You are not logged in.
Hello:
So much for my getting rid of all the gnome crap ...
No so fast ...
A deeper look helped me understand something that should have been pointed out to users in a clear(er) manner.
ie: for the half baked hoi-poloi like me.
The problem was that BiT did not automagically choose the available backend to use, seems that getting that done is a rather complex matter.
The solution is an option to add to the BiT GUI, apparently a work in progress to be included upstream, maybe in the next release (?).
But there was a quick, clean and easy alternative: to set it up manually, ending the bloody problem in 5'.
Could not have been easier but ...
Anyhow, if someone else comes across this same problem, the solution is within the BiT FAQs.
TL:DR
To diagnose and solve this follow these steps in a terminal:
# Show default backend
python3 -c "import keyring.util.platform_; print(keyring.get_keyring().__module__)"# List available backends:
keyring --list-backends# Find out the config file folder:
python3 -c "import keyring.util.platform_; print(keyring.util.platform_.config_root())"# Create a config file named "keyringrc.cfg" in this folder with one of the available backends (listed above)
[backend]
default-keyring=keyring.backends.kwallet.DBusKeyring
Once done, you should get something like this ...
$ python3 -c "import keyring.util.platform_; print(keyring.get_keyring().__module__)"
keyring.backends.chainer
$
@greenjeans:
That nails it, no more gnome-keyring in my system ...
$ apt list | grep installed | grep gnome-keyring
--- snip ---
$
... and just the necessary keyrings:
$ apt list | grep installed | grep keyring
--- snip ---
debian-archive-keyring/stable,stable,now 2023.3+deb12u2 all [installed]
devuan-keyring/stable,stable,now 2023.05.28 all [installed]
python3-keyring/stable,stable,now 23.9.3-2 all [installed,automatic]
$
Edit:
Just an update to confirm that BiT ran this morning's (05/08/25) daily cronjob without any issues.
Best,
A.
Hello:
... only reason (I can come up with) is that BiT looks for a PW and does not find one.
And so it seems:
---------------------------------------------
Debian Bug report logs - #998105
backintime-qt: Fails to access the keyring with python3-keyring 23.2.0-1
https://bugs.debian.org/cgi-bin/bugrepo … bug=998105
---------------------------------------------
BiT should be able to work properly without gnome-keyring or keepassxc installed.
The problem seems to be (?) with how BiT looks for and finds (or not) a keyring to use.
For whatever reason, it does not find and select the installed python3-keyring, going for whatever else is available to use.
Which is why, instead of using the installed python3-keyring 23.9.3-2, it uses the installed (and otherwise unnecessary) gnome-keyring 42.1-1+b2.
Failing to run if I purge it.
Apparently there is/was (?) a patch but the bottom line is that (two years on) the bug is still present in backintime-qt 1.3.3-4.
So much for my getting rid of all the gnome crap ...
Best,
A.
Hello:
... saying you haven't tried uninstalling it ...
No. 8^°
What I am saying is this:
... but if I purge it, BiT will not run properly.
ie: a statement of fact.
But further on (for clarity) I should have written this:
I guess (would have to purge gnome-keychain again to verify ...)
Sorry for being ambiguous, my command of the English language is rather lacking.
That said, the only reason (I can come up with) is that BiT looks for a PW and does not find one.
Thanks for your input.
Best,
A.
Hello:
Rather worrying, I think.
------
Canonical dusts off TPM encryption for Ubuntu 25.10
Passwordless disk locking is coming, a couple of years later than hoped
By Liam Proven @The Register
------
https://www.theregister.com/2025/07/31/ubuntu_tpm_fde/
We also feel it's worth pointing out that GNU guru Richard Stallman is dead set against this stuff, and we tend to agree with him. As Edward Snowden put it: Stallman was right. "Trusted Platform" doesn't mean you can trust your computer, it means software vendors can trust the PC to prevent you from fiddling with it.
Cannot but wonder how long before we get this crap in Debian/Devuan.
Best,
A.
Hello:
Can you expand on that? What seems to be broken?
I guess (would have to purge gnome-keychain to verify) that it does not find the password to be able to do its job.
From what I gather, BiT is a user mode backup so it only does backup/restore operations on directories where the user has write access.
As it runs automatically (cron job) it needs the password which is (?) in the gnome-keyring.
Thanks for your input.
Best,
A.
Hello:
... gnome-keyring sucks. I uninstalled it. Then everything works.
Interesting.
I have it installed in my system because BackInTime recommends it.
It is a remnant of the time when I did not block recommended packages.
$ aptitude why gnome-keyring
i backintime-common Depends python3-keyring
i A python3-keyring Depends python3-secretstorage (>= 3.2)
i A python3-secretstorage Recommends gnome-keyring | libkf5wallet-bin (>= 5.97) | keepassxc
$
But I don't use it to store passwords, not at all comfortable with that.
But it happens that gnome-keyring is not a dependency for BackInTime but if I purge it, BiT will not run properly.
keepassxc is not a dependency either and it requires network access, so that would be a hard no for me.
See https://packages.debian.org/en/sid/backintime-common
It would seem (?) that BiT should be using python3-keyring instead of gnome-keyring for me to be able to purge it.
Any ideas on how to get that done?
Thanks in advance.
Best,
A.
Hello:
Welcome to Devuan.
... should these files even exist on a supposedly systemd free fork of debian?
I run Devuan Daedalus on my box:
$ uname -a
Linux devuan 6.1.0-37-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.140-1 (2025-05-22) x86_64 GNU/Linux
$
My system does not have systemctl installed.
No dependency requires it, but it is present in the repository and as such, it can be installed:
$ apt list | grep systemctl
--- snip ---
systemctl-service-shim/stable,stable 0.0.5-1 all
systemctl/stable,stable 1.4.4181-1.1 all
$
# apt install systemctl
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Suggested packages:
tini | dumb-init
The following NEW packages will be installed:
systemctl
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 79.8 kB of archives.
After this operation, 279 kB of additional disk space will be used.
Get:1 http://deb.devuan.org/merged daedalus/main amd64 systemctl all 1.4.4181-1.1 [79.8 kB]
Fetched 79.8 kB in 4s (18.3 kB/s)
Selecting previously unselected package systemctl.
(Reading database ... 165616 files and directories currently installed.)
Preparing to unpack .../systemctl_1.4.4181-1.1_all.deb ...
Unpacking systemctl (1.4.4181-1.1) ...
Setting up systemctl (1.4.4181-1.1) ...
Processing triggers for man-db (2.11.2-2) ...
#
That said, I don't have much of an idea what it is used for in a systemd-less installation, but I suspect (wild guess) that it is/may be related to all the dummy/shim files Devuan uses to be able to run Debian packages which want to see indications of the presence of systemd to work properly.
ie: a non-dependent dependency, if you will.
If you install it and run it as root from a terminal, you will get a printout with the list of dummy / shim files installed in your system with their status, some with a description of what they are used for.
eg:
# systemctl
.depend.boot.service loaded inactive dead
.depend.start.service loaded inactive dead
.depend.stop.service loaded inactive dead
README.service loaded inactive dead
acpid.path loaded inactive dead ACPI Events Check
acpid.service loaded inactive dead ACPI event daemon
acpid.socket loaded inactive dead ACPID Listen Socket
--- snip ---
connman-wait-online.service loaded inactive dead Wait for network to be configured by ConnMan
connman.service loaded inactive dead Connection service
--- snip ---
zramswap.service loaded inactive dead Linux zramswap setup
150 loaded units listed.
To show all installed unit files use 'systemctl list-unit-files'.
#
Cannot say much more than that.
Best,
A.
Hello:
... two hidden dirs, named /.config and /.cache
See this thread: https://dev1galaxy.org/viewtopic.php?id=5596
There is a lot of information about /.config and /.cache there.
In my case, I solved it with this ...
# apt purge pulseaudio && apt autoclean && apt autoremove
... and then this: https://dev1galaxy.org/viewtopic.php?id=3904
The end result being this:
$ cat /etc/apt/preferences.d/avoid_pulseaudio
Package: pulseaudio:*
Pin: version *
Pin-Priority: -1
$
In your case, a bit more digging may be necessary.
Or not.
Please let us know how you fared.
Best,
A.
Hello:
From today's edition of The Register:
----------------------------------------------------------------------------------------------------------------------------------------------------------------------
Microsoft admits it 'cannot guarantee' data sovereignty
Under oath in French Senate, exec says it would be compelled – however unlikely – to pass local customer info to US admin.
by Paul Kunert @The Register
----------------------------------------------------------------------------------------------------------------------------------------------------------------------
https://www.theregister.com/2025/07/25/ … guarantee/
As proceedings continued, Carniaux was asked if in the event of an injunction that was legally justified, could he, as Microsoft director of public and legal affairs, "guarantee our committee, under oath" that data on French citizens could not be transmitted to the American government without the explicit agreement of the French government.
"No," said Carniaux, "I cannot guarantee that, but, again, it has never happened before."
The Register asked Microsoft to comment on this but it declined to do so.
So ...
What else is new?
Best,
A.
Hello:
I found some more info on this apport application:
https://nvd.nist.gov/vuln/detail/CVE-2016-9950
https://app.opencve.io/cve/?vendor=apport_project
https://security-tracker.debian.org/tra … -2019-7306
You will notice that Debian refers to all this as a non-issue because apport is not present.
Coming from the creators of systemd, I'll take it with a few grains of salt, low sodium variety.
Paraphrasing the Bard (of Avon, seems there are others):
An apport by any other name would still cause damage
So ...
Just to be on the safe side of whatever may be in there, Devuan users may want to consider purging everything in /usr/share/apport/*
But that's just me and my $0.02.
Best,
A.
Hello:
... but selectively omitted from installation by a simple option in the package preinst script.
Yes, of course*.
*Good luck with that ... 8^°
Thanks for your input.
Best,
A.
Hello:
dpkg -S apport/package-hooks
$ dpkg -S apport/package-hooks
lxappearance: /usr/share/apport/package-hooks/source_lxappearance.py
pcmanfm: /usr/share/apport/package-hooks/source_pcmanfm.py
yelp: /usr/share/apport/package-hooks/source_yelp.py
libfm-data: /usr/share/apport/package-hooks/source_libfm.py
openssh-client: /usr/share/apport/package-hooks/openssh-client.py
connman: /usr/share/apport/package-hooks/source_connman.py
lxterminal: /usr/share/apport/package-hooks/source_lxterminal.py
pcmanfm, lxappearance, libfm-data, sudo, synaptic, simple-scan, openssh-client, libmtdev1:amd64, connman, lxterminal, cups-daemon, yelp, grub-common, libmtp-common, conky-all: /usr/share/apport/package-hooks
conky-all: /usr/share/apport/package-hooks/conky.py
grub-common: /usr/share/apport/package-hooks/source_grub2.py
simple-scan: /usr/share/apport/package-hooks/source_simple-scan.py
libmtdev1:amd64: /usr/share/apport/package-hooks/source_mtdev.py
sudo: /usr/share/apport/package-hooks/source_sudo.py
libmtp-common: /usr/share/apport/package-hooks/source_libmtp.py
cups-daemon: /usr/share/apport/package-hooks/source_cups.py
synaptic: /usr/share/apport/package-hooks/source_synaptic.py
$
All python scripts.
Fortunately I managed to weed them all out.
Will do the same on all my Devuan installations.
... classified as a technological remnant from a modular idea ...
... cushioning the end-user with "services" so they could go happy without knowing what they were doing.
And here we are, still with all this absolutely unneeded shit in a Linux system.
No wonder every new release brings about more and more (and more) code.
All dirt swept under the rug, festering.
How much more of that is there to be found?
We all know better than that nowadays, don't we?
Yes, we is right.
Seems the pronoun does not include most (if not all) Debian devs.
Makes me wonder if they are not some sort of sleeper scripts.
As always, thanks for your input.
Best,
A.
Hello:
While looking at the active threads, I came across this post by fsmithred:
To get a list of config files that have been changed from the default:
debsums -ca
I did not know about that package (thanks fsr!) nor did I have it installed.
Once installed, I ran it and got a good deal of data which I have always wondered about as I also keep an installation log of sorts but, never thorough enough.
The data included quite a bit of references* to a package named apport which I recalled having deleted from every instance found.
* most if not all in localhost/usr/share/apport/package-hooks
I purged it after I looked it up and decided it was not something I wanted running in my system.
Apport intercepts Program crashes, collects debugging information about the crash and the operating system environment, and sends it to bug trackers in a standardized form. It also offers the user to report a bug about a package, with again collecting as much information about it as possible.
This was back in 05/2025, so it is still in my timeshift snapshots.
I had intended to ask here but forgot all about it till now.
I had a look today and could not find it in the Devuan repositories.
I did find that it was at one time in the Debian repositories:
https://tracker.debian.org/pkg/apport
Could it be that it is a zombie remnant from the original Devuan (jessie or ascii) installation which I dist-upgraded since then?
$ aptitude why apport
i screen Suggests byobu | screenie | iselect (>= 1.4.0-1)
p byobu Suggests apport
$
$ aptitude why byobu
i screen Suggests byobu | screenie | iselect (>= 1.4.0-1)
$
$ aptitude why screen
i screen Suggests byobu | screenie | iselect (>= 1.4.0-1)
p screenie Depends screen
$
I cannot recall having ever installed screen. 8^°
Moot point, purged it.
Q: Why did I have apport in my system if it was no longer* in the Devuan repositories?
* it was accepted in experimental in 09/2014 but finally removed in 03/2019. ie: over 10 years in experimental, never made it to stable after 05/2014.
Me thinks there should be some sort of mechanism (?) to post a notice about things like this when doing a dist-upgrade.
Thanks in advance.
Best,
A.
Edit:
My Devuan Chimaera VM has this without apport being installed:
$ locate apport
/usr/share/apport
/usr/share/apport/package-hooks
/usr/share/apport/package-hooks/openssh-client.py
/usr/share/apport/package-hooks/openssh-server.py
/usr/share/apport/package-hooks/source_grub2.py
/usr/share/apport/package-hooks/source_sudo.py
$
Same for my (default desktop install) Devuan Daedalus VM:
root@daedalus:~# locate apport
/usr/share/apport
/usr/share/apport/package-hooks
/usr/share/apport/package-hooks/openssh-client.py
/usr/share/apport/package-hooks/openssh-server.py
/usr/share/apport/package-hooks/source_apparmor.py
/usr/share/apport/package-hooks/source_cups.py
/usr/share/apport/package-hooks/source_grub2.py
/usr/share/apport/package-hooks/source_mtdev.py
/usr/share/apport/package-hooks/source_pulseaudio.py
/usr/share/apport/package-hooks/source_sudo.py
/usr/share/apport/package-hooks/source_synaptic.py
root@daedalus:~#
Can anyone explain to me why this is so?
apport is not in the Debian / Devuan repositories.
.
Hello:
git.devuan.org is that website.
Was passing by and tried* it out:
Unable to connect
An error occurred during a connection to git.devuan.org.
The site could be temporarily unavailable or too busy. Try again in a few moments.
If you are unable to load any pages, check your computer’s network connection.
If your computer or network is protected by a firewall or proxy, make sure that Firefox is permitted to access the web.
* 128.3.1esr (64-bit) without Pihole or uBlock enabled.
Best,
A.
Hello:
None of my packages are particularly important ...
I beg to differ.
Every bit of work contributed to Devuan Linux is important.
I have been using your TimeShift for the longest while, if I recall correctly, since ascii.
Best,
A.
Hello:
not every "keyring" is the same type ...
... debian and devuan keyrings ...
... contains the keys to authenticate the packages ...
So I gather.
... gnome keyring ...
... should be the gnome-keyring-daemon ...
I see.
... what it does is store your passwords ...
... dbus interface so that other programs can use ...
... upon login your browser does not ask for your local user password to unlock it's password store and allow you to login onto websites.
But I do not want any of that done.
ie: I log in with a specific password as required when required, I have no interest in that being automated.
... replacing the gnome keyring daemon with keepass ...
... need to install a plugin ...
Then why is it that aptitude prints out this:
$ aptitude why gnome-keyring
i backintime-common Depends python3-keyring
i A python3-keyring Depends python3-secretstorage (>= 3.2)
i A python3-secretstorage Recommends gnome-keyring | libkf5wallet-bin (>= 5.97) | keepassxc <- ###
$
I understand that python3-secretstorage needs either gnome-keyring or keepassxc.
libkf5wallet-bin seems to be a transitional package that can be removed so it does not count, leaving keepassxc as the only other alternative to gnome-keyring.
... invested with either pass or keepassxc ...
... consider replacing functionality ...
... with plugins for either of those.
The keepassxc web page FAQ says that it does not support pugins.
Further on, it also says that it requires network access and that if you do not want that particular feature, you have to compile it yourself.
Much to my chagrin, I think I will have to stay with the gnome-keyring daemon so that BiT will continue to work as it has up to now.
Thank you very much for your reply.
Best,
A.
Hello:
This is (sort of) a continuation of this thread from 09/2022.
My Daedalus installation has these keyrings installed:
$ apt list | grep installed | grep keyring
--- snip ---
debian-archive-keyring/stable,stable,now 2023.3+deb12u2 all [installed]
gnome-keyring/stable,now 42.1-1+b2 amd64 [installed]
python3-keyring/stable,stable,now 23.9.3-2 all [installed,automatic]
python3-keyrings.alt/stable,stable,now 4.2.0-1 all [installed,automatic]
$
I checked with aptitude to see just what wants what:
$ aptitude why debian-archive-keyring
i apt Depends debian-archive-keyring
$
$ aptitude why gnome-keyring
i backintime-common Depends python3-keyring
i A python3-keyring Depends python3-secretstorage (>= 3.2)
i A python3-secretstorage Recommends gnome-keyring | libkf5wallet-bin (>= 5.97) | keepassxc
$
$ aptitude why python3-keyring
i backintime-common Depends python3-keyring
$
$ aptitude why python3-keyrings.alt
i backintime-common Depends python3-keyring
i A python3-keyring Suggests python3-keyrings.alt
$
debian-archive-keyring is for apt -> must keep
gnome-keyring is a recommends from python3-secretstorage -> must keep / could replace with keepassxc, also a recommends (?)
python3-keyring is a recommends from backintime -> must keep
python3-keyrings.alt is a suggests from python3-keyrings.alt -> security issues / not needed*
* see the Debian package description here.
Keyrings in this package may have security risks or other implications. These backends were extracted from the main keyring project to make them available for those who wish to employ them, but are discouraged for general production use. Include this module and use its backends at your own risk.
I have purged python3-keyrings.alt with no apparent ill effects, will stay alert.
I use the gnome-disk-utility and am in the process of checking on the various gnome-whatevers installed in my system to see to what extent they are needed.
The one I am working on now is gnome-keyring which cannot be purged because then BiT does not work.
Makes me wonder why a recommends flag like this one isn't a depends flag.
eg:
$ aptitude why gnome-keyring
i backintime-common Depends python3-keyring
i A python3-keyring Depends python3-secretstorage (>= 3.2)
i A python3-secretstorage Depends gnome-keyring |or| libkf5wallet-bin (>= 5.97) |or| keepassxc
$
That said, if I understood correctly, gnome-keyring can be replaced with keepassxc.
Q:
How can I go about doing that without getting myself a hard to solve problem?
eg: screwing up BiT routines
Thanks in advance.
Best,
A.
Hello:
This any help?
Really could not say.
I have only seen this a couple of times before but (from what I can recall) never while booting*, I would have noticed it.
* Between [0.000000] and the end of the boot sequence. (see the time stamp on the dmesg printout)
And it is not reported by dmesg as a warning/alert/critical/error, so it is probably (?) harmless.
The BIOS (a POS if there ever was one) in my U24 WS does not have an entry for HPET and I certainly would not roll a kernel because of this.
More so if I cannot reproduce it or see any ill effects related to it.
Not to mention that I haven't a clue as to go about doing it. 8^°
My ca. 2007 U24 WS could be having this issue due to a less optimized HPET implementation, so it may be worthwhile attempting the tsc=nowatchdog kernel command line fix and wait to see what effect that has.
Thanks for your input.
Best,
A.
Hello:
... don't like feature creep ...
... think about philosophy of use.
+1
... could use some input ...
I hardly ever use the mixer so I could not say much save for the drop down pre-sets.
That said, I am definitely a client for this UI you have put together.
Looking good.
Thanks for the effort.
Best,
A.
Hello:
While checking my dmesg printout to see if I had properly fixed a damaged Palm data cable, I came across this bit:
--- snip ---
[20430.191148] clocksource: timekeeping watchdog on CPU3: hpet wd-wd read-back delay of 785435ns
[20430.191160] clocksource: wd-tsc-wd read-back delay of 209034ns, clock-skew test skipped!
--- snip ---
The printout does not say it is a warning (or alert/critical/error):
$ sudo dmesg --level=alert,crit,err,warn | grep timekeeping
$
I have also found that I can get the clocksource being used:
$ cat /sys/devices/system/clocksource/clocksource0/current_clocksource
tsc
$
But I have not been able to find out what triggers it, its relevance or how it can be avoided.
It is a very small slice of time (0.001s ?) but there must be a reason for a timekeeping watchdog to let the system know there was a delay.
I'd appreciate input on this.
Best,
A.
Hello:
... need to try again.
Indeed ...
And while at it check the sources.list syntax. 8^°
Done.
My RPi3B+ ascii installation is now fully updated/upgraded.
Thanks for your input.
Best,
A.
Hello:
... postfix mail server ...
... pihole.
... local network uses it for dns.
Thanks.
... not tried either of the installer files you listed ...
... give one of the installer images a try and see what happens ...
That would be great, more than anything to get a user sample number greater than 1.
I have been able to solve the /etc/apt/sources.list problem (wrong syntax) and was able to update/upgrade everything.
Of all the packages to upgrade, 75 were security fixes
I expanded the /ext4 partition from 1.75 to 3.0Gb, installed mc and purged all the vim stuff.
Once I get all the rest done, I will see about upgrading.
Q: does the the FAT16 partition need resizing?
Thanks for your input.
Best,
A.
Hello:
Now you know.
Indeed ...
I submitted a review to Kingston:
I made the mistake of relying on the Kingston brand name (as I have consistently done for the past 25+ years) and purchased three DataTraveler 64Gb Exodia M 3.2 USB drives.
The read / write speeds are short of absurd.
There's no need to explain anything, Kingston engineers know all about it.And now Kingston *also* knows that they have lost a client of 25+ years.
Recommends this product ✘ No
They wrote back and actually thanked me for the feedback.
Then had the gall to reply with this nonsense:
We apologize if you are dissatisfied with your product. The Exodia USB drive's are a basic low cost model with no minimum performance ratings based off the datasheet.
... no minimum performance ratings based off the datasheet?
Datasheet?
What datasheet?
Ahhh ...
They must be referring to the read/write data in the datasheet not included in the package nor transcribed anywhere in the package.
So, according to Kingston it could well be 0.5 Mb/s and it would be also a reasonable write speed for a USB 3.2 USB drive.
Like I said in my OP:
Caveat emptor.
It is an utter piece of crap, you will be wasting your money.
Best,
A.
Hello:
Welcome to Devuan.
Before I forget, have a read here.
... test page ...
... jobs from other applications get sent to the printer ...
... Printer Properties dialog reports ...
... but then the state returns to Idle shortly after, without printing anything.
Yes, seen that, been there and solved it.
The problem is that the CUPS archives have been sequestered by the assholes at Apple Corp. and are no longer accessible.
But I found my old CUPS mailing list posts (thanks to rbit) through the Wayback Machine:
https://lists.cups.org/pipermail/cups/2 … 75402.html
https://lists.cups.org/pipermail/cups/2 … 75403.html
TL;DR:
Yes, a package is probably missing.
Read all the links to get the necessary information.
My printer is one of those USB B&W laser M2020W marketed by Samsung / HP but I am confident the solution is probably the same / similar.
I do not use any HP drivers, just the CUPS supplied stuff from the Devuan repositories.
It may be a good thing to remove anything not downloaded from the Devuan repositories, more so it it did not solve the problem.
Should push come to shove, check the post I linked to at the beginning for a place to ask specific CUPS questions.
Let us know how you fared with this.
Best,
A.
Hello:
... a RPi3b+ running devuan.
Nice to know someone else is doing it.
What use do you give it?
... started with ascii on it, some image obtained from ...
Cannot remember but it is probably the same in my case.
... reason for staying on ascii?
No.
It was the image I had made as a backup and stored away before starting to try to do things with the actual installation.
It still had the PW for root (toor) and no UserID.
As I posted earlier, I downloaded two images but neither of them will boot my RPi. (see my previous two posts)
Can you boot from any one of them?
I'd appreciate it if you could verify that for me when you have a minute to spare.
... upgraded mine, one to chimaera the other to daedalus.
Ahh ...
An upgrade.
Methinks that it is another matter altogether.
ie: uprading from an ascii image you were able to boot from to Chimaera or Daedalus vis-à-vis booting from a fresh Chimaera, Beowulf or Daedalus image.
My money is on the UEFI/EFI shit screwing things up.
My backed up image does not have any of that.
The downloaded images do but you can only see them with gnome-disks, gparted does not show them.
... resize the boot partition ...
Not a problem, mount the MicroSD on any Linux box and go at it with gparted.
... setting it up new ...
... a more current image ...
I think it depends on the use given to the RPi.
ie: this hardware was already old and rather crippled when it was released and unless a newer kernel or specific package versions can really make a difference,
I don't see any advantage.
Linux releases gather more and more bloat with each release and this is just a 1Gb rig with 4xUSB 2.0 ports sharing the bus with the GbE port.
Not precisely cutting edge, lean and mean is of the greatest import.
Same goes for my ca. 2011 Asus 1000HE.
I cannot come up with a justification for moving from Beowulf with a backported kernel to a newer release.
Thanks for your input.
Best,
A.