RE:About a mass bug report not based on Sid or Jessie.

2014-04-19 Thread PICCA Frederic-Emmanuel
> It may be that libgc upstream's autogen.sh script is not really 'right' in
> some way. But there may well be a lot of upstreams like that, which is
> why maintainers need clear guidance on how to deal with this, without
> having to become autotools experts. i.e how to determine when they can
> just run dh_autoreconf and when they need to do something more
> involved.

for example in my package hkl (I am also the upstream), the autogen.sh
also run gtkdocize
#!/bin/sh

test -d m4 || mkdir m4
gtkdocize || exit 1
autoreconf -ivf


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/a2a20ec3b8560d408356cac2fc148e53b1e6e...@sun-dag3.synchrotron-soleil.fr



Re: debconf reconfiguration from postinst of another package

2014-04-19 Thread Tollef Fog Heen
]] Jonas Smedegaard 

> How to reconfigure one package from another?

I don't think this is supported today at all, and any success at doing
so would be a bug.

If you have a package that uses debconf as the UI to ask questions that
go into a configuration file, that's fine.  If you then later change the
values in the debconf database and run dpkg-reconfigure, the config
script should grab the current settings from the configuration file on
disk and seed the debconf db with those, overwriting your changes.  This
is the whole «debconf is not a registry» thing.

What you could do is provide your own debconf database with a higher
priority, with those settings then pre-seeded (you would then accept and
discard writes to «locked» keys).  This makes the problem slightly
easier, since you're then just left with «how do you trigger a
dpkg-reconfigure».  Sadly, I don't think dpkg provides the hooks you
need to do that today.  I think it could be useful to have it, so you
could do «dpkg --needs-reconfigure A B C» and those would then be put in
a state where they'd be reconfigured at the next opportunity.  Care
would of course have to be taken to avoid loops.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/87sip9y8hz@vuizook.err.no



Re: Proposing amd64-hardened architecture for Debian

2014-04-19 Thread Riku Voipio
On Tue, Apr 15, 2014 at 12:00:33PM +0200, Balint Reczey wrote:
> Facing last week's Heartbleed [1] bug the need for improving the
> security of our systems became more apparent than usually. In Debian
> there are widely used methods for Hardening [2] packages at build time
> and guidelines [3] for improving the default installations' security.

Riding the Heartbleed publicity wave seems unwise, unless you can
propose a hardening flag that would have protected users from
Heartbleed. Else, Heartbleed merely serves on a example
how wallpapering problems over with "hardened" binaries often
doesn't help you at all..

Considering that most issues protected by compiler hardening are
also detectable by static/dynamic code analysis, a more effective security
measure would be to spend time with clang static analyzer, valgrind, trinity
and other tools... or actualy reviewing patches that security critical
projects recieve.

Riku


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140419112659.ga22...@afflict.kos.to



Re: Proposing amd64-hardened architecture for Debian

2014-04-19 Thread Bálint Réczey
Hi Riku,

2014-04-19 13:26 GMT+02:00 Riku Voipio :
> On Tue, Apr 15, 2014 at 12:00:33PM +0200, Balint Reczey wrote:
>> Facing last week's Heartbleed [1] bug the need for improving the
>> security of our systems became more apparent than usually. In Debian
>> there are widely used methods for Hardening [2] packages at build time
>> and guidelines [3] for improving the default installations' security.
>
> Riding the Heartbleed publicity wave seems unwise, unless you can
> propose a hardening flag that would have protected users from
> Heartbleed. Else, Heartbleed merely serves on a example
> how wallpapering problems over with "hardened" binaries often
> doesn't help you at all..
>
> Considering that most issues protected by compiler hardening are
> also detectable by static/dynamic code analysis, a more effective security
> measure would be to spend time with clang static analyzer, valgrind, trinity
> and other tools... or actualy reviewing patches that security critical
> projects recieve.
Thank you for bringing this up now.
I have just managed to compile openssl, without the fix for the
Heartbleed test but with -fsanitize=address, and as I expected it
avoids leaking anything, I see only this in the Apache2's error.log:
...
[Sat Apr 19 13:44:58.818704 2014] [core:notice] [pid 18456:tid
3068020544] AH00094: Command line: '/us
r/sbin/apache2'
=
==18459==ERROR: AddressSanitizer: heap-buffer-overflow on address
0xb4960411 at pc 0xb547a785 bp 0xb14f7c88 sp 0xb14f7c7c
READ of size 1 at 0xb4960411 thread T2
ASAN:SIGSEGV
==18459==AddressSanitizer: while reporting a bug found another one.Ignoring.
=
==18461==ERROR: AddressSanitizer: heap-buffer-overflow on address
0xb4960411 at pc 0xb547a785 bp 0xaf86bc88 sp 0xaf86bc7c
READ of size 1 at 0xb4960411 thread T5
ASAN:SIGSEGV
==18461==AddressSanitizer: while reporting a bug found another one.Ignoring.
...

Since this is exactly the flag I looked at for amd64-hardened, if we
had this arch existing a few weeks ago it would have prevented
successful attacks on this platform.

I used Heartleech for triggering the bug and the attached debdiff on openssl.

The PoC is fragile because you need to set LD_PRELOAD=libasan1 and
compile the package with the following command:
CC=gcc-4.9 DEB_BUILD_OPTIONS=nocheck dpkg-buildpackage -rfakeroot -us -uc

I have also disabled OpenSSL's feelist implementation because any
custom memory handling would be disabled on amd64-hardened to let ASAN
 work effectively.

During creating the PoC I have hit several bugs which I had to work
around in the patch:

Changes:
 openssl (1.0.1f-1~dontuseheartbleedtest) UNRELEASED; urgency=low
 .
   * Enable -fsanitize=address
   * Disable freelist using -DOPENSSL_NO_BUF_FREELISTS
   * Add patch to fix freelist reuse from here:
 http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse
   * CVE-2014-0160 a.k.a Heartbleed is not fixed in this version!
   * Add patch 'Check i before r[i]' to fix buffer overflow by reading
   * Export ssl3_write_bytes() for compiling Heartleech
   * Use -DOPENSSL_NO_ASM to prevent crash in OPENSSL_cpuid_setup on i386


Cheers,
Balint
diff -Nru openssl-1.0.1f/debian/changelog openssl-1.0.1f/debian/changelog
--- openssl-1.0.1f/debian/changelog	2014-01-06 19:02:23.0 +0100
+++ openssl-1.0.1f/debian/changelog	2014-04-18 14:18:09.0 +0200
@@ -1,3 +1,16 @@
+openssl (1.0.1f-1~dontuseheartbleedtest) UNRELEASED; urgency=low
+
+  * Enable -fsanitize=address
+  * Disable freelist using -DOPENSSL_NO_BUF_FREELISTS
+  * Add patch to fix freelist reuse from here:
+http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse
+  * CVE-2014-0160 a.k.a Heartbleed is not fixed in this version!
+  * Add patch 'Check i before r[i]' to fix buffer overflow by reading
+  * Export ssl3_write_bytes() for compiling Heartleech
+  * Use -DOPENSSL_NO_ASM to prevent crash in OPENSSL_cpuid_setup on i386
+
+ -- Balint Reczey   Thu, 17 Apr 2014 20:12:10 +0200
+
 openssl (1.0.1f-1) unstable; urgency=high
 
   * New upstream version
diff -Nru openssl-1.0.1f/debian/patches/0001-Check-i-before-r-i.patch openssl-1.0.1f/debian/patches/0001-Check-i-before-r-i.patch
--- openssl-1.0.1f/debian/patches/0001-Check-i-before-r-i.patch	1970-01-01 01:00:00.0 +0100
+++ openssl-1.0.1f/debian/patches/0001-Check-i-before-r-i.patch	2014-04-17 20:17:12.0 +0200
@@ -0,0 +1,33 @@
+From 73c92dfa0c15d7932d86130a525d1a1bc43c312a Mon Sep 17 00:00:00 2001
+From: "Dr. Stephen Henson" 
+Date: Tue, 28 Jan 2014 15:10:27 +
+Subject: [PATCH] Check i before r[i].
+
+PR#3244
+(cherry picked from commit 9614d2c676ffe74ce0c919d9e5c0d622a011cbed)
+---
+ ssl/s3_srvr.c |4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+Index: openssl-1.0.1f/ssl/s3_srvr.c
+===
+--- openssl-1.0.1f.orig/ssl/s3_s

Re: Proposing amd64-hardened architecture for Debian

2014-04-19 Thread Michael Tautschnig
On Sat, Apr 19, 2014 at 14:26:59 +0300, Riku Voipio wrote:
[...]
> Riding the Heartbleed publicity wave seems unwise, unless you can
> propose a hardening flag that would have protected users from
> Heartbleed. Else, Heartbleed merely serves on a example
> how wallpapering problems over with "hardened" binaries often
> doesn't help you at all..
> 

+100 on this one. Hardening may be nice, but wouldn't have helped at all w.r.t.
Heartbleed (or any of the other recent SSL/TLS issues).

> Considering that most issues protected by compiler hardening are
> also detectable by static/dynamic code analysis, a more effective security
> measure would be to spend time with clang static analyzer, valgrind, trinity
> and other tools... or actualy reviewing patches that security critical
> projects recieve.
> 

Or maybe even just enable -Wall when compiling and take compiler warnings
seriously (plus explicitly silence the ones you are entirely sure they are
spurious). I wish people did that, it would so much help even starting static
analysis efforts as it helps rule out all the code that static analysis cannot
formally reason about due to its inconsistencies in typing. See [1] for some of
those - if only I had more time, I'd be reporting lots more that are still on my
stack for review. And I haven't even started reporting missing include files
(and thus missing declarations). I will propose an MBF for that as soon as time
permits.

Best,
Michael

[1] 
https://bugs.debian.org/cgi-bin/pkgreport.cgi?users=m...@debian.org&tag=goto-cc



pgpfve1WAfSgn.pgp
Description: PGP signature


Re: Proposing amd64-hardened architecture for Debian

2014-04-19 Thread Kevin Chadwick
previously on this list Michael Tautschnig contributed:

> > Riding the Heartbleed publicity wave seems unwise, unless you can
> > propose a hardening flag that would have protected users from
> > Heartbleed. Else, Heartbleed merely serves on a example
> > how wallpapering problems over with "hardened" binaries often
> > doesn't help you at all..
> >   
> 
> +100 on this one. Hardening may be nice, but wouldn't have helped at all 
> w.r.t.
> Heartbleed (or any of the other recent SSL/TLS issues).

I am afraid you have this completely backwards. You can't use idiotic
programming to justify anything.

http://marc.info/?l=openbsd-misc&m=139715715931884&w=2

I am glad they are cleaning OpenSSL up 

http://undeadly.org/cgi?action=article&sid=20140418063443

Especially when what they have found is "very surprising"

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/547070.34899...@smtp119.mail.ir2.yahoo.com



Bug#745259: ITP: apt-transport-tor -- APT transport for anonymous package downloads via Tor

2014-04-19 Thread Tim Retout
Package: wnpp
Severity: wishlist
Owner: Tim Retout 

* Package name: apt-transport-tor
  Version : 0.1
  Upstream Author : Tim Retout 
* URL : https://github.com/diocles/apt-transport-tor
* License : GPL
  Programming Lang: C++
  Description : APT transport for anonymous package downloads via Tor

 Provides support in APT for downloading packages anonymously via the Tor
 network.
 .
 APT already includes mechanisms for guaranteeing the authenticity of the
 packages you download.  However, an adversary sniffing your network traffic
 can still see what software you are installing.
 .
 Install apt-transport-tor, edit your sources.list to include only tor://
 URLs, and you can "apt-get install anarchism" without fear of reprisals.



This software works!  It was forked from the apt HTTPS transport.  It doesn't
yet have a build system or any packaging, but hopefully that's the easy part.

Tim


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140419225032.23729.94870.reportbug@thinkpad



Arm64 port live on debian-ports

2014-04-19 Thread Wookey
You may or may not have noticed that 'arm64' is coming. This a 64-bit
arm architecture also known as 'aarch64' and implemented in the ARM
CPU architecture 'v8'. Apart from iphones there is no publically
available 64-bit silicon yet, but that'll be changing rapidly later
this year and this port will start to become quite important.

The arm64 port is now building on real buildds in debian-ports (as
opposed to my previous bootstrapping efforts in Ubuntu and my initial
Debian bootstrap repo on people.debian.org). It recently passed 3000
(source) packages.

207 packages FTBFS so far, so if your packages are there please take
a look and fix them (or ask for advice if it's not clear what's needed).

http://buildd.debian-ports.org/status/architecture.php?a=arm64&suite=sid

There are about 270 pending arm64 bugfixes, some of which will be for those 
build failures:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?users=debian-...@lists.debian.org;tag=arm64

If there is an Ubuntu patch for your package is also very likely to
contain an arm64 fix.

If upstream changes are needed please check the Linaro aarch64
bugtracker ( https://bugs.launchpad.net/linaro-aarch64 ), and if there
is no mention please bring it to the attention of Riku Voipio or me so
we can put it on a list.

The main doc for the port is https://wiki.debian.org/Arm64Port

I've started a section there on porting for maintainers:
https://wiki.debian.org/Arm64Port#Porting_packages_for_arm64_-_Maintainer_info
which should give some pointers.

There isn't (yet) a proper DSA porting box, but I can give you shell
access to a machine if you need it. Just ask.

Further builds are currently stalled on
qt4/kdelibs/gtk+3/swig/php/openjdk. Once that lot is done libselinux,
gettext and db5.3 can be built properly and much of the rest of the
archive will become buildd-buildable. I expect this to happen in May.

I'm mostly offline for the next couple of weeks (at conference + holiday
afterwards) so nothing much will happen for a while, but if some of
you have fixed stuff when I get back that would be lovely :-)

Wookey
-- 
Principal hats:  Linaro, Emdebian, Wookware, Balloonboard, ARM
http://wookware.org/


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140420012701.gv29...@stoneboat.aleph1.co.uk



Re: Proposing amd64-hardened architecture for Debian

2014-04-19 Thread Riku Voipio
On Sat, Apr 19, 2014 at 02:06:45PM +0200, Bálint Réczey wrote:
> Hi Riku,
> 
> 2014-04-19 13:26 GMT+02:00 Riku Voipio :
> > On Tue, Apr 15, 2014 at 12:00:33PM +0200, Balint Reczey wrote:
> >> Facing last week's Heartbleed [1] bug the need for improving the
> >> security of our systems became more apparent than usually. In Debian
> >> there are widely used methods for Hardening [2] packages at build time
> >> and guidelines [3] for improving the default installations' security.
> >
> > Riding the Heartbleed publicity wave seems unwise, unless you can
> > propose a hardening flag that would have protected users from
> > Heartbleed. Else, Heartbleed merely serves on a example
> > how wallpapering problems over with "hardened" binaries often
> > doesn't help you at all..
> >
> > Considering that most issues protected by compiler hardening are
> > also detectable by static/dynamic code analysis, a more effective security
> > measure would be to spend time with clang static analyzer, valgrind, trinity
> > and other tools... or actualy reviewing patches that security critical
> > projects recieve.
> Thank you for bringing this up now.
> I have just managed to compile openssl, without the fix for the
> Heartbleed test but with -fsanitize=address, and as I expected it
> avoids leaking anything, I see only this in the Apache2's error.log:
> ...
> [Sat Apr 19 13:44:58.818704 2014] [core:notice] [pid 18456:tid
> 3068020544] AH00094: Command line: '/us
> r/sbin/apache2'
> =
> ==18459==ERROR: AddressSanitizer: heap-buffer-overflow on address
> 0xb4960411 at pc 0xb547a785 bp 0xb14f7c88 sp 0xb14f7c7c
> READ of size 1 at 0xb4960411 thread T2
> ASAN:SIGSEGV
> ==18459==AddressSanitizer: while reporting a bug found another one.Ignoring.
> =
> ==18461==ERROR: AddressSanitizer: heap-buffer-overflow on address
> 0xb4960411 at pc 0xb547a785 bp 0xaf86bc88 sp 0xaf86bc7c
> READ of size 1 at 0xb4960411 thread T5
> ASAN:SIGSEGV
> ==18461==AddressSanitizer: while reporting a bug found another one.Ignoring.
> ...
> 
> Since this is exactly the flag I looked at for amd64-hardened, if we
> had this arch existing a few weeks ago it would have prevented
> successful attacks on this platform.

Well this is certainly impressive - I was not aware of AddressSanitizer,
seems like very powerful and easy to us instrumentation tool. 

AddressSanitizer does not look like a flag intended for hardening. The
performance slowdown is quite steep. The instrumentation code itself might
be buggy, causing exploitation potential in itself.

Essentially this sounds about as wise as running server code under
valgrind.

> I used Heartleech for triggering the bug and the attached debdiff on openssl.
> 
> The PoC is fragile because you need to set LD_PRELOAD=libasan1 and
> compile the package with the following command:
> CC=gcc-4.9 DEB_BUILD_OPTIONS=nocheck dpkg-buildpackage -rfakeroot -us -uc
> 
> I have also disabled OpenSSL's feelist implementation because any
> custom memory handling would be disabled on amd64-hardened to let ASAN
>  work effectively.
> 
> During creating the PoC I have hit several bugs which I had to work
> around in the patch:
> 
> Changes:
>  openssl (1.0.1f-1~dontuseheartbleedtest) UNRELEASED; urgency=low
>  .
>* Enable -fsanitize=address
>* Disable freelist using -DOPENSSL_NO_BUF_FREELISTS
>* Add patch to fix freelist reuse from here:
>  http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse
>* CVE-2014-0160 a.k.a Heartbleed is not fixed in this version!
>* Add patch 'Check i before r[i]' to fix buffer overflow by reading
>* Export ssl3_write_bytes() for compiling Heartleech
>* Use -DOPENSSL_NO_ASM to prevent crash in OPENSSL_cpuid_setup on i386

This doesn't really look like a magical "if it was just compiled with
hardening flags, this wouldn't have happened" case. The PoC required
elobarate knowledge where the bug was and how it was hidden by
openssl's memory allocations. With -DOPENSSL_NO_BUF_FREELISTS the bug
would have been found with static analysis anyways...

Riku


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140420054723.ga26...@afflict.kos.to



Bug#745271: ITP: ruby-fog-brightbox -- Brightbox Cloud support for the fog gem

2014-04-19 Thread Praveen Arimbrathodiyil
Package: wnpp
Severity: wishlist
Owner: Pirate Praveen 

* Package name: ruby-fog-brightbox
  Version : 0.0.2
  Upstream Author : Paul Thornthwaite
* URL : https://rubygems.org/gems/fog-brightbox
* License : Expat
  Programming Lang: Ruby
  Description : Brightbox Cloud support for the fog gem

Module for the 'fog' gem to support Brightbox Cloud


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140420060719.31345.21013.report...@ravel.debian.org