Re: Can we please stop enforcing Signed-off-by commits?

2019-01-17 Thread Sheogorath
On 1/17/19 12:59 PM, Randy Barlow wrote:
> On Thu, 2019-01-17 at 11:13 +0100, Miro Hrončok wrote:
>> Why do Fedora upstreams enforce this?
> 
> I enforce the DCO in Bodhi. I started doing it after attended a talk by
> Richard Fontana where he suggested it as a way to be explicit about the
> license of contributions (i.e., not just the license of the project).
> My memory is now a bit hazy, but I think there was some discussion
> about how many projects work under the assumption that the license of
> contributions is equal to the license of the project (sometimes stated
> as "license in, license out", but that most do not make this explicit.
> The DCO explicitly states that the contribution itself is granted to
> the project under the same license that the project uses.

Just adding a link to the talk:
https://www.youtube.com/watch?v=F3OxXSirek4


-- 
Signed
Sheogorath



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora Lifecycles: imagine longer-term possibilities

2018-11-14 Thread Sheogorath
On 11/14/18 12:36 AM, Matthew Miller wrote:
> 
> So, what would this look like? I have some ideas, but, really, there
> are many possibilities. That's what this thread is for. Let's figure it
> out. How would we structure repositories? How would we make sure we're
> not overworked? How would we balance this with getting people new stuff
> fast as well?
> 

I know that 13 month for hardware vendors is quite short. Some of them
have processes for approving minor updates that take 6 month or longer.
We don't talk about a new kernel update here, we really talk about a
simple update of a client application in the IoT world.

So good so far, it makes sense that they are quite unhappy with Fedora
13 month release cycles. At the same time, one of the main reasons I use
fedora is because updates are so smooth in the recent releases. I think
that's something we can bring to IoT devices as well. With ostree and
the newer ways of upgrading systems it's definitely possible to upgrade
software quite fail safe.

I would go for one more release cycle that is supported (18-19 months)
instead of going for full LTS. Since LTS is really something I think
CentOS and RHEL should do. 10 years is LTS. 36 month is only half way,
and when we want IoT devices to become more secure in the long term, I
think we should work on making them safer and easier to update instead
of setting up an LTS which then causes ugly breaking during upgrades
which we see on Ubuntu and other places.

At least that's my experience and why I would like to avoid an LTS life
cycle. And 36 or 48 months are quite short for IoT (think about the
toaster you bought. How old is it?) but quite long in the world of software.

And for Vendors of notebooks and desktops, I think the upgrade process
is ready to work for end users. Especially on defaults.

When we look here to Windows, with Windows 10 they do exactly that.
Providing a Release that lasts 6 month (+ something for business) and
then is updated. We do this for 15 years now and quite smooth, so why
change? 13 months are completely fine for a desktop.

Finally people. We have resource, but not an infinite number of them. We
have so many projects we are working on and right now automatic various
of our existing projects already takes so much work time that adding
more release cycles would only make it harder. Especially with back
porting all the fixes to the then LTS. And besides that I guess most
people who want an LTS outside of the IoT world, would go for CentOS
anyway. So may let's see if we can bring CentOS and RHEL towards IoT
instead of bringing CentOS and RHEL to Fedora. I hope/guess the way for
the latter is way shorter.

-- 
Signed
Sheogorath



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Automating package maintainers responsivity check

2018-11-17 Thread Sheogorath
On 11/17/18 11:14 AM, Mattia Verga wrote:
> I would propose some sort of automatic check of maintainer responsivity. 
> Maybe a tool that checks a packager activity in the last 6 months and if 
> there is no activity then sends an email asking the maintainer to 
> confirm they're still involved in Fedora. In case there's no reply, 
> either automatically orphan their packages or notify someone 
> (devel-list) to try to reach them.
> 
> What do you think?
> 

So basically a heartbeat for developers? Maybe make it even more
automatic. When people are not active, they get an email about the
branching. when they don't react their package is not branched to the
new release. This will cause broken builds, yes. But that's actually the
point since people will ask the maintainer to branch it **now**. When
people don't react it's time to get a new maintainer. And the people who
are maybe interested in being this new maintainer: The people who need
the package.

Maybe I'm a bit to easy with taking packages away from unresponsive
maintainers, but I think this would be a quite easy way to take care of
those things.

-- 
Signed
Sheogorath



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Proposal: Faster composes by eliminating deltarpms and using zchunked rpms instead

2018-11-19 Thread Sheogorath
On 11/18/18 7:19 PM, Stephen John Smoogen wrote:
> On Sun, 18 Nov 2018 at 12:49, Neal Gompa  wrote:
>>
>> On Sun, Nov 18, 2018 at 11:54 AM Jonathan Dieter  wrote:
>>>
>>> On Sat, 2018-11-17 at 22:30 +0100, Kevin Kofler wrote:
>>>> Jonathan Dieter wrote:
>>>>> My proposal would be to make zchunk the rpm compression format for
>>>>> Fedora.
>>>>
>>>> Given that:
>>>> 1. zchunk is based on zstd, which is typically less efficient in terms of
>>>>compression ratio than xz, depending on settings
>>>>(see, e.g., https://github.com/inikep/lzbench), and
>>>> 2. zchunk can by design only compress chunks individually and not benefit
>>>>from the space savings of a solid archive with a global dictionary,
>>>> I fear that this is going to significantly increase the size of the RPMs,
>>>> which matters:
>>>> * for the initial downloads,
>>>> * for storage (e.g., keepcache=1, local mirrors, etc.), and
>>>> * for the people not using deltas for whatever reason.
>>>>
>>>> I think zchunk makes a lot of sense for the metadata, but I am not 
>>>> convinced
>>>> that it is the right choice for the RPMs themselves.
>>>
>>> I suspect the first is true, but zchunk does actually allow for a
>>> global (per-file) dictionary that can be used to compress each chunk.
>>> The difficulty is that the dictionary has to stay the same between file
>>> versions, or the chunk checksums won't match.  There would have to be
>>> some thought put into how to generate and store the dictionaries.
>>>
>>> As for how much bigger a zchunked rpm will be compared to an xz rpm, at
>>> the moment it's a bit hand-wavy.  Based on zchunked repodata work I've
>>> done, I think we might be looking at a size that's slightly smaller
>>> than a gzipped rpm.  I won't know for sure until I put together a
>>> proof-of-concept, but I want to make sure that there aren't any gaping
>>> holes in the proposal before I do that.
>>>
>>
>> I did some work several months ago to evaluate zstd compression for
>> RPMs for Fedora, because of the lower memory and CPU usage for
>> (de)compression. However, the average size increase from xz was pretty
>> large (~20% or more on average, and nothing ever was either the same
>> or smaller), even with heavier compression settings. That might have
>> changed a bit with newer zstd releases that offer some more tunables,
>> but I think it'll remain a tough sell on disk space.
> 
> So there are at least 4 legs here:
> CPU usage (in both uncompression install and deltarpm)
> Memory usage per transaction
> Network amount
> Disk amount
> 
> I expect that the best we are going to get in any 'improvement' is
> going to be 3 out of the 4. The xz compression and delta-rpm has a
> cpu/memory tradeoff for disk and network in comparison to gzip but it
> is mostly acceptable if you have fairly modern desktops. However for
> older hardware or lower power systems that tradeoff may not be good.
> 

Good point. Given that we start to have Fedora IoT we have to look at
those creatures. IoT devices hate heavy RAM usage, hate disk usage are
half way okay with CPU usage (but keep in mind it may take an hour to
decompress) and depending on the upstream, either use mobile data for
networking or when you're lucky some WiFi/Bluetooth/… thing.

Means:
CPU usage: Getting worse here, doesn't hurt too much
Memory usage: Don't! Get! Worse!
Network amount: Well, people wouldn't be happy when it gets worse, but
mobile data gets cheaper every day.
Disk amount: People won't be happy with an increase here, but as long as
it stays somewhere within 10% it's fine, more than 20% would already
hurt a lot.

So when we want to revisit RPM, we should keep our new fellows in mind.
Maybe we get some OSTree magic going? There we already see deltas
between versions and we get chunks.

-- 
Signed
Sheogorath



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Status of OwnCloud/NextCloud

2018-05-02 Thread Sheogorath
On 05/02/2018 07:18 PM, Tomasz Torcz wrote:
> On Wed, May 02, 2018 at 04:04:11PM +0100, Naheem Zaffar wrote:
>> Looking at Nextcloud releases, it seems that they do a major release once a
>> year.
>>
>> It should be possible to catch up with the upstream even if there is a
>> single update per Fedora release.
>>
>> Update to Nextcloud 11 in Fedora 27, 12 in current Fedora 28 and then in
>> Fedora 29 cath up with upstream.
> 
> 
>   What about updates (security fixes)? I don't know Nextcloud policy,
> but each Fedora version is supported for about 13 months.  Is
> it likely to receive security fixes for not-the-latest Nextcloud
> version?
> 
According to their web page[1] they support the last two versions of
Nextcloud. So with ~1 release per year and Fedora with 13 month of
support, we are covered here.

[1]: https://nextcloud.com/security/

-- 
Signed
Sheogorath



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Hiding the grub menu by default on single OS installs

2018-05-31 Thread Sheogorath
On 05/31/2018 12:23 PM, Hans de Goede wrote:
> The goal if this email is to:
> 1) Give people an advance warning about the plan to change
> this so we can discuss this early on

Actually I'm not a fan of this change. While it was easy to explain end
users they can boot to an older, usually working version by just
selecting the other entry, this makes it more complicated.

Especially with the latest change to easily allow people to install
external repositories for NVIDIA  graphic drivers which are known to
cause trouble with latest kernels.

If we want to boot faster, lowering the timeout to 1 second sounds fine.


-- 
Signed
Sheogorath



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/5EK73FJMTL2Q6LX4LALZ7VA5ADUV4ESN/


Re: CPE Git Forge Decision

2020-04-06 Thread Sheogorath via devel
On Tue, 2020-03-31 at 13:08 -0400, Matthew Miller wrote:
> On Tue, Mar 31, 2020 at 10:48:55AM -0500, Michael Catanzaro wrote:
> > Some failure of process or communication must have occurred
> > somewhere along the lines, because open source should have been the
> > first and most important requirement. A proprietary software
> > solution is incompatible with the ethos and purpose of the Fedora
> > project. I ask CPE to revise its requirements list to include open
> > source as the first and most important requirement from the Fedora
> > community. If that's incompatible with CentOS's need for merge
> > request approvals or whatever else, then we need to accept that
> > sharing the same forge is simply not going to work.
> 
> Obviously open source is one of our key foundations. And it is part
> of who
> we are even before those foundations were drafted. Nonetheless, I
> want to
> gently discuss this a little bit. We make an entirely open source and
> free
> software operating system. We support and promote and advocate for
> open
> source and free content. But we can't do everything, and at some
> point, this
> becomes "this is why we can't have nice things". I see that you've
> made
> contributions to other open source projects on GitHub and (hosted)
> GitLab
> this month. Lots of Fedora contributors have and will continue to do
> so.
> Many use that as their main hosting. It's not ideal, but it's not the
> end of
> the world. I don't see Fedora making use of non-open hosted services
> as the
> end of the world either, if that is what is best for us.
> 
> We did communicate as the very top line of our gathered requirements
> that
> open source is essential to our community and central to our
> feedback. I'm
> not trying to be soft on that. Let's just not do purity-test level
> assessments and instead focus on our goals.
> 

I actually have just one question about this decision, because so far,
and I read a lot, but not all mails regarding this, haven't answered
that:

Let's say the scenario is that we run GitLab EE for Fedora. Can we
make sure that at least all customization and modifications that are
done by Fedora contributors or in the name of Fedora executed by the
Gitlab team, will end up in GitLab-foss i.e. open source?

And what really makes me wonder in the whole process: According to
various mails from the CPE the deal that will come out, like features,
price, … is not yet figured out. Not even the plan what GitLab version
CPE is about to go for. But the decision to go for GitLab is already
made? How does that work and isn't that basically torpedoing every
price negotiation?

Hope we can figure those questions out.

-- 
Signed
Sheogorath

OpenPGP: https://shivering-isles.com/openpgp/0xFCB98C2A3EC6F601.txt


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Encrypted DNS in Fedora

2019-11-07 Thread Sheogorath via devel
On Thu, 2019-11-07 at 07:47 -0700, stan via devel wrote:
> On Thu, 7 Nov 2019 12:20:50 +0100
> David Sommerseth  wrote:
>  
> > Please just watch the talk by Paul Vixie (who is one of the really
> > big DNS gurus these days, even ISC BIND maintainer for quite some
> > years).  And you will see that DoH is pointless when you have DoT.
> > But DoT can also go much further than DoH will, when you consider
> > the
> > bigger part of the DNS query chain.
> 
> Thank you for pointing to that talk.  I found it very informative, as
> a
> mostly ignorant user of DNS.  I run knot-resolver as a local caching
> DNS
> server, pulling from, ironically, 1.1.1.1 via the router, and
> bypassing
> my ISP's DNS servers.  Really opened my eyes.
> 

The talk is right on many points, but I think it dismisses the most
essential point DoH does right: DNS is a decision of the device owner.

When you are the real owner of the device, you can configure the device
to use whatever DoH server you want. This includes company DoH servers.

We have to stop to make security products that rely on the same
mechanisms as an attacker would use.

For corporate environments use Puppet, Ansible, GPOs, MDM, whatever
your company device management you have to use at scale anyway, to
configure your preferred DoH server, which then can apply all the
measures he is talking about to protect things.

For private setups: Take the 10 minutes it takes to configure devices
properly instead of relying on easy to break network attacker-based
solutions.

And when you give a device to your kids, then it will probably just
take them one internet search to learn how to use the /etc/hosts file
in order to access evilpage.com.

I agree that DoH and DoT doesn't bring so much more privacy, but it
provides integrity to DNS that unencrypted DNS even with DNSSec is
lagging as an attack can always opt to not answer for a specific domain
name.

And whenever or not applications of the system should implement it, is
probably decided by how fast the system side will decide to deploy
encrypted DNS effectively.

-- 
Signed
Sheogorath

OpenPGP: https://shivering-isles.com/openpgp/0xFCB98C2A3EC6F601.txt


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Encrypted DNS in Fedora

2019-11-08 Thread Sheogorath via devel
On Thu, 2019-11-07 at 21:25 +0100, Nicolas Mailhot via devel wrote:
> Le jeudi 07 novembre 2019 à 18:32 +0100, Sheogorath via devel a écrit
> :
> > The talk is right on many points, but I think it dismisses the most
> > essential point DoH does right: DNS is a decision of the device
> > owner.
> 
> And the owner should be able to delegate this decision to the network
> manager.
> 

Then let's talk on how we properly implement this delegation process
instead of asking ourselves whenever we want DoH or DoT or not.

Let's find a DHCP/RA option that indicates a DoT or DoH service is
available or something similar. Simply stating "encrypted DNS is
pointless" is nothing I consider a valid solution.

> Suggesting static config is good enough outside the enterprise is a
> joke. Count the number of networked things in the modern home, it
> grows
> every years. A lot of those roam, either because they are designed to
> roam (smartphones) or because people vacation, because they like to
> share their stuff with friends and families, because they like to
> show
> of. A lot of those are cheap-ass gadgets that will revert (reset) to
> factory settings at the slightest problem (sometimes, just because
> the
> battery is dead, the juice was cut, and settings are kept in memory).
> 

And how are those devices related to Fedora? I mean, our goal here
should be to do things right or at least better. When we take those IoT
devices as our standards, then we can throw away SELinux, run stone-age 
kernels and we can also ignore the existence of updates for our
systems. We are Fedora, we want to lead tech towards a better
standards, not stay around in the status quo where everyone else
already is.

> Ansible or puppet are not designed to solve such generic situations.
> 
> Network management is no longer an enterprise-only concern.
> 
> Treating it as a sysadmin problem does not work.
> 
> The network happened. And not only internet side.
> 

I really hope for more IPv6 to happen (properly), so pretty much
everything becomes the internet. It makes so many things a lot easier
and a lot less security through obscurity.

-- 
Signed
Sheogorath

OpenPGP: https://shivering-isles.com/openpgp/0xFCB98C2A3EC6F601.txt


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora Workstation and disabled by default firewall

2019-09-02 Thread Sheogorath via devel
On 8/27/19 3:25 AM, John Harris wrote:
> On Monday, August 26, 2019 7:25:27 AM MST Iñaki Ucar wrote:
>> On Mon, 26 Aug 2019 at 15:25, Robert Marcano 
>> wrote:
>>>
>>>
>>> On 8/26/19 9:07 AM, mcatanz...@gnome.org wrote:
>>>
>>>>
>>>>
>>>> Well the thing is, blocknig ports tends to break applications that want
>>>> to use those ports. We're not going to do that, period. It also doesn't
>>>> really accomplish anything: either your app or service needs network
>>>> access and you have whitelisted it (in which case the firewall provides
>>>> no security), or it needs network access and you have not whitelisted
>>>> it
>>>> (in which case your firewall breaks your app/service). In no case does
>>>> it increase your security without breaking your app, right? Unless you
>>>> have malware installed (in which case, you have bigger problems than
>>>> the
>>>> firewall). Or unless you have a vulnerable network service installed
>>>> that you don't want (in which case, uninstall it).
>>>
>>>
>>>
>>> This is a reasonable point of view, until you notice Linux desktops
>>> evironments don't provide applications with a method to detect if they
>>> are running on a private network or not (See Windows Home, Office,
>>> Internet network settings).
>>
>>
>> That's a very good point. When Windows connects to a new network, it
>> asks whether it's a home connection (and then you want to share
>> resources in the network) or it's a public connection (and everything
>> should stay private). And I think that, if the user simply ignores the
>> notification, the default is to consider it a public network (not 100%
>> sure though). That's a good policy I think, and it would be great if
>> NetworkManager could do that.
>>
>> I understand mcatanzaro's point of view, but it's quite narrow,
>> because laptops not only connect to home networks to share resources,
>> but also to many insecure public WiFis. I don't think we should rely
>> on chasing upstream developers to behave in a *possibly* insecure
>> environment. The system should abstract this for them and set proper
>> firewall rules.
> 
> Keep in mind that even Windows doesn't address the use case where you set it 
> to Home or Business, or whatever the private setting is, and then plug in a 
> connection to a public network. It thinks it's still the same.
> 

I had something back in mind that tickled, when I read this. Because I
remember that Windows 7 did something with the default Gateway mac
address, so I did some digging.

https://web.archive.org/web/20170405202217/https://blogs.technet.microsoft.com/networking/2010/09/08/network-location-awareness-nla-and-how-it-relates-to-windows-firewall-profiles/

There is quite some documentation about how Windows
determines/determined when it was connected to a different network
(being it by wire or WiFi). Even when this information is might outdated
when looking at Windows 10.

Hope that helps to provide some inspiration towards solving this problem
and create better Firewall rule sets :)

(But in general it sounds like something that should go into
NetworkManager and could be useful for easier network profiles)

-- 
Signed
Sheogorath



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora Workstation and disabled by default firewall

2019-09-02 Thread Sheogorath via devel
On 8/28/19 1:01 AM, Adam Williamson wrote:
> On Tue, 2019-08-27 at 15:06 +0200, Jiri Eischmann wrote:
>> mcatanz...@gnome.org píše v Út 27. 08. 2019 v 15:07 +0300:
>>> On Tue, Aug 27, 2019 at 4:22 AM, John Harris 
>>> wrote:
>>>> No, that is not how this works, at all. First, let's go ahead and
>>>> address the 
>>>> idea that "if the firewall blocks it, the app breaks, so it's the
>>>> firewall's 
>>>> fault": It's not. If the firewall has not been opened, that just
>>>> means it 
>>>> can't be accessed by remote systems until you EXPLICITLY open that
>>>> port, with 
>>>> the correct protocol, on your firewall. That's FINE. That's how
>>>> it's designed 
>>>> to work. There's nothing wrong with that.
>>>>
>>>> This means that the system administrator (or owner, if this is
>>>> some 
>>>> individual's personal system) must allow the port to be accessed
>>>> remotely, 
>>>> before the app can be reached remotely, increasing the security of
>>>> the system.
>>>
>>> You've already lost me here. Sorry, but we do not and will not
>>> install a firewall GUI that exposes complex technical details like
>>> port numbers. Expecting users to edit firewall rules to use their
>>> apps is ridiculous and I'm not really interested in debating it.
>>
>> Yeah, when you ask users questions they're not qualified to answer,
>> you're just creating bad design.
>> I always imagine my mom (who BTW has been a Fedora user for years) how
>> she'd deal with that and I can't really imagine her opening/closing
>> firewall ports. She'd be puzzled even by "Do you trust this network?"
>> and would probably just click "Yes" to make it go away. No additional
>> security, just annoying UX.
> 
> However, Fedora Workstation is an edition. Which means it has a
> *policy-defined* target audience. That target audience is defined here:
> https://fedoraproject.org/wiki/Workstation/Workstation_PRD#Target_Audience
> 
> Case 1: "Engineering/CS student"
> Case 2: "Independent Developer"
> Case 3: "Small Company Developer"
> Case 4: "Developer in a Large Organization"
> 
> Are those people we believe do not understand the concepts associated
> with firewalls?
> 

Let's get real. It doesn't matter if you understand firewalls or not.
Reality is that developers run applications they are working on in
development configurations on their local system. With some luck they
are properly configured but as far as I know most dev setups, they are
not considered secure or "production-ready" and that for good reasons.

But what do we do after a long day? We take our notebook and close the
lid at the end of a long day or when we head over to this annoying
meeting with the new customer. We probably don't close and shut down all
services we are developing/testing in background. Then we head over
there, open the notebook and of course need some kind of
presentation/picture/data we stored on the cloud storage provider of our
trust. We connect to the public/unknown WiFi and *boom* suddenly we have
unexpected open ports on a public network we didn't to expose them to.

This is not something that people do on purpose but it simply happens.
It's how we use devices nowadays.

So I guess it would already improve the situation when we would only
open the ports on install, which by far isn't a perfect solution but
would already prevent the scenario mentioned above. Which appears no
matter if someone is aware of firewall concepts or not.

Let's work on solving this problem for everyone, because it's a general
problem.

-- 
Signed
Sheogorath



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora in GNOME Online Accountes

2019-09-18 Thread Sheogorath via devel
On 9/18/19 11:18 AM, Felipe Borges wrote:
> Hi!
> 
> On Wed, Sep 18, 2019 at 11:07 AM  wrote:
>>
>> Hello, I don't know if this is the right place to ask this question.
>> Btw, on Fedora 31, in the Online Accounts list there is a "Fedora"
>> voice  alongside "Google", "Nextcloud" and so on. What is its purpose?
> 
> The "Fedora" account is just a branded Kerberos account. By adding a
> Fedora account in GNOME Online Accounts you would get automatically
> signed on whenever you'd need to enter your FAS credentials. This
> means while accessing Pagure, participating in discussions in
> discussion.fedoraproject.org, and also while using Bodhi, Koji, and
> all.
> 

Just out of curiosity, is this done by a patch or with a separate package?

-- 
Signed
Sheogorath

OpenPGP: https://shivering-isles.com/openpgp/0xFCB98C2A3EC6F601.txt



signature.asc
Description: OpenPGP digital signature
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: Fedora 32 System-Wide Change proposal (late): Enable EarlyOOM

2020-01-07 Thread Sheogorath via devel
On Sat, 2020-01-04 at 12:17 -0600, Michael Catanzaro wrote:
> On Sat, Jan 4, 2020 at 11:38 am, Zbigniew Jędrzejewski-Szmek 
>  wrote:
> > What about using the memory controller for user units to allocate
> > memory resources between the processes in the user session? Thanks
> > to
> > recent developments, the gnome session uses separate systemd units
> > (and thus separate cgroups) for various services. We could set 
> > attributes
> > like memory.low for "the basic components of the user session",
> > and on the other hand, memory.swap.max for "the payload", i.e.
> > various
> > user processes on top.
> 
> This looks interesting. I'd love to see more serious discussion of
> this 
> proposal. Carving out dedicated memory for essential desktop
> processes 
> seems like something we should be able to do in 2020.
> 

And it seems like it is: In the issue about this whole topic some
implemented solutions where mentioned: 
https://github.com/Nefelim4ag/Ananicy

But not further commented at least on pagure. 
https://pagure.io/fedora-workstation/issue/98#comment-615424

Which I think is quite sad as those seem to be the way better way to
handle those things. Having a daemon that assigns cgroups to processes
seems to let the kernel do its thing and keep us all sane and keeps the
system reasonable responsive.

I guess the important question here is: Does it really prevent hanging
and what's the origin of hanging? Is it that the kernel starts to swap
and therefore eats up all CPU time or is it the programs in foreground
that suddenly all try to get their piece of memory back that forces
kswapd onto the CPU?

My guess would be the latter, but I'm sure the group who did the
research on this topic has a better insight into this.

-- 
Signed
Sheogorath

OpenPGP: https://shivering-isles.com/openpgp/0xFCB98C2A3EC6F601.txt


signature.asc
Description: This is a digitally signed message part
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org