Re: Fixing non-reproducibility in some guile packages

2017-02-12 Thread Andy Wingo
Hi :) [+guile-devel] On Mon 13 Feb 2017 07:18, Maxim Cournoyer writes: >>> ;;; note: auto-compilation is enabled, set GUILE_AUTO_COMPILE=0 >>> ;;; or pass the --no-auto-compile argument to disable. >>> ;;; compiling >>> /gnu/store/d3gli8g5bv6yhd3qwk5rfzqpsfvnj4lv-guile-nex

Re: [GNU-linux-libre] Free firmware - A redefinition of the term and a new metric for it's measurement.

2017-02-12 Thread Maxim Cournoyer
Hi, Christopher Howard writes: > On 02/10/2017 08:31 AM, David Craven wrote: >> Hi Maxim >> >>> +1. I don't see how having blobs helps security at all. >> >> Well the problem I was getting at is that things are not as fixed as >> they may seem. >> Quoting wikipedia: >> Decreasing cost of

Re: [PATCH 2/3] gnu: Add libfilezilla.

2017-02-12 Thread Maxim Cournoyer
Hi, ren...@openmailbox.org writes: > Hello Maxim, > > On 2017-02-12 20:26, Maxim Cournoyer wrote: >> Hi, >> > offering/offers/ or s/offering/provides/ >> >>> +(license gpl3+))) >> >> Only license information I could find is the COPYING file which is >> GPLv2. I think gpl2+ would be more appro

Re: Fixing non-reproducibility in some guile packages

2017-02-12 Thread Maxim Cournoyer
Hi! Christopher Allan Webber writes: > Jan Nieuwenhuizen writes: > >> While building guile2.2-gdbm-ffi an error is printed that does not >> prevent the package from being built >> >> @ build-started >> /gnu/store/z9m20fz1ayyl0g9b4ad6wgmq3fv2h7gi-guile2.2-gdbm-ffi-20120209.fa1d5b6.drv >> - x

Re: [PATCH 2/3] gnu: Add libfilezilla.

2017-02-12 Thread rennes
Hello Maxim, On 2017-02-12 20:26, Maxim Cournoyer wrote: Hi, offering/offers/ or s/offering/provides/ +(license gpl3+))) Only license information I could find is the COPYING file which is GPLv2. I think gpl2+ would be more appropriate. grepping libfilezilla directory, i see glp2 an

Re: [PATCH 3/3] gnu: Add filezilla.

2017-02-12 Thread Maxim Cournoyer
Hi, rennes writes: > * gnu/packages/ftp.scm (filezilla): New variable. > --- > gnu/packages/ftp.scm | 48 +++- > 1 file changed, 47 insertions(+), 1 deletion(-) > > diff --git a/gnu/packages/ftp.scm b/gnu/packages/ftp.scm > index 0fef1b160..129f04ef6

Re: [PATCH 2/3] gnu: Add libfilezilla.

2017-02-12 Thread Maxim Cournoyer
Hi, rennes writes: > * gnu/packages/ftp.scm (libfilezilla): New variable. > --- > gnu/packages/ftp.scm | 24 > 1 file changed, 24 insertions(+) > > diff --git a/gnu/packages/ftp.scm b/gnu/packages/ftp.scm > index 7380fcfc3..0fef1b160 100644 > --- a/gnu/packages/ftp.scm

Re: Archive authentication & ‘guix challenge’

2017-02-12 Thread Maxim Cournoyer
Hello, l...@gnu.org (Ludovic Courtès) writes: > myglc2 skribis: > >> On 02/09/2017 at 17:36 Ludovic Courtès writes: > > [...] > >>> Could it be that the ‘guix archive’ you ran uses a configuration >>> directory other than this one? What does: >>> >>> guile -c '(use-modules (guix config)) (pk

Re: Running services in containers

2017-02-12 Thread Maxim Cournoyer
Hi! Ricardo Wurmus writes: > Ludovic Courtès writes: > >> Those who didn’t have the luck to be at FOSDEM missed this not-so-visual >> demo I made of a Shepherd service running in a container. :-) >> >> I’ve polished the thing on my way back and pushed the result, using >> BitlBee as an example

Re: Commits signed by key not registered on Savannah

2017-02-12 Thread Leo Famulari
On Sun, Feb 12, 2017 at 04:55:14PM -0500, Mark H Weaver wrote: > David Craven writes: > > The integrity of our source code is given by peer review - we are > > subscribed to the commits ML so we see other peoples commits. > > If we're concerned about security (and we should be), then we should no

Re: Commits signed by key not registered on Savannah

2017-02-12 Thread Mark H Weaver
David Craven writes: > The integrity of our source code is given by peer review - we are > subscribed to the commits ML so we see other peoples commits. If we're concerned about security (and we should be), then we should not rely on the commits mailing list (or any web interface) to show us the

Re: [PATCH] gnu: ffmpeg: Build with SDL support.

2017-02-12 Thread Marius Bakke
Arun Isaac writes: > SDL is required for the `ffplay' executable to be built. > > * gnu/packages/video.scm (ffmpeg)[inputs]: Add sdl2. This increases ffmpegs closure size from 518.9 MiB to 525.7 MiB, which seems fine to me. If no one objects I will push this tomorrow or so. signature.asc Descr

Re: [PATCH] gnu: lcms: Update to 2.8.

2017-02-12 Thread Marius Bakke
Alex Vong writes: >>> Besides, the security bug in which 'lcms-fix-out-of-bounds-read.patch' >>> fixed has been assigned CVE-2016-10165 according to [0], should we >>> change the name of the patch? >>> >>> [0]: https://bugzilla.redhat.com/show_bug.cgi?id=1367357 >> >> Good catch. Would you like t

Re: bug#25463: guile-2.0.13 Check errors

2017-02-12 Thread Ludovic Courtès
Hello! Manolis Ragkousis skribis: > Locally on Hurd I am using this patch > http://paste.lisp.org/display/338954 on the glibc/hurd package to work > around that test failure. Ideally we need to modify the way guile > handles time.[1] Does ‘glibc/hurd’ have this patch in ‘core-updates’? Should

Re: Add murmur.

2017-02-12 Thread David Craven
Hi Hartmut, Sorry for my snide remark... >> This hypothetical attacker is trying to escalate privileges. I don't >> see how starting an unprivileged process would help with that. > > Well, simply by an exploiting a bug in that software. This is a quite > common case :-) It is my understanding th

Re: Add murmur.

2017-02-12 Thread pelzflorian (Florian Pelz)
On 02/12/2017 06:01 PM, Hartmut Goebel wrote: > Am 12.02.2017 um 15:37 schrieb David Craven: >> I think that it is a minor >> issue at best, since anything that isn't accessible over the network or >> running >> with any sort of privileges is not very useful. > > I strongly disagree! > > Every p

Re: Fixing non-reproducibility in some guile packages

2017-02-12 Thread Christopher Allan Webber
Jan Nieuwenhuizen writes: > While building guile2.2-gdbm-ffi an error is printed that does not > prevent the package from being built > > @ build-started > /gnu/store/z9m20fz1ayyl0g9b4ad6wgmq3fv2h7gi-guile2.2-gdbm-ffi-20120209.fa1d5b6.drv > - x86_64-linux > /var/log/guix/drvs/z9//m20fz1ayy

Re: Add murmur.

2017-02-12 Thread Hartmut Goebel
Am 12.02.2017 um 15:37 schrieb David Craven: > I think that it is a minor > issue at best, since anything that isn't accessible over the network or > running > with any sort of privileges is not very useful. I strongly disagree! Every piece of software available on the system may the intruder. T

Re: server and client in one package -> security issue

2017-02-12 Thread Hartmut Goebel
Am 12.02.2017 um 13:53 schrieb David Craven: > By development files I assume you mean header files? I don't see how those can > pose a security problem. Can you elaborate? Yes, I meant header files, but also pkgconfig files and all this stuff (including documentation). Having this (and compilers,

FAIL: tests/cpan.scm, tests/gem.scm, tests/pypi.scm, tests/crate.scm

2017-02-12 Thread John Darrington
After merging a very recent master, I get four test failures when running make check: FAIL: tests/pypi.scm FAIL: tests/cpan.scm FAIL: tests/gem.scm FAIL: tests/crate.scm Looking in test-suite.log there is the rather odd messge: actual-value: #f actual-error: + (wrong-number-of-args + #f +

Re: Auditing CPE names

2017-02-12 Thread Leo Famulari
On Sat, Feb 11, 2017 at 02:53:46PM -0500, Leo Famulari wrote: > It's important to name the package in accordance with the CPE or set > the cpe-name property, or else `guix lint -c cve` won't work for that > package. In commit 84b60a7cdfc (gnu: lcms: Fix an out-of-bounds read.) I tried to set the c

Re: Auditing CPE names

2017-02-12 Thread Ludovic Courtès
Leo Famulari skribis: > I wonder if anyone checks the Common Platform Enumeration (CPE) names of > new packages when creating them? > > It's important to name the package in accordance with the CPE or set > the cpe-name property, or else `guix lint -c cve` won't work for that > package. > > There

Re: Add murmur.

2017-02-12 Thread David Craven
> You read too much between the lines in my words. > I'm not counting on the certifications of Harmut. I simply agree with > the reasoning that no client and server should be combined if possible > to limit the attack surface. That's all. That may be true. It was my intention to back Ludo. I thin

How to M-x debbugs-gnu with new guix-patches

2017-02-12 Thread Christopher Allan Webber
So! We have a new debbugs tracking of guix-patches. Great! Those who are emacs users in the know probably like to use the M-x debbugs-gnu interface. Here's what you need to do: Add this to your .emacs: (add-to-list 'debbugs-gnu-all-packages "guix-patches") Now open up debbugs-gnu: C-u M-x

Re: [PATCH 1/1] gnu: screen: Fix CVE-2017-5618.

2017-02-12 Thread Ludovic Courtès
Leo Famulari skribis: > * gnu/packages/patches/screen-CVE-2017-5618.patch: New file. > * gnu/local.mk (dist_patch_DATA): Add it. > * gnu/packages/screen.scm (screen)[source]: Use it. LGTM, thank you! Ludo'.

New guix-patches mailing list hooked to Debbugs!

2017-02-12 Thread Ludovic Courtès
Hello Guix! We now have a new guix-patc...@gnu.org mailing list hooked to Debbugs to handle patches! https://bugs.gnu.org/guix-patches https://lists.gnu.org/mailman/listinfo/guix-patches You’re welcome to subscribe to it right away. Patches should now be sent to guix-patc...@gnu.org, especi

Re: [PATCH] gnu: Add tftp-hpa.

2017-02-12 Thread Gábor Boskovits
Hello! #1 A post on the list cought my attention regarding security of packages with both server and client. I think that should also apply to this package. I am waiting for follow ups on that. #2 I have discussed the licensing issues with Thomas Danckaert, but waiting for confirmation wether the

Re: Debbugs handling of Guix patches

2017-02-12 Thread Ludovic Courtès
Glenn Morris skribis: > I see you got this sorted out, so I've now completed the debbugs part. > It may take an hour or so for the mailing list redirection to take effect. It seems to be working now: https://debbugs.gnu.org/cgi/pkgreport.cgi?pkg=guix-patches Thanks, Glenn! Ludo'.

Re: Add murmur.

2017-02-12 Thread ng0
On 17-02-12 14:57:05, David Craven wrote: > > Okay. I prefer to wait for the outcome of the discussion around > > server+client merging. I'm in favor of separating for the reasons Harmut > > mentioned. > > This is a free software community. Anyone that needs to assert his authority > with external

Re: Announcement regarding the oss-security mailing list

2017-02-12 Thread Ludovic Courtès
Hi Leo, Leo Famulari skribis: > I look at the lwn.net security advisories, the Debian security-announce > mailing list, `guix lint -c cve`, the upstream bug trackers of a handful > of packages, and even some Twitter personalities. For me it’s mostly oss-sec, LWN, and ‘guix lint’. The good thin

Re: Add murmur.

2017-02-12 Thread David Craven
> Okay. I prefer to wait for the outcome of the discussion around > server+client merging. I'm in favor of separating for the reasons Harmut > mentioned. This is a free software community. Anyone that needs to assert his authority with external certifications rather than actions and sound reasonin

Re: [Savannah-hackers-public] New guix-patches mailing list not showing up on Mailman

2017-02-12 Thread Ludovic Courtès
Karl Berry skribis: > I created a new ‘guix-patches’ mailing lists ~48h ago on Savannah. > > I just created it by hand. Assaf is looking into the PHP<->Savannah > linkage/breakage. --best, karl. Perfect. Thank you Karl & Assaf! Ludo’.

Re: Add murmur.

2017-02-12 Thread ng0
On 17-02-12 14:37:53, Ludovic Courtès wrote: > ng0 skribis: > > > On 17-02-11 15:31:15, Ludovic Courtès wrote: > >> ng0 skribis: > > [...] > > >> > As far as I know right now, it does not have any graphical features or > >> > dependencies. > >> > > >> > mumble:murmur -> total: 1072.6 MiB > >>

Re: bug#25463: guile-2.0.13 Check errors

2017-02-12 Thread Manolis Ragkousis
Hello Renes, On 02/12/17 10:37, ren...@openmailbox.org wrote: > Now the following error is left: > > Running time.test > FAIL: time.test: internal-time-units-per-second: versus times and sleep > Running tree-il.test > > Totals for this test run: > pass

Re: Commits signed by key not registered on Savannah

2017-02-12 Thread Ludovic Courtès
Hi! The idea that I had while trying to see how to map TUF to Git¹ was to store keys in the Git repo we’re authenticating. We’d store a list of “authorized keys” for each “role” that we define. One of the roles would be “update the authorized committer keys”, for instance. Thus, to authenticate

Re: Add murmur.

2017-02-12 Thread Ludovic Courtès
ng0 skribis: > On 17-02-11 15:31:15, Ludovic Courtès wrote: >> ng0 skribis: [...] >> > As far as I know right now, it does not have any graphical features or >> > dependencies. >> > >> > mumble:murmur -> total: 1072.6 MiB >> > mumble:out-> total: .2 MiB >> >> And what about the total

Re: `guix pull` over HTTPS

2017-02-12 Thread Ludovic Courtès
Ricardo Wurmus skribis: > Leo Famulari writes: > >> However, I think that pulling code over HTTPS using a certificate store >> like nss-certs or from the host distro is a huge improvement over what >> we have now. If we can do that sooner, we should. > > I agree. If it’s easy to make the “le-ce

Re: server and client in one package -> security issue (was: Add murmur)

2017-02-12 Thread David Craven
> And from my point of view Guix already has a medium problem of acceptance > since it munges development-files and run-time files into one package - as we > do for all libraries. By development files I assume you mean header files? I don't see how those can pose a security problem. Can you elabor

Re: server and client in one package -> security issue (was: Add murmur)

2017-02-12 Thread ng0
On 17-02-12 13:23:09, Hartmut Goebel wrote: > Am 09.02.2017 um 23:50 schrieb Ludovic Courtès: > > I think the only reason to separate things usually is size, not > > “aesthetics.” So I’d be in favor of keeping both in the same output if > > there’s no size problem. > > Separating clients and serv

Re: Commits signed by key not registered on Savannah

2017-02-12 Thread David Craven
> Would the git repository, or a new git repository (guix-keys.git?) be a > bad idea? Best case, we craft something which serves as an GNUPG_HOME > for the keys which then live in the keyring of this thing (compare to > gentoo-keys, debian-keys, etc). I don't think that is a good idea. Placing it

server and client in one package -> security issue (was: Add murmur)

2017-02-12 Thread Hartmut Goebel
Am 09.02.2017 um 23:50 schrieb Ludovic Courtès: > I think the only reason to separate things usually is size, not > “aesthetics.” So I’d be in favor of keeping both in the same output if > there’s no size problem. Separating clients and servers is not an "aesthetic" thing. It's a matter of securi

Re: Commits signed by key not registered on Savannah

2017-02-12 Thread ng0
On 17-02-12 00:41:38, David Craven wrote: > > It might be nice to associate with each committer, a list of all keys > > that they have ever used to sign commits in our git repository. > > > Keys would be added to the list over time, but never removed. > > Sounds good. Where would we put that list

Re: Debbugs handling of packages

2017-02-12 Thread ng0
On 17-02-08 20:15:46, Andreas Enge wrote: > On Wed, Feb 08, 2017 at 03:29:31PM +0100, Ricardo Wurmus wrote: > > Just a question: does this mean that patch *sets* should be flattened > > before sending them so that they are part of the *same* debbugs issue > > (instead of being scattered across as m

[PATCH] gnu: Add font-google-material-design-icons.

2017-02-12 Thread José Miguel Sánchez García
-- José Miguel Sánchez GarcíaFrom 8b9659a427ef460d91a985a4d014bef05a0341d8 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jos=C3=A9=20Miguel=20S=C3=A1nchez=20Garc=C3=ADa?= Date: Sun, 12 Feb 2017 12:26:42 +0100 Subject: [PATCH] gnu: Add font-google-material-design-icons. * gnu/packages/font.scm (fon

[PATCH] gnu: Add simh.

2017-02-12 Thread José Miguel Sánchez García
-- José Miguel Sánchez GarcíaFrom 1b3ed6f71861cc59493cde95171834139317b561 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jos=C3=A9=20Miguel=20S=C3=A1nchez=20Garc=C3=ADa?= Date: Sun, 12 Feb 2017 12:33:49 +0100 Subject: [PATCH] gnu: Add simh. * gnu/packages/simh.scm: New file. * gnu/local.mk (GNU_SY