gnarface | AndroUser: please use paste.debian.net or just /msg it to me if you want me to actually read it | 00:03 |
---|---|---|
AndroUser | I took a photo because my laptop isn't connected to the internet. | 00:04 |
gnarface | oh, imgur.com then | 00:04 |
AndroUser | I tried connecting the hotel WiFi via MAC address using "wpa_cli wbs_pbc", MAC address was detected but I couldn't get to the Hotel login screen on my GUI browser. | 00:06 |
gnarface | oh, if it's a captive portal thingy, i'm not sure what software in linux supports that | 00:07 |
gnarface | you might have to actually decode the hex dump of the reply into a url and manually paste it into a browser | 00:08 |
AndroUser | https://wiki.debian.org/CaptivePortal | 00:09 |
AndroUser | this? | 00:09 |
gnarface | yea, though i don't know if that information is complete | 00:10 |
gnarface | i forget now exactly how i was doing it, but i think i had figured this out at one point but not using xdg-open | 00:11 |
gnarface | there is some way to get some data from the AP but it just looks like a bunch of raw hex | 00:11 |
gnarface | usually it decodes into a raw http header or at least a url with some vendor-specific garbage associated with it | 00:12 |
gnarface | sometimes you can use that in whole or in part manually | 00:12 |
gnarface | make no mistake though, they're actually doing this to try to keep unapproved vendors' client software/hardware out specifically, it's vendor lock-in, anti-trust style, and is probably one of those things that is technically illegal but law makers aren't smart enough to notice it happening | 00:13 |
gnarface | so, the end result is that if you're unlucky you can get yourself permanently blacklisted by the AP by poking at it in the wrong way, be careful how you use whatever URLs you find in there | 00:14 |
gnarface | as i understand it, there's no standard way to handle these things, so that's why the only support for them is through shady under-the-table deals direct from the AP vendors to Google/Apple | 00:15 |
gnarface | they pay money to get a private exception added to Android and iOS and then everyone just keeps it a secret | 00:16 |
gnarface | mind you, just from the information i've seen so far i don't know that's actually the problem, i've been having a lot of problems with wifi here that seems to be related to poor driver implementations in linux | 00:18 |
gnarface | AndroUser: if that xdg-open trick doesn't work, try something like "iw wlan0 scan" | 00:31 |
gnarface | (that should dump a bunch of information about all the wifi networks in range, maybe you can see what looks like a few lines of random hex data in there) | 00:31 |
Xenguy | re: the keyring issue today: I tried the current workaround recommended in IRC by bb|hcb , and this is the output I receive: | 01:04 |
Xenguy | https://paste.debian.net/hidden/c7b6dc48/ | 01:04 |
Xenguy | There are still a few errors in evidence, and I'm wondering if this is expected behavior, or not? | 01:05 |
Xenguy | Oh, this is Beowulf BTW | 01:06 |
Xenguy | IOW, should I proceed, or is the workaround currently being used for Stable not applicable to Oldstable? | 01:15 |
rrq | note: https://dev1galaxy.org/viewtopic.php?pid=37322#p37322 | 01:16 |
Xenguy | rrq, Unclear, are you suggesting I should manually download the file, check the checksums, and manually install instead? | 01:27 |
fsmithred | Xenguy, it looks like the keyring got upgraded. Did you try running another update afterward? | 01:55 |
fsmithred | I can try that on chimaera and see what happens. I used the deb package on beowulf. | 01:56 |
Xenguy | fsmithred, Let me try the sequence another time then | 01:56 |
fsmithred | just 'apt update' and see if the errors are gone | 01:56 |
Xenguy | OK, sec | 01:57 |
Xenguy | fsmithred, The errors are not gone when I do: apt-get update && apt-get upgrade -s | 01:58 |
fsmithred | doesn't -s mean simulate? | 01:59 |
Xenguy | Yes | 01:59 |
fsmithred | so you didn't install the new keyring | 01:59 |
fsmithred | yet | 01:59 |
Xenguy | Correct | 01:59 |
fsmithred | even though it says you did. That's weird. | 01:59 |
fsmithred | I think the errors go away when you get the new keyring. | 01:59 |
Xenguy | I'll try this, as bb|hcb recommended: apt-get update --allow-insecure-repositories && apt-get install devuan-keyring --allow-unauthenticated -s | 01:59 |
Xenguy | ^^ Again | 02:00 |
Xenguy | OK, even though there are error messages noting things, I think I should just proceed. Although there is something to be said for manually downloading instead and checking the checksums, hrm | 02:01 |
joerg | doesn't help there are TWO threads on forum now | 02:01 |
* Xenguy can hardly keep up... | 02:01 | |
fsmithred | doesn't work in chimaera | 02:05 |
golinux | Maybe fsmithred could join the 2 threads. I am just ignoring the whole issue for the moment . . . | 02:05 |
fsmithred | and in chimaera, apt-get does NOT have an option "--allow-insecure-repositories" | 02:06 |
fsmithred | it only has --no-allow-insecure-repositories | 02:06 |
fsmithred | wtf? | 02:06 |
golinux | The "bus factor" is haunting us . . . | 02:06 |
fsmithred | Xenguy, if you're going to proceed, you must run it again without the -s | 02:07 |
golinux | Will this ever be automated so synaptic can do it? | 02:07 |
fsmithred | but I don't think it'll work anyway | 02:07 |
fsmithred | Adding this to apt config as suggested in man page did not help: APT::Get::AllowUnauthenticated; | 02:17 |
Xenguy | fsmithred, hrm I just assumed that 'apt' or 'apt-get' was interchangeable, but you seem to be indicating otherwise | 02:17 |
fsmithred | they don't have all the same options | 02:17 |
Xenguy | So I'm learning, hrm | 02:17 |
fsmithred | but they are mostly interchangeable | 02:18 |
Xenguy | That's fine, I can use 'apt' instead, np | 02:18 |
fsmithred | they fail equally well in this case | 02:18 |
Xenguy | (Ahhh, the beautiful sound of heavy rain | 02:18 |
Xenguy | ) | 02:18 |
Xenguy | Alright, I'm pivoting here, and will d/l the keyring file, check checksums, and then 'dpkg -i | 02:23 |
Xenguy | ' to install | 02:23 |
rrq | those apt options don't work until you've removed teh InRelease file manually. did anyone read the isntructions? | 02:28 |
Xenguy | Jesus H. Particular Christ | 02:28 |
Xenguy | I followed the 'Alternatively' path you previously posted, here: https://dev1galaxy.org/viewtopic.php?pid=37322#p37322 | 02:29 |
rrq | yes, that;'s good too; it's an alternataive | 02:30 |
Xenguy | That appears to have gone fine, yet now it wants to install more updates than I would have expected (it could still be legit): | 02:30 |
Xenguy | Calculating upgrade... Done | 02:31 |
Xenguy | The following packages will be upgraded: | 02:31 |
Xenguy | ghostscript libflac8 libgs9 libgs9-common qemu qemu-block-extra qemu-kvm qemu-system-common qemu-system-data qemu-system-gui | 02:31 |
Xenguy | qemu-system-x86 qemu-utils | 02:31 |
oolon | ahoy! | 02:31 |
Xenguy | I assume I should just damn the torpedos and go for it | 02:31 |
rrq | (I've been carrying stuff so my fingers goa little be theym selves) | 02:31 |
oolon | i see the gpg key just expired. a is there going to be a update soon? | 02:31 |
* Xenguy sighs... | 02:31 | |
rrq | as long as you haven't changed your sources.list entries, than those are ordinary upgrades | 02:32 |
rrq | Xenguy: ^^^ | 02:32 |
Xenguy | rrq, That's what I assumed, they arrived just in time to confuse the issue, of course = ) | 02:32 |
Xenguy | Damn you Murphy! | 02:32 |
Xenguy | oolon, See /topic | 02:33 |
rrq | could someone change forum pointer in /topic to 37322#p37322 rather? | 02:34 |
oolon | cool so it expires in a few hours | 02:35 |
brocashelm | i think post 37322 should also be made into a separate thread | 02:36 |
rrq | mmm, yes. maybe golinux has the hands-on for such a thing ingrained? | 02:42 |
brocashelm | iirc, fluxbb supports this function (to split post(s) into a thread) | 02:46 |
brocashelm | if not, then just repost the same information plus the other working solutions as fallbacks | 02:46 |
rrq | might be easiest :) | 02:47 |
Xenguy | rrq, I was think that too. Better yet (if no one objects, or if someone will vouch for me), give me a 't' flag and I'll do it myself | 02:48 |
Xenguy | s/think/thinking | 02:48 |
Xenguy | Or somebody give me a 't' flag so I can adjust /topic | 02:48 |
Xenguy | That way I can be useful while the real wizards do the heavy lifting : -) | 02:50 |
golinux | It can be split but I am not competent to understand this topic yet. | 02:54 |
golinux | brocashelm: rrq ^^^ | 02:55 |
golinux | Threads can also be joined. | 02:56 |
golinux | fsmithred could do it too. | 02:57 |
golinux | I looked at joerg's post and just glazed over . . . | 03:00 |
joerg | hm? | 03:00 |
rrq | https://dev1galaxy.org/viewtopic.php?pid=37324#p37324 | 03:02 |
joerg | ok? | 03:04 |
fsmithred | I think there needs to be a note after "https://dev1galaxy.org/viewtopic.php?pid=37324#p37324" that says "Ignore the errors and proceed to the next command." | 03:07 |
fsmithred | not aftert http:blah | 03:07 |
fsmithred | after # apt-get update --allow-unauthenticated --allow-insecure-repositories | 03:07 |
Xenguy | It might be better to just advocate the other method (download, check checksums, and manual install) cos it trains users to check the validity of the file they just downloaded? | 03:08 |
joerg | +1 | 03:08 |
fsmithred | yeah, that was more comfortable for me | 03:09 |
joerg | "--allow-insecure-repositories" sounds nasty, read it aloud and listen ;-) | 03:10 |
golinux | Will this ever happen automatically in synaptic? | 03:11 |
Xenguy | OK, looks like I'm patched up now, thanks everyone for all assistance rendered | 03:11 |
Xenguy | golinux, You might need to temporarily hit the CLI | 03:11 |
* golinux groans . . . | 03:11 | |
fsmithred | Xenguy, I can't give you a +t | 03:11 |
Xenguy | which is not so bad if someone gives you a simple instruction | 03:12 |
Xenguy | golinux, ^^ | 03:12 |
Xenguy | fsmithred, Nothing ventured, nothing gained. I'm only seeking to help with /topic updates. Seems joerg has it covered, so no biggie | 03:12 |
golinux | Not tonight at least . . . | 03:13 |
Xenguy | golinux, I'm happy to walk you through it step-by-step, it just worked for me, and I think you'd find it pretty painless. Let me know if you'd like to proceed, and when would be a good time. You know where to find me : -) | 03:15 |
rustyaxe | Thanks to all who worked on repairing the repos/keyring. Cheers! | 03:17 |
Xenguy | IMHO the second alternative should be first, and the first second... | 03:24 |
Xenguy | Still, good enough, and good job | 03:24 |
joerg | https://dev1galaxy.org/viewtopic.php?id=5213 was too terse? | 03:26 |
joerg | note you truncated topic now | 03:26 |
fsmithred | what got lost? | 03:26 |
fsmithred | oh, I see it | 03:27 |
joerg | opic | 03:27 |
Xenguy | joerg, I thought it was great, I just felt that 'First alternative' should be 'Second alternative', and vice versa | 03:27 |
joerg | https://dev1galaxy.org/viewtopic.php?id=5213 is 100% idetical function to https://dev1galaxy.org/viewtopic.php?pid=37324#p37324 | 03:27 |
Xenguy | Whatevsies : -) | 03:28 |
Xenguy | Not gonna lose sleep over a detail | 03:28 |
* fsmithred edits his notes | 03:40 | |
oolon | i powered through and it worked | 05:06 |
oolon | i powered through and it worked | 05:06 |
Wonka | Did I miss some update of the devuan-keyring package? I have 2017.10.03, and that contains keys that are now expired, breaking "apt update"... | 09:15 |
D-HUND | Wonka: https://dev1galaxy.org/viewtopic.php?pid=37324#p37324 | 09:17 |
Wonka | oopsie :) | 09:21 |
Wonka | thanks! | 09:21 |
Wonka | now I'm kinda wondering how to monitor when signing keys of repositories expire... | 09:22 |
* _ds_ prefers use of ‘here’ docs & use of the --check option in instructions for checking hashes (where there are commands to be pasted) | 13:10 | |
nonono12345 | EXPKEYSIG BB23C00C61FC752C Devuan Repository (Amprolla3 on Nemesis) <repository@devuan.org> | 16:16 |
gnarface | solution in /topic | 16:18 |
joerg | Wonka: that's the best question of the week (how to monitor expiry date) - I'm sure any suggestions are highly welcome | 17:10 |
djph | joerg: as an owner of a key, or users? | 18:44 |
joerg | here the former :-) | 18:44 |
* joerg summons bb|hcb to chime in ;-) | 18:46 | |
djph | gpg --list-keys --fingerprint | grep -A2 expires <<- something like that> | 18:48 |
bb|hcb | Normally users should not have to monitor key's expiry. But devs should. Or as I did suggest in another channel, the key should remain valid for the lifetime of the whole release | 18:49 |
bb|hcb | djph: The ideal is to issue a new key with each release and let it be valid for the release lifetime | 18:52 |
bb|hcb | Then on the user's side no monitoring is needed | 18:53 |
djph | mmhmm | 18:57 |
djph | can't really disagree with that (barring, of course, a reason to kill it early) | 18:57 |
joerg | djph's suggestion might get integrated into the builder process, no? | 18:57 |
djph | I mean, I was just throwing out a "hey, here's a quick and dirty way to check the key dates" :D | 18:57 |
bb|hcb | Yes, there is a way to check, but there are many systems not exposed on the internet that are not updated at all. In case the key expires (like what happened now), update/upgrade will require a manual fix (as now)... And that is not good at all | 18:59 |
fsmithred | maybe Paul M. Furley has a script we could use. | 18:59 |
fsmithred | "a friendly robot called Expirybot" | 19:00 |
gnarface | can't you make a call to the openssl binary and just get it to return true or false based on whether the key is good? | 19:00 |
gnarface | i thought that was possible | 19:00 |
gnarface | then you could just stick that in a cron job | 19:00 |
djph | gnarface: for pgp keys? | 19:00 |
djph | uhhh, I dunno :D | 19:00 |
gnarface | oh, right, maybe for gpg no | 19:01 |
fsmithred | https://github.com/fawkesley/expirybot | 19:02 |
djph | whee, emails | 19:02 |
djph | heh, I've gotten emails from one of those before. "I KNOW! But today's Tuesday! I have 30 days!" :D | 19:03 |
fsmithred | I used to get them, but they stopped. Last one was in 2018 | 19:04 |
djph | hm ,maybe he stopped then | 19:04 |
djph | hm, only one I have expiring soon is a gmail that I don't use anymore. hah | 19:05 |
djph | ... oh, and a rsa2048 that I've also replaced already | 19:06 |
trmin | Getting error messages during update: "Fehl:2 http://deb.devuan.org/merged chimaera InRelease | 19:55 |
trmin | Die folgenden Signaturen waren ungültig: EXPKEYSIG BB23C00C61FC752C Devuan Repository (Amprolla3 on Nemesis) <repository@devuan.org>" Same with the pkgmaster repo. Obviously missing signature. Any idea? | 19:55 |
djph | trmin: check the /topic - there's a forum post about it | 19:56 |
triode | I have the same problem as this https://dev1galaxy.org/viewtopic.php?id=5212, but after applying the solution, all of my updates fail, the URL/file is not found for apt-get upgrade. Ideas? | 20:25 |
triode | An exanple would be: Err:1 http://deb.devuan.org/merged beowulf/main amd64 rsyslog amd64 8.1901.0-1+devuan4 404 Not Found [IP: 195.85.215.180 80] | 20:26 |
rwp | This is after having followed up by an "apt-get update"? | 20:27 |
triode | yes. | 20:27 |
triode | my /etc/apt/sources.list contains: https://pastebin.com/9SEPr7Aw | 20:28 |
triode | I will note my apt-get update throws errors still after the solution: https://pastebin.com/S1T0DEwW | 20:28 |
rwp | The deb.devuan.org name is a round robin DNS of many mirror sites. I think they are not yet all in sync yet. :-( | 20:29 |
triode | Is there a nice way to just toss the invalid sigs, or will it always shwo invalid when I do an update. | 20:29 |
rwp | I don't want to recommend shifting to the pkgmaster.devuan.org entry but I believe that would fix the problem for you. | 20:29 |
triode | Hrm, so this is a multipart error? e.g. if I wait it will resolve itself, or will the "The following signatures were invalid:" be there from here on out on my installs? | 20:31 |
triode | Just asking, as I have it installed on a few production servers... and the other sysadmins may freak and question why the heck I did this and not debian... :( | 20:31 |
rwp | Try this: sed --in-place 's/deb.devuan.org/pkgmaster.devuan.org/g' /etc/apt/sources.list && apt-get update --allow-insecure-repositories && apt-get install --allow-unauthenticated devuan-keyring && apt-get update | 20:33 |
rwp | And then afterward restore the sources.list back to the use of the mirrors to keep the load off the main server. | 20:33 |
triode | I thought you noted you would not recommend packagemaster? | 20:33 |
triode | Ah, I see. | 20:33 |
rwp | sed --in-place 's/pkgmaster.devuan.org/deb.devuan.org/g' /etc/apt/sources.list | 20:33 |
rwp | pkgmaster is the main server so if everyone were to abandon the mirrors and use it then the infrastructure would be overloaded and would collapse. | 20:34 |
triode | yes, I get that. | 20:34 |
rwp | We need the mirror system. But I think at this time the mirrors are not in sync yet. | 20:34 |
triode | Hrm, how long does it take the mirrors to sync up? | 20:35 |
rwp | I am sporadically seeing the same problem too. But I grabbed a local copy of the devuan-keyring_2022.09.04_all.deb file and have been copying it around locally and installing it with dpkg -i devuan-keyring_2022.09.04_all.deb and updating my systems that way. | 20:35 |
triode | So, anyone know what broke this in the first place? | 20:36 |
rwp | I was going to ask onefang about the mirror sync problems I have been seeing myself. | 20:36 |
fatalerrors | Hi I think repository certificates expirted | 20:36 |
triode | Ah. | 20:36 |
rwp | fatalerrors, Yes. Please see the /topic for fixes. | 20:37 |
golinux | fatalerrors: Youare lat to the party! | 20:49 |
djph | that was a real fun time; updating all 2 dozen VM's ... | 21:08 |
rwp | djph, http://www.infrastructures.org/ | 21:11 |
rwp | It's somewhat obtuse but basically says to use a system configuration framework to administer the network collective of systems rather than individual systems. | 21:11 |
djph | yeah, and ansible is on my "to learn" list :P | 21:12 |
rwp | onefang, I have been trying to decipher https://sledjhamr.org/apt-panopticon/results/Report-web.html because mirrors are giving BADSIG errors. :-( | 21:24 |
dan9er[m] | Hello, everyone! I'm trying to install Devuan Chimaera on my Surface Laptop 1. The issue is that the keyboard doesn't work past the installer bootloader. This can be worked around by plugging in an external keyboard and later fixed by installing the linux-surface patched kernel. However, the laptop only has 1 USB port, which is occupied by the installer USB. Is there an equivalent to Ubuntu's `toram` boot parameter (which dumps the USB's | 21:47 |
dan9er[m] | contents to RAM, allowing it to be unplugged), will I need to go out and buy a USB hub, or is there another way I don't know of? | 21:47 |
dan9er[m] | I'm using the `desktop` image (which is 4GB) and my model has 8GB of RAM, so i'm good on that | 21:49 |
bb|hcb | triode's problem is not because the mirror is not updated, rsyslog 8.1901.0-1+devuan4 is an old and obsolete version (current is devuan6). This means that the 'apt update' failed and apt is using old info | 21:51 |
fsmithred | dan9er[m], the live isos will boot to RAM. Be aware that they use a different installer (refractainstaller) | 21:52 |
fsmithred | or else you can do a debootstrap install from the live isos | 21:53 |
fluffywolf | that's a weird problem. leave it to microsoft to break something as simple as keyboard input. | 21:54 |
fluffywolf | did you try the traditional curses text-based installer and the graphical installer? | 21:55 |
dan9er[m] | fsmithred Does it actually go all to RAM right away or does it load from USB as needed (like Tails)? | 21:56 |
bb|hcb | And a note - advising people to switch to pkgmaster will not solve anything, but most probably create problems. pkgmaster has limited bandwidth unlike most mirrors and overloading it will cause delays to mirror updates... | 21:56 |
fsmithred | dan9er[m], it uses the toram boot option of live-boot | 21:57 |
dan9er[m] | fluffywolf, there is only curses installer. graphical got removed a while back due to size constraints | 21:57 |
fsmithred | filesystem.squashfs gets read into RAM and you can pull out the usb stick. | 21:57 |
dan9er[m] | fsmithred Thanks! | 21:58 |
fsmithred | assuming you prepared the stick with dd or cat. | 21:58 |
fsmithred | isohybrid | 21:59 |
dan9er[m] | and yeah fluffywolf microsoft really sucks, got this laptop as a hand-me-down | 21:59 |
fsmithred | if you made some kind of multi-boot usb stick, you will run into problems. | 21:59 |
dan9er[m] | would never buy a surface with my own money lmao | 22:00 |
fluffywolf | googling suggests the necessary drivers are in the mainline kernel on newer kernel releases? might be able to stuff a newer kernel into the installer. | 22:01 |
dan9er[m] | fsmithred I believe balenaEtcher is just a frontend to dd, right? Unless it does something stupid | 22:02 |
fsmithred | I have no idea. If so, it should show up on the desktop as a CD when you plug it in. | 22:03 |
fluffywolf | do we have a daedalus installer working yet? lol | 22:03 |
fsmithred | yes, there are daedalus installer isos and there are old daedalus live-isos. I can't make new live isos until something upstream gets fixed. | 22:04 |
fsmithred | live-boot, I think. | 22:04 |
dan9er[m] | uhhhh fluffywolf not sure how injecting a kernel would interact with the install process. KB works on kernel >=5.13 or with surface-linux. Chimaera uses 5.10 | 22:05 |
fluffywolf | does the daedalus installer include a new enough kernel to have the surface modules? looks like 5.14 or newer should Just Work, according to googling. | 22:05 |
fsmithred | oh, you need an image with a backports kernel. Try this one to see if it works: https://get.refracta.org/files/experimental/refracta_test_oblx_5.15_bpo-20220220_2148.iso | 22:07 |
fsmithred | dan9er[m], are you going to image the stick with a live iso and try booting to RAM? | 22:08 |
fsmithred | try soon, I mean. If that doesn't work, I have other ideas. | 22:09 |
dan9er[m] | Yeah, Chimaera live ISO seem like my best bet rn | 22:09 |
dan9er[m] | i'll let you know if that doesn't work | 22:09 |
fsmithred | ok | 22:10 |
dan9er[m] | fsmithred Well it won't boot from the USB. Tried flashing with dd, won't boot | 23:03 |
dan9er[m] | s/won't/didn't/ | 23:04 |
fsmithred | try the iso with the backports kernel. See if it boots. | 23:04 |
fsmithred | https://get.refracta.org/files/experimental/refracta_test_oblx_5.15_bpo-20220220_2148.iso | 23:04 |
fsmithred | it's devuan | 23:04 |
dan9er[m] | wait nvm, it boots if you go into UEFI and boot it from there??? | 23:05 |
fsmithred | oh. You normally boot that thing from bios? | 23:06 |
dan9er[m] | that didn't work with the regular image, welp | 23:06 |
fsmithred | how far did it get? | 23:06 |
fsmithred | any useful messages? | 23:06 |
dan9er[m] | Yeah VolUp+Power to go to bios, Boot config, swipe left on USB Storage | 23:06 |
dan9er[m] | The swipe left in bios didn't work with the non-live image | 23:07 |
fsmithred | try with the newer kernel | 23:07 |
fsmithred | ping me if it boots. I can tell you a couple of ways to install. | 23:07 |
rrq | dan9er[m]: how about getting a USB hub? | 23:08 |
fsmithred | that's no fun | 23:08 |
dan9er[m] | Nonono, I got the live USB to boot | 23:08 |
fsmithred | oh, ok | 23:09 |
fsmithred | does the keyboard work, or do you have to use toram and usb keyboard? | 23:09 |
dan9er[m] | Trackpad works but not KB strangely | 23:14 |
dan9er[m] | erm where's the on-screen KB | 23:15 |
dan9er[m] | there is none? | 23:17 |
fsmithred | none that I know of | 23:17 |
fsmithred | what's it called? | 23:18 |
fsmithred | copy/paste? | 23:18 |
dan9er[m] | Booting with toram now | 23:20 |
dan9er[m] | Getting this junk laptop to boot from USB is finicky, most time it just doesn't see the USB | 23:21 |
fsmithred | check accessibility settings. Might be a keyboard if you turn that on. | 23:22 |
dan9er[m] | there's sticky/slow/bounce keys, but no software KB | 23:26 |
rrq | another possible path is to instead use a PXE boot, if you have a server host on the same network | 23:27 |
dan9er[m] | I did to RAM boot and plugged in a KB, installing now | 23:41 |
dan9er[m] | Thank you everyone | 23:41 |
fsmithred | cool | 23:46 |
ballsystemlord | Hello, The repository key for devuan has expired. I looked up what to do and it seems that apt-key is the way to go... | 23:53 |
ballsystemlord | Until I actually tried it and got a no-op from he update option. | 23:53 |
ballsystemlord | And the adv option to receive keys is not advised due to the security problems. | 23:54 |
ballsystemlord | Any advice? | 23:54 |
ballsystemlord | My system was updated within the last 2 weeks. | 23:54 |
ballsystemlord | So it's not like I didn't receive any new packages. | 23:54 |
ballsystemlord | Thanks! | 23:54 |
Jjp137 | ballsystemlord, from the /topic: https://dev1galaxy.org/viewtopic.php?id=5213 | 23:57 |
Generated by irclog2html.py 2.17.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!