[06:09] <lotuspsychje> good morning
[06:09] <lotuspsychje> http://themes.freecode.com/tags/theme is not longer a valid url on the !themes trigger
[06:09] <lotuspsychje> tnx
[06:11] <daxcat> !-themes
[06:11] <daxcat> !themes
[06:12] <daxcat> !themes =~ s,http://themes.,http://,
[06:12] <daxcat> !themes
[21:17] <ezri> !info firefox trusty
[21:17] <k1l_> http://packages.ubuntu.com/trusty/firefox
[21:17] <ezri> Pici: how come it's p[ulling version number from trusty-updates (v44) instead of security (v45)?
[21:18] <k1l_> that says 45. so maybe the bot is not just updated yet
[21:18] <ezri> the security update was 7 days ago :\
[21:18] <ezri> assuming changelog isn't lying
[21:19] <ezri> oh, it was published 6 hours ago
[21:19] <ezri> Pici: nvm
[21:19]  * ezri mutters some things
[21:20] <Unit193> Was about to say that you have to look at the published date.
[21:20] <k1l_> yeah, maybe it just not got the daily cronjob for updating the bot db yet
[21:20] <ezri> Unit193: yeah I wasn't aware that stuff went via PPA
[21:20] <Myrtti> tor factoid could do an update to remove the tor-sasl bit for now
[21:20] <Myrtti> incidentally
[21:21] <Myrtti> I've forgotten how to do it
[21:21] <ezri> in Sane Dax Universe we don't do new major versions of packages and security updates are immediate to fix specific high-priority issues
[21:21] <ezri> !tor
[21:21] <ezri> !-tor
[21:21] <ezri> !search tor
[21:21] <ezri> oh, it's doing partial word match joy
[21:21] <ezri> !tor =~ s/ |.*$//
[21:21] <ezri> !tor
[21:21] <ezri> gdi the | is special huh
[21:22] <ezri> !no, tor is <reply> Tor is a program to route connections through several servers for anonymity. It is in Ubuntu's repositories, but the Tor Project recommends using their Tor packages due to past issues with Ubuntu's. For setup info, see option (2) of https://www.torproject.org/docs/debian.html.en
[21:22] <Unit193> ezri: If it doesn't build on some platform, that can hold things up a bit too.
[21:22] <ezri> !forget tor-sasl
[21:23] <ezri> !forget torsasl
[21:23] <ezri> !forget torgpg
[21:23] <ezri> !forget tor-gpg
[21:23] <Myrtti> if and when it comes back, it can be unforgetted
[21:23] <Myrtti> forgotten
[21:23] <Myrtti> whatever
[21:23] <ezri> ja
[21:24] <ezri> !forget eir
[21:24] <Unit193> Myrtti: Heh, pretty sure that's entirely no time soon. :)
[21:24] <ezri> !forget pdpc
[21:24] <ezri> !forget eir-#ubuntu-ops-team
[21:24] <Myrtti> Unit193: it's actually on the priority list quite high, not on the top mind, but there still
[21:24] <ezri> oh that one already got deleted
[21:25] <Myrtti> well, it's not the top1 item
[21:25] <Unit193> Still, going to be hard to figure out how to enable it, without all the abuse that comes with it.
[21:26] <ezri> depends on what precisely you mean by "abuse"
[21:27] <ezri> the reason it's disabled is because of people using it to brute-force NickServ account passwords. if they code it to only accept certificate-based SASL that's at least half of the problem solved
[21:28] <ezri> or another option is making the ability to use Tor-SASL opt-in along the lines of "I want to use Tor-SASL and assert that my password is not crap"
[21:28] <Unit193> Though I don't believe a lot of clients support that, Irssi no longer can (right now.)
[21:29] <ezri> irssi supports EXTERNAL, just freenode doesn't yet
[21:29] <Unit193> According to #irssi, that maaaay be broken in .18. :D
[21:30] <ezri> lol
[21:30] <Unit193> ezri: I used cap_sasl.pl with cryptx, /ns info Unit193
[21:30] <ezri> meanwhile weechat supports plain ecdsa-nist256p-challenge external dh-blowfish dh-aes
[21:31] <Unit193> We need 25519!
[21:31] <ezri> lol
 in italian ubuntu offtopic channel k1
[21:35] <k1l_> anyone know if they got an own ops channel for the italian ubuntu channel?
[21:36] <Myrtti> doesn't look like it
[21:36] <Myrtti> at least according to alis
[21:37] <ezri> chanserv says there is #ubuntu-it-ops
[21:37] <ezri> it's +s hence no alis
[21:38] <Unit193> nono, that's their secret police channel, clearly!