Re: [Debconf-discuss] list of valid documents for KSPs

2006-05-28 Thread Benjamin A7;Lee
On Sun, May 28, 2006 at 09:22:10PM -0700, Thomas Bushnell BSG wrote:
> Manoj Srivastava <[EMAIL PROTECTED]> writes:
> 
> > Once he has broken faith, nothing coming from that source can
> >  be accepted, since the source is now tainted.  Any information flow
> >  with that origination is tainted, and since you offer the same
> >  statements, without any form of untainting that is visible, I think
> >  you are rapidly approaching the untrusted relay category.
> 
> What I don't see is what exactly the scam *was*.  
> 
> It seems to me that you are saying that presenting an ID which should
> *scream* to anyone paying the least attention "this is not a
> government ID", has, ipso facto, lied.  
> 
> But no, they haven't.  They haven't forged, or been dishonest.

In fact (as I understand it) Martin willingly showed his real ID to
anyone who didn't accept his Transnational Republic ID.  That doesn't
sound all that dishonest to me - surely if the intent was to deceive he
wouldn't have shown any real ID?

bma

-- 
Benjamin A'Lee - <http://bmalee.eu/~bma/>
Secretary, TermiSoc - <http://termisoc.org/>
"Graphs of higher degree polynomials have this habit of doing unwanted
wiggly things." -- From a Cambridge maths lecture.


signature.asc
Description: Digital signature


Re: Debian's Linux kernel continues to regress on freedom

2007-09-12 Thread Benjamin A7;Lee
On Wed, Sep 12, 2007 at 06:35:18PM +0200, Pierre Habouzit wrote:
>   I did not took any kind of position on the matter in that thread yet.
> But to make you happy I will: there is little point in shipping rfc's
> that are mirrored everywhere on the interwebs, and rfc's are clearly
> non-free, and do not end up in the final binary package. So there is no
> point in no stripping them from the source package as it's not near
> being burden for the maintainers, who after all, are the ones that
> suffer the "most" of that decision.

If nothing else, RFCs shouldn't be shipped in arbitrary packages - there
are packages containing nothing but RFCs, and including individual RFCs
in other packages is needless duplication.

Having packages available (whether in non-free or otherwise) can be
useful in terms of having a local copy of the document, but not so vital
as to ignore any licencing issues, since (as has been mentioned) they
are distributed elsewhere.

Also, distributing them without permission to modify them, just because
"nobody will ever want to modify them anyway" doesn't really make sense
to me. The vast majority of people will never want to modify artwork, or
fonts, or other media included in packages, but still Debian requires
them to be free because some people might. For that matter, the majority
of people will never want to modify any program that they run, but
Debian still requires them to be free. Most people will never want to
modify RFCs, but some people might (or, at least, create derivative
works, translations, etc.), so they should be required to be free or
they should stay in the non-free section.

-- 
Benjamin A'Lee <[EMAIL PROTECTED]>
http://subvert.org.uk/~bma/
"It's hard to live up to your principles. If it were easy, your
principles probably aren't worth a damn anyway." - Mark Pilgrim


signature.asc
Description: Digital signature


Re: Building packages three times in a row

2007-09-23 Thread Benjamin A7;Lee
On Mon, Sep 24, 2007 at 12:54:58AM +0200, Martin Uecker wrote:
> Neil Williams <[EMAIL PROTECTED]>:
> > This has been covered before - certain upstream macros are among 
> > many factors that ensure that this is unlikely. I, for one, use such
> > macros upstream to indicate the build time of the actual executable
> > installed so this will change the binary every time it is built.
> 
> This could be fixed.

In every binary that includes the build date in it? There's rather a
lot; off the top of my head, Vim does it, and so does the Linux kernel
AFAIK.

> > You have md5sums and GnuPG signatures on the Release files - I see
> > no benefit from bit-matching.
> 
> The build host could be compromised. Not that unlikely.

And if the build host was compromised, how would that help any more than
md5sums and gpg-signing? With access to the build host, whatever list of
bits to match could be changed along with the binary, the md5sum, and
the gpg-signature.

Anyway, surely the point of hashes like md5, sha1, etc, is that it's
much faster to do that than to compare large files bit by bit?

-- 
Benjamin A'Lee <[EMAIL PROTECTED]>
http://subvert.org.uk/~bma/


signature.asc
Description: Digital signature


Re: Building packages with exact binary matches

2007-09-24 Thread Benjamin A7;Lee
On Tue, Sep 25, 2007 at 12:04:15AM +0200, Martin Uecker wrote:
> Manoj Srivastava <[EMAIL PROTECTED]> wrote:
> >Actually, if you do not trust the path down which a binary
> > package flows, you can not use any information down that flow path to
> > test your implementation.  You need to do a full source audit, and
> > build from source -- at which point, you might just install your trused
> > binary, instead of trying to verify that the upstream package is the
> > same as yours.
> 
> It would be enough when just a few people are actually recompiling the
> binaries and compare it to the official debian packages. Then
> *everbody* could trust that the packages are not modified,
> because any modification would be detected immediatley. This is
> only possible with bit-identical binaries.

Erm, if I can't trust the Debian Project to create trustworthy packages
and verify their integrity, why should I trust anyone else to verify
them? And why should anyone trust anyone else? A security system like
this would only make sense if everyone did it, and if you're going to
recompile every single package to make sure it's trustworthy, then you
may as well be using FreeBSD, Gentoo, or similar...

You're also assuming that the source code is trustworthy. If the binary
packages can be compromised, so can the source packages.

-- 
Benjamin A'Lee <[EMAIL PROTECTED]>
http://subvert.org.uk/~bma/


signature.asc
Description: Digital signature