Re: For Those Who Care About: Switzerland/Liechtenstein

2007-02-03 Thread Joey Schulze
Adrian von Bidder wrote:
> On Friday 02 February 2007 09:33, Sam Hocevar wrote:
> > On Fri, Feb 02, 2007, martin f krafft wrote:
> > > PS: Almost all... as first official act, I herewith announce the
> > > nomination of Mark J. Ray as an honorary member of debian.ch.
> > > Honorary members have no rights and no obligations, but they also
> > > cannot quit.
> >
> >Is that legal?
> 
> No it's not.  It's what we technically call a Joke.  Debian could use more 
> of them.  (And yes, I do invite people to make jokes on my expense when the 
> occasion arises.)

While I agree that it could help improve the discussion culture if
more jokes would be made in Debian, I reject the idea that they should
be made of cost of others, MJ Ray in this case.  Make the Tux an
honorary member, that would've been fine.  This is just an insult.

Regards,

Joey

-- 
All language designers are arrogant.  Goes with the territory...
-- Larry Wall

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: For Those Who Care About: Switzerland/Liechtenstein

2007-02-03 Thread Russell Coker
On Saturday 03 February 2007 20:25, Joey Schulze <[EMAIL PROTECTED]> wrote:
> > No it's not.  It's what we technically call a Joke.  Debian could use
> > more of them.  (And yes, I do invite people to make jokes on my expense
> > when the occasion arises.)
>
> While I agree that it could help improve the discussion culture if
> more jokes would be made in Debian, I reject the idea that they should
> be made of cost of others, MJ Ray in this case.  Make the Tux an
> honorary member, that would've been fine.  This is just an insult.

What was insulting about this?

Is MJ known to have a great dislike of Switzerland or is there any other 
reason to believe that he would be offended by such a joke?


I hereby create the Informal Debian Developers society and name MJ Ray as the 
first honorary member.  Honorary members can't quit!  ;)

-- 
[EMAIL PROTECTED]
http://etbe.blogspot.com/  My Blog

http://www.coker.com.au/sponsorship.html Sponsoring Free Software development



Re: Attempts at security

2007-02-03 Thread Hendrik Sattler
Am Freitag 02 Februar 2007 21:14 schrieb Reinhard Tartler:
> Hendrik Sattler <[EMAIL PROTECTED]> writes:
> > And everybody gets the SE Linux overhead if he wants or not?
>
> Which overhead does SE Linux impose to you?

Take a look at the extra paths in the LSM that the kernel runs for many system 
calls. There is no selective choice in what to turn on, except the rules that 
you specify later down that road.
ALthough capabilities also use the LSM (which sucks, btw), the are pretty 
simple (this is _not_ a comparison to SE Linux).

> > The current system does not give you perfect security but neither does
> > adding SE Linux. Instead, you probably get annoying permission
> > problems.
> > Name a few guys that really likes to use this on a private machine and
> > some real-life improvements that it brings. Hint: "increased security" is
> > not an argument.
>
> I consider "increased security" a very valid argument. The DAC security
> model is quite outdated now and doesn't really match real world security
> concerns most workstations are experiencing today!

"Real world security concerns"? Please describe your "real world" and compare 
to the other existant "real world"s.

> > Not being able to change the cause to the better doesn't mean to
> > introduce a mess to control the result.  And I really hope that Debian
> > never considers installing+enabling selinux by default.
>
> IIRC, debian/etch already does already install selinux today without you
> even noticing it.

It is not enabled by default. That is the other point: you get that selinux 
integration if you want or not.

HS


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts at security

2007-02-03 Thread Russell Coker
On Saturday 03 February 2007 22:37, Hendrik Sattler 
<[EMAIL PROTECTED]> wrote:
> Am Freitag 02 Februar 2007 21:14 schrieb Reinhard Tartler:
> > Hendrik Sattler <[EMAIL PROTECTED]> writes:
> > > And everybody gets the SE Linux overhead if he wants or not?
> >
> > Which overhead does SE Linux impose to you?
>
> Take a look at the extra paths in the LSM that the kernel runs for many
> system calls. There is no selective choice in what to turn on, except the
> rules that you specify later down that road.
> ALthough capabilities also use the LSM (which sucks, btw), the are pretty
> simple (this is _not_ a comparison to SE Linux).

It would be interesting to do some benchmarks and compare the overhead of a 
LSM kernel booted without SE Linux enabled to some of the other overheads we 
have.

One that springs to mind is CONFIG_HIGHMEM4G, it seems only useful if you have 
more than 896M of RAM.  Therefore it seems that all P3 desktop machines with 
the i686 kernel package from etch will receive no benefit from it (I am not 
aware of any P3 desktop machine that supports more than 512M of RAM).

Another is the fact that all Debian kernels for i686 and similar CPUs are 
compiled with SMP enabled even though the vast majority of such machines are 
not SMP.  Until the most recent developments in CPUs implementing the AMD64 
ISA SMP on the desktop was extremely rare (and desktops outnumber servers by 
a significant margin).

While an occasional branch statement that is not taken may impose a tiny 
overhead, it's nothing compared to having a sub-optimal memory arrangement or 
having extra locks for SMP.

This is not to criticise those choices of the kernel team.  Having a smaller 
number of kernels makes the entire build and support process easier - which 
benefits all of us in many non-obvious ways.

Anyway, if the overhead of SE Linux in the kernel is something you consider to 
be a problem then there are many bigger problems that you will have with the 
Debian kernel packages (or probably any kernel image from a binary 
distribution).  Best to just compile your own kernel.

> > > The current system does not give you perfect security but neither does
> > > adding SE Linux. Instead, you probably get annoying permission
> > > problems.
> > > Name a few guys that really likes to use this on a private machine and
> > > some real-life improvements that it brings. Hint: "increased security"
> > > is not an argument.
> >
> > I consider "increased security" a very valid argument. The DAC security
> > model is quite outdated now and doesn't really match real world security
> > concerns most workstations are experiencing today!
>
> "Real world security concerns"? Please describe your "real world" and
> compare to the other existant "real world"s.

Do you have any specific objections to Reinhard's statement?  Making 
ad-hominem attacks on someone else's grasp of reality doesn't help the 
discussion.

Do you even know what DAC is and what it's failings are?

> > > Not being able to change the cause to the better doesn't mean to
> > > introduce a mess to control the result.  And I really hope that Debian
> > > never considers installing+enabling selinux by default.
> >
> > IIRC, debian/etch already does already install selinux today without you
> > even noticing it.
>
> It is not enabled by default. That is the other point: you get that selinux
> integration if you want or not.

Apart from those branch instructions in the kernel image what specific things 
do you object to?

-- 
[EMAIL PROTECTED]
http://etbe.blogspot.com/  My Blog

http://www.coker.com.au/sponsorship.html Sponsoring Free Software development


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts at security (was Re: Draft spec for new dpkg "triggers" feature)

2007-02-03 Thread Hendrik Sattler
Am Samstag 03 Februar 2007 02:21 schrieb Russell Coker:
> On Saturday 03 February 2007 05:17, Hendrik Sattler
> <[EMAIL PROTECTED]> wrote:
> > And everybody gets the SE Linux overhead if he wants or not?
>
> It's disabled by default, unlike in Fedora and Red Hat Enterprise Linux
> where it's on by default.  I believe that the latest release of SUSE has
> AppArmor on by default.

RedHat has a long history of strange decisions.

> > The current
> > system does not give you perfect security but neither does adding SE
> > Linux. Instead, you probably get annoying permission problems.
>
> This is why every Windows user uses the administrator account for
> everything.

No, this is caused by other system design flaws and some bad software 
companies. Some learned and improved (Nero) and some didn't (Epson).

But Microsoft probably had reason why they hide the file system ACL settings 
by default (hint: complexity).

> > > You want features such as exec-shield, well you don't get them -
> > > because of other people with the same attitude as you.
> >
> > Please differ between things that are pretty much automatic (even when
> > not only using debian packages) and things that you need some days to
> > setup correctly (if you ever manage to do so).
> > And always think about the problems that you introduce with such things
> > (and almost all you named have such).
>
> You claim that almost all the examples I gave have problems.  Please
> explain the problems that you believe to be in exec-shield, PIE, and
> poly-instantiated directories.  Make sure that they are real examples not
> "a program might have some problem" claims.

PIE: 
http://www.linuxfromscratch.org/hlfs/view/unstable/uclibc/chapter02/pie.html
Does X already work with it? Mplayer is also name there and thus probably xine 
(using these win32-DLLs), too? How about things like Mono?
Exec-shield is related to it, AFAIK.
Since this is selective for every application, it is good. But everything that 
increases restrictions of whatever kind will hit a project that cannot handle 
this restriction. Not naming those in the same spot as advertising it does 
not really help...
But you are right, most users and even programmers will never notice...

For the poly-instantiated views to directories, I am not sure that this is 
thought to its end, yet. The main usage will probably be /tmp but there are 
already solutions for secure temp file creation. Although it can integrate 
with SE Linux, it does not require it.
Users may get confused why they do not see the same directory contents 
althought the path is the same.

HS


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts at security

2007-02-03 Thread Hendrik Sattler
Am Samstag 03 Februar 2007 13:17 schrieb Russell Coker:
> Anyway, if the overhead of SE Linux in the kernel is something you consider
> to be a problem then there are many bigger problems that you will have with
> the Debian kernel packages (or probably any kernel image from a binary
> distribution).  Best to just compile your own kernel.

At some point they just add. I don't have a problem compiling my own kernels 
but is there any site describing use case scenarios for selinux and also 
consider to not use it for some scenarios?

It's just that I am pretty sure that I do not need it. However, using the 
term "security" seems to set a flag in some minds that somehow implies the 
idea of getting it to everyone, needed or not.

Is it that strange to raise a flag and keep saying that there are some that 
don't need it and don't want it?
Typical example in _my_ case are selinux and fine grained file system extended 
ACLs.

HS


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts at security

2007-02-03 Thread Lars Wirzenius
On la, 2007-02-03 at 12:37 +0100, Hendrik Sattler wrote:
> > > Not being able to change the cause to the better doesn't mean to
> > > introduce a mess to control the result.  And I really hope that Debian
> > > never considers installing+enabling selinux by default.
> >
> > IIRC, debian/etch already does already install selinux today without you
> > even noticing it.
> 
> It is not enabled by default. That is the other point: you get that selinux 
> integration if you want or not.

Debian has made similar decisions throughout its history: we generally
don't provide separate X and non-X versions of the same package, for
packages where this is a build time option, for example. That is also a
cost every Debian user pays: increased disk and memory usage, even if
they don't use X at all.

In order to keep the complexity of the entire Debian system manageable,
we need to make those choices. If we, as a project, are of the opinion
that providing SELinux support is a good thing, then everything in
Debian that needs to be changed for the support to exist needs to be
changed, even if the individual maintainer thinks SELinux isn't useful.

The mechanism we have for deciding such policy issues is the policy
document, the -policy list, and the associated procedures for proposing
and accepting changes to the policy.

Enabling SELinux by default obviously shouldn't happen until it can be
done without disturbing most people's use of Debian. As far as I know,
that should be possible to achieve, though.

-- 
I've never seen anyone wear a Freudian slip.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts at security

2007-02-03 Thread Henrique de Moraes Holschuh
On Sat, 03 Feb 2007, Russell Coker wrote:
> One that springs to mind is CONFIG_HIGHMEM4G, it seems only useful if you 
> have 

You need to enable PAE (64GB support) to access the NX bit on ia32, which is
even worse, and that's the reason why my 1GB laptop has a PAE kernel :(

> Another is the fact that all Debian kernels for i686 and similar CPUs are 
> compiled with SMP enabled even though the vast majority of such machines are 
> not SMP.  Until the most recent developments in CPUs implementing the AMD64 

Nowadays the kernel patches itself at runtime, I believe, to reduce the cost
of SMP on UP.  But your point stands, anyway.

Heck, use of ECC memory can slow down a system by as much as 1% AFAIK, and
still, use of ECC is pretty much a given everywhere people really cares
about stability (e.g. you cannot even buy servers from non-joke vendors
without chipkill memory...)

> Anyway, if the overhead of SE Linux in the kernel is something you consider 
> to 
> be a problem then there are many bigger problems that you will have with the 

If the overhead is really big, we can have SE Linux in the kernel as an
optional component.  But it isn't that big when the thing is off.

It *is* quite measurable when it is ON and enforcing policy, but since we
are not talking about whether to enable it by default or not, or even how to
word the question asking the user whether he want it enabled or not, THAT is
not the point.

> Debian kernel packages (or probably any kernel image from a binary 
> distribution).  Best to just compile your own kernel.

Agreed.

> > "Real world security concerns"? Please describe your "real world" and
> > compare to the other existant "real world"s.

Botnets and the mafias behind them.  Trojans.  Script kiddies.

> > It is not enabled by default. That is the other point: you get that selinux
> > integration if you want or not.

Yes, and exactly what is the problem with that?

Have you *ever* looked at the ammount of libraries we link to in Debian?  SE
Linux libs are small compared to most of them, and *far* more useful.

SE Linux is really just an extra library and files laying around in your HD,
as long as you compile your own kernel.  And if you don't compile your own
kernel, its impact is very minimal while disabled *and* you are in no
position to argue anything about performance, as the Debian kernel config is
anything BUT engineered for performance anyway (e.g. everything is a
module).

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts at security

2007-02-03 Thread Ron Johnson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 02/03/07 08:20, Henrique de Moraes Holschuh wrote:
> On Sat, 03 Feb 2007, Russell Coker wrote:
[snip]
>>> "Real world security concerns"? Please describe your "real world" and
>>> compare to the other existant "real world"s.
> 
> Botnets and the mafias behind them.  Trojans.  Script kiddies.

I definitely know that there are Linux rootkits (sneak in via bugs
in ssh, PHP & MySQL, and kernel bugs?), but how pervasive are
*infected* Linux machines?


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFxKU8S9HxQb37XmcRAqZ/AJ9uCmpn1VPzIzoecfiIUGMfxGwujQCgubBV
Kdmxr2m8Z85wB0HOElVLBUA=
=EQJQ
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



/foo has been mounted xx times... check forced

2007-02-03 Thread Enrico Zini
Hello,

the feature as in the subject is nice and makes me feel safe, but
sometimes it hits on the laptop, when booting on batteries, with people
watching.

Ideally, if I'm in a hurry I would like to be able to do ^C on it, and I
would expect that the same check is run at next boot; however, I never
dare doing it.

Assuming it's safe to ^C fsck, would it make sense to change the message
to document it, like:

  /foo has been mounted xx times [...] check forced
  If you need to boot quickly, you can safely interrupt with ^C and
  postpone the check to the next startup.

Or are there better fsck strategies?


Ciao,

Enrico

-- 
GPG key: 1024D/797EBFAB 2000-12-05 Enrico Zini <[EMAIL PROTECTED]>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: /foo has been mounted xx times... check forced

2007-02-03 Thread Frans Pop
On Saturday 03 February 2007 10:39, Enrico Zini wrote:
> Assuming it's safe to ^C fsck, would it make sense to change the
> message to document it, like:

In my experience it is safe, except when the / partition is being fsck'ed. 

For / it is also safe, but I've been unable to get the system to boot 
normally before first completing the fsck. IIRC, it will reboot and then 
happily start fcsk'ing again.


pgp8eaG4xA2vg.pgp
Description: PGP signature


Re: /foo has been mounted xx times... check forced

2007-02-03 Thread Ron Johnson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 02/03/07 03:39, Enrico Zini wrote:
> Hello,
> 
> the feature as in the subject is nice and makes me feel safe, but
> sometimes it hits on the laptop, when booting on batteries, with people
> watching.
> 
> Ideally, if I'm in a hurry I would like to be able to do ^C on it, and I
> would expect that the same check is run at next boot; however, I never
> dare doing it.
> 
> Assuming it's safe to ^C fsck, would it make sense to change the message
> to document it, like:
> 
>   /foo has been mounted xx times [...] check forced
>   If you need to boot quickly, you can safely interrupt with ^C and
>   postpone the check to the next startup.
> 
> Or are there better fsck strategies?

The file /etc/init.d/checkfs.sh (in package initscripts) is supposed
to check whether you are on battery power or not.  Maybe a bug needs
to be filed against it?

Also according to /etc/init.d/checkfs.sh, the existence of the file
/fastboot should prevent fsck.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFxNYqS9HxQb37XmcRAnYXAJ9q9QpaaYIFXk3AWX7sIF0ox9FsQgCfRg66
9kUxXl/lO9LQwtSVlmCknN0=
=VaZt
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: /foo has been mounted xx times... check forced

2007-02-03 Thread Nico Golde
Hi,
* Ron Johnson <[EMAIL PROTECTED]> [2007-02-03 20:13]:
> On 02/03/07 03:39, Enrico Zini wrote:
[...] 
> > Assuming it's safe to ^C fsck, would it make sense to change the message
> > to document it, like:
> > 
> >   /foo has been mounted xx times [...] check forced
> >   If you need to boot quickly, you can safely interrupt with ^C and
> >   postpone the check to the next startup.
> > 
> > Or are there better fsck strategies?
> 
> The file /etc/init.d/checkfs.sh (in package initscripts) is supposed
> to check whether you are on battery power or not.  Maybe a bug needs
> to be filed against it?

That would be a problem since not every laptop supports apm 
or acpi properly. Could be also possible that needed kernel modules 
for this (have not checked this) are not already loaded when 
the script is started.

Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de
JAB: [EMAIL PROTECTED] - GPG: 0x73647CFF
Forget about that mouse with 3/4/5 buttons,
gimme a keyboard with 103/104/105 keys!


pgprgograK5zM.pgp
Description: PGP signature


Bug#409526: ITP: shell.fm -- console based player for last.fm radio streams

2007-02-03 Thread Nacho Barrientos Arias
Package: wnpp
Severity: wishlist
Owner: Nacho Barrientos Arias <[EMAIL PROTECTED]>

* Package name: shell.fm
  Version : 0.2
  Upstream Author : Jonas Kramer <[EMAIL PROTECTED]> and others.
* URL : http://nex.scrapping.cc/shell-fm/
* License : GPL
  Programming Lang: C
  Description : console based player for last.fm radio streams

Shell.FM is a lightweight and interactive console based player 
for last.fm radio streams, e.g. lastfm://artistnames/someartist.
.
 Homepage: http://nex.scrapping.cc/shell-fm/

-

Maintainer notes:

Upstream is currently working in switching from OpenSSL to libgcrypt
(or something like that), so I won't work on this package until this 
transition is complete.

Regarding source version, I will probably upload a SVN snapshot.

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-amd64
Locale: LANG=en_GB.ISO-8859-15, LC_CTYPE=en_GB.ISO-8859-15 (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: /foo has been mounted xx times... check forced

2007-02-03 Thread Armin Berres
Ron Johnson wrote:
> The file /etc/init.d/checkfs.sh (in package initscripts) is supposed
> to check whether you are on battery power or not.  Maybe a bug needs
> to be filed against it?

Assumption: This only works, if the battery module is loaded at this
point. Normally acpid loads this module, which is to late in the boot
process.

/Armin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: /foo has been mounted xx times... check forced

2007-02-03 Thread Nico Golde
Hi,
* Armin Berres <[EMAIL PROTECTED]> [2007-02-03 21:32]:
> Ron Johnson wrote:
> > The file /etc/init.d/checkfs.sh (in package initscripts) is supposed
> > to check whether you are on battery power or not.  Maybe a bug needs
> > to be filed against it?
> 
> Assumption: This only works, if the battery module is loaded at this
> point. Normally acpid loads this module, which is to late in the boot
> process.

Acpid doesn't load modules, it only listens to events and 
executes programs.
Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de
JAB: [EMAIL PROTECTED] - GPG: 0x73647CFF
Forget about that mouse with 3/4/5 buttons,
gimme a keyboard with 103/104/105 keys!


pgpQtEdDKJbnL.pgp
Description: PGP signature


Re: /foo has been mounted xx times... check forced

2007-02-03 Thread Evgeni Golov
On Sat, 3 Feb 2007 21:45:49 +0100 Nico Golde wrote:

> Acpid doesn't load modules, it only listens to events and 
> executes programs.

But the init-script does:

# As the name says. If the kernel supports modules, it'll try to load
# the ones listed in "MODULES".
load_modules() {
...
}

Regards
-- 
   ^^^| Evgeni -SargentD- Golov ([EMAIL PROTECTED])
 d(O_o)b  | PGP-Key-ID: 0xAC15B50C
  >-|-<   | WWW: http://www.die-welt.net   ICQ: 54116744
   / \| IRC: #sod @ irc.german-freakz.net



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: /foo has been mounted xx times... check forced

2007-02-03 Thread Luca Capello
Hello!

On Sat, 03 Feb 2007 21:45:49 +0100, Nico Golde wrote:
> * Armin Berres <[EMAIL PROTECTED]> [2007-02-03 21:32]:
>> Ron Johnson wrote:
>>> The file /etc/init.d/checkfs.sh (in package initscripts) is
>>> supposed to check whether you are on battery power or not.  Maybe
>>> a bug needs to be filed against it?
>> 
>> Assumption: This only works, if the battery module is loaded at
>> this point. Normally acpid loads this module, which is to late in
>> the boot process.
>
> Acpid doesn't load modules, it only listens to events and executes
> programs.

This is not completely true, because the Debian acpid init scripts
loads modules, as per /etc/default/acpid:
=
# Specify modules to load on acpid's startup
# MODULES may be uncommented to load "none", contain the string "all"
# to load all acpi related modules or simply a space seperated list
# of modules to be probed.
MODULES="battery ac processor button fan thermal"
=

Thx, bye,
Gismo / Luca


pgpSaioLtuUhF.pgp
Description: PGP signature


Re: /foo has been mounted xx times... check forced

2007-02-03 Thread Armin Berres
Evgeni Golov wrote:
> On Sat, 3 Feb 2007 21:45:49 +0100 Nico Golde wrote:
> 
>> Acpid doesn't load modules, it only listens to events and 
>> executes programs.
> 
> But the init-script does:

That's what I meant. Thanks for the clarification.
I can confirm the following behavior: If I boot with a stock debian
kernel fsck is run even if I'm on battery. If I boot with a self
compiled kernel which has the acpi modules built in, fsck isn't
executed, if I'm on battery.

/Armin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#409544: ITP: tripod -- iPod photo uploader

2007-02-03 Thread Mark Purcell
Package: wnpp
Severity: wishlist
Owner: Mark Purcell <[EMAIL PROTECTED]>

* Package name: tripod
  Version : 0.7.0
  Upstream Author : Seb Ruiz <[EMAIL PROTECTED]>
* URL : http://www.sebruiz.net/tripod
* License : GPL
  Programming Lang: C++
  Description : iPod photo uploader

Tripod makes transferring photos to your iPod a breeze! Plug it in, select some
images and upload them!

Tripod allows for creating, deleting and renaming photo albums, as well as
transferal of photos, obviously.

This package provides similar functionality to the iPodExport plugin within the
kipi-plugins package, indeed they are written by the same upstream author.

kipi-plugins has the advantage of working with the digikam, showimg, kphotoalbum
and gwenview applications.

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (700, 'unstable'), (650, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#409553: ITP: ttf2tex -- a TrueType font installer for Unix

2007-02-03 Thread Rafael Laboissiere
Package: wnpp
Severity: wishlist
Owner: Rafael Laboissiere <[EMAIL PROTECTED]>


* Package name: ttf2tex
  Version : 0.70
  Upstream Author : Philipp Lehman <[EMAIL PROTECTED]>
* URL : 
http://www.ctan.org/tex-archive/help/Catalogue/entries/ttf2tex.html
* License : GPL
  Programming Lang: Bash shell
  Description : a TrueType font installer for Unix

 ttf2tex is a script for the Bash shell which generates all files
 required to use TrueType fonts with teTeX or TeX Live from a set of
 font files. In short, it will do for fonts what fontinst's latinfamily
 command does for Type 1 PostScript fonts. In addition to that, ttf2tex
 sorts all files, builds the map files required by ttf2pk and pdftex,
 and optionally installs everything into either the system-wide local
 TeX tree or the private TeX tree of the user running ttf2tex. Note that
 ttf2tex's approach to using TrueType fonts with TeX does not imply
 converting them to Type 1 format. With a current version of teTeX and a
 proper setup, TeX can use TrueType fonts via the ttf2pk utility while
 pdftex even supports them natively.

 This package includes a tool for creating a Debian package for use in
 latex or pdflatex from a family of TT fonts in the file system
 (ttf2tex-mkpkg).  

Notice that ttf2tex is not being supported upstream since September 2004.
However, the command seems to be stable and robust.

A preliminary version of the package is available in [1], where you can also
find a package automatically generated with ttf2tex-mkpkg
(latex-dkghwr-font).  The TTF files for creating this package are in the
ttf-fifthhorseman-dkg-handwriting, which is in the NEW queue.  After
installing this package, a LaTeX file as simple as [2] can be used in
pdflatex to produce DVI or PDF files [3].



[1] http://people.debian.org/~rafael/ttf2tex/
[2] http://people.debian.org/~rafael/ttf2tex/test.tex
[3] http://people.debian.org/~rafael/ttf2tex/test.pdf
 
  

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.17-2-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#409563: ITP: thinkfinger -- library and utility for the SGS Thomson Microelectronics fingerprint reader

2007-02-03 Thread Luca Capello
Package: wnpp
Owner: Luca Capello <[EMAIL PROTECTED]>
Severity: wishlist

* Package name: thinkfinger
  Version : 0.2.2 [1]
  Upstream Author : Timo Hoenig <[EMAIL PROTECTED]>, Pavel Machek <[EMAIL 
PROTECTED]>
* URL or Web page : http://thinkfinger.sourceforge.net
* License : GPL
  Description : $PACKAGE for the SGS Thomson Microelectronics fingerprint 
reader

ThinkFinger is a driver for the UPEK/SGS Thomson Microelectronics
fingerprint reader.  The device is being found either as a standalone
USB device, built into USB keyboards or built into laptops (usually
From Dell, IBM/Lenovo and Toshiba).

Here it will be the second part of the long description, read below.
Moreover, $PACKAGE in the short description will reflect the package
contents [2].

ThinkFinger is devided into two parts: libthinkfinger and
pam_thinkfinger.  libthinkfinger is a library to be used in order to
communicate with the fingerprint reader.  The utility 'tf-tool' can be
used to acquire and to verify fingerprints.

Now, I don't really know the best way to package ThinkFinger.  In
theory, I guess we should have (file size in bytes, not stripped):

- libthinkfinger, depends on libusb
/usr/lib/libthinkfinger.so (31751)

- libthinkfinger-dev
/usr/include/libthinkfinger.h (4732)
/usr/lib/libthinkfinger.a (40484)
/usr/lib/libthinkfinger.la (876)
/usr/lib/pkgconfig/libthinkfinger.pc (324)

- tf-tool, depends on libthinkfinger
/usr/sbin/tf-tool (23152)
/usr/share/man/man1/tf-tool.1.gz (1052)

- libpam-thinkfinger, depends on libthinkfinger [3]
/etc/pam_thinkfinger/ [where the login fingerprint are stored]
/lib/security/pam_thinkfinger.so (27724)
/usr/share/man/man8/pam_thinkfinger.8.gz (782)

Am I correct?  Is tf-tool worth a single package or can I include it
in libthinkfinger (as I'd prefer)?

Thx, bye,
Gismo / Luca

Footnotes: 
[1] the package version will be greater than 0.2.2, because I'll wait
for the inclusion of the manpages as of 
  http://thread.gmane.org/gmane.linux.drivers.thinkfinger/111
[2] I still have a problem, because e.g. "PAM module for the SGS
Thomson Microelectronics fingerprint reader" is longer than the
expected 60 characters for the short description.  Suggestions
welcome!
[3] strictly speaking, the PAM module doesn't depend on tf-tool,
because it uses libthinkfinger to access the fingerprint reader.
However, it should recommends tf-tool because the latter is
necessary to acquire the fingerprint for a login user


pgp1ZO6k0qTN5.pgp
Description: PGP signature


Re: Attempts at security (was Re: Draft spec for new dpkg "triggers" feature)

2007-02-03 Thread Russell Coker
On Saturday 03 February 2007 23:47, Hendrik Sattler 
<[EMAIL PROTECTED]> wrote:
> > It's disabled by default, unlike in Fedora and Red Hat Enterprise Linux
> > where it's on by default.  I believe that the latest release of SUSE has
> > AppArmor on by default.
>
> RedHat has a long history of strange decisions.

Red Hat has a long history of making Linux easy to use.  Try using Fedora and 
Debian for the same sys-admin tasks and compare.  You will discover that 
right from the install Fedora is a lot easier.  Of course the Debian 
installer gives many options that the Fedora installer doesn't (degraded RAID 
arrays and encrypted block devices as two examples), but it's a lot harder to 
use.

The "targeted" SE Linux policy was developed because the "strict" policy was 
too difficult to use for most of the Fedora user-base.

> > You claim that almost all the examples I gave have problems.  Please
> > explain the problems that you believe to be in exec-shield, PIE, and
> > poly-instantiated directories.  Make sure that they are real examples not
> > "a program might have some problem" claims.
>
> PIE:
> http://www.linuxfromscratch.org/hlfs/view/unstable/uclibc/chapter02/pie.htm
>l Does X already work with it? Mplayer is also name there and thus probably
> xine (using these win32-DLLs), too? How about things like Mono?

I don't recall anyone seriously suggesting compiling all programs with PIE, 
just the ones that are likely to be attacked.

Mplayer does many nasty things (such as loading Windows DLLs).  You can expect 
it to have problems that other programs don't have.

> Exec-shield is related to it, AFAIK.

Not really.

> For the poly-instantiated views to directories, I am not sure that this is
> thought to its end, yet.

It's been around in various forms for more than 10 years, people have thought 
about it a lot.

> The main usage will probably be /tmp but there are 
> already solutions for secure temp file creation.

http://www.coker.com.au/selinux/talks/sage-2006/PolyInstantiatedDirectories.html
There aren't any other solutions to the problems that are solved by 
PI-directories.  Read my paper from the above URL and see if you can discover 
another solution.

> Users may get confused why they do not see the same directory contents
> althought the path is the same.

Generally with PI-directories a user doesn't have the opportunity to see 
different views of the same directory so this isn't a problem.

-- 
[EMAIL PROTECTED]
http://etbe.blogspot.com/  My Blog

http://www.coker.com.au/sponsorship.html Sponsoring Free Software development


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts at security

2007-02-03 Thread Russell Coker
On Sunday 04 February 2007 01:20, Henrique de Moraes Holschuh <[EMAIL 
PROTECTED]> 
wrote:
> On Sat, 03 Feb 2007, Russell Coker wrote:
> > One that springs to mind is CONFIG_HIGHMEM4G, it seems only useful if you
> > have
>
> You need to enable PAE (64GB support) to access the NX bit on ia32, which
> is even worse, and that's the reason why my 1GB laptop has a PAE kernel :(

My impression (after a quick google search) is that only applies when running 
a 32bit kernel on a 64bit CPU.  Best to just run an AMD64 kernel and have NX 
without any problems.

As an AMD64 kernel runs 32bit binaries, if you want a 32bit user-space why not 
run a 64bit kernel anyway?

> Heck, use of ECC memory can slow down a system by as much as 1% AFAIK, and
> still, use of ECC is pretty much a given everywhere people really cares
> about stability (e.g. you cannot even buy servers from non-joke vendors
> without chipkill memory...)

I wasn't aware of a 1% slowdown, however I have observed that the vendors that 
ship ECC systems tend to ship them some months after equivalent machines are 
available in non-ECC versions.  Being 3-6 months behind the cutting edge of 
technology is effectively more than a 1% loss.

> It *is* quite measurable when it is ON and enforcing policy, but since we

Measurable being as much as 5% depending on what you do (usually significantly 
less than 5%).

> > > It is not enabled by default. That is the other point: you get that
> > > selinux integration if you want or not.
>
> Yes, and exactly what is the problem with that?
>
> Have you *ever* looked at the ammount of libraries we link to in Debian? 
> SE Linux libs are small compared to most of them, and *far* more useful.

Maybe the people who complain about SE Linux overhead would be better off 
using Gentoo.  With Gentoo you can turn off every option that you don't need.  
This gets you the minimal installed size for everything and also means that 
you can discover exciting new bugs that other people haven't discovered.

-- 
[EMAIL PROTECTED]
http://etbe.blogspot.com/  My Blog

http://www.coker.com.au/sponsorship.html Sponsoring Free Software development


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Welcome to Gay.com!

2007-02-03 Thread Earlie Laoz

idid'nt received my verification code, please send it

Thanks

_
Express yourself instantly with MSN Messenger! Download today it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts at security

2007-02-03 Thread Henrique de Moraes Holschuh
On Sun, 04 Feb 2007, Russell Coker wrote:
> On Sunday 04 February 2007 01:20, Henrique de Moraes Holschuh <[EMAIL 
> PROTECTED]> 
> wrote:
> > On Sat, 03 Feb 2007, Russell Coker wrote:
> > > One that springs to mind is CONFIG_HIGHMEM4G, it seems only useful if you
> > > have
> >
> > You need to enable PAE (64GB support) to access the NX bit on ia32, which
> > is even worse, and that's the reason why my 1GB laptop has a PAE kernel :(
> 
> My impression (after a quick google search) is that only applies when running 
> a 32bit kernel on a 64bit CPU.  Best to just run an AMD64 kernel and have NX 
> without any problems.

Also for 32 bits on a 32 bit CPU, which is my case.  ia32 is not only the
32bits mode of a 64-bit processor.  It is the old i386...i686 arches too.

So I happen to not HAVE amd64 hardware in the laptop, at all :)

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



nsswitch.conf

2007-02-03 Thread Brian May
Hello,

Is it still the case that packages should not update
/etc/nsswitch.conf as documented in bug #78110?

The reason I ask is because libnss-mdns does just
this (e.g. see bug #406198), and I thought this
was a policy violation.

My personal opinion is that I consider /etc/nsswitch.conf, like
/etc/network/interfaces, a file reserved for local administrators and
changing the fundamental polices of the computer because some package
the administrator never heard of before was automatically pulled into
the upgrade process is not a good thing.

(not to mention mdns breaks anybody who used the recommendations of a
draft Internet standard[1] to name local computers as documented
already in numerous bug reports)

If it is now considered OK to update /etc/nsswitch.conf, could
somebody please point me to references?

Thanks.

Notes
[1] 
http://www3.ietf.org/proceedings/98aug/I-D/draft-ietf-dnsind-local-names-05.txt

Yes - I know - it has expired - the only other standard I know of that
reserves top level domains though is RFC2606[2], and I don't consider it
appropriate any of these for a local computer network.

[2] http://www.faqs.org/rfcs/rfc2606.html
-- 
Brian May <[EMAIL PROTECTED]>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts at security (was Re: Draft spec for new dpkg "triggers" feature)

2007-02-03 Thread Steve Langasek
On Sun, Feb 04, 2007 at 12:27:41PM +1100, Russell Coker wrote:
> On Saturday 03 February 2007 23:47, Hendrik Sattler 
> <[EMAIL PROTECTED]> wrote:
> > > It's disabled by default, unlike in Fedora and Red Hat Enterprise Linux
> > > where it's on by default.  I believe that the latest release of SUSE has
> > > AppArmor on by default.

> > RedHat has a long history of strange decisions.

> Red Hat has a long history of making Linux easy to use.  Try using Fedora and 
> Debian for the same sys-admin tasks and compare.  You will discover that 
> right from the install Fedora is a lot easier.  Of course the Debian 
> installer gives many options that the Fedora installer doesn't (degraded RAID 
> arrays and encrypted block devices as two examples), but it's a lot harder to 
> use.

Any chance we could stick to arguing the technical case for SELinux, instead
of inviting the thread to be further derailed in response to FUD about the
usability of the Debian installer?

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]