Re: Reviving schroot as used by sbuild

2024-06-28 Thread Sam Hartman
> "Helmut" == Helmut Grohne  writes:

Helmut> In this work, limitations with --chroot-mode=unshare became
Helmut> apparent and that lead to Johannes, Jochen and me sitting
Helmut> down in Berlin pondering ideas on how to improve the
Helmut> situation. That is a longer story, but eventually Timo
Helmut> Röhling asked the innocuous question of why we cannot just
Helmut> use schroot and make it work with namespaces.

I'll be honest, I think building a new container backend makes no sense
at all.
There's a lot of work that has gone into systemd-nspawn, podman, docker,
crun, runc, and the related ecosystems.

I think an approach that allowed sbuild to actually use a real container
backend would be long-term more maintainable and would allow Debian's
DevOps practices to better align with the rest of the world.

I have some work I've been doing in this space which won't be useful to
you because it is not built on top of sbuild.
(Although I'd be happy to share under LGPL-3 for anyone interested.)

But I find that I disagree with the idea of writing a new container
runtime for sbuild so strongly that I can no longer use sbuild for
Debian work, so I started working on my own package building solution.

I realize that I have not  done a good job of being constructive here.
I intended to write some blog posts on this topic, but got sucked into
work and tag2upload.

In terms of constructive feedback:

* I think your intuition that sbuild --chroot=unshare is limiting is
  good.

* I would move toward a persistent namespace approach  because it is
  more similar to broadly used container backends.

* overlayfs/fuse-overlayfs are how the rest of the world is solving
  these problems (or snapshots and the like).  Directories are kind of a
  Debian-specific artifact that I find more and more awward to deal with
  as the rest of my work uses containers for CI/CD.
  


signature.asc
Description: PGP signature


Re: Builds that pass locally but fail on sbuild? (Re: Reviving schroot as used by sbuild)

2024-06-29 Thread Sam Hartman
> "Richard" == Richard Lewis  writes:

Richard> Otto Kekäläinen  writes:
>> Could you point me to some Debian Bug # or otherwise share
>> examples of cases when a build succeeded locally but failed on
>> official Debian builders due to something that is specific for
>> sbuild/schroot?

Until I fixed it, krb5 would not work in a network namespace that only
had a lo interface.  It ran getaddrinfo with GAI_ADDRCONFIG in its
tests, because localhost is discouraged/not allowed in krb5 ticket
addresses per RFC 4120.  It only talks to itself, but it really wants to
talk to itself not on localhost.  I patched the sources to work around
sbuild chroot=unshare.


signature.asc
Description: PGP signature


Re: Urgent help with upload of netatalk to prevent being autoremoval from testing

2024-06-29 Thread Sam Hartman
> "Daniel" == Daniel Markstedt  writes:

Daniel> Hi all, I have drafted a release of the netatalk package
Daniel> that addresses 5 critical deb bugs.  However, I myself am
Daniel> only an uploader in name and don't yet have actual upload
Daniel> privileges.  And my co-maintainer, who does​ have privileges,
Daniel> has been too busy IRL to assist for quite some time.

Daniel> Normally I would be more patient, but right now netatalk is
Daniel> slated to get removed from Trixie testing on July 4th due to
Daniel> one of the bugs (libgcrypt-config deprecation.)

Daniel> For reference, the full list of the bugs to be fixed.

Drop a note to that bug indicating an upload is pending waiting
sponsorship.
That should be sufficient to reset the timer.



Re: Accepting DEP14?

2024-08-16 Thread Sam Hartman
> "Andreas" == Andreas Tille  writes:


Andreas> Are there any blockers to accept this DEP which I might
Andreas> have missed?

Honestly, the git-buildpackage default layout is good enough, and dep-14
 involves change  that doesn't feel like it brings enough value to me.

I.E. I think that dep-14 has been around so long and hasn't gotten
accepted is a strong suggestion that it doesn't bring sufficient value.
And I think that alone is a blocker.


signature.asc
Description: PGP signature


krb5: ABI Issue--confirm your packages work against 1.4.3 in experimental

2005-11-19 Thread Sam Hartman

Hi folks.  I've just uploaded Mit Kerberos 1.4.3-1 to experimental.

I'm writing to you because your package links against the main
kerberos library (libkrb53) and I'd like you to confirm that the
Kerberos support in your package still works against this version.

The public ABI and API of MIt Kerberos has been stable since before
Woody was released.  However MIT reserves the right to change symbols
not mentioned in krb5.h (or mentioned only when KRB5_PRIVATE is
defined) at any point in time. New symbols are not added to
KRB5_PRIVATE without an ABI bump.

Unfortunately, some packages end up calling symbols that are private
such as krb5_init_ets().  Many years ago--before krb5 was introduced
into Debian--this was actually a good idea.  however it has been
unnecessary and incorrect for any version of kerberos in Debian.


MIt Kerberos 1.4 apparently marks the first time when MIT has removed
any such symbol.  This can cause packages calling such a symbol to
break at runtime.  That's not good.

The solution to this problem is to remove the call to the private
symbol.  In the case of krb5_init_ets (the common problem), just
remove the call.  In the case of any other symbols, fix the problem if
it is obvious, or ask [EMAIL PROTECTED] for help if it is not.  (I'm on
that list; you could just ask me, but you will be better off asking a
larger list).

I'd appreciate it if you would take the time to see if your package
works against the new Kerberos library.  The easiest way to do this is
to build your package or at least the kerberos using parts of your
package against the new libkrb5-dev package and confirm there are no
warnings about missing prototypes and that your package can
successfully link to libkrb5.




If you do find problems, please upload a version of your package that
fixes the problem (built against the old library) to unstable.  Open a
serious bug tagged as experimental against the krb5 package asking me
to conflict with broken versions of your package.  Be sure to include
the version of your package that has the fix in the bug description.

The above procedure assumes that you don't need functionality from
krb5 1.4 to work around private symbols you are using.  If that ends
up not being the case then talk to me and we'll work something out.


Also, if your package is involved in some sort of transition and has
limited uploading,we'll need to work on timing with the release team.
If for this or any other reason you cannot upload a fix please still
open a bug so I'll know that krb5 1.4 will break your package.


Thanks for your cooperation in making Debian better and helping me
with this transition.

Finally, great thanks to Russ Allbery my co-maintainer for all his
work on the package.




pgpc4Ue7ebKVE.pgp
Description: PGP signature


Re: [useless] I am still on the keyring. With my old key.

2005-11-20 Thread Sam Hartman
> "Chip" == Chip Salzenberg <[EMAIL PROTECTED]> writes:

Chip> Who does a developer have to fuck around here to get his key
Chip> deleted?  -- Chip Salzenberg <[EMAIL PROTECTED]>


Chip> -- To UNSUBSC

Hi.  As you are no doubt aware by now, getting your key removed is a
great mystery and deep magic requiring much research and perseverance.
However as best I can tell delving into the sacred texts, it's a
cryptography magic not a sex magic.  Now, perhaps what you're trying
to do is use a sex magic as a means of coercion to catalyze the
cryptography magic.

That's certainly an interesting approach.  There do seem to be some
references to something similar in some related folk traditions.
However there aren't really any references to this sort of thing in
the sacred texts of cryptography.  I'm a bit concerned that
cryptography has its own coercion magic--never fully described and
only alluded to by the primary tool (the rubber hose [*]).  I'm
concerned that since cryptography has its own coercion magic, it may
not be easy to use another magic for the same purpose.  The powers at
play may simply not interact well.  If you do manage to succeed with
this approach then you will have learned something interesting.

Now, a few comments on attempting the cryptography magic directly.
It's my understanding that the key to such magics--particularly in the
Debian tradition--is to harness sufficient energy and focus it on a
point.  There are apparently techniques that involve public mailing
lists for amplification.  You do have access to a symbol of power
which may give you control of sufficient energy: your old key.



Consider carefully the following ritual.  Carefully write instructions
describing how one not familiar with the Debian tradition could use a
key to influence Debian--particularly focusing on a description of the
package upload ritual.  Of course since you are targeting novices your
description should focus on warning about the ways in which such power
could be abused; not all novices have sufficient imagination so you'll
have to be very explicit.  Take this ritual and place along side it
your private key.  I'm afraid that in order to harness sufficient
power you may have to remove the traditional wards around your key.
Post the result to debian-devel.  I think that the resulting
energy--particularly focused so close to your private key--may totally
destroy your key in the Debian sphere.


BE WARNED.  This is the first ritual I've tried to create myself.  It
involves powers and energies much stronger than I'm used to applying.
Energies that strong often lead to karmic backlash.  I have not yet
calculated the full extent of karmic backlash possible from this
ritual; it seems beyond my capabilities.  I would strongly advise
finishing such a calculation before you begin.  I'm certain that the
energies involved are great enough that there will be consequences
beyond your primary intended effect.

Good luck in your quest.

-Sam

P.S.  This is a *joke*.  I am not actually advocating disclosing a
private key.  Good luck in actually getting the key removed through
the normal mechanism.

[*] I suppose there are sex magics involving rubber hoses.  They are
beyond my experience and I am not sure how they would interact with
cryptography magic.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Boxed Penguin Prototype showcases customization of Debian to build infrastructure server

2000-12-30 Thread Sam Hartman

   In order to actually get something done in an electronic office, we
   need a certain amount of infrastructure. In a large environment, the
   incremental costs are somewhat visible, but you won't see how much 
   work it took to get there. In practice, starting from ground zero
   means identifying a large collection of interesting subsystems, then
   customizing each one, figuring out how to manage and maintain it,
   deploying it, documenting local procedures and policies, and then   
   moving on to the next one. This turns out to be a huge amount of
   one-time effort - which doesn't get streamlined or tuned, beyond
   becoming part of a particular sysadmin's knowledge base.

Boxed Penguin (http://www.boxedpenguin.com/) hopes to come up with a
general open-source solution to this problem: we hope to construct a set of 
tools
that allow sites to easily and quickly deploy infrastructure.

We'd like to draw your attention to our initial prototype, based on
Debian GNU/Linux, available at our website.  The prototype
demonstrates how a site could combine various components of Debian
together to set up an infrastructure.  Kerberos acts as a central
authentication service.  SASL and PAM are used to provide security to
applications like LDAP and IMAP.  AFS is used as a secure,
distributed file system for the site's data.  LDAP is used to provide
a means for distributing account information.

Most of the work in the prototype focused on integrating various
components.  For example scripts are provided to create all the parts
of a user account: Kerberos authentication information, an LDAP
password entry, AFS volumes for home directories and an IMAP mailbox.
Other scripts provide manipulation of group data.  

The other hard problem we attempted to solve was the integration of
the package installation.  Because we were creating a unified
infrastructure, we knew more about the desired state of the system
than the author of any package.  For example, we knew that LDAP would
be using Kerberos SASL for authentication and thus didn't need an
admin password.  We wanted to turn this extra knowledge into a
simplified installation experience for our users.  In most cases we
took advantage of Debconf and gave packages the hints we needed.

We hope that by bringing our prototype to the attention of the Debian
community, we can focus developer interest on problems that pop up
when you try and deploy Debian throughout a site or environment
instead of on a single machine.  For example, while effective, our
technique of stuffing debconf configuration in the boxedp-assumptions
package could probably be replaced with a better-architected system
for providing additional information to packages about containing
frameworks.  Also, we're interested in Debian's input on the problems
we are trying to solve and on how Debian can best be used to solve
these problems.


Thanks,

--Sam




Re: Boxed Penguin Prototype showcases customization of Debian to build infrastructure server

2001-01-02 Thread Sam Hartman
> "Bernd" == Bernd Eckenfels <[EMAIL PROTECTED]> writes:

Bernd> Hello Sam, On Sat, Dec 30, 2000 at 11:27:44PM -0500, Sam
Bernd> Hartman wrote:
>> In order to actually get something done in an electronic
>> office, we need a certain amount of infrastructure.

Bernd> Thanks for your work. I'm now looking into it. I think
Bernd> besides the packages you are working on, for a prototype,
Bernd> most of the work which needs to be done, is have some
Bernd> documentation. Background info and so on. This is at least
Bernd> needed, until your System is truely Plug+Play.

Agreed.  We have finite time and wanted to make stuff available for
people who were interested in looking at it as soon as was reasonable.
We will be working on documentation.  My priorities for documentation
are explaining enough AFS and Kerberos that Debian people can
understand what is going on.  It would also be important to document
exactly what the packages do.




Bernd> Since I currently need to set up a shared Account System on
Bernd> a Few Linux Servers (CVS File Server, SourceForge Project
Bernd> Management and Bugzilla Tracker) I may have a deeper look
Bernd> into writing some docu about it.

Let me know if you have any questions.




Re: security in testing

2003-05-26 Thread Sam Hartman
> "Gerfried" == Gerfried Fuchs <[EMAIL PROTECTED]> writes:

Gerfried> * Sven Luther <[EMAIL PROTECTED]> [2003-05-16
Gerfried> 13:33]:
>> Such a package should be as close to possible to the version
>> actually in testing, and not depend on packages and/or versions
>> that are not yet in testing.

Gerfried>  So, you request more or less that every developer
Gerfried> should backport fixes themself from the usual new
Gerfried> upstream version that fixes the problem (and mostly
Gerfried> always have new features too) to the version in testing,
Gerfried> which might even be older than just one upstream
Gerfried> release, due to usual holdups in the transition. It
Gerfried> sounds like you like to have every developer be able to
Gerfried> do what the security team does. That requires much skill
Gerfried> -- much more than most of us possess!

I'd actually hope that you would be capable of doing this sort of back
porting for any package you maintain.  You should certainly be doing
this for packages in stable, giving the security team tested patches,
rather than having them do the job of maintaining your packages for
you.

Sure, that's an ideal.  And perhaps you don't have these skills yet
and are still working on gaining significant skill with your packages
and with the languages they are written in.  If so, then you should
look for co-maintainers who do have the necessary skill sets to
provide security updates for your packages.  Even if you completely
ignore testing security, anything you can do to reduce the work load
on the security team will mean that Debian is less behind on
publishing security updates and will better help us serve our users.


--Sam




[Stefano =)] Bug#198619: Could not perform configuration on libpam0g

2003-06-25 Thread Sam Hartman

[Please cc me; I'm very behind on -devel]


I'm very confused by this bug and am sufficiently busy this week that
I'm not going to be able to diagnose it right now.

Could anyone who has a chance to do so please look at exactly what is
failing from a dependency standpoint?  
I get the feeling I'm missing
something about the interactions between pre-dependencies and
dependencies and apt.



--- Begin Message ---
Subject: Could not perform configuration on libpam0g
Package: libpam0g
Version: 0.76-12
Severity: normal
Tags: sid


I have tried to install Debian. Then i 've upraded it to SID. The same thing 
happens if I try to install Debian directly from SID. Apt-get says "Could 
not perform immediate configuration on libpam0g". On installations done 1 
month ago all the apt-get upgrade things works fine. This bug appears only 
on installations done in this week. This kind of bug then doesnt allow the 
installation and the configuration of dozens of packets as kdm, gcc and so 
on...


-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux Lan1-700 2.4.20date27.5 #1 SMP Mon May 26 02:37:37 CEST 2003 
i686
Locale: LANG=C, LC_CTYPE=C

Versions of packages libpam0g depends on:
ii  libc6 2.3.1-17   GNU C Library: Shared libraries 
an
ii  libpam-modules0.76-11Pluggable Authentication 
Modules f
ii  libpam-runtime0.76-11Runtime support for the PAM 
librar

_
MSN Foto: condividi, ritocca e stampa le tue foto online  
http://photos.msn.it



--- End Message ---


Re: Transition: new PAM config file handling in unstable

2003-08-25 Thread Sam Hartman
> "Joey" == Joey Hess <[EMAIL PROTECTED]> writes:

Joey> Steve Langasek wrote:
>> - It will now be possible to choose md5 vs. crypt passwords at
>> install time without violating policy.  (Currently, a number of
>> conffiles are being modified by maintainer scripts in order to
>> enable md5 passwords.)  Actually making this process
>> policy-compliant will require changes to a number of other
>> packages prior to release.

Joey> It's great to finally have this. Have you considered doing
Joey> something to ease upgrades of systems whose admins chose to
Joey> enable md5 passwords via passwd's debconf questions?

Unfortunately I have some bad news for you.

Karl (login maintainer) and I have decided that there will be no
question for sarge and that md5 passwords will be used by default.


Once there are tools for automated manipulation of the pam config
files, then it will be a configuration decision of libpam-modules what
the default passwd configuration for pam_unix is.

If debconf is available then the user will be asked; otherwise the
default will not be changed.

But I don't have time to review a design or to do the design myself
for sarge.




Re: Drop KRB4 support from HEIMDAL

2005-10-23 Thread Sam Hartman
Does the krb524 functionality disappear from the KDC if you turn off
krb4?

If so, that will be a problem for current openafs, although probably
not for future openafs.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Please test krb5-config in experimental

2009-07-22 Thread Sam Hartman


Last night I uploaded a more or less rewrite of krb5-config to
experimental.  The goal of this rewrite is to significantly reduce the
number of cases where users are asked questions or where the resulting
configuration is completely wrong.

krb5-config is responsible for generating /etc/krb5.conf, which is
used by Kerberos implementations in Debian.  Testing is valuable both
from people who use Kerberos and those who do not.

Testing is most valuable if you purge the krb5-config package before
testing.

Here is expected behavior:

* If your site does not use Kerberos at all, you will almost certainly
  be prompted for a Kerberos realm name.  If you enter a Kerberos
  realm name that Debian has never heard of, you will be prompted for
  Kerberos servers.  If you enter something like ATHENA.MIT.EDU (case 
sensitive), then you will not.

* If dnsdomainname or hostname --fqdn don't provide reasonable results you'll 
probably be prompted for a Kerberos realm.

* If your site uses Kerberos and your KDC configuration is in  DNS, then  you 
will not see any prompts at debconf priority above medium.

* If your Kerberos realm does not match your DNS domain, it should do
  a fairly good job of figuring that out.  If it doesn't, then I'd
  definitely like to hear from you--if nothing else, I can add a
  static hint.

* dpkg-reconfigure krb5-config at priority medium or below should allow you to 
set the realm and should make sure that Debian knows how to find KDCs for that 
realm.


Thanks for your help.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Please test krb5-config in experimental

2009-07-22 Thread Sam Hartman
I'd recommend coordinating any such model with the upstream Kerberos
implementations and with distributions.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Switching /bin/sh to dash without dash essential

2009-07-23 Thread Sam Hartman


Folks, there was a longish discussion on IRC starting about an hour
ago about dash and bash.

I agree we want to move the default /bin/sh to /bin/dash.
However I'm failing to understand why  we want dash to be essential.
If I'm not using dash as my /bin/sh why do I need it?

If the answer is that we really do want it everywhere independent of
what /bin/sh is, that's fine.  However, that's not obvious to me.

So, a proposal for doing a switch with dash not essential.

1) all /bin/sh shells know about each other.
2) The prerm script  for a /bin/sh shell finds another /bin/sh shell and 
updates the symlink if the current /bin/sh link is the one being removed.
3) The postinst for a /bin/sh shell can update the link if it decides that the 
installed shell would make a better /bin/sh
4) There is a package `the-shell ' that is essential and pre-depends on one of 
the  /bin/sh shells.


Variations:

1) You could have a registration mechanism.  My assumption is the set is small 
enough static is good

2) I assume that package operations cannot take place between calling the prerm 
script and actually removing the package.  If that is false, you could make 
sure that you are changing the link to a configured shell

I really don't mind if we go forward with the current proposal.
However, I think I and a lot of other people would appreciate clarity,
so far not expressed, about why dash needs to be essential.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Switching /bin/sh to dash without dash essential

2009-07-23 Thread Sam Hartman
> "Luk" == Luk Claes  writes:
Luk> We want everyone to use dash by default. If someone does not
Luk> want to use the default, they are free to do so, but the
Luk> default system shell is supposed to always be on the system.
Why?
I agree something should always provide /bin/sh.
I do not understand why the default system shell should be on the system always.

The only argument you've given that I understand is that no one wants
to do the work necessary to guarantee that /bin/sh is always present
and that the default system shell is not essential.
If that's the answer, that's a perfectly fine answer, but *say that*, don't 
just make assertions.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Switching /bin/sh to dash without dash essential

2009-07-23 Thread Sam Hartman
> "Siggy" == Siggy Brentrup  writes:
8
>> I agree we want to move the default /bin/sh to /bin/dash.
>> However I'm failing to understand why we want dash to be
>> essential.  If I'm not using dash as my /bin/sh why do I need
>> it?

Siggy> So you are complaining about a small package (installed
Siggy> size 224) becoming essential while forcing the embedded ppl
Siggy> to work around a monster (installed size 1236); numbers
Siggy> taken from my Ubuntu laptop where both are essential, I
Siggy> hope only for a limited period of time.  
Hmm.
I don't get any complaint about /bin/dash being the default system shell from 
my mail.
Nor do you see me complaining about having /bin/sh scripts be posixly correct.

>> If the answer is that we really do want it everywhere
>> independent of what /bin/sh is, that's fine.  However, that's
>> not obvious to me.

Siggy> As long as /bin/sh refuses extensions to posix I agree with
Siggy> you, but bashism has been a cuss word for years before
Siggy> 2004.

I don't understand how this has anything to do with anything I said.

Siggy> Maybe "posixly-correct-shell" would be a better name.

Siggy> Summing up you suggest making a virtual package - 

No.  I suggest a package with no files but with pre-depends and the
essential flag.  I don't think a virtual package would work correctly
at a technical level, although I'd be happy to be shown to be wrong.

Siggy> however
Siggy> it's called - essential.  While I think I grok your
Siggy> intentions, I doubt dpkg will follow, please read
Siggy> carefully:

Siggy>   http://www.debian.org/doc/debian-policy/ch-binary.html#s3.8

Read that long ago and read that word for word just now.
Can you help me understand what I'm missing?
I don't see how what I'm proposing would violate that.


>> I really don't mind if we go forward with the current proposal.
>> However, I think I and a lot of other people would appreciate
>> clarity, so far not expressed, about why dash needs to be
>> essential.

Siggy> See debian-policy cited above.

Again, please help me understand how what I propose would violate policy.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Switching /bin/sh to dash without dash essential

2009-07-24 Thread Sam Hartman
Steve, let's take a step back and calm down.

Are you saying that your objection to engineering a solution where
dash doesn't need to be essential is that it's not worth the effort?
I *think* that was the point of your message but am not entirely sure.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Switching /bin/sh to dash without dash essential

2009-07-24 Thread Sam Hartman
>>>>> "Steve" == Steve Langasek  writes:

Steve> On Fri, Jul 24, 2009 at 04:33:21AM -0400, Sam Hartman wrote:
>> Steve, let's take a step back and calm down.

>> Are you saying that your objection to engineering a solution
>> where dash doesn't need to be essential is that it's not worth
>> the effort?  I *think* that was the point of your message but
>> am not entirely sure.

Steve> Yes, that's definitely my position.  

OK, I'm fine with that.  I jumped into this mess because several
people asserted that we were making dash essential because it was
technically required.  As best I can tell that is false.  It seems
like there was a lot of not listening going on, and a lot of throwing
around assertions about what is and is not possible without actually
any attention to the accuracy of those assertions.  That makes me
grumpy and so I got involved.

I'm happy with the answer of "making dash essential is easier than not doing so 
and we have not seen a compelling reason to do something else."

Steve> From what I can see,
Steve> engineering a solution where dash doesn't need to be
Steve> essential isn't worth *any* effort, because IMHO, so far
Steve> the arguments for being able to remove dash from the system
Steve> appear entirely contrived.


I think you're being unfair here.  There are arguments about technical
cleanlyness and design esthetics that seem reasonable.  I don't see
that these arguments appear contrived.  I'm happy to agree with you
though that these arguments don't justify the work.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



krb5 transition: upgrading to krb5 1.6.1

2007-04-29 Thread Sam Hartman


Hi, folks.

I've just uploaded krb5 1.6.1 to experimental.  This is a new version
with enhanced plugin support, support for realm referrals, support for
storing Kerberos credentials in the Linux keyring rather than on disk,
and generally improvements all around.  The one big feature that is
missing from the Debian packages is support for the LDAP database
backend; that's missing because it requires LDAP 2.3.

I'd like to upload this to unstable.  It will involve a library
version bump; the new libraries are backward but not forward
compatible.  That is,existing software in Debian that uses public APIs
and is linked against the old version is expected to continue to work,
but new APIs are introduced so software linked against the new
libraries may not run against the old libraries.  In other words, no
soname change, but shlibdeps get bumped.

This is your chance to make sure that your software works against the
new version of Kerberos before it makes its way into unstable.  This
is also your chance to work with me if you're concerned about timing
of a shlibdeps change for krb5.



Samba is of particular concern because from time to time Samba has
used internal APIs and so it breaks when these APIs change.  I will
not consider it a bug in the krb5 package if internal APIs changing
breaks something, although I'll be happy to add conflicts as
appropriate.  I'll also be happy to try and work with you to figure
out how to fix your package if it is using internal APIs.  The public
APIs are anything in headers installed by libkrb5-dev without defining
KRB5_PRIVATE.



I'm aware of one issue that impacts nfs-utils.  Bug #413838 describe a
problem where if your server has a common misconfiguration the 1.6
Kerberos libraries on the client will cause mounts to fail.  In
particular, the kernel only supports DES encryption for NFS.  However,
many servers are keyed as if they support more modern encryption such
as AES.  The client tries to request that only DES be used, but this
has been broken in 1.6.  So, Kerberos negotiates AES or some other
strong encryption and then the server tries to feed this to the kernel
and fails.  This is a bug and MIT will definitely fix it, but I don't
think this should hold up an upload to unstable.  There is a work
around: properly configure the server.

Comments are welcome.

--Sam


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: krb5 transition: upgrading to krb5 1.6.1

2007-04-29 Thread Sam Hartman
> "Marcus" == Marcus Better <[EMAIL PROTECTED]> writes:

Marcus> Russ Allbery wrote:
>> Correct.  In general, you never want to have Kerberos keys in
>> your KDC for a service principal for enctypes that that service
>> doesn't support.

Marcus> Is there an easy way to find out which enctypes a service
Marcus> supports? (And why does the poor admin have to worry about
Marcus> this at all?)
It's a function of the software.  so, read the documentation for the
service.

In general, anything that just uses the kerberos libraries supports
everything--ssh, samba, imap, http, etc.
The exceptions tend to be:

* NFS - depends on what the kernel supports and the interface between userspace 
and kernel.
* Telnet - only does des.
* OpenAFS - generally takes care of itself, but basically only des.


There is protocol work underway so that a service can request keys for
itself.  This could be combined with some mechanism where packages
install templates indicating what enctypes they support and it's all
automated.  That would require the protocol work be finished and
cooperation between the krb5 package and the related other packages.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Bug#482528: heimdal-clients,krb5-user

2008-07-08 Thread Sam Hartman
Yeah, I'm reasonably sure that alternatives are wrong for kadmin.
Editor is intended to be used by a user.  Kadmin is often used by
users but is also quite often used by scripts.

Editors also can all work with text files.  It's basically not true
that you can use a heimdal kadmin against an MIT realm.  I can think
of basically no situation where they are interchangable.  However I
can think of many tasks where I'd be equally happy to use ed as Emacs.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#566346: ITP: krb5-appl - Kerberos applications and clients

2010-01-22 Thread Sam Hartman
package: wnpp
severity: wishlist
owner: hartm...@debian.org

name: krb5-appl
URL: http://web.mit.edu/kerberos/dist/krb5-appl
License: MIT Kerberos license 
(roughly MIT license plus a requirement that if you modify the
software you must mark it as modified)
description: Contains fairly ancient versions of telnetd, ftpd, rsh and
rlogin that support Kerberos authentication

Up until the upcoming Kerberos 1.8 release, these applications were part
of the main krb5 tree.  They are kind of old and crufty, but attempts to
kill them off have met with users (and Debian users) who say they are
still valuable in certain environments.  Reasons cited include that the
code base is simpler than things like ssh, it works and is in use, etc.
My belief that the security of the rsh and rlogin programs is quite
good, although the telnet and telnetd are well below current security
standards.

However upstream krb5 doesn't want to maintain the applicatinos as part
of the main source tree.  So, they are being split out.  Since Debian
users still want them, I'm going to package them.  They've been in
Debian for years already, so I think this should not be a problem.

To look at the WIP packages see
git://git.debian.org/git/pkg-k5-afs/debian-krb5-appl.git


pgpzgsy54Ey9T.pgp
Description: PGP signature


Re: Bug#155583: radiusd-freeradius history and future

2003-11-13 Thread Sam Hartman
> "Matt" == Matt Zimmerman <[EMAIL PROTECTED]> writes:

Matt> I think a single "Will you be using NIS?" question would be
Matt> justified; this could provide defaults for md5 vs. crypt
Matt> passwords and setuid-ness of unix_chkpwd, and so those
Matt> questions could be suppressed by default.

I disagree.  Debian is sufficiently hard to install that developers of
security software I've asked to install it have been frustrated to the
point of not using it by the number of questions.  I believe adding questions 
about NIS would be inappropriate.

I'd rather see a solution where we have some nis support package that
makes unix_chkpwd setuid root when that support package is installed.




Re: Bug#155583: radiusd-freeradius history and future

2003-11-14 Thread Sam Hartman
> "Andreas" == Andreas Metzler <[EMAIL PROTECTED]> writes:

Andreas> Steve Langasek <[EMAIL PROTECTED]> wrote:
>> On Fri, Nov 14, 2003 at 11:37:45AM -0500, Matt Zimmerman wrote:
Andreas> [...]
>>> > I'd rather see a solution where we have some nis support
>>> package that > makes unix_chkpwd setuid root when that support
>>> package is installed.

>>> This would be even better.

>> Yes, that doesn't sound like a bad solution.

Andreas> The package-name is nis, but afaict the only possible
Andreas> solutions for this would reqire nis to use
Andreas> dpkg-statoveride, whis is imho ugly.  cu andreas

I think dpkg-statoverride is not too bad in this case.  I'll talk to
the nis package maintainer and see if that's acceptable.  If not, nis
could install some flag file.  The unix_chkpwd could start with root
privs, chuck for this flag file with a hard coded path and drop to
shadow if the flag file does not exist.

--Sam




Re: Bits from the RM

2003-12-02 Thread Sam Hartman
> "aj" == Anthony Towns  writes:

aj> or overloaded with work, or, for that matter, fixing compromised Debian
aj> servers -- do you think it's desirable and possible to:

aj> * for confirmed bugs with a known fix, upload a fixed package
aj>   within a day or two of the patch been sent to the bug log

No, I don't think it is always desirable to do this and certainly my
maintinance style doesn't work well with this methodology.  The
problem is there is a fairly high fixed cost to building, testing and
doing release management for a package.  It takes me about an
afternoon to do a PAM or OpenAFS release even if I change one line.
OK, for a one line change I can probably get that down to two hours or
so.

It's a lot easier for me if I batch bugs together and if I did not do
so, I'd be even more behind than I already am.

I certainly think that expediting package uploads for RC bugs is a
critical responsibility I as a maintainer have.


But even if someone else claims to have tested a bug, I'm going to be
the one signing the package; I'm taking responsibility.  So I must
spend the time necessary to understand the fix, confirm the fix and do
the release engineering cruft I do for every release.

Clearly this can be taken too far; pam is an excellent example of a
package where I've let things slip enough that I'm having difficulty
digging myself out of the hole.

But I think dealing with normal bugs with confirmed fixes in a month
or two is much more reasonable than a day or two.  I'd feel
differently if Debian was my primary job or if I found a style of
maintaining packages that worked well for me with this goal.





Re: New maintainer behaviour with NMU and LogJam's hijacking

2002-11-29 Thread Sam Hartman
> "Christian" == Christian Surchi <[EMAIL PROTECTED]> writes:


Christian> Ari wrote to me in the end of october to ask me about
Christian> my intention about logjam packaging. I had an enormous
Christian> backlog and I could not be able to reply. Then he filed
Christian> a wishlist bug report (#166993) for the new upstream
Christian> release for logjam (4.0.0). Upstream web site
Christian> (http://logjam.danga.com) reports that 4.0.0 is
Christian> released on 29 Oct 2002.  Bug report was sent on 29 Oct
Christian> 2002 (!).

Christian> On 17 Nov 2002 Ari made a NMU for logjam
Christian> 4.0.0+cvs.2002.11.17 and another one a few days after
Christian> that date, IIRC, without a note to me.  I was handling
Christian> bugs for logjam, as you can see in BTS (#165281). Build
Christian> failure reported by Junichi Uekawa in that bug was
Christian> actually a libcurl-dev bug (#169654). I reported and
Christian> maintainer closed with an upload.

So, honestly after reading your message, I'm not quite sure what
you're complaining about.

If you're complaining that the NMU was handled improperly and that the
communication/policy should have been better, then it seems you're
right.  The person performing the NMU has already indicated that they
are sorry they didn't follow policy and so unless you can give
evidence that you think they will continue to fail to follow policy in
future then it seems like an honest mistake.

If you're arguing that the NMU shouldn't have been done then I think I
disagree.  Based on the evidence that you presented, our users and the
free software community were better served by having that package
updated.  And frankly no response from October 29 to mid November
seems like enough time that an NMU is reasonable.  Yes, the NMU should
have been to delayed; yes you should have been contacted.  But other
than your feelings getting hurt, what was the actual harm done to
Debian?

And yes, your feelings getting hurt is a real concern; it sucks to be
a volunteer and to have someone disrespect your work.  But
communication problems do happen and it seems reasonable to treat them
as communications problems and move on with life.




Re: reliable streams over UDP

2002-11-29 Thread Sam Hartman
> "Russell" == Russell Coker <[EMAIL PROTECTED]> writes:

Russell> Do we have a library in Debian that provides reliable
Russell> stream based communication over UDP?


librx from openafs provides this functionality; it may be somewhat
more complexity than you are looking for.




Re: New maintainer behaviour with NMU and LogJam's hijacking

2002-11-30 Thread Sam Hartman
> "Ari" == Ari Pollak <[EMAIL PROTECTED]> writes:

>> IIRC Ari has caused upset with NMUs before; xscreensaver, I
>> believe.  (I express no opinion about whether that upload was a
>> good idea or not.)

Ari> Didn't you sponsor the upload?


Um, so?  While yes the sponsor is at fault, it seems that you should
also take responsibility for your actions.

It seems that after that incident you would have had significant
desire to learn and follow the NMU policy.

So, I'd like to formally ask: have you read and do you plan to follow
generally accepted procedures for future NMUs?




Re: New maintainer behaviour with NMU and LogJam's hijacking

2002-11-30 Thread Sam Hartman
> "Ari" == Ari Pollak <[EMAIL PROTECTED]> writes:

Ari> I had been taking the full brunt of the responsibility for
Ari> the xscreensaver NMU, but since I was a pre-NM at the time
Ari> and sponsors of uploads are supposed to follow Debian policy
Ari> as well, he ended up taking most of the responsibility. This
Ari> was a similar situation; however, I felt it was necessary at
Ari> the time considering the circumstances of the package having
Ari> not being updated in over a year and a half despite new
Ari> versions being out which fixed bugs, and the lack of any
Ari> response from the package maintainer until after the NMU. I
Ari> still doubt that I would have gotten any response from the
Ari> maintainer at all had it not been for the actual package
Ari> upload.

Do you specifically agree it was wrong in this instance to upload
directly to incoming and not to a delayed queue?

In future will you agree to include NMU patches in a bug report to the
patch and unless there is a strong reason to do otherwise to upload to
a delayed queue?

I'm asking you these things in hope of making sure we're on the same
page.  If you don't agree then I'll try to convince you that you're
wrong, but if we are both understanding the best practice the same
way, then there's really no more to say.




Re: Kernel update for Debian 3.0/i386

2002-12-09 Thread Sam Hartman
Won't removing kernel-source-2.4.18 create a problem for other arches?




Re: debian-kerberos mailing list down?

2002-12-10 Thread Sam Hartman
Yes, the machine had a bad disk crash and I restored the other
services but failed to get debian-kerberos working.  IT is up now.




Re: /run/, resolvconf and read-only root

2003-04-27 Thread Sam Hartman
Hi.

I noticed that in order to implement your read-only root proposal, you
propose to modify the pam package.


I'm not really sure I see the justification for read-only /.  I can
see several possible justifications and some of the possible goals
conflict.

Until you get general consensus on a specific goal, I'm unlikely to
accept such changes if they are submitted to me.  As a maintainer I
want to be able to look at some statement and answer the following
questions:

1) Why are people mounting root read-only?

2) When root is read-only, what information is variable and what information  
should be immutable?  Why is this a reasonable categorization?

3)  What information needs to go in /var vs /run?


This message not withstanding, I will follow any related changes to
policy to the best of my ability.




Re: Bug#191037: /run/, resolvconf and read-only root

2003-04-28 Thread Sam Hartman
>>>>> "Jamie" == Jamie Wilkinson <[EMAIL PROTECTED]> writes:

Jamie> This one time, at band camp, Sam Hartman wrote:
>> Until you get general consensus on a specific goal, I'm
>> unlikely to accept such changes if they are submitted to me.
>> As a maintainer I want to be able to look at some statement and
>> answer the following questions:

Jamie> Hi Sam,

Jamie> I've just filed the bug with my patch to pam.  My goal is
Jamie> not specifically a read-only root (although that may be a
Jamie> useful by-product of it) but just to remove any program
Jamie> state out of /etc.  It is my firm belief that programs
Jamie> should not be writing anything to /etc.

I'm not sure I agree with this goal.  I don't specifically disagree
yet, but what you are proposing is a change in UNix semantics.  If the
rest of the world goes along with this, I will, but I'm somewhat
unconvinced it is the right direction.

I'd certainly feel better if there were a broader consensus than just
Debian before moving in this direction.


So, for now I'll sit back and see what other people do about /run.




Re: /run/, resolvconf and read-only root

2003-04-28 Thread Sam Hartman
OK, I think my worst fears are realized.  You do actually want to
solve all the goals I could have imagined you possibly wanting to try
try and solve.

I think I am very likely to wait until there is a policy change or at
least text that would be good guidelines as a policy change before
implementing.  The thread seems rather long, and my initial concern is
that this seems somewhat under thought through.




Re: kernel-{image,headers} package bloat breaks module builders

2001-04-24 Thread Sam Hartman
[I'm responding to Herbert directly to draw attention to this question
and make sure I get a response from him.  I have also read the rest of
this thread even though I am responding to a fairly early message.  ]


I'm approaching this as the maintainer of the openafs package, which
has a kernel module.  I suspect other module package maintainers
(PCMCIA, ALSA, etc) will have similar issues.

I am concerned about the work that this new kernel image organization
may create as well as the additional load on the mirrors potentially
placed by this scheme.  My assumption is that there will be different
modversions for each kernel configuration and that as such, I will
need to build binary modules packages against each kernel image.  If
you can guarantee that this is not the case and will not be the case,
then my module-specific concerns go away.  Even if you accept that the
bandwith usage/mirror load/distribution size increase simply from the
kernel packages is acceptable, it is not clear that multiplying the
number of packages (and thus to an extent some size multiplier) by the
number of module packages is also acceptable.  Assuming that the
number of module packages no in the kernel continues to increase,
which I think likely, the problem will only get worse over time.

I also am concerned about the amount of work this creates for module
maintainers.  Now I have to rebuild a lot of packages both when my
upstream sources change and when the kernel images change.  I had to
do this already, but the effort involved is significantly less.  I now
have to look and make sure the set of images hasn't changed, retrieve
the sources (kernel headers packages don't look enough like source
trees to satisfy make-kpkg), configure the kernel trees, which
involves grabbing the configs from somewhere (either kernel images or
the source package) and build modules for each kernel image.


The binary modules packages (alsa and pcmcia) especially although I
haven't been doing much better of late tend to have an annoying
history of not being in sync with the kernel.  I'm concerned that this
could make things worse.  Personally as a user (who has used stock
kernel images wherever possible) I'd much rather have modules packages
that work than lots of kernel images to choose from.




Re: kernel-{image,headers} package bloat breaks module builders

2001-04-25 Thread Sam Hartman
> "Herbert" == Herbert Xu <[EMAIL PROTECTED]> writes:


Herbert> I doubt the increase is going to be that significant.
Herbert> Since most of these will eventually become part of the
Herbert> mainstream kernel or get dropped.

I hope that is not actually the trend we see.

>> image.

Herbert> If your module source is properly constructed, you should
Herbert> be able to get away with a build-depends on the

No, I can't.  kernel-package, which is the exported public interface
for building modules on Debian does not support this.  Convince Manoj
to support kernel-headers packages for modules and you have a much
more reasonable argument.




Referring what kernel-images to build to the technical committee?

2001-04-25 Thread Sam Hartman

[cc list is an attempt at stakeholders for this issue.  If I missed
people, I'm sorry.  If I annoyed people by ccing them even though they
read the list, well I'm sorry too, but there are a fair number of
people who tend to want to be explicitly cc'd when an issue pertains
to them.]



Summary: Herbert has started building 8 different flavors of
kernel-image for i386.  These flavors correspond to CPU type; for
example there is an appropriate kernel for people with 386 machines to
run and an appropriate kernel for people with Athlon machines to run.
Several concerns have been brought up on debian-devel, and while I
believe that discussion has identified the tradeoffs involved, I do
not believe we have reached consensus on a direction to follow.

While Herbert is the maintainer of the kernel image for i386,I believe
the implications of this issue extend far beyond his packages and thus
this is an issue where the interests of different developers may come
into conflict.  Herbert's changes affect those who maintain module
packages like ALSA, PCMCIA, I2C and Openafs.  OSome have claimed these
decisions affect the installation by CDs by taking up a significant
chunk of a CD.  Concerns were raised about the bandwith and archive
space implications.

I believe that since debian-devel doesn't seem to be able to come to
consensus on this issue, we should refer the issue to a smaller group
than will fairly consider all the tradeoffs involved and come up with
a global direction for the project on this issue.  One concern I have
with Herbert's decision is that the i386 architecture is taking what
appears to be a different direction than other architectures.  I'd
rather have a global direction than have each architecture go off and
do their own thing.  Naturally, the tradeoffs may affect different
architcetures differently, so we may end up with a different set of
kernel images for each architecture, but the relative weights of the
tradeoffs and our overall goals could be decided globally.  I propose
the technical committee as an appropriate form to decide on this
issue, but I am open to other fora.

I'd like to summarize my understanding of the tradeoffs that we have
identified in the debian-devel discussion so that if we do turn this
issue over to the committee, they will know what concerns we have
already identified.  Please add to the following list if I have missed
something.  Note that I'm not trying to weight the tradeoffs here; I'm
trying to be fairly objective.  Comments of the form "That's not
important," are not appropriate at this time.  cThe goal is to
identify the issues and let whatever group we send this to evaluate
the weights of the issues.  Presumably such a group would ask for
public comment on the weightings if they would find that comment
useful.

performance: By having images optimized for each processor on i386
users should see better performance.  I don't believe performance
numbers were quantified in the discussion but quantifying performance
is probably important to evaluating this tradeoff.

Encouraging stock kernel use:  By having appropriate stock kernels
that meet people's needs we may encourage users to use the kernels.
This provides better/more consistent testing of our configurationas
well as easier upgrade.  Herbert indicated that previosly he did not
even use his own kernel image packages because they were not
optmized.  This should be considered separately from performance,
because even if there is not a significant performance win, if many
more users would use the stock kernel, the advantages  of doing so
might justify the change.  That is, the perception of whether
optimized kernels are needed influences whether people use them and
the value of this perception may  be differently weighted than the
actual reality of the performance.

Should build custom:  Some argumed that users should build a custom
kernel and the distribution was doing them a disservice by trying to
provide kernels that met their needs.

Archive Size:  The more kernel images we have, the more space it takes
up in the archive.

CD Size:  Craig (I believe) claimed that the new kernel images take up
a significant fraction of a CD.  If the number of CDs a typical users
actually has to look at gets too big, then Debian will be an
inconvenient distribution.  It's all fine that have lots of CDs with
optional software on them that you don't need, but if you will need a
CD of kernels as well as a base CD, (or if the base CD overflows
because of kernels), then that could suck.  People already complain we
need too many floppies to boot;  they would probably be more upset if
you need more than 1 CD in typical cases.

Bandwith:  So, moving these kernel images around takes up network
resources.   Consider resources used to upload the image,  resources
used to mirror the images resources used to download the images.  I
don't actually think resources  used to download the images changes
much, but we should evaluate all network re

RFC: Thoughts on building modules

2001-04-25 Thread Sam Hartman


One thing that strikes me as excellent about Debian is the build
system.  The autobuilders and tools make it very likely that package
builds are reproducible and a variety of tools like debhelper make it
easier to do the "right thing" in many circumstances than doing
something wrong.  I've come away from this experience convinced that
it is very important to have good tools for common tasks.

Sadly, I don't think building module packages for modules not in the
kernel lives up to the high standards of the rest of the Debian build
process.,especially for  module packages to work with stock kernels
and be uploaded to the Debian archive.  These concerns are mostly
technical and are to a great extent independent of 
how many kernel images we have, although obviously if there are a
lot of kernel images then autimation is even more important.

Manoj's kernel package provides an excellent tool for building custom
kernels for end users.  It also provides an adequate tool for end
users building modules for their kernels.  The modules are shipped
generally as tarballs that are unpacked into /usr/src/modules.  Then,
kernel-package generates .debs for each of these modules when
make-kpkg modules_image is run. The make-kpkg modules target is
intended for maintainers and is somewhat useful.  However, it has
several shortcomings for official modules package.  Because it is run
out of make-kpkg it is intended to build multiple modules for a single
kernel version.  It turns out what maintainers probably want is to
build multiple versions of the same module for different kernel
versions at once.  Also, module maintainers probably want to build on
multiple architectures.  With make-kpkg this means having an account
on multiple architectures.  It would be really nice to be able to take
advantage of the buildds to build modules for other architectures just
as the build non-module packages.



So, having established that we have some work to do, let's step back
and think about what is going on when you try and build modules.  Each
architecture has a set of kernel-images that are current.  Users
running a stock kernel are expected to install one of these images.
You as a module maintainer want to make it so that users can install a
version of your module for the stock kernel image  they have
selected.  So, for each architecture you want to find out what the
current set of stock kernel images are.  Normally, there will be at
least one old kernel version supported and one or more new kernel
versions; there may be multiple flavors/subarchitectures of each
kernel version.  There is currently no good way to find out what
kernel images are available.  You could grep through the packages
file, but that doesn't exclude images awaiting removal or images for
special purposes that are not stock images.

Assuming you do manage to find out what stock images exist, you need
to build your module for them.  There are roughly two approaches you
could take: using kernel headers or using kernel source.  Apparently
some/many modules require a kernel source tree; a kernel headers tree
is insufficient.  I don't actually know how common this is; I believe
the module I maintain could successfully build against a kernel
headers package if I tried.  If you are using make-kpkg to build your
modules then you must have a source tree.  For i386 apparently the
preferred way (according to kernel-image-i386 maintainer) is to use
kernel headers.  That may work fine for i386, but other architectures
(sparc and m68k were checked) only provide one kernel headers package,
not one kernel headers per flavor.  This is problematic because at
least according to the i386 kernel-image maintainer, we cannot
guarantee that modversions symbols will be the same between flavors,
so we cannot guarantee that modules built against one set of kernel
headers will work with other kernel flavors.


So, let's assume you want source for your kernel.  On i386 you're all
set; you basically just download the kernel source and build against
it.  On other platforms, it is more problematic.  For Sparc, there are
patches applied to the kernel  in the kernel-image-2.2-sparc package
for example.   PPC, m68k and ARM appear to actually generate
kernel-patch  packages for their architectures although I have seen
them get out of sync with the kernel images available in the archive.
Normally these patches don't seem to affect interfaces my modules care
about, so I can be sloppy and just download the kernel source
package.  However,  if we are talking about reproducible builds,
these patches matter, or at least an assertion that they will never
affect module builds.

There's also the issue of  dependencies.  When building most packages
one person is driving the need for rebuilds by changing the source
package.  Sometimes some library or policy will change  and you'll
have to rebuild even though there are not source changes you would
like to make.  However this is fairly rare, and tends not to be
arch

Re: RFC: Thoughts on building modules

2001-04-26 Thread Sam Hartman
> "Herbert" == Herbert Xu <[EMAIL PROTECTED]> writes:


Herbert> BTW, this is how the kernel images are organised on
Herbert> alpha/i386/sparc.

This is misleading.  The kernel-image-*-arch packages are much simpler
because they do not depend both on a kernel source package and on a
module deb package.  Also, note that this maximizes work for the
module maintainer, which is a valid thing to do, although I'd like to
note that we seem to get a much better balance for other porting
issues.  Finally, it means that I cannot release a module for a new
arch without package-installation access to that arch.  It's my
understanding that source-only uploads only work if there is an
existing binary package that depends on the source package being
installed, which is not the case for new package source uploads.




Formal request for review: [Sam Hartman ] Referring what kernel-images to build to the technical committee?

2001-04-26 Thread Sam Hartman
Hi.  I posted the following message to debian-devel last night and
have received agreement with the summary and apparently (it was not
explicitly stated) with the committee as a forum from Craig and
Herbert.  Thus I'd like to ask you to look at this issue.  There has
been some other discussion in the thread that the following message
starts and others have brought up some issues I did not cover in my
summary.  I recommend reading this discussion.


If there are any administrative hoops I need to jump through please
let me know.

--- Start of forwarded message ---
Resent-Date: Wed, 25 Apr 2001 20:30:46 -0400 (EDT)
Date: Wed, 25 Apr 2001 20:30:31 -0400 (EDT)
Message-Id: <[EMAIL PROTECTED]>
To: debian-devel@lists.debian.org
CC: [EMAIL PROTECTED],
[EMAIL PROTECTED] (module package maintainers),
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED] (kernel-image-i386 maintainer),
[EMAIL PROTECTED] (concerned about package size)
Subject: Referring what kernel-images to build to the technical committee?
Reply-to: debian-devel@lists.debian.org
From: Sam Hartman <[EMAIL PROTECTED]>
Resent-Message-ID: <[EMAIL PROTECTED]>
Resent-From: debian-devel@lists.debian.org
Resent-Sender: [EMAIL PROTECTED]


[cc list is an attempt at stakeholders for this issue.  If I missed
people, I'm sorry.  If I annoyed people by ccing them even though they
read the list, well I'm sorry too, but there are a fair number of
people who tend to want to be explicitly cc'd when an issue pertains
to them.]



Summary: Herbert has started building 8 different flavors of
kernel-image for i386.  These flavors correspond to CPU type; for
example there is an appropriate kernel for people with 386 machines to
run and an appropriate kernel for people with Athlon machines to run.
Several concerns have been brought up on debian-devel, and while I
believe that discussion has identified the tradeoffs involved, I do
not believe we have reached consensus on a direction to follow.

While Herbert is the maintainer of the kernel image for i386,I believe
the implications of this issue extend far beyond his packages and thus
this is an issue where the interests of different developers may come
into conflict.  Herbert's changes affect those who maintain module
packages like ALSA, PCMCIA, I2C and Openafs.  OSome have claimed these
decisions affect the installation by CDs by taking up a significant
chunk of a CD.  Concerns were raised about the bandwith and archive
space implications.

I believe that since debian-devel doesn't seem to be able to come to
consensus on this issue, we should refer the issue to a smaller group
than will fairly consider all the tradeoffs involved and come up with
a global direction for the project on this issue.  One concern I have
with Herbert's decision is that the i386 architecture is taking what
appears to be a different direction than other architectures.  I'd
rather have a global direction than have each architecture go off and
do their own thing.  Naturally, the tradeoffs may affect different
architcetures differently, so we may end up with a different set of
kernel images for each architecture, but the relative weights of the
tradeoffs and our overall goals could be decided globally.  I propose
the technical committee as an appropriate form to decide on this
issue, but I am open to other fora.

I'd like to summarize my understanding of the tradeoffs that we have
identified in the debian-devel discussion so that if we do turn this
issue over to the committee, they will know what concerns we have
already identified.  Please add to the following list if I have missed
something.  Note that I'm not trying to weight the tradeoffs here; I'm
trying to be fairly objective.  Comments of the form "That's not
important," are not appropriate at this time.  cThe goal is to
identify the issues and let whatever group we send this to evaluate
the weights of the issues.  Presumably such a group would ask for
public comment on the weightings if they would find that comment
useful.

performance: By having images optimized for each processor on i386
users should see better performance.  I don't believe performance
numbers were quantified in the discussion but quantifying performance
is probably important to evaluating this tradeoff.

Encouraging stock kernel use:  By having appropriate stock kernels
that meet people's needs we may encourage users to use the kernels.
This provides better/more consistent testing of our configurationas
well as easier upgrade.  Herbert indicated that previosly he did not
even use his own kernel image packages because they were not
optmized.  This should be considered separately from performance,
because even if there is not a significant performance win, if many
more users would use the stock kernel, the advantages  of doing so
might justify the change.  That is, the perceptio

Formal request for review: [Sam Hartman ] Referring what kernel-images to build to the technical committee?

2001-04-26 Thread Sam Hartman
Hi.  I posted the following message to debian-devel last night and
have received agreement with the summary and apparently (it was not
explicitly stated) with the committee as a forum from Craig and
Herbert.  Thus I'd like to ask you to look at this issue.  There has
been some other discussion in the thread that the following message
starts and others have brought up some issues I did not cover in my
summary.  I recommend reading this discussion.


If there are any administrative hoops I need to jump through please
let me know.

--- Start of forwarded message ---
Resent-Date: Wed, 25 Apr 2001 20:30:46 -0400 (EDT)
Date: Wed, 25 Apr 2001 20:30:31 -0400 (EDT)
Message-Id: <[EMAIL PROTECTED]>
To: debian-devel@lists.debian.org
CC: [EMAIL PROTECTED],
[EMAIL PROTECTED] (module package maintainers),
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED] (kernel-image-i386 maintainer),
[EMAIL PROTECTED] (concerned about package size)
Subject: Referring what kernel-images to build to the technical committee?
Reply-to: debian-devel@lists.debian.org
From: Sam Hartman <[EMAIL PROTECTED]>
Resent-Message-ID: <[EMAIL PROTECTED]>
Resent-From: debian-devel@lists.debian.org
Resent-Sender: [EMAIL PROTECTED]


[cc list is an attempt at stakeholders for this issue.  If I missed
people, I'm sorry.  If I annoyed people by ccing them even though they
read the list, well I'm sorry too, but there are a fair number of
people who tend to want to be explicitly cc'd when an issue pertains
to them.]



Summary: Herbert has started building 8 different flavors of
kernel-image for i386.  These flavors correspond to CPU type; for
example there is an appropriate kernel for people with 386 machines to
run and an appropriate kernel for people with Athlon machines to run.
Several concerns have been brought up on debian-devel, and while I
believe that discussion has identified the tradeoffs involved, I do
not believe we have reached consensus on a direction to follow.

While Herbert is the maintainer of the kernel image for i386,I believe
the implications of this issue extend far beyond his packages and thus
this is an issue where the interests of different developers may come
into conflict.  Herbert's changes affect those who maintain module
packages like ALSA, PCMCIA, I2C and Openafs.  OSome have claimed these
decisions affect the installation by CDs by taking up a significant
chunk of a CD.  Concerns were raised about the bandwith and archive
space implications.

I believe that since debian-devel doesn't seem to be able to come to
consensus on this issue, we should refer the issue to a smaller group
than will fairly consider all the tradeoffs involved and come up with
a global direction for the project on this issue.  One concern I have
with Herbert's decision is that the i386 architecture is taking what
appears to be a different direction than other architectures.  I'd
rather have a global direction than have each architecture go off and
do their own thing.  Naturally, the tradeoffs may affect different
architcetures differently, so we may end up with a different set of
kernel images for each architecture, but the relative weights of the
tradeoffs and our overall goals could be decided globally.  I propose
the technical committee as an appropriate form to decide on this
issue, but I am open to other fora.

I'd like to summarize my understanding of the tradeoffs that we have
identified in the debian-devel discussion so that if we do turn this
issue over to the committee, they will know what concerns we have
already identified.  Please add to the following list if I have missed
something.  Note that I'm not trying to weight the tradeoffs here; I'm
trying to be fairly objective.  Comments of the form "That's not
important," are not appropriate at this time.  cThe goal is to
identify the issues and let whatever group we send this to evaluate
the weights of the issues.  Presumably such a group would ask for
public comment on the weightings if they would find that comment
useful.

performance: By having images optimized for each processor on i386
users should see better performance.  I don't believe performance
numbers were quantified in the discussion but quantifying performance
is probably important to evaluating this tradeoff.

Encouraging stock kernel use:  By having appropriate stock kernels
that meet people's needs we may encourage users to use the kernels.
This provides better/more consistent testing of our configurationas
well as easier upgrade.  Herbert indicated that previosly he did not
even use his own kernel image packages because they were not
optmized.  This should be considered separately from performance,
because even if there is not a significant performance win, if many
more users would use the stock kernel, the advantages  of doing so
might justify the change.  That is, the perceptio

Re: RFC: Thoughts on building modules

2001-04-26 Thread Sam Hartman
>>>>> "Herbert" == Herbert Xu <[EMAIL PROTECTED]> writes:

Herbert> Sam Hartman <[EMAIL PROTECTED]> wrote:
>> This is misleading.  The kernel-image-*-arch packages are much
>> simpler because they do not depend both on a kernel source
>> package and on a module deb package.  Also, note that this
>> maximizes work for the

Herbert> How does that make it more complex?  

It has two sets of factors driving changes.  Tools designed to make
this maintaince process easier will be more complex than tools
designed to make maintaining kernel source packages for a single arch
easy.  Well, at least you have a complexity vs manual effort tradeoff.
I argue that currently the tradeoff is way too far on the side of
manual effort and that  we need more complexity.

Note that all of the solutions I discussed involved this complexity.
I was objecting to your implication that setting up module source
packages was as simple as setting up arch-specific kernel image
packages, not saying the complexity was unnecessary.

>> issues.  Finally, it means that I cannot release a module for a
>> new arch without package-installation access to that arch.
>> It's my understanding that source-only uploads only work if
>> there is an existing binary package that depends on the source
>> package being installed, which is not the case for new package
>> source uploads.

Herbert> Well, kernels/modules have traditionally required this
Herbert> kind of access.  There's no way around it I'm afraid.  --


I'd buy that if all three potential directions I presented in my first
message weren't ways around this.  Module packages really aren't that
different from normal packages; there is a lot of kernel code that is
not arch specific.  I agree that kernel packages are arch specific and
you aren't going to get away from that.  However, my point is
partially that module packages have different constraints that kernel
packages.




Re: openldap question and possible feature conflict

2001-04-27 Thread Sam Hartman
> "Brian" == Brian May <[EMAIL PROTECTED]> writes:

Brian> I have got a bug report #95246 requesting Heimdal be
Brian> compiled against openldap2. This would enable being able to
Brian> store the Kerberos database in the openldap database. All
Brian> data is stored in LDAP encrypted, so even if somebody
Brian> accesses the openldap database, the Kerberos data is not
Brian> compromised.

Please don't do this.  The performance is fairly bad and the security
implications are not so great. (My comments on performance come from
Joda forwarded through Assar).  For discussions of security, please
see discussion on kerberos@mit.edu (archived off
http://web.mit.edu/kerberos) and minutes of the last two Kerberos
working group meetings at IETF.

If you do this, please do not store  keys in the database.




Re: Proposing task-debian

2001-04-30 Thread Sam Hartman
> "Joey" == Joey Hess <[EMAIL PROTECTED]> writes:

Joey> If these tools become widly enough accepted that we think
Joey> everyone should have them available by default, we can make
Joey> them standard priority.

In the new universe (debbootstrap, tasksel, etc) where a user might
never run dselect, what makes sure that in the default configuration,
standard priority packages get installed?  I seem to be running into a
lot of systems I install that end up without ed or emacs20.  It's my
understanding that if I pick the defaults I really ought to end up
with these.
[I'm not interested in a flamewar about whether emacs20 should be standard; 
currently it is.]




Re: postgresql and libssl - Bug#95146

2001-05-01 Thread Sam Hartman
> "Petr" == Petr Cech <[EMAIL PROTECTED]> writes:


>> Since this question is currently being referred to legal
>> advice, do you want me to move postgresql into non-us, which
>> will force any packages depending on it into non-us too, or
>> should I leave it alone pending resolution of the legal
>> question?

Petr> oohhh. it the crypto really necessary? I think, that
Petr> building without libssl installed fix it

Yes, for most applications, security is really necessary.  For most
security models, that does mean crypto.  We should be encouraging
maintainers to help Debian be secure, even if that means moving many
packages into non-us.




Re: dm management of wm listings (kdm/gdm/etc..)

2001-05-03 Thread Sam Hartman
> "Ivan" == Ivan E Moore <[EMAIL PROTECTED]> writes:

Ivan>   Solution?: create a program (update-dm?) that would pull
Ivan> the current list of window/session-managers installed on the
Ivan> system and build the appropriate config files for whichever

You should probably consider whether this program ought to simply be
update-menu.  Is there any reason not to have a menu of window
managers?  You could then have the method for the DM only pull window
managers.  Note this is a serious question; there may well be many
good reasons this is a bad idea.




Re: build depends on kernel-headers

2001-05-06 Thread Sam Hartman
> "Manoj" == Manoj Srivastava <[EMAIL PROTECTED]> writes:

>>> "Aaron" == Aaron Lehmann <[EMAIL PROTECTED]> writes:
Aaron> So you're saying it's better to hardcode syscall numbers
Aaron> and stuff than using the kernel headers? Sre...

Manoj>  We already have a process for packages that actually
Manoj> do need kernel headers, and are thus dependent on
Manoj> particular kernel versions. 

We do?  please explain what it is.  Herbert produces kernel headers
packages for all flavors of kernels he produces.  I do not believe the
other arches do this.




Re: build depends on kernel-headers

2001-05-06 Thread Sam Hartman
>>>>> "Herbert" == Herbert Xu <[EMAIL PROTECTED]> writes:

Herbert> Sam Hartman <[EMAIL PROTECTED]> wrote:
>> We do?  please explain what it is.  Herbert produces kernel
>> headers packages for all flavors of kernels he produces.  I do
>> not believe the other arches do this.

Herbert> You obviously weren't listening to me when I explained
Herbert> this in the bloat thread.  If you aren't compiling a
Herbert> kernel module, then the flavoued kernel headers packages
Herbert> do not exist for you, period.  

I thought Manoj's comments applied to modules.




Re: build depends on kernel-headers

2001-05-07 Thread Sam Hartman
> "Herbert" == Herbert Xu <[EMAIL PROTECTED]> writes:


Herbert> I won't look at all of them as this is really the
Herbert> upstream maintainer's job.

This brings up an interesting point.  While we should work with
upstream maintainers to fix these problems, we should also try to
avoid making these programs harder to build on Debian than other
distributions.  If other distributions are still making headers
available in such a way that existing software builds, and we do not,
then we make lives harder for both our users and maintainers.  Yes, it
may be more correct, but we need to be carefule not to correct our
users into frustration.  Managing careful transition plans is also an
important part of correctness.




RFC: Potential solution for module building

2001-05-07 Thread Sam Hartman


So, a week or so ago, I asked for comments on some problems I've been
having with the Debian kernel modules build system for modules not in
the Linux source tree.  I'm only dealing with modules for upload to
Debian.  The make-kpkg solution seems to work for individuals building
modules for their own systems, and any areas where it does not work
can probably be addressed with kernel-package bugs.  

I've received a few comments and have also had several informative
side discussions on the issue on IRC and with a few people in person.
I believe I'm ready to  look at proposing a solution to the problem.

First, here is what I want to accomplish:

I want to provide a mechanism for building binary modules for upload
to Debian in an automated manner.  The set of kernel images to build
for needs to be determined by the architecture maintainers.  For
Sparc, modversions are not used so you can probably build one sparc
and one sparc64 module.  For i386, you need to build a module for each
kernel image flavor.  

Ben wants architecture maintainers to be able to build binary
modules to go along with their kernel images.  Herbert implied he'd
rather see module maintainers set up source packages for each
architecture.  I tend to be somewhere in between.   So, it seems that
a solution that allows architecture maintainers to build modules and
that allows module maintainers to build modules would be preferable.
IN most cases you would choose on a module-by-module basis whether it
would be built by the architecture maintainer or by the module maintainer.


I propose creating a set of tools--say call them debmodbuilder--to
help in building modules.  The primary tool would be a script to take
a modules config file and an image-set config  file and to build
modules.

The modules config file would specify which modules to build and which
packages contained the source tarball.  This file would be located in
the debian directory of source packages.  Architecture kernel-image
maintainers could add a module config file to their kernel-image
packages to say what modules to build.  Module maintainers who
maintain modules not build by the kernel-image maintainers could
include trivial module config files in the debian directory of their source
package to identify that their module should be built.  A sample of
what a module config file might look like is included near the bottom
of the message.

The image-set config file would specify which kernel images to
build against.  For each image you would specify the kernel
version and subarchitecture.  For example, Herbert's 386 kernel might
specify a version of 2.4.3 and a subarchitecture of 386.  The
subarchitecture is part of the module package name, but not of the
module installation location under /lib/modules.  The kernel config
file would also specify which set of kernel headers to use; this is
required because for some architectures like sparc, kernel headers are
reused for multiple subarchitectures.  This file would be included in
the debian directory of the architecture-specific kernel-image source
package.  It would also be installed as discussed shortly.  A sample
of what this file might look like is included at the end of the
message. 

In addition to potentially using the tool to help build modules, the
kernel image source package would also include a binary package that
depended on all the appropriate  kernel headers and included a copy of
the kernel config file for module builders to use.


This would require kernel image maintainers for architectures with
binary modules to create such kernel image configuration tool.  I'd be
happy to work with people  to help build automation for this into
existing kernel image source packages.  Then, kernel image maintainers
could build any modules they want to build for their arch, as well as
making it is for module builders to build for their arch.

I'd also be happy to write the module building tools:  I envision
tools to:

* Build the module debs given a module and image-set config file,
  integrating the built debs into debian/files.  This could be called
  from the debian/rules file for architecture-specific kernel-image
  source packages and from the debian/rules files for source packages
  that module maintainers maintain to build their modules.

* Generate appropriate build-depends  for module source packages given
  a module config file.  

* Generate depends: line for the binary package including the kernel
  config file given a image-set config file.

* Generate stanzas for debian/control given a image-set and module config
  file set.  I'm not sure this is useful, although it could allow you
  to get the binary line in your source  dsc file right.


Comments?  If I write these tools and they don't suck, will people be
willing to try using them?


Sample modules config file:

Module: openafs # untars into modules/openafs
Source-Package: openafs-modules-source 
TarFile: /usr/src/openafs.tar.gz #sources of module live here
Archi

Re: RFC: Potential solution for module building

2001-05-07 Thread Sam Hartman
>>>>> "Herbert" == Herbert Xu <[EMAIL PROTECTED]> writes:

Herbert> Sam Hartman <[EMAIL PROTECTED]> wrote:
>> for needs to be determined by the architecture maintainers.
>> For Sparc, modversions are not used so you can probably build
>> one sparc and one sparc64 module.  For i386, you need to build
>> a module for each

Herbert> I haven't read the whole message yet.  But I'd just like
Herbert> say that modversions is not the reason to compile modules
Herbert> for each kernel-image package.  Modversions help you to
Herbert> identify when you need to do that.  

Sure, agreed.  I was being sloppy.  Basically it's up to you as a
kernel-image maintainer to decide what sets of modules you need to
build against.  Since we are looking for an automated solution, we're
going to have to be conservative and may end up building slightly more
modules than we strictly need, but we will at least have modules that work.




Re: build depends on kernel-headers

2001-05-08 Thread Sam Hartman
>>>>> "Herbert" == Herbert Xu <[EMAIL PROTECTED]> writes:

Herbert> Sam Hartman <[EMAIL PROTECTED]> wrote:
>> This brings up an interesting point.  While we should work with
>> upstream maintainers to fix these problems, we should also try
>> to avoid making these programs harder to build on Debian than
>> other distributions.  If other distributions are still making
>> headers available in such a way that existing software builds,
>> and we do not, then we make lives harder for both our users and
>> maintainers.  Yes, it may be more correct, but we need to be
>> carefule not to correct our users into frustration.  Managing
>> careful transition plans is also an important part of
>> correctness.

Herbert> This is not something that we're doing.  This is a
Herbert> decision taken by the upstream kernel maintainer(s). 

First, it wouldn't be the first time that we had to jump through extra
hoops to make upgrading easy simply because an upstream didn't do
their job right.  However, I don't think there's anything we can
really do in that part of the problem space.


We are making active decisions related to this problem.  Ben is
actively removing headers not used by libc6-dev; there may be other
things happening as well related to these issues.  If this has the net
effect that I as an end user find I can't build significant sets of
software on Debian without significant effort, but I can build the
same software on a distribution that isn't as agressive at being
correct with its libc, then we have not served our user community.  We
do need to encourage people to transition, but we do not want to do so
in a manner that causes people to get the impression that Debian is
less functional for their needs.





Re: build depends on kernel-headers

2001-05-08 Thread Sam Hartman
>>>>> "Manoj" == Manoj Srivastava <[EMAIL PROTECTED]> writes:

>>> "Sam" == Sam Hartman <[EMAIL PROTECTED]> writes:
>>>>> "Manoj" == Manoj Srivastava <[EMAIL PROTECTED]> writes:
>>>>> "Aaron" == Aaron Lehmann <[EMAIL PROTECTED]> writes:
Aaron> So you're saying it's better to hardcode syscall numbers
Aaron> and stuff than using the kernel headers? Sre...

Manoj> We already have a process for packages that actually do
Manoj> need kernel headers, and are thus dependent on particular
Manoj> kernel versions.

Sam> We do?  please explain what it is.

Manoj>  We call these packages kernel modules; and we have a
Manoj> process by which you inform make where the relevant kernel
Manoj> headers are to be found. make-kpkg automates that somewhat
Manoj> (and make-kpkg can be used for packages that are not
Manoj> kernel-modules, you know).

How do I use make-kpkg to build modules with a kernel headers package?
I don't see how to do this in the manual, and when I try obvious
things I get told that the kernel headers directory is not a kernel
source directory.  If you had said that we have a process for building
modules from kernel sources I'd agree with you, but currently I don't
think we have such a process for headers.




Re: Questions to testing/unstable

2001-05-08 Thread Sam Hartman
> "Henrique" == Henrique de Moraes Holschuh <[EMAIL PROTECTED]> writes:

Henrique> AFAIK, I cannot do that.  If I build against testing, I
Henrique> help the breakage by adding yet another package that
Henrique> depends on the outdated libraries that are in testing,
Henrique> therefore helping those libraries to be held instead of
Henrique> upgraded.  It's a positive feedback loop. Unless I
Henrique> misunderstand testing, obviously, and such loop does not
Henrique> exist.

Or your could do shared library versions correctly so both versions
can exist.  I realize it is hard, especially if your upstream is not
committed to multiple major versions/versioned symbols/whatever is
necessary, but it is the correct solution and you can certainly strive
for it.




Re: moving a package from non-US/main to main?

2001-09-02 Thread Sam Hartman
> "Marc" == Marc Haber <[EMAIL PROTECTED]> writes:

Marc> On Sun, 2 Sep 2001 22:49:00 +0200 (CEST), Santiago Vila
Marc> <[EMAIL PROTECTED]> wrote:
>> However, you can repackage the .orig.tar.gz source and remove
>> the non-US bits from it. Then you could upload both source and
>> binaries to main.

Marc> That would break the principle of pristine sources, though.

So, that's not a principle, it's a somewhat desirable goal.  For some
licenses it may be necessary, but there are many reasons you might
have to change the upstream tarball, including for example DFSG
problems with part of a program.


Marc> Can anybody confirm that CAST is not among the non-USable
Marc> offenses?


First, CAST is actually going to be less exportable than SHA.  CAST is
a crypto system family, SHA is a hash.

I think software that only uses SHA is likely not to fall under ECCN
5d002 or 5e002 of the US Commerce Control List and thus doesn't fall
under the annoying crypto stuff.  I.E. I suspect you could have stuck
the SHA only version in main, but need to stick SHA+CAST in non-us.



Marc> Greetings Marc

Marc> -- -- !! No courtesy
Marc> copies, please !! - Marc Haber | " Questions are the |
Marc> Mailadresse im Header Karlsruhe, Germany | Beginning of
Marc> Wisdom " | Fon: *49 721 966 32 15 Nordisch by Nature |
Marc> Lt. Worf, TNG "Rightful Heir" | Fax: *49 721 966 31 29


Marc> -- To UNSUBSCRIBE, email to
Marc> [EMAIL PROTECTED] with a subject of
Marc> "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Which versions of libraries are developers supposed to compile against?

2001-09-03 Thread Sam Hartman
> "Jules" == Jules Bean <[EMAIL PROTECTED]> writes:


Jules> This seems a step back from the old freeze procedure, where
Jules> you could upload to frozen (and, I assume, auto-builders
Jules> were building against frozen)

Well, once your library and all dependencies are frozen you can act as
before, uploading to frozen.  I assume that autobuilders will build
uploads for frozen parts of frozen, or at least we'll have lots of
problems if they do not.



But yes, our release manager has decided to trade off staggering the
freeze/giving optional/ extra more time against the flexibility of
library maintainers.  It is his job to make these calls and really I
think our users come out ahead on the new freeze policy.




Re: moving a package from non-US/main to main?

2001-09-03 Thread Sam Hartman
>>>>> "Marc" == Marc Haber <[EMAIL PROTECTED]> writes:

Marc> On 02 Sep 2001 23:18:56 -0400, Sam Hartman
Marc> <[EMAIL PROTECTED]>
Marc> wrote:
>>>>>>> "Marc" == Marc Haber
>>>>>>> <[EMAIL PROTECTED]> writes:
Marc> On Sun, 2 Sep 2001 22:49:00 +0200 (CEST), Santiago Vila
Marc> <[EMAIL PROTECTED]> wrote:
>> >> However, you can repackage the .orig.tar.gz source and
>> remove >> the non-US bits from it. Then you could upload both
>> source and >> binaries to main.
>> 
Marc> That would break the principle of pristine sources, though.
>>  So, that's not a principle, it's a somewhat desirable goal.
>> For some licenses it may be necessary, but there are many
>> reasons you might have to change the upstream tarball,
>> including for example DFSG problems with part of a program.

Marc> I see. So that is not a real problem. Do I simply tar the
Marc> sources with non-US bits removed and call that tar
Marc> foo.orig.tar.gz, or is there a special procedure?

Yes, although you should say what you've done in debian/copyright in
the diff.  Really, though I would rather see software stay in non-us
than lose functionality.  Of course this doesn't matter for this case.




Re: build daemon architectures

2001-09-10 Thread Sam Hartman
> "Randolph" == Randolph Chung <[EMAIL PROTECTED]> writes:

>> The Automatic Package Building System page[1] lists the build
>> daemons with web pages.  It does not list those without,
>> however.  Since my latest libcdaudio packages are considered
>> out of date on i386, I was wondering if a build daemon exists
>> for that architecture.  If you know of a build daemon for an
>> architecture other than arm, m68k, powerpc, or sparc (even if
>> it doesn't have a

Randolph> i386, mips, mipsel, ia64, hppa, alpha, s390 all have
Randolph> autobuilders.


IT would be nice if we could also list which of those have non-us
autobuilders.




Bug#128888: ITP: ssh-krb5 - A version of OpenSSH patched to support Kerberos Authentication

2002-01-12 Thread Sam Hartman
package: wnpp
severity: wishlist

Hi.  AS discussed below, I intend to package OpenSSH using the current
Debian sources with patches to allow krb5 authentication.  I will use
the patches available at
http://www.sxw.org.uk/computing/patches/openssh.html.  These patches
attempt to comply with draft-ietf-secsh-gss-keyex along with some of
the more common other types of Kerberos authentication.

The Kerberos packaging will follow guidelines agreed on by Debian
kerberos package maintainers and included in
/usr/share/doc/krb5-config/packaging-guidelines.txt.gz.  The package
will likely build withe either Heimdal or MIT Kerberos, although the
version uploaded to non-us will  be compiled against MIT Kerberos.  

Below is previous discussion on this package attempting to justify the
need for yet another ssh package in Debian.



--- Begin Message ---

Hi.  I sent mail to [EMAIL PROTECTED] about tthis a while back.
I heard no response.  It is my intent to ITP ssh-krb5 as a package at
priority extra that conflicts with the existing ssh.  I will probably
store configuration files in /etc/ssh rather than /etc/ssh-krb5
because I believe that some time after woody releases we will be able
to get these changes folded into OpenSSH upstream and then hopefully
into the main Debian ssh packages.

This is a heads up for the Kerberos and Ssh community in Debian.





--- Begin Message ---


So I suspect I'm not the only one on this list that would like
Kerberized ssh in Debian.  However ssh is somewhat of a moving target;
here are the things we probably want to support:

* The ssh.com sshv1 Kerberos5 protocol (used by MIT among others)
* The ssh Kerberos4 protocol (used by CMU and others) (Is this the
same  as the krb4 in openssh?)
* draft-ietf-secsh-gss-keyex (standards track protocol)
* The krb5 support in sxw's patches to Openssh 2.5.2 (does anyone use
* this?
   no would be a really really convenient answer)

I propose that I talk to the ssh maintainer and get permission to ITP
an ssh-krb5 that supports the first three listed protocols.I believe
code will exist to do that fairly soon.  I'd rather do that than fold
in Kerberos support because it is so much of a moving target right now
and because it would be asking the ssh maintainer to maintain a lot of
third-party patches.


Reasonable?

___
Debian-kerberos mailing list
[EMAIL PROTECTED]
http://mailman.boxedpenguin.com/mailman/listinfo/debian-kerberos
--- End Message ---
--- End Message ---


Bug#142065: ITP: cyrus2-sasl-mit - MIT Kerberos modules for sasl2

2002-04-09 Thread Sam Hartman
package: wnpp
severity: wishlist

I'm planning on packaging libsasl2-gssapi-mit, a version of the GSSAPI
plugin for libsasl2 compiled against MIT Kerberos.

This package has the same source as cyrus-sasl2, but different build
environment and options.  It's not really possible to avoid having two
source packages, even given crypto-in-main.


This is the same setup we have for libsasl7 for all the same reasons.


I sent the SASL maintainer mail a while back and received no objection.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Transition: krb5 to drop Kerberos IV (libkrb53 restructuring)

2009-02-22 Thread Sam Hartman

[There are some questions at the end; comments would be greatly
appreciated on the questions if you have ever been involved in the
release process or library transitions before.  This is my first big
transition.]

The libkrb53 package (providing the MIT Kerberos shared libraries) has
been stable for the last eight years.  However, in 2006, MIT announced
its plans to remove support for the Kerberos 4 protocol [1].  Kerberos
5 has been the current version of Kerberos since the mid 1990s;
increasing security and code quality concerns motivated MIT's
decision.  In the upcoming 1.7 release of MIT Kerberos, the code will
be removed.  However, for well over 10 years, MIT Kerberos supports
building with the Kerberos 4 code disabled.

[1] http://web.mit.edu/kerberos/krb4-end-of-life.html   

I believe in managing things in small chunks.  I'd rather handle
removing Kerberos 4 independently of upgrading to a new version of
Kerberos (1.7).  As such, I plan to turn off Kerberos 4 in Debian
unstable in the very near future.  Only two packages in Debian
actually rely on krb4 support: kstart and zephyr.  In the case of
kstart, I believe disabling krb4 support will be relatively simple.
In the case of zephyr, things are more complicated because most of the
zephyr community uses krb4 to authenticate access.  The zephyr
maintainer is well aware of the krb4 issue and has been working to
resolve it.  I do not believe keeping krb4 support in Debian for
zephyr makes sense, especially since it would definitely be removed on
the 1.7 release of krb5.  Two additional packages (barnowl and owl)
link against libkrb4 but use no symbols from that library.

However, things are more complicated.  The krb4 and krb5 shared
libraries are all in the libkrb53 package.  Since libraries will be
removed, that package name needs to change.  I propose to split out
each library into a single package per our current best practice.  See
the version of the krb5 package in experimental for specific details
of the split.

I propose to upload a version of krb5 to unstable in about a week that
is basically identical to the krb5 in experimental.  I will include
some debconf fixes, a news file, and other minor changes.  See the
experimental branch of [2] for ongoing work towards this upload.

[2] git://git.debian.org/git/pkg-k5-afs/debian-krb5.git

Unfortunately, there are a lot of packages that reverse depend on
libkrb53.  All of these packages will need to be rebuilt.
Here's where I need sanity checking.

I assume that after the new krb5 has made its way into unstable and
has built on all arches, I should send mail to all these packages
asking them to upload a new version built against the new krb5.  I
assume that some time (1 week?) later, I should do a mass bug filing
against anything that is still uninstallable in unstable because of a
libkrb53 dependency.  I assume that doing NMUs to fix these bugs would
be appropriate.  Do I have things right so far?


When I file bugs, do I advise people to upgrade their build
dependencies to the version of krb5 that introduces the new library
packages?  Clearly the packages need to be built against that version
for unstable.  However it seems like that build dependency would make
things like backports harder.  Would it be better to have an explicit
build dependency or just make sure that things are rebuilt after krb5
is built on all arches?

Also, note that the ABI of the libraries that will remain is *not*
changing.  (In a somewhat related note, the soname of libraries that
remain will not need to change for 1.7; we won't expect any transition
beyond the krb5 package at that point).  So, packages not using the
krb4 libraries would actually work fine against the libkrb53 in
testing.  It seems like if I use an alternative dependency in the
symbols files for the new package, I could allow packages rebuilt for
unstable to migrate into testing ahead of the new version of krb5.
That is, if I made the dependency in libkrb5-3.symbols look like
libkrb5-3|libkrb53 (and similar changes for other symbols files), then
both the packages in unstable and testing would satisfy the
dependencies.  It seems like this would significantly reduce the
impact of the transition.  Am I missing something or would this change
be a good idea?

Attached is a list of the packages that appear to reverse-depend on
libkrb53.


Thanks for your consideration and review,

--Sam

  alpine
  aolserver4-nsimap
  asterisk-bristuff
  asterisk-classic
  audispd-plugins
  auditd
  autofs5-ldap
  balsa
  barnowl
  bind9
  bind9-host
  bind9utils
  bitstormlite
  boinc-client
  boinc-manager
  centericq
  centericq-fribidi
  centericq-utf8
  cgi-mapserver
  crossfire-client
  crossfire-client-gtk
  crossfire-client-gtk2
  crossfire-client-x11
  cups
  cups-driver-gutenprint
  cupsddk
  cupsddk-drivers
  curl
  cvsnt
  diatheke
  dnsutils
  dovecot-common
  epdfview
  etpan-ng
  evolution-data-server
  fetchmail
  flickcurl-utils
  freeradiu

Re: Transition: krb5 to drop Kerberos IV (libkrb53 restructuring)

2009-02-23 Thread Sam Hartman
>>>>> "Julien" == Julien BLACHE  writes:

Julien> Sam Hartman  wrote: Hi,

>> That is, if I made the dependency in libkrb5-3.symbols look
>> like libkrb5-3|libkrb53 (and similar changes for other symbols
>> files), then both the packages in unstable and testing would
>> satisfy the dependencies.  It seems like this would
>> significantly reduce the impact of the transition.  Am I
>> missing something or would this change be a good idea?

3Julien> Have you considered uploading a version of krb5 with: -
Julien> libkrb5-3 - libkrb4-?  - libkrb53 a metapackage depending
Julien> on both of the above - libkrb5-dev depending on libkrb5-3
Julien> alone and containing only the files needed to link with
Julien> libkrb5-3

That's undesirable because building without krb4 has some fairly
significant impacts on non-library parts of the krb5 packages.  So I
could not actually build with krb4 support disabled.  I guess I could
do two build passes one with krb4 support and one without (picking up
only the krb4 library from the krb4 build pass).


If I do something like this why do I want the krb4 libs to end up in a
new package we plan to get rid of reasonably soon?  Why not stick them
directly in libkrb53?  (krb4 libs in libkrb53 vs libkrb4-2 seems like
aa mostly asthetic issue unless I'm missing something).


Assuming that alternatives in the symbols file works, it seems like
the only difference between your proposal and my original proposal is
that it handles uninstalling libkrb53 somewhat better if one of the
packages that replaces files in libkrb53 is installed. It also allows
the new krb5 to migrate to testing ahead of waiting for everything to
be rebuilt.  If the alternatives approach works it means that both
approaches allow other packages to migrate to testing.

If there is some problem with the alternatives approach, then your approach is 
a clear winner.  

I actually think allowing the new krb5 package to migrate to testing
is worth a second build pass on the krb5 package, so I'll do roughly
what you suggest.  I assume that with this approach I don't need to
block on anyone for the first upload (the one with libkrb53 still
present) and can do so at my convenience.

I would appreciate your input on whether there is a good reason to
stick libkrb4 in a new package vs sticking it in libkrb53.  I'd also
appreciate your answer to whether the alternatives approach would work
to help sanity check my understanding in this space.


Thanks,

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Transition: krb5 to drop Kerberos IV (libkrb53 restructuring)

2009-02-23 Thread Sam Hartman
>>>>> "Sam" == Sam Hartman  writes:

>>>>> "Julien" == Julien BLACHE  writes:
Julien> Sam Hartman  wrote: Hi,

>>> That is, if I made the dependency in libkrb5-3.symbols look
>>> like libkrb5-3|libkrb53 (and similar changes for other symbols
>>> files), then both the packages in unstable and testing would
>>> satisfy the dependencies.  It seems like this would
>>> significantly reduce the impact of the transition.  Am I
>>> missing something or would this change be a good idea?

Sam> 3 Julien> Have you considered uploading a version of krb5
Sam> with: -
Julien> libkrb5-3 - libkrb4-?  - libkrb53 a metapackage depending
Julien> on both of the above - libkrb5-dev depending on libkrb5-3
Julien> alone and containing only the files needed to link with
Julien> libkrb5-3

Sam> That's undesirable because building without krb4 has some
Sam> fairly significant impacts on non-library parts of the krb5
Sam> packages.  So I could not actually build with krb4 support
Sam> disabled.  I guess I could do two build passes one with krb4
Sam> support and one without (picking up only the krb4 library
Sam> from the krb4 build pass).


Sam> unless I'm missing something).


Sam> Assuming that alternatives in the symbols file works, it
Sam> seems like the only difference between your proposal and my
Sam> original proposal is that it handles uninstalling libkrb53
Sam> somewhat better if one of the packages that replaces files in
Sam> libkrb53 is installed. It also allows the new krb5 to migrate
Sam> to testing ahead of waiting for everything to be rebuilt.  If
Sam> the alternatives approach works it means that both approaches
Sam> allow other packages to migrate to testing.

Ah, I was missing something.  It allows us to decouple when we
generate a bunch of binary NMUs from when we turn off krb4.  When I
upload the new package, nothing breaks in unstable, so there is no
particular need for the release team to do anything under any time
pressure.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Transition: krb5 to drop Kerberos IV (libkrb53 restructuring)

2009-02-23 Thread Sam Hartman
> "Julien" == Julien BLACHE  writes:

I really appreciate your help here!

Julien> As you note in your second reply, the goal is to decouple
Julien> the packaging change from the krb4 dismissal: 1 introduce
Julien> libkrb5-3 (Replaces: libkrb53), with libkrb53 depending on
Julien> libkrb5-3, libkrb5-3.shlibs pointing to libkrb53, and a
Julien> versionned dependency on libkrb53 in libkrb5-dev

Julien>  2 once it hits testing, change libkrb5-3.shlibs to point
Julien> to libkrb5-3, version the libkrb53 -> libkrb5-3 dependency
Julien> and the libkrb5-dev -> libkrb53 accordingly
Julien> If you don't do (1), you risk being tied into other
Julien> transitions by your rdeps as they'll be picking up
Julien> dependencies on libkrb5-3 as they get uploaded in unstable
Julien> as part of their own transitions or development cycles.

I'm sorry, but I don't see how I get stuck in unstable if I start out
with the libkrb5-3 shlibs and symbols files pointing to libkrb5-3
rather than libkrb53.  As I understand it, rdeps can only hold me in
unstable if moving my package into testing would make them
uninstallable in testing.

They depend on libkrb53  with a versioned dependency today.
A version of libkrb53 that is greater than any existing versioned dependency 
will be in my package migrating from unstable to testing, so their versioned 
dependency will be satisfied.
I don't know if we do build-dep related blocking today or not, but the 
build-deps on libkrb5-dev will continue to work.

In addition, since libkrb53 will pull in all the krb5 libraries a
package that depends on it will actually get the libraries it needs to function.

Now, I might hold my rdeps in unstable if for some reason it takes a
while for the new krb5 to migrate into testing.  However that's no
more true than if I added some symbols to one of my libraries and
upgraded my versioned dependency.  Still that's a reason to leave the
shlibs and symbols files pointing at libkrb53 until I make it into
testing.

The krb4 using packages are all leaf packages, so they will not
complicate things until libkrb53 goes away.


I trimmed the reply text, but you asked why I need two build passes.
The krb5 package includes a bunch of libraries as well as daemons,
utilities etc.  Building with krb4 enabled does more than build krb4
libraries, and I want to get the affects of building with krb4
disabled for daemons and utilities.  Doing two build passes will be
easy given my package structure and the package does not take
particularly long to build.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Transition: krb5 to drop Kerberos IV (libkrb53 restructuring)

2009-02-23 Thread Sam Hartman
OK, so I think we're all set.

The plan now is  to 

1) Build twice, once into build and once into build-krb4.  We only
pull libkrb4.so out of build-krb4.  2) Move all the libraries out of
libkrb53 and libkadm55 (sorry, in my previous mails I was simplifying
a bit) except for libkrb4.so.2.

3) Make libkrb53 depend on all the libraries it now contains and libkadm55 
depend on the libraries it contains.


4) Set up symbols and shlibs files to point everyone at libkrb53 and
   libkadm55 as appropriate.



At some point after the new krb5 enters testing:

5) Point symbols  files at libkrb5-3 and friends--point them at the
   package that contains the library.




When the first release of krb5 1.7 enters debian (probably beta1):


6) Drop libkrb53 (and thus the libkrb4.so.2), libkadm55 from the
   package.  If the old krb4 library fails to work against the new
   libkrb5-3 in 1.7, add a conflicts line.  Otherwise leave the
   conflicts line off for now.


At some point later, add a conflicts line if we did not do so in step 6.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Refactoring the Debtags web interface

2009-02-23 Thread Sam Hartman
> "Brian" == Brian May  writes:

Brian> Ben Finney wrote:
>> I invite anyone interested in knowing how the distinct areas of
>> identity, trust, and security intersect with the OpenID system,
>> to research the available documentation.
>> 

Brian> ...except openid has serious issues with establishing
Brian> identity in a secure manner. Especially if the server
Brian> connects to your identity provider using http (seems to be
Brian> common practise as far as I can tell). Using http makes
Brian> MITM attack easy. Just redirect requests to an identity
Brian> provider that always confirms the user's identity. 

I find it deeply ironic that I'm arguing against security.  However,
let's remember that we're talking about debtags.  It's always
important to think about your threat model and about how much
complexity you're willing to spend in order to get security.

This seems like a case where usability is far more important than
security.  If the system starts getting abused, we can lock it down
more.

If someone proposed using openid to do debian.org password resets or
to maintain the keyring, I'd be screaming up and down all over the
place.  I just don't see that the value of attacking the debtags
system warrents increased complexity and decreased usability in this
instance.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Transition: krb5 to drop Kerberos IV (libkrb53 restructuring)

2009-02-26 Thread Sam Hartman
>>>>> "Sam" == Sam Hartman  writes:

Sam> OK, so I think we're all set.  The plan now is to

Sam> 1) Build twice, once into build and once into build-krb4.  We
Sam> only pull libkrb4.so out of build-krb4.  2) 

This works at least.


Sam> 3) Make libkrb53 depend on all the libraries it now contains
Sam> and libkadm55 depend on the libraries it contains.


Sam> 4) Set up symbols and shlibs files to point everyone at
Sam> libkrb53 and libkadm55 as appropriate.


It turns out this fails impressively.  The problem is that the library
packages depend on each other.  So, for example, libk5crypto3 is
needed by libkrb5-3.  If I make the shlibs file for libk5crypto3 point
to libkrb53 instead of libk5crypto3, then libkrb5-3 depends on
libkrb53.  But libkrb53 depends on libkrb5-3 because that is the point
of libkrb53 in the new layout.

I probably could hack something that would work: use symbols files
that point at the split library packages internally and just before
the debs are constructed run a sed script on symbols and shlibs.


However as you'll recall the only reason we didn't point the shlibs at
the new packages initially is to make things easy for unstable
packages that get rebuilt while the new krb5 is waiting to migrate to
testing.

My proposal now is to upload with urgency medium.  There are no code
changes , I have high confidence that I can shake out any packaging
bugs in five days, and that provides a good compromise in my mind at
least between not blocking other people too much and having a simple
enough transition strategy that I can have high confidence I
understand it and that it will work.

If that sounds too problematic then I can investigate the option of
symbols files with alternatives (I.E. libk5crypto3|libkrb53 in the
symbols file.




 and In addition, either versioned replaces
don't work as well for downgrades as unversioned replaces, or replaces
on unpacked but not configured packages don't work as well as replaces
on installed packages.

I'll use unversioned replaces if the user experience is better,
versioned replaces otherwise.  (I had used unversioned replaces in
experimental, but was trying versioned in my current work).



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Transition: krb5 to drop Kerberos IV (libkrb53 restructuring)

2009-02-27 Thread Sam Hartman
> "Steve" == Steve Langasek  writes:

Steve> Actually, I was meaning to comment on this.  Why would you
Steve> not simply point the shlibs at the component library
Steve> packages at this stage?  The only side effect is that the
Steve> version of krb5 that includes the split library packages
Steve> has to migrate to testing before anything else depending on
Steve> these packages can reach testing, but that's not terribly
Steve> onerous given that krb5's own migration to testing won't be
Steve> tangled up with other packages - this is already a very
Steve> "soft" transition, and I don't see the need for extra work
Steve> on the shlibs handling.

That was the only reason.  If it had worked easily it would have been
worth it.  

At this point I'll just keep on top of the package and do everything I
can to let it migrate to testing quickly.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Transition: krb5 to drop Kerberos IV (libkrb53 restructuring)

2009-02-28 Thread Sam Hartman
>>>>> "Julien" == Julien BLACHE  writes:

Julien> Sam Hartman  wrote: Hi,

>> It turns out this fails impressively.  The problem is that the
>> library packages depend on each other.  So, for example,
>> libk5crypto3 is needed by libkrb5-3.  If I make the shlibs file
>> for libk5crypto3 point to libkrb53 instead of libk5crypto3,
>> then libkrb5-3 depends on libkrb53.  But libkrb53 depends on
>> libkrb5-3 because that is the point of libkrb53 in the new
>> layout.
>> 
>> I probably could hack something that would work: use symbols
>> files that point at the split library packages internally and
>> just before the debs are constructed run a sed script on
>> symbols and shlibs.

Julien> debian/shlibs.local should help for that.

There does not seem to be a symbols file override.  The package now
uses symbols files not shlibs files.  (Well, obvious/ly shlibs files
are generated for old dpkg-shlibdeps)


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Please test krb5 from experimental--even if you don't use Kerberos

2009-02-28 Thread Sam Hartman


Folks, I'd appreciate it if  people could try and test version 
1.6.dfsg.4~beta1-8 from experimental of the krb5 package.

The biggest change is a packaging reorganization.  So, while I'm
certainly interested in Kerberos users testing the packages, I'm most
interested in people other than me confirming that they don't break
your system.

This really works best from an unstable system.  Make sure
experimental is in your apt sources.
(Note these are only built for i386 now; I'll upload an amd64 build shortly)

aptitude update
aptitude -t experimental install  libkrb53  


If that works, then test reverse depenndencies of krb5 such as ssh,
the bind9 host command, etc.

If they don't give shared library load errors, then things look good;
drop me a note.  If you notice problems, then please file bugs.


If you either want to downgrade or need to downgrade, here are downgrade 
instructions.
They are a bit tricky because of  the transition involved.

  * Downgrading from this version to a previous version can  be
difficult because of library name changes.  Please follow these
instructions:
  - Get the libkrb53 and libkadm55 debs you want to downgrade to
  -dpkg --force-depends --remove  libkrb5-3 libkrb5support0 libdes425-3
libgssapi-krb5-2 libgssrpc4 libkadm5clnt5 libkadm5srv5 libkdb5-4
libk5crypto3
  -  At this point your system has broken Kerberos libraries
  - dpkg -i libkrb53*deb libkadm55*deb (using the debs you got above)
  - aptitude -f install to fix any other packages that may be broken

(N.B. a similar version of these instructions is included in the
NEWS.debian file.  There are two types.  There should be a space
between --force-depends and --remove.  ALso it is libk5crypto3 not
libkrb5crypto3; that will be corrected in the next upload)


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: group nvram

2009-03-18 Thread Sam Hartman
I'd like to chime in with the general concern that the proposal to
remove a bunch of groups from udev seems under-baked and that the
current groups have value.

I definitely would like to see the tss (tpm) group remain along with
the kvm and fuse groups.  I think scanner is important as well.

I can understand the argument for getting rid of nvram.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#759398: ITP: trust-router - Dynamically configure Trust Between RADIUS Realms

2014-08-26 Thread Sam Hartman
package: wnpp
severity: wishlist
owner: hartm...@debian.org


URL: git://git.project-moonshot.org/trust_router.git
http://www.project-moonshot.org/

license: bsd-3-clause

Description: The trust router establishes a DH key between two RADIUS
servers to protect a RADIUS over TLS session.  GSS-API authentication is
used between  to securely establish this key.  The trust router provides
a trusted-third-party to manage connections between RADIUS realms and to
provide information constraining what connections are permitted.

The trust router is used to connect Moonshot Service providers to
Identity Providers.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/014815379066-0646baf9-9869-4bd1-b409-9fbfa4f81de9-000...@email.amazonses.com



Bug#759159: ITP: shibboleth-resolver - Library to access the Shibboleth Attribute Resolver from Third-Party Applications

2014-08-26 Thread Sam Hartman
package: wnpp
severity: wishlist
owner: hartm...@debian.org

URL: http://www.shibboleth.org/
Source: svn https://svn.shibboleth.net/extensions/cpp-sp-resolver/trunk

Description: Shibboleth library to access Attribute Resolver
 The Shibboleth Service provider consumes information about an
 authenticated user from SAML and GSS-API , providing services such as
 attribute mapping, authorization, and attribute resolution.  This
 extension permits a third-party application to access resolved
 attributes.

License: Apache 2.0

I'm packaging this because it is a dependency of the Moonshot GSS-API
mechanism, an implementation of RFC 7055 (EAP for GSS-API).

Current work can be seen at
git://git.project-moonshot.org/shibboleth/resolver.git


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/01481537d429-39b5afac-c8f6-478e-a39d-36080f95f2a7-000...@email.amazonses.com



Bug#759511: ITP: moonshot-ui -Project Moonshot's Identity Selector

2014-08-27 Thread Sam Hartman
package: wnpp
owner: hartm...@debian.org
severity: wishlist

URL: http://www.project-moonshot.org/
source: git://git.project-moonshot.org/moonshot-ui.git
License: BSD-three-clause
Description: Project Moonshot provides  federated access to services
combining the best of EAP, RADIUS (over TLS), SAML and GSS-API.
 This component provides software to manage the local identity store and
 pick which identity is used for a given service.

--Sam


pgpX99LMmhJXH.pgp
Description: PGP signature


Bug#760411: ITP: moonshot-ui -- Project Moonshot Identity Manager

2014-09-03 Thread Sam Hartman
package: wnpp
severity: wishlist
owner: hartm...@debian.org

URL: http://www.project-moonshot.org/
source: git://git.project-moonshot.org/moonshot-ui.git
license: BSD-3-Clause
Description: This package manages the Moonshot identity store,
 permitting users to add and remove identities as well as to select which
 identity is used ith a given service.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/01483cfe60fc-8bfa9c51-9af5-49b4-9f26-8f1da55f8e3d-000...@email.amazonses.com



Bug#761868: ITP: moonshot-gss-eap -- A GSS-API Mechanism for the Extensible Authentication Protocol

2014-09-16 Thread Sam Hartman
package: wnpp
severity: wishlist
owner: hartm...@debian.org
x-debbugs-cc: debian-devel@lists.debian.org


source: git://git.project-moonshot.org/mech_eap.git
license: BSD-3-Clause
Description: Project moonshot provides federated access to a wide range
of applications.  This package adds a GSS-API mechanism supporting EAP
authentication and provides the core of Moonshot authentication and
authorization.  This package provides federated access for applications
such as Ssh, NFS, LDAP and IMAP.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/tslioknlpax@mit.edu



Thanks Ftpmaster for all your hard work with the Moonshot Suite

2014-10-23 Thread Sam Hartman


Hi.  back in 2011, I gave a talk at Debconf about the value of Debian to
people hoping to put together changes across an operating system.  I was
using my work in Project moonshot as an example; we've been looking at
integrating new security services throughout an operating system.
Debian has been really great for that because it's easy to modify and
easy to add new components, to use it both as a lab environment and a
stable system.

Today, with the acceptance of moonshot-gss-eap, we have all our
softhware in Debian unstable.  There are a few patches to other things
running around getting in shape, and lots of polishing and future
development.

However, I want to take  a moment to thank ftpmaster for their hard work
over the last month doing the "new" review for the Moonshot suite.  Some
of the packages were complex and pulled code from a lot of places.


In preparing to get all the packaging in shape for submission I talked
to a couple of FTP assistants at Debconf this year.  I'd always been
confused why the new queue processing took so long.  As I learned what
was involved, I realized that actually given the thorough review that is
done, it's amazing that new queue takes as short of a time as it does.
I also realized that we get a huge and valuable service out of this
work,.  It's valuable to our users who care about free software and the
DFSG, as well as everyone who cares about making sure that Debian is
redistributable and legal.

Thanks for all the hard work!


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/01493ce547da-53f6cce6-4f1f-45d1-ad48-155dfb81b114-000...@email.amazonses.com



Time for compassion and the Init GR

2014-11-06 Thread Sam Hartman

Early morning, Wednesday, November 19, the results of the GR on init
system coupling will be announced.
No result will make everyone happy.  In fact, that morning, some of our
developers, users and contributors will be really unhappy.

I would be dishonest if I said I didn't hope to be happy and reassured that
morning.  I suspect we all hope that the project will agree with our
position on this complex and emotionally intense issue and reassure us
that  our values are close to those of the project; reassure us that
this is a place where we can safely work together.

I don't know who, but I know that for some of the people I care about in
the project--people whose opinion I value--that morning will bring
disappointment, sadness, frustration and fear.  I may well be one of
those people.

However, Wednesday November 19 and every day after, Debian needs to work
together.  Today, now, before the results are announced, we have an
opportunity to extend compassion and empathy and remind ourselves of the
spirit in which we'd like to work together.

I'm hoping that we can all take a few minutes to gain empathy for those
who disagree with us.  Then I'm hoping we can use that understanding to
reassure them that they are valued and respected and their concerns
considered even when we end up strongly disagreeing with them or valuing
different things.  Towards that, I ask you to take a few minutes to
consider how you will feel if the option other than further discussion
that you least favor is selected by the project.  Actually, for some of
us, the prospect of months of further discussion of this issue itself is
likely to have its own negative feelings.  For the moment though, I ask
that you focus on one of the other options.

What do you feel?  Disappointment that the project didn't value
something important to you?  Fear about whether Debian will meet your
needs as an OS and community?  Sadness?  Frustration?  Fear when you
consider whether you'll be able to get your work done?

What actions could other members of the project take to turn some of
those feelings around without compromising their beliefs, changing their
mind, or giving up on the values that are important to them?  I'll
answer this question for myself in a moment; if you cannot think of
things that  would help you, perhaps some of the things that would help
me would also be valuable to you.  If not, you could find someone you
trust and value and work together to see what you could ask for to
receive emotional care.

It's almost certainly true that others in the project--people you have
worked with over the years--will have similar feelings if their least
favored option is selected.  Some of those people probably disagree with
you.
I'd ask you to consider extending other members of the project the sort
of care that will help you--the actions you were thinking about in the
previous paragraph.  My hope is that by doing so we can all treat each
other with respect and value without compromising our positions.  In
many cases, it may make sense to extend that care now, to commit now to
an attitude of care and respect even when we might be the ones needing
that care in a couple of weeks.

For myself, here are things that  I'd really value in a situation where
I'm feeling disappointed, sad and afraid that my values might not match
the project's:

* Not talking about these tradeoffs in terms of what's right and wrong,
 but acknowledging that different members of our project have different
 values.  User choice isn't bad any more than combining software to
 reduce code size is bad.  There isn't a right answer.  As Russ has
 explained a number of times in the TC, on debian-vote and on his blog,
 this is about tradeoffs.  I'm sure some people will be happy if the
 project's values are aligned with theirs.  When they take that as far
 as saying the project made the "right decision" or rejected "bad
 options," they are not valuing the contributions of those who disagreed
 with them.


* People who disagree with me taking the time to understand my
  position.  "Hey, Sam, what you seem to be saying is this...for these
  reasons.  Have I got it?"  That is, people taking the time to make
  sure they understand me without trying to persuade me.  I'm not asking
  for agreement, simply that I'm valued and my opinions are valued
  enough to read, understand and confirm that understanding.  I feel
  reassured that someone took the time to consider what I had to say
  even if they came to a different conclusion.

* When true, reassurances that we share common values even in situations
  where  we disagree about how to balance tradeoffs.

* Offers to work together/to listen to  my opinions in future.  "Hey,
  Sam, I
  realize the decision didn't go the way you were hoping, but  I'm
  interested in figuring out how within the scope of what we did decide
  we can best address the concerns you had."  I really hope that folks
  who value user choice will be willing to work with those

Re: RFC: DEP-14: Recommended layout for Git packaging repositories

2014-11-12 Thread Sam Hartman
Hi.
I've read the original proposal and believe it is generally going in the
right direction.

things I liked:

* didn't pick between dgit/git-dpm/git-pq; documented the common parts

* Seemed to really focus on one clear scope.

* Discouraged overlay packaging.
I've tried to read the arguments, and I'm unconvinced that should be a
recommended practice.
I'd prefer to simply rule it out of scope: this proposal describes how
to package debian and upstream sources together.  It does not apply to
other cases and does not forbid or recommend them.
It doesn't apply to svn.  It doesn't apply to overlay packaging.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/0149a6c75f57-85b0ccf2-2e0c-42cd-9299-f17f889aa95e-000...@email.amazonses.com



Re: Being part of a community and behaving

2014-11-13 Thread Sam Hartman
> "Patrick" == Patrick Ouellette  writes:

Patrick> On Thu, Nov 13, 2014 at 11:06:08PM +0100, Matthias Klumpp wrote:

Patrick> I did not ask for evangelization about how wonderful binary
Patrick> logs are, nor for a lesson on how to get the info out of
Patrick> systemd with the systemctl command.

Patrick> I am glad you like them and they work for you.  For me they
Patrick> add another level of obfuscation, a speed bump and a
Patrick> potential point of failure.  All of which are
Patrick> unnecessary. Cat , more  less ,
Patrick> grep   -- all worked well and continue to do
Patrick> so for my text file logs.  Awk, emacs, vi, all work on them
Patrick> too.  My log management tools all expect my old plain text
Patrick> formatted logs.

I'm confused.  Are you saying that cat  isn't working for you
with systemd on jessie?
I'm honestly asking for information here.
As best I can tell on my system everything that gets logged gets logged
to text log files.
Some of it also gets logged to the journal.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/0149ab9e4869-9d59ba6d-53db-4de0-a43c-841cef1c93bc-000...@email.amazonses.com



Re: Being part of a community and behaving

2014-11-13 Thread Sam Hartman
> "Patrick" == Patrick Ouellette  writes:


I think this is a bug.
On my system things get logged both to the journal and to
/var/log/syslog.
My understanding talking to systemd folks is that the behavior I'm
seeing is intended and that unless you went out of your way  to
configure something different you should still see stuff logged to text
files.
So, you might want to ask on #debian-systemd and/or report a bug.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/0149ac2c2d41-09d0ce56-a56f-4658-8bc5-853515c63387-000...@email.amazonses.com



Bug#769499: syslog-ng-core fails to enable systemd service unit

2014-11-13 Thread Sam Hartman
package: syslog-ng-core
severity: important
version:3.3.5-4
justification:  does not enable systemd unit.

syslog-ng-core's postinst does not enable its syslog unit.
I'm guessing that including systemd in the dh sequence is not quite
doing enough to actually  turn it on.

Unfortunately dh-systemd is under-documented so I cannot tell where the
bug is but I bet an explicit call to dh_systemd_enable will make your
users happy.
Attached is the buggy postinst

#! /bin/sh

set -e

if [ "$1" = "triggered" ]; then
   invoke-rc.d syslog-ng stop || exit $?
   invoke-rc.d syslog-ng start || exit $?
   exit 0
fi

dpkg-trigger register-syslog-ng-plugin

# Automatically added by dh_installinit
if [ -x "/etc/init.d/syslog-ng" ]; then
update-rc.d syslog-ng defaults 10 90 >/dev/null || exit $?
fi
# End automatically added section


exit 0


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/tslppcqmoet.fsf...@mit.edu



Re: init system policy

2014-11-18 Thread Sam Hartman
> "Russ" == Russ Allbery  writes:

>>> A second option is to migrate on upgrade the uid/gid information
>>> into an override in /etc/systemd/system.  Requires dealing with
>>> a dynamically generated config file in preinst/postinst, though,
>>> which means the tools that help proper config file handling in
>>> maintainer scripts (ucf, and sometimes dpkg-maintscript-helper)
>>> will be of limited help.

>> I think I'd be inclined to do this, as a one-time migration,

Russ> Yeah, this seems like the right solution to me too.  Drop a
Russ> configuration fragment in /etc/systemd that overrides the user
Russ> and group and then don't touch it again.

well, debconf seems like a win here.
There's no reasonable default so it's desirable to make it easy for the
admin to specify and so you'd probably want to use normal best practice
for debconf updates.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/0149c5dd1eb8-694ee9c8-e191-4683-8ced-987af790a4bf-000...@email.amazonses.com



Bug#769907: general: non-sysvinit init systems are made of fail

2014-11-20 Thread Sam Hartman
> "Didier" == Didier 'OdyX' Raboud  writes:

Didier> Systems cross-craded from Ubuntu to Debian are absolutely
Didier> not supported, and I wouldn't be surprised if some of the
Didier> issues you're seeing are in some way related to this.

I've seen both these issues on pure Debian systems.

And I do consider both of them likely to be significant problems on
upgrades from wheezy.
I've been burned by both of the identified issues on multiple systems.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/tslmw7lztqy@mit.edu



Bug#769907: general: non-sysvinit init systems are made of fail

2014-11-20 Thread Sam Hartman
> "Didier" == Didier 'OdyX' Raboud  writes:

Didier> Steve's suggestions stands though: separated and actionable
Didier> bugs for these two issues filed on the corresponding
Didier> packages are way more helpful than a general "non-sysvinit
Didier> init systems are made of fail".

sure.
My assumption of what it means when someone files a general bug is that
they're hoping for help from all of us figuring out where the bug
belongs.

In that spirit.
The first issue (fstab now fatally blocks boot) is something the systemd
maintainers have considered (as I understand it) and rejected.
I don't know that filing a bug that will be immediately wontfixed will
be helpful.
I don't think sending that issue to the TC is advised.

The second issue seems more actionable.
I wonder if we can get a bit more detail so we can retitle and reassign.

In my case, I've found that with systemd I tend to get a lot less output
in some cases than I do with sysvinit, but I haven't figured out what is
going on well enough to produce something actionable so I didn't bother
trying.
If others are seeing that it's perhaps worth exploring.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/tslegsxzstn@mit.edu



Bug#647740: ITP: libvertfo - library abstracting event loop interfaces

2011-11-05 Thread Sam Hartman
package: wnpp
severity: wishlist

URL: https://fedorahosted.org/libverto/
Description: libverto provides a common interface on top of libev, libevent, 
glib, tevent.
  The goal is to allow development of asynchronous libraries that  will work 
with whatever event loop an application happens to be using
  Features include automatic detection of which event loops are in a particular 
process space and support for writing new event loop modules.

License:
 * Copyright 2011 Red Hat, Inc.
 *
 * Permission is hereby granted, free of charge, to any person
 * obtaining a copy of this software and associated documentation files
 * (the "Software"), to deal in the Software without restriction,
 * including without limitation the rights to use, copy, modify, merge,
 * publish, distribute, sublicense, and/or sell copies of the Software,
 * and to permit persons to whom the Software is furnished to do so,
 * subject to the following conditions:
 *
 * The above copyright notice and this permission notice shall be
 * included in all copies or substantial portions of the Software.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
 * NONINFRINGEMENT.  IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
 * SOFTWARE.


I'm packaging this because it's a dependency for MIT Kerberos 1.10.
It's kind of annoying but libverto has not yet been released so I'll
probably end up packaging a git snapshot. I'll prod upstream and see
if a release can be caused to happen.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/2005173408.0b7a14...@carter-zimmerman.suchdamage.org



Bug#647742: ITP: libradsec - RADIUS over TLS/DTLS/UDP/TCP library

2011-11-05 Thread Sam Hartman
package: wnpp
severity: wishlist

URL: libradsec branch of http://www.project-moonshot.org/gitweb/radsecproxy.git
URL2: http://software.uninett.no/radsecproxy/
Description: libradsec is a library for RADIUS clients and servers
  This library features support for RADSEC (RADIUS over TLS/DTLS) as well as 
TCP and UDP transports.

License: The following license is a bit misleading because there are
GPL dependencies. So effectively libradsec is distributed under GPL2+. However, 
the intent is to remove the GPL dependencies in the near future and so the 
license will look more like
The source code is licensed under two different licenses, a 3-clause
BSD license and the GNU General Public License (version 2 or later).
Users of this library may choose which of these suits them best.


I'm packaging libradsec because Moonshot
(http://www.project-moonshot.org/) depends on it.  It has not been
formally released yet.  It's sort of related to radsecproxy that is
already in Debian in that eventually, libradsec may be used as a
library by radsecproxy. At that point it might make sense for the
libradsec and radsecproxy source packages to be combined. Today,
although they come from the same git repository, they come from
different branches and different places in the directory tree. There
are a couple of header files in common.

I cannot upload libradsec to unstable until libevent 2.x makes its way
into unstable.



-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/2005174338.dec664...@carter-zimmerman.suchdamage.org



Re: Hijacking^W^W^W^W^W^WSalvaging packages for fun and profit: A proposal

2012-10-11 Thread Sam Hartman

For myself, I'd feel a lot more comfortable with DDs seconding than DMs
seconding.

In my mind, when you sign up to be a DM, you're signing up to do a good
job of maintaining one or more packages.

In my mind a part of the additional commitment in agreeing to be a DD is
to think about the broader issues of the project, for example, the
social implications of your decision, to try and help build Debian as a
community and team.
I think that broader view is important when doing something that is
likely to have social consequences like an ITO.

So, I would prefer DD seconds to DM seconds.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/013a51e8b51f-2190865a-4871-43ec-a362-56efe361e561-000...@email.amazonses.com



Proposal: remove krb5-appl (rlogin, rsh, telnet, ftp with krb5 support)

2014-01-23 Thread Sam Hartman


hi.
A few months ago, Russ Allberry stepped down from co-maintaining
krb5-appl.
I'm reasonably happy to keep maintaining it, although when we thought
about it, we cannot think of anyone using the package.
It provides krb5 versions of rlogin, rsh, ftp and telnet.
The telnet is insecure and should not be used; even with encryption
turned on, it's only DES and has other design defects.

The other utilities kind of work, but ssh (with Kerberos authentication
if desired) is a much better solution.

My proposal is to drop the package from the archive, but I wanted to
give others a chance to shout out that I'm wrong and that there's some
compelling use-case I've missed.
If someone can convince me that the packages are useful I'm happy to
spend some effort on them.
However, I don't think that's the case.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/0143bfec0433-2cfb39b4-13f4-410f-8db1-52b5581c41bb-000...@email.amazonses.com



Re: Proposal: remove krb5-appl (rlogin, rsh, telnet, ftp with krb5 support)

2014-01-28 Thread Sam Hartman

FWIW, I'm not seeing enough demand that I'm interested in maintaining
krb5-appl.

I plan to request removal.
If there's a debian developer who thinks I'm making the wrong call they
should feel free to turn my removal request into a request to  adopt the
package.

--Sam


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/0143da7aeaed-262eb51d-bb52-494b-bffc-df7dc16f2633-000...@email.amazonses.com



Re: dpkg-dev: please reject native/non-native version when building native/non-native source packages

2014-02-05 Thread Sam Hartman
control: subscribe -1


> "Charles" == Charles Plessy  writes:


Charles> The 3.0 (native) format is useful when packaging a work
Charles> that is developped and distributed in a Git repository.
Charles> Please leave us this possibility.

Let me describe the use case I have which is an expansion on the above.
I have a bunch of software that I perform daily builds for  out of
version control (git in my case but the issue applies to other vcs as
well).
The software does have upstream versions but is not stable enough that
upstream release tarballs are useful to anyone.
Honestly at this point, I'm not sure anyone will ever find upstream
tarballs useful; anyone who is likely to want to build this from source
probably has a copy of git and can checkout a tag.

There is a packaging branch and an upstream branch.
Changes made on the packaging branch increment the debian revision;
changes made on the  ustream branch eventually involve an increment to
the upstream version.

Things get dumped into a Debian reprepro repository, and into Ubuntu
PPAs.
Eventually, things will get stable enough that I'll upload to a PPA.

Prior to that, I need a way to build a Debian package including source
from a directory without an upstream tar ball.  3.0(git) is not a
reasonable option because archive management programs have very little
support for it, and because package download tools probably aren't well
tested with it.

I'm happy to entertain other options rather than 3.0(native) but my
requirements are:

* support for upstream version
* support for debian revision

* No need to have upstream sources available to dpkg-buildpackage prior
  to running it

* No need to maintain .orig.tar.gz artifacts  produced by dpkg-source
  and keep the checksums of these artifacts consistent between packages
  with the same upstream versions.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/0144017b42b6-b65ba883-c94b-472c-89b7-7341c14ce8ab-000...@email.amazonses.com



Re: Bug#737634: dpkg-dev: please reject native/non-native version when building native/non-native source packages

2014-02-05 Thread Sam Hartman
>>>>> "Andreas" == Andreas Beckmann  writes:

Andreas> On 2014-02-05 10:57, Sam Hartman wrote:
>> tarballs useful; anyone who is likely to want to build this from
>> source probably has a copy of git and can checkout a tag.

Andreas> Such a tag corresponds to an upstrema version?

yes.

>> I'm happy to entertain other options rather than 3.0(native) but
>> my requirements are:
>> 
>> * support for upstream version * support for debian revision
>> 
>> * No need to have upstream sources available to dpkg-buildpackage
>> prior to running it
>> 
>> * No need to maintain .orig.tar.gz artifacts produced by
>> dpkg-source and keep the checksums of these artifacts consistent
>> between packages with the same upstream versions.

Andreas> All this sounds like it can be done with git-buildpackage
Andreas> --git-pristine-tar --git-pristine-tar-commit. Can be set in
Andreas> debian/gbp.conf. And maybe dpkg-source
Andreas> --single-debian-patch.  

no, that means I have to maintain the artifact (namely the
.orig.tar.gz).
The archive software (both reprepro and dak were I to use that) require
that the .orig.tar.gz not change checksums.

I don't want my build machines to be able to push back to my master
repository.
Nor do I want to have to release upstream versions if I lose state on my
build machines.
So this violates my requirements because I have to maintain  an artifact
of dpkg-source (the .orig.tar.gz) and makesure its checksum never
changes.

Also, using git-buildpackage is difficult.
The build is done by sbuild, which does not call git-buildpackage.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/014401fef5be-d5d021c8-b29f-48df-bfe9-91ce164a4899-000...@email.amazonses.com



Re: debconf managed configuration files

2014-02-05 Thread Sam Hartman
I've tried to do a reasonable job with the krb5-config package of
updating a user-managed krb5.conf and keeping it in sync with debconf
data.
It's quite old and I doubt it's best practice any more but it is an
example of how to approach a non-shell-script package.

The debconf-managed comment is an inadequate solution.  Better than just
somping on things and if that's all you have time for, then go for it.
However if you can do better please do!


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/01440205931b-e931214c-cd15-4377-8835-b4a2e2dcb10d-000...@email.amazonses.com



Re: Bug#737634: dpkg-dev: please reject native/non-native version when building native/non-native source packages

2014-02-05 Thread Sam Hartman
> "Neil" == Neil Williams  writes:


That makes sense and I do something similar as appropriate.  Even so, I
do not wish to maintain the upstream tarball as a maintained artifact.
There are cases where packaging release releases are made.  Maintaining
pristine-tar commits for daily builds is a worse solution than
3.0(native) or not including source packages in the resulting Debian
archive.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/014402578b78-e77d4d79-35bc-4e7f-8a9a-311d3b59207f-000...@email.amazonses.com



Re: Bug#737634: dpkg-dev: please reject native/non-native version when building native/non-native source packages

2014-02-05 Thread Sam Hartman
> "Bernhard" == Bernhard R Link  writes:


As I mentioned I have a packaging branch and an upstream branch.
I wish to use debian revisions to reflect packaging changes.

It's slightly more complex than changes to debian directory involve a
debian revision change; changes to other things involve a upstream
version change.

As an example I produce both RPMs and Debs. Just as I don't want to
increment the upstream version number because of a spec file change, I
don't want to increment the upstream version number because I updtaded
build-depends in debian/control.
Especially when the debian directory isn't even on the upstream master
branch.  Incrementing the upstream version number (which appears in
configure.ac among other places) so I could make changes to files that
don't even appear on that branch is an undesirable work flow.

I guess I could have a debian upstream version number that differed from
the actual upstream version number.
That seems undesirable from a user expectations standpoint as well as
potentially impacting things in unexpected ways.

The bug claims that it is a violation of policy to  use 3.0(native)
without  a.orig.tar.something.
I'm actually failing to find that in policy at all.
I'm finding some SHOULD level recommendations, but certainly not MUST
level recommendations, I can think of reasons why a maintainer might
want to voiolate those shoulds.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/014403490b5a-5b32fbed-1099-44ca-b73d-5c1d3514336c-000...@email.amazonses.com



Re: dpkg: is_native version checks in dpkg 3.0 Native

2014-02-05 Thread Sam Hartman
> "Russ" == Russ Allbery  writes:

Russ> Ian Jackson  writes:
>> Secondly, there doesn't appear to be any support in policy for
>> this restriction.

Russ> Policy definitely supports this restriction, as Guillem
Russ> pointed out.  I want to echo that analysis as one of the
Russ> people to have touched that portion of the Policy document.

Citation requested.
I looked for this today and couldn't find it.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/014404036284-6388572e-e02b-400f-b378-bfbcd745ff2c-000...@email.amazonses.com



Re: dpkg: is_native version checks in dpkg 3.0 Native

2014-02-05 Thread Sam Hartman
> "Russ" == Russ Allbery  writes:

>> Citation requested.  I looked for this today and couldn't find
>> it.

Russ> Policy lacks a section that clearly defines native and
Russ> non-native packages, which is a long-standing bug in Policy.
Russ> Currently, that information is in Policy 5.6.12, which is an
Russ> inobvious place for it, and worse, is hidden in the definition
Russ> of the debian_revision component.  However, the intent is to
Russ> define native vs. non-native by the version number format
Russ> used:

OK, we found the same section of policy.

Russ> This part of the version number specifies the version of
Russ> the Debian package based on the upstream version. It may
Russ> contain only alphanumerics and the characters + . ~ (plus,
Russ> full stop, tilde) and is compared in the same way as the
Russ> upstream_version is.

Russ> It is optional; if it isn't present then the
Russ> upstream_version may not contain a hyphen. This format
Russ> represents the case where a piece of software was written
Russ> specifically to be a Debian package, where the Debian package
Russ> source must always be identical to the pristine source and
Russ> therefore no revision indication is required.

OK.
I agree that policy 6.5.12 clearly states that if the debian revision is
absent:

* The software is written for Debian

* the source and upstream source must be the same

* No revision is required (i think this last is analysis not normative)

However, I cannot read that text to imply anything about what happens if
the Debian revision is present:

* Policy seems silent on whether the software MAY?SHOULD NOT/MUST NOT be
  written explicitly for Debian (I consider this a feature)

* Policy appears silent about whether the source and upstream source are
  the same/need be the same

* Policy seems very silent about whether technical mechanisms that would
  make it difficult for the upstream source and source to differ are
  appropriate with a debian revision present.
Clearly, if your source and upstream source differ, using technical
  mechanisms incompatible with that is nonsensical.

I claim that 6.5.12 at least is silent on the treatment of packages that
have a Debian revision.  

I agree that 6.5.12 strongly suggests that
3.0(QUILT) packages should have a debian revision.  Any thought at all
about 3.0(QUILT) raises that to a requirement rather than a strong
suggestion.
However that seems unrelated to this bug.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/0144044d1318-5b90edcf-54df-4368-8a94-4bf008381306-000...@email.amazonses.com



Re: Call to fork

2014-02-10 Thread Sam Hartman
> "debianfan" == debianfan   writes:

debianfan>I would like to propose forking Debian if the ctte
debianfan> committee selects systemd 

It's with great hesitation that I jump in here, and I know what I'm
 doing is wrong.
I hope I've earned enough credibility over the years in the project  to
 make a constructive but off-topic comment.


In all seriousness.
Forking, or creating a Debian downstream because you'd like a different
boot approach sounds like exactly the sort of constructive approach that
will help you solve your problems and get an operating system you're
happy with.

Many people have created Debian derivatives.  Debian is great for that
sort of thing.

We even work with people who create Debian derivatives on a regular
basis.

In this instance I'm quite positive that if interesting technical work
is done on such a fork several Debian developers will be delighted to
discuss what parts of it can be merged back in.

Deriving from Debian is a great way to provide a custom experience.
If you find that our boot strategy doesn't work for you and you cannot
make the improvements you wish within Debian, then such a fork would be
a great way to constructively help us all out.

however, the Debian TC list is not the right place to plan or ask about
how to create a Debian derivative.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/01441e907282-e61a0b67-b5fd-48ba-b995-1eb813e7772c-000...@email.amazonses.com



Re: Call to fork

2014-02-11 Thread Sam Hartman
Thanks for sharing this.
So, you're frustrated and very disappointed because Ddebian, something
you cared about deeply has drifted so far away from what you want that
you can no longer support it?

I hope that if you decide to fork, you succeed in creating something
that meets your needs.  I hope that where appropriate we (both the
Debian community and the broader FLOSS community)  can work together
where appropriate.

Again, thanks for being open and sharing how this is affecting you.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/01442145887a-984e7e4a-29b0-4e71-8a2a-53a8f44c45b9-000...@email.amazonses.com



  1   2   3   4   5   >