Re: New stable version after Sarge

2005-01-04 Thread Jan Niehusmann
On Tue, Jan 04, 2005 at 05:31:26PM +0100, Thomas Jollans wrote:
> stuff. If I needed something more production-ready, I'd use testing 
> because you have (almost) garantee that the software will work and you 
> will have security updates, too. (But not in the same quality as 

Unfortunately, testing does not guarantee security updates. Sure, one
day the updates will promote from unstable to testing. But this can take
a long time, if, for example, some dependencies block the new version
from testing.

This may change with a testing-security upload queue.

Jan




Re: New stable version after Sarge

2005-01-06 Thread Jan Niehusmann
On Thu, Jan 06, 2005 at 09:51:21AM +0100, Marc Haber wrote:
> That would leave testing users who happen to have such a package
> installed alone because they wouldn't notice their package vanishing
> from the mirrors, continuing to use a potentially vulnerable package.

Good point. But that problem can be solved by some program checking that
all installed packages are actually available from the selected
distribution(s).

That could be integrated into apt (e.g. apt-get upgrade warning about
packaged without a current installation canditate, or where the most
recent version from the archives is older than the installed one), or it
could be a separate tool. Perhaps it can even be done with existing
tools?

Jan




Re: The sarge release disaster - some thoughts

2005-03-15 Thread Jan Niehusmann
On Tue, Mar 15, 2005 at 05:39:37PM +0100, Frank Lichtenheld wrote:
> So where is the lack of communication you detected?

Well, at least to me it's completely unclear why it took so long to
address the points you mentioned (t-s, d-i). There are probably very good
reasons, and people did work hard to address the problems ASAP, but with
the information publicly available, one can only guess about that.

Jan


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Possible compromise on releasing architectures

2005-03-24 Thread Jan Niehusmann
On Thu, Mar 24, 2005 at 12:59:19AM -0800, Blars Blarson wrote:
> Release candidate architecture:
> 
> * testing managed by port release manager(s)
> * testing consists of packages that built on the candidate and
>   are in release architecture testing with the same version

Please specify what applies to sources and what to binaries. As I
understand your proposal, one would need architecture specific source
repositories (as different architectures may have different versions 
in testing).

Jan


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: First call for votes for the Lenny release GR

2008-12-18 Thread Jan Niehusmann
On Thu, Dec 18, 2008 at 04:45:02PM +1100, Russell Coker wrote:
> It seems that the grass-roots support for doing something quite different to 
> the current vote includes me, Brian, and quite a few bloggers on Planet 
> Debian.

I don't like the current vote either and wouldn't mind if it was
canceled.

My suggestion is to do a very simple vote first, with only two choices: 

a) continue with the release process and don't wait for further GRs

Of course this means, effectively, that we do trust the release
team and other developers involved in the release process

b) wait with the lenny release until we made decisions on the open
issues

This means that we don't want do be hasty, take our time to
agree what the open issues are, how they could be resolved and
what further GRs are necessary to finally decide on these
matters.

The third option, further discussion, could be included on the ballot
for completeness, but as it is roughly equivalent to "I don't want to
delay lenny but I don't want to release it in it's current state
either", it's only for people who really can't decide what they want :-)

IMHO we have to bite the bullet: Either we release lenny without
agreeing on the DFSG issues first, or we delay lenny.

As the vote suggested above is only sensible if lenny isn't delayed by
the vote itself, it would be good to start it ASAP and do it with a
shortened voting period.

Jan


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#435693: ITP: qca2-plugin-ossl -- OpenSSL plugin for QCA2

2007-08-02 Thread Jan Niehusmann
Package: wnpp
Severity: wishlist
Owner: Jan Niehusmann <[EMAIL PROTECTED]>


* Package name: qca2-plugin-ossl
  Version : 0.1~20070706
  Upstream Author : Justin Karneges <[EMAIL PROTECTED]>, Brad Hards <[EMAIL 
PROTECTED]>
* URL : http://delta.affinix.com/qca/
http://delta.affinix.com/download/qca/2.0/beta7/
* License : LGPL
  Programming Lang: C++
  Description : OpenSSL plugin for QCA2

 This plugin provides features based on OpenSSL. It implements:
  * Hashing - SHA1, SHA0, RIPEMD160, MD2, MD4, MD5
  * Hashing - SHA224, SHA256, SHA384 and SHA512 (for openssl 0.9.8)
  * Block Ciphers
  * Keyed Hash Message Authentication Code (HMAC), using SHA1, MD5, RIPEMD160
  * Public keys - RSA, DSA, Diffie-Hellman
  * PKCS#12
  * SSL/TLS
  * CMS (for S/MIME)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#223469: ITP: qca -- The Qt Cryptographic Architecture (QCA), cryptographic algorithmns for Qt programs

2003-12-09 Thread Jan Niehusmann
Package: wnpp
Severity: wishlist

* Package name: qca
  Version : not yet released, currently CVS only
  Upstream Author : Justin Karneges <[EMAIL PROTECTED]>
* URL : http://psi.affinix.com/
* License : LGPL
  Description : The Qt Cryptographic Architecture (QCA)

This library provides an easy Qt-compatible API for the following features:

  SSL/TLS
  X509
  SASL
  RSA
  Hashing (SHA1, MD5)
  Ciphers (BlowFish, 3DES, AES)

Functionality is supplied via plugins.

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux sirith 2.4.22 #1 Sat Aug 30 16:40:19 CEST 2003 i686
Locale: LANG=C, [EMAIL PROTECTED]



signature.asc
Description: Digital signature


Security updates for sarge? (was: Ubuntu discussion at planet.debian.org)

2004-10-22 Thread Jan Niehusmann
On Fri, Oct 22, 2004 at 10:20:51AM +0200, Jérôme Marant wrote:
> Debian developers, on the contrary, run unstable and rarely run
> testing, which means that they don't really know about the shape
> of what they release.

I would immediately upgrade at least one, probably more, woody machines
to sarge if there was a working security update system. And I guess I'm
not the only one.

Question to the security team: What's holding back security support for
sarge? (This is not a complaint - I'm just curious)

Jan




Re: Fwd: Please confirm your message

2002-12-02 Thread Jan Niehusmann
On Sun, Dec 01, 2002 at 08:43:06PM +0100, Russell Coker wrote:
> When you have a very small number of people doing something totally contrary 
> to what everyone else on the Internet is doing, and expecting that everyone 
> else should go out of their way to accomodate them, then you don't need to do 
> any research into who they are.

See it that way: The problem of spam unfortunately is not solved, yet.
There are several approaches to limit the amount of spam, and none of
them is perfect. So, some research is necessary to find better ways of
limiting spam.

And the best way to evaluate some spam filter is to use it. Of course,
that may annoy people, and these people should speak up (because that
adds important information to the evaluation process - a spam filtering
scheme which annoys people too much will not work in the long run). But
please don't take it personal. 

> It is not suitable for individual email addresses.

Time will tell. I fear that some day, the only way to use email
productively is to block all email with invalid sender adresses. And I
don't know a way do valdiate a (not yet known) address but to try it
and send a reply.
If you combine that with some autoresponders on both ends, no human
interaction would be needed, so annoyance should go down.

Jan




Re: Fwd: Please confirm your message

2002-12-02 Thread Jan Niehusmann
On Mon, Dec 02, 2002 at 04:58:48PM +0100, Russell Coker wrote:
> On Mon, 2 Dec 2002 16:39, Jan Niehusmann wrote:

> > Time will tell. I fear that some day, the only way to use email
> > productively is to block all email with invalid sender adresses. And I

> If an auto-responder can handle such messages then spammers will just
> use such auto-responders and therefore the spam filter will be almost
> useless.

You are missing the point: That scheme doesn't directly block spam, it
only assures that a mail has a valid Reply-To:-address. Which may (or
may not) stop spam. Time will tell.

> Also there's the issue of two people having such filters trying to
> communicate with each other.

Of course such programs need careful design to prevent loops.

I don't say this is the only solution, I don't even claim it solves the
spam problem at all. But I think it's a sensible experiment. After all,
it may work.

Jan




Re: Fwd: Please confirm your message

2002-12-02 Thread Jan Niehusmann
On Mon, Dec 02, 2002 at 08:18:46AM -0800, Stephen Zander wrote:
> The above is based on the false premise that those who send spam are
> incapable of sending it with (forged) real email addresses.  They
> already have lots of them to choose from.

But if they send the spam with a forged email address, the confirmation
request won't be answered. 

(Which needs to be considered when designing a confirmation
auto-responder: It may only confirm messages which were actually sent
from that account)

Jan

PS: I think we are getting off-topic. I am interested in your opinion,
but please consider sending it by private email.




Re: Bug#171693: ITP: wondershaper -- a script to set up QoS, mainly for home users

2002-12-04 Thread Jan Niehusmann
On Wed, Dec 04, 2002 at 02:25:43PM +0100, Joerg Friedrich wrote:
> and the other htb-based. cbq is no longer developped, but tc from
> iproute does not support htb.

Well, according to the changelog, tc does support htb, but it's probably
based on htb2 and 2.4.20 contains htb3, which seems to be incompatible. 

But for people using htb2, the wondershaper script could be useful now,
so I think it'd be fine to upload it now.

Jan




Re: Bug#171693: ITP: wondershaper -- a script to set up QoS, mainly for home users

2002-12-06 Thread Jan Niehusmann
I'd say a package wich only works with a recent kernel version is not a
problem. Add a note to the description, and let the program detect
availability of the necessary features at runtime, with a meaningfull
error message if the feature is missing.

By the way, the iproute package just got updated:

iproute (20010824-9) unstable; urgency=medium

  * Added patch for HTB v3.6 to be able to work with kernel 2.4.20
(from http://luxik.cdi.cz/~devik/qos/htb/v3/htb3.6-020525.tgz)
(closes: Bug#147550, Bug#167149, Bug#167597, Bug#171277)

 -- Juan Cespedes <[EMAIL PROTECTED]>  Thu, 05 Dec 2002 13:44:10 +0100

Jan




Re: plagiarism of reiserfs by Debian

2003-04-22 Thread Jan Niehusmann
On Sun, Apr 20, 2003 at 06:19:28PM -0400, Glenn Maynard wrote:
> Remember, the issue here isn't whether there's good reason to remove the
> Reiser message, but whether we're allowed to (apparently not) and
> whether not being allowed to do so is DFSG-free.  Even if we were happy
> with simply putting it back in, it still can't go in main if it's not free.

Are you sure about that? I didn't read all the messages in this thread,
but from the ones I read, I get the impression that Hans is not trying
to say that debian does something illegal. I read phrases like rude,
impolite, and ingrateful, but not illegal. He did talk about 'violation
of copyright' in his first mail, but reading his second mail, I'm quite
sure he doesn't really care about legal positions, but about fairness.

I think debian should respect the authors' wishes, even if we would be
allowed not to do so. This is not about DFSG-freeness, it's just nice
behaviour.

And of course, now that the topic is being discussed, it's of course ok
to ask Hans if the messages can be turned of under certain
circumstances, if that improves the usefulness of the software to the
users.

Jan




emu10k1-mixer?

2001-05-07 Thread Jan Niehusmann
Is there a mixer available that supports the advanced mixing features
of the emu10k1 chip (found on Soundblaster Live) ?

The only one I know is 'dm', a little but very usefull command line
tool. As it's not yet in debian, I will ITP it if there are no 
alternatives.

There is another point I'm not sure about:
dm is part of the emu10k1-driver-package from http://opensource.creative.com/.
This package contains some other tools. Although I don't use these tools,
and I don't know much about them, I think they should be packaged together
with dm in a package called emu10k1-utils or something like that. On the
other hand, as I don't even know how to use these tools, it's not clear to
me if they are working.

As Soundblaster Live is a fairly common soundcard, I wonder why there
are so few tools to use it's features. Being able to route sound from
any of it's inputs to any output independently is a great thing. And 
having a programmable DSP should be even greater to people who need it.

Jan

-- 
OpenPGP-signierte bzw. -verschlüsselte Mail erwünscht
EMail-Key: 1024D/F12DA065 (=> Keyserver oder auf Anfrage)




Re: mutt-1.3.24-3 complains of read-only /var/mail/foo

2002-01-02 Thread Jan Niehusmann
On Wed, Jan 02, 2002 at 11:00:58AM -0900, Christopher S. Swingley wrote:
> > A quick search of the debian-devel archive didn't turn up
> > anything about this, but I might have goofed the search.
> > Anyway, mutt-1.3.24-2 works well enough for me, but 1.3.24-3
> > won't let me modify /var/mail/foo.
> 
> # chown root:mail /usr/bin/mutt_dotlock
> # chmod 2755 /usr/bin/mutt_dotlock
>   
> $ ls -l /usr/bin/mutt_dotlock 
> -rwxr-sr-x1 root mail /usr/bin/mutt_dotlock

This bug is fixed in mutt-1.3.25-1, and besides this minor glitch,
it's important to upgrade to 1.3.25 because it fixes a rather
serious security hole. 

Jan




Release.gpg

2002-01-14 Thread Jan Niehusmann
Hi!

Is there a reason why the Release.gpg files for testing and unstable are
empty?

I'm using the Wichert's script to check the integrity of the local
mirror, but at the moment this is not possible because auf the missing
signature.

Jan




Re: Release.gpg

2002-01-14 Thread Jan Niehusmann
On Mon, Jan 14, 2002 at 03:30:45PM +0100, Jan Niehusmann wrote:
> I'm using the Wichert's script to check the integrity of the local

Sorry, wrong attribution - of course, the script is written by Anthony
Towns.




Re: Release.gpg

2002-01-14 Thread Jan Niehusmann
On Mon, Jan 14, 2002 at 05:51:39PM +0100, Martin Schulze wrote:
> Jan Niehusmann wrote:
> > Is there a reason why the Release.gpg files for testing and unstable are
> > empty?
> 
> A bug on your end of the pipe?
> 
> auric!joey(pts/0):/org/ftp.debian.org/incoming> l `locate Release.gpg`
[...]
> -rw-r--r--1 ajt  debadmin  480 Jan 14 10:28 
> /org/ftp.debian.org/ftp/dists/woody/Release.gpg
[...]

But:

bash-2.05a$ ncftp ftp.debian.org
NcFTP 3.1.1 (Dec 23, 2001) by Mike Gleason ([EMAIL PROTECTED]).
Connecting to 128.101.36.192... 
saens.debian.org FTP server (vsftpd)
Logging in...   
Login successful. Have fun.
Sorry, I don't do help. 
Logged in to ftp.debian.org.
Current remote directory is /debian/dists/testing.
ncftp /debian/dists/testing > ls -l *.gpg
-rw-r--r--   77 1176 11760 Jan 13 22:53 Release.gpg


This does look empty... but perhaps the problem has already been fixed
and the files only needs to propagate to the mirrors.

Jan




NEW packages stalled?

2002-04-15 Thread Jan Niehusmann
Hi!

Can anybody tell me why the psi package in queue/new doesn't get
processed? I made an upload which only changed 'non-US' to 'net' nearly
three weeks ago. (I added another upload with new features last week)

If there is anything wrong with this package, please tell me, so I can
correct it.

Jan


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: NEW packages stalled?

2002-04-15 Thread Jan Niehusmann
On Mon, Apr 15, 2002 at 09:29:10PM +1000, Anthony Towns wrote:
> ] Build-Depends: debhelper (>> 3.0.0), tmake, libqt3-mt-dev, libssl-dev
>  ^^
> OpenSSL can't be used with GPL licensed software.

The psi binary package doesn't contain openssl code. The only thing
needed at compile time is the ssl.h header file, and the created binary
works perfectly well without openssl. It is not linked against openssl.

So I don't see how this conflicts with GPL. If you have an convincing
argument, I am sure the author of psi will add an exception clause to
his license, as he did for qt. (SSL support is included in the sources
and binaries distributed by the upstream author, as well)

Jan



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Allow encfs into jessie?

2014-09-11 Thread Jan Niehusmann
Hi,

due to bug #736066, encfs was removed from jessie.

I'd think it would be better to allow encfs into jessie for the
following reasons:

The bug report is about security issues, but these are not security
issues of the software (as in: you can somehow hack into the computer
wich is running the software), but of the encryption algorithms used.

So it can be compared to a package implementing md5: Yes, it's known
that md5 is not secure any more, but that's not a reason to remove all
packages implementing md5 from debian.

One could argue that encfs shouldn't be used any longer to encrypt
files, and therefore encfs is just not useful and can be removed.

But many users will have legacy installations using encfs encrypted file
systems, and will be surprised that they can't access them any more from
jessie. So removing encfs will cause major inconveniences to some of our
users.

Therefore, I propose that encfs should be allowed into jessie.

(What would be the right way to do that? Lower the severtiy of the bug?
Add a jessie-ignore tag?)

To notify users about the potential security issue, a NEWS file could
be added, or one could add a warning to the output of the encfs command.

Regards,
Jan


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140911101208.ga17...@x61s.reliablesolutions.de



Re: Allow encfs into jessie?

2014-09-12 Thread Jan Niehusmann
Hi Holger,

On Thu, Sep 11, 2014 at 06:42:32PM +0200, Holger Levsen wrote:
> I (probably too briefly) skimmed though the bug report, but couldn't find a 
> usecase where an encrypted filestem container with broken crypto could be 
> useful. Could you elaborate, please?

As far as I understand the EncFS Security Audit, encfs is not using
'broken crypto'. The conclusion of the audit states it quite clearly:

"EncFS is probably safe as long as the adversary only gets one copy of
the ciphertext and nothing more. EncFS is not safe if the adversary
has the opportunity to see two or more snapshots of the ciphertext at
different times. EncFS attempts to protect files from malicious
modification, but there are serious problems with this feature."
(from https://defuse.ca/audits/encfs.htm)

A common use case for disk encryption is to protect a lost or stolen
laptop. And the adversary is not some powerful agency, but a curious
person browsing through the hard disk before formatting it.

I see no reason to assume that encfs is not good enough for that use
case, at the moment.

Of course, the crypto should be improved ASAP, as attacks to crypto
only get better.

Regards,
Jan



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140912114636.ga2...@jannic.reliablesolutions.de



Bug#975630: ITP: condure -- HTTP/WebSocket connection manager

2020-11-24 Thread Jan Niehusmann
Package: wnpp
Severity: wishlist
Owner: Jan Niehusmann 

* Package name: condure
  Version : 1.1.0
  Upstream Author : Justin Karneges 
* URL : https://github.com/fanout/condure/
* License : Apache-2.0
  Programming Lang: Rust
  Description : HTTP/WebSocket connection manager

Condure is a service that manages network connections on behalf of server
applications, in order to allow controlling the connections from multiple
processes. Applications communicate with Condure over ZeroMQ.

Condure can only manage connections for protocols it knows
about. Currently this is HTTP/1 and WebSockets. See Supported protocols.

The project was inspired by Mongrel2.

The existing package pushpin supports condure as an alternative to
mongrel2, and it looks like upstream is slowly migrating from mongrel2
to condure.

As a rust software, this will be packaged as part of the debian-rust
team.



Re: OpenSSL 1.1.0

2016-11-11 Thread Jan Niehusmann
Hi,

On Fri, Nov 04, 2016 at 11:58:44PM +0200, Adrian Bunk wrote:
> You could enforce that no Qt-using package uses the wrong OpenSSL by 
> adding libssl1.0-dev dependencies to libqt4-dev and qtbase5-dev.

How can I handle the case of a package which uses both qt and curl? The
latter already switched to OpenSSL 1.1.

Jan



Re: OpenSSL 1.1.0

2016-11-11 Thread Jan Niehusmann
Hi,

(Cc to Alessandro because this causes issues with libcurl)

On Wed, Nov 02, 2016 at 09:15:13PM +0100, Kurt Roeckx wrote:
> I don't think having libssl1-1-dev vs libssl1.0-dev is going to
> make much differences in the end. The build conflicts will always
> have to be sorted out.

Well I think it makes a difference:

With libssl-dev silently switching to OpenSSL 1.1, packages get
recompiled with the new version, but the maintainers may be unaware that
this causes compatibility issues.

I have a concrete example:

It seems like the package zurl is broken by libcurl3 being linked with
OpenSSL 1.1.

This means the binary package zurl 1.7.0-1 works fine with libcurl3
7.50.1-1, but fails to connect to https URLs when libcurl3 is upgraded
to 7.51.0-1.

(It also works with curl 7.51.0-1 recompiled with OpenSSL 1.0, so I'm
quite sure it's actually caused by the OpenSSL transition.)

So, in short, upgrading libcurl3 breaks existing binary packages.

According to our policy, that means a SONAME change would be necessary.
("Every time the shared library ABI changes in a way that may break
binaries linked against older versions of the shared library, the SONAME
of the library and the corresponding name for the binary package
containing the runtime shared library should change.")

But the way the OpenSSL transition was communicated, Alessando probably
didn't expect that the change would cause an ABI change.

How do we handle this?

For this single package, zurl, I could recompile with OpenSSL 1.1. This
seems to work, but I'm not sure if there are hidden issues, as zurl also
links to qt5, which is built against libssl1.0-dev.

But who knows which other packages are silently broken the same way?

Jan



Re: OpenSSL 1.1.0

2016-11-11 Thread Jan Niehusmann
On Fri, Nov 11, 2016 at 03:15:09PM +0100, Kurt Roeckx wrote:
> At least something like that also came up with xmltooling.
> It's probably caused by this:
> curl_easy_setopt(easy, CURLOPT_SSL_CTX_FUNCTION, &sslCtxFunction_cb);
> 
> You get an SSL_CTX from OpenSSL 1.1 and you call an OpenSSL 1.0
> function with that handle. And libcurl really shouldn't have been
> exposing such functions directly. If something like that is
> really needed libcurl should have made a proper wrapper.

Yes, I agree that libcurl shouldn't expose such functions. But it does,
and it's to late to change that.

By exposing that function, SSL_CTX became part of curl's ABI.

So by linking to a different OpenSSL version with a different
representation of SSL_CTX, curl indeed changed its ABI and must
change SONAME, right?

Jan



Re: OpenSSL 1.1.0

2016-11-14 Thread Jan Niehusmann
On Mon, Nov 14, 2016 at 10:45:50AM -0300, Lisandro Damián Nicanor Pérez Meyer 
wrote:
> And yes, I would step back and switch libssl-dev to provide libssl1.0-dev and 
> have libssl1.1-dev around for anyone who can really do the switch.

That's the only viable alternative I see.

It looks like an increasing number of packages, including apache2,
openssh, qt4 and qt5, picked to build-depend on libssl1.0-dev.

So OpenSSL 1.0 won't go away, and through packages indirectly depending
on both versions, we'll get very difficult to solve conflicts.

As removing all those packages clearly is not an option, the release
will be significantly delayed if we don't revert the default to be
OpenSSL 1.0.

(It's fine if packages which depend on libssl-dev get an RC-bug if they
can't be compiled with OpenSSL 1.1. Packages which can't be ported
should explicitly depend on libssl1.0-dev. That way we'll make progress
towards a point where we can start a smooth transition.)

I'd be glad to have a quick transition to OpenSSL 1.1 now, but I honestly
don't see a way how this may work.

Please revert the default back to 1.0 for now.

Jan



Re: OpenSSL 1.1.0

2016-11-15 Thread Jan Niehusmann
On Tue, Nov 15, 2016 at 10:43:07AM -0300, Lisandro Damián Nicanor Pérez Meyer 
wrote:
> On lunes, 14 de noviembre de 2016 22:16:25 ART Jan Niehusmann wrote:
> [snip] 
> > (It's fine if packages which depend on libssl-dev get an RC-bug if they
> > can't be compiled with OpenSSL 1.1. Packages which can't be ported
> > should explicitly depend on libssl1.0-dev. That way we'll make progress
> > towards a point where we can start a smooth transition.)
> 
> I *really* disagree with that. Swtiching libssl-dev to provide libssl1.1-dev 
> means that some apps/libs will get automatically recompiled and some of them 
> might even not FTBFS (because for example, they are ready to use 1.1).
> 
> That means we left the door open to crashes due to mixed libssl versions.

I probably didn't state that clear enough: I don't think libssl-dev
should provide libssl1.1-dev.

But building packages - purely for testing purposes - against
libssl1.1-dev and reporting any issues is a good thing, and I even think
such bugs could be marked RC, to make sure we make progress.

At the same time, I don't want to remove packages which can't be ported
quickly. Therefore, either these bugs can't be RC, or there must be an
easy way for maintainers to opt out. One way of such an opt-out would be
changing the dependency to libssl1.0-dev.

However, the quoted paragraph was meant as a side-note only. It's not
important, at the moment.


The one thing we should decide *quickly* is if we want to revert
libssl-dev back to 1.0, or if we want to delay the freeze by several
months.

> By letting libssl-dev provide libssl1.0 we do not open this door, and we let 
> maintainers decide on a per-basis case.

Yes, and we avoid cases like with libcurl3, where the recompile to
libssl1.1 broke ABI compatibility of libcurl3 without notice.

Jan



Re: OpenSSL 1.1.0

2016-11-21 Thread Jan Niehusmann
Hi,

On Mon, Nov 21, 2016 at 11:11:09AM +0100, Tino Mettler wrote:
> At the end I noticed that Qt will stay at 1.0 (by glancing into the
> changelog of the relevant upload) which means that my package also has
> to to stay at 1.0 and the whole excitement resulted in just a changed
> build-dep.

I'm not so sure about this any more:

In https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844018 Stepan
Golosunov wrote that according to his understanding of dlsym(3), it
should be fine to link a program with OpenSSL 1.1 and Qt at the same
time, even though Qt links to OpenSSL 1.0.

Can somebody who knows OpenSSL, Qt and dlopen/dlsym well enough confirm
that?

If that's true, it would (IMHO) be a major step towards a timely release
of stretch with OpenSSL 1.1 as the default version.

Jan



Re: OpenSSL 1.1.0

2016-11-24 Thread Jan Niehusmann
On Thu, Nov 24, 2016 at 03:59:10PM +0200, Adrian Bunk wrote:
> If inspection is not easily possible, then adding a dependency on 
> libssl1.0-dev to qtbase5-private-dev should be sufficient to
> ensure that this is not leaked to a different OpenSSL version.

I see two disadvantages:

1) doesn't catch cases where a package doesn't depend on libssl at all,
   but depends on two libraries which in turn use qt and libssl.

2) needlessly affects packages which use qt, but don't use QNetwork /
   QSsl.

But I don't know a better alternative, either.

Jan



Re: OpenSSL 1.1.0

2016-11-24 Thread Jan Niehusmann
On Thu, Nov 24, 2016 at 07:23:22PM +0200, Adrian Bunk wrote:
> If both b-dev and c-dev would depend on the libssl*-dev they use,

Which is not always the case, now.

qtbase5-private-dev exposes lots of internal OpenSSL structures, but
doesn't depend on any OpenSSL package.

libcurl4-openssl-dev only suggests libssl-dev. And it provides access to
an SSL_CTX via:

typedef CURLcode (*curl_ssl_ctx_callback)(CURL *curl,/* easy handle */
  void *ssl_ctx, /* actually an
OpenSSL SSL_CTX */
  void *userptr);


It's working around a dependency by using a (void *) instead.


So, at least in theory, a package using both qtbase5-private-dev and
libcurl4-openssl-dev could relay an SSL_CTX between two different
versions of OpenSSL.

In practice, of course, its highly unlikely that a package links to two
different libraries, accesses SSL-related functions in both of them,
passes structures around, and does not depend on libssl-dev, itself.

Therefore I think this is a red herring.


The more important question is if there are any risks left if there are
no structures exchanged between the two versions of OpenSSL. Which, in
turn, boils down to the question of dlopen()/dlsym() do the right thing.

If this usage is not OK, we need to make sure no package using Qt (and,
in any of its use-cases triggering an SSL connection via Qt), links to
OpenSSL 1.1, directly or indirectly. And indirect usage can't be
prevented with the build-dependency Adrian suggests.

If, instead, such usage is fine, only (dev-)packages exposing SSL
structures need to be protected by a build-dependency on libssl-dev.
That would be libcurl4-openssl-dev, qtbase5-private-dev and probably
some others I don't know about.

Jan



Re: OpenSSL 1.1.0

2016-11-24 Thread Jan Niehusmann
On Fri, Nov 25, 2016 at 01:56:19AM +0400, Stepan Golosunov wrote:
> qsslsocket_openssl_symbols.cpp also tries to load any libssl.* it can
> find (in directories gathered from dl_iterate_phdr) when it cannot
> find libssl.so..  This asks for trouble when
> libssl1.0.2 is not installed and probably needs to be patched out.

This should be covered by qt 5.7.1~20161021+dfsg-6 (currently in sid).
>From the changelog:

"Make libqt5network5 depend on libssl1.0.2. It will crash when only
newer libssl versions are installed."

Jan



Bug#858345: ITP: tnetstring3 -- python3 library for data serialization using typed netstrings

2017-03-21 Thread Jan Niehusmann
Package: wnpp
Severity: wishlist
Owner: Jan Niehusmann 

* Package name: tnetstring3
  Version : 0.3.1
  Upstream Author : Carlo Pires 
* URL : https://pypi.python.org/pypi/tnetstring3
* License : MIT
  Programming Lang: Python / C
  Description : python3 library for data serialization using typed 
netstrings

Tnetstring is a lot like JSON but it uses a new syntax called "typed
netstrings" that was proposed for use in the Mongrel2 webserver. It's
designed to be simpler and easier to implement than JSON, with a happy
consequence of also being faster in many cases.

This Python library provided functions to read and write tnetstrings.
It's a port of the python2 tnetstring library.

The python2 version is available in debian as package 'tnetstring'. I was
asked by users of that package if I could package the python3 version,
as well.