Bug#1066903: libgnt: please drop runtime dependencies

2024-03-15 Thread Richard Laager
This sounds reasonable to. It looks like you beat me to this with an NMU. Thanks! On 2024-03-15 04:08, Gianfranco Costamagna wrote: Package: libgnt Version: 2.14.4-1.1 Severity: serious Tags: patch Hello, I found some runtime dependencies, such as removed libglib2.0-0 breaking every 32bit

Bug#1066081: ntpsec: ntpd reports error about missing /var/log/ntpsec

2024-03-12 Thread Richard Laager
(Replying via mobile, so non-Debian address.) It should be reasonably possible to convert this to .d style. I will have to dig into this to fully consider all the implications, especially around handling upgrades. I think part of the issue here is that ntpd logs there by default. That is, you

Bug#1066081: ntpsec: ntpd reports error about missing /var/log/ntpsec

2024-03-12 Thread Richard Laager
Control: reopen -1 On 2024-03-12 11:10, MOESSBAUER, Felix wrote: On Tue, 2024-03-12 at 10:33 -0500, Richard Laager wrote: This is intentional. The logging is optional and whether the directory exists controls this. Hi Richard, that's a quite uncommon interface. Is this at least documented

Bug#1058451: ntpsec: FTBFS [Hurd] change Build-Depends: systemd to [linux-any]

2024-03-10 Thread Richard Laager
I think, but am not sure, that this is now functionally a duplicate of #1060506. That one tells me to change it from systemd to systemd-dev because: Since systemd_253-2 [1], these two pkgconfig files have been split into a separate package named systemd-dev. This package is arch:all,

Bug#1064025: ntpsec does not sync to server if "iburst" is missing

2024-03-10 Thread Richard Laager
I agree that the description, as provided, would be a bug. However, I cannot reproduce this. Can you provide your ntp.conf file, in full, please? -- Richard OpenPGP_signature.asc Description: OpenPGP digital signature

Bug#1065567: timedatectl does not recognize ntpsec

2024-03-06 Thread Richard Laager
If I'm understanding this correctly, I just need to install a file with the contents "ntpsec.service" to /usr/lib/systemd/ntp-units.d/50-ntpsec.list. That's easy enough to do. -- Richard OpenPGP_signature.asc Description: OpenPGP digital signature

Bug#1058451: ntpsec: FTBFS [Hurd] change Build-Depends: systemd to [linux-any]

2023-12-26 Thread Richard Laager
On 2023-12-26 22:02, Martin-Éric Racine wrote: On Wed, Dec 27, 2023 at 5:54 AM Richard Laager wrote: On 2023-12-26 21:43, Martin-Éric Racine wrote: Looking at the diff for the Hurd port What Hurd port? https://deb.debian.org/debian-ports/pool-hurd-i386/main/n/ntp/ That is the wrong

Bug#1058451: ntpsec: FTBFS [Hurd] change Build-Depends: systemd to [linux-any]

2023-12-26 Thread Richard Laager
On 2023-12-26 21:43, Martin-Éric Racine wrote: Looking at the diff for the Hurd port What Hurd port? -- Richard OpenPGP_signature.asc Description: OpenPGP digital signature

Bug#1058451: ntpsec: FTBFS [Hurd] change Build-Depends: systemd to [linux-any]

2023-12-26 Thread Richard Laager
On 2023-12-26 02:38, Martin-Éric Racine wrote: On Mon, Dec 25, 2023 at 12:20 AM Richard Laager wrote: If past me was correct, without systemd at build-time, waf will not install the systemd units. Then we will end up with other failures in debian/rules or from the .install files

Bug#1058451: ntpsec: FTBFS [Hurd] change Build-Depends: systemd to [linux-any]

2023-12-24 Thread Richard Laager
On 2023-12-12 04:52, Martin-Éric Racine wrote: Build-Depends: systemd must be changed to systemd [linux-any], since systemd has not been powerted to non-Linux platforms. I suspect that change would be necessary, but not sufficient. In commit 7f969a0ecab4ef3ab50defd4fe9d7e7a47817dbe, I wrote:

Bug#1058511: ntpsec: FTBFS: mv: cannot stat 'debian/tmp/lib/systemd/system/ntpd.service': No such file or directory

2023-12-24 Thread Richard Laager
Control: fixed 1.2.2+dfsg1-3 This looks to be the same as #1052664. -- Richard OpenPGP_signature.asc Description: OpenPGP digital signature

Bug#1058961: ntpsec: postinst should check for user:group before adding them

2023-12-24 Thread Richard Laager
On 2023-12-18 16:15, Bob Proulx wrote: Package: ntpsec Version: 1.2.2+dfsg1-3 Severity: normal Tags: patch Every time the ntpsec package upgrades it attempts to unconditionally add the ntpsec user and group as per the following postinst snippet. addgroup --system --quiet ntpsec

Bug#1059273: missing path /var/lib/ntp/drift-tmp in apparmor.d/usr.sbin.ntpd

2023-12-24 Thread Richard Laager
On 2023-12-22 05:32, Stefan Bauer wrote: Apparmor denies creation of /var/lib/ntp/drift-tmp. Where are you getting /var/lib/ntp/drift from? The ntpsec package in Debian has (from when both ntp and ntpsec existed in Debian) everything namespaced under "ntpsec". It uses

Bug#1057570: libgnt: FTBFS: error: invalid use of incomplete typedef ‘PANEL’ {aka ‘struct panel’}

2023-12-24 Thread Richard Laager
On 2023-12-20 09:57, Sven Joachim wrote: I have not tested it myself, but these errors should be fixed in libgnt 2.14.4 which has been released upstream the other day. See https://keep.imfreedom.org/libgnt/libgnt/rev/2da723f790d6, which explicitly mentions this bug. Thanks for letting me

Bug#1057966: ntpsec-ntpdate not fully compatible with ntpdate, causes adjtimex --host breakage

2023-12-10 Thread Richard Laager
From ntpdate (the wrapper): # Known bugs: # * The -e and -p options of ntpdate are not yet implemented. # * ntpdate took 4 samples and chose the best (shortest trip time). # This takes the first. I suppose there are maybe 4 options here: A) Do nothing. B) Change adjtimex to not pass -p. C)

Bug#1049424: ntpsec: Missing /var/log/ntpsec is logged as an error

2023-08-16 Thread Richard Laager
On 2023-08-15 10:35, Santiago Vila wrote: Either a missing /var/log/ntpsec directory is considered a "supported configuration" or it's not. I agree with you on the general point. I'll process this bug in more detail when time allows, in the relatively near future. I currently expect the

Bug#1043145: Upgraded ntpsec to 1.2.2+dfsg1-1+deb12u1: fewer servers remain

2023-08-07 Thread Richard Laager
The "pool" directive spins up more associations than it needs and then prunes them back (which takes a while). https://docs.ntpsec.org/latest/quick.html#pool https://docs.ntpsec.org/latest/discover.html#assoc With 4 pool servers each returning 4 A records and one of them returning 4

Bug#1040355: ntpdate: obsolete conffiles

2023-07-23 Thread Richard Laager
Fix pending as: https://salsa.debian.org/debian/ntpsec/-/commit/ed7cf69b3c7ec6cc21a604e47fbf6ee9a9966117 Feedback welcome! 1. I brought back some of the (manual) postrm bits for the ntp & ntpdate packages. This was something I should have preserved when making the transitional packages.

Bug#1036443: ntpsec: leftover files on purge

2023-07-23 Thread Richard Laager
Fix pending as: https://salsa.debian.org/debian/ntpsec/-/commit/ed7cf69b3c7ec6cc21a604e47fbf6ee9a9966117 Feedback welcome! 1. I brought back some of the (manual) postrm bits for the ntp & ntpdate packages. This was something I should have preserved when making the transitional packages.

Bug#1040354: ntp: obsolete conffiles

2023-07-23 Thread Richard Laager
Fix pending as: https://salsa.debian.org/debian/ntpsec/-/commit/ed7cf69b3c7ec6cc21a604e47fbf6ee9a9966117 Feedback welcome! 1. I brought back some of the (manual) postrm bits for the ntp & ntpdate packages. This was something I should have preserved when making the transitional packages.

Bug#1038422: ntpsec: ntpd segmentation fault in libcrypto.so[7f6d3ecc5000+278000]

2023-07-23 Thread Richard Laager
Is this reproducible for you? If you have experience with building from source, upstream has proposed the following patch. Otherwise, I could build a test package for you. diff --git a/ntpd/nts_cookie.c b/ntpd/nts_cookie.c index 166d0230f..a73955fb7 100644 --- a/ntpd/nts_cookie.c +++

Bug#1038422: ntpsec: ntpd segmentation fault in libcrypto.so[7f6d3ecc5000+278000]

2023-07-22 Thread Richard Laager
Some questions from upstream, with my commentary added... How busy is this sustem? Is it just a simple client or also a server? If server, how busy? From the stack trace, the server side is trying to decode a NTS cookie. Is this box setup as a NTS server? That needs a certificate and key so

Bug#1038876: ntpq: missing empty lines between command outputs

2023-06-28 Thread Richard Laager
I forwarded this upstream. I'm not sure how much upstream will care. But hopefully I can get a firm answer either way. -- Richard

Bug#1038422: ntpsec: ntpd segmentation fault in libcrypto.so[7f6d3ecc5000+278000]

2023-06-28 Thread Richard Laager
On 2023-06-28 20:14, forest.ow...@riseup.net wrote: On 2023-06-28 02:39, Richard Laager wrote: The original submitter replied off the tracker (probably by accident). I'll summarize here. The ntp.conf he included is the stock ntp.conf. He indicated he will try to get a backtrace. I'm trying

Bug#1036113: libpurple0: license conflict with libsasl2

2023-06-27 Thread Richard Laager
On 2023-06-27 17:35, Bastian Germann wrote: Am 28.06.23 um 00:13 schrieb Richard Laager: The last bugfix release took them more than 3 years and when #767 is released is unknown. When a release happens is irrelevant, as you can carry #767 as a patch in the Debian package until then. Even

Bug#1038422: ntpsec: ntpd segmentation fault in libcrypto.so[7f6d3ecc5000+278000]

2023-06-27 Thread Richard Laager
The original submitter replied off the tracker (probably by accident). I'll summarize here. The ntp.conf he included is the stock ntp.conf. He indicated he will try to get a backtrace. -- Richard

Bug#1036113: libpurple0: license conflict with libsasl2

2023-06-27 Thread Richard Laager
Wait a minute... You are a maintainer for cyrus-sasl. You have already addressed the BSD-4-clause-KTH in the latest upload. You also fixed debian/copyright to reference BSD-3-Clause-Attribution in the latest upload. That license is fine for the reasons I mentioned. That just leaves the MD5

Bug#996892: cyrus-sasl2: consider handling as system library

2023-06-27 Thread Richard Laager
On 2023-06-27 16:19, Richard Laager wrote: For BSD-3-Clause-Attribution BTW, my suggestion of asking CMU to drop the clause should not be read as taking or agreeing to the position that it is GPL-incompatible. I don't actually see an incompatibility with BSD-3-Clause-Attribution

Bug#1036113: libpurple0: license conflict with libsasl2

2023-06-27 Thread Richard Laager
Bastian, I see you have raised the severity on this bug again. What is your goal here? Cyrus SASL has reverse (binary) dependencies in the ballpark of 7,500. Quickly taking that list through UDD gives me just over 4,500 source packages. Surely, a large number of those are going to be GPL

Bug#996892: cyrus-sasl2: consider handling as system library

2023-06-27 Thread Richard Laager
On 2023-06-27 16:19, Richard Laager wrote: For RSA-MD, I'd imagine there are other MD5 implementations that could be dropped in relatively easily. Also, Bastian Germann mentioned in bug #1036113: "See https://github.com/cyrusimap/cyrus-sasl/issues/513 for an implementation that leaves

Bug#996892: cyrus-sasl2: consider handling as system library

2023-06-27 Thread Richard Laager
On Thu, 13 Apr 2023 14:36:12 +0200 Bastian Germann wrote: Hi Philipp, Thanks for clarifying that. There is one file in cyrus-sasl2 that is licensed under BSD-4-clause-KTH (which really has an advertisement clause), which we can get rid of; see https://github.com/cyrusimap/cyrus-sasl/pull/724.

Bug#1038422: ntpsec: ntpd segmentation fault in libcrypto.so[7f6d3ecc5000+278000]

2023-06-26 Thread Richard Laager
I'm not sure if you saw this, as he didn't send it directly to you, but Matt Selsky asked: > Can you please share your ntp.conf or if there's a particular server > that seems to cause this segfault so that we can try to reproduce it? Also, can you get a stack trace? There are some instructions

Bug#1036821: NTP does not keep accurate time on bookworm

2023-06-07 Thread Richard Laager
I've made a suggestion upstream of how we could do better here by making this either a fatal error or at least a warning. If it was a fatal error with a good error message, you would have figured it out immediately. Let's see what people think of that. -- Richard

Bug#1036821: Acknowledgement (NTP does not keep accurate time on bookworm)

2023-06-07 Thread Richard Laager
On 2023-06-07 03:22, Rob Janssen wrote: On 6/7/23 10:13, Richard Laager wrote: On 2023-06-07 02:37, Rob Janssen wrote: Yes I was using the "ntp" package before. I have upgraded and it installed "ntpsec".  I tried to remove it as I have no need for the "security&

Bug#1036821: Acknowledgement (NTP does not keep accurate time on bookworm)

2023-06-07 Thread Richard Laager
On 2023-06-07 02:37, Rob Janssen wrote: Yes I was using the "ntp" package before. I have upgraded and it installed "ntpsec".  I tried to remove it as I have no need for the "security" part but it removed "ntp" as well. And then you presumably reinstalled it. Did this result in you starting

Bug#1036821: Acknowledgement (NTP does not keep accurate time on bookworm)

2023-06-06 Thread Richard Laager
The answer is so obvious as soon as someone said it! The default "minsane" is "3" (see "tos minclock 4 minsane 3" in /etc/ntpsec/ntp.conf). Try commenting out that line, or if that doesn't work, set both to "1". -- Richard OpenPGP_signature Description: OpenPGP digital signature

Bug#1036821: Acknowledgement (NTP does not keep accurate time on bookworm)

2023-06-06 Thread Richard Laager
Since you've moved to chrony, this is probably moot for you. But in case it affects anyone else, I forwarded this upstream: https://gitlab.com/NTPsec/ntpsec/-/issues/790 Can you confirm you were running the "ntp" package on bullseye, not "ntpsec"? -- Richard OpenPGP_signature Description:

Bug#1036443: ntpsec: leftover files on purge

2023-05-25 Thread Richard Laager
At first glance, I agree that these should be cleaned up. I just need to actually do the work on this, ASAP, of course. On 2023-05-22 08:40, Christoph Anton Mitterer wrote: Oh and I've just noticed that I've had accidentally reported the bug against ntpsec, not ntp. That is correct, I

Bug#1036113: libpurple0: license conflict with libsasl2

2023-05-25 Thread Richard Laager
First, I've downgraded the severity on this to "important". We are currently in a freeze with a release imminent. Removing pidgin from the next Debian release is a significant step that we should not undertake lightly. The issue at hand has existed for years, possibly a decade or even two,

Bug#1033088: ntpsec: mssntp in ntp.conf breaks time service to all clients

2023-04-29 Thread Richard Laager
On 4/29/23 21:54, Steven Monai wrote: I downloaded and unpacked this source on a Bookworm host. The build system bundled with the source ("waf") seems to assume python 2.x, but, unfortunately, Bookworm provides only python3. Any hints? Quick approach is try this: python3 waf configure ...

Bug#1033088: ntpsec: mssntp in ntp.conf breaks time service to all clients

2023-04-28 Thread Richard Laager
forwarded 1033088 https://gitlab.com/NTPsec/ntpsec/-/issues/785 thanks Sorry for the delay in responding. I had hoped to try to reproduce this myself. But I need to be honest with myself that it's simply not going to happen. Can you confirm whether you get either of these messages to stderr

Bug#1020865: ntpsec-ntpdate: ntpdate-debian doesn't work due to missing dependency

2022-09-27 Thread Richard Laager
On 9/27/22 14:00, Dima Kogan wrote: root@shorty:/home/dima# ntpdate-debian sed: can't read /etc/ntpsec/ntp.conf: No such file or directory Yep, I see the issue. I'll upload a fix. The missing file is in the "ntpsec" package, which is not in the Depends, and maybe should be there. If I

Bug#971523: ntpsec-ntpdate: ntpdate fail if DNS name for server resolve to IPv6

2022-09-27 Thread Richard Laager
I've submitted a patch upstream to suppress those messages except in debug mode, since they are clearly confusing: https://gitlab.com/NTPsec/ntpsec/-/merge_requests/1288 This bug probably should have been marked fixed already once the upstream change to make them non-fatal was uploaded to

Bug#1013867: Don't use user ntpsec if package ntp is installed

2022-07-04 Thread Richard Laager
On 6/26/22 02:18, Klaus Ethgen wrote: When package ntp is installed (from long history), the ntp daemon is started by this /etc/init.d/ntp which uses user ntp:ntp. So all auxiliary directories and files are owned by ntp:ntp. I agree this is the expected "before" state. When ntpsec starts to

Bug#1012600: [Pkg-zfsonlinux-devel] Bug#1012600:

2022-06-19 Thread Richard Laager
I think this is because it Depends: a kernel << 5.18 and not Conflicts/Breaks a kernel >= 5.18. Since you can install multiple kernel packages, your existing kernel package is satisfying the dependency. -- Richard OpenPGP_signature Description: OpenPGP digital signature

Bug#1012699: ntpleapfetch broken

2022-06-11 Thread Richard Laager
[Responding on mobile.] I’ll take a look at it, as obviously it should be made to work. But on Debian, there shouldn’t be a need for ntpleapfetch, as the tzdata package ships the leap second file. -- Richard > On Jun 11, 2022, at 22:33, Martin Maney wrote: > >  > Correction: does not apply

Bug#1011526: pidgin: fails to start on sway

2022-05-25 Thread Richard Laager
On 5/25/22 02:05, Samtinel wrote: Are other GTK apps working? Yes, dino-im starts successfully. GTK 2 Uh, this I did not check. I will do that when I get to my terminal later. So you happen to know a simple GTK 2 package I can test on? I don't. So much stuff has moved to GTK 3 (or now

Bug#1011526: pidgin: fails to start on sway

2022-05-24 Thread Richard Laager
I really don't know. Are other GTK apps working? If so, GTK 2 apps specifically? -- Richard

Bug#1011166: [Debian-on-mobile-maintainers] Bug#1011166: Bug#1011166: pidgin breaks chatty autopkgtest: error while loading shared libraries: libjabber.so.0

2022-05-20 Thread Richard Laager
On 5/20/22 01:56, Evangelos Ribeiro Tzaras wrote: Hi, On Thu, 2022-05-19 at 22:23 -0500, Richard Laager wrote: On 5/19/22 04:04, Evangelos Ribeiro Tzaras wrote: Thanks for the patch! I'll upload a fixed version soon. If you upload a new version, you (or I) can then close the binNMU request

Bug#1011166: [Debian-on-mobile-maintainers] Bug#1011166: pidgin breaks chatty autopkgtest: error while loading shared libraries: libjabber.so.0

2022-05-19 Thread Richard Laager
On 5/19/22 04:04, Evangelos Ribeiro Tzaras wrote: Thanks for the patch! I'll upload a fixed version soon. If you upload a new version, you (or I) can then close the binNMU request, bug #1011201. -- Richard OpenPGP_signature Description: OpenPGP digital signature

Bug#1011166: pidgin breaks chatty autopkgtest: error while loading shared libraries: libjabber.so.0

2022-05-18 Thread Richard Laager
Control: notfound 1011166 pidgin/2.14.9-2 Control: tags 1011166 patch On 5/17/22 15:34, Paul Gevers wrote: I note that the library moved location from /usr/lib/purple-2/libjabber.so.0.0.0 to /usr/lib/x86_64-linux-gnu/purple-2/libjabber.so.0.0.0. I converted from an ancient compat version to

Bug#1011201: nmu: chatty_0.6.3-1

2022-05-18 Thread Richard Laager
Package: release.debian.org User: release.debian@packages.debian.org Usertags: binnmu Severity: normal chatty directly links against an internal library (libjabber.so.0) in libpurple0. This is technically wrong, but at the moment, it is what it is. I converted libpurple0 to multiarch, which

Bug#1006350: pidgin: crashes when typing past visible number of lines

2022-04-15 Thread Richard Laager
This has hopefully been fully fixed now (upstream). It will land in the 2.14.9 release, which should be coming next week. However, I've uploaded a backport of it now. -- Richard

Bug#1001610: Gbonds

2022-01-31 Thread Richard Laager
On 1/31/22 19:37, Trey Glover wrote: I had no idea that the treasury was doing this. Is there a code fix in place yet? In unstable, yes; it's fixed in 2.0.3-17. I wrote code to use the Treasury API to generate old-style sbMM.asc files which are stored (as always) in ~/.gbonds/ In

Bug#1004709: update-ieee-data URLs need updating

2022-01-31 Thread Richard Laager
Package: ieee-data Version: 20210605.1 I ran into this on 20180805.1 on Ubuntu 20.04, but I verified that the same URLs are present in Debian's 20210605.1. update-ieee-data references URLs (see the files_to_get variable near the top) which which no longer work. For example, this 404s:

Bug#1003956: ntpsec: security settings

2022-01-25 Thread Richard Laager
On 1/25/22 17:08, Christoph Anton Mitterer wrote: On Tue, 2022-01-25 at 16:34 -0600, Richard Laager wrote: Consider a powerful attacker who a) runs a clocksource one trusts and b) can block traffic to any other sources in the pool one uses? Does NTP(sec) complain eventually (like too many

Bug#1003956: ntpsec: security settings

2022-01-25 Thread Richard Laager
On 1/25/22 10:45, Christoph Anton Mitterer wrote: On Tue, 2022-01-25 at 00:54 -0600, Richard Laager wrote: There are two potential issues: A) the server serves bogus/malicious time B) a MITM messes with the time. (A) is kinda what I'd want to prevent by having -g removed... at least

Bug#1003966: ntpsec: split out ntpdig?

2022-01-24 Thread Richard Laager
I'm relatively set on the idea of breaking out ntpdig, since it's the renamed replacement for sntp which is broken out in src:ntp, which we are talking (on debian-devel) about ntpsec replacing. -- Richard OpenPGP_signature Description: OpenPGP digital signature

Bug#1003956: ntpsec: security settings

2022-01-24 Thread Richard Laager
Control: reopen -1 On 1/24/22 13:25, Christoph Anton Mitterer wrote: On Tue, 2022-01-18 at 21:52 -0600, Richard Laager wrote: Shouldn't -g be removed? First off, note that the stock ntpsec.service has Restart=no, not Restart=yes. So in the malicious/broken server scenario described, ntpd

Bug#1003966: ntpsec: split out ntpdig?

2022-01-18 Thread Richard Laager
I have a few questions: 1. What is your use case for ntpdig and/or ntpdate (please be specific which) if not for the hooks? Note that ntpdate is a wrapper script around ntpdig that upstream does not install by default. And then there's ntpdate-debian wrapping ntpdate. 2. My recollection is

Bug#1002563: bullseye-pu: package gbonds/2.0.3-16+deb11u1

2021-12-23 Thread Richard Laager
A couple more things: This seems like it would qualify for the stable-updates special case to be pushed out before the next point release. Granted, this is not a popular package, so I'm not sure if that affects the decision. I don't immediately have plans to make updates for buster or

Bug#1002563: bullseye-pu: package gbonds/2.0.3-16+deb11u1

2021-12-23 Thread Richard Laager
7:41:52.0 -0500 +++ gbonds-2.0.3/debian/patches/download-sites 1969-12-31 18:00:00.0 -0600 @@ -1,15 +0,0 @@ -Description: Remove snaught.com from the download list - It didn't have the latest redemption data. This leaves only the - official U.S. Treasury FTP site. -Author:

Bug#1001610: GBonds Unable to Update Redemption Tables

2021-12-12 Thread Richard Laager
Package: gbonds Version: 2.0.3-8 Severity: grave The U.S. Treasury has discontinued publishing the sbMM.asc files on its FTP site. Unfortunately, this means that GBonds is unable to update its redemption tables. Given that a, if not the, major reason to use GBonds is to track the current

Bug#999375: rsyslog randomly exits, possibly caused by imrelp

2021-11-11 Thread Richard Laager
FWIW, you can force OpenSSL with this, which is what I do: module(load="omrelp" tls.tlslib="openssl") -- Richard

Bug#996699: [Debian-on-mobile-maintainers] Bug#996699: chatty: Cross-building fails to resolve libpurple-dev

2021-10-20 Thread Richard Laager
On a related note, I still need to bring this package's debehlper compat level current. That would hopefully address these: W: finch-dev: pkg-config-unavailable-for-cross-compilation usr/lib/pkgconfig/finch.pc W: libpurple-dev: pkg-config-unavailable-for-cross-compilation

Bug#995370: pidgin: segmentation fault on malloc/free

2021-10-04 Thread Richard Laager
I've uploaded a 2.14.7-2 with the upstream patch that should fix the issue. If it doesn't, please let me know. -- Richard OpenPGP_signature Description: OpenPGP digital signature

Bug#995370: pidgin: segmentation fault on malloc/free

2021-10-01 Thread Richard Laager
On 10/1/21 7:11 AM, Václav Ovsík wrote: This is the changeset causing segfaults. Thanks! That's excellent that you bisected it all the way to a commit (not just a release). I've copied this to the upstream bug report. -- Richard

Bug#995370: pidgin: segmentation fault on malloc/free

2021-09-30 Thread Richard Laager
On 9/30/21 7:16 AM, Vaclav Ovsik wrote: after ugprade of pidgin:amd64 to 2.14.7-1 from 2.14.1-1+b1 Are you in any position to bisect this by building the intermediate 2.14.x versions of Pidgin? -- Richard

Bug#995042: pidgin: new upstream releases 2.14.2 to 2.14.7

2021-09-25 Thread Richard Laager
Thanks for your report. I was finally able to find some time today for Debian work. I've updated to the latest Pidgin release. I do have a lot more work to do on modernizing the packaging, but at least we're shipping the latest upstream release now. -- Richard

Bug#995090: systemd_system_unit_dir should be /usr/lib/systemd/system

2021-09-25 Thread Richard Laager
Package: systemd Version: 247.9-2+b1 Severity: normal $ pkg-config --variable systemd_system_unit_dir systemd /lib/systemd/system This should be /usr/lib/systemd/system instead. debhelper and lintian now use/expect this path. See: lintian-explain-tags systemd-service-in-odd-location which

Bug#989976: unblock: ntpsec/1.2.0+dfsg1-4

2021-06-17 Thread Richard Laager
0+dfsg1/debian/changelog --- ntpsec-1.2.0+dfsg1/debian/changelog 2021-01-20 20:36:38.0 -0600 +++ ntpsec-1.2.0+dfsg1/debian/changelog 2021-06-17 00:15:04.0 -0500 @@ -1,3 +1,9 @@ +ntpsec (1.2.0+dfsg1-4) unstable; urgency=medium + + * ntpkeygen: Stop using # character: CVE-2021-22212 (Closes

Bug#989847: CVE-2021-22212

2021-06-17 Thread Richard Laager
I've uploaded a targeted fix to unstable and requested an unblock. -- Richard

Bug#989847: CVE-2021-22212

2021-06-14 Thread Richard Laager
On 6/14/21 1:59 PM, Moritz Muehlenhoff wrote: Package: ntpsec Severity: important Tags: security X-Debbugs-Cc: Debian Security Team This was assigned CVE-2021-22212: https://gitlab.com/NTPsec/ntpsec/-/issues/699 Patch:

Bug#983095: pidgin: 5353/udp probe every 2 sec

2021-06-07 Thread Richard Laager
Unfortunately, I don't see any references to 5353 in any of that. However, I do see a mention of libgstmicrodns.so. I wonder if that's related. Could you run: dpkg -S /usr/lib/x86_64-linux-gnu/gstreamer-1.0/libgstmicrodns.so Then remove whatever package ships that library? You can reinstall

Bug#983095: pidgin: 5353/udp probe every 2 sec

2021-06-03 Thread Richard Laager
On 5/16/21 7:50 PM, Richard Laager wrote: So it's happening in a child process. Gary had an idea here... Pidgin generally only uses child processes for DNS. Is it possible that you have some NSS plugin that is doing this? Specifically, do you have libnss-mdns installed? I do, and I still

Bug#988819: libgnt-doc: broken symlinks: /usr/share/doc/libgnt-doc/* -> ../../gtk-doc/html/*

2021-05-20 Thread Richard Laager
On 5/19/21 3:31 PM, Andreas Beckmann wrote: Should libgnt-doc have a Depends/Recommends/Suggests: libglib2.0-doc ? Yes. Thanks! In the course of investigating this, I found that I also need libglib2.0-doc as a Build-Depends. I've made both fixes, but intend to wait to upload until after the

Bug#983095: pidgin: 5353/udp probe every 2 sec

2021-05-16 Thread Richard Laager
On 5/16/21 3:21 AM, Slavko wrote: I didn't see it, pidgin.log attached, but tcpdump shows them. Then i tried it with -f option to strace: Good thinking. So it's happening in a child process. A good next step is to use gdb, but the fork will complicate things. I think you can do "set

Bug#983095: pidgin: 5353/udp probe every 2 sec

2021-05-12 Thread Richard Laager
Can you try this: rm -rf pidgin-test mkdir pidgin-test strace -e trace=socket,sendto pidgin -c pidgin-test 2>&1 | \ tee pidgin.log Hopefully you'll see some socket() call for 5353 and some sendto() calls as it sends the packets. If so, then let's try to find out what is opening that

Bug#983095: pidgin: 5353/udp probe every 2 sec

2021-05-10 Thread Richard Laager
I was never able to reproduce this, nor was Gary (Pidgin lead developer). Are you able to narrow this down at all? For example, if you run: mkdir pidgin-test pidgin -c pidgin-test that will start with a blank config. Does it happen then? If not, try adding accounts and/or enabling

Bug#983095: pidgin: 5353/udp probe every 2 sec

2021-02-23 Thread Richard Laager
I am not able to reproduce this. Do you have a packet capture? Specifically, I'd like to know what sort of request it is. -- Richard

Bug#949977: ITP: libgnt -- GLib Ncurses Toolkit

2021-01-22 Thread Richard Laager
This obviously took me a long time to get to, but I finally have. 1. As discussed with Ari, I have adopted the Pidgin package. I also made a few cleanups at the same time. More extensive updating (e.g. to modern debhelper compat) will probably have to wait until after bullseye, given

Bug#980508: ntpsec: apparmor="DENIED" while trying to read /etc/ssl/openssl.cnf

2021-01-20 Thread Richard Laager
On 1/19/21 6:09 PM, Diederik de Haas wrote: # journalctl -kaf --no-hostname | grep -w 'apparmor="DENIED"' jan 20 00:45:32 kernel: audit: type=1400 audit(1611099932.689:41): apparmor="DENIED" operation="open" profile="/usr/sbin/ntpd" name="/etc/ssl/openssl.cnf" pid=43157 comm="ntpd"

Bug#980464: [Pkg-zfsonlinux-devel] Bug#980464: zfs-dracut: dracut+ZFS-on-root systems rendered unbootable

2021-01-19 Thread Richard Laager
FWIW, I gave the patch a review and it seems sane to me. I also looked at the package in unstable and confirmed that zgenhostid is being installed to /sbin, not /bin. -- Richard

Bug#977794: marked as done (ntpsec: Stops after seeing an old version of openssl is used)

2020-12-21 Thread Richard Laager
On 12/21/20 2:51 AM, Debian Bug Tracking System wrote: I'd expect the update of ntpsec triggers too the update of libssl1.1 to a compatible version. I ended up taking the opposite approach. I patched out the OpenSSL build vs install version check from upstream NTPsec. While I definitely think

Bug#971523: ntpsec-ntpdate: ntpdate fail if DNS name for server resolve to IPv6

2020-10-25 Thread Richard Laager
tags 971523 upstream forwarded 971523 https://gitlab.com/NTPsec/ntpsec/-/issues/680 On 10/1/20 4:13 AM, Petter Reinholdtsen wrote: > ntpdig: socket error on transmission: [Errno 101] Network is unreachable > > My guess is that you have working IPv6, while I do not. > > root@devuan-n900:~# ping6

Bug#972132: [Pkg-zfsonlinux-devel] Bug#972132: zfs-initramfs: Fails to boot when / is on zfs encryption=on dataset

2020-10-12 Thread Richard Laager
On 10/12/20 9:29 PM, John Goerzen wrote: > I have set up this system to use ZFS crypto rather than my more conventional > zfs-atop-LUKS. Can you explain a little bit more about how you setup your system? This (root-on-ZFS with native encryption) already works for me on Buster (with ZFS from

Bug#971523: ntpsec-ntpdate: ntpdate fail if DNS name for server resolve to IPv6

2020-10-01 Thread Richard Laager
On 10/1/20 3:19 AM, Petter Reinholdtsen wrote: > root@devuan-n900:~# /usr/sbin/ntpdate -b 0.debian.pool.ntp.org > 1.debian.pool.ntp.org 2.debian.pool.ntp.org 3.debian.pool.ntp.org > ntpdig: socket error on transmission: [Errno 101] Network is unreachable NTPsec's ntpdate is just a

Bug#960132: mdadm: mdcheck_start.service trying to start unexisting file

2020-09-18 Thread Richard Laager
name): --- mdadm-4.1/debian/changelog 2019-01-15 12:23:53.0 -0600 +++ mdadm-4.1/debian/changelog 2020-09-18 02:09:41.0 -0500 @@ -1,3 +1,9 @@ +mdadm (4.1-1+deb10u1) buster; urgency=medium + + * Install misc/mdcheck (Closes: #960132) + + -- Richard Laager Fri, 18 Sep 2020 02:

Bug#959013: RFS: gnome-maps/3.30.3.1-0+deb10u1 [NMU] -- map application for GNOME

2020-09-12 Thread Richard Laager
FWIW, this looks good to me. This is a new upstream release, but it's a bug-fix only (adding a translation update at the same time seems fine). Is there a particular reason this should NOT be uploaded? -- Richard signature.asc Description: OpenPGP digital signature

Bug#960132: mdadm: mdcheck_start.service trying to start unexisting file

2020-09-11 Thread Richard Laager
On Sun, 10 May 2020 02:16:57 +0700 Павел Мотырев wrote: > There is a patch in attachment, that adds missed scripts into the > package during build process. syslog-events is already installed by a dh_installexamples call. Also, I'm not sure why this would need to install the mdcheck script into

Bug#962509: Not always boot arguments must include a root= parameter

2020-09-07 Thread Richard Laager
On 9/7/20 4:00 AM, kvaps wrote: > Thanks for your intention to help. > It seems I already found the correct solution for my case, > > The problem persists only for the scripts/local, which is set by > default (BOOT=local) > We can review two cases where it might be caused: > > 1. LTSP and

Bug#962509: Not always boot arguments must include a root= parameter

2020-09-06 Thread Richard Laager
On Tue, 9 Jun 2020 01:25:58 +0200 kvaps wrote: > Package: initramfs-tools > Version: 0.133+deb10u1 > > Hi, after the change introduced in f8ceeb90 both zfs and http booting > methods are not working anymore, it stops on the message: > > No root device specified. Boot arguments must include a

Bug#656060: logrotate: drop compress option

2020-08-12 Thread Richard Laager
to make it easier to grep the files. In the Root-on-ZFS HOWTOs that I maintain, I recommend people turn it off for reason A. At $DAYJOB, we use ext4 but turn off log compression for reason C (and the implied B). > p.s.: @Richard Laager: I quite did not get the point with the snapshots. 1. Write

Bug#968329: gbp import-orig should strip +dfsg, etc. for upstream-vcs-tag

2020-08-12 Thread Richard Laager
for _upstream_version_from_debian_upstream(). In a previous version, I called it _mangle_upstream_version(). -- Richard From 7cc1195bac48833fa551102a114d943be2cc006b Mon Sep 17 00:00:00 2001 From: Richard Laager Date: Wed, 12 Aug 2020 21:54:06 -0500 Subject: [PATCH 1/4] import-orig: Fix a comme

Bug#966565: [zfsutils-linux] zfs-mount-generator broken by git_fix_dependency_loop_encryption1.patch

2020-07-30 Thread Richard Laager
On 7/30/20 1:58 PM, Antonio Russo wrote: > Changing this line to > > pools=$(zpool list -H -o name | true) This should be || true (two pipes, not one). -- Richard signature.asc Description: OpenPGP digital signature

Bug#957616: ntpsec: ftbfs with GCC-10

2020-07-25 Thread Richard Laager
On 7/25/20 5:27 PM, Reiner Herrmann wrote: > this has been fixed in version 1.1.9. > The relevant commit is this one: > > https://gitlab.com/NTPsec/ntpsec/-/commit/ccdd9d4b941b30fc44b301595e42809dbe48628d Thanks for that information! That saves me investigating. I need to get 1.1.9 packaged

Bug#962424: [Pkg-zfsonlinux-devel] Bug#962424: zfsutils-linux: systemd zfs-mount-generator breaks boot if multiple datasets have the same mountpoint

2020-06-09 Thread Richard Laager
On 6/9/20 7:02 PM, Wxcafé wrote: > I don't use zfs-import-cache since it's a single pool that contains the > root so it's in the kernel cmdline and imported at that point. I wasn't asking about the pool cache, but the filesystem cache file used by zfs-mount-generator. That would show all the

Bug#962424: [Pkg-zfsonlinux-devel] Bug#962424: zfsutils-linux: systemd zfs-mount-generator breaks boot if multiple datasets have the same mountpoint

2020-06-09 Thread Richard Laager
On 6/7/20 3:12 PM, wxcafe wrote: > The systemd zfs-mount-generator script > (/lib/systemd/system-generators/zfs-mount-generator) can break system > boot if there are multiple datasets with the same mountpoint, because it > ignores the zfs property canmount=noauto. It certainly does not "ignore"

Bug#961748: Does CVE-2018-8956 affect ntpsec?

2020-05-30 Thread Richard Laager
On 5/28/20 1:39 PM, Moritz Muehlenhoff wrote: > Source: ntpsec > Severity: normal > Tags: security > > There was a "new" CVE assignment for ntp (2018 ID, but appeared today): > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8956 > > Does this affect ntpsec? Almost certainly not. NTPsec

Bug#961094: [Pkg-zfsonlinux-devel] Bug#961094: zfsutils-linux: Hostid is not regenerated on a clone/copy/restore of the underlying OS

2020-05-19 Thread Richard Laager
On 5/19/20 7:34 PM, Real Carbonneau wrote: > For example, every clone of a Debian system has a UUID (eg command "dmidecode > -t 1"), thus it would be simple to generate a new hostid (possibly keeping the > old one backed up) when the system uuid has been observed to have changed. The BIOS UUID is

  1   2   3   4   >