E: Failed to fetch https://myattwg.att.com/olam/jsp/login/uverse/VS/UverseAccount.html
File has unexpected size (7009 != 20884). Mirror sync in progress?
[IP: 184.31.10.246 443]
Hashes of expected file:
- SHA256:eac7c87ae7118d29d55d497c8a3873dd1c0c062dd3df06ca74a4710ddcb950d9
- MD5Sum:40029a8ea9aa7a6c9ddf3aa60404c17a [weak]
- Filesize:20884 [weak]
On 13 Jan 2024 13:44 +0000, from lbrtchx@gmail.com (Albretch Mueller):
E: Failed to fetch https://myattwg.att.com/olam/jsp/login/uverse/VS/UverseAccount.html
File has unexpected size (7009 != 20884). Mirror sync in progress?
[IP: 184.31.10.246 443]
Hashes of expected file:
- SHA256:eac7c87ae7118d29d55d497c8a3873dd1c0c062dd3df06ca74a4710ddcb950d9
- MD5Sum:40029a8ea9aa7a6c9ddf3aa60404c17a [weak]
- Filesize:20884 [weak]
That URL doesn't look right. You wouldn't by any chance be behind a
captive portal or something like that which is asking for
reauthentication?
On 1/13/24, Michael Kjörling <2695bd53d63c@ewoof.net> wrote:
On 13 Jan 2024 13:44 +0000, from lbrtchx@gmail.com (Albretch Mueller):
E: Failed to fetch
https://myattwg.att.com/olam/jsp/login/uverse/VS/UverseAccount.html
File has unexpected size (7009 != 20884). Mirror sync in progress?
[IP: 184.31.10.246 443]
Hashes of expected file:
-
SHA256:eac7c87ae7118d29d55d497c8a3873dd1c0c062dd3df06ca74a4710ddcb950d9
- MD5Sum:40029a8ea9aa7a6c9ddf3aa60404c17a [weak]
- Filesize:20884 [weak]
That URL doesn't look right. You wouldn't by any chance be behind a
captive portal or something like that which is asking for
reauthentication?
Assuming I am indeed "behind a captive portal or something like that
which is asking for reauthentication" why is it that it only reacts
when I visit certain sites, like the profiled ones I need to access
right after I boot up?
My access to the Internet seems to be fine. I tested various urls:
My access to the Internet seems to be fine. I tested various urls:
url="https://www.wired.co.uk/article/facebook-energy-heating-homes"
E: Failed to fetch
https://myattwg.att.com/olam/jsp/login/uverse/VS/UverseAccount.html
On 1/19/24, Max Nikulin <manikulin@gmail.com> wrote:
Precise steps
depend on degree of your paranoia.
... and mine is of the totally irrevocable, even joyful kind; so,
where are the steps?
I have always believe that Debian’s basic assumptions about using the Internet as a relatively secure, “private” venue are definitely more worryingly irrational than my paranoia.
I think at some point I will have to learn more about Debian’s apt utility. Any documentation you would suggest explaining it all from
the protocoled structure of deb packages to the various installation procedures depending on degree of paranoia? When I learn something I
like to learn all of it.
I tend to only mind what I am working on. I would just use an
unexposed computer and/or do things by hand/on paper if possible, but
you can’t do algorithmic simulations and tests by hand.
lbrtchx
On 1/19/24, Max Nikulin <manikulin@gmail.com> wrote:
On 18/01/2024 12:45, Albretch Mueller wrote:
On 1/14/24, Max Nikulin wrote:
Generally just pay attention that GPG keys for repositories are obtained >>> through trusted channels.
How do you functionally (that is, give me the step-by-step command
line statements, ... in order to) do that?
Verify installation (or live) image to have initial keyring
https://lists.debian.org/msgid-search/uobl6l$i21$1@ciao.gmane.io
Re: Correction to last message for Debian 11 and Debian 12. Thu, 18 Jan 2024 23:55:48 +0700.
Optionally install necessary keyring packages.
When adding a third-party repository, evaluate that GPG key you are
going to add really belongs to repository maintainers. Precise steps
depend on degree of your paranoia.
Package dependencies to me are just DAGs,
[ … ] I haven’t found a book yet, explaining it all.
At times I have found great explanations about single aspects.
On 1/19/24, David Wright <deblis@lionunicorn.co.uk> wrote:
On Fri 19 Jan 2024 at 22:19:21 (+0000), Albretch Mueller wrote:
Package dependencies to me are just DAGs,Are they? No circular dependencies?
The way I see them, "circular dependencies" are "cultural".
"organizational" issues not essentially technical ones. circular
dependencies happen in packages which should be part of the same node.
Show me examples in which it is not the case.
[ … ] I haven’t found a book yet, explaining it all.What sales figures would you expect to see with such a book?
At times I have found great explanations about single aspects.
... and since that sounds to me like ransom money aren't you the one
who would determine the amount yourself?
[ … ] So, to start I would
like to study the Debian packages and how dpkg establishes and keeps
those dependencies. What happens on the hire and on the repositories
with certificates ... I haven’t found a book yet, explaining it all.
At times I have found great explanations about single aspects.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 297 |
Nodes: | 16 (2 / 14) |
Uptime: | 29:00:56 |
Calls: | 6,669 |
Calls today: | 1 |
Files: | 12,216 |
Messages: | 5,338,027 |