Hi Daniel,

I actually suspected such (maturity) reasons after playing around with
it for a moment. And I do understand and agree with them.

So for now, please add the following or a similar sentence after "This
package contains the network daemon, which will accept and wrap
traffic redirected to it." in tcpcryptd's package description to make
people not expect a system service (as I did):

  So far this package does not start the service automatically. Please
  see the provided example script on how to start it.

Maybe the second sentence belongs to README.Debian instead, but I
think the package description is not a bad place either for now.

Daniel Kahn Gillmor wrote:
> On 08/08/2014 09:28 AM, Axel Beckert wrote:
> > while it seems that the provided
> > /usr/share/doc/tcpcryptd/examples/launch_tcpcryptd.sh seems to take care
> > of making the user aware that starting it may interrupt existing
> > connections, I think, it would be very useful and following the idea of
> > opportunistic encryption if tcpcryptd would be started by default,
> > e.g. via some init.d script.
> > 
> > Maybe a debconf question of priority low or medium could ask the user if
> > it should be enabled by default, with the default set to yes.
> 
> yes, this is definitely on the agenda for the package.  (see debian/TODO
> for additional packaging work plans).  I hope to get a sensible systemd
> tcpcryptd.service file sorted out during debconf

Please also provide an init.d script. Please do not make this package
dependent on systemd. I can imagine there are quite some paranoid
people out there who not trust systemd.

> there are a lot of possible nuances of how things could go wrong with
> enabling such a service by default -- from making sure it handles
> changes in network status properly, to questions about "phone-home"
> behavior on startup, to concerns about client linkability, to
> interaction with existing firewall rules,

Indeed. I must admit, I didn't get it working yet with the provided
example script. On one machine 3/6 tests failed, on another machine it
already failed to set the initial iptables rules and I haven't yet
found out why. (Both machines had fail2ban on it, but no further
iptables usage. The one where it failed immediately was a Xen DomU.)

> to the scary possibility of locking out the administrator of a
> remote machine if something goes wrong.

As far as I've understood it should suffice to disable tcpcrypt on his
local machine in that case.

> So for the moment, the package will be a tools-only package, not one
> that supplies a system service in any automated way.

I can understand that.

> But i'd be very happy for help/suggestions/patches to add a system
> service that address any of the above concerns.

As soon as I've understood what goes wrong with the example script in
my cases I may file more reports (I don't want to call them "bug
reports" :-) with how I had to improve the script to make it work. I
think this will also enlarge the chances to make it a system service
at some point in the future.

                Regards, Axel
-- 
 ,''`.  |  Axel Beckert <a...@debian.org>, http://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE
  `-    |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to