Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread Sam Hartman
> "Ian" == Ian Jackson  writes:

Ian> Sam Hartman writes ("Git Packaging Round 2: When to Salsa"):
>> Discussion Comments ---
Ian> ...
>> I realize that not everyone wants all developers to have push
>> access to their packages.  If you have a firm idea about that,
>> then this recommendation is not for you.  I also realize that by
>> starting by recommending the debian group I'm recommending a more
>> permissive maintainership model closer to low threshhold NMU than
>> only NMU my packages after explicit confirmation.  I think that
>> the dh discussion supports the conclusion that we are OK with
>> that as a project *as a recommendation*.  If a maintainer doesn't
>> like that level of openness, that's fine.  My take though is that
>> when recommending what to do to people who do not have
>> preconceived ideas, more open policies like the debian group and
>> low threshhold NMUs are in alignment with the project.

Ian> I absolutely have no problem with recommending this as a
Ian> practice to the individual maintainer who doesn't know better.
Ian> However, for this practice to be useful:

Ian> 1. The maintainer's git repository branch format must be
Ian> documented.  Otherwise another contributor has to guess.  This
Ian> could be done either by doing maintainer uploads with dgit
Ian> (since recent versions of dgit include the maintainer branch
Ian> format information in the git tags), or perhaps by writing
Ian> something in README.source.

Makes sense.
My take is discussion on debian-devel strongly supports making it easier
to figure out what branch format people are using.


Ian> 2. We need to have a shared understanding of when people may
Ian> push to branches in the debian/ repository.  I think you are
Ian> proposing that the answer be "if you do an NMU".  I would
Ian> support this but it is a change to current practice.  We also
Ian> need to understand how this relates to the recommendation to
Ian> NMU to DELAYED.

I'm not  proposing a change to current practice.
I *think* that  the documented practice may not be in alignment with
what happens.
That is, it seems like Debian developers are much more conservative in
how they use the debian group than is permitted by the wiki.

I use the debian group for my packages.
My experience has been that sometimes people push obvious things like
changelog cleanups without asking.  Sometimes I get merge requests.
People will sometimes push fixes to areas of the code they have been
working on especially after I encourage them to do so.
Yes, I could have just given permission to push.  I probably would not
have done so in the instances in question.

I understand this is one person's experience not actual data.

I think in this discussion we can recommend that interested parties
revisit the wiki documentation and see how it matches to reality after
running with the debian group for a few years.

I did do a bit of looking at data.
In my unstable sources.list, there are 17863 source packages that
include salsa.debian.org in the vcs-git.  Of those, 2192 are in the
debian group.
That's the largestsingle group; perl-team (next) comes in at 1417.

The debian group is larger than all the individual accounts used on
salsa combined according to vcs-git in unstable.

So, what I'm seeing is that most people maintain packages in teams.
When they choose to maintain packages not in an explicit team, the
debian group is the dominant choice.
That choice is common enough that we have a strong presumption that it
actually works for people.  If it were a complete mess of people pushing
without thinking or considering consequences we'd be hearing about it
more.

My take is that I think I have sufficient support for my original
recommendation on using debian at this point.  Adding Ian's
recommendation that you need to document the branch format makes sense.

Revisiting what current practice is for the debian group and how that
interacts with NMUs and delayed also makes sense.
I don't think we need to block on that happening.  I do not plan to lead
that discussion: I don't think I have time.

As always, continued feedback welcome; this is where I see things at
this point in the discussion.

--Sam



Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread David Bremner
Sam Hartman  writes:
>
> I did do a bit of looking at data.
> In my unstable sources.list, there are 17863 source packages that
> include salsa.debian.org in the vcs-git.  Of those, 2192 are in the
> debian group.
> That's the largestsingle group; perl-team (next) comes in at 1417.
>
> The debian group is larger than all the individual accounts used on
> salsa combined according to vcs-git in unstable.

Sure, but there's a lot of inertia from collab-maint on alioth when it
was the promoted / only-sensible option. I'd guess that most
collab-maint packages were ported to the debian group.

d



Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github

2019-09-12 Thread Sam Hartman
> "Ian" == Ian Jackson  writes:


Ian> No-one should be asked to interact with a non-free service, as
Ian> part of contributing to Debian.

Ian> Note I say "no-one should be asked".  It is not enough, for me,
Ian> for there to be a "plan (b)" route.  Ie, it is not OK for a
Ian> maintainer to advertise a github repo as preferred, or to ask
Ian> for PRs on github, even if an alternative or mirror, or Salsa,
Ian> or the BTS are also advertised.

Ian> This is for two reasons: firstly, this is a matter of
Ian> principle.  Our mission is free software.  Free software needs
Ian> free tools.  We should not be advertising or encouraging the
Ian> use of non-free tools.

I agree that many people in the project want us to work hard to avoid
encouraging non-free tools.
I agree that's a significant consideration.

Ian> Secondly, there is a practical problem if a maintainer (even a
Ian> solo maintainer) chooses to regard a nonfree service as
Ian> primary.  If another person comes along and wants to help out
Ian> with that package, they will either have to also tolerate using
Ian> the nonfree service, or they will have to try to persuade the
Ian> maintainer to abandon their existing hosting or tools (and
Ian> maybe the maintainer's existing workflow, if the nonfree tools
Ian> are significantly different).  For me that is wholly
Ian> unacceptable.

I agree that this can be a consequence of using non-free tools.
I believe those involved in the discussions around this issue have
considered this consequence.

>> If the use of a non-free service is preventing an active member
>> of our community from contributing to a team, the team should
>> work to find a solution so that member can contribute
>> effectively.

Ian> This is no good as an answer.

Ian> In practice imprecations to a team (or a maintainer) to "find a
Ian> solution so that a Debian contributor can contribute
Ian> effectively" will be useless because:

Ian> (i) Even having to ask this question already makes the new
Ian> contributor seem awkward, puts them at a social disadvantage,
Ian> and perhaps annoys people.

Ian> (ii) We lack workable enforcement mechanisms for this kind of
Ian> imprecation.  (Because we lack *any* workable enforcement
Ian> mechanisms to deal with obstructive maintainer behaviours.)

Ian> (iii) Even if everyone has good will, and or even if we had
Ian> excellent and proportionate and swift enforcement mechanism,
Ian> there will inevitably be a delay and hassle and friction.

I agree that these are problems you can run into.

Ian> ...
>> Using non-free services for Debian packaging is not recommended
>> but is permitted.

Ian> I strongly disagree with this, or at least, with what seems to
Ian> me to be the obvious implication.  It is also contrary to our
Ian> current practice.

Unfortunately, I believe you are in the rough when judging rough
consensus on this issue.

This was discussed fairly recently on debian-project; my take is that
Thomas Goirand represented a position roughly the same as your own.
My reading of that discussion is that:

1) there are significant problems we'd run into if we forbid  non-free tools in
Debian work

2) There was not sufficient support in that discussion to do so anyway

3) There are significant problems that come up when non-free tools are
used.  The problems enumerated were similar to the problems you describe
above.

More over your claim that this is not our current practice runs counter
to facts. Of the 26,480 packages in my unstable sources with a vcs-git,
1836 are on github.  7% seems much more consistent to me with "NOT
Recommended" than "forbidden."

I think you would take exception if I said that dgit (940 packages in my
unstable sources--about half the github count) ran counter to current
practice. Yes, that is comparing apples to oranges on a number of
levels.  My point is that there is a significant fraction of our
developers who do use github and that it seems to be a current practice.

That said, I'm really confused that your message didn't get any response
before now.  Considering how sharp some of the responses were on
-project, I don't know how to take this.  Were people not responding
because the -project discussion was so recent, they didn't see a need to
rehash it?  Were people not responding because -devel has a very
different audience and everyone here agrees with you?

In terms of next steps.  I'd recommend that you read the -project
discussion.  Your arguments here are not responsive to several of the
counters brought up in that discussion.  Obviously you may disagree with
the trade offs expressed, but it would be valuable for you to consider
the points made in that discussion.  Even so, based on that discussion
and the active use of github, my take is that we do not have a rough
consensus to forbid non-free servic

Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread Ansgar
On Thu, 2019-09-12 at 08:14 -0400, Sam Hartman wrote:
> Ian> 1. The maintainer's git repository branch format must be
> Ian> documented.  Otherwise another contributor has to guess.  This
> Ian> could be done either by doing maintainer uploads with dgit
> Ian> (since recent versions of dgit include the maintainer branch
> Ian> format information in the git tags), or perhaps by writing
> Ian> something in README.source.
> 
> Makes sense.
> My take is discussion on debian-devel strongly supports making it easier
> to figure out what branch format people are using.

I don't see much value in this requirement (besides additional work). 
One should look at the repository anyway whan planning to do changes
(to match the existing style used); one would naturally see how files
are organized.  We already had tons of packages shipping a
README.source stating "this packages uses quilt, ..." before which I
also didn't find very valuable; this seems pretty similar.

If dgit provides a program to figure this out, people interested in
obtaining the information automatically can just extract and use that. 
(Using dgit to upload packages is sadly incompatible with best
practices around packaging.)

Ansgar



Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github

2019-09-12 Thread Ian Jackson
Sam Hartman writes ("Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github"):
> Unfortunately, I believe you are in the [wrong] when judging rough
> consensus on this issue.
> 
> This was discussed fairly recently on debian-project; my take is that
> Thomas Goirand represented a position roughly the same as your own.
> My reading of that discussion is that:

Thomas was making a lot of much stronger assertions about what should
be done.

> More over your claim that this is not our current practice runs counter
> to facts. Of the 26,480 packages in my unstable sources with a vcs-git,
> 1836 are on github.  7% seems much more consistent to me with "NOT
> Recommended" than "forbidden."

Blimey.  I didn't realise that.

I think this does not demonstrate that I am wrong about project's
overall opinion about this.  I am confident that a GR to forbid this
would succeed.

It just demonstrates that we have few working enforcement mechanisms
against contributors who violate our norms.

> Even if there is not rough consensus to forbid non-free services, I'd
> welcome help documenting the concerns that can come up.

I think this is a question of Debian's core values.

Given the current situation, with 7% of packages in violation of what
I see as a key norm, it seems that this cannot be resolved via a
consensus process.

We should resolve this with a GR.  Something like:

  Subject: Free Software Needs Free Tools

  No Debian contributor should be expected or encouraged, when working
  to improve Debian, to use non-free tools.  This includes proprietary
  web services.  We will ensure this, insofar as it is within Debian's
  collective control.

  For example, Vcs-Git fields in source packages must not refer to
  proprietary git code management systems.  Non-Debian services are
  acceptable here so long as they are principally Free Software.

  We encourage all our upstreams to use Free/Libre tools.

  We recognise that metadata in Debian which describes the behaviour
  of those outside our community, for example fields which refer to
  upstream source management systems, may (in order to be accurate)
  still need to refer to proprietary systems.

Ian.

-- 
Ian JacksonThese opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.



Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread Sam Hartman
> "Ansgar" == Ansgar   writes:

Ansgar> On Thu, 2019-09-12 at 08:14 -0400, Sam Hartman wrote:
Ian> 1. The maintainer's git repository branch format must be
Ian> documented.  Otherwise another contributor has to guess.  This
Ian> could be done either by doing maintainer uploads with dgit
Ian> (since recent versions of dgit include the maintainer branch
Ian> format information in the git tags), or perhaps by writing
Ian> something in README.source.
>> 
>> Makes sense.  My take is discussion on debian-devel strongly
>> supports making it easier to figure out what branch format people
>> are using.

Ansgar> I don't see much value in this requirement (besides
Ansgar> additional work).  One should look at the repository anyway
Ansgar> whan planning to do changes (to match the existing style
Ansgar> used); one would naturally see how files are organized.

I actually find it annoying to figure out which  branch format something
is.
I do the work you suggest, but automation or documentation would help me
as a developer.



Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread David Bremner
Sam Hartman  writes:

>> "Ansgar" == Ansgar   writes:
>
> Ansgar> On Thu, 2019-09-12 at 08:14 -0400, Sam Hartman wrote:
> Ian> 1. The maintainer's git repository branch format must be
> Ian> documented.  Otherwise another contributor has to guess.  This
> Ian> could be done either by doing maintainer uploads with dgit
> Ian> (since recent versions of dgit include the maintainer branch
> Ian> format information in the git tags), or perhaps by writing
> Ian> something in README.source.
> >> 
> >> Makes sense.  My take is discussion on debian-devel strongly
> >> supports making it easier to figure out what branch format people
> >> are using.
>
> Ansgar> I don't see much value in this requirement (besides
> Ansgar> additional work).  One should look at the repository anyway
> Ansgar> whan planning to do changes (to match the existing style
> Ansgar> used); one would naturally see how files are organized.
>
> I actually find it annoying to figure out which  branch format something
> is.
> I do the work you suggest, but automation or documentation would help me
> as a developer.

I just went through a batch of 240+ team uploads (because *sigh* no
arch-all bin:NMUs). I can confirm it's annoying to have to figure the
the git workflows involved when working at even this modest scale.  If
we're not going to enable people to work on multiple packages, then I
(still) don't really see the point of the Debian salsa team.

d



Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github

2019-09-12 Thread Enrico Zini
On Thu, Sep 12, 2019 at 02:07:52PM +0100, Ian Jackson wrote:

> I think this does not demonstrate that I am wrong about project's
> overall opinion about this.  I am confident that a GR to forbid this
> would succeed.

For what is worth, I would vote against such a GR.

I'm extremely uncomfortable reading what you wrote.

I consider you one of the leading actors of the current discussion on
improving/cleaning/redesigning default workflows in Debian, and I
respect you as such.

I see you keep pushing things with a strong cohercive slant rather than
working on creating useful and attractive infrastructure to make
everyone's work easier.

I wish this work would be grounded instead on an acknowledgement and
acceptance of the, imperfect, diverse, yet still valid status quo.

Thankfully I still consider it to be so, with the exception of the
occasional frightening cohercive twist in some of your mails.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread Ian Jackson
Ansgar writes ("Re: Git Packaging Round 2: When to Salsa"):
> If dgit provides a program to figure this out, people interested in
> obtaining the information automatically can just extract and use that. 

It is not possible to figure out the branch format automatically
given just the maintainer branch.

> (Using dgit to upload packages is sadly incompatible with best
> practices around packaging.)

Using dgit to upload packages is best practice.

Ian.

-- 
Ian JacksonThese opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.



should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Drew Parsons
https://python3statement.org/ is a site documenting the projects which 
are supporting the policy of dropping Python2 to keep Python3 only.


The site is designed for python packages specifically, to have only 
Python3 supported by end of 2020.


But it seems to me it would be in the spirit of the site to add Debian's 
pledge to remove Python2 (we are currently in the middle of doing just 
that).


Is this a thing that we want to do as a project, to add Debian to 
https://python3statement.org/ ?


Drew



Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github

2019-09-12 Thread Ian Jackson
Enrico Zini writes ("Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github"):
> On Thu, Sep 12, 2019 at 02:07:52PM +0100, Ian Jackson wrote:
> > I think this does not demonstrate that I am wrong about project's
> > overall opinion about this.  I am confident that a GR to forbid this
> > would succeed.
> 
> For what is worth, I would vote against such a GR.
> I'm extremely uncomfortable reading what you wrote.

I'm sorry to hear that.

> I see you keep pushing things with a strong cohercive slant rather
> than working on creating useful and attractive infrastructure to
> make everyone's work easier.

The latter is what I am trying to do.  I'm sorry that the opposite is
occuring.

> I wish this work would be grounded instead on an acknowledgement and
> acceptance of the, imperfect, diverse, yet still valid status quo.

For me, my opposition to github has nothing to do with my desire to
improve Debian's workflows.

I am indeed trying to improve Debian's workflows by providing better
options.  Options that I hope people will voluntarily adopt, and that
will become more officially recommended - but *not* mandatory.

On the other hand, my opposition to github is like my opposition to
the inclusion of software in main which automatically and without
adequate user permission downloads and runs proprietary binary DRM
code.  Or like the arguments we've had over the lack of proper source
code for some javascript and machine language programs.  Software has
been blocked from Debian, and valuable contributors discouraged, as a
result.

Should we also tolerate these freedom problems as an "imperfect,
diverse, yet still valid status quo" ?  Is it unjustifiably "coercive"
to block non-free software from Debian main ?

I guess one lesson I should perhaps learn is that it is difficult for
me in particular to push on these kind of software freedom issues when
they are entangled with workflow issues, because of inevitable
confusion/conflation/whatever.

So maybe I should leave the "Free Software Needs Free Tools"[1]
advocacy to others.  I do still think it's important.
  [1] https://mako.cc/writing/hill-free_tools.html

> Thankfully I still consider it to be so, with the exception of the
> occasional frightening cohercive twist in some of your mails.

Well, thanks for the rebuke.  I hope I have clarified my thinking and
please do the same again in future.  (Or, indeed, right now, if you
think this message is still frightening...)

Regards,
Ian.

-- 
Ian JacksonThese opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.



Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Ian Jackson
Drew Parsons writes ("should Debian add itself to https://python3statement.org  
?"):
> https://python3statement.org/ is a site documenting the projects which 
> are supporting the policy of dropping Python2 to keep Python3 only.

That statement is a *pledge* to drop support for python2 by the end of
2020.  Have we in fact made such a pledge ?  I think I may have missed
the memo that python2 would be removed from bullseye.

I did some searching and found this
  https://lists.debian.org/debian-python/2019/07/msg00080.html
which is a sane-looking transition plan but doesn't seem to have a
timeframe and doesn't seem to contemplate removal of the actual
python2 interpreter.

FTAOD I don't have an opinion about whether bullseye *should* ship
without python2.  Obviously dropping it would not be desirable from
users' pov, but maintaining an ancient thing by ourselves would not be
desirable either.  I think I trust the Debian Python team to make that
tradeoff.

But we need to be clear what's going on and communicate early.  If
python2 is going out of bullseye then there are a lot of bugs that
should probably be marked rc fairly soon...

thanks,
Ian.

-- 
Ian JacksonThese opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.



Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Jim Popovitch
On Thu, 2019-09-12 at 16:01 +0100, Ian Jackson wrote:
> Drew Parsons writes ("should Debian add itself to 
> https://python3statement.org  ?"):
> > https://python3statement.org/ is a site documenting the projects which 
> > are supporting the policy of dropping Python2 to keep Python3 only.
> 
> That statement is a *pledge* to drop support for python2 by the end of
> 2020. 

FWIW, that proposed ending date is 2020-01-01, ~110 days from now.

-Jim P.



Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Ian Jackson
Jim Popovitch writes ("Re: should Debian add itself to 
https://python3statement.org  ?"):
> On Thu, 2019-09-12 at 16:01 +0100, Ian Jackson wrote:
> > Drew Parsons writes ("should Debian add itself to 
> > https://python3statement.org  ?"):
> > > https://python3statement.org/ is a site documenting the projects which 
> > > are supporting the policy of dropping Python2 to keep Python3 only.
> > 
> > That statement is a *pledge* to drop support for python2 by the end of
> > 2020. 
> 
> FWIW, that proposed ending date is 2020-01-01, ~110 days from now.

It says

  | the following projects have pledged to drop support for Python 2.7
  | no later than 2020, coinciding with the Python development team's
  | timeline for dropping support for Python 2.7.

which is rather ambiguous.

If we do interpret it to mean 2020-01-01, I doubt there is any
realistic chance of us making that, even if we decide we want to.

Ian.

-- 
Ian JacksonThese opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.



Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Jim Popovitch
On Thu, 2019-09-12 at 16:14 +0100, Ian Jackson wrote:
> Jim Popovitch writes ("Re: should Debian add itself to 
> https://python3statement.org  ?"):
> > On Thu, 2019-09-12 at 16:01 +0100, Ian Jackson wrote:
> > > Drew Parsons writes ("should Debian add itself to 
> > > https://python3statement.org  ?"):
> > > > https://python3statement.org/ is a site documenting the projects which 
> > > > are supporting the policy of dropping Python2 to keep Python3 only.
> > > 
> > > That statement is a *pledge* to drop support for python2 by the end of
> > > 2020. 
> > 
> > FWIW, that proposed ending date is 2020-01-01, ~110 days from now.
> 
> It says
> 
>   | the following projects have pledged to drop support for Python 2.7
>   | no later than 2020, coinciding with the Python development team's
>   | timeline for dropping support for Python 2.7.
> 
> which is rather ambiguous.

I agree, that site seems, by-design, to avoid the obvious issue that the
Python Developers have stated (in lots of places) that they will stop
supporting Python 2x on 2020-01-10 (search for "python2 eol")


> If we do interpret it to mean 2020-01-01, I doubt there is any
> realistic chance of us making that, even if we decide we want to.

I agree, it's a time waster to even try.   The issue really comes down
to: will DDs support python2 security releases through bullseye's eol.

-Jim P.





Bug#940121: ITP: sphinxcontrib-svg2pdfconverter -- Sphinx SVG to PDF Converter Extension

2019-09-12 Thread Gianfranco Costamagna
Package: wnpp
Owner: Gianfranco Costamagna 
Severity: wishlist
X-Debbugs-CC: debian-devel@lists.debian.org


* Package name: sphinxcontrib-svg2pdfconverter
  Version : 0.1.0
  Upstream Author : 2018-2019 by Missing Link Electronics, 2018-2019 by Stefan 
Wiehler
* URL : https://github.com/sephalon/sphinxcontrib-svg2pdfconverter/
* License : BSD-2
  Programming Lang: Python
  Description : Sphinx SVG to PDF Converter Extension

 This extension converts SVG images to PDF in case the builder
 does not support SVG images natively (e.g. LaTeX).
 .
 Internally, either Inkscape or rsvg-convert from libRSVG as a more
 lightweight alternative is used to convert images.
 .
 This package contains the Python 3.x module.


I need this package to fix nbsphinx RC bug #939492 due to new pandoc currently 
in unstable.

Cheers,

Gianfranco



Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Mo Zhou
Hi Drew,

https://release.debian.org/transitions/html/python2-rm.html

Given the current progress it looks not easy to make a promise.
If some upstream happen to lag behind the schedule of python3
migration, we'll just stuck there for a while.

On 2019-09-12 14:46, Drew Parsons wrote:
> https://python3statement.org/ is a site documenting the projects which
> are supporting the policy of dropping Python2 to keep Python3 only.
> 
> The site is designed for python packages specifically, to have only
> Python3 supported by end of 2020.
> 
> But it seems to me it would be in the spirit of the site to add
> Debian's pledge to remove Python2 (we are currently in the middle of
> doing just that).
> 
> Is this a thing that we want to do as a project, to add Debian to
> https://python3statement.org/ ?
> 
> Drew



Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Matthias Klose

On 12.09.19 17:01, Ian Jackson wrote:

Drew Parsons writes ("should Debian add itself to https://python3statement.org  
?"):

https://python3statement.org/ is a site documenting the projects which
are supporting the policy of dropping Python2 to keep Python3 only.


That statement is a *pledge* to drop support for python2 by the end of
2020.  Have we in fact made such a pledge ?  I think I may have missed
the memo that python2 would be removed from bullseye.

I did some searching and found this
   https://lists.debian.org/debian-python/2019/07/msg00080.html
which is a sane-looking transition plan but doesn't seem to have a
timeframe and doesn't seem to contemplate removal of the actual
python2 interpreter.

FTAOD I don't have an opinion about whether bullseye *should* ship
without python2.  Obviously dropping it would not be desirable from
users' pov, but maintaining an ancient thing by ourselves would not be
desirable either.  I think I trust the Debian Python team to make that
tradeoff.

But we need to be clear what's going on and communicate early.  If
python2 is going out of bullseye then there are a lot of bugs that
should probably be marked rc fairly soon...


it's communicated here:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=py2removal;users=debian-pyt...@lists.debian.org

derived from
https://release.debian.org/transitions/html/python2-rm.html (not perfect, we are 
still missing bug reports).



it's way too early to mark all of these as RC.

No, it's not yet decided if Python2 will be part of bullseye.  But the python 
command and the unversioned python packages won't be part of bullseye.






thanks,
Ian.





Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Alf Gaida
On Thu, 12 Sep 2019 16:01:54 +0100
Ian Jackson  wrote:

> That statement is a *pledge* to drop support for python2 by the end of
> 2020.  Have we in fact made such a pledge ?  I think I may have missed
> the memo that python2 would be removed from bullseye.
> 
""He's dead, Jim" (Doctor Leonard McCoy)

> I did some searching and found this
>   https://lists.debian.org/debian-python/2019/07/msg00080.html
> which is a sane-looking transition plan but doesn't seem to have a
> timeframe and doesn't seem to contemplate removal of the actual
> python2 interpreter.
It doesn't really matter. In fact python2 is dead for years, if we
start now to make a plan we are years to late. The timeframe is _now:.
 
> FTAOD I don't have an opinion about whether bullseye *should* ship
> without python2.  Obviously dropping it would not be desirable from
> users' pov, but maintaining an ancient thing by ourselves would not be
> desirable either.  I think I trust the Debian Python team to make that
> tradeoff.
I have an opinion. If we define stable following Jack Cohen, python2
can stay forever - if you forgOt:
There's this special biologist word we use for "stable". It's "dead". ~
Jack Cohen

> But we need to be clear what's going on and communicate early.  If
> python2 is going out of bullseye then there are a lot of bugs that
> should probably be marked rc fairly soon...
We can't do better now - planning of the removal and preparation for
would been a task for the buster release cycle - this chance is
gone. But is is no reason to remove dead things now. And the last
reminder is the python clock:

Let me copy and paste the content of https://pythonclock.org/ at the
time of writing:

> Hell, yes, Python 2.7 will retire in...
> 0
> Years
> 3
> Months
> 19
> Days
> 4
> Hours
> 59
> Minutes
> 44
> Seconds
>
>
> What's all this, then?
> Python 2.7 will not be maintained past 2020. Originally, there was no
> official date. Recently, that date has been updated to January 1,
> 2020.
> This clock has been updated accordingly. My original idea was to throw
> a Python 2 Celebration of Life party at PyCon 2020, to celebrate
> everything Python 2 did for us. That idea still stands. (If this
> sounds
> interesting to you, email pythonclock...@gmail.com).
> 
> Python 2, thank you for your years of faithful service.
> 
> Python 3, your time is now.
> 
> How do I get started?
> If the code you care about is still on Python 2, that's totally
> understandable. Most of PyPI's popular packages now work on Python 2
> and 3, and more are being added every day. Additionally, a number of
> critical Python projects have pledged to stop supporting Python 2
> soon.
> To ease the transition, the official porting guide has advice for
> running Python 2 code in Python 3.
>

Only another harsh comment:
So what do you expect - i kown this page from the beginning. If it is
surprising for the Debian project that these guys are serious about it
we really should adjust the perception of the environment around us.

I for myself have two important python2 projects that are not migrated
right now - and i will migrate them if really needed because it is no
fun to do so - so it depends on Debian - but i'm dead without both
projects, so i'm in fact prepared, only to lazy to do it now.


> thanks,
> Ian.
> 


Cheers Alf

-- 
Alf Gaida
BDBF C688 EFAD BA89 5A9F  464B CD28 0A0B 4D72 827C



Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Paul Gevers
Hi,

On 12-09-2019 17:01, Ian Jackson wrote:
> But we need to be clear what's going on and communicate early.

Yes, not on the front page, but there is (first bullet):

https://www.debian.org/releases/buster/amd64/release-notes/ch-information.en.html#deprecated-components

Paul



signature.asc
Description: OpenPGP digital signature


Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Marco d'Itri
On Sep 12, Alf Gaida  wrote:

> It doesn't really matter. In fact python2 is dead for years, if we
> start now to make a plan we are years to late. The timeframe is _now:.
Dead for who? As long as somebody will be interested in maintaining 
python2 it will not be dead.
I maintain some packages which have been abandoned by their upstream 
maintainers 20 years ago and they are fine.
I am not a python users, but as long as somebody will continue to 
maintain it in Debian we have no reason to remove it no matter what 
the upstream maintainers would like.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Marc Haber
On Mon, 9 Sep 2019 00:38:03 +0200, Adam Borowski 
wrote:
>With local DNS:
>* the target server knows about you (duh!)
>* the ISP can read the destination of every connection
>  [reading the DNS packets, reading the IP header, reading SNI header]
>* the ISP can block such connections
>  [blocking DNS packets, blocking actual connection]
>* DNSSEC forbids falsifying DNS
>
>With DoH:
>* the target server knows about you (duh!)
>* the ISP can read the destination of every connection
>  [reading the IP header, reading SNI header]
>* the ISP can block such connections
>  [blocking actual connection]
>* Cloudflare can read the destination of every connection
>  [they serve the DNS...]
>* Cloudflare can falsify DNS¹
>* Cloudflare can block connections
>  [blocking or falsifying DNS response]
>
>So currently DoH is strictly worse.

Will DOH break corporate web apps that are accessed over a VPN (and
thus only resolvable via the local resolver)? Or has Mozilla catered
for that?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Mo Zhou
On 2019-09-12 16:22, Marco d'Itri wrote:
> On Sep 12, Alf Gaida  wrote:
> 
>> It doesn't really matter. In fact python2 is dead for years, if we
>> start now to make a plan we are years to late. The timeframe is _now:.
> Dead for who? As long as somebody will be interested in maintaining 
> python2 it will not be dead.

Agreed. there are already python2 forks such as:
https://github.com/naftaliharris/tauthon

It may sound funny but I don't hope any python2 stuff get back with
a new name after the python2 removal. But, it could happen if some
people is willing to support and maintain...

How should Debian react if someone submitted an ITP for python2
forks, such as the tauthon above?



Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github

2019-09-12 Thread Alf Gaida
On Thu, 12 Sep 2019 08:47:49 -0400
Sam Hartman  wrote:
> That said, I'm really confused that your message didn't get any
> response before now.  Considering how sharp some of the responses
> were on -project, I don't know how to take this.  Were people not
> responding because the -project discussion was so recent, they didn't
> see a need to rehash it?  Were people not responding because -devel
> has a very different audience and everyone here agrees with you?
That's really easy: Most people aviod harsh or sharp answers, i'm not.
And to be honest, i don't really understand all the discussions about
git. It's just a tool - and most of the time misused in debian. Not
that i'm the biggest git expert on earth - i'm only a happy user for
ten years now. And the ten years include bitbucket, github, gitlab,
gitblit, gitea, gitolite, gerrit and so on - so it is totally
irrelevant to some extend where things are hosted, it remains git in
the very end.

Regarding the workflow and participation - it might be a problem that
one need an account for github or other non-free services - it's easy:
No account, no participation, bad luck. In one thing Ian is right:
Debian packages should not be hosted on non-free services. I would go a
step further: No Debian package must be hosted outside of debian.
Period. Problem solved. That would prevent problems like the ones with
debian live hosted by Progress Linux, LXDE packaging hosted on
https://git.lxde.org (broken for some month now) and so on. Would really
make sense, but is a different story.

Another though: If we start not to allow packaging on non free services
and using non-free tools - what would be next: Considering projects
that use non-free services like github or bitbucket as non-free - in
this case please drop the whole LXQt from debian, we will continue to
use github.com in near future and are not planning a change right now.

Cheers Alf

-- 
Alf Gaida
BDBF C688 EFAD BA89 5A9F  464B CD28 0A0B 4D72 827C



Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github

2019-09-12 Thread Sam Hartman
> "Ian" == Ian Jackson  writes:

Ian> Sam Hartman writes ("Re: Git Packaging Round 2: SHOULD Not or
Ian> MUSt NOT Github"):
>> Unfortunately, I believe you are in the [wrong] when judging

Ian placed the word "wrong" in my mouth replacing the word "rough" from
my original mail.  I disagree with that characterization of what I said
in the strongest possible terms.  Judging consensus is not about finding
right or wrong; it is not about a moral judgment at all.  Judging
consensus is about finding agreement (or its lack).  When I say that Ian
is in the rough, I mean that I think there is not a perfect consensus on
the issue, and that Ian holds an view that is inconsistent with what
consensus exists.  I'm also implying by that statement that the
discussion is not ongoing; that we've reached a good enough
approximation of consensus to move on even though some people wish we
had reached a different conclusion.

>> More over your claim that this is not our current practice runs
>> counter to facts. Of the 26,480 packages in my unstable sources
>> with a vcs-git, 1836 are on github.  7% seems much more
>> consistent to me with "NOT Recommended" than "forbidden."

Ian> Blimey.  I didn't realise that.

Ian> I think this does not demonstrate that I am wrong about
Ian> project's overall opinion about this.  I am confident that a GR
Ian> to forbid this would succeed.

Ian> It just demonstrates that we have few working enforcement
Ian> mechanisms against contributors who violate our norms.

>> Even if there is not rough consensus to forbid non-free services,
>> I'd welcome help documenting the concerns that can come up.

Ian> I think this is a question of Debian's core values.

Ian> Given the current situation, with 7% of packages in violation
Ian> of what I see as a key norm, it seems that this cannot be
Ian> resolved via a consensus process.

Ian> We should resolve this with a GR.  Something like:

This sounds like a discussion that would be better on debian-project.
I'll try and move it there, quoting your draft text.

--Sam



Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github

2019-09-12 Thread Ian Jackson
Sam Hartman writes ("Re: Git Packaging Round 2: SHOULD Not or MUSt NOT Github"):
> Ian Jackson  writes:
> 
> > Sam Hartman writes ("Re: Git Packaging Round 2: SHOULD Not or
> > MUSt NOT Github"):
> >> Unfortunately, I believe you are in the [wrong] when judging
> 
> Ian placed the word "wrong" in my mouth replacing the word "rough" from
> my original mail.  I disagree with that characterization of what I said
> in the strongest possible terms.

I'm sorry, I genuinely thought you had made a typo.  The sentence

  Unfortunately, I believe you are in the rough when judging rough
  consensus on this issue.

didn't make sense to me.  I should have stared at it for longer and
then maybe I would have seen what you meant.

>When I say that Ian is in the rough, I mean that I think there is
> not a perfect consensus on the issue, and that Ian holds an view
> that is inconsistent with what consensus exists.

Thanks for the explanation.

Ian.

-- 
Ian JacksonThese opinions are my own.

If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.



Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Adam Borowski
On Tue, Sep 10, 2019 at 07:46:57PM +0200, Marco d'Itri wrote:
> On Sep 09, Adam Borowski  wrote:
> 
> > With DoH:
> > * the target server knows about you (duh!)
> > * the ISP can read the destination of every connection
> >   [reading the IP header, reading SNI header]
> > * the ISP can block such connections
> >   [blocking actual connection]
> Well, no. They cannot without significantly more expensive hardware to 
> do DPI and a *totally different* legislative framework.
> (Source: I have been dealing with government-mandated censorship in 
> Italy for ~15 years, both at technical and policy levels.)

I don't understand how blocking by IP would be any more expensive than
blocking by DNS.  It's _cheaper_: you read a field in the IP header instead
of doing it in a higher level DNS server.

> > * Cloudflare can falsify DNS¹
> You can use DNSSEC over DoH.

If implemented.

> You obviously consider Mozilla's choices of trusted resolvers (currently 
> Cloudflare, hopefully others too in the future) a bigger privacy risk 
> for generic users (the one who use the browser defaults) than their ISP, 
> I disagree.

Currently you need to trust the ISP; with DoH you need to trust both the ISP
and Cloudflare.  Unless you tunnel all the data over DNS (iodine), you need
to contact your actual destination over open network.

> I still believe that generic users are better served by deploying more 
> censorship-resistant protocols than by worrying that Cloudflare (or 
> whoever else) would violate the privacy requirements mandated by 
> Mozilla.

Sure, but DoH is less censorship-resistant not more.


Meow!
-- 
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ Your snowflakes have nothing on my socks drawer.
⢿⡄⠘⠷⠚⠋⠀
⠈⠳⣄



How to give back a build

2019-09-12 Thread Jeff
The package I uploaded yesterday failed to build[1]. In the buildd, 2 of
1000+ tests failed. Of course, I built in a clean sbuild for sid before
I uploaded it, and the same package built fine on the newer Ubuntu
distros on launchpad. So I'm hoping it was just a glitch, and I'd like
to retry the build, but my search engine foo is failing me.

How can I give back the build?

Or will it retry automatically?

Regards

Jeff

[1]
https://buildd.debian.org/status/logs.php?arch=all&pkg=gscan2pdf&ver=2.5.6-1



signature.asc
Description: OpenPGP digital signature


Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Ansgar
Adam Borowski writes:
> On Tue, Sep 10, 2019 at 07:46:57PM +0200, Marco d'Itri wrote:
>> Well, no. They cannot without significantly more expensive hardware to 
>> do DPI and a *totally different* legislative framework.
>> (Source: I have been dealing with government-mandated censorship in 
>> Italy for ~15 years, both at technical and policy levels.)
>
> I don't understand how blocking by IP would be any more expensive than
> blocking by DNS.  It's _cheaper_: you read a field in the IP header instead
> of doing it in a higher level DNS server.

>From the top of my head I can think of several reasons:

 - For IP-level blocking you need to implement blocking in more places
   instead of a central place (DNS); also more data needs to be
   processed in total.  Block lists are generally not public and access
   to them might need different restrictions (for legal reasons).

 - IP-level blocking leads to more overblocking (anything sharing the
   same IP); this causes legal problems.

So Marco's arguments seem reasonable.

>> > * Cloudflare can falsify DNS¹
>> You can use DNSSEC over DoH.
>
> If implemented.

It's probably easier to use DNSSEC with DoH as you avoid broken
resolvers at ISP or customer routers that don't speak DNSSEC or not even
proper DNS.  I've encountered customer routers that knew only about `A`
RRs and lied about `PTR` which breaks stuff in interesting ways...

Ansgar



Re: How to give back a build

2019-09-12 Thread Adam D. Barratt
On Thu, 2019-09-12 at 19:02 +0200, Jeff wrote:
> The package I uploaded yesterday failed to build[1]. In the buildd, 2
> of 1000+ tests failed. Of course, I built in a clean sbuild for sid
> before I uploaded it, and the same package built fine on the newer
> Ubuntu distros on launchpad. So I'm hoping it was just a glitch, and
> I'd like to retry the build, but my search engine foo is failing me.
> 
> How can I give back the build?

If you're a DD, then you can use the service described in 
https://debblog.philkern.de/2019/08/alpha-self-service-buildd-givebacks.html

Otherwise e-mail debian-wb-team@lists.d.o and request the give-back.
That is the address listed in 
https://release.debian.org/wanna-build.txt , which is the first Google
hit for "debian give back" for me.

> Or will it retry automatically?
> 

Nope.

Regards,

Adam



Re: How to give back a build

2019-09-12 Thread Samuel Thibault
Hello,

Jeff, le jeu. 12 sept. 2019 19:02:15 +0200, a ecrit:
> How can I give back the build?

Please read the Misc Developer News on d-d-a :)

https://lists.debian.org/debian-devel-announce/2019/08/msg3.html

Samuel



Re: How to give back a build

2019-09-12 Thread Andreas Metzler
On 2019-09-12 Jeff  wrote:
> The package I uploaded yesterday failed to build[1]. In the buildd, 2 of
> 1000+ tests failed. Of course, I built in a clean sbuild for sid before
> I uploaded it, and the same package built fine on the newer Ubuntu
> distros on launchpad. So I'm hoping it was just a glitch, and I'd like
> to retry the build, but my search engine foo is failing me.

> How can I give back the build?

https://lists.debian.org/debian-devel-announce/2019/08/msg3.html



Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Bastian Blank
On Thu, Sep 12, 2019 at 06:26:34PM +0200, Marc Haber wrote:
> Will DOH break corporate web apps that are accessed over a VPN (and
> thus only resolvable via the local resolver)? Or has Mozilla catered
> for that?

Please see https://wiki.mozilla.org/Trusted_Recursive_Resolver.
network.trr.mode=2 seems to configure what you want.  DoH needs to be
able to bootstrap anyway.

Bastian

-- 
Youth doesn't excuse everything.
-- Dr. Janice Lester (in Kirk's body), "Turnabout Intruder",
   stardate 5928.5.



Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Amir H. Firouzian
Then you should ask why we have ICANN in the first place!

PS: https://en.wikipedia.org/wiki/OpenNIC

On Sun, Sep 8, 2019 at 11:01 PM Ondřej Surý  wrote:
>
> Hi,
>
> I haven’t found any discussion on the topic (although I haven’t searched very 
> hard and only looked for DoH and DNS keywords in the BTS), but since Mozilla 
> plans to enable DoH to CloudFlare by default to US based users: 
> https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/
>  I would rather see an explicit statement. I would be very surprised with 
> Debian’s usual stance regarding the users’ privacy that we would not consider 
> this as a privacy violation, but again I am not Firefox maintainer in Debian 
> and I would rather hear from them than speculate on my own.
>
> Thanks,
> Ondřej
> --
> Ondřej Surý 



Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Ondřej Surý
What? How did you manage to go from me suggesting disabling DoH by default to 
CloudFlare in Firefox without explicit user consent to an attack on ICANN?

But I guess that this alternative DNS root nonsense will just never die, so I 
should not be really surprised.

--
Ondřej Surý 

> On 12 Sep 2019, at 19:45, Amir H. Firouzian  wrote:
> 
> Then you should ask why we have ICANN in the first place!
> 
> PS: https://en.wikipedia.org/wiki/OpenNIC
> 
>> On Sun, Sep 8, 2019 at 11:01 PM Ondřej Surý  wrote:
>> 
>> Hi,
>> 
>> I haven’t found any discussion on the topic (although I haven’t searched 
>> very hard and only looked for DoH and DNS keywords in the BTS), but since 
>> Mozilla plans to enable DoH to CloudFlare by default to US based users: 
>> https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/
>>  I would rather see an explicit statement. I would be very surprised with 
>> Debian’s usual stance regarding the users’ privacy that we would not 
>> consider this as a privacy violation, but again I am not Firefox maintainer 
>> in Debian and I would rather hear from them than speculate on my own.
>> 
>> Thanks,
>> Ondřej
>> --
>> Ondřej Surý 



Re: should Debian add itself to https://python3statement.org ?

2019-09-12 Thread Andrey Rahmatullin
On Thu, Sep 12, 2019 at 09:30:09AM -0700, Mo Zhou wrote:
> How should Debian react if someone submitted an ITP for python2
> forks, such as the tauthon above?
"Go ahead but don't interfere with other packages, including the Python 3
interpreter and the Python 3 modules, and we won't maintain tauthon
modules or the packaging infrastructure for them".

Note: this is a private opinion, not the opinion of DPMT as a whole.

-- 
WBR, wRAR


signature.asc
Description: PGP signature


Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread Marc Haber
On Sun, 08 Sep 2019 17:35:10 -0400, Sam Hartman 
wrote:
>* Use a public repository where in-progress and ongoing work are
>  available to the public.  Do not just push when you release.

I would liket to have a recommendation about git push --force in that
case. I frequently do rebase --interactive to sort and bring structure
in my commit histories, which would need a force push in case a commit
which is part of a rebase was already pushed. To avoid this; I
frequenly push only after releasing.

How about documenting that branches prefixed with "wip" can be force
pushed any time and people pulling from those branches should be
expected to handle that?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread Marc Haber
On Sun, 08 Sep 2019 22:05:17 -0700, Russ Allbery 
wrote:
>Sean Whitton  writes:
>> On Sun 08 Sep 2019 at 05:35PM -04, Sam Hartman wrote:
>
>>> You are encouraged to mirror your repository to Salsa so that people can
>>> find more of the Debian packaging in one place.
>
>> Hmm, if the Vcs-* are set correctly, what's the value of mirroring to
>> salsa?  (I don't object in the least; just wondering about the value.)
>
>Higher chance that the repository won't go away.  For instance, the
>primary home of all of my packaging repositories is on my own Git server
>and will continue to be because I like to have my own personal control
>over such things, but it's in the project's best interest for me to mirror
>them to Salsa so that if I suddenly make millions of dollars and decide I
>just want to read books and stop running online services, the repositories
>don't become inaccessible.

alioth.debian.org, anyone? That one went away pretty fast.

-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: How to give back a build

2019-09-12 Thread Jeff
On 12/09/2019 19:08, Adam D. Barratt wrote:
> If you're a DD, then you can use the service described in 
> https://debblog.philkern.de/2019/08/alpha-self-service-buildd-givebacks.html

Thanks to those who replied so quickly. The instructions worked a treat.

Regards

Jeff



signature.asc
Description: OpenPGP digital signature


Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Clément Hermann
Le September 12, 2019 4:52:47 PM UTC, Adam Borowski  a 
écrit :
>On Tue, Sep 10, 2019 at 07:46:57PM +0200, Marco d'Itri wrote:
>> On Sep 09, Adam Borowski  wrote:
>> 
>> > With DoH:
>> > * the target server knows about you (duh!)
>> > * the ISP can read the destination of every connection
>> >   [reading the IP header, reading SNI header]
>> > * the ISP can block such connections
>> >   [blocking actual connection]
>> Well, no. They cannot without significantly more expensive hardware
>to 
>> do DPI and a *totally different* legislative framework.
>> (Source: I have been dealing with government-mandated censorship in 
>> Italy for ~15 years, both at technical and policy levels.)
>
>I don't understand how blocking by IP would be any more expensive than
>blocking by DNS.  It's _cheaper_: you read a field in the IP header
>instead
>of doing it in a higher level DNS server.

I don't think it is, actually. Disregarding the legal framework part, only 
looking at the technical aspect of things, when you do it with DNS, you just 
have to create a local version of the zone that has be censored and distribute 
it normally on your resolvers, for instance. 

Anyway you do a high level modification in a high level service. Request will 
go through your DNS infrastructure the way it's intended to.

However, reading IP headers on routers to block a particular destination is not 
how network are designed to operate. It's not as cheap a function you'd think, 
because it means either being able on the customer router, or close to it, and 
those aren't usually designed to filter that way, or you make sure all traffic 
pass by a filtering router at some point - which means dedicated hardware with 
the traffic load involved. This is usually complicated in a large ISP context: 
networks are huge and evolved over time ; and they weren't designed for 
censorship to begin with, there was this thing called Net Neutrality... ;)

Cheers,

-- 
nodens



Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Simon Richter
Hi,

On Thu, Sep 12, 2019 at 06:52:47PM +0200, Adam Borowski wrote:

> > I still believe that generic users are better served by deploying more 
> > censorship-resistant protocols than by worrying that Cloudflare (or 
> > whoever else) would violate the privacy requirements mandated by 
> > Mozilla.

> Sure, but DoH is less censorship-resistant not more.

The idea for resilience is "too big to block".

When Domain Fronting still worked with Google, people used this to
circumvent censorship because blocking it would have required blocking
Google, so cooperation from Google was necessary to implement effective
censorship.

For the same reason, a lot of political activism is taking place on Github,
who have a smaller target market than Google and have fewer staff exposed
in hostile political environments, so they can manage threats by
restricting employees' travel.

The same will apply to services also hosted on a big CDN, and I believe
that is the business model behind providing this service in the first
place -- pull international activists onto CloudFlare.

I expect this to bring a marked improvement for a short time, followed by
the realization at CF that they exist by the kind permission of
nation-state actors that are very interested in strategic Internet choke
points.

To put it bluntly: CloudFlare has, as a consequence of their business
model, too many employees and assets bound in various jurisdictions. Their
censorship resilience is going to be limited to countries where they do not
have a local presence.

They already need to be able to return different results depending on the
client's IP address, otherwise they break anycast or split horizon based
load balancing for everyone whose DNS they do not control themselves. This
mechanism will be used to limit the scope of governmental censorship
requests to the appropriate geographic area.

To be honest, my feeling is that CloudFlare management are not believing
this to be political at all -- it's a technical solution that improves
service for their own customers and degrades service for non-customers
(because it breaks traditional geo-based load balancing), so of course they
are going to do this.

They have a history of ignoring context, and the fallout will be
interesting to watch. In the meantime, we have a responsibility towards our
users to not expose them to unnecessary risks.

I'm fairly sure that a plugin to control the DoH setting from the
navigation bar will pop up shortly. I'd be in favour of installing it by
default (keep in mind: we are also "too big to block", so we're in the
position to give software that is useful for activists an install base that
makes it hard to identify activists by having the software installed).

   Simon



Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Wouter Verhelst
On Sun, Sep 08, 2019 at 11:17:13PM +0200, Marco d'Itri wrote:
> On Sep 08, Ondřej Surý  wrote:
> 
> > I would rather see an explicit statement. I would be very surprised 
> > with Debian’s usual stance regarding the users’ privacy that we would 
> > not consider this as a privacy violation, but again I am not Firefox 
> > maintainer in Debian and I would rather hear from them than speculate 
> > on my own.
> I think that this is a privacy enhancement, since it prevents some major 
> ISPs from spying on users DNS queries.

Except all they need to do is return NXDOMAIN on the
"use-application-dns.net" domain, and Presto! they can spy on their
users again.

https://support.mozilla.org/en-US/kb/configuring-networks-disable-dns-over-https

So no, DoH defeats people who run wireshark, but it does not "prevent
some major ISPs from spying". If a "major ISP" wants to spy, it just
needs to tell Firefox "hey, that DoH feature? Please just disable it,"
and it's back in business.

Meanwhile, Firefox' default sends everything to the other side of the
Internet without the user's consent. How does that improve privacy?

> When it will be enabled in other countries it will prevent
> government-mandated (or "encouraged") censorship.

Nope. See above.

> It would be a terrible signal if Debian decided to disable an 
> anti-censoship feature provided by an upstream vendor.

Except DoH is *not* an anti-censorship feature. It is a feature that
provides a net reduction in privacy.

CloudFlare says that it won't read your DNS requests -- scout's honour!
-- but even if that's true and we can believe it, there's no reason to
assume it will continue to do so forever, past any potential future
acquisitions or CEO changes.

Mozilla really missed the ball on this one. OpenBSD already made the
necessary changes to Firefox. I think we should, too.

-- 
To the thief who stole my anti-depressants: I hope you're happy

  -- seen somewhere on the Internet on a photo of a billboard


signature.asc
Description: PGP signature


Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Wouter Verhelst
On Tue, Sep 10, 2019 at 07:56:48PM +0200, Julien Cristau wrote:
> On Tue, Sep 10, 2019 at 08:24:03 +0200, Ondřej Surý wrote:
> 
> > > On 9 Sep 2019, at 15:31, Bjørn Mork  wrote:
> > > 
> > > I for one, do trust my ISPs a lot more than I trust Cloudflare or
> > > Google, simply based on the jurisdiction.
> > 
> > While I still strongly agree with you on this one (even though I think all
> > major ISPs here are scumbags, especially the incumbent), I still strongly
> > think we should not have this debate here, and we should turn this around
> > the usual Debian policy - to not send data to 3rd party without explicit 
> > user
> > content and defaulting to not doing so.
> > 
> How is this worse than what we're already doing by default, namely
> sending the same data to whoever happens to be on the network, in
> addition to whoever happened to be listed in an unauthenticated dhcp
> response?  (Which, if you're lucky, is your ISP, aka a 3rd party.)

The major difference is that third party is someone you've got a
contractual relation with.

If you're talking to CloudFlare, you don't. Good luck calling CloudFlare
support when something goes wrong.

-- 
To the thief who stole my anti-depressants: I hope you're happy

  -- seen somewhere on the Internet on a photo of a billboard



Re: How to give back a build

2019-09-12 Thread Wouter Verhelst
On Thu, Sep 12, 2019 at 07:02:15PM +0200, Jeff wrote:
> The package I uploaded yesterday failed to build[1]. In the buildd, 2 of
> 1000+ tests failed. Of course, I built in a clean sbuild for sid before
> I uploaded it, and the same package built fine on the newer Ubuntu
> distros on launchpad. So I'm hoping it was just a glitch, and I'd like
> to retry the build, but my search engine foo is failing me.
> 
> How can I give back the build?
> 
> Or will it retry automatically?

You ask the wanna-build maintainers, or the build maintainers of the
architecture in question.

There's the debian-wb-team mailinglist where such requests can be sent.

-- 
To the thief who stole my anti-depressants: I hope you're happy

  -- seen somewhere on the Internet on a photo of a billboard



Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Marco d'Itri
On Sep 12, Wouter Verhelst  wrote:

> Except all they need to do is return NXDOMAIN on the
> "use-application-dns.net" domain, and Presto! they can spy on their
> users again.
They need to have a government to compel then to do it, which is not 
obvious. And then Mozilla will disable that (you can read this clearly 
in their announcement) and figure out a different strategy.

> Meanwhile, Firefox' default sends everything to the other side of the
> Internet without the user's consent. How does that improve privacy?
Not really "to the other side": Cloudflare's resolvers are highly 
anycasted.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#940140: ITP: node-es-to-primitive -- Pure javascript implementation of ToPrimitive algorithm

2019-09-12 Thread Bastien Roucariès
Package: wnpp
Severity: wishlist
Owner: Bastien Roucariès 

  Package name: node-es-to-primitive
  Version : 1.2.0
  Upstream Author : Jodan Harband
  URL : https://github.com/ljharb/es-to-primitive/
  License : expat
  Programming Lang: javascript
  Description : Pure javascript implementation of ToPrimitive algorithm

 This package provides a ponyfill for ToPrimitive algorithm, thus
 converting of JavaScript object to a primitive value. In JavaScript
 a primitive is data that is not an object and has no method. There
 are seven primitive data type: string, number, bigint, boolean, null,
 undefined and symbol.
 .
 Node.js is an event-based server-side JavaScript engine.


Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Wouter Verhelst
On Thu, Sep 12, 2019 at 11:43:33PM +0200, Marco d'Itri wrote:
> On Sep 12, Wouter Verhelst  wrote:
> 
> > Except all they need to do is return NXDOMAIN on the
> > "use-application-dns.net" domain, and Presto! they can spy on their
> > users again.
> They need to have a government to compel then to do it, which is not 
> obvious.

That's not in the announcement. In fact, it also allows for "opt-in
parental controls", which has nothing to do with governments.

> And then Mozilla will disable that (you can read this clearly 
> in their announcement) and figure out a different strategy.

The announcement does indeed mention that, yes. I sincerely doubt
they'll actually do that, though, unless more than, say, 50% of the
networks they measure end up disabling things.

Of course that's just a matter of personal opinion.

> > Meanwhile, Firefox' default sends everything to the other side of the
> > Internet without the user's consent. How does that improve privacy?
> Not really "to the other side": Cloudflare's resolvers are highly 
> anycasted.

I admit to using some hyperbole here, but the point was that your data
is being sent to a partner of the software you happen to be using,
without you having a contractual relationship with them.

If your bank did that, you'd yell that it's improper. So why is a
browser allowed to do so?

Don't get me wrong; I applaud Mozilla for trying to make encrypted DNS
the default. I just don't think they're going about it the right way.

-- 
To the thief who stole my anti-depressants: I hope you're happy

  -- seen somewhere on the Internet on a photo of a billboard



Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Jeremy Stanley
On 2019-09-12 22:27:39 +0200 (+0200), Simon Richter wrote:
[...]
> The idea for resilience is "too big to block".
> 
> When Domain Fronting still worked with Google, people used this to
> circumvent censorship because blocking it would have required
> blocking Google, so cooperation from Google was necessary to
> implement effective censorship.
[...]
> I'd be in favour of installing it by default (keep in mind: we are
> also "too big to block", so we're in the position to give software
> that is useful for activists an install base that makes it hard to
> identify activists by having the software installed).

Note that by way of counterargument, Google and its services have
been blocked in mainland China by the Great Firewall for nearly a
decade now, so I question whether there is really such a thing as
"too big to block."
-- 
Jeremy Stanley


signature.asc
Description: PGP signature


Work-needing packages report for Sep 13, 2019

2019-09-12 Thread wnpp
The following is a listing of packages for which help has been requested
through the WNPP (Work-Needing and Prospective Packages) system in the
last week.

Total number of orphaned packages: 1307 (new: 2)
Total number of packages offered up for adoption: 153 (new: 0)
Total number of packages requested help for: 53 (new: 0)

Please refer to https://www.debian.org/devel/wnpp/ for more information.



The following packages have been orphaned:

   golang-gopkg-flosch-pongo2.v3 (#940030), orphaned yesterday
 Description: Django-syntax like template-engine for Go
 Installations reported by Popcon: 2
 Bug Report URL: https://bugs.debian.org/940030

   python-medusa (#939642), orphaned 5 days ago
 Description: Framework for implementing asynchronous servers
 Installations reported by Popcon: 268
 Bug Report URL: https://bugs.debian.org/939642

1305 older packages have been omitted from this listing, see
https://www.debian.org/devel/wnpp/orphaned for a complete list.



No new packages have been given up for adoption, but a total of 153 packages
are awaiting adoption.  See https://www.debian.org/devel/wnpp/rfa_bypackage
for a complete list.



For the following packages help is requested:

   autopkgtest (#846328), requested 1016 days ago
 Description: automatic as-installed testing for Debian packages
 Reverse Depends: autodeb-worker debci-worker
 Installations reported by Popcon: 1185
 Bug Report URL: https://bugs.debian.org/846328

   balsa (#642906), requested 2909 days ago
 Description: An e-mail client for GNOME
 Installations reported by Popcon: 714
 Bug Report URL: https://bugs.debian.org/642906

   broadcom-sta (#886599), requested 612 days ago (non-free)
 Description: Broadcom STA Wireless driver (non-free)
 Installations reported by Popcon: 1777
 Bug Report URL: https://bugs.debian.org/886599

   cargo (#860116), requested 884 days ago
 Description: Rust package manager
 Reverse Depends: dh-cargo
 Installations reported by Popcon: 1214
 Bug Report URL: https://bugs.debian.org/860116

   cyrus-sasl2 (#799864), requested 1450 days ago
 Description: authentication abstraction library
 Reverse Depends: 389-ds-base adcli autofs-ldap
   cairo-dock-mail-plug-in claws-mail claws-mail-acpi-notifier
   claws-mail-address-keeper claws-mail-archiver-plugin
   claws-mail-attach-remover claws-mail-attach-warner (108 more
   omitted)
 Installations reported by Popcon: 199899
 Bug Report URL: https://bugs.debian.org/799864

   dee (#831388), requested 1154 days ago
 Description: model to synchronize mutiple instances over DBus
 Reverse Depends: dee-tools gir1.2-dee-1.0 libdee-dev zeitgeist-core
 Installations reported by Popcon: 45838
 Bug Report URL: https://bugs.debian.org/831388

   developers-reference (#759995), requested 1839 days ago
 Description: guidelines and information for Debian developers
 Installations reported by Popcon: 8315
 Bug Report URL: https://bugs.debian.org/759995

   devscripts (#800413), requested 1444 days ago
 Description: scripts to make the life of a Debian Package maintainer
   easier
 Reverse Depends: apt-build apt-listdifferences aptfs arriero
   autodeb-worker brz-debian bzr-builddeb customdeb debci
   debian-builder (32 more omitted)
 Installations reported by Popcon: 12236
 Bug Report URL: https://bugs.debian.org/800413

   docker.io (#908868), requested 362 days ago
 Description: Linux container runtime
 Reverse Depends: golang-docker-dev
   golang-github-containers-storage-dev
   golang-github-fsouza-go-dockerclient-dev
   golang-github-google-cadvisor-dev
   golang-github-samalba-dockerclient-dev kubernetes-node subuser
   whalebuilder
 Installations reported by Popcon: 2215
 Bug Report URL: https://bugs.debian.org/908868

   ed (#886643), requested 612 days ago
 Description: classic UNIX line editor
 Reverse Depends: apt-cacher libdebbugs-perl opensmtpd sn
 Installations reported by Popcon: 16494
 Bug Report URL: https://bugs.debian.org/886643

   ejabberd (#767874), requested 1774 days ago
 Description: distributed, fault-tolerant Jabber/XMPP server written
   in Erlang
 Reverse Depends: ejabberd-contrib ejabberd-mod-cron
   ejabberd-mod-default-contacts ejabberd-mod-default-rooms
   ejabberd-mod-deny-omemo ejabberd-mod-filter ejabberd-mod-grafite
   ejabberd-mod-log-chat ejabberd-mod-logsession ejabberd-mod-logxml
   (10 more omitted)
 Installations reported by Popcon: 447
 Bug Report URL: https://bugs.debian.org/767874

   fbcat (#565156), requested 3529 days ago
 Description: framebuffer grabber
 Install

Re: Mozilla Firefox DoH to CloudFlare by default (for US users)?

2019-09-12 Thread Shengjing Zhu
// send from my mobile device

Jeremy Stanley  于 2019年9月13日周五 06:51写道:

> On 2019-09-12 22:27:39 +0200 (+0200), Simon Richter wrote:
> [...]
> > The idea for resilience is "too big to block".
> >
> > When Domain Fronting still worked with Google, people used this to
> > circumvent censorship because blocking it would have required
> > blocking Google, so cooperation from Google was necessary to
> > implement effective censorship.
> [...]
> > I'd be in favour of installing it by default (keep in mind: we are
> > also "too big to block", so we're in the position to give software
> > that is useful for activists an install base that makes it hard to
> > identify activists by having the software installed).
>
> Note that by way of counterargument, Google and its services have
> been blocked in mainland China by the Great Firewall for nearly a
> decade now, so I question whether there is really such a thing as
> "too big to block."
> --
> Jeremy Stanley
>

I share the same concern. And please note that cloudflare doesn't have pop
in China mainland, and in some ISP from China, the latency can be more than
200ms(http://mping.chinaz.com/?host=1.0.0.1).

>


Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread Guillem Jover
On Thu, 2019-09-12 at 15:37:49 +0100, Ian Jackson wrote:
> Ansgar writes ("Re: Git Packaging Round 2: When to Salsa"):
> > (Using dgit to upload packages is sadly incompatible with best
> > practices around packaging.)
> 
> Using dgit to upload packages is best practice.

I'm sorry, but "best practice" according to who? The dgit maintainers?

Thanks,
Guillem



Re: Git Packaging Round 2: When to Salsa

2019-09-12 Thread Pirate Praveen



On 2019, സെപ്റ്റംബർ 13 1:06:13 AM IST, Marc Haber 
 wrote:
>alioth.debian.org, anyone? That one went away pretty fast.

I wonder why people keep repeating this. This was migrated to salsa and also 
archived, so nothing was lost. This was a planned move to a better solution 
(gforge was unmaintained), there was enough time to move things around.
-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.



Bug#940153: ITP: mockery -- mock code autogenerator for Golang

2019-09-12 Thread Dmitry Smirnov
Package: wnpp
Severity: wishlist
Owner: Dmitry Smirnov 
X-Debbugs-CC: debian-devel@lists.debian.org, 
pkg-go-maintain...@lists.alioth.debian.org

   Package name: mockery
Version: 0.0~git20181123
Upstream Author: Opinionated Architecture
License: BSD-3-clause
URL: https://github.com/vektra/mockery
Vcs-Browser: https://salsa.debian.org/go-team/packages/mockery
Description: golang-github-stretchr-testify-dev
Description: mock code autogenerator for Golang
 Mockery provides the ability to easily generate mocks for golang
 interfaces. It removes the boilerplate coding required to use mocks.


signature.asc
Description: This is a digitally signed message part.