Bug#764399: ITA: makefs -- create a cd9660 or ffs file system image from a directory tree

2015-11-16 Thread Steven Chamberlain
retitle 764399 ITA: makefs -- create a cd9660 or ffs file system image from a 
directory tree
owner 764399 !
thanks

Hi,

Christoph Egger and I agree that as GNU/kFreeBSD Maintainers we should
adopt this package.  It is required by debian-installer to build the d-i
netboot images for kfreebsd.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


signature.asc
Description: Digital signature


Bug#686447: ITP: zfs-linux -- The native Linux kernel port of the ZFS filesystem

2014-06-02 Thread Steven Chamberlain
Hi,

So from https://github.com/zfsonlinux/pkg-spl we have:
> Package: libnvpair1
> Package: libnvpair1-dbg
> Package: libuutil1
> Package: libuutil1-dbg
> Package: libzfs1
> Package: libzfs1-dbg
> Package: libzfs-dev
> Package: libzpool1
> Package: libzpool1-dbg
> Package: zfs-dkms
> Package: zfs-initramfs
> Package: zfsutils
> Package: zfsutils-dbg

And in the existing zfsutils package, currently only built for
kfreebsd-any, we have:
> Package: libnvpair1
> Package: libnvpair1-udeb
> Package: libumem1
> Package: libumem1-udeb
> Package: libuutil1
> Package: libuutil1-udeb
> Package: libzfs1
> Package: libzfs1-udeb
> Package: libzpool1
> Package: libzpool1-udeb
> Package: zfsutils
> Package: zfsutils-udeb

With such an overlap implied by that, and knowing it all originated from
a common codebase at some time, I really hope it can be merged back into
a common package built for kfreebsd-any and linux-any.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/538c7e03.9090...@pyro.eu.org



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-11 Thread Steven Chamberlain
This is good to see already :)

I expect it builds fine on GNU/Linux, with GCC and Clang, unless
hardening options are used, then these warnings would be treated as errors:

> In file included from md5/md5_locl.h:98:0,
>  from md5/md5_dgst.c:60:
> md5/md5_dgst.c: In function 'md5_block_data_order':
> ./md32_common.h:237:66: warning: right-hand operand of comma expression has 
> no effect [-Wunused-value]
>  #  define HOST_c2l(c,l) ((l)=*((const unsigned int *)(c)), (c)+=4, l)
>   ^
> md5/md5_dgst.c:107:2: note: in expansion of macro 'HOST_c2l'
>   HOST_c2l(data,l); X( 0)=l;  HOST_c2l(data,l); X( 1)=l;
>   ^

> ./md32_common.h:213:41: warning: right-hand operand of comma expression has 
> no effect [-Wunused-value]
>  l|=(((unsigned long)(*((c)++)))),  \
>  ^
> sha/sha256.c:245:3: note: in expansion of macro 'HOST_c2l'
>HOST_c2l(data,l); T1 = X[0] = l;  ROUND_00_15(0,a,b,c,d,e,f,g,h);
>^

We'd want to configure with --disable-silent-rules, if debhelper scripts
don't already do that.

Compiling on GNU/kFreeBSD is possible (and potentially GNU/Hurd) but
requires the attached patch *and* a solution for getentropy:

1. try to use getentropy_linux.c - but would have to disable use of
Linux-specific sysctls and headers;  it is dangerous to rely on only
/dev/random, so we should implement replacement sysctls to use on
FreeBSD - that could be a bit messy

2. create a new getentropy_freebsd.c - but seems silly as FreeBSD itself
does not need it (see solution 3);  also does not help GNU/Hurd

3. (my preference) link with libbsd, which already provides a
arc4random_buf and so getentropy is not needed at all - WARNING: the
libbsd arc4random implementation still uses RC4 at the moment (as on
FreeBSD), but OpenBSD has already changed it to use ChaCha20 (see Bug
#747671);  we'd also want to make sure libbsd's entropy gathering is at
least as robust as in getentropy_linux.c

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org
--- configure.orig	2014-07-11 18:42:02.0 +0100
+++ configure	2014-07-12 01:26:15.064409115 +0100
@@ -2915,7 +2915,7 @@
 		TARGET_OS=darwin;
 		LDFLAGS="$LDFLAGS -Qunused-arguments"
 		;;
-	*linux*)
+	*linux* | *gnu*)
 		TARGET_OS=linux;
 		CFLAGS="$CFLAGS -D_BSD_SOURCE -D_POSIX_SOURCE -D_GNU_SOURCE"
 		;;


Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-12 Thread Steven Chamberlain
On Jul 12, Toni Mueller  wrote:
> On Sat, Jul 12, 2014 at 07:43:44AM +0200, Marco d'Itri wrote:
> > On Jul 12, Toni Mueller  wrote:
> > > * Package name: libressl
> > I am highly doubtful at best.
> 
> in which respect, and why?

I think some people are jumping ahead to "oh no!  we're replacing
OpenSSL?".  That's something to be have some rough plan for in case
we eventually want to do that.  But for now I don't think it's a
reason not to package it or even allow it into sid/testing.

> > What are your plans exactly?
> 
> My plan is to first build the package(s) and upload to experimental, so
> people can start to play with it.

It is definitely an interesting piece of software, with some different
design choices being made here and there.  It even adds some new
features (new ciphers and elliptic curves for example) and the utilities
are useful standalone (such as for an SSL CA).

People can start to play around with it and maybe to try to rebuild
packages against it locally.  It couldn't be a drop-in replacement
for OpenSSL's libssl and libcrypto because the ABI will differ.  The
source API is being kept as similar as possible so in theory:

> Packages currently build-depending on openssl should be able to
> build-depend on "openssl-dev | libressl-dev".

that sounds like it should just work.  Or otherwise, it could reveal
if a package uses some 'unsafe' part of the API that OpenBSD has removed
during their cleanup.  Any incompatibilities or run-time differences are
likely interesting to both SSL libraries as it could indicate a bug
somewhere.

Probably only a minority of people would want to rebuild many packages
on their system against LibreSSL.  But having it packaged, and
co-installable helps people who want to do this.  Similarly there is
support in the Exim packaging to rebuild with OpenSSL instead of GnuTLS.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140712140150.ga15...@squeeze.pyro.eu.org



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-13 Thread Steven Chamberlain
On 12/07/14 02:09, Steven Chamberlain wrote:
> [...] these warnings would be treated as errors:
> 
>> > In file included from md5/md5_locl.h:98:0,
>> >  from md5/md5_dgst.c:60:
>> > md5/md5_dgst.c: In function 'md5_block_data_order':
>> > ./md32_common.h:237:66: warning: right-hand operand of comma expression 
>> > has no effect [-Wunused-value]
>> >  #  define HOST_c2l(c,l) ((l)=*((const unsigned int *)(c)), (c)+=4, l)
>> >   ^

A new upstream release LibreSSL 2.0.1 already addressed that:  basically
stop using -Werror in the portable library because many compilers have
warnings that OpenBSD's compiler does not, and I guess they did not
think the warnings legitimate or worth the effort of 'fixing' right now.

This new version brings in many small changes from the still-ongoing
cleanup.  ABI versions bumped to libcrypto 30.0.0 and libssl 27.0.0.
AFAICT only private_RC4_set_key was removed, and ssl_version_string
added to the respective libraries' exported symbols.

Am I right in thinking Debian would not bump its own SONAME if there
were unimportant ABI changes, like these seem to be?

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53c2ef58.4050...@pyro.eu.org



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-13 Thread Steven Chamberlain
On 12/07/14 12:53, Toni Mueller wrote:
> my intention is to package this stuff so one can have both openssl and
> libressl installed in parallel. libressl currently has libraries with
> these sonames:
> 
> libssl.so.26
> libcrypto.so.29

If the ABI is already different, there's no need for the library names
to exactly match what the Debian OpenSSL package has or what OpenBSD
uses?  Actually I think you should avoid it, to avoid any confusion.

Perhaps use libssl-openbsd.so.26, libcrypto-openbsd.so.30 just like we
did in src:freebsd-libs?  Or pick anything else that sounds better.

The "openssl" binary built by LibreSSL sources will also need to be
renamed, if they're to be co-installable.  To "libressl" I presume?
AFAIK the command-line apps have not changed significantly (except
bugfixes) so could be a drop-in replacement someday (much easier than
switching libraries).

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53c30523.4060...@pyro.eu.org



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-14 Thread Steven Chamberlain
On 14/07/14 21:08, Toni Mueller wrote:
>> > You forget one of the big problems with OpenSSL that LibreSSL doesn't
>> > fix: the license.
> Granted. Due to the amount of inherited code, it can't. We'll see how
> things evolve as the amount of inherited code will dwindle.

So, merely as a result of the licensing, we could have a fascinating
situation whereby:
* BSD-licensed software contemplates switching from OpenSSL to LibreSSL
* GNU-licensed software keeps using OpenSSL with license exception, or
maybe someday switches to GnuTLS

So, this reduces the amount of software that could potentially switch
from OpenSSL from LibreSSL.  And since BSD and GNU software are unable
to link against each other, it reduces the likelihood that something
will indirectly link against OpenSSL and LibreSSL at the same time (the
situation Russ Allbery described).

So actually I think this simplifies things.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53c43d49.6070...@pyro.eu.org



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-16 Thread Steven Chamberlain
On 16/07/14 03:06, Paul Tagliamonte wrote:
> I didn't see this yet in the thread, so:
> https://www.agwa.name/blog/post/libressls_prng_is_unsafe_on_linux

What's most interesting is that someone spent such effort to look for
this;  that there are so many eyes now on both the original OpenSSL and
the new LibreSSL code.  Both projects ought to benefit from this.

This was a real, but totally contrived issue with many preconditions:

* initial 'grandparent' process initialises LibreSSL's PRNG, then forks
* first-forked process does not use the PRNG yet, but forks again
* grandparent uses the PRNG for things and then exits, freeing up the
pid to be re-used
* second-forked 'grandchild' process might coincidentally get the same
pid as its grandparent
* grandchild uses the PRNG for things;  LibreSSL would not realise it
has forked if the pid is the same, so does not reseed - PRNG output
would be repeated from what the grandparent got before it exited -
possibly having security impact


The other major concern was about scary entropy-gathering code,
implemented in LibreSSL Portable for Linux as a last resort for when
/dev/urandom can't be read.  I agree that it's too risky, or:  too
difficult to prove safe and robust in any conceivable situation.
Debian's major OpenSSL bug was able to happen undetected for a while out
of similar circumstances.

A compile-time ifdef already allows to disable this fallback code and
raise SIGKILL instead, crashing the calling process.  As part of the
LibreSSL port to GNU/kFreeBSD and Hurd I would actually have asked that
we do this anyway in Debian, at least for those platforms.

It seems extreme, but the point is that something must be wrong on the
system if we get to the fallback code - /dev/urandom missing from a
chroot, or fd's exhausted, and the kernel not having a reliable sysctl
interface like OpenBSD's to get random bytes in the first place.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org



signature.asc
Description: OpenPGP digital signature


Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-16 Thread Steven Chamberlain
(This may seem a little off-topic for the ITP but please bear with me...)

On 16/07/14 21:13, Guillem Jover wrote:
> kFreeBSD does have a supported sysctl for this: CTL_KERN KERN_ARND.
> (As does NetBSD which has two, KERN_URND and KERN_ARND.)

Actually yes, we would certainly want to use that.  But is there any
conceivable way it could fail?  (sysctl calls can return an error code).
 What could we do then?

We'd need to figure this out if we want the prospective libressl package
to build on GNU/kFreeBSD on Hurd.  Currently it won't build, because it
needs either a kernel-specific getentropy implementation, or arc4random.

libbsd's arc4random.c, I'm guessing was based on older OpenSSH Portable
sources.  If reading /dev/urandom fails, it uses only gettimeofday,
getpid, and uninitialised bytes from the stack (as a seed to the PRNG).

LibreSSL Portable on Linux has the new, scary fallback mechanism
instead, more comprehensive, but I honestly don't like that approach.
It's too difficult to estimate how much entropy it could really gather,
or potential failure cases.  And we wouldn't even know when the fallback
was being used.

Native OpenBSD would actually raise SIGKILL if their sysctl fails.
(Their cvsweb is down - quoting inline from arc4random.c instead) :

> _rs_stir(void)
>   [...]
>   if (getentropy(rnd, sizeof rnd) == -1)
>   raise(SIGKILL);

libevent's arc4stir is different again;  it's defined to return an int,
with -1 indicating a failure of all attempts to seed:
* from /dev/urandom
* from /proc/sys/kernel/random/uuid
* using a kernel-specific sysctl

These arc4random implementations also differ in which stream cipher they
use also (RC4 originally, ChaCha20 in newer OpenBSD code).

As a result of all this mess, I think we should be looking to converge
on a single arc4random implementation, in a place such as libbsd, but
make sure it is up to the task first.

If arc4random is available and LDFLAGS include -lbsd, LibreSSL Portable
will actually use it instead of the bundled implementation.  I'm
guessing OpenSSH Portable would do this too (I can see it being tested
for by ./configure in the buildd log).

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53c6e74d.8080...@pyro.eu.org



Bug#754513: ITP: libressl -- SSL library, forked from OpenSSL

2014-07-16 Thread Steven Chamberlain
Oh, and note that OpenSSH Portable uses RAND_bytes from libssl to seed
its arc4random implementation.

So AFAICT if you were to link OpenSSH Portable against LibreSSL
Portable, it would get really crazy:

/dev/urandom or sysctl or scary fallback ->
LibreSSL Portable getentropy ->
LibreSSL Portable arc4random.c (ChaCha-20) ->
LibreSSL RAND_bytes ->
OpenSSH Portable arc4random.c (ChaCha-20) ->
OpenSSH

with the stream cipher, seeding and stirring all happening twice.

So I really like the idea of both getting an arc4random implementation
from one place, such as libbsd.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53c6ec32.9000...@pyro.eu.org



Bug#754513: Questions from upstream

2014-07-21 Thread Steven Chamberlain
Hi Brent,

Thank you very much for your input here.

On 21/07/14 13:10, Brent Cook wrote:
> Also, please do not replace arc4random in libressl. We'll have to figure
> out what to do about the circular dependency with openssh

OK, let's see what the OpenSSH Portable team comes up with...

Having embedded copies of arc4random.c in different packages though
(libressl, openssh, libevent, libbsd) is not great.  It would be nice to
someday package it into a re-usable library for all of Debian to use,
and for ensuring it always stays up-to-date with upstream.

(The one in LibreSSL Portable is currently the most up-to-date;  I
realise other/older versions of it are unsafe for some use cases).

> replacing
> with the version from libbsd is really not the way to go at the moment

Agreed, there are serious problems with the arc4random in libbsd at the
moment (I'm looking at our options to fix this).  But if we could
someday split out arc4random, then libbsd would seem like a good place
to put it.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53cd0831.9080...@pyro.eu.org



Bug#686447: [Pkg-zfsonlinux-devel] any news/reply regarding ZFS in NEW?

2014-02-28 Thread Steven Chamberlain
On 28/02/14 15:13, Turbo Fredriksson wrote:
> It's very flattering that people thought my stuff was good enough to accept 
> without further review,
> but it's also a bit frightening - I'm good, but not THAT good (as we could 
> see :).

ISTR it was committed to master by mistake?  Then reverted, but when
Christian Perrier originally did this he rewrote git history;  Joey Hess
corrected that in the VCS, but Christian's next upload reintroduced it
all from his working copy.  Or something like that.

The actually useful bits for Linux were later reverted by KiBi due to
d-i build issues, but the other changes (including some that are
problematic for kFreeBSD) are still there.

Perhaps I could undo Turbo's changes in master, and we can later
carefully review, clean up and reintroduce changes ZoL really needs?

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/5310f6e7.4000...@pyro.eu.org



Bug#686447: [Pkg-zfsonlinux-devel] any news/reply regarding ZFS in NEW?

2014-03-02 Thread Steven Chamberlain
On 02/03/14 12:19, Turbo Fredriksson wrote:
> Might I suggest that the reason is that these is _completely_ different 
> implementation, with
> absolutly no common code?

Right, so conversely, zfs-linux shares a lot of code already with
zfsutils and it makes no sense for them to be packaged separately or
compete over namespace?

> if the FTP maintainers [...] say that this is not acceptable,
> then we'll rename it, without any bitching or
> whining or expressing opinions that we can't backup with facts.

> Basically, their ruling is law. Your opinion is just that - your opinion and 
> bear no weight at this
> moment.

It actually seemed to be an offer for collaboration with you, but I
don't see that working so well now.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/531356ba.5090...@pyro.eu.org