bug reports (was: Re: md5sum passwords)

1995-11-15 Thread Bill Mitchell

On Wed, 15 Nov 1995, Daniel Quinlan wrote:

> Open input is good, in general.  If you want to guarantee haggling, do
> it on a mailing list.  If you don't want haggling, have input sent to
> a responsible party.

Good point.  I agree.  General distribution of bug reports is a useful
option, but shouldn't be the default.

> [...] If you want to speed things up, I suggest these initial steps:
> 
>  - Send bug reports only to the maintainer, mirror them on a WWW-site.
>(A good example -- http://www.cogs.susx.ac.uk/cgi-bin/ltxbugs2html)
>Maybe also send them to packages that are related.  Mirroring
>the bugs to debian-devel was a stupid idea from the beginning, IMHO.

Mirroring bug reports to debian devel was done because it was
convenient, I think.  Bug reports weren't, and still are not, sent
to package maintainers because that is inconvenient to implement.
I've said, and I still think,  think that it'd be a good idea to
deal with that implementation inconvenience in the intrests of
effectiveness.

>  - Try to send comments to the maintainer, unless it's something that
>really concerns everyone.

Bug reports should go directly to the maintainer, I think.  The very
long list of un-actioned bug reports indicates to me that either
bugs aren't being dealt with very well or that many maintainers are
very delenquent in closing completed bug reports.  I think we have
both of those cases represented.  I'd like to see this list still
appear on debian-devel, but be sorted by maintainer with a subsort
by package.  I think that'd be much more useful, if a bit less
convenient to implement.



Bug#1865: cmr10 at 10.0pt not loadable: Metric (TFM) file not found.

1995-11-15 Thread birkholz
Package: kpathsea
Version: 2.6-1

LaTeX did not work after I purged the old TeX packages and installed the
new ones.  This is what happened:

$ latex 951115.tex
This is TeX, Version 3.1415 (C version 6.1)
(951115.tex
LaTeX2e <1995/06/01> patch level 1
(/usr/lib/texmf/tex/latex/latex209.def
Entering LaTeX 2.09 compatibility mode.
(/usr/lib/texmf/tex/latex/tracefnt.sty) 
(/usr/lib/texmf/tex/latex/latexsym.sty)
kpathsea: Appending font creation commands to missfont.log.

! Font OT1/cmr/m/n/10=cmr10 at 10.0pt not loadable: Metric (TFM) file not 
found
.

   relax
l.355 \selectfont

?

I set KPATHSEA_DEBUG=63 and tried again.  It looks like kpathsea is looking
for cmr10.tfm in the path=.:/var/spool/texmf/fonts/tfm//
:/usr/local/lib/texmf/fonts/tfm//:/usr/lib/texmf/fonts/tfm//.
Unfortunately, the textfm package puts the font metric files in
/usr/lib/texmf/fonts/metafont/tfm/, not /usr/lib/texmf/fonts/tfm/.

I was able to get latex and dvips working by symlinking
/usr/lib/texmf/fonts/metafont/tfm/ to /usr/lib/texmf/fonts/tfm/.

I'll append the compressed debugging log.

Matt Birkholz <[EMAIL PROTECTED]>
PGP 2.6.2 Public Key ID = 74305425
Key Fingerprint = B3 34 FB 3E 3C FE E8 57  AA B4 B2 95 A7 C0 1E AF
Finger [EMAIL PROTECTED] for key.  (Note missing "z"; thank you, Primenet.)

begin 660 kpathsea.log.gz
M'XL("`.6J3```VMP871HOX(`^)$"J#Z?)DJ#I
MT&U--ZQIBB4;[EMAIL PROTECTED]&7*)D*1*D4GSG[]2,FV1$IR13+]>[EMAIL 
PROTECTED]>\[AU;V7
ME[+D9P"M"L8%^./#ZYO?KM^\OOWUS<]_O3T_/@R>`0(%6H'3HR1)CD+Y:W`W
M0]/E_.P:09XN0`'%`F2,@S"E&<@P0278RSC+0<@"+
[EMAIL PROTECTED]"IZ1S$S;#J8`J%`DT9S?"\4EY/YASL44912VI%5
M=B91\^XI-YQO$0Y`OBS%+5KA4IPG!]))='8+"5&_JVF>]T]R/[EMAIL PROTECTED](
M7I<0G+\"[EMAIL PROTECTED]&#>\['AF:MW+WI<7ZU`*6BUO"V-VRV+MY\_'RXMW56W5:
MSGI)R'[0B]OQ7,8*1/=VCST`O`*.5X?9BSC>7J4L):Q$>[EMAIL PROTECTED](#
M8R^N_KQ\?7-=&81GSRKK"%/L`MW)[EMAIL PROTECTED]"WZ@;3MZOQJR=I//BIE
M-8LF8:67GC)AS1F,R%;C(O_^_L-?ZY!X5M7K";[EMAIL PROTECTED]=J"
M6C!&1L2893W]AM5T;"T=5TF5>[ZG4GIQ>7'UOEE<*^TB+R+EW#(26:[JW#;N
MM:.U7UJ'[EMAIL PROTECTED]&[EMAIL PROTECTED](9BS0.]5;([H._4YYJ'
M)[D.7[/A>"[EMAIL PROTECTED]/JS.]=5D[/)B*B65=OK@VK/(VM3L6'I;?E(^
M_[/I\[>ALFL'(T%[]B_RJ+E[V0I7Z#W#M^=W*M1&:EL2>!+W^:O9T(]VV%,T
M0(VCUV(:'4IR&'5O--3S;9_1YG?:S*\>N1Y'V/P`/#3C4KDU:[$%[Z",M`D"
M+Y/3TZ,H/H[BY)6:[EMAIL PROTECTED]:0*]$V:3^#2'=\9=U7$_4]1'(B?>M#8.T
M=?00L6IOD]<`,\QO":9WY5CSYXD=MZ@<[\%N`%CR%QP1!F?N_":`)3_D`J<$
MA2DIW?A-`$O^J3SO3JY9VUYY)`3B[MR&O77<4?10>K#K]M;[EMAIL PROTECTED]>WOV
M^5+V05[\.H)UUOG,7K.V9.9(W>YVYS;L+=E+(IWF$76&O6VNWR6QM&6.N=ZV
MMF=.O)@3#^:)%_/$E3DCZ!-UI];-K6OK)\KQ/`DA]G8H&H.[UA;UOCU=_E8^[.
MWT%PZ^#=^75[2_8'1S2^XYA\6B@([EMAIL PROTECTED]'A5,Q\=CR&?:V=?_RG5_=
MU^VMV:\]V:\]V-6S`2B''OP=!%L%98JQ![UF;LF=%B\.?W3GULVMN4^.8A_N
MMKG]>H]IXK7:M^U=V">>[!-GOV?S^E,>@[EMAIL PROTECTED]"K0)2^BHP$>SO[96"X\)=
[EMAIL PROTECTED],''02WCL.9W["W77/E)[EMAIL PROTECTED]:L/>99\A1_OP&PA.
MGY#'B8<"$\%-P<1;P<13P:&[EMAIL PROTECTED]:M#3#/FH\!`L%>0+E!ZYZ5`1["]T\MF
[EMAIL PROTECTED]9QX^*"[EMAIL 
PROTECTED]&@"T_6_+4SP,F
[EMAIL PROTECTED]'00+!7(XYZ9T$%H%.QZIK4!4$\7#I_=8+6?<&W=ZQIU4VR#
MT?NT:[^)]ECH2?]CK_KX;[EMAIL PROTECTED]&,Z!]6#LF`2QJ?5\^AR,S'%
M!(M'(.LI,F=5OS_:NK'\;9ULWN(>=2]\I)/U6;:<_&/<&WK_>V5'Z&F2AO)V
M_2GU=Y"WK<_+=V?3>J!-WFYG^?F0^M\K`1CY9$.?^]*<)[%Z[V6,[[[0JT^-
M)[6U?YA-B9XHT;N7_K$``[W'3O,33_H3+_9C3_;C'G:]Z]EQJ:N^9_C\CBYJ
M.#I`\Z;&KNZKWV(=S]M0WN^>VWRG0_V17PZ+,5_K\,7#O?GRAJVNMO9V/&B3
M,ZYZ9US/F+J^Y'B]^:K>#()-&3E5Q;[EMAIL PROTECTED]([EMAIL 
PROTECTED]>J<:G>ETPY6CS)F">
[EMAIL PROTECTED]"@#14&[EMAIL PROTECTED]@V]NDE4?$5Y1*,[EMAIL 
PROTECTED])([7$A`&4"J)=$X)2@,W")
M!,O%ZKS&5O261`&+R7)%`')/0-P#C%]!0+0_<,[EMAIL PROTECTED]/#PZ`C\
M4\K`2872U1T;_`0^!N\94/N.$K`,L*4HEB(,;CBD9

Announce: libgdbm-1.7.3-2

1995-11-15 Thread J.H.M.Dassen
Note: this version is made to cooperate with David's new ELF packages
and the new directory structure (ELF libs in /usr/lib; a.out libs in
/usr/i486-linuxaout). 

Changes since elf-libgdbm 1.7.3-1
* Renamed to libgdbm. Added 'Provides: elf-libgdbm' to control file.
* Use /usr/ instead of /usr/i486-linuxelf; part of Debian's move to ELF.
* Added 'Depends: libc5'. This also fixes Bug#1761.
* Changed symlinks for shared libs.

GNU dbm is a set of database routines that use extendible hashing and
that work similar to the standard UNIX dbm routines.

This package contains both the static and the dynamic libgdbm.
It should go into project/experimental/elf.

adb20616838bd48fbcb41b76ae6937b4  libgdbm-1.7.3-2.deb
52131aceb354c448a0aa2e784e070418  libgdbm-1.7.3-2.diff.gz
60c628468f341de322236743b7c822d1  libgdbm-1.7.3-2.tar.gz

-rw-r--r--   1 root root39499 Nov 15 07:58 libgdbm-1.7.3-2.deb
-rw-r--r--   1 root root10700 Nov 15 08:00 libgdbm-1.7.3-2.diff.gz
-rw-r--r--   1 root root81381 Nov 13 18:21 libgdbm-1.7.3-2.tar.gz

Ray
-- 
J.H.M. Dassen | RUMOUR  Believe all you hear. Your world may  
[EMAIL PROTECTED]  | not be a better one than the one the blocks   
[EMAIL PROTECTED]  | live in but it'll be a sight more vivid.  
  | - The Hipcrime Vocab by Chad C. Mulligan  



Bug reports by maintainer and package

1995-11-15 Thread Ian Jackson
Below is a listing generated by a new version of the bug summaries
script.

What do people think of it ?

I currently have the following crontab entries for generating bug
summaries to debian-devel:

23 16 * * 5   /home/iwj10/things/debian-bugs/scripts/mailsummary undone
23 16 * * 2   /home/iwj10/things/debian-bugs/scripts/mailsummary veryold

I'm inclined to replace the Wednesday posting of only the very old bug
reports with this new listing by maintainer and package, and to leave
the full reports sorted by age on Friday.  The reports sorted by age
now list the package maintainer where the originator used to be.

It's interesting to note that the people who are most involved with
the critical parts of the project are also those with the most
outstanding bug reports against their packages.  I think I shall be
following Ian M.'s lead and asking for some volunteers ...

Ian.

 Package  Ref   Subject

Nils Rennebarth <[EMAIL PROTECTED]> (1 bugs):
 gpm  1669  shutdown hangs on gpm -k until mouse is moved

[EMAIL PROTECTED] (Guy R. Thomas) (1 bugs):
 dld  1488  dld control file dsccription problem

Erick Branderhorst <[EMAIL PROTECTED]> (1 bugs):
 hyperlatex   1719  hyperlatex recommends ghostscript - nonexistent package

Robert Read <[EMAIL PROTECTED]> (1 bugs):
 ftape1615  ftape package contains only source

Giuseppe Vacanti <[EMAIL PROTECTED]> (2 bugs):
 diald1611  Diald 0.10 man pages
 diald1613  diald: minor typo in config-script

Robert Sanders <[EMAIL PROTECTED]> (2 bugs):
 strace   1205  strace doesn't compile with newer kernel sources
 strace   1539  strace source package does not compile

[EMAIL PROTECTED] (David H. Silber) (2 bugs):
 fortune  1118  fortune is setuid games ?!
 uucp 1265  Misc. uucp bugs

Christian Linhart <[EMAIL PROTECTED]> (2 bugs):
 tgif 1821  tgif should read /etc/papersize
 xarchie  1857  xarchie doesn't honour default archie server setting

Kenny Wickstrom <[EMAIL PROTECTED]> (2 bugs):
 tin  1619  tin depends on inn | inewsinn | inews
 tin  1753  trn recommends, instead of depends

Helmut Geyer, [EMAIL PROTECTED] (2 bugs):
 ghostview1225  ghostviewR6 bad name, depends on xbaseR6, ghostviewR5 exist
 xxgdb1231  xxgdbR6 bad name, depends on xbaseR6, xxgdbR5 exists

Dirk Eddelbuettel <[EMAIL PROTECTED]> (2 bugs):
 acct 1737  missing man pages for accouting commands
 acct 1738  `errors' in /usr/info/accounting

[EMAIL PROTECTED] (D.J. Gregor) (2 bugs):
 cdtool   1322  cdtool: wrong permissions for manpages
 workbone 1381  workbone postinst fails

Matt Porter <[EMAIL PROTECTED]> (3 bugs):
 lrzsz1635  revision should be package_revision
 lrzsz1727  Man-pages
 lrzsz1729  Naming of commands

[EMAIL PROTECTED] (Robinson, Jim) (3 bugs):
 ifrench  1233  Bad french.hash file in ifrench.deb
 igerman, w   1793  german.hash has wron magic number
 wenglish  416  perl doesn't flush output automatically

Kenneth MacDonald <[EMAIL PROTECTED]> (3 bugs):
 ispell   1627  ispell copyright file
 ispell   1715  ispell recommends word-list - nonexistent package
 linuxdoc-s   1830  version of doc behind linuxdoc package

[EMAIL PROTECTED] (D.J. Gregor) (4 bugs):
 gnuplot  1662  gnuplot won't run
 xfig 1224  xfig depends on xpmR6, xbaseR6
 xfig 1408  xfig always asks about colour/mono
 xfig 1453  `xfig' should depend on `X11R6'

Alvar Bray <[EMAIL PROTECTED]> (4 bugs):
 man  1735  apropos(1) segfaults
 man  1751  corrupt man page for dc
 man  1805  man package problem
 man  1841  man_db problems

David Engel <[EMAIL PROTECTED]> (4 bugs):
 expect   1836  expect core dumps
 ldso 1646  ldso (or dpkg) "bug"
 snmp 1820  snmp postinst backgrounds start-stop-daemon ?
 snmp 1824  snmpd not killed by pre/post-rm, ignored SIGTERM

Michael Alan Dorman <[EMAIL PROTECTED]> (4 bugs):
 minicom  1636  minicom cant file /etc/minicom.users
 minicom  1661  minicom should use /etc for config files
 minicom  1679  Minicom has default lockfile in /var/spool/uucp
 minicom  1728  Depencies&Conflicts

[EMAIL PROTECTED] (D.J. Gregor) (4 bugs):
 unclutter1779  unclutter - I need -noevents
 vim  1133  vim asks unnecessary and unclear question
 vim  1187  Various `vi' versions trample on each other.
 vim  1405  vim doesn't use update-alternatives

Martin Schulze <[EMAIL PROTECTED]> (5 bugs):
 syslogd   786  syslogd gone awol
 syslogd  1474  syslogd uses default settings for update-rc.d
 syslogd  1531  syslogd continues to write to old file after savelog
 syslogd  1813  /var/log/news should exist
 syslogd  1833  [EMAIL PROTECTED]: patch for Debian sysklogd package]

Anders Chrigstrom <[EMAIL PROTECTED]> (5 bugs):
 bison1553  Bison: #include problem
 bison1554  Bison: confusing documentation
 bison  

Bug#1866: xwpe should depend on xcompat

1995-11-15 Thread Marek Michalkiewicz
Package: xwpe
Version: 1.4.1-1

xwpe requires old X library (libX11.so.3) which is in the xcompat
package.  But xwpe does not "depend" on xcompat.

Marek



Re: Bug reports by maintainer and package

1995-11-15 Thread Dirk . Eddelbuettel

  Ian Jackson writes:
  Ian>  Below is a listing generated by a new version of the bug summaries
  Ian> script.
  Ian> 
  Ian> What do people think of it ?

I like it and prefer it over the old format. Two small glitches:
 - Nils Rennebarth has two entries (the very first and a bigger one
   further down
 - An acct bug (#1738) is assigned to me even though I marked it done. It's 
   not in last Friday's list.

--
[EMAIL PROTECTED]  http://qed.econ.queensu.ca/~edd 



OK, OK :-)

1995-11-15 Thread Ian Jackson
I accidentally deleted the test for whether the bug had been marked as
done.  Don't bother reporting this, ahm, interesting feature any more.

I'll fix it and produce another list.

Any other comments that people haven't made yet ?

Ian.



Bug#1867: [hag@gnu.ai.mit.edu: a little bit of flamage about single user mode]

1995-11-15 Thread Ian Murdock
Package: sysvinit
Version: 2.57b-1

--- Start of forwarded message ---
Date: Wed, 15 Nov 1995 01:03:29 -0500
To: Ian Murdock <[EMAIL PROTECTED]>
Subject: a little bit of flamage about single user mode
From: Daniel Hagerty <[EMAIL PROTECTED]>

I know I saw some mail about this on debian-users a few weeks
ago, but I must let you know this:

The current debian system's concept of "single user" is
seriously hosed, and tries to do way too many things that are
inappropriate for a single user machine. Basically, a single user
shell should finish booting the kernel, and give you a shell at that
point. Root shouldn't even be remounted read-write. It certainly
shouldn't try to ifconfig network interfaces, or mount remote nfs
filesystems. The network interface one is particularly bad, you can
seriously trash a network for 10-15 minutes while arp caches clear out
and so forth.

--- End of forwarded message ---



Re: md5sum passwords

1995-11-15 Thread Daniel Quinlan
Andrew Howell <[EMAIL PROTECTED]> writes:

> Though it would be nice if the whole community switched I don't think
> it's that great a deal whether they do or not, us using MD5 and others
> using DES shouldn't lead to any incompatibilties or problems as far
> as I can see.

I asked Garrett A. Wollman (FreeBSD) about their experience using MD5
outside of the US, why they didn't switch to MD5 wholesale, etc.

Garrett noted:

> Because it's incompatible with every other UNIX system out there.
> Lots of people need access to YP password databases, etc., and
> therefore have to have the DES hash.
>
> Some people find the existence of two different password mechanisms
> confusing.  Some people find the fact that the `crypt' function and
> library doesn't actually do encryption really confusing.
>
> Some programs use small fixed-length buffers to hold hashed
> passwords, causing them to crash when used with the longer output
> from the MD5 scheme.

Before Debian actually switches to MD5, issues such as these must be
resolved.  Any use of fixed-length buffers to hold hashed passwords
should probably be considered a bug, regardless.

A mixed solution may be possible, supplying DES (from both a US and a
non-US site) to those who require YP support.  I'm still not in favor
of Debian doing this alone in the Linux community, though.

 Dan

-- 
Daniel Quinlan  Member of the League for Programming Freedom
[EMAIL PROTECTED]



Re: dselect CD-ROM / hard disk / NFS method

1995-11-15 Thread Ian Jackson
Bill Mitchell writes ("Re: dselect CD-ROM / hard disk / NFS method"):
> On Wed, 15 Nov 1995, Ian Jackson wrote:
> > If it sees what looks like a Debian mirror of some kind (possibly in a
> > `debian' subdirectory) and has `stable' and `development'
> > subdirectories it will offer the user the choice between the stable
> > tree and the development one, rather than requiring them to specify
> > the pathname themselves.  (The user will still be able to specify a
> > different pathname if they want to.)
> > [...]
> > So, in summary, the script will look for trees named
> >   stable
> >   development
> >   contrib
> >   non-free
> > and in each tree will it look for
> >   binary
> >  and
> >   binary/Packages
> >  or
> >   binary/Packages.gz
> > 
> > It will look for these trees in the root of the installation
> > filesystem, or in a subdirectory `debian' of that filesystem.
> 
> "it" is dselect, right?  Unless I misunderstand, that's what it
> looks like to the user.

Yes.  It's the dselect disk access method script, which is invoked by
dpkg when the user selects hard disk partition, mounted filesystem or
CD-ROM from the dselect access method list.

> Could we have a dselect(1) or dsleect(8) man page which explains
> such things as this, or points the user to another man page which
> explains them?

Well volunteered.

This ought really to go in the installation manual, in the form `to
get dselect to work well, download the following files into a
directory tree like this'.  Perhaps you'd like to write an appropriate
chapter or section and send it to Ian M. ?

Ian.



Re: md5sum passwords

1995-11-15 Thread Ian Jackson
Andrew Howell writes ("Re: md5sum passwords"):
> Daniel Quinlan writes:
> > I think switching would probably be a decent idea, although it is not
> > of earth-shattering importance to me.  I'm also concerned about doing
> > Debian doing it alone, instead of with the cooperation of the rest of
> > the Linux community.
> 
> Though it would be nice if the whole community switched I don't think
> it's that great a deal whether they do or not, us using MD5 and others
> using DES shouldn't lead to any incompatibilties or problems as far
> as I can see.

Don't many programs have built in limits like 8 on the length of a
password, and 13 or whatever it is on the length of an encrypted
password ?  I don't see the point in switching.

> > I am more interested in longer user names and longer password.  I'm
> > disgusted with being limited to eight characters.
> 
> Yes, MD5 obviously makes the system that much more secure from attempts
> at using crack on a passwd file. MD5 being much slower than DES and also
> just the fact that you can't count on the password being 8 characters long
> anymore would make it a quite a more difficult process.

It's very hard to get people to remember a decently-long secret. For
this reason longer passwords aren't in general going to make for
better security.

What we should do instead, IMO, is to keep a secret cookie in a
read-protected file and use that as part of the data when hashing the
password (we can use MD5 or DES or SHA or whatever, though if we use
MD5 we'll have to truncate the result).

Programs that can read the file would just use it; programs that can't
would consult a system daemon to do the crypt() for them.

The effect of this would be that the cracker would have to use your
daemon to do all the crypts - which makes cracking infeasible - and
that *no programs would even need to be recompiled*.

We have 13 characters available, and 2 of these are known to be the
salt.  Each character yields 6 bits with a sensible encoding, so we
have 12 bits of salt and 66 bits available for the encrypted
passwords.

The salt is less important if we constrain the potential cracker to
use our daemon, so we can keep some of it (4 bits perhaps?) as an
index number into a smallish table of secrets, so that we can change
the secret without having to have all the users change their passwords
at once.

Daniel Quinlan writes ("Re: md5sum passwords"):
> I am more interested in longer user names and longer password.  I'm
> disgusted with being limited to eight characters.

Longer user names is pretty much a lost cause at this late stage, I
think.  Feel free to try, but expect a lot of problems.  Longer
passwords are difficult too, and even 8 lowercase alphanumerics are a
bit over 40 bits of entropy: this is fine to prevent guessing if the
attacker can't run an off-line search.  If you use case and
punctuation too you can get around 50 bits, which is pretty good for a
login application.

Getting people to remember even 40 bits worth of password is the real
problem; we should be concentrating on ways to get good use out of
even 20 or 10 or less bits of randomness - and the way to do this is
to ensure that attempts at password searching have to go through
something you control.

> A little reading on using MD5 instead of DES turned up a FreeBSD web
> page on the topic.
> 
>   http://www.freebsd.org/handbook/handbook68.html

The FreeBSD web page seems to say to me that they made the decision to
use MD5 instead of crypt because of the export control issues.  It
seems that the Linux community in general has taken the view that
since it is no more practical to use crypt than MD5 for
confidentiality it is silly to replace one with the other (the US
government view is - broadly speaking - that integrity and
authentication is OK whereas confidentiality isn't, which is very
silly when you try to apply it to algorithms: there's a standard way
to turn a hash function into a block cipher).

I think we should continue to provide a crypt()-like interface, and I
think my plan above is a way to significantly improve our security -
bringing it up to the level of systems with shadow passwords - without
the pain of recompiling every binary.

(The scheme also allows users to check their own and each others'
passwords, so that screenlocker programs &c don't need to be trusted
by the sysadmins.  This feature could be disabled simply by not
running the crypting daemon.)

If people think this is a sufficiently good idea I might even be
persuaded to implement it, just so I can write a paper about it :-).



Re: md5sum passwords

1995-11-15 Thread Ian Jackson
Daniel Quinlan writes ("Re: md5sum passwords"):
> Bill Mitchell <[EMAIL PROTECTED]> writes:
> > This might be a bit harsh WRT the distribution itself.  Too much
> > open input can lead to a lot of haggling over diverse viewpoints on
> > this or that alternative (not that we haven't had a bit of that
> > anyhow).
> 
> Open input is good, in general.  If you want to guarantee haggling, do
> it on a mailing list.  If you don't want haggling, have input sent to
> a responsible party.
> 
> Most Debian contributors seem to think every issue concerns everyone,
> everyone debates on everything, everything goes very slowly.  If you
> want to speed things up, I suggest these initial steps:

I don't think we have a problem wrt slow response to bug reports
because of the comments people make about them.

On the other hand, I think there have been a number of times where the
only reason we made the best decision about how to fix a particular
problem was that another not-obviously-related developer saw the
report and perhaps the reply and was able to give good input.

It also allows any developer to pick off non-bugs, so that the busy
maintainer with half the distribution on their plate doesn't have to
deal with it.

I think the problems we've had with slowness have been due to lack of
manpower in some cases, and in many cases a lack of willingness to
part with things until they're perfect.  One of Linux's selling points
is that the latest hottest thing - buggy as hell or not - is always
available if you want it.  I think this really improves people's
motivation to help contribute.

Bill Mitchell writes ("bug reports (was: Re: md5sum passwords)"):
> On Wed, 15 Nov 1995, Daniel Quinlan wrote:
> > Open input is good, in general.  If you want to guarantee haggling, do
> > it on a mailing list.  If you don't want haggling, have input sent to
> > a responsible party.
> 
> Good point.  I agree.  General distribution of bug reports is a useful
> option, but shouldn't be the default.

At one point I agreed with you, but I've come to disagree.

I don't think the general distribution of bug reports has been
unhelpful.

One thing we could do is to set up a seperate list that gets copies of
all bug reports, and have the developers decide individually whether
to see all of the reports rather than having the submitter decide
whether to distribute it generally.

Speaking as the dpkg maintainer I find that many bug reports touch on
my area in some way, and I reply to a significant number of them.  I
wouldn't want to lose the ability to do that.

> Mirroring bug reports to debian devel was done because it was
> convenient, I think.  Bug reports weren't, and still are not, sent
> to package maintainers because that is inconvenient to implement.

It's not so inconvenient now as it was, and it could be done.

Ian.



Re: md5sum passwords

1995-11-15 Thread Ian Jackson
Daniel Quinlan writes ("Re: md5sum passwords"):
> 1. Release a new copy.  Make it very public.
> 
> It has been my experience that contributors are more apt to continue
> contributing if things aren't kept so private and are updated often.

I agree entirely.

>  - People like to see the results of their work
>  - People like to contribute to projects that are moving forward
>at a significant pace or are updated often.
>  - People don't like to repeat work.  Knowing the status of things
>means that you won't repeat work.
>  - The urge to work is often the result of seeing something new that
>you have strong feelings about (positive or negative).
> 
> 2. Stop calling it a draft, call it a work in progress.

I agree here too.

It's critically important to get things out of the door quickly.  We
can revise them later - especially with manuals, for example.

Ian.



Re: New a.out/ELF development packages

1995-11-15 Thread Bill Mitchell
On Sat, 11 Nov 1995, David Engel wrote:

>[...]
> 3. Start converting other packages to ELF.

What's the protocol for package uploads from here on out?

Upload a.out packages?  Announce where?

Upload elf packages?  Announce where?

If both a.out and elf packages are to be uploaded, how are
uploaders to differentiate one from the other?



ELF packages

1995-11-15 Thread Ian Murdock
I've moved the new ELF packages that David and Ray are working on to
/debian/private/project/elf.  As soon as they give the word, I'll move
them into the distribution.  For now, I urge everyone to upgrade their
copies of gcc, libc, etc., as we're going to start wanting to building
ELF packages fairly soon.



Re: New a.out/ELF development packages

1995-11-15 Thread Ian Jackson
Bill Mitchell writes ("Re: New a.out/ELF development packages"):
> On Sat, 11 Nov 1995, David Engel wrote:
> >[...]
> > 3. Start converting other packages to ELF.
> 
> What's the protocol for package uploads from here on out?
> 
> Upload a.out packages?  Announce where?
> 
> Upload elf packages?  Announce where?
> 
> If both a.out and elf packages are to be uploaded, how are
> uploaders to differentiate one from the other?

If you only want them to go into the 1.0 development tree (the usual
case) then you may upload one or the other, though ELF would be
preferred now.

If you want them to go into the 0.93 stable tree because they fix a
serious problem or for some similar reason you should say so and must
upload an a.out.  If you have both a.out and ELF versions of the same
package I suggest you call them revision 3.1 and 3.2 or whatever - Eg,
hello-1.3-4.1 for the a.out and hello-1.3-4.2 for the ELF.  This will
ensure that upgrades happen in the right direction.

Ian.



Re: ELF packages

1995-11-15 Thread David Engel
> I've moved the new ELF packages that David and Ray are working on to
> /debian/private/project/elf.  As soon as they give the word, I'll move
> them into the distribution.  For now, I urge everyone to upgrade their
> copies of gcc, libc, etc., as we're going to start wanting to building
> ELF packages fairly soon.

As far as I'm concerned, the aout-* packages are ready to go into
the distribution.

I'll be uploading new ELF libc5, binutils and gcc packages later
tonight or tomorrow morning.  The only change is that they explicitly
"conflict" with and "provide" the elf-* equivalents.  These should
also be moved into the distribution.

I'll also be uploading an ELF gcc 2.7.1 package.  I don't expect any
problems, but this one should probably receive a little more testing
before being moved.

David
-- 
David EngelOptical Data Systems, Inc.
[EMAIL PROTECTED]  1101 E. Arapaho Road
(214) 234-6400 Richardson, TX  75081



Revised resorted bugs list

1995-11-15 Thread Ian Jackson
Right, I think I've fixed the bug that caused it to list bugs that had
been marked as done.  There is a file (well, three files actually) on
ftp.debian.org that can override the Maintainer field from the
packages in the archive; I've edited this a little, but there are
probably still remaining problems.

If you upload a revised package this file will automatically catch up;
otherwise you can mail Ian M. or myself and we can edit the file.

Ian.

 Package  Ref   Subject

Nils Rennebarth <[EMAIL PROTECTED]> (1 bugs):
 gpm  1669  shutdown hangs on gpm -k until mouse is moved

Dirk Eddelbuettel <[EMAIL PROTECTED]> (1 bugs):
 acct 1737  missing man pages for accouting commands

Robert Read <[EMAIL PROTECTED]> (1 bugs):
 ftape1615  ftape package contains only source

Matt Porter <[EMAIL PROTECTED]> (1 bugs):
 lrzsz1635  revision should be package_revision

[EMAIL PROTECTED] (Guy R. Thomas) (1 bugs):
 dld  1488  dld control file dsccription problem

[EMAIL PROTECTED] (D.J. Gregor) (1 bugs):
 unclutter1779  unclutter - I need -noevents

Kenneth MacDonald <[EMAIL PROTECTED]> (1 bugs):
 linuxdoc-s   1830  version of doc behind linuxdoc package

Robert Sanders <[EMAIL PROTECTED]> (2 bugs):
 strace   1205  strace doesn't compile with newer kernel sources
 strace   1539  strace source package does not compile

Giuseppe Vacanti <[EMAIL PROTECTED]> (2 bugs):
 diald1611  Diald 0.10 man pages
 diald1613  diald: minor typo in config-script

[EMAIL PROTECTED] (David H. Silber) (2 bugs):
 fortune  1118  fortune is setuid games ?!
 uucp 1265  Misc. uucp bugs

Helmut Geyer, [EMAIL PROTECTED] (2 bugs):
 ghostview1225  ghostviewR6 bad name, depends on xbaseR6, ghostviewR5 exist
 xxgdb1231  xxgdbR6 bad name, depends on xbaseR6, xxgdbR5 exists

Kenny Wickstrom <[EMAIL PROTECTED]> (2 bugs):
 tin  1619  tin depends on inn | inewsinn | inews
 tin  1753  trn recommends, instead of depends

Alvar Bray <[EMAIL PROTECTED]> (2 bugs):
 man  1805  man package problem
 man  1841  man_db problems

Martin Schulze <[EMAIL PROTECTED]> (2 bugs):
 syslogd   786  syslogd gone awol
 syslogd  1813  /var/log/news should exist

[EMAIL PROTECTED] (D.J. Gregor) (2 bugs):
 cdtool   1322  cdtool: wrong permissions for manpages
 workbone 1381  workbone postinst fails

Christian Linhart <[EMAIL PROTECTED]> (2 bugs):
 tgif 1821  tgif should read /etc/papersize
 xarchie  1857  xarchie doesn't honour default archie server setting

(orphan) (2 bugs):
 inewsinn 1441  `inewsinn' should provide virtual package
 inewsinn 1752  inewsinn recommends trn

Michael Alan Dorman <[EMAIL PROTECTED]> (2 bugs):
 minicom  1661  minicom should use /etc for config files
 minicom  1679  Minicom has default lockfile in /var/spool/uucp

David Engel <[EMAIL PROTECTED]> (3 bugs):
 expect   1836  expect core dumps
 snmp 1820  snmp postinst backgrounds start-stop-daemon ?
 snmp 1824  snmpd not killed by pre/post-rm, ignored SIGTERM

[EMAIL PROTECTED] (D.J. Gregor) (3 bugs):
 xfig 1224  xfig depends on xpmR6, xbaseR6
 xfig 1408  xfig always asks about colour/mono
 xfig 1453  `xfig' should depend on `X11R6'

[EMAIL PROTECTED] (Robinson, Jim) (3 bugs):
 ifrench  1233  Bad french.hash file in ifrench.deb
 igerman, w   1793  german.hash has wron magic number
 wenglish  416  perl doesn't flush output automatically

[EMAIL PROTECTED] (Bill Mitchell) (4 bugs):
 ae   1724  unexpected keypress translations
 git  1848  git gets SIGV
 indent850  [indent] option mentioned in documentation not supported
 mtools   1355  mformat does not work

Anders Chrigstrom <[EMAIL PROTECTED]> (5 bugs):
 bison1553  Bison: #include problem
 bison1554  Bison: confusing documentation
 bison1769  bison files in /usr/share
 sendmail 1437  Debian sendmail
 sendmail 1657  Sendmail uses flock instead of fcntl and is setgid root

Sven Rudolph <[EMAIL PROTECTED]> (5 bugs):
 adduser  1534  adduser problems with home directories
 adduser  1711  adduser replaces NIS entries in /etc/passwd
 adduser? m   1708  `passwd' not interruptible when invoked by `adduser'
 bigloo   1354  bigloo: several problems (ELF, packaging, manpage)
 xonix1377  xonix can't write its score file.

Andrew Howell <[EMAIL PROTECTED]> (6 bugs):
 rxvt 1161  rxvt manual page differs from implementation
 samba1825  samba not completely killed by pre/post-rm
 tcsh  820  tcsh builtin `echo' doesn't check write errors
 xntp 1656  /etc/ntp.drift should be somewhere in /var (FSSTND)
 xntp 1770  xntp dumps core with kernel 1.3.35
 xtron1703  xtron documentation

Peter Tobias <[EMAIL PROTECTED]> (6 bugs):
 lpr   902  lpr can't print a PostScript file ?!
 lpr  1061  /etc/printcap vs. /usr/man/man5/printcap.5

Re: Revised resorted bugs list

1995-11-15 Thread Dirk . Eddelbuettel

You did not fix the other bug. Nils, for example  has two entries :

Nils Rennebarth <[EMAIL PROTECTED]> (1 bugs):
 gpm  1669  shutdown hangs on gpm -k until mouse is moved

Nils Rennebarth <[EMAIL PROTECTED]> (19 bugs):
 bibtex, kp   1429  several TeX packages Provide themselves
 dvipsk   1716  dvipsk recommends psfonts - nonexistent package
<...>

-- 
[EMAIL PROTECTED]  http://qed.econ.queensu.ca/~edd 



[tange@mi.aau.dk: More info on packages]

1995-11-15 Thread Ian Murdock
--- Start of forwarded message ---
Date: Mon, 13 Nov 1995 19:28:10 +0100
From: [EMAIL PROTECTED]
Subject: More info on packages
To: Ian Murdock <[EMAIL PROTECTED]>

Hi Ian.

I love being on the debian-announce-list. But I must admit, that 
the packagedescriptions generally lack. I am sure that there are
packages - which I might find handy - but have not installed simply
because I do not know what this package does. I am sure this goes 
for a fair share of the debian-announce-readers, too.

Therefore it would be nice if maintainers included a description of
the package in the announcement. This could just be the LSM-entry
that follows the non-package version.

Since you (as far as I know) are the headorganizer of Debian I 
hereby give you this idea. If you find it acceptable please suggest
it to all packagemaintainers.

/Ole



--- End of forwarded message ---



Re: ELF packages

1995-11-15 Thread Bill Mitchell

On Wed, 15 Nov 1995, Ian Murdock wrote:

> [...] For now, I urge everyone to upgrade their
> copies of gcc, libc, etc., as we're going to start wanting to building
> ELF packages fairly soon.

I've started working on mine.  The second package build failed
because it uses curses.

The plan, AFAK, is to junk curses in favor of ncurses.  However,
I recall that Bruce put the ncurses package up for grabs.  Would
it be possible to get an elf libncurses?  Is the stuff in
/usr/include/ncurses to be repositioned to /usr/include or to
remain in /usr/include/ncurses?

Also, I see that we no longer have /usr/include/curses.h, but do
have /usr/include/bsd/curses.h.