Re: Bug#353277: ndiswrapper in main (was: Bug#353277: should be in contrib)

2006-02-18 Thread Arthur de Jong

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


On Sat, 18 Feb 2006, Josselin Mouette wrote:
Come on, please stop arguing with random, unsuited comparisons, and use 
common sense : what's the purpose of ndiswrapper without non-free 
drivers to use it on? We've always put things of the like in contrib, 
and if we stop doing it, we can remove contrib entirely.


The purpose of ndiswrapper is to run non-free Windows drivers on Linux. 
The same is more or less true for wine and dosemu (otherwise we would 
probably make a native version of said apps).


Would the situation change (contrib-wise) if ndiswrapper were integrated 
into the kernel? Would we want to split the ndiswrapper part to contrib 
then?


- -- 
- -- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFD95rRVYan35+NCKcRAk9/AKCz0PEtSLrjUfa2JHUSxFp1GC3yGwCg5gfT
S18zHSeAQGSETSaZfkyPmps=
=f4Pu
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Ongoing Firefox (and Thunderbird) Trademark problems

2005-06-14 Thread Arthur de Jong
On Tue, 2005-06-14 at 19:30 +0100, Matthew Garrett wrote:
> Manoj Srivastava <[EMAIL PROTECTED]> wrote:
> > While this argument was indeed tempting, I think we also need
> > to look at how free the resulting package is: Can a derivbative take
> > any package in main, modify it, and further redistribute it? If yes,
> > then the package can remain in main, and is free; if not, then the
> > package is not free.
> 
> Our users have permission to modify it and further redistribute it *as
> long as they change the name*. That's a limitation we're willing to
> accept for ourselves - why should it not be free enough for our users?

Let's say we call it mozilla-firefox (assuming we are allowed to in the
first place) and downstream (making some modifications) is not allowed
to call it mozilla-firefox. If we call it debian-firefox then downstream
is still not allowed (under the same conditions) to call it
mozilla-firefox. The difference is not that huge to me. (but naming the
package just firefox seems to me like a good idea in the first place)

-- 
-- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: GFDL question

2006-03-25 Thread Arthur de Jong
On Wed, 2006-03-15 at 14:06 -0800, Thomas Bushnell BSG wrote:
> Norbert Preining <[EMAIL PROTECTED]> writes:
> 
> > Ok, there are no invariant sections, but there is (a short) front and
> > back cover text.
> >
> > How do we proceed with these documents?
> 
> The resolution which passed excludes documentation with front cover
> texts.  Read it.

I re-read it, and it states:
| This means that works that don't include any Invariant Sections, Cover
| Texts, Acknowledgements, and Dedications (or that do, but permission
| to remove them is explicitly granted), are suitable for the main
| component of our distribution.

-- 
-- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: NMUs for Python Policy -- please hold them a little

2006-06-23 Thread Arthur de Jong
On Fri, 2006-06-23 at 18:43 +0200, Raphael Hertzog wrote:
> Yes:
> http://www.ouaza.com/wordpress/2006/06/23/the-python-transition-can-continue/
> 
> I wonder if I should make a second announce on -devel-announce just to
> make it clear to everybody.

At the lease I would appreciate (as a python application package
maintainer) a post to debian-python with some confirmations from the
involved parties.

There has been a lot of confusion and conflict as to which solution
package maintainers should follow. A sign of agreement on that list
would be welcome. I would like to get a warm happy feeling that I won't
have to change packaging again in a few days/weeks.

It would also be helpful if this document
  http://people.debian.org/~aba/python-policy/
(was http://people.debian.org/~piman/python-policy/ before, but I just
noticed http://www.debian.org/doc/packaging-manuals/python-policy/ is
also 0.4.1.0) was updated with respect to the new rules (e.g. handling
of XS-Python_Version).

All in all I'm glad the conflicts seem to be over and appreciate the
hard work that has been put into this.

-- 
-- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: PAM messages on chrooted console

2003-05-31 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


> After restarting init my tty6 works, however I keep getting PAM messages
> on my console such as:
> PAM_unix[19031]: (login) session opened for user minghua by minghua(uid=0)
> I noticed such messages go to /var/log/auth.log in my stardard
> installation, however this log in chroot (/var/chroot/var/log/auth.log)
> is existent but empty.  I also looked at my /var/chroot/etc/syslog.conf,
> but it is identical to /etc/syslog.conf.

The problem is that if you want to log to files inside the chroot you
should probably run a seporate syslog from inside the chroot and configure
it to only listen on /dev/log (inside the chroot). Also, programs that
start logging outside the chroot will continue to log to that syslog since
the connection is kept open. Using netstat -a -p and lsof may give you a
little more information on who is accessing what.

- -- arthur - [EMAIL PROTECTED] - http://tiefighter.et.tudelft.nl/~arthur --


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)

iD8DBQE+2H63VYan35+NCKcRAiwuAKCDGf6Jh2XAF/VgDg9n8qBoLtRz2wCg3hD4
7dt8kHewKtnCMhSbVFpjO04=
=nv6J
-END PGP SIGNATURE-




Re: Debian RC System/Init Scripts

2003-09-27 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


> I'm curious if there has ever been any attempt to Policyize scripts
> located in init.d. Specifically requiring inclusion of such lines as
> DESC="description" or NAME="name". I ask because I am doing a little bit
> of work on the rc startup script.

I know there is some work in lsb. See this for details:
http://www.linuxbase.org/spec/refspecs/LSB_1.3.0/gLSB/gLSB/initscrcomconv.html
But debian policy does not require these last time I checked.

- -- arthur - [EMAIL PROTECTED] - http://tiefighter.et.tudelft.nl/~arthur --
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)

iD8DBQE/dhNNVYan35+NCKcRApraAKDpFqWY0FBihVX+LRlr5aEqNFXWAgCferxg
asu6komiQXQ+uaPtpK6cHoE=
=zn4p
-END PGP SIGNATURE-




Bug#326429: ITP: webcheck -- website link and structure checker

2005-09-06 Thread Arthur de Jong
(resent to debian-devel because evolution did not add X-Debbugs-CC header)

Subject: ITP: webcheck -- website link and structure checker
Package: wnpp
Owner: Arthur de Jong <[EMAIL PROTECTED]>
Severity: wishlist

* Package name: webcheck
  Version : 1.9.3
  Upstream Author : Arthur de Jong <[EMAIL PROTECTED]>
* URL : http://ch.tudelft.nl/~arthur/webcheck/
* License : GPL
  Description : website link and structure checker
 webcheck is a website checking tool for webmasters. It crawls a given
 website and generates a number of reports in the form of html pages.
 It is easy to use and generates simple, clear and readable reports.
 .
 Features of webcheck include:
  * support for http, https, ftp and file schemes
  * view the structure of a site
  * track down broken links
  * find potentially outdated and new pages
  * list links pointing to external sites
  * can run without user intervention

Webcheck (release 1.0) was in Debian before, but was removed on
2005-02-02 (orphaned on 2004-05-31, request for removal on 2004-11-02,
see bug #251931) because it was no longer maintained and there was no
upstream development. Since I have taken over development and will
maintain this package this is no longer the case.

Bugs that were open at the time webcheck was removed:
#71419 request for internationalization of output
  this is on the TODO list as a wishlist item
#192868 handle relative links to file:/ urls nicely
  using file:/// urls is possible and supported, automatically
  translating relative or absolute paths into file:/// is also
  supported now
#201154 please handle url()'s in stylesheets
  this is also implemented in the current version of webcheck
#253424 recursion problem in sitemap module (key not found)
  this should be solved as most of the code is rewritten
#271085 produce a validation report (using wdg-html-validator)
  there is an item on the TODO list to implement more html validation
  checking, however I do not think that submitting a large number of
  html pages to a web-based checker is a good idea
#286017 problem with recent python version
  webcheck is developed using python 2.3 but is tested regularly with
  python 2.4 so this should be solved
(this leaves two wishlist bugs in the TODO list)

There are a couple of questions left though:
* I'm not sure if I need some statement on the copyrights on the
  generated html files. The css file that is just copied has a BSD
  license.
* The old package provides, conflicts with and replaces linbot (the name
  of webcheck a long time ago). Should I keep that or just drop it?
  (linbot was in slink, potato and woody but neither linbot or webcheck
  were in sarge)
* The old package has a configuration file in /etc/webcheck and the new
  package no longer provides that. What would be the best way to get rid
  of it? (policy 10.7.3 has a note about removing conffiles but I'm not
  sure it's relevant) Should I delete it on upgrade?

Btw, I'm packaging this as a native Debian package because I just want
to release one version and have one source tarball.

-- 
-- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Bug#326429: ITP: webcheck -- website link and structure checker

2005-09-09 Thread Arthur de Jong
On Wed, 2005-09-07 at 00:47 -0500, Peter Samuelson wrote:
> [Arthur de Jong]
> > I'm not sure if I need some statement on the copyrights on the
> > generated html files. The css file that is just copied has a BSD
> > license.
> 
> Generally, output from a program is not considered to be copyrighted.
> The templates from which it is built could be copyrighted, and if
> significant bits of a template are copied in verbatim, you may wish to
> copy in a license statement from the template too.

The templates are embedded in the python code (e.g. write('')) (except for the mentioned css file). The python code is GPL.
Most of the content (links, titles, other gathered information) is from
the crawled website.

> > The old package provides, conflicts with and replaces linbot (the
> > name of webcheck a long time ago). Should I keep that or just drop
> > it? (linbot was in slink, potato and woody but neither linbot or
> > webcheck were in sarge)
> 
> Completely your call.  You do not need to support upgrades from woody
> or prior, but you can if you wish.  Three lines in debian/control
> which you'll never need to change is a pretty cheap price, but it *is*
> untidy if you want a minimalist control file.

I think I'll keep those lines for a while then (they're not in the way
for now).

> > The old package has a configuration file in /etc/webcheck and the
> > new package no longer provides that. What would be the best way to
> > get rid of it? (policy 10.7.3 has a note about removing conffiles
> > but I'm not sure it's relevant) Should I delete it on upgrade?
> 
> Is the package configured in some other way, or have you dropped
> support for any site-wide configuration?  If you still have a
> configuration mechanism, it's best if you can migrate /etc/webcheck to
> the new scheme automatically, then delete it, at upgrade time.  If
> not, you can just delete it.

The new package does not use a configuration file at all any more (the
config.php file is still there but it is not really meant to be edited
any more and is not in /etc). I don't think I want to keep a site-wide
configfile. Maybe I'll support specifying a configfile from the
command-line one day.

I'm going for completely removing the /etc/webcheck directory on
upgrades. Anyone think there should be a debconf question about this at
install time (e.g. test if /etc/webcheck exists and ask the user to
remove it)?

> > Btw, I'm packaging this as a native Debian package because I just
> > want to release one version and have one source tarball.
> 
> Not recommended - you'll have to release a whole new "upstream
> version" any time you fix a trivial Debian bug, or even just to
> recompile against a newer sid library.  Providing backports or forks
> (for etch after etch is frozen) will require new upstream version
> numbers, which will confuse your non-Debian audience ("wait, what's
> the current release?  Upstream 3.1.15 and 3.1.15~etch1 were released
> at the same time, but 3.0.4.etch2 was just added to the debian ftp
> site")

I think this would avoid confusion since every Debian version is also a
released version. If a release changes just Debian packaging (unlikely
at the moment since it is in development) that will be documented in the
NEWS file. Since this is a python package with architecture: all the
risk of recompiles are minimal. I'm not too worried about the version
numbers of backports or forks because priority is extra (not likely to
be affected by major freeze problems) but adding a .etch# or .sarge#
suffix shouldn't cause too much confusion.

> And there's the bandwidth issue - you and the build daemons have to
> transfer the whole source tarball every time you make a trivial change
> to debian/*.

The current tarball is pretty small (45k plus maybe 5k for a debian
directory) and since the architecture is all (no buildds) I don't think
we'll be having a lot of bandwidth issues.

Thanks for you comments!

-- 
-- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


nss-ldapd init script sequence number

2008-04-28 Thread Arthur de Jong

Hi, I maintain nss-ldapd, a replacement for nss_ldap which uses a local
daemon (nslcd) to proxy name lookup requests (passwd/group/hosts/etc)
to an LDAP server. I have received a bug report (#475626) that I would
welcome some input on.

The problem is that a lot of daemons are started at sequence 20
(/etc/rc2.d/S20...) an may want to do name lookups (e.g. exim is
mentioned in the bugreport). This means that nslcd should probably be
started before sequence 20. However, slapd is started at sequence 19
and it would be best to start nslcd after slapd. Currently nslcd is
started at sequence 20.

The problem with starting nslcd before slapd is that slapd does name
lookups during startup which slow down slapd startup by about 5 seconds
(because slapd is not ready to handle lookups yet) and leaves nslcd in a
state where it believes the LDAP server is unreachable and will only
retry after some timeout has expired. This could in turn cause failed
lookups for processes that do name lookups just after slapd has been
started.

So, what would the best solution for this problem?

- request slapd to be started at sequence 18 and start nslcd at
  sequence 19 when this has changed (haven't extensively checked if that
  would cause problems for slapd)
- add some magic to nslcd to do more retries during startup and handle
  this case especially
- something else??

This also brings up the problem with what to do with existing
installations. If I understand correctly changing the parameter to
update-rc.d will not change any existing symlinks so any changes that
are made now will only affect existing installations.

Feedback is very much appreciated (also other feedback related to
nss-ldapd). Thanks.

-- 
-- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Bug#475626: nss-ldapd init script sequence number

2008-04-30 Thread Arthur de Jong
On Mon, 2008-04-28 at 16:38 +0200, Petter Reinholdtsen wrote:
> This is exactly the kind of problems the dependency based boot
> sequencing is supposed to solve.
[...]

I have added:
  Should-Start: slapd
to fix the problem that nslcd should be started after slapd.

However to solve the problem that nslcd should be started before mail
servers I would like to add:
  Provides: $named
at least exim and postfix have a Required-Start for this) but the
description on http://wiki.debian.org/LSBInitScripts suggests that such
a provides should be specified in a different place. Where should that
be?

> Anyway, while we wait for Debian to switch to dependency based boot
> sequencing, I believe the best option for you is to get slapd moved at
> the start and end.

I have filed bug #478674 for this. The end sequence is already very high
(80) so I don't think there is a reason to make this even higher. The
dependencies of slapd are either started at runlevel S ($remote_fs and
$network) or at sequence 10 ($syslog).

> > This also brings up the problem with what to do with existing
> > installations. If I understand correctly changing the parameter to
> > update-rc.d will not change any existing symlinks so any changes
> > that are made now will only affect existing installations.
> 
> This is correct.  If you want to change the sequence number, the only
> option provided by the update-rc.d interface is to remove all
> start/stop symlinks and insert it again with new sequence numbers.

This would however change local customisations that administrators may
have made to their init script order. Something like this could do it
though in postinst:

[ -l /etc/rc2.d/S20nslcd ] &&
mv /etc/rc2.d/S20nslcd /etc/rc2.d/S19nslcd
[ -l /etc/rc3.d/S20nslcd ] &&
mv /etc/rc3.d/S20nslcd /etc/rc3.d/S19nslcd
[ -l /etc/rc4.d/S20nslcd ] &&
mv /etc/rc4.d/S20nslcd /etc/rc4.d/S19nslcd
[ -l /etc/rc5.d/S20nslcd ] &&
mv /etc/rc5.d/S20nslcd /etc/rc5.d/S19nslcd
[ -l /etc/rc0.d/K20nslcd ] &&
mv /etc/rc0.d/K20nslcd /etc/rc0.d/K21nslcd
[ -l /etc/rc1.d/K20nslcd ] &&
mv /etc/rc1.d/K20nslcd /etc/rc1.d/K21nslcd
[ -l /etc/rc6.d/K20nslcd ] &&
mv /etc/rc6.d/K20nslcd /etc/rc6.d/K21nslcd

However this would work around update-rc.d and be a policy violation:
http://www.debian.org/doc/debian-policy/ch-opersys.html#s9.3.3

I suspect not much packages do this when changing sequence number. e.g.
I have an etch system which has been upgraded a lot of times that starts
nscd at sequence 19 but my sid system that has been installed about a
year ago starts it at 20.

-- 
-- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: mass bug filing for undefined sn?printf use

2008-12-30 Thread Arthur de Jong
On Sun, 2008-12-28 at 12:02 -0600, Steve Langasek wrote:
> I don't know whether these are also a problem in practice - but if so,
> using sprintf(buf + strlen(buf) [...]) is definitely wrong.

I don't know if any of my code uses such a construct but why is that
wrong as long as [...] doesn't contain buf? (assuming proper bound
checks are done and other parameters are sane)

Thanks.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: mass bug filing for undefined sn?printf use

2008-12-30 Thread Arthur de Jong
On Tue, 2008-12-30 at 10:41 -0600, Steve Langasek wrote:
> On Tue, Dec 30, 2008 at 10:06:41AM +0100, Arthur de Jong wrote:
> > On Sun, 2008-12-28 at 12:02 -0600, Steve Langasek wrote:
> > > I don't know whether these are also a problem in practice - but if so,
> > > using sprintf(buf + strlen(buf) [...]) is definitely wrong.
> 
> > I don't know if any of my code uses such a construct but why is that
> > wrong as long as [...] doesn't contain buf?
> 
> That's not the context of this discussion; we were talking about buggy code
> that *did* use buf as one of the args to the format string.

Ok, I misunderstood. Thanks.

In that case there can be a great number of situations in which the
buffer may be filled with it's own content (eg. pass the same array as
two arguments to a function and use the above construct in that
function, assignments to temporary variables, etc, etc). Very hard to
check for.

Perhaps this would be a good test for tools such as split, rats or
flawfinder (none of them currently warn about this problem and neither
do any gcc flags that I commonly use). Those kind of tools already to
quite some analysis of source code so perhaps it isn't too difficult to
implement it there.

I've just performed a test with the following code on my system (sid,
hardening-wrapper not installed, compiled with gcc without any extra
flags):

  char buf[20];
  strcpy(buf,"FOO");
  snprintf(buf,sizeof(buf),"%s%s",buf,"BAR");
  printf("%s\n",buf);
  strcpy(buf,"BAR");
  snprintf(buf,sizeof(buf),"%s%s","FOO",buf);
  printf("%s\n",buf);

which returned

BAR
FOOFOO

so in any case the behaviour is not as could be naively expected
(FOOBAR).

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Why is su preserving the environment?

2009-01-24 Thread Arthur de Jong
On Sat, 2009-01-24 at 11:07 +0100, Josselin Mouette wrote:
> The question is whether we can consider safe to pass authentication
> tokens as environment variables. Either we do, and we fix applications
> that pass environment where they shouldn’t. Either we don’t, and we have
> to find another way to pass them.

You can easily get the environment of a process (of when the process
started or the actual value depending on the application) by giving ps
the e option.

It seems this information is from /proc//environ but I don't think
all *nixes properly protect the environment. So in general I would say
not to put authentication tokens into the environment.

However, most applications that do something like that put a reference
to the authentication token in the environment (e.g.
XAUTHORITY=/tmp/.gdm0QI8NZ) which is ok as long as the access to the
real token (socket mostly) is protected.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: dh_installinit

2007-11-11 Thread Arthur de Jong

On Sun, 2007-11-11 at 11:04 +0100, Vincent Danjean wrote:
> When these mechanisms will be ready, a deamon will be unable to close
> all its file descriptors (unless it closes the whole range of fd
> (0--2^16 ?) or unless an application can get a list of its open fds).

This seems to be quite common code (from one of my packages (cvsd),
don't know what the original source for this code was):

  m=sysconf(_SC_OPEN_MAX);
  for (i=0;ihttp://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: dh_installinit

2007-11-12 Thread Arthur de Jong

On Mon, 2007-11-12 at 12:34 -0600, Steve Greenland wrote:
> On 11-Nov-07, 14:25 (CST), Arthur de Jong <[EMAIL PROTECTED]> wrote: 
> > This seems to be quite common code (from one of my packages (cvsd),
> > don't know what the original source for this code was):
> > 
> >   m=sysconf(_SC_OPEN_MAX);
> >   for (i=0;i > close(i);
> > 
> > There are hurd packages for this package so that should also work.
> 
> Wrong. That code is buggy. The limit of OPEN_MAX can be indeterminate,
> and thus sysconf(_SC_OPEN_MAX) can return -1.

Thanks, fixed that in my code (if the call returns negative, we just
close the first 32 file descriptors and hope that's enough).

Anyone have a better way to detect the highest open file descriptor
(preferably something that also works inside a chroot jail that does not
have /proc mounted)? NetBSD seems to have fcntl(F_MAXFD) that should do
the trick, but it's unavailable on Linux.

-- 
-- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Debian Package

2010-03-14 Thread Arthur de Jong
On Tue, 2010-03-09 at 18:25 +, brian m. carlson wrote:
> On Tue, Mar 09, 2010 at 12:52:31PM -0500, Jake wrote:
> > I was creating a Debian package and after it install I would like it
> > to prompt the user to reboot the computer, is there anyway to do
> > this?
> 
> Except in very limited circumstances, there should be no need to reboot
> the computer after installing a package.  The only exception I can think
> of is something related to the kernel; in general, root should be aware
> that a reboot is required to make that functionality work, but may want
> to defer it indefinitely (for example, on a server).
> 
> So yes, the right way to do this is debconf, but what you want to do is
> probably the wrong thing.

You could also have a look at update-notifier. It has a mechanism to
signal users that they should reboot. Rebooting from maintainer scripts
is probably a bad idea (may leave dpkg in an inconsistent state).

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: [RFC] disabled root account / distinct group for users with administrative privileges

2010-10-23 Thread Arthur de Jong
On Thu, 2010-10-21 at 16:48 +0100, Philip Hands wrote:
> If we decide to reject 'admin', I think we should use sudo.  I find the
> argument that admin is confusing given the presence of adm fairly
> convincing -- It's all too easy to say something like "could you add
> fred to the adm group" over the phone and pronounce 'adm' as 'admin'.

At work we use "admin" to hold all administrative staff (think
paperwork) so I would vote against that.

> Sadly, we are not the first to make this decision though, and having
> admin on Ubuntu and sudo on Debian would be a pain for people that have
> mixed sites, or even for admins that just have access to some of each.

The admin group is already used in update-notifier though (#502392) and
perhaps also other software coming from Ubuntu.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Init dependency between nfs-kernel-server and name server

2010-10-24 Thread Arthur de Jong
On Thu, 2010-10-21 at 20:27 +0200, Tollef Fog Heen wrote:
> | Besides, I believe $named is a existing and fitting virtual facility
> | for this use.
> 
> Indeed, it seems quite appropriate.

It would at least simplify things for my nslcd package which provides
name lookups (user, group, hosts, etc) via LDAP. It currently has a long
list of things in the X-Start-Before header which is ugly.

The thing is, that nslcd may also have a dependency on hostname lookups
(e.g. if the LDAP server is specified as a hostname instead of an IP
address) which makes things even more complex.

For some background you may want to check out
  #478807, #544093 and #585968

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: enable/disable flags in /etc/default

2011-02-28 Thread Arthur de Jong
On Sat, 2011-02-26 at 21:44 +0100, Tollef Fog Heen wrote:
> Personally, I'd rather we didn't have them, as this is supposed to be
> controlled by the rcN.d links and if that interface is too hard for
> people we should fix that rather than invent multiple ways of disabling
> daemons, but the current mess is, well, a mess.

I would also love to have a way to easily configure which daemons should
be started at boot time. I don't know whether switching to insserv made
things simpler in that regard though.

In general I don't like having to mess with /etc/default/foo because it
also makes it more difficult to start/stop by hand.

Once nice compromise is what the mldonkey-server package does:
- /etc/default/mldonkey-server can be used to disable starting at boot,
  but:
- /etc/init.d/mldonkey-server force-start still allows manual starting
  of the service
- the service is correctly stopped on shutdown

I would personally really like to see this in most daemons that not all
users may need all the time. Extra bonus points for having some
convention for option names.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Bug#618473: general: Problems to handle NIS group names

2011-03-17 Thread Arthur de Jong
reassign nfs-common
thanks

On Tue, 2011-03-15 at 15:10 +0100, Christian Andretzky wrote:
> I've really no idea, which package(s) are responsible for this problem.

Reassigning to nfs-common because that seems to be the most likely
candidate (assuming autofs is used to mount nfs filesystems).

> In my log files I can find messages like:
> 
> Mar 15 14:56:09 oedibus automount[1983]: set_tsd_user_vars: failed to get 
> group info from getgrgid_r
> 
> As the result the output from ls command looks like
> 
> ...
> drwx--  21 saadi   12000  4096 19. Nov 12:22 saadi
> ...
> 
> The output of 'ypcat group' shows the correct group names.
> 
> If I dont use autofs and mount the filesystem manual using 'mount',
> the same problem happens.

It would really be hulpful if you could post more
information. /etc/nsswitch.conf, /etc/auto.master, nfs mount settings
(nfs version), etc come to mind.

I know nfs4 uses and idmap that has caused issues in the past if the
naming service is not available during boot (see e.g. #500778).

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: When bind9 reinstalls, no db.root

2002-08-22 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Wed, 21 Aug 2002, Marc Singer wrote:

> On Wed, Aug 21, 2002 at 09:42:53PM +0200, Josip Rodin wrote:
> > > > Sounds like you want dpkg --force-confmiss.
> > >
> > > I wouldn't expect that since the documentation states:
> > >
> > >  confmiss: Always install  a  missing  configuration
> > >   file.  This  is  dangerous, since it means not pre-
> > >   serving a change (removing) made to the file.
> > >
> > > How could it be dangerous to install a *missing* configuration file?
> >
> > If the default configuration data in the file do something you don't want.
>
> For example...

Logcheck has a number of files under /etc/logcheck/ignore.d... that are
marked as configuration files. Removing a configuration files means that
more information is present in the log summary. (automaticly) Replacing
these configuration files would result in unwanted behaviour.

- -- arthur - [EMAIL PROTECTED] - http://tiefighter.et.tudelft.nl/~arthur --
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)

iD8DBQE9ZKQgVYan35+NCKcRAoZSAJ4u1IeVFKCujBEuSr3yj9L9CZpCxQCfYgZO
e+MVu8TbK1ViLL5zA6i9ui8=
=W8zs
-END PGP SIGNATURE-




Re: When bind9 reinstalls, no db.root

2002-08-22 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Thu, 22 Aug 2002, Arthur de Jong wrote:

> > For example...
>
> Logcheck has a number of files under /etc/logcheck/ignore.d... that are
> marked as configuration files. Removing a configuration files means that
> more information is present in the log summary. (automaticly) Replacing
> these configuration files would result in unwanted behaviour.

Oh I just thought of a better one: a lot of packages have configfiles in
/etc/cron.{daily,monthly,weekly}. Removind a configfile is clearly not the
same as having a default in this case.

Bluntly overwriting the db.root file is also not a good idea since some
people use alternative root nameservers. If you screwed up your package
configuration you should do:
  apt-get --purge remove bind9
  apt-get install bind9
(maybe apt-get --purge --reinstall install bind9 would be nice)
You either replace you whole configuration or just your binaries. I don't
think tat changing dpkg to do vodoo for you is a good idea.

- -- arthur - [EMAIL PROTECTED] - http://tiefighter.et.tudelft.nl/~arthur --
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)

iD8DBQE9ZKg+VYan35+NCKcRAoRDAKDpCk9sGyA1IhYEOx4uYSNfaivl3gCdHu+d
8wFw7M3PKUaMpmIiSTbEz3s=
=8G62
-END PGP SIGNATURE-




Re: debconf review of cvsd (was Re: stop abusing debconf already)

2003-04-20 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


> Arthur de Jong wrote:
> > Ok, could you review my cvsd package for me for correct debconf usage
> > and tell me what you do and don't like?
>
> Thanks for taking advantage of that offer. (So far you're the only one.)
> I am ccing this to -devel just because.
>
> All of the debconf questions are pretty well worded and clear, but
> there's always room for improvement:

Thanks for the review. I've changed most of the wording according to your
suggestions (English isn't my native language).

>s/zero (0)/0/  # Apparently writing it out has the possibility to make
>   # someone enter the number the wrong way so why not just
>   # not write it out?

I spelled out zero because some (most) fonts don't represent 0 differently
from O. Same goes for 1 and l.

>   - It's sort of odd that you use spaces to separate multiple items in one
> question, and then colons to separate them in the next.

It would be nice if debconf would have some unified way of entering lists.
I'm also not very happy with the way it is currently done, but I've
modeled it after the cvs questions and a colon is the "standard" seporator
for directories, while using : in addresses may provide problems with IPv6
addresses (improving this is on my TODO list).

>   - I was fairly confused by cvsd/limit_memorylocked, because I thought
> that only programs run as root could lock memory, and why would cvs
> want to? Was this just added for (over)completeness?

Probably. I provided questions for all the limits I could find. The code
also covers limits for things that are not settable on linux (there is
even a debconf question about it that is never asked).

>   - You have no translations for the debconf templates in the package. The
> DDTP project has a complete German translation at
> http://ddtp.debian.org/debconf/source/cvsd. Of course you may want to
> make the above changes first, and wait for an updated translation..

I have received a Brazillian translation of the debconf questions that I'm
merging into cvsd (bug #187795). I saw the German translation at
  http://ddtp.debian.org/cgi-bin/ddtp.cgi?part=debconf&package=cvsd
before but I never saw the page you linked (very useful page but I can't
find it linked from the site). And since the site says "(Now) we don't
need any action from the debian package maintainer." I didn't take any
action regarding the translation.

> If I reconfigure cvsd, pick all the limits, and take the default value
> for everything else, it exits with code 20:
>
> debconf (developer): <-- GET cvsd/limits
> debconf (developer): --> 0 coredumpsize, cputime, datasize, filesize,
> memorylocked, openfiles, maxproc, memoryuse, stacksize, virtmem
> debconf (developer): <-- GET cvsd/limit_coredumpsize cputime datasize 
> filesize memorylocked openfiles maxproc memoryuse stacksize virtmem
> debconf (developer): --> 20 Incorrect number of arguments
> zsh: exit 20DEBCONF_DEBUG=. dpkg-reconfigure cvsd
>
> Looks like a bug.. After doing this I also did not see all the limits
> stuff in cvsd.conf, it had only these config items:
>
> Uid cvsd
> Gid cvsd
> PidFile /var/run/cvsd.pid
> RootJail /var/lib/cvsd
> MaxConnections 10
> Nice 1
> Listen * 2401

This looks like it may be due to a bug (or incompatibility) in zsh. Do you
have /bin/sh set to zsh? I have some strange results if I use zsh to
process the postinst. I'll do some more testing. Somehow the result of the
'GET cvsd/limits' is passed to the next command.

> Looking at your priorities, I'm not sure why the maximum connection
> limit is at priority medium.

I already changed it to low for the next release (couldn't remember
either why it was set to medium).

> > I've set it up to ask first whether to use debconf to manage
> > configuration of /etc/cvsd/cvsd.conf (not a conffile). If the user
> > chooses to not use debconf, he's on his own (an example cvsd.conf is
> > provided).
>
> Of course this is where in my opinion you lose. First of all, as Colin
> pointed out recently, any question that asks "use debconf" and defaults
> to true results in the package violating debian policy on any system
> where the debconf priority is higher than the question, or
> noninteractive mode is used. If the question is not shown to the user at
> all, and a default config is put into place, and the user edits that
> config and loses changes on upgrade, then you've violated policy.
>
> Secondly of course, I hate all "use debconf" questions. It's the wrong
> way to use debconf; you should be intelligently parsing answers out o

Re: /run/, resolvconf and read-only root

2003-04-30 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


> I don't know what it will take to convince you, but I would like you to
> answer these questions:

I also have a problem with adding another toplevel directory and I suspect
there are some more. I haven't read the complete thread (I also have other
things to do) but I've picked up bits and pieces.

> Do you think having programs write to /etc is a bad thing?

I think creating /run is worse.

I think it should be possible for any program that writes to /etc (it it
cannot use /var) either to be configurable to store it's data somewhere
else or use a symlink to store the data somwhere else (e.g. /proc/flashrom
or /nfsmounteddiskbutnotroot or other unusual place). I think that should
be the first step in tris transition.

> Where would you put /etc/mtab, to keep /etc sacrosanct?

I think that state about the mounted filesystems should be kept by the
kernel (that meens /proc). If there is some state that is not kept by the
kernel but by userspace it should probably stored in /var somewhere (if
/var is not available on boot writing the file could be delayed until it
is mounted). Having mtab in /etc may be useful for historical reasons to a
couple of people though and you might consider a symlink to some file in
/var.

I haven't seen a very good description of /run yet and I'm not completely
sure that something like "a place to write files to when you can't write
to /var yet" is useful. This is not a useful description because /var may
be mounted at different times on different systems (e.g. nfs mounted /var
vs localy mounted /var).

I think finding a soltion for the ro root, nfs /var combination is a good
thing but I doubt it should be this invasive.

- -- arthur - [EMAIL PROTECTED] - http://tiefighter.et.tudelft.nl/~arthur --
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)

iD8DBQE+r8wJVYan35+NCKcRAn+UAJ93q4FPQV8CQfbrplEsFL/gjkckBQCeMBYj
pXPlDwCZhivmJJuR8EjvDjo=
=m5Gm
-END PGP SIGNATURE-




Re: Release Candidate 2 of Debian Installer

2009-02-01 Thread Arthur de Jong
On Sun, 2009-02-01 at 03:46 +, The Fungi wrote:
> On Sat, Jan 31, 2009 at 07:56:01PM -0600, Andrew Deason wrote:
> > Label names could be generated to minimize collisions.  Something like
> > ${hostname}-/ instead of /, or maybe something even more specific.
> 
> The namespace here is, unfortunately, pretty limited. The manpages
> for mkreiserfs and mke2fs mention a 16-character limit for
> filesystem labels [...]

Also using slashes in labels causes problems with the symlinks showing
up in /dev/disk/by-label.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: handling group membership in and outside d-i

2009-02-27 Thread Arthur de Jong
On Thu, 2009-02-26 at 13:01 +, Ben Hutchings wrote:
> On Thu, 2009-02-26 at 08:31 +0100, Peter Palfrader wrote:
> > This is of course broken.  It breaks granting console users access
> > to the netdev or powerdev groups through pam_groups, which is really
> > really annoying when you get your users from say ldap.
>
> But that's broken to start with, since you can't revoke group
> membership when the user logs out.

The group membership is only assigned to the process, not in the group
database. I generally have something like:

gdm; :*; *; Al-2400; audio,floppy,video,cdrom,scanner,plugdev,voice

in /etc/security/group.conf to ensure that any user that is logged in on
the console can do most things you can expect console users to do. So
for a gdm session:

% groups
users voice cdrom floppy audio src video plugdev scanner

But the NSS databases contain the following:

% groups arthur
arthur : users src

I've found that with lenny for some things (dbus?) you need consolekit
(I install policykit-gnome which has all the dependencies I need) to
accomplish (part of?) what you did with secondary groups before.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: xcdroast does no longer work with wodim: Who to blame?

2009-02-28 Thread Arthur de Jong
On Sat, 2009-02-28 at 12:43 +1100, Russell Coker wrote:
> http://en.wikipedia.org/wiki/Joerg_Schilling
> 
> I notice that Joerg's Wikipedia page is rather bare.
> 
> Instead of spending time covering all the old arguments on this list,
> perhaps some people could add links (such as the ones you cited) to
> Joerg's Wikipedia page.  A Wikipedia page about Joerg that is remotely
> complete and also neutral requires a reference to these issues (the
> current page only has two paragraphs).

Have a look at the cdrtools page:
http://en.wikipedia.org/wiki/Cdrtools

The cdrkit page also has some info:
http://en.wikipedia.org/wiki/Cdrkit

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --



signature.asc
Description: This is a digitally signed message part


Re: Bug#419209: lvm2: Hangs during snapshot creation

2009-03-06 Thread Arthur de Jong
On Thu, 2009-03-05 at 09:58 +0100, Klaus Ethgen wrote:
> Well, I did also some tests and wasn't able to trigger that bug on my
> laptop too. But I also have the lvm direct on the hard disk. On my
> server there is a md device underlying. So I suggest the problem is
> just with a lvm on top of a md device (which you see not that often on
> desktop systems).

FWIW, I have a similar setup and cannot reproduce this:

# uname -a
Linux bobo 2.6.26-1-amd64 #1 SMP Sat Jan 10 19:55:48 UTC 2009 x86_64 GNU/Linux

# mdadm --detail /dev/md0
/dev/md0:
Version : 00.90
  Creation Time : Sun Apr 29 20:01:14 2007
 Raid Level : raid1
 Array Size : 58596992 (55.88 GiB 60.00 GB)
  Used Dev Size : 58596992 (55.88 GiB 60.00 GB)
[...]
Number   Major   Minor   RaidDevice State
   0   810  active sync   /dev/sda1
   1   8   171  active sync   /dev/sdb1

# pvs
  PV VG   Fmt  Attr PSize  PFree
  /dev/md0   main lvm2 a-   55.88G 9.88G

# lvs
  LV   VG   Attr   LSize   Origin Snap%  Move Log Copy%  Convert
  home main -wi-ao  30.00G
  foo  main -wi-ao   6.00G
  root main -wi-ao   2.00G
  squidmain -wi-ao   2.00G
  srv  main -wi-ao   2.00G
  swap main -wi-ao   2.00G
  tmp  main -wi-ao 512.00M
  var  main -wi-ao   1.50G

# dmsetup table
main-squid: 0 4194304 linear 9:0 75497856
main-swap: 0 4194304 linear 9:0 7340416
main-root: 0 4194304 linear 9:0 384
main-foo: 0 8388608 linear 9:0 79692160
main-foo: 8388608 4194304 linear 9:0 104857984
main-tmp: 0 1048576 linear 9:0 11534720
main-var: 0 3145728 linear 9:0 4194688
main-srv: 0 4194304 linear 9:0 109052288
main-home: 0 62914560 linear 9:0 12583296

# lvcreate -s --size 2G -n foobar /dev/main/srv 
  Logical volume "foobar" created

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Sponsorship requirements and copyright files

2009-03-22 Thread Arthur de Jong
On Sun, 2009-03-22 at 12:11 +, Noah Slater wrote:
> Firmly in my mind is the cost/benefit of this extra effort. If we
> succeed in integrating debian/copyright checks into lintian, or dpkg
> and it's front-ends, it seems reasonable to imagine that this effort
> would be a good trade-off.

I have been reading this discussion a bit and I've been wondering what
use-case you actually have for machine-readable debian/copyright files.

FTP masters have indicated that they don't care about the format. This
seems logical because they don't "trust" what the maintainer put in
debian/copyright and need to review the source by hand anyway.

As a package maintainer I don't see much benefit for my work with this
new format. My packages are extremely simple when copyright is concerned
though.

As a user I hardly ever look at /usr/share/doc/*/copyright. If the
package is in main I consider that enough information for just using it.

If I'm developing software and I want to use another piece of software
(e.g. library, framework or component) I check the license (I don't care
about the copyright holders btw.) and perhaps sometimes I check the
copyright file but most of the time I just check what upstream put on
their website. For these seldom uses a common format or tools wouldn't
help me much.

So for me debian/copyright is mostly a write-only file.

I can understand there may be benefits of a parsable format but I don't
directly see enough gain. On the other hand there seems to be a lot of
(perceived) cost involved (maintainer work).

This means that if you want to introduce a new format you have to
convince the maintainer of a package that there is some benefit, be it
in tools that make their life easier or some concrete benefit for our
users.

Anyway, thanks for the work on the format. To me it seems to probably be
a good thing. I hope this mail wasn't too negative.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: What are the benefits of a machine-parseable ‘debian/copyright’ file? (was: Sponsorship requirements and copyright files)

2009-03-23 Thread Arthur de Jong
On Mon, 2009-03-23 at 10:03 +1100, Ben Finney wrote:
> > Anyway, thanks for the work on the format. To me it seems to
> > probably be a good thing. I hope this mail wasn't too negative.
> 
> I find this a little confusing, since you spent most of your message
> saying how you *don't* think it's a good thing (nor, presumably, much
> of a bad thing), but thanks for the positive note :-)

I think having a uniform format for debian/copyright is a good thing in
general. It makes it easier to read and write.

The problem is that I don't see much use for a machine-parsable format
though at this point.

Firstly (and most importantly for me), there are no tools to support it
so there is no immediate benefit (except the improvement in
readability).

Secondly, the use-cases that have been pointed out are very limited and
IMHO don't justify the amount of effort that has to be put into
converting files.

BTW, the use-case where you don't want to install FDL content and have
some way for apt to warn you before doing so won't be solved by a new
format because debian/copyright is written at the source-level and not
on the binary package level (think -doc packages that have FDL stuff and
-bin packages that have other-licensed stuff). (not that I've given this
too much thought)

Also I think that for complexly licensed packages a single line wouldn't
do justice to the license at all (think of a GPL-licensed work with some
BSD-licensed source parts, CC-licensed documentation, MIT-licensed
whatever, etc,). For those, if you would be really interested, you would
have to read the copyright files completely anyway (either that or GPL +
CC docs would also do it).

I have converted a couple of my packages to the new format (it's
probably old by now) but for a more recent one (nss-ldapd) I skipped
because the wiki page was unreadable and it would also be more effort
(patches are welcome though ;) ).

Note that this is completely separate from whether or not to list all
copyright holders and for which files to list them. I would like to see
some simplifications here or at least some rationale (but that's another
subthread).

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


integrating PAM module into nss-ldapd (RFH)

2009-05-15 Thread Arthur de Jong

Hello list (I've put a couple of people in Bcc to try to get more
feedback),

I'm working on integrating a PAM module into nss-ldapd and am looking
for input on this. The PAM module was kindly provided by Howard Chu from
the OpenLDAP project but I'm still working on the server part.

(more info on nss-ldapd: http://packages.debian.org/nss-ldapd)

With this new functionality I'm planning to generate three binary
packages (instead of the now one): libnss-ldapd (the NSS module),
libpam-ldapd (the PAM module) and nslcd (the daemon). The reason for
this split is that some users may want to stick with the other PAM
module. Also the OpenLDAP people are working on an overlay that could
replace the nslcd part (but it's up to the OpenLDAP maintainers if they
want to provide such a package).

Also, I'm looking for people who are willing to spend some time on
nss-ldapd. I could use some help with the PAM packaging part, I know
libpam-runtime was changed recently so if anyone can help to get the the
PAM packaging into shape that would be great.

Since nss-ldapd seems to be used more often now, having a co-maintainer
for the package would really help. There is still enough development
work to be done but also packaging work with the upcoming split.

Another important part where I would really welcome suggestions is a
better name for the software. I've seen some confusion over the current
name (people not noticing the d at the end) and with the integration of
PAM functionality the name no longer covers the functionality.

Current work on integrating the PAM functionality can be tracked here:
http://arthurenhella.demon.nl/svn/nss-ldapd/nss-pam-ldapd/
http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-pam-ldapd/

Any comments and suggestions are very much appreciated. Thanks.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: integrating PAM module into nss-ldapd (RFH)

2009-06-01 Thread Arthur de Jong
On Sat, 2009-05-30 at 16:05 -0700, Richard A Nelson wrote:
> This is great news! I've already converted all my boxes and am
> continually exhorting conversion to libnss-ldapd (mostly on IRC, but
> also those who report bugs on the libnss-ldap package).
>
> It seems to me, as the libnss-ldap maintainer, that libnss-ldapd is
> functional enough that we should deprecate libnss-ldap.

nss-ldapd still has some rough edges here and there but should be stable
enough for most environments. nss_ldap has some features though that
aren't implemented in nss-ldapd (most of which aren't documented if I
remember correctly). Also nss_ldap has seen more testing, especially in
Kerberos, SASL and SSL-related setups.

> I would also, as the pam-ldap maintainer, recommed similar deprecation
> for it once you have bind-auth (for auth), and exop (for pw change)
> going.

The PAM implementation I'm working on does a username to DN lookup and
attempts to bind with that DN. That seems to work fine in my test setup.
This module has seen very little testing though and authorisation and
password change currently aren't implemented.
> 
> There is already so many mis-configured machines out there, and the
> older packages have some significant issues, that I really believe
> Debian would do well by standardizing/offering only the one, superior,
> solution.

I think that keeping nss_ldap and pam_ldap around is generally a good
idea (mostly because of to the feature differences) for as long as
someone is willing to maintain it.

Having said that I don't see a problem with having nss-ldapd as the
default NSS module for LDAP. For the PAM module I'm not confident enough
about the current code yet.

> > Also, I'm looking for people who are willing to spend some time on
> > nss-ldapd. I could use some help with the PAM packaging part, I know
> > libpam-runtime was changed recently so if anyone can help to get the
> > the PAM packaging into shape that would be great.
>
> Whilst I'm no pam wizard (by any stretch), we can likely take some
> information from the extant pam-ldap package.

Neither am I (but I'm learning now). I didn't know much about NSS before
I began on nss-ldapd.

I already took the patch from Steve Langasek in #517971 which seems to
work ok.

The only thing I noticed was that pam_sm_acct_mgmt() does not seem to be
called with that configuration (probably pam_unix thinks enough
authorization has taken place in /etc/pam.d/common-account).

> > Since nss-ldapd seems to be used more often now, having a
> > co-maintainer for the package would really help. There is still
> > enough development work to be done but also packaging work with the
> > upcoming split.
>
> Count me in - in whatever way I can be of assistance ...  I've moved
> most of my machines to KRB5 auth, but the LDAP passward are being
> still kept in sync; so I can easily run tests.

Great, I'll add you to the Uploaders field in the upcoming upload. I'll
also provide you with commit access to the repository. I'm thinking
about having one, maybe two more releases in the 0.6.x series and have a
0.7.x series with the PAM module enabled, the package rename and the
split into three packages.

> > Another important part where I would really welcome suggestions is a
> > better name for the software. I've seen some confusion over the
> > current name (people not noticing the d at the end) and with the
> > integration of PAM functionality the name no longer covers the
> > functionality.
>
> Yes, the name does cause confusion (often an issue on #ldap and
> #openldap), which is one reason I favour deprecation of the older
> packages (if not removal), and having one solution for Debian.

That does not fix the problem outside Debian though, e.g.:
http://www.securityfocus.com/bid/34211
https://bugzilla.redhat.com/show_bug.cgi?id=491623

> But even if we don't do that, I think the current name proposals make
> sense - even if somewhat confusing.

It's the best I could come up with ;) So unless a better alternative is
presented I think we'll have to stick with that.

> > Current work on integrating the PAM functionality can be tracked
> > here:
> > http://arthurenhella.demon.nl/svn/nss-ldapd/nss-pam-ldapd/
> > http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-pam-ldapd/
>
> /me makes a note to pull these Tuesday afternoon (this weekend is my
> 28th anniversary) - and we're still recovering from 3weeks on the
> road, so I wont have much computer time until then.

I plan to integrate as much as possible from the nss-pam-ldapd branch
into the nss-ldapd branch to already get some code into the 0.6.x
releases.

Thanks for the feedback!

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: DEP-5: Please clarify the meaning of "same licence and share copyright holders"

2009-06-10 Thread Arthur de Jong
On Wed, 2009-06-10 at 11:06 +0200, Fabian Greffrath wrote:
> I am sorry if it's just me who doesn't understand this sentence, but 
> please clarify the meaning of "...indicating files that have the same 
> licence and share copyright holders." in the current DEP-5 proposal 
> for the 'Files' field.
>
> Imagine I have three files in the source: a, b and c.
> File a is copyrighted by Person A, file b is copyrighted by Person B 
> and file c is copyrighted by both Persons A and B. All files are 
> licensed under the GPL.

Let's make it even more interesting, let's say a has:
  Copyright (C) 2006 Person A
b has:
  Copyright (C) 2007 Person B
and c has:
  Copyright (C) 2007 Person A
  Copyright (C) 2008 Person B
or even a file d which has:
  Copyright (C) 2008 Person A

What I now would put in debian/copyright is:
  Copyright (C) 2006-2008 Person A
  Copyright (C) 2007-2008 Person B

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Bug#678676: ITP: svn2cl -- Generate GNU-style changelog from svn repository history

2012-06-23 Thread Arthur de Jong
Package: wnpp
Severity: wishlist
Owner: Arthur de Jong 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: svn2cl
  Version : 0.13
  Upstream Author : Arthur de Jong 
* URL : http://arthurdejong.org/svn2cl/
* License : BSD-3-clause
  Programming Lang: Bourne shell and XSLT
  Description : Generate GNU-style changelog from svn repository history

 This tool uses an xsl stylesheet for generating a classic GNU-style
 ChangeLog from a subversion repository log.

This software was part of the subversion-tools package but was dropped
in the 1.7 version because upstream 
dropped the contrib section.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Bug#680226: lib{nss,pam}-ldapd: apt wants to remove them on dist-upgrade in favour of lib{nss,pam}-ldap:i386

2012-07-05 Thread Arthur de Jong
found 680226 0.8.5
tags 680226 + help
thanks

On Wed, 2012-07-04 at 15:42 +0200, Thorsten Glaser wrote:
> this situation is a bit weird, on an M-A enabled system (debugging
> hindered a bit due to #680225), after upgrading libnss-ldapd and
> libpam-ldapd to the latest version (or even before doing that), a
> further dist-upgrade wants to kill them and install libnss-ldap and
> libpam-ldap (the nōn-“d” versions, which thus will not work due to
> #423252) from i386 (WTF?).

Thanks for pointing this out.

My guess is that this is due to the Conflicts/Replaces that is included
in libnss-ldapd on libnss-ldap and in libpam-ldapd on libpam-ldap.

I guess the conflicts is interpreted to apply to any installed version
of the package while what should be interpreted as a conflict/replaces
only of the package of the same architecture.

I'm not sure what the proper way is to specify that Conflicts and
Provides should only apply for a same-architecture version of the
package. If I do this (just trying some things):

Conflicts: libnss-ldap:${Arch}
Provides: libnss-ldap:${Arch}

the package is built but Lintian complains loudly and dpkg refuses to
install with:

# dpkg -i libnss-ldapd_0.8.10-2_i386.deb
dpkg: error processing libnss-ldapd_0.8.10-2_i386.deb (--install):
 parsing file '/var/lib/dpkg/tmp.ci/control' near line 9 package 'libnss-ldapd':
 'Conflicts' field, reference to 'libnss-ldap': invalid architecture name 
'i386': a value different from 'any' is currently not allowed

This page [https://wiki.ubuntu.com/MultiarchSpec] says: "consideration
of a syntax extension for Conflicts(and Replaces) is deferred until
after the initial implementation"

Does anyone know how to deal with this situation? I could perhaps drop
the provides (or make it Provides: libnss-ldap:${Arch}). There is only
one package in the archive that has a suggests on libnss-ldap so the
"damage" within the archive should be minimal. This would only leave the
case where you would want to have libnss-ldap on i386 and libnss-ldapd
on amd64 impossible (which is theoretically valid).

Any ideas?

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --



signature.asc
Description: This is a digitally signed message part


Re: Bug#680226: lib{nss,pam}-ldapd: apt wants to remove them on dist-upgrade in favour of lib{nss,pam}-ldap:i386

2012-07-07 Thread Arthur de Jong
On Fri, 2012-07-06 at 10:00 +0200, David Kalnischkies wrote:
> > I'm not sure what the proper way is to specify that Conflicts and
> > Provides should only apply for a same-architecture version of the
> > package. If I do this (just trying some things):
> 
> There is simple no way.

Thanks for your reply.

I guess I could drop the Provides for now then which seems to be the
least disruptive change to support multiarch (but also see below).

I can't drop the Conflicts because libnss-ldapd and libnss-ldap share
the same file (at least the same library which may be in the same file
depending on whether you are comparing multiarch or non-multiarch
versions). 

> > # dpkg -i libnss-ldapd_0.8.10-2_i386.deb
> > dpkg: error processing libnss-ldapd_0.8.10-2_i386.deb (--install):
> >  parsing file '/var/lib/dpkg/tmp.ci/control' near line 9 package 
> > 'libnss-ldapd':
> >  'Conflicts' field, reference to 'libnss-ldap': invalid architecture name 
> > 'i386': a value different from 'any' is currently not allowed
> 
> Which dpkg version is that?

This was 1.16.4.2 that was lying around in a play chroot. dpkg 1.16.7
installs the deb just fine.

I've been playing a bit with only changing the conflicts to include
:${Arch} which seems to work with dpkg (though lintian still complains),
however apt doesn't seem to understand it and doesn't remove
libnss-ldapd when installing libnss-ldap.

Then again, I can't reproduce the problem that Thorsten reported. I've
got both libnss-ldapd:i386 and libnss-ldapd:amd64 installed (both
0.8.10-1) in a chroot with dpkg:i386 1.16.7. The installation was done
with apt-get (apt:i386 0.9.7.1) and went fine. Also apt-get dist-upgrade
doesn't want to remove either of the packages (for some reason apt does
want to switch back to the i386 coreutils that I managed to switch to
amd64).

On Fri, 2012-07-06 at 11:02 +, Thorsten Glaser wrote: 
> Could this work: libnss-ldap and libnss-ldapd both provide the same
> virtual package and conflict with it? Same for the pam ones but a
> different virtual package.

My guess is that it wouldn't because the conflict would still match it
on the other architecture.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Removing packages from unofficial repositories

2014-01-04 Thread Arthur de Jong
On Thu, 2014-01-02 at 12:52 -0500, Simon Ruggier wrote:
> However, I would expect that most users would not have the patience to
> do this via apt preferences, and if there is an easier way, I was not
> aware of it.

I also did this a few times. I remove the third-party repositories from
sources.list, apt-get update and check the output of

apt-show-versions  | egrep -v '/(testing|unstable).*uptodate'

Not ideal, but it works.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Crypto consolidation in debian ?

2011-05-08 Thread Arthur de Jong
On Sun, 2011-05-01 at 14:08 +0100, Roger Leigh wrote:
> If we could move to having a central service, rather than having every
> process load in a pile of extra libraries, I would probably be in
> favour of it.  If would make some things, such as NSS queries inside
> chroots, much more efficient and robust.

This is what nss-pam-ldapd does to replace nss_ldap (NSS part in
libnss-ldapd). It uses a central daemon running as a dedicated user (for
LDAP NSS requests only). The original reason for the creation of
nss-ldapd was that the OpenLDAP libraries are not meant to be in
processes that do not expect them. I guess there are more.

Another solution (that Joss already pointer out) is libnss-sss which has
a slightly broader scope.

I'm not sure that having a central process to read stuff from simple
flat files is a good idea though as it adds extra complexity and a
single point of failure.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Re: Crypto consolidation in debian ?

2011-05-08 Thread Arthur de Jong
On Sun, 2011-05-01 at 12:55 +0200, Bastien ROUCARIES wrote:
> It seems fedora is moving to nss for openldap

I don't think it's completely free from the same kind of issues as
GNUTLS. For example, I recently came across this:
  https://bugzilla.redhat.com/show_bug.cgi?id=701587
NSS (Network Security Service, not Name Service Switch) seems to change
the scheduling parameters of a process.

Also OpenLDAP itself isn't that good a candidate to load into every
process. Just look at all the hacks nss_ldap needs to do keep it in a
sane state. Also environment variables and files in user's home
directory influence libldap's workings.

Although switching SSL/TLS library to something different may be a good
idea, I don't think it will fix the problem for NSS (Name Service Switch
here) modules.

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part