[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Unofficial Debian Monthly Testing Snapshot Release (version 2011.04)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi all,

I am pleased to announce the unofficial Debian monthly testing snapshot
release for April 2011 (version 2011.04).  This release is currently
available in two flavors, i386 and amd64, as mini iso images (16 MiB
each) downloadable from:

http://alioth.debian.org/~gilbert-guest/snapshots/2011.04/debian-testing-snapshot-2011.04-i386-mini.iso
sha512sum: b5f3a09ba740c45437fa62e50fbdcff74b1b5bae8affa9c81e67e2eed0293e48ba14c5c9bed50879366fdf9352df05f0cfa74e6adb17dea2cea0b62d9102eb1a
http://alioth.debian.org/~gilbert-guest/snapshots/2011.04/debian-testing-snapshot-2011.04-amd64-mini.iso
sha512sum: 421fc33b773fb8f242e288e6de8e937653eae10cf623c260605172666f1262662cd5c06e60f01a39e69aab3e52a706c8a30ecc5bbcd66fdb321f7b1c04b16feb

These files can be written to CD or DVD media or directly to a USB
stick. Instructions for USB installation can be found here:
http://www.debian.org/releases/squeeze/i386/ch04s03.html.en

IMPORTANT: There will be no inherent security support for these
snapshot releases.  The images do automatically set up testing-security
as an apt source during installation, so any DTSA's (Debian Testing
Security Advisories) will be automatically applied to snapshot
installations. However, the security team does not issue many updates
this way anymore (optioning instead to primarily use unstable uploads
as a means to fix testing). This is an area that could potentially be
improved if there are volunteers interested in this problem. For more
information on current testing security processes, see:
http://svn.debian.org/wsvn/secure-testing/doc/narrative_introduction

Ideally for those wishing to have a mostly security supported system,
the snapshot media will simply be a reliable stepping stone for
installation followed by an upgrade to testing proper, which does
receive quasi-official support from the security team (i.e. uploads to
unstable that transition to testing).

To upgrade from a previous snapshot, change the existing snapshot entries
in your /etc/apt/sources.list to:
  deb http://snapshot.debian.org/archive/debian/20110331T214934Z wheezy main
  deb-src http://snapshot.debian.org/archive/debian/20110331T214934Z wheezy main
Note that upgradability of individual packages isn't necessarily
guaranteed.

Note that this is an unofficial project since it does not come with the
backing or support from Debian as a team, but hopefully that will
change in the future as the concept is proven out.

This message is being limited only to the debian-devel list to
(hopefully) keep the load on existing resources small for now, and to
determine whether a more robust hosting solution will be necessary for
future releases.  This also provides a chance for feedback and
contributions from the devel community before attempting to target a
wider audience.  Please keep in mind that this is an unofficial
test/development release before spreading the word too much.

Anyway, enjoy!  And send feedback to cut-team@lists.alioth.debian.org.

Best wishes,
Mike Gilbert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=
=Nbpx
-----END PGP SIGNATURE-----


Reply to: