Re: what about Netplan?

2024-07-16 Thread Noah Meyerhans
On Mon, Jul 15, 2024 at 02:57:21AM +0200, Cyril Brulebois wrote:
> Lukas Märdian  (2024-07-11):
> > Additional benefits of Netplan:
> > * Already used on Debian Bookworm [cloud] images by default
> 
> Having started to toy with cloud images these last few days, and
> learning about the various components in there, I'm not exactly sure
> where /etc/netplan/90-default.yaml is coming from but it's 644 in at
> least Debian 12 and Debian sid “nocloud” amd64 images (QCOW format),
> leading netplan to complain about these too-wide permissions.
> 
> I'm not sure where this file is coming from, but it'd be great to have
> those permissions fixed/those warnings go away.
> 
> I'd be glad if someone could take it up from here, I've burned up all
> the time I had to spend on Netplan on the short term. Thanks already!

I think that may be a cloud image specific issue.  Will look deeper...



Re: Request for feedback on draft: DEP-18: Enable true open collaboration on all Debian packages

2024-08-03 Thread Noah Meyerhans
On Sat, Aug 03, 2024 at 04:15:33PM +0900, Charles Plessy wrote:
> > I have drafted a new DEP at
> > https://salsa.debian.org/dep-team/deps/-/merge_requests/8 titled "DEP-18:
> > Enable true open collaboration on all Debian packages".
> 
> Hi Otto,
> 
> thank you for your initiative,
> 
> one problem I have with NMUs in team-maintained package is that they
> often bypass Salsa…  Would it make sense to add to the DEP a request
> that NMUs are started from and pushed to the default branch?

+1

Regardless of what VCS is used, an NMU that bypasses it just makes more
work for the maintainer.  If not pushed, there should at minimum be an
open merge request that applies cleanly to whatever was in the archive
prior to the NMU.  It would be nice to codify this.

noah



Re: Removing more packages from unstable

2024-08-21 Thread Noah Meyerhans
On Tue, Aug 20, 2024 at 11:09:51AM +0200, Bastian Venthur wrote:
> I think popcon does give a good approximation of how much percent of people
> installed a certain package even if not everyone uses it, don't you agree?

No, definitely not.  There are hundreds of thousands of Debian systems
running in various cloud environments, and I'd be surprised if any of
them have ever submitted popcon data.

> Last time I installed Debian it was still enabled by default.

Oh? I don't think it has ever been enabled by default.

noah



Re: Vancouver meeting - clarifications

2005-03-24 Thread Noah Meyerhans
On Wed, Mar 23, 2005 at 01:07:07PM +0100, Wouter Verhelst wrote:
> On Wed, Mar 23, 2005 at 01:46:17AM +0100, Pierre THIERRY wrote:
> > - Debian: 11 ports, 9157 packages (sarge) [17593 in sid]
> > - NetBSD: 55 ports, 5300 packages
> 
> It should be noted that the definition of 'port' isn't necessarily the
> same if you compare NetBSD against Debian; for instance, NetBSD/mac68k
> and NetBSD/amiga count as two ports, whereas in Debian, they count as
> one (albeit the 'subarchitecture' is different)

Additionally, they do not provide binaries for all their packages.  In
fact, the pkgsrc collection does not even follow the normal release
cycle.  When NetBSD is ready to release, they simply take a snapshot of
pkgsrc.  It's not even a requirement that the packages in pkgsrc are
even buildable on all supported platforms.

NetBSD is able to support as many platforms as they do because they have
very different requirements for "support" than we do.  It's not a good
idea to compare us to them.

noah



pgpsqrooX3nPQ.pgp
Description: PGP signature


removal of lukemftpd and lukemftp from debian

2006-03-28 Thread Noah Meyerhans
Hi all.  I sent the following to Takuo KITAME on Monday, 20 March, and
have yet to get a reply.  Please read and comment:

The lukemftpd and lukemftp packages have been replaced upstream by
tnftpd and tnftp [1] and have not seen any maintainer activity since
2002.  [2]

The tnftp package (an ftp client) is in the archive [2], and should
probably replace lukemftp.  It does properly Conflict with and Replace
lukemftp in debian/control.  However, it also does not get any
maintainer support and has had an open RC security bug with an attached
patch for more than 1 year.  I will prepare an NMU of the current
upstream release to fix this bug ASAP.

So, before I file a bug against ftp.debian.org requesting the removal of
the lukemftp* packages, would anybody like to speak up in their defense?
I'm willing to adopt tnftp and package tnftpd so it can replace
lukemftpd, if that's what needs to happen.

noah

1. http://freshmeat.net/projects/tnftpd
   http://freshmeat.net/projects/tnftp
2. http://packages.qa.debian.org/l/lukemftp.html
   http://packages.qa.debian.org/l/lukemftpd.html
3. http://packages.qa.debian.org/t/tnftp.html




signature.asc
Description: Digital signature


Re: System users that receive mail in /var/mail/systemuser?

2006-04-10 Thread Noah Meyerhans
On Mon, Apr 10, 2006 at 11:43:53AM -0700, Stephen Samuel wrote:
> Also: in my experience, I've rarely received spam for system users other 
> than postmaster and webmaster -- and those are probably due to DNS 
> registrations and the like.

Really?  I get spam addressed to ftp, cyrus (the Cyrus IMAP system),
postfix, apache, daemon, etc etc all the time.  Those are very common
user names, and (even better for the spammers) their mail is typically
aliased to a group of people.  They're probably in every spammers list
of dictionary words to try.

Still, though, even if I'd never expect legitimate mail to e.g. my
proftpd user, I'd certainly not want to automatically discard it.  I'd
prefer a default configuration that sent it to root, but that could
easily be overridden.

noah



signature.asc
Description: Digital signature


Bug#362454: ITP: kredentials -- KDE systray applet for managing AFS and Kerberos credentials

2006-04-14 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans <[EMAIL PROTECTED]>


* Package name: kredentials
  Version : 0.7.1
  Upstream Author : Noah Meyerhans (yes, that's me)
* URL : http://people.csail.mit.edu/noahm/kredentials
* License : MIT
  Description : KDE systray applet for managing AFS and Kerberos credentials

Kredentials is a KDE systray applet for keeping Kerberos and AFS
authentication tokens current. Each hour it renews Kerberos tickets and
(optionally) obtains new AFS tokens, and it notifies the user upon final
ticket expiration.

-- System Information:
Debian Release: 3.1
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.15.4-csail
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



appropriate use of /etc/alternatives

2003-05-30 Thread Noah Meyerhans
I intend to package the xplot utility from xplot.org.  This tool is
useful with the tcptrace package, which I maintain.  However, there's
already an xplot package that installs /usr/bin/xplot.  It's not
compatible with xplot.org, but does essentially the same thing (plots
data in X).

I suggested to the xplot maintainer, Peter Galbraith, that we use
/etc/alternatives to manage a /usr/bin/xplot symlink.  He doesn't think
that it's an appropriate use of alternatives, since the tools are not
compatible.  Do others agree?  On what level do tools need to be
compatible in order to go into alternatives?  I'm sure there are a
number of examples of alternatives that are incompatible on at least
some level (think nvi and vim config files, for example), but they do
essentially the same thing.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpa7SHSM9XHi.pgp
Description: PGP signature


Re: appropriate use of /etc/alternatives

2003-05-30 Thread Noah Meyerhans
On Fri, May 30, 2003 at 02:25:48PM -0400, Ben Collins wrote:
> I agree. A user should not have to concern themselves about which one
> they are using. If the command name is the same, they better support the
> same functionality.

But they do support the same functionality, just on different formats of
data file.  There are plenty of cases where a user needs to be aware of
which specific alternative they're using.  /usr/bin/zsh can run zsh
version 3 or 4, depending on alternatives.  If the user is going to
write a script in zsh, he better know which version he's getting,
otherwise he may write code using a feature not present in the version
he's running.  On some level, zsh3 is incompatible with zsh4, though
they both basically do the same thing.  Same with the two
xplot tools.

> Sounds to me like you don't even want to call the package just xplot, to
> avoid confusion. Maybe xplot-ng? :)

Well obviously my package won't be called xplot, there's already an
xplot package.  But I don't want to rename the binary that gets
installed by it.  If we can't use alternatives to manage /usr/bin/xplot
in this case, my package will simply end up conflicting with the
existing xplot package, which is neither necessary nor desirable.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgp6A72pdVAbf.pgp
Description: PGP signature


Re: appropriate use of /etc/alternatives

2003-05-31 Thread Noah Meyerhans
On Sat, May 31, 2003 at 02:00:41PM +0100, Mark Brown wrote:
> The binary is going to have to be renamed - even if you use an
> alternative there'll still be a renamed binary there.  

yes, but the user would only need to know in the even that they had both
alternatives installed, which I don't see happening very often.

> Would it be possible to massage the data format for one xplot into the
> other or modify one to accept the input of the other in a compatibility
> mode?

Possibly, but why create more work for the user?

I guess xplot-xplotorg will just end up conflicting with xplot.  It
sucks, since that means the new package winds up in the ghetto (priority
extra) but it's preferable to the options available.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpRkqahPTmNJ.pgp
Description: PGP signature


what to do with iputils (ping, etc)

2005-10-21 Thread Noah Meyerhans
Before I go off and do something drastic like fork the iputils packages
(the packages that give us a handy little tool called 'ping') I'd like
to ask for advice from the wider community.

The iputils source package builds the iputils-{ping,tracepath,arping}
binary packages.  Iputils-ping is the default ping in Debian, and is
thus rather important to get right.  Unfortunately, the upstream source
and build process is a mess.  The upstream developer is one of the
kernel network stack maintainers, and he wants the iputils package to
always work with the latest and greatest kernel functionality.  As a
result, he includes lots of kernel headers in his programs rather than
using standard headers from /usr/include.

At one point I fixed the tracepath code so it would build using standard
headers.  (I never uploaded the fix.)  I haven't fixed ping, etc.  The
thing is, this was so intrusive to both the build system and the code
that it can only be described as a fork.  I'm not completely opposed to
forking this code, since it's fairly mature and not wildly changing (in
fact, there hasn't been a new release in quite some time... like years)
and it would allow me to clean it up a bit.  But I'd like to get a
second opinion...

noah



signature.asc
Description: Digital signature


Re: what to do with iputils (ping, etc)

2005-10-21 Thread Noah Meyerhans
On Fri, Oct 21, 2005 at 08:51:43PM +0200, Marco d'Itri wrote:
> > and build process is a mess.  The upstream developer is one of the
> > kernel network stack maintainers, and he wants the iputils package to
> > always work with the latest and greatest kernel functionality.  As a
> > result, he includes lots of kernel headers in his programs rather than
> > using standard headers from /usr/include.
> So what? There is nothing wrong with this.

Tell that to the hurd or kFreeBSD people.

> > At one point I fixed the tracepath code so it would build using standard
> > headers.
> I'd say you *broke* the code.

By making it no longer Linux specific?  By making it use POSIX
datatypes?  How does that follow?  (Actually, I think the tracepath
packages may in fact be Linux-specific; ping and traceroute6 certainly
shouldn't be.)

> > second opinion...
> It's not obvious which problem you are trying to solve.

Bugs like 163254 and 285420.

noah




signature.asc
Description: Digital signature


Re: what to do with iputils (ping, etc)

2005-10-21 Thread Noah Meyerhans
On Fri, Oct 21, 2005 at 12:54:53PM -0700, Thomas Bushnell BSG wrote:
> 
> Folding the headers into the package does not advance this goal, it
> retards it.

The inclusion of the kernel headers into the package was an explicitly
temporary fix for version 3:20020927-2:
  * Build system cleanup.  Stop including anything from /usr/src/linux.
We still define our own versions of things that should be included
from /usr/src/sys, and this needs to be fixed, but I will wait until
post sarge to do so.  (Closes: Bug#223164)

At this point the package should probably build-depend on
linux-kernel-headers and use the headers from that package in order to
avoid maintaining its own copy of the files.  However, I'm still not
convinced there needs to be anything linux specific in this package.

noah



signature.asc
Description: Digital signature


Re: what to do with iputils (ping, etc)

2005-10-21 Thread Noah Meyerhans
On Fri, Oct 21, 2005 at 10:13:30PM +0200, Marco d'Itri wrote:
> > Is a portable version required to be not working and not up to date?
> If the upstream maintainer is not interested in it, yes.

It depends on what you mean by "up to date".  If we're only including
glibc headers, then we can only use functionality that glibc supports.
If we bypass glibc and directly use kernel functionality, then we get
all the latest and greatest kernel networking features.  However, the
programs are then entirely linux specific, and may even fail to work
correctly on different (typically older) version of Linux.

So yes, in some sense, a portable ping may be out of date.  This is
exactly why the upstream author didn't accept my patches to remove the
dependency on kernel headers.  He cares more about the package being up
to date.  Our requirements may be slightly different, though.

noah




signature.asc
Description: Digital signature


Re: what to do with iputils (ping, etc)

2005-10-21 Thread Noah Meyerhans
On Fri, Oct 21, 2005 at 10:54:58PM +0200, Marco d'Itri wrote:
> > So yes, in some sense, a portable ping may be out of date.  This is
> > exactly why the upstream author didn't accept my patches to remove the
> > dependency on kernel headers.  He cares more about the package being up
> > to date.  Our requirements may be slightly different, though.
> Please let me know if you plan to remove features from iputils, so
> I will start maintaining a new, fully working package.

It's worth noting that at this point I believe "portable" and
"up-to-date" are not mutually exclusive.  They may be in the future.
That makes it somewhat hard to justify maintaining a separate package,
IMO.  But that's just me.

noah



signature.asc
Description: Digital signature


Re: what to do with iputils (ping, etc)

2005-10-21 Thread Noah Meyerhans
On Fri, Oct 21, 2005 at 11:52:02PM +0200, Marco d'Itri wrote:
> > How on earth does supporting that feature require incompatibility with
> > other systems?
> It does not, but the iputils maintainer is hinting that this is the
> package status.

I never said anything about the PMTU discovery features.  In fact, I
said that up to date != linux-specific *at this moment*.  I believe that
PMTU discovery is perfectly fine, given that the given sockopts exist in
the libc headers.  Given the fact that iputils hasn't seen an upstream
update in more than 2 years, we may never actually lose *anything* by
converting the package to use only libc headers.  Where we may lose is
if upstream adds new features that are not yet handled by libc.  Even
then, though, we may be able to work around them in the package by
adding our own linux specific definitions when building for Linux
systems.

noah




signature.asc
Description: Digital signature


Re: what to do with iputils (ping, etc)

2005-10-22 Thread Noah Meyerhans
On Sat, Oct 22, 2005 at 12:59:41PM +0200, Adrian von Bidder wrote:
> > It depends on what you mean by "up to date".  If we're only including
> > glibc headers, then we can only use functionality that glibc supports.
> > If we bypass glibc and directly use kernel functionality, then we get
> > all the latest and greatest kernel networking features.
> 
> What kind of features are we talking about here?

Hypothetical networking features that may be added to Linux in the
future.  As I've said, I do not believe any existing features will need
to be removed in order to remove the linux specific bits of this
package.

The problem with making this change is really that it'll be so
disruptive as to make it hard to consider the code as anything other
than a fork.  I'll revisit this claim, though.  Maybe I can keep things
from being quite so drastic.  We'll see.  I'm going to make an upload of
iputils soon to fix a bunch of bugs, but after that, I'll see what I can
do to please everybody and get the best of both worlds...

noah



signature.asc
Description: Digital signature


per-user temp directories by default?

2005-11-03 Thread Noah Meyerhans
Within the security team, there has recently been some talk of pushing
for per-user temp directories by default in etch.  I'd like to see what
people's reaction to such a proposal would be.

There are a number of outstanding "insecure tempfile vulnerabilities",
and there has been some talk that they're both too numerous and of low
enough impact that they're not even worth releasing DSAs for.  Never the
less, they are potentially dangerous and should be dealt with on some
level.  We believe that using libpam_tmpdir by default should make
nearly all of these vulnerabilities cease to be relevant (there are some
braindead apps that have /tmp hardcoded and don't use $TMP or $TMPDIR).
As far as I can tell, we would simply need to move libpam-tmpdir from
priority "optional" to "required" and modify the default
/etc/pam.d/common-session to include the following line:

session optionalpam_tmpdir.so

I have little operational experience with this PAM module, though.  Does
it cause problems for certain apps?  If so, could these problems be
solved with a less simplistic PAM configuration?

noah



signature.asc
Description: Digital signature


Re: per-user temp directories by default?

2005-11-04 Thread Noah Meyerhans
On Fri, Nov 04, 2005 at 01:16:31PM +0100, Frank K?ster wrote:
> What do the security people mean with per-user temp directories?  It's
> clear that $HOME/tmp would be bad, but /tmp/$USERNAME/ with proper
> permissions doesn't sound so awkward.

Sorry for not being more clear.  The default (only?) behavior of
libpam_tmpdir is to set $TMP and $TMPDIR to /tmp/user/$UID.

noah



signature.asc
Description: Digital signature


Re: per-user temp directories by default?

2005-11-04 Thread Noah Meyerhans
On Fri, Nov 04, 2005 at 01:00:48PM +0100, Klaus Ethgen wrote:
> That whould be no good idea for security environment where you do
> special think to secure /tmp (make it in memory and encrypt swap). With
> tempdir in users home all applications like for example gpg write
> temporary files to this location which ends up unencrypted on a disk or,
> more bad over an unsecure NFS share to the fileserver.
> 
> Please don't do this by default as it break the security of many, many
> systems!

First of all, libpam_tmpdir doesn't put $TMP in $HOME.  Second, we're
talking about the *default* configuration.  If you're doing something
with encrypted swap or $HOME on NFS, you've already diverged quite a bit
from the default configuration, so your security would not be broken
even if $TMP was in $HOME.  You'd simply have one single line to delete
from the default pam configuration.

noah



signature.asc
Description: Digital signature


Re: per-user temp directories by default?

2005-11-04 Thread Noah Meyerhans
On Fri, Nov 04, 2005 at 08:12:39AM +0100, Javier Fern?ndez-Sanguino Pe?a wrote:
> > There are a number of outstanding "insecure tempfile vulnerabilities",
> > and there has been some talk that they're both too numerous and of low
> > enough impact that they're not even worth releasing DSAs for.  Never the
> 
> Where was that talk done? I've been the one auditing that and there have been
> DSAs for most of the bugs I've reported to the audit team. Granted, they are
> not being issued inmediately (I usually provide the report and a patch), but
> they are on the queue as far as I know.

Yes, your numerous reports are what lead to this discussion, which
happened within [EMAIL PROTECTED]  Basically somebody was like "whoa, we'll
never be able to fix all of these!  And why should we, anyway, since the
problems are so minor?"  So it was proposed to at least provide an
additional layer of safety so we can say that this class of bugs
generally does not affect our default configuration.

> The problem is, there's lots of those. And when I mean lots I mean that I
> have a list of ~4780 binary packages of which at least ~2300 make use of
> insecure tempfiles for sure and the others need to be reviewed (as the script

So can we really be expected to release ~2300 DSAs to fix all these
things?  Even with patches to fix them, it's going to be an insane
amount of work.  This is exactly why we want libpam_tmpdir.

> IMHO, it's a worthwhile goal for etch but it should be done at the same time
> that there is a policy change mandating the use of mktemp/tempfile for shell
> scripts, File::Temp in perl scripts, tempnam in Php, tmpfile in C and safe
> constructs in those languages that lack a proper implementation (see #291389,
> for example).

You may be right that a policy change would be required.  Packages would
need to respect $TMP or $TMPDIR in order for this proposal to work.  As
has been pointed out earlier (Joey Hess mentioned CUPS breaking), this
may result in a number of bugs.

noah



signature.asc
Description: Digital signature


Re: Bits from the Security Team

2008-03-09 Thread Noah Meyerhans
On Sun, Mar 09, 2008 at 11:05:11PM +0100, Moritz Muehlenhoff wrote:
> * You need to be familiar with how the wide variety Debian packages
>   are maintained, patched and built. If you're not scared by
>   packages generating their patch series by applying sed statements
>   from cdbs include files before passing the patches through an
>   awk filter to quilt until they're finally built with yada, you
>   might be the right person.

OTOH, if you're doing that in one of *your* packages, you're probably
not the right person.  The security team prefers its members to be sane.
;)

noah



signature.asc
Description: Digital signature


Bug#543956: ITP: choqok -- KDE microblogging client

2009-08-27 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans 


* Package name: choqok
  Version : 0.6.6
  Upstream Author : Mehrdad Momeny 
* URL : http://choqok.gnufolks.org/
* License : GPL
  Programming Lang: C++
  Description : KDE microblogging client

Choqok is a fast, efficient and simple to use micro-blogging client for KDE.
It curently supports the twitter.com and identi.ca microblogging services.

Other notable features include:
* Support for user + friends time-lines.
* Support for @Reply time-lines.
* Support for sending and receiving direct messages.
* Twitpic.com integration.
* The ability to use multiple accounts simultaneously.
* Support for search APIs for all services.
* KWallet integration.
* Support for automatic shortening urls with more than 30 characters.
* Support for configuring status lists appearance.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Linux image packages going to depend on python

2009-11-30 Thread Noah Meyerhans
On Sun, Nov 29, 2009 at 02:15:41PM -0600, Manoj Srivastava wrote:
> Perhaps you should consider making the script just create a
>  ./fstab.new file, and not overwriting /etc/fstab?  makes it easier to
>  test the script out without altering current setup.

Keeping a copy of the original file, maybe in /var/backups, might be
helpful as well.

noah



signature.asc
Description: Digital signature


Re: Mozilla renames: is Debian the only one?

2007-04-12 Thread Noah Meyerhans
On Thu, Apr 12, 2007 at 02:27:51PM -0300, Margarita Manterola wrote:
> >> Gentoo has done renames of Mozilla products such as Firefox too.
> >I asked one of my local gentoo devs - and he says "no - it is not
> >rebranded/renamed"
> 
> It's a USE flag called "mozbranding".  It lets the user choose wether
> they want to rebrand it (to Bon Echo) or not.

NetBSD does something similar in their pkgsrc collection.  The default
uses Bon Echo, but it can be overridden to use the Mozilla branded
names.

noah



signature.asc
Description: Digital signature


Bug#502482: ITP: xplot-xplot.org -- fast tool to graph and visualize lots of data

2008-10-16 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans <[EMAIL PROTECTED]>

* Package name: xplot-xplot.org
  Version : 0.90.7.1
  Upstream Author : Tim Shepard <[EMAIL PROTECTED]>
* URL : http://www.xplot.org/
* License : MIT
  Programming Lang: C, Perl
  Description : fast tool to graph and visualize lots of data

xplot is a fast visualization tool for examining multiple data sets in
parallel plots.  It supports easy zoom-in and zoom-out capabilities, and
synchronized views into multiple data sets (with the -x, -y, and -tile
options).

The upstream package is named simply "xplot", but this conflicts with a
different (incompatible) package already in the archive and is thus
being packaged under a different name.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Bug#502482: ITP: xplot-xplot.org -- fast tool to graph and visualize lots of data

2008-10-16 Thread Noah Meyerhans
On Thu, Oct 16, 2008 at 10:08:49PM +0200, Guus Sliepen wrote:
> > Looks like the last release was in 2003, is this still maintained
> > upstream?  If not, what make it stand out beyond the other plotting apps
> > we have already?
> 
> Fast zoom-in, zoom-out and panning on multiple plots on large datasets is
> something very little plotting apps do.  The only good app that can do that
> that I've used is kst.  I haven't tried xplot, but if it can do this then it
> would stand out (especially since it's a very small tool). 

The real reason I want to upload this is because it's useful for the
tcptrace package, which has finally seen some maintainer attention after
a long period of neglect.  While tcptrace does include a script for
converting its output to a format usable by gnuplot, it was written with
the xplot.org tool in mind and works better with it.

noah



signature.asc
Description: Digital signature


Re: Re: I hereby resign as secretary

2008-12-19 Thread Noah Meyerhans
On Fri, Dec 19, 2008 at 05:04:55PM +, Ian Lynagh wrote:
> > project atmosphere.  The only way we can "get things back on track"
> > and re-focus our energy on the real reason we are all here... to
> > create a free operating system...
> 
> I believe that part of the problem is that we are not all here to create
> "a free operating system". I have the impression that some developers
> merely wish to create "an operating system", or perhaps a
> "'free-enough-for-me' operating system".

OTOH, it seems to me that there are people with varying degrees of
pragmatism.  I believe that we are all here to create a free operating
system.  However, there are those for whom an imperfect release is
better than no release at all, while there are others who believe that
if the release can't be made 100% free then it is not ready.
Personally, I'm quite happy to stand in the former group.  While I
believe that shipping non-free blobs is distasteful and unfortunate, I
believe that our users are better served by timely and functional
releases.

But then again, I also believe it to be insane that we don't allow
ourselves to include, for example, RFCs as a part of our OS.  Clearly
I'm not a true supporter of free software. 

noah



signature.asc
Description: Digital signature


Re: Freedom and pragmatism (was: I hereby resign as secretary)

2008-12-19 Thread Noah Meyerhans
On Sat, Dec 20, 2008 at 09:02:04AM +1100, Ben Finney wrote:
> > OTOH, it seems to me that there are people with varying degrees of
> > pragmatism.
> 
> That implies a (lamentably common) false dichotomy. Free software
> goals *are* pragmatic goals. They directly affect how we interact with
> the digital information that infuses our lives; essential freedom in
> that sphere is a highly pragmatic goal.
> 
> There may be reasons that compel us to reduce our freedom, and they
> may also be described as ???pragmatic???. But it's wrong to imply that
> those who strive for freedom don't do so for very pragmatic reasons.

Of course there are pragmatic reasons for developing and evangelizing
free software.  If there weren't, we really would be just a bunch of
fanatics.  At the moment, I am most concerned with releasing lenny, and
I believe that our users are not well served by continued delays.

Looking back at the GR from 2006 regarding sourceless firmware in the
kernel, it's clear that most of us want the issue to be resolved.
However, it's also clear from the state of things today that there
aren't enough people with the required skills and the motivation to
resolve it.  This appears to be the case both in Debian and upstream.
If this was not true, then people would have worked to resolve the
firmware issue in the kernel long before it became a release blocker.
We can't force the people with the required skills to spend time on
something for which they otherwise have no motivation.

I suppose, then, that what I'm advocating is yet another compromise.
It's difficult to compromise on our ideals, but I believe that
continuing to delay releases over this issue is frustrating our
developers and users alike.

noah



signature.asc
Description: Digital signature


Re: Modifying debian/changelog entries

2009-01-19 Thread Noah Meyerhans
On Mon, Jan 19, 2009 at 01:20:17PM +0100, Peter Palfrader wrote:
> >   * Is it okay to occasionally modify old changelog entries for clarity and
> > style, typos and such like, as long as you don't change the semantics?
> 
> The occassional fix for the previous few changelog entries is probably
> fine.

In fact, I can think of one case where I'd actually encourage it.  We
occasionally update packages to solve security issues before a CVE
number for the particular vulnerability is known.  Retroactively
modifying the changelog to include the CVE number, once it's known,
helps to resolve any doubt about the specifics of the issue.

noah



signature.asc
Description: Digital signature


deprecated server packages in lenny?

2009-01-23 Thread Noah Meyerhans
The etch release notes documented several major server packages as being
deprecated, and stated that they'd be removed for lenny.  These include
Apache 1, php4, mysql 4, etc.  Users were encouraged to migrate to their
replacement packages, which were already included in etch.  Can anybody
suggest a set of packages in a similar state with lenny?

This has been submitted as bug #512690 against release-notes.

Thanks.
noah



signature.asc
Description: Digital signature


Re: UPG and the default umask

2010-05-11 Thread Noah Meyerhans
On Tue, May 11, 2010 at 06:09:58PM -0700, Russ Allbery wrote:
> UPG without a umask of 002 is pointless.  One may as well just put all
> users in a users group.

Right, our default setup is a strange and basically meaningless blend of
two different approaches to user primary groups.

One approach would be for users to be in a shared group (typically
"users", but a project- or organization-specific group would also be
common) and would have a more restrictive default umask (probably 022,
or maybe something even more strictive like 077).  Users can than share
files with other members of their primary group by granting access using
chmod.

The other approach is to use private groups, like we do in Debian, but
with a more permissive default umask (probably 002).  Collaboration is
then achieved by setting the setgid bit on a directory where the
collaborative work is being done.

Either of these approaches is OK.  User's files are not writable by
anybody but that user unless explicit steps are taken.

Our default settings, however, break both of these approaches.  The
first doesn't work because the group permissions are effectively
meaningless, since there isn't anybody but the user in the group.  The
second is broken because the umask is too restrictive, so changing the
group ownership of a file doesn't accomplish anything.

It would be interesting to see the discussion that lead to our current
default setup, if anybody feels like combing the archives...

noah



signature.asc
Description: Digital signature


Re: all twitter client should support OAuth before they will drop Basic Auth in August

2010-06-29 Thread Noah Meyerhans
On Tue, Jun 29, 2010 at 08:54:55PM +0900, Hideki Yamane wrote:
> > Waiting for qoauth [1].
> 
>  Thanks! I haven't heard about it. Choqok author seems to make a fork from
>  that, see http://momeny.wordpress.com/2010/06/09/kde-oauth/#comment-248

There's no need for a qoauth fork.  The change is being merged upstream.

qoauth is in NEW as of last night.  I'll have new choqok packages by the
time it's accepted.

noah



signature.asc
Description: Digital signature


Re: old ITP's

2002-09-02 Thread Noah Meyerhans
On Mon, Aug 26, 2002 at 08:30:13PM +0200, Bas Zoetekouw wrote:
>   #89421 tcptrace filed:  531, changed  531

This was mine, and I do still intend to package it.  The issue that
prevented me from doing so was that it wants to use another software
package called xplot, written by Tim Shepard of the MIT Lab for Computer
Science (see www.xplot.org).  This is not compatible with the xplot
package in Debian, and I didn't have time to get things straightened
out.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgphRY52sAERA.pgp
Description: PGP signature


Re: old ITP's

2002-09-03 Thread Noah Meyerhans
On Mon, Sep 02, 2002 at 07:06:23PM -0700, Vikram wrote:
> 
> If you are too busy for this I still offer to look into packaging tcptrace
> with xplot.

If you want to go ahead and package xplot, please do.  You'll need to
handle the fact that we've already got an xplot package that installs a
program called xplot.  Consider using the alternatives system for that.
You'll need to coordinate with the maintainer of the other xplot package
for that to work.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpZrwUcqF3mH.pgp
Description: PGP signature


Re: Potato to Woody upgrade problem

2001-09-25 Thread Noah Meyerhans
On Tue, Sep 25, 2001 at 09:40:58AM -0500, Branden Robinson wrote:
> On Tue, Sep 25, 2001 at 09:28:39AM -0400, Dale Scheetz wrote:
> > On the installation in question the Xservers file has everything commented
> > out. The default-display-manager file contains the line:
> > 
> > /usr/bin/X11/wdm
> > 
> > I put the correct line into the Xservers file and wdm comes up as
> > expected! Thanks! (what process should have put this in?)
> 
> High-priority debconf questions from gdm, kdm, wdm, and xdm.

One thing, though.  After Branden's NMU of wdm 1.20-11.2,
/etc/X11/wdm/Xservers has all X server lines commented out.  It used to
be that the postinst would uncomment one if the user requested it that
wdm be used to manage :0.

Since the debconf default-display-manager mechanism is now used to
determine which display manager runs, shouldn't wdm/Xservers contain a
valid server line for :0?

noah
(wdm maintainer)

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgplKnKWWrFqd.pgp
Description: PGP signature


Re: Potato to Woody upgrade problem

2001-09-25 Thread Noah Meyerhans
On Tue, Sep 25, 2001 at 04:35:51PM +0100, Dave Swegen wrote:
> > Since the debconf default-display-manager mechanism is now used to
> > determine which display manager runs, shouldn't wdm/Xservers contain a
> > valid server line for :0?
> 
> Just uncommented the last line in /etc/X11/wdm/Xservers, and wdm ran
> perfectly well. It was the reason why wdm did nothing. So it would seem
> that postinst (or something) isn't doing the right thing).

Well, it's not quite that.  It's that postinst used to do something that
would (possibly) result in that line being uncommented.  That was how
it would resolve conflicts between xdm and wdm.  Of course, this also
necessitated that postinst edited xdm's Xservers file to comment out its
xserver line.  That's against policy (one package can't touch another's
config files).

So now we've got a nice debconf mechanism for choosing the display
manager, and all that junk about commenting and uncommenting lines is
removed.  However, the line in Xservers was commented by default to
ensure no breakage.  Nothing in the postinst script should touch that
file, the file should just contain the right value by default.

I will fix that unless Branden can supply me with some reason that it
should not be the case.  I can't imagine that there'd be one, though.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpAuOCyaPTDE.pgp
Description: PGP signature


handling password expiration in display managers

2001-09-25 Thread Noah Meyerhans
Do any display managers (gdm, kdm, xdm, whatever) currently handle
password expiration correctly?  Currently wdm does not handle it at all
(you simply can't log in), and I want to fix it.  What, if anything, is
the standard way for doing this?

CDE's dtwm is the only display manager I've seen that supports password
expiration, which it does by (as far as I can tell) replacing the
standard X session with 'xterm -e passwd'.

I've not done any programming with the PAM libraries, so I don't know
how to catch the expiration message from the pam authentication
routines.

Any suggestions?

Thanks.
noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpmOdauKrzot.pgp
Description: PGP signature


Re: LVM + XFS/Ext3 (Was no space left on device: LVM, Gnus --> dpkg, apt-get ?)

2002-01-08 Thread Noah Meyerhans
On Tue, Jan 08, 2002 at 09:59:45AM -0800, Karl M. Hegbloom wrote:
> 
>  I have not tried yet, but am planning to experiment and see if it is
>  possible to *shrink* an XFS filesystem.  In the case where I have one
>  LV that's larger than it needed to be, I'd like to be able to shrink
>  the filesystem then shrink the LV.  Anyone know if that is possible?
>  If it's not, it should be!

It is not possible to shrink XFS filesystems.

>  I am very convinced that XFS is the *best* filesystem for Linux.  It
>  is way better than ext3fs for many reasons.  From what I gather, it
>  is also superiour to IBM's JFS, and certainly superiour to Reiserfs.

I felt the same way, up until a couple of months ago.  I had been
running only XFS on my laptop for a good 6 months or so, when suddenly
very weird things started happening.  Files and directories would
randomly become inaccessable, hanging any command that touched them.

My attempts to fix the problems lead to even more frustration.
xfs_repair cannot be run unless the filesystem is completely unmounted.
This is, shall we say, a major pain when your root fs is XFS.  I ended
up completely reinstalling, and am currently running only ext2.  Not
that I think ext2 is a particularly good filesystem, but it's certainly
the most mature at this point.

>  I've had no trouble with it so far.  I've been told that it is
>  incompatible with LILO; that it starts the filesystem at offset 0
>  rather than offset 512 like other filesystems?  I have not confirmed
>  this yet.  Anyone know?  It works great with GRUB.

LILO and XFS are fine together.  In fact, it wasn't until fairly
recently that GRUB could boot from XFS.  For the longest time I had to
use LILO because GRUB couldn't read my XFS filesystems.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpkdlPSGcd5n.pgp
Description: PGP signature


Re: RFC: Packaging buildd

2002-04-15 Thread Noah Meyerhans
On Sun, Apr 14, 2002 at 08:53:03PM +0100, Roger Leigh wrote:
> Does anyone who uses buildd/wanna-build/rbuilder have any comments?  I
> don't yet have a big enough HDD to run an autobuilder offline, so I
> have not tried to use it yet.  I won't be able to do much more till
> June, but I'll have plenty of time then to fix things.

I have set up a few rbuilders for the security team, which involves
wanna-build and sbuild.  I think that packaging them is definitely
possible, though it will be a PITA.  A lot of the configurable stuff
really doesn't have safe defaults.  The postinst would probably end up
being very interactive.

When I set the software up, I based my work on the .debs generated by
the rules script in the CVS tree, so that directory certainly isn't
*completely* broken.

Since I have several rbuilders left to set up ASAP, I would certainly be
willing to help with the effort to create decent packages for it.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpb5jZAzV7gZ.pgp
Description: PGP signature


Re: Bug#141748: ITP: openca -- Open Source Certification Authority

2002-04-17 Thread Noah Meyerhans
On Mon, Apr 08, 2002 at 07:35:07PM +1000, Brian May wrote:
> 
> Oh, sorry, did I say 2 parts? obviously, I still have some learning to
> do myself...
> 

Now, I mean no offense by this at all, but shouldn't you leave the
packaging duties of this security-critical package to somebody with more
in-depth knowledge of how it works?  It seems fairly obvious that you
have not yet actually used the package at all.  Will you be using it
once it's packaged?  If I'm going to be running OpenCA, I certainly want
to know that the packaging is done right.

It's not that I don't trust your ability to learn the package, but I
think it is unwise for somebody to be responsible for this package when
they're not really even clear on the basic functionality of it.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpZAl8QJJrP7.pgp
Description: PGP signature


Re: Grid tasks

2009-03-18 Thread Noah Meyerhans
On Mon, Mar 16, 2009 at 02:28:08PM +0100, Steffen Moeller wrote:
> > Would there be support for creating a grid task, and splitting it this way?
> > 
> > Currently the packages are in the new queue. Should I wait until they
> > actually reach unstable before creating the task? Are there any other
> > obvious candidate packages?
> 
> I don't think that there is such a thing like "the Grid". We should wait a 
> bit longer to
> see how the world evolves around the concepts associated with grids (X.509 
> certificates,
> virtual organisations, ...). To me, mere computations are what may initially 
> drive us, but
> there should be more to come.

I'm not sure about that.  There's a whole lot of inertia behind things
like the Open Science Grid (http://www.opensciencegrid.org/).  My site,
with a Debian-based Condor cluster, is considering joining it right now.
If we can make it easier for people to build clusters that can easily be
added to such a grid, we should.

Additionally, I'd argue that "The Grid" could pretty easily refer to a
site-local grid.  A workstation joined to a local cluster doesn't really
need to care about whether it's part of something larger or not.

noah
(who should probably go sign up for debian-science at this point...)



signature.asc
Description: Digital signature


seeking co-maintainers for spamassassin

2012-06-05 Thread Noah Meyerhans
I still make active use of spamassassin, but I don't have the time these
days to spend keeping up with bug reports and feature requests. Aside
from the backlog, the package is generally in good shape and works well
for most users. The upstream development is fairly stable, with the most
recent code release happening about a year ago. Upstream rule updates
are still fairly common, and although they should probably be pulled in
to the package more frequently than they have, I imagine that most users
are relying on sa-update to keep up-to-date.

Spamassassin is written in perl, with an additional small C program
(spamc). The source is maintained in svn and uses quilt for patch
management.

I'm perfectly happy to see patches attached to some of the open bugs, so
please don't hesitate to send them in. Ideally I'd like to get a
co-maintainer or two, though. Preferably these would be people who run
spamassassin in production somewhere, and who are thus appropriately
sensitive to the issues that come with mucking with other peoples'
email.

Thanks.
noah



signature.asc
Description: Digital signature


Re: seeking co-maintainers for spamassassin

2012-06-06 Thread Noah Meyerhans
On Tue, Jun 05, 2012 at 10:48:23PM -0700, Noah Meyerhans wrote:
> I'm perfectly happy to see patches attached to some of the open bugs, so
> please don't hesitate to send them in. Ideally I'd like to get a
> co-maintainer or two, though. 

BTW, this is bug #676317 in wnpp. Please follow up there if you'd like
to help.

noah



signature.asc
Description: Digital signature


Re: Ubuntu will switch to systemd

2014-02-14 Thread Noah Meyerhans
On Fri, Feb 14, 2014 at 07:40:20PM +0100, Daniel Pocock wrote:
> > I have to admit that I did *not* expect this. At all.
> > 
> > http://www.markshuttleworth.com/archives/1316
> > 
> 
> Quite the opposite - some people felt it would be inevitable that
> Debian choosing systemd would effectively be a death sentence for Upstart

I'm not sure I understand why. Debian and Ubuntu have been using
different init systems for some time now, with Ubuntu on upstart and
Debian on sysvinit. Why should our change of defaults really matter to
them, when they weren't using our default anyway?

Or might they be resigned to the "tight coupling" that Ian Jackson is so
worried about? As Debian becomes more tightly bound to systemd, using
something else may prove increasingly difficult.

noah



signature.asc
Description: Digital signature


Re: Deprecating/removing racoon/ipsec-tools from Debian GNU/Linux and racoon from Debian/kfreebsd

2014-04-04 Thread Noah Meyerhans
On Fri, Apr 04, 2014 at 12:59:35PM +1300, Matt Grant wrote:
> Systemd package support is the thing that pushed me over the edge about
> this.  There are no systemd unit files at all for ipsec-tools/racoon
> that I know of. Please advise me otherwise, and I will look at putting
> them in the current package.

I've recently worked out unit files for other packages, and am happy to
help come up with a suitable unit file for racoon as well.

> The issues are:
> 
> 1) Security.  The racoon daemon has to run as root, with a lot of the
> default GCC security flags turned off. 

Running as root without build-time hardening is bad, but...

> 4) racoon/setkey are native IPSEC implementations across FreeBSD,
> NetBSD, Mac OSX, and Linux, and thus having it available give a 'just
> works' IPSEC option. 

...

> My main concern as maintainer are the security issues, with an old code
> base running as root.

The code base may be old, but it's pretty widely used and thus should
have many eyes watching it. (I'm being optimistic, I know). The
ipsec-tools mailing lists don't see a lot of activity, but they're by no
means dead.  And there was just an upstream 0.8.2 release in February.

> I am willing to co-maintain this package with other developers and
> maintainers.  My belief is that there is likely a Debian kFreeBSD
> developer/maintainer out there who would like to do this, and do a lot
> of the work :-)

I'm happy to help maintain ipsec-tools, as I make regular use of it and
have done so for several years. I'd also be supportive of removing it
for jessie+1 based on your arguments for doing so. If that's the path
taken, it'd be really good if we could document (and at least partially
automate?) the migration path from racoon to the preferred alternatives.

noah



signature.asc
Description: Digital signature


Re: Forming racoon/ipsec-tools maintainers group

2014-04-15 Thread Noah Meyerhans
On Tue, Apr 15, 2014 at 08:52:43PM +1200, Matt Grant wrote:
> Just emailing to tell you I have not forgotten this.  This Easter I will
> have the time to organise this and 'turn the crank handles'.

Sounds good, thanks Matt.

You might have also noticed that I just pushed a new branch to the
ipsec-tools git repo to add a basic systemd unit file for racoon. I
won't merge or upload it until the team is established, but I wanted to
be sure I got this published before too long.

http://anonscm.debian.org/gitweb/?p=collab-maint/ipsec-tools.git;a=shortlog;h=refs/heads/systemd

I also hope to begin work on updating the package to 0.8.2 within the
next week or so, but haven't done anything yet.

http://sourceforge.net/projects/ipsec-tools/files/ipsec-tools/0.8.2/

Thanks
noah



signature.asc
Description: Digital signature


Re: correct use of su

2014-05-12 Thread Noah Meyerhans
On Sun, May 11, 2014 at 11:12:08AM +1000, Brian May wrote:
>What about the task of running a short program for a brief duration, e.g.
>from cron scripts?  Is using su considered acceptable?
>e.g. /etc/cron.daily/spamassassin on wheezy has numerous references to su.

There are two reasons I use su in /etc/cron.daily/spamassassin. One is
to change uid/gid, and the other is to reset the shell environment to a
base state. The need for this was highlighted in bug 738951. I doubt
that this is a problem unique to spamassassin.

'su -l' takes care of both uid switching and environment cleansing.
start-stop-daemon only helps with the first. The appropriate solution
for resetting the environment isn't apparent. Should s-s-d be extended
with such functionality? Or is there a more appropriate tool that I'm
missing?

noah



signature.asc
Description: Digital signature


Re: Confusing our users - who is supporting LTS?

2018-10-23 Thread Noah Meyerhans
On Tue, Oct 23, 2018 at 10:05:35PM +0200, Tollef Fog Heen wrote:
> > To be clear, the ongoing cost to the cloud team of dealing with jessie
> > on AWS (where this issue originally came up) has been exactly zero,
> > afaict. That is, we haven't actually updated anything in >18 months.
> > Users who launch a jessie image there get 8.7, with 106 pending updates.
> > As long as LTS exists and users are happy with it, there's nothing
> > strictly wrong with this situation. They should update their instances
> > and reboot, but from there, they are free to continue using them in
> > relative safety.
> 
> I disagree with the statement that there's nothing wrong with this.

Sorry; to be more precise, I meant that there's nothing wrong that can't
be remedied using entirely standard and well-established workflows, e.g.
dist-upgrade. There's no need to add custom apt sources, apt keys, or
anything like that. dist-upgrade is something I'd expect most users to
do pretty early in the lifetime of a cloud instance (and possibly
regularly after that, depending on how long it's expected to remain
active).

noah



signature.asc
Description: PGP signature


Re: Bug#966621: Make /tmp/ a tmpfs and cleanup /var/tmp/ on a timer by default [was: Re: systemd: tmpfiles.d not cleaning /var/tmp by default]

2024-05-29 Thread Noah Meyerhans
On Wed, May 29, 2024 at 06:58:32PM +0200, Andreas Metzler wrote:
> >> I think it is bad choice to deliberately have different behavior for
> >> freshly installed and upgraded systems. Offering upgrades has always
> >> been one of the major selling points of Debian, and imho this
> >> implicitely includes that you do not get a worse or second class Debian
> >> installation when you upgrade it than if you installed from scratch.
> 
> > I strongly disagree: it is a bad choice to change on upgrades a default 
> > which may cause data loss.
> 
> That is false dichotomy. data-loss will occur when people use /tmp or
> /var/tmp for persistent data-storage because "This has (for a couple of
> years) worked on Debian systems" not because "This has (for a couple of
> years) worked on *this* *specific* Debian system.".

Both perspectives are valid, and that is part of why this change is
concerning to me.  Transitioning the filesystem configuration of an
existing system is inherently dangerous and can lead to data loss, as
Marco points out.  But leaving a system to diverge from the default
Debian base configuration leads to configurtion drift that may trigger
obscure bugs, untested configuration, difficult upgrades, etc.  I'm not
convinced the change is worth the risk.

noah



Re: Proposal: plocate as standard for bookworm

2021-02-13 Thread Noah Meyerhans
On Mon, Feb 08, 2021 at 07:28:56PM +0100, Richard Hartmann wrote:
> I very dimly remember updatedb being a concern when cloud images were
> first discussed. Back then and today, agreed, it does not make sense
> there.

Agreed, but we don't install all Priority: standard packages on the
cloud images anyway, and I don't see us going out of our way to add it
to them even if plocate is promoted to standard.

> IMO, it makes sense on both servers and desktops, so rather than
> through tasksel, I would think it's a useful default to have on all
> non-virtual installations.

Personally I'd rather leave it out of the default install, and I really
don't like the idea of running it on servers by default.  First, the
additional IO may impact serving latencies.  Second, because servers
(except maybe multi-user shell servers, but they're not the general
case) are purpose-built systems, and the locate utility really doesn't
contribute anything to the system's purpose.

noah



Re: ps in cloud images

2021-09-13 Thread Noah Meyerhans
On Sun, Sep 12, 2021 at 09:33:54PM +0100, mooff wrote:
> IMO, many human hours will be lost by the decision not to include procps in
> the default cloud images.
> 
> I understand it could be a security measure, but maybe stubs could be
> offered which name the package we want (procps)
> 
> Tracing my third call to apt-file search bin/ps ;)

What cloud images are you looking at?  The images built by the Debian
cloud team *do* include procps.  See the manifests for (some of) the
current bullseye images, all of which indicate that procps is included:

https://cloud.debian.org/images/cloud/bullseye/latest/debian-11-ec2-arm64.json
https://cloud.debian.org/images/cloud/bullseye/latest/debian-11-generic-amd64.json
https://cloud.debian.org/images/cloud/bullseye/latest/debian-11-azure-amd64.json



Re: ps in cloud images

2021-09-13 Thread Noah Meyerhans
On Mon, Sep 13, 2021 at 08:59:25PM +0100, mooff wrote:
> I might have been imprecise in saying 'cloud' images, but I mean:
> 
> $ docker run -it --rm debian:bullseye bash
> root@3ee3e7c4ce62:/# ps
> bash: ps: command not found
> root@3ee3e7c4ce62:/#

That is not a cloud image.

> > I think that `reportbug cloud.debian.org` would be the > place to discuss
> this
> 
> Thanks Paul. I wasn't sure where to send it.

Since container images are not published by the cloud team, this would not
be the right place to send this.

I believe that the people publishing container images want issues raised
on GitHub at https://github.com/debuerreotype/docker-debian-artifacts

In my opinion, leaving procps out of the base container images is a
reasonable decision.  They're typically used as the basis for
application-specific images, recipes for which typically pull in
whatever packages are necessary or helpful for supporting the
application's deployment.  Populating the base images with packages that
aren't strictly necessary is undesirable, and I'd argue that it would be
roughly equivalent to Debian packages declaring a Depends relationship
on a package that they don't strictly depend on.

noah



Re: Bug#995189: RFH: isc-dhcp

2021-09-27 Thread Noah Meyerhans
On Mon, Sep 27, 2021 at 08:25:14PM +0300, Martin-Éric Racine wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> The ISC DHCP suite has a lenghty list of bug reports that have been left 
> unattended. Some bugs date back to DHCP 3 or even earlier.
> 
> Additionally, recent upstream releases are still unpackaged. One release came 
> out well ahead of the Bullseye freeze, a bug report requesting its packaging 
> was filed, but it remains unanswered.
> 
> Leaving a package with a priority Important in such utter state of neglect is 
> unacceptable.
> 
> At this point, it has become clear that, at the very least, its maintainers 
> need help, hence why I filed this WNPP bug.

It's worth noting also that ISC's DHCP client, packaged as
isc-dhcp-client from the isc-dhcp source package, is considered EOL
upstream.  As it's still the first recommended DHCP client by ifupdown,
and ifupdown is still Priority: important, most systems are likely to be
installing isc-dhcp-client.

We may want to start a broader conversation about the default DHCP
client package in Debian.  The maintainers of these packages should
obviously be involved.

For what it's worth, my preference would be transition to
systemd-networkd with bookworm.  If we keep the ifup/ifdown commands
from ifupdown at all, I think they should be fairly this wrappers around
their networkd equivalents.  I don't think we should install something
like netplan by default.

And, of course, environments that currently pull in NetworkManager
should continue to do so if it makes sense.  Although by default, I
believe that NetworkManager uses the ISC dhclient as its DHCP client, so
we may want to make changes there.  It has a built-in DHCP client, but
seems to prefer an external client if one is available.

(Of course, this conversation may already be taking place, but if so
I've missed it.  Please feel free to point me in the right direction.)

noah



signature.asc
Description: PGP signature


Re: Bug#995212: chromium: Update to version 94.0.4606.61 (security-fixes)

2021-12-06 Thread Noah Meyerhans
On Sun, Dec 05, 2021 at 07:58:17PM +0300, Dmitry Alexandrov wrote:
> >> So what's happening with chromium in both sid and stable? I saw on 
> >> d-release that it was removed from testing (#998676 and #998732), with a  
> >> discussion about ending security support for it in stable.
> >
> > The problem really is lack of maintenance. In my opinion, chromium deserves 
> > an active *team* to support it in Debian.  <...>  The security team doesn't 
> > have the bandwidth to do it themselves, they need a team to help them.
> 
> Sorry for a silly question, but whatʼs so wrong with the build done by 
> linuxmint.com [1], so Debian needs a whole team to duplicate their effort?  
> Itʼs for Debian 10 (i. e. oldstable) as of now, but works fine at Sid in my 
> (limited) experience.
> 

Well, you can start with the fact that the Mint chromium source packages
don't even include the chromium source, let alone the sources for all
the other things they build (NodeJS, and more).

The biggest difficulty, as far as I can tell from my look at Chromium
from several months ago, is that our patch set [1] needs a lot of
attention with every chromium release.  Mint doesn't apply any patches
at all to the source, at least none of any real complexity.

One lesson we may take from Mint, though, is that it's not worth trying
to patch Chromium as much as we'd like.  Anything that we can do to
simplify the Chromium packaging will help us keep the package
up-to-date, which in turn will help us keep our users safer.  In my
opinion, we should be pretty aggressive about dropping as many of the
Chromium patches as possible, even if that means we link against
bundled/vendored dependencies.

Legal/licensing considerations are still important and I don't know if
we actually *can* ship builds based on the bundled stuff.  But based on
the number of patches we have to disable various things [2] or build
against system dependencies [3], I can't help but think we'd have an
easier time keeping this package fresh if we could drop some of those.

noah

1. 
https://salsa.debian.org/chromium-team/chromium/-/blob/master/debian/patches/series
2. 
https://salsa.debian.org/chromium-team/chromium/-/tree/master/debian/patches/disable
3. 
https://salsa.debian.org/chromium-team/chromium/-/tree/master/debian/patches/system



Re: Missing CVEs in the json data

2021-12-20 Thread Noah Meyerhans
On Sun, Dec 19, 2021 at 12:26:12PM +0200, Adi Matalon wrote:
>In the json data you are reporting:
>[1]https://security-tracker.debian.org/tracker/data/json
>There are 28947 CVES, and there are 2800~ which aren't exist in the json:
>For example:
>For CVE-2021-2014 exists a page:
>[2]https://security-tracker.debian.org/tracker/CVE-2021-2014 - with an
>informative data
>But in the json the CVE doesn't exist.

The web site lists (approximately) all CVEs, even those that don't apply
to Debian.  The JSON feed only lists CVEs that impact Debian in some
form.  In the case of CVE-2021-2014, Debian does not ship Mysql <=
5.7.32 in any supported release, so it is not included in the JSON file.
If anything, maybe the web listing for this CVE could more clearly
indicate that Debian isn't impacted.  But as it is, the lack of any
impacted stable releases on the web view should give a good hint.

>Another example is for cve that became reject:
>[3]https://security-tracker.debian.org/tracker/CVE-2021-30631

Similar to the previous one, since the CVE is rejected it cannot impact
any shipped Debian versions, and thus doesn't appear in the JSON file.

>I wanted to know if it is by mistake and if there is a json which includes
>all cves.

The JSON data for CVEs that actually impact Debian is already 29MB
(minified).  A full feed would be significantly larger.

The downloads at https://cve.mitre.org/data/downloads/index.html might
be useful to you.

>Furthermore, do you have an api that returns the information in json
>format for a specific cve?

Not at this time.  This may be worth a wishlist bug against
security.debian.org.  I could see how this could be a useful feature.

noah



Re: WNPP/ITP/... for Amazon SDK for C++ ?

2021-12-26 Thread Noah Meyerhans
On Sun, Dec 26, 2021 at 06:08:56PM -0600, Dirk Eddelbuettel wrote:
> I have a package that could take advantage of this if it were packaged, and I
> am sure a number of other packages are in a similar situation given how
> pervasive AWS use is. So does anybody know where this is at?
> 
> FWIW I have packaged _subsets_ of the C++ SDK informally for my own use (also
> at Launchpad) but I don't think I have the time and energy to take this on as
> another package.

The cloud-team could probably be a reasonable umbrella under which the
package could be co-maintained.  Would you be interested in
co-maintaining it as part of that team?  I'm not sure any of us have a
lot of expertise or desire to work with C++, but we've got a lot of
familiarity with cloud services, etc, and maintain other cloud service
SDKs.  If you can contribute on the C++ side, we could probably
effectively maintain the package together.

Of course, if others are already looking into packaging, they should by
all means continue, with or without coordinating with the cloud-team.

noah



Re: The future of src:ntp

2022-01-17 Thread Noah Meyerhans
On Mon, Jan 17, 2022 at 05:01:10PM +0100, Bernhard Schmidt wrote:
> I could just step down as a maintainer/uploader and have the ntp packaging
> bitrot, but this would be a large disservice to our users (unless someone
> else continues to maintain it). I think another option would be to migrate
> to one of the alternatives for Bookworm.

The cloud team has been installing chrony by default in the images we
generate since stretch and it's been a good experience for us.  I'd be
happy to see it become the default distro-wide.

noah



signature.asc
Description: PGP signature


Re: Cloud team plans for cloud-hosted mirrors

2022-01-26 Thread Noah Meyerhans
On Wed, Jan 26, 2022 at 10:04:47AM +0100, Marc Haber wrote:
> >> >The cloud team wants to make folks aware of a possible change to the cloud
> >> >images.  The team plans to register a new domain, debian.cloud, for 
> >> >mirrors
> >> >inside of cloud provider infrastructure.  For such mirrors, sources.list 
> >> >will
> >> >look like:
> >> >  deb http://.debian.cloud/debian/ bullseye main
> >> 
> >> Are the IP ranges of the Cloud Providers registered that badly that
> >> deb.debian.org wouldn't reliably point to the mirrors inside the
> >> provider's infrastructure? Or are the cloud providers' mirrors
> >> differnet from what we expect from a Debian mirror?
> >
> >deb.debian.org is served from fastly and AWS CDNs - so it's outside of most
> >cloud provider's infrastructure.
> 
> So it is not possible to hook arbitrary mirrors into deb.debian.org
> and we're dependent on Fastly and AWS here?
> 
> I thought it was something more flexible.

I could be misremembering the conversation, but I believe deb.debian.org
is only fastly at the moment.  It would be technically possible to
direct some clients to other mirrors/CDNs, but the mirror admins are
hesitant to introduce that level of complexity at the moment, as it
would make troubleshooting significantly more difficult.  If fastly
becomes unreliable for some reason, then deb.debian.org would be
repointed to some other back end.

noah



Re: Seeking consensus for some changes in adduser

2022-03-10 Thread Noah Meyerhans
On Thu, Mar 10, 2022 at 09:35:27PM +0100, Marc Haber wrote:
> On Wed, 09 Mar 2022 21:34:33 +0100, Pierre-Elliott Bécue
>  wrote:
> >Considering many have replied, I'll stick to that one:
> >Marc Haber  wrote on 08/03/2022 at 
> >17:49:04+0100:
> >> (3)
> >> #625758
> >> --disabled-password just does not set a password for the newly created
> >> account (resulting in '*' in shadow) while --disabled-login places a '!'
> >> in shadow. On modern systems with PAM, both variants seem to be
> >> identical, allowing login via ssh. Aside from the documentation needing
> >> change to document reality, should we introduce a --no-set-password
> >> option and deprecate the two older options (to be removed in trixie+2)?
> >
> >How about --disabled-login => shell is set to /usr/sbin/nologin ?
> 
> I have noted that as one of the options for my summary. I assume that
> in that case, the password should still be * to avoid creating an
> active unlocked account with empty password?

+1 to --disabled-login setting the shell to /usr/sbin/nologin with
documentation being updated to reflect this.  I'd suggest a default
behavior of a password of '*', with the ability to override it and
prompt for a real password with a "--set-password".  Although honestly,
I also wouldn't be opposed to requiring an extra step of calling
'usermod' to set a password for a disabled account.  It's sort of a
special case, and not one that has to be explicitly handled by adduser.

noah



Bug#1023369: ITP: s2n-tls -- C99 implementation of the TLS/SSL protocols

2022-11-02 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: s2n-tls
  Version : 1.3.26
  Upstream Author : Amazon Web Services
* URL : https://github.com/aws/s2n-tls
* License : Apache 2.0
  Programming Lang: C
  Description : C99 implementation of the TLS/SSL protocols

 s2n-tls is a C99 implementation of the TLS/SSL protocols that is
 designed to be simple, small, fast, and with security as a
 priority. It is released and licensed under the Apache License 2.0.
 .
 The s2n-tls I/O APIs are designed to be intuitive to developers
 familiar with the widely-used POSIX I/O APIs, and s2n-tls supports
 blocking, non-blocking, and full-duplex I/O. Additionally there are
 no locks or mutexes within s2n-tls.
 .
 s2n-tls implements SSLv3, TLS1.0, TLS1.1, and TLS1.2. For encryption,
 s2n-tls supports 128-bit and 256-bit AES, in the CBC and GCM modes,
 ChaCha20, 3DES, and RC4. For forward secrecy, s2n-tls supports both
 DHE and ECDHE. s2n-tls also supports the Server Name Indicator (SNI),
 Application-Layer Protocol Negotiation (ALPN) and the Online
 Certificate Status Protocol (OCSP) TLS extensions. SSLv3, RC4, 3DES
 and DHE are each disabled by default for security reasons.
 .
 As it can be difficult to keep track of which encryption algorithms
 and protocols are best to use, s2n-tls features a simple API to use
 the latest "default" set of preferences. If you prefer to remain on a
 specific version for backwards compatibility, that is also supported.

This package will be maintained by the cloud team.  Initial packaging is
being driven by the awscli package, version 2 of which will depend on this
package.



Bug#1023412: ITP: aws-c-common -- C99 package for AWS SDK for C

2022-11-03 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: aws-c-common
  Version : 0.8.4
  Upstream Author : Amazon Web Services
* URL : https://github.com/awslabs/aws-c-common
* License : Apache 2.0
  Programming Lang: C
  Description : C99 package for AWS SDK for C

 Core c99 package for AWS SDK for C. Includes cross-platform
 primitives, configuration, data structures, and error handling.

This package will be maintained by the cloud team.  It is initially being
packaged as a dependency for awscli v2.



Bug#1023415: ITP: aws-checksums -- fast, cross-platform CRC32c/CRC32 implementations

2022-11-03 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: aws-checksums
  Version : 0.1.13
  Upstream Author : Amazon Web Services
* URL : https://github.com/awslabs/aws-checksums
* License : Apache 2.0
  Programming Lang: C
  Description : fast, cross-platform CRC32c/CRC32 implementations

 Cross-Platform HW accelerated CRC32c and CRC32 with fallback to
 efficient SW implementations. C interface with language bindings for
 each of our SDKs

This package will be maintained by the cloud team.  Packaging is initially
being driven by awscli v2 dependencies.



Bug#1025351: ITP: aws-crt-python -- Python 3 bindings for the AWS Common Runtime

2022-12-02 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-cl...@lists.debian.org

* Package name: aws-crt-python
  Version : 0.15.3
  Upstream Author : Amazon Web Services
* URL : https://github.com/awslabs/aws-crt-python
* License : Apache 2.0
  Programming Lang: Python and C
  Description : Python 3 bindings for the AWS Common Runtime

aws-crt-python contains python interfaces for common low-level functionality
used when interfacing with Amazon Web Services service endpoints.  It
provides socket handling, the HTTP client implementation, authentication,
logging, and error handling.

The package is initially being prepared in order to support upgrading the
awscli package to version 2.x, which introduces it as a dependency.  It will
be maintained by the cloud team.

In the future, the C components in this package may be split into standalone
packages that can be used independently of the python bindings if needed.
For now the focus is on python.

noah



Bug#1026919: ITP: amazon-ec2-net-utils -- utilities for managing network interfaces in Amazon EC2

2022-12-23 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: amazon-ec2-net-utils
  Version : 2.3.0
  Upstream Contact: Noah Meyerhans 
* URL : https://github.com/amazonlinux/amazon-ec2-net-utils
* License : Apache 2.0
  Programming Lang: Shell
  Description : utilities for managing network interfaces in Amazon EC2

amazon-ec2-net-utils provides udev integration and helper utilities to manage
network configuration in the Amazon EC2 cloud environment.  It is responsible
for configuring systemd-networkd with appropriate configuration for DHCPv4 and
DHCPv6 as appropriate to the network environment in which an EC2 instance is
running.  It supports policy routing configuration to ensure compliance with
Virtual Private Cloud (VPC) network anti-spoofing restrictions.  IP aliasing
and prefix delegation are also supported.

I'm the upstream author and will maintain this package within the Debian cloud
team.



setting sysctl net.ipv4.ping_group_range

2023-01-02 Thread Noah Meyerhans
There are several examples of packages installing files to
/usr/lib/sysctl.d, but I haven't found any specific guidance on policies
about what's appropriate for them.  Since sysctl variables change the
system behavior in a way that's not limited to the package changing the
setting, and since the package in question (iputils-ping) is Priority:
important and part of the default install, I won't want to make any
changes without consulting here first.

See bug #1008281 for context. [1]

The proposal is to install /usr/lib/sysctl.d/iputils-ping.conf with the
following content:
net.ipv4.ping_group_range="0 2147483647"

With that in place, unprivileged users are able to excute ping for both
IPv4 and IPv6 targets without cap_net_raw (currently set as either a
file-based attribute on the ping binary or acquired via setuid).  But
since that applies system-wide, not just to the ping binary, there may
be objections.

After applying this change, I believe it'd be appropriate to drop ping's
setcap/setuid settings from postinst altogether, though I'd be open to
other options. [2]

noah

1. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008281
2. 
https://salsa.debian.org/debian/iputils/-/blob/master/debian/iputils-ping.postinst



Re: setting sysctl net.ipv4.ping_group_range

2023-01-02 Thread Noah Meyerhans
On Mon, Jan 02, 2023 at 10:11:38PM +0100, Marco d'Itri wrote:
> On Jan 02, Peter Pentchev  wrote:
> 
> > I personally would prefer giving the administrator a way to change that.
> > Maybe add a low priority debconf question with a "ping is not setuid"
> > default, then mention that debconf setting in a comment in the file that
> > the package installs in the sysctl.d/ directory.
> Please don't. There are already way too many debconf questions and this 
> one would be totally pointless: anybody who cares to change the default
> can just locally override the /usr/lib/sysctl.d/ file with a drop-in in 
> /etc/sysctl.d/ .

+1. I don't have any desire to add debconf to iputils-ping.  I'd suggest
the /etc/sysctl.d/ approach for admin overrides as well.

noah



Re: setting sysctl net.ipv4.ping_group_range

2023-01-02 Thread Noah Meyerhans
On Mon, Jan 02, 2023 at 10:09:44PM +0100, Marco d'Itri wrote:
> > With that in place, unprivileged users are able to excute ping for both
> > IPv4 and IPv6 targets without cap_net_raw (currently set as either a
> > file-based attribute on the ping binary or acquired via setuid).  But
> > since that applies system-wide, not just to the ping binary, there may
> > be objections.
> I do not think that the submitter made clear why this would be 
> preferable, so I had to research it myself. See:
> 
> https://fedoraproject.org/wiki/Changes/EnableSysctlPingGroupRange
> https://github.com/systemd/systemd/pull/13141
> 
> Since this is one of the systemd sysctl defaults (of which I think that 
> we should adopt more, especially the network-related ones!) I agree with 
> changing this.
> I would just do it in the systemd package package to allow all packages 
> to benefit from it without having to care if ping is installed.

I'm entirely happy to reassign this request to systemd and have the
setting applied more broadly.  The question that arises then is what to
do about the file-level capabilities on the ping binary.  Ideally we
drop them entirely (including the setuid fallback), but when?

I could leave things completely decoupled, and simply wait until systemd
makes the change and then upload iputils and assume that anybody
upgrading iputils is also upgrading systemd.  That seems to be what
Fedora did, according to the fedoraproject.org wiki cited above.
Alternatives would seem to involve some level of versioned dependency,
which doesn't feel right.

noah



migration from cron.daily to systemd timers

2020-01-07 Thread Noah Meyerhans
Spamassassin has traditionally supplied a cron.daily script.  I'd like
to provide the same functionality via a systemd timer, while still
providing cron as a fallback.  For the most part, this is
straightforward, but there are a few details on which I'd like feedback.

Current the cron.daily script is a no-op by default, and functionality
is enabled by setting CRON=1 in /etc/default/spamassassin.  For users
running systemd, I'd expect to ship a timer unit that is disabled by
default, and have them enable it with:

$ systemctl enable spamassassin-daily-maintenance.timer

Any issues with that?

For upgrades from versions that did not include the timer, should I
enable the systemd timer if the user has set CRON=1?  Or should I leave
the timer disabled and preserve the original behavior via cron.daily?
Since the cron script is a conffile, and may have local modifications, I
think it should be left in place, but would take confirmation.  It'd be
possible to perform the migration while still preserving local
modifications, e.g. by having the shipped cron script enable the unit
file, but IMO that would be gross.

If the timer and the cron activity are both enabled, the cron script
will be a no-op.  This is accomplished with the following in the cron
script:

if command -v systemctl > /dev/null 2>&1 &&
   systemctl is-enabled spamassassin-daily-maintenance.timer; then
exit 0
fi

Would you do this a different way?

noah



Re: migration from cron.daily to systemd timers

2020-01-07 Thread Noah Meyerhans
On Tue, Jan 07, 2020 at 05:32:47PM -0600, Richard Laager wrote:
> Could you check for local modifications and only enable the timer if
> there were NOT local modifications?
> 
> [ -e /etc/default/spamassassin ] && . /etc/default/spamassassin
> if [ -d /run/systemd/system ] && [ "$CRON" = "1" ] &&
>! some_check_for_local_modifications
> then
> systemctl enable spamassassin-daily-maintenance.timer
> fi

Since existing cron.daily scripts won't have any knowledge of the timer,
one possible transition process could involve having the installed cron
script unconditionally enable the timer when it runs.  Users who are
running with a modified script in place will continue to do so.  Users
who are running unmodified scripts, or who revert their system to the
original script during the package upgrade, will get the new behavior
which will perform the transition.

> If it was me, I'd just check for whether systemd is running (e.g. [ -d
> /run/systemd/system ]), not whether the timer unit is enabled. That way,
> at least moving forward, you're only supporting two scenarios (systemd
> uses the units, non-systemd uses cron) rather than three (those two plus
> the option of systemd systems still using cron).

My expectation is that there will be some systemd users who will still
prefer cron for some reason.  Those users could, obviously, just modify
the cron.daily script to remove the systemd conditional, but if we can
trivially support them, then I don't mind doing so.  On the other hand,
transitioning people to the timer wouldn't upset me at all either.

> If you were doing this new, I would suggest that you use cron.d instead
> of cron.daily. Then check for systemd by prefixing your command with:
>   [ -d /run/systemd/system ] || ...
> This way, if the user installs systemd-cron (which replaces crond and
> generates systemd service & timer units from cron files), it will not
> generate units for the cron job. See:
> https://github.com/systemd-cron/systemd-cron/blob/master/src/bin/systemd-crontab-generator.py#L335

I hadn't considered systemd-cron.  Thanks for pointing this out...

noah



Re: migration from cron.daily to systemd timers

2020-01-07 Thread Noah Meyerhans
On Wed, Jan 08, 2020 at 02:43:08AM +0100, Daniel Leidert wrote:
> > For upgrades from versions that did not include the timer, should I
> > enable the systemd timer if the user has set CRON=1?
> 
> I disagree here. I don't want you to overrule my decision for a cron-script. 
> If
> a user has enabled a cron-job you shouldn't change that to a systemd timer 
> unit
> without the user's explicit approval.

I'm not sure that I take CRON=1 as meaning "I want to use cron forever".
I'd rather interpret it as "I want to enable spamassassin's daily
maintenance job".  The details of how it's accomplished aren't really
relevant, IMO.

> Please ask during installation and give the question an appropriate priority.
> By choosing the priority you can even achieve a "silent" transition for
> "normal" users and let more advanced users decide.

Yeah, that's probably the best way in terms of user flexibility.  I'm
not convinced it's necessary, though, and I don't like the idea of all
the other packages undergoing similar transitions all having to
introduce similar debconf questions.

noah



Re: migration from cron.daily to systemd timers

2020-01-08 Thread Noah Meyerhans
On Wed, Jan 08, 2020 at 02:18:34PM +0100, Daniel Leidert wrote:
> > Yeah, that's my reaction as well.  The point is to run the job
> > periodically.
> 
> No. The configuration says CRON=1. It doesn't say PERIODIC_CHECKS=1. Your
> behavior here is pretty similar to Microsofts: Let the user decide if updates
> shouldn't be automatically installed and still install a bunch of them 
> automatically without his approval independent of his decision.
> 
> I have enabled a cron-job, not a systemd timer unit. And I don't want you to
> silently override this.

You haven't enabled a cron job, though.  You've edited a file in
/etc/default.  The variable happens to be named CRON, but that was never
a good choice.  That name was introduced >15 years ago by a previous
package maintainer, and is only there today due to inertia and a lack of
real need to move to something else.

Had the variable been named PERIODIC_CHECKS or something like that,
would your objections still stand?

noah



Re: migration from cron.daily to systemd timers

2020-01-08 Thread Noah Meyerhans
On Wed, Jan 08, 2020 at 11:25:56AM -0800, Russ Allbery wrote:
> > As a third party with no particular ax to grind on this, I do wonder
> > what the advantage is to adding another mechanism for this particular
> > use case, given the need to somehow handle upgrades involving an
> > existing (presumably working?) solution.
> 
> Timer units allow the administrator to easily enable and disable them
> without mucking around with changing configuration files and then dealing
> with merging changes to configuration files.  (I just had to deal with
> this with a spamassassin upgrade as part of upgrading to the latest
> stable.)  They also handle suspended systems, time changes, and other
> related things better than cron jobs (anacron helps with some of that, of
> course).

It's also quite a bit easier for an admin to adjust the period of a
systemd timer than it is for a cron.daily script.

cron.daily scripts are also run serially.  The random delayed start
feature that the spamassassin job uses to reduce load on the sa-update
servers doesn't really play nicely with this, as it ends up delaying the
start of subsequent jobs for no good reason.  We could avoid this with
cron.d, and as has been pointed out elsewhere in this thread, that might
be desirable anyway, but that's still a migration that is going to be
visible to administrators.  IMO the migration to systemd timers can be
done more smoothly, so it's still preferable.

The big drawback of systemd timers, IMO, is that a nonzero exit code
doesn't generate email by default the way cron does.  At smaller sites,
anyway, this is a perfectly sensible way of being notified of problems
with the job.

noah



Re: migration from cron.daily to systemd timers

2020-01-08 Thread Noah Meyerhans
On Wed, Jan 08, 2020 at 10:09:58PM +0100, Stephan Seitz wrote:
> > visible to administrators.  IMO the migration to systemd timers can be
> > done more smoothly, so it's still preferable.
> 
> Well, since you need to support non-systemd systems as well (like mine) the
> cron script is still needed (I don’t think these timers work with elogind).
> 
> So the migration can only take place on systems running systemd.

That is a given, and has been stated more than once in this thread, from
the beginning.



Re: migration from cron.daily to systemd timers

2020-01-08 Thread Noah Meyerhans
On Wed, Jan 08, 2020 at 10:32:07PM +0100, Philip Hands wrote:
> I don't really care what that comment says, as that's up to the
> maintainer of the package, and how they intend to deal with this in the
> future, but I'm really not a fan adding unnecessary questions to debconf.

Here's my proposal for how to perform this conversion:

https://salsa.debian.org/noahm/spamassassin/commit/2b2020cbd2e43361d93d8efc1304f5575c0a83e1

If CRON=0, as is the default, then the cron.daily script is a no-op, as
today, under systemd or non-systemd.

If CRON=1 and non systemd, then the cron.daily script performs the
maintenance as today.

If systemd and CRON=1 and the systemd time is enabled, then the
cron.daily script is a no-op.

If systemd and CRON=1 and the timer is disabled, then then:

   a. If the administrator has created a file named
  /etc/spamassassin/skip-timer-conversion, then the cron script will
  perform the daily maintenance tasks.
   b. If there is no /etc/spamassassin/skip-timer-conversion file, then
  the cron script will enable the timer, run a single invocation of
  the maintenance task, and exit.  Future invocations of the
  cron.daily script are no-op, as described above, due to the timer
  being enabled.

I find the /etc/spamassassin/skip-timer-conversion file a little clunky,
but I doubt that most people are going to bother with it, and it
provides the flexibility to choose not to switch to the timer.

noah



Bug#959066: ITP: amazon-ec2-utils -- Utilities to manage Amazon EC2 instance storage

2020-04-28 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans 

* Package name: amazon-ec2-utils
  Version : 1.3
* URL : https://github.com/aws/amazon-ec2-utils
* License : MIT
  Programming Lang: Python
  Description : Utilities to manage Amazon EC2 instance storage

Amazon-ec2-utils contains tools to help manage network attached storage
resources on Amazon EC2 virtual machines.  This includes:

- The ebsnvme-id utility to read and report information about NVME-attached
  EBS volumes
- udev configuration to ensure that NVME storage devices are accessible via
  names that reflect the Amazon EC2 API drive mapping configuration

This package will be maintained by the Debian cloud team.



Bug#925530: cloud.debian.org: Debian docker images pointing to github for bug tracking

2020-06-28 Thread Noah Meyerhans
On Sun, Jun 28, 2020 at 05:26:41PM +0200, Lucas Nussbaum wrote:
> > On https://hub.docker.com/_/debian, there's:
> > 
> > > Where to file issues:
> > > https://github.com/debuerreotype/docker-debian-artifacts/issues
> 
> This hasn't changed. The Debian official images still point to github
> for bug tracking. I would expect the BTS to be used for bug tracking
> (and salsa for maintaining the generation tools)

Not wanting to speak for paultag or tianon, but I don't think the intent
has ever been to present these as "Debian's official images for Docker."
In fact, the language used is "Docker Official Images".  These are
"Docker's official Debian images".  The difference may be subtle, but is
significant.

> One could argue that the Cloud team delegation does not cover Docker
> images. The delegation says:
> 
> > With the Debian Trademark Team, establish policies and procedures
> > for the Debian Cloud Team regarding "Official Debian Cloud
> > Images" for both open and proprietary platforms.
> 
> The current version of those policies is, AFAIK,
> https://wiki.debian.org/Teams/DPL/OfficialImages
> 
> But I think that it would be a nice addition to change the delegation to
> also include official images for virtualization environments such as
> Docker, LXC, Vagrant, as well as official images for SBC such as the
> Raspberry Pi (where it's often more convenient to boot a pre-built image
> than use the Debian installer).

This proposal increasingly diverges from any common definition of
"cloud".

noah



signature.asc
Description: PGP signature


Re: Proposal: use /usr/bin/open as an alternative for run-mailcap and others.

2020-10-12 Thread Noah Meyerhans
On Fri, Oct 09, 2020 at 12:14:23PM +0200, Stephan Seitz wrote:
> > is probably very handy.  Even more handy is the fact that you don't
> > really need to learn the command name of your image viewer and your pdf
> > viewer and your html viewer and you .dia viewer and your .mp3 player
> > and every other viewer you might need to handle: only the 'open'
> > command.
> 
> I don’t know about that. Normally I use mupdf for pdf, but mupdf doesn’t
> allow copy & paste. So if I want to do this, I need another pdf program.
> 
> For my FLAC music I use audacious for my playlists and ogg123 for CLI
> playing.
> 
> If I want to open an image, I’m using qiv or gimp.
> 
> Other rules apply for attachments in mutt, so mutt is using its own mailcap
> definitions.

"open" is a verb commonly used to describe the action of accessing a
file in Linux.  You used it yourself above, and it's one of the most
prominent functions in the file API.  It seems sensible to provide a
tool that matches the verb most commonly used to describe this action.

> That’s why I need to know the different programs anyway. Why would I go for
> something like open which can only use one program for the file type?

You wouldn't, but that's not the point.  The availability of
/usr/bin/open wouldn't preclude your use of whatever program you want to
use.  What it would do is provide a convenient utility to support people
who don't (yet) have a preference for what application they want to use
to open a file.  Maybe they have only basic needs, or are unfamiliar
with the file type and its associated commands.  There are surely many
other reasons.

In order to support users who might care about what application they
use, or who may wish to explore alternatives, it might be nice if the
'open' command could optionally print a list of programs that support
the specified file's MIME type.

noah



Re: Bug#972443: ITP: rotp -- Remnants of the Precursors game

2020-10-19 Thread Noah Meyerhans
On Sun, Oct 18, 2020 at 10:13:06PM +0200, Adam Borowski wrote:
> > Remnants of the Precursors is a high-quality remake of the classic Master of
> > Orion (1993) game by SimTex.
> 
> Sounds like pure awesomesity!
> 
> > Game engine will go to contrib; while the game data [artwork,text,sound] 
> > will
> > need to go to non-free.
> 
> Except for this bit.

So impure awesomesity? ;)

Still sounds exciting, in any case.  I only wish I had as much time for
games today as I did in 1993...

noah



Re: unattended-upgrades by default?

2016-11-04 Thread Noah Meyerhans
On Fri, Nov 04, 2016 at 04:15:58PM +0100, Rhonda D'Vine wrote:
>  In theory I'm all for it, but there definitely should be some more fine
> tuning for that.  Please don't auto-restart varnish by needrestart, it
> puts a lot of load on the backend which might be a very bad idea.  And
> the downtime that a mysql upgrade brings along is kinda annoying.
> 
>  And: cluster setups might be a real pain here.  If you restart the
> cluster software at the same time you potentially run into split brain
> issues.
> 
>  So: BIG yeah for single-user non-critical systems, big nay and
> headaches for production nodes. 

Any reasonably well managed production host is going to be driven by
some kind of configuration management system and the admin can override
the default. They'll undoubtedly be overriding several defaults already.

Overriding the default (or simply purging unattended-upgrades) is a
trivial step in such an environment. And if for some reason it's not
trivial, then I think this is another case for wanting the service
enabled by default.

noah



signature.asc
Description: PGP signature


Re: dpkg no longer installs conffiles??

2016-11-29 Thread Noah Meyerhans
On Wed, Nov 30, 2016 at 05:13:50AM +0100, Guillem Jover wrote:
> > I don't know a suitable forum for this type of question. And please don't 
> > refer
> > me to the high-traffic ML debian-user, I won't use that one.
> 
> You don't need to subscribe to be able to post. Using one of the
> support channels before sending to d-devel or filing bugs is always
> helpful, because it saves maintainers from having to do the triaging
> in case this is a local user problem.

But almost everybody sends their replies only to the list. Just like you
did. In fact, our mailing list code of conduct[1] explicitly requests
that one not CC the original poster unless explicitly requested. I could
be wrong, and I don't have any data to back up this claim, but I doubt
most people seeking help from the community know about that requirement.
Even if they do, I suspect that most of us will, out of habit, ignore
their request and send replies only to the mailing list.

FWIW, -devel and -user are at about the same volume these days. [2][3]

noah

[1] https://www.debian.org/MailingLists/#codeofconduct
[2] https://lists.debian.org/stats/debian-user.png
[3] https://lists.debian.org/stats/debian-devel.png


signature.asc
Description: PGP signature


Re: Confusing our users - who is supporting LTS?

2018-10-23 Thread Noah Meyerhans
On Tue, Oct 23, 2018 at 11:03:39AM -0400, Antoine Beaupré wrote:
> TL;DR: Why not just delegate image management to the LTS team once
> oldstable because LTS just like we do with security? Zobel also provided
> a good template for the images life cycle which could clarify this on
> debian-cloud@, which I fully support.

We could certainly delegate. The goal for the future, though, is to have
enough automation in place that continuing to support an old release is
simply a matter of not turning off its image generation. For technical
reasons, jessie is a bit different, but future releases should be
simpler. But the question really isn't "how do we keep publishing and
supporting jessie?", it's "should we keep publishing and supporting
jessie?"

To be clear, the ongoing cost to the cloud team of dealing with jessie
on AWS (where this issue originally came up) has been exactly zero,
afaict. That is, we haven't actually updated anything in >18 months.
Users who launch a jessie image there get 8.7, with 106 pending updates.
As long as LTS exists and users are happy with it, there's nothing
strictly wrong with this situation. They should update their instances
and reboot, but from there, they are free to continue using them in
relative safety.

> But in the cloud infrastructure, things are slightly different. The base
> image isn't as important as the application and/or data that runs on
> top. In the cloud, we install new "machines" all the time, sometimes as
> part of CI/CD processes and those machines are not "pets", they are
> "cattle" and recycled constantly.

That's a very common use case, for sure, but not the only one we want to
support. We definitely do have people who launch an instance and then
keep it around for a long time, interacting with and configuring it by
hand, just as they would with any physical server. (In fact, I recently
noticed a bunch of what appeared to be jessie EC2 instances owned by our
QA team; when I asked about them, I learned that they'd all been
upgraded in place to stretch.)

> In that sense, switching the base OS is, paradoxically, a big deal so
> it actually makes sense to install an older release for newer
> machines. This is why Travis CI still supports Ubuntu LTS Precise
> (12.04) and Trusty (14.04), the former which isn't supported by
> Canonical, and it's missing *two* more recent LTS releases, Xenial
> (16.04) and Bionic (18.04).

Yes, this is correct; it's also something we can continue to support,
even without active engagement from the LTS team. As long as the LTS
team doesn't do anything that breaks updates on the old images, we're
never going to tell people that they can't launch them. The question
here was simply about discoverability. If you're a Debian user just
beginning exploration of public cloud alternatives, should we make it
easy for you to launch LTS instead of stable?

> It seems like a nice, symmetrical approach to solve the problem: just
> punt this over to the LTS team. We have some capacity and knowledge. I
> know I would be happy to work on those images.

I'm not even sure that's necessary. I, as a member of the cloud team and
maintainer of the stretch AWS images, have already expressed willingness
to update the jessie images, if it's something we as a project agree is
appropriate.  Coming to some clearer agreement about that, especially in
light of a decision to the contrary that we made within the cloud team
recently, is the sticky point.

The perception, afaict, is that LTS only exists because people are paid
to work on it. There has not traditionally been sufficient interest
within Debian to sustain support of a release for 5 years, so some
companies have provided financial incentives. That's fine, but potential
somewhat fragile. If that funding goes away, does LTS go away? Is LTS
work, for pay, going to drain resources from volunteer work? These
questions exist outside the context of the current cloud team issue. The
cloud team just happens to be the one to have tripped over them in this
instance.

noah



signature.asc
Description: PGP signature


Re: Alioth: the future of mailing lists

2017-09-19 Thread Noah Meyerhans
On Tue, Sep 19, 2017 at 09:43:46AM +0200, Marc Haber wrote:
> >> I have managed mailman installations for some time so I'm fairly familiar
> >> with how it works, and have some time from November onwards to work on
> >> this which I hope would be enough time to develop and implement a migration
> >> plan. I'm CCing the alioth and DSA teams so they are aware of this.
> >Do you have infrastructure for running it? 
> 
> How high are the requirements (CPU-, Memory) wise? I guess that one of
> those 5 Euros a month VPSses with 50 Gig Disk and 8 GB RAM would not
> be enough?

We have accounts and are already running systems on the various public
clouds (AWS, GCE, etc). Availability of compute resources really
shouldn't be an issue for us.

I am also willing to help maintain the alioth mailing list service if
necessary.  Maybe we could create a mailing list to coordinate this
effort. ;)

noah



signature.asc
Description: PGP signature


Re: Most optimal way to import NMU into existing git-builpackage repository?

2024-10-25 Thread Noah Meyerhans
On Fri, Oct 25, 2024 at 03:03:53PM +, Holger Levsen wrote:
> > Honestly I'd be happy if we could just establish some expectation that
> > the NMUer open a merge request for their changes.  It can be merged
> > later without losing anything or requiring additional work.  Enforcement
> > of this expectation would be even better, of course.
> 
> the current expectation is that an NMU bug is opened, which contains
> the debdiff.
> 
> https://www.debian.org/doc/manuals/developers-reference/developers-reference.en.html#when-and-how-to-do-an-nmu
> 
> "... Then, you must send a patch with the differences between the current
>  package and your proposed NMU to the BTS. The nmudiff script in the
>  devscripts package might be helpful"

Right, and that's not a whole lot more helpful than requiring me to
download the sourcepackage and generate the debdiff myself.  Sure all
the content is there, but it's still a tedious amount of work that's
easily forgotten.  Further, it loses a little bit of metadata, in that
the git commit now comes from me, rather than the person doing the
actual NMU.

Yes, I know this is trivial, and yes I know I can fix it with more work;
I don't want NMUs to make more work for me.  It makes me not like NMUs.

noah



Re: Most optimal way to import NMU into existing git-builpackage repository?

2024-10-25 Thread Noah Meyerhans
On Fri, Oct 25, 2024 at 08:45:16AM +0200, Andreas Henriksson wrote:
> I would very much prefer if it was possible in Debian to not allow
> the archive to get out of sync with packaging git repo (for example
> when it lives under salsa.debian.org/debian which uploaders should have
> access to already).
> That would probably also require some "tag to upload" solution to be
> implemented first I presume.

Honestly I'd be happy if we could just establish some expectation that
the NMUer open a merge request for their changes.  It can be merged
later without losing anything or requiring additional work.  Enforcement
of this expectation would be even better, of course.

noah



Re: ifupdown behaviour with IPv6 DAD failure (Was: proposal: Hybrid network stack for Trixie)

2024-09-23 Thread Noah Meyerhans
On Mon, Sep 23, 2024 at 05:48:53PM +0200, Philipp Kern wrote:
> > > > I like ifupdown. It's simple and just works.
> > > 
> > > I find this quite funny, given a recent discussion about IPv6 dad
> > > issues with ifupdown on #debian-admin.
> > 
> > The "discussion" was about ifup@eth0 being in a failed state on a
> > particular server due to a DAD failure and someone having to manually
> > intervene.
> 
> I find my ghost being invoked here.
> 
> > Chris, what behaviour do you expect here? Below I'm going to assume what
> > you're getting at is that we should continue to retry DAD.
> > 
> > To me going to a stable failure state seems desirable. Continuing to re-try
> > for IPs could cause instability in the face of legitimate address
> > conflicts: when the owning machine reboots the conflicting machine would
> > now win the IP due to continous retrying. The change in owner would cause
> > disruption to services entirely unrelated to the machine that was just
> > rebooted.
> 
> DAD did not fail, it timed out after 60 sleeps of 0.1, aka 6s. The kernel
> subsequently succeeded to configure the network. The script in question was
> added in response to [1] and [2] to have a pause during boot to give the
> kernel time to resolve the situation before continuing the bootup. So it
> left the race around because there's not that much it can do better as a
> script-based setup without much state.

I'm not familiar with the discussion on #debian-admin, so the details
may be different, but I can point to a specific use case where we want
DAD/SLAAC failure handled without marking the interface as failed.  The
cloud team wanted to produce working images that would support both
IPv4-only and dualstack environments transparently, without knowing the
type of environment in advance or requiring admin intervention. [1]

We ended up coming up with something that worked, but it would have been
nice if ifupdown could have handled this more gracefully. [2]

We have since transitioned to systemd-networkd and netplan; bullseye is
the last generation of cloud images to use ifupdown.  Although the above
issue certainly contributed to this decision, the primary driver for the
netplan change was the cloud-init integration.

noah

1. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804396#17
2. 
https://salsa.debian.org/cloud-team/debian-cloud-images/-/tree/master/config_space/bullseye/files/etc/network



Re: apt running on crashed gnome-terminal

2024-12-29 Thread Noah Meyerhans
On Sun, Dec 29, 2024 at 07:43:23PM +, Richard Lewis wrote:
> > today I decided to upgrade from bookworm to trixie/testing[1][2]. I ran
> > the upgrade in a gnome-terminal, and of course all gnome terminals in
> > the system crashed halfway through the upgrade[1][3].
> 
> not much consolation, but: i supose this is why the release-notes
> recommend upgrading inside screen (see also:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035401)

Yes, but the discussion in #1035401 and the corresponding MR shows that
this has limits as well.

IMO, an upgrade between releases should happen with as few layers of
software involved as possible.  Local tty login or serial console is
ideal.  This is, of course, not always feasible.

noah

1. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035401
2. https://salsa.debian.org/ddp-team/release-notes/-/merge_requests/213



Bug#1090811: debian-installer: install linux-sysctl-defaults by default

2024-12-19 Thread Noah Meyerhans
On Thu, Dec 19, 2024 at 09:53:27PM +0100, Chris Hofstaedtler wrote:
> > > > In theory, if we don't want to explicitly install the package in d-i,
> > > > another possibility might be to bump it to Priority: standard and let
> > > > tasksel install it.  I'm not sure what the tradeoffs might be that would
> > > > drive the decision one way or another.
> [..]
> > > Regarding tasksel vs. Priority, the latter has a potential for a much
> > > wider impact: lots of Debian system are installed without d-i and/or
> > > tasksel, and most if not all would get the package via Priority. (Think
> > > of all the tools building Debian images, chroots, containers, etc., on
> > > top of debootstrap/mmdebstrap/etc.)
> > 
> > I'm not sure it's the case that most of those other systems install
> > Priority: standard.  Debootstrap certainly doesn't by itself, and I
> > don't think the debuerreotype tool for building OCI images does either.
> > In any case, your point still stands.  I'll re-assign this to general
> > for now, and we can discuss the options in a broader context.
> 
> We have a mechanism for installing iputils-ping into "most" systems, why
> not use the same mechanism to install linux-sysctl-defaults?
> 
> Systems that want iputils-ping likely also want
> linux-sysctl-defaults.

Both iputils-ping and systemd declare Recommends on
linux-sysctl-defaults.  The expectation is very much that it's installed
everywhere by default.  The only reason it isn't today is that those
packages are installed by deboostrap, which doesn't install Recommends.

I believe that it's important for linux-sysctl-defaults to be part of
the default installation except in unusual cases.  In addition to the
"make ping work" sysctl, it sets a number of other important sysctls
that should be set by default (e.g. net.core.default_qdisc,
fs.protected_symlinks, net.ipv4.conf.default.rp_filter and others).  

These are system-wide settings that we don't want changed with the
installation of some package after the fact.

There are at least a couple of ways we can accomplish this:

* Raise the linux-sysctl-defaults priority to 'standard', which will get
  it installed by tasksel under d-i while still leaving it out of other
  debootstrapped installations (containers, etc)
* Raise its priority to 'important', in which case debootstrap will
  install it

And there are probably more.

noah



Bug#1100705: ITP: azure-proxy-agent -- access control for Microsoft Azure link-local network services

2025-03-17 Thread Noah Meyerhans
Package: wnpp
Severity: wishlist
Owner: Noah Meyerhans 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-cl...@lists.debian.org

* Package name: azure-proxy-agent
  Version : 1.0.25
* URL : https://github.com/Azure/GuestProxyAgent
* License : MIT
  Programming Lang: Rust
  Description : access control for Microsoft Azure link-local network 
services

The Azure guest proxy agent provides access control to potentially sensitive
wireserver and instance metadata link-local HTTP endpoints within the Microsoft
Azure cloud environment.  

This packaged will be maintained by the cloud team.