Bug#613788: ITP: dropbox -- secure backup, sync and sharing util

2011-02-17 Thread Vincent Cheng
Package: wnpp
Severity: wishlist
Owner: Vincent Cheng 


* Package name: dropbox
  Version : 1.0.20-1
  Upstream Author : Dropbox, Inc.
* URL : http://www.dropbox.com
* License : Proprietary
  Section : non-free/net
  Description : secure backup, sync and sharing util

 Dropbox is a Web-based file hosting service operated by Dropbox, Inc.
 which uses cloud computing to enable users to store and share files and
 folders with others across the Internet using file synchronization.

 This package only contains the Dropbox daemon; it does not contain the
 Nautilus plugin for Dropbox.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20110217083526.29472.58814.reportbug@vincent-laptop



Re: Bug#613788: ITP: dropbox -- secure backup, sync and sharing util

2011-02-17 Thread Philipp Kern
On 2011-02-17, Vincent Cheng  wrote:
> * Package name: dropbox
>   Version : 1.0.20-1
>   Upstream Author : Dropbox, Inc.
> * URL : http://www.dropbox.com
> * License : Proprietary
>   Section : non-free/net
>   Description : secure backup, sync and sharing util

You should consider http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610300
first.

Kind regards
Philipp Kern


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/slrnilpo1r.84b.tr...@kelgar.0x539.de



Re: for those who care about unbound (resolvconf and DNSSEC)

2011-02-17 Thread Robert Edmonds
On 2011-02-17, Daniel Baumann  wrote:
> On 02/17/2011 05:07 AM, Robert Edmonds wrote:
>> i'm inclined to implement all three of these features and make them each
>> individually toggle-able via /etc/default/unbound, and to enable these
>> features by default
>
> in order to do that for the first two that involve resolvconf, does that
> mean you're going to add a depends on resolvconf (rather than e.g. a
> recommends)? i'd prefere to not have resolvconf pulled in hard.

let me rephrase: the resolvconf options would be enabled by default, but
would be no-ops unless resolvconf is installed.  and i think the package
would only Suggest: resolvconf.

-- 
Robert Edmonds
edmo...@debian.org


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/ijina1$b0k$1...@dough.gmane.org



Re: for those who care about unbound (resolvconf and DNSSEC)

2011-02-17 Thread Michael Tokarev
17.02.2011 07:07, Robert Edmonds wrote:
> hi,
> 
> i'd like to get some feedback on whether i should implement some changes
> in the unbound debian packaging:
> 
> * integration with resolvconf as a provider of recursive DNS
>   resolution. (#562031)
> 
> * retrieving a list of upstream recursive DNS servers from
>   resolvconf and automatically configuring these servers as
>   forwarders, and deconfiguring them when they are no longer
>   available. (#567879)

Yes, both of these are really useful.  I have this done long
ago locally on some notebook - trivially doable based on bind9
scripts.  I just can't find it right now.

But indeed, this (#567879) needs unbound-control working, or
else it's impossible to change unbound config at runtime.
This is not a problem IMHO, to enable unbound-control by
default in new install.  Check for 'control-enable: no'
in unbound.conf (ie, if it is explicitly disabled) before
enabling it, and log a warning if updating list of
forwarders failed in dhcp script (if updating is enabled
in /etc/default/unbound)

> * enabling DNSSEC validation by default. (#594911)

This is very useful, but questionable, since it makes
unbound to require writable files (now it does not write
anything except of the pid file).  This in turn makes it
difficult to chroot it properly - it can only be chrooted
into /etc, and I'd rather keep /etc read-only during normal
operations.  However, debian initscript does not have
provisions for chrooting it.

> i'm inclined to implement all three of these features and make them each
> individually toggle-able via /etc/default/unbound, and to enable these
> features by default, but i would like to hear some wider opinions.  (i
> have never even used resolvconf before.)
> 
> there are some sub-issues such as:
> 
> * automatically creating key material and configuration for
>   unbound-control (a la bind9 and rndc) so that unbound-control can
>   be used to reload the forwarder configuration without dumping the
>   cache.
> 
> * making sure we don't accidentally attempt to configure ourselves
>   as a forwarder.

What do you mean here?

> * how, or whether to include the root trust anchor.  unbound now has
>   a utility called unbound-anchor which attempts to fetch an updated
>   root trust anchor from https://data.iana.org/root-anchors/, using
>   a built-in copy of the ICANN HTTPS cert (so, it doesn't rely on
>   x509 PKI); failing that, it writes out a built-in copy of the root
>   trust anchor.
> 
>   it would be possible to invoke unbound-anchor in the unbound
>   postinst in order to write out a trust anchor file into e.g.
>   /var/cache/unbound, which is then referenced by the unbound config
>   file, and it would also be possible to re-invoke unbound-anchor in
>   the unbound init script.  this would mean that a DNS server with
>   the unbound package would cause HTTPS connections to be made,
>   although if these connections failed there would be a fall-back
>   trust anchor used.
> 
>   it's possible that at some point in the future old versions of
>   unbound-anchor would no longer be able to securely generate an
>   up-to-date root trust anchor file, but i believe this could be
>   adequately handled by a stable-security or stable point release
>   update.

That's all good points.  Maybe a debconf question (whenever to enable
dnssec and to fetch the root keys etc) is in order.

Thanks!

/mjt


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d5cf693.5090...@msgid.tls.msk.ru



Bug#613806: ITP: mplayer2 -- next generation movie player for Unix-like systems

2011-02-17 Thread Reinhard Tartler
Package: wnpp
Severity: wishlist
Owner: Reinhard Tartler 

* Package name: mplayer2
  Version : 2.0beta1
  Upstream Author : Uoti Urpala 
* URL : http://www.mplayer2.org/
* License : GPL
  Programming Lang: C
  Description : next generation movie player for Unix-like systems

   MPlayer plays most MPEG, VOB, AVI, Ogg/OGM, VIVO, ASF/WMA/WMV,
   QT/MOV/MP4, FLI, RM, NuppelVideo, yuv4mpeg, FILM, RoQ, PVA files,
   supported by many native, XAnim, RealPlayer, and Win32 DLL codecs. It
   can also play VideoCD, SVCD, DVD, 3ivx, RealMedia, and DivX movies.
   
   Another big feature of MPlayer is the wide range of supported output
   drivers. It works with X11, Xv, DGA, OpenGL, SVGAlib, fbdev, DirectFB,
   but also SDL (plus all its drivers) and some low level card-specific
   drivers (for Matrox, 3Dfx and Radeon, Mach64 and Permedia3). Most of
   them support software or hardware scaling, therefore allowing fullscreen
   display. MPlayer is also able to use some hardware MPEG decoder boards,
   such as the DVB and DXR3/Hollywood+.
   

The text above is copied from the existing mplayer package. It is
basically a well-known and quite popular fork of mplayer. TBH, I'm a bit
unsure what to do with it. From the first look, it seems that mplayer2
is better suited for being included in a distro release, but not (yet)
in its current form. Currently, it includes a copy of ffmpeg-mt, a
well-known fork of the ffmpeg package, which features multithreaded h264
decoding and actually is already in debian as part of the
chromium-browser package. While ffmpeg-mt is currently being
integrated/merged into ffmpeg upstream, mplayer2's future is not that
certain.

Having this in mind, I intend to maintain the package under the
pkg-multimedia umbrella. mplayer2 shoudl go to experimental for now,
including ffmpeg-mt. Help and ideas with that is more than welcome!



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110217115115.5101.47056.reportbug@debian



Default Homedir Permissions

2011-02-17 Thread Olaf van der Spek
Hi,

Default homedir permissions are 755. World-readable (and listable).
Common (security) sense says that permissions that are not required
should not be granted. For example, accounts mysql and www-data should
not have access to my documents.

Some time ago I filed a bug related to this: 398793
The maintainer didn't agree and asked me to bring this up on this
list. What do you think?
The (only) disadvantage is that ~/public_html requires you too grant
permission manually.

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398793
-- 
Olaf


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktin3n3j_dxds0zvrhhhfgo9mvvjrpg+yywdvy...@mail.gmail.com



Re: Default Homedir Permissions

2011-02-17 Thread Martin Wuertele
* Olaf van der Spek  [2011-02-17 13:51]:

> Default homedir permissions are 755. World-readable (and listable).
> Common (security) sense says that permissions that are not required
> should not be granted. For example, accounts mysql and www-data should
> not have access to my documents.
> 
> Some time ago I filed a bug related to this: 398793
> The maintainer didn't agree and asked me to bring this up on this
> list. What do you think?
> The (only) disadvantage is that ~/public_html requires you too grant
> permission manually.
> 
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398793

IIRC you are asked during installation if you want world readable home
directories or not.

Kind regards,
Martin


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110217125231.gt12...@anguilla.debian.or.at



Re: Default Homedir Permissions

2011-02-17 Thread Olaf van der Spek
On Thu, Feb 17, 2011 at 1:52 PM, Martin Wuertele  wrote:
> IIRC you are asked during installation if you want world readable home
> directories or not.

No you're not. Unless (I assume) you do an expert install. Even then,
non-world-readble means 751, not 750. The default should still change.
-- 
Olaf


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/AANLkTi=66vthmh2--ape7jqq4nwv_jdf1rhl17amk...@mail.gmail.com



Re: Default Homedir Permissions

2011-02-17 Thread Martin Wuertele
* Olaf van der Spek  [2011-02-17 13:56]:

> On Thu, Feb 17, 2011 at 1:52 PM, Martin Wuertele  wrote:
> > IIRC you are asked during installation if you want world readable home
> > directories or not.
> 
> No you're not. Unless (I assume) you do an expert install. Even then,
> non-world-readble means 751, not 750. The default should still change.

You are right about the expert install (I can't remember when I last did
a non-expert install).

751 togeather with a default umask of 027 would work, however several
programs don't work flawless with non 022 or 002 umaks (eg #531885).

Kind regards,
Martin

p.s. no need to CC me as I'm subscribed


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110217132710.gu12...@anguilla.debian.or.at



SEVEN KINGS en Tournée 2011

2011-02-17 Thread Newsletter SEVEN KINGS
SEVEN KINGS

Officiel

Sons of the Gipsy Kings

Les fils des Gipsy Kings vous feront voyager dans la musique Gitane d'hier et 
d'aujourd'hui SEVEN KINGS interprètent les plus beaux titres du répertoire des 
GIPSY KINGS, leurs pères, et de nouvelles compositions qui vous attendent dans 
cette tournée 2011
C'est ainsi qu'ils suivent le chemin de la grande lignée des REYES.

Programmez vos dates :
http://www.od-prod.com/e-mailing/contact.php?camp=sevenkings&lien=Contact&email=oliv...@od-prod.com

Tél : 00 33 4 66 84 59 58
www.seven-kings.com

Seven kings
7 Rue Félibre Roumieux
30900 NIMES


Re: Default Homedir Permissions

2011-02-17 Thread Ian Jackson
Olaf van der Spek writes ("Default Homedir Permissions"):
> Default homedir permissions are 755. World-readable (and listable).
> Common (security) sense says that permissions that are not required
> should not be granted. For example, accounts mysql and www-data should
> not have access to my documents.

I disagree with this conclusion, because I disagree with the
underlying implication that the general readability of files is not
needed.

Most installed systems have a smallish number of users who know each
other reasonably well and would like to be able to share files.  It
does not make sense to put strong privacy barriers in between those
users.  Sensitive data like email and browser histories are already
made non-world-readable.

So the default is correct.

Perhaps it might be reasonable to try to find a way for accounts like
msql and www-data not to be able to access home directories (add
"daemon" to their supplementary group list and set the permissions of
/home 0705 to root.daemon, perhaps), but is this really worthwhile ?
If it is, the right thing to do is to go away and think about exactly
how to do it, not to file a bug asking for the default home directory
permissions to be changed.

Ian.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/19805.9786.37599.609...@chiark.greenend.org.uk



Re: Default Homedir Permissions

2011-02-17 Thread Olaf van der Spek
On Thu, Feb 17, 2011 at 2:44 PM, Ian Jackson
 wrote:
> Olaf van der Spek writes ("Default Homedir Permissions"):
>> Default homedir permissions are 755. World-readable (and listable).
>> Common (security) sense says that permissions that are not required
>> should not be granted. For example, accounts mysql and www-data should
>> not have access to my documents.
>
> I disagree with this conclusion, because I disagree with the
> underlying implication that the general readability of files is not
> needed.

> Most installed systems have a smallish number of users who know each
> other reasonably well and would like to be able to share files.  It

What are those assumptions based on?
And how do you go from "want to share some files" to "default to share
all files"?

> does not make sense to put strong privacy barriers in between those
> users.  Sensitive data like email and browser histories are already
> made non-world-readable.

chmod 755 ~ is not a hard way to remove the barrier.

> So the default is correct.
>
> Perhaps it might be reasonable to try to find a way for accounts like
> msql and www-data not to be able to access home directories (add
> "daemon" to their supplementary group list and set the permissions of
> /home 0705 to root.daemon, perhaps), but is this really worthwhile ?

That would be another violation of general security principles (access
control based on exlcusion instead of inclusion);

> If it is, the right thing to do is to go away and think about exactly
> how to do it, not to file a bug asking for the default home directory
> permissions to be changed.

The bug wasn't about that, although it was related.


-- 
Olaf


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/AANLkTim3=P6Ed-=z+vnpagvfhm-fh+4gn32pbso3m...@mail.gmail.com



Re: Bug#613788: ITP: dropbox -- secure backup, sync and sharing util

2011-02-17 Thread brian m. carlson
On Thu, Feb 17, 2011 at 12:35:26AM -0800, Vincent Cheng wrote:
> * Package name: dropbox
>   Version : 1.0.20-1
>   Upstream Author : Dropbox, Inc.
> * URL : http://www.dropbox.com
> * License : Proprietary
>   Section : non-free/net
>   Description : secure backup, sync and sharing util

It looks like you're still missing the source for librsync.so.1 in your
packages.  Also, I *strongly* recommend that you not include binary-only
shared libraries that are already available in Debian.  The security
team will not be very happy with you.  As an example, your package
ships libz.so.1, which has been the target of a DSA previously.

-- 
brian m. carlson / brian with sandals: Houston, Texas, US
+1 832 623 2791 | http://www.crustytoothpaste.net/~bmc | My opinion only
OpenPGP: RSA v4 4096b: 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187


signature.asc
Description: Digital signature


Re: Default Homedir Permissions

2011-02-17 Thread Ian Jackson
Olaf van der Spek writes ("Re: Default Homedir Permissions"):
> chmod 755 ~ is not a hard way to remove the barrier.

We are arguing about defaults, so this is not a relevant answer.

> What are those assumptions based on?

I could ask you the same question.  We are arguing in a vacuum.

I don't think we should make a change, but people who want defaults
changed always make more noise than people who are happy with the way
they are.  I just wanted to make it clear that this change would not
be universally welcomed.

I don't think there is anything else useful to be said in this
subthread.

Ian.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/19805.13004.7522.663...@chiark.greenend.org.uk



Re: Default Homedir Permissions

2011-02-17 Thread Roger Leigh
On Thu, Feb 17, 2011 at 03:31:18PM +0100, Olaf van der Spek wrote:
> On Thu, Feb 17, 2011 at 2:44 PM, Ian Jackson
>  wrote:
> > Olaf van der Spek writes ("Default Homedir Permissions"):
> >> Default homedir permissions are 755. World-readable (and listable).
> >> Common (security) sense says that permissions that are not required
> >> should not be granted. For example, accounts mysql and www-data should
> >> not have access to my documents.
> >
> > I disagree with this conclusion, because I disagree with the
> > underlying implication that the general readability of files is not
> > needed.
> 
> > Most installed systems have a smallish number of users who know each
> > other reasonably well and would like to be able to share files.  It
…
> > So the default is correct.
> >
> > Perhaps it might be reasonable to try to find a way for accounts like
> > msql and www-data not to be able to access home directories (add
> > "daemon" to their supplementary group list and set the permissions of
> > /home 0705 to root.daemon, perhaps), but is this really worthwhile ?
> 
> That would be another violation of general security principles (access
> control based on exlcusion instead of inclusion);

There are obviously differences of opinion in our expectations of
"how secure" a default installation should be.

Should it be locked down like Fort Knox?

Should it be generally usable, and easy for users to see each other's
stuff?

In general, I think it's fair to say that the average Debian
installation does not require Fort Knox levels of security.  Simply
allowing other people to read our files is often something desirable;
if I have something especially secret, I'll take steps to make sure
it's not readable or writeable by anyone except me.  But in general,
it's not a bad thing that others can see my stuff.  I can always keep
private things in a 0700 subdirectory.

Even on the massively shared systems I use, it's common for home
directories to be readable by default, so you can let other people
access your data, scripts, git repos, or whatever.

I can see that in some circumstances you might well want total control
over who can see your files, but unless you're dealing with TOP SECRET
stuff, I am not convinced that this is something the typical user would
wish to have by default.  Are there any common use cases which require
this?


Regards,
Roger

-- 
  .''`.  Roger Leigh
 : :' :  Debian GNU/Linux http://people.debian.org/~rleigh/
 `. `'   Printing on GNU/Linux?   http://gutenprint.sourceforge.net/
   `-GPG Public Key: 0x25BFB848   Please GPG sign your mail.


signature.asc
Description: Digital signature


Re: Default Homedir Permissions

2011-02-17 Thread Olaf van der Spek
On Thu, Feb 17, 2011 at 3:38 PM, Ian Jackson
 wrote:
> Olaf van der Spek writes ("Re: Default Homedir Permissions"):
>> chmod 755 ~ is not a hard way to remove the barrier.
>
> We are arguing about defaults, so this is not a relevant answer.

In both cases it's easy to change permissions, but:

If you start with safe permissions but want to share everything, you
get an error message. Easy to fix.
If you start with unsafe permissions but wanted to share nothing, you
don't get an error messages and your data leaks. Impossible to fix.

>> What are those assumptions based on?
>
> I could ask you the same question.  We are arguing in a vacuum.

Feel free to ask.

-- 
Olaf


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktins21pvtzze5vkczxomabitubunx90bsye-m...@mail.gmail.com



Re: Default Homedir Permissions

2011-02-17 Thread Roger Leigh
On Thu, Feb 17, 2011 at 01:44:26PM +, Ian Jackson wrote:
> Perhaps it might be reasonable to try to find a way for accounts like
> msql and www-data not to be able to access home directories (add
> "daemon" to their supplementary group list and set the permissions of
> /home 0705 to root.daemon, perhaps), but is this really worthwhile ?
> If it is, the right thing to do is to go away and think about exactly
> how to do it, not to file a bug asking for the default home directory
> permissions to be changed.

This is easily accomplished using ACLs.  Example to only allow apache
access to public_html, and nothing else:

% setfacl -m g:www-data:x ~
% setfacl -m g:www-data:rx ~/public_html
% getfacl ~ ~/public_html
getfacl: Removing leading '/' from absolute path names
# file: home/rleigh
# owner: rleigh
# group: rleigh
user::rwx
group::r-x
group:www-data:--x
mask::r-x
other::r-x

# file: home/rleigh/public_html
# owner: rleigh
# group: rleigh
user::rwx
group::r-x
group:www-data:r-x
mask::r-x
other::r-x


Regards,
Roger

-- 
  .''`.  Roger Leigh
 : :' :  Debian GNU/Linux http://people.debian.org/~rleigh/
 `. `'   Printing on GNU/Linux?   http://gutenprint.sourceforge.net/
   `-GPG Public Key: 0x25BFB848   Please GPG sign your mail.


signature.asc
Description: Digital signature


Re: Default Homedir Permissions

2011-02-17 Thread Olaf van der Spek
On Thu, Feb 17, 2011 at 3:58 PM, Roger Leigh  wrote:
> In general, I think it's fair to say that the average Debian
> installation does not require Fort Knox levels of security.  Simply
> allowing other people to read our files is often something desirable;

Does other refer to other users, all other accounts or the entire world?

> if I have something especially secret, I'll take steps to make sure
> it's not readable or writeable by anyone except me.  But in general,
> it's not a bad thing that others can see my stuff.  I can always keep
> private things in a 0700 subdirectory.

You can, but you can easily forget that.
Note that defaulting to private does not prevent you from changing the
permissions.

> I can see that in some circumstances you might well want total control
> over who can see your files, but unless you're dealing with TOP SECRET
> stuff, I am not convinced that this is something the typical user would
> wish to have by default.  Are there any common use cases which require
> this?

Like backups, the need for security is often discovered after it was necessary.

-- 
Olaf


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/AANLkTim_txyuh+zvXyOXHzWTPf8QypYZHj=s+b4ko...@mail.gmail.com



Re: RFA: all my packages

2011-02-17 Thread Ryan Kavanagh
Hi,

On Thu, Feb 10, 2011 at 09:55:48PM -0500, Ryan Kavanagh wrote:
> On Thu, Feb 10, 2011 at 07:02:16PM -0500, Yaroslav Halchenko wrote:
> > On Thu, 10 Feb 2011, Decklin Foster wrote:
> > > rxvt-unicode is a total clusterfuck.
> > 
> > if noone ever comes up (I am already overloaded somewhat) -- I guess
> > I will need to look at this cluster..ck since I am using it ;-)
> 
> I don't think I have the time and nor the ability to properly maintain
> rxvt-unicode solo, but since it's my terminal of choice, I'm willing to
> co-maintain it.

I've setup the pkg-urxvt team[0] for the several people interested in
helping with the packaging. Please request to join. I'll file an ITA and
import the packaging into git shortly.

Kind regards,
Ryan

[0] https://alioth.debian.org/projects/pkg-urxvt/

-- 
|_)|_/  Ryan Kavanagh |  GnuPG key
| \| \  http://ryanak.ca/ |  4A11C97A (Transitioning from E95EDDC9)   
()  ascii ribbon campaign - against html e-mail 
/\  www.asciiribbon.org   - against proprietary attachments


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110217151754.GA11811@qoppa



Re: Default Homedir Permissions

2011-02-17 Thread Roger Leigh
On Thu, Feb 17, 2011 at 04:07:12PM +0100, Olaf van der Spek wrote:
> On Thu, Feb 17, 2011 at 3:58 PM, Roger Leigh  wrote:
> > In general, I think it's fair to say that the average Debian
> > installation does not require Fort Knox levels of security.  Simply
> > allowing other people to read our files is often something desirable;
> 
> Does other refer to other users, all other accounts or the entire world?

It refers to S_IRWXO, which is what this bug is about.  What that
means in practice is up to you.

> > if I have something especially secret, I'll take steps to make sure
> > it's not readable or writeable by anyone except me.  But in general,
> > it's not a bad thing that others can see my stuff.  I can always keep
> > private things in a 0700 subdirectory.
> 
> You can, but you can easily forget that.
> Note that defaulting to private does not prevent you from changing the
> permissions.
…
> Like backups, the need for security is often discovered after it was 
> necessary.

Yes, but like everything there is a tradeoff.  A totally secure system
is an unusable system.  Having to instruct every user how to relax the
permissions to allow others to access their files, or allow their web
pages to be visible, is effectively pointless make-work if that was what
you wanted in the first place.  And for most people, I would argue that
/is/ what is wanted.

Remember that historically, multi-user systems have been about sharing
and collaboration, not isolation in walled-off prisons.  I know which
type of system I want, and it's not the latter.

0755 is not inherently insecure.  Others can't make any changes, but
they can look.  The only issue here is accidental disclosure of
information intended to be private.

I would argue that a change that /would/ make a real difference, would
be to have (as an example) emblems in Nautilus that flag files and
folders depending on if other people have read or write access.  That
would visually show what is (and is not) secure either by intention or
by accident.


Regards,
Roger

-- 
  .''`.  Roger Leigh
 : :' :  Debian GNU/Linux http://people.debian.org/~rleigh/
 `. `'   Printing on GNU/Linux?   http://gutenprint.sourceforge.net/
   `-GPG Public Key: 0x25BFB848   Please GPG sign your mail.


signature.asc
Description: Digital signature


Re: Default Homedir Permissions

2011-02-17 Thread Ian Jackson
[Someone] writes ("Re: Default Homedir Permissions"):
> [stuff]

We are in danger of wasting a lot of time with this discussion.

The general pattern is that someone who is unhappy with the state of
the world proposes a substantial change.  The worry amongst the rest
of us is that the change might go ahead if we don't oppose it.

So those of us who oppose feel impelled to respond to every message;
whereas the proponent of change is dedicated.  There is no natural
conclusion to this argument.

So I would like the maintainers of the adduser package (which seems to
be where the default is mainlys et) to post here to reassure us that
they don't intend to make this change, and that if the maintainers are
thinking of changing their mind they will consult debian-devel.

Ian.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/19805.15206.29837.470...@chiark.greenend.org.uk



Re: Default Homedir Permissions

2011-02-17 Thread Olaf van der Spek
On Thu, Feb 17, 2011 at 4:24 PM, Roger Leigh  wrote:
> On Thu, Feb 17, 2011 at 04:07:12PM +0100, Olaf van der Spek wrote:
>> On Thu, Feb 17, 2011 at 3:58 PM, Roger Leigh  wrote:
>> > In general, I think it's fair to say that the average Debian
>> > installation does not require Fort Knox levels of security.  Simply
>> > allowing other people to read our files is often something desirable;
>>
>> Does other refer to other users, all other accounts or the entire world?
>
> It refers to S_IRWXO, which is what this bug is about.  What that
> means in practice is up to you.

Other (people) in "Simply allowing other people to read our files is
often something desirable" does not refer to S_IRWXO.

>> Like backups, the need for security is often discovered after it was 
>> necessary.
>
> Yes, but like everything there is a tradeoff.  A totally secure system
> is an unusable system.  Having to instruct every user how to relax the
> permissions to allow others to access their files, or allow their web
> pages to be visible, is effectively pointless make-work if that was what
> you wanted in the first place.

You're right, in that case it makes more sense to edit /etc/adduser.conf
Or to setup public dirs that people could use to share stuff without
defaulting to share their entire home dir.

> And for most people, I would argue that
> /is/ what is wanted.

Is it? A lot of people have desktops / laptops that aren't shared with
other people and that don't use the per-user public_html.

> Remember that historically, multi-user systems have been about sharing
> and collaboration, not isolation in walled-off prisons.  I know which
> type of system I want, and it's not the latter.

Historically security was not an issue.

> 0755 is not inherently insecure.  Others can't make any changes, but
> they can look.  The only issue here is accidental disclosure of
> information intended to be private.

Right

-- 
Olaf


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/AANLkTi=4R87hRmXQc4Y7zL9b5KJ0yJqtTYXeX80MQN=p...@mail.gmail.com



Auditing systems for default homedir permissions and other potential security risks and also for overly long subjects and needlessly antagonistic mailing list discussion threads

2011-02-17 Thread Lars Wirzenius
On to, 2011-02-17 at 15:24 +, Roger Leigh wrote:
> I would argue that a change that /would/ make a real difference, would
> be to have (as an example) emblems in Nautilus that flag files and
> folders depending on if other people have read or write access.  That
> would visually show what is (and is not) secure either by intention or
> by accident.

I'm with Roger and Ian on the default permissions, but that's not why I
am making this thread needlessly longer. I am making it needlessly
longer because I had a mildly related idea that I am hoping someone will
pick up and implement.

It would be really cool if there was an automatic auditor for people to
use. Not just showing emblems in Nautilus, but offering to fix things as
well. Here's how I imagine it might work.

You tell the auditor what kind of system this is. d-i would set up a
default. For example, personal laptop, or web server, or mail server.
You also tell the auditor how much security you want: normal, a lot, or
too much.

The auditor then looks for things in the system, and in home
directories, which might be problems. For example, if it's meant to be a
mail server with a lot of security, having telnetd installed and running
would be a problem for it to flag. Likewise, it might flag home
directory permissions.

It then presents the user with a prioritized report, with most urgent
things first. The user can then say "I'm ok with this, don't tell me
about it again", or "Fix this now, please", or "I don't know what I'm
doing, just do something smart", or "I'm suddenly busy, just tell me
about this when I ask for a new report".

The automatic fixing might do things like remove or disable services, or
fix permissions, or install missing security updates, or, on the "too
much" security level, wipe all disks and send an e-mail to the nearest
secure destruction service to come and pick up the computer and take to
it where it can be melted.

(If you like the idea, start hacking! I will not get around to this
until some other millennium, when I've finished my backup application. I
want my backups done before I request my computer to be destroyed.)


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1297957018.22676.40.camel@tacticus



Re: RFA: all my packages

2011-02-17 Thread Vincent Danjean
  Hi,

On 17/02/2011 16:17, Ryan Kavanagh wrote:
> I've setup the pkg-urxvt team[0] for the several people interested in
> helping with the packaging. Please request to join. I'll file an ITA and
> import the packaging into git shortly.

Will there be more than the git repo ? If not, why don't you use the
collab-maint projet on alioth ?

  Regards,
Vincent

> Kind regards,
> Ryan
> 
> [0] https://alioth.debian.org/projects/pkg-urxvt/
> 


-- 
Vincent Danjean   GPG key ID 0x9D025E87 vdanj...@debian.org
GPG key fingerprint: FC95 08A6 854D DB48 4B9A  8A94 0BF7 7867 9D02 5E87
Unofficial packages: http://moais.imag.fr/membres/vincent.danjean/deb.html
APT repo:  deb http://people.debian.org/~vdanjean/debian unstable main


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d5d41ac.7000...@free.fr



Re: Bug#613788: ITP: dropbox -- secure backup, sync and sharing util

2011-02-17 Thread Julien Cristau
On Thu, Feb 17, 2011 at 14:52:49 +, brian m. carlson wrote:

> On Thu, Feb 17, 2011 at 12:35:26AM -0800, Vincent Cheng wrote:
> > * Package name: dropbox
> >   Version : 1.0.20-1
> >   Upstream Author : Dropbox, Inc.
> > * URL : http://www.dropbox.com
> > * License : Proprietary
> >   Section : non-free/net
> >   Description : secure backup, sync and sharing util
> 
> It looks like you're still missing the source for librsync.so.1 in your
> packages.  Also, I *strongly* recommend that you not include binary-only
> shared libraries that are already available in Debian.  The security
> team will not be very happy with you.  As an example, your package
> ships libz.so.1, which has been the target of a DSA previously.
> 
The security team doesn't support the non-free section in any way, so
not really.  Still a bad idea though.

Cheers,
Julien


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110217154133.gw12...@radis.liafa.jussieu.fr



Re: Default Homedir Permissions

2011-02-17 Thread Marco d'Itri
On Feb 17, Ian Jackson  wrote:

> I disagree with this conclusion, because I disagree with the
> underlying implication that the general readability of files is not
> needed.
Agreed.

> Perhaps it might be reasonable to try to find a way for accounts like
> msql and www-data not to be able to access home directories (add
> "daemon" to their supplementary group list and set the permissions of
> /home 0705 to root.daemon, perhaps), but is this really worthwhile ?
We have ACLs, but I believe that the local requirements vary enough
that it is not worth the effort.

-- 
ciao,
Marco


signature.asc
Description: Digital signature


Re: Default Homedir Permissions

2011-02-17 Thread Austin English
On Thu, Feb 17, 2011 at 07:14, Ian Jackson
 wrote:
> [Someone] writes ("Re: Default Homedir Permissions"):
>> [stuff]
>
> We are in danger of wasting a lot of time with this discussion.
>
> The general pattern is that someone who is unhappy with the state of
> the world proposes a substantial change.  The worry amongst the rest
> of us is that the change might go ahead if we don't oppose it.

More simply, the option could be put in the default install instead of
only the expert install. Make the default choice the current behavior,
but let local administrators choose what is best for their system.

-- 
-Austin


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktimhuo+zpb7opyrkdptd4nmqspdaqba8kq75+...@mail.gmail.com



Re: Default Homedir Permissions

2011-02-17 Thread Ian Jackson
Austin English writes ("Re: Default Homedir Permissions"):
> On Thu, Feb 17, 2011 at 07:14, Ian Jackson
>  wrote:
> > [Someone] writes ("Re: Default Homedir Permissions"):
> >> [stuff]
> >
> > We are in danger of wasting a lot of time with this discussion.
> >
> > The general pattern is that someone who is unhappy with the state of
> > the world proposes a substantial change.  The worry amongst the rest
> > of us is that the change might go ahead if we don't oppose it.
> 
> More simply, the option could be put in the default install instead of
> only the expert install. Make the default choice the current behavior,
> but let local administrators choose what is best for their system.

Your reply doesn't seem to be a way of avoiding wasting time, I'm
afraid, but rather a way of perpetuating the discussion.

But at the risk of doing the same myself: increasing the priority of
installation questions is not without costs.  I think that the current
default suits a big enough proportion of our users that it should be
kept at the current priority.

Ian.


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/19805.20948.449432.456...@chiark.greenend.org.uk



Re: Default Homedir Permissions

2011-02-17 Thread Martin Owens
On Thu, 2011-02-17 at 15:24 +, Roger Leigh wrote:
> Yes, but like everything there is a tradeoff.  A totally secure system
> is an unusable system.  Having to instruct every user how to relax the
> permissions to allow others to access their files, or allow their web
> pages to be visible, is effectively pointless make-work if that was
> what
> you wanted in the first place.  And for most people, I would argue
> that
> /is/ what is wanted.

You don't want to make it harder for users, but this is where design can
help. If we need to make a system which prevents cross user file
attacks, then we could fairly easily implement these things:

 * Shared Folder, directory which is available to all users where they
can put explicitly shared contents (MacOSX does this).
 * Make sure shared folders via smb/nfs are accessible, make it clear
that this would share files inside the system as much as on the network.
 * A program which allows temporary file access to another user's home
folder after the user have authorised the access.

> Remember that historically, multi-user systems have been about sharing
> and collaboration, not isolation in walled-off prisons.  I know which
> type of system I want, and it's not the latter.

Yes, but we don't make it clear that a user's home directory is a
free-for-all with all users. Folder indicators would be useful. But do
users know that they've signed up for this when they installed Ubuntu?

I think it's more likely that Ubuntu users think the data is protected
until the magic time when cross-user file access is demanded and then
it's unprotected for that one instance. Computers are magic after all.
Asking users would be key to answering that.

> 0755 is not inherently insecure.  Others can't make any changes, but
> they can look.  The only issue here is accidental disclosure of
> information intended to be private. 

If public by default is the way we want to go, then why not have a
Private folder be default in the users home directory? Combined with the
indication emblem in nautilus; this might provide a space for users to
put data. ATM it's too hard to teach users how to secure a folder or
even how to set up an encrypted folder.

Martin,


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1297961716.28341.10.camel@delen



Re: RFA: all my packages

2011-02-17 Thread Tollef Fog Heen
]] Vincent Danjean 

| On 17/02/2011 16:17, Ryan Kavanagh wrote:
| > I've setup the pkg-urxvt team[0] for the several people interested in
| > helping with the packaging. Please request to join. I'll file an ITA and
| > import the packaging into git shortly.
| 
| Will there be more than the git repo ? If not, why don't you use the
| collab-maint projet on alioth ?

The request said they'll use at least a mailing list, else I wouldn't
have approved it.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/8739nm7d2f@qurzaw.varnish-software.com



Re: for those who care about unbound (resolvconf and DNSSEC)

2011-02-17 Thread Daniel Baumann
On 02/17/2011 09:46 AM, Robert Edmonds wrote:
> let me rephrase: the resolvconf options would be enabled by default, but
> would be no-ops unless resolvconf is installed.  and i think the package
> would only Suggest: resolvconf.

thanks.

-- 
Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email:  daniel.baum...@progress-technologies.net
Internet:   http://people.progress-technologies.net/~daniel.baumann/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d5d789e.6040...@progress-technologies.net



Bug#613857: RFA: cacti + cacti-spine

2011-02-17 Thread sean finney
Package: wnpp
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Due largely to the fact that I'm no longer using cacti on a regular basis,
I think cacti and spine should get a new maintainer.

Both packages are relatively up to date and in decent shape, and the upstream
authors are responsive and pleasant to work with.

I'm also open to starting up an alioth project for co-maintenance, and can
sponsor/review uploads for a while if there's interested people who are not
(though preferably are interested in becoming) uploading developers.


Sean


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk1demoACgkQynjLPm522B1ETgCfYbs7VRKu4tCyKj8B9W8pYxUJ
4msAn0e0m/HqoCAIlAkIQyTTTIeNanwx
=c2E4
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110217194347.29062.34035.reportbug@minnika



Bug#613870: RFA: libraw -- raw image decoder library

2011-02-17 Thread Luca Falavigna
Package: wnpp
Severity: normal
X-Debbugs-CC: debian-devel@lists.debian.org


I request an adopter for libraw source package.
It is one of the build-dependencies of shotwell package.

Package: libraw-dev
Description: raw image decoder library (development files)
 LibRaw is a library for reading RAW files obtained from digital photo
cameras (CRW/CR2, NEF, RAF, DNG, and others).

 This package contains a static library and header files.

Package: libraw-doc
Description: raw image decoder library (documentation)
 LibRaw is a library for reading RAW files obtained from digital photo
cameras (CRW/CR2, NEF, RAF, DNG, and others).

 This package contains documentation files.

-- 
  .''`.
 :  :' :   Luca Falavigna 
 `.  `'
   `-



signature.asc
Description: OpenPGP digital signature


Re: Default Homedir Permissions

2011-02-17 Thread Ron Johnson

On 02/17/2011 10:55 AM, Martin Owens wrote:

On Thu, 2011-02-17 at 15:24 +, Roger Leigh wrote:

Yes, but like everything there is a tradeoff.  A totally secure system
is an unusable system.  Having to instruct every user how to relax the
permissions to allow others to access their files, or allow their web
pages to be visible, is effectively pointless make-work if that was
what
you wanted in the first place.  And for most people, I would argue
that
/is/ what is wanted.


You don't want to make it harder for users, but this is where design can
help. If we need to make a system which prevents cross user file
attacks, then we could fairly easily implement these things:

  * Shared Folder, directory which is available to all users where they
can put explicitly shared contents (MacOSX does this).


Speaking as a (non-Unix) (non-DD and so no authority here) 
Administrator who is constantly pestered by auditors & CISO reviews, 
I agree with Olaf, and think that Shared Folder is a good way to 
make this explicit.


--
"The normal condition of mankind is tyranny and misery."
Milton Friedman


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d5d9ded.2080...@cox.net



Re: Default Homedir Permissions

2011-02-17 Thread Ron Johnson

On 02/17/2011 08:58 AM, Roger Leigh wrote:
[snip]


Should it be locked down like Fort Knox?



There's a heck of a lot of middle ground between "Fort Knox" and 
"Hippy Commune".



Should it be generally usable, and easy for users to see each other's
stuff?



Only with the owner's permission.  Privacy, remember?  It's why we 
encrypt Wi-Fi and https exists.


--
"The normal condition of mankind is tyranny and misery."
Milton Friedman


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d5d9eb1.80...@cox.net



Re: Default Homedir Permissions

2011-02-17 Thread Ron Johnson

On 02/17/2011 09:24 AM, Roger Leigh wrote:
[snip]


Yes, but like everything there is a tradeoff.  A totally secure system
is an unusable system.


Why the black and white?  What happened to grey?


   Having to instruct every user how to relax the
permissions to allow others to access their files, or allow their web
pages to be visible, is effectively pointless make-work if that was what
you wanted in the first place.  And for most people, I would argue that
/is/ what is wanted.



Most people want "easy".  It's why Windows is malware central.


Remember that historically, multi-user systems have been about sharing
and collaboration, not isolation in walled-off prisons.  I know which
type of system I want, and it's not the latter.



I thought it was about sharing expensive resources.  (But then, I 
come from a DP background.)


--
"The normal condition of mankind is tyranny and misery."
Milton Friedman


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d5da07d.9020...@cox.net



RFC: bringing back task packages

2011-02-17 Thread Joey Hess
A long time ago, tasksel installed task packages, which were regular
metapackages. This was dropped because the task packages had to Depend
on many packages, which made the installed system brittle, and made 
testing propigation a problem. Now that Recommends are installed by
default, I'm revisiting the idea of using task packages. It solves
many issues and inconsistencies with tasksel vs the rest of Debian.

The other problem with task packages before is that tasksel allowed the
user to select from amoung all that were available, and this resulted in a
confusing long mess of tasks to choose from. To avoid that, I intend to
keep the ultimate decision about what tasks are displayed in tasksel under
the control of the tasksel maintainers. But, I do hope that moving more of
the maintenance of tasks to the developers responsible for those areas of
Debian will result in a better selection of software and less work. We've
already had some good progress in that area with the gnome metapackages
which are used by tasksel.

If tasksel was switched to task packages, the task packages would probably
be initially built from tasksel's source. They could be split out of
tasksel's source as other groups stepped up to maintain them.


## Questions for teams

### gnome

Would the gnome team want to maintain a task-gnome?
Much of tasksel's gnome task is already taken from the gnome-core
and gnome metapackages, with a few more things added. task-gnome
would not need to deal with core X desktop stuff; task-desktop would
still handle that. Although we could move away from having a task-desktop
if you'd prefer.

There are also many localized desktop tasks. Mostly these add things
like localization packages for openoffice, and occasionally some fonts.
I'd like to see those be maintained in conjunction with task-gnome,
but it would mean some coordination with the dozens of people who
currently maintain those localization tasks.

### kde, lxde, xfce

See above and s/gnome/$you/

### cups

Would the cups maintainers be interested in maintaining a
task-print-server? Keeping the right ppds and cups packages in the task
has been an ongoing issue for me.

Note that a subset of cups is also installed as part of the desktop
tasks, and it would also make sense to have a metapackage on the cups
side that desktop tasks could use. The sole different currently is
that openprinting-ppds is included in the print server task, but not
the desktop tasks.

### blends

I think there is interest in getting some blends displayed in Taskel?
It's mostly orthagonal to this proposal, but this would help with
giving you full control over what your tasks do. I do feel that blends
need to be listed below the other tasks in tasksel, and probably with
a divider between them. Also, we have been careful to only have ten
tasks, to avoid overloading the user; and there is a limit to the length
of the list before it begins scrolling, so the d-i team would have to
look at the UI before adding Blends to the interface.

### i18n

There are many language tasks in tasksel. It might be good to have
the task packages be moved out of tasksel; I don't know if it'd make
sense to have individual language teams maintain them, or what.

If tasksel displayed Task packages' short Description fields, those
would need to be translated. I know we have translated Descriptions
but I don't know about coverage, or if that info is available when
tasksel runs in d-i?


## Comparing tasksel and dpkg fields

Key -> Depends
This would be an improvement, as new Depends of a task would be
installed on upgrade; there is currently no way to upgrade a task
and get new packages that have been added to it.

Note that Britney already treats Key as Depends internally.
So this change would not impact testing migration.

Packages -> Recommends
Recommends may be better than what we have now in tasksel.
If aptitude auto-selects *new* recommends of a previously installed
package to be installed? Currently new Packages added to a task
only affect new installations of that task.

Most packages in a task need to be Recommends, to avoid wedging
Britney, and to allow removing bits of a task that are not wanted.

Note that the Task field on the package side, which is added to the
archive based on data from tasksel, could go away.

Enhances -> ???
The Enhances fields are not truely the same as Depends
(but are probably closer to Depends than to dpkg's Enhances).
A task that Enhances other tasks is hidden, and 
auto-force-installed when the other tasks are installed.

Relevance -> ???
This is used to do some UI ordering of tasks. Closest equivilant
is Priority, but it's not granular enough.

Test- -> ???
These fields specify programs to run to test if the 
task should be force-auto-installed, or hidden, or selected
for installation.

Descrip

printer server task in the installer?

2011-02-17 Thread Miguel Figueiredo
A Quinta 17 Fevereiro 2011 23:20:30 Joey Hess você escreveu:

[...]

> Note that a subset of cups is also installed as part of the desktop
> tasks, and it would also make sense to have a metapackage on the cups
> side that desktop tasks could use. The sole different currently is
> that openprinting-ppds is included in the print server task, but not
> the desktop tasks.

[...]

If the installer will present no more than a few tasks during installation to 
not overload the user i think this task can be left out of the installer and 
be installed after. It's a very specific and no so common task imho.

-- 
Melhores cumprimentos/Best regards,

Miguel Figueiredo
http://www.DebianPT.org


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201102172348.28133.el...@debianpt.org



Re: Default Homedir Permissions

2011-02-17 Thread Joey Hess
Martin Owens wrote:
> If public by default is the way we want to go, then why not have a
> Private folder be default in the users home directory? Combined with the
> indication emblem in nautilus; this might provide a space for users to
> put data. ATM it's too hard to teach users how to secure a folder or
> even how to set up an encrypted folder.

IIRC, Ubuntu has done some work toward providing such an encrypted
private subdirectory by default. Someone should look into pulling that
into a package in Debian.

-- 
see shy jo


signature.asc
Description: Digital signature


Re: RFC: bringing back task packages

2011-02-17 Thread Charles Plessy
Le Thu, Feb 17, 2011 at 07:20:30PM -0400, Joey Hess a écrit :
> 
> ### blends
> 
> I think there is interest in getting some blends displayed in Taskel?
> It's mostly orthagonal to this proposal, but this would help with
> giving you full control over what your tasks do. I do feel that blends
> need to be listed below the other tasks in tasksel, and probably with
> a divider between them. Also, we have been careful to only have ten
> tasks, to avoid overloading the user; and there is a limit to the length
> of the list before it begins scrolling, so the d-i team would have to
> look at the UI before adding Blends to the interface.

Dear Joey,

it would be very exciting to have the possibility to select a blend at the
installation. To circumvent the limitation of space, how about having a single
line to select ‘Chose a Debian Pure Blend‘, that would lead to a page that
provides the full list of blends ?


> ### i18n
> 
> There are many language tasks in tasksel. It might be good to have
> the task packages be moved out of tasksel; I don't know if it'd make
> sense to have individual language teams maintain them, or what.

On the other hand, I would warmly welcome an i18n task that reproduces the user
experience on Macintoshes, where a standard system contains everything to read
and write a large number of languages. Currently with Debian, on fresh
installs, I have to iterate over the missing fonts for Japanese and other Asian
languanges, and look back on my old notes to figure out what packages will
provide me an input system for chinese characters, because I select French or
English at install time. 


Have a nice day,

-- 
Charles Plessy
Debian Med packaging team,
http://www.debian.org/devel/debian-med
Tsurumi, Kanagawa, Japan


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110218013916.gb...@merveille.plessy.net



Re: RFC: bringing back task packages

2011-02-17 Thread Paul Wise
On Fri, Feb 18, 2011 at 9:39 AM, Charles Plessy  wrote:

> it would be very exciting to have the possibility to select a blend at the
> installation. To circumvent the limitation of space, how about having a single
> line to select ‘Chose a Debian Pure Blend‘, that would lead to a page that
> provides the full list of blends ?

Being able to install blends from d-i would indeed be cool. Seems to
me that there could be potentially many many tasks for the blends. For
e.g. there are 19 tasks in the Debian Med blend. There are hundreds of
Debian derivatives and many of these could become Debian Pure Blends
with some work. I would suggest some sort of search field would be the
way to go, browsing any list of blend tasks is going to be a pain.
Maybe a drill-down UI would also work, grouping tasks based on
audience; 'I am a scientist', 'I research medicine', 'I research
epidemiology', oh cool I should install tasks-med-epi to get some
tools (which are foo, bar & baz) for that. Maybe a combination of
these is the way to go.

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/aanlktims7b6vs-smu6yeh2-+vnqoevwrvbxtqekfm...@mail.gmail.com



squeeze-updates during Squeeze installation

2011-02-17 Thread Adnan Hodzic
Hello,

During Squeeze installation process, since volatile archive was
replaced with squeeze-updates and error of unreachable archive occurs.
Of course installation process can be continued without any
consequences, but I'm guessing installer should be updated so new
users don't get confused with this error message.

If this was "fixed" in meantime, please disregard this email.


Adnan


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/AANLkTinB9j7uhMT9RSuxMZCw5hcR2VSWc7Q27B5+=h...@mail.gmail.com



Bug#613898: ITP: vargs -- function argument handling for Node

2011-02-17 Thread Jonas Smedegaard
Package: wnpp
Severity: wishlist
Owner: Jonas Smedegaard 

* Package name: vargs
  Version : 0~20100516-1
  Upstream Author : Alexis Sellier 
* URL : https://github.com/cloudhead/vargs
* License : Expat
  Programming Lang: JavaScript
  Description : function argument handling for Node

 Node is an event-based server-side JavaScript engine.
 .
 vargs provided variable argument handling for Node functions taking a
 callback.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20110218022631.14518.29971.reportbug@localhost.localdomain



how come the buildd machines can't find python-vtk?

2011-02-17 Thread Steve M. Robbins
I uploaded insighttoolkit the other day, but the buildd machines
refuse to build it, claiming an installability problem [1]:

  insighttoolkit/alpha dependency installability problem:

insighttoolkit (= 3.20.0-8) build-depends on one of:
- python-vtk (= 5.4.2-8)

This is repeated for all architectures.  

Two things puzzle me:

1. python-vtk is still in the archive according to the PTS
   and "rmadison"

2. the above output says "(= 5.4.2-8)", but the build-dep isn't
   versioned

What's going on?

Thanks,
-Steve


[1] https://buildd.debian.org/status/package.php?p=insighttoolkit


signature.asc
Description: Digital signature


Re: squeeze-updates during Squeeze installation

2011-02-17 Thread Raphael Hertzog
(Moving to debian-b...@lists.debian.org where it's more appropriate)

On Fri, 18 Feb 2011, Adnan Hodzic wrote:
> Hello,
> 
> During Squeeze installation process, since volatile archive was
> replaced with squeeze-updates and error of unreachable archive occurs.
> Of course installation process can be continued without any
> consequences, but I'm guessing installer should be updated so new
> users don't get confused with this error message.

I also saw this error message but only under special circumstances. I
believe when I installed from a DVD and selected to not use a mirror.

It's still somewhat disturbing. Maybe we should keep an empty "stable"
archive on volatile.debian.org in the mean time.

Cheers,
-- 
Raphaël Hertzog ◈ Debian Developer

Follow my Debian News ▶ http://RaphaelHertzog.com (English)
  ▶ http://RaphaelHertzog.fr (Français)


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110218073017.gf13...@rivendell.home.ouaza.com