On 2024-03-14T21:49:46.000+01:00, Michael Gmelin <gre...@freebsd.org> wrote: > > > On 14. Mar 2024, at 21:38, Daniel Engberg > > <daniel.engberg.li...@pyret.net> wrote: > > > > On 2024-03-12T15:15:49.000+01:00, Eugene Grosbein <eugen@grosbeinnet> > > wrote: > > > > > 12.03.2024 3:24, Daniel Engberg пишет: > > > > > > [skip] > > > > > > > > > > > > > Another possible option would be to add something to the port's > > > > matedata that makes pkg aware and easy notiable > > > > like using a specific color for portname and related information to > > > > signal > > > > like if it's red it means abandonware and potentially reduced security. > > > > > > Of course, we need to inform users but not enforce. Tools, not policy. > > > > > Eugene > > > > Hi, > > > > Given that we seem to agree on these points in general why should such > > ports still be kept in the tree? We don't have such tooling available and > > it wont likely happen anytime soon. Because it's convenient for a committer > > who uses these in a controlled network despite being potentially harmful > > for others? > > > > Just to be clear, I'm after where do we draw the line in general. > > > > If we look at other distros in general based on availability the decision > > seems to favour overall user security than "convenience". Given that we > > have security policies etc in place I'd say that we in general are leaning > > towards user security? > > So your proposal is to only have ports in the tree that are safe to run on > unprotected public networks? > -m
I'm asking if we should purposely support it despite the efforts of keeping users safe. Best regards, Daniel