NEW changes in stable-new

2015-04-16 Thread Debian FTP Masters
Processing changes file: netcf_0.1.9-2+deb7u2_sparc.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1yie2r-j1...@franck.debian.org



Bug#746946: wheezy-pu: package distro-info-data/0.23~deb7u1

2015-04-16 Thread Raphael Hertzog
On Thu, 16 Apr 2015, Stefano Rivera wrote:
 +- Correct EOL date of Debian 6.0 Squeeze to 2014-05-31.

FWIW, Debian 6 Squeeze is supported for at least 5 years (i.e. 2016-02-06) and
most likely until Wheezy is no longer supported (i.e. 2016-04-24).

cf http://wiki.debian.org/LTS

-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150416090058.gb6...@home.ouaza.com



Re: Bug#769355: reportbug: extend binNMU support to cover more distros besides unstable

2015-04-16 Thread Holger Levsen
Hi Sandro,

On Donnerstag, 16. April 2015, Sandro Tosi wrote:
 That's great! now, last doubt: what type of suites are allowed in the
 nmu command? Andreas mentioned some (other than the default
 'unstable'):
 
 * experimental
 * $STABLE-backports
 * $STABLE-proposed-updates
 * $STABLE
 
 are there any other acceptable?

$OLDSTABLE-lts comes to my mind.


cheers,
Holger


signature.asc
Description: This is a digitally signed message part.


Bug#782381: Bug#781995: motif/2.3.4-6.1 failed to build

2015-04-16 Thread Graham Inggs

retitle 782381 pre-approval: unblock: motif/2.3.4-6.2
thanks


On 16/04/2015 07:46, Michael Gilbert wrote:

On Thu, Apr 16, 2015 at 1:31 AM, Graham Inggs wrote:

If you uploaded 2.3.4-6.2 now, could it cause any harm?  At least this
will get the package built and Release Team can still decide whether
to grant the unblock request or not.

If you can talk the release team into pre approving an unblock, then
I'm willing to do the upload.

Best wishes,
Mike


Great, thanks.

Is there anywhere else I should be talking to Release Team, besides 
replying to bug #782381?



For the record, I grepped /var/lib/dpkg/status and found:
49 instances of libxm4 (
47 instances of libxm4 (=
46 instance of libxm4 (= 2.3.4
1 instance of libxm4 (= 2.3.3 (from arb)
0 instances of libxm4 (= 2.3.4-
2 instances of libxm4 (= (from libmotif-dev and libmotif4-dbg)


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/552f7d9d.9030...@nerve.org.za



Processed: Re: Bug#781995: motif/2.3.4-6.1 failed to build

2015-04-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 retitle 782381 pre-approval: unblock: motif/2.3.4-6.2
Bug #782381 [release.debian.org] pre-approval: unblock: motif/2.3.4-8
Changed Bug title to 'pre-approval: unblock: motif/2.3.4-6.2' from 
'pre-approval: unblock: motif/2.3.4-8'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
782381: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782381
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.14291757212374.transcr...@bugs.debian.org



NEW changes in stable-new

2015-04-16 Thread Debian FTP Masters
Processing changes file: netcf_0.1.9-2+deb7u2_mipsel.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1yigcy-0002wq...@franck.debian.org



Bug#782599: marked as done (unblock: libdatetime-timezone-perl/1:1.75-2+2015c)

2015-04-16 Thread Debian Bug Tracking System
Your message dated Thu, 16 Apr 2015 13:31:44 +0100
with message-id 
4d49d7cf275a262bd1a06e496c7f5...@mowgli.jungle.funky-badger.org
and subject line Re: Bug#782599: unblock: 
libdatetime-timezone-perl/1:1.75-2+2015c
has caused the Debian Bug report #782599,
regarding unblock: libdatetime-timezone-perl/1:1.75-2+2015c
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
782599: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782599
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please unblock package libdatetime-timezone-perl:

This version contains an update of the data files to the 2015c
version of the olsondb as a quilt patch. It contains contemporary
changes for Egypt.

Changelog:

libdatetime-timezone-perl (1:1.75-2+2015c) unstable; urgency=medium

  * Update to Olson database version 2015c.
Add patch debian/patches olson-2015c, which updates the timezone *.pm
files, using upstream's tools/parse_olson script.
This update contains contemporary changes for Egypt.

 -- gregor herrmann gre...@debian.org  Tue, 14 Apr 2015 18:49:09 +0200

I'm attaching a manually stripped down debdiff.

unblock libdatetime-timezone-perl/1:1.75-2+2015c


Cheers,
gregor

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=XiVu
-END PGP SIGNATURE-
diff -Nru libdatetime-timezone-perl-1.75/debian/changelog libdatetime-timezone-perl-1.75/debian/changelog
--- libdatetime-timezone-perl-1.75/debian/changelog	2015-03-21 17:40:02.0 +0100
+++ libdatetime-timezone-perl-1.75/debian/changelog	2015-04-14 18:49:27.0 +0200
@@ -1,3 +1,12 @@
+libdatetime-timezone-perl (1:1.75-2+2015c) unstable; urgency=medium
+
+  * Update to Olson database version 2015c.
+Add patch debian/patches olson-2015c, which updates the timezone *.pm
+files, using upstream's tools/parse_olson script.
+This update contains contemporary changes for Egypt.
+
+ -- gregor herrmann gre...@debian.org  Tue, 14 Apr 2015 18:49:09 +0200
+
 libdatetime-timezone-perl (1:1.75-2+2015b) unstable; urgency=medium
 
   * Update to Olson database version 2015b.
diff -Nru libdatetime-timezone-perl-1.75/debian/patches/olson-2015c libdatetime-timezone-perl-1.75/debian/patches/olson-2015c
--- libdatetime-timezone-perl-1.75/debian/patches/olson-2015c	1970-01-01 01:00:00.0 +0100
+++ libdatetime-timezone-perl-1.75/debian/patches/olson-2015c	2015-04-14 18:49:27.0 +0200
@@ -0,0 +1,11810 @@
+Description: update to olson db 2015c
+Origin: vendor
+Author: gregor herrmann gre...@debian.org
+Last-Update: 2015-04-14
+
+--- a/lib/DateTime/TimeZone/Africa/Abidjan.pm
 b/lib/DateTime/TimeZone/Africa/Abidjan.pm
+@@ -3,7 +3,7 @@
+ # DateTime::TimeZone module distribution in the tools/ directory
+ 
+ #
+-# Generated from debian/tzdata/africa.  Olson data version 2015b
++# Generated from debian/tzdata/africa.  Olson data version 2015c
+ #
+ # Do not edit this file directly.
+ #
+@@ -39,7 +39,7 @@
+ ],
+ ];
+ 
+-sub olson_version { '2015b' }
++sub olson_version { '2015c' }
+ 
+ sub has_dst_changes { 0 }
+ 
+--- a/lib/DateTime/TimeZone/Africa/Cairo.pm
 b/lib/DateTime/TimeZone/Africa/Cairo.pm
+@@ -3,7 +3,7 @@
+ # DateTime::TimeZone module distribution in the tools/ directory
+ 
+ #
+-# Generated from debian/tzdata/africa.  Olson data version 2015b
++# Generated from debian/tzdata/africa.  Olson data version 2015c
+ #
+ # Do not edit this file directly.
+ #
+@@ -1164,17 +1164,17 @@
+ ],
+ [
+ 63547362000, #utc_start 2014-09-25 21:00:00 (Thu)
+-63565509600, #  utc_end 2015-04-23 22:00:00 (Thu)
++63566114400, # 

Re: Bug#746946: wheezy-pu: package distro-info-data/0.23~deb7u1

2015-04-16 Thread Stuart Prescott
Hi Raphael,

 +- Correct EOL date of Debian 6.0 Squeeze to 2014-05-31.
 
 FWIW, Debian 6 Squeeze is supported for at least 5 years (i.e. 2016-02-06)
 and most likely until Wheezy is no longer supported (i.e. 2016-04-24).
 
 cf http://wiki.debian.org/LTS

There is an on-going confusion in the wider Debian community about whether 
squeeze is still supported or EOL.

The squeeze-lts work does not cover all of squeeze -- there are significant 
limitations in the packages and archs covered. It would be inappropriate to 
indicate to users that other archs were supported by saying that squeeze is 
still a supported release. 

From the very first line of the wiki page you linked to:

LTS (Long Term Support) is a project for providing security
patches after oldstable reached its end of life. 

which would agree with distro-info-data in stating that squeeze is EOL.

As much as squeeze-lts is a great initiative, it's not true to say that 
squeeze is still a supported release. I guess that makes it EOL and it wants 
an EOL date that reflects when that change happened: 2014-05-31

Stuart

-- 
Stuart Prescotthttp://www.nanonanonano.net/   stu...@nanonanonano.net
Debian Developer   http://www.debian.org/ stu...@debian.org
GPG fingerprint90E2 D2C1 AD14 6A1B 7EBB 891D BBC1 7EBB 1396 F2F7




-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/mgo2uv$ofa$1...@ger.gmane.org



Re: Bug#769355: reportbug: extend binNMU support to cover more distros besides unstable

2015-04-16 Thread Adam D. Barratt

On 2015-04-16 0:48, Sandro Tosi wrote:

That's great! now, last doubt: what type of suites are allowed in the
nmu command? Andreas mentioned some (other than the default
'unstable'):

* experimental
* $STABLE-backports
* $STABLE-proposed-updates
* $STABLE

are there any other acceptable? is $STABLE 'stable' or 'wheezy' (the
former is preferred - from my POV - to avoid to update the suites list
at each release)? No binnmu in testing? so, really, what should I put
in this suites menu?! :)


The suites in wanna-build use codenames, and there are no 
-proposed-updates suites. wanna-build also exposes aliases for a 
handful of suites, but not all (wanna-build  --distribution-aliases on 
buildd.d.do will give you a list), and I assume the alias list is 
managed by hand. Due to both of those considerations, I'd suggest using 
the codenames.


As a not-necessarily-complete list, which will obviously change RSN:

- experimental
- sid/unstable (default if no suite is specified)
- jessie/testing
- wheezy/stable
- {wheezy,stable}-security
- wheezy-backports

Regards,

Adam


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/49c0c92332b4b2667537d1bab1162...@mowgli.jungle.funky-badger.org



need email marketing solutions?

2015-04-16 Thread Louis

Hope you are doing well today!
We specialize in providing email marketing services to a number of
businesses.

We would like to be your marketing partners and help your business reach
the next level.
We can increase your business sales 2-4 times than before.

Please contact us if you would require more information about pricing or
proposal.
Looking forward to your positive response.

Thanks,
Louis
Contact: cosm...@aliyun.com



--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/f1f485034d335dbd58b2f11aaf8e6...@smythstoys.com



Re: Bug#746946: wheezy-pu: package distro-info-data/0.23~deb7u1

2015-04-16 Thread Raphael Hertzog
[ Moving it to -lts to continue the discussion ]

Hi,

On Thu, 16 Apr 2015, Stuart Prescott wrote:
  cf http://wiki.debian.org/LTS
 
 There is an on-going confusion in the wider Debian community about whether 
 squeeze is still supported or EOL.

Where did you notice any confusion?

 The squeeze-lts work does not cover all of squeeze -- there are significant 
 limitations in the packages and archs covered. It would be inappropriate to 
 indicate to users that other archs were supported by saying that squeeze is 
 still a supported release. 

It's also inappropriate to say that it's EOL when 98% of the users who
are using amd64/i386 are still covered.

Yes there are packages which are unsupported in Squeeze but very much
like there are unsupported packages in Wheezy right now:

Squeeze:
http://anonscm.debian.org/cgit/collab-maint/debian-security-support.git/plain/security-support-ended.deb6
Wheezy:
http://anonscm.debian.org/cgit/collab-maint/debian-security-support.git/plain/security-support-ended.deb7
+ chromium cf https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776904

It's just that the list expands over time as more and more packages
get unsupportable when upstream no longer supports them. And we try to
avoid this by backporting newer upstream version when there's no other
solution (we did this recently for wireshark in squeeze). (And we would
love to shorten the list of unsupported packages if we had more
resources)

 From the very first line of the wiki page you linked to:
 
 LTS (Long Term Support) is a project for providing security
 patches after oldstable reached its end of life. 
 
 which would agree with distro-info-data in stating that squeeze is EOL.

Or that we should rephrase our description. We are working hand in hand
with security team to provide a continuity in security support. EOL is in
2016 but in the interim, there are restrictions in what is truly
supported.

 As much as squeeze-lts is a great initiative, it's not true to say that 
 squeeze is still a supported release. I guess that makes it EOL and it wants 
 an EOL date that reflects when that change happened: 2014-05-31

I disagree. But I really don't care about distro-info so I will not
discuss this further in this context.

That said I believe it's important to clarify the situation of squeeze.
Your EOL description is misleading (and not really thankful of the work
that Debian LTS team members have put into Squeeze).

Cheers,
-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150416140223.gb18...@home.ouaza.com



Re: Bug#746946: wheezy-pu: package distro-info-data/0.23~deb7u1

2015-04-16 Thread Moritz Mühlenhoff
On Thu, Apr 16, 2015 at 04:02:23PM +0200, Raphael Hertzog wrote:
 Yes there are packages which are unsupported in Squeeze but very much
 like there are unsupported packages in Wheezy right now:

Also, all other distros with long support have some level of reduced
support over time, see for example the requirements for
fixes in RHEL in it's later support stages, so having a few packages
not supported in squeeze-lts is fairly common.

We shouldn't label the LTS phase as second class.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150416160236.GB7902@pisco.westfalen.local



Bug#782712: pre-upload unblock request: systemd/215-17 for RC bug #751707

2015-04-16 Thread Martin Pitt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hello release team,

yesterday I discovered that systemd breaks a common way of setting up
plain cryptsetup partitions. Turns out that this has already been
known for a while, but the impact wasn't appreciated enough:

  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751707

What happens is that systemd's cryptsetup integration ignores the
offset= parameter in crypttab and instead uses the whole device. So
if you had a swap or other partition underneath in order to identify
the partition via UUID or label instead of an unreliable hardcoded
device name, switching to systemd destroys the underlying metadata,
and causes a boot hang as crypttab now refers to a nonexisting
UUID/label. This is quite a common way to set up encrypted swap, the
way that ecryptfs' own swap setup tool does it (the Ubuntu installer
calls that if you select encrypt my home directory; I'm not sure
whether Debian's installer does the same).

IMHO this qualifies as data loss, and we cannot repair this
automatically after the damage happened. So I'd really like to fix
this in jessie, and I upgraded it to RC.

The patch is quite straightforward. It got a first review by upstream,
I made it a bit more defensive since the first version, and it'll
probably land today. I attached my test script to the upstream bug [1]
which allows you to play around with various offset= options and
verify that it doesn't destroy the initial part of the partition.

I realize this is a somewhat awkward timing as we want to deep-freeze
in two days, and this means an udeb change (although only formally as
there are no effective changes in udev). 215-16 should go into testing
tonight, and I'm prepared to upload 215-17 with that fix right after
that with urgency=high.

What would you recommend how to proceed?

Thank you in advance!

Martin

[1] https://bugs.freedesktop.org/show_bug.cgi?id=87717
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)
diff --git a/debian/changelog b/debian/changelog
index 29ff5a3..103d8ce 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+systemd (215-17) UNRELEASED; urgency=medium
+
+  * cryptsetup: Implement offset and skip options. (Closes: #751707,
+LP: #953875)
+
+ -- Martin Pitt mp...@debian.org  Thu, 16 Apr 2015 07:12:08 -0500
+
 systemd (215-16) unstable; urgency=medium
 
   [ Christian Seiler ]
diff --git a/debian/patches/cryptsetup-Implement-offset-and-skip-options.patch 
b/debian/patches/cryptsetup-Implement-offset-and-skip-options.patch
new file mode 100644
index 000..f392bbc
--- /dev/null
+++ b/debian/patches/cryptsetup-Implement-offset-and-skip-options.patch
@@ -0,0 +1,66 @@
+From: Martin Pitt martin.p...@ubuntu.com
+Date: Thu, 16 Apr 2015 06:44:07 -0500
+Subject: cryptsetup: Implement offset and skip options
+
+These are useful for plain devices as they don't have any metadata by
+themselves. Instead of using an unreliable hardcoded device name in crypttab
+you can then put static metadata at the start of the partition for a stable
+UUID or label.
+
+https://bugs.freedesktop.org/show_bug.cgi?id=87717
+https://bugs.debian.org/751707
+https://launchpad.net/bugs/953875
+---
+ src/cryptsetup/cryptsetup.c | 21 +++--
+ 1 file changed, 19 insertions(+), 2 deletions(-)
+
+diff --git a/src/cryptsetup/cryptsetup.c b/src/cryptsetup/cryptsetup.c
+index a67d85e..6257c81 100644
+--- a/src/cryptsetup/cryptsetup.c
 b/src/cryptsetup/cryptsetup.c
+@@ -50,12 +50,12 @@ static bool arg_discards = false;
+ static bool arg_tcrypt_hidden = false;
+ static bool arg_tcrypt_system = false;
+ static char **arg_tcrypt_keyfiles = NULL;
++static uint64_t arg_offset = 0;
++static uint64_t arg_skip = 0;
+ static usec_t arg_timeout = 0;
+ 
+ /* Options Debian's crypttab knows we don't:
+ 
+-offset=
+-skip=
+ precheck=
+ check=
+ checkargs=
+@@ -168,6 +168,20 @@ static int parse_one_option(const char *option) {
+ return 0;
+ }
+ 
++} else if (startswith(option, offset=)) {
++
++if (safe_atou64(option+7, arg_offset)  0) {
++log_error(offset= parse failure, refusing.);
++return -EINVAL;
++}
++
++} else if (startswith(option, skip=)) {
++
++if (safe_atou64(option+5, arg_skip)  0) {
++log_error(skip= parse failure, refusing.);
++return -EINVAL;
++}
++
+ } else if (!streq(option, none))
+ log_error(Encountered unknown /etc/crypttab option '%s', 
ignoring., option);
+ 
+@@ -403,6 +417,9 @@ static int attach_luks_or_plain(struct crypt_device *cd,
+ } else
+ params.hash = ripemd160;
+ 
++params.offset = arg_offset;
++   

Bug#746946: wheezy-pu: package distro-info-data/0.23~deb7u1

2015-04-16 Thread Stefano Rivera
Hi Raphael (2015.04.16_11:00:58_+0200)
 FWIW, Debian 6 Squeeze is supported for at least 5 years (i.e. 2016-02-06) and
 most likely until Wheezy is no longer supported (i.e. 2016-04-24).
 
 cf http://wiki.debian.org/LTS

We could hack that in, but we should really support LTS separately. This
is #782685.

SR

-- 
Stefano Rivera
  http://tumbleweed.org.za/
  +1 415 683 3272


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150416164917.ga3...@bach.rivera.co.za



Bug#782712: pre-upload unblock request: systemd/215-17 for RC bug #751707

2015-04-16 Thread Cyril Brulebois
(Cc: debian-boot@ added.)

Martin Pitt mp...@debian.org (2015-04-16):
 Hello release team,

(With my d-i release manager hat.)

 yesterday I discovered that systemd breaks a common way of setting up
 plain cryptsetup partitions. Turns out that this has already been
 known for a while, but the impact wasn't appreciated enough:
 
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751707
 
 What happens is that systemd's cryptsetup integration ignores the
 offset= parameter in crypttab and instead uses the whole device. So
 if you had a swap or other partition underneath in order to identify
 the partition via UUID or label instead of an unreliable hardcoded
 device name, switching to systemd destroys the underlying metadata,
 and causes a boot hang as crypttab now refers to a nonexisting
 UUID/label. This is quite a common way to set up encrypted swap, the
 way that ecryptfs' own swap setup tool does it (the Ubuntu installer
 calls that if you select encrypt my home directory; I'm not sure
 whether Debian's installer does the same).

Grepping for hash= in partman-* d-i packages led to partman-crypto,
which seems responsible for this (no surprise here):
  
http://anonscm.debian.org/cgit/d-i/partman-crypto.git/tree/finish.d/crypto_config

There's no offset= there.

Looking into partman-* in Ubuntu vivid, it turns out that one of them
look at user-setup, and that's where the following is defined:
| Template: user-setup/encrypt-home
| Type: boolean
| Default: false
| # :sl2:
| _Description: Encrypt your home directory?
`---[ debian/user-setup-udeb.templates ]---

which is then used in user-setup-apply where there's a lot more
(encryption-related) code than in Debian, which e.g. calls adduser with
an option to encrypt home, which then calls some commands from the
ecryptfs-utils package, but I don't see any offset in the
ecryptfs-setup-private script.

Anyway, asking for home encryption indeed leads to swap encryption,
through a ecryptfs-setup-swap call, which in turn triggers:
|echo cryptswap$i UUID=$uuid /dev/urandom 
swap,offset=1024,cipher=aes-xts-plain64  /etc/crypttab
`---[ src/utils/ecryptfs-setup-swap ]---

The same file in the Debian package has no offset, so I guess that means
Debian is rather safe.

 IMHO this qualifies as data loss, and we cannot repair this
 automatically after the damage happened. So I'd really like to fix
 this in jessie, and I upgraded it to RC.
 
 The patch is quite straightforward. It got a first review by upstream,
 I made it a bit more defensive since the first version, and it'll
 probably land today. I attached my test script to the upstream bug [1]
 which allows you to play around with various offset= options and
 verify that it doesn't destroy the initial part of the partition.
 
 I realize this is a somewhat awkward timing as we want to deep-freeze
 in two days, and this means an udeb change (although only formally as
 there are no effective changes in udev). 215-16 should go into testing
 tonight, and I'm prepared to upload 215-17 with that fix right after
 that with urgency=high.
 
 What would you recommend how to proceed?

Provided a review by the release team, I'm OK with letting this go into
testing between D-I Jessie RC3 (to be released at the end of this week)
and a possible extra debian-installer upload (before the release).

I'm not exactly entirely sure how to deal with D-I for Jessie past RC3
anyway:
 - Do nothing?
 - BinNMU to make sure it's built against last-migrated components?
 - Sourceful upload in case there's any changes staged in git during the
   last week? (I hope that won't be necessary.)


Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#782712: pre-upload unblock request: systemd/215-17 for RC bug #751707

2015-04-16 Thread Cyril Brulebois
Martin Pitt mp...@debian.org (2015-04-16):
 Hello Cyril,
 
 Cyril Brulebois [2015-04-16 19:40 +0200]:
  Anyway, asking for home encryption indeed leads to swap encryption,
  through a ecryptfs-setup-swap call, which in turn triggers:
  |echo cryptswap$i UUID=$uuid /dev/urandom 
  swap,offset=1024,cipher=aes-xts-plain64  /etc/crypttab
  `---[ src/utils/ecryptfs-setup-swap ]---
  
  The same file in the Debian package has no offset, so I guess that means
  Debian is rather safe.
 
 Well, it actually means that it's even more broken :-( If you don't
 specify an offset at all, then you can only boot this system once.
 Then your partition will be overwritten with random data entirely, and
 the next time you won't have any matching UUID any more, and you again
 get a hanging boot (this affects sysvinit and upstart too). I. e. you
 will have exactly the same effect.
 
 So to properly fix this, we need:
 
  (1) the fix to add the offset=:
  https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/840
 
  (Updating the used cipher would also be a good idea, but not
  essential)
 
  This fix alone is sufficient under sysvinit and upstart.
 
  (2) this systemd fix to actually respect offset= when booting under
  systemd.

Huh? Last I checked, guided encrypted LVM just works…

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#782728: unblock: glibc/2.19-18

2015-04-16 Thread Aurelien Jarno
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Dear release team,

The locales package (part of the glibc source package) recently got an
RC bug reported. While this RC bug is also present in Jessie, I think
it's a good idea to also fix it in Jessie as the C.UTF-8 locale is more
and more used. I have therefore uploaded version glibc/2.19-18 to
unstable, with the following diff:

Index: changelog
===
--- changelog   (revision 6378)
+++ changelog   (working copy)
@@ -1,3 +1,11 @@
+glibc (2.19-18) unstable; urgency=medium
+
+  [ Aurelien Jarno ]
+  * debhelper.in/locales.templates: allow the C.UTF-8 locale to be
+selected as the default locale. Closes: #782241.
+
+ -- Aurelien Jarno aure...@debian.org  Tue, 14 Apr 2015 19:50:11 +0200
+
 glibc (2.19-17) unstable; urgency=medium
 
   [ Adam Conrad ]
Index: debhelper.in/locales.templates
===
--- debhelper.in/locales.templates  (revision 6378)
+++ debhelper.in/locales.templates  (working copy)
@@ -15,7 +15,7 @@
 Template: locales/default_environment_locale
 Type: select
 #flag:translate:1
-__Choices: None, ${locales}
+__Choices: None, C.UTF-8, ${locales}
 Default: None
 _Description: Default locale for the system environment:
  Many packages in Debian use locales to display text in the correct


Could you please unblock it so that it moves into Jessie? Thanks in
advance.

Regards,
Aurelien


-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20150416194642.1892.97621.report...@weber.rr44.fr



Bug#782712: pre-upload unblock request: systemd/215-17 for RC bug #751707

2015-04-16 Thread Martin Pitt
Hello Cyril,

Cyril Brulebois [2015-04-16 19:40 +0200]:
 Anyway, asking for home encryption indeed leads to swap encryption,
 through a ecryptfs-setup-swap call, which in turn triggers:
 |echo cryptswap$i UUID=$uuid /dev/urandom 
 swap,offset=1024,cipher=aes-xts-plain64  /etc/crypttab
 `---[ src/utils/ecryptfs-setup-swap ]---
 
 The same file in the Debian package has no offset, so I guess that means
 Debian is rather safe.

Well, it actually means that it's even more broken :-( If you don't
specify an offset at all, then you can only boot this system once.
Then your partition will be overwritten with random data entirely, and
the next time you won't have any matching UUID any more, and you again
get a hanging boot (this affects sysvinit and upstart too). I. e. you
will have exactly the same effect.

So to properly fix this, we need:

 (1) the fix to add the offset=:
 https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/840

 (Updating the used cipher would also be a good idea, but not
 essential)

 This fix alone is sufficient under sysvinit and upstart.

 (2) this systemd fix to actually respect offset= when booting under
 systemd.

Thanks,

Martin
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature


Bug#782712: pre-upload unblock request: systemd/215-17 for RC bug #751707

2015-04-16 Thread Lennart Sorensen
On Thu, Apr 16, 2015 at 10:05:17PM +0200, Cyril Brulebois wrote:
 Martin Pitt mp...@debian.org (2015-04-16):
  Hello Cyril,
  
  Cyril Brulebois [2015-04-16 19:40 +0200]:
   Anyway, asking for home encryption indeed leads to swap encryption,
   through a ecryptfs-setup-swap call, which in turn triggers:
   |echo cryptswap$i UUID=$uuid /dev/urandom 
   swap,offset=1024,cipher=aes-xts-plain64  /etc/crypttab
   `---[ src/utils/ecryptfs-setup-swap ]---
   
   The same file in the Debian package has no offset, so I guess that means
   Debian is rather safe.
  
  Well, it actually means that it's even more broken :-( If you don't
  specify an offset at all, then you can only boot this system once.
  Then your partition will be overwritten with random data entirely, and
  the next time you won't have any matching UUID any more, and you again
  get a hanging boot (this affects sysvinit and upstart too). I. e. you
  will have exactly the same effect.
  
  So to properly fix this, we need:
  
   (1) the fix to add the offset=:
   https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/840
  
   (Updating the used cipher would also be a good idea, but not
   essential)
  
   This fix alone is sufficient under sysvinit and upstart.
  
   (2) this systemd fix to actually respect offset= when booting under
   systemd.
 
 Huh? Last I checked, guided encrypted LVM just works…

Worked for me about a month ago.

-- 
Len Sorensen


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150416205818.gu29...@csclub.uwaterloo.ca



Bug#782728: unblock: glibc/2.19-18

2015-04-16 Thread Cyril Brulebois
Aurelien Jarno aure...@debian.org (2015-04-16):
 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: unblock
 
 Dear release team,
 
 The locales package (part of the glibc source package) recently got an
 RC bug reported. While this RC bug is also present in Jessie, I think
 it's a good idea to also fix it in Jessie as the C.UTF-8 locale is more
 and more used. I have therefore uploaded version glibc/2.19-18 to
 unstable, with the following diff:
 
 Index: changelog
 ===
 --- changelog (revision 6378)
 +++ changelog (working copy)
 @@ -1,3 +1,11 @@
 +glibc (2.19-18) unstable; urgency=medium
 +
 +  [ Aurelien Jarno ]
 +  * debhelper.in/locales.templates: allow the C.UTF-8 locale to be
 +selected as the default locale. Closes: #782241.
 +
 + -- Aurelien Jarno aure...@debian.org  Tue, 14 Apr 2015 19:50:11 +0200
 +
  glibc (2.19-17) unstable; urgency=medium
  
[ Adam Conrad ]
 Index: debhelper.in/locales.templates
 ===
 --- debhelper.in/locales.templates(revision 6378)
 +++ debhelper.in/locales.templates(working copy)
 @@ -15,7 +15,7 @@
  Template: locales/default_environment_locale
  Type: select
  #flag:translate:1
 -__Choices: None, ${locales}
 +__Choices: None, C.UTF-8, ${locales}
  Default: None
  _Description: Default locale for the system environment:
   Many packages in Debian use locales to display text in the correct
 
 
 Could you please unblock it so that it moves into Jessie? Thanks in
 advance.

No objections, thanks.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#782728: marked as done (unblock: glibc/2.19-18)

2015-04-16 Thread Debian Bug Tracking System
Your message dated Thu, 16 Apr 2015 22:26:14 +0200
with message-id 55301ae6.80...@thykier.net
and subject line Re: Bug#782728: unblock: glibc/2.19-18
has caused the Debian Bug report #782728,
regarding unblock: glibc/2.19-18
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
782728: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782728
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Dear release team,

The locales package (part of the glibc source package) recently got an
RC bug reported. While this RC bug is also present in Jessie, I think
it's a good idea to also fix it in Jessie as the C.UTF-8 locale is more
and more used. I have therefore uploaded version glibc/2.19-18 to
unstable, with the following diff:

Index: changelog
===
--- changelog   (revision 6378)
+++ changelog   (working copy)
@@ -1,3 +1,11 @@
+glibc (2.19-18) unstable; urgency=medium
+
+  [ Aurelien Jarno ]
+  * debhelper.in/locales.templates: allow the C.UTF-8 locale to be
+selected as the default locale. Closes: #782241.
+
+ -- Aurelien Jarno aure...@debian.org  Tue, 14 Apr 2015 19:50:11 +0200
+
 glibc (2.19-17) unstable; urgency=medium
 
   [ Adam Conrad ]
Index: debhelper.in/locales.templates
===
--- debhelper.in/locales.templates  (revision 6378)
+++ debhelper.in/locales.templates  (working copy)
@@ -15,7 +15,7 @@
 Template: locales/default_environment_locale
 Type: select
 #flag:translate:1
-__Choices: None, ${locales}
+__Choices: None, C.UTF-8, ${locales}
 Default: None
 _Description: Default locale for the system environment:
  Many packages in Debian use locales to display text in the correct


Could you please unblock it so that it moves into Jessie? Thanks in
advance.

Regards,
Aurelien


-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
---End Message---
---BeginMessage---
On 2015-04-16 22:14, Cyril Brulebois wrote:
 Aurelien Jarno aure...@debian.org (2015-04-16):
 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: unblock

 Dear release team,

 The locales package (part of the glibc source package) recently got an
 RC bug reported. While this RC bug is also present in Jessie, I think
 it's a good idea to also fix it in Jessie as the C.UTF-8 locale is more
 and more used. I have therefore uploaded version glibc/2.19-18 to
 unstable, with the following diff:

 [...]

 Could you please unblock it so that it moves into Jessie? Thanks in
 advance.
 
 No objections, thanks.
 
 Mraw,
 KiBi.
 

Ack, unblocked, thanks.

~Niels---End Message---


Bug#782712: pre-upload unblock request: systemd/215-17 for RC bug #751707

2015-04-16 Thread Martin Pitt
Cyril Brulebois [2015-04-16 22:05 +0200]:
 Huh? Last I checked, guided encrypted LVM just works…

Yes, that's fine -- this creates an encrypted PV which then contains
unencrypted root, swap, and home partitions. This error happens if you
don't encrypt the full disk (with cryptsetup/LUKS), but just encrypt
your home directory (with ecryptfs). The latter will create an
encrypted swap partition with a random key, otherwise you'd find part
of your /home data in your swap partition.

Martin

P. S.  Swap partitions, will you please just die. Most systems don't
need them any more, and those who do are better of with the
swapspace package or similar. But that's waay out of reach for
Jessie :-)

-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature