[arm-allstar] Arch vulnerabilities

Fred Moore fred at fmeco.com
Fri May 1 02:38:35 EST 2015


Just curious how vulnerabilities are planned for... has a system (other
than) ABS/Packman been thought out or incorporated into this custom Arch
distribution..  if so is app-rpt going to be just a source package in
the future, how is this going to be handled.. I am wondering about
updates..  patches or ???

For some reason when I dd the image to a 16G class 4 card it took almost
2 hours.. I was monitoring the process with isotat, it appeared that
some block sequences were transmitted several times each second.. 
anyone else seeing this.. I ran this with two different files with the
same result.. ???  Both file's checksum agreed.

BTW I tested with Rasbarian image and it finished in about 15 minutes
and didn't seem to be having any problem when monitored with iostat.  I
did veryify the sha of all files I downloaded with each other... 

Doug if I may be so bold, would you mind publishing the sha checksum's
on the website, so we don't have to download several times and compare
to each other, and are able to verify a 100% correct download..   you
might also think about a code signature.. so we know code that is not
from you, but somehow will get out in the wild.. 

Thanks for all the hard work... regards.. Fred


-- 
Fred Moore
email: fred at fmeco.com
       fred at safes.com
phone:  321-217-8699


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 535 bytes
Desc: OpenPGP digital signature
URL: <http://lists.hamvoip.org/pipermail/arm-allstar/attachments/20150501/9d1d9f6b/attachment.pgp>


More information about the arm-allstar mailing list