Bug#1028588: ITP: history-service -- Lomiri's history service for storing messages and calls

2023-01-13 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: history-service
  Version : 0.4
  Upstream Author : UBports developers 
* URL : https//gitlab.com/ubports/development/core/history-service
* License : GPL-3, LGPL-3
  Programming Lang: C++
  Description : Lomiri's history service for storing messages and calls

 A service to record the messages that are sent and received and the calls that
 are made in the Lomiri platform (driving Ubuntu Touch).
 .
 This package will be maintained by the UBports Packaging Team.



Bug#1028589: ITP: telephony-service -- Telephony service components for Lomiri

2023-01-13 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: telephony-service
  Version : 0.5
  Upstream Author : UBports developers 
* URL : 
https://gitlab.com/ubnports/development/core/telephony-service/
* License : GPL-3, CC-BY-SA-3.0
  Programming Lang: C++
  Description : Telephony service components for Lomiri

 This package will provide the telephony dispatcher daemon for Lomiri's
 Dialer App and Messaging App and its client API.
 .
 This package will be maintained by the UBports Packaging Team.



Bug#1028599: ITP: tone-generator -- Telephony Tone Generator

2023-01-13 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: tone-generator
  Version : 1.6.1
  Upstream Author : UBports developers 
* URL : https://gitlab.com/ubports/development/core/tone-generator
* License : LGPL-2.1
  Programming Lang: C
  Description : Telephony Tone Generator

 Tone Generator is simple daemon which provides generation of playback
 tones for DTMF (dialer keypad tones), call progress indication, and
 other miscellaneous telephony-related tones.
 .
 Tone Generator is needed by the telephony stack of Lomiri and was
 originally developed by Nokia.
 .
 This package will be maintained by the UBports Packaging Team.



Bug#1028626: ITP: parsec-service -- Abstraction layer for secure storage and operations

2023-01-13 Thread Emanuele Rocca
Package: wnpp
Severity: wishlist
Owner: Emanuele Rocca 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: parsec-service
  Version : 1.1.0
  Upstream Author : Parsec Project Contributors
* URL : https://github.com/parallaxsecond/parsec
* License : Apache-2.0
  Programming Lang: Rust
  Description : Abstraction layer for secure storage and operations

 Parsec is an abstraction layer that can be used to interact with
 hardware-backed security facilities such as the Hardware Security Module (HSM),
 the Trusted Platform Module (TPM), firmware-backed, and isolated software
 services.
 .
 The core component of Parsec is the security service, provided by this package.
 The service is a background process that runs on the host platform and provides
 connectivity with the secure facilities of that host, exposing a
 platform-neutral API that can be consumed into different programming languages
 using a client library.

This package will be maintained under the umbrella of the Debian Rust Team.



need we support unshadowed passwords from the installer

2023-01-13 Thread nick black
it's 2023 and imho time to stop supporting unshadowed passwords
from the installer.

 https://salsa.debian.org/installer-team/user-setup/-/merge_requests/5

1) nis (and possibly conserver?) seem the primary drivers of an
unshadowed passwd.=20

let me freely admit that, despite the advanced age of forty-two
(seventy-eight in UNIX years), that i know nothing about nis/yp
except that there was a big o'reilly book about it back when one
read the security book with the big safe on the front and the
scripting book with the big drill. i suspect it's basically a
halfway point between syncing /etc/passwd and /etc/hosts with
cron+rsh, and hiring someone on whom you can inflict ldap? so
please correct me wherever i'm woefully ignorant.

...but it appears that NIS can be made to work with shadowed
passwords (though without their benefits). this is from a
cursory reading of a FAQ last updated in 2003, so take it with a
grain of salt. the "linux network administrators [sic] guide"
seems to confirm this, and can also help you set up IPX or UUCP.

2) it seems that the unshadowing of passwords is only a
   "/sbin/shadowconfig off" away. somewhere down the long road, we
   appear to have lost shadowconfig.8, but this is what i gather
   from web searches.

   i'd almost suggest this might want to go into the "nis"
   package, avoiding "why do we even have that lever"
   situations, but i resolutely oppose feature creep for this MR.

3) if someone accidentally selects this during install, i can't
think of any means by which they'd find out during the course of
typical systems administration.

4) i don't have to answer this question in any other installer
i've used in the past decade, i'm pretty certain.

5) arch appears to support NIS without any mention of shadowing?
though admittedly that wiki page is "somewhat unfinished"[0]

6) fedora has recently discussed eliminating NIS support
entirely. it's a done deal in RHEL.

i'm absolutely not suggesting we stop supporting NIS or other
programs which rely on unshadowed passwords. it's a big ol'
tent, and we have more than enough room for you to carry forth
the torch of Solaris 2. i just don't think this belongs in the
installer anymore.

--rigorously, nick

[0] https://wiki.archlinux.org/title/NIS

-- 
nick black -=- https://www.nick-black.com
to make an apple pie from scratch,
you need first invent a universe.


signature.asc
Description: PGP signature