Thankfully My Last Post

2014-05-12 Thread Kevin Chadwick
On Mon, 12 May 2014 12:00:48 +0200
A debian dev wrote:

 Nobody cares.
 
 Please go away.

You apparently don't care that an official debian document is making
sweeping incorrect statements even though I have told you I have
professional experience in this area and pointed debian to a buildroot
link multiple times that at the very least shows your page to be
inaccurate. Devices are getting smaller and smaller and mhz aren't
equivelent at all for any idiots out there, systemd is not even close
to a Universal init.

Perhaps it is still under consideration but you also don't seem to have
given nearly enough consideration to su breakage and ploughed ahead
with su eradication despite rc.local likely being used under
systemd. Users not having read this thread will quite rightly from
learning from much more authoritative sources than debian continue to
use su in /etc/rc.local. Is there any danger to security of those users
from doing that; unanswered and unconsidered? This is important as I
guarantee users will continue to do so and likely forever and no
amount of website writing will change that.

The tech-ctte decision was 50/50 and the final statements largely
ignored the crux of the issues, an obviously significant part??? of
systemds 50% was based on licensing and not technical arguments that
you keep insisting on whilst ignoring pro systemd non technical and
incorrect statements. I have no preference for Upstart beyond over
systemd but if Ubuntu did decide to inhouse it then how is that an
issue. You still have a license to continue to use that code and develop
it. It is quite rediculous when the technical consequences are far
reaching and even affect Linux beyond debian that this should be a
major factor especially when /sbin/init has been undeveloped for so
long or do you want pid1 to be re-developed for ever. It has also been
said that a fork may be required anyway due to the belligerent nature
of upstream. Good intentions to develop for the good of the task itself
for shared benefit is the main thing that counts outside of legal
nonsense like patents.

Perhaps there should have been tech-ctte decisions on the various
points.

Having just looked it up I am surprised Matthias Urlichs actually is a
debian dev and suggest he qualifies his statements much more before
making them?

The Tech-Ctte output was rather poor largely due to the obfuscation
systemd places on the crux of what it deals with and that is primarily
why I tried to correct debian developers statements.

Perhaps debian simply inherited the changes to su but no-one spoke
against it in 1999 or 2000. I am sure Theo among others would have
spotted that fundamental default behaviour change and the potential
future danger and not allowed it to happen and this makes me appreciate
OpenBSD even more. (I know PAM would thankfully have no chance of
getting into OpenBSD but that is not the point)

A major part of why I am leaving and investigating my options is because
I see major management problems and do not believe debian is anywhere
near as stable or universal as it purports to be, though much more than
Fedora.

___

There are two ways of constructing a software design. One is to make
it so simple that there are OBVIOUSLY no deficiencies. And the other is
to make it so complicated that there are no OBVIOUS deficiencies

Professor C. A. R. Hoare
The 1980 Turing award lecture
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/372796.30485...@smtp141.mail.ir2.yahoo.com



Re: correct use of su

2014-05-11 Thread Kevin Chadwick
previously on this list Steve Langasek contributed:

 Yes.  This has been the case for su in Debian since 1999, and to do
 otherwise would break a variety of configurations where session setup is
 required in order for, e.g., the su process to have access to the files of
 the target user.

It seems to me that someone needlessly? dropped the ball in 1999 then
and this should have perhaps been a new flag or added to -l where PAM
is in use, as it fundamentally changes the behaviour contrary to the
varying titles of su.

Now done of course and for so long I wouldn't know what the fallout to
debian and other things would be and so the best way to fix this bug
today at all. I do know that I would much prefer if a script in rc.local
that uses su to drop priviledges and maybe even then sudo to re-gain
one or two worked on all unix-like systems and without having to deal
with debians overly complex scripts in comparison to bsd or create a
systemd unit (I think it's clear I wouldn't). However as I don't use
polkit and use sudo to handle my suspending and shutdowns I think I
probably could without issue anyway? 

Not being a PAM fan but only locking it down a little on systems with
it. I can't say I fully understand the weight of grounds with which
must not was stated though.

I hope I don't get flamed as I am not enjoying or intentionally bashing
these things for any political reason and I'm actually rather busy. I
simply strive for what I see as simpler and better alternatives in ease
of use/config and lack of exploits and don't believe I should have to
hide anything.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/248613.30904...@smtp148.mail.ir2.yahoo.com



Re: Avoiding systemd

2014-05-11 Thread Kevin Chadwick
previously on this list Russ Allbery contributed:

 by the non-stop sniping (for *months* now) by people like Kevin Chadwick,

Well I have only responded to incorrect statements and have tried to
ignore any that are not from debian developers and may not affect the
future of debian but you can't always tell if the person is a debian
developer or not (no @debian.org or footer).

I shall do myself and some of you a favour however but maybe not the
world and unsubscribe as I think I will be unable to ignore everything
especially incorrect or innacurate sweeping statements such as found
on the following link which I assume is a form of consensus from the
developers.

https://wiki.debian.org/Debate/initsystem/systemd

Embedded systems benefit from speed improvements, shell-less design,
ability to remove optional components, and lower memory footprint.

Perhaps I should mention that some of my work involves programming
embedded systems including linux and deeper embedded.

I have been considering my options (Slackware, but hopefully and
most beneficially Openbsd and a linux kernel) recently anyway and
whilst I won't cut off my nose to spite my face. I have been wondering
if whilst having debian repos available of so many packages is
convenient offline perhaps it is limiting me to an out of date subset
of available compilable code when most additional tools are small and I
am quite capable of fixing any issues with impact. Threads have also
brought into question the security of those repos and DVDs, where I
thought it was rather higher (atleast I know how trustable a program is
if I download it manually).

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/773142.30904...@smtp148.mail.ir2.yahoo.com



Re: systemd-fsck?

2014-05-11 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

 I haven't yet seen a system where booting with init=/bin/bash works but
 booting systemd in emergency mode does not.

Have you added me to a killfile?

I mentioned such a bug as happened in Arch testing in this very thread
or do you mean a debian system?

How it wasn't found before hitting testing beats me but doesn't
surprise me on arch. I imagine it wouldn't happen even on debian
experimental as I would hope upstream code would be tested out of
tree first? I got the impression it was a systemd release with the
segfault but find that hard to believe too but perhaps arch used pid1
differently to upstream testers.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/639917.30904...@smtp148.mail.ir2.yahoo.com



Re: systemd-fsck?

2014-05-11 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

  Will a script doing this be portable to other Linuxes or even BSD
  Unices?

 No. BSD has daemon(8). If you want portability, you probably need to check
 what's available. (start-stop-daemon, daemon (on BSDs), sudo)
 

I can tell you that not all systems (pclinux os and others) have sudo
though I think they should and why should people know or re-learn how
to use sudo for that. The only portable and intuitive thing almost
guaranteed to be available is su, atleast it was.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/273168.30904...@smtp148.mail.ir2.yahoo.com



Re: systemd-fsck?

2014-05-10 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

 I also would not expect an end user to add su foo -c /do/whatever to
 /etc/rc.local. Your opinion may differ, that's OK.

My opinion certainly does differ as I'm sure is already apparent ;-)
especially that pid1 and single user should most certainly be
technically held to a higher level of scrutiny where the decision
to increase it's complexity has been decided (perhaps you meant the
other parts of systemd though).

I love sudo but do not use it in rc.local. How can using substitute user
identity in rc.local possibly be wrong, please elaborate without
mentioning PAM. I can't say I know the details but even so surely the
bug has to be either with systemd or my expectation being PAM?

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/704384.38987...@smtp111.mail.ir2.yahoo.com



Re: systemd-fsck?

2014-05-10 Thread Kevin Chadwick
previously on this list Steve Langasek contributed:

  Using systemd breaks something that worked for probably a decade or longer
  before however long that su is in that init script.  So on what account do
  you call calling su in an init script a bug?  It may not be the most
  elegant solution to do things, granted, but a bug?  Come on.  Calling it a
  bug just cause systemd / policykit treat calling su in an initscript as
  they do is quite arrogant in my eyes.  
 
 As the maintainer of the pam package in Debian, I assure you: this is a bug
 in dirmngr.  System services should not (must not) call interfaces that
 launch pam sessions as part of their init scripts.  su is one of those
 interfaces.

In that case should it be one of those interfaces. 

He is right, books tell you (for decades) quite rightly to do just that
in rc.local for example. Examples are all over the internet, so if this
breaks your system are you or RedHat going to change all those books
and websites to say but if you are using Linux post 20?? you now have to
do it differently unless you use Slackware or maybe Gentoo or???, that
is irresponsible or bad planning or configuration or perhaps money in
RedHat's pocket for support if I was inclined to be sinical.

The su utility allows a user to run a shell with the user and group
ID of another user without having to log out and in as that other user.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/101395.27220...@smtp148.mail.ir2.yahoo.com



Re: systemd-fsck?

2014-05-09 Thread Kevin Chadwick
previously on this list Simon McVittie contributed:

 That would let cautious systemd users keep the
 sysvinit binaries around, and boot with init=/usr/lib/sysvinit/init if
 something went horribly wrong with systemd.

Not that it would affect me but that would be wise, an upstream bug
caused arch testings pid1 to segfault not long after they switched.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/651368.84881...@smtp114.mail.ir2.yahoo.com



Re: standalone logind (Re: Bits from the systemd + GNOME sprint)

2014-05-07 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

 Hi,
 
 Kevin Chadwick:
   * last but not least: if you do have a tangible reason for your post, i.e.
 one of your packages doesn't work with the way systemd is packaged,
 kindly tell us which package that is and what you're trying to do.
  
  My first mail stated it.
 
 Did not. See below.
 

There may be less to consider for a user/admin about dependence
on the simpler or particular parts of the package for example.

I have avoided root ipv6 exploits due to similar scrutiny.



  Why do you question it.
 
 Because I do not share your opinion. 
 

I guess I need to make sure I stick to one main point as you have
twisted the first question and jumped on my responses even when I
stated they weren't the raised issue. I guess I will have to remember
that as it simply allowed you to distract from the raised issue and
create more noise. Even the thread rename is wrong. There are multiple
binaries in systemd-services so simply breaking them up into multiple
packages means the dependency information needs to be considered once
instead of wasting many admins time, never mind porters and embedded
work. You know I have been considering but it now occurs to me that it
may actually be easier to get something like alpine mini (a kernel and a
small userland) running under qemu to handle a usb driver for a
proprietary tool that enables a tcp port gdbserver or look at porting
access to OpenBSD than deal with debian and systemd.

Out of interest, how does debian kfreebsd compatibility with Linux only
software fair?

  Look at all the tasks mentioned in the logind man page some of which are
  unneeded and complex and will have affects upon security.
 
 … which are …?
 

Multi-seat management

Session switch management

Device access management for users

Automatic spawning of text logins on virtual console activation and
user runtime directory management.


By unneeded and which I had already stated I meant by me. I need none of
these and nor would any of my users or products. So why should the job
of removal be harder than it could quite easily be and would be from
almost any other upstream. 

More exploits will be found so why make the job of avoiding them where
there is no downside more difficult. Especially when these two were
quite dangerous.

http://osvdb.org/search?search%5Bvuln_title%5D=logindsearch%5Btext_type%5D=alltext

__

This has been twisted onto an init argument that I never intended
somehow despite the closing line below. So as you haven't already you
may wish to stop reading as this has nothing to do with the raised
issue and is simply adding yet more noise.

 Like systemd in general, I question your assertion that splitting
 logind into separate programs has any effect other than needlessly
 increasing complexity. Now you have at least two programs whose services
 are necessary (or at least damn convenient) to have on a normal Debian
 system; also, these might need to talk to each other, above everything else
 they do -- so you get to debug two interacting asynchronous processes
 instead of one single-threaded one.
 

Might need talk to each other is basically saying in many cases they
don't and that is hardly difficult with many plus sides being:

Competition; better code more easily and readily replaced with even
better or more application specific code and with less devotion of time,
easier porting and adaptability, ease of application specific changes,
well defined tasks and implementations. More easily audited code, More
easily understood code. Less exploitable code required in memory not
to mention less memory required for any particular task to be
accomplished. Using more memory in total means little in the face of
the benefits of requiring less per task when you consider use cases.

I could go on and talk for a very long time about this but you would be
better off buying some books about the origins of Unix and why it works
so well and on so many platforms and is so adaptable to so many
completely different and diverse situations and purposes.


 
 As I'd like to keep d-devel civil (and mostly-technical), I will stop here.
 
 -- 
 -- Matthias Urlichs


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick

Re: standalone logind (Re: Bits from the systemd + GNOME sprint)

2014-05-06 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

   
   Sorry, but I suspect the latter.
  
  Why did I expect any reasonable and balanced discussion! I suspect
  but haven't mentioned that I expect the reasons for bundling these
  components together to be on highly questionable grounds.
  
 Oh, you mentioned that plainly enough.

Really why not quote then, you are an assuming liar and quote the only
contentless part of my email which was a reply to your original
assumption.

 
 A reasonable and balanced discussion may be started when somebody comes
 forward with legitimate technical problems.  I did not perceive your
 concerns as such.
 
 * for better or worse, Debian decided on systemd as its future init system.
   As such it's probably going to be Priority: Standard, and Joe+Jane DD
   expect (IMHO entirely reasonably) that it's going to be all there.
 
 * you didn't actually state what the TECHNICAL problem is. I don't like
   it is not a technical reason. Another package will have problems
   replacing | turning off | not installing some part of systemd is
   (respectively) true but not demonstrated to be relevant | false | not
   deemed relevant given the wide availability of multi-GByte microSD cards
 
 * your signature has already been mentioned. If you state up front that
   you're not interested in a reasonable discussion, don't complain when it
   doesn't happen.
 

I stand by it absolutely. There is no bias there only a deeply
technically founded opinion. What has that got to do with being open
minded and balanced on a point by point technical basis. You are the
one being closed minded and dismissive.

 * last but not least: if you do have a tangible reason for your post, i.e.
   one of your packages doesn't work with the way systemd is packaged,
   kindly tell us which package that is and what you're trying to do.

My first mail stated it. Why do you question it. Look at all the tasks
mentioned in the logind man page some of which are unneeded and
complex and will have affects upon security. Removing logind when
apps expect it is potentially insecure too especially if many are like
you and will not test this possibility. I have avoided root ipv6
exploits due to similar scrutiny. I don't see how you only caring about
functionality and not security or correctness is any reasonable
response.


 
  I guess there is no unlaborious way to see which programs depend on a
  particular binary of a given package?
  
 The people packaging systemd probably (I do not speak for them) did not see
 any good reason to split up these packages, for the reasons I mentioned in
 this and my last email.

Nothing you mentioned touched on that at all. What would best practice
be?

 If this is a real problem for you, kindly speak up
 and tell us why disabling logind with two quick systemctl commands,
 assuming that you _really_ do not need it, is insufficient.
 

See above. Though I didn't know it could be disabled officially like
avahi-daemon so thanks for that. It is still important for an admin to
be able to quickly see what packages may have issues or how to avoid
any unexpected security issues as a result of packages expecting it to
be around.

-- 
___

There are two ways of constructing a software design. One is to make
it so simple that there are OBVIOUSLY no deficiencies. And the other is
to make it so complicated that there are no OBVIOUS deficiencies

Professor C. A. R. Hoare
The 1980 Turing award lecture
___
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/806463.34955...@smtp118.mail.ir2.yahoo.com



Re: standalone logind (Re: Bits from the systemd + GNOME sprint)

2014-05-05 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

 The second case is a no-brainer. Many packages in Debian consist of more
 than one binary, of which you need at most one (if that). Do you really
 want to mass-file a bug against all of these _and_ the packages depending
 on them, or are you picking on systemd for non-technical reasons here?
 
 Sorry, but I suspect the latter.

Why did I expect any reasonable and balanced discussion! I suspect
but haven't mentioned that I expect the reasons for bundling these
components together to be on highly questionable grounds.

Something like avahi-daemon can be easily understood as what it is
needed for and whilst I would like to remove it I can simply disable the
service without any consideration as I know I have no use for it even
if I use cups meaning an increases in security without any
functionality loss for our users.

Things like coreutils are used but not resident. With systemd-services
knowing what it is doing is more important and being able to avoid
complex resident code with minimal sacrifice should be possible.

You could easily argue that just logind does far more in one binary
than it should for reasonable system management never mind it being
bundled with other especially potentially widely used functions like
systemd-localed. After a quick look at the script I guess aptdaemon only
needs localed.

I guess there is no unlaborious way to see which programs depend on a
particular binary of a given package?

GDM can be easily avoided or uninstalled for example if you have no
need for logind and perhaps there are alternatives for any others but
the current situation means you have to cut out more or investigate far
more than you should have to.

And Yes KDE dependencies being so coarse grained do really annoy me but
atleast KDE doesn't run by default.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/63894.49700...@smtp115.mail.ir2.yahoo.com



Re: A question about patches for upstream

2014-05-05 Thread Kevin Chadwick
previously on this list Bas Wijnen contributed:

 Which means that if the maintainer is unable to do that, the response please
 forward this upstream should be interpreted (and perhaps more clearly 
 written)
 as sorry I don't have time, this is how you can try to make things happen
 yourself.

Perhaps at the same time the minimum could be a debian dev anonymous
email address that is used to simply send a link to the bug report to
the upstream mailing list if they have one. It is not always easy for
a user to find the right place/list/having to register possibly
a second time etc..

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/553432.30578...@smtp104.mail.ir2.yahoo.com



Re: standalone logind (Re: Bits from the systemd + GNOME sprint)

2014-05-04 Thread Kevin Chadwick
previously on this list Michael Biebl contributed:

 Anyone interested in keeping standalone logind working is invited to
 help the systemd-shim maintainer to implement and test this
 functionality (it will most likely be using cgmanager for that as far as
 I heard). Having v208 out is a prerequisite for being able to test those
 changes in systemd-shim.

Is it possible to break up systemd-services into multiple
packages. I know our systems have no functional use for systemd-logind
and yet lots seems to depend on it but it is less clear what depends on
which parts and so why each of the many packages do so. Whilst avoiding
segfaults is a valid reason to depend it is a bit silly when it is the
only reason code is installed for some or in some cases almost all
users. There may be less to consider for a user/admin about dependence
on the simpler or particular parts of the package for example.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/326384.15025...@smtp144.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-05-02 Thread Kevin Chadwick
previously on this list Tzafrir Cohen contributed:

  A wide misconception. Chroots are easily implemented and add security
  almost for free   
 
 Not completely for free. You now have an extra mini-system to maintain.
 
 (often /dev/log is all that is needed) and so can be

You completely misunderstand. Many daemons have chroot config options
for security reasons. I am asking does Debian use them by default and
if not why not.

  used by default without any potential problems,   
 
  they also never bring
  new risks  
 
 unless you forget to unpdate them.
 

You don't need to update them, they are basically empty and created on
daemon startup with perhaos one or two files like a dns root key for
unbound which is then self maintained (better if writes could be
avoided though). I am talking about dropping an unpriviledged process
permissions to next to nothing running with no shell and no filesystem
access so that any exploit in the network/any input code is far
less likely to get any further.

 It's also worth mentioning systemd-nspawn:
 http://www.freedesktop.org/software/systemd/man/systemd-nspawn.html

Not at all, it hasn't been tested for this, isn't supported by daemons
that crucially use priviledge seperation, which involves forking
children so a tiny process doing what root needs or a tiny process doing
the dangerous stuff in a chroot as an unpriviledged user or a
combination of both and any wrong communication means the priv parent
dies), sounds like it does what most Linux admins think chroot is only
good for and talks about all sorts of stuff that would make any chroot
in this way pointless. more powerful I expect means less secure in
this usage.

p.s. this is proper security in quality daemons implementing application
specific security not polkit/systemd rubbish. Whilst you have got me to
mention systemd I shall bring something up that has yanked my chain.

I suppose the debian page

https://wiki.debian.org/Debate/initsystem/systemd

Is just written by random developers and is not official or speaking as
a debian collective because it is very unbalanced indeed.

Embedded more performance less memory blah blah well that depends as
systemd is NOT compatible with application specific embedded that
basically is what embedded is all about and the Linux kernel is
atleast for now and would be forked otherwise. I could argue further
about larger systems but I won't bother, it would just be twisted and
move away from the main point anyway.

http://lists.busybox.net/pipermail/buildroot/2011-November/047612.html

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/25453.25357...@smtp118.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-05-02 Thread Kevin Chadwick
On Fri, 02 May 2014 10:55:15 +0200
Aaron Zauner wrote:

 Bashing on Tor does not help here.

The page suggests all devs use Tor to avoid being targetted. 

I am saying, does it accomplish that and is is best practice. Should
they be hackable even if they are targetted or stumbled upon. I find
that highly questionable and I am suggesting other simpler policies
will be far more effective. Hiding is fine but not at the cost of
complexity where security (confidentiality/protection/unexploitability)
is paramount.

I also mentioned ssh which I believe all the devs are using already. I
am not going to say which VPN/SSH is best for the devs, I wouldn't
know. I expect they would not choose commerical proprietary
insecure CISCO you compare to TOR though in any case.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/519419.15824...@smtp146.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-05-02 Thread Kevin Chadwick
previously on this list Kevin Chadwick contributed:

 all sorts of stuff that would make any chroot
 in this way pointless. more powerful I expect means less secure in
 this usage.

p.p.s. why implement yet more code and complexity into systemd for
preventing device files when you can just use the nodev filesystem flag.

Yet another classic example of pointless arguably, more likely
detrimental feature creep/steal and even worse when duplicating existing
functions that can be applied more universally.

Perhaps because of this quote taken from the opening page of a book
about Ada and high integrity software.


There are two ways of constructing a software design. One is to make
it so simple that there are OBVIOUSLY no deficiencies. And the other is
to make it so complicated that there are no OBVIOUS deficiencies

Professor C. A. R. Hoare
The 1980 Turing award lecture

I think the one thing all should be able to agree on about systemd is
that systemd falls into the latter.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/753535.36099...@smtp138.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-05-01 Thread Kevin Chadwick
On Wed, 30 Apr 2014 18:33:56 +0200
Aaron Zauner wrote:

  It adds a lot of complexity for privacy benefit. Integrity is often
  muddled into security too. As far as I am concerned they can actually
  counter each other and are seperate entities.   
 No they are not. Integrity should be part of your understanding of
 security. Basics of information security suggest confidentiality,
 integrity and availability. [0]
 

Suggested Basics, yes and good to remember they may influence each
other but I don't like mixing them up once that is understood
personally. The desired level of Information security *may* have next
to nothing to do with integrity and conversely availability can often
be everything in a specific situation. It makes much more practical
sense to keep integrity and availability as their own seperate
entities. All too often the word secure is confused and abused or
marketed. All too often I have witnessed it being said that X is more
secure when actually it may be more exploitable but increases
availability or integrity.

Debian developers not being able to upload security fixes is part of
the mix but then I would guess you could more easily bring down the TOR
network too than a private VPN and filtering would be much more
difficult so I would say TOR is not *optimum* for security or
availability and obscurity is no real security though perhaps very 
occasionally the best possible ;-).

  Obscuring from targetted attack is highly questionable to me when a
  secure VPN from a lightly used machine (no web browsing) can offer real
  security. You may just be giving a way in otherwise.  
 First I don't understand your first sentence. Second how does a VPN
 provide more security than say Tor?

Tor is more complex, less proven, had more past exploits and crucially I
believe? generally more reliant on external infrastructure. It's
primary aim is privacy and not a simply secure protocol. I include SSH
when I say VPN too but host security is paramount in any case.

Devs avoiding html mail clients on machines with keys or access etc..
might be another idea. Was there a resolution on binary uploads?


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/483967.32253...@smtp150.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-04-29 Thread Kevin Chadwick
previously on this list people contributed:

  - easy create and run programs from chroot and alternate users  
 
 Could you detail what you mean by this? It sounds like you want either
 virtual machines or something like docker.io:
 
 https://packages.debian.org/sid/docker.io

  
   hint: chroot $CHROOT_PATH su - $USER -c $command_with_args  

Security and chroots aren't things I would associate, you need better.

A wide misconception. Chroots are easily implemented and add security
almost for free (often /dev/log is all that is needed) and so can be
used by default without any potential problems, they also never bring
new risks and always make life difficult for an attacker to raise
priviledges or get what they are actually after when done
correctly. Even at a simple level it should be obvious that they can
just nullify the payload so the attacker simply goes elsewhere. Does
debian chroot unbound and nginx under their own unbound and nginx users
by default?

MACs are hardly ever used by default due to management problems and when
they are they either may even lead to exploitable programs that cannot
do what they expect to be able to or may not offer the protection
expected and why not use the chroot under a MAC anyway. If the kernel
can be attacked from the chroot then likely the MAC can and due to
increased complexity, arguments just as easily arise against both. For
most daemons where the filesystem access amounts to little then a MAC is
unlikely to prevent any more attacks that chroot wouldn't and where a
program needs a lot of access you are fighting a losing battle and you
should rethink your attack surface. Time would be better spent on
privsep or getting your web content to run without www-data writes via
DACs than tuning a complicated MAC to allow it to some degree or
writing a cgi program to keep things out of the chroot.

What I am saying is MACs are fine when done right and you have the spare
time but should not trump better design or excuse lack of priviledge
seperation or the often underused and mis-understood power of DACs
not being used to their upmost in the first place.

Virtual machines add complexity, waste resources and cannot be on by
default for each package which is very important. Also many new attacks
like timing attacks between virtual machines arrive. Auditing and bug
reporting is also greatly complicated compared to bare metal.

I am interested in finding out more about qubes though if I find the
time for the desktop, mainly in terms of how deep they may have gone for
sandboxing say a browser.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/686939.12569...@smtp141.mail.ir2.yahoo.com



Re: Hardened OpenSSL fork

2014-04-29 Thread Kevin Chadwick
previously on this list Thomas Goirand contributed:

  OpenBSD developers are extensively cleaning up OpenSSL 1.0.1g  
 
 I'm not so sure if cleaning-up really means removing 90k lines of code
 without extensive checks. I'd very much prefer some unit tests added to
 the current code base, or a *long* audit process for example.

I understand the concern over reliability in the short term but they
are not playing and quite frankly in light of heartbleed any issues
that align with 99% of use cases can be fixed and I don't think that
has anything to do with the OPs thread. If it does what 99% need (you
should test in any case) and has 90k less lines of code then the rest
can be better audited and if better understood then it is more likely
to work especially in the long term, it is not part of OpenBSD stable
yet. I guess you haven't witnessed all the examples of code rot and
worse that they have found?

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/930532.18175...@smtp112.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-04-29 Thread Kevin Chadwick
On Tue, 29 Apr 2014 00:20:05 +
Jacob Appelbaum wrote:

 
  Tor provides privacy and more likely lowers security so which threat
  against contributors or contributor actions is the Tor policy aimed to
  protect?  
 
 I'm confused, what? How does Tor lower security and at the same time,
 it provides privacy?

Just like antivirus scanners bring greater exploitability especially
if you are not vulnerable to detectable viruses then so does Tor. It
adds a lot of complexity for privacy benefit. Integrity is often
muddled into security too. As far as I am concerned they can actually
counter each other and are seperate entities. Security is an
application specific process to be understood in light of a particular
threat model. So Tor for certain things yes but not for everything.
Obscuring from targetted attack is highly questionable to me when a
secure VPN from a lightly used machine (no web browsing) can offer real
security. You may just be giving a way in otherwise.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/400899.24381...@smtp140.mail.ir2.yahoo.com



Re: Gcc and undefined behavior

2014-04-29 Thread Kevin Chadwick
previously on this list Vincent Lefevre contributed:

  Plus, crashing in a screensaver is bad :D  
 
 The sanitizers should be used only for testing / debugging, or
 possibly for critical applications where it may be better to crash
 (in a controlled way) than behave erratically with possible system
 compromission as a consequence.

I am not sure exactly what checks you are talking about but
isn't this debatable in that if it is more likely to crash early or
immediately then the bugs are more likely to be fixed and it could have
crashed later anyway at a more critical and less analysed time or led
to greater consequences or bugs present in more critical deployments.

OpenBSD catches many bugs but they are not the size of Debian which
could catch more.

Perhaps there is an argument just for testing as oppose to stable?

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/113866.98512...@smtp113.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-04-29 Thread Kevin Chadwick
previously on this list Thorsten Glaser contributed:

  Debian policy should require that in every source package all security
  packages should be clearly marked as such in standard and easily parsable 
  way with optional further references.  
 
 Veto because the security impact of bugs is disputable, and
 probably 100% of all patches:
 
 http://www.insanitybit.com/2012/06/02/linus-torvalds-all-bugs-are-created-
 equal-9/

? Doesn't that page argue against your 'veto'?

I can understand Linus not wanting to have to decide if there is any
security relevence in each change or be accused of missing some when he
of course would especially when he has said he can't keep up with the
many commits and so must want to accelerate and not decelerate the
process.

I used to look through the commits when I could in order to decide
whether to update the kernel more often than every other release and
whilst some were obvious or even mentioned security I wondered what
level of collaboration went on between distros to work out which had
security implications or whether seperate processes helped spot more
or not and just created more work.

In any case once publicly known and sooner the better it is surely
better to inform at every opportunity.

p.s. Security is never black and white and I hate the same people,
funny that, like reading your stars. There is lots of mis-information
and lies about OpenBSD out there. I notice the page doesn't disclose
any of his supposed findings or say very much at all.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/406410.91532...@smtp109.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-04-29 Thread Kevin Chadwick
previously on this list Thorsten Glaser contributed:

  A wide misconception. Chroots are easily implemented and add security
  almost for free (often /dev/log is all that is needed) and so can be
  used by default without any potential problems, they also never bring
  new risks and always make life difficult for an attacker to raise
  priviledges or get what they are actually after when done
  correctly. Even at a simple level it should be obvious that they can
  just nullify the payload so the attacker simply goes elsewhere. Does  
 
 Bwahahahahahahahahahahahahahahahahahaha!
 
 (To casual observers: the entire paragraph is very wrong.)
 
 Yes, chroots help isolating things, but, just like systrace(4), they
 are far from being inescapable.

I also said the following and nothing is inescapable atleast in any
general conversation, so who is being black and white now! Chroot
provides a noticeable improvement in security at a very low cost in
time to implement and almost 0 maintenance. Systrace has security merit
too despite it's shortcomings at isolating ROOT in CERTAIN SITUATIONS
and is used by sshd now by default.

  If the kernel
  can be attacked from the chroot then likely the MAC can and due to
  increased complexity, arguments just as easily arise against both.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/80183.89090...@smtp103.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-04-29 Thread Kevin Chadwick
previously on this list Marko Randjelovic contributed:

 Well, we have the word hardening in the subject, I'm not sure
 what OP meant, probably he ment more security then hardening,
 but grsecurity which is mentioned in wiki[1] contains features to
 prevent breaking out of chroot, so combined with grsecurity chroot
 might be called a security feature?

Fair enough but almost all of those escape mitigations combat an
attacker with ROOT priviledges and you shouldn't have been running the
daemon as root in the first place and what is not in the chroot makes
raising priviledges to root much more difficult. Chroot *IS* a security
feature as extensively used by dovecot including priv sep and coded
into sshd and unbound and apache and nginx. People *HAVE* watched
attackers get frustrated and leave.

The first thing an attacker usually tries with an exploit is to
load /bin/sh then they may try to get data into the filesystem but
find the filesystem is noexec and likely not writable by the process
owner. Then all of a sudden especially with ASLR and a nonexec stack
things have gotten much more difficult and the chances of causing
noticeable crashes increases.

At this point if they haven't left already, two things are likely
to happen, if it is non targeted as the kernel.org attack was they leave
and find one of the many other systems to attack.

If it is a buy and shoot attack it has failed to execute the buyers
shell code or program and your just one more system that isn't on their 
botlist.

Otherwise they have a more difficult task of exploring the process
space and attacking the kernel or hoping the chroot is not owned by
root or the cd was not invoked.

Chroot also helps to prevent MAC bypass on systems where grsec prvi I/O
is not disabled.

The whole point is security is layers and in my opinion MAC should be
the final layer but many distro's and more so Fedora than debian use it
whilst ignoring their lax DAC permissions.

I thought this would be a no-brainer default atleast for some packages.
I guess I was wrong?

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/450827.54193...@smtp120.mail.ir2.yahoo.com



Re: goals for hardening Debian: ideas and help wanted

2014-04-25 Thread Kevin Chadwick
previously on this list Paul Wise contributed:

 I have written a non-exhaustive list of goals for hardening the Debian
 distribution, the Debian project and computer systems of the Debian
 project, contributors and users.
 
 https://wiki.debian.org/Hardening/Goals
 
 If you have more ideas, please add them to the wiki page.

Though it will take some guts, the best way I see for a distro to help
users secure their machines is to provide sudoers entries disabled by
default and enabled either manually through requests during various
package installs or a sudoers-policies package or in sudoers.d by
default. I've read a story about sudoers being packaged by distro's
at one time but mistakes meaning they stopped doing so. I expect that's
a myth and silly if not. I find little about it but hearsay and whilst I
know sudo's maintainer prefers rules not to be enabled by default as
that encourages general policies and so an insecure default. I am not
sure he minds commented policies that are easily enabled. If I ever
have any time I intend to create a sudoers policy site if no-one
beats me to it and more searches don't find one but a project like
debian may be better suited to the task. Sudo is undoubtedly more
secure than polkit when used correctly and easily modified by users. If
things like synaptic had an option to use sudo, users could very easily
and intuitively modify the default policy to only allow a certain list
of packages to be installed and synaptic would be none the wiser and
work very securely with whatever exact permissions the user decides and
that apt-get provides the control for. This empowers users and the more
correct way of doing things.

Any security related tools and settings should have a high quality man
page.

All security configuration should be insisted on being in /etc if it
isn't already. A default polkit configuration for example should be
easily found and edited and not be allowed to exist in /usr or need to
be copied from anywhere to anywhere. That is simply irresponsible.

sysctl.conf could perhaps have more commented entries

If a doc exists in /usr/share then perhaps a man page should atleast
point to it and be found via apropos in many cases as understanding is
the first step to securing.

You could port the privledge seperation patches for X11 from OpenBSD so
that only a small part for handling device files etc. runs as root.

tcpdump is more secure but for more risky things like wireshark it
could be made to die perhaps by a wrapper if run as root and dumpcap be
suid group wireshark mode 750 and users add themselves to that group to
use it.

http://marc.info/?l=openbsd-miscm=139694935227588w=2

More use of chrooting by default would be good too.


Some comments on the existing content on the page follows.

Tor provides privacy and more likely lowers security so which threat
against contributors or contributor actions is the Tor policy aimed to
protect? Asking contributor's to boot debian where possible without
listening services from dedicated usb/hdd with a vpn or ssh to avoid
router resident attackers maybe seen as a bit draconian but I would
suggest is a better practice to aim for.

If grsec is coming RBAC deserves mentioning under MACs

Routers, you could simplify their usage so you are using a subset of
the firmware risk. So use bridge mode and a pppoe client on a debian or
an OpenBSD box where I can contest pppoe setup is dead easy and in
kernel. Though the bastille debian box and VPN two paragraphs up is
probably easier for most with wireless etc.




-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/246269.70707...@smtp101.mail.ir2.yahoo.com



Re: Hardened OpenSSL fork

2014-04-21 Thread Kevin Chadwick
On Mon, 21 Apr 2014 10:55:36 +0200
Kurt Roeckx wrote:

  I'm not sure what you're trying to say here.  But look at the
  example of the random number generator in my other e-mail.  I've
  seen other cases were they do things like that.  And I can
  perfectly understand why they do it, and then rely on that
  behaviour on OpenBSD, but it only works on OpenBSD.

It is a big task they are undertaking and are simply making their job
easier. Later I expect portability patches can be more easily
considered. I am sure OpenBSD get's far less funding than OpenSSL you
know. I don't use debian online but if I did I would find an OpenSSL
package with a dependence on haveged until something better is
upstreamed desirable.

I also expect patches may be needed or reverted for OpenBSD's long long
time_t.

http://www.openbsd.org/papers/eurobsdcon_2013_time_t/

  
  It did because it would have been picked up likely weeks after the bug
  was introduced due to OpenBSD and Gentoo hardened bug reports or static
  analysis resulting in bug reports. As Theo says possibly before it was
  actually released meaning all risk avoided essentially for free.  
 
 It seems you do not understand either vulnerability.

I understand it perfectly, did you follow the link I posted to Theo's
response to an OpenSSl dev about this very thing or the slides about
OpenBSD's mitigation tecniques. It would have been found sooner or later
way before it was. Replacing malloc has been described as exploitaion
mitigation mitigation.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/214362.32904...@smtp130.mail.ir2.yahoo.com



Re: Proposing amd64-hardened architecture for Debian

2014-04-21 Thread Kevin Chadwick
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/931879.29654...@smtp141.mail.ir2.yahoo.com



Re: Hardened OpenSSL fork

2014-04-20 Thread Kevin Chadwick
previously on this list people contributed:

 On Sun, Apr 20, 2014 at 07:07:45PM +0100, Steven Chamberlain wrote:
  Hi,
  
  But meanwhile, OpenBSD developers are extensively cleaning up OpenSSL
  1.0.1g.
 
 One of the problems with anything from OpenBSD is that they only
 care about OpenBSD, and if you want to use that fork you'll
 actually have to go and revert some of the things they're doing.
 

Not true actually but of course their primary concern is naturally
OpenBSD. They takes POSIX seriously and atleast one patch has brought
it closer to POSIX standards. It is also clear to me that Theo wants
all to follow and benefit from best practice and bug hunting, the fact
that there is so much resistance is not his fault... is strlcpy still
rejected by glibc on the false premise of not solving truncation despite
better performance than strncpy and when it makes finding truncation
much easier! when used how they have been applying it to openssl.

https://lwn.net/Articles/507319/


 Some of the things they're changing are actually good changes,
 but some are also just wrong.  They don't seem to be understanding
 why things are the way they are and seem to be changing code they
 don't understand.


Based on what? heartbleed happening due to  performance for embedded
but there is little need and no need for doing so generically.

Sure they are ripping much out and rewriting parts just to get it going
on OpenBSD initially with the statement on undeadly that portability
can be brought back later. OpenSSH development certainly looks more
than co-operative to linux portability.


 They also seems to like to do white space changes, which is really
 helpful.
 

Apparently it is to them in following the style(9) they are used
to. What's the problem, ignoring whitespace for diffing is easy.


  It's now using native malloc/free instead of its own allocator
  which allowed the Heartbleed bug to happen.
 
 This did not allow heartbleed to happen.  It might have hidden
 CVE-2010-5298 more, but it was always there and is unrelated to
 heartbleed.
 

It did because it would have been picked up likely weeks after the bug
was introduced due to OpenBSD and Gentoo hardened bug reports or static
analysis resulting in bug reports. As Theo says possibly before it was
actually released meaning all risk avoided essentially for free.

 
  I wonder if this might result in an alternate SSL/TLS library we could
  use in Debian?
 
 There are alternatives, but I guess you mean alternative to
 openssl.  Currently it actually doesn't look like a good option to
 me.
 

If it is more secure then it meets most users needs better and so I
disagree. The suggestion was for another package anyway like OpenNTP
which avoided the recent security issues. Of course it is too early for
this to be done now and who knows how upstream will react but
considering their revenue streams that will likely have a lot to do
with damage limitation.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/602746.76025...@smtp109.mail.ir2.yahoo.com



Re: Proposing amd64-hardened architecture for Debian

2014-04-19 Thread Kevin Chadwick
previously on this list Michael Tautschnig contributed:

  Riding the Heartbleed publicity wave seems unwise, unless you can
  propose a hardening flag that would have protected users from
  Heartbleed. Else, Heartbleed merely serves on a example
  how wallpapering problems over with hardened binaries often
  doesn't help you at all..

 
 +100 on this one. Hardening may be nice, but wouldn't have helped at all 
 w.r.t.
 Heartbleed (or any of the other recent SSL/TLS issues).

I am afraid you have this completely backwards. You can't use idiotic
programming to justify anything.

http://marc.info/?l=openbsd-miscm=139715715931884w=2

I am glad they are cleaning OpenSSL up 

http://undeadly.org/cgi?action=articlesid=20140418063443

Especially when what they have found is very surprising

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/547070.34899...@smtp119.mail.ir2.yahoo.com



Re: Proposing amd64-hardened architecture for Debian

2014-04-18 Thread Kevin Chadwick
On Fri, 18 Apr 2014 14:57:41 +0200
Aaron Zauner wrote:

  Usually the Linux kernel itself provides more than enough entropy. This
  can (and probably should) be enhanced but should  not be done in a
  specific distribution.

I know there has been a little work on the kernel in this area, mainly
when you have a modern cpu you will be fine but are the days of waiting
on gpg and being asked to move the mouse on the latest Linux Kernel and
whichever kernel lands in debian 8 over? You should be able to write
gigabytes of random data to disk without any worry.

  Building exploit mitigations isn’t easy. It’s difficult because the
  attackers are relentlessly clever. And it’s aggravating because there’s
  so much shitty software that doesn’t run properly even when it’s not
  under attack, meaning that many mitigations cannot be fully enabled.
  But it’s absolutely infuriating when developers of security sensitive
  software are actively thwarting those efforts by using the world’s most
  exploitable allocation policy and then not even testing that one can
  disable it.  

 Nothing to add here, very well said!

I realised just after sending that I had removed one too many seperating
lines (before the link).

So I wasn't as clear as I meant to be in that the bit above was taken
from an OpenBSD devs (Teds) page about Heartbleed.

http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse

--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/505473.83266...@smtp146.mail.ir2.yahoo.com



Re: Proposing amd64-hardened architecture for Debian

2014-04-17 Thread Kevin Chadwick
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___

--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/67745.48677...@smtp129.mail.ir2.yahoo.com



Re: the importance of defaults (was: Debian default desktop environment)

2014-04-16 Thread Kevin Chadwick
previously on this list Cesare Leonardi contributed:

 On 12/04/2014 12:23, alberto fuentes wrote:


 
 While i like Xfce, my current DE, the thing i worry most is that it 
 seems almost stagnant: the latest release (4.10) was from 2 years ago 
 and from the Xfce main site and blog i see no advancements.
 Really really a pity.
 

4.11 is downloadable actually, xfce follows a stable philosophy like
debian does. You should also compare like for like, 4.11 or 4.10 to mate
as debian stables (itself old) packages are far older than two
years.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/619137.17007...@smtp108.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-08 Thread Kevin Chadwick
previously on this list people contributed:

 but that doesn't change the fact that ffm with autoraise
 works in gnome3.

 GNOME 3 is based on Mutter which has, AFAICT, all features Metacity
 (GNOME 2) used to provide. The focus settings are not shown in the
 control center, but you can use gnome-tweak-tool or the gsettings CLI to
 change them.

Last time I looked it was alledged but no raise on click was not
offered and couldn't be manually done.

 The main problem in GNOME 3.4 with focus-follows-mouse is that it makes
 the application menu (in the top bar) mostly unusable if you have to
 move the pointer over another application to reach the menu. But the
 application menu is not used much in 3.4, and the problem should be
 fixed in more recent versions (the application menu doesn’t switch
 immediately with the focus).

You can change the timing on xfce, inherited from the brill fvwm and
also the timing of desktop scroll by mouse.

I am getting the impression that many missed a detail.

It also supports focus follows mouse, no raise on click
  ^^

I am talking about focus follows mouse but raise only on clicking say
the border or bar, you can still enter text into any layered windows
that have focus. So you can quickly switch for entry to or from web
pages on one screen or read a web page in the background. Reference 4
open windows at once, use the scroll upon focus etc.. Basically the
closest thing to a panelling window manager like scrotwm (which I could
learn) without needing to learn the commands (works for my users too
and I should test what I provide) and allowing overlapping for
redundant web edges, saves time re-sizing etc..


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/821760.5213...@smtp138.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-08 Thread Kevin Chadwick
previously on this list Bálint Réczey contributed:

 Xfce is friendly enough, but it feels old compared to Gnome 3 and I
 would like to attract new users before convincing them. It is much
 easier than in the opposite order. :-)

I think you are reflecting a subset of users priorities. I've switched
users from desktop to desktop and they don't care a jot about
flashiness in fact many like simple but pretty which is perfectly
do-able with almost any window manager, what they hate is 

a) things moving too much that they can't find

b) not being able to do what they want or things disappearing


Looking Flashy is always enticing but not at any functional expense
and limited performance expense.


Gnome 3 is getting both a and b wrong.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/317873.5213...@smtp138.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-08 Thread Kevin Chadwick
previously on this list Jean-Christophe Dubacq contributed:

  I am talking about focus follows mouse but raise only on clicking say
  the border or bar, you can still enter text into any layered windows
  that have focus. So you can quickly switch for entry to or from web
  pages on one screen or read a web page in the background. Reference 4
  open windows at once, use the scroll upon focus etc.. Basically the
  closest thing to a panelling window manager like scrotwm (which I could
  learn) without needing to learn the commands (works for my users too
  and I should test what I provide) and allowing overlapping for
  redundant web edges, saves time re-sizing etc..  
 
 
 And this is a so tiny detail that it does not matter for what should be
 the default desktop environment. No matter how configurable is your
 thing, what matters is how usable is it out of the box.

??? I agree with someone else who responded with killer feature as for
me it is also a primary requirement from a window manager precisely
because of the usability increase. 

 For the rest,
 apt-get or any other package management interface is your friend.

Exactly, This all came from xfce multiple desktop support in debian 8
apparently not being the best, I was merely saying that it matters less
to xfce because of this feature but also with *randr from apt-get it is
not a problem and later versions than xfce-display-settings-4.10 I
am pretty sure do have good support without *randr bootstrapping.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/852276.47110...@smtp141.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-07 Thread Kevin Chadwick
previously on this list Iain R. Learmonth contributed:

 The problem of integration is present, but now that I think about it, is
 likely more of an upstream problem than a packaging problem. I guess as
 more and more things use dbus, integration will become easier.

Perhaps but integration and universal interfacing is more of a design
issue and you could in many cases argue that dbus makes this worse
through adding an extra potentially non universal interface especially
for servers.

The job of dbus is for universal sockets and making life easier for
programmers that need that in handling the protocol for them and
shouldn't be thought of as anything magic or to promote good design. It
can make things cryptic to users and more effort to get a handle on
for users for a start.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/581286.94347...@smtp115.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-07 Thread Kevin Chadwick
previously on this list Wookey contributed:

 but I just wanted to repoy to correct the
 apparent misapprehension that XFCE doesn't do user-friendly monitor out
 of the box.

It is hardly a showstopper either and I expect xfce-4.10 does and as
there has been a long time of testing before 4.10 was released as
stable it is put at a bit of a disadvantage to Gnome and KDE for having
the same aims as debian stable with the bugs I have come across such as
in mimecache handling actually being down to gnome libraries. As
already said the control of this is very simple via *randr.

It also supports focus follows mouse, no raise on click which is
something inherited from fvwm and Gnome cannot do even with gnome
tweaks last time I checked and KDE had a bug open about it. I find that
very useful to make the most of even multiple desktops and more would
use it if they could.

Atleast with 'win98' (rediculous and no reply to justify so far) you
won't suddenly have users not knowing how to shutdown their machine
like happened on was it win 8 and Gnome 3.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/35081.94347...@smtp115.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-07 Thread Kevin Chadwick
previously on this list Adam D. Barratt contributed:

 Please fix your clock.
 

Have you considered relying on your own clock? I use mail receive
order. Do you not get spam annoyingly staying at the top of your box?

Sorry if your client does not allow that or doesn't support maildir but
this is a linux box that I haven't had time to upgrade but I shall be
moving back to OpenBSD as soon as the new webkit packages hit the
mirrors (few days max most likely). On linux if the clock has been set
forward by accident then it stupidly requires root to do a manual fsck
and which I can't be bothered with hence since yesterday currently
always going forward, still can't find reverse.

Let's not bring up ntp, crappy bios (not crystal) etc. etc..

Regards

Kc

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/487717.67707...@smtp135.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-07 Thread Kevin Chadwick
previously on this list Jakub Wilk contributed:

 * Gunnar Wolf gw...@gwolf.org, 2014-04-04, 23:22:
 - Media player: mplayer (on libcaca, of course)
 
 With its 4 RC bugs, it doesn't look like mplayer is going to be part of 
 jessie.
 

I can't tell, is that sarcasm, I hope so as it is the only player hat
does certain things or has enough performance for some video on
some machines.



-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/212583.85816...@smtp139.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-07 Thread Kevin Chadwick
previously on this list Philip Hands contributed:

 As for my grumpy tone, I apologise for that -- it probably comes from
 the several voluminous threads on debian-devel recently spouting drivel
 about systemd which I may have unfairly associated with this thread.

If you think it's all drivel then I would suggest you do not understand
the issues raised or the opposing points of view of many.

https://plus.google.com/+TheodoreTso/posts/4W6rrMMvhWU

p.s. If you read far enough then please ignore the part about sudo
being coarse grained as it allows a far more fine grained approach than
the defaults of polkit and the rediculous pkexec with great
intuitive power to the user too. In any other case proper specific priv
sep should be used anyway.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/717862.61818...@smtp102.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-04 Thread Kevin Chadwick
previously on this list Undefined User contributed:

 It's not about Gnome, Xfce or whatever desktop environment being focused
 only on touchscreen devices or identical to a mobile platform (that would
 be terrible for everyone), but at least something that doesn't make people
 think that Debian looks like from last decade and don't support new
 technologies (although, we all know, none of these being true -- but we
 have to show it).

I'm not sure I agree or that many care so much. In just the last few
weeks I have had one 80 year old and one 30 year old both say they
wanted the Windows XP interface back over Windows 7/Vista repectively.

Which bit exactly do you think looks like win 98? xfce4-panel;
gnome-panel runs in xfce.

It should take very little to improve the look of xfce and with very
little memory usage increase.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/237840.89367...@smtp101.mail.ir2.yahoo.com



Re: Debian default desktop environment

2014-04-04 Thread Kevin Chadwick
previously on this list people contributed:

 Why then install an alternative at all. Experienced users install what
 they want anyways. The DEs working best for unexperienced users would
 be the DEs that do much work themselves,

Xfce allows more options and choice by default on a cd and
unexperienced users have a better chance of loading synaptic and a web
browser on xfce than heavier desktops and is meant to be more stable.

Hasn't Gnome or just GTK3? just removed cue tips shortcuts too affecting
mouse/touchless systems.

 XFCE (at least the version in Debian 8) doesn't automatically handle
 external monitors, which is a pretty significant use-case for all kinds
 of users.
 

I don't want to reboot right now but xfce4-display-settings in debian 7
does atleast after you have run xrandr and I would guess if plugged in
during boot up as my second screen comes up by itself with it's own
panels when it is.

 I do not think it's fair to expect a new user to be configure xrandr or
 find  install a 3rd party xrandr GUI.

You could add lxrandr to the default and the DE would still be smaller
than gnome. How modular is Gnome, you could even use their display
management tools until newer versions of xfce hit debian stable,
atleast you should be able to? 

I know xfce 4.11 might take some time to hit stable and has some extra
tweaks such as for having screens above and below each other. Perhaps
having an xfce backports choice during install is another idea but I
guess that couldn't be supported.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/615301.77533...@smtp118.mail.ir2.yahoo.com



Re: ca-certificates: no more cacert.org certificates?!?

2014-04-03 Thread Kevin Chadwick
previously on this list Bas Wijnen contributed:

 On Tue, Apr 01, 2014 at 10:49:15PM +0100, Kevin Chadwick wrote:
I think at Debian we all agree that it would be a good
   thing if everything would be encrypted, so this is a very bad outcome.
  
  I beg to differ I'm afraid. SSL should be used where it is required
  otherwise you are opening the server upto DOS and as it is more
  complex, bugs and exploits not to mention greater memory and cpu usage
  in similar fashion to systemd.
 
 That's a valid point.  I think all connections should be encrypted,
 unless the server admin knowingly disables the encryption.  Does that
 sound better?
 
 What I would like to see, is that if someone new to making websites
 tries something, they will be using encrypted connections.  And if they
 start asking people to fill out personal data, they don't need to do
 anything extra to make sure it works right.
 

Sorry but I still have to disagree as this shouldn't really but
certainly does still increase the chances of someone submitting data to
a site that doesn't care about the security of that data or have the
ability to look after it.

OTOH it would prevent wordpress logins being stolen so easily and ISPs
snooping, however I believe in solving specific problems not swapping
problems around, what do you know again like systemd due to it's multi
functional design or rather lack of it;-)

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/991243.53700...@smtp120.mail.ir2.yahoo.com



Re: default messaging/VoIP client for Debian 8/Jessie

2014-04-03 Thread Kevin Chadwick
previously on this list Russ Allbery contributed:

  I guess you missed all the exploits in JAVA over the years and
  especially last year where it was banned for long periods from all
  browsers. To the point that the pressure is building on web hosts to
  drop JAVA KVM clients completely.  
 
 Most of the exploits in Java (I have no idea why you write the word in all
 caps)

Just from the logo, the one I see on Windows boxes as I don't really
see one anywhere else and avoid it wherever possible and which is the
correct stance to take for multiple reasons.

http://blog.trendmicro.com/trendlabs-security-intelligence/java-native-layer-exploits-going-up/

 are flaws in the sandbox security model.  While those are real
 vulnerabilities in the context of running untrusted Java applets
 downloaded from the network, they're not horribly interesting in the
 context of running trusted applications installed through normal signed
 apt repositories.
 

Not horribly interesting isn't saying much and the rediculous number of
vulns on osvdb this year alone not to mention the bloatedness and
ability to run jars in such a complex beast outside the unix security
model by default is more than enough to rule out any default java apps
in I'm sure many peoples opinion. Heck CESG guidelines say to get rid of
small parsers like perl and shell access.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/676094.53700...@smtp120.mail.ir2.yahoo.com



Re: systemd and Linux are *fundamentally incompatible* - and I can prove it

2014-04-03 Thread Kevin Chadwick
previously on this list Jan Gloser contributed:

Kev, the systemd design document says it all about the lack of design
with statements showing a clear lack of understanding. I would be
ashamed to call it a design document.

 I would also like to ask something the people who dislike systemd (as there
 seem to be more). I am not very proficient with such internals of debian,
 but you say things like systemd breaks things and systemd has no unified
 design and sytemd is possibly a security risk. But can you give some easily
 reproducible examples or setups, code samples, cucumber scenarios,
 whatever, that could clearly demonstrate how systemd breaks anything?

As systemd tries to do so much it is pointless as you simply get side
tracked when your arguments succeed or ironically get called trolls by
real trolls.

I will just say this

OpenBSDs /sbin/init.c is 1448 lines long

Systemds rediculously placed /usr/lib/systemd/systemd.c doesn't exist
but rather there is a directory with many files and just cgroup.c is
nearly 1000 lines long. So good luck evaluating all of that for your
next linux based system when quite clearly the devs don't know even
pid1 like the back of their hand due to having a segfault rather than
die in it. pid1 being potentially larger than your daemon would be quite
laughable too.

As even well audited code tends to have a bug per 1000 lines, is
having this much code permanently resident supposedly for all of
Linux never mind unix ecosystems that have served each other so well a
good design especially when linux is moving onto smaller and smaller
devices? Are the benefits worth it? Is it self managing and open to
competition. It is difficult to get a good design from a bad design.
Evolving /sbin/init simple functionality in the past resulted in
migration of code into the kernel and not the other way around.

Such a fundamental game changer with so much clouding the core
functionality in terms of pulling in so much really shouldn't be decided
by a 50/50 decision. Companies often require 75% or more for game
changing decisions.

 scenario, why not just migrate to Gentoo or BSD?

Gentoo means you have to build otherwise I would for the few things I
need linux for. Sabayon has moved to systemd and my system would have
broken recently because of systemd if I was using it. I use OpenBSD
wherever possible.

Things are often tested on debian or *buntu and the base is well
tested and hence my usage for offline development.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/216266.53700...@smtp120.mail.ir2.yahoo.com



Re: systemd and Linux are *fundamentally incompatible* - and I can prove it

2014-04-03 Thread Kevin Chadwick
previously on this list The Wanderer contributed:

 I was explicitly referring to the point in the future when maintainers
 do stop providing traditional init scripts. This likely won't happen
 that fast, no, but I do think it's likely that it will happen - whether
 days after the jessie release or decades, or more likely something in
 between.

You know that's what Arch Linux devs said two months before banishing
init scripts to AUR where it wasn't even gpg signed.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/695583.53700...@smtp120.mail.ir2.yahoo.com



Re: systemd - some more considerations

2014-04-03 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

  I don't believe I have said that.  «die» is not the same as «crash».  
 
 If you're talking about PID1, the end result is the same.

It is not because one is a foreseen issue and the other indicates a
lack of polish on PID1!

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/199497.53700...@smtp120.mail.ir2.yahoo.com



Re: systemd - some more considerations

2014-04-03 Thread Kevin Chadwick
previously on this list Steve Langasek contributed:

 The avalanche has already started; it is too late for the pebbles to vote.

Winston Churchill said It is never too late a few times and I think
some of his quotes are quite fitting.

A lie gets halfway around the world before the truth has a chance to
get its pants on.

Men occasionally stumble over the truth, but most of them pick
themselves up and hurry off as if nothing has happened.

You have enemies? Good. That means you´ve stood up for something,
sometime in your life.

It has been said that democracy is the worst form of government
except all the others that have been tried.

Never give in-never, never, never, never, in nothing great or small,
large or petty, never give in except to convictions of honour and good
sense. Never yield to force; never yield to the apparently overwhelming
might of the enemy.

And one that's funny to lighten the mood.

Lady Astor: Winston, if I were your wife I´d put poison in your
coffee.

Winston Churchill: Nancy, if I were your husband I´d drink it.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/679110.53700...@smtp120.mail.ir2.yahoo.com



Re: ca-certificates: no more cacert.org certificates?!?

2014-04-01 Thread Kevin Chadwick
previously on this list people contributed:

 I still don't see why we penalize Debian users for the fact that _other_
 operating systems don't include the cacert certificate

Seems illogical to me we need more free CAs not less and I do agree
about the extortionism especially on EV.

If a web designer only tests if one browser works on one OS without a
chaining issue then does he really care and is he a fool that needs
teaching anyhow.

 I have to agree on that. But a Startcom Certificate on a personal web
 site is one web site more that doesn't train users to blindly click
 away certificate warnings. A cacert certificate or a self-signed
 certificate on a personal web site is one web site more that does that
 kind of training.

Or to check if they are on the right domain?

Xombrero caching of cert changes and warnings is useful in the terrible
climate for those who know what to check.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/169118.38101...@smtp132.mail.ir2.yahoo.com



Re: default messaging/VoIP client for Debian 8/Jessie

2014-04-01 Thread Kevin Chadwick
previously on this list Bas Wijnen contributed:

 I see the problem of all the bloat that comes with Java, but it is
 minor.  The main problem is still
 https://www.gnu.org/philosophy/java-trap.html

I guess you missed all the exploits in JAVA over the years and
especially last year where it was banned for long periods from all
browsers. To the point that the pressure is building on web hosts to
drop JAVA KVM clients completely.

I'm starting to question if Debian takes security and correctness
seriously enough.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/92558.69695...@smtp146.mail.ir2.yahoo.com



Re: ca-certificates: no more cacert.org certificates?!?

2014-04-01 Thread Kevin Chadwick
previously on this list Bas Wijnen contributed:

 From: Bas Wijnen wij...@debian.org
 To: debian-devel@lists.debian.org
 Subject: Re: ca-certificates: no more cacert.org certificates?!?
 Date: Tue, 1 Apr 2014 22:22:12 +0200
 User-Agent: Mutt/1.5.21 (2010-09-15)
 
 On Tue, Apr 01, 2014 at 11:04:43AM +0100, Philip Hands wrote:
  I think the real problem here is the user interface asking one to trust
  a site (forever, unless you're concentrating) at a point where you
  really don't care because all you're interested in is seeing the cute
  picture of an otter on someone's blog.  
 
 Yes.  And the fact that making your blog use an encrypted connection
 causes either scary warnings for all your visitors, or a lot of hassle
 trying to find a CA who is slightly less extorting than the others,
 leads to the result that most people give it up and don't use encryption
 on their blog.

I agree

  I think at Debian we all agree that it would be a good
 thing if everything would be encrypted, so this is a very bad outcome.
 

I beg to differ I'm afraid. SSL should be used where it is required
otherwise you are opening the server upto DOS and as it is more
complex, bugs and exploits not to mention greater memory and cpu usage
in similar fashion to systemd.

 
 I've also asked Mozilla to give plain HTTP connections at least as much
 warnings as self-signed certificates (which would probably mean no
 warnings for either of them), but I don't think they'll listen.

What have you asked them exactly. I believe glaring warnings should be
removed from self-signed and green bars removed completely for EV certs
but you should be asked to check the fingerprint for self-signed and the
browser should cache the cert and warn of changes in all cases
though that would scare the uninitiated at first???


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/616880.64104...@smtp144.mail.ir2.yahoo.com



Re: default messaging/VoIP client for Debian 8/Jessie

2014-03-31 Thread Kevin Chadwick
I use JAVA for eclipse (mostly good but a bit of a pain at times but I
need a particular plugin for embedded work, commercial prog dependence
in other cases) but think JAVA by default would be a big negative even
aside from being a dpig, especially for anything network facing and
especially without config lock down. Does it require the web plugin?

p.s. I've been waiting/hoping to get a proper *nix/nux on my phone but
do any of them work with Android and Iphone as they are a bit pointless
without friends and I don't like whatsapp as it's made my phone act a
bit funny and has eaten up valuable memory.

Tox has been mentioned on the OpenBSD ports list recently which got my
attention and has a pidgin plugin and android client but I think you
would need ekiga/asterisk for sip and it's stated as not 'complete' yet
too.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___

I have no idea why RTFM is used so aggressively on LINUX mailing lists
because whilst 'apropos' is traditionally the most powerful command on
Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool
to help psychopaths learn to control their anger.

(Kevin Chadwick)

___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/481258.86380...@smtp150.mail.ir2.yahoo.com



Re: systemd and Linux are *fundamentally incompatible* - and I can prove it

2014-03-25 Thread Kevin Chadwick
previously on this list Brett Parker contributed:

 Maybe you should do some more investigation, get some better clue of
 what you're talking about, and come back with a better, more thought
 out, set of arguments that actually have merit.

Right, by arguing on the basis of the definition of Linux rather than
the meaning of his arguments, or as often is the case on this
subject dividing and conquering or ignoring the valid points and
changing the subject to the 100th *needed* functionality that every
system apparently should have by default but actually turns out to
already exist but optionally installed and actually means little or
just gets in the way of better implementations.

There is another reason why Unix consisting of parts that do one thing
well is so valuable and that is because arguing over the best way of
doing it can't be polluted or crap forced in the back door with the
good.

Your response is actually closer to trolling.

Why is it the the word troll gets so abused. Naming people trolls when
they are not is worse than trolling in my opinion.

I really haven't the time right now to look over the links having took
a break from work to watch a footy match but assuming I didn't miss the
sarcasm then if Thorsten Glazer sees even an ounce of merit then I can
almost guarantee he is not trolling.


p.s. systemd being a bad design for an OS which aims to be so cross
platform is simply obvious to me on many levels, at the very least it
calls for extra oil/work/code depending on the scenario to meet that aim
and with little/no *real/truly beneficial* reason.

Still maybe it will be the death of Linux on the desktop atleast for
techies and I wouldn't mind to be honest as without grsecurity the linux
*kernel* actually has less security features than Windows or even
FreeBSD now and FreeBSD was trailing behind for a long time. The
userland security is much better than windows but with the exception
of apt repos being the only well used thing that springs to mind (which
is a valuable security feature) this was basically inherited from good
designers.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/815696.92264...@smtp145.mail.ir2.yahoo.com



Re: Bits from the Security Team

2014-03-07 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

  I did a „setcap cap_sys_ptrace+eip
  /usr/lib/nagios/plugins/check_procs”, but a normal user can’t still
  check for running programs of another user.
  
  What did I wrong?

 check_procs is a script, not a real executable.
 
 Since starting an interpreter with capabilities (or setuid, for that
 matter) of a script involves a race condition (kernel starts interpreter
 with script's rights, Joe Badass replaces the script with something

Is it writable by others than root?

I don't know the details of hidepid but the grsecurity patch has similar?
functionality and lets users see their own processes or a group see them
all.



+menu Filesystem Protections
+depends on GRKERNSEC
+
+config GRKERNSEC_PROC
+   bool Proc restrictions
+   help
+ If you say Y here, the permissions of the /proc filesystem
+ will be altered to enhance system security and privacy.  You MUST
+ choose either a user only restriction or a user and group restriction.
+ Depending upon the option you choose, you can either restrict users to
+ see only the processes they themselves run, or choose a group that can
+ view all processes and files normally restricted to root if you choose
+ the restrict to user only option.  NOTE: If you're running identd or
+ ntpd as a non-root user, you will have to run it as the group you
+ specify here.
+
+config GRKERNSEC_PROC_USER
+   bool Restrict /proc to user only
+   depends on GRKERNSEC_PROC
+   help
+ If you say Y here, non-root users will only be able to view their own
+ processes, and restricts them from viewing network-related 
information,
+ and viewing kernel symbol and module information.
+
+config GRKERNSEC_PROC_USERGROUP
+   bool Allow special group
+   depends on GRKERNSEC_PROC  !GRKERNSEC_PROC_USER
+   help
+ If you say Y here, you will be able to select a group that will be
+  able to view all processes and network-related information.  If 
you've
+  enabled GRKERNSEC_HIDESYM, kernel and symbol information may still
+  remain hidden.  This option is useful if you want to run identd as
+  a non-root user.
+
+config GRKERNSEC_PROC_GID
+   int GID for special group
+   depends on GRKERNSEC_PROC_USERGROUP
+   default 1001
+
+config GRKERNSEC_PROC_ADD
+   bool Additional restrictions
+   depends on GRKERNSEC_PROC_USER || GRKERNSEC_PROC_USERGROUP
+   help
+ If you say Y here, additional restrictions will be placed on
+ /proc that keep normal users from viewing device information and 
+ slabinfo information that could be useful for exploits.
+
+config GRKERNSEC_LINK
+   bool Linking restrictions
+   help
+ If you say Y here, /tmp race exploits will be prevented, since users
+ will no longer be able to follow symlinks owned by other users in
+ world-writable +t directories (e.g. /tmp), unless the owner of the
+ symlink is the owner of the directory. users will also not be
+ able to hardlink to files they do not own.  If the sysctl option is
+ enabled, a sysctl option with name linking_restrictions is created.



-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/64312.74336...@smtp121.mail.ir2.yahoo.com



Re: default init on non-Linux platforms

2014-02-23 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

  Kevin, I don't think you understand the reasoning behind this. Again,
  the problem the init system has to solve here is being able to track a
  process with a 100% accuracy, so whatever automated mechanisms you have
  configured when certain situations occur, they have to find the correct
  process to work on as to not kill the daemon instance you actually
  still need.

 … not to mention any other processes which the daemon started, which
 may or may not linger after its (grand)parent died, and which may or
 may not cause problems when restarting.

Never happened to me and shouldn't happen on a well designed service
that should be controlling it's children. If it does happen you should
be checking the system over anyway and possibly filing a bug.

The only time I've had zombies is on a desktop.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/706169.64541...@smtp137.mail.ir2.yahoo.com



Re: default init on non-Linux platforms

2014-02-23 Thread Kevin Chadwick
On Fri, 21 Feb 2014 23:53:51 +0100
John Paul Adrian Glaubitz wrote:

 Kevin, I don't think you understand the reasoning behind this. Again,
 the problem the init system has to solve here is being able to track a
 process with a 100% accuracy, so whatever automated mechanisms you have
 configured when certain situations occur, they have to find the correct
 process to work on as to not kill the daemon instance you actually
 still need.
 

ADRIAN, I hate it when people use your name thinking it makes any
difference to the content your about to spout.

 And, to my current knowledge, this is not possible without a mechanism
 like CGroups. Whether you rely on PID files or grep through the output
 of ps or use pidof, either of them are fragile and prone to fail.
 

Regex works just fine for me.

 I elaborated in my actual real-life case how PID files are prone to
 failure - I am aware that the situation with the full filesystem
 shouldn't occur in the first place,

Right including the rest of this email that's two counts of fantasy or
bad practice now justifying increased complexity in the kernel.

  but, well administrators are just
 humans after all - and, using ps to track the process you are looking
 for to be able to restart, stop or kill it, can obviously be easily
 tricked into failure as well. 

 I was merely expressing that I think that CGroups are an indispensable
 if you're planning to use Debian to build modern productive systems with
 high availability in mind.

As I have already said in previous threads that you have obviously
forgotten from months ago. Something like CARP for complete server
redundancy or Ciscos redundancy protocol, I forget what it is called
is the way to go for many reasons.

 Just imagine some other (malicious)
 process using the same name as well or when you need to control
 different instances of the very same process.

So you keep machines that are running malicious processes online by
adding complexity to the kernel. It is people like you that meant that
kernel.org was offline for months after rediculously simple measures
weren't bothered with.

If you are lucky enough to have malicious processes that can be found
rather than a rootkit then you should be pulling the plug investigating
and hardening before all your machines take part in a DDOS.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/648730.64541...@smtp137.mail.ir2.yahoo.com



Re: default init on non-Linux platforms

2014-02-23 Thread Kevin Chadwick
previously on this list Marco d'Itri contributed:

  But you aren't planning on running openrc at all, are you?  
 Who is? Seriously, would you mind stepping forward?

If it was available I would use it but wouldn't be switching cgroups
on or would be switching them off even if I hadn't bothered to
compile them out of the kernel out of principle and to catch any
nonsense that *required* them because some daemon writer has now decided
they don't need to bother with tracking their own children anymore.

When I used OpenRC on Alpine Linux I found it far nicer to work with
than any of systemd, upstart or syv-rc. The only one I find nicer to
work with is OpenBSD's.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/277875.64541...@smtp137.mail.ir2.yahoo.com



Re: default init on non-Linux platforms

2014-02-23 Thread Kevin Chadwick

Perhaps before this thread spirals out of control I should re-iterate
that what I said was cgroups doesn't pass the worth-it barrier for me
and not that they have NO value.

I also mentioned pgroups for those that do want this functionality but
also want portability and not bugs in daemons on one system but not
another increasing forking, reducing eyefall, collaboration etc. and
perhaps want a simpler solution.

The benefit that Linux and even firefox etc. has gained from OpenBSD's
practically paranoid bug fixing as well as finding the bugs for all the
platforms it's userland still runs on especially in compiler tools
should be realised and not underestimated. To some degree it will be
true for debians HURD and is it kfreebsd too. So I don't get the
holding Linux back rubbish especially when it is often based on
superficial arguments that carry little weight, atleast in my eyes.
Isolating Linux would hold it back and make it a flakier system in my
eyes.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/924308.73795...@smtp129.mail.ir2.yahoo.com



Re: default init on non-Linux platforms

2014-02-23 Thread Kevin Chadwick
previously on this list Kevin Chadwick contributed:

 Perhaps before this thread spirals out of control I should

should also mention this has been discussed on this very list already,
though before I was enrolled and the following response went
unreplied to. 

On the other hand and I doubt of significance to me but it may well be
worth looking into how Google uses cgroups though apparently systemd
causes or would cause problems for them in potential kernel changes
being incompatible with their usage. May have been resolved and brought
up before though I forget if replied to, but might provide some
pro argument for the cgroups case for the few that it matters to
rather than the many that enforcing it's usage matters to.

https://lists.debian.org/debian-devel/2011/07/msg00423.html

___

 It seems this problem (double fork) is the basement of using cgroup
 under systemd ;)

 I think messing around with cgroups is a ridiculous way to solve this
 problem.

To be fair, systemd also uses cgroups to reliably kill rogue child
processes when stopping a service.  This is not unlike what BSD-derived
shells use pgroups for, I believe.

 The right answer is simply to change the daemons to give
 them an option which causes them not to fork.  Then you can just have
 a single supervision daemon which reaps (and restarts, if desired).

 I haven't done a survey of the available init replacements but this is
 not a new concept

Well, it's already present in SV init :

  1:2345:respawn:/sbin/getty 38400 tty1

 and I hope that most of them implement it as a possibility.

Daemontools, runit, minit, upstart, systemd all do.  I don't know about
initng.

-- Juliusz



-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/489578.4170...@smtp104.mail.ir2.yahoo.com



Re: default init on non-Linux platforms

2014-02-23 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

 One sample usecase where they dont't: the system is wedged / overcommitted
 and I need to terminate some services; guess I'll start another ten processes
 to do that. Yeah, right.
 
 I'll be nice to everybody else here and not enumerate any others.

Again that means your system is badly designed or administered without
proper restraints such as nice and limits which are important for
other reasons. Pkill root owned processes are hardly demanding but quite
the opposite.

not-well designed services should be fixed.

Why should I HAVE to have any evil when I don't have ANY need for it
and have much more important things depending on the kernel to be secure.

unfortunately cgroups are a necessary evil - Linus Torvalds

Should have added for a select few and others that don't know what
they are doing!

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/400062.71270...@smtp120.mail.ir2.yahoo.com



Re: default init on non-Linux platforms

2014-02-21 Thread Kevin Chadwick
previously on this list hero...@gentoo.org contributed:

  And grepping through the output of ps or similar is not what
  I would consider reliable and robust either.  
 
 Nod. grepping `ps` is what we should avoid at all cost.

All cost? While I like OpenRC and thanks to Gentoo for it and like
your mention of each to there own (I am no old-nerd by the way). I have
to disagree.

If a service fails I am more interested in why and what will happen if
it restarts and not is it back-up already. For that, I would use
redundant servers which in any way you look at it and especially for
high availability situations must be more reliable than trying to
restart a failed service blindly that may not operate as it should when
it does.

Functional externally generated tests like https returned this file are
most valuable for monitoring services and I don't really see your point
or the major benefit at all, especially if it involves increased kernel
complexity.

cgroups doesn't break that, worth it, question for me personally.

However whilst I have found the reasoning by the CTTE to have been
rather disappointing and superficial and I am unlikely to ever use
systemd due to having fundamental issues with it. If a major concern was
portability and many of you have your heart set on systemd then
although it goes against my desires and technical concerns then perhaps
pgroups are worth a mention.




http://marc.info/?l=openbsd-miscm=135313692911156w=2


how can someone write this and not explain why a process managing
pgroups can't achieve the same results?

pgroups is going to be the first alternative for someone instinctively
looking for a portable alternative, so i'm genuinely interested in
knowing why they've discarded the idea

i am, however, aware of differences *unrelated* to writing a systemd
like appliance. pgroups do not provide per item hostname and other
virtualization facilities in freebsd jails/linux cgroups, but what
about *relevant* differences? something weak like the index for for
cgroups is wide enough to fit an UUID? in other words, something that
*doesn't* require a completely new api?




http://marc.info/?l=openbsd-miscm=135314269712851w=2

therefore the requirement for cgroups is completely arbitrary

also of interest:

* early versions of systemd documentation advised daemon authors not
to double fork. presumably cgroups wasn't in the radar at the time

* several (all?) openbsd daemons have options for not double-forking.
some of these daemons have the gall of preceding systemd




-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/163088.43505...@smtp102.mail.ir2.yahoo.com



Re: default init on non-Linux platforms

2014-02-19 Thread Kevin Chadwick
previously on this list Thomas Goirand contributed:

 So, systemd is still using /etc/rc?.d. Could you tell exactly what it
 uses out of /etc/rc?.d, and what for? Does it only needs to see them as
 S??script-name in runlevel 2 or 4 (or whatever it uses...)?
 
 If systemd needs links in /etc/rcX.d, then I think it should be possible
 to hack something.

One of the main things I like about OpenRC and especially OpenBSDs rc
system is that you can modify the files directly intuitively.

The main thing I hate about the current system is those links and them
requiring a tool to edit them in any timely fashion. Almost as much as
the huge commandlines needed to do so for systemd without it's tools
or for things it's tools can't or couldn't do at the time I tested it
out, if I remember rightly to do with
org.??? lines.

Do people use all those runlevels?

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/494637.19636...@smtp114.mail.ir2.yahoo.com



Re: systemd's journal

2014-02-19 Thread Kevin Chadwick
previously on this list Helmut Grohne contributed:

  It's just occurred to me that the binary format may not work with append
  only logging?  
 
 That's true for the journal. When the journal opens its binary log, it
 flags the file as being opened, but what is the issue with not being
 append only?
 

I like to use the kernel to enforce append only on certain log files so
that they can't be tampered without finding a kernel exploit or
rebooting. Your right in that it does mean you can't compress but I
find logs are small on modern disks.

I do it all the time on OpenBSD with schg backed up by it's ace
critical bug free kernel and have done so on Linux with chattr -a mixed
with another trick that I forget right now though I believe it can be
done with RBACs like grsecurities or SELinux.

  Also recovering those logs from a possibly intentionally
  uncompletely wiped disk would be much harder especially on an ext3/ext4
  filesystem where carving is required when otherwise you could image or
  ddrescue in case of hardware failure and use grep.  
 
 I have not tried, but I imagine it not being that much harder for the
 following reasons:
 
 If your journal is compressed, you basically lose, but that is true for
 compressed text logs as well. So if you need this recovery scenario,
 don't compress.
 
 If your journal is uncompressed, you can exploit aspects of the format
 to find the log. Specifically, log entry consists of key-value pairs,
 most of which likely match /\(_SYSTEMD_[A-Z_]*\|MESSAGE\)=.*/. Another

True and fair enough, though can you read partial fragments from a
journal or does it need the whole thing or complete chunks recovered.

Anyway it's not like I have ever needed to do this but it's good to
know you can and for the same reason I save my odt files as text
occasionally when writing them as a more reliable format and advise
others to do so.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/889772.23942...@smtp150.mail.ir2.yahoo.com



Re: pulseaudio related problems....

2014-02-18 Thread Kevin Chadwick
previously on this list Steve Langasek contributed:

 All
 software has bugs.  The difference is in how you handle them.

And how many!!! AND how many per 1000 lines AND how many run with
priviledges.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/421905.41062...@smtp141.mail.ir2.yahoo.com



Re: Upstart support for LSB headers (Two line init.d scripts? Sure, that will work!)

2014-02-18 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

  discussion. No, we should not depend on it for Debian; but we should
  provide the interface for system administrators who wish to use it,
  because it is not Debian's place to tell them that they cannot use that
  interface.

 It's not our place to tell people that they _cannot_ use it, but it's a
 good place to add a consider writing a .service file if you start daemons
 here; read the XXX manpages to learn more.

I agree but more than that why should I waste my time, I have no
intention of ever writing a .service file or anything much longer than
one-liners else I'd say that something is wrong in one of a few places
and most likely the program design.

I get the plus of my scripts running on any system, even Windows or a c
loop embedded device.

Plus I stop services with the likes of pkill as when service stop fails
I would prefer to know how anyway and can use them on any system or with
any favourite of myself or others whether it's monit, nagios etc. etc.
or any shell.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/879291.41062...@smtp141.mail.ir2.yahoo.com



Re: pulseaudio related problems....

2014-02-18 Thread Kevin Chadwick
previously on this list John Paul Adrian Glaubitz contributed:

 The problem is that many people who complain about PulseAudio issues
 are often prejudiced about it in the first place such that they aren't
 actually interested in having the problem fixed but rather just want
 to get rid of it and uninstall it. Trying to debug the problem in such
 cases is very difficult.
 
  And to the extent that Debian users are unhappy with pulseaudio as a
  default, it's because others have been trying to blame the user for the
  problems instead of constructively engaging to *fix* pulseaudio.  
 
 I think the reservations are mutual. If your attention as a user is
 I'm too lazy to take a second to look into how PulseAudio actually
 works and what box I have to check., you can't expect us on the
 other side to be happy to help as well.

What's that phrase about assumption again? ;-)

I'm sure Salvo has, but it is worth checking the PCM in the mixer as
it kept being set occasionally to 0 for me on multiple mythbuntu boxes.

Though if you don't need the features and don't have the time to set up
jackd then why not remove. I assume pulseaudio as the default has some
ease of use advantage or feature though as I know jackd is better for
pro audio.

It hasn't happened since I removed pulseaudio but I did that because it
wanted polkit or dbus system-services and without polkit permissions or
dbus system-services enabled sound didn't work anyway. I was rather glad
when I found adding myself to the audio group meant I got Alsa audio
back. Not sure why the audio group was empty by default, surely it
should fall back to Alsa?


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/31542.41062...@smtp141.mail.ir2.yahoo.com



Re: systemd's journal

2014-02-18 Thread Kevin Chadwick
previously on this list Helmut Grohne contributed:

 So for the time being (i.e. until all of my systems and recovery systems
 are converted to systemd), I do see a slight[2] disadvantage

 It may take even longer until all initramfs will use
 systemd (and I do want to read logs from the initramfs if all I can
 mount is the /var/log).

It's just occurred to me that the binary format may not work with append
only logging?

Also recovering those logs from a possibly intentionally
uncompletely wiped disk would be much harder especially on an ext3/ext4
filesystem where carving is required when otherwise you could image or
ddrescue in case of hardware failure and use grep.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/327685.41062...@smtp141.mail.ir2.yahoo.com



Re: Honestly, fork systemd

2014-02-18 Thread Kevin Chadwick
previously on this list Svante Signell contributed:

  To answer the original poster's own question, what can he do?
  
  He can stop writing these emails and start writing code (a fork of
  systemd supporting kFreeBSD, to be specific)  
 
 I don't think forking systemd is a good choice, that software id doomed,
 better to fork gnome components to make them usable with another init
 system. There are a number of usable components of gnome, e.g.
 evolution, I would like to still use it, without systemed, but that is
 currently not possible :(

3.10.4 runs on OpenBSD likely after patching though I don't see any
patches to evolution itself in their ports tree. I think Antonio patched
OpenBSD's sndio in for pulseaudio for gnome 3. You could look into that.

I do see a configure arg --with-sub-version=OpenBSD Ports so maybe
the patches were accepted upstream.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/527874.41062...@smtp141.mail.ir2.yahoo.com



Re: Honestly, f__k systemd and f__k lennart, and f__k the fans of them. Where's linus in all of this?

2014-02-14 Thread Kevin Chadwick
previously on this list Gunnar Wolf contributed:

  Everyone knows that the systemd crap is armtwisting and trys to
  pull everyone and everything along with it.  
 
 Please provide some numbers on this statement of fact. I believe (and
 will continue to believe) that the strong supporters of sysvinit within
 the development community of debian is a small minority,

That IS twisting things in true pro systemd style. SysV fanboys?, I hate
SysV but like a small init and yes scripted bootup and certain
features like written order of execution in depend lines are way
overstated as musts but I have little issue with it.

 respect and trust those four people - As well as the four others TC
 members.

I haven't had any time yet for looking into the decision process so
this may not be the case but (and considering the subject lines I
noticed on the ctte mailing list along the lines of voting to avoid
systemd) considering the vast implementation difference between all the
systems on the table and systemd. It would seem wrong (again this is
before I've found time in looking at the details of the members
reasoning) to outright consider 4 for systemd against 4 for the others
as a decision in favour of systemd?


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/358883.76883...@smtp128.mail.ir2.yahoo.com



Re: when will we finally throw away binary uploads (Re: Please upgrade your build environment when you are affected by transition

2014-02-14 Thread Kevin Chadwick
previously on this list Brian May contributed:

 After the damage is done, probably easier to find the malware that did it

Assuming the damage is visible?


 All rants aside, I believe there's a fairly wide agreement that we
 should throw away binaries from builds.  

 I'd encourage something slightly different and then I'd expand on it a
 bit.

Sounds like a plan but perhaps if they are not already? these uploads
should be enabled within their own apt sources line.

Whilst malicious code can be hidden in source and accompanying packages
such as via sidechannel attacks, any additional threats should be
avoided or users enabled to avoid them where possible.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/783597.44818...@smtp131.mail.ir2.yahoo.com



Re: Tired of my fellow SysV supporters

2014-02-12 Thread Kevin Chadwick
previously on this list Russ Allbery contributed:

 One person in particular is currently creating new throwaway
 accounts at various free email providers to post violent threats and
 invective-filled rants to various project mailing lists. 

Maybe it's Lennart and he's hired a psychologist ;-)

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/845980.95022...@smtp104.mail.ir2.yahoo.com



Re: Bug#727708: Fsck SystemD and its developers and its users. GR to override this please.

2014-02-12 Thread Kevin Chadwick
previously on this list John Paul Adrian Glaubitz contributed:

 You know that you did this before and you apologized to me in private.
 If you like, I can post this mail to the public list. You said the exact
 same things before and I have heard other Debian Developers who think
 the same way about you.
 

I think you need some balance here as much can be flung in your
direction here too.

 Your problem is that you can't accept defeat. Again, 

Defeat? That says it all

If they have decided on systemd as default then I'd like to see the
published reasoning, though I am sure it would annoy me greatly.

The fragmentation of Linux (which includes cortex and blackfin
kernel support) has begun through an idea that was said to unite and
not divide and the benefits are negligible when you consider what
linux can already optionally do.

OpenRC is also more intuitive and easier to CLI and on install
scripts.

Promises of uniting leading to the opposite continues to repeat itself
through human history, it seems.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/310589.38154...@smtp134.mail.ir2.yahoo.com



Re: Bug#727708: Fsck SystemD and its developers and its users. GR to override this please.

2014-02-12 Thread Kevin Chadwick
On Wed, 12 Feb 2014 11:25:14 -0500
Paul Tagliamonte wrote:

  If they have decided on systemd as default [...]  
 
 https://lists.debian.org/debian-devel-announce/2014/02/msg5.html
 
 Can we please end this thread?

Sure but perhaps you could save me the trouble to say if there is a
general outline of the factors that the decision made was based upon
perhaops somewhere in the ctte mailing list archive. Or a round up
published before voting.

Don't tell me it was just a vote with licensing issues being taken by
many over real issues as some sites seem to be saying. Do voters give
their primary reasons?


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/384598.17177...@smtp111.mail.ir2.yahoo.com



Re: Call to fork

2014-02-11 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed:

 For instance, a daemon which fails to start under sysvinit will
 not even prevent the services which depend on it from starting up.
 How terminally stupid is that?

Perhaps you should rethink that whilst considering the complexities. I
disagree and could easily argue doing so is stupid.

I have also done just that for services not designed to work together
within rc.local.



-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/345050.99715...@smtp150.mail.ir2.yahoo.com



Re: Bug#727708: Fsck SystemD and its developers and its users. GR to override this please.

2014-02-11 Thread Kevin Chadwick
previously on this list Svante Signell contributed:

  What I don't get is why are those people trying to push Debian's
  decision when they are primarily using a different platform. But I
  guess it's pure politics and trying to push their own projects.  
 
 I'm pretty sure there are _many_ Debian users and developers among the
 people not being happy with the way things are heading :-( Make your
 voices heard!

heading? I have faith and if not I shall just switch distro with a
little more work or less convenience for offline machines but miss the
guarantee of stability and have some worries and dashed hopes for the
future of debian embedded.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/357212.23464...@smtp119.mail.ir2.yahoo.com



Re: Bug#727708: Fsck SystemD and its developers and its users. GR to override this please.

2014-02-11 Thread Kevin Chadwick
previously on this list John Paul Adrian Glaubitz contributed:

 On 02/11/2014 05:20 AM, Thomas Goirand wrote:
  It's like being able to customize internal parts of your cars engine
  when ordering one from your dealer. Customers don't care who the
  manufacturer of your ignition system is as long it's the best
  possible one. (Yes, I know comparisons with cars are bad ;)).
  
  That's partly not truth. Some customers care, and do customization of
  their car.
 
 No, it's absolutely not. You can have the choice for the interior
 design, the paint job, the radio, the type of engine and comfort
 features, but you certainly cannot have the choice on internal
 parts like the ignition system or starter motor.

I'm under the impression Americans customise almost routinely.

I know one of my Dad's favourite features of the original mini (mini's
may be simple but they won many rallies and are still going) was that
almost anyone could take it apart completely in his garage and put it
all back together optionally replacing parts. Only the interfaces have
to match.

That was until he rolled it into a ditch and is still unable to work
out how he physically managed to scramble out of the tiny triangular
window.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/619879.21733...@smtp145.mail.ir2.yahoo.com



Re: Bug#727708: Fsck SystemD and its developers and its users. GR to override this please.

2014-02-11 Thread Kevin Chadwick
previously on this list John Paul Adrian Glaubitz contributed:

 systemd is used as the default init system in:
 
 - Fedora
 - Arch Linux
 - Mageia
 - openSUSE
 - SLES (upcoming)
 - RHEL7
 - Frugalware
 - (see Wikipedia)
 
 Plus companies like Intel and BMW are using it in their embedded platforms.


So some distros with relatively few users out of the huge number that
exist.

and two companies shipping products that actually are embedded in a dash
and I'm guessing not actually embedded devices or at the very highest
end. You don't call a high powered quad arm seven server embedded, do
you?

Which is a bit like an SME having a minimum of 200 employees when 85%
of companies have four.



-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/876122.10768...@smtp101.mail.ir2.yahoo.com



Re: [Bulk] Re: Bug#727708: Fsck SystemD and its developers and its users. GR to override this please.

2014-02-11 Thread Kevin Chadwick
On Tue, 11 Feb 2014 20:39:10 +0100
John Paul Adrian Glaubitz wrote:

 While they loose the warranty which is my main point.
 

Who needs a warranty when it's so straight forward. These days you have
an engine with a management system which you have to fix or convince
the mechanic that the management system is reporting the wrong thing
before he sends it to Mercedes to be fixed at 10 times the price.

Or it switches your car off when you don't want it to or dials Mercedes
to come pick your car up when you have tried to hide it, like happened
to Jeremy Clarkson.

 Yes, you can replace your init system with anything you like, but
 don't expect everyone else in Debian to actively support you.

In true systemd supporting style.

Cheers, mate


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/684127.74971...@smtp102.mail.ir2.yahoo.com



Re: [Bulk] Re: Bug#727708: Fsck SystemD and its developers and its users. GR to override this please.

2014-02-11 Thread Kevin Chadwick
On Tue, 11 Feb 2014 20:37:59 +0100
John Paul Adrian Glaubitz wrote:

 Arch, openSUSE and Fedora are among the most popular and widely
 used Linux distributions where most of the upstream development
 happens.
 

Show me the numbers, I completely disagree and developers from those
ditributions such as RedHat have been equally vocal against systemd.

  and two companies shipping products that actually are embedded in a dash 

 
 Those two are multi-billion dollar companies.
 

With many projects where systemd couldn't even hope to be used. The
point is you are trying to make a point out of nothing.

 On the other hand, what companies and distributions and companies
 actively support Upstart and OpenRC.
 

Meaningless. How many companies support development of /sbin/init?

 Don't diminish the achievements by the systemd developers when
 the competition isn't even remotely on par when it comes to
 momentum and community and company support.

I don't wish to get dragged into what has been discussed far better
many times before yet again. I have faith that those that have spoken
against systemd have shown good reasoning and understanding and the
opposite camp largely misunderstands what already exists and the depth
of usage with a few minor plus points. I also realise security benefits
are often muted and risks misunderstood.

Init scripts are here to stay no matter what happens for many
reasons, the only question is what is the best default or init just
for Debian. Which is easiest to switch to. Which default may cause bugs
and/or lend itself to upstreams making worse and less pliable software.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/374770.71754...@smtp103.mail.ir2.yahoo.com



Re: conflict between system user and normal user

2014-02-10 Thread Kevin Chadwick
previously on this list Peter Palfrader contributed:

  I would really like to standardize on some prefix.  
 
  I like _ as a prefix because adduser doesn't allow the local sysadmin to
  create accounts with that prefix without special flags, which I think
  makes it a more useful reserved namespace.  
 
 Just a me too:
 
 If we could actually agree and document in policy that the _ prefix is
 the way to go that'd be great.  I'd be more than happy to rename
 debian-tor to _tor for instance.
 
 Guidance (or even code) on how to properly rename existing system users
 would be appreciated.

OpenBSD uses _ntp for ntpd and apparently all services since just
after sshd was added to base, so there is some synergy there. Apparently
it happened to ensure no namespace collision of system bundled services.

On OpenBSD I use the same syntax when adding things like my automounter
user for my hotplugd script.

So I'd agree with the underscore but see the not allowing the local
sysadmin to create accounts easily with it as a bad thing as they could
perfectly well want to avoid collisions with packages as much as a
debian dev.

It is the admins system primarily after all and purposefully getting
in the way is completely wrong in my opinion, warnings even with
relentless beeping if you must.

This is something I disagree with the stance on udev about for
removing LAST_ACTION too.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/648834.53502...@smtp102.mail.ir2.yahoo.com



Re: Upstart support for LSB headers (Two line init.d scripts? Sure, that will work!)

2014-02-10 Thread Kevin Chadwick
previously on this list Sergey B Kirpichev contributed:

 Doesn't matter)  rc.local shouldn't be used by local
 admin to start services from.  Why not use usual init-script?

I wouldn't be surprised if rc.local has been around longer than Debian
and is meant to run at the end. Particularly for a service that isn't
packaged it may be useful and expected to run last. It seems perfectly
logical for a user to expect a local service or command to run last ie
as if a user did so after boot up. The special hurd case should run
after rc.local as a special case perhaps an include ./rc.local.oddball.

The arguments online of services should be shutdown gracefully in case
they have problems on the next bootup by upstart and systemd seems to
be nonsense.

On OpenBSD you have rc.shutdown but in any case if the system dies or
crashes, plug pulled etc., then services should start just fine on
reboot or be re-written rather than being flaky rubbish

In fact in that case abusing rc.local means a higher likelihood of
testing for and removing flaky services or fixing bugs before that
annoying time of things breaking which almost always happens at the
worst time possible.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/863947.50998...@smtp124.mail.ir2.yahoo.com



Re: conflict between system user and normal user

2014-02-10 Thread Kevin Chadwick
previously on this list Simon McVittie contributed:

  So I'd agree with the underscore but see the not allowing the local
  sysadmin to create accounts easily with it as a bad thing as they could
  perfectly well want to avoid collisions with packages as much as a
  debian dev.  
 
 A concrete example, please? If you (as local sysadmin) always create
 accounts matching [a-z]*, and Debian packages always create accounts
 matching _*, then your local actions can't collide with Debian packages.

Oops, I guess I read it too fast, sorry for wasting your time. I thought
system accounts were going to get the underscore. Which means the
preventing admin makes more sense but the synergy possibly being the
opposite.

In any case, before this morning I thought OpenBSD underscored users
were chrooted or something along those lines and it turns out it was the
Absolute OpenBSD book that says they are unpriviledged users which from
taking a look stands up with mysql package/port unpriviledged user also
using underscore. The fact that basically all of the daemons are
unpriviledged is a testament to OpenBSD I guess.

So the mailing list thread I based OpenBSD using underscore for non
base users was wrong despite being made by a usually reliable source
or actually I'm guessing has possibly changed now that basically all
base daemons are unpriviledged.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/84316.34880...@smtp108.mail.ir2.yahoo.com



Re: Valve games for Debian Developers

2014-01-23 Thread Kevin Chadwick
previously on this list Russ Allbery contributed:

Just want to mention, I'd really appreciate it if jockey and so polkit
could become an optional dependency of the steam launcher (Ubuntu) and
so I guess steam OS as the Nvidia functionality is not used or needed
when I use steam. Despite Nvidia having faster opengl atleast with Wine
I've just switched to AMD as they are far less closed than Nvidia and
so KMS works on OpenBSD.

Polkit is riskier not to mention less manageable than sudo and I have no
need for it and shouldn't be forced to install it and even though I buy
steam credits from secure machines and don't store my card details with
steam and you may say it is only gaming, Gaming with incoming traffic is
still a risky use of a computer.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/648867.92600...@smtp138.mail.ir2.yahoo.com



Re: Bug#735927: general: X *always* crashes when ram is full

2014-01-20 Thread Kevin Chadwick
previously on this list Roger Leigh contributed:

 With an SSD, you really
 don't want /tmp or swap on it;

Why?, due to limited write cycles?

As long as it is a modern SSD (years) or one of the old ones one with a
sandforce controller (OpenBSD dev let me know about that) then it has a
good 20% extra space above it's listed gigabytes reserved unusable for
wear levelling meaning this is a non issue even when full?

Unless he's worried about not being able to wipe the swap?

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/801542.40858...@smtp127.mail.ir2.yahoo.com



Re: Bug#735927: general: X *always* crashes when ram is full

2014-01-20 Thread Kevin Chadwick
On Mon, 20 Jan 2014 14:30:24 +
Roger Leigh wrote:

 This is a system with 8 cores @4GHz, 16GiB RAM,
 over 16GiB swap, so should be pretty performant, yet /tmp on an
 SSD made it crawl and freeze continually.

Interesting, have a look if it states the write access time spec in the
datasheet (if available) of that SSD? Though when I've looked for
write access time on off the shelf SSD drives it usually only mentions
throughput or reading.

Do you know if it slows the build if you use it for the source code? If
your not sure it's a sandforce or has similar wear levelling then
obviously don't try it in case you wear it out, though as it's your
root I don't suppose you will try it.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/829972.77857...@smtp115.mail.ir2.yahoo.com



Re: Bug#735927: general: X *always* crashes when 5 youtube video opened

2014-01-18 Thread Kevin Chadwick
previously on this list Andrew Shadura contributed:

 Apparently, you haven't got free disk space left. That's sort of
 expected that when there's no free disk space programs start crashing
 randomly.

Shouldn't happen if you partition your disks and even then only
carelessly written programs like mythtv and KDE crash or refuse to
start but them two may have been fixed now in this regard.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/926698.27371...@smtp147.mail.ir2.yahoo.com



Do you use OpenSSH

2014-01-14 Thread Kevin Chadwick

It certainly wouldn't be as secure or successful and may not even exist
without OpenBSD.

OpenBSD currently has a shortfall for it's electricity costs and so any
donation's would be much appreciated by the project.

Sorry if you see this as spam it won't happen again.

___

The OpenBSD project uses a lot of electricity for running the
development and build machines.  A number of logistical reasons
prevents us from moving the machines to another location which might
offer space/power for free, so let's not allow the conversation to go
that way.

We are looking for a Canadian company who will take on our electrical
expenses -- on their books, rather than on our books.  We would be
happiest to find someone who will do this on an annual recurring
basis.

That way the various OpenBSD efforts can be supported, yet written off
as an off-site operations cost by such a company.  If we reduce this
cost, it will leave more money for other parts of the project.

We think that a Canadian company is the best choice for accounting
reasons.  If a company in some other jurisdiction feels they can also
do this successfully, we'd be very happy to hear from them as well.

I am not going to disclose the actual numbers here.  Please contact me
for details if serious.

Thanks.
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/972769.25938...@smtp112.mail.ir2.yahoo.com



Re: xpdf removed from testing?

2014-01-13 Thread Kevin Chadwick
previously on this list Svante Signell contributed:

 Is it true that xpdf is about to disappear. I like that program very
 much.

I like it too but it's save dialog is pretty terrible. Have you checked
out mupdf. No save but similar otherwise.

p.s. qpdfview is shaping up and remembers tabs too.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/96511.59881...@smtp101.mail.ir2.yahoo.com



Re: Bug#727708: tech-ctte: Decide which init system to default to in Debian.

2013-11-01 Thread Kevin Chadwick
previously on this list Ben Hutchings contributed:

   In other words, Canonical gets the right to take a free software
   contribution and make it proprietary. The contributors gets to own the
   software, and can continue releasing it as free software, but can't
   prevent Canonical from making non-free versions of it. I don't find
   that an acceptable situation.  
  
  But I saw today that this paragraph goes on with:
  
  As a condition on the exercise of this right, We agree to also
  license the Contribution under the terms of the license or
  licenses which We are using for the Material on the Submission
  Date.
  
  My understanding (as a non-expert on legalese en_*) is, that Canonical
  would only be allowed to re-license the Contribution under a
  dual-license scheme, with (a) the original license, and (b)
  $whatever-they-want.  
 [...]
 
 Yes, but that says nothing about the rest of the program that it's a
 part of, nor that they will continue to distribute the Contribution.
 Since the contributor, retaining copyright, can give that license to
 anyone anyway, this condition doesn't appear to have any meaningful
 effect.
 
 Ben.

I don't see why this should affect the decision at all personally
especially far less than less co-operative upstreams though perhaps a
pure BSD license could be seen as a free-er plus point.

It basically means they have reserved the right that they may never
use but put in jut in case likely for other projects to stop
contributing or publishing the source of their work to the project but
continue to use the communities past work.

The community could even then decide that just canonical was not
allowed to use any of their changes from then on whilst still
benefiting from Canonical's past work.

At the end of the day whatever increases the chance of code being done
for good reasons and the good of the community is what is important
and forcing publication may?? help twist the arms of the less important
contributors but also hinders that likelihood in reduced initial
take up anyway possibly including partial release.

Apache's BSD based and Googles BSD based licenses and many others would
all allow this, what has been and is going to be contributed in a
constructive and forth coming way for the good of all is what is
important.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/304170.20633...@smtp139.mail.ir2.yahoo.com



Re: Bug#727708: tech-ctte: Decide which init system to default to in Debian.

2013-10-31 Thread Kevin Chadwick
previously on this list Theodore Ts'o contributed:

 So hopefully that is something the technical committee will take into
 account --- how well things are documented, both in terms of a
 comprehensive reference manual, and a tutorial that helps people with
 common things that system administrators might want to do.  The
 docuementation you pointed to at http://upstart.ubuntu.com/cookbook/
 is something I wish I had access to when I first was forced to use
 Upstart; maybe if Upstart was as polished back then, I might not have
 given up on Ubuntu in disgust.

I would like to have seen that, I think the man page found via
apropos upstart should point to that doc in /usr/share as well as the
http for offline use at the very least, even if a pdf/html has to be
copied off to be read on a server. I don't use Linux for any servers
that I currently deploy but I can see that being very annoying in
certain situations. 

I have had my time wasted with almost every init system except
OpenRC which is pretty much intuitive but still not so intuitive as
OpenBSD's being my favourite where you have around 6 files (few for
lockdownability but actually simplicity too) ALL in /etc and with rc in
the name and one directory called rc.d all of which have very good man
pages including giving reasons for why things are done in as few files
as possible even though you could work it out yourself rather quickly.

Of course good man pages is one of OpenBSD's watch words or primary
goals and security and minimal defaults comes before speed and ease
of average user use so it shouldn't be that surprising.

rc.conf has the defaults and the line
. /etc/rc.conf.local

rc.conf.local can have overrides such as
sshd_flags=NO for off
or
sshd_flags= for default
or
sshd_flags=-4 for ipv4 only

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/947826.52397...@smtp103.mail.ir2.yahoo.com



Re: Bug#727708: tech-ctte: Decide which init system to default to in Debian.

2013-10-31 Thread Kevin Chadwick
previously on this list Wouter Verhelst contributed:

  By absense of documentation, are you referring to the almost 10% of the
  source base that are comments or the 15% that is DocBook XML based
  documentation?  (Almost 14kLOC and almost 36kLOX, respectively.)  
 
 That particular comment was not referring to systemd specificaly.
 
 I haven't looked at the systemd code in much detail myself. What I wrote
 in the above-quoted post was based on the comment of this OpenRC
 developer. Perhaps I should have checked some more before repeating that
 comment, though.

Well he actually said that seperating/finding the logind code and any
relevent documentation was difficult.

So an accurate rebuttal would be ?kLOC and ?kLOX concerning logind and
perhaps a description of all the functionality of logind from those
comments.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/290887.44189...@smtp132.mail.ir2.yahoo.com



Re: Bug#727708: tech-ctte: Decide which init system to default to in Debian.

2013-10-30 Thread Kevin Chadwick
previously on this list Zbigniew Jędrzejewski-Szmek contributed:

 Hi Helmut,
 exec vs. ExecStart= and export vs. Environment= is easy.
 Anyone can whip up a sed script to convert between those. The question
 is how to deal with more advanced options. Let's say that I have a
 systemd unit with
 
 CapabilityBoundingSet=CAP_SYS_TIME# limit the capability bounding set to 
 CAP_SYS_TIME
 PrivateTmp=yes# run with unshared /tmp
 InaccessibleDirectories=/home   # run without access to /home
 WatchdogSec=60  # consider the service dead if it 
 hasn't pinged the
   # manager for in the last minute
 Restart=on-failure# restart service on watchdog failure 
 or unclean exit
 
 This isn't a question of syntax, it's a question of significant
 functionality in the manager. I think that sharing service
 descriptions between disparate init managers is infeasible, unless we
 forbid the use of anything but the basic features.
 

Couldn't they just be ignored not to mention already having existing or
far more functional and robust *options* that work with any init system.

Even SElinux has people wanting to use RSBAC or grsecurities RBAC
because they have a better security record due to more secure
architectures and rules.

and on another matter I personally much prefer a setcap (again or other
options like RBAC) shell line to

CapabilityBoundingSet=CAP_SYS_TIME

 Another thing that is turning into a significant gap is socket
 activation.  In systemd, socket activation allows the service to
 receive multiple open sockets (e.g. ports 80 and 443 for an httpd
 server). Socket activation of daemons is cool:

No it isn't and has been argued over not long ago, so as I have been
requested to and am now trying (even harder) it would be good if we
could keep the S/N ratio down.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/527896.83523...@smtp118.mail.ir2.yahoo.com



Re: Bug#727708: tech-ctte: Decide which init system to default to in Debian.

2013-10-30 Thread Kevin Chadwick
previously on this list Helmut Grohne contributed:

 Most participants in this thread appear to agree that the sysvinit
 *interface* for services (shell scripts) is suboptimal.

Not so sure, I have various thoughts on this and even the reasons that
it is considered sub optimal but think some like me have chosen not to
bring this up out of fear of opening another can of worms which has
already been discussed many times.

I have always found OpenRC quite nice in being intuitive, quick and
flexible to administer though compared to debian's sysv implementation,
upstart and systemd.

The freedom arguments can be combatted somewhat with the 'modern' init
having options to use shell scripts but then the question becomes
whether services start needing hacking and recompiling for things like
embedded usage or any other unexpected scenario or desire and I guess
Gentoo is heavily into embedded and unexpected scenarios like debian.

On the other hand if those disrespectful services choose to ignore unix
philosophy then it may simply be an extension of dependency hell in any
case and so is of little matter except discouragement.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/922863.83523...@smtp118.mail.ir2.yahoo.com



Re: Bug#727708: tech-ctte: Decide which init system to default to in Debian.

2013-10-30 Thread Kevin Chadwick
previously on this list Jonathan Dowland contributed:

  Couldn't they just be ignored not to mention already having existing or
  far more functional and robust *options* that work with any init system.  
 
 A cursory glance at the example above…
 
   PrivateTmp=yes
   InaccessibleDirectories=/home  
 
 …would suggest that simply ignoring such things could be a major
 security concern. So, no.
 

Well I meant that they would be used by systemd and ignored likely
noisily by default by others. However this really should be the job of
the service in any case as depending on a third party service for
security that isn't extra such as potentially PrivateTmp that
apache/php may need (likely in a /var chroot in this case though) is
asking for trouble.

  and on another matter I personally much prefer a setcap (again or other
  options like RBAC) shell line to
  
  CapabilityBoundingSet=CAP_SYS_TIME  
 
 Presumably your preference is not purely down to syntax. What is it
 down to?

For something that is as long and no more descriptive than the shell
it replaces it is simply adding obfuscation that fails to teach anything
useful to users for use in other contexts and doesn't have a man page
which like so often on Linux needs improving for setcap but that is of
no importance to the better practice of empowering users who may
become the next generation of devs.


  No it isn't and has been argued over not long ago, so as I have been
  requested to and am now trying (even harder) it would be good if we
  could keep the S/N ratio down.  

 I'm afraid you're failing with sentences such as the above.

True and certainly could have been worded more tactfully. I was
referring to the thread from the 27th Aug entitled 

Custom Reload command/signal in upstart

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/818151.66282...@smtp124.mail.ir2.yahoo.com



Re: Bug#727708: tech-ctte: Decide which init system to default to in Debian.

2013-10-30 Thread Kevin Chadwick
previously on this list Russ Allbery contributed:

  Well I meant that they would be used by systemd and ignored likely
  noisily by default by others. However this really should be the job of
  the service in any case as depending on a third party service for
  security that isn't extra such as potentially PrivateTmp that apache/php
  may need (likely in a /var chroot in this case though) is asking for
  trouble.  
 
 No, it should *not* be the job of each service to reimplement tricky
 security measures.  They should be implemented in one place or a small
 number of competing places that are thoroughly tested and that have been
 examined with lots of eyeballs, and then reused by everyone else rather
 than having them attempt to roll their own strategies.
 
 This applies to several features in upstart and systemd.  Socket
 activation is another excellent example.  Anyone care to guess how much
 badly-written code to handle listening to a network socket currently
 exists in the archive?  How much of it causes the daemon to fork and exit
 in the parent before it's actually listening to the network, thus breaking
 boot ordering?  And that's despite the existence of the inet superserver,
 which hopefully a lot of packages are using rather than rolling their own.
 
 It's one thing to avoid a monoculture.  It's quite another to chase
 avoidance of a monoculture into a nasty case of Not Invented Here.
 Services should not be responsible for doing things that can be done
 properly by well-tested and robust system services for exactly the same
 reason that services should not use their own implementation of AES and
 should instead rely on one of the several robust and well-tested crypto
 libraries.

Well I completely disagree, yes they should use or atleast reference
good well audited shared references but code for security should be
tailored to the almost always simpler job at hand otherwise you will
always be less secure and doing so actually increases eyeballs on the
code. Bringing it back to PrivateTmp what you are certainly doing is
adding complexity about whether systemd is running and has done this or
not and for what good reason, which then raises questions and less
audited code for all the other use cases. If you analyse the really
secure packages on the two sides guess which has the extremely low
vulnerability track record. You may also stop the dev from providing
extra layers of security because the generalised behaviour is out of
their domain and they don't need to think about it.

If on the other hand you are talking about making it easier for some
programmers who are not willing to take the time to be careful then you
may have a point for backing things like polkit but I would say they
should stick to unpriviledged user operations then as this
generalisation and misunderstanding/unfamiliarity does and will lead to
more exploits and they shouldn't be doing anything risky as root if
they are not willing to be careful anyway.

And no it isn't exactly the same reason as well defined libraries with
very specific low level jobs at all, often even standard c libraries
functions are the right tool but sometimes you take part of it and make
something more correct.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/68396.31640...@smtp104.mail.ir2.yahoo.com



Re: let's split the systemd binary package

2013-10-29 Thread Kevin Chadwick
previously on this list Philipp Kern contributed:

 I'm not sure why our enterprise users don't count as users as well.

Of course they do even if the couple of people possibly concerned with
it that I know use.. is it Citrix? I was merely pointing out that it
is an extremely small minority of Debian users but possibly? a majority
or major section of RedHats paying customers and even more so it's
revenue stream (pay more).

This should be considered in weighting the pros and cons that's all
especially when terms like real features (largely gone undefined) are
being banded around. As I have said issues that affect many and people
may actually notice have gone are easily fixed as far as I am aware
(certainly the ones mentioned like suspend, as I do so when disabling
polkit very easily without compilation). So how many debian Gnome users
will notice the breakage aside from suspend and ? how many will
continue to use Gnome if the default is changed as has already been
raised.

On top of that, large organisation's should have no problem solving
this and do they use debian or want support from Red Hat/Citrix in
most cases?

I don't need the dbus system bus personally either but I understand the
vast vast majority do in current setups, so that is a real issue of the
future if permitted to land into the kernel as the only option (I doubt
it) and as Canonical/Ubuntu and Google have concerns on multiple fronts
here I think it is certainly worth waiting that out and should not
really be used as an argument currently.


-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/905842.70346...@smtp101.mail.ir2.yahoo.com



Re: let's split the systemd binary package

2013-10-29 Thread Kevin Chadwick
previously on this list Olav Vitters contributed:

 On Tue, Oct 29, 2013 at 06:37:35PM +, Kevin Chadwick wrote:
  Of course they do even if the couple of people possibly concerned with
  it that I know use.. is it Citrix? I was merely pointing out that it
  is an extremely small minority of Debian users but possibly? a majority  
 
 Do you have any references to back up how you know this? Or just merely
 guessing? It seems like pure guesswork.
 

Until someone points out some new functionality I have missed, this is
surely obvious especially if the *buntus are included.

  This should be considered in weighting the pros and cons that's all
  especially when terms like real features (largely gone undefined) are
  being banded around. As I have said issues that affect many and people
  may actually notice have gone are easily fixed as far as I am aware
  (certainly the ones mentioned like suspend, as I do so when disabling
  polkit very easily without compilation). So how many debian Gnome users
  will notice the breakage aside from suspend and ? how many will
  continue to use Gnome if the default is changed as has already been
  raised.  
 
 Are you taking up ConsoleKit development or not? Loads of things could
 theoretically maybe be done. What matters is something concrete.
 

I have no use for consolekit and it doesn't run on my systems and none
of my users notice, so why would I?. What I don't agree with is this
ultimatum that something must be done and making a mountain out of a
trench. Worst case is holding systemd back or using consolekit and all
this may be solved in x number of unknown ways by the time it matters to
stable. I'm also sure those that need session tracking could easily
afford to sponsor the work if they need it and use Debian.


  On top of that, large organisation's should have no problem solving
  this and do they use debian or want support from Red Hat/Citrix in
  most cases?  
 
 Please don't turn this into a Canonical vs Red Hat thread.
 

I am not, I have spotted and cited trends and made statements perhaps
without citing other annoying trends in detail that may alter my tone
to only parts of RedHat (such as documentation, configuration
methods...). I respect the company as a whole and don't forget many
Redhat employees have publicly spoken out against systemd. I was merely
responding to the post of lennart's that may make many think there is no
alternative, when they specifically have been talked about recently.
There are always alternatives. Who knows even linux itself may fork one
day but I hope not.

  I don't need the dbus system bus personally either but I understand the
  vast vast majority do in current setups, so that is a real issue of the
  future if permitted to land into the kernel as the only option (I doubt
  it) and as Canonical/Ubuntu and Google have concerns on multiple fronts
  here I think it is certainly worth waiting that out and should not
  really be used as an argument currently.  
 
 GNOME relies on d-bus for various things. Not liking d-bus doesn't
 change that fact.

Who said I didn't like dbus. I even said the session bus should be used
where it is best suited. I do think it is often used when it shouldn't
be and do disagree with parts of dbus. dbus has atleast 3 major distinct
functions that I can think of. Running programs as root is one I
completely disagree with and with evidential good reason.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/908332.97162...@smtp144.mail.ir2.yahoo.com



Re: Proposal: switch default desktop to xfce

2013-10-28 Thread Kevin Chadwick
  you need something with big buttons
 that is finger-friendly, 

I'm surprised how much accuracy a capacitive multitouch mobile has when
in touchscreen terms it is actually extremely poor (3-4mm) exacerbated
by them not responding to nails (conductive), a trade-off for size and
multitouch. Many have much better accuracy (infra-red, resistive) and
certainly will have multitouch too in the future. Websites having big
buttons represented by tiny ones visually on Android is certainly true
due to this.

 My conclusion is that the right UI to choose is quite machine-specific
 and also user-specific.

The 10 touch Baanto has very good accuracy (  mm) and is an example of
an external infra-red that actually doesn't work with Linux due to an
indirectly related bug last time I checked even though it is alleged to
by Baanto.

Some accurate single touch resistive touches also work as a standard
mouse though they require detection and the movement being inverted,
but it would be a very simple driver. The supplier had died but it
seems to have been revived recently.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/106418.70388...@smtp117.mail.ir2.yahoo.com



Re: Proposal: switch default desktop to xfce

2013-10-28 Thread Kevin Chadwick
  OK. I suggest that we *try* that for now.  
 
 If we try, what will be the criteria for assessing whether the
 experiment has been successful (and hence worth keeping for Jessie) or a
 failure (and hence reverting it)?

I think it should be considered that there has been much improvement
upto 4.10 and 4.11 even has some useful multi desktop improvements
(above and below) so it would be better if 4.10 or higher was the
assessed version.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/390320.67774...@smtp127.mail.ir2.yahoo.com



Re: let's split the systemd binary package

2013-10-28 Thread Kevin Chadwick
   E.g. XFCE either wants ConsoleKit, or logind. If you look at ConsoleKit,
   you'll notice it is NOT maintained.  
  
  XFCE *needs* neither and in fact the vast vast majority of users do
  not either.  
 
 I check the spec files for Fedora, Mageia, openSUSE. They all seem to
 require logind. For Arch, seems as well, but not sure (difficult to
 verify). For Debian it is a recommends.
 

So all the systemd using Distro's!

How about Gentoo, Slackware, LFS and many many others?

 Needs neither seems to be true based on the recommends, but vast
 majority seems incorrect. I do wonder what breaks though :P

By vast majority I was meaning user requirements and not distro
packagers expectations, user requirements is actually the metric which
should count the most and most users do not need session tracking, it
can actually get in the way (one user using many logins, shutdown, usb
access etc.).

User requirements are normally automatically reflected by unix
developers but RedHats enterprise requirements and extensive dev time
have the potential to swing that even if they rectify it from time to
time.


p.s. Whoever decided to use non unique names in gdm over unique
usernames for user selection must have had a strange thought process
going on.

-- 
___

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
___


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/583301.3469...@smtp126.mail.ir2.yahoo.com



  1   2   >