On 2024-03-14T23:27:53.000+01:00, Tomoaki AOKI <junch...@dec.sakura.ne.jp> 
wrote:
>  On Thu, 14 Mar 2024 22:17:39 +0100
> Daniel Engberg <daniel.engberg.li...@pyret.net> wrote:
> 
> 
> >    On 2024-03-14T21:49:46.000+01:00, Michael Gmelin <gre...@freebsd.org> 
> > wrote:
> > 
> > >      
> > > 
> > > >         On 14. Mar 2024, at 21:38, Daniel Engberg 
> > > > <daniel.engberg.li...@pyret.net> wrote:
> > > >     
> > > >      On 2024-03-12T15:15:49.000+01:00, Eugene Grosbein 
> > > > <eugen@grosbeinnet> wrote:
> > > >    
> > > > 
> > > > >          12.03.2024 3:24, Daniel Engberg пишет:
> > > > >      
> > > > >      [skip]
> > > > >      
> > > > >      
> > > > >     
> > > > > 
> > > > > >             Another possible option would be to add something to 
> > > > > > the port's matedata that makes pkg aware and easy notiable
> > > > > >       like using a specific color for portname and related 
> > > > > > information to signal
> > > > > >       like if it's red it means abandonware and potentially reduced 
> > > > > > security.
> > > > >        
> > > > >      Of course, we need to inform users but not enforce. Tools, not 
> > > > > policy.
> > > > >      
> > > >       Eugene
> > > >     
> > > >     Hi,
> > > >     
> > > >     Given that we seem to agree on these points in general why should 
> > > > such ports still be kept in the tree? We don't have such tooling 
> > > > available and it wont likely happen anytime soon. Because it's 
> > > > convenient for a committer who uses these in a controlled network 
> > > > despite being potentially harmful for others?
> > > >     
> > > >     Just to be clear, I'm after where do we draw the line in general.
> > > >     
> > > >     If we look at other distros in general based on availability the 
> > > > decision seems to favour overall user security than "convenience". 
> > > > Given that we have security policies etc in place I'd say that we in 
> > > > general are leaning towards user security?
> > >     
> > >   So your proposal is to only have ports in the tree that are safe to run 
> > > on unprotected public networks?
> > >   
> >   -m
> >  
> >  I'm asking if we should purposely support it despite the efforts of 
> > keeping users safe.
> >  
> >  Best regards,
> >  Daniel
>  
> How about setting NO_PACKAGE [1] to force admins to build from ports
> by themselves for such risky but too usful to delete ports?
> 
> You may also want to introduce something like LICENSE framework to
> force interaction on build/install, but without something like
> LICENSES_ACCEPTED+= variable to bypass it.
> 
> 
> [1]
> https://docs.freebsd.org/en/books/porters-handbook/special/#porting-restrictions
> 
> 
> -- 
Tomoaki AOKI    <junch...@dec.sakura.ne.jp>

Hi,

That may very well be an option possibly with some guidelines to prevent it 
turning into  a loophole for being a dumping ground. Since we've moved to git 
perhaps another option might be to create a separate repo (possibly via 
submodules) with less restricive polices and have that as an "add-on" for the 
official tree without the ports team's and committers's involvement, a bit like 
"you're on your own" approach?

Best regards,
Daniel

Reply via email to