Re: Anyone get Evolution 0.8 working?

2001-01-02 Thread Bob Bernstein
On Tue, Jan 02, 2001 at 09:56:58AM -0800, Bruce Perens wrote:

 I built gtkhtml 0.8 and evolution 0.8 on unstable. Evolution says Can't 
 initialize the Evolution shell.
 This appears to be a CORBA problem. Before I dive in, has anyone else dealt 
 with it?

Only to the extent you are duplicating _exactly_ my experience with
evolution 0.8 and gtkhtml 0.8, where both are built from source on unstable!

Sorry. 

If you are vouchsafed a solution (by your, or anyone else's, hand) could you
post a heads-up hereabouts?


-- 
Bob Bernstein
at
Esmond, Rhode Island, USA  




Re: Anyone get Evolution 0.8 working?

2001-01-02 Thread Bob Bernstein
On Tue, Jan 02, 2001 at 05:51:52PM -0800, Bruce Perens wrote:

 Ettore set me straight. The problem is that oaf is not looking in
 /usr/local/share/oaf , and if you do the default installation, CORBA
 won't work. Move the contents of /usr/local/share/oaf to /usr/share/oaf .
 Run oaf-slay.  Various GNOME applications die. Start evolution.

Yes, that does it.

It is a continual pain trying to get the prefixes straight with gnome,
mixing and matching Helix stuff and source code.

 There may be a policy question here regarding /usr/local and oaf.

I'll be staying tuned! g

Thanks,

-- 
Bob Bernstein
at
Esmond, Rhode Island, USA  




Re: Security of Debian SuX0r?

2000-09-02 Thread Bob Bernstein
On Fri, Sep 01, 2000 at 05:40:15PM -0500, Roland Bauerschmidt wrote:

 Shall we make something like 700 default?

No. Resist the urge to dumb things down. Better to insist on intelligent,
responsible users who have been educated, and have educated themselves,
about the realities of computer security rather than lull them into a false
sense of security. chmod 700 will set them up for nasty surprises on other
Unix accounts they may come to use.

The reality is that if you must keep something private then encrypt it (pgp
-c my_secrets.txt). Anything less than that represents ceding control over
your privacy to other parties, whether it be the operating system, the
network configuration, or whatever. Encourage users to be responsible for
security *themselves*.

My $0.02 worth...

-- 
Bob Bernstein
at
Esmond, R.I., USA


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Security of Debian SuX0r?

2000-08-30 Thread Bob Bernstein
Juhapekka Tolvanen [EMAIL PROTECTED] wrote:

 Have you guys and girls seen this? What do you think about it?
 
 http://www.securityportal.com/closet/

I demur from the generally benign flavor of the reactions I've seen so far. I
think this was a hatchet job by a guy who appears completely disingenuous when
he claims he would have liked to have written a glowing review of Debian.
Here's my reply to him, which was a kneejerk reaction and could have been
longer and more thorough: 

Date: Wed, 30 Aug 2000 12:51:12 -0400 (EDT)
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
From: Bob Bernstein [EMAIL PROTECTED]
Subject: point by point rebuttal

I will back up my claim that the review was biased herewith:

A casual read suggests that other distros do things much better. Wrong. Kurt
seems to think that any distro that doesn't follow *his* notion of a secure
system is flawed, i.e. contains 'bugs'. 

Thus his first Debian criticism is something *every* distro does:

The first thing I noticed was
that while formatting the disk,
Debian defaults to an enormous /
partition and a swap partition.

I know of no Linux distro that does otherwise. And he is wise enough to
acknowledge that here. But that is the last we see of this wisdom. (NetBSD and
FreeBSD offer default disklabels that are better. OpenBSD does not bother to
offer any default at all; you're on your own.) So, next:

The next default that really
ticks me off is the password
encryption scheme - the default
is to use crypt. You can also use
MD5, but there is a warning about
compatibility.

So there's a warning? At least MD5 *can* be implemented at install-time. Why
doesn't he mention that Caldera for one doesn't even offer MD5 as an _option_
at install-time? Next:

Moving on. Once the basic install
is done, you will discover that
several services are enabled in
inetd that shouldn't be. Discard,
daytime, time, shell, login, and
exec (r services) are all enabled
by default, few of which (none,
in my opinion) are needed on
modern systems.

As you once pointed out in a linuxplanet article, this is a fault of ALL Linux
distros, in fact of ALL distros I know of other than OpenBSD! Next:

dpkg - My main beef with dpkg is
the lack of package signing
support. 

The guy is simply a raving rpm zealot here. To trade off the superb utility of
the Debian package system for PGP sigs is stupid. And no, MD5 sigs are not
that much more of a risk here because due to the excellence of the Debian
package collection one is rarely IF EVER called on to use a non-official
package. This is very much in contrast to the chaos that reigns in the rpm
world. Next:

Home directories for users in
Debian are by default world
readable and executable (to
change into a directory, you need
executable permission). This is a
very bad idea. It is made even
worse by the fact that the
default umask is 022. 

These are world-wide Unix standard values. And they are install DEFAULTS. If
you are going to administer a system with public access and/or large numbers
of users then you have to make some decisions and let your users know what the
reality is. It foolish to assume on any Unix system that the files in your
home dir cannot be read by others logged on to the system. And it is simple to
create a confidential subdir or - if you're not using Apache's 'public_html'
default - to change the permissions on your home dirs (as he notes). He is
creating a tempest in a tea pot here. Next:

LILO is also configured very
poorly. Despite the fact that
Debian 2.2 specifies sulogin
for single user mode, prompting a
user for the root password is
easily bypassed, by entering the
following argument at the LILO
command line:
Linux init=/bin/sh

I don't know how other distros do this. Kurt's discussion of these matters in
his LASG is the best I know of. And, I believe this has come up on the
debian-devel list. So I will give him a point here _tentatively_, until I hear
the other side. But, as usual, and as noted, the fix is simple. How does COL
do it? (I would add that anyone in the world can create a boot floppy or CD
that will obtain the same results! I am a big supporter of boot security, as
my security piece indicates, but at a certain point you have say that given
physical access to the machine, all bets are off.)

The rest of the article seems to be limited to a critique of the package
versions that are distributed with this release. I don't know how to answer
that. At a certain point one must freeze a release in order to make it
actually a release! The implication here is that it is possible on God's good
earth to make a release wherein none of its member packages contain any
security flaws at all! How silly. As for the fact that Debian hasn't applied
known, available fixes to certain packages in the release, he may be right
there. That's the second and last point I will _tentatively_ give him. Now he
says:

Debian's goal of a bug
free-release hasn't been met.

I haven't seen one bug mentioned in this article. A bug