Bug#1003973: Should we pull in fwupd by default for most systems?

2022-01-18 Thread Diederik de Haas
On Tuesday, 18 January 2022 20:13:14 CET Steve McIntyre wrote:
> At the moment, fwupd will only be installed by default on systems
> installed to use a Gnome desktop (checked for Buster, Bullseye and
> Sid).

On Gnome, yes, but not other DE or systems where no DE is installed:
$ apt-cache rdepends fwupd
fwupd
Reverse Depends:
  fwupd-amd64-signed
  fwupd-unsigned
  fwupd-tests
  plasma-discover-backend-fwupd
  gnome-software
  gnome-firmware
  fwupdate

(I removed the duplicates and :arm64 entries from that list)

It's direct dependency list is also rather large and I don't know how to 
retrieve its transitive dependency list, but seeing the following items, I 
expect a LOT of GLib and other Gnome software will be dragged in:
libgusb2, libjson-glib-1.0-0, libpolkit-gobject-1-0

Not a problem on Gnome DE systems as I assume they'll get them anyway, but 
others may not want those.
And then there are the (transitive) recommendations.

> We should probably pull it in and enable it by default for most
> systems (i.e. all desktops and servers) 

For me it's primarily useful on my Thinkpad *laptop* as I'm lucky that Lenovo 
supports fwupd (for Thinkpads (at least?)). 
On my PC/servers I've only gotten an update once for my Logitech Unifying 
Receiver, but most are still on BIOS or hybrid.

When updating my laptop, I always verify that I have a working Live (rescue) 
CD/disk because M$ bootloader usually gets enabled by default, so I have to 
use a Live disk and then through chroot reinstall GRUB, so I can boot into 
Debian again. So for me it's not an entirely smooth experience, which I think 
it should be if enabled for everyone.

> - it's the primary way expected to drive updates to UEFI system firmware
> and the DBX list. 

I really do like the project/initiative btw and I hope many more companies 
will provide their updates through that system.
But it would be a stretch to say that we're there yet (or even close).

> Maybe just for UEFI installations?

I would recommend to at least restrict it to those installations as UEFI seems 
to be assumed (or even required?).

Given the above *I* would not be in favor of installing it for everyone (just 
yet). But I am just one person.

My 0.02

signature.asc
Description: This is a digitally signed message part.


Bug#1003973: Should we pull in fwupd by default for most systems?

2022-01-18 Thread Osmario Avila
How to unsubscribe from this newsletter?


Em ter., 18 de jan. de 2022 às 16:39, Osmario Avila 
escreveu:

> How to unsubscribe from this newsletter?
>
>
> Em ter., 18 de jan. de 2022 às 16:15, Steve McIntyre 
> escreveu:
>
>> Source: tasksel
>> Severity: normal
>> Tags: security
>>
>> Hi,
>>
>> At the moment, fwupd will only be installed by default on systems
>> installed to use a Gnome desktop (checked for Buster, Bullseye and
>> Sid).
>>
>> We should probably pull it in and enable it by default for most
>> systems (i.e. all desktops and servers) - it's the primary way
>> expected to drive updates to UEFI system firmware and the DBX
>> list. Maybe just for UEFI installations?
>>
>> -- System Information:
>> Debian Release: 10.11
>>   APT prefers oldstable-updates
>>   APT policy: (500, 'oldstable-updates'), (500, 'oldstable-debug'), (500,
>> 'oldoldstable'), (500, 'oldstable')
>> Architecture: amd64 (x86_64)
>> Foreign Architectures: i386
>>
>> Kernel: Linux 5.10.0-0.bpo.9-amd64 (SMP w/4 CPU cores)
>> Kernel taint flags: TAINT_CPU_OUT_OF_SPEC
>> Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8),
>> LANGUAGE=en_GB:en (charmap=UTF-8)
>> Shell: /bin/sh linked to /usr/bin/dash
>> Init: systemd (via /run/systemd/system)
>> LSM: AppArmor: enabled
>>
>> -- debconf information excluded
>>
>>


Bug#1003973: Should we pull in fwupd by default for most systems?

2022-01-18 Thread Osmario Avila
How to unsubscribe from this newsletter?


Em ter., 18 de jan. de 2022 às 16:15, Steve McIntyre 
escreveu:

> Source: tasksel
> Severity: normal
> Tags: security
>
> Hi,
>
> At the moment, fwupd will only be installed by default on systems
> installed to use a Gnome desktop (checked for Buster, Bullseye and
> Sid).
>
> We should probably pull it in and enable it by default for most
> systems (i.e. all desktops and servers) - it's the primary way
> expected to drive updates to UEFI system firmware and the DBX
> list. Maybe just for UEFI installations?
>
> -- System Information:
> Debian Release: 10.11
>   APT prefers oldstable-updates
>   APT policy: (500, 'oldstable-updates'), (500, 'oldstable-debug'), (500,
> 'oldoldstable'), (500, 'oldstable')
> Architecture: amd64 (x86_64)
> Foreign Architectures: i386
>
> Kernel: Linux 5.10.0-0.bpo.9-amd64 (SMP w/4 CPU cores)
> Kernel taint flags: TAINT_CPU_OUT_OF_SPEC
> Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8),
> LANGUAGE=en_GB:en (charmap=UTF-8)
> Shell: /bin/sh linked to /usr/bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled
>
> -- debconf information excluded
>
>


Bug#1003973: Should we pull in fwupd by default for most systems?

2022-01-18 Thread Steve McIntyre
Source: tasksel
Severity: normal
Tags: security

Hi,

At the moment, fwupd will only be installed by default on systems
installed to use a Gnome desktop (checked for Buster, Bullseye and
Sid).

We should probably pull it in and enable it by default for most
systems (i.e. all desktops and servers) - it's the primary way
expected to drive updates to UEFI system firmware and the DBX
list. Maybe just for UEFI installations?

-- System Information:
Debian Release: 10.11
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable-debug'), (500, 
'oldoldstable'), (500, 'oldstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-0.bpo.9-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_CPU_OUT_OF_SPEC
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

-- debconf information excluded