Bug#1072516: "command -v" prints to the terminal

2024-06-03 Thread Marco d'Itri
Package: mailcap
Version: 3.71gg
Severity: important
X-Debbugs-Cc: jcris...@debian.org, anto...@debian.org
Control: affects -1 mutt

After upgrading mailcap, when opening a message with mutt I see strings 
like "/usr/bin/vim" and "/usr/bin/evince" printed in random places.
Looks like it is caused by this change:

  79285fc update-mime: convert .desktop file's TryExec to a
  test= field for the mailcap entry (Closes: #964173)

On a more general note, I am not sure that it is a good idea to 
automatically add entries for text/plain since they cause a useless 
shell exec in mutt every time a message is opened (maybe the mutt 
maintainer can add some insight?).

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.8.11-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=it_IT.utf8, LC_CTYPE=it_IT.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages mailcap depends on:
ii  media-types  10.1.0
ii  perl 5.38.2-5

Versions of packages mailcap recommends:
ii  bzip2 1.0.8-5.1
ii  file  1:5.45-3
ii  xz-utils  5.6.1+really5.4.5-1

mailcap suggests no packages.

-- Configuration Files:
/etc/mailcap.order changed [not included]

-- no debconf information

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1072035: bookworm-pu: package dns-root-data/2024041801

2024-05-31 Thread Marco d'Itri
On May 30, Emilio Pozuelo Monfort  wrote:

> This looks reasonable to me. Should a similar update be proposed for bullseye?
Yes, uploaded.

diff --git a/debian/changelog b/debian/changelog
index 97fdbf8..98e603c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,28 @@
+dns-root-data (2024041801) unstable; urgency=medium
+
+  * Add myself to the Uploaders field, as discussed with Ondřej.
+  * Fix the package description. (Closes: #1064829)
+  * Update the expired Verisign GRS PGP key.
+  * Update the root hints file to version 2024041801, with:
++ updated A and  records for B. (Closes: #1054393)
+
+ -- Marco d'Itri   Tue, 21 May 2024 16:25:44 +0200
+
+dns-root-data (2023010101) unstable; urgency=medium
+
+  * merge current root hints and signatures (same contents as before)
+  * d/copyright: bump to 2023
+
+ -- Daniel Kahn Gillmor   Wed, 11 Jan 2023 10:00:11 
-0500
+
+dns-root-data (2022120101) unstable; urgency=medium
+
+  * Updated upstream root data (same contents as before)
+  * d/copyright: update for 2022
+  * Standards-Version: bump to 4.6.1 (no changes needed)
+
+ -- Daniel Kahn Gillmor   Tue, 20 Dec 2022 18:51:44 
-0500
+
 dns-root-data (2021011101) unstable; urgency=medium
 
   * updated upstream root data (same contents as before)
diff --git a/debian/control b/debian/control
index ac3736a..cd14d8a 100644
--- a/debian/control
+++ b/debian/control
@@ -4,6 +4,7 @@ Priority: optional
 Maintainer: dns-root-data packagers 
 Uploaders:
  Daniel Kahn Gillmor ,
+ Marco d'Itri ,
  Ondřej Surý ,
  Robert Edmonds ,
 Build-Depends:
@@ -13,7 +14,7 @@ Build-Depends:
  openssl,
  unbound-anchor,
  xml2,
-Standards-Version: 4.5.1
+Standards-Version: 4.7.0.0
 Homepage: https://data.iana.org/root-anchors/
 Vcs-Git: https://salsa.debian.org/dns-team/dns-root-data.git
 Vcs-Browser: https://salsa.debian.org/dns-team/dns-root-data
@@ -24,7 +25,7 @@ Architecture: all
 Multi-Arch: foreign
 Depends:
  ${misc:Depends},
-Description: DNS root data including root zone and DNSSEC key
+Description: DNS root hints and DNSSEC trust anchor
  This package contains various root zone related data as published
  by IANA to be used by various DNS software as a common source
  of DNS root zone data, namely:
diff --git a/debian/copyright b/debian/copyright
index 83463f6..d389c35 100644
--- a/debian/copyright
+++ b/debian/copyright
@@ -3,7 +3,7 @@ Upstream-Name: IANA Root Zone Management
 Source: https://www.iana.org/domains/root/files
 
 Files: *
-Copyright: Copyright (c) 2010-2018 Internet Corporation For Assigned Names and 
Numbers
+Copyright: Copyright (c) 2010-2023 Internet Corporation For Assigned Names and 
Numbers
 License: ICANN-Public
  ICANN asserts no property rights to any of the IANA registries or
  public keys we maintain. You are free to redistribute the IANA
@@ -14,7 +14,7 @@ License: ICANN-Public
 
 Files: debian/*
 Copyright: 2014 Ondřej Surý ,
- 2018 Daniel Kahn Gillmor 
+ 2018-2023 Daniel Kahn Gillmor 
 License: Expat
 
 License: Expat
diff --git a/registry-admin.key b/registry-admin.key
index 9c0fb78..22f087a 100644
Binary files a/registry-admin.key and b/registry-admin.key differ
diff --git a/root-anchors.p7s b/root-anchors.p7s
index ff40c7a..fc6cd07 100644
Binary files a/root-anchors.p7s and b/root-anchors.p7s differ
diff --git a/root.hints b/root.hints
index 6d39aad..f0a0934 100644
--- a/root.hints
+++ b/root.hints
@@ -8,9 +8,9 @@
 ;   file/domain/named.cache 
 ;   on server   FTP.INTERNIC.NET
 ;   -OR-RS.INTERNIC.NET
-; 
-;   last update: January 11, 2021 
-;   related version of root zone: 2021011101
+;
+;   last update: April 18, 2024
+;   related version of root zone: 2024041801
 ; 
 ; FORMERLY NS.INTERNIC.NET 
 ;
@@ -21,8 +21,8 @@ A.ROOT-SERVERS.NET.  360    
2001:503:ba3e::2:30
 ; FORMERLY NS1.ISI.EDU 
 ;
 .360  NSB.ROOT-SERVERS.NET.
-B.ROOT-SERVERS.NET.  360  A 199.9.14.201
-B.ROOT-SERVERS.NET.  360    2001:500:200::b
+B.ROOT-SERVERS.NET.  360  A 170.247.170.2
+B.ROOT-SERVERS.NET.  360    2801:1b8:10::b
 ; 
 ; FORMERLY C.PSI.NET 
 ;
diff --git a/root.hints.sig b/root.hints.sig
index 389c1ac..630ff8a 100644
Binary files a/root.hints.sig and b/root.hints.sig differ

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1072035: bookworm-pu: package dns-root-data/2024041801

2024-05-30 Thread Marco d'Itri
On May 27, Jonas Meier  wrote:

>   [ ] attach debdiff against the package in (old)stable

diff -Nru dns-root-data-2023010101/debian/changelog 
dns-root-data-2024041801~deb12u1/debian/changelog
--- dns-root-data-2023010101/debian/changelog   2023-01-11 16:00:11.0 
+0100
+++ dns-root-data-2024041801~deb12u1/debian/changelog   2024-05-30 
14:02:49.0 +0200
@@ -1,3 +1,19 @@
+dns-root-data (2024041801~deb12u1) bookworm; urgency=medium
+
+  * Rebuild for bookworm. (Closes: #1072035)
+
+ -- Marco d'Itri   Thu, 30 May 2024 14:02:49 +0200
+
+dns-root-data (2024041801) unstable; urgency=medium
+
+  * Add myself to the Uploaders field, as discussed with Ondřej.
+  * Fix the package description. (Closes: #1064829)
+  * Update the expired Verisign GRS PGP key.
+  * Update the root hints file to version 2024041801, with:
++ updated A and  records for B. (Closes: #1054393)
+
+ -- Marco d'Itri   Tue, 21 May 2024 16:25:44 +0200
+
 dns-root-data (2023010101) unstable; urgency=medium
 
   * merge current root hints and signatures (same contents as before)
diff -Nru dns-root-data-2023010101/debian/control 
dns-root-data-2024041801~deb12u1/debian/control
--- dns-root-data-2023010101/debian/control 2022-12-21 00:52:11.0 
+0100
+++ dns-root-data-2024041801~deb12u1/debian/control 2024-05-21 
16:25:42.0 +0200
@@ -4,6 +4,7 @@
 Maintainer: dns-root-data packagers 
 Uploaders:
  Daniel Kahn Gillmor ,
+ Marco d'Itri ,
  Ondřej Surý ,
  Robert Edmonds ,
 Build-Depends:
@@ -13,7 +14,7 @@
  openssl,
  unbound-anchor,
  xml2,
-Standards-Version: 4.6.1
+Standards-Version: 4.7.0.0
 Homepage: https://data.iana.org/root-anchors/
 Vcs-Git: https://salsa.debian.org/dns-team/dns-root-data.git
 Vcs-Browser: https://salsa.debian.org/dns-team/dns-root-data
@@ -24,7 +25,7 @@
 Multi-Arch: foreign
 Depends:
  ${misc:Depends},
-Description: DNS root data including root zone and DNSSEC key
+Description: DNS root hints and DNSSEC trust anchor
  This package contains various root zone related data as published
  by IANA to be used by various DNS software as a common source
  of DNS root zone data, namely:
Binary files /tmp/osYYJAlpQA/dns-root-data-2023010101/registry-admin.key and 
/tmp/1ohQbBsBE0/dns-root-data-2024041801~deb12u1/registry-admin.key differ
diff -Nru dns-root-data-2023010101/root.hints 
dns-root-data-2024041801~deb12u1/root.hints
--- dns-root-data-2023010101/root.hints 2023-01-11 08:22:00.0 +0100
+++ dns-root-data-2024041801~deb12u1/root.hints 2024-05-21 16:25:42.0 
+0200
@@ -9,8 +9,8 @@
 ;   on server   FTP.INTERNIC.NET
 ;   -OR-RS.INTERNIC.NET
 ;
-;   last update: January 01, 2023
-;   related version of root zone: 2023010101
+;   last update: April 18, 2024
+;   related version of root zone: 2024041801
 ; 
 ; FORMERLY NS.INTERNIC.NET 
 ;
@@ -21,8 +21,8 @@
 ; FORMERLY NS1.ISI.EDU 
 ;
 .360  NSB.ROOT-SERVERS.NET.
-B.ROOT-SERVERS.NET.  360  A 199.9.14.201
-B.ROOT-SERVERS.NET.  360    2001:500:200::b
+B.ROOT-SERVERS.NET.  360  A 170.247.170.2
+B.ROOT-SERVERS.NET.  360    2801:1b8:10::b
 ; 
 ; FORMERLY C.PSI.NET 
 ;
Binary files /tmp/osYYJAlpQA/dns-root-data-2023010101/root.hints.sig and 
/tmp/1ohQbBsBE0/dns-root-data-2024041801~deb12u1/root.hints.sig differ

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#966621: Make /tmp/ a tmpfs and cleanup /var/tmp/ on a timer by default [was: Re: systemd: tmpfiles.d not cleaning /var/tmp by default]

2024-05-28 Thread Marco d'Itri
On May 28, Andreas Metzler  wrote:

> I think it is bad choice to deliberately have different behavior for
> freshly installed and upgraded systems. Offering upgrades has always
> been one of the major selling points of Debian, and imho this
> implicitely includes that you do not get a worse or second class Debian
> installation when you upgrade it than if you installed from scratch.
I strongly disagree: it is a bad choice to change on upgrades a default 
which may cause data loss.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1033012:

2024-05-05 Thread Marco d'Itri
On Jan 12, Yangfl  wrote:

> Please kindly check 2.3.4-1 to see if that fixed your problem.
It does not. The problem is that TasksMax in miniupnpd.service is set 
too low. Set it to something like 10, because it makes no sense to count 
every single process and it is hard anyway when spawning shell scripts.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1070472: Uses the obsolete /sbin/route without a dependency

2024-05-05 Thread Marco d'Itri
Package: miniupnpd
Version: 2.3.1-1
Severity: serious
Tags: patch

Pseudo-patch for miniupnpd.config:

-   MiniUPnPd_EXTERNAL_INTERFACE=$(LC_ALL=C /sbin/route | grep -m 1 default 
| awk -- '{ print $8 }')
+   MiniUPnPd_EXTERNAL_INTERFACE=$(LC_ALL=C ip -o route show | sed -nre 
'/^default /s/^default .*dev ([^ ]+).*/\1/p')

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1036908: expect: Broken use of \c in man page

2024-05-03 Thread Marco d'Itri
On May 29, Helge Kreutzmann  wrote:

> The usage of \c is in mkpasswd(1) is incorrect. It fails when trying
> to use po4a to provide translations of the man pages. Im currently
> "patching around this" in manpages-l10n.
> 
> For a full explanation of the problem (the man page is different, but
> the problem is the same) see Debian #1036826 and the explanations by
I have read #1036826 and tested multiple proposed solutions but I could 
not managed to reproduce the original output.
Are you able to propose a patch which does not change the generated man 
page?

> Bjarni, especially in message #25.
That solution has been rejected by Branden.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1060134: kmod-udeb vs busybox-udeb: agree on who ships depmod

2024-04-26 Thread Marco d'Itri
On Apr 26, Michael Tokarev  wrote:

> So, should I disable module utils in busybox-udeb now?
I think so.

> Is kmod udeb ready and used in d-i already, or does it need some
> prep first?
AFAIK it works.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1060134: kmod-udeb vs busybox-udeb: agree on who ships depmod

2024-04-09 Thread Marco d'Itri
On Jan 06, Michael Tokarev  wrote:

> Yes, some utils in busybox aren't as good as regular implementations. For
Yes. Nowadays kmod has many more features related to compressed modules 
and verification of signatures.
Can we agree that kmod should provide these programs for d-i?
Or can the d-i maintainers just tell us what they want?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1056156: varnish: CVE-2023-44487: VSV00013 Varnish HTTP/2 Rapid Reset Attack

2024-04-04 Thread Marco d'Itri
On Apr 04, Salvatore Bonaccorso  wrote:

> While I do agree (and it was filled with this severity), the bug
> severity would not be RC, varnish currently seem to lack active
> maintainership. 
Not anymore: https://salsa.debian.org/md/varnish/ .

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#782691: varnishncsa sometimes does not start after reboot

2024-04-03 Thread Marco d'Itri
On Apr 16, Oskar Liljeblad  wrote:

> varnishncsa sometimes does not start after reboot.
> I suspect varnishncsa fails because it cannot contact varnish, which has not 
> started completely yet.
This bug is 9 years old: can you still reproduce it?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1068311: tcp-wrappers: Can anything be done to avoid the libnsl dependency?

2024-04-03 Thread Marco d'Itri
On Apr 03, Colin Watson  wrote:

> I wondered if anything could be done to avoid this or refactor it
> somehow?
Sure: I think that it makes sense to just disable NETGROUP (which is
the conditional for yp_get_default_domain), because I do not think that 
anybody in 2024 still uses NIS and if they do then we are only doing 
them a favour by disabling netgroups support here.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1056156: varnish: CVE-2023-44487: VSV00013 Varnish HTTP/2 Rapid Reset Attack

2024-04-01 Thread Marco d'Itri
Control: found -1 5.0.0-1
Control: fixed -1 7.4.2

On Nov 17, Salvatore Bonaccorso  wrote:

> CVE-2023-44487[0]:
> | The HTTP/2 protocol allows a denial of service (server resource
> | consumption) because request cancellation can reset many streams
> | quickly, as exploited in the wild in August through October 2023.
Fixing this issue would require backporting a significant amount of 
new features in varnish and I do not believe that it would be practical.

I am inclined to downgrade this bug because:
- this is just a DoS attack
- it only concerns people using hitch for TLS termination instead of 
  a full web server like nginx or haproxy

nginx in stable is also vulnerable, BTW.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1068184: RM: gup -- ROM; popcon 0

2024-04-01 Thread Marco d'Itri
Package: ftp.debian.org
Severity: normal
X-Debbugs-Cc: g...@packages.debian.org
Control: affects -1 + src:gup
User: ftp.debian@packages.debian.org
Usertags: remove

As much as I like retrocomputing, let's not waste space in the archive.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1067932: usrmerge is dangerous : lost bash and other commands

2024-03-29 Thread Marco d'Itri
On Mar 29, Denis Migdal  wrote:

> Maybe I was better off reinstalling, indeed, but I prefer to properly
> plan/prepare for it.
This is why the conversion procedure stopped.
Then you started thinkering with your system to "fix" it and did worse.

> It'd help me if, at least, usrmerge printed the number of duplicates and sym
> links. Maybe with a more explicit error message, indicating what to do, "we
> strongly advise to reinstall your system", "remove duplicates, but be
> careful of symlinks", or whatever.
This does not happen frequently enough (only you reported this) to 
justify investing development resources.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1041552: HFS/HFS+ are insecure

2024-03-14 Thread Marco d'Itri
On Mar 13, Michael Biebl  wrote:

> > So I propose this content for a file like
> > /usr/lib/udev/rules.d/75-insecure-fs.rules:
> Just curious: Why did you pick priority 75?
I can't remember.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1064798: kmod: installs same filename to both bin and sbin

2024-03-09 Thread Marco d'Itri
On Mar 09, ca...@allfreemail.net wrote:

> I believe the fix is incomplete, because both /usr/bin/lsmod and
> /usr/sbin/lsmod are still being created.
Actually it has been this way at least since Debian 7.
I will not break compatibility for no good reason.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1061516: Please add a sshd@.service template for socket activation

2024-03-05 Thread Marco d'Itri
On Mar 04, Colin Watson  wrote:

> Does this patch look workable?  It mostly just resurrects the template
> unit we used to ship, under a different name.
Looks good to me!

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1065192: RM: gortr -- ROM; abandoned by upstream

2024-03-01 Thread Marco d'Itri
Package: ftp.debian.org
Severity: normal
X-Debbugs-Cc: go...@packages.debian.org
Control: affects -1 + src:gortr
User: ftp.debian@packages.debian.org
Usertags: remove

Development of cfrpki and gortr has been discontinued by the upstream 
maintainers, so there is no reason to keep them in Debian.

Users can migrate to rpki-client and stayrtr as suggested by upstream.

Another bug has been filed for removal of cfrpki.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1065191: RM: cfrpki -- ROM; abandoned by upstream

2024-03-01 Thread Marco d'Itri
Package: ftp.debian.org
Severity: normal
X-Debbugs-Cc: cfr...@packages.debian.org
Control: affects -1 + src:cfrpki
User: ftp.debian@packages.debian.org
Usertags: remove

Development of cfrpki and gortr has been discontinued by the upstream 
maintainers, so there is no reason to keep them in Debian.

Users can migrate to rpki-client and stayrtr as suggested by upstream.

Another bug has been filed for removal of gortr.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1061516: Please add a sshd@.service template for socket activation

2024-02-27 Thread Marco d'Itri
On Jan 25, Marco d'Itri  wrote:

> systemd currently expects the template to be named sshd@.service 
> (because that is what Fedora uses), but if you prefer to keep the 
> ssh@.service name then I suppose that we could patch systemd as well.
Is there any way I can help with this?
The major issue is deciding how you want the template to be called.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1064798: kmod: installs same filename to both bin and sbin

2024-02-25 Thread Marco d'Itri
On Feb 26, ca...@allfreemail.net wrote:

> This causes a problem on a filesystem layout where bin and sbin are 
> merged into a single real directory, typically by sbin being a symlink 
> to bin. Such a filesystem layout has become standard on some 
> distributions now, and others are moving onto in their next releases.
This is not supported by Debian and we have no such plans.
But obviously it is still a bug, and I will fix in whenever I will do 
a new upload.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1063804: FTBFS: depmod: FATAL: could not search modules: No such file or directory

2024-02-12 Thread Marco d'Itri
On Feb 12, Salvatore Bonaccorso  wrote:

> --with-module-directory=/usr/lib/modules
> 
> Looping in Marco for comments.
I can revert it if it causes too much trouble, but maybe this is just 
the right time to switch the kernel packages to /usr/lib/modules/ as well?
Please let me know if I am missing anything...

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1063476: the sanesecurity configuration is not suitable for a release

2024-02-08 Thread Marco d'Itri
Source: fangfrisch
Version: 1.7.0-1
Severity: grave
Tags: upstream

Control: forwarded -1 https://github.com/rseichter/fangfrisch/issues/30

The sanesecurity section of default configuration, if enabled, relies on 
an unofficial HTTP mirror which is seriously overloaded and probably 
seriously expensive for their operators, since it is located in 
Australia.
The only other known HTTP mirror is mentioned on 
https://wiki.gentoo.org/wiki/ClamAV_Unofficial_Signatures, with a vague 
note about it being available to the public.

Until fangfrisch will implement rsync support, I do not think that it is 
safe to include fangfrisch in a Debian release due to the possible 
effect on unsuspecting third party mirrors.

This has also been discussed upstream:
https://github.com/rseichter/fangfrisch/issues/30

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1061516: Please add a sshd@.service template for socket activation

2024-01-25 Thread Marco d'Itri
Package: openssh-server
Version: 1:9.6p1-3
Severity: normal
Control: affects -1 systemd

The next release of systemd will contain support to connect to the 
system with SSH over an AF_VSOCK socket:
https://github.com/systemd/systemd/pull/30777/files

The server side of this uses what Ubuntu currently ships as 
ssh@.service, i.e. a template for socket activation of per-connection 
sshd daemons.

systemd currently expects the template to be named sshd@.service 
(because that is what Fedora uses), but if you prefer to keep the 
ssh@.service name then I suppose that we could patch systemd as well.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1054393: dns-root-data: New IPs for b.root-servers-net 2023-11-27

2024-01-22 Thread Marco d'Itri
This is annoying and needs to be fixed in stable too.
Do you want me to make a NMU?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1061178: usrmerge: Usrmerge fails with a staticly-linked cp command

2024-01-20 Thread Marco d'Itri
On Jan 20, Ajax Dong  wrote:

> Days ago I upgraded one of my machines (I use sudo machinectl shell
> network-service to get its shell) from Debian Buster to Debian Bookworm.
> The cp and mv command on that machine was staticly-linked and
> self-contained. (It does not require any shared library.) UseMerge
This does not look like any Debian system I know.

> Because /bin/cp is staticly linked, ldd exited with error, $fh is not
Not on any of the Debian 10, 11 and 12 systems that I checked:

md:~$ ldd /sbin/ldconfig
statically linked
md:~$

And this ldd output does not cause early_conversion_files() to fail.
What's up then?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1041552: HFS/HFS+ are insecure

2024-01-10 Thread Marco d'Itri
On Jan 10, Michael Biebl  wrote:

> While we could ship such a udev rule for udisks, I don't think it will
> properly solve the issue. The device will still show up in nautilus, plasma
> etc and mounting is just an additional click away.
The threat model here is: somebody connects a crafted USB stick to 
a computer with a locked screen.

Also, the listed file systems are not used or not used anymore on 
removable devices.
Certainly not on removable devices used by regular users.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1060002: usrmerge: support working with a moved coreutils and policycoreutils

2024-01-04 Thread Marco d'Itri
On Jan 04, Helmut Grohne  wrote:

> the way usrmerge works now prevents us from moving /bin/cp and
> /sbin/restorecon to /usr for DEP17. I'm attaching a patch that makes
> both of them movable and thus decouples their move from when base-files
> switches. Do you have any objections?
Please just describe in detail why these changes will be needed.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1059920: DEP17: move all kmod files to /usr

2024-01-03 Thread Marco d'Itri
On Jan 03, Helmut Grohne  wrote:

> We want to finalize the /usr-merge transition via DEP17 by moving all
> the files to /usr. kmod is involved now, because it is installed by
> debootstrap. Hence, I'm sending you a patch for the move. I don't think
> this is going to cause any flags from dumat, but the patch is
> non-trivial nonetheless, so I recommend doing an experimental upload in
> order to have other QA systems and volunteer testers try it. I also note
I like to keep unstable unstable...
But what about d-i? Is it merged now?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1059841: DDPO: backports-new show in the wrong column

2024-01-02 Thread Marco d'Itri
Package: qa.debian.org
Severity: normal

I have uploaded fort-validator 1.6.1-1~bpo12+2 to bookworm-backports, 
but it is shown in the testing/unstable column instead of in the stable 
one.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1059768: CapabilityBoundingSet breaks fileOwner/fileGroup

2023-12-31 Thread Marco d'Itri
Package: rsyslog
Version: 8.2310.0-1
Severity: normal
Tags: upstream

forwarded -1 https://github.com/rsyslog/rsyslog/pull/5223
affects -1 inn inn2

CapabilityBoundingSet in /usr/lib/systemd/system/rsyslog.service lacks 
CAP_DAC_OVERRIDE, which is needed to make fileOwner/fileGroup work.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1059745: ITP: cryptsetup-2fa -- 2FA plugin for cryptsetup

2023-12-31 Thread Marco d'Itri
On Dec 31, YunQiang Su  wrote:

>   Upstream Contact: YunQiang Su 
> * URL : https://github.com/wzssyqa/cryptsetup-2fa/
What are the benefits of this compared to systemd-cryptenroll?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1058761: cheese segfaulted

2023-12-15 Thread Marco d'Itri
Package: cheese
Version: 44.1-1
Severity: normal
Tags: upstream

I do not remember exactly what I did to cause this.

#0  0x7f5d4cf46c83 in find_root (node=0xdd74dc3c3606beee)
at ../../../glib/gsequence.c:1615
Download failed: Invalid argument.  Continuing without source file 
./debian/build/deb/../../../glib/gsequence.c.
1615../../../glib/gsequence.c: No such file or directory.
[Current thread is 1 (Thread 0x7f5d4ad32ac0 (LWP 1474281))]
(gdb) where
#0  0x7f5d4cf46c83 in find_root (node=0xdd74dc3c3606beee)
at ../../../glib/gsequence.c:1615
#1  node_get_last (node=) at ../../../glib/gsequence.c:1682
#2  get_sequence (node=) at ../../../glib/gsequence.c:187
#3  g_sequence_iter_get_sequence (iter=)
at ../../../glib/gsequence.c:1193
#4  0x7f5d4d3f783f in iter_is_valid
(iter=iter@entry=0x7ffe4e42cba0, list_store=0x56334ae4f9c0 [GtkListStore])
at ../../../gtk/gtkliststore.c:398
#5  0x7f5d4d3f7fb0 in gtk_list_store_get_value
(tree_model=, iter=0x7ffe4e42cba0, column=1, 
value=0x7ffe4e42c9f0) at ../../../gtk/gtkliststore.c:678
#6  0x7f5d4d51153e in gtk_tree_model_get_valist
(tree_model=tree_model@entry=0x56334ae4f9c0, 
iter=iter@entry=0x7ffe4e42cba0, var_args=var_args@entry=0x7ffe4e42caa0) at 
../../../gtk/gtktreemodel.c:1810
#7  0x7f5d4d5118e1 in gtk_tree_model_get
(tree_model=0x56334ae4f9c0, iter=iter@entry=0x7ffe4e42cba0)
at ../../../gtk/gtktreemodel.c:1774
#8  0x563349f78184 in ___lambda6_
(device=0x56334ac7b020 [CheeseCameraDevice], _data2_=0x56334acd21f0)
at src/cheese.p/cheese-preferences.c:1050
#9  lambda6__gfunc (data=0x56334ac7b020, self=0x56334acd21f0)
at src/cheese.p/cheese-preferences.c:1075
#10 0x7f5d4cef0cda in g_ptr_array_foreach
--Type  for more, q to quit, c to continue without paging--c
(array=array@entry=0x56334a65b000, func=func@entry=0x563349f78110 
, user_data=user_data@entry=0x56334acd21f0)
at ../../../glib/garray.c:2690
#11 0x563349f78428 in 
cheese_preferences_dialog_on_camera_update_num_camera_devices 
(self=0x56334addf500 [CheesePreferencesDialog])
at src/cheese.p/cheese-preferences.c:1145
#12 
_cheese_preferences_dialog_on_camera_update_num_camera_devices_g_object_notify 
(_sender=, pspec=, self=0x56334addf500)
at src/cheese.p/cheese-preferences.c:217
#17 0x7f5d4da40243 in 
(instance=instance@entry=0x56334ac146b0, signal_id=, 
detail=) at ../../../gobject/gsignal.c:3675
#13 0x7f5d4da25540 in g_closure_invoke
(closure=0x56334add9290, return_value=0x0, n_param_values=2, 
param_values=0x7ffe4e42cf10, invocation_hint=0x7ffe4e42ce60)
at ../../../gobject/gclosure.c:832
#14 0x7f5d4da38afc in signal_emit_unlocked_R
(node=node@entry=0x7ffe4e42cfe0, detail=detail@entry=4464, 
instance=instance@entry=0x56334ac146b0, 
emission_return=emission_return@entry=0x0, 
instance_and_params=instance_and_params@entry=0x7ffe4e42cf10)
at ../../../gobject/gsignal.c:3980
#15 0x7f5d4da3a501 in signal_emit_valist_unlocked
(instance=instance@entry=0x56334ac146b0, signal_id=signal_id@entry=1, 
detail=detail@entry=4464, var_args=var_args@entry=0x7ffe4e42d140)
at ../../../gobject/gsignal.c:3612
#16 0x7f5d4da40186 in g_signal_emit_valist
(instance=0x56334ac146b0, signal_id=1, detail=4464, 
var_args=0x7ffe4e42d140) at ../../../gobject/gsignal.c:3355
#18 0x7f5d4da29734 in g_object_dispatch_properties_changed
(object=0x56334ac146b0 [CheeseCamera], n_pspecs=, 
pspecs=) at ../../../gobject/gobject.c:1427
#19 0x7f5d4da2c790 in g_object_notify_by_spec_internal
(pspec=, object=0x56334ac146b0 [CheeseCamera])
at ../../../gobject/gobject.c:1551
#20 g_object_notify_by_pspec
(object=0x56334ac146b0 [CheeseCamera], pspec=)
at ../../../gobject/gobject.c:1657
#25 0x7f5d4da40243 in 
(instance=instance@entry=0x56334a9ebc30, signal_id=, 
detail=detail@entry=0) at ../../../gobject/gsignal.c:3675
#21 0x7f5d4da25540 in g_closure_invoke
(closure=0x56334ac2b510, return_value=0x0, n_param_values=2, 
param_values=0x7ffe4e42d450, invocation_hint=0x7ffe4e42d3a0)
at ../../../gobject/gclosure.c:832
#22 0x7f5d4da38afc in signal_emit_unlocked_R
(node=node@entry=0x7ffe4e42d520, detail=detail@entry=0, 
instance=instance@entry=0x56334a9ebc30, 
emission_return=emission_return@entry=0x0, 
instance_and_params=instance_and_params@entry=0x7ffe4e42d450) at 
../../../gobject/gsignal.c:3980
#23 0x7f5d4da3a501 in signal_emit_valist_unlocked
(instance=instance@entry=0x56334a9ebc30, signal_id=signal_id@entry=384, 
detail=detail@entry=0, var_args=var_args@entry=0x7ffe4e42d680)
at ../../../gobject/gsignal.c:3612
#24 0x7f5d4da40186 in g_signal_emit_valist
(instance=0x56334a9ebc30, signal_id=384, detail=0, var_args=0x7ffe4e42d680)
at ../../../gobject/gsignal.c:3355
#26 0x7f5d4dbe9c6a in cheese_camera_device_monitor_removed
(device=, monitor=0x56334a9ebc30 

Bug#1058760: assertion failed in isc_signal_stop()

2023-12-15 Thread Marco d'Itri
Package: bind9-host
Version: 1:9.19.17-1
Severity: normal
Tags: upstream

This happened after I pressed ^C:

#0  __pthread_kill_implementation (threadid=, 
signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
Download failed: Invalid argument.  Continuing without source file 
./nptl/./nptl/pthread_kill.c.
44  ./nptl/pthread_kill.c: No such file or directory.
[Current thread is 1 (Thread 0x7f04feaf0480 (LWP 1416976))]
(gdb) where
#0  __pthread_kill_implementation (threadid=, 
signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
#1  0x7f04ffaa815f in __pthread_kill_internal (signo=6, 
threadid=) at ./nptl/pthread_kill.c:78
#2  0x7f04ffa5a472 in __GI_raise (sig=sig@entry=6)
at ../sysdeps/posix/raise.c:26
#3  0x7f04ffa444b2 in __GI_abort () at ./stdlib/abort.c:79
#4  0x7f04fffc9355 in isc_assertion_failed (
file=file@entry=0x7f058129 "signal.c", line=line@entry=78, 
type=type@entry=isc_assertiontype_require, 
cond=cond@entry=0x7f051480 "((signal) != ((void *)0) && ((const 
isc__magic_t *)(signal))->magic == ((('S') << 24 | ('I') << 16 | ('G') << 8 | 
(' '") at ./lib/isc/assertions.c:49
#5  0x7f04fffe8521 in isc_signal_stop (signal=)
at ./lib/isc/signal.c:78
#6  0x7f04fffdd89e in isc_loopmgr_blocking (loopmgr=0x7f04fc208600)
at ./lib/isc/loop.c:587
#7  0x5624a7a1b056 in get_address (host=0x7f04fc272a00 "127.0.0.1", 
myport=53, sockaddr=0x7f04fc29f7d8) at ./bin/dig/dighost.c:4521
#8  0x5624a7a1d31d in start_udp (query=)
at ./bin/dig/dighost.c:3263
#9  0x5624a7a1e8ef in clear_current_lookup () at ./bin/dig/dighost.c:1820
#10 0x5624a7a2028a in recv_done (handle=0x7f04fc29fa80, 
eresult=, region=0x7fffab553870, arg=0x7f04fc29f700)
--Type  for more, q to quit, c to continue without paging--c
at ./bin/dig/dighost.c:3915
#11 0x7f04fffbadfc in isc___nm_readcb (arg=)
at netmgr/netmgr.c:1783
#12 isc__nm_readcb (sock=sock@entry=0x7f04fc274800, uvreq=, 
eresult=eresult@entry=ISC_R_SHUTTINGDOWN, async=async@entry=false)
at netmgr/netmgr.c:1798
#13 0x7f04fffc8146 in isc__nm_udp_failed_read_cb (sock=0x7f04fc274800, 
result=ISC_R_SHUTTINGDOWN, async=false) at netmgr/udp.c:865
#14 0x7f04ffef767b in uv_walk (loop=loop@entry=0x7f04fc272020, 
walk_cb=walk_cb@entry=0x7f04fffb8b10 , arg=arg@entry=0x0)
at ./src/uv-common.c:549
#15 0x7f04fffbb758 in networker_teardown (arg=0x7f04fc20f2f0)
at netmgr/netmgr.c:140
#16 0x7f04fffc96a7 in isc__async_cb (handle=)
at ./lib/isc/async.c:111
#17 0x7f04ffef8633 in uv__async_io (loop=0x7f04fc272020, 
w=, events=) at ./src/unix/async.c:176
#18 0x7f04fff0c065 in uv__io_poll (loop=loop@entry=0x7f04fc272020, 
timeout=) at ./src/unix/linux.c:1476
#19 0x7f04ffef92f8 in uv_run (loop=loop@entry=0x7f04fc272020, 
mode=mode@entry=UV_RUN_DEFAULT) at ./src/unix/core.c:447
#20 0x7f04fffdbd30 in loop_thread (arg=0x7f04fc272000)
at ./lib/isc/loop.c:282
#21 0x5624a7a14fc8 in main (argc=2, argv=0x7fffab557dd8)
at ./bin/dig/host.c:914
(gdb) 



-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.5.0-4-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=it_IT.utf8, LC_CTYPE=it_IT.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages bind9-host depends on:
ii  bind9-libs  1:9.19.17-1
ii  libc6   2.37-13
ii  libidn2-0   2.3.4-1+b1

bind9-host recommends no packages.

bind9-host suggests no packages.

-- no debconf information

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1057089: bullseye-pu: package usrmerge/37~deb12u1

2023-11-30 Thread Marco d'Itri
On Nov 29, Andreas Beckmann  wrote:

> Improve the usrmerge experience in bookworm.
Great idea, thank you for working on this!

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1056698: should not depend on the Javascript libraries

2023-11-24 Thread Marco d'Itri
Package: restic
Version: 0.16.2-1
Severity: normal

Having a 100% console-based backup program depend on tens of MBs of 
Javascript libraries and fonts just for the HTML manual that almost 
nobody will access there is really wasteful.
Please make these recommends, or else move the HTML to a restic-doc 
package.


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.5.0-4-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=it_IT.utf8, LC_CTYPE=it_IT.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages restic depends on:
ii  libc62.37-12
ii  libjs-jquery 3.6.1+dfsg+~3.5.14-1
ii  libjs-sphinxdoc  7.2.6-2
ii  sphinx-rtd-theme-common  2.0.0~rc3+dfsg-2

Versions of packages restic recommends:
ii  fuse3 [fuse]  3.14.0-4

restic suggests no packages.

-- no debconf information

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#810018: New Essential package procps-base

2023-11-20 Thread Marco d'Itri
On Nov 20, Craig Small  wrote:

> Also why is killall5 not a candidate too?
Probably because it makes no sense outside of sysvinit, except that as 
a footgun.
(Also, is it equivalent to pkill --inverse?)

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#706918: pppd stopped passing ipparam value to /etc/ppp/ip-up after an upgrade to Wheezy

2023-11-04 Thread Marco d'Itri
On May 06, Evgeny Kapun  wrote:

> Package: ppp
> Version: 2.4.5-5.1+b1
> 
> If ipparam option is supplied to pppd, pppd is supposed to pass its 
> argument to scripts like /etc/ppp/ip-up. However, after a system 
> upgrade from Squeeze to Wheezy, this stopped working. Previously, 
> ip-up was invoked like this:
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#736851: ppp: Please ship logcheck rules

2023-11-03 Thread Marco d'Itri
Control: severity -1 wishlist
Control: tag -1 help

On Jan 27, Jonathan Wiltshire  wrote:

> Please ship snippets for consumption by the logcheck package.
Please provide sensible rules.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#514274: Bad ppp frames for certain TCP package lengths

2023-11-03 Thread Marco d'Itri
On Feb 05, Eckhart Wörner  wrote:

> With a UMTS connection to o2 Germany, connections sometimes dropped. Looking 
> into that issue with wireshark, I found out that the 
> connection drops because a TCP package of length 187 + k * 240 bytes (with k 
> in 0,1,...) never makes it to the TCP stack of the 
> receiver (i.e. the computer where PPP is running). This can be reproduced 
> using netcat and a 187 byte file.
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#555477: /usr/sbin/pppd: ppp with persist does not redial after error

2023-11-03 Thread Marco d'Itri
On Nov 09, Alex S Kurilo  wrote:

> ppp does not redial if pppoe server return 'No client slots available' 
> (persist turned on, after other errors it tries to reconnect)
> The following line appears in the syslog before pppd dies:
> > PADS: System-Error: RP-PPPoE: Server: No client slots available
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#650634: pppd eats all cpu in tdb_allocate()

2023-11-03 Thread Marco d'Itri
On Dec 01, onehalf3544  wrote:

> Problem is reproducible (nobody is able to establish connection =(( ).
> I'll continue debugging, but would appreciate any advice.
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#451363: ppp: radius plugin stops talking to radius server

2023-11-03 Thread Marco d'Itri
On Nov 15, B Thompson  wrote:

> I am having problems with the radius plugin supplied with ppp (I am using this
> to authenticate users of my (poptop) pptp vpn. Here are the logs from a failed
> login :-
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#384998: rp-pppoe plugin and MLPPP don't play well together - tiny fragments are sent

2023-11-03 Thread Marco d'Itri
On Aug 28, James Harper  wrote:

> When using the rp-pppoe plugin and pppoe, the fragments used are tiny (8 
> bytes of ppp data), and consequently the link behaves really really poorly. 
> The correct behaviour is that MLPPP fragments should be (packet size) / 
> (number of links), but less than MTU. When using /usr/sbin/pppoe, it works 
> fine.
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#374698: pppd exits despite 'persist' option

2023-11-03 Thread Marco d'Itri
On Jun 20, Claus Fischer  wrote:

> Summary: The persist option does not work properly.
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#203620: ppp: pppstats returns 0 for IN (incoming bytes) after a while

2023-11-03 Thread Marco d'Itri
On Jul 31, Christian Schoenebeck  wrote:

> I encountered that pppstats displays 0 for incoming bytes after a while. Here 
> is an example output of pppstats:
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#325746: pppd 2.4.3 (+pptpd) bug - error count recive and transmit bytes

2023-11-03 Thread Marco d'Itri
On Aug 30, Женя Дрюков  wrote:

> Error count VPN traffic  client disconnect after 10 secconds width only 
> Send bytes 113 Megabytes !!!
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#518624: /usr/sbin/pppd: ppp authentication mschapv2 doesn't work after upgrading winbind to 2:3.2.5-4

2023-11-03 Thread Marco d'Itri
On Mar 07, Sergey Dorofeev  wrote:

> Both upgraded.
> Windows clients also affected.
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#627088: ppp: reconnect after hangup fails with many Protocol-Reject messages

2023-11-03 Thread Marco d'Itri
On May 17, Richard  wrote:

> after upgrading to wheezy a previously functioning PPTP connection has 
> problems. 
> when the connection hangs up and the daemon tries to reconnect, the 
> connection fails
> with the following log messages:
Are you still able to reproduce this issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1034053: segfaulted on quit

2023-10-02 Thread Marco d'Itri
Control: version -1 2.2.12-0.1

Again:

#0  0x7f4fd963a11a in __GI___libc_free (mem=0x54495f7469)
at ./malloc/malloc.c:3344
Download failed: Argomento non valido.  Continuing without source file 
./malloc/./malloc/malloc.c.
3344./malloc/malloc.c: File o directory non esistente.
(gdb) where
#0  0x7f4fd963a11a in __GI___libc_free (mem=0x54495f7469)
at ./malloc/malloc.c:3344
#1  0x55b62120b685 in safe_free (ptr=0x55b622c3c7d0) at ../../lib.c:198
#2  0x55b6211f0bf0 in rfc822_free_address (p=0x55b622ee2da0)
at ../../rfc822.c:140
#3  0x55b62120e9a0 in mutt_free_envelope (p=0x55b622ee2d80)
at ../../muttlib.c:875
#4  0x55b62120edf7 in mutt_free_body (p=0x55b622d46c38)
at ../../muttlib.c:208
#5  0x55b62120ee0c in mutt_free_body (p=0x55b622d46ac8)
at ../../muttlib.c:211
#6  0x55b62120ebba in mutt_free_header (h=0x55b622d66500)
at ../../muttlib.c:382
#7  0x55b6211d70e1 in mx_fastclose_mailbox (ctx=ctx@entry=0x55b621fa95d0)
at ../../mx.c:736
#8  0x55b6211d7bab in mx_close_mailbox (ctx=0x55b621fa95d0, 
index_hint=index_hint@entry=0x7fff63f24274) at ../../mx.c:1014
#9  0x55b6211ac799 in mutt_index_menu () at ../../curs_main.c:1414
#10 0x55b62118c157 in main (argc=1, argv=0x7fff63f25508, 
environ=) at ../../main.c:1400
(gdb) 

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1053156: libmnl is 18 months out of date

2023-09-28 Thread Marco d'Itri
Source: libmnl
Version: 1.0.4-3
Severity: wishlist

1.0.5 was released in April 2022.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#704435: varnish: Pushing vcls failed:#012CLI communication error (hdr)

2023-09-25 Thread Marco d'Itri
On Apr 01, "Rune K. Svendsen"  wrote:

> Apr  1 06:40:17 raspberrypi varnishd[28809]: Pushing vcls failed:#012CLI 
> communication error (hdr)
This bug is 10 years old: can you still reproduce this?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#945269: debian-policy: packages should use tmpfiles.d(5) to create directories below /var

2023-09-17 Thread Marco d'Itri
On Sep 17, Bill Allombert  wrote:

> Does not that would break users expectation that the system image contains 
> /var
> before the first boot ?
I am not aware of such expectations.

> A lot of things in /var are caches that are mostly instance-independent and 
> can
> be prefilled, but for that, users expect a minimal directory hierarchy to be
> present before first boot.
Can you show some examples of how this would work in practice?

> It seems your scheme favors some usecase over some others.
There are always tradeoffs, but my use case does not forbid the other 
one: worst case it requires one more mkdir while copying that data.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#945269: debian-policy: packages should use tmpfiles.d(5) to create directories below /var

2023-09-17 Thread Marco d'Itri
On Sep 17, Russ Allbery  wrote:

> (I am a little confused by this wording, but I think what you're saying is
> that /usr is encrypted and read-only, and /var is recreated on each boot.
> That at least is my understanding of the pattern that you're trying to
> enable.)
The general idea is to be able to create /var on the first boot.
If /var can be populated programmatically then a system can be trivially 
replicated by sharing (or copying) /usr and by copying /etc.

BTW, I do not expect that tmpfiles.d(5) will be the standard method used 
to create most directories below /var.
Usually the CacheDirectory, LogsDirectory and StateDirectory directives 
are more convenient and flexible.

> The benefit we gain from this is attribution of the directories in the
> dpkg database, which is useful (although I understand that one can argue
> about how useful).
Not enough to justify having multiple sources of truth is my opinion.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#885698: What licenses should be included in /usr/share/common-licenses?

2023-09-10 Thread Marco d'Itri
On Sep 10, Enrico Zini  wrote:

> I like this. I'd say that even if a license is shorter than 25 lines I'd
> appreciate to be able to link to it instead of copypasting it.
Me too.

> I like to be able to fill the license field with a value, after checking
> that the upstream license didn't diverge from what it looks like. I'd
> love to use SPDX IDs there, for example. In an ideal world, I'd like to
> autofill debian/copyright with SPDX IDs from upstream metadata. Having a
> link to a file goes closer to having a declarative license ID.
Agreed.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1050901: libc6:amd64: install /usr/lib64 without including it

2023-09-08 Thread Marco d'Itri
> As the issue is actually introduced by the usrmerge package, I am
> reassigning the bug there. I am also tagging it wontfix as I don't
> believe the usrmerge maintainer will want to rollback the usrmerge
> transition, but feel free to change that if I am wrong.
Indeed.

I have used TSM for many years but I have never noticed this issue 
because the upstream Debian packages are so much awful that I repackaged 
the software: https://github.com/rfc1036/tivsm-deb .

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1043456: tecla: shows nothing and segfaults on keypress

2023-09-07 Thread Marco d'Itri
On Sep 07, Jeremy Bícha  wrote:

> This popup window is Tecla. Does it work correctly?
This way it does not crash anymore.
Still, it should be fixed to either not crash or not start if it can 
only be called by gnome-control-center.

(BTW, it does not react to left-alt, while it correctly reports pressing 
right-alt as Alt_R / Meta_R.)

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1043456: tecla: shows nothing and segfaults on keypress

2023-09-07 Thread Marco d'Itri
Control: reopen -1

Still broken.

||/ Name   Version  Architecture Description
+++-==---==>
ii  tecla  45~rc-1  amd64keyboard layout viewer for the GNO>

[Thread debugging using libthread_db enabled]   
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `tecla'.
Program terminated with signal SIGSEGV, Segmentation fault.

warning: Section `.reg-xstate/1963868' in core file too small.
#0  tecla_model_get_keycode_key (model=0x0, keycode=24)
at ../src/tecla-model.c:338
Download failed: Argomento non valido.  Continuing without source file 
./obj-x86_64-linux-gnu/../src/tecla-model.c.
338 ../src/tecla-model.c: File o directory non esistente.
[Current thread is 1 (Thread 0x7effd81ee2c0 (LWP 1963868))]
(gdb) where
#0  tecla_model_get_keycode_key (model=0x0, keycode=24)
at ../src/tecla-model.c:338
#1  0x55e0f78b72a8 in key_pressed_cb
(controller=, keyval=, keycode=, modifiers=, view=0x55e0f84828c0 [TeclaView])
at ../src/tecla-view.c:343
#6  0x7effdb17a243 in 
(instance=instance@entry=0x55e0f8516490, signal_id=, 
detail=detail@entry=0) at ../../../gobject/gsignal.c:3675
#2  0x7effdb4bcb0b in _gtk_marshal_BOOLEAN__UINT_UINT_FLAGSv
(closure=, return_value=0x7ffe1c328650, instance=, args=, marshal_data=, n_params=, param_types=0x55e0f85113c0) at gtk/gtkmarshalers.c:1748
#3  0x7effdb15f749 in _g_closure_invoke_va
(closure=0x55e0f85663c0, return_value=0x7ffe1c328650, 
instance=0x55e0f8516490, args=0x7ffe1c328750, n_params=3, 
param_types=0x55e0f85113c0)
at ../../../gobject/gclosure.c:895
#4  0x7effdb173913 in signal_emit_valist_unlocked
(instance=instance@entry=0x55e0f8516490, signal_id=signal_id@entry=99, 
detail=detail@entry=0, var_args=var_args@entry=0x7ffe1c328750)
at ../../../gobject/gsignal.c:3516
#5  0x7effdb17a186 in g_signal_emit_valist
(instance=0x55e0f8516490, signal_id=99, detail=0, var_args=0x7ffe1c328750)
--Type  for more, q to quit, c to continue without paging--c
at ../../../gobject/gsignal.c:3355
#7  0x7effdb53c0fd in gtk_event_controller_key_handle_event
(controller=0x55e0f8516490 [GtkEventControllerKey], event=, 
x=, y=)
at ../../../gtk/gtkeventcontrollerkey.c:121
#8  0x7effdb53b09a in gtk_event_controller_handle_event
(controller=controller@entry=0x55e0f8516490 [GtkEventControllerKey], 
event=event@entry=0x55e0f8e5c7b0 [GdkKeyEvent], 
target=target@entry=0x55e0f84828c0 [TeclaView], x=x@entry=0, y=y@entry=0) at 
../../../gtk/gtkeventcontroller.c:362
#9  0x7effdb67e55c in gtk_widget_run_controllers
(widget=widget@entry=0x55e0f84828c0 [TeclaView], 
event=event@entry=0x55e0f8e5c7b0 [GdkKeyEvent], 
target=target@entry=0x55e0f84828c0 [TeclaView], x=0, y=0, 
phase=phase@entry=GTK_PHASE_BUBBLE) at ../../../gtk/gtkwidget.c:4581
#10 0x7effdb685db1 in gtk_widget_event
(widget=widget@entry=0x55e0f84828c0 [TeclaView], 
event=event@entry=0x55e0f8e5c7b0 [GdkKeyEvent], 
target=target@entry=0x55e0f84828c0 [TeclaView])
at ../../../gtk/gtkwidget.c:4775
#11 0x7effdb5ac5de in gtk_propagate_event_internal
(widget=widget@entry=0x55e0f84828c0 [TeclaView], 
event=event@entry=0x55e0f8e5c7b0 [GdkKeyEvent], topmost=) at 
../../../gtk/gtkmain.c:1947
#12 0x7effdb5ac676 in gtk_propagate_event
(widget=widget@entry=0x55e0f84828c0 [TeclaView], 
event=event@entry=0x55e0f8e5c7b0 [GdkKeyEvent]) at ../../../gtk/gtkmain.c:1997
#13 0x7effdb5acd03 in gtk_main_do_event
(event=0x55e0f8e5c7b0 [GdkKeyEvent]) at ../../../gtk/gtkmain.c:1689
#14 0x7effdb6921f0 in surface_event
(surface=surface@entry=0x55e0f858c730 [GdkX11Toplevel], event=, widget=) at ../../../gtk/gtkwindow.c:4830
#15 0x7effdb80a5ea in _gdk_marshal_BOOLEAN__POINTER
(closure=closure@entry=0x55e0f82bb050, 
return_value=return_value@entry=0x7ffe1c328c90, 
n_param_values=n_param_values@entry=2, 
param_values=param_values@entry=0x7ffe1c328d20, 
invocation_hint=invocation_hint@entry=0x7ffe1c328c70, 
marshal_data=marshal_data@entry=0x0) at gdk/gdkmarshalers.c:258
#21 0x7effdb17a243 in 
(instance=instance@entry=0x55e0f858c730, signal_id=, 
detail=detail@entry=0) at ../../../gobject/gsignal.c:3675
#16 0x7effdb87f5f3 in gdk_surface_event_marshaller
(closure=0x55e0f82bb050, return_value=0x7ffe1c328c90, n_param_values=2, 
param_values=0x7ffe1c328d20, invocation_hint=0x7ffe1c328c70, marshal_data=0x0)
at ../../../gdk/gdksurface.c:433
#17 0x7effdb15f540 in g_closure_invoke
(closure=0x55e0f82bb050, return_value=0x7ffe1c328c90, n_param_values=2, 
param_values=0x7ffe1c328d20, invocation_hint=0x7ffe1c328c70)
at ../../../gobject/gclosure.c:832
#18 0x7effdb172afc in signal_emit_unlocked_R
(node=node@entry=0x7ffe1c328df0, detail=detail@entry=0, 
instance=instance@entry=0x55e0f858c730, 

Bug#1051119: NM reports fake Wi-Fi BSSIDs

2023-09-02 Thread Marco d'Itri
Package: network-manager
Version: 1.44.0-1
Severity: important

"nmcli device wifi list" reports obviously fake BSSIDs for all networks 
to which I have not connected to:

IN-USE  BSSID  SSIDMODE   CHAN  RATE   SIGNAL  >
B4:4B:D6:..:..:..  (omitted)   Infra  2 65 Mbit/s  87  >
00:01:02:00:03:90  (omitted)   Infra  2 65 Mbit/s  77  >
00:01:02:00:03:91  WOW FI - FASTWEBInfra  2 65 Mbit/s  77  >
00:01:02:00:03:FD  (omitted)   Infra  2 65 Mbit/s  75  >
*   B4:4B:D6:..:..:..  (omitted)   Infra  3665 Mbit/s  59  >
00:01:02:00:03:B3  (omitted)  461  Infra  2 65 Mbit/s  57  >
00:01:02:00:03:8E  FRITZ!Box 7530 WB   Infra  2 65 Mbit/s  55  >
82:8F:34:..:..:..  Vodafone-WiFi   Infra  3 65 Mbit/s  54  >
00:01:02:00:03:93  TIM-29740309Infra  2 65 Mbit/s  35  >
00:01:02:00:03:96  (omitted)  045  Infra  2 65 Mbit/s  30  >
00:01:02:00:04:AE  Sala da pranzo.v,   Infra  2 65 Mbit/s  27  >
00:01:02:00:04:71  (omitted)   Infra  2 65 Mbit/s  25  >
00:01:02:00:04:BC  (omitted)   Infra  2 65 Mbit/s  25  >
00:01:02:00:04:A1  (omitted)   Infra  2 65 Mbit/s  20  >

(The real BSSIDs and the non-generic SSIDs have been elided for 
paranoia reasons.)

This breaks the Mozilla Location Services API (used, among others, by 
Firefox and Geoclue), which once it sees at least two of these 
00:01:02:00:03:* BSSIDs it will happily geolocate me either in Vietnam 
or (less frequently) in Germany.

I do not believe this to be a kernel issue because "iwlist scanning" 
properly reports the BSSIDs of all networks.


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.4.0-2-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=it_IT.utf8, LC_CTYPE=it_IT.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages network-manager depends on:
ii  adduser 3.137
ii  dbus [default-dbus-system-bus]  1.14.10-1
ii  dbus-broker [dbus-system-bus]   33-1
ii  libaudit1   1:3.1.1-1
ii  libbluetooth3   5.69-1
ii  libc6   2.37-7
ii  libcurl3-gnutls 8.2.1-2
ii  libglib2.0-02.77.2-1
ii  libgnutls30 3.8.1-4
ii  libjansson4 2.14-2
ii  libmm-glib0 1.20.6-2
ii  libndp0 1.8-1
ii  libnewt0.52 0.52.23-1+b1
ii  libnm0  1.44.0-1
ii  libpsl5 0.21.2-1
ii  libreadline88.2-1.3
ii  libselinux1 3.5-1
ii  libsystemd0 254.1-3
ii  libteamdctl01.31-1
ii  libudev1254.1-3
ii  policykit-1 123-1
ii  polkitd 123-1
ii  udev254.1-3

Versions of packages network-manager recommends:
ii  dnsmasq-base [dnsmasq-base]  2.89-1
ii  libpam-systemd   254.1-3
pn  modemmanager 
ii  ppp  2.4.9-1+1.1+b1
ii  wireless-regdb   2022.06.06-1
ii  wpasupplicant2:2.10-15

Versions of packages network-manager suggests:
ii  iptables   1.8.9-2
pn  libteam-utils  

Versions of packages network-manager is related to:
ii  isc-dhcp-client  4.4.3-P1-2

-- Configuration Files:
/etc/NetworkManager/NetworkManager.conf changed [not included]
/etc/NetworkManager/dispatcher.d/01-ifupdown changed [not included]

-- no debconf information

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1050681: bookworm-pu: package inn2/2.7.1-1~deb12u1

2023-08-27 Thread Marco d'Itri
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: i...@packages.debian.org
Control: affects -1 + src:inn2

This stable upload contains two patches backported from the upstream 
repository on request of the upstream maintainer.
The patches are also part of the package which is currently in testing.

One patch fixes hangs in nnrpd, while the other allows the package to 
process the high-precision syslog timestamps format which is currently 
the default for Debian.

The package also contains a minor security fix which changes the default 
permissions of two configuration files which contain secrets, which has 
already been added to the next unstable upload.

For a better view of the changes please see
https://salsa.debian.org/md/inn2/-/commits/bookworm .

-- 
ciao,
Marco
diff -Nru inn2-2.7.1/debian/changelog inn2-2.7.1/debian/changelog
--- inn2-2.7.1/debian/changelog	2023-05-01 19:25:42.0 +0200
+++ inn2-2.7.1/debian/changelog	2023-08-28 02:04:59.0 +0200
@@ -1,3 +1,13 @@
+inn2 (2.7.1-1~deb12u1) bookworm; urgency=medium
+
+  * Added patch backport_a1f2e9323: this upstream commit fixes nnrpd hangs
+when compression is enabled.
+  * Added patch backport_f7d111aad: this upstream commit adds support for
+high-precision syslog timestamps which now are the default in Debian.
+  * Made inn-{radius,secrets}.conf not world readable.
+
+ -- Marco d'Itri   Mon, 28 Aug 2023 02:04:59 +0200
+
 inn2 (2.7.1-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru inn2-2.7.1/debian/patches/backport_a1f2e9323 inn2-2.7.1/debian/patches/backport_a1f2e9323
--- inn2-2.7.1/debian/patches/backport_a1f2e9323	1970-01-01 01:00:00.0 +0100
+++ inn2-2.7.1/debian/patches/backport_a1f2e9323	2023-08-28 02:04:59.0 +0200
@@ -0,0 +1,154 @@
+From: Enrik Berkhan 
+Subject: nnrpd: avoid hang due to misplaced select()
+Origin: upstream, commit:a1f2e932338a17eb4111243f29fcade52d39e0a7
+
+The select() call in nnrpd's input data processing is moved right
+before the related read() call to avoid blocking when it shouldn't.
+
+Without this change, there could still remain data to be inflated, that
+has already been read, if compression had been activated.  The select()
+can then time out because the client might already have sent all data
+before, and the yet to be inflated data will not be used until after
+the timeout.
+
+Resolves: #269
+
+diff --git a/nnrpd/line.c b/nnrpd/line.c
+index fc68b15dd..6c048720c 100644
+--- a/nnrpd/line.c
 b/nnrpd/line.c
+@@ -79,12 +79,11 @@ line_reset(struct line *line)
+ }
+ 
+ /*
+-**  Timeout is used only if HAVE_OPENSSL is defined.
+ **  Returns -2 on timeout, -1 on read error, and otherwise the number of
+ **  bytes read.
+ */
+ static ssize_t
+-line_doread(void *p, size_t len, int timeout UNUSED)
++line_doread(void *p, size_t len, int timeout)
+ {
+ ssize_t n;
+ 
+@@ -122,6 +121,22 @@ line_doread(void *p, size_t len, int timeout UNUSED)
+ }
+ #endif /* HAVE_ZLIB */
+ 
++/* It seems that the SSL_read cannot be mixed with select()
++ * as in the current code.  TLS communicates in its own data
++ * blocks and handshaking.  The line_doread using SSL_read
++ * could return, but still with a partial line in the SSL_read
++ * buffer.  Then the server TLS routine would sit there waiting
++ * for completion of that data block while nnrpd sat at the
++ * select() routine waiting for more data from the server.
++ *
++ * Here, we decide to just bypass the select() wait.  Unlike
++ * innd with multiple threads, the select on nnrpd is just
++ * waiting on a single file descriptor, so it is not really
++ * essential with blocked read like SSL_read.  Using an alarm
++ * signal around SSL_read for non active timeout, TLS works
++ * without dead locks.  However, without the select() wait,
++ * the IDLE timer stat won't be collected...
++ */
+ #ifdef HAVE_OPENSSL
+ if (tls_conn) {
+ int err;
+@@ -152,9 +167,38 @@ line_doread(void *p, size_t len, int timeout UNUSED)
+ xsignal(SIGALRM, SIG_DFL);
+ } else
+ #endif /* HAVE_OPENSSL */
++{
++fd_set rmask;
++int i;
++
++/* Wait for activity on stdin, updating timer stats as we go. */
++do {
++struct timeval t;
++
++FD_ZERO();
++FD_SET(STDIN_FILENO, );
++t.tv_sec = timeout;
++t.tv_usec = 0;
++TMRstart(TMR_IDLE);
++i = select(STDIN_FILENO + 1, , NULL, NULL, );
++TMRstop(TMR_IDLE);
++if (i == -1 && errno != EINTR) {
++syswarn("%s can't select", Client.host);
++break;
++}
++} while (i == -1);
++
++ 

Bug#1050586: kmod: Updating to kmod to 30+20230601-1 results in a non booting system modules cannot be decompressed

2023-08-27 Thread Marco d'Itri
Control: retitle -1 kmod does not work with XZ in-kernel module decompression

On Aug 27, Jon Westgate  wrote:

> Note that I already had "Support in-kernel module decompression" selected
> when the compression method was XZ.
> 
> Would you like me to try without it?
No need to: we know that everything works fine without in-kernel 
decompression, because this is how the Debian kernel is configured.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1041552: HFS/HFS+ are insecure

2023-08-27 Thread Marco d'Itri
On Aug 27, Diederik de Haas  wrote:

> While I agree that "orphan" does mean that it is NOT actively maintained, 
> AFAICT the situation is a bit more blurry for "odd fixes".
All these file systems are either rare enough and/or not used on 
removable media, so I do not believe that it is unreasonable to ask the
few users that want them to be mounted automatically to disable this 
policy with a symlink like
ln -s /dev/null /etc/udev/rules.d/75-insecure-fs.rules .

> Previously not knowing about that status, I looked up the commits where the 
> status was set to "odd fixes" and found that for some the reason was that the 
> maintainer didn't have the hardware to test it themselves.
> I do not think that's the same as 'unmaintained'.
It means that they are not tested enough...

> I'm not sure if it would actually result in unbootable systems, but I do think
> a bit more care should be taken before blacklisting modules.
Did you actually read the thread? No modules are being blacklisted, the 
plan is just to stop udisks2 from automatically mounting such removable 
media.
I am quite sure that routers file systems are not mounted with udisks2.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1050586: kmod: Updating to kmod to 30+20230601-1 results in a non booting system modules cannot be decompressed

2023-08-26 Thread Marco d'Itri
On Aug 26, Jon Westgate <0...@fsck.tv> wrote:

> The error message it gave was "decompresson failed with status 6"
Status 6 is XZ_OPTIONS_ERROR, which means "Input was encoded with 
settings that are not supported by this XZ decoder".
So it looks like you have compressed the modules (how?) with XZ settings 
which are supported by the userspace loader but not by the kernel one.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1041552: HFS/HFS+ are insecure

2023-08-26 Thread Marco d'Itri
Control: reassign -1 udisks2
Control: retitle -1 do not mount automatically unmaintained file systems

On Jul 20, md wrote:

> You are totally correct.
> Kernel team, please blacklist HFS/HFS+ for automounting.
As discussed on debian-devel@, this policy should not be handled by the 
kernel because modules autoloading of file systems drivers should not be
disabled.

So I propose this content for a file like
/usr/lib/udev/rules.d/75-insecure-fs.rules:

# Do not automatically mount these file systems because their drivers are
# marked as "orphan" or "odd fixes" in the kernel MAINTAINERS file and so
# are more at risk of having security-sensitive defects which could be
# exploited by a crafted file system.
SUBSYSTEM!="block", GOTO="udisks_insecure_fs_end"

ENV{ID_FS_TYPE}=="affs", ENV{UDISKS_AUTO}="0"
ENV{ID_FS_TYPE}=="ecryptfs", ENV{UDISKS_AUTO}="0"
ENV{ID_FS_TYPE}=="efs", ENV{UDISKS_AUTO}="0"
ENV{ID_FS_TYPE}=="hfs", ENV{UDISKS_AUTO}="0"
ENV{ID_FS_TYPE}=="hfsplus", ENV{UDISKS_AUTO}="0"
ENV{ID_FS_TYPE}=="jffs2", ENV{UDISKS_AUTO}="0"
ENV{ID_FS_TYPE}=="jfs", ENV{UDISKS_AUTO}="0"
ENV{ID_FS_TYPE}=="qnx6", ENV{UDISKS_AUTO}="0"
ENV{ID_FS_TYPE}=="sysv", ENV{UDISKS_AUTO}="0"

LABEL="udisks_insecure_fs_end"

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1050586: kmod: Updating to kmod to 30+20230601-1 results in a non booting system modules cannot be decompressed

2023-08-26 Thread Marco d'Itri
On Aug 26, Jon Westgate  wrote:

> Yes I am using compressed modules
And are these modules compressed with xz or something else?

This new code was introduced in the latest snapshot, and apparently it 
fails when used with kernels with compressed modules support enabled 
(which so far is not the default for Debian kenrels).

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1050582: kmod update corrupts systemd uefi boot

2023-08-26 Thread Marco d'Itri
On Aug 26, antonio  wrote:

> Kernel: Linux 6.4.12-1-liquorix-amd64 (SMP w/24 CPU threads; PREEMPT)
I see that you are using a custom kernel. What is the status of the
CONFIG_MODULE_COMPRESS_* kernel configuration options?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1050586: kmod: Updating to kmod to 30+20230601-1 results in a non booting system modules cannot be decompressed

2023-08-26 Thread Marco d'Itri
On Aug 26, Jon Westgate <0...@fsck.tv> wrote:

> Kernel: Linux 6.4.11 (SMP w/12 CPU threads; PREEMPT)
I see that you are using a custom kernel. What is the status of the
CONFIG_MODULE_COMPRESS_* kernel configuration options?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1050586: kmod: Updating to kmod to 30+20230601-1 results in a non booting system modules cannot be decompressed

2023-08-26 Thread Marco d'Itri
On Aug 26, Jon Westgate <0...@fsck.tv> wrote:

> The system partially booted but systemd then prevented boot due to missing
> modules,
> The error message it gave was "decompresson failed with status 6"
Are you using compressed modules?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1050542: bookworm-pu: package openbsd-inetd/0.20221205-2+deb12u1

2023-08-25 Thread Marco d'Itri
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
Control: affects -1 + src:openbsd-inetd

This is needed to fix #1050208, introduced in bookworm, which makes 
inetd crash on configuration reloads.

The fix is in the change to patches/default_v4v6, everything else is 
improvements to the test suite and more tests (also to catch this 
specific problem).

0.20221205-2+deb12u1 is a no changes rebuild of the package currently in 
testing.

For a better view of the changes please see
https://salsa.debian.org/md/openbsd-inetd/-/commits/master .

-- 
ciao,
Marco
diff -Nru openbsd-inetd-0.20221205/debian/changelog openbsd-inetd-0.20221205/debian/changelog
--- openbsd-inetd-0.20221205/debian/changelog	2023-01-02 14:33:50.0 +0100
+++ openbsd-inetd-0.20221205/debian/changelog	2023-08-26 00:34:16.0 +0200
@@ -1,8 +1,21 @@
+openbsd-inetd (0.20221205-2+deb12u1) bookworm; urgency=medium
+
+  * Rebuilt for bookworm.
+
+ -- Marco d'Itri   Sat, 26 Aug 2023 00:34:16 +0200
+
+openbsd-inetd (0.20221205-2) unstable; urgency=medium
+
+  * Updated the Debian patch default_v4v6 to fix fix a double free and
+a memory leak on configuration reloads. (Closes: #1050208)
+
+ -- Marco d'Itri   Wed, 23 Aug 2023 12:49:41 +0200
+
 openbsd-inetd (0.20221205-1) unstable; urgency=medium
 
   * New CVS snapshot.
   * When just "tcp" or "udp" is specified in inetd.conf, now inetd defaults
-to runnning two servers: one for IPv4 and one for IPv6 traffic.
+to running two servers: one for IPv4 and one for IPv6 traffic.
 This is identical to specifying both e.g. "tcp4" and "tcp6".
 The old semantics of only accepting IPv4 connections can be restored
 by using "tcp4" or "udp4".
diff -Nru openbsd-inetd-0.20221205/debian/copyright openbsd-inetd-0.20221205/debian/copyright
--- openbsd-inetd-0.20221205/debian/copyright	2023-01-01 22:49:25.0 +0100
+++ openbsd-inetd-0.20221205/debian/copyright	2023-08-23 03:00:22.0 +0200
@@ -29,10 +29,3 @@
  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  * SUCH DAMAGE.
 
-setproctitle.c and discard_stupid_environment() come from netkit 0.17,
-patched by the USAGI project.
-
-strlcpy.c comes from the openbsd source tree, slightly edited.
-
-bsd-closefrom.c comes from the openssh source tree, slightly edited.
-
diff -Nru openbsd-inetd-0.20221205/debian/NEWS openbsd-inetd-0.20221205/debian/NEWS
--- openbsd-inetd-0.20221205/debian/NEWS	2023-01-02 03:09:21.0 +0100
+++ openbsd-inetd-0.20221205/debian/NEWS	2023-08-23 12:46:59.0 +0200
@@ -1,7 +1,7 @@
 openbsd-inetd (0.20221205-1) unstable; urgency=medium
 
   * When just "tcp" or "udp" is specified in inetd.conf, now inetd defaults
-to runnning two servers: one for IPv4 and one for IPv6 traffic.
+to running two servers: one for IPv4 and one for IPv6 traffic.
 This is identical to specifying both e.g. "tcp4" and "tcp6".
 The old semantics of only accepting IPv4 connections can be restored
 by using "tcp4" or "udp4".
diff -Nru openbsd-inetd-0.20221205/debian/openbsd-inetd.preinst openbsd-inetd-0.20221205/debian/openbsd-inetd.preinst
--- openbsd-inetd-0.20221205/debian/openbsd-inetd.preinst	2023-01-02 02:45:43.0 +0100
+++ openbsd-inetd-0.20221205/debian/openbsd-inetd.preinst	2023-08-23 03:06:12.0 +0200
@@ -54,14 +54,6 @@
 install)
 create_inetd
 ;;
-
-upgrade|abort-upgrade)
-;;
-
-*)
-echo "$0 called with unknown argument '$1'" >&2
-exit 1
-;;
 esac
 
 #DEBHELPER#
diff -Nru openbsd-inetd-0.20221205/debian/patches/default_v4v6 openbsd-inetd-0.20221205/debian/patches/default_v4v6
--- openbsd-inetd-0.20221205/debian/patches/default_v4v6	2023-01-02 02:30:41.0 +0100
+++ openbsd-inetd-0.20221205/debian/patches/default_v4v6	2023-08-23 02:45:43.0 +0200
@@ -44,37 +44,35 @@
  	int val;
  	int argc;
 +	static int proto_override;
-+	static char *saved_cp;
++	static char saved_line[1024];
  
  	sep = calloc(1, sizeof(struct servtab));
  	if (sep == NULL) {
-@@ -1165,6 +1167,14 @@ getconfigent(void)
+@@ -1165,6 +1167,11 @@ getconfigent(void)
  more:
  	freeconfig(sep);
  
 +	if (proto_override) {
 +	/* process again the same configuration entry */
-+	cp = saved_cp;
-+	saved_cp = NULL;
++	cp = saved_line;
 +	} else {
-+		if (saved_cp)
-+		free(saved_cp);
 +
  	while ((cp = nextline(fconfig)) && *cp == '#')
  		;
  	if (cp == NULL) {
-@@ -1172,6 +1182,10 @@ more:
+@@ -1172,6 +1179,11 @@ more:
  		return (NULL);
  	}
  
-+		/* keep a copy of the configuration entry */
-+		saved_cp = newstr(cp);
-+	} /* proto_override */
++	/* keep a copy of the configuration entry */
++	strcpy(saved_line, cp);
++
++	} /* !proto_override */
 +
  	memset(sep, 0, sizeof *sep);

Bug#1050208: libc6: double free detected in tcache 2, then abort

2023-08-23 Thread Marco d'Itri
In one or two weeks I will also do a stable upload.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1043539: project: Forwarding of @debian.org mails to gmail broken

2023-08-15 Thread Marco d'Itri
On Aug 14, Stephen Frost  wrote:

>If someone has some idea how to get them to care about ARC, I'd love to
>hear about it, as I have folks on the one hand who view DKIM/DMARC as
>too painful to set up but then they end up with bounces from gmail due
>to my forwarding of messages through my server (which are being
>ARC-signed by it and pass on that the SPF check was successful when they
>arrived to my server)...
I do not know of any situation in which DMARC adoption would improve
deliverability, and most people that configure it are just engaging in
cargo cult sysadmining.
DMARC with p=reject is useful when the sender domain is a phishing
victim, e.g. a financial organization, but most users do not need it.

In other words: if these people want to support use cases like
forwarding and participating to mailing lists then they should adopt
DKIM and ignore DMARC.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1043094: gnome-flashback segfaults after unlocking the screen

2023-08-05 Thread Marco d'Itri
Package: gnome-flashback
Version: 3.46.0-2
Severity: important

This started on August 2 and I have already seen 3 crashes.

(gdb) where
#0  0x55841ae65d2a in check_volume_queue
(manager=0x55841bf80270 [GsdAutomountManager])
at ./gnome-flashback/libautomount-manager/gsd-automount-manager.c:211
#1  screensaver_signal_callback
(proxy=, sender_name=, signal_name=, user_data=0x55841bf80270, parameters=)
at ./gnome-flashback/libautomount-manager/gsd-automount-manager.c:365
#2  screensaver_signal_callback
(proxy=, sender_name=, signal_name=, parameters=, user_data=0x55841bf80270)
at ./gnome-flashback/libautomount-manager/gsd-automount-manager.c:353
#7  0x7f374612f5ff in 
(instance=instance@entry=0x55841c0bf530, signal_id=, 
detail=) at ../../../gobject/gsignal.c:3675
#3  0x7f37461153f8 in g_closure_invoke
(closure=0x55841c0e2bb0, return_value=0x0, n_param_values=4, 
param_values=0x7ffea1ae19c0, invocation_hint=0x7ffea1ae1910)
at ../../../gobject/gclosure.c:832
#4  0x7f374612801c in signal_emit_unlocked_R
(node=node@entry=0x7ffea1ae1ac0, detail=detail@entry=0, 
instance=instance@entry=0x55841c0bf530, 
emission_return=emission_return@entry=0x0, 
instance_and_params=instance_and_params@entry=0x7ffea1ae19c0) at 
../../../gobject/gsignal.c:3980
#5  0x7f3746129951 in signal_emit_valist_unlocked
--Type  for more, q to quit, c to continue without paging--c
(instance=instance@entry=0x55841c0bf530, signal_id=signal_id@entry=165, 
detail=detail@entry=0, var_args=var_args@entry=0x7ffea1ae1c20)
at ../../../gobject/gsignal.c:3612
#6  0x7f374612f552 in g_signal_emit_valist
(instance=0x55841c0bf530, signal_id=165, detail=0, var_args=0x7ffea1ae1c20)
at ../../../gobject/gsignal.c:3355
#8  0x7f3746279da5 in on_signal_received
(connection=, sender_name=0x7f370c0301b0 ":1.45", 
object_path=, interface_name=, 
signal_name=0x7f370c038b50 "ActiveChanged", parameters=0x7f370c0244d0, 
user_data=0x55841c0c3860)
at ../../../gio/gdbusproxy.c:890
#9  0x7f3746267afb in emit_signal_instance_in_idle_cb (data=0x7f370c04e640)
at ../../../gio/gdbusconnection.c:3802
#10 0x7f3746012449 in g_main_dispatch
(context=context@entry=0x55841bc4cfc0) at ../../../glib/gmain.c:3476
#11 0x7f37460155b7 in g_main_context_dispatch_unlocked
(context=0x55841bc4cfc0) at ../../../glib/gmain.c:4284
#12 g_main_context_iterate_unlocked
(context=0x55841bc4cfc0, block=block@entry=1, dispatch=dispatch@entry=1, 
self=) at ../../../glib/gmain.c:4349
#13 0x7f3746015e6f in g_main_loop_run (loop=0x55841bc81750)
at ../../../glib/gmain.c:4551
#14 0x55841ae3d483 in main (argc=1, argv=0x7ffea1ae1fe8)
at ./gnome-flashback/gf-main.c:203
(gdb) 

Module libudev.so.1 from deb systemd-254-1.amd64
Module libsystemd.so.0 from deb systemd-254-1.amd64
Stack trace of thread 8937:
#0  0x55841ae65d2a n/a (gnome-flashback + 0x4dd2a)
#1  0x7f37461153f8 g_closure_invoke (libgobject-2.0.so.0 + 0x163f8)
#2  0x7f374612801c n/a (libgobject-2.0.so.0 + 0x2901c)
#3  0x7f3746129951 n/a (libgobject-2.0.so.0 + 0x2a951)
#4  0x7f374612f552 g_signal_emit_valist (libgobject-2.0.so.0 + 0x30552)
#5  0x7f374612f5ff g_signal_emit (libgobject-2.0.so.0 + 0x305ff)
#6  0x7f3746279da5 n/a (libgio-2.0.so.0 + 0x11ada5)
#7  0x7f3746267afb n/a (libgio-2.0.so.0 + 0x108afb)
#8  0x7f3746012449 n/a (libglib-2.0.so.0 + 0x56449)
#9  0x7f37460155b7 n/a (libglib-2.0.so.0 + 0x595b7)
#10 0x7f3746015e6f g_main_loop_run (libglib-2.0.so.0 + 0x59e6f)
#11 0x55841ae3d483 n/a (gnome-flashback + 0x25483)
#12 0x7f3745e016ca __libc_start_call_main (libc.so.6 + 0x276ca)
#13 0x7f3745e01785 __libc_start_main_impl (libc.so.6 + 0x27785)
#14 0x55841ae3d561 n/a (gnome-flashback + 0x25561)

Stack trace of thread 8994:
#0  0x7f37460015b5 g_hash_table_lookup (libglib-2.0.so.0 + 0x455b5)
#1  0x7f374612e6e1 g_signal_handlers_destroy (libgobject-2.0.so.0 + 0x2f6e1)
#2  0x7f374611994d n/a (libgobject-2.0.so.0 + 0x1a94d)
#3  0x7f374611a3c0 g_object_unref (libgobject-2.0.so.0 + 0x1b3c0)
#4  0x7f374627f987 n/a (libgio-2.0.so.0 + 0x120987)
#5  0x7f37462127c3 n/a (libgio-2.0.so.0 + 0xb37c3)
#6  0x7f37462127f9 n/a (libgio-2.0.so.0 + 0xb37f9)
#7  0x7f3746012449 n/a (libglib-2.0.so.0 + 0x56449)
#8  0x7f37460155b7 n/a (libglib-2.0.so.0 + 0x595b7)
#9  0x7f3746015e6f g_main_loop_run (libglib-2.0.so.0 + 0x59e6f)
#10 0x7f374627d8a6 n/a (libgio-2.0.so.0 + 0x11e8a6)
#11 0x7f374604207d n/a (libglib-2.0.so.0 + 0x8607d)
#12 0x7f3745e623ec start_thread (libc.so.6 + 0x883ec)
#13 0x7f3745ee2a1c __clone3 (libc.so.6 + 0x108a1c)

Stack trace of thread 8976:
#0  0x7f3745e5f156 __futex_abstimed_wait_common64 (libc.so.6 + 0x85156)
#1  0x7f3745e61818 __pthread_cond_wait_common (libc.so.6 + 0x87818)
#2  0x7f3740111369 n/a (radeonsi_dri.so + 0x111369)
#3  0x7f37400c502b n/a (radeonsi_dri.so + 0xc502b)
#4  

Bug#1041892: debchange --bpo ignores -D

2023-07-24 Thread Marco d'Itri
Package: devscripts
Version: 2.23.5
Severity: normal

If I run e.g. "debchange -D bullseye-backports --bpo" then debchange 
should be smart enough to use the correct value for the changelog entry 
and for the package version, but instead it defaults to the current 
stable release:

package (8.1-1~bpo12+1) bullseye-backports; urgency=medium

  * Rebuild for bookworm-backports.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1041552: HFS/HFS+ are insecure

2023-07-21 Thread Marco d'Itri
On Jul 21, Matthew Garrett  wrote:

> > You are totally correct.
> > Kernel team, please blacklist HFS/HFS+ for automounting.
> Isn't this a userland policy decision? udisks will happily trigger a 
> module load for hfsplus if udev has identified it, and I don't think 
> there's a trivial mechanism for the kernel to disable that. I believe 
Yes, I was also thinking about this and I believe that you are right.
The kernel team did this in the past for some uncommon network 
protocols, but they could do it themselves because these modules are 
autoloaded using aliases.

Since I happen to be the kmod maintainer it looks like that solving this
is on me. :-)

Unless somebody has a better idea then then my plan is to ship in the 
next upload of kmod a file in /etc/modprobe.d/ which uses the blacklist 
directive to prevent automatically loading some file system modules.

By looking at the MAINTAINERS file I have identified these file systems 
marked as "orphan" and "odd fixes":

efs
hfs
hfaplus
qnx6
sysv

affs
ecryptfs
jffs2
jfs

And I think that I can also safely add a few more which while actively 
maintained I believe are only used in a retrocomputing context or are 
generally uncommon anyway:

befs
bfs
hpfs
omfs
qnx4
reiserfs
spu
ufs

Did i miss anything?

I think that all of these have enough of a niche usage that it would not 
be an unreasonable burden for the affected users to manually load the 
modules when needed (ad hoc or using /etc/modules-load.d/).

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1039919: Please consider the ssh-agent socket activation patch

2023-06-29 Thread Marco d'Itri
Source: openssh
Severity: wishlist
Tags: patch

It would be nice to have this patch added to the Debian package:

http://lists.mindrot.org/pipermail/openssh-unix-dev/2023-June/040812.html

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1039913: Please add hook for self-signing systemd-boot after upgrade

2023-06-29 Thread Marco d'Itri
On Jun 29, Jan Naumann  wrote:

> Could you please add a hook to the postinst that either a local script can be
> called on installation time which takes care of signing the image (similar to
> the `/etc/kernel/postinst.d/ mechamism) or add some call to `sbsign` yourself 
> if
> e.g. the signing key is available at a specific path.
I am working on packaging sbctl (which I believe is *much* nicer[1] than
sbsigntool and mokutil), so I plan to do some work in this area in the 
future.
But I am not sure yet of which shape this interface should have.

Part of the issue is that at least sbctl signs the installed binaries in 
place, while bootctl looks for .efi.signed files in the source 
directory, and "bootctl install" could also be run manually at any time.

But since systemd-bootx64.efi comes from /usr/lib/systemd/boot/efi/ it 
would not be right to have something which is not the package manager 
install a .efi.signed file there, so I suspect that this cannot be 
solved just with some shell scripting.
And for the time being there are zero chances that Debian (or anybody 
else, I understand) will be able to ship a signed systemd-boot, so this 
is not a useful interface right now.

[1] https://blog.bofh.it/debian/id_465

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1039522: usrmerge: cannot complete upgrade to bookworm because of #842145

2023-06-26 Thread Marco d'Itri
On Jun 26, Giuseppe Sacco  wrote:

> Warning: NFS detected, /usr/lib/usrmerge/convert-usrmerge will not be run
> automatically. See #842145 for details.
What is the purpose of opening this new bug about the same issue?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1038853: usrmerge: clean up the unused empty biarch directories

2023-06-22 Thread Marco d'Itri
Release managers, I would like to upload to 12.1 a new package to fix 
this (and other minor issues).


On Jun 22, Andreas Beckmann  wrote:

> Package: usrmerge
> Version: 35
> Severity: important
> Tags: patch
> 
> bootstrapping a merged-/usr system or earlier conversions may have
> created empty biarch directories and links to them, e.g.
>   /usr/libx32
>   /libx32 -> /usr/libx32
> 
> Since glibc 2.35-4 this is handled by the respective glibc packages
> and usrmerge has stopped creating them.
> 
> So let's clean them up (once) on upgrades of the usrmerge/usr-is-merged
> packages if they are not owned by any package according to the dpkg
> database. Otherwise they might suddenly disappear after installation and
> removal of a package "owning" them.
> 
> While the existence/disappearance of these directories and links is
> harmless for a regular system, it is nasty for doing QA testing since
> that may trigger an error on sudden disappearance of files/directories
> (at non-volatile locations). Ignoring these locations is not a good
> idea, since it might hide actual bugs mishandling the biarc locations.
> 
> I've been running piuparts bullseye -> bookworm upgrade tests with this
> patch applied and that solved all the unexpected disappearance of biarch
> directories and links.
> 
> 
> Andreas

> >From 6a07b047055ef2d05ab3381f9f7ce64c21f6b60b Mon Sep 17 00:00:00 2001
> From: Andreas Beckmann 
> Date: Sun, 28 May 2023 14:20:21 +0200
> Subject: [PATCH] postinst: Clean up the unused empty biarch directories
> 
> bootstrapping or earlier conversions may have created empty biarch
> directories and links. glibc 2.35-4 or later will create them if
> needed, so clean up the unused (and unowned) ones
> 
> Closes: #
> ---
>  debian/usr-is-merged.postinst | 28 
>  debian/usrmerge.postinst  | 22 +-
>  2 files changed, 49 insertions(+), 1 deletion(-)
>  create mode 100644 debian/usr-is-merged.postinst
> 
> diff --git a/debian/usr-is-merged.postinst b/debian/usr-is-merged.postinst
> new file mode 100644
> index 000..3d0e0c5
> --- /dev/null
> +++ b/debian/usr-is-merged.postinst
> @@ -0,0 +1,28 @@
> +#!/bin/sh
> +set -e
> +
> +cleanup_biarch_dirs() {
> +  # bootstrapping or earlier conversions may have created empty biarch
> +  # directories and links. glibc 2.35-4 or later will create them if needed,
> +  # so clean up the unused (and unowned) ones
> +  local arch_directories="/lib64 /lib32 /libo32 /libx32"
> +  for dir in $arch_directories; do
> +[ -e "$dir" ] || continue
> +if ! dpkg-query -S $dir >/dev/null 2>&1; then
> +  rm -v $dir
> +  if [ -e /usr$dir ] && ! dpkg-query -S /usr$dir >/dev/null 2>&1 ; then
> +rmdir --ignore-fail-on-non-empty -v /usr$dir
> +  fi
> +fi
> +  done
> +}
> +
> +case "$1" in
> +configure)
> +  if dpkg --compare-versions "$2" lt "36~" ; then
> +cleanup_biarch_dirs
> +  fi
> +;;
> +esac
> +
> +#DEBHELPER#
> diff --git a/debian/usrmerge.postinst b/debian/usrmerge.postinst
> index 257f0e5..057b7f1 100644
> --- a/debian/usrmerge.postinst
> +++ b/debian/usrmerge.postinst
> @@ -1,4 +1,5 @@
> -#!/bin/sh -e
> +#!/bin/sh
> +set -e
>  
>  is_fs() {
>local fs_type
> @@ -49,6 +50,22 @@ END
>/usr/lib/usrmerge/convert-usrmerge || return $?
>  }
>  
> +cleanup_biarch_dirs() {
> +  # bootstrapping or earlier conversions may have created empty biarch
> +  # directories and links. glibc 2.35-4 or later will create them if needed,
> +  # so clean up the unused (and unowned) ones
> +  local arch_directories="/lib64 /lib32 /libo32 /libx32"
> +  for dir in $arch_directories; do
> +[ -e "$dir" ] || continue
> +if ! dpkg-query -S $dir >/dev/null 2>&1; then
> +  rm -v $dir
> +  if [ -e /usr$dir ] && ! dpkg-query -S /usr$dir >/dev/null 2>&1 ; then
> +rmdir --ignore-fail-on-non-empty -v /usr$dir
> +  fi
> +fi
> +  done
> +}
> +
>  case "$1" in
>  configure)
>   # Skip the conversion for buildds.
> @@ -59,6 +76,9 @@ case "$1" in
> echo "W: /etc/unsupported-skip-usrmerge-conversion exists." >&2
>   else
> maybe_convert "$@" || { echo "E: usrmerge failed." >&2; exit 1; }
> +   if dpkg --compare-versions "$2" lt "36~" ; then
> + cleanup_biarch_dirs
> +   fi
> /usr/lib/usrmerge/convert-etc-shells
>   fi
>  ;;
> -- 
> 2.20.1
> 


-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#945269: debian-policy: packages should use tmpfiles.d(5) to create directories below /var

2023-06-13 Thread Marco d'Itri
On Jun 13, Bill Allombert  wrote:

> Conversely, sometimes I need to use chroots to test init scripts.
> start-stop-daemon should not refuse to run in a chroot if policy-rc.d allows
> it.
I suggest that you try systemd-nspawn for this purpose.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1037362: usrmerge: Can not run due to an open file handle (GLOB) that it seems is not possible to close

2023-06-13 Thread Marco d'Itri
retitle -1 1037362 usrmerge: fails to run ldd

On Jun 13, Lawrence Bayly  wrote:

> Spoke too soon, usrmerge broke my system worse than I could have 
> imagined, /usr/bin/init went to systemd but in the old place 
> /lib/systemd (the lib folder was either empty or not there, likely 
> because of the usrmerge), fixing that didn't really do much as 
> I suspect a whole bunch of other stuff was moved without the system 
> really knowing where it all was. (I could have sat there moving stuff 
> around or symlinking to hopefully solve the problem but in the end it 
> seemed like alot of work)
At this point it is not really clear to me what you have done, but 
please note that since convert-usrmerge failed running ldd it means that 
it did not modify your system in any way.
So this looks like auto-inflicted damage to me.

I will keep this bug around for a while to see if anybody else shows up 
with the same problem and to improve the error message.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1037362: usrmerge: Can not run due to an open file handle (GLOB) that it seems is not possible to close

2023-06-12 Thread Marco d'Itri
On Jun 12, Lawrence Bayly  wrote:

> root@cg-sg:/tmp/coreutils/bin# ldd /bin/cp
> not a dynamic executable
> root@cg-sg:/tmp/coreutils/bin# file /bin/cp
> /bin/cp: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically 
> linked, interpreter /lib64/ld-linux-x86-64.so.2, 
> BuildID[sha1]=e8f03b272b3dbd03cc8748cf2b52744a58d0cf5c, for GNU/Linux 3.2.0, 
> stripped
This is the correct file. Is your ldd weird then?

It should look like this:

-rwxr-xr-x 1 root root 5398 Apr 10 10:35 /usr/bin/ldd

Please also report the output of:
- dpkg -l libc-bin
- which ldd
- ldd --version

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1037362: usrmerge: Can not run due to an open file handle (GLOB) that it seems is not possible to close

2023-06-12 Thread Marco d'Itri
On Jun 12, Lawrence Bayly  wrote:

> root@cg-sg:~# file /bin/cp
> /bin/cp: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically 
> linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, 
> BuildID[sha1]=3a0bad79264ea6b37c1b8d4dd2b206b8001097dc, stripped
Interesting. I am still trying to figure out why ldd does not work on 
it.

> The upgrade did kinda go badly and I did lose libcrypt.so.1 at one 
> point earlier in the upgrade for some odd reason which meant perl 
> wouldn't run (and that script wouldn't run either as it depended on 
> perl) until I copied it back, so it potentially could be that /bin/cp 
> is also an outdated binary.
This happened because you upgraded while skipping a release, and this is 
not supported.

> Should I copy /bin/cp from another debian system and try again?
Reinstalling the coreutils package should be enough, but I wonder at 
this point what else is broken on your system.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1037362: usrmerge: Can not run due to an open file handle (GLOB) that it seems is not possible to close

2023-06-12 Thread Marco d'Itri
On Jun 12, Lawrence Bayly  wrote:

> The output is as follows:-
> 
> root@cg-sg:~# ldd /bin/cp
>not a dynamic executable
Weird. Is /bin/cp a script then? Where does it come from?

-- 
ciao,
Marco



Bug#1037362: usrmerge: Can not run due to an open file handle (GLOB) that it seems is not possible to close

2023-06-12 Thread Marco d'Itri
On Jun 12, Lawrence Bayly  wrote:

> FATAL ERROR:
> Can't close(GLOB(0x564e905c3aa0)) filehandle: '' at 
> /usr/lib/usrmerge/convert-usrmerge line 222

This is not an open file but the call to ldd, the default error message 
is stupid.
Please report the output and exit status of "ldd /bin/cp".

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1037257: is 5 years out of date, has warnings

2023-06-09 Thread Marco d'Itri
Package: python3-junos-eznc
Version: 2.1.7-5
Severity: normal

2.1.7 was released in 2017.

Running a playbook which depends on this package makes Ansible emit
these warning:

/usr/lib/python3/dist-packages/jnpr/junos/device.py:838: SyntaxWarning: "is 
not" with a literal. Did you mean "!="?
  if rpc_rsp_e.text is not None and rpc_rsp_e.text.strip() is not '':
/usr/lib/python3/dist-packages/jnpr/junos/device.py:1222: SyntaxWarning: "is 
not" with a literal. Did you mean "!="?
  if auto_probe is not 0:
/usr/lib/python3/dist-packages/jnpr/junos/rpcmeta.py:145: SyntaxWarning: "is 
not" with a literal. Did you mean "!="?
  if model and filter_xml is None and options.get('format') \
/usr/lib/python3/dist-packages/jnpr/junos/utils/start_shell.py:147: 
SyntaxWarning: "is not" with a literal. Did you mean "!="?
  self.last_ok = got is not ''

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1036920: systemd: please ship a placeholder in /usr/lib/modules-load.d/

2023-05-29 Thread Marco d'Itri
On May 29, Luca Boccassi  wrote:

> Does it matter that much if the empty directory is removed? Next time
> a package shipping a modules-load config is installed it will be just
> re-added, no? Or are there functional issues?
I do not think that it is a big deal if /usr/lib/modules-load.d/ 
disappears from time to time. Local users are expected to install local 
files in /etc/modules-load.d/ anyway.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1034053: segfaulted on quit

2023-05-23 Thread Marco d'Itri
> This happened while/after saving a mailbox on quit.
> Apparently nothing was corrupted.
Again:

warning: Section `.reg-xstate/3368169' in core file too small.
#0  __pthread_kill_implementation (threadid=, 
signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
Download failed: Argomento non valido.  Continuing without source file 
./nptl/./nptl/pthread_kill.c.
44  ./nptl/pthread_kill.c: File o directory non esistente.
(gdb) where
#0  __pthread_kill_implementation (threadid=, 
signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
#1  0x7f765179ad2f in __pthread_kill_internal (signo=6, 
threadid=) at ./nptl/pthread_kill.c:78
#2  0x7f765174bef2 in __GI_raise (sig=sig@entry=6)
at ../sysdeps/posix/raise.c:26
#3  0x7f7651736472 in __GI_abort () at ./stdlib/abort.c:79
#4  0x7f765178f2d0 in __libc_message (action=action@entry=do_abort, 
fmt=fmt@entry=0x7f76518a9459 "%s\n") at ../sysdeps/posix/libc_fatal.c:155
#5  0x7f76517a464a in malloc_printerr (
str=str@entry=0x7f76518ac118 "double free or corruption (out)")
at ./malloc/malloc.c:5660
#6  0x7f76517a66b0 in _int_free (av=0x7f76518e2c60 , 
p=0x7f76518e2d40 , have_lock=, 
have_lock@entry=0) at ./malloc/malloc.c:4584
#7  0x7f76517a8d2f in __GI___libc_free (mem=)
at ./malloc/malloc.c:3385
#8  0x5653d28c5fe1 in safe_free (ptr=0x7f76518e2d60 )
at ../../lib.c:198
#9  0x5653d28ab928 in rfc822_free_address (p=0x5653d4eae8a0)
at ../../rfc822.c:140
#10 0x5653d28c916c in mutt_free_envelope (p=0x5653d4eae880)
at ../../muttlib.c:875
#11 0x5653d28c95a7 in mutt_free_body (p=0x5653d53298d8)
--Type  for more, q to quit, c to continue without paging--c
at ../../muttlib.c:208
#12 0x5653d28c95bc in mutt_free_body (p=0x5653d5329768)
at ../../muttlib.c:211
#13 0x5653d28c9376 in mutt_free_header (h=0x5653d4bd0908)
at ../../muttlib.c:382
#14 0x5653d2891dd1 in mx_fastclose_mailbox (ctx=ctx@entry=0x5653d4d9ada0)
at ../../mx.c:736
#15 0x5653d289288b in mx_close_mailbox (ctx=0x5653d4d9ada0, 
index_hint=index_hint@entry=0x7fffdc35a814) at ../../mx.c:1014
#16 0x5653d2862040 in mutt_index_menu () at ../../curs_main.c:1414
#17 0x5653d2842107 in main (argc=1, argv=0x7fffdc35baa8, 
environ=) at ../../main.c:1400
(gdb) 

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1036523: should not enable non-free-firmware on virtualized systems

2023-05-22 Thread Marco d'Itri
On May 22, Cyril Brulebois  wrote:

> For the record: non-free-firmware can be enabled because (1) the kernel logs
> firmware requests, (2) available hardware matches modalias information, (3)
> CPU matches one with microcode.
> 
> (1) and (2) definitely make sense in a virtualized system as well: you can
> have whatever passthrough configuration to access hardware from the host,
> e.g. some USB Wi-Fi adapter (that's how I've tested many changes before
> switching to baremetal for final tests).
Fair enough: if somebody is exposing the hardware devices to the guest 
OS then they can surely deal with the consequences.

> > microcode packages should not be installed on virtualized systems because
> > guests never have the privileges required to update the CPU microcode.
> > Otherwise guests could influence the whole system and possibly undermine 
> > its security.
> Is that true for absolutely all virtualization systems detected by the file
> linked to above? Your latest message on IRC suggests we might have to pick
> and choose?
Did it? I am not aware of any scenario in which it would make sense for 
an hypervisor to allow guests to change the CPU microcode.

I am not familiar with HyperV, but from what I remember from the my Xen 
times the dom0 is for most practical purposes the host, not a guest, so 
I am not sure that it is useful al all to report it do d-i as 
a virtualized environment.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1036523: should not enable non-free-firmware on virtualized systems

2023-05-21 Thread Marco d'Itri
Source: hw-detect
Version: 1.155
Severity: normal
Tags: d-i

When bookworm is installed on a virtualized system, the non-free-firmware 
component will be enabled even if this is not needed: firmwares cannot 
be loaded on virtualized systems because guests usually lack direct 
access to the hardware.

As a workaround I had to preseed:

  d-i hw-detect/firmware-lookup string never

As discussed on IRC with kibi, this is caused by hw-detect trying to 
install the microcode packages. This is the relevant code:

https://salsa.debian.org/installer-team/hw-detect/-/blob/master/hw-detect.post-base-installer.d/50install-firmware#L51
https://salsa.debian.org/installer-team/hw-detect/-/blob/master/hw-detect.finish-install.d/08hw-detect

microcode packages should not be installed on virtualized systems 
because guests never have the privileges required to update the CPU 
microcode.
Otherwise guests could influence the whole system and possibly undermine 
its security.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1035673: unblock: whois/5.5.17

2023-05-07 Thread Marco d'Itri
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: wh...@packages.debian.org
Control: affects -1 + src:whois

Please unblock package whois

It contains a few database updates.



unblock whois/5.5.17



diff --git a/debian/changelog b/debian/changelog
index 741c74a..13123bc 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,14 @@
+whois (5.5.17) unstable; urgency=medium
+
+  [ Robert Scheck ]
+  * Added the .cd TLD server.
+  * Updated the -kg NIC handles server name.
+
+  [ Marco d'Itri ]
+  * Removed 2 new gTLDs which are no longer active.
+
+ -- Marco d'Itri   Wed, 03 May 2023 14:24:37 +0200
+
 whois (5.5.16) unstable; urgency=medium
 
   * Add bash completion support, courtesy of Ville Skyttä.
diff --git a/new_gtlds_list b/new_gtlds_list
index 760c79f..12ff5b8 100644
--- a/new_gtlds_list
+++ b/new_gtlds_list
@@ -573,7 +573,6 @@ lilly
 limited
 limo
 lincoln
-linde
 link
 lipsy
 live
@@ -596,7 +595,6 @@ ltda
 lundbeck
 luxe
 luxury
-macys
 madrid
 maif
 maison
diff --git a/nic_handles_list b/nic_handles_list
index 870ebd6..3fae1dd 100644
--- a/nic_handles_list
+++ b/nic_handles_list
@@ -8,7 +8,7 @@
 -dkwhois.dk-hostmaster.dk
 -ilwhois.isoc.org.il
 -iswhois.isnic.is
--kgwhois.domain.kg
+-kgwhois.kg
 -coop  whois.nic.coop
 -frnic whois.nic.fr
 -lrms  whois.afilias.info
diff --git a/servers_charset_list b/servers_charset_list
index cc81a38..fa85e4e 100644
--- a/servers_charset_list
+++ b/servers_charset_list
@@ -38,7 +38,7 @@ whois.isnic.isiso-8859-1
 whois.nic.it   utf-8
 whois.jprs.jp  iso-2022-jp
 whois.nic.ad.jpiso-2022-jp
-whois.domain.kgcp1251
+whois.kg   cp1251
 whois.nic.or.krutf-8
 whois.kr   utf-8
 whois.nic.kz   utf-8
diff --git a/tld_serv_list b/tld_serv_list
index 948f005..cb480da 100644
--- a/tld_serv_list
+++ b/tld_serv_list
@@ -113,7 +113,7 @@
 .co.ca whois.co.ca
 .cawhois.cira.ca
 .ccVERISIGN ccwhois.verisign-grs.com
-.cdNONE
+.cdwhois.nic.cd
 .cfNONE
 .cgNONE# www.nic.cg
 .chwhois.nic.ch

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1035672: unblock: inn2/2.7.1-1

2023-05-07 Thread Marco d'Itri
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: i...@packages.debian.org
Control: affects -1 + src:inn2

Please unblock package inn2

This is the diff betwwen 2.7.1 RC1 and 2.7.1.
It contains many documentation fixes, small fixes to pullnews and 
a significant for ovsqlite-util.
It also adds a versioned Breaks on manpages-dev which fixes the RC bug 
#1035098.

The 2.7.1 package is being used in production on one of my news servers.

Follows the git diff between debian/2.7.1_20230322-1 and debian/2.7.1-1,
abridged of whitespace and documentation changes.
The full changelog can be consulted at
https://salsa.debian.org/md/inn2/-/commits/master .

The package has a fairly decent autopkgtest but it currently cannot work 
on the Debian infrastructure, because the workers do not have valid 
hostnames. I will find a solution after the release, so please bear with 
me once more. :-)


unblock inn2/2.7.1-1



diff --git a/Makefile.global.in b/Makefile.global.in
index db42dee2e..3a84f23e7 100644
--- a/Makefile.global.in
+++ b/Makefile.global.in
@@ -20,7 +20,7 @@
 ##  be complying with the NNTP protocol.
 
 VERSION= 2.7.1
-VERSION_EXTRA  = rc1 version
+VERSION_EXTRA  =
 
 ##  The absolute path to the top of the build directory, used to find the
 ##  libraries built as part of INN.  Using relative paths confuses libtool
diff --git a/backends/news2mail.in b/backends/news2mail.in
index bef6ca86a..952cf4610 100644
--- a/backends/news2mail.in
+++ b/backends/news2mail.in
@@ -104,9 +104,15 @@ sub mailto {
 my ($t, $s, @a) = @_;
 
 my $sendmail = $INN::Config::mta;
+# Remove %s and -f from the mta command line (we'll explicitly set
+# recipients and an envelope sender below).
+# Remove -oem as we'll set -oee so that sendmail exits with a
+# non-zero status only if the mail cannot be sent.
 $sendmail =~ s!\s*%s!!;
+$sendmail =~ s!(^|\s+)-f\s*\S*!!;
+$sendmail =~ s!(^|\s+)-oem!!;
 my @command = (
-split(' ', $sendmail), '-ee', '-odq', "-f$s",
+split(' ', $sendmail), '-oee', '-odq', "-f$s",
 "-pNNTP:$INN::Config::pathhost", @a
 );
 
diff --git a/debian/changelog b/debian/changelog
index eff319e64..eeaf10caa 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+inn2 (2.7.1-1) unstable; urgency=medium
+
+  * New upstream release.
+  * Breaks manpages-dev << 6.03-2 to make upgrades smoother, because of
+file(3) and list(3) removed from inn2-dev 2.6.5-1. (Closes: #1035098)
+
+ -- Marco d'Itri   Mon, 01 May 2023 19:25:42 +0200
+
 inn2 (2.7.1~20230322-1) unstable; urgency=medium
 
   * New release candidate 1 of the stable branch.
diff --git a/debian/control b/debian/control
index 93d37618c..8d7089372 100644
--- a/debian/control
+++ b/debian/control
@@ -63,6 +63,7 @@ Package: inn2-dev
 Section: devel
 Architecture: any
 Depends: ${misc:Depends}
+Breaks: manpages-dev (<< 6.03-2)
 Conflicts: inn
 Description: libinn.a library, headers and man pages
  You will only need this if you are going to compile programs that
diff --git a/frontends/pullnews.in b/frontends/pullnews.in
index b21ce29b4..0d8809cec 100644
--- a/frontends/pullnews.in
+++ b/frontends/pullnews.in
@@ -100,6 +100,7 @@ my $defaultRetryTime = 1;
 my $defaultProgressWidth = 50;
 my $defaultMaxArts;
 my $lockfile;
+my $runEndBlock = 0;
 
 # Check whether pullnews is run inside INN.
 my $use_inn_shlock = 0;
@@ -120,6 +121,8 @@ if (not $use_inn_shlock) {
 }
 
 END {
+return unless $runEndBlock;
+
 # In case we bail out, while holding a lock.
 if ($use_inn_shlock) {
 INN::Utils::Shlock::releaselocks();
@@ -423,7 +426,7 @@ if ($use_inn_shlock) {
 INN::Utils::Shlock::lock($lockfile)
   or die "cannot create lockfile $lockfile\n";
 } else {
-sysopen(LOCK, "$lockfile", O_RDWR | O_CREAT, 0700)
+sysopen(LOCK, "$lockfile", O_RDWR | O_CREAT, 0644)
   or die "cannot create lockfile $lockfile: $!\n";
 $oldfh = select;
 select LOCK;
@@ -439,6 +442,9 @@ if ($use_inn_shlock) {
 
 print LOCK "$$\n";
 }
+# Now that a lock file has been created, ensure we release it when this process
+# ends or is stopped.
+$runEndBlock = 1;
 
 print LOG scalar(localtime(time)), " start\n\n" unless $quiet;
 
@@ -554,6 +560,7 @@ if (not $quiet and not $quietness) {
 }
 
 my $connectionAttempts = 0;
+my %groupsStarted = ();
 
 UPSTREAM:
 foreach my $server (@servers) {
@@ -683,6 +690,7 @@ foreach my $server (@servers) {
 } continue {
 # Reinitialize the counter for the next server.
 $connectionAttempts = 0;
+%groupsStarted = ();
 }
 
 saveConfig();
@@ -768,7 +776,8 @@ sub stats {
 sub saveConfig {
 return if $no_op;
 
-$SIG{INT} = $SIG{QUIT} = 'IGNORE';
+local $SIG{INT} = 'IGNORE';
+local $SIG{QUIT} = 'IGNORE';
 
 open(FILE, ">$groupFile"

Bug#1035390: mirror submission for mirrors.qontinuum.space

2023-05-03 Thread Marco d'Itri
On May 03, Qontinuum  wrote:

> The server is plugged on the ISP's router which is itself linked on fiber
> optics. Why such question?
Because this looks very much like some kind of consumer/small business 
internet service, unsuitable for hosting a public mirror.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1035390: mirror submission for mirrors.qontinuum.space

2023-05-03 Thread Marco d'Itri
On May 03, Qontinuum  wrote:

> It isn't located in a datacenter and it has 1Gbps uplink bandwidth.
Please describe what kind of connectivity.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1035390: mirror submission for mirrors.qontinuum.space

2023-05-02 Thread Marco d'Itri
On May 02, Qontinuum  wrote:

> Country: MC Monaco
> Location: Monaco
> Sponsor: Q Continuum https://qontinuum.space
> Comment: This site replaces debian.qontinuum.space that no longer exist
Can you clarify which data center is hosting this server and how much 
bandwidth is available to it?

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1034958: Consequence of #951598

2023-04-29 Thread Marco d'Itri
On Apr 29, Helge Kreutzmann  wrote:

> Reverse, I believe manpages-dev should declare:
> Breaks:   inn2-dev (<< 2.7.0-1)
> Replaces: inn2-dev (<< 2.7.0-1)
> 
> Is this fine for you?
Yes.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1034958: Consequence of #951598

2023-04-29 Thread Marco d'Itri
Would this work for you? Please let me know ASAP since the hard freeze
is very close.

Package: inn2-dev
Breaks: manpages-dev (<< 6.03-2)

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1034468: unblock: inn2/2.7.1~20230322-1

2023-04-26 Thread Marco d'Itri
On Apr 26, Paul Gevers  wrote:

> PS: have you considered adding a non-superficial autopkgtest to your package
> such that you don't need to wait for us to unblock your package?
Yes, long story. There is actually one but it is not run, because it 
needs to be significantly modified to actually work on our CI 
infrastructure, because inn2 cannot be installed on systems without 
a valid hostname.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1034586: always reports inactive/expired certificate on armhf

2023-04-21 Thread Marco d'Itri
On Apr 21, gs-debian@gluelogic.com wrote:

> I probably should have started with the most basic thing:
> 
> What is the date on your device?
NTP-accurate.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#1034586: always reports inactive/expired certificate on armhf

2023-04-21 Thread Marco d'Itri
On Apr 21, gs-debian@gluelogic.com wrote:

> What your `uname -a` ?
Linux omitted.mi.bofh.it 6.1.0-7-arm64 #1 SMP Debian 6.1.20-2 (2023-04-08) 
aarch64 GNU/Linux

> What is the output of the following for you?
> $ lighttpd -V | grep "Y2038 support"
>   + Y2038 support
Same.

Thank you for your help.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


  1   2   3   4   5   6   7   8   9   10   >