Re: projectb users - we want you

2008-08-12 Thread Michael Casadevall
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I'm not a DD so I can't add myself to the list; I'd like to see better
support for importing dsc files and binaries into the archive (aka to
importing an existing archives (import-archive now works  though after
I gave it a lobotomy).

Database wise, the only thing I could see being a worthwhile
improvement to whats already there would maybe be moving the bug
closed lists to the database so they can be queried without having to
go parsing through text files. That being said, that improvement
probably would only affect Debian itself, and very few dak/projectb
users.
Michael

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: http://getfiregpg.org

iEYEARECAAYFAkihSYMACgkQpblTBJ2i2puKxACeOdvLRWO/xmhMOINRnlpjk8ja
tekAn0AblyCJ4JX+NBBuahMebKXkYBff
=SoLc
-END PGP SIGNATURE-

On Mon, Aug 11, 2008 at 5:38 PM, Cameron Dale <[EMAIL PROTECTED]> wrote:
> On Wed, Aug 6, 2008 at 12:13 PM, Joerg Jaspert <[EMAIL PROTECTED]> wrote:
>> Please login to merkel and add yourself to ~joerg/projectb.users (the
>> file is mode 666, so everyone with login is able to do it).
>
> Done. I'm surprised at the few entries after almost a week. Is no one
> using projectb, or is everyone busy at debconf?
>
>> Also, as a user, or potential user, of that database - feel free to let
>> us know what other data you would like to see in it. We might actually
>> put it into the database then. (It has to be related to the archive in
>> some way, so we wont randomly list, eg., bug data or something, but one
>> example would be adding the descriptions or so).
>
> I'd like to have access to all of the hashes of the files, SHA1 in
> particular, instead of just the MD5.
>
> Also, there's some information available in the archive that doesn't
> seem to be available in projectb, but that it would be nice to have.
> The suite_architectures table is incomplete (only listing unstable,
> experimental, sarge-r0, and etch-m68k). And there also isn't a way to
> determine the codenames from the suite names without looking in the
> Release files.
>
> Thanks,
> Cameron
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>
>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#494796: ITP: life -- LIbrary for the Finite Element method

2008-08-12 Thread Christophe Prud'homme
Package: wnpp
Severity: wishlist
X-Debbugs-CC: debian-devel@lists.debian.org

--- Please fill out the fields below. ---

   Package name: life
Version: 0.9.8
Upstream Author: Christophe Prud'homme <[EMAIL PROTECTED]>
URL: http://www.prudhomm.org/life
License: LGPL
Description: LIbrary for the Finite Element method

Life is a C++ library for partial differential equation solves using 
generalized Galerkin methods i.e. fem, hp/fem, spectral methods. The main 
features are: 
 o handles 1D, 2D and 3D geometries 
 o supports various geometric entities: simplices and hypercubes
 o supports various polynomial families: Lagrange, Legendre, Dubiner
 o supports from low to high order approximations in space, time and geometry
 o provides functional mathematical concepts : operators, function spaces,   
   elements of function spaces... 
 o provides a Domain Specific Embedded Language (DSEL) in C++ for variational
   formulations, integration and projection 

A version of the Debian files is already available on the pkg-scicomp svn 
repository.

C.
-- 
Debian Developer
Annecy - Grenoble
Scientific computing related software



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages

2008-08-12 Thread brian m. carlson

On Tue, Aug 12, 2008 at 10:38:07AM +0400, Dmitry E. Oboukhov wrote:

SM> A while ago, the use of libpam-tmpdir was suggested in order to mitigate
SM> some of these attacks. It would be nice to see it in use by default, some
SM> day.

SM> Obviously there will always be some programs that don't look at the
SM> TMPDIR environment variable and directly use /tmp.
write file to /tmp/filename == write file to $TMPDIR/filename
both cases are security holes if TMPDIR=/tmp :)


The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp
that is only accessible by that user, and then sets TMPDIR and other
variables to that.  Hence, it doesn't matter nearly as much if you
create a non-random filename, because nobody but you can access it.

--
brian m. carlson / brian with sandals: Houston, Texas, US
+1 713 440 7475 | http://crustytoothpaste.ath.cx/~bmc | My opinion only
troff on top of XML: http://crustytoothpaste.ath.cx/~bmc/code/thwack
OpenPGP: RSA v4 4096b 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187


signature.asc
Description: Digital signature


Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages

2008-08-12 Thread Dmitry E. Oboukhov
>>> A while ago, the use of libpam-tmpdir was suggested in order to mitigate
>>> some of these attacks. It would be nice to see it in use by default, some
>>> day.
>> 
>>> Obviously there will always be some programs that don't look at the
>>> TMPDIR environment variable and directly use /tmp.
>> write file to /tmp/filename == write file to $TMPDIR/filename
>> both cases are security holes if TMPDIR=/tmp :)

> The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp
> that is only accessible by that user, and then sets TMPDIR and other
> variables to that. Hence, it doesn't matter nearly as much if you
> create a non-random filename, because nobody but you can access it.

Yes, but
scripts must use $TMPDIR instead '/tmp' or mktemp/tempfile utils :)

--
... mpd playing: U.D.O. - Midnight Mover

. ''`. Dmitry E. Oboukhov
: :’  : [EMAIL PROTECTED]
`. `~’ GPGKey: 1024D / F8E26537 2006-11-21
  `- 1B23 D4F8 8EC0 D902 0555  E438 AB8C 00CF F8E2 6537


signature.asc
Description: Digital signature


Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages

2008-08-12 Thread Dmitry E. Oboukhov

The script in attach looks through a mirror of a specified distributive
and makes a search of '>\s*/tmp/' and 'tee [^|]*/tmp/' constructions.

It finds less errors then I've found earlier however the results of its
work are more accurate.

The script looks through all the files of packages marked as executable.
That is even if the script is in /usr/share/doc and is marked as
executable it will be tested nevertheless.

The full viewing of a mirror takes a few hours.
Later I shall publish the reports on lenny (already attached) and etch.
:)

attaches: 
report of lenny: http://uvw.ru/report.lenny.txt
script: http://uvw.ru/find_the_bug2.sh

Somebody may rewrite 'check' section of script ;)

short report of lenny:

Package: aegis
Version: 4.24-3
 /usr/share/doc/aegis/examples/remind/bng_dvlpd.sh
 /usr/share/doc/aegis/examples/remind/bng_rvwd.sh
 /usr/share/doc/aegis/examples/remind/awt_dvlp.sh
 /usr/share/doc/aegis/examples/remind/awt_intgrtn.sh

Package: aegis-web
Version: 4.24-3
 /usr/lib/cgi-bin/aegis.cgi

Package: ampache
Version: 3.4.1-1
 /usr/share/ampache/www/locale/base/gather-messages.sh

Package: apertium
Version: 3.0.7+1-1+b1
 /usr/bin/apertium-gen-deformat
 /usr/bin/apertium-gen-reformat
 /usr/bin/apertium

Package: aptoncd
Version: 0.1-1.1
 /usr/share/aptoncd/xmlfile.py

Package: ara-byte
Version: 1.0.25
 /usr/bin/ara

Package: arb-common
Version: 0.0.20071207.1-4
 /usr/lib/arb/SH/arb_fastdnaml
 /usr/lib/arb/SH/dszmconnect.pl

Package: audiolink
Version: 0.05-1
 /usr/bin/audiolink

Package: aview
Version: 1.3.0rc1-8
 /usr/bin/asciiview

Package: bacula-common
Version: 2.4.2-1
 
/usr/share/doc/bacula-common/examples/autochangers/mtx-changer.Adic-Scala=
r-24

Package: bash-doc
Version: 3.2-4
 /usr/share/doc/bash/examples/misc/aliasconv.sh
 /usr/share/doc/bash/examples/misc/aliasconv.bash
 /usr/share/doc/bash/examples/misc/cshtobash

Package: bk2site
Version: 1:1.1.9-3.1
 /usr/lib/cgi-bin/bk2site/redirect.pl

Package: bulmages-servers
Version: 0.11.1-2
 /usr/share/bulmages/examples/scripts/actualizabulmacont
 /usr/share/bulmages/examples/scripts/installbulmages-db
 /usr/share/bulmages/examples/scripts/creabulmafact
 /usr/share/bulmages/examples/scripts/creabulmacont
 /usr/share/bulmages/examples/scripts/actualizabulmafact

Package: caudium
Version: 3:1.4.12-11
 /usr/share/caudium/configvar

Package: cdcontrol
Version: 1.90-1.1
 /usr/lib/cdcontrol/writtercontrol

Package: cdrw-taper
Version: 0.4-2
 /usr/sbin/amlabel-cdrw

Package: citadel-server
Version: 7.37-1
 /usr/lib/citadel-server/migrate_aliases.sh

Package: cman
Version: 2.20080629-1
 /usr/sbin/fence_egenera

Package: cmus
Version: 2.2.0-1+b1
 /usr/share/doc/cmus/examples/cmus-status-display

Package: convirt
Version: 0.8.2-3
 /usr/share/convirt/image_store/_template_/provision.sh
 /usr/share/convirt/image_store/Linux_CD_Install/provision.sh
 /usr/share/convirt/image_store/Fedora_PV_Install/provision.sh
 /usr/share/convirt/image_store/CentOS_PV_Install/provision.sh
 /usr/share/convirt/image_store/common/provision.sh
 /usr/share/convirt/image_store/example/provision.sh
 /usr/share/convirt/image_store/Windows_CD_Install/provision.sh

Package: crossfire-maps
Version: 1.11.0-1
 /usr/share/games/crossfire/maps/Info/combine.pl

Package: ctn
Version: 3.0.6-12
 /usr/share/doc/ctn/examples/add-accession-numbers

Package: cups
Version: 1.3.7-9
 /usr/share/doc/cups/examples/pstopdf

Package: datafreedom-perl
Version: 0.1.7-1
 /usr/bin/dfxml-invoice

Package: decompyle
Version: 2.3.2-4+b1
 /usr/bin/decompyle

Package: dhis-server
Version: 5.3-1
 /usr/lib/dhis-server/dhis-dummy-log-engine

Package: digitaldj
Version: 0.7.5-6+b1
 /usr/share/digitaldj/fest.pl

Package: dist
Version: 1:3.5-17-1
 /usr/bin/patcil
 /usr/bin/patdiff

Package: docvert
Version: 3.4-4
 
/usr/share/docvert/core/lib/pyodconverter/test-pipe-to-pyodconverter.org.=
sh

Package: dpkg-cross
Version: 2.3.0
 /usr/share/dpkg-cross/bin/gccross

Package: dtc-common
Version: 0.29.6-1
 /usr/share/dtc/admin/accesslog.php
 /usr/share/dtc/admin/sa-wrapper

Package: emacs-jabber
Version: 0.7.91-1
 /usr/lib/emacsen-common/packages/install/emacs-jabber

Package: emacspeak
Version: 26.0-3
 /usr/share/emacs/site-lisp/emacspeak/etc/extract-table.pl

Package: feta
Version: 1.4.16
 /usr/share/feta/plugins/to-upgrade

Package: firehol
Version: 1.256-4
 /sbin/firehol

Package: fml
Version: 4.0.3.dfsg-2
 /usr/share/fml/libexec/mead.pl

Package: freeradius-dialupadmin
Version: 2.0.4+dfsg-4
 /usr/share/freeradius-dialupadmin/bin/backup_radacct
 /usr/

Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages

2008-08-12 Thread Eugene V. Lyubimkin
Dmitry E. Oboukhov wrote:
 A while ago, the use of libpam-tmpdir was suggested in order to mitigate
 some of these attacks. It would be nice to see it in use by default, some
 day.
 Obviously there will always be some programs that don't look at the
 TMPDIR environment variable and directly use /tmp.
>>> write file to /tmp/filename == write file to $TMPDIR/filename
>>> both cases are security holes if TMPDIR=/tmp :)
> 
>> The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp
>> that is only accessible by that user, and then sets TMPDIR and other
>> variables to that. Hence, it doesn't matter nearly as much if you
>> create a non-random filename, because nobody but you can access it.
> 
> Yes, but
> scripts must use $TMPDIR instead '/tmp' or mktemp/tempfile utils :)
tempfile uses $TMPDIR by default :)

-- 
Eugene V. Lyubimkin aka JackYF, Ukrainian C++ developer.



signature.asc
Description: OpenPGP digital signature


Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages

2008-08-12 Thread Dmitry E. Oboukhov
EVL>>> The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp
EVL>>> that is only accessible by that user, and then sets TMPDIR and other
EVL>>> variables to that. Hence, it doesn't matter nearly as much if you
EVL>>> create a non-random filename, because nobody but you can access it.
EVL>> 
EVL>> Yes, but
EVL>> scripts must use $TMPDIR instead '/tmp' or mktemp/tempfile utils :)
EVL> tempfile uses $TMPDIR by default :)

sorry, 
scripts must use $TMPDIR or _must_ _use_ mktemp/tempfile ;)

--
... mpd playing: U.D.O. - Animal House

. ''`. Dmitry E. Oboukhov
: :’  : [EMAIL PROTECTED]
`. `~’ GPGKey: 1024D / F8E26537 2006-11-21
  `- 1B23 D4F8 8EC0 D902 0555  E438 AB8C 00CF F8E2 6537


signature.asc
Description: Digital signature


Re: Can a package modify slapd.conf in its maintainer script?

2008-08-12 Thread Petter Reinholdtsen

[Soren Hansen]
> On Mon, Aug 11, 2008 at 08:48:29AM +0200, Petter Reinholdtsen wrote:
>> I really wish there was some organized way for packages to
>> automatically add schemas and settings to the OpenLDAP server
>> configuration, at install time.
>
> The new cn=config backend in recent OpenLDAP versions provide
> exactly this sort of thing (also for remote slapd instances, I
> believe).

This sound very interesting, and the web pages I find about it
indicate that it definitely would solve part of our OpenLDAP
configuration issues.  Is it possible to enable it automatically in
slapd at install time?

Happy hacking,
-- 
Petter Reinholdtsen


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Can a package modify slapd.conf in its maintainer script?

2008-08-12 Thread Steve Langasek
On Tue, Aug 12, 2008 at 05:21:26PM +0200, Petter Reinholdtsen wrote:

> [Soren Hansen]
> > On Mon, Aug 11, 2008 at 08:48:29AM +0200, Petter Reinholdtsen wrote:
> >> I really wish there was some organized way for packages to
> >> automatically add schemas and settings to the OpenLDAP server
> >> configuration, at install time.

> > The new cn=config backend in recent OpenLDAP versions provide
> > exactly this sort of thing (also for remote slapd instances, I
> > believe).

> This sound very interesting, and the web pages I find about it
> indicate that it definitely would solve part of our OpenLDAP
> configuration issues.  Is it possible to enable it automatically in
> slapd at install time?

It is possible; I'm currently awaiting feedback from the OpenLDAP
comaintainers before we enable it.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developerhttp://www.debian.org/
[EMAIL PROTECTED] [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Can a package modify slapd.conf in its maintainer script?

2008-08-12 Thread Bastian Blank
On Tue, Aug 12, 2008 at 12:35:30PM -0300, Steve Langasek wrote:
> It is possible; I'm currently awaiting feedback from the OpenLDAP
> comaintainers before we enable it.

You know that parts of the config settings are only supported in the
legacy-format? Is there documentation how to import new schemas in the
new config tree? Also modification are only supported via the ldap
protocol, who say that root may authenticate at all?

Bastian

-- 
We do not colonize.  We conquer.  We rule.  There is no other way for us.
-- Rojan, "By Any Other Name", stardate 4657.5


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#494863: ITP: transset-df -- manager for on-the-fly transparency changing in X

2008-08-12 Thread Daniel Moerner
Package: wnpp
Severity: wishlist
Owner: Daniel Moerner <[EMAIL PROTECTED]>

  Package name: transset-df
  Version : 6
  Upstream Author : Daniel Forchheimer <[EMAIL PROTECTED]>
  URL : http://www.forchheimer.se/transset-df/
  License : 'Use however you want. I can't stop you': public domain
 parts.

 Copyright 1993, 1998 The Open Group

 Permission to use, copy, modify, distribute, and sell this
 software and its documentation for any purpose is hereby 
 granted without fee, provided that the above copyright 
 notice appear in all copies and that both that copyright 
 notice and this permission notice appear in supporting
 documentation.
 [...]

  Programming Lang: C
  Description : manager for on-the-fly transparency changing in X

transset-df is a program that allows the user to change window 
transparencies on the fly.  Supported methods include using window 
manager hotkeys, 'select by pointing' without actually clicking a window, 
and selecting by name and window id.  transset-df is a modified version 
of xorg's transset and requires compositing to function.  It is meant 
to allow a windowmanger-independent way to support transparency.


I have been in contact with the upstream developer, who has expressed
interest in bringing transset-df into debian.  Unlike transset, it has
had releases in 2005, 2006, and 2007, and is still being slowly
developed upstream.  The developer is willing to explicitly provide a
better license if the public domain parts license is deemed unacceptable
for Debian.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages

2008-08-12 Thread Dmitry E. Oboukhov

report for etch:

http://uvw.ru/report.etch.txt

107 packages :(


On 18:23 Tue 12 Aug , Dmitry E. Oboukhov wrote:

TDEO> The script in attach looks through a mirror of a specified distributive
TDEO> and makes a search of '>\s*/tmp/' and 'tee [^|]*/tmp/' constructions.

TDEO> It finds less errors then I've found earlier however the results of its
TDEO> work are more accurate.

TDEO> The script looks through all the files of packages marked as executable.
TDEO> That is even if the script is in /usr/share/doc and is marked as
TDEO> executable it will be tested nevertheless.

TDEO> The full viewing of a mirror takes a few hours.
TDEO> Later I shall publish the reports on lenny (already attached) and etch.
TDEO> :)

TDEO> attaches:
TDEO> report of lenny: http://uvw.ru/report.lenny.txt
TDEO> script: http://uvw.ru/find_the_bug2.sh

--
... mpd is off

. ''`. Dmitry E. Oboukhov
: :’  : [EMAIL PROTECTED]
`. `~’ GPGKey: 1024D / F8E26537 2006-11-21
  `- 1B23 D4F8 8EC0 D902 0555  E438 AB8C 00CF F8E2 6537


signature.asc
Description: Digital signature


Bug#494868: ITP: python-keyczar -- cryptographic toolkit for python

2008-08-12 Thread Eric Evans
Package: wnpp
Severity: wishlist
Owner: Eric Evans <[EMAIL PROTECTED]>


* Package name: python-keyczar
  Version : 05b
  Upstream Author : Arkajit Dey <[EMAIL PROTECTED]>
* URL : http://code.google.com/p/keyczar/
* License : Apache 2.0
  Programming Lang: Python
  Description : cryptographic toolkit for Python

Keyczar is a cryptographic toolkit designed to make it easier and 
safer for developers to use cryptography in their applications. 
Keyczar supports authentication and encryption with both symmetric
and asymmetric keys. Some features of Keyczar include:

  * A simple API
  * Key rotation and versioning
  * Safe default algorithms, modes, and key lengths
  * Automated generation initialization vectors and ciphertext 
signatures


The long description is pretty much copy and paste from the project
website and will require some additional work. Suggestions are welcome.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)

-- 
Eric Evans
[EMAIL PROTECTED]


signature.asc
Description: Digital signature


Re: feature: to add explanations of recommendations and suggestions dependencies

2008-08-12 Thread Adeodato Simó
* Shachar Or [Sun, 10 Aug 2008 18:36:35 +0300]:

> I am not suggesting this data will be put in with the package's description, 

Why not? I think (briefly) explaining some of the most relevant
recommends and suggests is a perfect use of the description space. And
if more verbosity is needed, that information should go into the
README.Debian file in my opinion.

Cheers,

-- 
Adeodato Simó dato at net.com.org.es
Debian Developer  adeodato at debian.org
 
Testing can show the presence of bugs, but not their absence.
-- Dijkstra


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Bug#494863: ITP: transset-df -- manager for on-the-fly transparency changing in X

2008-08-12 Thread Paul Wise
On Tue, Aug 12, 2008 at 3:07 PM, Daniel Moerner <[EMAIL PROTECTED]> wrote:

> transset-df is a modified version of xorg's transset and requires compositing 
> to function.

Might be a good idea to encourage transset-df upstream to join the
upstream xorg project and commit his changes there.

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DebianPython/NewPolicy

2008-08-12 Thread Henrik Stokseth
Seems this wasn't strictly necessary according to pythonsupport's docs:
*** You don't need X[BS]-Python-Version fields. You don't need ***
*** debian/pycompat. You don't need to call dh_python after***
*** dh_pysupport. Just remove all of these.***

However python-central still uses them. So the DebianPython policy
should be updated accordingly.
See: http://wiki.debian.org/DebianPython/NewPolicy


Sincerely,
Henrik.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages

2008-08-12 Thread John H. Robinson, IV
Dmitry E. Oboukhov wrote:
> EVL>>> The idea behind libpam-tmpdir is that it creates a subdirectory of /tmp
> EVL>>> that is only accessible by that user, and then sets TMPDIR and other
> EVL>>> variables to that. Hence, it doesn't matter nearly as much if you
> EVL>>> create a non-random filename, because nobody but you can access it.
> EVL>> 
> EVL>> Yes, but
> EVL>> scripts must use $TMPDIR instead '/tmp' or mktemp/tempfile utils :)
> EVL> tempfile uses $TMPDIR by default :)
> 
> sorry, 
> scripts must use $TMPDIR or _must_ _use_ mktemp/tempfile ;)

Why use $TMPDIR at all?

$TMPDIR may not be set (libpam-tmp may not be installed[1]), so you have
to test for it. If the test fails, you have to fall back to mktemp or
tempfile.

As mktemp and tempfile are both essential[2], they can be relied upon.

If $TMPDIR is set, it may be set to something bad, like /tmp. You can be
left with the exact same problem you are trying to solve.

Both mktemp and tempfile support $TMPDIR, and will fall back gracefully
if $TMPDIR does not exist in the environment. 

My impression is that mktemp or tempfile should be used, and ignore
TMPDIR anyway. If you really need a directory to write lots of files to,
mktemp -d is there for you.

Is there any scenario where using mktemp or tempfile fails, and sing
$TMPDIR succeeds?

[1] % aptitude search libpam-tmp
p   libpam-tmpdir  - automatic per-user temporary directories  

[2] % aptitude show $(dpkg -S $(which mktemp tempfile) | sed 's/:.*//') | grep 
-E '^(Pa|E)'
Package: mktemp
Essential: yes
Package: debianutils
Essential: yes

[3] I liked [2] too much to remove it. Sorry.

-- 
John H. Robinson, IV  [EMAIL PROTECTED]
 http  
WARNING: I cannot be held responsible for the above, sbih.org ( )(:[
as apparently my cats have learned how to type.  spiders.html  


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: feature: to add explanations of recommendations and suggestions dependencies

2008-08-12 Thread Charles Plessy
Le Mon, Aug 11, 2008 at 07:02:02PM -0400, Felipe Sateler a écrit :
> Goswin von Brederlow wrote:
> 
> Could they be added as XB-Comment:? I use XS-Comment and it appears in the 
> dsc,
> I don't know if XB-* appear in the deb or elsewhere.

Hi Felipe,

The answer is only in the sources for the moment.

http://git.debian.org/?p=dpkg/dpkg.git;a=blob;f=scripts/dpkg-gencontrol.pl;h=219b4ffacd7af3e5ee051444c49f99ff61b3ce19;hb=HEAD
http://git.debian.org/?p=dpkg/dpkg.git;a=blob;f=scripts/dpkg-genchanges.pl;h=a59918f55aa72b3e204aa21f0df1bbb516300768;hb=HEAD
http://git.debian.org/?p=dpkg/dpkg.git;a=blob;f=scripts/dpkg-source.pl;h=4c9f00630bbcc7fe3b8a94ff1a76fc06be90c9e0;hb=HEAD

As I do not know if all the combinations allowed by the regular
expressions in the above scripts are intended for use, I fail to propose
a good enough documentation patch to the dpkg team. If anybody is more
inspired, feel free to send your contribution to the following bug:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476335

Have a nice day,

-- 
Charles Plessy
Debian Med packaging team,
Tsurumi, Kanagawa, Japan


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: feature: to add explanations of recommendations and suggestions dependencies

2008-08-12 Thread Felipe Sateler
Charles Plessy wrote:

> Le Mon, Aug 11, 2008 at 07:02:02PM -0400, Felipe Sateler a écrit :
>> Goswin von Brederlow wrote:
>> 
>> Could they be added as XB-Comment:? I use XS-Comment and it appears in the
>> dsc, I don't know if XB-* appear in the deb or elsewhere.
> 
> Hi Felipe,
> 
> The answer is only in the sources for the moment.

A quick test shows that XB-Comment: something shows as Comment: something in the
deb. However, this doesn't mean that it will show up in apt-cache show. It
would depend on how the Packages file is created.

-- 

  Felipe Sateler


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: feature: to add explanations of recommendations and suggestions dependencies

2008-08-12 Thread Shachar Or
On Tuesday 12 August 2008 22:57, Adeodato Simó wrote:
> * Shachar Or [Sun, 10 Aug 2008 18:36:35 +0300]:
> > I am not suggesting this data will be put in with the package's
> > description,
>
> Why not? I think (briefly) explaining some of the most relevant
> recommends and suggests is a perfect use of the description space. And
> if more verbosity is needed, that information should go into the
> README.Debian file in my opinion.

Of course that while there aren't data 'fields' for this purpose it would be 
best that maintainers put this in the description.

I'm suggesting that there be fields for this purpose, specifically - a reason 
behind each recommend/sugggest. This would make it possible for tools to 
fetch this information specifically, for tools to display this information in 
specific locations and perhaps for the system to 'know' for what reason(s) a 
package is installed.
>
> Cheers,

-- 
Shachar Or | שחר אור
http://ox.freeallweb.org/


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#494928: ITP: sflphone -- SIP and IAX2 compatible VoIP phone

2008-08-12 Thread Francois Marier
Package: wnpp
Severity: wishlist
Owner: Francois Marier <[EMAIL PROTECTED]>

* Package name: sflphone
  Version : 0.9.1
  Upstream Author : Savoir-faire Linux <[EMAIL PROTECTED]>
* URL : http://www.sflphone.org
* License : GPL
  Programming Lang: C++
  Description : SIP and IAX2 compatible VoIP phone

SFLphone is a SIP/IAX2 compatible softphone for Linux. The SFLphone project's 
goal is to
create a robust enterprise-class desktop phone. While it can serve home users 
very well,
it is designed with a hundred-calls-a-day receptionist in mind.

It features a flexible client/server architecture where the GTK client talks to 
the daemon
through DBus and is capable of handling multiple VoIP connections at once.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Can a package modify slapd.conf in its maintainer script?

2008-08-12 Thread Petter Reinholdtsen
[Bastian Blank]
> You know that parts of the config settings are only supported in the
> legacy-format?

Nope.  What parts is that?

> Is there documentation how to import new schemas in the new config
> tree?

I found http://www.zytrax.com/books/ldap/ch6/slapd-config.html>.

> Also modification are only supported via the ldap protocol, who say
> that root may authenticate at all?

I guess root can use slapadd, but then one need to stop the LDAP
server.

Happy hacking,
-- 
Petter Reinholdtsen


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages

2008-08-12 Thread Dmitry E. Oboukhov
Some people wrote to me: your script is bad, it detects qemu, but qemu
is bugfree. 

ok, looking qemu:

qemu makes mount the directory /tmp/mount.$$. Attacker creates many
symlinks /tmp/dir.\d+ -> /etc and if qemu
(/usr/sbin/qemu-make-debian-root) starts then /etc goes
out from root directory tree. The result: system is unusable.

example of script for attacker:

perl -e 'symlink("/etc", "/tmp/mount.$_") for ($$ .. $$ + 1)'

instead /etc attacker may select any system directory, for example /var,
/usr or even /.

of course I may be mistaken but I don't use qemu, sorry.

--
... mpd is off

. ''`. Dmitry E. Oboukhov
: :’  : [EMAIL PROTECTED]
`. `~’ GPGKey: 1024D / F8E26537 2006-11-21
  `- 1B23 D4F8 8EC0 D902 0555  E438 AB8C 00CF F8E2 6537


signature.asc
Description: Digital signature