Re: Bits from the release team and request for discussion

2009-09-10 Thread Russell Coker
On Wed, 26 Aug 2009, Manoj Srivastava sriva...@debian.org wrote:
 if [ -e  /etc/pam.d/login ]; then
   perl -pli~ -e 'm/session.*pam_selinux.so/  s/^\#\s*//o'
 /etc/pam.d/login rm /etc/pam.d/login~
 fi
 if [ -e /etc/pam.d/ssh ]; then
   perl -pli~ -e 'm/session.*pam_selinux.so/  do { s/^\#\s*//o;
 s/multiple//; } ' /etc/pam.d/ssh rm /etc/pam.d/ssh~
 fi

I would prefer it if this sort of thing was kept to scripts 
like /usr/sbin/selinux-activate from the selinux-basics package.

If you believe that selinux-activate is inadequate in some way then feel free 
to file a bug report (or in the case of Manoj just do an upload to fix it).

In terms of documentation I think that perhaps comments in the 
selinux-activate script would go a long way.  Then the ideal advice would be 
something like use selinux-activate, but if you want to do it your own 
different way then read the comments and do whatever seems right.

As things change scripts like selinux-activate will change to match.  But we 
will keep them matching the current distribution.

I have no objection to anyone editing config files by hand, but I would prefer 
that when offering advice such things be given a low priority.

-- 
russ...@coker.com.au
http://etbe.coker.com.au/  My Main Blog
http://doc.coker.com.au/   My Documents Blog


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Bits from the release team and request for discussion

2009-08-25 Thread Marc 'HE' Brockschmidt
ond...@sury.org writes:
 with root being signed[1] really soon (TM), could we add DNSSEC
 support to this list? Since I have recently switched position in my
 company (which took a lot of time), it looks like I will have now
 plenty of time for DNSSEC (since I can put DNSSEC in Debian to my top
 priorities).

What is needed to enable DNSSEC support in Debian? How many changes do
we actually need to do? Have bugs been filed for this? Is there already
documentation about this somewhere?

We would be happy add this as a release goal, but I fear we simply don't
know enough about it :-)

Marc
-- 
BOFH #300:
Digital Manipulator exceeding velocity parameters


pgpQsJBa4ABmb.pgp
Description: PGP signature


Re: Bits from the release team and request for discussion

2009-08-25 Thread Manoj Srivastava
On Tue, Aug 25 2009, Luk Claes wrote:

 Manoj Srivastava wrote:
 Hi,
 
 I would like to set up a selinux related release goal for
  Squeeze.
 
  Developer assiociated:  Manoj Srivastava (Perhaps also Russell Coker,
  but I have not discussed this with him)
  Issues to be solved:
(a) Get all Debian patches to the reference security policy merged in
upstream.  Status: In progress, we have all patches submitted,
some need to be tweaked and resubmitted based on feedback
 Time line: 1-2 months, depending on free tie I have

 While this is relevant to Debian, it does not look like it impacts what
 is in Debian or are there possible changes in Debian depending on the
 feedback?

I think there is a distinct possibility, yes. As the reference
 policy evolves upstream, and out patches are not also changed to keep
 in sync, we are reaching what I think are sublte breakages. The gbest
 way of ensuring that we do not have mismatches in policy is to get the
 patches into upstream policy, which has many more eyeballs on it, and
 is tested more extensively.

(b) Update reference security policy to allow standard machines to be
in enforcing mode.
Status: It is possible to run minimal virtual machines in
enforcing mode, but real machines are somewhat crippled; these
denials need to be inspected, and determination needs to be made
for how to resolve them (no not want security holes enshrined in
policy)
   Time line: 6-8 months (can be done in tandem with a, if here were
   more people working on it)

 Are the issues identified already or do you have an idea about how
 many issues there are to tackle?

The issues involved depend on the set of packages
 installed. Russell Coker has identified and solved  issues related to
 his play machine, and to his eepc laptop. My build machines which use
 selinux virtual machine now show no issues, and most of the issue on my
 development machine have been resolved.

I am uncertain of issues with SELinux and packages I do not
 use.  There are a few reported already against the refpolicy package,
 and I am working at looking at them, and then forwarding them to the
 refpolicy mailing list.

I am also somewhat rusty with the conventions adopted in
 reference policy (some style issues, and some with more substance), so
 this s likely to be slow going until I have time to get myself back up
 to speed with modern policy. Help here is greatly appreciated.

 Do you have any documentation for possible contributors to help you with
 this?

I try this recipe (can be used in virtual machines, if you do
 not want to mess up your real machines)
--8---cut here---start-8---
aptitude install --without-recommendsselinux-policy-default selinux-basics
if [ -e /etc/selinux/${UML_POLICY_TYPE}/contexts/files/file_contexts  ]; then
 setfiles /etc/selinux/default/contexts/files/file_contexts /
fi
if [ -e  /etc/pam.d/login ]; then
  perl -pli~ -e 'm/session.*pam_selinux.so/  s/^\#\s*//o' /etc/pam.d/login
  rm /etc/pam.d/login~
fi
if [ -e /etc/pam.d/ssh ]; then
  perl -pli~ -e 'm/session.*pam_selinux.so/  do { s/^\#\s*//o; s/multiple//; 
} ' /etc/pam.d/ssh
  rm /etc/pam.d/ssh~
fi

if which setfiles /dev/null 21; then
  if [ -e /etc/selinux/${UML_POLICY_TYPE}/contexts/files/file_contexts  ]; then
   setfiles /etc/selinux/${UML_POLICY_TYPE}/contexts/files/file_contexts 
/etc/pamd.d/
  fi
fi

if [  -x /sbin/fixfiles ]; then
/sbin/fixfiles -l /root/fixfiles.log  -f -F relabel
fi

# schedule a relabeling for the next reboot
touch /.autorelabel
--8---cut here---end---8---

To grub, I add:
--8---cut here---start-8---
# defoptions=selinux=1 audit=1
--8---cut here---end---8---

And then reboot. The next reboot will finish relabelling the
 files, and sets me up with selinix enabled, and in enforcing mode.

If we had more people testing the SELinux policies and reporting
 the denials to the refpolicy mailing list, we  could rapidly get into
 refpolicy in sync with Debian specific additions.

Thanks in advance for help,

manoj
-- 
Intelligence without character is a dangerous thing. Steinem
Manoj Srivastava sriva...@debian.org http://www.debian.org/~srivasta/  
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Bits from the release team and request for discussion

2009-08-03 Thread Holger Levsen
Hi,

On Sonntag, 2. August 2009, martin f krafft wrote:
 In the next announcement, I strongly suggest you approach this
 point. If you are syncing with Ubuntu LTS, then I suggest you state
 the reasons for doing so, e.g. that Canonical has agreed to provide
 security upgrades for squeeze).

Oh, did they?

 Hope this helps,

I dont think so. You made it sound as if Debian would follow Ubuntu or Marks 
wishes, and that Ubuntu/Canonical has committed to support Debian. AFAIK, we 
dont and they dont.


regards,
Holger



signature.asc
Description: This is a digitally signed message part.


Re: Bits from the release team and request for discussion

2009-08-03 Thread martin f krafft
also sprach Holger Levsen hol...@layer-acht.org [2009.08.03.1047 +0200]:
  In the next announcement, I strongly suggest you approach this
  point. If you are syncing with Ubuntu LTS, then I suggest you state
  the reasons for doing so, e.g. that Canonical has agreed to provide
  security upgrades for squeeze).
 
 Oh, did they?

That was just one possible outcome/example.

  Hope this helps,
 
 I dont think so. You made it sound as if Debian would follow
 Ubuntu or Marks wishes, and that Ubuntu/Canonical has committed to
 support Debian. AFAIK, we dont and they dont.

I phrased it badly then. It's exactly points like this which need to
be addressed explicitly: why are we doing this? And iff
Canonical/Ubuntu is part of the reason, then state exactly where the
benefits for Debian are, and ideally how this decision was reached
in the first place.

-- 
 .''`.   martin f. krafft madd...@d.o  Related projects:
: :'  :  proud Debian developer   http://debiansystem.info
`. `'`   http://people.debian.org/~madduckhttp://vcs-pkg.org
  `-  Debian - when you have better things to do than fixing systems
 
a fundamentalist is someone who hates sin more than he loves virtue.
 -- john h. schaar


digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)


Re: Bits from the release team and request for discussion

2009-07-30 Thread Gustavo Franco
On Thu, Jul 30, 2009 at 11:16 AM, Manoj Srivastavasriva...@debian.org wrote:
 Hi,

        I would like to set up a selinux related release goal for
  Squeeze.

  Developer assiociated:  Manoj Srivastava (Perhaps also Russell Coker,
                         but I have not discussed this with him)
  Issues to be solved:
   (a) Get all Debian patches to the reference security policy merged in
       upstream.  Status: In progress, we have all patches submitted,
       some need to be tweaked and resubmitted based on feedback
        Time line: 1-2 months, depending on free tie I have
   (b) Update reference security policy to allow standard machines to be
       in enforcing mode.
       Status: It is possible to run minimal virtual machines in
       enforcing mode, but real machines are somewhat crippled; these
       denials need to be inspected, and determination needs to be made
       for how to resolve them (no not want security holes enshrined in
       policy)
      Time line: 6-8 months (can be done in tandem with a, if here were
      more people working on it)
   (c) Make it easier to run in struct (no unconfined.pp module)
       mode. This needs firstly documentation, and secondly, additional
       tweaks to policy to make it work. Russell has a play machine
       where it all works, but those changes are not in the reference
       policy -- and some of them might not be fit to be in ref policy
       at all.
      Time line: 9-12 months

        The actual non-policy packages are now well in sync with
  upstream,  so the weak point is the security policy.

        Ideally, the goal would be to have Squeeze certifiable at EAL-4,
  at least the standard install (no optional packages), if someone with
  deep pockets were willing to actually pay for the certification, and be
  willing to push through the process.

Which parts of the work you described above would be needed to Squeeze
be certifiable at EAL-4? All of them?

Based on your timeline, it seems A is on track to make Squeeze, we
should get more people to work with you on B (setting as a goal) and C
would be a no go for this release, jmo. Am I wrong?

regards,
-- Gustavo stratus Franco


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Bits from the release team and request for discussion

2009-07-30 Thread Manoj Srivastava
Hi,

I would like to set up a selinux related release goal for
 Squeeze.

 Developer assiociated:  Manoj Srivastava (Perhaps also Russell Coker,
 but I have not discussed this with him)
 Issues to be solved:
   (a) Get all Debian patches to the reference security policy merged in
   upstream.  Status: In progress, we have all patches submitted,
   some need to be tweaked and resubmitted based on feedback
Time line: 1-2 months, depending on free tie I have
   (b) Update reference security policy to allow standard machines to be
   in enforcing mode.
   Status: It is possible to run minimal virtual machines in
   enforcing mode, but real machines are somewhat crippled; these
   denials need to be inspected, and determination needs to be made
   for how to resolve them (no not want security holes enshrined in
   policy)
  Time line: 6-8 months (can be done in tandem with a, if here were
  more people working on it)
   (c) Make it easier to run in struct (no unconfined.pp module)
   mode. This needs firstly documentation, and secondly, additional
   tweaks to policy to make it work. Russell has a play machine
   where it all works, but those changes are not in the reference
   policy -- and some of them might not be fit to be in ref policy
   at all.
  Time line: 9-12 months

The actual non-policy packages are now well in sync with
 upstream,  so the weak point is the security policy.

Ideally, the goal would be to have Squeeze certifiable at EAL-4,
 at least the standard install (no optional packages), if someone with
 deep pockets were willing to actually pay for the certification, and be
 willing to push through the process.

manoj
-- 
The Public is merely a multiplied me. Mark Twain
Manoj Srivastava sriva...@debian.org http://www.debian.org/~srivasta/  
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Bits from the release team and request for discussion

2009-07-30 Thread Robert Millan
On Thu, Jul 30, 2009 at 07:28:58PM +0200, Luk Claes wrote:
 
 Timeline
 
 
 Based on feedback of the community on the plan to freeze in December
 2009 and  the ambituous Release Goals we set for ourselves, we are
 revisiting the decision to freeze December 2009.
 
 We'll be consulting all key teams within Debian to see how their plans
 and schedules can fit into a new timeline. Before the end of August we
 hope to have finished this process of consultation and be able to
 present the new plan to you.

Hi,

Both Felix and I think that December as freeze date for GRUB is a bit too
tight.  For Squeeze we plan to make GRUB 2 the default, and it's not an
easy migration.

Nevertheless, if you decide to go with that, we'll try to accomodate.

HTH

-- 
Robert Millan

  The DRM opt-in fallacy: Your data belongs to us. We will decide when (and
  how) you may access your data; but nobody's threatening your freedom: we
  still allow you to remove your data and not access it at all.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Bits from the release team and request for discussion

2009-07-30 Thread Charles Plessy
Le Thu, Jul 30, 2009 at 07:28:58PM +0200, Luk Claes a écrit :
 
 Timeline
 
 
 Based on feedback of the community on the plan to freeze in December
 2009 and  the ambituous Release Goals we set for ourselves, we are
 revisiting the decision to freeze December 2009.
 
 We'll be consulting all key teams within Debian to see how their plans
 and schedules can fit into a new timeline. Before the end of August we
 hope to have finished this process of consultation and be able to
 present the new plan to you.

Dear release team,

many thanks for revisiting your decision. It is much appreciated.

Have a nice day,


-- 
Charles Plessy
Tsurumi, Kanagawa, Japan


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Bits from the release team and request for discussion

2009-07-30 Thread Russell Coker
On Fri, 31 Jul 2009, Manoj Srivastava sriva...@debian.org wrote:
  Developer assiociated:  Manoj Srivastava (Perhaps also Russell Coker,
  but I have not discussed this with him)

I will be involved in this, but I find it difficult to get enough free time.

  Issues to be solved:
(a) Get all Debian patches to the reference security policy merged in
upstream.  Status: In progress, we have all patches submitted,
some need to be tweaked and resubmitted based on feedback
 Time line: 1-2 months, depending on free tie I have

Great work!

(b) Update reference security policy to allow standard machines to be
in enforcing mode.
Status: It is possible to run minimal virtual machines in
enforcing mode, but real machines are somewhat crippled; these
denials need to be inspected, and determination needs to be made
for how to resolve them (no not want security holes enshrined in
policy)
   Time line: 6-8 months (can be done in tandem with a, if here were
   more people working on it)

That shouldn't be difficult.  Incidentally it would really help me with 
working on this if you could get the policy to build with -j2...

(c) Make it easier to run in strict (no unconfined.pp module)
mode. This needs firstly documentation, and secondly, additional
tweaks to policy to make it work. Russell has a play machine
where it all works, but those changes are not in the reference
policy -- and some of them might not be fit to be in ref policy
at all.
   Time line: 9-12 months

My Play Machine runs the same policy as every other SE Linux machine I run 
which is also the same as the policy in my repository (a newer version than 
the policy in Lenny).  There is a single extra module of policy which allows 
read-only and read-append file types so that guest users can't mess with each 
other so easily.

The basic strict functionality works without any changes to policy.

Solving B plus writing a tiny amount of documentation will solve C.

 Ideally, the goal would be to have Squeeze certifiable at EAL-4,
  at least the standard install (no optional packages), if someone with
  deep pockets were willing to actually pay for the certification, and be
  willing to push through the process.

The EAL number is a matter of how well you meet your profile targets.  We can 
meet the requirements to be certifiable (*) with CAPP and RBACPP at EAL-4 if 
we continue on the current course.  Meeting LSPP will be a lot harder, I've 
never even tried that on Debian.  Not that out users are likely to mind - 
very few people use LSPP configurations.

(*) Getting certified requires a lot of time, paperwork, and money.  Expect to 
spend the best part of $1,000,000 to get it.

-- 
russ...@coker.com.au
http://etbe.coker.com.au/  My Main Blog
http://doc.coker.com.au/   My Documents Blog


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org