Re: Paying Debian contributors (Was Re: Advantages/Disadvantages of Open Source Software)

2022-09-16 Thread Chuck Zmudzinski
On 9/16/22 12:05 AM, Maude Summerside wrote:
>
> On 2022-09-15 17:56, Chuck Zmudzinski wrote:
> > On 9/15/2022 11:46 AM, Andy Smith wrote:
> >> Hello,
> >>
> >> On Wed, Sep 14, 2022 at 10:04:48PM -0400, Chuck Zmudzinski wrote:
> >>> I am not against giving maintainers like Steve just compensation for the
> >>> work they do fixing bugs, and by compensation I mean money.
> >>
> >> It's a very tricky subject to propose to start paying (some?) people
> >> in what was always a volunteer project, to do the same work that
> >> others do voluntarily. It has been proposed before, and it did not
> >> go down well. Search for "dunc tank debian" to read about that.
> >>
> >> More recently (since 2014), the Debian LTS effort started paying
> >> people to upload fixed Debian packages past the end of the normal
> >> release lifetime. This is organised by private company Freexian who
> >> accept sponsorship funds and pay developers to do this work for
> >> Debian, not out of Debian's own funds.
> >>
> >> https://www.freexian.com/services/debian-lts.html
> >> https://wiki.debian.org/LTS
> >> https://wiki.debian.org/LTS/FAQ
> >>
> >> They do LTS, ELTS and some other limited scope efforts.
> >>
> >> If you do use Debian LTS maybe you could consider contributing to
> >> this? Though I would point out:
> >>
> >> - It's not going to give you the right to tell people what to work
> >>   on, how to do it, govern their timescales etc. Sponsors are paying
> >>   for a certain amount of developer time per month, but Freexian and
> >>   those developers decide what to work on and how to do it.
> >>
> >> - At the moment the minimum contribution is €255/year.
> >>
> >> It could also be interesting to explore individual packaging teams
> >> within Debian having Patreon and/or ko-fi accounts or similar.
> >>
> >> Broadly though, none of these small scale funding ideas are ever
> >> going to give you the kind of service you apparently seem to want:
> >> to be able to force the developers to work on what you want them to
> >> work on, in the way you want them to work on it. I can only ever see
> >> that happening in situations where you pay much much more for a
> >> bespoke solution.
> > 
> > So I have to pay someone lots of money to fix a problem I already know how 
> > to fix?
> > I don't think you really understand my use case very well.
> > 
> > Cheers
> > 
>
> Can you stop complaining and take a minute to go read the code of
> conduct, rules regarding the Debian mailing list.
> There's no reason to do dual posting.
>
> WtF have you written myself a personal mail ?
I think I did, but it was just an oversight. I am aware
of the Code of Conduct, and it also says everyone is
to presume good intentions, as far as possible. When
I noticed I forgot to reply to list, I sent the message
again, I think with a little more detail, to the list also,
where I should have sent the message in the first place.

BTW, just so everyone is aware, the message I sent
is on debian-user, and it is an interesting story about
a Debian bug and I don't think it was against the Code
of Conduct.

Best regards,

Chuck



Re: Paying Debian contributors (Was Re: Advantages/Disadvantages of Open Source Software)

2022-09-15 Thread Chuck Zmudzinski
On 9/15/22 6:29 PM, Lee wrote:
> On 9/15/22, Chuck Zmudzinski  wrote:
> >
> > So I have to pay someone lots of money to fix a problem I already know how
> > to fix?
> > I don't think you really understand my use case very well.
>
> I surely don't.  If you know how to fix whatever why haven't you fixed
> it already?

I have it fixed in the distro on one bug, but on another I still have to
apply the fix myself because no one in Debian will fix it. Fedora
developers also fixed the same bug. I discuss that bug in some
other posts here. Please read them before asking me about this
again.

Cheers,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-15 Thread Chuck Zmudzinski
On 9/15/22 11:45 AM, Maude Summerside wrote:
>
> On 2022-09-14 23:23, Chuck Zmudzinski wrote:
> > On 9/14/2022 11:01 PM, Maude Summerside wrote:
> >>
> >> On 2022-09-14 21:45, Michael Stone wrote:
> >>> On Wed, Sep 14, 2022 at 11:16:00PM +0100, Steve McIntyre wrote:
> >>>> I'll be brutally honest: being accused of "possibly malicious"
> >>>> unwilligness is *not* a great way to convince overstretched volunteers
> >>>> to spend their time on issues.
> >>>
> >>> Especially when it's an ongoing pattern of discourse.
> >>>
> >>
> >> I think there's many barrier that discourage people from wanting to
> >> contribute to many project. I feel some developer use the community as
> >> unpaid beta tester but don't go further into accepting contribution.
> >>
> >> For sure, having managed some project, I have to say that it's hard to
> >> accept contribution that will add new functions to as software when
> >> these come from a unknown contributor. Not because of being scared of
> >> malicious intent (unless the person is really paranoid but that's
> >> another story). Simply because adding a new function means having to
> >> support it's ongoing development and there's no guarantee that the
> >> contributor will do so. Same goes on for code contributed that needs
> >> refactoring, that are badly documented, etc. But all this need some good
> >> social behavior from the project owner/manager.
> > 
> > As a user of the Debian software and a user of the BTS, I am discouraged not
> > because new contributions or functions are being rejected, but because bugs
> > are not being fixed. Those are two very different things. Maybe it's just 
> > too hard
> > for volunteers to fix the bugs and make Debian better, and maybe we need to
> > pay the volunteers so they are not volunteers anymore and will be motivated
> > to actually fix the Debian software. The fact that Debian is created by 
> > volunteers
> > is probably one of the really big disadvantages of Debian software.
> > 
> I think there's a piece missing hugely in *your* equation.
> The package maintainer are the LAST line of resort when there's a bug to
> fix. Sure you can report them thru BTS but they'll transmit those
> upstream to the original software developer.

Not in my experience. Most upstream projects say users should report
bugs to the distro first and let the distro's maintainers decide what to
do. The bugs I see that the Debian maintainer *should* forward to the
upstream project usually fail to do that. Of two cases of bugs affecting
my machine this past couple of years, one I reported the bug to Debian,
Debian's maintainer ignored it, I found the fix after a long bisecting process
and the fix was in the upstream part of the code. So I tagged the
bug with patch and upstream and waited for the maintainer to forward
the bug. The maintainer again ignored it so I had the opportunity to
make a contribution to an upstream project and I submitted the patch
to the upstream project myself and when it was committed upstream
I tagged the bug fixed upstream on BTS and now the bug is closed.

That is a happy ending to a bug report. The other one this year both
Debian and the upstream project, the Linux kernel, are ignoring the
bug and that is the one I described in a post earlier today to this list
when I also asked the community a question about systemd, udev,
and the coldplug all devices stage of boot where the bug happens. This
bug is still not a happy ending, at least for those who want the bug fixed.
I am not the one who reported it. I would not be surprised if the one
who reported it gave up on it and switched to Fedora or another distro
that has fixed the bug in their distro. It is the kind of bug that can be
fixed in *either* the Linux kernel upstream code or in the systemd/udev
configuration by the distro. But Debian maintainers are just volunteers
so they cannot fix it. At least that is what everyone here is telling me.

>
> What would happened if every bug was fixed by the Debian maintainer ?
> We'd end up having two different source code because at every bug fix
> there would be a different tree of source code being built.

Most users are not able to determine when they report a bug if
it is in the upstream or Debian part. I learned how to find where
the bug is because no one else in the free software world would do
it. You advocate for a world where every user can fix their own
bugs and the maintainers can complain they can't fix bugs because
they are just volunteers. That doesn't make sense to me. The BTS
is useful because users do post workarounds for the bugs that
the maintainers don't fix, but users are mistaken if they think
when they report a bug the maintainer will see to it that it
will get fixed. I also think the bot that says the maintainer
will respond to you in due course sometimes lies because in
some cases the maintainer never responds.

Best regards,

Chuck



Re: Paying Debian contributors (Was Re: Advantages/Disadvantages of Open Source Software)

2022-09-15 Thread Chuck Zmudzinski
On 9/15/2022 11:46 AM, Andy Smith wrote:
> Hello,
>
> On Wed, Sep 14, 2022 at 10:04:48PM -0400, Chuck Zmudzinski wrote:
> > I am not against giving maintainers like Steve just compensation for the
> > work they do fixing bugs, and by compensation I mean money.
>
> It's a very tricky subject to propose to start paying (some?) people
> in what was always a volunteer project, to do the same work that
> others do voluntarily. It has been proposed before, and it did not
> go down well. Search for "dunc tank debian" to read about that.
>
> More recently (since 2014), the Debian LTS effort started paying
> people to upload fixed Debian packages past the end of the normal
> release lifetime. This is organised by private company Freexian who
> accept sponsorship funds and pay developers to do this work for
> Debian, not out of Debian's own funds.
>
> https://www.freexian.com/services/debian-lts.html
> https://wiki.debian.org/LTS
> https://wiki.debian.org/LTS/FAQ
>
> They do LTS, ELTS and some other limited scope efforts.
>
> If you do use Debian LTS maybe you could consider contributing to
> this? Though I would point out:
>
> - It's not going to give you the right to tell people what to work
>   on, how to do it, govern their timescales etc. Sponsors are paying
>   for a certain amount of developer time per month, but Freexian and
>   those developers decide what to work on and how to do it.
>
> - At the moment the minimum contribution is €255/year.
>
> It could also be interesting to explore individual packaging teams
> within Debian having Patreon and/or ko-fi accounts or similar.
>
> Broadly though, none of these small scale funding ideas are ever
> going to give you the kind of service you apparently seem to want:
> to be able to force the developers to work on what you want them to
> work on, in the way you want them to work on it. I can only ever see
> that happening in situations where you pay much much more for a
> bespoke solution.

So I have to pay someone lots of money to fix a problem I already know how to 
fix?
I don't think you really understand my use case very well.

Cheers



systemd: udev coldplug all devices question

2022-09-14 Thread Chuck Zmudzinski
Hello,

There are some devices that when present will cause the "coldplug all devices"
stage at boot to fail. On a normally installed system only an error is reported
in the journal and logs during boot but the system boots normally and the
device also functions normally. But on debian installer media such as netinst
or the Debian live installer images, this failure causes a crash and prevents
users with such devices from being able to run the debian installer from those
installer media.

This was reported as a bug over a year and a half ago on BTS, and the bug
is currently assigned to linux, that is, the Debian Linux Kernel Team. The
problem has also been documented on the Debian installation reports
pseudo package. One of the Debian kernel developers suggested a solution
of increasing the uevent buffer in the kernel from 2k to 4k, and tests showed
that the patch of increasing the buffer in the kernel solved the coldplug all
devices problem.

That bug of too small a buffer size is in the upstream part of the Linux kernel,
so the bug should probably be forwarded to the Linux kernel, and the person
who reported the bug (not me) did report the bug to the Linux kernel, as well
as to the Debian BTS. But neither Debian nor the Linux kernel has acted on the
bug report to try to fix it, except for the suggestion that a Debian kernel
developer made to increase the uevent buffer size in the kernel over a year
ago and another suggestion from another Debian maintainer or developer who
gave me advice on how to document the problem in the installer so the
problem could be included on the debian installer errata page, which is
why I made the installation report. But the debian installer errata page
also was never updated even though I made that installation report over
six months ago:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005308
https://www.debian.org/releases/bullseye/debian-installer/#errata

I also tested a current Fedora Workstation 36 installation in the same
computing environment, which is a virtual environment, and it exhibited
some of the same symptoms that are fixed by the increase of the uevent
buffer in the kernel, but on Fedora at the "coldplug all devices" stage
during boot, the device that was creating data too big for the uevent buffer
in the kernel on both Fedora and Debian did not cause an error message
to be printed to the journal and boot logs on Fedora and also on Fedora the
live and netinst images do not crash, but on Debian these negative things do
happen.

Finally, another workaround to make the Debian live image or the Debian netinst
image bootable with the problematic device was to edit the udev startup script
on the installer image (I think it was in the initrd) to keep it from causing 
the
catastrophic crash when the "coldplug all devices" command is executed, which
is actually done, IIUC, by the udevadm executable file.

So my question is about udevadm which I think is the command that is executed
during boot to coldplug all devices: Is there a way to write the udev rules
configuration files so that a particular kind of device that perhaps is not 
really
what I would call "udev-aware" could be excluded from the set of devices that
are coldplugged at boot? I am only asking here in case someone knows the answer
and is willing to tell me, but if no one here can answer my question I will 
probably
be able to figure it out by examining the differences between the Fedora and
Debian udev rules for the various kinds of devices. I suspect that Fedora wrote
its udev rules so such devices that are not really the kind of devices that 
need to
be udev-aware and that cause problems or error messages are excluded from
the "coldplug all devices" stage of boot.

For reference, I am talking about Bug #983357 which is the primary
bug report:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983357

Thanks in advance for any tips from the udev experts.

Kind regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-14 Thread Chuck Zmudzinski
On 9/14/2022 11:01 PM, Maude Summerside wrote:
>
> On 2022-09-14 21:45, Michael Stone wrote:
> > On Wed, Sep 14, 2022 at 11:16:00PM +0100, Steve McIntyre wrote:
> >> I'll be brutally honest: being accused of "possibly malicious"
> >> unwilligness is *not* a great way to convince overstretched volunteers
> >> to spend their time on issues.
> > 
> > Especially when it's an ongoing pattern of discourse.
> > 
>
> I think there's many barrier that discourage people from wanting to
> contribute to many project. I feel some developer use the community as
> unpaid beta tester but don't go further into accepting contribution.
>
> For sure, having managed some project, I have to say that it's hard to
> accept contribution that will add new functions to as software when
> these come from a unknown contributor. Not because of being scared of
> malicious intent (unless the person is really paranoid but that's
> another story). Simply because adding a new function means having to
> support it's ongoing development and there's no guarantee that the
> contributor will do so. Same goes on for code contributed that needs
> refactoring, that are badly documented, etc. But all this need some good
> social behavior from the project owner/manager.

As a user of the Debian software and a user of the BTS, I am discouraged not
because new contributions or functions are being rejected, but because bugs
are not being fixed. Those are two very different things. Maybe it's just too 
hard
for volunteers to fix the bugs and make Debian better, and maybe we need to
pay the volunteers so they are not volunteers anymore and will be motivated
to actually fix the Debian software. The fact that Debian is created by 
volunteers
is probably one of the really big disadvantages of Debian software.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-14 Thread Chuck Zmudzinski
On 9/14/22 6:16 PM, Steve McIntyre wrote:
> Stefan wrote:
> In article  you 
> write:
> >> the interest of the user. These "volunteers" obviously have other,
> >> possibly malicious, interests if they prove themselves unwilling to
> >> apply fixes to bugs that are reported to them.
> >
> >I think there's a confusion here: these volunteers will also have
> >"other, possibly malicious, interests" even if they are willing/eager
> >to apply fixes to bugs that are reported to them.
> >
> >Same goes for people you pay, so it's not specific to volunteers.
> >And of course it's also not specific to a particular kind of license.
>
> Thanks Stefan, it's great to see that some people understand the
> issues.
>
> I'll be brutally honest: being accused of "possibly malicious"
> unwilligness is *not* a great way to convince overstretched volunteers
> to spend their time on issues.
>

Thank you Steve, for the work you do as maintaining the grub software
packages on Debian.

I am not against giving maintainers like Steve just compensation for the
work they do fixing bugs, and by compensation I mean money.

Why not require the user to pay a small fee when reporting a bug
which can be used to provide just compensation for the services the
maintainers provide to the community when the maintainer fixes bugs?
I would be willing to pay a reasonably small fee that would go to the
maintainers who worked on the bug and successfully fixed it.

I'll be brutally honest: Being accused of being a troll is *not* a
great way to convince Debian users who want to contribute to
and help Debian to spend their free time helping maintainers fix
the bugs reported to the BTS. I also suspect many users agree
with me, but are afraid to say so for fear of being accused of
being a troll.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-14 Thread Chuck Zmudzinski
On 9/14/2022 9:06 AM, The Wanderer wrote:
> On 2022-09-14 at 08:51, Chuck Zmudzinski wrote:
>
> > On 9/14/2022 1:03 AM, to...@tuxteam.de wrote:
> >
> >> On Tue, Sep 13, 2022 at 03:41:11PM -0400, Chuck Zmudzinski wrote:
> >>
> >> [...]
> >>
> >>> Actually, someone already has shown us how to do it better. His name is
> >>> Linus Torvalds [...]
> >>
> >> I don't know what your aim is.
> >>
> >> I have the impression that it's just arguing for arguing's sake [1].
> >>
> >> [1] in the classical sense of "trolling", as per Wikipedia:
> >>  "In Internet slang, a troll is a person who posts inflammatory,
> >>   insincere, digressive,[1] extraneous, or off-topic messages in
> >>   an online community [...], with the intent of provoking readers
> >>   into displaying emotional responses,[2] or manipulating others'
> >>   perception.
> >>   https://en.wikipedia.org/wiki/Trolling
> > 
> > So you are accusing me of being a troll. Well, it takes one to know one.
>
> No, it very much does not.
>
> > Congratulations! I am starting my own list of trolls on debian-user and
> > you are the first member of that list.
>
> Given the long, long history of helping people that Tomas has on this
> mailing list, I think that if you want to convince anyone other than
> yourself that Tomas is a troll, you're going to have a *very* heavy lift
> (or a whole lot of lying) ahead of you.
>
> (Mind, by my personal definition - which is a bit different from the
> above, though probably still largely compatible - I'm not entirely
> convinced that you're a troll either. But you're *definitely* behaving
> in such a way that I do not blame others for reaching that conclusion.)

I admit that I behaved like a troll when i tried to enter into a conversation 
with
Tomas. I do know he helps many people on this list, that is something good he
does. But on this thread, he also behaved like a troll and caused me to also
behave like a troll. That is a fact, if anyone wants to take the time to look at
what he said, the things he omitted in his replies, etc.

I especially noted his response to my introduction of the idea in this thread
that open source projects like Debian consider themselves communities, and
I wanted to emphasize that those who volunteer to help out with Debian or
other free software communities should not serve their own interests but the
interests of the community. After I made those points, that is when Tomas
started his ad hominum attacks against me and turned the conversation away
from what it means for Debian to be a community and changed it into an ad
hominum attack against me. It causes me to think there are some aspects of
the idea of Debian as a community that are offensive to him. From what he
actually did in this thread, I am inclined to think his idea of Debian as a 
community
is that it is a community of developers only, and not of users. Maybe he is 
right
about that. Maybe Debian *is only* a community of the one thousand or so
Debian developers with voting rights, and the rest of us are trolls if we dare 
to
express our opinions as mere Debian users on the debian-user list or on any
other Debian hosted forum.

So I am going to be very careful about trying to have an objective conversation
with Tomas, given what I actually saw him do in this thread, and given the 
mistake
I made by letting him bait me into appearing to be a troll. I will be careful
to not let that happen again.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-14 Thread Chuck Zmudzinski
On 9/13/2022 7:11 PM, Thiemo Kellner wrote:
> Am 13.09.22 um 23:55 schrieb Chuck Zmudzinski:
> > 
>
> > I am fairly sure I was a victim of
> > the breach of Yahoo that affected hundreds of millions of its users.
> I am sorry for you. I do not know this case, so I cannot tell whether 
> OSS or CSS components of their service were breached, or even a social 
> engineering case.

There is information about the Yahoo data breach on the Internet, including the
$117 million class action case on behalf of 194 million class members:

https://www.cnbc.com/2020/02/06/what-to-do-if-you-got-email-from-yahoo-about-a-data-breach-settlement.html

I don't know if there is enough information available in the public domain to 
determine
to what extent free/oss software might have contributed to that data breach. I 
do remember
Yahoo admitted the number of affected accounts was around 500 million.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-14 Thread Chuck Zmudzinski
On 9/14/2022 1:03 AM, to...@tuxteam.de wrote:
> On Tue, Sep 13, 2022 at 03:41:11PM -0400, Chuck Zmudzinski wrote:
>
> [...]
>
> > Actually, someone already has shown us how to do it better. His name is
> > Linus Torvalds [...]
>
> I don't know what your aim is.
>
> I have the impression that it's just arguing for arguing's sake [1].
>
> [1] in the classical sense of "trolling", as per Wikipedia:
>  "In Internet slang, a troll is a person who posts inflammatory,
>   insincere, digressive,[1] extraneous, or off-topic messages in
>   an online community [...], with the intent of provoking readers
>   into displaying emotional responses,[2] or manipulating others'
>   perception.
>   https://en.wikipedia.org/wiki/Trolling
>

So you are accusing me of being a troll. Well, it takes one to know one.

Congratulations! I am starting my own list of trolls on debian-user and
you are the first member of that list.

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-14 Thread Chuck Zmudzinski
On 9/14/2022 7:08 AM, debian-u...@howorth.org.uk wrote:
> > On 9/13/2022 3:59 PM, err...@free.fr wrote:
> > > Please STOP!
> > >
> > > you are annoying, and if you want improve free softwares, is not
> > > like this. you will better contribute with your code or with your
> > > translations than by writing to this mailing-list  
>
> I agree with the sentiments of annoyance and that this thread should
> stop now, please.

Not everyone agrees, because some have still been making comments here that
in my opinion and theirs are constructive and not just trolling.

>
> > The problem is, with all due respect, that I do have my code
> > improvements for free software, but some free software people do not
> > want to accept my contributions but instead want to allow the free
> > software to continue to have the bugs, and they will not explain
> > themselves either. Why should I waste my time contributing to
> > software projects who do not want my contributions? Treating people
> > who want to contribute this way is not the way to gain more advocates
> > for free software!
>
> But again you have been asked before to be specific about your
> objections, so a link to your proposed code improvements and whatever
> conversation there was when you submitted them would go some way to
> justifying the space and time you have already wasted on this list.
>
> > > I want you kicked from this list.  
> > 
> > Well, if you get me kicked off, I will be kicked off. But that is not
> > the way to build a community of people trying to make good software.
> > That is all I am advocating for, and I am really surprised to be
> > treated this way on this list for advocating for improved software in
> > Debian. I guess the trolls on here do not really want to increase the
> > number of people working on improving Debian. But without more
> > people, Debian cannot possibly provide quality support for 59,000
> > free software packages. That is just a fact, even it no one here
> > wants to acknowledge it.
>
> I haven't seen much evidence of trolls here, apart from yourself.

I did make the mistake of feeding a couple of trolls, from now on I will ignore 
them.
They baited me into appearing as a troll by refusing to acknowledge a simple 
truth
and forcing me to say the same obvious truth over and over again, and I 
understand
why some people might be annoyed by that.

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-14 Thread Chuck Zmudzinski
On 9/13/2022 7:11 PM, Thiemo Kellner wrote:
> Am 13.09.22 um 23:55 schrieb Chuck Zmudzinski:
> > On 9/13/2022 4:14 PM, Thiemo Kellner wrote:
> > I think Megha is emphasizing, and possibly over-emphasizing, the fact 
> > that the persons
> > who actually commit the code in free software projects can operate with 
> > little or
> > no oversight when they are just volunteers not really accountable to anyone.
> And I very much think she is wrong there. Being software developer 
> myself, unfortunately closed source mainly, I can tell that oversight is 
> not related to the licensing model or the pay of the developer. I would 
> go to the length to say that volunteers take, in general, a bigger pride 
> in the quality of their work, because they are not payed for it. The few 
> quite fruitless attempts in writing OSS, I took, failed sometimes 
> because I intend to create the perfect solution and thus not 
> progressing, whereas in the work for money I am often forced to 
> implement a working solution I can tell from the start, it will not be 
> easily maintainable or extendable.
> > to think the situation might be better if either 1) open source projects 
> > exercised more
> > oversight than they currently do over the persons who actually write the 
> > code and
> > release the software
> As I already told. In over 25 years of experience, I do not have 
> complaints about the oversight taken by OSS projects, where as I 
> regularly can complain about closed source payed for software. In the 
> past two weeks I was hunting down a problem we had with IBM DataStage. 
> One of the parallel subprocess terminated unexpectedly and all the 
> message DataStage cared to give was that the subprocess received a 
> SIGINT. We hope to have work around, because we could not find the 
> source. To me, one of the worst things one can do as developer not to 
> have proper error reporting - unless you know, you will not get bothered 
> when the shit starts to hit the fan.
> > , or 2) free/oss software never became ubiquitous. We just cannot
> > know without being able to do a time machine experiment and see how the 
> > software
> > world would have developed if free/oss software had not become as 
> > ubiquitous as it is
> > today.
> I cannot agree with you at all on this point. Omnipresence of OSS does 
> not mean there are more error in the code. It just means there are more 
> users to detect problems, thus more possiblities for the bugs to get 
> fixed. Sure, if OSS developers are overloaded the will not get to fix 
> all the problems, just as developers on CSS (closed source software). 
> Much more, because the sales man can sell better new shiny features even 
> if useless, than stable code. The buyer expects that flaws get fixed for 
> free, maybe rightly so, thus the CSS company will fix as few bugs it can 
> get away with (exageration).
> > If there was not a serious problem of malware, identity theft, ransomware, 
> > etc.,
> > I would be more inclined to question what Megha Verma wrote, but based on 
> > what
> > I see in how free/oss projects are governed, I am not surprised that a 
> > world that relies
> > on so much free/oss software also suffers from so much malware, ransomware, 
> > identity
> > theft, etc.
> Again, my experience with OSS is not this one. And I very much think, 
> that malware, ransomware usually is software on its own not built-in any 
> software. Maybe exploiting a backdoor a company put in their products 
> for ease of maintenance or just by negligence. Identity theft sounds 
> like social engineering or man in the middle attack. The latter not 
> necessarily being a problem of OSS.
> >   Just because *you* have not experienced malware in the software you use
> > does not mean that there are no cases where free/oss software is being 
> > deployed
> > elsewhere in a stealthy way for malicious purposes.
>
> I did not state that OSS was free of flaws and bugs. I am make a point 
> to state that in my experience there are fewer bugs therein than in CSS.
>
> > I am fairly sure I was a victim of
> > the breach of Yahoo that affected hundreds of millions of its users.
> I am sorry for you. I do not know this case, so I cannot tell whether 
> OSS or CSS components of their service were breached, or even a social 
> engineering case.
> >
> > I know people will reply and say it is much worse with proprietary 
> > software. But we
> > really cannot know for sure, because free/oss is so ubiquitous now it is 
> > hard to
> > separate free/oss software from proprietary software.
>
> I certainly can tell my experience comparing OSS to CSS. And 

Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-14 Thread Chuck Zmudzinski
On 9/13/2022 6:47 PM, Stefan Monnier wrote:
> > If free/oss projects like Debian want to provide software with those
> > positive characteristics to their users, those projects must have in
> > place some level of oversight over what the persons who actually write
> > the software actually do, or don't do in the case of failing to fix
> > bugs that could easily be fixed, so that the goals of quality, useful,
> > safe, and secure software are reached.
>
> That's why I like Free Software: all of this is done out in the open,
> making oversight particularly easy.
>
> For proprietary code you generally simply can't do that at all because
> it's all kept secret.
>
>
> Stefan
>

We really agree on this point, thanks.

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-14 Thread Chuck Zmudzinski
On 9/13/2022 4:38 PM, Stefan Monnier wrote:
> > The users. They stop using software or any product that does not work
> > well or is more trouble than it is worth. Then the entity, whether
> > a free/oss or proprietary provider ends up shutting down
> > the enterprise.
>
> But, being Free Software, any remaining user can keep using it,
> improving it, checking if it contains any back doors, hire someone else
> to do it, etc...
>
> >> You do realize that nobody enforces that on proprietary software
> >> either, right?
> > The users do, in the marketplace - and what is not used by enough
> > users eventually disappears.
>
> That's right.  And then you're typically completely screwed even if it
> happened to work well for you.
>
> The company will also blissfully ignore your requests if you're part of
> too-small a slice of their users.  Ever tried to get an `armhf` binary for
> a proprietary GNU/Linux software?
>
> > I think it is true that the "best" software development model depends
> > less on free/oss vs.  proprietary and more on the wisdom, foresight,
> > integrity, and technical expertise of those doing the work and making
> > the important decisions.
>
> I don't care which is better.  I just prefer not to depend on the
> goodwill of a company (most of which I know act against my interest;
> probably inevitably because they are beholden to their shareholders).

Of course you know many of those companies that you know act against your
interests have employees who "volunteer" to contribute to free/oss software 
projects,
so in practice the free/oss software is not free from this problem, but a truly
open project can make it possible to find out which volunteers are not acting
in the true interests of those who advocate for the benefits of free/oss 
software,
and this is not possible in secretive, proprietary organizations.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-13 Thread Chuck Zmudzinski
On 9/13/2022 4:31 PM, Stefan Monnier wrote:
> > the interest of the user. These "volunteers" obviously have other,
> > possibly malicious, interests if they prove themselves unwilling to
> > apply fixes to bugs that are reported to them.
>
> I think there's a confusion here: these volunteers will also have
> "other, possibly malicious, interests" even if they are willing/eager
> to apply fixes to bugs that are reported to them.
>
> Same goes for people you pay, so it's not specific to volunteers.
> And of course it's also not specific to a particular kind of license.
>
>
> Stefan
>

So I presume you agree that no matter the kind of license, development model, 
etc.,
it is in the interest of the users of software for there to be oversight of 
what the persons
who actually write the code and release the software to the public actually do 
to deter
them from doing anything malicious, and if they do not act in the interest of 
the users,
then they are undermining the purpose of any software project that claims to 
provide
quality software that is secure, useful, and safe to use.

If free/oss projects like Debian want to provide software with those positive
characteristics to their users, those projects must have in place some level of 
oversight
over what the persons who actually write the software actually do, or don't do 
in the
case of failing to fix bugs that could easily be fixed, so that the goals of 
quality, useful,
safe, and secure software are reached.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-13 Thread Chuck Zmudzinski
On 9/13/2022 4:14 PM, Thiemo Kellner wrote:
> Am 12.09.22 um 19:47 schrieb Chuck Zmudzinski:
> > "Open Source Software is accessible to all means it can be used and 
> > misused.
> > And, that’s where it turns unconstructive for us. With OSS, we can expect 
> > harm,
> > virus transfer, identity burglary, and many other malicious practices to 
> > hurt the
> > process." [1]
> > ...
> > 
> > [1] 
> > https://medium.com/quick-code/advantages-disadvantages-of-open-source-software-explained-2fd35acd413
>
> Hi Chuck
>
> ...
>
> I do not quite get the meaning of "Open Source Software is accessible to 
> all means it can be used and misused." by Megha Verma. Assuming that it 
> is by its nature possible to "inject" malicious code then yes and no. 
> Yes, it theoretically is possible as anyone can get and change the code, 
> but no, if the project is fairly well maintained, i.e. no commits to the 
> main branch of the code repository without any review. Personally, I 
> have been using OSS for more than 25 years and never had the suspicion 
> any of the OSS I used was acting malicious.

I think Megha is emphasizing, and possibly over-emphasizing, the fact that the 
persons
who actually commit the code in free software projects can operate with little 
or
no oversight when they are just volunteers not really accountable to anyone. 
Also,
we do not really know what the malware/ransomware situation would be like today
around the world if free/oss software were not as ubiquitous as it is today in 
web
servers, phone operating systems like android, etc. It clearly is not a good 
situation
now regarding malware and ransomware around the world, and it is not 
unreasonable
to think the situation might be better if either 1) open source projects 
exercised more
oversight than they currently do over the persons who actually write the code 
and
release the software, or 2) free/oss software never became ubiquitous. We just 
cannot
know without being able to do a time machine experiment and see how the software
world would have developed if free/oss software had not become as ubiquitous as 
it is
today. If there was not a serious problem of malware, identity theft, 
ransomware, etc.,
I would be more inclined to question what Megha Verma wrote, but based on what
I see in how free/oss projects are governed, I am not surprised that a world 
that relies
on so much free/oss software also suffers from so much malware, ransomware, 
identity
theft, etc. Just because *you* have not experienced malware in the software you 
use
does not mean that there are no cases where free/oss software is being deployed
elsewhere in a stealthy way for malicious purposes. I am fairly sure I was a 
victim of
the breach of Yahoo that affected hundreds of millions of its users. A word to 
the wise:
be vigilant about the software you use and take note of any red flags.

I know people will reply and say it is much worse with proprietary software. 
But we
really cannot know for sure, because free/oss is so ubiquitous now it is hard to
separate free/oss software from proprietary software. For example, most web
browsers are based on chromium, a free oss project that comes in large part from
Google, but some of the most-used browsers in the world based on chromium
are proprietary, such as chrome and edge.

I recommend everyone be very aware of the risks of using any software, whether
it be proprietary software or free/oss software in today's world of so much 
malware.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-13 Thread Chuck Zmudzinski
On 9/13/2022 3:59 PM, err...@free.fr wrote:
> Please STOP!
>
> you are annoying, and if you want improve free softwares, is not like this.
> you will better contribute with your code or with your translations than by 
> writing to this mailing-list

The problem is, with all due respect, that I do have my code improvements for 
free software, but some free software people do not want to accept my 
contributions but instead want to allow the free software to continue to have 
the bugs, and they will not explain themselves either. Why should I waste my 
time contributing to software projects who do not want my contributions? 
Treating people who want to contribute this way is not the way to gain more 
advocates for free software!

>
> I want you kicked from this list.

Well, if you get me kicked off, I will be kicked off. But that is not the way 
to build a community of people trying to make good software. That is all I am 
advocating for, and I am really surprised to be treated this way on this list 
for advocating for improved software in Debian. I guess the trolls on here do 
not really want to increase the number of people working on improving Debian. 
But without more people, Debian cannot possibly provide quality support for 
59,000 free software packages. That is just a fact, even it no one here wants 
to acknowledge it.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-13 Thread Chuck Zmudzinski
On 9/13/2022 2:33 PM, Michael Stone wrote:
> On Tue, Sep 13, 2022 at 02:14:38PM -0400, Chuck Zmudzinski wrote:
> >So do you, obviously. Someone said something that raised that question in my 
> >mind,
> >but you deleted that part from this message, which proves you are the one 
> >who has
> >an ax to grind by not answering the question that has been raised by the 
> >comments
> >you and another person has been making.
>
> What question?

You identified "rhetorical questions" that you wanted me to stop.

> I saw no question. Either talk about specifics or it's 
> nothing but empty FUD.
>
> >> Either get to the point and discuss
> >> what's bothering you directly or stop with the pointless rhetorical
> >> questions.
> >>
> >
> >It bothers me that there are supposed advocates of free/oss software like 
> >Debian
> >who think that it is good for free/oss software if the persons who volunteer
> >to develop and maintain free software like Debian can ignore bugs reported 
> >to them
> >and refuse to fix them.
>
> Here's the thing: it's open source. If you think it's not being done 
> right THEN YOU DO IT DIFFERENTLY. If you don't like how some software is 
> being maintained, fork it and show everyone how it can be done better.

Actually, someone already has shown us how to do it better. His name is
Linus Torvalds. Debian and other oss projects should see and understand
what he does that makes the Linux kernel a truly useful software project. Debian
is successful because of the Linux kernel, not the other way around.

Since you bring up forks, I have an opinion about that. Everyone have their own
fork is not a sustainable model for free/oss software, IMHO. If everyone needs
to have their own fork, that is because of the failure of the way free/oss 
projects
are governed. Again this is just my opinion, but I think it is valid.

There is a place for some forks when the goal of the project has a particular 
focus,
but for a project like Debian, which currently claims to support 59000 free 
software
packages in the stable distribution, the focus is on general purpose computing 
and,
IMHO, it is a failure for Debian and free/oss software when a fork such as 
Devuan
happens. The Devuan fork proved how ridiculous it is for Debian to claim to be 
able
to support 59000 software packages in its stable distribution, which is 
currently what
the "Reasons to use Debian" page on debian.org claims. I think that if Debian 
really
wants to provide *high quality* support for each and every one of the 59000 
software
packages in its repositories, it should look at the Devuan fork and try to 
understand
what it could have done to prevent it from happening. All those people working 
on
Devuan could still be working on Debian. I don't understand why it was good for 
that
fork to happen. Just my opinion, FWIW.

>  
> It's unreasonable to just sit on the sidelines and make vague 
> accusations. The ax you want to grind seems to involve one specific 
> issue.

The issue is the survival of free/oss software - it will not survive if the idea
that those who develop and maintain free/oss software don't have to respond
to the bugs that are reported to them prevails. No one will use it if the people
who create it are free to let the problems that inevitably arise go without 
fixing
them.

> Tell us what it is, then everyone can decide for themselves 
> whether you have a point, whether it can/should be addressed, or whether 
> you're just mad that you can't make someone else do what you want.

I think I have clarified what the issue is sufficiently. I am not mad that I 
cannot
make someone else do what I want. I would just be sad if free/oss software
dies out because it was taken over by people who refused to acknowledge the
simple idea that it is bad for free/oss software if those who develop and
maintain the software are free to not fix the bugs that users report to them.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-13 Thread Chuck Zmudzinski
On 9/13/2022 2:02 PM, Michael Stone wrote:
> On Tue, Sep 13, 2022 at 12:42:12PM -0400, Chuck Zmudzinski wrote:
> >Software projects today, IIUC, are communities. The "volunteers" should do 
> >what the community
> >wants, not necessarily what you or I want. Do you think the free/oss 
> >software community wants
> >volunteers who ignore bugs or refuse to fix bugs in free/oss software? If 
> >they do ignore a
> >bug or refuse to fix a bug with a known fix, don't they owe an explanation 
> >to the community?
> >If not, why not?
>
> You seem to have an ax to grind.

So do you, obviously. Someone said something that raised that question in my 
mind,
but you deleted that part from this message, which proves you are the one who 
has
an ax to grind by not answering the question that has been raised by the 
comments
you and another person has been making.

> Either get to the point and discuss 
> what's bothering you directly or stop with the pointless rhetorical 
> questions.
>

It bothers me that there are supposed advocates of free/oss software like Debian
who think that it is good for free/oss software if the persons who volunteer
to develop and maintain free software like Debian can ignore bugs reported to 
them
and refuse to fix them. If you think that is good for free/oss software, I 
disagree with
you. Fortunately, you are just one person, and I doubt the Debian community or
any other free software community wants the persons who develop and maintain
the software to ignore and/or refuse to fix the bugs reported to them.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-13 Thread Chuck Zmudzinski
On 9/13/2022 12:36 PM, to...@tuxteam.de wrote:
> On Tue, Sep 13, 2022 at 12:25:40PM -0400, Chuck Zmudzinski wrote:
>
> [...]
>
> > I agree with that. But the price-performance ratio could be even better if 
> > the "volunteers"
> > in free/oss software projects were not free to ignore bugs reported to them.
>
> Hm. I doubt that. Perhaps they will do more what *you* want,

Software projects today, IIUC, are communities. The "volunteers" should do what 
the community
wants, not necessarily what you or I want. Do you think the free/oss software 
community wants
volunteers who ignore bugs or refuse to fix bugs in free/oss software? If they 
do ignore a
bug or refuse to fix a bug with a known fix, don't they owe an explanation to 
the community?
If not, why not?



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-13 Thread Chuck Zmudzinski
On 9/13/2022 11:53 AM, Michael Stone wrote:
> On Tue, Sep 13, 2022 at 11:27:43AM -0400, Chuck Zmudzinski wrote:
> >On 9/13/2022 12:36 AM, to...@tuxteam.de wrote:
> >> On Mon, Sep 12, 2022 at 03:32:27PM -0400, Michael Stone wrote:
> >>
> >> > [...] "I can't get personalized/dedicated support with enforceable
> >> > SLAs for free"
> >
> >If the requirement that maintainers and developers of free/oss software must 
> >actually
> >fix the bugs reported to them is not enforced, then free/oss software *is* 
> >vulnerable to
> >all kinds of malicious activity by the "volunteers" who create the free/oss 
> >software.
>
> Enforced by whom? How?

The users. They stop using software or any product that does not work well or
is more trouble than it is worth. Then the entity, whether a free/oss or 
proprietary
provider ends up shutting down the enterprise.

> You do realize that nobody enforces that on 
> proprietary software either, right?

The users do, in the marketplace - and what is not used by enough users 
eventually
disappears.

> THIS IS NOT A CHARACTERISTIC THAT 
> DISTINGUISHES OPEN SOURCE AND CLOSED SOURCE SOFTWARE. Given that, 
> continuing this discussion seems silly. (Especially since it appears 
> that you'll simply to repeat your original assertion, mistaken though it 
> is, without even trying to address to the points that others have made.)
>

I think it is true that the "best" software development model depends less on 
free/oss vs.
proprietary and more on the wisdom, foresight, integrity, and technical 
expertise of
those doing the work and making the important decisions.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-13 Thread Chuck Zmudzinski
On 9/13/2022 11:44 AM, to...@tuxteam.de wrote:
> On Tue, Sep 13, 2022 at 11:27:43AM -0400, Chuck Zmudzinski wrote:
> > On 9/13/2022 12:36 AM, to...@tuxteam.de wrote:
> > > On Mon, Sep 12, 2022 at 03:32:27PM -0400, Michael Stone wrote:
> > >
> > > > [...] "I can't get personalized/dedicated support with enforceable
> > > > SLAs for free"
> > 
> > If the requirement that maintainers and developers of free/oss software 
> > must actually
> > fix the bugs reported to them is not enforced, then free/oss software *is* 
> > vulnerable to
> > all kinds of malicious activity by the "volunteers" who create the free/oss 
> > software.
> > 
> > >
> > > Had I a printer, I'd print out this, frame it and hang it on the
> > > wall. This makes the point very nicely :-)
> > >
> > > Cheers
> > 
> > Yes, it is true, no one should use Debian or any software maintained by 
> > totally
> > unaccountable "volunteers" for any mission-critical purpose without also 
> > hiring
> > someone with the time and expertise to do what is necessary to make such 
> > software
> > secure and bug-free for the intended purpose of the software. That is, users
> > must *not trust* the volunteers who maintain and develop Debian software to 
> > act in
> > the interest of the user [...]
>
> But how is that different from commercial software?

Not that much different. I like the fact that we have free/oss software now so
we can see which "volunteers" who sometimes work for big corporations choose to
ignore bugs reported to them. I won't trust those "volunteers" nor will I trust
the companies they work for, nor will I trust the software and hardware those
companies release into the marketplace. I also think it is better for free/oss
projects to enforce some minimum level of effort on the "volunteers" who
maintain and develop the software to reduce the chances that the
"volunteers" can get away with abusing their position as "volunteers" who have
the power to upload official software to the free/oss projects' download 
servers.

> The commercial entity
> is bound to the shareholders and to the paying customers -- based on how
> much they pay for. If you, as a customer, are shelling out a significant
> amount of money, you can as well pay a dedicated person to keep your
> free software in shape. Probably the price-performance ratio will be
> better.

I agree with that. But the price-performance ratio could be even better if the 
"volunteers"
in free/oss software projects were not free to ignore bugs reported to them.

Cheers



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-13 Thread Chuck Zmudzinski
On 9/13/2022 12:36 AM, to...@tuxteam.de wrote:
> On Mon, Sep 12, 2022 at 03:32:27PM -0400, Michael Stone wrote:
>
> > [...] "I can't get personalized/dedicated support with enforceable
> > SLAs for free"

If the requirement that maintainers and developers of free/oss software must 
actually
fix the bugs reported to them is not enforced, then free/oss software *is* 
vulnerable to
all kinds of malicious activity by the "volunteers" who create the free/oss 
software.

>
> Had I a printer, I'd print out this, frame it and hang it on the
> wall. This makes the point very nicely :-)
>
> Cheers

Yes, it is true, no one should use Debian or any software maintained by totally
unaccountable "volunteers" for any mission-critical purpose without also hiring
someone with the time and expertise to do what is necessary to make such 
software
secure and bug-free for the intended purpose of the software. That is, users
must *not trust* the volunteers who maintain and develop Debian software to act 
in
the interest of the user. These "volunteers" obviously have other, possibly 
malicious,
interests if they prove themselves unwilling to apply fixes to bugs that are 
reported to
them.

Thanks for clarifying that fact.

Best regards



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-12 Thread Chuck Zmudzinski
On 9/12/22 3:32 PM, Michael Stone wrote:
> On Mon, Sep 12, 2022 at 01:47:49PM -0400, Chuck Zmudzinski wrote:
> >Well, I suppose so, but I am pleased that a grub maintainer is now on the 
> >case. Still,
> >there is another Debian bug that affects me that continues to be ignored, so 
> >I admit
> >I have an attitude about that. I accept that what is of grave or important 
> >severity to
> >me is not necessarily of grave or critical severity to the official Debian 
> >maintainers
> >and developers. I wish to merely point out that what is often said about the 
> >advantages
> >and disadvantages of free, open-source software that is maintained by 
> >volunteers is
> >true:
>
> No, it's a misguided conclusion that isn't supported by facts. I can 
> think of any number of bugs in closed source software that aren't fixed. 
> The only real difference is this: with open source software you might 
> actually be told "I'm not going to prioritize this because I'm a 
> volunteer and prefer to do something else", while with propietary 
> software the discussion that concludes "this customer isn't important 
> enough to require a change in the priority of the request" isn't going 
> to be public and all you'll ever be told is that the request is being 
> reviewed or somesuch. 
>
> There is an exception that proves the rule, however: if you're a large 
> enough customer, paying enough money, you may well get a team of people 
> dedicated to implementing whatever you ask for. But here's the 
> thing--you can get the same level of service for open source software, 
> if you're willing to pay for it. (Not directly from debian, but there 
> are consultants/etc that will provide such services.) Your complaint 
> really boils down to "I can't get personalized/dedicated support with 
> enforceable SLAs for free", which is just as true for proprietary 
> software as it is for open source software.
>

I actually agree free/oss is better - if I was a big paying customer
(I am not), I would pay for a free/oss solution instead of a proprietary
solution because the entire development of the solution would be in the
open which would make it more difficult for the persons implementing
the solution to do anything malicious behind closed doors.

Still, I think it is obvious that the success of free/oss projects depends
very much on whether or not the persons who volunteer as developers
and maintainers actually respond to and fix bugs. Also, if the persons
who volunteer as developers and maintainers can ignore bug
reports without any consequences from the community, then the
possibility for free/oss software to fully realize the advantages of the
free/oss software development model over the proprietary model is
undermined.

Best regards,

Chuck



Re: Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-12 Thread Chuck Zmudzinski
On 9/12/2022 1:58 PM, The Wanderer wrote:
> On 2022-09-12 at 13:47, Chuck Zmudzinski wrote:
>
> > On 9/12/2022 12:14 PM, David Wright wrote:
> > 
> >> On Mon 12 Sep 2022 at 11:13:52 (-0400), Chuck Zmudzinski wrote:
>
> >>> The grub maintainers do not have the time or interest to fix it.
> >>> Perhaps the Xen users could try to convince the Xen maintainers
> >>> to do an nmu to fix it if the grub maintainers continue to ignore
> >>> the bug, but I don't know if that breaks the etiquette that 
> >>> governs such things in the world of Debian developers - I am just
> >>> a Debian user.
> >> 
> >> There seems to be some attitude here.
> > 
> > Well, I suppose so, but I am pleased that a grub maintainer is now on
> > the case. Still, there is another Debian bug that affects me that
> > continues to be ignored, so I admit I have an attitude about that. I
> > accept that what is of grave or important severity to me is not
> > necessarily of grave or critical severity to the official Debian
> > maintainers and developers. I wish to merely point out that what is
> > often said about the advantages and disadvantages of free,
> > open-source software that is maintained by volunteers is true:
> > 
> > An advantage is that  the user has full access to the source code and
> > is free to fix problems if the official releases have unpatched bugs
> > but this of course costs time and resources devoted to solving
> > problems that are not fixed promptly in the official release. A
> > disadvantage is that often the priorities of the developers who
> > release free, open source software are not always the same as the
> > priorities of any particular user, so there is no guarantee that the
> > developers of free, open source software will ever get around to
> > fixing a problem that might be causing trouble for some subset of 
> > users of the software who very often just stop using the free, open
> > source software and return to proprietary software that just works
> > for them without a big hassle or effort to keep it working well and
> > securely.
>
> I am inclined to dispute one aspect of this characterization.
>
> That which you cite here as a disadvantage is only a disadvantage
> (relative to proprietary software) if the proprietary software does, as
> you say, "just work for them".
>
> It is equally possible (if not more) to find that a given piece of
> proprietary software does not meet your needs (because the priorities of
> its developers, or at least the people who pay them, do not match your
> priorities).
>
> If that happens, you don't even have the option of falling back to hack
> the source and run your own version; you're effectively stuck. As I
> understand matters, that is in fact the reason Free Software was
> invented in the first place.
>
> With access to the source and appropriate license guaranteeing you the
> right to modify it (et cetera), if the priorities of the developers
> don't match yours you do at least have the possibility of going in and
> fixing it yourself - whether as a patch to go upstream, or a public
> fork, or even just a local fork. With proprietary software, you don't
> have that option.
>
> As such, not only is this not a disadvantage unique to Free Software,
> it's a disadvantage that exists even *worse* with proprietary software.
>

I agree OSS that works well is much better than proprietary software, because it
makes a software solution that works well accessible to all the users. The 
disadvantage
is that in practice, OSS does not always work as well and is sometimes more 
buggy
than proprietary software when, for example, the developers and maintainers
are unwilling or unable to fix bugs or add features and the users do not have
the ability to fix the problems or convince the developers to fix the problems, 
and
it is especially a problem when the only reason the OSS supporters give for not
fixing problems is: "we are just volunteers." Really good, secure software is 
not
going to come from volunteers who are never required to at least explain why 
they
fail to fix bugs that have a known fix but remain open for an unreasonably long 
time
due to the lack of attention to the bug by the developers and maintainers. 
Unfortunately,
this does happen in Debian, and as long as defenders of OSS continue to say, 
"they are just
volunteers," there will always be a risk that the "volunteers" will be able to 
sabotage the
real goals of OSS software. In the end, though, OSS is probably best because 
those who do
sabotage OSS software eventually get caught precisely because the process of
developing OSS is also open so the malice is eventually discovered by the 
community and
the malicious actors are removed from positions where they can cause harm.

Best regards,

Chuck



Advantages/Disadvantages of Open Source Software (Was Re: Package grub-xen-host breaks PV domains with 11.5 point release)

2022-09-12 Thread Chuck Zmudzinski
On 9/12/2022 12:14 PM, David Wright wrote:
> On Mon 12 Sep 2022 at 11:13:52 (-0400), Chuck Zmudzinski wrote:
> > On 9/12/2022 12:55 AM, David Wright wrote:
> > >
> > > I would imagine a fix could follow quite quickly as it only requires
> > > rebuilding with a filename added to a list of files not to have
> > > their symbols stripped (or reverting the compatibility level change).
> > 
> > The patch to fix the bug with the dh_strip override was identified six days 
> > ago
> > in the bug report by a user, yet AFAICT the grub maintainers have not even
> > acknowledged the existence of this bug yet to those who have contributed
> > to the bug report on BTS. So I do not expect a fix very soon.
>
> I don't see why: I see Steve's post from several hours ago.

Sorry, I missed that, Steve is a grub maintainer and now he is looking at the 
bug, and that is a
good and encouraging fact.

>
> > The grub maintainers
> > do not have the time or interest to fix it. Perhaps the Xen users could try 
> > to
> > convince the Xen maintainers to do an nmu to fix it if the grub maintainers
> > continue to ignore the bug, but I don't know if that breaks the etiquette 
> > that
> > governs such things in the world of Debian developers - I am just a Debian 
> > user.
>
> There seems to be some attitude here.

Well, I suppose so, but I am pleased that a grub maintainer is now on the case. 
Still,
there is another Debian bug that affects me that continues to be ignored, so I 
admit
I have an attitude about that. I accept that what is of grave or important 
severity to
me is not necessarily of grave or critical severity to the official Debian 
maintainers
and developers. I wish to merely point out that what is often said about the 
advantages
and disadvantages of free, open-source software that is maintained by 
volunteers is
true:

An advantage is that  the user has full access to the source code and is free 
to fix
problems if the official releases have unpatched bugs but this of course costs 
time
and resources devoted to solving problems that are not fixed promptly in the 
official
release. A disadvantage is that often the priorities of the developers who 
release
free, open source software are not always the same as the priorities of any 
particular
user, so there is no guarantee that the developers of free, open source 
software will
ever get around to fixing a problem that might be causing trouble for some 
subset of
users of the software who very often just stop using the free, open source 
software
and return to proprietary software that just works for them without a big 
hassle or
effort to keep it working well and securely.

Megha Verma of medium.com goes so far to say a disadvantage of OSS is that free
open source software can be misused for malicious purposes, but it would be hard
to prove what she says is true, but her point is that the way open source 
projects
are governed lends itself to possible abuse. This is how she explains it:

"Open Source Software is accessible to all means it can be used and misused.
And, that’s where it turns unconstructive for us. With OSS, we can expect harm,
virus transfer, identity burglary, and many other malicious practices to hurt 
the
process." [1]

I would not go so far to say that is happening in Debian, but I have experienced
the fact that not every bug that is important to my use case will be fixed 
quickly
in Debian, even if I or other users takes the time to find the fix and share it
with the Debian developers. This experience of mine with Debian as a long-time
user of Debian *does* raise suspicion in my mind, and I would not be suspicious
of malicious intent by Debian developers and maintainers if they were more
responsive to some bugs they just ignore for months and even years. I agree
my suspicion does not prove malice, but my suspicion is reasonable when there
are Debian "volunteers" who do work in corporate environments where the
interests of their employer might conflict with the interests of the open source
software projects such as Debian that they contribute to. This is simply a risk 
that
users of Debian software, or of any open source software, should be aware of,
and users should know how to mitigate this risk of malicious activity within
open source software projects like Debian.

So it as a fact that if a person is just a user of Debian and not an official
developer of Debian, there is no guarantee that the use case of that particular
user will receive prompt attention from the official Debian developers. That
is true because Debian developers are just volunteers and not liable for any
problems the software they release might cause to those who use Debian
software. That is a *big disadvantage* of open source software.

Best regards,

Chuck

[1] 
https://medium.com/quick-code/advantages-disadvantages-of-open-source-software-explained-2fd35acd413



Re: Should a serious bug have made in into bullseye 11.5?

2022-09-12 Thread Chuck Zmudzinski
On 9/12/2022 11:36 AM, Tim Woodall wrote:
> On Mon, 12 Sep 2022, David Wright wrote:
>
> >
> > AFAICT it had two months in testing without this problem being
> > hit and reported.
> >
>
> Unfortunately, g-x-h is probably mostly used on stable or oldstable with
> guests running testing.
>
> I'm not sure if it's possible to run a xen hypervisor in a domu - that
> would be an interesting way to run testing.
>
> Tim.
>

I think that xen hypervisor running in a domu is called nested virtualization.
The Xen project defines support for this as follows [1]:

### x86/Nested PV
This means running a Xen hypervisor inside an HVM domain on a Xen system,
with support for PV L2 guests only
(i.e., hardware virtualization extensions not provided
to the guest).

    Status, x86 Xen HVM: Tech Preview

This works, but has performance limitations
because the L1 dom0 can only access emulated L1 devices.

Xen may also run inside other hypervisors (KVM, Hyper-V, VMWare),
but nobody has reported on performance.

### x86/Nested HVM

This means providing hardware virtulization support to guest VMs
allowing, for instance, a nested Xen to support both PV and HVM guests.
It also implies support for other hypervisors,
 739 such as KVM, Hyper-V, Bromium, and so on as guests.

    Status, x86 HVM: Experimental

[1] http://xenbits.xen.org/gitweb/?p=xen.git;a=blob_plain;f=SUPPORT.md;hb=HEAD



Re: Package grub-xen-host breaks PV domains with 11.5 point release

2022-09-12 Thread Chuck Zmudzinski
On 9/12/2022 12:55 AM, David Wright wrote:
> On Mon 12 Sep 2022 at 01:15:47 (+0200), Tom Lew wrote:
> > This is my first post, bear with me..
> > 
> > Package "grub-xen-host" shipped with point release 11.5 broke all PV
> > domains on my Xen server, after "apt upgrade" from 11.4.
> > 
> > I found https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017944
> > exactly mirroring my situation, and I wonder whether this can be fixed
> > for other users in any (fast) way, upfront other users doing apt
> > upgrade on their Xen hosts?
> > 
> > My workaround for this ATM: install and pin previous grub-xen-host
> > (grub-xen-host_2.04-20_amd64.deb, grub-xen-bin_2.04-20_amd64.deb,
> > grub-common_2.04-20_amd64.deb). Probably the wrong way to fix it, but
> > works for me so far(TM).
> > 
> > In case this should be reported or added to something somewhere,
> > please let me (a Debian bug reporting newbie) know.
>
> I would imagine a fix could follow quite quickly as it only requires
> rebuilding with a filename added to a list of files not to have
> their symbols stripped (or reverting the compatibility level change).

The patch to fix the bug with the dh_strip override was identified six days ago
in the bug report by a user, yet AFAICT the grub maintainers have not even
acknowledged the existence of this bug yet to those who have contributed
to the bug report on BTS. So I do not expect a fix very soon. The grub 
maintainers
do not have the time or interest to fix it. Perhaps the Xen users could try to
convince the Xen maintainers to do an nmu to fix it if the grub maintainers
continue to ignore the bug, but I don't know if that breaks the etiquette that
governs such things in the world of Debian developers - I am just a Debian user.

Best regards,

Chuck

>
> AFAICT apt-listbugs would have reported this to you before
> the upgrade of grub-xen-host took place, as someone had reported
> it on 22 Aug. So it might be worth installing apt-listbugs.
>
> Cheers,
> David.
>



Re: Currently on x11vnc, looking for reliable VNC solution?

2022-09-09 Thread Chuck Zmudzinski
On 9/7/22 10:11 PM, David wrote:
> On Thu, 8 Sept 2022 at 11:44, Chuck Zmudzinski  wrote:
> > On 9/7/22 7:45 PM, David wrote:
> > > On Thu, 8 Sept 2022 at 02:49, Chuck Zmudzinski  
> > > wrote:
> > > > On 9/7/2022 12:13 PM, Chuck Zmudzinski wrote:
> > >
> > > > > I use the tigervnc-standalone-server which is in the Debian packages
> > > > > archives. I use it only on a trusted LAN network so I don't need an
> > > > > encrypted vnc connection either, and I can access it remotely from the
> > > > > Internet by connecting to the LAN using a VPN (I use strongswan/IKEv2
> > > > > for the VPN server). The main configuration files are at ~/.vnc, and
> > > > > there are tools to configure it such as vncpasswd. The most important
> > > > > configuration file is ~/.vnc/xstartup, where you launch your DE or
> > > > > window manager of your choice.
> > >
> > > > > You can launch the server from a terminal logged in as an ordinary 
> > > > > user
> > > > > and the server runs as an ordinary user in the background so after you
> > > > > start the server in a terminal you can exit that terminal session.
> > >
> > > > Actually, you *should* exit that terminal session, especially if it is
> > > > a terminal window running in the same kind of session (gnome, lxde, etc)
> > > > and as the same user that you plan to run in the VNC server. This is
> > > > another limitation of the tigervnc-standalone-server: it does not 
> > > > connect
> > > > to an already running X11 session but instead launches a new session as
> > > > an ordinary user as specified in ~/.vnc/xstartup.
> > >
> > > > I have found that if I try to run two sessions as the same user, one 
> > > > over
> > > > VNC and one on the local desktop, it does not work too well, at least
> > > > with the current version of gnome, probably because there is not good
> > > > enough separation of the various user processes that gnome starts for
> > > > each user session.
> > >
> > > Hi,
> > >
> > > Regarding your final sentence, I wonder if installing dbus-x11 instead of
> > > dbus-user-session would improve that situation.
> > >
> > > Because of what I read in the 'Description' in the output of
> > > 'apt show dbus-user-session'.
> > >
> >
> > I have both dbus-user-session and dbus-x11 installed:
> >
> > chuckz@debian:~$ dpkg-query -l dbus*
> > Desired=Unknown/Install/Remove/Purge/Hold
> > | 
> > Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
> > |/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
> > ||/ NameVersion  Architecture Description
> > +++-===---=
> > ii  dbus1.12.20-2amd64simple interprocess 
> > messaging system (daemon and utilities)
> > un  dbus-bin  (no description 
> > available)
> > un  dbus-daemon   (no description 
> > available)
> > un  dbus-session-bus  (no description 
> > available)
> > un  dbus-session-bus-common   (no description 
> > available)
> > un  dbus-system-bus   (no description 
> > available)
> > un  dbus-system-bus-common(no description 
> > available)
> > ii  dbus-user-session   1.12.20-2amd64simple interprocess 
> > messaging system (systemd --user integration)
> > ii  dbus-x111.12.20-2amd64simple interprocess 
> > messaging system (X11 deps)
> >
> > I don't know how systemd handles the case when one user has two gnome 
> > sessions running at the same time or if it is possible to make it behave 
> > better in that case. I also don't know if installing dbus-session-bus or 
> > dbus-system-bus might help. If anyone has any tips to improve the way it 
> > runs in that case, I could try them out.
>
> The 'Description' to which I referred you says:
>   To retain dbus' traditional session semantics, in which login sessions
>   are artificially isolated from each other, remove this package and install
>   dbus-x11 instead
>
> Note: "remove this package".
>

I just tried my system with the dbus-user-session package removed, and it still 
does not run two gnome sessions of the same user very well. After removing the 
dbus-user-session package with the dbus-x11 package still installed, I started 
the tigervnc server which started a gnome user session, and then when I logged 
into another gnome session on the local display as the same user, the session 
on the local display started normally but in the process of starting the 
session on the local display the tigervnc server died. So I avoid running two 
gnome sessions as the same user at the same time on the same machine, and I 
don't think the feature of running two sessions at the same time as the same 
user on the same machine is a feature that is needed all that much, it is just 
a curiosity for me.

Best regards,

Chuck



Re: Currently on x11vnc, looking for reliable VNC solution?

2022-09-07 Thread Chuck Zmudzinski
On 9/7/22 7:45 PM, David wrote:
> On Thu, 8 Sept 2022 at 02:49, Chuck Zmudzinski  wrote:
> > On 9/7/2022 12:13 PM, Chuck Zmudzinski wrote:
>
> > > I use the tigervnc-standalone-server which is in the Debian packages
> > > archives. I use it only on a trusted LAN network so I don't need an
> > > encrypted vnc connection either, and I can access it remotely from the
> > > Internet by connecting to the LAN using a VPN (I use strongswan/IKEv2
> > > for the VPN server). The main configuration files are at ~/.vnc, and
> > > there are tools to configure it such as vncpasswd. The most important
> > > configuration file is ~/.vnc/xstartup, where you launch your DE or
> > > window manager of your choice.
>
> > > You can launch the server from a terminal logged in as an ordinary user
> > > and the server runs as an ordinary user in the background so after you
> > > start the server in a terminal you can exit that terminal session.
>
> > Actually, you *should* exit that terminal session, especially if it is
> > a terminal window running in the same kind of session (gnome, lxde, etc)
> > and as the same user that you plan to run in the VNC server. This is
> > another limitation of the tigervnc-standalone-server: it does not connect
> > to an already running X11 session but instead launches a new session as
> > an ordinary user as specified in ~/.vnc/xstartup.
>
> > I have found that if I try to run two sessions as the same user, one over
> > VNC and one on the local desktop, it does not work too well, at least
> > with the current version of gnome, probably because there is not good
> > enough separation of the various user processes that gnome starts for
> > each user session.
>
> Hi,
>
> Regarding your final sentence, I wonder if installing dbus-x11 instead of
> dbus-user-session would improve that situation.
>
> Because of what I read in the 'Description' in the output of
> 'apt show dbus-user-session'.
>

I have both dbus-user-session and dbus-x11 installed:

chuckz@debian:~$ dpkg-query -l dbus*
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name    Version  Architecture Description
+++-===---=
ii  dbus    1.12.20-2    amd64    simple interprocess 
messaging system (daemon and utilities)
un  dbus-bin          (no description available)
un  dbus-daemon       (no description available)
un  dbus-session-bus          (no description available)
un  dbus-session-bus-common       (no description available)
un  dbus-system-bus       (no description available)
un  dbus-system-bus-common        (no description available)
ii  dbus-user-session   1.12.20-2    amd64    simple interprocess 
messaging system (systemd --user integration)
ii  dbus-x11    1.12.20-2    amd64    simple interprocess 
messaging system (X11 deps)

I don't know how systemd handles the case when one user has two gnome sessions 
running at the same time or if it is possible to make it behave better in that 
case. I also don't know if installing dbus-session-bus or dbus-system-bus might 
help. If anyone has any tips to improve the way it runs in that case, I could 
try them out.

Best regards,

Chuck



Re: Currently on x11vnc, looking for reliable VNC solution?

2022-09-07 Thread Chuck Zmudzinski
On 9/7/2022 12:13 PM, Chuck Zmudzinski wrote:
> On 9/7/2022 4:41 AM, piorunz wrote:
> > On 07/09/2022 05:58, notoneofmyseeds wrote:
> > > On 07.09.22 06:19, Alexander V. Makartsev wrote:
> > >
> > >>>
> > >> I've switched to NoMachine [1] a long time ago.
> > >> It has all features I need, which are multi-platform and cross-OS
> > >> support, public key authentication, reliable file transfer between
> > >> hosts, and completely free no strings attached license for personal use.
> > >
> > > and the there's anydesk, with conditions just as nomachine.
> > >
> > > anydesk.com
> > >
> > >>
> > >>
> > >> [1] https://www.nomachine.com/
> >
> > Thanks for your replies guys. These solutions are overkill to my needs,
> > I just need reliable LAN access from one machine to another, as for WAN
> > access I already have ssh tunnel which tunnels all traffic I want if
> > need be. So, I don't think I need external, commercial, not open source
> > solution for my simple remote access. I'd rather fix VNC server I have
> > right now, or switch to different VNC server. Anyone has experience with
> > VNC, or similar LAN protocols, which work? Thanks in advance.
> >
> > --
> > With kindest regards, Piotr.
> >
> > ⢀⣴⠾⠻⢶⣦⠀
> > ⣾⠁⢠⠒⠀⣿⡁ Debian - The universal operating system
> > ⢿⡄⠘⠷⠚⠋⠀ https://www.debian.org/
> > ⠈⠳⣄
> >
>
> I use the tigervnc-standalone-server which is in the Debian packages 
> archives. I use it only on a trusted LAN network so I don't need an encrypted 
> vnc connection either, and I can access it remotely from the Internet by 
> connecting to the LAN using a VPN (I use strongswan/IKEv2 for the VPN 
> server). The main configuration files are at ~/.vnc, and there are tools to 
> configure it such as vncpasswd. The most important configuration file is 
> ~/.vnc/xstartup, where you launch your DE or window manager of your choice.
>
> You can launch the server from a terminal logged in as an ordinary user and 
> the server runs as an ordinary user in the background so after you start the 
> server in a terminal you can exit that terminal session. 

Actually, you *should* exit that terminal session, especially if it is a 
terminal window running in the same kind of session (gnome, lxde, etc) and as 
the same user that you plan to run in the VNC server. This is another 
limitation of the tigervnc-standalone-server: it does not connect to an already 
running X11 session but instead launches a new session as an ordinary user as 
specified in ~/.vnc/xstartup. I have found that if I try to run two sessions as 
the same user, one over VNC and one on the local desktop, it does not work too 
well, at least with the current version of gnome, probably because there is not 
good enough separation of the various user processes that gnome starts for each 
user session. So when I use the tigervnc standalone VNC session, I log out of 
the session on the local desktop for the user that is running the VNC server, 
and if I am going to use the local desktop session as the same user that is 
using the VNC server, I kill the VNC server first, so there
will not be two gnome sessions running as the same user.
> With the vnc port (usually 5901) open in the firewall, you can connect to the 
> server and start your apps, and once you have apps running, it will keep them 
> running in the session until you kill the server. I use it with gnome-session 
> with Xorg (I tried wayland session a while back and Xorg seemed more stable), 
> and it works adequately for my needs on stable, testing, and sid. It works 
> with both VNC viewers I have tried: RealVNC on Windows, and tigervnc-viewer 
> on Debian.
>
> There is one slight annoyance that I live with: With the gnome-session 
> desktop, there are some apps and settings that will require me to enter my 
> password when I first use that setting or app, such as setting up a color 
> profile, using the keyring, and starting the Brave browser. This could 
> probably be fixed with appropriate commands in the ~/.vnc/xstartup file, but 
> I have not tried debugging it and I just enter the password when asked by the 
> gnome desktop and after the first time for each app or setting it won't ask 
> again until I kill the server and restart it.
>
> Best regards,
>
> Chuck
>



Re: Currently on x11vnc, looking for reliable VNC solution?

2022-09-07 Thread Chuck Zmudzinski
On 9/7/2022 4:41 AM, piorunz wrote:
> On 07/09/2022 05:58, notoneofmyseeds wrote:
> > On 07.09.22 06:19, Alexander V. Makartsev wrote:
> >
> >>>
> >> I've switched to NoMachine [1] a long time ago.
> >> It has all features I need, which are multi-platform and cross-OS
> >> support, public key authentication, reliable file transfer between
> >> hosts, and completely free no strings attached license for personal use.
> >
> > and the there's anydesk, with conditions just as nomachine.
> >
> > anydesk.com
> >
> >>
> >>
> >> [1] https://www.nomachine.com/
>
> Thanks for your replies guys. These solutions are overkill to my needs,
> I just need reliable LAN access from one machine to another, as for WAN
> access I already have ssh tunnel which tunnels all traffic I want if
> need be. So, I don't think I need external, commercial, not open source
> solution for my simple remote access. I'd rather fix VNC server I have
> right now, or switch to different VNC server. Anyone has experience with
> VNC, or similar LAN protocols, which work? Thanks in advance.
>
> --
> With kindest regards, Piotr.
>
> ⢀⣴⠾⠻⢶⣦⠀
> ⣾⠁⢠⠒⠀⣿⡁ Debian - The universal operating system
> ⢿⡄⠘⠷⠚⠋⠀ https://www.debian.org/
> ⠈⠳⣄
>

I use the tigervnc-standalone-server which is in the Debian packages archives. 
I use it only on a trusted LAN network so I don't need an encrypted vnc 
connection either, and I can access it remotely from the Internet by connecting 
to the LAN using a VPN (I use strongswan/IKEv2 for the VPN server). The main 
configuration files are at ~/.vnc, and there are tools to configure it such as 
vncpasswd. The most important configuration file is ~/.vnc/xstartup, where you 
launch your DE or window manager of your choice.

You can launch the server from a terminal logged in as an ordinary user and the 
server runs as an ordinary user in the background so after you start the server 
in a terminal you can exit that terminal session. With the vnc port (usually 
5901) open in the firewall, you can connect to the server and start your apps, 
and once you have apps running, it will keep them running in the session until 
you kill the server. I use it with gnome-session with Xorg (I tried wayland 
session a while back and Xorg seemed more stable), and it works adequately for 
my needs on stable, testing, and sid. It works with both VNC viewers I have 
tried: RealVNC on Windows, and tigervnc-viewer on Debian.

There is one slight annoyance that I live with: With the gnome-session desktop, 
there are some apps and settings that will require me to enter my password when 
I first use that setting or app, such as setting up a color profile, using the 
keyring, and starting the Brave browser. This could probably be fixed with 
appropriate commands in the ~/.vnc/xstartup file, but I have not tried 
debugging it and I just enter the password when asked by the gnome desktop and 
after the first time for each app or setting it won't ask again until I kill 
the server and restart it.

Best regards,

Chuck



Re: networking.service: start operation timed out [SOLVED]

2022-08-31 Thread Chuck Zmudzinski
On 8/31/22 11:03 AM, Jeremy Ardley wrote:
> On 31/8/22 10:45 pm, Chuck Zmudzinski wrote:
> >
> > I don't use haproxy but I see there is a package for it in the Debian
> > repos. I think what you are seeing should be reported as a bug in
> > haproxy if you are using the Debian packaged version. The haproxy
> > package should start haproxy at the appropriate time during boot,
> > and systemd provides the ability to make services such as haproxy
> > depend on certain systemd targets being reached before it tries to
> > start, such as the network-online target which I think would be
> > enough for haproxy to start. But in any case, you might report a bug
> > in haproxy and see if the package maintainers can help you out if
> > you are using the Debian packaged version.
> >
> haproxy does retry three (?) times over a period. The problem is my upstream 
> provider can take up to 10 minutes to provide a dhcp address and ipv6 RA.
>
> The network service does start correctly, but lapses into a retry mode when 
> it can't get the full delegation at once.
>
> haproxy requires a configured interface for it to bind to. Typically this 
> means bind to an IP address and port. If the solicitation to the upstream 
> router hasn't happened, there is no IP and port to bind. haproxy does have an 
> (undocumented?) retry feature to repeatedly try to bind over a period.
>
> If any bug request is to be logged, perhaps it should be for haproxy to have 
> configurable binding options including number of retries or time elapsed?
>
> Jeremy
>

It sounds like it should be either a request for better documentation on
configuring retries over a long time period from the haproxy documentation
or a bug with wishlist severity if haproxy currently cannot handle such a long
time to wait for the address to be configured by the upstream router.

It also seems to be a ridiculously long time (ten minutes) for your provider
to configure your interface. I would look for a different provider if they
can't or won't fix it.

Chuck



Re: networking.service: start operation timed out [SOLVED]

2022-08-31 Thread Chuck Zmudzinski
On 8/30/22 8:49 PM, Jeremy Ardley wrote:
> On 30/8/22 9:56 am, Ross Boylan wrote:
> >
> > Now everything just works.
> >
> > Thanks again to everyone.
> >
> > There are probably some general lessons, though I'm not sure what they
> > are.  Clearly the systemd semantics tripped me up; it's kind of an odd
> > beast.  I understand one of its major goals was to allow startup to
> > proceed in parallel, which is pretty asynchronous.  But it has to
> > assure that certain things happen in a certain order, which results in
> > some things being synchronous and blocking.  I'm surprised that a tool
> > intended for use from the command line (systemctl) is blocking.
> >
> > Ross
> >
>
> One of my problems with systemd is the that name resolution is by 
> default done by resolved. If resolved was bug free that might be O.K. 
> but it's not - and in a production environment it's not a safe option.
>
> A result of the use of resolved is the start-up and dependency logic. If 
> you start doing things outside of the plan, you run into all sorts of 
> problems. I use bind9 on my various machines and have had to go to some 
> lengths to take resolved out of the equation.
>
> On a similar but different topic. I have a router that connects to an 
> upstream server and also runs haproxy. The upstream connection uses DHCP 
> and IPv6 solicitation. The problem is haproxy fails to start when the 
> upstream connection is not established and configured quickly enough. 
> What would be very helpful is a systemd way to start haproxy when the 
> network is established 'as configured'. So far all I can do is run a 
> cron job to see if haproxy is running and if not, try and restart it. 
> There has to be a better way.
>

You are right, you should not need to use a cron job to start a
service like haproxy.

I don't use haproxy but I see there is a package for it in the Debian
repos. I think what you are seeing should be reported as a bug in
haproxy if you are using the Debian packaged version. The haproxy
package should start haproxy at the appropriate time during boot,
and systemd provides the ability to make services such as haproxy
depend on certain systemd targets being reached before it tries to
start, such as the network-online target which I think would be
enough for haproxy to start. But in any case, you might report a bug
in haproxy and see if the package maintainers can help you out if
you are using the Debian packaged version.

Best regards,

Chuck



Re: Virtual Machines

2022-08-22 Thread Chuck Zmudzinski
On 8/22/2022 8:50 AM, Tom Browder wrote:
> Can anyone recommend a good book on the general topic of VMs? Or one on a 
> specific VM stack (using Linux as  base)?
>
> Thanks.
>
> -Tom

This looks like a comprehensive and reasonably up-to-date online book:

https://linuxhandbook.com/virtualization/

Best regards,

Chuck



Re: Comments on upgrade steps from one version of Debian to another

2022-08-20 Thread Chuck Zmudzinski
On 8/20/2022 3:48 PM, John Boxall wrote:
> I created an upgrade script based on something I found a few years ago 
> that indicated the steps to follow to upgrade from one version of Debian 
> to another (e.g. Buster 10 to Bullseye 11). As I am going to need to run 
> this script at some point (I am still running Buster/10 on my systems), 
> I thought I'd ask the Debian user brain trust to comment/critique the 
> scripted steps. So here they are:
>
>
> ### Start
> apt -y install aptitude
> aptitude search \'~o\'
> apt update
> apt -y upgrade
> apt -y full-upgrade
> dpkg -C
> apt-mark showhold
> #
> Update sources.list
> #
> Update files in sources.list.d
> (I don't even have this part started yetdidn't know I needed it the 
> last time I ran it)
> #
> apt-get check
> apt update
> apt list --upgradable
> apt-get check
> apt -y upgrade
> apt -y full-upgrade
> aptitude search \'~o\'
> ### End
>
> Thoughts/critique/criticism/flames/etc
>

Hi John, here are my suggestions:

You can use apt, apt-get, or aptitude to run the commands that do most of the 
work, and in your script you chose apt for that task. I recall reading that 
they do not all use the same algorithm to determine which packages to upgrade 
and in what order, at each stage of the upgrade. I think I read somewhere that 
aptitude has the best algorithm, but apt-get is more suitable for a script. I 
don't remember if there are advantages or disadvantages to using apt. So you 
should do a little research to try to find the most up-to-date information 
about the pros and cons of the different apt related tools. The Debian wiki has 
a page on that, I think. Also, you might want to make sure you record the 
upgrade session in a logfile so you can examine what the script actually did in 
case there are problems. And of course, backup or take a snapshot beforehand so 
you can restore the system back to a working state in case things get broken 
badly.

HTH,

Chuck



Re: Why are some Debian bugs ignored for a long time?

2022-08-20 Thread Chuck Zmudzinski
On 8/20/22 4:28 PM, Stefan Monnier wrote:
> Chuck Zmudzinski [2022-08-20 16:20:21] wrote:
> > That's a fair point. It may not be so easy for me to work on a bug that 
> > does not affect
> > my systems, but I am willing to help with bugs important to the Debian 
> > project now, as
> > the bookworm development process continues. I will take some time and see 
> > if I can
> > help out with some other open bugs that do not directly affect my systems. 
> > Such bugs
> > can be found by querying BTS for bugs marked as critical or grave by the 
> > maintainer
> > and bugs that are blocking a release, as these are the ones most important 
> > to the
> > maintainers and developers. I don't know if I have the skills to fix such 
> > bugs which are
> > probably not so easy to fix, but it wouldn't hurt to ask if there is 
> > anything I can do to
> > help. One thing that is always helpful are testers to test the proposed 
> > fixes for open
> > bugs, and I could help with that in cases when the bug affects a package on 
> > one or more
> > of my systems, at least to tell the maintainer, "that proposed fix looks 
> > good, it does not
> > break anything on my systems."
>
> Yes, there are many things one can do to help.  E.g. several bugs are
> misfiled (for example, sent to the Debian maintainer instead of being
> sent to the package's developer even though the bug is unrelated to the
> Debian packaging itself).  Or often the bug report lacks information to
> reproduce it.
>
>
> Stefan
>

On Debian, the best thing users can do to help, AFAICT, is to run the
testing distribution on non-critical systems to see if the development
of the next stable Debian version is causing problems. The more people
who run testing and give the developers feedback about problems on BTS,
the more likely the stable version won't break someone's current setup
when it is released and users start upgrading to the new stable version
in larger numbers. Still, for this development process that Debian uses to
be effective, when problems are reported to BTS, the developers and
maintainers need to respond to the bugs that are reported and not ignore
them.

Best regards,

Chuck



Re: Why are some Debian bugs ignored for a long time?

2022-08-20 Thread Chuck Zmudzinski
On 8/20/2022 2:06 PM, Stefan Monnier wrote:
> > So that means "free" software written and maintained by volunteers will 
> > never be as
> > stable and secure as software that is written by people who are paid by the 
> > hour.
>
> Not necessarily.  Have you filed a bug report about a problem you
> perceived in macOS, Windows, other your usual shrink wrapped software?
> Has it always been fixed promptly?
>
> If you want your bugs to be fixed, you generally need resort to some
> kind of support contract, which you can get for Free Software just as
> easily as for proprietary software (probably more easily, actually).
>
> Notice also that the goal of Free Software is not to be technically
> better (you may be confusing it for Open Source software), but
> ethically better.
>
> I suspect most maintainers who don't respond promptly to bug reports
> aren't happy about that fact: its demoralizing to be in charge of
> something you can't devote the resources it really deserves.
>
> But note that *you* can help, by taking on some of the work, looking for
> bugs that haven't gotten an answer yet and trying to address them.

That's a fair point. It may not be so easy for me to work on a bug that does 
not affect
my systems, but I am willing to help with bugs important to the Debian project 
now, as
the bookworm development process continues. I will take some time and see if I 
can
help out with some other open bugs that do not directly affect my systems. Such 
bugs
can be found by querying BTS for bugs marked as critical or grave by the 
maintainer
and bugs that are blocking a release, as these are the ones most important to 
the
maintainers and developers. I don't know if I have the skills to fix such bugs 
which are
probably not so easy to fix, but it wouldn't hurt to ask if there is anything I 
can do to
help. One thing that is always helpful are testers to test the proposed fixes 
for open
bugs, and I could help with that in cases when the bug affects a package on one 
or more
of my systems, at least to tell the maintainer, "that proposed fix looks good, 
it does not
break anything on my systems."

Thanks,

Chuck

> I don't think anyone can do that for any random bug, but I'm pretty sure
> most people on this list would be able to do that for at least one of
> the pending bug reports.
>
>
> Stefan
>



Re: Why are some Debian bugs ignored for a long time?

2022-08-20 Thread Chuck Zmudzinski
On 8/20/2022 1:25 AM, to...@tuxteam.de wrote:
> On Fri, Aug 19, 2022 at 05:06:38PM -0400, Chuck Zmudzinski wrote:
> > On 8/19/2022 4:44 PM, piorunz wrote:
> > > On 19/08/2022 18:57, Chuck Zmudzinski wrote:
> > >
> > > > I have noticed that some Debian bugs are ignored for a long time [...]
> > >
> > > Hi Chuck,
> > >
> > > Maybe because developers/maintainers are not paid by the hour, but mere
> > > volunteers, don't you think?
>
> There is another point: the package maintainer is very autonomous
> in how (s)he does her thing. This has advantages and disadvantages.
>
> There are processes in place for resolving such situations as when
> a maintainer becomes unresponsive (perhaps (s)he has moved on to
> other things, perhaps (s)he is in some situation of distress). Among
> others, there is the NMU [0].
>
> This question comes up regularly in this list. Had you searched
> the archives, you'd found things like this [1] with advice (hint:
> this would leave developers more time for fixing bugs ;-)
>
> There is good advice by Jonathan Dowland in the linked thread on
> how to do something about it. Want to give it a try?
>
> > So that means "free" software written and maintained by volunteers will 
> > never be as
> > stable and secure as software that is written by people who are paid by the 
> > hour.
>
> This is, of course, nonsense. This would be only the case if
> the instance giving out the cash had an interest on the software
> being "stable and secure". Most of the time they have an interest
> on the software being sold, or on it generating cash flow via
> other means (gathering user data, for that to be sold, for example).
>
> So they will allocate their resources accordingly. I've worked
> in the belly of big corps for a while and I assure you that my
> boss wouldn't allow me to fix a bug unless (s)he could justify
> to their bosses that the 1400 dollars "spent" on this are coming
> back in some way.

There are plenty of "volunteers" for free software projects that also
work, as you say, in the "belly of big corps." Are you suggesting these
"volunteers" will ignore bugs in free software projects because their
boss does not want them to fix the bugs in the free project and force
users to buy a paid version of the project?

Best regards,

Chuck



Re: Why are some Debian bugs ignored for a long time?

2022-08-20 Thread Chuck Zmudzinski
On 8/20/2022 1:25 AM, to...@tuxteam.de wrote:
> On Fri, Aug 19, 2022 at 05:06:38PM -0400, Chuck Zmudzinski wrote:
> > On 8/19/2022 4:44 PM, piorunz wrote:
> > > On 19/08/2022 18:57, Chuck Zmudzinski wrote:
> > >
> > > > I have noticed that some Debian bugs are ignored for a long time [...]
> > >
> > > Hi Chuck,
> > >
> > > Maybe because developers/maintainers are not paid by the hour, but mere
> > > volunteers, don't you think?
>
> There is another point: the package maintainer is very autonomous
> in how (s)he does her thing. This has advantages and disadvantages.
>
> There are processes in place for resolving such situations as when
> a maintainer becomes unresponsive (perhaps (s)he has moved on to
> other things, perhaps (s)he is in some situation of distress). Among
> others, there is the NMU [0].

I know about nmu, and I submitted one once but withdrew it because the
package maintainer did eventually indicate a fix the problem was coming
once I sent out the nmu.

>
> This question comes up regularly in this list. Had you searched
> the archives, you'd found things like this [1] with advice (hint:
> this would leave developers more time for fixing bugs ;-)
>
> There is good advice by Jonathan Dowland in the linked thread on
> how to do something about it. Want to give it a try?
>
> > So that means "free" software written and maintained by volunteers will 
> > never be as
> > stable and secure as software that is written by people who are paid by the 
> > hour.
>
> This is, of course, nonsense. This would be only the case if
> the instance giving out the cash had an interest on the software
> being "stable and secure". Most of the time they have an interest
> on the software being sold, or on it generating cash flow via
> other means (gathering user data, for that to be sold, for example).
>
> So they will allocate their resources accordingly. I've worked
> in the belly of big corps for a while and I assure you that my
> boss wouldn't allow me to fix a bug unless (s)he could justify
> to their bosses that the 1400 dollars "spent" on this are coming
> back in some way.
>
> Witness the whole history of Microsoft software with its incredible
> ecosystem of malware, and you'll see how wrong your idea is :)
>
> So each "world" has its upsides and (surprise!) its downsides.
>
> That doesn't mean I wouldn't like to see projects like Debian
> better funded, mind you. There are also people thinking about
> this. There are companies which sponsor Debian, there are
> companies which let employees work for Debian on their company
> time; one seemingly successful example is Freexian [2], which
> offers services by keeping alive older versions of Debian.
>
> I get you want to contribute?

Yes, that's what mystifies me. I don't know why Debian ignores
someone who wants to contribute time to help the project.

In another case, the bug was upstream and although I reported the
bug on Debian first, marked it 'patch' and 'upstream' in the BTS, it was
still being ignored, so I just submitted the patch directly to upstream who
accepted my patch.

Usually upstream projects want and expect users to report bugs to
the distro, not to the upstream project, for many good reasons that I
need not explain here. Then the distro package maintainer, rather
than the user, interacts with the upstream developers and maintainers.
Of course if the distro maintainers ignore upstream bugs reported to the
distro, the whole free software ecosystem will suffer, not just Debian.

Best regards,

Chuck

> [0] https://wiki.debian.org/NonMaintainerUpload
> [1] https://lists.debian.org/debian-user/2022/05/threads.html#00028
> [2] https://www.freexian.com/services/debian-lts.html
>



Re: Why are some Debian bugs ignored for a long time?

2022-08-19 Thread Chuck Zmudzinski
On 8/19/2022 9:18 PM, Andy Smith wrote:
> Hi Chuck,
>
> On Fri, Aug 19, 2022 at 08:20:21PM -0400, Chuck Zmudzinski wrote:
> > On 8/19/2022 6:59 PM, Andy Smith wrote:
> > > Volunteers cannot be forced to do work, else they are not
> > > volunteers.
> > 
> > The fact that Debian is created by volunteers and therefore the chances are
> > high that users might run into problems and not get help from the volunteers
> > who alone have the power to fix the problems is a fact that Debian users, 
> > and
> > all users of free software, need to keep in mind.
>
> A danger here is that you write as if this is a particular problem
> for Debian, but I think you've merely stated a truism for every
> volunteer effort of any kind.
>
> People do sometimes need reminding that they are relying on a
> volunteer effort, however.
>
> > I am going to try some other projects and find out by experience
> > where the consideration for the user has a higher priority than in
> > Debian.
>
> I am not going to tell you that Debian is the best Linux
> distribution for you or anyone specific, though you could perhaps
> expect responses along those lines given that we're having this
> conversation in a Debian space.
>
> The thing is though, you can experience a problem within one project
> that is frustrating and demotivating and so move to another project
> that does not have that particular problem, only to later experience
> a different problem in the next project that is also frustrating and
> demotivating. Only you can decide which one overall suits you best;
> what's certain is that nothing is going to be perfect.

Of course.

>
> If any Linux distribution were asked, "do you consider the user
> experience to be a high priority?" they are probably all going to
> answer, "yes!" But in reality there will always be some decisions
> (or lack of decisions) made where some number of users feel they
> were mistreated.
>
> If you have the time and interest to look at other distributions
> it's probably not going to be wasted time, anyway, if only to
> compare and contrast.
>
> Cheers,
> Andy
>

Thanks for the feedback, I do have the time to experiment with other distros 
and obviously I will use what best serves my goals. Debian still has the 
advantage that I have been using it for quite a while, have invested much time 
in tweaking it, and it still works fairly well for me. But at this point, I 
don't know if I will upgrade to bookworm or move to another distro before 
bookworm is released.

Best regards,

Chuck



Re: Why are some Debian bugs ignored for a long time?

2022-08-19 Thread Chuck Zmudzinski
On 8/19/2022 6:59 PM, Andy Smith wrote:
> Hello,
>
> On Fri, Aug 19, 2022 at 05:06:38PM -0400, Chuck Zmudzinski wrote:
> > On 8/19/2022 4:44 PM, piorunz wrote:
> > > On 19/08/2022 18:57, Chuck Zmudzinski wrote:
> > > > I have noticed that some Debian bugs are ignored for a long time, 
> > > > sometimes even when the person who submitted the bug offered a patch. 
> > > > The Debian developers/maintainers sometimes don't even reply and 
> > > > therefore never explain why the proposed patch cannot be applied. Why 
> > > > is that the case with Debian developers/maintainers?
> > >
> > > Hi Chuck,
> > >
> > > Maybe because developers/maintainers are not paid by the hour, but mere
> > > volunteers, don't you think?
> > 
>
> > you are saying if a Debian user experiences a bug in Debian
> > software, Debian developers/maintainers do not have to fix it.
>
> That is a direct consequence of the meaning of the term "volunteer";
> you may as well have said, "water is wet". Volunteers cannot be
> forced to do work, else they are not volunteers.

The fact that Debian is created by volunteers and therefore the chances are
high that users might run into problems and not get help from the volunteers
who alone have the power to fix the problems is a fact that Debian users, and
all users of free software, need to keep in mind.

>
> > If Debian developers/maintainers actively refuse to fix some bugs that 
> > inevitably arise
> > by ignoring them, why would anyone depend on Debian software for anything 
> > important?
>
> I would argue that the situation is similar (and often worse) in
> every other free software project.

In Linux itself, I think it is *much* better than in Debian. I am going to try 
some other projects
and find out by experience where the consideration for the user has a higher 
priority than in
Debian.

>
> I would also argue that while you may pay a software vendor to care
> about your use case, that can also come with different issues.
>
> So really, life is not perfect, and we all do what we can to cope
> with that. Things are not perfect in Debian nor elsewhere both
> within and outside the free software world.
>
> I think I know some of the bugs that you are referring to as I keep
> on eye on those developments. A gentle ping on the relevant bugs to
> ask where things are may be appropriate.That's really the strongest
> thing you can do.

I do that and I am ignored. I am not holding my breath waiting for a response
from the relevant developers and maintainers. However, it would be a pleasant
surprise if they *did* respond and I would be grateful if they did. I just don't
think volunteers trying to help Debian but who ignore users who report bugs
in Debian is over the long term a good thing for Debian.

> Others may be tempted to try to drag more info out
> of you to determine what the exact history is here and who is
> right/wrong, but I don't think that will help anyone in these
> particular cases.

We agree on that point.

Best regards,

Chuck



Re: Why are some Debian bugs ignored for a long time?

2022-08-19 Thread Chuck Zmudzinski
On 8/19/2022 6:43 PM, Timothy M Butterworth wrote:
>
>
> On Fri, Aug 19, 2022 at 6:40 PM Chuck Zmudzinski  
> wrote:
>
> On 8/19/2022 6:20 PM, Timothy M Butterworth wrote:
> >
> >
> > On Fri, Aug 19, 2022 at 5:07 PM Chuck Zmudzinski 
>  wrote:
> >
> >     On 8/19/2022 4:44 PM, piorunz wrote:
> >     > On 19/08/2022 18:57, Chuck Zmudzinski wrote:
> >     >
> >     > > I have noticed that some Debian bugs are ignored for a long 
> time, sometimes even when the person who submitted the bug offered a patch. 
> The Debian developers/maintainers sometimes don't even reply and therefore 
> never explain why the proposed patch cannot be applied. Why is that the case 
> with Debian developers/maintainers?
> >     >
> >     > Hi Chuck,
> >     >
> >     > Maybe because developers/maintainers are not paid by the hour, 
> but mere
> >     > volunteers, don't you think?
> >
> > Debian Stable usually only ships security and stability patches. 
> >  
> >
> >     So that means "free" software written and maintained by volunteers 
> will never be as
> >     stable and secure as software that is written by people who are 
> paid by the hour.
> >
> > Freexian has developers that are paid by the hour to work on Debian, 
> anyone who wants with cash to spare can purchase some hours to have work done 
> on packages of their choosing.
> >
> >   * 2 hours pack: 240 EUR + VAT (120 EUR/hour)
> >   * 5 hours pack: 600 EUR + VAT (120 EUR/hour)
> >   * 10 hours pack: 1150 EUR + VAT (115 EUR/hour)
> >   * 20 hours pack: 2300 EUR + VAT (115 EUR/hour)
> >   * 50 hours pack: 5500 EUR + VAT (110 EUR/hour)
> >
>
> That's good to know. Thanks. Presumably the work they do would be 
> contributed back
> to Debian for the benefit of all. I am curious if they would be able to 
> help in a case when
> a bug with a known fix has been ignored for a long time. I would prefer 
> that Debian would
> just fix the bug instead of having to pay someone to tell Debian they 
> should fix the bug.
>
> I could also just migrate to Fedora since their distro does not have the 
> bug and I wouldn't
> have to pay anyone for my system to work using Fedora.
>
> Distro hopping is one of the best things about Linux, I personally switch 
> between Debian, openSUSE and Fedora. One day I want to roll my own distro. I 
> am planning on making a stripped down debian focusing on KDE Plasma and KDE 
> Apps. One DE one hardware platform.

Yes, the many distros is a nice thing about Linux, and now it looks like it is 
time for
me to start hopping from Debian to other distros when necessary.

Sorry, I forgot to reply-to the list, so I am bringing the discussion back to 
the list.

Thanks,

Chuck

>  
>
> Best regards,
>
> Chuck
> >
> >
> >
> >
> > --
> > ⢀⣴⠾⠻⢶⣦⠀
> > ⣾⠁⢠⠒⠀⣿⡁ Debian - The universal operating system
> > ⢿⡄⠘⠷⠚⠋⠀ https://www.debian.org/
> > ⠈⠳⣄⠀⠀
>
>
>
> -- 
> ⢀⣴⠾⠻⢶⣦⠀
> ⣾⠁⢠⠒⠀⣿⡁ Debian - The universal operating system
> ⢿⡄⠘⠷⠚⠋⠀ https://www.debian.org/
> ⠈⠳⣄⠀⠀



Re: Why are some Debian bugs ignored for a long time?

2022-08-19 Thread Chuck Zmudzinski
On 8/19/2022 4:44 PM, piorunz wrote:
> On 19/08/2022 18:57, Chuck Zmudzinski wrote:
>
> > I have noticed that some Debian bugs are ignored for a long time, sometimes 
> > even when the person who submitted the bug offered a patch. The Debian 
> > developers/maintainers sometimes don't even reply and therefore never 
> > explain why the proposed patch cannot be applied. Why is that the case with 
> > Debian developers/maintainers?
>
> Hi Chuck,
>
> Maybe because developers/maintainers are not paid by the hour, but mere
> volunteers, don't you think?

So that means "free" software written and maintained by volunteers will never 
be as
stable and secure as software that is written by people who are paid by the 
hour. That is,
Debian software can *never* be as stable and secure as software that is written 
and
maintained by people who are paid by the hour. Not only that, you are saying if 
a Debian
user experiences a bug in Debian software, Debian developers/maintainers do not 
have
to fix it. That's fine, but...

If Debian developers/maintainers actively refuse to fix some bugs that 
inevitably arise
by ignoring them, why would anyone depend on Debian software for anything 
important?

Best regards,

Chuck



Why are some Debian bugs ignored for a long time?

2022-08-19 Thread Chuck Zmudzinski
Hello,

I have noticed that some Debian bugs are ignored for a long time, sometimes 
even when the person who submitted the bug offered a patch. The Debian 
developers/maintainers sometimes don't even reply and therefore never explain 
why the proposed patch cannot be applied. Why is that the case with Debian 
developers/maintainers?

Best regards,

Chuck



Re: Windows on VMware on Deb 11: safely usable?

2022-08-17 Thread Chuck Zmudzinski
On 8/17/2022 10:34 AM, hdv@gmail wrote:
> On 2022-08-17 12:53, Tom Browder wrote:
> > Unfortunately, I have to have a Windows host. I have given up dual 
> > hosting because of the pain, so I am using a dedicated Win 10 box and a 
> > Deb laptop.
> > 
> > I would love to run Windows on a VM on Debian iff I can have it be 
> > reliable enough to use with reasonable response (no games, just Office 
> > 360, IO Drive, H Block, and such). I haven't kept up with the VM world 
> > but a quick search shows VMware might be a good choice.
> > 
> > Anyone using such a rig for the real world (i.e., not testing or as a 
> > hobby)? If it is reliable, I plan to get a hefty SilentPC to run my 
> > primary digital duopoly.
> > 
> > Thanks.
> > 
> > -Tom
>
> Please note that VirtualBox isn't in the official repository. There is a 
> reason for that: Oracle won't/can't cooperate with the Debian Security Team.
>
> As for VMWare: when I still used it, a major disadvantage was that you 
> had to fuss around with the kernel every time there was an update. That 
> really was a major PITA. I don't know if that still is the case with 
> VMWare, but I do know I have no such trouble with libvirt. At all.

I don't see much discussion about libvirt on debian-use, which I presume is
KVM/Qemu VMs. That means one of two things: either 1) no one is using it, or
2) it works so well it is good enough for the real world and no one needs to ask
questions about it on debian-user.

My advice - buy your Silent PC, Install Debian on it, and use KVM/Qemu on it
to install Windows. That will use supported Debian free software to provide the
virtualization environment for your Windows installation. If for some reason
KVM/Qemu/libvirt does not work, then install Windows Pro on the Silent PC
and run Debian in Hyper-V. AFAIK, MS fully supports Debian in Hyper-V, and that
would also most likely be a reliable setup also for the real world to run 
Debian 11
and Windows 10/11 simultaneously.

Chuck



Re: Windows on VMware on Deb 11: safely usable?

2022-08-17 Thread Chuck Zmudzinski
On 8/17/2022 6:53 AM, Tom Browder wrote:
> Unfortunately, I have to have a Windows host. I have given up dual hosting 
> because of the pain, so I am using a dedicated Win 10 box and a Deb laptop.
>
> I would love to run Windows on a VM on Debian iff I can have it be reliable 
> enough to use with reasonable response (no games, just Office 360, IO Drive, 
> H Block, and such). I haven't kept up with the VM world but a quick search 
> shows VMware might be a good choice.
>
> Anyone using such a rig for the real world (i.e., not testing or as a hobby)? 
> If it is reliable, I plan to get a hefty SilentPC to run my primary digital 
> duopoly.
>
> Thanks.
>
> -Tom

I have this working now with Xen/Qemu, Deb 11, and Windows 10, but I would not 
recommend
that for the real world, since sometimes updates and such break it. I don't 
know about VMware
on Debian, I suppose it might work, you can inquire with VMware to see how much 
support they
provide for VMware on Debian. Also, KVM/Qemu users might be able to weigh in 
with how
viable that is as an option to run Windows in a VM on Debian for the real word. 
And the
other option I know about is Virtualbox, which I also think can run on Debian 
and supports
Windows VMs.

Best regards,

Chuck



Re: Help: disk swap

2022-08-02 Thread Chuck Zmudzinski
On 7/27/2022 1:51 PM, Erik Mathis wrote:
> I would look at the UEFI vs BIOS boot options in the "backup" server and 
> compare it to the "broken" server and make sure they are the same. Also check 
> for BIOS updates and such.
>
>
> -Erik-
>
>
> On Wed, Jul 27, 2022 at 7:59 AM tony  wrote:
>
> Hi,
>
> I turned on my main home server after a few weeks absence,  and got
> smoke from its power supply. Fortunately, I have a backup system, which
> does work; both are running Debian 10, so I swapped use to that machine.
> and am able to work with that, but some of the files and settings are a
> bit out of date.
>
> I decided to move the disk from the broken machine to the backup, but on
> booting I'm dropped into a grub screen saying disk id  not
> found. Not entirely surprising perhaps.
>
> So, how do I get it to recognize, and boot from the old disK.
>
> Cheers, Tony
>

I have used the following procedure to fix booting from a disk that
causes the system to drop to the grub shell instead of booting normally:

When in the grub shell, type ls, and you will see a list of the available
disks and partitions. You will see items like (hd0,gpt1) which would be
the first gpt partition on the first disk. Then you can list the files in that
partition using 'ls (hd0,gpt1)/'. You should then look for the partition with
the boot/grub/grub.cfg file, and then use the configfile command from
the grub shell to load the grub configuration on the disk from the broken
machine which should allow you to boot the Debian system that is on that
disk. For example, if the grub.cfg file is on (hd0,gpt1), then you do:

grub> configfile (hd0,gpt1)/boot/grub/grub.cfg

Hopefully you will see the normal grub menu giving you the option to
select on OS to boot, and hopefully you will be able to boot the Debian
that is on the disk from the broken machine.

If you can get the Debian system on the disk from the broken machine running,
then you will need to reinstall grub to update your grub so it can boot using 
the
disk from the broken machine without dropping to the grub shell. For example,
If you use efi, you will need to reinstall grub-efi-amd64-bin or maybe
grub-efi-amd64-bin-signed for secure boot, and after that it should boot the
disk from the broken machine without dropping to the grub shell.

Chuck



Re: TBird mail (was: user perms)

2022-06-18 Thread Chuck Zmudzinski
On 6/15/22 7:14 AM, Felix Miata wrote:
> gene heskett composed on 2022-06-15 06:34 (UTC-0400):
>
> > What the heck is this vertical bar it uses for a quote level
>
> That's taken care of here with one or both of these two entries in prefs.js 
> in the
> profiledir:
>
>   user_pref("mail.quoteasblock", false);
>   user_pref("mail.quoted_graphical", false);
>
> I haven't noticed whether or not in GUI preferences if either has a 
> counterpart.

I also use this setting to help get rid of the vertical bar:

        user_pref("mailnews.send_plaintext_flowed", false);

and I take care to check Options-> Delivery Format is set to
"Plain Text Only" before sending a message.



Re: disable IPv6 debian

2022-04-15 Thread Chuck Zmudzinski

On 4/15/2022 6:58 PM, Andy Smith wrote:

Hello,

On Fri, Apr 15, 2022 at 10:34:25AM -0400, Chuck Zmudzinski wrote:

I have an issue with a few websites that seem to hang with ipv6

If you happen to know their IPv6 addresses and can trust that those
assignments will remain stable then you may prefer instead to add
prohibited routes for these, e.g.

# ip route add prohibit 2001:db8::/32

Your web browser will then fall back to using the IPv4 results that
it gets from DNS.

Cheers,
Andy



Thank you, Andy. I will try this if I find the addresses of the websites 
are stable.


Regards,

Chuck



Re: disable IPv6 debian

2022-04-15 Thread Chuck Zmudzinski

On 4/15/22 8:10 AM, wilson wrote:

no. it's the Hadoop system, which has the possible issue with ipv6.

thanks




I would check the documentation for Hadoop - does it have an option to 
disable ipv6? I would just disable ipv6 for the app that has the issue 
with ipv6, not for the whole system. I also note that according to the 
Debian Wiki, Debian does not provide Hadoop packages: 
https://wiki.debian.org/Hadoop


Regards,

Chuck



Re: disable IPv6 debian

2022-04-15 Thread Chuck Zmudzinski




On 4/15/22 12:08 PM, Tim Woodall wrote:

On Fri, 15 Apr 2022, Greg Wooledge wrote:


On Fri, Apr 15, 2022 at 11:21:46AM -0400, Chuck Zmudzinski wrote:
Another improvement to the script would be to have the script toggle 
the
default route on or off, depending on the existence or not of the 
default

route, for the case when there is no argument to the script.


That requires some way to *determine* the current state. Parsing the
routing table, perhaps?  If you could tell us how to do that, it might
help.




Try this (untested as I'm remote and don't want to remove my default
route!)

[[ -z "$( ip -6 route show exact default )" ]] && echo no

Hopefully will print no if there is no default route.

Tim.



This works well to determine the state and also prints a useful message 
if the expected argument is not present:


#!/bin/bash
if [ "$1" == on ]
then
    ip -6 route | grep default > /dev/null || \
    ip -6 route add default via 2602:304:cef3:a430:d250:99ff:fe0b:b810 
dev eth0

elif [ "$1" == off ]
then
    ip -6 route | grep default > /dev/null && ip -6 route delete default
else
    echo "The script ipv6 requires either on or off as the argument."
fi

I tested all four cases:

1. There is no default route, and the argument is on
2. There is no default route, and the argument is off
3. There is a default route, and the argument is on
4. There is a default route, and the argument is off

Works as expected.

Regards,

Chuck



Re: disable IPv6 debian

2022-04-15 Thread Chuck Zmudzinski




On 4/15/22 11:12 AM, Chuck Zmudzinski wrote:

On 4/15/2022 10:50 AM, Greg Wooledge wrote:

On Fri, Apr 15, 2022 at 10:34:25AM -0400, Chuck Zmudzinski wrote:

user@debian:~$ cat ipv6
#!/bin/bash
if [ $1 == "on" ]
then
 ip -6 route add default via  dev 
elif [ $1 == "off" ]
then
 ip -6 route delete default
fi

Quotes are in the wrong place.  The [ builtin command follows the
ordinary parsing rules, which means an unquoted $1 argument will be
subject to word splitting and filename expansions.

In simpler terms, it will blow up if $1 is empty or contains whitespace
characters or globbing characters.

The quotes need to go around "$1", not around string constants.

if [ "$1" == on ]



You are right, with no arguments I get this:

./ipv6: line 2: [: ==: unary operator expected
./ipv6: line 5: [: ==: unary operator expected

I did not write the script with unexpected values or whitespace for 
the argument in mind. It is a simple script that works as expected if 
the argument is what the script is designed for, either 'on' or 'off'. 
Of course the script is improved as you suggest to not dump the error 
message when there is no argument and is also further improved with 
error and help messages to handle the cases when the argument is not 
as designed or contains whitespace, as you point out. I have updated 
my script with your suggestion. Thanks!


Chuck



Another improvement to the script would be to have the script toggle the 
default route on or off, depending on the existence or not of the 
default route, for the case when there is no argument to the script.


Regards,

Chuck



Re: disable IPv6 debian

2022-04-15 Thread Chuck Zmudzinski

On 4/15/2022 10:50 AM, Greg Wooledge wrote:

On Fri, Apr 15, 2022 at 10:34:25AM -0400, Chuck Zmudzinski wrote:

user@debian:~$ cat ipv6
#!/bin/bash
if [ $1 == "on" ]
then
     ip -6 route add default via  dev 
elif [ $1 == "off" ]
then
     ip -6 route delete default
fi

Quotes are in the wrong place.  The [ builtin command follows the
ordinary parsing rules, which means an unquoted $1 argument will be
subject to word splitting and filename expansions.

In simpler terms, it will blow up if $1 is empty or contains whitespace
characters or globbing characters.

The quotes need to go around "$1", not around string constants.

if [ "$1" == on ]



You are right, with no arguments I get this:

./ipv6: line 2: [: ==: unary operator expected
./ipv6: line 5: [: ==: unary operator expected

I did not write the script with unexpected values or whitespace for the 
argument in mind. It is a simple script that works as expected if the 
argument is what the script is designed for, either 'on' or 'off'. Of 
course the script is improved as you suggest to not dump the error 
message when there is no argument and is also further improved with 
error and help messages to handle the cases when the argument is not as 
designed or contains whitespace, as you point out. I have updated my 
script with your suggestion. Thanks!


Chuck



Re: disable IPv6 debian

2022-04-15 Thread Chuck Zmudzinski

On 4/15/2022 8:10 AM, wilson wrote:

no. it's the Hadoop system, which has the possible issue with ipv6.

thanks




I have an issue with a few websites that seem to hang with ipv6, so I 
don't want to disable ipv6 permanently but only temporarily when I want 
to access those sites. One class of sites are the Yahoo! Mail website 
app pages (including aol.com and att.net which are administered by 
Yahoo!) which seem to work much better with ipv4 only. I just 
temporarily delete the default ipv6 route when accessing those websites, 
and then re-enable it for other sites, with this little script:


user@debian:~$ cat ipv6
#!/bin/bash
if [ $1 == "on" ]
then
    ip -6 route add default via  dev 
elif [ $1 == "off" ]
then
    ip -6 route delete default
fi

Then I do 'sudo ipv6 off' to disable the default ipv6 route and 'sudo 
ipv6 on' to re-enable it, assuming the ipv6 script is located in a 
directory listed in the PATH environment variable.


Of course you need to insert the correct values for the default ipv6 
gateway address and device for your network into the script which I 
redacted to protect the privacy of my ipv6 address and network 
configuration.


It works well and causes the system to fallback to ipv4 for the public 
Internet without affecting ipv6 on my LAN which still functions 
correctly without a default ipv6 route. Your application (Hadoop) may be 
different, but if you only need to disable ipv6 for a certain network or 
class of networks, or only temporarily, deleting the ipv6 route to that 
network or class of networks or to the default route might be a solution 
for your issue.


Regards,

Chuck



Re: Does this happen often with sid?

2022-03-30 Thread Chuck Zmudzinski




On 3/29/22 3:16 PM, Joe wrote:

On Tue, 29 Mar 2022 14:36:55 -0400
Chuck Zmudzinski  wrote:



I do like synaptic also because it saves a history of all the
changes that it makes to the system.



The apt tools also do this, but in a more user-hostile way. See
/var/log/apt/history.log.

This may be what Synaptic uses, I'm never quite sure of the sharing
between the apt tools.

  


It looks to me like synaptic's history only logs the changes
synaptic makes, while /var/log/apt/history.log logs changes
made by any of the apt tools, including synaptic.

Chuck



Re: Does this happen often with sid?

2022-03-29 Thread Chuck Zmudzinski

On 3/29/22 10:46 AM, Joe wrote:

On Mon, 28 Mar 2022 17:54:23 -0400
Chuck Zmudzinski  wrote:


On 3/28/22 5:35 PM, Ash Joubert wrote:

On 29/03/2022 03:34, Chuck Zmudzinski wrote:

I am new to running the unstable sid distribution. Today I wanted
to upgrade it and when using the dist-upgrade option of apt-get (I
think that's equivalent to the full-upgrade option of apt), I got
this:

[...]> The problem is with the section that lists the packages that
will be

REMOVED.

Yes, this is normal for sid. Unwanted removals are usually a sign
that dependencies are in transition. All sid administrators should
know how to recognise this situation and avoid unwanted removals. I
use:

apt-get -s -V -o Debug::pkgProblemResolver=yes dist-upgrade

to simulate a dist-upgrade to see what is going on and then
"apt-mark hold" to hold packages until I am satisfied that
dist-upgrade can proceed without unwanted removals. I use the
package web page, package tracker, and transition tracker
<https://release.debian.org/transitions/> to help identify the
cause. "apt-mark showhold" lists held packages, which can be unheld
when the transition is complete.

Kind regards,
  

Thank you, Ash, for this tip as I learn how to manage package
dependencies on Sid. I also look at the package web page and package
trackers to see what might be wrong. I will continue to use stable
most of the time for ordinary work, and keep Sid up to date when I am
working on bug fixes. It looks like quite a few packages are
currently affected by the recent upgrade of Python to 3.10, including
Xen, Samba, and Libre Office. For Xen, it appears a binary-only
upload fixes it, and that was already done earlier today.



A couple of other remarks: aptitude uses a more sophisticated algorithm
to decide upgrades. Some sets of upgrades require to be done in a
specific order, and aptitude is better able to find such cases. Don't
try it with several hundred packages though, it will take forever.

For example, apt on my sid is currently leaving about 100 packages
untouched, and aptitude upgraded 20 of them. It's never going to get
everything, but it may just manage that one critical package that you
absolutely must get upgraded.

If you have plenty of time, you can try it by hand. It is possible to
do this with any of the tools, but I'm most comfortable with Synaptic.
I did once clear a logjam completely by patient use of Synaptic, every
single withheld package could be upgraded if it was done in the right
order, but this is extremely rare. Almost always, as has been said,
there are dependency issues that order of upgrade does not affect.

One other point: don't leave sid for too long without maintenance. I
upgrade mine most days, but I'd recommend not leaving it longer than a
couple of weeks when times are busy. Sid goes relatively quiet during
the release freeze, when nothing new can be moved out to testing, but it
gets fairly frantic just after the release. I would suggest upgrading at
least once a week then.



Thank you Joe for your suggestions about managing package
dependencies in Sid. I did not know that aptitude uses a different
algorithm for calculating the upgrade, and it is good to know
that I can try it instead of apt or apt-get.

I do like synaptic also because it saves a history of all the
changes that it makes to the system.

I realize Sid needs at least weekly maintenance. That's a valid
point also.

Regards,

Chuck



Re: Does this happen often with sid?

2022-03-28 Thread Chuck Zmudzinski



On 3/28/22 3:04 PM, songbird wrote:

...

   running unstable there's a few mailing lists i'd follow
(release, devel and boot), ctte is also worth it for seeing
what issues people are hitting that haven't had an easy
answer yet.  transition tracker too.


Thanks, I will have a look at those places when there are issues.

   currently the python 3.10 transition is being worked on so
that may take some time to sort through.

   i don't really follow sid/unstable as that is a bit too
choatic for me.  testing is close enough for my interests
and a few selected packages and the most recent kernels are
about where i end up.  :)


   songbird



I am now running Sid mainly to try to fix a bug in Xen upstream, and the 
newer the version of Xen I test on, the better.


All the best,

Chuck



Re: Does this happen often with sid?

2022-03-28 Thread Chuck Zmudzinski

On 3/28/22 5:35 PM, Ash Joubert wrote:

On 29/03/2022 03:34, Chuck Zmudzinski wrote:
I am new to running the unstable sid distribution. Today I wanted to 
upgrade it and when using the dist-upgrade option of apt-get (I think 
that's equivalent to the full-upgrade option of apt), I got this:
[...]> The problem is with the section that lists the packages that 
will be

REMOVED.


Yes, this is normal for sid. Unwanted removals are usually a sign that 
dependencies are in transition. All sid administrators should know how 
to recognise this situation and avoid unwanted removals. I use:


apt-get -s -V -o Debug::pkgProblemResolver=yes dist-upgrade

to simulate a dist-upgrade to see what is going on and then "apt-mark 
hold" to hold packages until I am satisfied that dist-upgrade can 
proceed without unwanted removals. I use the package web page, package 
tracker, and transition tracker 
<https://release.debian.org/transitions/> to help identify the cause. 
"apt-mark showhold" lists held packages, which can be unheld when the 
transition is complete.


Kind regards,



Thank you, Ash, for this tip as I learn how to manage package 
dependencies on Sid. I also look at the package web page and package 
trackers to see what might be wrong. I will continue to use stable most 
of the time for ordinary work, and keep Sid up to date when I am working 
on bug fixes. It looks like quite a few packages are currently affected 
by the recent upgrade of Python to 3.10, including Xen, Samba, and Libre 
Office. For Xen, it appears a binary-only upload fixes it, and that was 
already done earlier today.


Cheers,

Chuck



Re: Does this happen often with sid?

2022-03-28 Thread Chuck Zmudzinski



On 3/28/22 10:52 AM, Andrew M.A. Cater wrote:

On Mon, Mar 28, 2022 at 10:34:01AM -0400, Chuck Zmudzinski wrote:


The problem is with the section that lists the packages that will be
REMOVED.

It looks like the upgrade to the python3 packages that remove/replace some
existing python3 packages versions triggers apt to also remove samba and
xen-utils-4.16, which I do not want, so I aborted it. Can I expect that in
due time, the python3 dependencies will be updated so the full upgrade can
succeed without removing the xen-utils-4.16 and samba packages?

Thanks,

Chuck


Hi Chuck,

Yes, this is entirely normal in Sid and is the main reason that we discourage
people in general from running it as a distribution: if it breaks, you get to
keep both pieces and are expected to be able to fix missing dependencies.

In this instance, I suspect that samba will be fixed relatively quickly - I'm
honestly not sure how big the Xen team is at the moment.


It looks like the cause of the problem is an upgrade to Python 3.10 and 
it is also looks like it is already fixed for Xen by the Build Daemon 
according to this changelog entry for today's upload of Xen packages to 
the main archive:


xen (4.16.0+51-g0941d6cb-1+b1) sid; urgency=low, binary-only=yes

  * Binary-only non-maintainer upload for amd64; no source changes.
  * Python 3.10 as default

 -- amd64 / i386 Build Daemon (x86-ubc-01) 
  Mon, 28 Mar 2022 11:29:11 +


I am still waiting for the fix for samba, though. Also, on my desktop 
Sid installation with libreoffice, the Python 3.10 upgrade also removes 
libreoffice until that dependency is fixed for libreoffice.


So it looks like the Python 3.10 upgrade is going to cause some packages 
to be removed with the full-upgrade option to apt, so be careful out 
there upgrading Sid today.


Cheers,

Chuck



Re: Does this happen often with sid?

2022-03-28 Thread Chuck Zmudzinski

On 3/28/2022 10:52 AM, Andrew M.A. Cater wrote:

On Mon, Mar 28, 2022 at 10:34:01AM -0400, Chuck Zmudzinski wrote:

I am new to running the unstable sid distribution. Today I wanted to upgrade
it and when using the dist-upgrade option of apt-get (I think that's
equivalent to the full-upgrade option of apt), I got this:

--
user@debian:~$ sudo apt-get dist-upgrade
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
The following packages were automatically installed and are no longer
required:
   attr grub-xen-bin grub-xen-host libcephfs2 libldap-2.4-2 libldb2
libpython3.9 libpython3.9-minimal
   libpython3.9-stdlib libtdb1 libyaml-0-2 linux-image-5.16.0-3-amd64
python3-dnspython python3-gpg
   python3-importlib-metadata python3-markdown python3-more-itertools
python3-pygments python3-requests-toolbelt
   python3-yaml python3-zipp python3.9 python3.9-minimal samba-common
tdb-tools xen-hypervisor-4.16-amd64
   xen-hypervisor-common xen-utils-common xenstore-utils
Use 'sudo apt autoremove' to remove them.
The following packages will be REMOVED:
   python3-ldb python3-samba python3-talloc python3-tdb samba
samba-common-bin samba-dsdb-modules samba-libs
   samba-vfs-modules xen-system-amd64 xen-utils-4.16
The following NEW packages will be installed:
   libpython3.10-minimal libpython3.10-stdlib python3-charset-normalizer
python3.10 python3.10-minimal
The following packages will be upgraded:
   dirmngr gpg gpg-agent gpg-wks-client gpg-wks-server gpgconf gpgsm
libpython3-stdlib python3 python3-minimal
   python3-requests
11 upgraded, 5 newly installed, 11 to remove and 0 not upgraded.
Need to get 9,842 kB of archives.
After this operation, 76.2 MB disk space will be freed.
Do you want to continue? [Y/n] n
Abort.
user@debian:~$


The problem is with the section that lists the packages that will be
REMOVED.

It looks like the upgrade to the python3 packages that remove/replace some
existing python3 packages versions triggers apt to also remove samba and
xen-utils-4.16, which I do not want, so I aborted it. Can I expect that in
due time, the python3 dependencies will be updated so the full upgrade can
succeed without removing the xen-utils-4.16 and samba packages?

Thanks,

Chuck


Hi Chuck,

[The xscreensaver person, I presume - \o/ ]

Yes, this is entirely normal in Sid and is the main reason that we discourage
people in general from running it as a distribution: if it breaks, you get to
keep both pieces and are expected to be able to fix missing dependencies.

In this instance, I suspect that samba will be fixed relatively quickly - I'm
honestly not sure how big the Xen team is at the moment.

There's every likelihood that it will gradually be fixed as things move
forwards but this is Sid so there's no guarantee that it won't break
elsewhere in some new and interesting way.

All the very best, as ever,

Andy Cater



Thanks, Andy, that seems reasonable. I will try to help the Xen team with
this if I can. I have been in contact with them a bit in the past.

Chuck



Does this happen often with sid?

2022-03-28 Thread Chuck Zmudzinski
I am new to running the unstable sid distribution. Today I wanted to 
upgrade it and when using the dist-upgrade option of apt-get (I think 
that's equivalent to the full-upgrade option of apt), I got this:


--
user@debian:~$ sudo apt-get dist-upgrade
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
The following packages were automatically installed and are no longer 
required:
  attr grub-xen-bin grub-xen-host libcephfs2 libldap-2.4-2 libldb2 
libpython3.9 libpython3.9-minimal
  libpython3.9-stdlib libtdb1 libyaml-0-2 linux-image-5.16.0-3-amd64 
python3-dnspython python3-gpg
  python3-importlib-metadata python3-markdown python3-more-itertools 
python3-pygments python3-requests-toolbelt
  python3-yaml python3-zipp python3.9 python3.9-minimal samba-common 
tdb-tools xen-hypervisor-4.16-amd64

  xen-hypervisor-common xen-utils-common xenstore-utils
Use 'sudo apt autoremove' to remove them.
The following packages will be REMOVED:
  python3-ldb python3-samba python3-talloc python3-tdb samba 
samba-common-bin samba-dsdb-modules samba-libs

  samba-vfs-modules xen-system-amd64 xen-utils-4.16
The following NEW packages will be installed:
  libpython3.10-minimal libpython3.10-stdlib python3-charset-normalizer 
python3.10 python3.10-minimal

The following packages will be upgraded:
  dirmngr gpg gpg-agent gpg-wks-client gpg-wks-server gpgconf gpgsm 
libpython3-stdlib python3 python3-minimal

  python3-requests
11 upgraded, 5 newly installed, 11 to remove and 0 not upgraded.
Need to get 9,842 kB of archives.
After this operation, 76.2 MB disk space will be freed.
Do you want to continue? [Y/n] n
Abort.
user@debian:~$


The problem is with the section that lists the packages that will be 
REMOVED.


It looks like the upgrade to the python3 packages that remove/replace 
some existing python3 packages versions triggers apt to also remove 
samba and xen-utils-4.16, which I do not want, so I aborted it. Can I 
expect that in due time, the python3 dependencies will be updated so the 
full upgrade can succeed without removing the xen-utils-4.16 and samba 
packages?


Thanks,

Chuck



Re: Definitive instructions for Buster LTS security updates

2022-02-21 Thread Chuck Zmudzinski

On 2/21/2022 10:28 AM, Christian Britz wrote:


On 2022-02-21 15:45 UTC+0100, David Wright wrote:


AFAICT, running buster, nothing has yet changed. My sources.list
is attached (ignore the first line), and as of this morning it
yields:

And I think nothing will change in the future. Take the Stretch example
at https://wiki.debian.org/LTS/Using. The sources.list stayed the same.
Maybe buster-updates will disappear, I do not know how this is handled.

IMO it makes totally sense to leave this unchanged - every system will
automatically benefit from LTS.



I also experienced the same behavior with Jessie and now with Stretch.
I did not need to change anything in sources.list, and I received the
LTS updates for Jessie and I still receive them for Stretch while it is 
still

getting LTS updates. So I would expect buster to also not need any changes
to sources.list to receive LTS updates.

Regards,

Chuck Zmudzinski



Re: Cannot login to my user?

2022-02-20 Thread Chuck Zmudzinski

Dear Thomas,

If you can login as Bob on the command line, try

journalctl --user

and look for some error from your last login attempt to the gnome desktop.

If you cannot login on the command line as Bob, try

sudo journalctl

after logging in as Sally and look for some error from your last login 
attempt as Bob.


Regards,

Chuck

On 2/18/2022 12:36 PM, Christian Britz wrote:

Mr. Anderson,

can you login to the command line?
If so, you could check the file .xsession-errors in your home directory.

You can also switch with "Bob" to Xfce for testing purposes.

If you can't resolve it, backup your data from /home/bob and empty the
directory (start with a clean profile).

Regards,
Christian

On 2022-02-18 18:15 UTC+0100, Thomas Anderson wrote:

Hello Friends,

I have Debian 9, I know I need to upgrade my dist, will do that tonight
or tomorrow =)

Last week, I made a new user say "Sally."

Previously, for years, my main user "Bob" was running perfectly with a
gnome desktop.

Recently, I realized, I cannot login to Bob anymore?!?

The login screen loads as expect, i type in my credentials for Bob, the
screen goes black, then I end

up at the login screen again?!?

Sally can login. Sally happens to have a Xfce.

I checked that there were no root owned files on Bob. There are none,
since I read that could be a cause.

Is there a log file I can check for login errors?

Thanks





Re: Misremembered (was: Re: Stupid question)

2022-02-14 Thread Chuck Zmudzinski

On 2/14/2022 10:19 AM, Bijan Soleymani wrote:

On 2022-02-14 10:02, rhkra...@gmail.com wrote:
I think I did mis-remember this, and the behavior I described is more 
like the

behavior of the Debian installer (i.e., it boots an image (with a Linux
kernel)  into RAM to use temporarily for the installation.


AFAIK a ramdisk image is not only loaded when using the Debian 
installer, it is also loaded when booting a full installation on a disk. 
For example, the initrd.img-5.10.0-11-amd64 file that is created when 
installing a kernel and installed under /boot on bullseye systems 
contains the compressed contents of a filesystem that is loaded into RAM 
upon initial boot, and AFAIK that filesystem does not contain a kernel 
but it does contain kernel modules that are binary-compatible with the 
running kernel to support the proper initialization of various hardware. 
The main job of that initrd environment is to find and mount the 
installed root filesystem that is usually on an SSD these days.




I just wanted to try to correct this for posterity.

If anyone can confirm this (both my mistake about grub and my (new)
recollection about the Debian installer, those would be good things.:-)

Sorry for the noise!


IMHO it's not noise if you are trying to clarify or correct something.



Not sure about the Debian installer (except that it does boot and run 
Linux, but not sure it ever switches to another kernel midway), but 
the Grub bootloader is kind of a mini-OS, in that it can read files 
from filesystems (rather than some other bootloaders that read from 
specific sectors/blocks of a disk).


Which is to say if you boot to grub and you are in the grub menu and 
see there is no entry for the particular kernel (or OS) you want, you 
can edit the boot parameters for any menu entry you see and boot the 
missing kernel (or OS) from then and there. (with other bootloaders 
you'd have to boot to the OS or boot from a live CD to modify the boot 
loader parameters).


Also, grub has its own shell, and sometimes if something is not 
configured right, grub may drop into its shell where a knowledgeable 
user can type in commands such as the ls command to list files on the 
disks attached to the system and the configfile command which can be 
used to load the grub configuration if for some reason grub was unable 
to find the grub.cfg file that tells grub how to boot the system. This 
is a useful feature for those who know how to use it, and it has saved 
me from having to reinstall on more that one occasion.


Chuck



Re: Stupid question

2022-02-14 Thread Chuck Zmudzinski

On 2/13/2022 11:23 AM, Andrei POPESCU wrote:

On Du, 13 feb 22, 02:40:27, Chuck Zmudzinski wrote:

This is my understanding of how grub works.

It looks you are using the old MBR partitioning scheme. The logical
partition indicates that.
So I also assume you are using the legacy booting (not UEFI). So the first
thing that
happens is that you will have an active partition set that your BIOS will
boot (if you have
standard bootcode installed in the first sector of the disk).

Legacy BIOS doesn't have an understanding of partitions, it will just
look for a bootloader in the MBR of the mass storage device chosen to
boot from.

The active / bootable flag was (still is?) a Microsoft thing[1], Linux
bootloaders never cared about it and can load operating systems
regardless if the corresponding partition is marked active or not.

[1] as far as I recall it was used in DOS times to let the bootloader
know which is the system partition, but it could be (ab)used for
multi-booting ;)

Kind regards,
Andrei


That's a good clarification that the active partition is a Microsoft thing
implemented by the bootcode Microsoft installs in the MBR of the device
chosen to boot from. Now for an unanswered question: What
does bootcode installed by Debian Linux in the MBR do? How does it
decide which partition to boot from? I think this is what the OP
is asking.

Regards,

Chuck



Re: Stupid question

2022-02-12 Thread Chuck Zmudzinski

On 2/12/2022 4:04 AM, Hans wrote:

Dear list,

I am thinking of a solution of a problem. But I have an understanding problem,
maybe you can give some background knowledge.

The problem: I have one harddrive, there are two linuces installed.

The partitions are as followed:

kali-linux: 1st primary -> /boot
  2nd > /


debian3rd primary -> /boot
4th logical > /
 > swap
 > /home (encrypted)
 > /usr (encrypted)
 > /var (encrypted)


This is the structure, and as said before, only ONE drive.

Now my question: Is it possible to configure grub that way, that I can choose
either kali or debian to boot?

What I might to know, please correct me:
Both are running different kernels. As far as I understood grub, I can set the
root partition ( / ) with the UUID. This is an entry in grub.cfg and maybe in
/etc/default/grub.

But how can I tell grub, to use the kernel of the second /boot?

I dunno, if it is possible at all, to get a dual boot, the way I want it. With
a combination of Windows + Linux on one harddrive this is working, however,
just because grub does not touch the windows bootloader (as fas as I know),
and what of course is also working, if you got two harddrives, each with
different linux. They all can be booted from one grub installation, of course.

Maybe I could find a solution, if I would have fully understood how grub is
working, and what it is doing.

Any hints are welcome, and if this does never work at all, please drop me a
line.

Best regards

Hans








This is my understanding of how grub works.

It looks you are using the old MBR partitioning scheme. The logical 
partition indicates that.
So I also assume you are using the legacy booting (not UEFI). So the 
first thing that
happens is that you will have an active partition set that your BIOS 
will boot (if you have
standard bootcode installed in the first sector of the disk). The active 
partition is either 1st
primary in which case you will boot from the grub from kali, or 3rd 
primary in which
case you will boot the grub from Debian. So first you need to see which 
partition your
BIOS boots. You can view or change the partitions and which one is the 
active boot

partition using a disk partition tool such as fdisk.

If you set Debian's grub on the 3rd partition as the active boot 
partition, you should
be able to fairly easily display a menu to select either kali or Debian 
on the grub menu.
You will need to make sure os-prober is enabled, it is enabled by 
default on bullseye
and older, but I think in bookworm and sid you need to enable it by a 
setting in
/etc/default/grub). The changelog for grub on bookworm and unstable has 
an entry to
tell you how, I think. You also need to set the timeout to something 
(usually 5 or 10

seconds) to display the menu, and you can also set a default OS to boot in
/etc/default/grub to handle the case when you do not select an OS before the
timeout expires.

After that, you just run sudo update-grub from your Debian system and 
then on the next

reboot the grub menu should have entries for both kali and Debian.

Cheers,

Chuck



Re: Query

2022-02-07 Thread Chuck Zmudzinski

On 2/7/2022 4:36 PM, Greg Wooledge wrote:

On Mon, Feb 07, 2022 at 04:31:51PM -0500, Chuck Zmudzinski wrote:

On 2/7/2022 10:50 AM, William Lee Valentine wrote:

I am wondering whether a current Debian distribution can be installed
and run on an older Pentium III computer. (I have Debian 11.2 on a DVD.)

The computer is

    Dell Dimension XPS T500: Intel Pentium III processor (Katnai)
    memory: 756 megabytes, running at 500 megahertz
    IDE disc drive: 60 gigabytes
    Debian partition: currently 42 gigabytes
    Debian 6.0: Squeeze

Based on what others are saying, it looks like a typical modern Debian
desktop environment such as Gnome or Plasma KDE will not work well with such
an old system. I suggest you look for a Distro that is tailored for old
hardware.

Bah, silly.  Just use a traditional window manager instead of a bloated
Desktop Environment.  Problem solved.


Which windows manager for an extremely resource-limited system? Debian's 
wiki page on window managers lists more than 30 possibilities. Its not 
silly to take a look at a distro based on Debian that is tailored for 
low resources as a starting point to try and build a Debian 11.2 system 
that will work OK on a Pentium III with less than 1 GB of memory. Debian 
provides so many packages, and such distros like antiX can give one an 
idea about which packages to use when trying to build a Debian 11.2 
system that will work well on an older system with such a small amount 
of memory and such an old CPU.




But the *real* problem will come when they try to run a web browser.  That's
where the truly massive memory demand is.

756 MB is plenty of RAM for daily use of everything except a web browser.



Yes, it will be important to try to find a web browser that is the least 
bloated as possible. Again, looking at the browser choices of distros 
tailored for old hardware can help build a Debian 11.2 system that will 
work well on old hardware.


In any case, it will need to be a carefully crafted selection of Debian 
11.2 packages to have a decent experience, and most definitely start 
with a small netinst installation with only the text console to start, 
and then build the GUI environment carefully from the ground up.


Again, good luck to the OP in trying out Debian 11.2 on his system.

Chuck



Re: Query

2022-02-07 Thread Chuck Zmudzinski

On 2/7/2022 10:50 AM, William Lee Valentine wrote:

I am wondering whether a current Debian distribution can be installed
and run on an older Pentium III computer. (I have Debian 11.2 on a DVD.)

The computer is

   Dell Dimension XPS T500: Intel Pentium III processor (Katnai)
   memory: 756 megabytes, running at 500 megahertz
   IDE disc drive: 60 gigabytes
   Debian partition: currently 42 gigabytes
   Debian 6.0: Squeeze


Based on what others are saying, it looks like a typical modern Debian 
desktop environment such as Gnome or Plasma KDE will not work well with 
such an old system. I suggest you look for a Distro that is tailored for 
old hardware. See, for example this page:


https://itsfoss.com/lightweight-linux-beginners/

A quick look at the 16 distros would make me try antiX-19 first:

http://download.tuxfamily.org/antix/docs-antiX-19/FAQ/index.html

and

https://antixlinux.com/blog/

It advertises support down to as low as Pentium II and uses Debian 
buster as the base. Perhaps a later version will be based on bullseye. 
Its 32-bit version does not need to use a pae kernel, and it is systemd 
free, and these are probably some of the hacks that are needed to keep 
such an old system working well with modern software.


There are also antiX 21 packages, but the blog page does not advertise 
version 21 as a release, perhaps it is a development or beta version 
based on bullseye.


Good luck,

Chuck



If I install Debian 11.2, will it run on this machine? Will it preserve
the files and directories that I have on Squeeze?

I am not subscribed to this mailing list. I would appreciate advices.

-- William Lee Valentine






Re: XEN domU: Guest Rx stalled, unreachable

2022-01-16 Thread Chuck Zmudzinski

On 1/16/2022 7:16 AM, Felix Odenkirchen wrote:

Dear all,

I'm running a stock Debian SID vm on xen, hostname "vm-sid".
Dom0 is on stock Debian Bullseye, hostname "bigiron-one".

apt updating vm-sid packages on 2022-01-13 08:11:00 UTC rendered vm-sid
unaccessible over network upon reboot.
Updated packages:
bsdutils bsdextrautils dbus eject initramfs-tools libblkid1 libc-bin
libfdisk1 libnss-systemd libpam-systemd libpython3.9-minimal
libpython3.9-stdlib libsmartcols1 libsystemd0 libudev1 libuuid1 mailcap
man-db mount python3-pkg-resources python3.9 python3.9-minimal systemd
systemd-sysv systemd-timesyncd udev util-linux

log messages on dom0:
    12:36:35 felix: /etc/xen/scripts/vif-bridge: online type_if=vif
XENBUS_PATH=backend/vif/18/0
    12:36:35 kernel: [2348158.091840] xenbr0: port 4(vif18.0) entered
blocking state
    12:36:35 kernel: [2348158.091846] xenbr0: port 4(vif18.0) entered
disabled state
    12:36:35 kernel: [2348158.091991] device vif18.0 entered
promiscuous mode
    12:36:35 felix: /etc/xen/scripts/vif-bridge: Successful vif-bridge
online for vif18.0, bridge xenbr0.11:58:39     12:37:14 kernel:
[2348197.078134] vif vif-18-0 vif18.0: Guest Rx ready
    12:37:14 kernel: [2348197.078164] IPv6: ADDRCONF(NETDEV_CHANGE):
vif18.0: link becomes ready
    12:37:14 kernel: [2348197.078235] xenbr0: port 4(vif18.0) entered
blocking state
    12:37:14 kernel: [2348197.078238] xenbr0: port 4(vif18.0) entered
forwarding state
    12:38:49 kernel: [2348292.051684] vif vif-18-0 vif18.0: Guest Rx
stalled
    12:38:49 kernel: [2348292.051759] xenbr0: port 4(vif18.0) entered
disabled state

WORKAROUND:

1. Logging in on virtual console
    felix@bigiron-one:~$ sudo xl console 18

2. bringing interface up manually
    felix@vm-sid:~# sudo ip a
    1: lo:  mtu 65536 qdisc noqueue state UNKNOWN
group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
    2: enX0:  mtu 1500 qdisc noop state DOWN group
default qlen 1000
    link/ether 00:16:3e:14:07:93 brd ff:ff:ff:ff:ff:ff
    felix@vm-sid:~# sudo ip link set enX0 up
    felix@vm-sid:~# sudo dhclient

3. log on dom0
    12:41:24 kernel: [2348446.972241] vif vif-18-0 vif18.0: Guest Rx 
ready

    12:41:24 kernel: [2348446.972304] xenbr0: port 4(vif18.0) entered
blocking state
    12:41:24 kernel: [2348446.972308] xenbr0: port 4(vif18.0) entered
forwarding state

4. network running and stable


I fail to see why SID domU stopped bringing up its network interface.
Worked perfectly before.
Another apt update && apt upgrade didn't remove the problem, so no
package fix yet  :-/
All the other domU (Bullseye and Bookworm vm's) are not affected and
running fine,
How can I determine the source of the problem on vm-sid, or the relevant
package?

Regards,
Felix




Hi Felix,

It looks to me like a change in one of the systemd or udev packages in 
vm-sid is causing the trouble here. In my experience with Debian, the 
networking startup stuff is not so straightforward, but I do know that 
systemd and udev are the software components responsible for setting up 
the network and responding to networking events such as plugging in an 
ethernet cable or turning on wifi. So I would look in the changelogs of 
the systemd and udev packages that were updated and see if you can get a 
clue on what might have changed to break your networking startup 
configuration. For example, if your network is setup using 
/etc/network/interfaces and ifup at startup and the systemd 
configuration changed so that the ifup script that reads 
/etc/network/interfaces are no longer called correctly at startup, then 
your network interface would not be brought up automatically at startup. 
In my experience, once when I changed some packages the network 
interface name changed and that caused my network interface to not come 
up properly at startup. To fix it, I had to tweak the systemd configuration.


All the best,

Chuck



Re: Impossible to give "write" permission on a sub folder

2021-11-27 Thread Chuck Zmudzinski

Read the ntfs-3 man page.

Take a look at the man page for ntfs-3g, the section on
Access Handling and Security:

From the ntfs-3g man page:

   Access Handling and Security
   By default, files and directories are owned by the effective 
user and group of the mounting process,  and  ev‐
   erybody  has  full read, write, execution and directory browsing 
permissions.  You can also assign permissions
   to a single user by using the uid and/or the gid options 
together with the umask, or fmask and dmask options.


   Doing so, Windows users have full access to the files created by 
ntfs-3g.


   But, by setting the permissions option, you can benefit from the 
full ownership and  permissions  features  as
   defined  by  POSIX.  Moreover, by defining a Windows-to-Linux 
user mapping, the ownerships and permissions are

   even applied to Windows users and conversely.

   If ntfs-3g is set setuid-root then non-root users will be also 
able to mount volumes.



You use the defaults option when mounting. I do not know how that
affects access and security for ntfs-3g. I would suggest either using
uid and gid options when mounting instead, or using the
usermapping file that maps Windows users to Debian users.

You need to check which user under Windows owns those folders, which Windows
users have write access to those folders, etc.

As mentioned in the man page, there is a way to map Windows users to
Debian 11 users using the default .NTFS-3G/UserMapping file or a
custom usermapping file with the usermapping mount option.

I used this feature a long time ago, and the format for the usermapping
file is documented in the ntfs-3g man page.

As is said at the beginning of this reply, read the ntfs-3g man page!

HTH,

Chuck

On 11/26/2021 3:29 AM, lists.deb...@netc.eu wrote:

Hello to all,
I have a dual boot PC with Windows 10 and Debian 11
This PC has 2 drives, one SSD that has both operating systems and a 
HDD where I store all other files (documents, music, images, ...)
The goal is to share this HDD between Windows and Debian. To do it, I 
added the following line to the fstab file:


UUID=ACB23705B236D414 /mnt/windows  ntfs-3g defaults,umask=000  
 0   0

the folders lount without any problem to /mnt/windows, all with the 
correct permission settings (rwx) :


$ ls -l /mnt/windows/
total 80
drwxrwxrwx 1 root root 4096 14 nov. 20:20 '$RECYCLE.BIN'
drwxrwxrwx 1 root root 4096 24 nov. 15:59 CloudStation
drwxrwxrwx 1 root root 4096 21 nov. 11:44 Documents
-rwxrwxrwx 1 root root 8192 25 juin 08:15 DumpStack.log.tmp
drwxrwxrwx 1 root root 4096 22 nov. 20:41 Images
drwxrwxrwx 1 root root 4096 24 nov. 11:53 Music
drwxrwxrwx 1 root root 8192 23 nov. 06:21 'System Volume Information'
drwxrwxrwx 1 root root 40960 21 nov. 22:22 Downloads
drwxrwxrwx 1 root root 4096 21 nov. 19:44 Videos

My problem is that in some sub folders, I'm not getting the write 
("w") permission. For example on the "Documents" one:


$ ls -l /mnt/windows/Documents/
total 117
drwxrwxrwx 1 root root 16384 24 nov. 15:59 User1
-rwxrwxrwx 1 root root 0 26 nov. 2020 Default.rdp
-rwxrwxrwx 1 root root 432 11 mars 2021 desktop.ini
dr-xr-xr-x 1 root root 40960 24 nov. 15:59 User2
drwxrwxrwx 1 root root 16384 24 nov. 16:00 Public
drwxrwxrwx 1 root root 4096 24 nov. 15:59 User3
dr-xr-xr-x 1 root root 20480 21 nov. 12:05 Scan
-rwxrwxrwx 1 root root 18432 4 déc. 2016 Thumbs.db
drwxrwxrwx 1 root root 0 16 nov. 23:13 'Unified Remote'

Most of the folders are OK, but I ave User2 and San that doesn't have 
the write ("w") permission...

Do you have any idea on whats going on?
Thanks in advance for all the help,
Berst regards,
Marc




Re: GUI browser in VNC

2021-10-20 Thread Chuck Zmudzinski

On 10/20/2021 4:01 PM, Chuck Zmudzinski wrote:

On 10/20/2021 4:06 AM, Julius Hamilton wrote:

Hey,

I’d like to run a desktop in VNC and open GUI browsers like Firefox 
in it.


I succeeded in setting up the VNC server but after installing 
Firefox, Chromium and Chrome I find they don’t open when I launch them.


Is this because I am root user?

Is it just because you should always run browsers as non-root?

Thanks very much,
Julius




I use the tigervnc-standalone-server package for VNC access. It allows
a VNC server to be run as a normal user. It works fine with firefox on
my system.

Set up the VNC password and the xstartup script in the $HOME/.vnc
configuration directory. The package provides tools such as vncpasswd
to help set it up, and you can set the xstartup script to start any
installed desktop environment. I have used it with gnome, lxde, and
lxqt and it works fine. I don't think the package provides encrypted
connections, though,


Actually, looking at the man pages for tigervncserver, there are
options to provide encrypted connections using X509 certs or
TLS. This would also presumably require the VNC viewer
to support X509 or TLS security, but I have not tried it.



After installing and configuring it, start the server as an ordinary 
user:


$ vncserver -geometry 1024x768

You can adjust the geometry as desired and connect to it from any
VNC viewer.


Also, as normal (non-root) user, you stop it with:
$ vncserver -kill :1

Cheers,

Chuck



Re: GUI browser in VNC

2021-10-20 Thread Chuck Zmudzinski

On 10/20/2021 4:06 AM, Julius Hamilton wrote:

Hey,

I’d like to run a desktop in VNC and open GUI browsers like Firefox in it.

I succeeded in setting up the VNC server but after installing Firefox, 
Chromium and Chrome I find they don’t open when I launch them.


Is this because I am root user?

Is it just because you should always run browsers as non-root?

Thanks very much,
Julius




I use the tigervnc-standalone-server package for VNC access. It allows
a VNC server to be run as a normal user. It works fine with firefox on
my system.

Set up the VNC password and the xstartup script in the $HOME/.vnc
configuration directory. The package provides tools such as vncpasswd
to help set it up, and you can set the xstartup script to start any
installed desktop environment. I have used it with gnome, lxde, and
lxqt and it works fine. I don't think the package provides encrypted
connections, though, so I only use it on a trusted private network
or with a VPN that provides security and encryption.

After installing and configuring it, start the server as an ordinary user:

$ vncserver -geometry 1024x768

You can adjust the geometry as desired and connect to it from any
VNC viewer.

I also use Xen and Xen's built-in VNC server also works fine with
firefox in my experience - Xen's built-in VNC server allows access
to Debian running in Xen unprivileged domains from any VNC
viewer, but that is probably a niche use case.

Cheers,

Chuck



Fwd: Privacy and defamation of character on Debian public forums

2021-09-29 Thread Chuck Zmudzinski

On 9/28/2021 11:34 AM, Jonathan Dowland wrote:

On Tue, Sep 28, 2021 at 07:10:08AM -0400, Chuck Zmudzinski wrote:
As the original poster, I can say this hits the nail on the head. 
Most definitely, Andy Smith and others claim a right to call 
newcomers like me a laughingstock, damned, etc., on the basis of 
their supposed god-like status.

...

By overreaction, he clearly means I refused to worship him and his ilk
as the gods they think they are, 


I think this is an unreasonable characterisation of Andy Smith which I
invite you to retract. I've read all of his messages on this subject to
this list (at least) and I thought he'd taken great pains to make clear
that he was merely an interested bystander, no more important than
anyone else -- including you!


I agree to retract this. I am sure Andy Smith is a fine person, and I can
see he devotes much of his time heping others use Debian, and that is
a good thing that he does. My statement was an emotional overreaction
in response to Borden, who clearly is overstating problems in Debian.
I did too, and I am sorry.

Thanks,

Chuck



Re: Privacy and defamation of character on Debian public forums

2021-09-29 Thread Chuck Zmudzinski

On 9/28/2021 10:23 AM, Pierre-Elliott Bécue wrote:

Chuck Zmudzinski  wrote on 28/09/2021 at 13:10:08+0200:


On 9/27/2021 9:18 PM, Borden wrote:

I sympathise with your frustrations.

The open source "community" - especially Debian - is not known for
its civility. There have been numerous articles (and backlashes)
identifying the rampant misogyny, racism, arrogance, murder and
general rudeness amongst its members and leaders. If you're
expecting a well-governed organisation with a robust, even-handed
and consistent method for handling problems, your princess is in
another castle.

Unfortunately, the old economic principle "You get what you pay for"
applies. People who are good at what they do charge good rates and
are in too high demand to deal with us plebs for free. As in any
volunteer organisation, positions attract people with way too much
free time and whose opinions of themselves (including their legal
scholarship) exceeds their abilities. It's pretty tribal.

I'm speaking very broadly here and not in reference to anybody in particular, 
but I have  numerous incidents from the past 20 years in mind.

Many newcomers to open source are encouraged to read Eric Raymond's
"How to ask questions the smart way" which is a rambling manifesto
that establishes the caste system of project managers at the top and
newcomers at the bottom. Contributors are to be worshipped as gods,
and we must be grateful to them when they down from Nirvana to
educate us.

As the original poster, I can say this hits the nail on the head. Most
definitely, Andy Smith and others claim a right to call newcomers like
me a laughingstock, damned, etc., on the basis of their supposed
god-like status. The fact is, I solved my bug (#994899) and wanted to
help the Debian project out. And as thanks I get called a
laughingstock and that I would be "damning" myself further if I didn't
stop my alleged "overreaction." By overreaction, he clearly means I
refused to worship him and his ilk as the gods they think they are,
even claiming the power and right to damn newcomers at will. Yet they
are the ones unable to solve their bug (#991967). And they are the
gods to be worshiped? Ha ha! I wouldn't pay any of them a dime to try
to squash a software bug. I will just fix it myself. Debian is closing
in on a million bugs. That's a lot, it takes about 97 new bugs per day
over the 28-year life-span of the project to get to a number that
high. And that is only the ones that are reported. I have seen many
bugs in free software that I did not bother to report, and I am sure
many others have as well.

I am inclined to say that if the truth be told, the only bugs that
matter are the ones that Google, Amazon, Microsoft, IBM, etc. want to
get solved. I see many bugs are marked as patch available, yet the
patch is never applied. My bug is marked as patch available. But I am
not Google or Amazon. So I doubt my patch for my bug will ever make it
into the distribution. Apparently I have committed the deadly sin of
questioning the gods. If Debian wants to prove me wrong, then Debian
should accept my patch into the distribution, or at least consider it
and have the courtesy to tell me why they can't or won't accept the
patch. If they do work with me to get a fix into the Debian software
for my bug, then I will retract my statement that I believe only the
bugs that are important to Debian are the ones giant multinational
corporations want a fix for. Or, think of it this way. Maybe the big
software companies plant bugs on purpose in free software (or worse,
malware, ransomware, etc.) so most people have no choice but to pay
them for their commercial products and security solutions, and it is
not good for their bottom line if too many people can get a secure,
bug-free product for free. Again, if Debian accepts my patch for my
bug, then I would stand corrected.

Hi Chuck,

You really should consider stopping to reply and leave things as they
are.

Regards,

--
PEB


I agree, it's time to stop this thread, I am satisfied with things how they
are.

All the best,

Chuck



Re: Privacy and defamation of character on Debian public forums

2021-09-28 Thread Chuck Zmudzinski

On 9/27/2021 9:18 PM, Borden wrote:

I sympathise with your frustrations.

The open source "community" - especially Debian - is not known for its 
civility. There have been numerous articles (and backlashes) identifying the rampant 
misogyny, racism, arrogance, murder and general rudeness amongst its members and leaders. 
If you're expecting a well-governed organisation with a robust, even-handed and 
consistent method for handling problems, your princess is in another castle.

Unfortunately, the old economic principle "You get what you pay for" applies. 
People who are good at what they do  charge good rates and are in too high demand to deal 
with us plebs for free. As in any volunteer organisation, positions attract people  with 
way too much free time and whose opinions of themselves (including their legal 
scholarship) exceeds their abilities. It's pretty tribal.

I'm speaking very broadly here and not in reference to anybody in particular, 
but I have  numerous incidents from the past 20 years in mind.

Many newcomers to open source are encouraged to read Eric Raymond's "How to ask 
questions the smart way" which is a rambling manifesto that establishes the caste 
system of project managers at the top and newcomers at the bottom. Contributors are to be 
worshipped as gods, and we must be grateful to them when they down from Nirvana to 
educate us.


As the original poster, I can say this hits the nail on the head. Most 
definitely, Andy Smith and others claim a right to call newcomers like 
me a laughingstock, damned, etc., on the basis of their supposed 
god-like status. The fact is, I solved my bug (#994899) and wanted to 
help the Debian project out. And as thanks I get called a laughingstock 
and that I would be "damning" myself further if I didn't stop my alleged 
"overreaction." By overreaction, he clearly means I refused to worship 
him and his ilk as the gods they think they are, even claiming the power 
and right to damn newcomers at will. Yet they are the ones unable to 
solve their bug (#991967). And they are the gods to be worshiped? Ha ha! 
I wouldn't pay any of them a dime to try to squash a software bug. I 
will just fix it myself. Debian is closing in on a million bugs. That's 
a lot, it takes about 97 new bugs per day over the 28-year life-span of 
the project to get to a number that high. And that is only the ones that 
are reported. I have seen many bugs in free software that I did not 
bother to report, and I am sure many others have as well.


I am inclined to say that if the truth be told, the only bugs that 
matter are the ones that Google, Amazon, Microsoft, IBM, etc. want to 
get solved. I see many bugs are marked as patch available, yet the patch 
is never applied. My bug is marked as patch available. But I am not 
Google or Amazon. So I doubt my patch for my bug will ever make it into 
the distribution. Apparently I have committed the deadly sin of 
questioning the gods. If Debian wants to prove me wrong, then Debian 
should accept my patch into the distribution, or at least consider it 
and have the courtesy to tell me why they can't or won't accept the 
patch. If they do work with me to get a fix into the Debian software for 
my bug, then I will retract my statement that I believe only the bugs 
that are important to Debian are the ones giant multinational 
corporations want a fix for. Or, think of it this way. Maybe the big 
software companies plant bugs on purpose in free software (or worse, 
malware, ransomware, etc.) so most people have no choice but to pay them 
for their commercial products and security solutions, and it is not good 
for their bottom line if too many people can get a secure, bug-free 
product for free. Again, if Debian accepts my patch for my bug, then I 
would stand corrected.


Chuck



Re: Privacy and defamation of character on Debian public forums

2021-09-26 Thread Chuck Zmudzinski

On 9/26/2021 7:28 AM, Chuck Zmudzinski wrote:

On 9/26/2021 7:18 AM, rhkra...@gmail.com wrote:

On Saturday, September 25, 2021 12:58:44 PM Chuck Zmudzinski wrote:

I am truly sorry, are there second chances in the Debian Community?

I hope and trust so -- I've had to make use of them more than once ;-)


... That is why defamation is not the only
issue to discuss here. The other is privacy and whether or
not Debian volunteers can discuss matters privately or does
every criticism we have about another person need to
be expressed in the public forums?
Things certainly can be discussed privately, but (1) not everyone 
immediately
thinks of that under all circumstances.  (And may either (2) consider 
the
criticism (if it is that) to be so mild it doesn't require private 
discussion,
or (3) is useful for the entire list, and thus useful to be public 
rather than

private.  (In that situation (3) (or (2)), it would be nice if it were
discussed in private first as an extra element of courtesy, but see (1).

Have a good day!





May I add (4) not everyone immediately thinks (or agrees) that it is 
not good
to just include a link without also posting the relevant text from 
that link.

I think posting the link with a summary of other relevant information
is sufficient. I respect that opinion of the poster of message #10 of 
my bug,
but I don't think I must agree with it. Now I know that's what he 
expects,

and I will try to remember that in future interactions with him.

All the best,

Chuck



Also, other people might be offended if I posted the link and did what
the author of #10 wanted me to do, also include the relevant text
of the link. What effect does that have? Suppose someone reads the link
and then comes back to my message and finds repeated what I
already said in the link. He/she becomes annoyed that I
wasted her/his time. When I was formulating my initial bug report,
how was I supposed to know how the author of message #10
wanted me to create my bug report?

Cheers,

Chuck



Re: Privacy and defamation of character on Debian public forums

2021-09-26 Thread Chuck Zmudzinski

On 9/26/2021 7:18 AM, rhkra...@gmail.com wrote:

On Saturday, September 25, 2021 12:58:44 PM Chuck Zmudzinski wrote:

I am truly sorry, are there second chances in the Debian Community?

I hope and trust so -- I've had to make use of them more than once ;-)


... That is why defamation is not the only
issue to discuss here. The other is privacy and whether or
not Debian volunteers can discuss matters privately or does
every criticism we have about another person need to
be expressed in the public forums?

Things certainly can be discussed privately, but (1) not everyone immediately
thinks of that under all circumstances.  (And may either (2) consider the
criticism (if it is that) to be so mild it doesn't require private discussion,
or (3) is useful for the entire list, and thus useful to be public rather than
private.  (In that situation (3) (or (2)), it would be nice if it were
discussed in private first as an extra element of courtesy, but see (1).

Have a good day!





May I add (4) not everyone immediately thinks (or agrees) that it is not 
good
to just include a link without also posting the relevant text from that 
link.

I think posting the link with a summary of other relevant information
is sufficient. I respect that opinion of the poster of message #10 of my 
bug,

but I don't think I must agree with it. Now I know that's what he expects,
and I will try to remember that in future interactions with him.

All the best,

Chuck



Re: Privacy and defamation of character on Debian public forums

2021-09-25 Thread Chuck Zmudzinski

On 9/25/2021 10:02 AM, Andy Smith wrote:

Hello,

On Sat, Sep 25, 2021 at 09:06:34AM -0400, rhkra...@gmail.com wrote:

On Friday, September 24, 2021 05:31:47 PM The Wanderer wrote:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994899 - specifically.
the first reply (comment 10).

[…]


I've read over message #5, and without being a Debian developer or a user of
Xen, aside from being a little longer / wordier than probably necessary, I
don't see anything so objectionable about it.

[ I am not a member of the Debian Xen team and haven't contributed
anything to this particular bug, but I have followed it all as I
have an interest in the team's work. ]

It's not outrageously objectionable, it's just not a very good bug
report with some *slightly* objectionable elements and background.

This whole thing is pretty mundane and has been blown out of all
proportion by Chuck failing to handle reasonable advice given by
someone trying to help in good faith.


I don't doubt at all that the advice in message #10 was given
in good faith. I thought the author of #10's decision to rudely
refuse to collaborate with me forever by saying "Bye" in a later
message was also an overreaction to anything wrong I might
have done.

Also what would have remained
with a very niche audience (people interested in Debian's Xen
packages) has now been shown to a much wider audience as a
consequence of Chuck bringing this to the attention of debian-user.

To explain a bit more of the background, you'll see that Chuck
referred to another bug in that bug log and a lot of other
discussion took place there. Some of the things that are wrong with
Chuck's bug are that Chuck criticised the Debian Xen team for
including particular patches, and made some other factually
incorrect statements,


For example?

and wrote in a style as if as if the situation
were fully known about by the Debian Xen team while valiant users
like Chuck are crushed underfoot.


I admit the Debian Xen Team may not have been aware
of the situation, and besides, I was more concerned that
the Debian Release Team did not notice that patches from
an unstable branch of the Xen upstream source made it
into the Debian stable release. There is what I would call
a "Debian patch" exploit attack surface exposed here to the
authors of malware. THAT is a serious issue. The Xen Team's
patches in question are perfectly acceptable in unstable and
maybe in testing, but IMO, not in stable.


In reality, the Debian Xen team didn't have good visibility of the
issue and it's not yet been proven where exactly the bug lies. Even
if it was shown to be in a patch that the team HAD taken on
questionable basis, so what, we are all volunteers here, there is no
need to berate people for their good faith efforts,


I think its an overstatement to say I "berated" anyone in the
bug report. You, however, judge me as "damned" and as a
"laughingstock" in your first reply to my original post. That also
is an overstatement of anything wrong I might have done,
don't you think?

we should expect
bug reports to just focus on finding and fixing the bug not as
someone's platform to deal out a blame narrative.


Agreed.


Basically it's not a big deal and could have easily been turned
around; I felt #10 was a fairly gentle request to focus on the facts
and make progress but to say the criticism was not received well
would be an understatement!


I am truly sorry, are there second chances in the Debian Community?


For example, one of the "strongest" statements in #10 is

 "It's good that you filed this bug against the Debian Xen
 package […] way you went about it ... not so good."

Chuck's response to that seems to have been to go about complaining
in multiple unrelated locations of how he has been accused of being
"not good". Note that he's morphed a statement of "your bug report
was not done in a good way" into "someone in the Debian community
told me I was not a good person; remove their slander or risk being
sued". A dramatic misrepresentation of what actually happened. The
rest of it is full of things like that.


Are you trying to say now I am not a good person? Seems so to me.


It could be partially understandable if #10 had simply said, "your
bug report sucks," which believe me, I have seen and continue to see
even from long standing Debian Developers. But Diederik did also
take the time to give useful advice about HOW to move the situation
forward, in fact that was the majority of the response.


I really appreciate Diederik's input, my  point was I would have
preferred he contact me in private about any criticisms he had
for me personally before criticizing the way I wrote my bug
report in public. That is what I would have done if I wanted to
criticize him. But he is the one who made the first criticism
of a Debian volunteer in PUBLIC. So to defend myself, it had
to also be in public. That is why defamation is not the only
issue to discuss here. The other is privacy and whether or
not Debian 

Re: Privacy and defamation of character on Debian public forums

2021-09-24 Thread Chuck Zmudzinski

On 9/24/2021 8:04 AM, Brad Rogers wrote:

On Fri, 24 Sep 2021 07:45:03 -0400
Chuck Zmudzinski  wrote:

Hello Chuck,


happened to me, but I would not be surprised
if in the U.S. eventually Debian will get sued
unless it scrubs its website of some of the

In the USA, Section 230 covers this;  Debian can't be held liable for
comments made by others using their systems.



However, if Debian refuses to remove defamatory comments,
perhaps Debian could be held liable if Debian refuses to remove
comments at a person's request if the comments truly harm a
person's good reputation and, for example, destroys a person's
ability to get a job in software development, or anywhere else
for that matter. Who would hire me if they read what is now
being said about me by Andy Smith, et. al. on Debian's web
pages. If Debian wants to be sure to avoid such a lawsuit,
I think Debian should remove at least some comments to
completely avoid legal liability. I am sure I could find a lawyer
in the U.S. to try it if I wanted to.

Cheers,

Chuck



Re: Privacy and defamation of character on Debian public forums

2021-09-24 Thread Chuck Zmudzinski

On 9/24/2021 8:04 AM, Brad Rogers wrote:

On Fri, 24 Sep 2021 07:45:03 -0400
Chuck Zmudzinski  wrote:

Hello Chuck,


happened to me, but I would not be surprised
if in the U.S. eventually Debian will get sued
unless it scrubs its website of some of the

In the USA, Section 230 covers this;  Debian can't be held liable for
comments made by others using their systems.



I am already satisfied that Debian has officially offered
to hear my side of the story and scrub the public
facing web pages that legitmetely offend me.

Debian won't be held liable in this case because
Andy Smith et al who have accused me of being
"damned" on the public forums do not officially
speak for Debian.

Cheers,

Chuck



Re: Privacy and defamation of character on Debian public forums

2021-09-24 Thread Chuck Zmudzinski

On 9/24/2021 10:10 AM, Jonathan Carter wrote:

Hi Chuck

On 2021/09/24 13:45, Chuck Zmudzinski wrote:

I was accused in public of wrongdoing on the
Debian bug tracking system which is hosted
on a public, Debian website in response to a
bug report I made.

Since Debian's policy is to keep everything
on its website public, and I was told every
message I send regarding Debian must be
put on Debian's public forums, then how
can I try and work out a disagreement with
someone in private emails instead of needing
to expose the dispute in public with all the
negativity, slander, and defamation that
might entail?

I am willing to cooperate with anyone to help
improve Debian software, but only if they
agree to not accuse me in public of wrongdoing
without first discussing the matter with me
in a private email or other private forum.

I am not interested in suing Debian for what
happened to me, but I would not be surprised
if in the U.S. eventually Debian will get sued
unless it scrubs its website of some of the
comments people make about each other on
Debian public forums.


You can (and we'd appreciate it if you would) contact the Debian 
Community team directly (which would not be public) at:


commun...@debian.org

Please include the details like the relevant bug numbers and as much 
other detail as possible.


thanks,

-Jonathan


It is Bug #994899, I ask that you remove every message except for my 
original bug report
from the public facing servers. I leave it to the package maintainers to 
decide things
like bug severity, etc. I think it is clear from why I want this if you 
read the whole
bug report. Please read the bug report with all its messages, and I was 
especially upset
that I was accused of being "not good" = bad, and just plain "wrong," 
and "ranting," etc.
If you have any more questions, please reply to me privately and 
off-list. Also read the
message Andy Smith posted in response to my post on the debian-user 
mailing list:


https://lists.debian.org/debian-user/2021/09/msg00790.html

I do not ask you to remove that message unless you think you should, but 
I cite it

as evidence that there is a problem within the Debian community about not
observing just plain common decency and respect for other persons.

Thank you,

Chuck Zmudzinski



Re: Privacy and defamation of character on Debian public forums

2021-09-24 Thread Chuck Zmudzinski

On 9/24/2021 9:19 AM, Andy Smith wrote:

On Fri, Sep 24, 2021 at 07:45:03AM -0400, Chuck Zmudzinski wrote:

I was accused in public of wrongdoing on the Debian bug tracking
system

That is an interesting point of view, but I think you were simply
accused of being factually wrong and creating a poor quality bug
report. It was your choice to take that extremely personally.


how can I try and work out a disagreement with someone in private
emails instead of needing to expose the dispute in public with all
the negativity, slander, and defamation that might entail?

You were not asked to continue a disagreement in public, you were
asked to provide several pieces of factual information about your
setup and experience so that you could be helped.

My advice is to do that and only that. I see that you already
started doing it, but you still could not resist surrounding that
with large amounts of extraneous emotive text. And now it's leaked
onto debian-user.

Just write facts in the bug report that are relevant to the bug and
not he-said she-said he did this to me, they lied about this. blah
blah. If you can't, then just stop, as you already suggested you
would.


I am willing to cooperate with anyone to help improve Debian
software, but only if they agree to not accuse me in public of
wrongdoing without first discussing the matter with me in a
private email or other private forum.

You may be surprised to find that you get no takers for your "allow
me to rant in your ear but you must never disagree with me"
collaboration style.


I am not interested in suing Debian for what happened to me, but I
would not be surprised if in the U.S. eventually Debian will get
sued unless it scrubs its website of some of the comments people
make about each other on Debian public forums.

Debian doesn't exist as a US entity, so good luck with that. Even
writing about theoretically suing Debian because you can't write a
coherent bug report makes you look like the worst kind of Internet
laughing stock.


Thoughts?

I followed the bug you reported and thought that Diederik's response
to you was exactly on the mark. I also was in the IRC channel where
Diederik spent considerable time asking other developers questions
just so that Diederik could help solve your bug report. I feel very
sorry for Diederik that this effort was spent only to get this sort
of tantrum from you.

That you interpreted Diederik's advice as an attack I think says
more about you than anything else and I recommend that you stop this
overreaction now before you leave even more of a damning impression
of yourself.

After seeing what you have put Diederik through I would have
absolutely no desire to spend effort helping you on a future problem
and I think that is likely to be the view of others also. This
behaviour is not helping your cause.


I have no "cause" I am pursuing. I submitting the bug
report to help make Debian better. It does not reflect
well on the Debian community if this is the way it
treats someone who tries to help.

All the best,

Chuck



Re: Privacy and defamation of character on Debian public forums

2021-09-24 Thread Chuck Zmudzinski

On 9/24/2021 9:19 AM, Andy Smith wrote:

On Fri, Sep 24, 2021 at 07:45:03AM -0400, Chuck Zmudzinski wrote:

I was accused in public of wrongdoing on the Debian bug tracking
system

That is an interesting point of view, but I think you were simply
accused of being factually wrong and creating a poor quality bug
report. It was your choice to take that extremely personally.


how can I try and work out a disagreement with someone in private
emails instead of needing to expose the dispute in public with all
the negativity, slander, and defamation that might entail?

You were not asked to continue a disagreement in public, you were
asked to provide several pieces of factual information about your
setup and experience so that you could be helped.

My advice is to do that and only that. I see that you already
started doing it, but you still could not resist surrounding that
with large amounts of extraneous emotive text. And now it's leaked
onto debian-user.

Just write facts in the bug report that are relevant to the bug and
not he-said she-said he did this to me, they lied about this. blah
blah. If you can't, then just stop, as you already suggested you
would.


I am willing to cooperate with anyone to help improve Debian
software, but only if they agree to not accuse me in public of
wrongdoing without first discussing the matter with me in a
private email or other private forum.

You may be surprised to find that you get no takers for your "allow
me to rant in your ear but you must never disagree with me"
collaboration style.


I am not interested in suing Debian for what happened to me, but I
would not be surprised if in the U.S. eventually Debian will get
sued unless it scrubs its website of some of the comments people
make about each other on Debian public forums.

Debian doesn't exist as a US entity, so good luck with that. Even
writing about theoretically suing Debian because you can't write a
coherent bug report makes you look like the worst kind of Internet
laughing stock.


Thoughts?

I followed the bug you reported and thought that Diederik's response
to you was exactly on the mark. I also was in the IRC channel where
Diederik spent considerable time asking other developers questions
just so that Diederik could help solve your bug report. I feel very
sorry for Diederik that this effort was spent only to get this sort
of tantrum from you.

That you interpreted Diederik's advice as an attack I think says
more about you than anything else and I recommend that you stop this
overreaction now before you leave even more of a damning impression
of yourself.




After seeing what you have put Diederik through I would have
absolutely no desire to spend effort helping you on a future problem
and I think that is likely to be the view of others also. This
behaviour is not helping your cause.

Regards,
Andy


In your opinion, I am "damned." I sure am glad you are not God.

All the best,

Chuck



Privacy and defamation of character on Debian public forums

2021-09-24 Thread Chuck Zmudzinski

I was accused in public of wrongdoing on the
Debian bug tracking system which is hosted
on a public, Debian website in response to a
bug report I made.

Since Debian's policy is to keep everything
on its website public, and I was told every
message I send regarding Debian must be
put on Debian's public forums, then how
can I try and work out a disagreement with
someone in private emails instead of needing
to expose the dispute in public with all the
negativity, slander, and defamation that
might entail?

I am willing to cooperate with anyone to help
improve Debian software, but only if they
agree to not accuse me in public of wrongdoing
without first discussing the matter with me
in a private email or other private forum.

I am not interested in suing Debian for what
happened to me, but I would not be surprised
if in the U.S. eventually Debian will get sued
unless it scrubs its website of some of the
comments people make about each other on
Debian public forums.

Thoughts?



Re: Debian 11 installer crashed and reboot

2021-08-24 Thread Chuck Zmudzinski

On 8/24/2021 2:51 AM, Thomas Schmitt wrote:

Hi,

Chuck Zmudzinski wrote:

I don't know when an official fix will come , but I have come up with
a workaround that works for me:

Congrats. Great investigation work, as far as i can judge as bystander.

So it's only the initrd and not the kernel which spoils booting.
(I wonder whether Secure Boot would detect and refuse on a manipulated
kernel or initrd.)


Have a nice day :)

Thomas



I suppose secure boot might fail but I am not using it in my Xen HVM.
I think the kernel and initrd would need to be digitally signed for
secure boot to be able to check them, and I think in Debian secure boot
only the grub boot loader is digitally signed, and my hack does not
change that. So it is possible Debian's secure boot would also work with
my hack to the initrd.

Cheers,

Chuck



Re: Debian 11 installer crashed and reboot

2021-08-23 Thread Chuck Zmudzinski

On 8/19/2021 3:11 PM, Andy Smith wrote:

Hi Chuck,

On Tue, Aug 17, 2021 at 08:04:43AM -0400, Chuck Zmudzinski wrote:

After some testing of the Debian 11 installer on Xen
(using the debian-11.0.0-amd64-netinst.iso), I find that
this image only supports installation into a Xen PV guest,
the guest always crashes and reboots for either a BIOS
or OVMF boot into an HVM Xen guest.

Could you report this to Debian's Xen team as a bug? Perhaps it is
as simple as needing different kernel options in the netinst
installer kernel given that the full install works under HVM?

The Debian Xen team is very under-resourced for human help and it
has been a long time since they have managed to keep the version in
stable to a recent and supported one upstream. If you run a Xen dom0
on Debian I think really you need to be building your own packages
or using the Debian Xen team's packages from sid.

The stable packaged 4.11 hypervisor is out of even security support
upstream so it's not really suitable for production use. I don't
think the Debian Xen team would recommend using it but would instead
suggest using their newer package that;s in sid (on stable) and
test/report bigs against that. But let's get this reported.

I'm not skilled enough in Debian package building to help the team
but I do still report bigs sometimes; for production use I am
building packages from newer upstream source.

For this problem I can't help as I don't run HVM guests (only PV and
PVH).

The Debian Xen team mailing list is at:
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-xen-devel

Cheers,
Andy



I just discovered this already has been reported as a bug:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983357

I don't know when an official fix will come , but I have come up with
a workaround that works for me:

This fix might also work on the live ISO images that are also reported
to crash and reboot in Xen HVM domUs.

Prerequisites: xorriso and initramfs-tools packages installed

Download/copy debian-11.0.0-amd64-netinst.iso into current working 
directory:


Step 1: Mount the original iso:

mkdir CD
sudo mount -o ro -t iso9660 debian-11.0.0-amd64-netinst.iso CD

Step 2: Copy the initrd.gz file we need to modify:

cp -p CD/install.amd/initrd.gz .

Step 4: Unmount the original iso:

sudo umount CD

Step 5: As root, extract the initramfs into a working directory:

sudo unmkinitramfs initrd.gz initramfs

Step 6: As root, edit the start-udev script that causes the crash and 
reboot:


sudo vi initramfs/lib/debian-installer/start-udev

In the start-udev script change this line:

udevadm trigger --action=add

to

dmesg | grep DMI: | grep 'Xen HVM domU' || udevadm trigger --action=add

and save the file

This change should only disable the udevadm trigger in Xen HVM DomUs.

Step 7: Re-pack the initrd into a new initrd file:

cd initramfs

find . | sort | sudo cpio --reproducible --quiet -o -H newc > ../newinitrd

cd ..

gzip -v9f newinitrd

Step 8: Create the new installation ISO:

cp -p debian-11.0.0-amd64-netinst.iso debian-11.0.0-amd64-xenhvm-netinst.iso

xorriso -dev debian-11.0.0-amd64-xenhvm-netinst.iso -boot_image any keep \
-map newinitrd.gz /install.amd/initrd.gz

Optional Step 9: Clean up

sudo rm -r initramfs newinitrd.gz initrd.gz

The ISO image debian-11.0.0-amd64-xenhvm-netinst.iso can now be used to 
install
Debian bullseye in a Xen HVM Domu. On the main menu, choose the Install 
option,

not the graphical or expert options, in order to boot using the modified
initrd.gz ramdisk.

Cheers,

Chuck Zmudzinski



Re: Debian 11 installer crashed and reboot

2021-08-23 Thread Chuck Zmudzinski

On 8/21/2021 7:06 PM, Chuck Zmudzinski wrote:

On 8/21/2021 5:52 AM, Thomas Schmitt wrote:

Hi,

there might be an easier way (still depending on whether such simple
file replacements are tolerated by the booting system):

   # Choose the desired new files
new_kernel=...path.to.desired.new.kernel.in.some.mounted.filesystem...
new_initrd=...path.to.desired.new.initrd.in.some.mounted.filesystem...

   # Choose the files in the ISO to be replaced by the new files.
   # The ISO needs not to be mounted. (Better it should not be mounted.)
   # Naively, i assume that it's about these two:
   old_kernel=/install.amd/xen/vmlinuz
   old_initrd=/install.amd/xen/initrd.gz

   # Copy netinst ISO to playground ISO
   cp debian-11.0.0-amd64-netinst.iso test.iso

   # Use xorriso multi-session to override the undesired files
   xorriso -dev test.iso \
   -boot_image any keep \
   -map "$new_kernel" "$old_kernel" \
   -map "$new_initrd" "$old_initrd"

This will result in a quite short run of xorriso, which will report
something like

   ISO image produced: 8108 sectors
   Written to medium : 8288 sectors at LBA 193024
   Writing to 'test.iso' completed successfully.

(The numbers 8108 and 8288 are result of the sizes of the two dummy 
files

which i used as $new_kernel #and new_initrd. Yours will be substantially
larger due to the typical size of an initrd.)

Inspection of the boot equipment of test.iso shows no differences,
except the new storage position of the El Torito boot catalog and the
enlarged ISO image size.

When mounted by Linux, the paths
   /mnt/iso/install.amd/xen/vmlinuz
   /mnt/iso/install.amd/xen/initrd.gz
lead to the content of $new_kernel and $new_initrd.

Then it depends on the inner doings of boot loader and starting system,
whether this perky change is tolerated.


Have a nice day :)

Thomas



Hi Thomas,

Thank you for these tips. I will use them to try to get a bullseye
Debian installer ISO working in a Xen HVM DomU next week
when I have some spare time and post the results here.

All the best,

Chuck



This approach (using xorriso with -dev, -boot_image, and -map options)
works to change the kernel and ramdisk on the ISO, and the new
ISO does boot into a Xen HVM without crashing and rebooting, but I
still have not succeeded in getiing the ramdisk configured correctly to
boot the Debian installer. Using the ramdisk of a full install on the
ISO causes init to drop to an initramfs shell because that ramdisk
is not configured to start the Debian installer but instead expects a
root filesystem to be passed to it on the linux kernel command line.

I expect it is possible to create a ramdisk that will successfully boot
the Debian installer in a Xen HVM. I think some components from
the ramdisk of a full install are needed to prevent the crash and
reboot, and it is a matter of identifying what components from
the ramdisk of a full install are needed. I would suspect some
kernel module that a Xen HVM needs is missing from the ramdisks
on the installation ISO.

I will continue to work on it this week in my spare time.

Cheers,

Chuck



Re: Debian 11 installer crashed and reboot

2021-08-22 Thread Chuck Zmudzinski

On 8/16/2021 2:30 AM, John Mok wrote:

Hi all,

Tried to install Debian 11 guest using netinst, but the installer
crashed and reboot automatically.

  Host: Xen 4.11.4 on Debian 10
Guest: Debian 11 (kernel 5.10)

Here is the steps to reproduce the problem:-
1) Either guest BIOS or OVMF boot
2) Select "Expert install" on installation menu

Then, the guest crashed and reboot.

Another try with the installer on Debian Live 11, it immediately
crashed and reboot.

Is it a installer bug or something ?

Thanks a lot.

John Mok



This problem has been reported by Philip Susi on 2021-04-27 in a
comment on linux kernel bug 207695:

https://bugzilla.kernel.org/show_bug.cgi?id=207695#c3

The kernel panic is caused by the Xen virtual keyboard.

I was able to capture a screenshot of the crash by setting
panic=60 and removing quiet from the kernel command line
on the grub menu (the kernel parameters for a grub boot
entry can be adjusted by pressing e when that grub boot
entry is highlighted, when booting with ovmf firmware).

Error message  reported by the kernel is:

failed to write 'add' to '/devices/virtual/input/input2/uevent': cannot 
allocate memory


This problem only occurs using the kernel on the installation
media, a full-featured bullseye kernel boots fine in a Xen HVM
guest.

The installer bullseye kernel also boots fine from the installer
media in a Xen PV guest.

I think the Xen HVM virtual keyboard is one provided by
Qemu. It apparently needs a larger buffer than the one
provided by the installation kernel.

Any ideas how to fix this in the installation kernel?

Chuck



Re: Debian 11 installer crashed and reboot

2021-08-21 Thread Chuck Zmudzinski

On 8/21/2021 5:52 AM, Thomas Schmitt wrote:

Hi,

there might be an easier way (still depending on whether such simple
file replacements are tolerated by the booting system):

   # Choose the desired new files
   new_kernel=...path.to.desired.new.kernel.in.some.mounted.filesystem...
   new_initrd=...path.to.desired.new.initrd.in.some.mounted.filesystem...

   # Choose the files in the ISO to be replaced by the new files.
   # The ISO needs not to be mounted. (Better it should not be mounted.)
   # Naively, i assume that it's about these two:
   old_kernel=/install.amd/xen/vmlinuz
   old_initrd=/install.amd/xen/initrd.gz

   # Copy netinst ISO to playground ISO
   cp debian-11.0.0-amd64-netinst.iso test.iso

   # Use xorriso multi-session to override the undesired files
   xorriso -dev test.iso \
   -boot_image any keep \
   -map "$new_kernel" "$old_kernel" \
   -map "$new_initrd" "$old_initrd"

This will result in a quite short run of xorriso, which will report
something like

   ISO image produced: 8108 sectors
   Written to medium : 8288 sectors at LBA 193024
   Writing to 'test.iso' completed successfully.

(The numbers 8108 and 8288 are result of the sizes of the two dummy files
which i used as $new_kernel #and new_initrd. Yours will be substantially
larger due to the typical size of an initrd.)

Inspection of the boot equipment of test.iso shows no differences,
except the new storage position of the El Torito boot catalog and the
enlarged ISO image size.

When mounted by Linux, the paths
   /mnt/iso/install.amd/xen/vmlinuz
   /mnt/iso/install.amd/xen/initrd.gz
lead to the content of $new_kernel and $new_initrd.

Then it depends on the inner doings of boot loader and starting system,
whether this perky change is tolerated.


Have a nice day :)

Thomas



Hi Thomas,

Thank you for these tips. I will use them to try to get a bullseye
Debian installer ISO working in a Xen HVM DomU next week
when I have some spare time and post the results here.

All the best,

Chuck



Re: Debian 11 installer crashed and reboot

2021-08-21 Thread Chuck Zmudzinski

On 8/19/2021 3:11 PM, Andy Smith wrote:

Hi Chuck,

On Tue, Aug 17, 2021 at 08:04:43AM -0400, Chuck Zmudzinski wrote:

After some testing of the Debian 11 installer on Xen
(using the debian-11.0.0-amd64-netinst.iso), I find that
this image only supports installation into a Xen PV guest,
the guest always crashes and reboots for either a BIOS
or OVMF boot into an HVM Xen guest.

Could you report this to Debian's Xen team as a bug? Perhaps it is
as simple as needing different kernel options in the netinst
installer kernel given that the full install works under HVM?


Would you also consider the fact that the OP also noted that the
live ISO also crashes and reboots in a Xen HVM guest a bug? My
thought is that both netinst and live amd64 ISOs should work on
a Xen HVM out of the box (OOTB). If I report a bug, I am inclined
to consider the bug to be that both netinst and live amd64 ISOs
crash in Xen HVM guests and the bug should not be closed until
both ISOs work OOTB in a Xen HVM guest on both a default
Xen/Dom0 stable and oldstable installation, so that users of
oldstable can use oldstable to quickly and easily test stable in a
Xen HVM guest. This would require, as I understand it, close
cooperation between the Xen team, the Qemu team, and the
Debian installer developers so those key parts of the Xen HVM
environment play nicely together with the Debian installer.

I also wonder if the bug should be reported to Debian installer
developers instead of to the Xen team.

Cheers,

Chuck



Re: Debian 11 installer crashed and reboot

2021-08-21 Thread Chuck Zmudzinski

On 8/21/2021 4:34 AM, Thomas Schmitt wrote:

Hi,

John Mok wrote:

As a quick fix on the make installer media work, how can I remake my own
installation ISO by recompil ing the kernel and initramfs ?

Chuck Zmudzinski wrote:

A quick solution would not even require any recompilation
of a kernel, since we know the kernel and ramdisk of
an installed bullseye system does work in a Xen HVM guest.
[...]
I am not familiar with the process that the debian installer team
uses to generate the installation ISOs, but if I wanted to learn
I would start by looking at
https://wiki.debian.org/DebianInstaller/CheckOut

If there are no checksums in the ISO which would cover the initially
booted kernel and the ramdisk, then you could also go the path of

   https://wiki.debian.org/RepackBootableISO

This article mainly shows how to determine the necessary arguments for
the ISO 9660 producing program. Nevertheless, in
   
https://wiki.debian.org/RepackBootableISO#Methods_to_overwrite.2C_delete.2C_or_add_files
it shows some ways how to do the desired manipulations of the ISO's
file tree.

I assume that questions about the entrails of a Debian installation ISO
are best asked at debian-cd mailing list. (Although two of the experts
there happen to be also our friendly list hosts here.)


Have a nice day :)

Thomas



This is how it should be - I am happy that Debian installer developers are
following the user list. There is no more important Debian user to support
than the user who tries to install Debian for the first time. It is the 
Debian

installer's job to try to ensure, as far as possible, that a new Debian user
will be able to quickly and easily install Debian on all supported 
platforms.

I presume that would include at least the bare hardware of the supported
architectures, things like docker/Linux containers and supported virtual
environments such as qemu/kvm and Xen. So the Debian installer developers
should always monitor the Debian user lists for problems that users are 
having

installing Debian in the supported computing environments.

Cheers,

Chuck



Re: Debian 11 installer crashed and reboot

2021-08-20 Thread Chuck Zmudzinski

On 8/21/2021 12:08 AM, Chuck Zmudzinski wrote:

On 8/19/2021 3:11 PM, Andy Smith wrote:

Hi Chuck,

On Tue, Aug 17, 2021 at 08:04:43AM -0400, Chuck Zmudzinski wrote:

After some testing of the Debian 11 installer on Xen
(using the debian-11.0.0-amd64-netinst.iso), I find that
this image only supports installation into a Xen PV guest,
the guest always crashes and reboots for either a BIOS
or OVMF boot into an HVM Xen guest.

Could you report this to Debian's Xen team as a bug? Perhaps it is
as simple as needing different kernel options in the netinst
installer kernel given that the full install works under HVM?


Hi Andy,

That is exactly what I think the problem is. I will look into it and 
see if

there is a simple solution like adding the correct kernel configuration
options and kernel modules to the kernel and ramdisk on the default
debian installer iso. The generic default amd64 iso should work in
Xen HVM guests.


The Debian Xen team is very under-resourced for human help and it
has been a long time since they have managed to keep the version in
stable to a recent and supported one upstream. If you run a Xen dom0
on Debian I think really you need to be building your own packages
or using the Debian Xen team's packages from sid.

The stable packaged 4.11 hypervisor is out of even security support
upstream so it's not really suitable for production use.


With bullseye released, that is oldstable now. Xen 4.14 is on bullseye
and I think Xen 4.15 is the latest release upstream, so it is not
too far behind now. I presume Xen 4.14 is still getting security patches
upstream, but I cannot find a good explanation of Xen's support
cycle on their website and I don't know if Debian can expect upstream
to support 4.14 until bullseye becomes oldstable in two years or so.


I found this page: https://xenbits.xen.org/docs/unstable/support-matrix.html

Xen 4.14 will have security support until 2023-07-24, which should cover 
most

of the time bullseye will be the stable version.

Chuck



I don't
think the Debian Xen team would recommend using it but would instead
suggest using their newer package that;s in sid (on stable) and
test/report bigs against that. But let's get this reported.


If/when I find the solution, I will post a bug report and see if the Xen
team can get the solution into the installer media for future bullseye
point releases. I already know the same problem exists on Xen 4.14
on bullseye, and AFAIK even sid has not bumped to 4.15 yet.


I'm not skilled enough in Debian package building to help the team
but I do still report bigs sometimes; for production use I am
building packages from newer upstream source.

For this problem I can't help as I don't run HVM guests (only PV and
PVH).


I always had difficulty with pygrub/pvgrub on PV domains, and using
bullseye's Xen-4.14 version, I could not boot the debian installer iso
with pygrub but had to extract the xen-enabled kernel and ramdisk to
Dom0 and boot them from within Dom0. I think this is another Xen
bug in the Xen-4.14 package that I also will investigate next week.
Probably some tweaks to the pygrub script are needed there.

I have always wanted to try out PVH domains, but have not done so
yet.


The Debian Xen team mailing list is at:
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-xen-devel


I will do some testing on this next week. I do want to help the Xen team
make Debian more Xen-friendly and will report these bugs, hopefully
sometime next week.

Cheers,

Chuck


Cheers,
Andy







Re: Debian 11 installer crashed and reboot

2021-08-20 Thread Chuck Zmudzinski

On 8/21/2021 12:42 AM, John Mok wrote:

Hi Chuck,

As a quick fix on the make installer media work, how can I remake my 
own installation ISO by recompil ing the kernel and initramfs ?


Can give me some directions ?


Not yet regarding what kernel options are needed, because
I have not done any tests yet to see which kernel configuration
options or modules might be missing that are needed by the
Xen HVM.

A quick solution would not even require any recompilation
of a kernel, since we know the kernel and ramdisk of
an installed bullseye system does work in a Xen HVM guest.

Therefore...

if you can build an iso that is the same as the installation
iso in every way except that it boots using the default Debian kernel
and ramdisk on the final installed system instead of the stripped
down kernels/ramdisks on the installation media, you should get an
iso that can boot the debian installer in a Xen HVM guest.

I am not familiar with the process that the debian installer team
uses to generate the installation ISOs, but if I wanted to learn
I would start by looking at

https://wiki.debian.org/DebianInstaller/CheckOut 
<https://wiki.debian.org/DebianInstaller/CheckOut>


and follow the instructions in the wiki checkout the source code
for the debian installer and from there you might be able to learn
how to build and modify a Debian installation ISO.

Regards,

Chuck

Chuck



Thanks a lot.

John Mok


On Sat, Aug 21, 2021, 12:08 Chuck Zmudzinski <mailto:brchu...@netscape.net>> wrote:


On 8/19/2021 3:11 PM, Andy Smith wrote:
> Hi Chuck,
>
> On Tue, Aug 17, 2021 at 08:04:43AM -0400, Chuck Zmudzinski wrote:
>> After some testing of the Debian 11 installer on Xen
>> (using the debian-11.0.0-amd64-netinst.iso), I find that
>> this image only supports installation into a Xen PV guest,
>> the guest always crashes and reboots for either a BIOS
>> or OVMF boot into an HVM Xen guest.
> Could you report this to Debian's Xen team as a bug? Perhaps it is
> as simple as needing different kernel options in the netinst
> installer kernel given that the full install works under HVM?
Hi Andy,

That is exactly what I think the problem is. I will look into it
and see if
there is a simple solution like adding the correct kernel
configuration
options and kernel modules to the kernel and ramdisk on the default
debian installer iso. The generic default amd64 iso should work in
Xen HVM guests.
>
> The Debian Xen team is very under-resourced for human help and it
> has been a long time since they have managed to keep the version in
> stable to a recent and supported one upstream. If you run a Xen dom0
> on Debian I think really you need to be building your own packages
> or using the Debian Xen team's packages from sid.
>
> The stable packaged 4.11 hypervisor is out of even security support
> upstream so it's not really suitable for production use.
With bullseye released, that is oldstable now. Xen 4.14 is on bullseye
and I think Xen 4.15 is the latest release upstream, so it is not
too far behind now. I presume Xen 4.14 is still getting security
patches
upstream, but I cannot find a good explanation of Xen's support
cycle on their website and I don't know if Debian can expect upstream
to support 4.14 until bullseye becomes oldstable in two years or so.
> I don't
> think the Debian Xen team would recommend using it but would instead
> suggest using their newer package that;s in sid (on stable) and
> test/report bigs against that. But let's get this reported.
If/when I find the solution, I will post a bug report and see if
the Xen
team can get the solution into the installer media for future bullseye
point releases. I already know the same problem exists on Xen 4.14
on bullseye, and AFAIK even sid has not bumped to 4.15 yet.
>
> I'm not skilled enough in Debian package building to help the team
> but I do still report bigs sometimes; for production use I am
> building packages from newer upstream source.
>
> For this problem I can't help as I don't run HVM guests (only PV and
> PVH).
I always had difficulty with pygrub/pvgrub on PV domains, and using
bullseye's Xen-4.14 version, I could not boot the debian installer iso
with pygrub but had to extract the xen-enabled kernel and ramdisk to
Dom0 and boot them from within Dom0. I think this is another Xen
bug in the Xen-4.14 package that I also will investigate next week.
Probably some tweaks to the pygrub script are needed there.

I have always wanted to try out PVH domains, but have not done so
yet.
>
> The Debian Xen team mailing list is at:
>
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-xe

Re: Debian 11 installer crashed and reboot

2021-08-20 Thread Chuck Zmudzinski

On 8/19/2021 3:11 PM, Andy Smith wrote:

Hi Chuck,

On Tue, Aug 17, 2021 at 08:04:43AM -0400, Chuck Zmudzinski wrote:

After some testing of the Debian 11 installer on Xen
(using the debian-11.0.0-amd64-netinst.iso), I find that
this image only supports installation into a Xen PV guest,
the guest always crashes and reboots for either a BIOS
or OVMF boot into an HVM Xen guest.

Could you report this to Debian's Xen team as a bug? Perhaps it is
as simple as needing different kernel options in the netinst
installer kernel given that the full install works under HVM?

Hi Andy,

That is exactly what I think the problem is. I will look into it and see if
there is a simple solution like adding the correct kernel configuration
options and kernel modules to the kernel and ramdisk on the default
debian installer iso. The generic default amd64 iso should work in
Xen HVM guests.


The Debian Xen team is very under-resourced for human help and it
has been a long time since they have managed to keep the version in
stable to a recent and supported one upstream. If you run a Xen dom0
on Debian I think really you need to be building your own packages
or using the Debian Xen team's packages from sid.

The stable packaged 4.11 hypervisor is out of even security support
upstream so it's not really suitable for production use.

With bullseye released, that is oldstable now. Xen 4.14 is on bullseye
and I think Xen 4.15 is the latest release upstream, so it is not
too far behind now. I presume Xen 4.14 is still getting security patches
upstream, but I cannot find a good explanation of Xen's support
cycle on their website and I don't know if Debian can expect upstream
to support 4.14 until bullseye becomes oldstable in two years or so.

I don't
think the Debian Xen team would recommend using it but would instead
suggest using their newer package that;s in sid (on stable) and
test/report bigs against that. But let's get this reported.

If/when I find the solution, I will post a bug report and see if the Xen
team can get the solution into the installer media for future bullseye
point releases. I already know the same problem exists on Xen 4.14
on bullseye, and AFAIK even sid has not bumped to 4.15 yet.


I'm not skilled enough in Debian package building to help the team
but I do still report bigs sometimes; for production use I am
building packages from newer upstream source.

For this problem I can't help as I don't run HVM guests (only PV and
PVH).

I always had difficulty with pygrub/pvgrub on PV domains, and using
bullseye's Xen-4.14 version, I could not boot the debian installer iso
with pygrub but had to extract the xen-enabled kernel and ramdisk to
Dom0 and boot them from within Dom0. I think this is another Xen
bug in the Xen-4.14 package that I also will investigate next week.
Probably some tweaks to the pygrub script are needed there.

I have always wanted to try out PVH domains, but have not done so
yet.


The Debian Xen team mailing list is at:
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-xen-devel

I will do some testing on this next week. I do want to help the Xen team
make Debian more Xen-friendly and will report these bugs, hopefully
sometime next week.

Cheers,

Chuck


Cheers,
Andy





Re: Debian 11 installer crashed and reboot

2021-08-17 Thread Chuck Zmudzinski

On 8/17/2021 8:04 AM, Chuck Zmudzinski wrote:

On 8/16/2021 4:25 AM, Andrew M.A. Cater wrote:

On Mon, Aug 16, 2021 at 02:30:33PM +0800, John Mok wrote:

Hi all,

Tried to install Debian 11 guest using netinst, but the installer
crashed and reboot automatically.

  Host: Xen 4.11.4 on Debian 10
Guest: Debian 11 (kernel 5.10)

Here is the steps to reproduce the problem:-
1) Either guest BIOS or OVMF boot
2) Select "Expert install" on installation menu

Then, the guest crashed and reboot.

Another try with the installer on Debian Live 11, it immediately
crashed and reboot.

Is it a installer bug or something ?

Thanks a lot.

John Mok

I think people would need many more details as to exactly what 
happens and

when it reboots.

So: You boot the installer - from just a .iso file / from the .iso 
flashed

to a USB? Can you show what works and at what point it fails?

The quick suggestion would be that it's something to do with Xen 
hypervisor
but I'm not in any better position than to guess, since I don't use 
Xen here.


I do know that none of the tests the media team do involve booting on 
Xen:
in most cases we prefer to run on real hardware. Occasionally, some 
of the

tests have to be run on KVM/QEMU. Xen as DomU  is untested then.

All the very best, as ever,

Andy Cater




After some testing of the Debian 11 installer on Xen
(using the debian-11.0.0-amd64-netinst.iso), I find that
this image only supports installation into a Xen PV guest,
the guest always crashes and reboots for either a BIOS
or OVMF boot into an HVM Xen guest.

I also found that the device model fails to start if one
tries to run the xen built-in vnc server for graphical
output. The only solution is to connect to the
Xen console using the xl console command. The -c
switch to xl create did not work to connect to the
Xen console when creating the guest; it could not
find the pty device, so it is necessary to let the guest
complete the startup and then run xl console 
to connect to the console once the VM is running.
This will display the first page of the debian installer
where the language is selected, and from there
Debian 11 can be installed onto a virtual disk.

The following lines in the xl.cfg file enabled the VM
to boot the debian-11.0.0-amd64-netinst.iso as a
PV Xen guest:

bootloader = 'pygrub'
bootloader_args= [ 
'--kernel=install.amd/xen/vmlinuz','--ramdisk=install.amd/xen/initrd.gz' 
]


I forgot one more essential tweak to get the VM to
boot the Debian installer under pygrub and xen: It was necessary
for the first disk to be the iso image, not the hard disk,
in the disk = [ ... ] directive in the xl.cfg file when booting from
the cd image. Otherwise, pygrub could not find the kernel and
initrd images. This is documented somewhere, but I don't remember
where, and the documentation for booting the debian installer
into Xen is really not very good.

Chuck Zmudzinski


Once installed and booting from the virtual disk, the
bootloader_args setting can be commented out.

After booting from the virtual disk, the grub-pc package can
be added to boot into a Xen HVM guest with BIOS booting,
and if space is left for an efi partition, the grub-efi package
can be installed to boot with OVMF after converting
the partition table of the virtual disk from MBR to GPT.

Also, the vnc server can be used for graphical output
after booting from the virtual disk to run a desktop
environment.

All in all, it is a big pain to install Debian 11 on the Xen
hypervisor using the debian installer, as it seems
supporting Xen installations is not a priority for Debian.

But once it is installed, it works very well on Xen, and
I find I can use the same bullseye image to boot it
as a Xen PV guest, a Xen HVM guest using BIOS boot,
or as a Xen HVM guest using OVMF boot just by tweaking
the xl.cfg configuration file after getting the image configured
for such a setup. I can even boot the same image on
the bare hardware by tweaking the initramfs-tools
configuration in the installed bullseye image.

Chuck Zmudzinski





Re: Debian 11 installer crashed and reboot

2021-08-17 Thread Chuck Zmudzinski

On 8/16/2021 4:25 AM, Andrew M.A. Cater wrote:

On Mon, Aug 16, 2021 at 02:30:33PM +0800, John Mok wrote:

Hi all,

Tried to install Debian 11 guest using netinst, but the installer
crashed and reboot automatically.

  Host: Xen 4.11.4 on Debian 10
Guest: Debian 11 (kernel 5.10)

Here is the steps to reproduce the problem:-
1) Either guest BIOS or OVMF boot
2) Select "Expert install" on installation menu

Then, the guest crashed and reboot.

Another try with the installer on Debian Live 11, it immediately
crashed and reboot.

Is it a installer bug or something ?

Thanks a lot.

John Mok


I think people would need many more details as to exactly what happens and
when it reboots.

So: You boot the installer - from just a .iso file / from the .iso flashed
to a USB? Can you show what works and at what point it fails?

The quick suggestion would be that it's something to do with Xen hypervisor
but I'm not in any better position than to guess, since I don't use Xen here.

I do know that none of the tests the media team do involve booting on Xen:
in most cases we prefer to run on real hardware. Occasionally, some of the
tests have to be run on KVM/QEMU. Xen as DomU  is untested then.

All the very best, as ever,

Andy Cater




After some testing of the Debian 11 installer on Xen
(using the debian-11.0.0-amd64-netinst.iso), I find that
this image only supports installation into a Xen PV guest,
the guest always crashes and reboots for either a BIOS
or OVMF boot into an HVM Xen guest.

I also found that the device model fails to start if one
tries to run the xen built-in vnc server for graphical
output. The only solution is to connect to the
Xen console using the xl console command. The -c
switch to xl create did not work to connect to the
Xen console when creating the guest; it could not
find the pty device, so it is necessary to let the guest
complete the startup and then run xl console 
to connect to the console once the VM is running.
This will display the first page of the debian installer
where the language is selected, and from there
Debian 11 can be installed onto a virtual disk.

The following lines in the xl.cfg file enabled the VM
to boot the debian-11.0.0-amd64-netinst.iso as a
PV Xen guest:

bootloader = 'pygrub'
bootloader_args= [ 
'--kernel=install.amd/xen/vmlinuz','--ramdisk=install.amd/xen/initrd.gz' ]


Once installed and booting from the virtual disk, the
bootloader_args setting can be commented out.

After booting from the virtual disk, the grub-pc package can
be added to boot into a Xen HVM guest with BIOS booting,
and if space is left for an efi partition, the grub-efi package
can be installed to boot with OVMF after converting
the partition table of the virtual disk from MBR to GPT.

Also, the vnc server can be used for graphical output
after booting from the virtual disk to run a desktop
environment.

All in all, it is a big pain to install Debian 11 on the Xen
hypervisor using the debian installer, as it seems
supporting Xen installations is not a priority for Debian.

But once it is installed, it works very well on Xen, and
I find I can use the same bullseye image to boot it
as a Xen PV guest, a Xen HVM guest using BIOS boot,
or as a Xen HVM guest using OVMF boot just by tweaking
the xl.cfg configuration file after getting the image configured
for such a setup. I can even boot the same image on
the bare hardware by tweaking the initramfs-tools
configuration in the installed bullseye image.

Chuck Zmudzinski



Re: Debian 11 installer crashed and reboot

2021-08-16 Thread Chuck Zmudzinski

On 8/16/2021 1:40 PM, Chuck Zmudzinski wrote:

On 8/16/2021 12:49 PM, Chuck Zmudzinski wrote:

On 8/16/2021 4:25 AM, Andrew M.A. Cater wrote:

On Mon, Aug 16, 2021 at 02:30:33PM +0800, John Mok wrote:

Hi all,

Tried to install Debian 11 guest using netinst, but the installer
crashed and reboot automatically.

  Host: Xen 4.11.4 on Debian 10
Guest: Debian 11 (kernel 5.10)

Here is the steps to reproduce the problem:-
1) Either guest BIOS or OVMF boot
2) Select "Expert install" on installation menu

Then, the guest crashed and reboot.

Another try with the installer on Debian Live 11, it immediately
crashed and reboot.

Is it a installer bug or something ?

Thanks a lot.

John Mok

I think people would need many more details as to exactly what 
happens and

when it reboots.

So: You boot the installer - from just a .iso file / from the .iso 
flashed

to a USB? Can you show what works and at what point it fails?

The quick suggestion would be that it's something to do with Xen 
hypervisor
but I'm not in any better position than to guess, since I don't use 
Xen here.


I do know that none of the tests the media team do involve booting 
on Xen:
in most cases we prefer to run on real hardware. Occasionally, some 
of the

tests have to be run on KVM/QEMU. Xen as DomU  is untested then.

All the very best, as ever,

Andy Cater



I can say bullseye runs fine as a Xen DomU on both the buster xen-4.11
hypervisor and the bullseye xen-4.14 hypervisor on my workstation, with
either BIOS or OVMF boot, but mine is a bullseye image upgraded from
buster several months ago. I have not tried the bullseye debian 
installer

on the xen hypervisor. Maybe for installing bullseye on xen you can try
installing buster first then upgrade it to bullseye if the debian 
bullseye

installer does not work on the xen hypervisor.

Chuck Zmudzinski



I would also ask if you have successfully booted another linux distro
(an earlier Debian or another distribution such as ubuntu) on your
Debian 10 xen-4.11.4 hypervisor. If not, the problem may be with your
xen configuration files on your Debian 10 host system, not with the
Debian 11 installer. Maybe some tweaks to the DomU xl.cfg configuration
file for your Debian 11 DomU or to the xen hypervisor boot options
(usually set in /etc/default/grub) might get it working.

Chuck Zmudzinski



I tested the debian-11.0.0-amd64-netinst.iso image on my Debian 10
xen-4.11.4 hypervisor using both OVMF and BIOS boot using an HVM
type Xen guest, and in both cases, I can confirm the same behavior as
the OP: crash and restart after selecting any of the installation options
from the grub menu that is displayed after booting. Nevertheless, a
full installation of Debian 11 boots and runs fine in the same environment
under Xen.

Browsing the files in the iso image, I can see there is a folder for xen:
/install.amd/xen with three files in it: vmlinuz, initrd.gz, and debian.cfg.

However, these files in the xen folder are never referenced anywhere from
the menu or submenu items in the /boot/grub/grub.cfg file on the iso image.
So a workaround would be to create an iso image with a menu entry in the
/boot/grub/grub.cfg file for an installation on xen, and that grub menu item
would be configured to load the vmlinuz kernel and initrd.gz image in the
/install.amd/xen directory.

It might also be possible to escape to the grub command shell
instead of selecting one of the installation options after booting and
manually enter the commands to load the xen-enabled kernel and initrd.gz
images in the /install.amd/xen folder on the netinst iso, but that is not
very user friendly, and I am not even sure if those images are mainly for
a PV type Xen guest rather that an HVM type Xen guest that really should
not need a special kernel or initrd image, but I could be wrong about that.

Also, the debian.cfg file in /install.amd/xen mentions the need to use an
iso image that supports installation under xen, and it references things
like multi-arch iso images which I don't think exist anymore in modern
Debian. Anyway, I suggest the OP read this debian.cfg file and try using
the suggestions there to get the debian 11 installer running under xen.

To summarize,  I do not think the Debian installer is designed for easy
installation under Xen, and it is not clear exactly which iso is needed, 
nor is it

clear which type of Xen guest should be configured (PV or HVM) to enable
installation of Debian 11 under Xen.

Chuck Zmudzinski



Re: Debian 11 installer crashed and reboot

2021-08-16 Thread Chuck Zmudzinski

On 8/16/2021 12:49 PM, Chuck Zmudzinski wrote:

On 8/16/2021 4:25 AM, Andrew M.A. Cater wrote:

On Mon, Aug 16, 2021 at 02:30:33PM +0800, John Mok wrote:

Hi all,

Tried to install Debian 11 guest using netinst, but the installer
crashed and reboot automatically.

  Host: Xen 4.11.4 on Debian 10
Guest: Debian 11 (kernel 5.10)

Here is the steps to reproduce the problem:-
1) Either guest BIOS or OVMF boot
2) Select "Expert install" on installation menu

Then, the guest crashed and reboot.

Another try with the installer on Debian Live 11, it immediately
crashed and reboot.

Is it a installer bug or something ?

Thanks a lot.

John Mok

I think people would need many more details as to exactly what 
happens and

when it reboots.

So: You boot the installer - from just a .iso file / from the .iso 
flashed

to a USB? Can you show what works and at what point it fails?

The quick suggestion would be that it's something to do with Xen 
hypervisor
but I'm not in any better position than to guess, since I don't use 
Xen here.


I do know that none of the tests the media team do involve booting on 
Xen:
in most cases we prefer to run on real hardware. Occasionally, some 
of the

tests have to be run on KVM/QEMU. Xen as DomU  is untested then.

All the very best, as ever,

Andy Cater



I can say bullseye runs fine as a Xen DomU on both the buster xen-4.11
hypervisor and the bullseye xen-4.14 hypervisor on my workstation, with
either BIOS or OVMF boot, but mine is a bullseye image upgraded from
buster several months ago. I have not tried the bullseye debian installer
on the xen hypervisor. Maybe for installing bullseye on xen you can try
installing buster first then upgrade it to bullseye if the debian 
bullseye

installer does not work on the xen hypervisor.

Chuck Zmudzinski



I would also ask if you have successfully booted another linux distro
(an earlier Debian or another distribution such as ubuntu) on your
Debian 10 xen-4.11.4 hypervisor. If not, the problem may be with your
xen configuration files on your Debian 10 host system, not with the
Debian 11 installer. Maybe some tweaks to the DomU xl.cfg configuration
file for your Debian 11 DomU or to the xen hypervisor boot options
(usually set in /etc/default/grub) might get it working.

Chuck Zmudzinski



Re: Debian 11 installer crashed and reboot

2021-08-16 Thread Chuck Zmudzinski

On 8/16/2021 4:25 AM, Andrew M.A. Cater wrote:

On Mon, Aug 16, 2021 at 02:30:33PM +0800, John Mok wrote:

Hi all,

Tried to install Debian 11 guest using netinst, but the installer
crashed and reboot automatically.

  Host: Xen 4.11.4 on Debian 10
Guest: Debian 11 (kernel 5.10)

Here is the steps to reproduce the problem:-
1) Either guest BIOS or OVMF boot
2) Select "Expert install" on installation menu

Then, the guest crashed and reboot.

Another try with the installer on Debian Live 11, it immediately
crashed and reboot.

Is it a installer bug or something ?

Thanks a lot.

John Mok


I think people would need many more details as to exactly what happens and
when it reboots.

So: You boot the installer - from just a .iso file / from the .iso flashed
to a USB? Can you show what works and at what point it fails?

The quick suggestion would be that it's something to do with Xen hypervisor
but I'm not in any better position than to guess, since I don't use Xen here.

I do know that none of the tests the media team do involve booting on Xen:
in most cases we prefer to run on real hardware. Occasionally, some of the
tests have to be run on KVM/QEMU. Xen as DomU  is untested then.

All the very best, as ever,

Andy Cater



I can say bullseye runs fine as a Xen DomU on both the buster xen-4.11
hypervisor and the bullseye xen-4.14 hypervisor on my workstation, with
either BIOS or OVMF boot, but mine is a bullseye image upgraded from
buster several months ago. I have not tried the bullseye debian installer
on the xen hypervisor. Maybe for installing bullseye on xen you can try
installing buster first then upgrade it to bullseye if the debian bullseye
installer does not work on the xen hypervisor.

Chuck Zmudzinski



  1   2   >