Re: Volantino evento traduzioni

2003-12-03 Thread Carlo Contavalli
On Tue, Dec 02, 2003 at 10:24:47AM +0100, Stefano Canepa happily wrote:
 Io vorrei partecipare all'evento e visto che traduco anche per gnome
 rilancer? l'invito nella lista dei traduttori di gnome. Non sono sicuro
Fantastico!

 A Genova ? stato distribuito visto che c'era un banchetto Debian. 
Grazie,

Ciao,
Carlo

-- 
  GPG Fingerprint: 2383 7B14 4D08 53A4 2C1A CA29 9E98 5431 1A68 6975
-
The algorithm to do that is extremely nasty.  You might want to mug
someone with it.
-- M. Devine, Computer Science 340




problem de creation de paquet

2003-12-03 Thread Lam

hola

j'essaye de construire un paquet debian d'une application
dans le repertoire doc, j'ai  2 scripts shell, lorsque je cree l'archi
du paquet, je l'ai retrouve en non executable !

je vois pas pourquoi les permissions changent 

une idee ?

merci

-- 
(concatenate 'string lam (reverse gro.ylimafxut@))




Re: Bug#222730: ITP: zope-groupuserfolder -- group management for Zope

2003-12-03 Thread Andreas Tille
On Tue, 2 Dec 2003 [EMAIL PROTECTED] wrote:

 This package is an empty dummy package that always depends on a package
 built for Debian's default Python version.
Why that.  It should depend from Debian's Zope version or if explicite
Python dependency is needed for one or the other reason it should depend
from the Python version Zope is dependant from.  This is not automatically
the default Python version.

Kind regards

  Andreas.




Re: popularity-contest

2003-12-03 Thread Petter Reinholdtsen
[Gürkan Sengün]
 I could not reach [EMAIL PROTECTED] which is mentioned
 on the following page:
 http://people.debian.org/~apenwarr/popcon/

Are you aware that the popcon project are now on alioth?

URL:https://alioth.debian.org/projects/popcon/

The work stopped up a bit because of the break-in, but we are a small
group maintaining it now.




Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Graham Wilson
On Wed, Dec 03, 2003 at 02:57:11AM +0100, Bernd Eckenfels wrote:
 On Wed, Dec 03, 2003 at 10:54:24AM +1000, Andrew Pollock wrote:
  The only way to have avoided this kernel vulnerability from day-0 of
  discovery/fix release would have been to be constantly upgrading to
  pre-release kernels.
 
 Yes but also the debian servers would not have been vulnerable if they had
 used 2.4.23. At least not at that point in time.

They also would not have been affected if they were running 2.2.x. Why
don't we just downgrade them all, then?

-- 
gram


signature.asc
Description: Digital signature


Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Don Armstrong
On Tue, 02 Dec 2003, Tom wrote:
 Yes but the attacker did not steal the DD's computer.  He rooted it
 remotely.

So the machine is rooted remotely, the DD logs into a debian box even
using our new fangled smart cards, and the attacker still can control
the connection.

In this particular intrusion vector, the use of a smart card merely
means that the attacker has to trojan the ssh binary on the
compromised machine and use it to run a command that opens a shell
under the DD's uid on a non-privledged port, thus circumventing the
smart card in its entirety.

If you log into a machine from a compromised machine using any means I
can forsee today, the attacker can always control the account of the
machine logged into, because the attacker effectively become the user
of the machine.


Don Armstrong

-- 
Tell me something interesting about yourself.
Lie if you have to.
 -- hugh macleod http://www.gapingvoid.com/archives/batch20.php

http://www.donarmstrong.com
http://www.anylevel.com
http://rzlab.ucr.edu


signature.asc
Description: Digital signature


Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 12:20:59AM -0800, Don Armstrong wrote:
 On Tue, 02 Dec 2003, Tom wrote:
  Yes but the attacker did not steal the DD's computer.  He rooted it
  remotely.
 
 So the machine is rooted remotely, the DD logs into a debian box even
 using our new fangled smart cards, and the attacker still can control
 the connection.

Not while the smart card isn't inserted.

 
 In this particular intrusion vector, the use of a smart card merely
 means that the attacker has to trojan the ssh binary on the
 compromised machine and use it to run a command that opens a shell
 under the DD's uid on a non-privledged port, thus circumventing the
 smart card in its entirety.

I don't understand this objection, but it seems valid.  Could you 
explain?

 
 If you log into a machine from a compromised machine using any means I
 can forsee today, the attacker can always control the account of the
 machine logged into, because the attacker effectively become the user
 of the machine.
 

Yes, I always warned my employer that all I have to do is own your 
machine before you plug in your smart card, leave a logic bomb to do 
something while you're connected, wait for you to hang up and then 
report back.

But it's all layers, layers, layers.  More layers = better, none is a 
panacea.  Have you ever used smartcards?  I think that the more layers 
the better.




Re: [debian-devel] Re: more details on the recent compromise of debian.org machines

2003-12-03 Thread Magosnyi rpd
A levelezm azt hiszi, hogy Matt Zimmerman a kvetkezeket rta:
 On Fri, Nov 28, 2003 at 10:08:45AM +0100, Bernd Eckenfels wrote:
 
  In the final announcement I would add also a statement about reducing the
  number of trust relations between the machines and perhaps limiting shell
  access.
 
 It seems fairly clear that this was not an issue because the compromised
 user had accounts on all of the relevant systems.

It occurs to me that
-limiting shell access did save one machine for some time
-this machine had been compromised using a trust relationship
between it and an other compromized debian machine

The question (as ever):
What is the good balance between security (limiting access
and trust relationship in this case), and efficiency of processes
(debian developers' work in this case)?

I demand that the above may or may not mean that trust relationships
and shell access should be restricted, but certainly means that the
possibility and impacts of such measures should be thought about.

-- 
GNU GPL: csak tiszta forrsbl




Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Don Armstrong
[NB: I wanted to take this OT discussion off [EMAIL PROTECTED] and into private
mail, but your e-mail address was munged in some sort of anti-spam
measure, and not trivially un-mungeable. Please consider providing
information on how to demunge it in some X- header, or not using
munging at all.]

On Wed, 03 Dec 2003, Tom wrote:
 On Wed, Dec 03, 2003 at 12:20:59AM -0800, Don Armstrong wrote:
 the attacker still can control the connection.
 
 Not while the smart card isn't inserted.

Well, the DD can't log in without the smart card, so that's clearly a
prerequisite.

 the use of a smart card merely means that the attacker has to trojan
 the ssh binary on the compromised machine and use it to run a command
 that opens a shell under the DD's uid on a non-privledged port, thus
 circumventing the smart card in its entirety.
 
 I don't understand this objection, but it seems valid.  Could you 
 explain?

If you have adjusted ssh, you don't need to show the compromised
user the output of all the commands that are being run on the other
end of the connection.

 Have you ever used smartcards? 

Unfortunatly, yes.

 I think that the more layers the better.

Sure, I'm just saying that the cost to put  1000 smart cards with the
requisite hardware in all of the places that DD's log in from doesn't
give us enough extra security to merit the extra cost. Of course, if
someone was to design such a system, work all of the bugs out, and get
a hardware vendor to deploy it to DD's, I wouldn't stand in the way.

[I would personally rather see paired random number generators than
smart cards, but we're a bit too spread out for that to be much of a
reality.]


Don Armstrong

-- 
You could say she lived on the edge... Well, maybe not exactly on the edge,
just close enough to watch other people fall off.
  -- hugh macleod http://www.gapingvoid.com/batch8.htm

http://www.donarmstrong.com
http://www.anylevel.com
http://rzlab.ucr.edu


signature.asc
Description: Digital signature


Re: UserLinux white paper

2003-12-03 Thread Cameron Patrick
On Wed, Dec 03, 2003 at 08:24:09AM +0100, Bernd Eckenfels wrote:

|  This is the Proprietary software model, with artificial, government
|  imposed (via copyright laws) monopolies, resulting in customer lock-in
|  and price maximization.
| 
| I dont see a monopol, at least no government imposed.

I believe that when Zenaan was saying was the copyright laws /are/ a
government-supported monopoly on distributing a particular creative work
(in this case, a piece of proprietary software).

Cameron.




Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 01:03:16AM -0800, Don Armstrong wrote:
 [NB: I wanted to take this OT discussion off [EMAIL PROTECTED] and into 
 private
 mail, but your e-mail address was munged in some sort of anti-spam
 measure, and not trivially un-mungeable. Please consider providing
 information on how to demunge it in some X- header, or not using
 munging at all.]

Heh.  That's my actual email address.  Fooled ya.

 Well, the DD can't log in without the smart card, so that's clearly a
 prerequisite.

You leave it unplugged until you need it, do your thing, then unplug it.

Sure, I could still infect your toolchain so you unwittingly upload 
trojaned stuff.  But the fact is in this *actual* compromise the 
password was stolen and the hacker worked later at his leisure:
smartcards would have prevented this *actual* incident (but of course 
doesn't prohibit other ways of attack).

If something could have prevented something that actually happened, I 
say go for it.




Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 01:16:39AM -0800, Tom wrote:
 
 If something could have prevented something that actually happened, I 
 say go for it.

Oh, one last thing: each DD should pay for the device him/her self and 
should be required to fly to meet wherever they can pick them up.  Why 
do you assume somebody has to pay for everything?  What's wrong with 
bearing some of the costs yourself?  This is a big deal.




Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Artur R. Czechowski
On Wed, Dec 03, 2003 at 02:00:51PM +1100, Russell Coker wrote:
 I agree that smartcards would help a lot.  However as has been previously 
 suggested the cost of 1200+ smart-card readers is probably prohibitive.
What about RSA tokens? This solution does not require any special hardware
to connect on the client side.

Cheers
Artur




Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Don Armstrong
On Wed, 03 Dec 2003, Tom wrote:
 each DD should pay for the device him/her self and should be required
 to fly to meet wherever they can pick them up.  Why do you assume
 somebody has to pay for everything?  What's wrong with bearing some
 of the costs yourself?

Could it possibly be because equipment is expensive and plane flights
around the planet are not cheap?

I know few DDs who are independently wealthy, and frankly, requiring
volunteers to spend large amounts of money so they can volunteer their
time isn't something that we should be doing, nor do I really see the
project as a whole supporting such an action.

Please feel free to produce code and take action to prove me wrong
though.


Don Armstrong

-- 
UF: What's your favourite coffee blend?
PD: Dark Crude with heavy water. You are understandink? If geiger
counter does not click, the coffee, she is just not thick.

http://www.donarmstrong.com
http://www.anylevel.com
http://rzlab.ucr.edu


signature.asc
Description: Digital signature


Re: [custom] Debian Enterprise - packages

2003-12-03 Thread Andreas Tille
On Tue, 2 Dec 2003, John Goerzen wrote:

 First of all.  This is obviously not a Debian projects
I see it clearly as Debian project and can't find the rationale why
you sais that it is _obviousely_ not.
 (since it is not operating within the Debian framework.)
Why.
If I see this right Zenaan is planning the depandencies for the meta packages
he wants to build.  As long as there is no debian-enterprise list created
he has no other chance than using debian-devel to discuss this topics.
It was the same for Debian-Jr, Debian-Med, etc and nobody thought that
this whould not fit into Debian framework.

 I don't see why this then
 necessitates over a dozen threads on debian-devel -- AND why it gets to
 call itself Debian.  Moreover, I remain unconvinced that there is any
 need to split from the regular Debian framework, especially since it
 seems that all you're doing is removing choices.
... or rather giving suggestions, what might fit well into Enterprise
framework as we did fro children in Debian-Jr.

 (Though I admit I
 killfiled the earlier threads on the topic because they were too
 unwieldy)  Anyway:
Perhaps this is the reason.

 On Wed, Dec 03, 2003 at 02:45:51PM +1100, Zenaan Harkness wrote:
  * Office Suite - OpenOffice (there's no other near as feature complete)

 And OpenOffice is the only one that runs on only two -- yes, two --
 architectures that Debian supports.
Which is a problem for Debian and not for Debian-Enterprise or any other
Custom Debian Distribution.

  * Scripting Language - Python (no one will debate this one :)

 If you think you can get every large enterprise worldwide to standardize
 on a single scripting language -- much less get even ONE to do that --
 then you will surely be nominated for several nobel prizes.
:)
This is the only part of your mail I do completely agree with.

Kind regards

  Andreas.




Re: [custom] The term flavor and encouraging work on Debian

2003-12-03 Thread Andreas Tille
On Wed, 3 Dec 2003, Fabian Fagerholm wrote:

 In my view (as I said), it would be logical to name a further
 subdivision of that product flavor.
I like this interpretation of the term flavor and it would be easily applicable
for Debian-Med to flavors like:

- Medical practice
- Medical research
- Microbiology
- Dental practice
- Veterinary medicine
- ...

 Ok. Semantics, of course, but that's what's being discussed here. :)
 I just think Custom Debian Distribution is not a very innovative
 phrase, it is too general to instantly give someone an idea of what it's
 about, and on top of all, it's quite long.
ACK.  That's why other people invented terms like Fedora.  It just
says nothing and so int can't cause false implications.  It has to be
defined precisely before it is a term to work with.

Kind regards

 Andreas.




Re: [custom] The term flavor and encouraging work on Debian

2003-12-03 Thread Andreas Tille
On Tue, 2 Dec 2003, Fabian Fagerholm wrote:

 Actually, I'd like to see the term Custom Debian Distribution be set
 aside because a custom something is created each time someone modifies
 an original. Debian Enterprise certainly is an original. By the time a
 capable sysadmin has installed it, it will (probably) be custom.
 (Custom Custom Debian Distribution, anyone ?)

 The term suggests that the distribution is not-Debian, which is
 unneccessary and confusing.
As non native speaker and also in general I try to avoid joining stupid
naming discussions.  But here is the weak part of the name we have choosen
which has definitely to be clarified in an announcement of those people
who invented the term.

Kind regards

   Andreas.




Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote:
 On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote:
  Joey Hess [EMAIL PROTECTED] wrote:
   Goswin von Brederlow wrote:
dpkg that it is downgrading the package, and a clever attacker might
avoid even that.
 
   How would you avoid it?
 
   Make the replacement package really be a different package entirely, of
   a higher version than the package it purports to replace.
 
   I think aj had some more examples along these lines the last time this
   came up.
 
  I still don't understand how you change the version number (or the
  package-name) without breaking the signature.
 
 You change the contents of the compromised Packages file, so that 
 
 Package: bash
 Essential: yes
 Priority: required
 Section: base
 Architecture: i386
 Version: 2.05b-12
 
 is accompanied by
 
 Filename: pool/main/b/bash/vulnerable-ident-server_1.0-1_i386.deb

that information is already embedded in the .deb. Try dpkg --control
foo.deb; cd DEBIAN; ls.

apt should sanity-check whether that information matches the information
it already has (from, e.g., the Packages file). If not, it should scream
as loud as possible.

-- 
Wouter Verhelst
Debian GNU/Linux -- http://www.debian.org
Nederlandstalige Linux-documentatie -- http://nl.linux.org
Stop breathing down my neck. My breathing is merely a simulation.
So is my neck, stop it anyway!
  -- Voyager's EMH versus the Prometheus' EMH, stardate 51462.


signature.asc
Description: Digital signature


Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote:
 Hi, Henrique de Moraes Holschuh wrote:
 
  On Tue, 02 Dec 2003, Wouter Verhelst wrote:
  So unless you have a suggestion that would solve this particular issue,
  I'm afraid this idea won't work in practice.
  
  We could verify if the gpg agent (gpa? I forget the name...) cannot do this
  over a secure channel. It should be able to, and if not, it can probably be
  taught to.
 
 It's not that easy (basically you need to tunnel the actual
 encryprion/signing function, not just the passphrase-getting).
 See ssh-agent as an example.
 
 The good thing is that people are already thinking about this.
 
 http://lists.gnupg.org/pipermail/gnupg-users/2003-April/017920.html

Well, implemented as Werner suggests in that message would require me to
send the actual .deb over the line. I won't do that, since I don't have
the bandwidth (or, in many cases, the time to wait for the download to
finish; arrakis runs behind an ADSL line, while quickstep behind my
cable modem. upstream speeds aren't that fast (and I regularly handle
their mails at work)).

As I understand it, an OpenPGP signature is an encrypted hash or
something similar of the actual data. It would be feasible if the
signature algorithm would allow for hashing the data on the remote
machine, and signing that hash locally.

Then again, we could do such things right now. Wouldn't it be more
interesting to gpg-sign md5sums of control.tar.gz and data.tar.gz?
Especially in the case of larger .debs, that would probably reduce the
actual signature size as well...

-- 
Wouter Verhelst
Debian GNU/Linux -- http://www.debian.org
Nederlandstalige Linux-documentatie -- http://nl.linux.org
Stop breathing down my neck. My breathing is merely a simulation.
So is my neck, stop it anyway!
  -- Voyager's EMH versus the Prometheus' EMH, stardate 51462.


signature.asc
Description: Digital signature


Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Russell Coker
On Wed, 3 Dec 2003 20:34, Artur R. Czechowski [EMAIL PROTECTED] wrote:
 On Wed, Dec 03, 2003 at 02:00:51PM +1100, Russell Coker wrote:
  I agree that smartcards would help a lot.  However as has been previously
  suggested the cost of 1200+ smart-card readers is probably prohibitive.

 What about RSA tokens? This solution does not require any special hardware
 to connect on the client side.

What is a RSA token?

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Wed, Dec 03, 2003 at 06:50:09AM +0100, Goswin von Brederlow wrote:
 Bernd Eckenfels [EMAIL PROTECTED] writes:
  How often has this person glance over the results? As I understand debian
  build daemons run unattended and build continously. Correct me when I am 
  wrong here.
  
  But if I asume righ, I dont want to lose that processing speed, especially
  since it can be easyly compensated with 3rd party timestamps.
 
 In theory every build log is read. In praxis I believe all buildd
 admins scroll through the log and look for some obvious signs of
 errors before signing. I don't expect them to read a 17 MB logfile
 line by line for example.

Well, actually...

All failed logs are examined to find the cause of the failure and to
decide on further action.

All successful logs get their .changes extracted, signed, and mailed
back. This is often done semi-automatically; in my case, this script is
used:

#!/bin/bash
cat $1  ~/buildd/orig
cat $1 | sed -e '9,/\.changes\:$/d' -e '/^\*/,$d'  ~/buildd/changes
cat ~/buildd/changes  $1

together with some mutt hooks that allow me to just hit ryd for as
many successful logs in my mailbox (and my gpg passphrase on the first
one). IOW, I don't really look at successful messages anymore; if a
build succeeds, it is assumed to be OK (which is why running regression
tests at deb build time is a good idea, and should be done if at all
possible).

They do run mostly unattended, and do build continuously; it's just so
that as-of-yet unsigned packages are put in ~buildd/build instead of
~buildd/upload (they're moved once the signed .changes arrives by mail)

 But even without reading having an actual person handling the signing
 has advantages. In case a buildd is compromised the signing still
 isn't. The attacker can't start and upload 500 backdoor packages
 pretending to be something else without raising red flags.  Also
 failures in the buildd behaviour have to be cought, like building
 empty debs all of a sudden. A quick glance at the package contents
 listed in the build log will detect that.

Even considering the above, this is still true. We keep an eye on our
systems; maintaining an autobuilder is more than just handling its logs.

I regularly have to log in to both machines to fix some issue (once
every week at least); if something weird is going on, I'll find out
then. Also, I get logs of all sorts mailed back on a daily and weekly
basis. Those logs I do examine conspiciously.

-- 
Wouter Verhelst
Debian GNU/Linux -- http://www.debian.org
Nederlandstalige Linux-documentatie -- http://nl.linux.org
Stop breathing down my neck. My breathing is merely a simulation.
So is my neck, stop it anyway!
  -- Voyager's EMH versus the Prometheus' EMH, stardate 51462.


signature.asc
Description: Digital signature


Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Artur R. Czechowski
On Wed, Dec 03, 2003 at 09:49:21PM +1100, Russell Coker wrote:
 On Wed, 3 Dec 2003 20:34, Artur R. Czechowski [EMAIL PROTECTED] wrote:
  On Wed, Dec 03, 2003 at 02:00:51PM +1100, Russell Coker wrote:
   I agree that smartcards would help a lot.  However as has been previously
   suggested the cost of 1200+ smart-card readers is probably prohibitive.
  What about RSA tokens? This solution does not require any special hardware
  to connect on the client side.
 What is a RSA token?
Device used in some internet banks. You have a device, which has only
chipset, digital pad with on/off switch and display, all embedded in small
case. Authentication is made using C/R algorithm: you receive a number
from system, enter it into token, chipset signs it using stored RSA key, you
get a number from display and use is as a password. 

Cheers
Artur
-- 
[...] jestem wredna, elazna mapa
/Croolik/




Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Wouter Verhelst
On Tue, Dec 02, 2003 at 05:19:22PM -0800, Tom wrote:
 On Wed, Dec 03, 2003 at 10:54:24AM +1000, Andrew Pollock wrote:
  On Wed, Dec 03, 2003 at 11:17:19AM +1100, Russell Coker wrote:
 
  
  The only way to have avoided this kernel vulnerability from day-0 of
  discovery/fix release would have been to be constantly upgrading to
  pre-release kernels.
  
  I'm starting to sound like I'm trolling for closed-source development models
  or something, which is not the case,
 
 Smartcards would have avoided the Debian compromise: merely having a 
 compromised DD box would have prevented bad guy from getting on the box.

Perhaps. But smartcards have a significant problem in a project such as
Debian:

Are you going to pay for all those smartcards plus their readers?
Including any smartcards for possible future DD's?

If not, I suggest we forget about this, as it won't be feasible.

-- 
Wouter Verhelst
Debian GNU/Linux -- http://www.debian.org
Nederlandstalige Linux-documentatie -- http://nl.linux.org
Stop breathing down my neck. My breathing is merely a simulation.
So is my neck, stop it anyway!
  -- Voyager's EMH versus the Prometheus' EMH, stardate 51462.


signature.asc
Description: Digital signature


Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 12:06:33PM +0100, Artur R. Czechowski wrote:
  What is a RSA token?
 Device used in some internet banks. You have a device, which has only
 chipset, digital pad with on/off switch and display, all embedded in small
 case. Authentication is made using C/R algorithm: you receive a number
 from system, enter it into token, chipset signs it using stored RSA key, you
 get a number from display and use is as a password. 

Yeah, these are good: they're cheap and I think it would have been 
effective at preventing this particular incident.  That's an excellent 
idea.




The term Custom Debian Distribution (Was Re: [custom] The term flavor and encouraging work on Debian)

2003-12-03 Thread Fabian Fagerholm
On Wed, 2003-12-03 at 12:17, Andreas Tille wrote:
 On Tue, 2 Dec 2003, Fabian Fagerholm wrote:
  The term suggests that the distribution is not-Debian, which is
  unneccessary and confusing.

 As non native speaker and also in general I try to avoid joining stupid
 naming discussions.  But here is the weak part of the name we have choosen
 which has definitely to be clarified in an announcement of those people
 who invented the term.

If some of the people who participated in the Debcamp Custom
Distribution BOF (see
http://www.debian.org/devel/debian-nonprofit/News/2003/20030717) are
listening, perhaps you could elaborate? (Cc'ing Mako Hill since he was
referenced as one of the driving forces behind the meeting.)

It might be hard, impossible and undesirable to reverse the decision to
use the term. I think the term can be correctly understood if you
present it as I have in some recent postings to this list:

Debian is the super-project.
XYZ is a Debian subproject
that produces a Custom Debian Distribution
with the flavors A, B and C.

A subproject is easily understood: it's an organisational structure.
Basically, it's a group of people working on a subset of Debian. They
coordinate via a web site and in some cases have a special mailing list.

Some subprojects create Custom Debian Distributions for their particular
area of interest. Upon installation of the Custom Debian Distribution,
you can select between a number of flavors that set some defaults to
suit a particular use.

More ideas? Perhaps some of this could be intergrated into the Debian
Subproject Howto as soon as some degree of consensus has been reached.
(I can't find it right now with people.d.o being inaccessible.)
-- 
Fabian Fagerholm [EMAIL PROTECTED]


signature.asc
Description: This is a digitally signed message part


Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 12:10:28PM +0100, Wouter Verhelst wrote:
 
 Are you going to pay for all those smartcards plus their readers?
 Including any smartcards for possible future DD's?
 
 If not, I suggest we forget about this, as it won't be feasible.

I don't think the USB models cost that much (maybe $50-$100 ea. in 
bulk).  My badge at Microsoft was my smart card.  The devs themselves 
could pay part of the cost, with perhaps partial donations from a 
corporate sponsor.  I think even a college student could find $50 for 
this.

The other guys suggestion about RSA tokens was better.  I think they are 
probably only $15-$25, because they don't connect to your PC.

Anyway, feel free to forget about it.  It was just a suggestion.




Re: Revival of the signed debs discussion

2003-12-03 Thread Matthias Urlichs
Hi,

[ I'm Cc-ing Werner Koch on this ]

Wouter Verhelst:
 On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote:
  Hi, Henrique de Moraes Holschuh wrote:
  
   On Tue, 02 Dec 2003, Wouter Verhelst wrote:
   So unless you have a suggestion that would solve this particular issue,
   I'm afraid this idea won't work in practice.
   
   We could verify if the gpg agent (gpa? I forget the name...) cannot do 
   this
   over a secure channel. It should be able to, and if not, it can probably 
   be
   taught to.
  
  It's not that easy (basically you need to tunnel the actual
  encryprion/signing function, not just the passphrase-getting).
  See ssh-agent as an example.
  
  The good thing is that people are already thinking about this.
  
  http://lists.gnupg.org/pipermail/gnupg-users/2003-April/017920.html
 
 Well, implemented as Werner suggests in that message would require me to
 send the actual .deb over the line. I won't do that,

... and it doesn't make sense, since ...

 As I understand it, an OpenPGP signature is an encrypted hash or
 something similar of the actual data. It would be feasible if the
 signature algorithm would allow for hashing the data on the remote
 machine, and signing that hash locally.
 
... that would work. It'd probably require a few hooks within GPG
to generate a hash packet / .

 Then again, we could do such things right now. Wouldn't it be more
 interesting to gpg-sign md5sums of control.tar.gz and data.tar.gz?

That makes a lot of sense; you can then compare md5sums independently.
You can't directly compare detached signatures: they're timestamped and
contain random data, AFAIK.

Still, sending the to-be-signed file across the wire doesn't make sense.

 Especially in the case of larger .debs, that would probably reduce the
 actual signature size as well...

?? A hash is a hash, and should be independent of file size.

-- 
Matthias Urlichs   |   {M:U} IT Design @ m-u-it.de   |  [EMAIL PROTECTED]
Disclaimer: The quote was selected randomly. Really. | http://smurf.noris.de
 - -
REAL PROGRAMMERS don't write in Pascal, Mesa, Ada or any of those other pinko
  computer science languages. Strong typing is for people with weak memories.




Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Hamish Moffatt
On Wed, Dec 03, 2003 at 12:06:33PM +0100, Artur R. Czechowski wrote:
  What is a RSA token?
 Device used in some internet banks. You have a device, which has only
 chipset, digital pad with on/off switch and display, all embedded in small
 case. Authentication is made using C/R algorithm: you receive a number
 from system, enter it into token, chipset signs it using stored RSA key, you
 get a number from display and use is as a password. 

The RSA SecurID tokens are a bit smarter than that; the output for a
given input changes every minute. My employer uses them for remote
access to their intranet; you have a fixed pin number which you enter
into the card to get this minute's (6 digit) password. No reason why the
pin would have to be fixed though.

I have no idea what they cost. Also the newest ones are not exactly fit
for carrying around in your wallet. They last 3 years on internal
batteries.

Hamish
-- 
Hamish Moffatt VK3SB [EMAIL PROTECTED] [EMAIL PROTECTED]




Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Wed, Dec 03, 2003 at 12:08:10PM +0100, Matthias Urlichs wrote:
 Wouter Verhelst:
  Especially in the case of larger .debs, that would probably reduce the
  actual signature size as well...
 
 ?? A hash is a hash, and should be independent of file size.

Obviously, sorry. I don't know how I got that idea :)

-- 
Wouter Verhelst
Debian GNU/Linux -- http://www.debian.org
Nederlandstalige Linux-documentatie -- http://nl.linux.org
Stop breathing down my neck. My breathing is merely a simulation.
So is my neck, stop it anyway!
  -- Voyager's EMH versus the Prometheus' EMH, stardate 51462.


signature.asc
Description: Digital signature


Re: configuring lilo on package installation

2003-12-03 Thread Javier Fernndez-Sanguino Pea

On Sun, Nov 23, 2003 at 06:19:39PM +0100, Tobias Grimm wrote:
 Hi!
 
 I'm working on a nvram-wakeup package for a Debian based VDR 
 distribution (c't vdr). nvram-wakeup needs a special kernel-image, that 
 forces a shutdown on the next reboot. Normally this image is installed 
 to /boot and a new section has to be added to lilo.conf:
 
 image  = /boot/bzImage.poweroff
 label  = PowerOff
 
 It wouldn't be a problem to modify the lilo.conf in the maintainer 
 script, but I'm not sure if this is the way this should be done.

Yes it is, it's a policy violation.

 
 What's the best way to add a section to the lilo.conf during package 
 installation (and remove it when uninstalling)?

If the lilo manager does not provide a script to manage lilo.conf, or does
not provide a way to hook things into it (the answer to both question is,
I believe, that it doesn't), IMHO you can only add a debconf note telling
the admin what he needs to do in order to enable the package.

Regards

Javi


signature.asc
Description: Digital signature


Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-03 Thread Bernhard R. Link
* Chad Walstrom [EMAIL PROTECTED] [031202 18:14]:
 I'm not following your logic, if that's what you call it.  You're saying
 that checking the current filesystem on a daily basis is NOT a good way
 to verify filesystem integrity?

I say it won't give you an real advantage over checking the *.md5sums files.
(The only slight advantage is that it lists all file, but the disadvtage
 that you cannot verify your database).

 Update your system when you introduce a known change (a must).  Check it
 daily (a must).  What is incorrect about this policy?

It will only help you to catch intruders securely, if you your check
involves rebooting daily from a ro-media containing verified kernel and
checksum-utilities. Not to talk about, that a database update should at
least be done after booting from clear mendium without net-access and
checking that the changes are correct.

Otherwise it only catches intruders, hwo are to stupid to cope with system
installed. (Which is the same as with installed .md5sums files)


Hochachtungsvoll,
  Bernhard R. Link

-- 
Sendmail is like emacs: A nice operating system, but missing
an editor and a MTA.




Bug#222450: ITP: audiolink -- makes managing and searching for music easier

2003-12-03 Thread Amit Shah
Package: wnpp
Severity: wishlist

* Package name: audiolink
  Version : 0.04
  Upstream Author : Amit Shah [EMAIL PROTECTED]
* URL : http://audiolink.sourceforge.net/
* License : GPLv2
  Description : makes managing and searching for music easier

 AudioLink is a tool that makes searching for music on your local
 storage media easier and faster. Your searches can include a variety
 of criteria, like male artists, female artists, band, genre, etc.
 .
 It works with MP3 files and creates a mysql database in which it
 stores the information about the music files.
 .

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux magrathea 2.6.0-test11 #1 Thu Nov 27 10:56:43 IST 2003 i686
Locale: LANG=C, LC_CTYPE=C





Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Marc Haber
On Wed, 3 Dec 2003 22:27:39 +1100, Hamish Moffatt [EMAIL PROTECTED]
wrote:
The RSA SecurID tokens are a bit smarter than that; the output for a
given input changes every minute. My employer uses them for remote
access to their intranet; you have a fixed pin number which you enter
into the card to get this minute's (6 digit) password. No reason why the
pin would have to be fixed though.

I have no idea what they cost. Also the newest ones are not exactly fit
for carrying around in your wallet. They last 3 years on internal
batteries.

I seriously doubt that the server-side software is DFSG-free. The only
Linux Agent that is available from rsa.com is for RedHat 7.3, and I
would be astonished if it were available in source code form.

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber  |Questions are the | Mailadresse im Header
Karlsruhe, Germany  | Beginning of Wisdom  | Fon: *49 721 966 32 15
Nordisch by Nature  | Lt. Worf, TNG Rightful Heir | Fax: *49 721 966 31 29




Bug#222592: ITP: sks -- Synchronizing OpenPGP Key Server

2003-12-03 Thread Peter Palfrader
Package: wnpp
Severity: wishlist

* Package name: sks
  Version : 1.0.5
  Upstream Author : Yaron M. Minsky [EMAIL PROTECTED]
* URL : http://www.nongnu.org/sks/
* License : GPL (parts are LGPL, BSD)
  Description : Synchronizing OpenPGP Key Server

 SKS is an OpenPGP key server that correctly handles all OpenPGP features
 defined in RFC2440 and RFC2440bis, including photoID packages and multiple
 subkeys.
 .
 This key server implementation uses an efficient and reliable reconciliation
 algorithm to keep the database in sync with other SKS servers.  Additionally
 it can both send and receive PKS style sync emails.





Re: Revival of the signed debs discussion

2003-12-03 Thread Matthias Urlichs
Hi,

Werner Koch:
 There are some minor problems because we don't just sign a hash but
 need to add some more data.  Creating an incomplete hash on the remote
 machine is not the cleanest solution, so I have to come up with a
 better way.
 
You're the GPG expert...


I'm also a bit concerned about MitM attacks; the hash-or-whatever which
the local side is supposed to sign should probably be encrypted with the
signer's public key, otherwise I can just replace the data packet with
something that ends up signing a totally different file. :-/

In other words, doing this isn't trivial.

-- 
Matthias Urlichs   |   {M:U} IT Design @ m-u-it.de   |  [EMAIL PROTECTED]
Disclaimer: The quote was selected randomly. Really. | http://smurf.noris.de
 - -
Show respect for age.  Drink good Scotch for a change.




Re: The term Custom Debian Distribution (Was Re: [custom] The term flavor and encouraging work on Debian)

2003-12-03 Thread Andreas Tille
On Wed, 3 Dec 2003, Fabian Fagerholm wrote:

 It might be hard, impossible and undesirable to reverse the decision to
 use the term.
Exactly.

 I think the term can be correctly understood if you
 present it as I have in some recent postings to this list:

 Debian is the super-project.
 XYZ is a Debian subproject
 that produces a Custom Debian Distribution
 with the flavors A, B and C.

 A subproject is easily understood: it's an organisational structure.
 Basically, it's a group of people working on a subset of Debian. They
 coordinate via a web site and in some cases have a special mailing list.

 Some subprojects create Custom Debian Distributions for their particular
 area of interest. Upon installation of the Custom Debian Distribution,
 you can select between a number of flavors that set some defaults to
 suit a particular use.
Thanks for this clarifying words.

 More ideas? Perhaps some of this could be intergrated into the Debian
 Subproject Howto as soon as some degree of consensus has been reached.
 (I can't find it right now with people.d.o being inaccessible.)
You might try

   apt-get {source,install} subproject-howto

Kind regards

   Andreas.




Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Russell Coker
On Wed, 3 Dec 2003 23:06, Marc Haber [EMAIL PROTECTED] wrote:
 I have no idea what they cost. Also the newest ones are not exactly fit
 for carrying around in your wallet. They last 3 years on internal
 batteries.

 I seriously doubt that the server-side software is DFSG-free. The only
 Linux Agent that is available from rsa.com is for RedHat 7.3, and I
 would be astonished if it were available in source code form.

For an initial order of 1200 units and the potential for other larger orders 
they may reconsider this.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page




Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Hamish Moffatt
On Wed, Dec 03, 2003 at 01:06:08PM +0100, Marc Haber wrote:
 On Wed, 3 Dec 2003 22:27:39 +1100, Hamish Moffatt [EMAIL PROTECTED]
 wrote:
 The RSA SecurID tokens are a bit smarter than that; the output for a
 given input changes every minute. My employer uses them for remote
 access to their intranet; you have a fixed pin number which you enter
 into the card to get this minute's (6 digit) password. No reason why the
 pin would have to be fixed though.
 
 I have no idea what they cost. Also the newest ones are not exactly fit
 for carrying around in your wallet. They last 3 years on internal
 batteries.
 
 I seriously doubt that the server-side software is DFSG-free. The only
 Linux Agent that is available from rsa.com is for RedHat 7.3, and I
 would be astonished if it were available in source code form.

That's true, but there may be similar technology available from other
companies. I have no idea what the server-side part looks like,
having only been an end user of the token solution.

Hamish
-- 
Hamish Moffatt VK3SB [EMAIL PROTECTED] [EMAIL PROTECTED]




Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Hamish Moffatt
On Wed, Dec 03, 2003 at 01:16:39AM -0800, Tom wrote:
 On Wed, Dec 03, 2003 at 01:03:16AM -0800, Don Armstrong wrote:
  [NB: I wanted to take this OT discussion off [EMAIL PROTECTED] and into 
  private
  mail, but your e-mail address was munged in some sort of anti-spam
  measure, and not trivially un-mungeable. Please consider providing
  information on how to demunge it in some X- header, or not using
  munging at all.]
 
 Heh.  That's my actual email address.  Fooled ya.

How about including your full name somewhere in your posts too then?
I find it a bit off-putting to discuss security with someone who's
obscuring their identity.

Hamish
-- 
Hamish Moffatt VK3SB [EMAIL PROTECTED] [EMAIL PROTECTED]




Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Wouter Verhelst [EMAIL PROTECTED] writes:

 On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote:
  Hi, Henrique de Moraes Holschuh wrote:
  
   On Tue, 02 Dec 2003, Wouter Verhelst wrote:
   So unless you have a suggestion that would solve this particular issue,
   I'm afraid this idea won't work in practice.
   
   We could verify if the gpg agent (gpa? I forget the name...) cannot do 
   this
   over a secure channel. It should be able to, and if not, it can probably 
   be
   taught to.
  
  It's not that easy (basically you need to tunnel the actual
  encryprion/signing function, not just the passphrase-getting).
  See ssh-agent as an example.
  
  The good thing is that people are already thinking about this.
  
  http://lists.gnupg.org/pipermail/gnupg-users/2003-April/017920.html
 
 Well, implemented as Werner suggests in that message would require me to
 send the actual .deb over the line. I won't do that, since I don't have
 the bandwidth (or, in many cases, the time to wait for the download to
 finish; arrakis runs behind an ADSL line, while quickstep behind my
 cable modem. upstream speeds aren't that fast (and I regularly handle
 their mails at work)).
 
 As I understand it, an OpenPGP signature is an encrypted hash or
 something similar of the actual data. It would be feasible if the
 signature algorithm would allow for hashing the data on the remote
 machine, and signing that hash locally.
 
 Then again, we could do such things right now. Wouldn't it be more
 interesting to gpg-sign md5sums of control.tar.gz and data.tar.gz?
 Especially in the case of larger .debs, that would probably reduce the
 actual signature size as well...

The size being 132 bytes with only 72 bytes actual payload is small
enough.

But we could change what gets signed: Instead of signing the
control.tar.gz + data.tar.gz cated together the list of md5sums of all
files already present in the deb is signed.

The md5sums list would only be a few hundert bytes so transmitting it
over the network is not a problem. But it would mean one can't sign
buildd uploads offline anymore, or at least not in one go. The deb has
to be signed first and then a new chages file created.

Only transmitting and signing a digest of the deb is allways an option
if it becomes clear that splitting the gpg signing procedure (as
debsisgs uses now) between the remote and local system becomes to
complex. Lets see if a gpg agent can be developed that allows remote
signing without transmitting the deb.

MfG
Goswin




Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Tom
On Thu, Dec 04, 2003 at 12:20:57AM +1100, Hamish Moffatt wrote:
 
 How about including your full name somewhere in your posts too then?
 I find it a bit off-putting to discuss security with someone who's
 obscuring their identity.

Ha Ha Ha what a joke.  I don't want to be googled for all eternity.

Let me tell you a story about a job I had one time: I worked for a guy 
(in his basement -- don't ask) who bought your personal credit card data 
and other publicly available information.  He would pay about $10,000 or 
$15,000 for lists of ~100,000-200,000 people's data.  My job was to 
datamine it under criteria like:  Give me all the people who make 
between $50,000-$80,000 /yr, own a boat, live within 15 miles of certain 
area, and used their Visa more than 10 times on the boat within the last 
6 months.  We'd rank order the data, apply the filter, and maybe get 
10,000 good names, which he would sell for about $140,000 to a home 
alarm company, who would then call you during dinner. [1]

Another job I had was for a drug testing company.  My job was to write 
the report processing system which would say You Person X have Tested 
Positive for Drugs A, B, and C and you are fucked.  At one point in 
1994 I had 40,000 people's drug test results on my 486SX-50.  Just for 
grins I did a group by query, grouping drug frequency by a company's SIC 
industry code, and sorting in descending order.  The most frequent 
people to test positive for drugs are construction workers, marijuana 
and cocaine.  The next most frequent are school employees (probably bus 
drivers) testing positive for alcohol.  Everything else was kind of 
evenly distributed.

And you wonder why I am concerned with my identity!!!

[1] I finally told the guy to go pound sand.  I said: You'd be more 
useful to society if you just grow corn or something.  Doing that type 
of work made me want to slit my wrists.




Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Matthias Urlichs [EMAIL PROTECTED] writes:

 Hi,
 
 Werner Koch:
  There are some minor problems because we don't just sign a hash but
  need to add some more data.  Creating an incomplete hash on the remote
  machine is not the cleanest solution, so I have to come up with a
  better way.
  
 You're the GPG expert...
 
 
 I'm also a bit concerned about MitM attacks; the hash-or-whatever which
 the local side is supposed to sign should probably be encrypted with the
 signer's public key, otherwise I can just replace the data packet with
 something that ends up signing a totally different file. :-/
 
 In other words, doing this isn't trivial.

Assume you have a secure connection. A ssh connection will be more
secure than the mail being send around now. Anyone could do a MitM
attack on the changes files being mailed, get his own packages changes
file signed, upload the debs and hope noone notices the build didn't
actually upload its deb.

Encrypting the digest with the public key before sending would only
ensure only the recipient can read it, which is rather pointless for
pretty random bits. You could encrypt or sign it with the buildds gpg
key to ensure the origin of the message. Anything short of a
compromised buildd would be save and a compromised buildd would be
fatal whatever method is used.

MfG
Goswin




Re: configuring lilo on package installation

2003-12-03 Thread Goswin von Brederlow
Javier =?iso-8859-15?Q?Fern=E1ndez-Sanguino_Pe=F1a?= [EMAIL PROTECTED] writes:

 On Sun, Nov 23, 2003 at 06:19:39PM +0100, Tobias Grimm wrote:
  Hi!
  
  I'm working on a nvram-wakeup package for a Debian based VDR 
  distribution (c't vdr). nvram-wakeup needs a special kernel-image, that 
  forces a shutdown on the next reboot. Normally this image is installed 
  to /boot and a new section has to be added to lilo.conf:
  
  image  = /boot/bzImage.poweroff
  label  = PowerOff
  
  It wouldn't be a problem to modify the lilo.conf in the maintainer 
  script, but I'm not sure if this is the way this should be done.
 
 Yes it is, it's a policy violation.
 
  
  What's the best way to add a section to the lilo.conf during package 
  installation (and remove it when uninstalling)?
 
 If the lilo manager does not provide a script to manage lilo.conf, or does
 not provide a way to hook things into it (the answer to both question is,
 I believe, that it doesn't), IMHO you can only add a debconf note telling
 the admin what he needs to do in order to enable the package.

One can dpkg-divert lilo with a script that runs the real lilo with an
alternate config file. But thats realy ugly and only works for one
package at a time.

MfG
Goswin




Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Marc Haber
On Thu, 4 Dec 2003 00:19:36 +1100, Hamish Moffatt [EMAIL PROTECTED]
wrote:
On Wed, Dec 03, 2003 at 01:06:08PM +0100, Marc Haber wrote:
 I seriously doubt that the server-side software is DFSG-free. The only
 Linux Agent that is available from rsa.com is for RedHat 7.3, and I
 would be astonished if it were available in source code form.

That's true, but there may be similar technology available from other
companies. I have no idea what the server-side part looks like,
having only been an end user of the token solution.

I have only taken a perfunctory look at the web site, and the
server-side looks like a PAM plugin for the RSA product.

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber  |Questions are the | Mailadresse im Header
Karlsruhe, Germany  | Beginning of Wisdom  | Fon: *49 721 966 32 15
Nordisch by Nature  | Lt. Worf, TNG Rightful Heir | Fax: *49 721 966 31 29




Re: Revival of the signed debs discussion

2003-12-03 Thread Matthias Urlichs
Hi,

Werner Koch:
 On Wed, 3 Dec 2003 13:26:02 +0100, Matthias Urlichs said:
  the local side is supposed to sign should probably be encrypted with the
  signer's public key, otherwise I can just replace the data packet with
  something that ends up signing a totally different file. :-/
 
 And if I do that, I could also sign the file right at the remote
 machine because the (or some) signature key must be available over
 there ;-)
 
Ouch. You're obviously right. :-/

-- 
Matthias Urlichs   |   {M:U} IT Design @ m-u-it.de   |  [EMAIL PROTECTED]
Disclaimer: The quote was selected randomly. Really. | http://smurf.noris.de
 - -
The day advanced as if to light some work of mine; it was morning,
and lo! now it is evening, and nothing memorable is accomplished.
-- H.D. Thoreau




Re: The term Custom Debian Distribution (Was Re: [custom] The term flavor and encouraging work on Debian)

2003-12-03 Thread Benj. Mako Hill
On Wed, Dec 03, 2003 at 01:24:24PM +0200, Fabian Fagerholm wrote:
 If some of the people who participated in the Debcamp Custom
 Distribution BOF (see
 http://www.debian.org/devel/debian-nonprofit/News/2003/20030717) are
 listening, perhaps you could elaborate? (Cc'ing Mako Hill since he
 was referenced as one of the driving forces behind the meeting.)
 
 It might be hard, impossible and undesirable to reverse the decision to
 use the term. I think the term can be correctly understood if you
 present it as I have in some recent postings to this list:
 
 Debian is the super-project.
 XYZ is a Debian subproject
 that produces a Custom Debian Distribution
 with the flavors A, B and C.

Right.

Your other posts seems well informed. Subprojects is already defined
for us (see http://www.debian.org/devel/ for an example of one
place). Debian-NP is clearly a subproject as is Debian-Med and
the IPv6 project.

If you apt-get install the subproject-howto you will get something
talking *only* about creating a custom Debian-distribution -- not
about creating a subproject for any other sort of work. The folks at
the BOF saw a real lack of interaction between the people making
custom distributions and we attributed this, in part, to the fact that
we didn't have a single concept around which identify and say, yeah,
that person is doing the same thing as me, we should work together.
The flavors people were not working with the metadistros people and
the subproject people where on their own.

We thought Custom Debian Distribution (and a [custom] tag in emails
to -devel until a list is created) both referenced our relationship to
Debian (we're inside) and described what we were trying to do in a way
that was not so restrictive that it couldn't refer to multiple
technologies but not so broad that it would apply to projects with
very different types of goals.

I think we left with the idea that flavors or metadistros and the
like may still describe *technologies* or methods which one could use
to achieve a Custom Distro.

I think this is in line with what AJ, yourself, and others have said --
which is nice. :)

 More ideas? Perhaps some of this could be intergrated into the Debian
 Subproject Howto as soon as some degree of consensus has been reached.
 (I can't find it right now with people.d.o being inaccessible.)

I think it absolutely should. I also think the HOWTO should be renamed
or expanded in scope to bring it into alignment with the consensus that
seems to be coalescing around these issues.

Regards,
Mako


-- 
Benjamin Mako Hill
[EMAIL PROTECTED]
http://mako.yukidoke.org/



pgpOrscPgu7VS.pgp
Description: PGP signature


Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Steve Langasek
On Wed, Dec 03, 2003 at 01:24:50AM -0800, Tom wrote:
 On Wed, Dec 03, 2003 at 01:16:39AM -0800, Tom wrote:
  
  If something could have prevented something that actually happened, I 
  say go for it.

 Oh, one last thing: each DD should pay for the device him/her self and 
 should be required to fly to meet wherever they can pick them up.  Why 
 do you assume somebody has to pay for everything?  What's wrong with 
 bearing some of the costs yourself?

Hahahahahahahaha

Share the crack.

plonk
-- 
Steve Langasek
postmodern programmer


signature.asc
Description: Digital signature


Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 08:45:49AM -0600, Steve Langasek wrote:
 
 Share the crack.

In my experience kids in college and right out tend to freak out over 
the thought of having to spend a few dollars of disposable income, 
because they don't have any :-)

Hey, laugh if you want, most organizations have dues, it's not 
unprecedented in human history :-)




Re: [RFC] adding system users: which is the best way??

2003-12-03 Thread Andreas Metzler
Steve Greenland [EMAIL PROTECTED] wrote:
[...]
 I think the idea of a namespace for usernames used by packages is a good
 idea, but rather than debian-, we should take this to the LSB folk, so
 that we can get it done once.

The problem with this is time. I need to add a system-user (for exim4)
_now_. Shall I go for namespace, and if yes which one? _debian-exim,
debian-dexim, DEB-exim?
  cu and- wondering whether he should actually subscribe to another
  ml. -reas




Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Graham Wilson
On Wed, Dec 03, 2003 at 05:42:20AM -0800, Tom wrote:
 Let me tell you a story about a job I had one time: I worked for a guy 
 (in his basement -- don't ask) who bought your personal credit card data 
 and other publicly available information.  He would pay about $10,000 or 
 $15,000 for lists of ~100,000-200,000 people's data.  My job was to 
 datamine it under criteria like:  Give me all the people who make 
 between $50,000-$80,000 /yr, own a boat, live within 15 miles of certain 
 area, and used their Visa more than 10 times on the boat within the last 
 6 months.  We'd rank order the data, apply the filter, and maybe get 
 10,000 good names, which he would sell for about $140,000 to a home 
 alarm company, who would then call you during dinner. [1]

So you've aided telemarketers and worked for Microsoft? Is your last
name Darkness, middle name Prince of?

-- 
gram


signature.asc
Description: Digital signature


Re: [custom] Debian Enterprise - a Custom Debian Distribution

2003-12-03 Thread Fraser Campbell
On December 1, 2003 07:05 pm, Enrico Zini wrote:

 On Mon, Dec 01, 2003 at 02:33:57PM -0600, Chad Walstrom wrote:
- GNU ERP software project ?name?
 
  GNU Enterprise (gnue)  http://www.gnue.org/

 I've just learnt of Cubit from South Africa: http://www.cubit.co.za/

Is it free software?  They don't seem to provide a link to the full text of 
their license, it sounds free according to their license summary but I also 
see the statement Cubit has only a very small yearly license fee and no 
purchase cost.

-- 
Fraser Campbell [EMAIL PROTECTED] http://www.wehave.net/
Georgetown, Ontario, Canada   Debian GNU/Linux




Bug#222630: ext2 is the wrong default for partconf/create-filesystem

2003-12-03 Thread Gleydson Mazioli da Silva
I think the reason for that is because on old BF days disk space was expensive 
(so 
lost 32MB for a journal file ou more than that would be a considerable lost).

Joey Hess [EMAIL PROTECTED] escreveu em Sun, 30 Nov 2003 21:43:54 -0500:

 Package: partconf
 Severity: normal
 
 Most users will want a journaling filesystem, and ext3 would be a good
 choice for the default filesystem type, but the current default, ext2,
 is not a very good choice. I suggest to s/2/3 in the Default field of
 the partconf/create-filesystem template.
 
 -- System Information:
 Debian Release: testing/unstable
 Architecture: i386
 Kernel: Linux dragon 2.4.22 #1 Sun Oct 12 15:11:10 EDT 2003 i686
 Locale: LANG=en_US, LC_CTYPE=en_US
 
 -- 
 see shy jo
 


---
Gleydson Mazioli da Silva
[EMAIL PROTECTED]
[EMAIL PROTECTED]

Negligência: Nome que se dá, no colégio, à burrice das crianças ricas.


pgpquQdgm9Jab.pgp
Description: PGP signature


Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 09:06:07AM -0600, Graham Wilson wrote:
 
 So you've aided telemarketers and worked for Microsoft? Is your last
 name Darkness, middle name Prince of?

Satan fell because he wanted to know.  So do I.
I'm a contrarian.  I believe the opposite of whatever I'm confronted 
with at the moment.

Evil is when you look around your life and say: man, I gotta get some 
new friends. :-)




exim4-config and exim4-base installed on systems with non-exim-MTA

2003-12-03 Thread Marc Haber
Hi,

as co-maintainer for the exim4-packages, I have noticed an issue with
dselect. Currently, exim4 is the default MTA, and exim4, exim4-base,
exim4-config and exim4-daemon-light are Priority: important, while
exim4-daemon-light provides mail-transport-agent. The exact package
dependencies can be seen in the archive.

This causes dselect to install exim4-base and exim4-config on a system
that has some other (non-exim) MTA installed, which is a bad thing.

I have discussed this with Andreas, and we didn't find a solution,
since the exim4-packages need to be installed and configured in a
certain order to be operational. Both of us are not adept in package
dependency declaration, so I would like to ask the experts how to
solve this problem.

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber  |Questions are the | Mailadresse im Header
Karlsruhe, Germany  | Beginning of Wisdom  | Fon: *49 721 966 32 15
Nordisch by Nature  | Lt. Worf, TNG Rightful Heir | Fax: *49 721 966 31 29




Re: exim4-config and exim4-base installed on systems with non-exim-MTA

2003-12-03 Thread Anthony Towns
On Wed, Dec 03, 2003 at 04:41:00PM +0100, Marc Haber wrote:
 as co-maintainer for the exim4-packages, I have noticed an issue with
 dselect. Currently, exim4 is the default MTA, and exim4, exim4-base,
 exim4-config and exim4-daemon-light are Priority: important, while
 exim4-daemon-light provides mail-transport-agent. The exact package
 dependencies can be seen in the archive.

What are they, exactly, and why are they that way?

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   Linux.conf.au 2004 -- Because we can.
   http://conf.linux.org.au/ -- Jan 12-17, 2004


pgphcwC6tQbhF.pgp
Description: PGP signature


Two different libpng2_1.0.12-3.woody.3_i386.deb?

2003-12-03 Thread Santiago Vila
file=main/libp/libpng/libpng2_1.0.12-3.woody.3_i386.deb
wget -q -O 1.deb http://ftp.debian.org/debian/pool/$file
wget -q -O 2.deb http://security.debian.org/pool/updates/$file
diff 1.deb 2.deb

Binary files 1.deb and 2.deb differ

How could this happen? Should I worry about it?




Re: exim4-config and exim4-base installed on systems with non-exim-MTA

2003-12-03 Thread Andreas Metzler
On Thu, Dec 04, 2003 at 02:15:30AM +1000, Anthony Towns wrote:
 On Wed, Dec 03, 2003 at 04:41:00PM +0100, Marc Haber wrote:
 as co-maintainer for the exim4-packages, I have noticed an issue with
 dselect. Currently, exim4 is the default MTA, and exim4, exim4-base,
 exim4-config and exim4-daemon-light are Priority: important, while
 exim4-daemon-light provides mail-transport-agent. The exact package
 dependencies can be seen in the archive.
 
 What are they, exactly, and why are they that way?

exim4 is a metapackage that depends on the other three and is not hit by
the problem. The rest is a straighforward chain.

With  as depends on:

daemon  -base  -config.

other possible dependencies would be:
daemon   -config  -base
or
daemon  -base
   `--  -config

The daemon-packages provide/conflict/replaces MTA.

The main point is that the daemon is started by its own postinst
and therefore it requires ATM -base to be unpacked (init-script) and
-config to be configured.

Afaict starting/stopping the the daemon in its own postinst/prerm is
really the only correct thing to do as it needs to be restarted when
only daemon is upgraded or when you exchange daemon-light for
daemon-heavy.
 cu andreas




Re: development environment question

2003-12-03 Thread John Smith
On Wed, 2003-12-03 at 18:36, bruce wrote:
 hi...
 
 I was talking with Ian Murdock yesterday, and he suggested I pose the
 question to this group.
 
 We're interested in creating a development environment that would allow open
 source applications to be created. The development environment would go
 beyond simply providing project management functions (ala sourceforge.net)
 but to actually allowing developers to build/create/test their applications
 within our network. Users would be able to add/modify applications on the
 test servers to suit their needs. Such a network would have to be carefully
 developed, given the inherent security issues.
 
 The issue we're facing, is how would you go about constructing such an
 environment. Does anyone have any pointers to information/sites regarding
 this issue? Does anyone have expertise regarding the
 construction/development of this kind of environment?
 
 I kind of thought that given what Debian has put together with it's
 development environment, that there might be people on this list who might
 be able to provide some  pointers.
 
 All reasonable pointers/assistance will be helpful.
 
 Thanks
 
 Bruce Douglas
 [EMAIL PROTECTED]
 (925) 866-2790
 
 

Hi Bruce,

I don't want to disappoint you, but as with all IT projects, 
you need to specify a very specific goal that you want to achieve. 
Your goal, allow open source applications to be created and allowing
developers to build/create/test their applications within our network.
Users would be able to add/modify applications on the test servers to
suit their needs doesn't sound very aimed toward something.

Given the requirements for application development, a lonely
place for writing and a clean environment for testing, I don't think
you are going to achieve much. Separated testing environments with
free access to the internet to the outside, look like an awfully
inviting target for people with not so nice intentions (spammers, virus
distributers, port scanners etc.)

Good luck, hope you make something of your idea.

Sincerely,

Jan.





Re: [custom] Debian Enterprise - policies

2003-12-03 Thread Andres Salomon
On Wed, 03 Dec 2003 15:01:09 +1100, Zenaan Harkness wrote:

 (Really should read ahead further ... here are more, and all laid out
 together)
 
 * DFSG Free Software only (I know this one will get debated, but this is
 the whole point of Debian Enterprise - if you want proprietary software,
 go buy Red Hat or SUSE/Novell).
 

This goes without saying.  If it's under the Debian name, it should comply
w/ the various Debian policies.


 * Specifically targetting For-Profit entities (vs Debian-NP)
 

Is this really a goal?  While we're not specifically targeting non-profit
entities, we're not going to exclude them, either; especially if they have
infrastructure similar to a standard for-profit company.  Non-profits need
their oracle, too.  ;)


 * 100% Debian (Social Contract, DFSG, policies + procedures)
 
 * LSB compliance


I think LSB compliance is one of the most important things listed (aside
from standard stuff like policy compliance).  We want commercial
software vendors to supply binaries that adhere to the LSB; whether
distributed in deb, rpm, or tarball format.  Furthermore, we want to
convince commercial software vendors that working within the LSB is more
important than working within Debian.  A company may certify their
software to work w/ DE (or a DE flavor); we should convince them to
certify software to work w/ all LSB-compliant distributions.  This allows
companies to not limit themselves to DE, or a subset of DE flavors, but
all of Debian (and other LSB-compliant distributions).




 
 * Official statement as to support of Freedesktop.org standards
 
 * Common Criteria (not until we're big enough)
 
 * OpenCOE (the COE folks had to wedge _apt_ into Red Hat to get it to
 work to their satisfaction)
 
 * we have a FIPS 140 certification for OpenSSL
 
 * Other standards ??





Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Bernd Eckenfels
On Wed, Dec 03, 2003 at 01:54:22PM +1100, Matthew Palmer wrote:
 Nov 28  22:39  Linux 2.4.23 released
^
 
 Bernd is correct, though - if the machines had been running 2.4.23, they
 wouldn't have been vulnerable.  The fact that it was impossible to do so
 doesn't enter into the equation when you're working from blind assertions. 
 g

Hehe, well I am sorry. I had the impression 2.4.23 was older. Should have 
checked my facts.

BTW: I do have checked the kernel version of the major distros, all ship
newer kernels than debian (if you look at the upstream version). However I do 
not know
how reliable dostrowatch is, for comparision.

Greetings
Bernd
-- 
  (OO)  -- [EMAIL PROTECTED] --
 ( .. )  [EMAIL PROTECTED],linux.de,debian.org} http://home.pages.de/~eckes/
  o--o *plush*  2048/93600EFD  [EMAIL PROTECTED]  +497257930613  BE5-RIPE
(OO)  When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!




Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Andreas Schuldei
* Russell Coker ([EMAIL PROTECTED]) [031203 04:03]:
 I have sent a message to Werner asking if the GPG smart-card device could be 
 re-implemented with a USB interface.  I think that a USB dongle with GPG 
 technology would be a good option as most developer's machines already have 
 USB support.

as discussed in depth in an earlier c't magazine (german) usb is
not a save bus to use for security relevant applications, since
it allows for recording and backplaying of command sequences.




Re: debsums for maintainer scripts

2003-12-03 Thread Manoj Srivastava
On Mon, 1 Dec 2003 19:22:44 -0200, Henrique de Moraes Holschuh [EMAIL 
PROTECTED] said: 

 On Mon, 01 Dec 2003, Thomas Viehmann wrote:
 Henrique de Moraes Holschuh wrote:
  On Mon, 01 Dec 2003, christophe barbe wrote:
 
 Before mass bug-filling, it would be necessary to make it
 mandatory which unfortunately is not the case right now afaik.
 
 
  Deployment plan for md5sums everywhere:
 At ~600 affected source packages, this seems hardly feasible.

 It is feasible. You just to care about it enough, and you certainly
 don't have to do it alone, or in one go.

 Otherwise, it simply won't happen, unless about 90% of the packages
 or so aready use md5sums.  At that figure, you have some changes of
 passing a policy of 'must', and you are guaranteed to get a 'should'
 to be approved IMHO.

Before we make such a push, we should at least ensure that it
 is something we really want to do. I think locally generated
 checksums are a better solution.

manoj
-- 
There are three schools of magic.  One: State a tautology, then ring
the changes on its corollaries; that's philosophy.  Two: Record many
facts. Try to find a pattern.  Then make a wrong guess at the next
fact; that's science.  Three: Be aware that you live in a malevolent
Universe controlled by Murphy's Law, sometimes offset by Brewster's
Factor; that's engineering.
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: [custom] Debian Enterprise - packages

2003-12-03 Thread Chris Halls
On Wed, 2003-12-03 at 05:49, John Goerzen wrote:
  * Office Suite - OpenOffice (there's no other near as feature complete)
 
 And OpenOffice is the only one that runs on only two -- yes, two --
 architectures that Debian supports.

You missed two.  OOo is available on i386, powerpc, sparc and s390.

Chris




Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Darren Salt
I demand that Tom may or may not have written...

 On Wed, Dec 03, 2003 at 08:45:49AM -0600, Steve Langasek wrote:
 Share the crack.

 In my experience kids in college and right out tend to freak out over the
 thought of having to spend a few dollars of disposable income, because they
 don't have any :-)

Some of us have to *buy* them before we can spend them ;-)

-- 
| Darren Salt   | nr. Ashington, | linux (or ds) at
| woody, sarge, | Northumberland | youmustbejoking
| RISC OS   | Toon Army  | demon co uk
|   Oh, sarge too...

This was the most unkind cut of all.




Re: [custom] Debian Enterprise - flavors

2003-12-03 Thread Mark Ferlatte
Zenaan Harkness said on Wed, Dec 03, 2003 at 02:58:18PM +1100:
 Flavours (and sub-flavours/ tasks/ yadda) is as good a place to start as
 any. So here are some proposed flavours:
 
  - Enterprise (base packages and more neutral config)
  - Enterprise Desktop - with sub-flavours of:
 - Secretary Desktop
 - Presentation Client (OO Presenter, multimedia, flash)
 - Developer Desktop (all build-depends of all flavours, as a start)
 
  - Enterprise Fileserver
  - Enterprise Webserver
  - Enterprise Auth Server
  - Enterprise Departmental Server (combines File, Web + Auth)
 
  - Enterprise Firewall
  - Enterprise SCM Server
  - Enterprise Router
 
  - Enterprise Thin Client

Something to keep in mind that most of the above could be handled by exactly
the same software loadout.

For example:  There is no difference between Desktop, Fileserver, Webserver,
Auth Server loadouts that matters; you just turn off the services by default
and let the customization process turn on the services that matter for that
role.  It doesn't matter if the webserver has openoffice installed; it's just a
few bits on disk.

It might be worth reading
http://www.infrastructures.org/papers/bootstrap/bootstrap.html before getting
flavour happy.

M


pgpduCDZGTL4W.pgp
Description: PGP signature


Re: [custom] The term flavor and encouraging work on Debian

2003-12-03 Thread VEROK Istvan

On Wed, 3 Dec 2003, Andreas Tille wrote:
 On Wed, 3 Dec 2003, Fabian Fagerholm wrote:

  In my view (as I said), it would be logical to name a further
  subdivision of that product flavor.
 I like this interpretation of the term flavor and it would be easily
 applicable for Debian-Med to flavors like:
- Medical practice
- Medical research
[snip]

Just a suggestion on naming:

Due to the unclear connotations, there is a great deal of confusion over
the terms internal project, subproject, flavor, custom Debian
distribution and the like.  To clarify my own thinking, I started using
just subset and mutation instead.

To my mind, the difference is whether a given collection of packages aims
to be straightforwardly upgradable to a full Debian (IOW, whether it can 
peacefully coexist with any number of packages from Debian proper).  If
yes, it's a subset.  If no, it's a mutation.  Debian-Jr, Debian-NP,
Debian-Lex, Debian-Med are all subsets.  Adamantix and Knoppix are
mutations.

Subsets can also have subsets, or a subset may even come from the
confluence of other subsets, so there is no need to name one level a
custom Debian distro and another level a flavor.

My EUR 0.02,
Istvan




Re: debsums for maintainer scripts

2003-12-03 Thread Manoj Srivastava
On Mon, 1 Dec 2003 18:08:28 +0100, Eduard Bloch [EMAIL PROTECTED] said: 

 AFAICS the only way to verify the contents of maintainer scripts
 automaticaly is to have the binary package, verify its contents via
 .changes or Release/Packages path, extract it and compare the
 files. Too complicated.

umm, not if it is automated at install time, when the package
 is present already.

 I would like to see the following things happen:

 - current md5sums file in control.tar.gz should contain checksums of
really all files

Hard to do for conffiles. Now, if the md5sums were generated
 at install time, you could checksum my locally modified conffile
 (even if I did not accept the maintainers changes). The md5sums
 stored for conffiles currently are rarely any good, since the files
 are often modified by the admin.

 - a signature of the md5sums file should be stored either in
control.tar.gz or in the ar file itself

So you have to download the package itself to check the
 contents of the md5sum fule? Why not generate the md5sums at this
 point anyway?

 - new dpkg version should pickup the signature files and store them
either in /var/lib/dpkg/info or in some alternative directory

Or you could sign the newly generated md5sum files at install
 time, complete with the checksums of the locally modified conffiles,
 and not have to depend on knowing the key of the persons producing
 the Packages file.

 - modify debsums to check the signature as well as maintainer
scripts' checksums

ok.

manoj
-- 
I have a theory that it's impossible to prove anything, but I can't
prove it.
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: UserLinux white paper

2003-12-03 Thread Bernd Eckenfels
On Wed, Dec 03, 2003 at 04:36:18PM +1100, Zenaan Harkness wrote:
 How many financials implementations are ultimately needed - really only
 one, perhaps customized for vertical markets.

A healthy market requires competition. And different companies have very
different needs. The IT Infrastructure is indeed the only last field where
Enterprises can differ, today.

 This is the Proprietary software model, with artificial, government
 imposed (via copyright laws) monopolies, resulting in customer lock-in
 and price maximization.

I dont see a monopol, at least no government imposed.

 This is not a properly free market economy. The monopolies are
 artificially imposed, not natural.

Well, I dont think it is correct to asume that Free Software can be the
model for all Software Business. Someone has to pay for the work needed,
after all. And somebody has to get payed, which is more important! (Yes I
known, Free is Free as in free speach). Free Software is one possible business
model, as long as it is not priceless. Customer lock-ins are more uncommon with
Free Software (however, even if you have the source code to your FI, you wont
change your software rovider easyly).

 Free Software clearly and evidently redifines *within the current
 (legal, financial) system* the way to a Free Market Economy.

Hmm.. the above sentence looks good, I wonder what it means?

 We will see profits of some ISVs fall, we will see others disappear
 altogether. We will see new organisations take hold in this new free
 market - predominantly services-based organizations.

It does not look that way, if you look on the current market, but I might be 
wrong.

Looking at the figures of a typical ISV, most of them (unless they manage to
do a large share if OEM business) earn more than 50% of their money by
services. It is already the case, that service is the main focus in the
business. You do not sell software, you solve problems. (You sell solutions,
like Ted put it)

Greetings
Bernd
-- 
  (OO)  -- [EMAIL PROTECTED] --
 ( .. )  [EMAIL PROTECTED],linux.de,debian.org} http://home.pages.de/~eckes/
  o--o *plush*  2048/93600EFD  [EMAIL PROTECTED]  +497257930613  BE5-RIPE
(OO)  When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!




Re: [custom] The term flavor and encouraging work on Debian

2003-12-03 Thread Fabian Fagerholm
On Wed, 2003-12-03 at 01:32, Zenaan Harkness wrote:
  Debian is the super-project.
  Debian Enterprise is a Debian Subproject that creates
  a Custom Debian Distribution,
 
 Subproject and custom debian distribution, here, are the same thing. No
 point officially having two terms. CDD is a term that I think is
 intended to be a little more expansive than subproject, so I think
 that's more applicable for this level of naming...

When the term Custom Debian Distribution was chosen, the rationale was
that there is a need to differentiate between subprojects that aim to
create a special version of Debian, and subprojects that do other
things, such as IPV6 or the technical committee.

So, I interpret that as meaning that a subproject is an abstract,
organisational thing (how it manifests itself is another matter) and a
Custom Debian Distribution is the concrete product put together by a
subproject.

In my view (as I said), it would be logical to name a further
subdivision of that product flavor.

 Correct depending on your view. But it is also true that Debian
 GNU/Linux is an original, of which Debian Enterprise is a customization
 - and this is the useful distinction in this case.

Ok. Semantics, of course, but that's what's being discussed here. :)
I just think Custom Debian Distribution is not a very innovative
phrase, it is too general to instantly give someone an idea of what it's
about, and on top of all, it's quite long.

Compare with package pool -- anyone with decent knowledge of the
English language, and who knows what a package is, will instantly see
the idea. I think flavor fits into the same category.

-- 
Fabian Fagerholm [EMAIL PROTECTED]


signature.asc
Description: This is a digitally signed message part


Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Bernd Eckenfels [EMAIL PROTECTED] writes:

 On Wed, Dec 03, 2003 at 03:17:20AM +0100, Goswin von Brederlow wrote:
  What the admins signature can gives us is a trusted timestamp and
  another pair of eyes reading the changes files.
 
 Well, a trusted timestamp can be added/required by a third party. No need to
 bother a build admin with signing of packages he cannot verify.
 
 Just make a small web service which is receiving an
 packagename,version,hash string and answer with a signed timestamp. There
 are even services like that out there on the net.

If there is no person sitting there signing it manually its useless.
The buildd admin is already signing every changes file before upload
so he is the logical person for signing debs too.

  Don't get me wrong, I'm all for an gpg key on the buildd to sign every
  deb. Not as replacement to at least one person glancing over the
  result but as an extra measure.
 
 How often has this person glance over the results? As I understand debian
 build daemons run unattended and build continously. Correct me when I am 
 wrong here.
 
 But if I asume righ, I dont want to lose that processing speed, especially
 since it can be easyly compensated with 3rd party timestamps.

In theory every build log is read. In praxis I believe all buildd
admins scroll through the log and look for some obvious signs of
errors before signing. I don't expect them to read a 17 MB logfile
line by line for example.

But even without reading having an actual person handling the signing
has advantages. In case a buildd is compromised the signing still
isn't. The attacker can't start and upload 500 backdoor packages
pretending to be something else without raising red flags. Also
failures in the buildd behaviour have to be cought, like building
empty debs all of a sudden. A quick glance at the package contents
listed in the build log will detect that.

MfG
Goswin




Re: [custom] Debian Enterprise - packages

2003-12-03 Thread Andres Salomon
On Wed, 03 Dec 2003 14:45:51 +1100, Zenaan Harkness wrote:

 As per the recommendations from Bruce Perens' User Linux paper
 http://userlinux.com/white_paper.html, this thread is to discuss the
 applications within the bounded set of Debian Enterprise/ User Linux.


I think discussing the favorite applications, at this point, is a bit
premature.  Debian Enterprise (DE) should be concentrating on the
framework that will make flavors possible.  There is much that remains to be
done on the technical level (kernels, a distribution that is up-to-date
enough that companies will _want_ to use it, an installer, etc).  Deciding
what applications to supply isn't of much use right now (especially given
the rate of development of some; mozilla-firebird may be a good choice
now, but what about when epiphany or another alternative becomes the
better browser?).

Remember the original goals that DE is attempting to solve. 
Current Debian-using companies must maintain their own package backports,
kernels, and so on.  Deciding what browser we will default to, while
possibly helping in standardization, is a long ways off.  In order for DE
to become useful, we must cater to companies (not the other way around). 
Thus, we should build out the infrastructure enough so that DE, by itself,
is installable and useable.  At that point, we can start worrying about
what flavors will contain what software.


 
 The bounded set will depend on the flavour. So first comes proposed
 flavours (and sub-flavours/ tasks/ yadda) - see previous email/ thread.
 
 Here are some initial (obviously debatable and incomplete) selections to
 start out the bounded-apps conversation:
 
 * Web Browser
   - Mozilla-Firebird
 I've used Mozilla, Galeon in its day, more recently Epiphany, and the
 last few months Moz-Firebird. It is simply the simplest (and in my
 opinion best) of the crop.
 
 * Web Server - Apache 2.0 (let's get with the times)
 
 * Open SSH Implementation - OpenSSH (much more active that gnu version)
 
 * Office Suite - OpenOffice (there's no other near as feature complete)
 
 * Scripting Language - Python (no one will debate this one :)
  - I have never used, only read (plenty) about Python, and I'm not
 personally too sure about this white space thing, but from what I hear
 about it (quite consistently) eventually feeling more natural than
 anything else, I am inclined to believe this really is the case. My
 experience with Java (after C/C++) was sort of like that, and if Python
 is more so, then I think it could be closest to the next VB replacement

Install Images

2003-12-03 Thread Tom Badran
Is there anywhere i can download debian-installer beta images (im getting a 
new laptop tommorow), prefereably with support for reiserfs filesystems? 
Gluck still isnt working and i cant seem to find mirrors anywhere.

Thanks

Tom

-- 
 ^__^| Tom Badran
 (oo)\__ | Imperial College
 (__)\   )\/\| Department of Computing
||w || ---
|| ||| Using Debian SID


pgpg1D2FLjlBS.pgp
Description: signature


Re: apt-rpm article -- the features we don't have

2003-12-03 Thread Goswin von Brederlow
Hamish Moffatt [EMAIL PROTECTED] writes:

 On Tue, Dec 02, 2003 at 02:10:56PM +, Jonathan Dowland wrote:
  On Mon, Dec 01, 2003 at 07:06:41PM -0500, Joey Hess wrote:
   
   Similarly, to check the build depends of a source package file:
 apt-get build-dep apt-listchanges-1.49-11104cl.src.rpm
  
  Should this be the job of apt-get? Fetching a list of build-depends is a
  similar job to that performed by apt-cache for other fields. I always
  associate apt-get with installing and removing packages.
 
 Yes, and apt-get build-dep somesourcepackage does install the
 necessary build-deps, so this fits right in.

apt-get build-deb foo-version.dsc would be nice when building a
package with changed build-depends (compared to what Sources.gz
lists).

Most of the time the ones mentioned in Sources work though and debuild
will show the rest.

MfG
Goswin




Re: INSTALL-REPORT

2003-12-03 Thread Thomas Wana
On Wednesday 03 December 2003 19:33, Joshua Kwan wrote:
 On Wed, Dec 03, 2003 at 09:22:14AM +0100, Werner Wobrowsky wrote:
  Debian Installer sarge-i386-bussinescard.iso, httP://freedesktop.or/

 Cool, but...

  FreeBSD 5.1-RELEASE-p11 #0: Thu Nov 27 15:07:08 CET 2003
  [EMAIL PROTECTED]:/usr/src/sys/i386/compile/NEW

 I didn't know the sarge ISOs supported Debian/FreeBSD. :)
 Wrong dmesg?

Hehe not only that, he seems to have marked the whole dmesg
and pasted it into the shell again, producing lots and lots
of shell error messages. Funny thing :-) that's why it is a
good idea to double-check the stuff you mail, especially when
it goes to a high volume mailing list ... you could look a 
bit stupid.

Tom

P.S.: in the pasted part:

$ FreeBSD 5.1-RELEASE-p11 #0: Thu Nov 27 15:07:08 CET 2003
FreeBSD: not found

:-)




Re: Debian packages and freedesktop.org (Gnome, KDE, etc) menu entries

2003-12-03 Thread Sebastien Bacher
AKL. Mantas Kriauciunas [EMAIL PROTECTED] writes:

 Hi,

 Debian has a usability problem - it's hard to start lots of programs, 
 installed from debian packages, because simple users just can't find
 them in menu.
 Standart debian menu entry isn't good solution for user-friendly
 desktops, like Gnome and KDE, because debian menu isn't intuitive (for
 example there are no icons for categories) and there are no possibility
 to translate debian menu entry.

 Solution is to add freedesktop.org standartized menu entry for programs,
 which could be started from menu (for example there is no meaning to
 start apt-get tool from menu). Then users of modern desktops will be
 happy, because they can easily find how to start installed applications
 - menu entries will be localized and will be in right place.

 Why I'm writing this letter instead simply filling bugs on packages?
 
 ...

 Maybe debian developers should improve debian package making standards
 (Debian policy) and recommend to add Gnome/Kde menu entry for all packages,
 which have Debian menu entry ? Then maintainers will include .desktop
 files, at least after bugreports :)

I'm not sure that's a good idea. I'm using Gnome and I'd like to keep a
simple applications' menu, not having hundred entries like in my
debian's menu. Having too many entries in a menu is an usability problem
imho (it's very annoying to search an item in the middle of long
menus). If you are using non KDE/Gnome apps you should perhaps add some
launchers in the desktop for them ?

I've added the gnome/kde in the Cc: field because I think it's rather a
desktop's problem than a mentors/devel problem.


Cheers,

Sebastien Bacher





Re: Install Images

2003-12-03 Thread Tom Badran
On Wednesday 03 December 2003 18:12, Andreas Metzler wrote:
 http://freedesktop.org/~daniel/d-i/
   cu andreas

You star ;)

Thanks

Tom

-- 
 ^__^| Tom Badran
 (oo)\__ | Imperial College
 (__)\   )\/\| Department of Computing
||w || ---
|| ||| Using Debian SID


pgpQ49PglrOcI.pgp
Description: signature


Re: Revival of the signed debs discussion

2003-12-03 Thread Werner Koch
On Wed, 3 Dec 2003 12:08:10 +0100, Matthias Urlichs said:

 signature algorithm would allow for hashing the data on the remote
 machine, and signing that hash locally.
 
 ... that would work. It'd probably require a few hooks within GPG
 to generate a hash packet / .

Since I moved my actual development to faster machines I now always
need to copy the tarballs to the box where I can sign them and this is
not very convenient.  Obviously, I thought about such a solution too.

There are some minor problems because we don't just sign a hash but
need to add some more data.  Creating an incomplete hash on the remote
machine is not the cleanest solution, so I have to come up with a
better way.

  Werner

-- 
Werner Koch  [EMAIL PROTECTED]
The GnuPG Expertshttp://g10code.com
Free Software Foundation Europe  http://fsfeurope.org




Re: Two different libpng2_1.0.12-3.woody.3_i386.deb?

2003-12-03 Thread Jeroen van Wolffelaar
On Wed, Dec 03, 2003 at 05:44:36PM +0100, Santiago Vila wrote:
 file=main/libp/libpng/libpng2_1.0.12-3.woody.3_i386.deb
 wget -q -O 1.deb http://ftp.debian.org/debian/pool/$file
 wget -q -O 2.deb http://security.debian.org/pool/updates/$file
 diff 1.deb 2.deb

 Binary files 1.deb and 2.deb differ

$ dpkg -x 1.deb 1 ; dpkg -x 2.deb 2
$ diff -ur 1 2
Binary files 1/usr/share/doc/libpng2/changelog.Debian.gz and
2/usr/share/doc/libpng2/changelog.Debian.gz differ
$ zdiff -qs */usr/share/doc/libpng2/changelog.Debian.gz
Files - and /tmp/changelogDebian.gz.10985 are identical

So, only the gzip compression on the changelog is different... which
means that both packages are created independently from the same source,
with the same resulting binaries etc, only apparently using different
versions of gzip and/or different default options for gzip.

 How could this happen? Should I worry about it?

Very strange, maybe it has something to do with them being security-team
NMU's, one is build by security team, the other by the maintainer.

Should you worry? I don't know, depends on wether it's normal that two
different builds circulate on offical archives...

--Jeroen

-- 
Jeroen van Wolffelaar
+31-30-253 4499
[EMAIL PROTECTED]
http://Jeroen.A-Eskwadraat.nl




Re: Revival of the signed debs discussion

2003-12-03 Thread Matt Zimmerman
On Wed, Dec 03, 2003 at 06:43:18AM +0100, Goswin von Brederlow wrote:

 Matt Zimmerman [EMAIL PROTECTED] writes:
 
  On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote:
  
   But this kind of tampering _can_ be checked by apt before installing
   the deb simply by adding a signature verifyer into the
   DPkg::Pre-Install-Pkgs config option, the same mechanism
   apt-listchanges already uses to display only the new section of the
   changelog.
  
  Indeed, apt can do a lot better, and is very close to doing so. See #203741.
 
 The assumption was that the archive was compromised but the Release.gpg
 file changed and resigned.

Who was assuming this?  At any rate, protecting the secret key is of course
the weakest link in any public key cryptosystem, and I don't see what that
has to do with apt.

 #203741 is about checking the
 Release.gpg chain of trust or is there more hidden in all the mails.

Yes, that is what it is about.

 Did the BTS reoder the mails, there don't seem to follow a locigal
 discussion. Haven't bothered to check the timestamps though.

Messages from discussions in other fora (including private mail) were later
copied to the BTS.

-- 
 - mdz




Re: Debian packages and freedesktop.org (Gnome, KDE, etc) menu entries

2003-12-03 Thread Zenaan Harkness
On Wed, 2003-12-03 at 20:15, Herbert Xu wrote:
 AKL. Mantas Kriauciunas [EMAIL PROTECTED] wrote:
  
  Solution is to add freedesktop.org standartized menu entry for programs,
  which could be started from menu (for example there is no meaning to
  start apt-get tool from menu). Then users of modern desktops will be
  happy, because they can easily find how to start installed applications
  - menu entries will be localized and will be in right place.
 
 If the Debian menu system can't represent what you want, then we should
 either extend it so that it does, or get rid of it.  It makes no sense
 to support two sets of menu entries throughout the distribution.

I agree. I would like to see .desktop standard adopted. There have been
a few threads I have seen so far, and there seems to be some level of
resistance to the idea.

I think if too many applications in menu or wanting simple menu is a
different problem entirely. Once you know where to find apps, you still
have too many. At the moment it's doubly complex, and that's plain
silly!

imho of course
zen

-- 
Debian Enterprise: A Custom Debian Distribution: http://debian-enterprise.org/
* Homepage: http://homepages.ihug.com.au/~zenaan/
* PGP Key: http://homepages.ihug.com.au/~zenaan/zen.asc
* Please respect the confidentiality of this email as sensibly warranted.




Re: The term Custom Debian Distribution (Was Re: [custom] The term flavor and encouraging work on Debian)

2003-12-03 Thread cobaco
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 2003-12-03 12:24, Fabian Fagerholm wrote:
 On Wed, 2003-12-03 at 12:17, Andreas Tille wrote:
  On Tue, 2 Dec 2003, Fabian Fagerholm wrote:
   The term suggests that the distribution is not-Debian, which is
   unneccessary and confusing.
 
  As non native speaker and also in general I try to avoid joining stupid
  naming discussions.  But here is the weak part of the name we have
  choosen which has definitely to be clarified in an announcement of those
  people who invented the term.

 If some of the people who participated in the Debcamp Custom
 Distribution BOF (see
 http://www.debian.org/devel/debian-nonprofit/News/2003/20030717) are
 listening, perhaps you could elaborate? (Cc'ing Mako Hill since he was
 referenced as one of the driving forces behind the meeting.)

hm, I've added a definition to the wiki:

  A Custom Debian Distribution (CDD) is a version of Debian that is tailored   
  for a particular situation/target group out-of-the-box. 

  Any changes necessary to Debian to support this particular situation/target  
  group arge merged back into Debian whenever possible, improving Debian as a  
  whole.

- -- 
Cheers, cobaco
  
1. Encrypted mail preferred (GPG KeyID: 0x86624ABB)
2. Plain-text mail recommended since I move html and double
format mails to a low priority folder (they're mainly spam)
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/zdCV5ihPJ4ZiSrsRAsbLAJ9DdvJr/UQyZlIA0hAQgfu9b/gdowCglNOb
vJDtVz2E2aHumHDpKmxSjHc=
=CIIJ
-END PGP SIGNATURE-




Re: Debian packages and freedesktop.org (Gnome, KDE, etc) menu entries

2003-12-03 Thread Matthias Urlichs
AKL. Mantas Kriauciunas wrote:

 Herbert Xu: Please discuss this on debian-devel before filing further
 bugs.

IMHO, there's no need to discuss this to death -- .desktop files make
sense, therefore packages should supply them. There's no sane way to ask
maintainers to do so except to file bugs, therefore bugs should be filed,
and that's all there is to it.

-- 
Matthias Urlichs   |   {M:U} IT Design @ m-u-it.de   |  [EMAIL PROTECTED]
Disclaimer: The quote was selected randomly. Really. | http://smurf.noris.de
 - -
The seven deadly sins ... Food, clothing, firing, rent, taxes, respectability
and children.  Nothing can lift those seven milestones from man's neck but
money; and the spirit cannot soar until the milestones are lifted.
-- George Bernard Shaw




Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Anthony Towns aj@azure.humbug.org.au writes:

 On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote:
  You change the contents of the compromised Packages file, so that 
  Package: bash
  is accompanied by
  Filename: pool/main/b/bash/vulnerable-ident-server_1.0-1_i386.deb
  which contains a perfectly valid .deb file, signed by a DD, that has
  nothing whatsoever to do with bash.
  AFAIK, apt does not sanity check the relationship between package names
  and filenames (and it's not obvious that this should be part of its
  responsibilities), and dpkg only gets a list of .debs to install once
  they've been downloaded.
 
 Problem is that apt runs:

Not realy a problem, a benefit in this case.

   # dpkg -i vulnerable-ident-server_1.0-1_i386.deb
   # dpkg --configure bash
 
 the latter will generally give you an error, and for remote exploits,
 just unpacking the vulnerable software isn't enough. It's probably fine
 for local exploits, but you'd have to be on your toes.

You get an error. Its a bit late in the process as it is now but for
me red flags would rise, sirens start screaming, the internet
connection starts a 60 second hardware cut countdown :)

 Getting apt to downgrade a package you've already got installed is more
 straightforward; although apt-get dist-upgrade; apt-get dist-upgrade
 will keep trying to download the same deb then.

Yeah, as shown version mismatches don't show up suspiciously. One has
to read the output carefully to detect those. Fat chance when doing a
dist-upgrade of 300 debs.

That is what you ment, a older package claiming to be newer, right?

 Getting apt to upgrade a package you've already got installed to something
 newer that's vulnerable isn't detectable, but will usually need a newer
 libc6, which is a good warning sign.

If you upgrade you probably want a newer version. Making sure you
don't install a vulnerable version (be it a faked or real package
doesn't much matter) is your own job. Faking the newest version
to be an even newer, not yet existing, version might throw people off
thinking a DSA has already been fixed or prevent future fixes from
getting installed though.

I wrote a little script that checks what apt things its installing
against what the control files of the debs say. I will test it with
some more fakes and then file it in the BTS.

MfG
Goswin




Re: exim4-config and exim4-base installed on systems with non-exim-MTA

2003-12-03 Thread Marc Haber
On Thu, 4 Dec 2003 04:21:55 +1000, Anthony Towns
aj@azure.humbug.org.au wrote:
I'm going to ignore the -config package, since it's not really part of
the problem.

Is it?

Okay, so you want to say:

   * any exim4-daemon package should only be installed when exim4-base
 is already installed and setup
   * exim4-base and shouldn't be installed when another MTA
 is installed
   * exim4-base shouldn't be installed when exim4-daemon isn't going
 to be installed

Yes. Additionally, the three points hold for exim4-config as well.

Ideally you'd have a dep loop here: exim4-daemon deps exim4-base and
vice-versa. There are two options that can make that work, one is a
Pre-Depends: (avoid if possible, but maybe not unreasonable),

Do we need consensus on -devel to have two binary packages built from
the same source declaring a pre-dependency?

the other
is to ensure that exim4-base (and config) is configured first, which
can be done by having them not have a postinst script. That mightn't be
good enough.

Both -base and -config have non-trivial postinst scripts.

If those solutions aren't possible, then you can have exim4-base installed
without an exim4 daemon. To avoid having another MTA installed, you have
to have a Conflicts: m-t-a. You thus also have to have a Provides: m-t-a.
But then you have to provide /usr/sbin/sendmail, which means you need
a daemon installed.

So you're back to needing the circular dependencies.

Right.

Personally, I'd suggest not having the separate -config package; and
letting sites do their own exim configurations manually, rather than by
creating a replacement -config package.

The way -config does the configuration is something that is questioned
by a lot of people. Most conservative eximists hate the configuration
being split out in several files, and having the separate -config
package allows people to throw away the entire -config magic.

This is something I would hate to give up.

If that's really out of the question, and the -config or -base package needs
a postinst atm, a Pre-Depends is probably the best option.

Which package should then pre-depend on which other package?

Greetings
Marc, really appreciating your help

-- 
-- !! No courtesy copies, please !! -
Marc Haber  |Questions are the | Mailadresse im Header
Karlsruhe, Germany  | Beginning of Wisdom  | Fon: *49 721 966 32 15
Nordisch by Nature  | Lt. Worf, TNG Rightful Heir | Fax: *49 721 966 31 29




Re: debsums for maintainer scripts

2003-12-03 Thread Manoj Srivastava
On Mon, 1 Dec 2003 17:12:36 -0500, christophe barbe [EMAIL PROTECTED] said: 

 I don't see why adding a md5dsum_are_mandatory clause to the debian
 policy would be difficult (what would be a good reason to not add
 md5sum to a package?).

Because it buys little security wise? Because there are
 solutions one can put in place today that offer better coverage than
 in package md5sums?

manoj
-- 
In an age when the fashion is to be in love with yourself, confessing
to be in love with somebody else is an admission of unfaithfulness to
one's beloved. Russell Baker
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: [RFC] adding system users: which is the best way??

2003-12-03 Thread Zenaan Harkness
On Thu, 2003-12-04 at 01:51, Andreas Metzler wrote:
 Steve Greenland [EMAIL PROTECTED] wrote:
 [...]
  I think the idea of a namespace for usernames used by packages is a good
  idea, but rather than debian-, we should take this to the LSB folk, so
  that we can get it done once.
 
 The problem with this is time. I need to add a system-user (for exim4)
 _now_. Shall I go for namespace, and if yes which one? _debian-exim,
 debian-dexim, DEB-exim?

This might be pointing out the obvious, but anyway:

If nothing else, perhaps email a freedesktop list to get a tentative/
quick discussion of the topic - put some suggestions up there if you
want to pre-empt particular convention, and tell them what you chose
after a few days. Pre-existing usage (if you're the first), especially
as the result of discussion with the relevant people, will add something
to the decision process, hopefully toward not having to make changes in
the future.

cheers
zen

-- 
Debian Enterprise: A Custom Debian Distribution: http://debian-enterprise.org/
* Homepage: http://homepages.ihug.com.au/~zenaan/
* PGP Key: http://homepages.ihug.com.au/~zenaan/zen.asc
* Please respect the confidentiality of this email as sensibly warranted.




Re: Bug#222730: ITP: zope-groupuserfolder -- group management for Zope

2003-12-03 Thread Nicolas Ledez
Le Wed, Dec 03, 2003 at 08:58:19AM +0100, Andreas Tille a écrit :
 On Tue, 2 Dec 2003 [EMAIL PROTECTED] wrote:
 
  This package is an empty dummy package that always depends on a package
  built for Debian's default Python version.
 Why that.  It should depend from Debian's Zope version or if explicite
 Python dependency is needed for one or the other reason it should depend
 from the Python version Zope is dependant from.  This is not automatically
 the default Python version.
Oups, it's a real package, but I made a copy-paste too fast.

Updated description :

Description: Add group management to zope
 GroupUserFolder is a kind of user folder that provides a special kind
 of user management.
 Some users are flagged as GROUP and then normal users will be able to
 belong to one or serveral groups.

-- 
Nicolas Ledez - Virtual Net (www.virtual-net.fr)
80, avenue des Buttes de Coesmes - 35700 RENNES
tel: +33 2 23 21 06 32 - fax: +33 2 99 38 16 85


pgphfEsDtRkDo.pgp
Description: PGP signature


Re: OT: Smartcards and Physical Security

2003-12-03 Thread Manoj Srivastava
On Wed, 3 Dec 2003 06:54:29 -0800, Tom Ballard  [EMAIL PROTECTED] said: 

 On Wed, Dec 03, 2003 at 08:45:49AM -0600, Steve Langasek wrote:

 Share the crack.

 In my experience kids in college and right out tend to freak out
 over the thought of having to spend a few dollars of disposable
 income, because they don't have any :-)

Guess what the median age of a Debian developer is.

 Hey, laugh if you want, most organizations have dues, it's not
 unprecedented in human history :-)

Volunteer organization have dues? And what services would
 Debian provide, pray, apart from the priviledge of working without
 pay?

manoj
-- 
I don't know what you mean by 'glory', Alice said. Humpty Dumpty
smiled contemptuously.  Of course you don't -- till I tell you.  I
meant 'there's a nice knock-down argument for you!' But glory
doesn't mean 'a nice knock-down argument', Alice objected. When I
use a word, Humpty Dumpty said, in a rather scornful tone, it means
just what I choose it to mean -- neither more nor less. The question
is, said Alice, whether you can make words mean so many different
things. The question is, said Humpty Dumpty, which is to be master
-- that's all. Lewis Carrol, Through the Looking Glass
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: OT: Smartcards and Physical Security

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 09:26:15AM -0600, Manoj Srivastava wrote:
   Guess what the median age of a Debian developer is.

Don't know, don't care.

   Volunteer organization have dues?

Yes, I don't know what planet you're from, but on this planet the 
Rotarians, Kiwanas, Civitans, Knights of Columbus, United Way, Red 
Cross, Freemasons, NAACP, and Jerry's Kids all collect money from their 
members.  You still feeling superior?




Re: OT: Smartcards and Physical Security

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 09:28:30AM -0600, Manoj Srivastava wrote:
  Sender: Tom Ballard [EMAIL PROTECTED]

Yeah, somebody else pointed that out.  It's bullshit that mutt was doing 
that to me.  My /etc/email-addresses:
# This is /etc/email-addresses. It is part of the exim package
#
# This file contains email addresses to use for outgoing mail. Any local
# part not in here will be qualified by the system domain as normal.
#
# It should contain lines of the form:
#
#user: [EMAIL PROTECTED]
#otheruser: [EMAIL PROTECTED]
tom: Tom [EMAIL PROTECTED]

So I thought I was covered, and my .muttrc never showed it.  I fixed
it.

Like I said, I never thought I'd have to lie to Linux, but there you 
are.




Re: OT: Smartcards and Physical Security [Was: Re: Backport of the integer overflow in the brk system call]

2003-12-03 Thread Tom
On Tue, Dec 02, 2003 at 05:34:05PM -0800, Don Armstrong wrote:
 On Tue, 02 Dec 2003, Tom wrote:
  I think the DD's should seriously think about requiring smartcards.
  It would have prevented the proxmiate cause of our recent troubles.
 
 Smartcards are not a magical panacea either. The problems associated

No, they're not.  Security is all about layers of defense.

 with them aren't too terribly different from those associated with
 keys or other forms of physical security, notably, that they can be
 stolen, or the output from them duplicated. Refer to the ongoing saga
 between DirectTV and satelite pirates for a trivially applicable
 example.

Yes but the attacker did not steal the DD's computer.  He rooted it 
remotely.  It is true that a shitty smartcard which is only dumb storage 
for a private key is no better than storing your keys on an USB keyring.

Good smartcards never transfer the key off the card.  The smart card can 
be compromised itself true.  Repeat: Security is about layers of 
defense.  Multiple things have to be compromised.

 
 From my perspective, Smartcards do little to raise the bar. They
 merely move the bar sideways.

You're wrong.  They're better.




Re: exim4-config and exim4-base installed on systems with non-exim-MTA

2003-12-03 Thread Anthony Towns
On Wed, Dec 03, 2003 at 05:49:20PM +0100, Andreas Metzler wrote:
 exim4 is a metapackage that depends on the other three and is not hit by
 the problem. The rest is a straighforward chain.
 
 daemon  -base  -config.
 other possible dependencies would be:
 daemon   -config  -base
 or
 daemon  -base
`--  -config
 The daemon-packages provide/conflict/replaces MTA.

On Wed, Dec 03, 2003 at 04:41:00PM +0100, Marc Haber wrote:
 This causes dselect to install exim4-base and exim4-config on a system
 that has some other (non-exim) MTA installed, which is a bad thing.

I'm going to ignore the -config package, since it's not really part of
the problem.

Okay, so you want to say:

* any exim4-daemon package should only be installed when exim4-base
  is already installed and setup
* exim4-base and shouldn't be installed when another MTA
  is installed
* exim4-base shouldn't be installed when exim4-daemon isn't going
  to be installed

Ideally you'd have a dep loop here: exim4-daemon deps exim4-base and
vice-versa. There are two options that can make that work, one is a
Pre-Depends: (avoid if possible, but maybe not unreasonable), the other
is to ensure that exim4-base (and config) is configured first, which
can be done by having them not have a postinst script. That mightn't be
good enough.

If those solutions aren't possible, then you can have exim4-base installed
without an exim4 daemon. To avoid having another MTA installed, you have
to have a Conflicts: m-t-a. You thus also have to have a Provides: m-t-a.
But then you have to provide /usr/sbin/sendmail, which means you need
a daemon installed.

So you're back to needing the circular dependencies.

Personally, I'd suggest not having the separate -config package; and
letting sites do their own exim configurations manually, rather than by
creating a replacement -config package. Then you should be able to set
things up so that:

exim4-daemon
- has a postinst which starts the daemon
- Provides/Conflicts: m-t-a
- Depends: exim4-base
exim4-base
- has no postinst
- needs no configuration
- provides common support files
- Depends: exim4-daemon

Having a check to say /etc/exim/exim.conf already exists? well, obviously
you don't need any help and not asking any debconf questions is one
way that should work, specifically asking do you want to configure exim
manually? is another.

If that's really out of the question, and the -config or -base package needs
a postinst atm, a Pre-Depends is probably the best option.

Cheers,
aj

-- 
Anthony Towns [EMAIL PROTECTED] http://azure.humbug.org.au/~aj/
I don't speak for anyone save myself. GPG signed mail preferred.

   Linux.conf.au 2004 -- Because we can.
   http://conf.linux.org.au/ -- Jan 12-17, 2004


pgp4QJffJQsl2.pgp
Description: PGP signature


Re: OT: Smartcards and Physical Security

2003-12-03 Thread Tom
On Wed, Dec 03, 2003 at 09:24:07AM -0600, Manoj Srivastava wrote:
   Heh. Your grasp of the practicality of the situation is
  slipping.  Not only do these guys donate a fairly expensive chunk of
  billable hours and expertise, they must pay to be able to volunteer?

Sure, if you care about security.




Re: Backport of the integer overflow in the brk system call

2003-12-03 Thread Manoj Srivastava
On Tue, 2 Dec 2003 23:46:45 +, Geoff Richards [EMAIL PROTECTED] said: 

 On Tue, Dec 02, 2003 at 01:28:28PM -0800, Tom wrote:
 I read all the words but took a completely different meaning :-)
 I'm from the South, we have different speech patterns...

 South of where?

The Mason-Dixon line?

manoj
-- 
Beware of all enterprises that require new clothes, and not rather a
new wearer of clothes. Henry David Thoreau
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: The term Custom Debian Distribution (Was Re: [custom] The term flavor and encouraging work on Debian)

2003-12-03 Thread Andreas Tille
On Wed, 3 Dec 2003, cobaco wrote:

 hm, I've added a definition to the wiki:

   A Custom Debian Distribution (CDD) is a version of Debian that is tailored
I do not like the term version.  I'd prefer a subset of Debian.  You
get a CDD together with main but you get a helping hand to cope with the
sheer mass.
   for a particular situation/target group out-of-the-box.

   Any changes necessary to Debian to support this particular situation/target
   group arge merged back into Debian whenever possible, improving Debian as a
   whole.
There are no changes to Debian, because CDDs reside completely in
main / testing /unstable as any other package.

Kind regards

Andreas.




Re: [RFC] adding system users: which is the best way??

2003-12-03 Thread Anthony DeRobertis
On Sun, 2003-11-30 at 07:47, Bernhard R. Link wrote:

 Could anyone familar with cups explain why this is no RC-bug? 

From when I've seen it do it, for the same reason SWAT and webmin aren't
RC bugs: They do it because the administrator said to change the config.


signature.asc
Description: This is a digitally signed message part


Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Matt Zimmerman [EMAIL PROTECTED] writes:

 On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote:
 
  But this kind of tampering _can_ be checked by apt before installing
  the deb simply by adding a signature verifyer into the
  DPkg::Pre-Install-Pkgs config option, the same mechanism
  apt-listchanges already uses to display only the new section of the
  changelog.
 
 Indeed, apt can do a lot better, and is very close to doing so. See #203741.

The assumption was that the archive was compromised but the
Release.gpg file changed and resigned. #203741 is about checking the
Release.gpg chain of trust or is there more hidden in all the mails.

Did the BTS reoder the mails, there don't seem to follow a locigal
discussion. Haven't bothered to check the timestamps though.

MfG
Goswin




Re: Two different libpng2_1.0.12-3.woody.3_i386.deb?

2003-12-03 Thread Gabor Burjan
On Wed, Dec 03, 2003 at 05:44:36PM +0100, Santiago Vila wrote:

 wget -q -O 1.deb http://ftp.debian.org/debian/pool/$file
 wget -q -O 2.deb http://security.debian.org/pool/updates/$file
 diff 1.deb 2.deb
 
 Binary files 1.deb and 2.deb differ
 
 How could this happen? Should I worry about it?

$ diff -u (cd 1  find . -type f -print0 | xargs -0 md5sum) (cd 2  find . 
-type f -print0 | xargs -0 md5sum)
--- /dev/fd/63  Wed Dec  3 18:11:59 2003
+++ /dev/fd/62  Wed Dec  3 18:11:59 2003
@@ -4,5 +4,5 @@
 efcb0a3d92c575963f4cd4e4f79f425f  ./usr/share/doc/libpng2/changelog.gz
 54119d0a36cff7d0822489193119fc83  ./usr/share/doc/libpng2/ANNOUNCE.gz
 ebe766baed86109342285496d792d3ef  ./usr/share/doc/libpng2/KNOWNBUG.gz
-9371022fb0313ab0b2062202383c57ec  ./usr/share/doc/libpng2/changelog.Debian.gz
+3f9dfa57c390b6465b655e12f4b3490a  ./usr/share/doc/libpng2/changelog.Debian.gz
 27164cfa4772e8424149aaa801119ead  ./usr/lib/libpng.so.2.1.0.12
$ diff -u (zcat 1/usr/share/doc/libpng2/changelog.Debian.gz) (zcat 
2/usr/share/doc/libpng2/changelog.Debian.gz)
$

It looks like that the two binary packages were built on different places but
have basically the same content.

Gabor




Re: INSTALL-REPORT

2003-12-03 Thread Joshua Kwan
On Wed, Dec 03, 2003 at 09:22:14AM +0100, Werner Wobrowsky wrote:
 Debian Installer sarge-i386-bussinescard.iso, httP://freedesktop.or/

Cool, but...

 FreeBSD 5.1-RELEASE-p11 #0: Thu Nov 27 15:07:08 CET 2003
 [EMAIL PROTECTED]:/usr/src/sys/i386/compile/NEW

I didn't know the sarge ISOs supported Debian/FreeBSD. :)
Wrong dmesg?

-- 
Joshua Kwan


pgpIROADjx2N3.pgp
Description: PGP signature


Bug#222807: ITP: distcmd -- Distribute load to multiple machines using ssh

2003-12-03 Thread Anthony DeRobertis
Package: wnpp
Severity: wishlist

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

* Package name: distcmd
  Version : 0.9
  Upstream Author : Anthony DeRobertis [EMAIL PROTECTED]
* URL : http://ntp.derobert.net/DistCmd/
* License : GPL
  Description : Distribute load to multiple machines using ssh

 DistributedCommand allows you to run commands load-balanced over
 one or more machines. Notable features include performing all remote
 control of machines using ssh; transfering files over scp or a shared
 filesystem, on a per-host basis; and avoiding copying through hardlinks
 when possible.
 .
 Out of the box, it supports running oggenc to encode Ogg Vorbis
 streams. An example of how to use it with Jack the Ripper is included.


NOTE: Packages are available at the above URL. That URL is not going to
  last forever, though

  I need a sponsor for this.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/zfVF+z+IwlXqWf4RAmR7AJ4jMHVOyJk3a5MWxTgEUXvU4r3SjQCeMqbs
71w0U2whdvZ82IBeSs+YKhE=
=2HqB
-END PGP SIGNATURE-




  1   2   >