-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, 19 May 2008, Kees Cook wrote:
> On Mon, May 19, 2008 at 08:21:04PM +0100, Paul Sladen wrote:
> > The 'openssh-blacklist' package is currently "questionably useful" on
> That's a very old version of dpkg that doesn't support bzip2.

Ubuntu has shipped with a dpkg that did not include bzip2 support[0]; and
that was not so very long ago.  Sarge was the first version of Debian to
ship with a bzip2-capable dpkg, which was *less than 3 years ago*[1].

Put simply.  Anyone with a three-year old Debian install was either running
pre-release software at install time, or *may[2] have hit this issue*.

> The space-savings is non-trivial,

The space-savings from bzip2'ing 'openssh-server' and 'openssh-client' are
greater than the saving from bzip2'ing 'openssh-blacklist'.[3]

> so bzip2 is going to stay [for 'openssh-blacklist']

If 'openssh-server' and 'openssh-client' are deamed important enough to be
'gziped' then any hard dependencies should be treated the same---otherwise
the core (gziped) package is uninstallable[4] and the entire dependency tree
for 'sshd' might as well be bziped.

If new dependencies are introduced [during a security fix] I think an extra
100kB on the mirror is preferable to *zero or more* broke packaging setups
on systems.[5] (The installed on-disk size for the user is the same)[6][7].  

When packages started to be bziped in Ubuntu (eg. OOo) those packages
received 'Pre-Depends: >=1.10.24' for dpkg;  I would hope the same is true
for more system critical packages.

I would rather see something fail cleanly, than break.  Leaving both the
packaging system in an inconsistent state and no 'sshd' running.[7]

Any security fix should ideally be doing the minimum of alteration, and
require the minimum of intervention.  The OpenSSH update was a /critical/
security update, in response to a /critical/ bug introduced early.

I hope that the update can be made available as a distro-signed binary
package for as many affected systems as possible, without the further risk
of leaving any of the those machines broken.

It is not the security fix that has lead to a breakage.
It is _new_ code and the packaging choices made with it:

  1). A hard 'Depends:' for a non-critical (but good-idea) extension.
  2). Use of a non-critical (but mild space-saving) packaging extension.
  3). Non-use of a non-critical (but good practice) Pre-Depends: safety net.
  4). Installation on a not-the-latest (but well serving) Debian system.

It is the unfortunately coincidental combination of all four.  I'm happy
to supply patches to update any of the three avenues, should you have a
preference.

        -Paul

[0] 
http://changelogs.ubuntu.com/changelogs/pool/main/d/dpkg/dpkg_1.10.22ubuntu2.1/changelog
    although not an LTS release.
[1] Sarge (Debian 3.1), released on 2005-06-06.
    (buggy) openssl 0.9.8c-1 uploaded on 2006-09-17.
[2] Depending on the exact set of intermediate updates/upgrades.
[3] Saving of 121639 bytes vs. 117867 bytes (i386 and all
    respectively).  The saving on the binaries packages massively outweighs
    the saving on the all package when multiplied across 12 architectures.
    Note: the advdef (in 'advancecomp') deflater beats .bzip2 on the
    'openssh-blacklist/data.tar' and is still backwards compatibile with
    older versions of dpkg. 
[4] In the situations where it is deamed preferable to have .gz
[5] That size even comes up, I fear, is a distraction from the packaging
    compatibility issue.
[6] As an interesting aside, with a raw binary packing of the hash blobs,
    the .gz, beats no packing, beats .bz2.
[7] I no longer have immediate access to the first machine I hit this
    on;  I had closed the ssh session and have not location why 'sshd' had
    been stopped before the installation failed.  Why, I don't know.
 -- 
Why do one side of a triangle when you can do all three.  Somewhere, GB.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFIMgjTc444tukM+iQRAr22AJ9OcDTf0vYF6NfL3dbNbSD/9YpffwCeLbfM
RfysF67ngvoB9pv6GJAgUGs=
=sabs
-----END PGP SIGNATURE-----





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to