The thing that finally made me install Chromium? The refusal of Google+ to work with Firefox 3.5 (from Debian/testing). Well played Google. Well played.
Update: Please note I didn't say "switch to Chromium", it was just installing it at all. I've also pulled in FF 5 from experimental which seems to be working nicely - I hope that it can make its way into unstable and thus to testing soon.
This is for my own reference more than anything else; periodically I find myself needing to boot DOS. Usually because I want to upgrade a BIOS and the upgrade tool only works with Windows or DOS. Yes, I’m aware of flashrom, but the scary messages about toasting laptops means I’m much happier going the DOS route there. So I need a writable medium with a DOS boot image. The easy way to do it is to find a DOS floppy image and write that to a USB stick with dd, but it’s basically a one off and means you can’t fit a whole lot on the image. I wanted to do a native USB boot. The following did the trick for me.
Firstly, this is all on a Debian testing box, in particular with dosfstools (3.0.9-1), mbr (1.1.11-4) and syslinux (2:4.04+dfsg-2). I don’t think I’m using anything particularly new from these tools, so I suspect Debian stable will work just fine.
In the below my USB stick is on
/dev/sdb, I’ve got a copy of FreeDOS in
~/FreeDOS/ (I extracted the files from a
balder10.img floppy image that’s easy enough to find, but all you need is
command.com), and I wanted things neatly in their own subdirectories so I could try and keep the key for repeated use and know which bits I wanted to keep and which were transient. I also added a copy of the Debian Installer for convenience; it would need a copy of the netinst ISO dropped into the root to actually be useful, as there’s not enough to do a full netboot from the wider Internet using just the HD initrd.
# Create a single bootable LBA VFAT partition spanning entire stick. echo 0,,C,* | sfdisk /dev/sdb # Format as VFAT and give it a disk label. mkfs.vfat -n 'DOS BOOT' /dev/sdb1 # Install an MBR install-mbr /dev/sdb # Mount it and create some directories for our files. mount /dev/sdb1 /media/DOS\ BOOT/ cd /media/DOS\ BOOT/ mkdir boot mkdir boot/syslinux/ mkdir FreeDOS # Copy the chain.c32 syslinux tool over. cp /usr/lib/syslinux/chain.c32 boot/syslinux/ # Copy FreeDOS over and move the important bits to / cp ~/FreeDOS/* FreeDOS/ mv FreeDOS/command.com . mv FreeDOS/autoexec.bat . mv FreeDOS/fdconfig.sys . # Add the Debian Installer mkdir boot/d-i/ cd boot/d-i/ wget http://cdn.debian.net/debian/dists/squeeze/main/installer-amd64/current/images/hd-media/initrd.gz wget http://cdn.debian.net/debian/dists/squeeze/main/installer-amd64/current/images/hd-media/vmlinuz # Install syslinux syslinux -d boot /dev/sdb1
I made a
boot/syslinux.help file containing:
Available boot options are: FreeDOS d-i
prompt 1 display syslinux.help default FreeDOS label FreeDOS COM32 /boot/syslinux/chain.c32 APPEND freedos=/FreeDOS/kernel.sys label d-i KERNEL /boot/d-i/vmlinuz INITRD /boot/d-i/initrd.gz
Initial testing was done using kvm which was a lot easier than constantly rebooting my laptop.
Hopefully this is of help to someone. The only neat bit that I didn’t see elsewhere when I was looking was the use of
chain.c32 to load
kernel.sys rather than having to use a FreeDOS provided boot sector image.
This should probably be an official FAQ, but a) I wanted to rant a bit more than is probably acceptable for something “official” and b) the sort of person this information is directed at never bloody reads keyring.debian.org, which is the logical place for it.
Who are keyring-maint?
Currently Gunnar Wolf (good cop) and Jonathan McDowell (bad cop). Previous keyring maintainers include Igor Grobman & James Troup.
I’d like to be a DM/DD. Do I send you my key?
I’d like to replace my DM/DD key in the Debian keyring. What should I do?
Read the instructions at http://keyring.debian.org/replacing_keys.html
I have a new key that isn’t signed by anyone else, will you accept it?
No. Did you read http://keyring.debian.org/replacing_keys.html ?
I’ve got a single DD signature on my new key. That’s enough, right?
Not unless your old key has been lost and you’re getting a different DD to request the replacement for you (and if they’re prepared to ask for a key replacement we’ll wonder why they’re not prepared to sign the new key too).
Did you read http://keyring.debian.org/replacing_keys.html ?
I’m still really confused about how I should request a key replacement. Help?
Try reading https://rt.debian.org/Ticket/Display.html?id=3141 (which just happens to be a recent decent example). Clear subject line (I’d have added a real name too, but it’s still fairly clear), full fingerprint of the old and new keys, inline signed so RT doesn’t mangle it. New key signed by old key and 3 other DDs. Request signed by old key.
That RT link needs a login. I don’t have one.
Have you tried reading up on the Debian RT system? There’s a generic read only login that’ll get you access.
That’s too hard. Can’t you just give me the details?
Damnit. It appears the read-only login details are currently disabled due to misuse (one wonders how). Try reading http://wiki.debian.org/rt.debian.org
Why are you using RT? Isn’t bugs.debian.org more appropriate?
We need the ability to for people to contact us is in a private fashion, for example if they need to us to remove a key because it’s been lost or compromised. We could only use RT for that purpose and use bugs.d.o for things that can be public, but this way all the information is in one place and we get to make the call about when it becomes a publicly viewable ticket.
What’s with jetring? Should I send you a jetring changeset?
jetring is a tool written by Joey Hess that used to be used to manage the Debian Maintainers keyring. keyring-maint borrowed a number of good ideas from jetring but don’t use it at all. We ignore jetring changesets.
So you just want key fingerprints, not attached keys?
Yes. Of course you have to make sure your key is actually on a public keyserver so we can get it. the.earth.li is a good choice (because Jonathan runs it and thus pays more attention to it), but subkeys.pgp.net or pool.sks-keyservers.net are also commonly used.
My key has expired and I want to update the key expiry date. I should email RT asking for this to be done, right?
No, you should send the updated key via HKP to keyring.debian.org. You can do this with
“gpg –keyserver keyring.debian.org –send-key
I tried to send an entirely new key via HKP to keyring.debian.org, but I can’t see it there. What gives?
keyring.debian.org only accepts updates to keys it already knows about. That means you can send updated expiry dates, new uids and new signatures to your existing key, but not an entirely new key.
I sent my updated key via HKP to keyring.debian.org and can see it’s updated there, but the Debian archive processing tools (eg dak) don’t seem to recognize the update. Why not?
The updates sent via HKP are folded back into the HKP server automatically every 15 minutes or so. They are folded into the live Debian keyrings on a manual basis, at least once a month.
This means if your key has an expiry date then you probably want to update your key at least a month before it expires.
Where can I find these live Debian keyrings?
They’re what’s available via rsync from keyring.debian.org::keyrings/keyrings/
This is canonical location for the current Debian Developers and Debian Maintainers keyrings.
What about the debian-keyring package?
This is a convenience package of the keyrings. It’s usually the most out of date. We update it sporadically and try to ensure that the version shipped with a stable Debian release is current at the point of release. It is not used by any of the official Debian infrastructure.
Why don’t you automatically update my key in the live keyring when I send an update via HKP?
We think that automatic updates of keys that allow uploads to Debian are a bad thing and that invoking a human eye at some step of the process is a useful sanity check.
How are updates to the keyring tracked?
We use bzr to maintain the keyring, with a separate file per key that can then be easily combined into the various keyrings. You can see the repository at:
Note that this is only updated when a keyring is pushed to live; the working tree may contain details of compromised keys and thus isn’t public.
What’s with the whole replacement of 1024 bit keys?
2 things. Firstly 1024 bit keys tend to use SHA1 as a hash algorithm, which has been shown to be weaker than expected. While we’re not aware of active exploits against this updating all of the keys Debian uses is not a trivial process and it’s wiser to get it done /before/ there’s a known issue. Secondly computing power has moved on and we feel that upgrading to larger key sizes is prudent.
Elliptic curve cryptography (ECC) keys look like the future. Can I use one for Debian?
No, not at present. When there are tools that are part of a Debian stable release that support them we’ll look into it, after discussion with the major users of the keyring (DSA, ftpmaster, the secretary).
I don’t normally mention the PGP keyserver I’ve been working on for the past 9 years, but there are a few keyserver related comments I’ve been meaning to make that prompt me to do so this time.
onak is the keyserver powering the.earth.li (AKA
Back in February I finally enabled hkps (HKP over SSL) access to it as I
promised dkg I would do back at
DebConf10. I also turned on IPv6.
Most of the active keyservers out there are running
SKS. I think there might be a few
OpenPKSD instances as well. If you’re
running SKS please ensure that you have at least one address in your
mailsync file, so that you send key updates to the non SKS keyservers
out there - it seems that SKS requires the receiving keyserver to send
out updates via email, rather than each server sending out any updates
it processes to its mailsync peers. Feel free to add
earth.li - no need to contact me to do so (but you can drop me a
line if you want me to send you mail updates back).
Also in the past there was a
pgp-keyserver-folk mailing list, originally
on flame.org, then on alt.org. Both of these have been dead for a while.
I created a local
some time ago, but never publicised it. I believe the SKS lists are
fairly active, but limited to that community, so it would be nice to
have somewhere that was keyserver agnostic that admins could talk to
Anyway. onak 0.4.0. Largely fixes to
keyd, which is a backend daemon
that handles talking to the key database. This is particularly useful
for large/busy keyservers. Also a couple of fixes that make the db4
backend a lot more reliable (especially with queries that return lots of
results). And various other minor cleanups. If you’re one of the 3
people running it you probably want to upgrade; updated packages have
already been uploaded to Debian unstable.
subscribe via RSS