Call for testing: APT 1.5~alpha1/experimental

2017-06-29 Thread Julian Andres Klode
APT 1.5~alpha1 landed in experimental today(ish). It includes three
big changes (one of which, the new https support, is opt-in).

  [ Changes to unauthenticated repositories ]
  The security exception for apt-get to only raise warnings if it encounters
  unauthenticated repositories in the "update" command is gone now, so that it
  will raise errors just like apt and all other apt-based front-ends do since
  at least apt version 1.3.

  It is possible (but STRONGLY ADVISED AGAINST) to revert to the previous
  behaviour of apt-get by setting the option
Binary::apt-get::Acquire::AllowInsecureRepositories "true";
  See apt-secure(8) manpage for configuration details.

  [ Experimental https support in http ]
  The http method will eventually replace the curl-based https method, but for
  now, this is an opt-in experiment that can be enabled by setting
  Dir::Bin::Methods::https to "http". Known issues:
- We do not support HTTPS proxies yet
- We do not support proxying HTTPS connections yet (CONNECT)
- IssuerCert and SslForceVersion are unsupported
  TLS code paths can be disabled by setting Acquire::AllowTLS to "false".

  [ Release Info Changes ]
  If values like Origin, Label, and Codename change in a Release file,
  update fails, or asks a user (if interactive). Various
  --allow-releaseinfo-change are provided for non-interactive use.

Please consider testing it. I'm especially interested in people
using client certificates or anything fancy with HTTPS that is not
listed in the known issues list.

It would be great if people knowledgeable
about https and TLS in general also had a look at how GnuTLS is used:

https://anonscm.debian.org/cgit/apt/apt.git/commit/?id=2851ec6cf037d552118b885be0dd7796d74730c6

(I accidentally squashed a move of the SOCKS code in there, but
 it should still be readable)

Thanks!
-- 
Debian Developer - deb.li/jak | jak-linux.org - free software dev
  |  Ubuntu Core Developer |
When replying, only quote what is necessary, and write each reply
directly below the part(s) it pertains to ('inline').  Thank you.



Re: Declarative packaging (Was: Re: Intended MBF: maintainer scripts not using strict mode)

2017-06-29 Thread Ian Jackson
Paul Wise writes ("Re: Declarative packaging (Was: Re: Intended MBF: maintainer 
scripts not using strict mode)"):
> IIRC last time we discussed this, the recommendation was to set an
> environment variable that maintainer scripts could check to determine
> if they should do host-specific actions or just generic actions common
> to all hosts. Personally I think that seems like a bit of a hack and
> there needs to be a new state for packages to be in added to dpkg.

How about using triggers-pending for this ?

You'd need to canonical trigger name.

Ian.



Re: IMPORTANT: Do live Debian images have a future?

2017-06-29 Thread Pirate Praveen
On തിങ്കള്‍ 26 ജൂണ്‍ 2017 07:38 വൈകു, Steve McIntyre wrote:
> If our live images are going to be good enough to meet the standards
> that Debian users deserve and expect, we need *consistent*,
> *sustained* involvement from a lot more people. Please tell me if
> you're going to help. If we don't see a radical improvement soon, I'll
> simply disable building live images altogether to remove the false
> promises they're making.
> 
> [1] 
> https://get.debian.org/images/release/current-live/amd64/iso-hybrid/#issues
> 

I'd be happy to test and report bugs continuously. I have already
started reporting some bugs.



signature.asc
Description: OpenPGP digital signature


Re: Intended MBF: maintainer scripts not using strict mode

2017-06-29 Thread Matthew Vernon
Ralf Treinen  writes:

> I had a cursory look over the listed maintainer scripts, and did not
> find any that does a careful checking of exit statuses. Though some
> of them are quite trivial, or even sometimes empty. It looks to me
> as not using strict mode in these cases is an oversight, and I would
> like to file bugs for these.
>
> What is your opinion? Policy says "should", not "must". If you agree
> with the MBF, what do you think would be the appropriate severity?

I think it would have been better to have:
i) filed no more than 1 bug per source package
ii) been specific about the scripts you were objecting to

Regards,

Matthew

-- 
"At least you know where you are with Microsoft."
"True. I just wish I'd brought a paddle."
http://www.debian.org



Re: Intended MBF: maintainer scripts not using strict mode

2017-06-29 Thread Emilio Pozuelo Monfort
On 27/06/17 18:47, Russ Allbery wrote:
> Ralf Treinen  writes:
>> On Mon, Jun 26, 2017 at 11:09:26PM +0200, Mattia Rizzolo wrote:
> 
>>> sigh.
>>> And using `#!/bin(ba)?sh -e` is not good either (there is a lintian tag
>>> about it, iirc).
> 
>> what is the rationale for this? Is anyone calling maintainer scripts
>> like "sh 

Re: Call for testing: APT 1.5~alpha1/experimental

2017-06-29 Thread Julian Andres Klode
On Thu, Jun 29, 2017 at 09:38:31AM +0200, Julian Andres Klode wrote:
> APT 1.5~alpha1 landed in experimental today(ish). It includes three
> big changes (one of which, the new https support, is opt-in).

1.5~alpha2 fixes a critical security issue for people that set
a custom CaInfo option: Alpha 1 always loaded the system-wide CA
store, now only the custom one is loaded.

As another notable change, you can now use the http method for
tor+https, just set Dir::Bin::Methods::tor+https to "http".

Also SRV support now properly uses the port specified in the
SRV response, not the original port (there will be a stable
update for that).

-- 
Debian Developer - deb.li/jak | jak-linux.org - free software dev
  |  Ubuntu Core Developer |
When replying, only quote what is necessary, and write each reply
directly below the part(s) it pertains to ('inline').  Thank you.



Re: UMASK 002 or 022?

2017-06-29 Thread gwmfms6
The wider community doesn't seem that concerned with the fact that all 
Debian and Ubuntu users are now (with the most recent stable releases) 
completely unable to change their default umask (and further have a 
default setting that gives the world read access to all their 
documents). I think this needs to be viewed as a security issue.


Even with the premise that the average Linux user is more computer 
competent than the average Windows or Mac user, I still don't think it's 
a fair assumption that all linux users know all about umask and 
permissions. Due to this, many users may unwittingly create "guest" 
accounts or friend accounts on their computers unknowingly giving read 
access to all documents they've created. This is not an uncommon 
practice in university contexts especially. Same goes if there's any 
sort of remote access going on through SSH etc.


This issue strikes me as something that should be of higher concern to 
the community.


Someone mentioned changing the permissions on one's home folder. That 
just adds insult to injury that by default everyone's home folder let's 
the world have read access along with all files being created with read 
access. It's poor privacy and security policy. The average computer-user 
assumes that other account holders can't read their "stuff" unless they 
do something to allow that person to read their stuff. But this is 
completely untrue on Debian Stretch and Ubuntu 17.04.




Work-needing packages report for Jun 30, 2017

2017-06-29 Thread wnpp
The following is a listing of packages for which help has been requested
through the WNPP (Work-Needing and Prospective Packages) system in the
last week.

Total number of orphaned packages: 1079 (new: 1)
Total number of packages offered up for adoption: 171 (new: 0)
Total number of packages requested help for: 45 (new: 0)

Please refer to http://www.debian.org/devel/wnpp/ for more information.



The following packages have been orphaned:

   posterazor (#866220), orphaned yesterday
 Description: splits an image across multiple pages for assembly into
   a poster
 Installations reported by Popcon: 577
 Bug Report URL: http://bugs.debian.org/866220

1078 older packages have been omitted from this listing, see
http://www.debian.org/devel/wnpp/orphaned for a complete list.



No new packages have been given up for adoption, but a total of 171 packages
are awaiting adoption.  See http://www.debian.org/devel/wnpp/rfa_bypackage
for a complete list.



For the following packages help is requested:

   autopkgtest (#846328), requested 211 days ago
 Description: automatic as-installed testing for Debian packages
 Reverse Depends: debci-worker openstack-pkg-tools
 Installations reported by Popcon: 838
 Bug Report URL: http://bugs.debian.org/846328

   balsa (#642906), requested 2104 days ago
 Description: An e-mail client for GNOME
 Reverse Depends: balsa-dbg
 Installations reported by Popcon: 668
 Bug Report URL: http://bugs.debian.org/642906

   busybox (#854181), requested 145 days ago
 Description: Tiny utilities for small and embedded systems
 Reverse Depends: bootcd busybox-syslogd dropbear-initramfs
   live-boot-initramfs-tools open-infrastructure-system-boot udhcpc
   udhcpd wicd-daemon zfs-initramfs
 Installations reported by Popcon: 199542
 Bug Report URL: http://bugs.debian.org/854181

   cargo (#860116), requested 79 days ago
 Description: Rust package manager
 Reverse Depends: dh-cargo
 Installations reported by Popcon: 477
 Bug Report URL: http://bugs.debian.org/860116

   cups (#532097), requested 2945 days ago
 Description: Common UNIX Printing System
 Reverse Depends: bluez-cups boomaga chromium
   cinnamon-settings-daemon cloudprint cups cups-backend-bjnp
   cups-browsed cups-bsd cups-client (66 more omitted)
 Installations reported by Popcon: 182439
 Bug Report URL: http://bugs.debian.org/532097

   cyrus-sasl2 (#799864), requested 645 days ago
 Description: authentication abstraction library
 Reverse Depends: 389-ds-base 389-ds-base-libs 389-dsgw adcli
   autofs-ldap cairo-dock-mail-plug-in claws-mail
   claws-mail-acpi-notifier claws-mail-address-keeper
   claws-mail-archiver-plugin (127 more omitted)
 Installations reported by Popcon: 200818
 Bug Report URL: http://bugs.debian.org/799864

   dee (#831388), requested 349 days ago
 Description: model to synchronize mutiple instances over DBus
 Reverse Depends: dee-tools gir1.2-dee-1.0 libdee-1.0-4-dbg
   libdee-dev zeitgeist-core
 Installations reported by Popcon: 66457
 Bug Report URL: http://bugs.debian.org/831388

   developers-reference (#759995), requested 1034 days ago
 Description: guidelines and information for Debian developers
 Installations reported by Popcon: 18548
 Bug Report URL: http://bugs.debian.org/759995

   devscripts (#800413), requested 639 days ago
 Description: scripts to make the life of a Debian Package maintainer
   easier
 Reverse Depends: apt-build apt-listdifferences aptfs arriero
   bzr-builddeb customdeb debci debian-builder debmake debpear (24 more
   omitted)
 Installations reported by Popcon: 13176
 Bug Report URL: http://bugs.debian.org/800413

   ejabberd (#767874), requested 969 days ago
 Description: distributed, fault-tolerant Jabber/XMPP server written
   in Erlang
 Reverse Depends: ejabberd-contrib ejabberd-mod-cron
   ejabberd-mod-log-chat ejabberd-mod-logsession ejabberd-mod-logxml
   ejabberd-mod-message-log ejabberd-mod-muc-log-http
   ejabberd-mod-post-log ejabberd-mod-pottymouth ejabberd-mod-rest (4
   more omitted)
 Installations reported by Popcon: 629
 Bug Report URL: http://bugs.debian.org/767874

   fbcat (#565156), requested 2724 days ago
 Description: framebuffer grabber
 Installations reported by Popcon: 201
 Bug Report URL: http://bugs.debian.org/565156

   fgetty (#823061), requested 425 days ago
 Description: console-only getty & login (issue with nis)
 Installations reported by Popcon: 1641
 Bug Report URL: http://bugs.debian.org/823061

   freeipmi (#628062), requested 2226 days ago
 Description: GNU implementation

Re: UMASK 002 or 022?

2017-06-29 Thread darkestkhan
On Thu, Jun 29, 2017 at 7:43 PM,   wrote:
> The wider community doesn't seem that concerned with the fact that all
> Debian and Ubuntu users are now (with the most recent stable releases)
> completely unable to change their default umask (and further have a default
> setting that gives the world read access to all their documents). I think
> this needs to be viewed as a security issue.
>
> Even with the premise that the average Linux user is more computer competent
> than the average Windows or Mac user, I still don't think it's a fair
> assumption that all linux users know all about umask and permissions. Due to
> this, many users may unwittingly create "guest" accounts or friend accounts
> on their computers unknowingly giving read access to all documents they've
> created. This is not an uncommon practice in university contexts especially.
> Same goes if there's any sort of remote access going on through SSH etc.
>
> This issue strikes me as something that should be of higher concern to the
> community.
>
> Someone mentioned changing the permissions on one's home folder. That just
> adds insult to injury that by default everyone's home folder let's the world
> have read access along with all files being created with read access. It's
> poor privacy and security policy. The average computer-user assumes that
> other account holders can't read their "stuff" unless they do something to
> allow that person to read their stuff. But this is completely untrue on
> Debian Stretch and Ubuntu 17.04.
>

Are you saying that default permissions for home dirs in Debian is 755?

-- 

darkestkhan
--
Feel free to CC me.
jid: darkestk...@gmail.com
May The Source be with You.