Re: dist-git proof of concept phase 2 ready for testing

2009-12-19 Thread Jeff Garzik


Sorry, if I missed this in previous messages...

Are the cvs tags going to become git tags, or git branches?  When I 
checked out ~48 hours ago, it seemed like everything was a git branch, 
which is not what I expected for the build tags.


kernel.org admins recommend either 'git tag -a' or 'git tag -s' tags, 
and not plain 'git tag'.


Jeff




--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: dist-git proof of concept phase 2 ready for testing

2009-12-19 Thread Jeff Garzik

On 12/19/2009 08:04 PM, Jesse Keating wrote:



On Dec 19, 2009, at 15:02, Jeff Garzik jgar...@pobox.com wrote:



Sorry, if I missed this in previous messages...

Are the cvs tags going to become git tags, or git branches? When I
checked out ~48 hours ago, it seemed like everything was a git branch,
which is not what I expected for the build tags.

kernel.org admins recommend either 'git tag -a' or 'git tag -s' tags,
and not plain 'git tag'.




The cvs tags should become gi tags. If they aren't I'll have to look
into it.


Yep, current pull looks fine that way.  Everything is git tags, with 
zero git branches.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Datacenter, git, and cvs

2009-12-14 Thread Jeff Garzik

On 12/14/2009 04:57 PM, Todd Zullinger wrote:

Mike Chambers wrote:

If I understand what is happening now (and over the past weekend),
the datacenter machines are moving to a new location, AND the
package building is moving from cvs to git (will be, or already in
process)?


Only the former is taking place now.  A move from cvs to git is being
tested but is not imminent.  I'm sure that it will be hard to miss
once that change is ready and implemented.


If done right, the move to git can still service CVS requests in some 
capacity...  that may make the transition a little less abrupt and painful.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: [RFC] unified i386/x86_64 install media.

2009-11-24 Thread Jeff Garzik

On 11/24/2009 08:31 PM, Matthew Miller wrote:

On Tue, Nov 24, 2009 at 06:17:08PM -0600, Dennis Gilmore wrote:

the goal for F-13 is to have unified media, for F-14 and beyond we could look
at other options like having a 64 bit kernel and 32 bit userland. i should
have stated that a bit more clearly



So would this mean one disk with two repositories on it, or is everything
mashed together all in one repository?


The current x86-64 has both 32-bit and 64-bit mashed together, so that 
sort of configuration would be more of the same.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: [RFC] unified i386/x86_64 install media.

2009-11-24 Thread Jeff Garzik

On 11/24/2009 09:58 PM, Matthew Miller wrote:

On Tue, Nov 24, 2009 at 09:19:22PM -0500, Jeff Garzik wrote:

So would this mean one disk with two repositories on it, or is everything
mashed together all in one repository?

The current x86-64 has both 32-bit and 64-bit mashed together, so that
sort of configuration would be more of the same.


Well, it's currently only half-mashed.


In Fedora 12, the i686 and x86-64 rpms are in the same directory, on the 
x86-64 DVD ISO.


That's sufficiently mashed for my purposes, but whatever... :)

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: [RFC] unified i386/x86_64 install media.

2009-11-24 Thread Jeff Garzik

On 11/25/2009 01:32 AM, Jesse Keating wrote:

On Nov 24, 2009, at 19:30, Jeff Garzik jgar...@pobox.com wrote:


On 11/24/2009 09:58 PM, Matthew Miller wrote:

On Tue, Nov 24, 2009 at 09:19:22PM -0500, Jeff Garzik wrote:

So would this mean one disk with two repositories on it, or is
everything
mashed together all in one repository?

The current x86-64 has both 32-bit and 64-bit mashed together, so
that
sort of configuration would be more of the same.


Well, it's currently only half-mashed.


In Fedora 12, the i686 and x86-64 rpms are in the same directory, on
the x86-64 DVD ISO.

That's sufficiently mashed for my purposes, but whatever... :)



Look closer. It is only a small subset of the i686 content in the x86_64
repo for multilib purposes.


That's merely a space issue, not any failure to or absence of mash

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Security policy oversight needed?

2009-11-20 Thread Jeff Garzik

On 11/20/2009 02:21 AM, Rudolf Kastl wrote:

there are also inconsistencies between gui clickery and shell usage...
simple example:

click shutdown in gnome just does it in f12


Yeah, you can do that in F11 as well :(

I agree, this needs protecting with a root password too.

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Security policy oversight needed?

2009-11-19 Thread Jeff Garzik

On 11/19/2009 09:03 AM, Chris Adams wrote:

Again, you are also making the assumption that desktop distro ==
single-user system, when the Fedora desktop work is going in the other
direction (making the desktop more multi-user friendly).  Many home
systems are now multi-user, and not everybody should be installing
software.


+1 agreed

A huge number of comments here, in the bugzilla, and elsewhere point to 
desktop spin == no root password logic being quite unpopular.


It needs to be an /option/ in the desktop spin, an option defaulted to 
OFF (== prompt for root pw).


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-19 Thread Jeff Garzik

On 11/19/2009 12:16 PM, Simon Andrews wrote:

Bill Nottingham wrote:

Jeff Garzik (jgar...@pobox.com) said:

This sounds like a tacit admission that the default install for
servers is bloody stupid (== same as desktop), unless the admin
REMOVES packages we helpfully installed on the server system.


PackageKit has only ever been included in destkop package groups.
While these groups are enabled by default, they are with the caveat of:

The default installation of Fedora includes a set of software
applicable for general internet usage.


I've just been and checked on our servers, which were installed with
minimal packages and never used for desktop activities and found two of
them with PackageKit installed.

Looking at the dependencies there is nothing on those machines which
currently requires PackageKit so it could be cleanly removed, but
something has pulled this in as a dependency in the past.

Both of these machines have been through sequential upgrades from around
FC3.

Changing the behaviour of PackageKit would certainly affect me and I've
never explicity installed it.


Indeed.  This issue is giving Fedora a major black eye in security.

And this major security issue -- where admins upgrade into insecurity -- 
is just hand-waved away even though it applies to a lot of situations.


As Kevin K noted, it is completely illogical that the presence or 
absence of a package (PackageKit) dictates security, or lack thereof.


Desktop spin or not, you need to prompt for a root password by default, 
unless the user has opted INTO a lowered security policy.


Ironically, even Microsoft Windows Vista is smart enough to ASK if you 
want a loose or tight security policy.  Fedora 12 just assumes you want 
a loose policy.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-19 Thread Jeff Garzik

On 11/19/2009 03:59 PM, Peter Jones wrote:

On 11/19/2009 03:37 PM, Jeff Garzik wrote:

On 11/19/2009 12:16 PM, Simon Andrews wrote:

Bill Nottingham wrote:

Jeff Garzik (jgar...@pobox.com) said:

This sounds like a tacit admission that the default install for
servers is bloody stupid (== same as desktop), unless the admin
REMOVES packages we helpfully installed on the server system.


PackageKit has only ever been included in destkop package groups.
While these groups are enabled by default, they are with the caveat of:

The default installation of Fedora includes a set of software
applicable for general internet usage.


I've just been and checked on our servers, which were installed with
minimal packages and never used for desktop activities and found two of
them with PackageKit installed.

Looking at the dependencies there is nothing on those machines which
currently requires PackageKit so it could be cleanly removed, but
something has pulled this in as a dependency in the past.

Both of these machines have been through sequential upgrades from around
FC3.

Changing the behaviour of PackageKit would certainly affect me and I've
never explicity installed it.


Indeed.  This issue is giving Fedora a major black eye in security.

And this major security issue -- where admins upgrade into insecurity --
is just hand-waved away even though it applies to a lot of situations.


Seriously, quit spreading this it's hand-waved away FUD.  Elsewhere in
the thread, notably without your participation, people have started


I'm in the thread; I guess that's another thing you are hand-waving away.



discussing both guidelines for how polkit policy should work and also
mentioned that they're going to bring this specific case up at the next
FESCo meeting and try to deal with it.

So seriously, quit pontificating about how your opinion is the truth,
the way, and the light, and start reading what others are saying.  It's
not as you seem to think is is.


These are facts, not opinion:

* F11 with PK would prompt for a password
* F12 with PK does not

* Everyone upgrading to F12, with PK on their system, receives this 
wonderful gift of lessened security.


* The user is not warned of this change, either via upgrade tool or 
[gold] release notes.


* Judging by the reaction here and elsewhere, this change was NOT 
expected by the Fedora userbase.



Every second that ticks by, more people upgrade into insecurity, with no 
warning besides a slashdot thread.  This is a secalert issue.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Vote for the bug (was Re: Local users get to play root?)

2009-11-19 Thread Jeff Garzik


Note to all...

Please add your vote to 
https://bugzilla.redhat.com/show_bug.cgi?id=534047 (Active local console 
users get to install signed software on a machine they do not have the 
root password to)


I agree with Rahul that it is less productive to +1 on this email thread.

Jeff




--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Vote for the bug (was Re: Local users get to play root?)

2009-11-19 Thread Jeff Garzik

On 11/19/2009 07:48 PM, Jesse Keating wrote:

On Nov 19, 2009, at 13:51, Jeff Garzik jgar...@pobox.com wrote:

Note to all...

Please add your vote to
https://bugzilla.redhat.com/show_bug.cgi?id=534047 (Active local
console users get to install signed software on a machine they do not
have the root password to)

I agree with Rahul that it is less productive to +1 on this email
thread.



Yes because what we really need here is more noise...

Please do /not/ pile on to the bug. It will not help no matter what your
opinion is.


huh?

Are you not familiar with the concept of bugzilla votes?  Try clicking 
on the '(vote)' link sometime.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Vote for the bug (was Re: Local users get to play root?)

2009-11-19 Thread Jeff Garzik

On 11/19/2009 08:25 PM, Jeff Spaleta wrote:

On Thu, Nov 19, 2009 at 4:15 PM, Jeff Garzikjgar...@pobox.com  wrote:

Are you not familiar with the concept of bugzilla votes?  Try clicking on
the '(vote)' link sometime.


I'm not aware of a workflow or policy which takes into account
bugzilla votes in Fedora.  Individual maintainers may or may not
consider votes when prioritizing how they use bugzilla, but there's
certainly nothing that I am aware that suggests that highly voted on
bugs are subject to high level review or discussion as a part of
project management.  I fear that you are encouraging people to vote
with the expectation that the vote will matter in some way when it may
not.


Valid points.

However, I reject the implied notion that ALL feedback from Fedora users 
must be stifled -- which is the only conclusion one may draw from Fedora 
leaders asking people to (a) not comment on the list, and (b) not 
comment on the bug.


I'm curious what Fedora leaders think is the proper forum for __Fedora 
users__ to register complaints against this policy.  Voting seems to be 
the most efficient, and least spam-y method of doing so, but I am open 
to suggestions!


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Vote for the bug (was Re: Local users get to play root?)

2009-11-19 Thread Jeff Garzik

On 11/19/2009 09:20 PM, Jeff Spaleta wrote:

On Thu, Nov 19, 2009 at 4:34 PM, Jeff Garzikjgar...@pobox.com  wrote:

I'm curious what Fedora leaders think is the proper forum for __Fedora
users__ to register complaints against this policy.  Voting seems to be the
most efficient, and least spam-y method of doing so, but I am open to
suggestions!


Voting doesn't mean much if there's no agreement to process the votes.


No, you misunderstand the purpose of Bugzilla voting.



But I think you've failed to state something important.  I think what
you really want to know is how Fedora users can register complaints
meant to illicit an immediate response... faster than the turn around
one can obtain via a fesco meeting.  You want a 911 number to call,
instead of a town meeting to speak at.


No, that's not it at all.

I meant precisely what I said, no more, no less:  it makes ZERO sense to 
squelch Fedora users' feedback.  Fedora leaders are saying no feedback 
on fedora-devel and no feedback on the bugzilla, and now, no Bugzilla 
voting.


Bugzilla voting was created precisely so that users could raise the 
profile of a bug and register their voice, without adding actual noise 
to the discussion.  Similar to like links on Facebook.


Fedora users -- keep on voting, that is why the feature exists.

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik


Sorry, but this default (desktop users can install pkgs without root) is 
just stupid.  It is antithetical to all standard security models that 
have come before in Fedora and other Linux distributions.


Instead of shielding yourselves with silly arguments about the lack of 
lock-and-key on a desktop machine, ask yourself how many decades-old 
assumptions you are wiping in one fell swoop.  It's no excuse to give 
viruses, pranksters and other vectors easy access to Fedora.


Even Microsoft Windows asks for elevated privileges for this sort of thing!

This is just shameful.

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 12:45 PM, Bastien Nocera wrote:

On Wed, 2009-11-18 at 18:08 +0100, nodata wrote:

Yikes! When was it decided that non-root users get to play root?

Ref:
   https://bugzilla.redhat.com/show_bug.cgi?id=534047

This is horrible!


Seems fair as the default for a desktop installation.

Once we get the new user management stuff into F13 [1], we'd probably
tighten that rule so that only admins are given the option, or all users
but with the need to authenticate as an admin.


No, the sane security answer is to least privileges as-is (require root) 
until your new user management stuff is ready.


Re-read your own post, and realize you proposed:

FC1+: secure
F12: insecure
F13+ secure again

This is a hugely inconsistent security policy, a special case that 
administrators must un-learn and re-learn as they go through Fedora 
versions.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 01:04 PM, Seth Vidal wrote:

On Wed, 18 Nov 2009, Jon Ciesla wrote:

Seth Vidal wrote:

You have PackageKit installed on servers? really?



I do if it's in the default DVD install, or was pulled in in an
upgrade. I've never intentionally installed it, and yes I do. Never
imagined it would be a problem. I'll remove it.



Maybe you and I have a different concept of 'Servers'. But I tend to
install @core only and then remove items whenever I can for a server.



This sounds like a tacit admission that the default install for servers 
is bloody stupid (== same as desktop), unless the admin REMOVES packages 
we helpfully installed on the server system.


Does that sound like good engineering to you?

Sorry, this new policy is wildly inconsistent, a special case that will 
change in F13, we are told.  It is wholly different from the entire 
history of Linux distributions.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 01:28 PM, Seth Vidal wrote:

I didn't say it did - I said it didn't make sense to have items like PK
on servers.



Listen to yourself.

The above is a blatant admission that it is REALLY EASY for existing 
users to upgrade themselves into a security nightmare.


* F11 w/ PK: requires root
* F12 w/ PK: does not require root

And you don't see any problem with this?

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 01:23 PM, Seth Vidal wrote:



On Wed, 18 Nov 2009, nodata wrote:


Am 2009-11-18 19:18, schrieb Colin Walters:

This is a major change. I vote for secure by default.

If the admin wishes this surprise-root feature to be enabled he can
enable it.


I'm not sure how this is 'surprise root'. IT will only allow installs of
pkgs signed with a key you trust from a repo you've setup.

which pretty much means: if the admin trusts the repo, then it is okay.

if the admin doesn't trust the repo it should NOT be on the box and
enabled b/c an untrusted repo can nuke your entire world.



By your own adminssion, we are talking about DESKTOP USERS.

How little social engineering + virus automation does it take to get 
such an install to include a malicious 3rd party repo?


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 01:41 PM, Konstantin Ryabitsev wrote:

2009/11/18 Simo Sorcesso...@redhat.com:

On Wed, 2009-11-18 at 13:19 -0500, Konstantin Ryabitsev wrote:

This significantly limits the number of users with powers to install
signed software -- almost to the point of where it sounds like a fair
trade-off. If someone has physical access to the machine, then heck --
it's not like they don't already effectively own it.


Most of my users wouldn't be able to own it even if I let a root shell
open, but they would definitely be able to install or remove packages
using the GUI.

The difference is huge.


If I have physical access to your machine, I'll own it. I may have to
use tools to get to the HDD, but it's only a question of time and
dedication.

Now, there can be situations where someone has access to the TTY
console or GDM (usually when it's a VM guest or a machine behind a
network KVM), but most often, if someone can log in on the console,
they are sitting in front of the physical box, to which they have full
access.


Console access is no excuse for a completely lax security policy. 
Didn't Microsoft Windows teach us all that?


In the real world(tm), hacking via console access still means there are 
a lot of hurdles you must dodge, like making noise while opening the case.


This new policy completely screws multi-user setups where (for example) 
kids are given a login to play games -- but I sure don't want them to be 
installing packages.  Now, pkgs installs for them are trivial.


The physical argument by policy proponents is the real straw man:

F12+PK lowers the security barrier from difficult to a simple mouse 
click.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 02:26 PM, Bob Arendt wrote:

On 11/18/09 12:03, Konstantin Ryabitsev wrote:

2009/11/18 Simo Sorcesso...@redhat.com:

If I have physical access to your machine, I'll own it. I may have to
use tools to get to the HDD, but it's only a question of time and
dedication.


*you* are not one of my users, and this has nothing to do with *you*
hacking in my machine. If I have physical access to a machine I do not
even care about what's installed on it. In 99% of the cases I will just
be able to boot from a live cd. That's a completely different issue.


Well, then we're violently agreeing about the same thing.

Anyway. It doesn't look like this is a change in Fedora policy,
because it clearly caught everyone off-guard. Looks like PK developer
made an executive decision and it's up to us to either issue an update
to revert to the previous behaviour, or to continue debating whether
allowing local console users to install trusted software from trusted
repositories is a sane security trade-off.


I haven't tried .. but does this this also include the capability for
my grade-school child to *remove* software using their account?
Like gcc? glibc? gdm? All fun activities ...



They sure can install all the naughty software you've forbidden on that 
machine.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 02:53 PM, Casey Dahlin wrote:

The answer is: because being associated with a login on the local console 
doesn't verify that it is a /user/ in control.


Bingo.

I guess everyone else missed that day in Security 101 class.

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 03:25 PM, Colin Walters wrote:

On Wed, Nov 18, 2009 at 3:20 PM, Jeff Spaletajspal...@gmail.com  wrote:


I'm not sure enough sysadmins understand PolicyKit enough to
confidently generate local policy edits.  I think learning how to
implement site specific PolicyKit best practises by modifying unwanted
PackageKit's behavior is going to be a trial by fire introduction to
PolicyKit policy editting for a lot of admins. We saw the same sort of
learning curve frustration when hal policy was introduced that changed
how hardware was handled.


Having Yet Another access control system in HAL was precisely the
reason PolicyKit was created, so administrators can have one place to
find this stuff across the OS.


Rather irrelevant to our current problem, unfortunately.

Admins will upgrade to F12 not knowning that PK policy defaults have 
changed.  They will upgrade into insecurity.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 04:34 PM, Seth Vidal wrote:

I said I do remove items from @core that I don't need. It was my way of
saying servers should have as little as possible on them.


You keep repeating this, as if your personal actions and situation are 
relevant.


How many existing installs out there have PK, and will get upgraded into 
insecurity?


How many admins will even known about this new F12 policy when they install?

At a minimum there should have been a big flashing warning in F12 
release notes, employing the blink tag, at the very top about this 
security change.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 04:46 PM, Seth Vidal wrote:

Jeff, I think you're misunderstanding, a lot, here. I'm not in favor of
user-can-install-pkgs. I'm just explaining why I don't think pk should
be on servers.


PK will be on F12 servers, because of upgrades and very poor 
communication of this new policy.


That is the reality of the situation.

/should/ is not relevant at all here.

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 05:14 PM, Richard Hughes wrote:

2009/11/18 Jeff Garzikjgar...@pobox.com:

How little social engineering + virus automation does it take to get such an
install to include a malicious 3rd party repo?


You need the root password to install from repos not signed by a key
previously imported, or if the package signature is wrong.


You forget we have botnets doing distributed cracking now.

Fedora just opened up a huge attack vector, for the users who are least 
equipped to understand the consequences.


And this enormous security hole of a policy change was done with next to 
/zero/ communication, making it likely that many admins will not even 
know they are vulnerable until their kids install a bunch of unwanted 
packages.


Jeff




--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 05:36 PM, Colin Walters wrote:

On Wed, Nov 18, 2009 at 5:18 PM, Jeff Garzikjgar...@pobox.com  wrote:


You forget we have botnets doing distributed cracking now.


But...if you've cracked the root password, there are rather easier
(and less audited) routes to trojaning the system than adding a third
party yum repository and downloading your malicious RPM.


I am talking about cracking signing keys, not root passwords.

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 05:38 PM, Richard Hughes wrote:

If you're deploying F12, then I really think you should know the
basics about PolicyKit.


should?

The F12 security policy is dumbed down to make life easier for users, 
making it easier for them to get by with -less- knowledge.  And yet you 
claim that education bar should be HIGHER than F10/F11?


That is unrealistic.

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 05:51 PM, Rahul Sundaram wrote:

On 11/19/2009 04:19 AM, Richard Hughes wrote:

2009/11/18 Seth Vidalskvi...@fedoraproject.org:

Richard,
  to be fair, when I asked you how to edit a .pkla file you couldn't tell me.
So, if our engineers don't know the basics, how should our users?


Fair comment. Release notes additions might be good in this regard.


It should have been announced and documented with the rationale for the
change *before* the release. Just pretending that everyone should know
about how PolicyKit works when documentation is just lacking doesn't cut
it. You didn't even respond to by bugzilla comment and just closed the


Agreed 100.1%.



bug. We will still do a post-release update for the release notes now
but that's scrambling to minimize damage.


The only thing that will fix the damage is to update PK, reverting the 
default-insecure policy.


May I remind folks that it is easy to UPGRADE INTO INSECURITY here. 
Admins with servers, coming from F10/F11, can very easily fall into this 
trap simply by updating their current systems.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 06:12 PM, Richard Hughes wrote:

2009/11/18 Eric Christensene...@christensenplace.us:

Has anyone drafted a notice to go out on the Announce List explaining
this vulnerability?  If admins don't know to fix/remove PK then they are
putting their systems at risk.


I'm really bored of this conversation. The bikeshed is blue. There are
much bigger problems in UNIX security than installing signed packages.
We don't set a grub password by default.


Signed does not mean bug-free.

Further, observe the broken logic:

Because local users might be able to break into the system with effort, 
it is pointless to have any safeguards at all.


[firefox|pidgin] exploit + PackageKit == trivial remote exploit.

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 07:23 PM, Bill Nottingham wrote:

Jeff Garzik (jgar...@pobox.com) said:

Sorry, but this default (desktop users can install pkgs without
root) is just stupid.  It is antithetical to all standard security
models that have come before in Fedora and other Linux
distributions.


Out of the box, a desktop user has the ability to shut down the machine.
This gives them the ability, out of the box, to:
- DoS everyone on it
- get a root shell
-- install whatever they want
-- put viruses on
- hell, slap in a livecd or USB key and reinstall the box


How is any of that justification for lowering the security bar to zero?

All of those you list are more technically complex than the current F12 
behavior -- letting the kids or guests click a button.


IFF this feature was listed as a question in firstboot, and
IFF this feature was explained in detail in release notes, then there 
would have been no problem at all...


You also omitted the case where admins of servers upgrade into a less 
secure policy.  PackageKit presence does not imply desktop user.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 07:34 PM, Jeff Garzik wrote:

On 11/18/2009 07:23 PM, Bill Nottingham wrote:

Jeff Garzik (jgar...@pobox.com) said:

Sorry, but this default (desktop users can install pkgs without
root) is just stupid. It is antithetical to all standard security
models that have come before in Fedora and other Linux
distributions.


Out of the box, a desktop user has the ability to shut down the machine.
This gives them the ability, out of the box, to:
- DoS everyone on it
- get a root shell
-- install whatever they want
-- put viruses on
- hell, slap in a livecd or USB key and reinstall the box


How is any of that justification for lowering the security bar to zero?

All of those you list are more technically complex than the current F12
behavior -- letting the kids or guests click a button.


And it ignores that remote exploits are now much easier, because remote 
non-root exploit + package install == remote root exploit.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 07:37 PM, Colin Walters wrote:

On Wed, Nov 18, 2009 at 7:36 PM, Jeff Garzikjgar...@pobox.com  wrote:


And it ignores that remote exploits are now much easier, because remote
non-root exploit + package install == remote root exploit.


No, the uid needs to have logged in through a physical console.



See references in multiple mails to firefox, pidgin, and any number of 
other example applications run by a uid logged in through a physical 
console.


Web browsers -- especially with bin-only flash -- are the most likely 
vector for remote exploits these days.  Far more so than any system daemon.


There are Real Good(tm) reasons why Firefox complains, if your Flash 
plug-in is out of date, even on Linux...


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Security policy oversight needed?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 07:37 PM, Mike McGrath wrote:

I think that's too subjective though.  I'd be more in favor of a simple,
broad view of what the user should be able to do without root.  It's
possible install packages would be on that list, it's possible not.
That way packages could ask themselves does this break the policy?  If
it doesn't, great.  If it does, time for a bug report.

Better then a review process because then everyone would generally know
what to expect.


Agreed, that makes more sense and is more scalable.

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 07:52 PM, Eric Christensen wrote:

I guess the big thing, to me, is that this vulnerability wasn't
presented, documented, or talked about and it is the opposite policy to
what most (all?) SYSADMINS would expect.  If you don't know to fix it
then you are pwned.


Bingo.  That is the crux of the dilemma.

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Local users get to play root?

2009-11-18 Thread Jeff Garzik

On 11/18/2009 07:45 PM, Mike McGrath wrote:

Stick with the facts, be clear about what you're
trying to accomplish (changing it back in F13?  Changing it back in F12?
Setting a policy so stuff like this doesn't happen again?)



1) We should recognize this new policy departs from decades of Unix and 
Linux sysadmin experience.


2) F12 policy should be reverted to F11, ASAP.  Possibly with a CVE.

3) Due to #1, F13+ should not deviate from the decades-old default.

4) Release notes should explain new [and after step #2, optional] policy 
in detail, including how to turn it off again.  Seth's laudable write-up 
efforts should not have been necessary -- that info should be prepared.


5) The people who want this new security policy should add an opt-in 
checkbox in Anaconda or firstboot.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


x86-64 on i386 (was Re: Promoting i386 version over x86_64?)

2009-11-18 Thread Jeff Garzik


Another data point for this thread:

Running a 64-bit kernel with a 32-bit userland is a common practice on 
non-x86 platforms, and non-Linux OS's.  For a lot of tasks, you simply 
do not need 64-bit pointers and a 64-bit process address space.  Both 
executable code and in-memory data structures tend to be smaller on 32-bit.


cp(1), for example, can be 32-bit as long as it supports O_LARGEFILE and 
off64_t.


Jeff




--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: x86-64 on i386 (was Re: Promoting i386 version over x86_64?)

2009-11-18 Thread Jeff Garzik

On 11/18/2009 09:56 PM, Roland McGrath wrote:

Another data point for this thread:


x86 is unlike other architectures because 64-bit also has twice as many
registers as 32-bit.  So you get to trade off the benefits of register
allocation across more registers against the memory/cache footprint of
64-bit pointers.


Absolutely.  x86-64 is definitely one of my favorite ISAs.  Worlds 
improvement from i386.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Promoting i386 version over x86_64?

2009-11-17 Thread Jeff Garzik

On 11/18/2009 01:32 AM, Gregory Maxwell wrote:

I noticed that http://fedoraproject.org/get-fedora appears to be
strongly promoting i386 Fedora over x86_64. Is this intentional or an
oversight?


I agree, that was my first impression as well.

However, if you just want a single download now button, 32-bit would 
get you the widest hardware coverage.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: buildsys Broken dependencies - libc

2009-11-16 Thread Jeff Garzik

On 11/16/2009 12:37 AM, Arthur G wrote:

Hi anyonewhocanhelp,
Just curious, is libc now an explicit dependency or should I buy a sense
of humour?
broken dependencies in the development tree:
On ppc:
xmlfy-1.5.0-1.fc12.ppc requires libc.so.6(GLIBC_2.4)
xmlfy-1.5.0-1.fc12.ppc requires libc.so.6
etc


Everyone is getting these emails, therefore I assumed it would be fixed 
by someone other than the package maintainers :)


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


How to update F12 packages?

2009-11-16 Thread Jeff Garzik


Project Hail[1] has three packages in F12, cld, chunkd and tabled, which 
need updating.


I successfully built cld: make build placed it into 
dist-f12-updates-candidate apparently.  But koji wait-repo is timing 
out after a two-hour wait, preventing me from building chunkd and tabled.


What do I need to do, to build updated chunkd and tabled packages on top 
of the new cld?


Does each dependency need its own bodhi update, or something?

I am hoping to avoid

- build cld
- submit bodhi update
- wait for update to be processed into repo
- build chunkd
- submit bodhi update
- wait for update to be processed into repo
- build tabled
- submit bodhi update
- wait for update to be processed into repo

Surely there is a faster way, for _clusters_ of dependent packages, such 
as Project Hail's?


Thanks,

Jeff



[1] http://hail.wiki.kernel.org/


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: How to update F12 packages?

2009-11-16 Thread Jeff Garzik

On 11/16/2009 09:42 PM, Orcan Ogetbil wrote:

On Mon, Nov 16, 2009 at 8:43 PM, Jeff Garzik wrote:


What do I need to do, to build updated chunkd and tabled packages on top of
the new cld?



You need to file a ticket to releng [1] and ask for buildroot
overrides as outlined in the guidelines somewhere I can't remember.

You need to provide them the name, version, release of the package you
want to have in the buildroot so you can build other packages on top
of that. Also let them know on what Fedora version(s) you want to have
your package tagged. See example [2].


Ticket filed, thanks for the advice.

It is a bit messy to file two tickets each time I build my packages, 
though :(


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Looking into LLVM

2009-10-28 Thread Jeff Garzik

On 10/28/2009 06:24 AM, Kevin Kofler wrote:

Jud Craft wrote:


On Mon, Oct 26, 2009 at 12:31 PM, Kevin Kofler wrote:

But this is about C++.


I don't mean to misunderstand, but if I recall from your very first
post in this thread...


Actually, the ABI issue is only if you use the C code generator, not the
native ones.


Hence I thought you were talking about ABI issues with C.


You misunderstood me. The C code generator is an LLVM *back*end, not a
frontend. The frontend is what recognizes the input language, the backend is
what defines the output LLVM generates.


I'm not up on how LLVM frontend integration works, so I actually don't
understand the distinction between the LLVM C Backend and the
native LLVM backends.


LLVM can either directly output machine code (native backend) for some
architectures or it can output preoptimized C code (especially for those
architectures which don't have a native backend). The latter is what the C
code generator or C backend does.


clang and all other LLVM language front-ends produce bitcode, which is 
virtualized machine code a la JVM.  LLVM backend generates 
processor-dependent machine code from processor-independent machine code.


The LLVM C __backend__ converts bitcode back into C...   something no 
idiot in their right mind would use for C++ or anything else.  The LLVM 
C backend is not commonly used.


The vast, vast majority of people trying to compile C++ programs with 
LLVM would either use

clang - llvm - asm code
or
llvm-gcc - llvm - asm code

Certainly not
Clang (C++) → LLVM → LLVM C backend → gcc [- asm code]

Regards,

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Looking into LLVM

2009-10-26 Thread Jeff Garzik

On 10/26/2009 10:45 AM, Adam Jackson wrote:

On Mon, 2009-10-26 at 19:07 +0530, Rahul Sundaram wrote:

On 10/26/2009 07:03 PM, Adam Jackson wrote:

On Sun, 2009-10-25 at 21:05 +0530, Rahul Sundaram wrote:

Has anyone been looking into building Fedora with it to see how the
performance impact is?


I'm going to go out on a limb here and say that the dominating factor in
our performance is the code itself.


I meant performance, primarily in terms of speed of compilation. Not the
code itself.


Suppose it's faster.  Say even by a factor of 100.  So what?  What
problem would that solve?


Personally I don't that compile speed is as interesting as new bugs the 
compiler is able to highlight, either through the compilation process or 
through the use of LLVM as a static analyzer.


But LLVM/clang is quite far away from building Fedora, so I do not think 
there's a need for people to get anxious.


I worked for a couple weeks on fixing LLVM, clang and Linux kernel bugs 
so that the kernel would build under clang.


Jeff







--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: thunderbird upgrade - wtf?

2009-10-14 Thread Jeff Garzik

On 10/14/2009 08:21 AM, Steve Dickson wrote:

On 10/13/2009 09:56 AM, Christopher Aillon wrote:


Not everyone had issues with the indexing so that seemed to slip past
testing.  It was a change, but didn't seem to disrupt things, so we let
it slide.

Not to pile on, believe me I know painful change is... 8-) but...

This new indexing is the biggest pain of all the changes IMHO...
My laptop CPU start to and continues to be pegged when I start up and
shut down TB3b... I could not read mail for 24hrs due to TPB3 trying
to indexing all my mail... Granted I have a ton of mail, in large number
of folders...  but my CPU became pegged, TPB3 start to eat all the memory,
causing everything to be swapped out, which caused the system to finally hang!!
This was happen continuously. So I figured the only way to get by this was to
delete mail... Which became a race between me deleting mail and TB3b try
to index that folder...  I have a feeling that scenario was not tested
too well... ;-)

So for you to say indexing didn't seem to disrupt things is simply
inaccurate... It was a major disruption and a complete waste of time...


Agreed.

Or put more simply, this bug fix update dropped an unexpected, 2+ 
gigabyte turd into my NFS-mounted home directory



[jgar...@bd ~]$ ls -l ~/.thunderbird/tc8ktlwu.default/global-messages-db.sqlite
-rw-r--r-- 1 jgarzik jgarzik 2731515904 2009-10-14 08:42 
/g/g/.thunderbird/tc8ktlwu.default/global-messages-db.sqlite


as well as slowing down all my NFS accesses for ~24 hours.

I hope a thunderbird update is being prepared, to make 2 config tweaks 
for F11?


And a warning / release note for F12 users, noting that a __lot__ of 
additional disk space is required in ~/.thunderbird.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


thunderbird rel-eng

2009-10-14 Thread Jeff Garzik

On 10/14/2009 10:31 AM, Jesse Keating wrote:

On Wed, 2009-10-14 at 09:27 -0500, Mike McGrath wrote:


The problem isn't GLODA and smart folders, it's that we have no process in
place to identify and deal with problems like this before it's too late.


Aside from updates-testing you mean, where people can test potential
updates and give feedback as to how they work on their systems?


Do you honestly believe this was a testing problem?

Long after F11 release, we had an update billed as a bug fix that included

1) a major UI change.

2) additional home directory disk space requirement, several GIGABYTES 
in size.  A non-trivial, on-going CPU usage requirement, as well.


3) global indexing which lumps together, in a single file, distinctly 
separate email accounts.  This potentially creates a LEGAL PROBLEM for 
end users.


These changes in the middle of a stable Fedora release are outside the 
bounds of normal, expected bug fixes.  That is simply not up to Fedora 
standards by any stretch of the imagination.


The above are major problems that should be caught by a release 
engineering process... the maintainer if nobody else.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: thunderbird upgrade - wtf?

2009-10-14 Thread Jeff Garzik

On 10/13/2009 09:56 AM, Christopher Aillon wrote:

Not everyone had issues with the indexing so that seemed to slip past
testing. It was a change, but didn't seem to disrupt things, so we let
it slide.

We are looking at reverting both in F11.



Global indexing introduces legal issues, disk space requirements and CPU 
requirements that extend beyond F11...


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: thunderbird upgrade - wtf?

2009-10-14 Thread Jeff Garzik

On 10/14/2009 11:35 AM, Michael Cronenworth wrote:

Jeff Garzik wrote:


Global indexing introduces legal issues, disk space requirements and CPU
requirements that extend beyond F11...




Maybe I'm a bit stupid, but what is the significance of how many files
your emails are stored in? Separating them out provides some sort of
security advantage?



Legally speaking, it is important, if I am ever called into court, to be 
able to show a distinct separation between my personal email and my 
NDA-heavy Red Hat email.  And, bboth of which must be separate from my 
micro-micro-corporation.


If one does not demonstrate intent at creating walls separating legal 
entities, it becomes a whole lot easier for a GarzikMicroCorp-related 
lawsuit to subpoena my personal and Red Hat email.


Separation of data is basic legal CYA.

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: thunderbird upgrade - wtf?

2009-10-14 Thread Jeff Garzik

On 10/14/2009 12:03 PM, Michael Cronenworth wrote:

I fully understand the separation of email accounts, but what I'm
getting at is the storage of your binary data on the hard disk. If you
keep any personal email on your hard disk, and the whole disk is
subpoenaed, your personal+RH email will be on it. The only safe way to
prevent that is to not use TB at all. It keeps caches of everything
whether you like it or not. In fact, it might be a cool feature to add
to TB - a corporate mode so to speak - that prevents any and all local
storage of email data.


That is why my cache points to a tmpfs location...  goes away after each 
reboot.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: thunderbird upgrade - wtf?

2009-10-13 Thread Jeff Garzik

On 10/13/2009 01:58 AM, Christopher Aillon wrote:

On 10/11/2009 09:46 AM, Rahul Sundaram wrote:

On 10/11/2009 10:03 PM, Michael Cronenworth wrote:


I do use TB (read my email headers). I fully understood that TB 3.0 was
in beta and could drastically change at any moment. I keep track of
their development as well so I was prepared for the changes that have
happened. If you expect beta software to act like stable software then
you need to update your dictionary.


Oh please. Expecting all Fedora thunderbird users to keep track of
upstream development of software included in Fedora is totally
ridiculous. The package maintainer made the judgement to include a beta
release of thunderbird. If major UI or other behaviour changes were
expected to follow in later revisions, it would have been wise to not
include the beta release in the first place. Otherwise, it would have
been easy enough to disable those couple of features we are talking
about in the update and avoid the hassle for users.


The changes were not expected. Actually, the fact that TB3 is still in
beta was not expected, since it was supposed to be released as a final
within a week of FF35. Clearly, things haven't been going as planned for
upstream and that's had an effect on Fedora, too. While the changes are
unfortunate, they have gone through testing, and I'll note that



er, huh?  What does that mean?

If testing had been done, then why were these two _blindingly obvious_ 
behavior changes pushed to F11?


Where did the process break down, then?

Did the package maintainer think that UI and indexing changes in the 
middle of a stable Fedora release are acceptable, general practice?


The indexing change has created a new wrinkle, too:  I separate my work 
and non-work email for LEGAL reasons.  Now the index has smushed those 
two together.  Lovely, fscking lovely...


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: thunderbird upgrade - wtf?

2009-10-11 Thread Jeff Garzik

On 10/11/2009 04:54 AM, Rahul Sundaram wrote:

It was ok to ship a beta release of thunderbird but updates shouldn't
cause such issues. If the fixes were necessary to push as updates then
it would have prudent to disable smart folders and indexing by
default and leave it enabled in Fedora 12.


Precisely.  F11 is supposed to be a stable release.  The sudden 
appearance of both smart folders and indexing was unexpected, disruptive 
and IMO did not achieve the desired quality level for a Fedora stable 
release upgrade.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


thunderbird upgrade - wtf?

2009-10-10 Thread Jeff Garzik


Just upgraded my F11 workstation, which included an upgrade to 
thunderbird-3.0-2.7.b4.fc11.x86_64


Without any prompting or warning, my email layout -- a key interface 
into my open source development workflow -- was changed to use something 
called smart folders.


Also annoying, though of less impact to me personally, was the decision 
(again, without prompting or warning) to index all of my email -- of 
which there is a considerable amount.


Now, I'm sure smart folders are a nifty new feature, but where was the 
warning about this upgrade?  Why was this done late in F11, rather than F12?


IMO, major MUA upgrades should be handled better than this.

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: PPC/PPC64 disabled in Koji for dist-f13

2009-09-30 Thread Jeff Garzik

On 09/28/2009 12:21 PM, Josh Boyer wrote:

Hi All,

As of today, ppc and ppc64 are no longer primary architectures in koji starting
with the dist-f13 tag.  This is in accordance with the FESCo approved demotion
of PowerPC starting with Fedora 13 development.

The dist-f12 and older tags continue to have them as primary.



Both ppc and ppc64 have been excellent at catching software bugs in my 
projects that long went unnoticed on i386/x86-64.


The lack of big endian builds by default is a notable loss, and will 
lead to a decline in software quality.


I think this is a net-negative for Fedora.

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: fp.o content via IPv6

2009-09-09 Thread Jeff Garzik

On 09/09/2009 09:48 AM, Seth Vidal wrote:



On Wed, 9 Sep 2009, Matt Domsch wrote:


We could instead advertise www.ipv6.fp.o and make people choose to use
v6 or not. Google does this today for exactly these reasons (failures
elsewhere in the network we can't control). Kind of defeats the
purpose though.


Why not do this and continue working on ipv6 on the rest of the systems?


rest of the systems == rest of the world.  could take a while :)

This is precisely IPv6's catch-22:  if providers don't implement IPv6, 
then end user networks won't get fixed.  If end user networks don't get 
fixed, providers won't implement IPv6.


The hosts that require an explicit hostname (ipv6.google.com) tend to 
get used very rarely, and are poorly integrated into the existing site.


There tend to be three main policy choices:

1) Work through the problems.  The ideal, and also the most difficult. 
The most irritating to end users.


2) Wikimedia approach:  deploy IPv6 as first class citizen for all 
engineer/admin services, where presumably the end user has some 
knowledge when delays or strange errors appear.  wait a bit to deploy 
IPv6 on main, public-facing, Windows-user-using sites.


3) Google DNS approach:  Whitelist networks that are IPv6-safe:  Using a 
feature such as BIND views, return  records, or not, depending on 
whether the querying system is in the whitelist.


A nice approach and OK for google, but IMO probably too much trouble and 
manual labor for fp.o.  An alternate approach, possibly viable for fp.o, 
could be to blacklist (== no  records returned in DNS) networks that 
are terminally broken.


If people wanted to pursue alt#3, I'm pretty sure BIND views will do the 
trick... they worked for me in the past, delivering two different 
versions of a zone depending on whether the querying party was 
external or internal to the network on which I deployed that config. 
http://www.oreillynet.com/pub/a/oreilly/networking/news/views_0501.html


Jeff


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: [PATCH] add apache IPv6 config options

2009-08-28 Thread Jeff Garzik

On 08/28/2009 05:11 PM, Matt Domsch wrote:

index 5c40c80..bd4480f 100644
--- a/modules/httpd/files/httpd.conf-rhel5p
+++ b/modules/httpd/files/httpd.conf-rhel5p
@@ -148,6 +148,7 @@ MaxRequestsPerChild1
  #
  Listen 0.0.0.0:80
  Listen 0.0.0.0:443
+Listen [::]:80


Two comments:

- wouldn't *:80 accomplish the same thing as two listen directives? 
Perhaps *:80 means that Apache binds, on Linux, to the 
slightly-more-efficient ipv6 socket, where ipv4 connections are 
ipv6-mapped (::10.20.30.40)?


- do you need a listen [::]:443 also?

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: [PATCH] add IPv6 addresses for apache VirtualHost stanzas

2009-08-28 Thread Jeff Garzik

On 08/28/2009 05:11 PM, Matt Domsch wrote:

From: Matt Domschmdom...@puppet1.fedora.phx.redhat.com

---
  manifests/servergroups/proxy.pp |   23 +++
  1 files changed, 23 insertions(+), 0 deletions(-)

diff --git a/manifests/servergroups/proxy.pp b/manifests/servergroups/proxy.pp
index bfa0481..eeb9e19 100644
--- a/manifests/servergroups/proxy.pp
+++ b/manifests/servergroups/proxy.pp
@@ -22,6 +22,7 @@ class proxy {
  66.35.62.162,
  80.239.156.214,
  152.46.7.221,
+[2610:28:200:1::fed0:1],
  ],
  server_aliases =  [ stg.fedoraproject.org ],
  ssl=  true,


No objection/comment on the IPv6 portion of this patch.

I'm surprised these highly repetitive address lists are not 
auto-generated from a flat file (or other database), though.


Jeff


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: [PATCH] change proxy4 IPv6 addresses to static scheme

2009-08-28 Thread Jeff Garzik

On 08/28/2009 05:11 PM, Matt Domsch wrote:

From: Matt Domschmdom...@puppet1.fedora.phx.redhat.com

---
  modules/bind/files/master/fedoraproject.org |3 ++-
  1 files changed, 2 insertions(+), 1 deletions(-)

diff --git a/modules/bind/files/master/fedoraproject.org 
b/modules/bind/files/master/fedoraproject.org
index 2327080..14eb8c3 100644
--- a/modules/bind/files/master/fedoraproject.org
+++ b/modules/bind/files/master/fedoraproject.org
@@ -168,8 +168,9 @@ posse8  INA 209.132.178.18
  posse9  INA 209.132.178.20
  proxy3  INA 66.35.62.162
  proxy4  INA 152.46.7.221
-proxy4  IN  2610:28:200:1:216:3eff:fe62:9fdd
+proxy4  IN  2610:28:200:1::fed0:1
  proxy4-2INA 152.46.7.222
+proxy4-2IN  2610:28:200:1::fed0:2
  proxy5  INA 80.239.156.214
  publictest1 INA 152.46.7.227
  publictest2 INA 152.46.7.228


Tangential issue...

How are IPv6 addresses assigned to proxy4[-2] ?

If they are statically set on the machine, all good.

If they are assigned via radvd or DHCPv6, you might want to consider 
some setup where the machine's IPv6 address is proactively pushed to the 
DNS servers.  One method is nsupdate + TSIG, which is pretty easy to set 
up on a fine-grained basis (ie. give a DNS key DNS update perms for 
_only_ the proxy4  addresses).


Otherwise, the dynamically-assigned IPv6 address on the host may not 
match the IPv6 address in DNS.


Jeff



___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: [PATCH] add apache IPv6 config options

2009-08-28 Thread Jeff Garzik

On 08/28/2009 05:11 PM, Matt Domsch wrote:

From: Matt Domschmdom...@puppet1.fedora.phx.redhat.com

---
  modules/httpd/files/00-namevirtualhost.conf |4 
  modules/httpd/files/httpd.conf-rhel5p   |1 +
  2 files changed, 5 insertions(+), 0 deletions(-)


another apache question...

will ipv6 addresses in log files choke any existing log analysis tools?

Jeff



___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: [PATCH] add IPv6 addresses for apache VirtualHost stanzas

2009-08-28 Thread Jeff Garzik

On 08/28/2009 07:36 PM, Mike McGrath wrote:

On Fri, 28 Aug 2009, Jeff Garzik wrote:


On 08/28/2009 05:11 PM, Matt Domsch wrote:

From: Matt Domschmdom...@puppet1.fedora.phx.redhat.com

---
   manifests/servergroups/proxy.pp |   23 +++
   1 files changed, 23 insertions(+), 0 deletions(-)

diff --git a/manifests/servergroups/proxy.pp
b/manifests/servergroups/proxy.pp
index bfa0481..eeb9e19 100644
--- a/manifests/servergroups/proxy.pp
+++ b/manifests/servergroups/proxy.pp
@@ -22,6 +22,7 @@ class proxy {
   66.35.62.162,
   80.239.156.214,
   152.46.7.221,
+[2610:28:200:1::fed0:1],
   ],
   server_aliases =   [ stg.fedoraproject.org ],
   ssl=   true,


No objection/comment on the IPv6 portion of this patch.

I'm surprised these highly repetitive address lists are not auto-generated
from a flat file (or other database), though.



I'm not quite sure what you mean but I am interested in a better way to do
this.  basically we've got 4 sites + staging.  As such, fedoraproject.org
could listen on 5 different addresses.  We have to enter them somewhere,
any ideas?


I was thinking in the m4-macro sense; looking at Matt's patch, it 
appears that a large number of virtual hosts have the same address list. 
 If so, it seems like some sort of macro substitution could be employed 
to match a list of virtual hosts with a set of addresses.


Not a big deal... just noting an above-average amount of copy/paste.

Jeff



___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Policy on removing %changelog entries?

2009-08-27 Thread Jeff Garzik
What is the policy regarding deletion of individual entries in the 
middle of %changelog?


A developer added a %changelog entry to each of my cloud daemons' 
packages, on the main fedora-cvs devel branch of each.


Then, a day or so later, after other %changelog entries had been added 
by me...  the same developer removed one %changelog entry from the 
middle of %changelog, and added another entry at the top.


I thought the policy was to never delete %changelog entries, ever?

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: IPv6 for Fedora services?

2009-08-26 Thread Jeff Garzik

On 08/27/2009 01:01 AM, Matt Domsch wrote:

I've done some more digging, and posted my findings on [1]
specifically that our torrent tracker doesn't support IPv6, though the
VM is on a machine that has a global IPv6 address.  I've started
looking at building opentracker, which is under a beerware license (so
acceptable).

[...]

Regarding bittorrent,

http://www.sixxs.net/tools/tracker/

And they link to
http://ipv6.niif.hu/index.php?mn=3sm=5lg=en
which is dead, but
http://ipv6.niif.hu/index.php?mn=3sm=5lg=en
which is alive, and contains some discussion of IPv6 and BT.



With what we have at iBiblio, we could enable ns2, proxy4, and
torrent1 pretty easily.


Nice!

Jeff


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: IPv6 for Fedora services?

2009-08-26 Thread Jeff Garzik

On 08/27/2009 01:06 AM, Tristan Santore wrote:

Matt,
I think the key issue is to get anything going. Anything is better than
nothing. When other providers roll IPv6 PAs out, then those locations
can be enabled, when available.
Of course there would also be the 6to4 option. Might also be smart, to
check if those providers offer a 6to4 gateway, then 6to4 tunneling,
could be used in the interim.


6to4 is definitely worth investigating, but there are a few downsides,

- gateway is often far away (you hint at this)

- it complicates firewalling; a site may need additional rules relating 
to wrapping, unwrapping and passing protocol IPPROTO_IPV6 (41) on the 
iptables (ie. IPv4 tables) side of things


It's definitely an option to consider, though...

Jeff


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Koji build failure with coreutils-7.5

2009-08-24 Thread Jeff Garzik

On 08/24/2009 03:11 AM, Jim Meyering wrote:

Jim Meyering wrote:

Todd Zullinger wrote:

I tried to build a git update into dist-f12-openssl earlier and had it
die in %doc with an error from cp¹:

cp: preserving times for 
`/builddir/build/BUILDROOT/git-1.6.4.1-1.fc12.i386/usr/share/doc/git-1.6.4.1/contrib/hooks':
 Function not implemented


Hi Todd,

This is because that latest version of coreutils tries to preserve
permissions on symlinks when it thinks that is possible.
It determines whether to try by testing at configure time for the
existence of the utimensat function.  If it can compile and link
against that function, then the resulting executable will call it
and report any failure.  The trouble is when you configure on a system
with recent libraries and headers, yet *run* with a kernel
that is old enough as to lack the syscall.


By the way, to those who maintain koji,

It is subtly dangerous to configure a package against headers and
libraries that are not well-matched with the kernel.
In this case, new headers/libraries suggest a function is available,
as detected by a standard autoconf function-existence check.
Yet only at run time do we detect (via surprising failure with ENOSYS)
that the kernel is too old to support the function that we were led
to believe would be available.  Here, it wasn't that big a deal,
but I can easily imagine this sort of mismatch leading to a more
serious problem.

It is fine to have a kernel *newer* than would be suggested by
headers/libraries.  Now you've seen why is risky to use one that is older.


Unfortunately this is quite common for build machines...  as it is easy 
to build any number of buildroots for any number of OS's.


But since one cannot chroot into a new kernel, to build with new 
libraries/headers, the kernel remains inevitably older than that which 
the machine builds.


The only other alternative I can think of is booting a virtual machine 
for each package build, which I imagine is probably too costly/painful 
to consider for koji...



Outside of koji, speaking as a kernel developer, people DO boot older 
kernels on newer userlands -- particularly if they are having a problem 
with their hardware.  So it is entirely possible that a run-time check 
for a newly-added syscall is the only way to make things work.  :( 
That's what people had to do with sendfile(2) for a long time.  I 
imagine most other newly-added Linux syscalls don't find their way into 
core daemons and utilities, so most people don't notice.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: IPv6 for Fedora services?

2009-08-23 Thread Jeff Garzik

On 08/23/2009 06:59 PM, David JM Emmett wrote:

A rather large ballache would also be ip6tables - I saw no mention in
your post - thought I'd throw it out there also.


Are you saying that IPv4 rules would need IPv6 counterparts, or 
something more?


Jeff


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: IPv6 for Fedora services?

2009-08-23 Thread Jeff Garzik

On 08/23/2009 04:50 PM, Matt Domsch wrote:

The automatic Internet2 detection will need some help too, as right
now the BGP tables I'm pulling from
   http://syslog.abilene.ucaid.edu/bgp/WASH/RIBS/
is only listing IPv4 addresses.


neat :) didn't know about this.



As for serving other content, if it's fronted by the proxy servers
(e.g. web content), then it should naturally start working via the
IPv6-enabled proxys.  Testing will prove that out.


Yep.

Though I would prioritize A+ web setups below other tasks, since web 
content has the greatest possibility of meeting a misconfigured user, 
who cannot figure out what went wrong.




For non-web content (git, cvs, ssh?), I believe this is mostly hosted
in PHX, which at this point we don't believe has native IPv6.  How can
we go about requesting such in the colo?  I presume this is something
that Red Hat IS would have to ask for on our behalf.  I'd much rather
try to get native going, instead of dealing with 6to4 (the nearest
6to4 server is 10 hops and 60+ms away) or tunnels.


Agreed...  unless native IPv6 is estimated to be years away.

Internal pushing at RH has yielded very little result...



fedorapeople is at BU, which has some native IPv6 capability, but it's
not clear they use it:
   http://www.mrp.net/IPv6_Survey.html

As for DNS servers (serving DNS over IPv6), we have:
ns1 is at serverbeach.


Best googled estimates are probably by the end of 2009



ns2 is at ibiblio.


That's the good news.  ibiblio has been experimenting with IPv6 for 
years:  http://theclassicalstation.org/press/2004_ipv6.shtml



Also, another DNS issue:  getting  glue records served by the .org 
registrar.




We'll need to know their native IPv6 capability before proceeding
there.  This is less critical, as most users are still doing their DNS
lookups to an IPv4 DNS server at their ISP.  But it would be nice.


Technically this is true... but it is also true that most users are 
still doing IPv4 ;)


I tend to look at DNS as a sooner rather than later hurdle, because 
that is the first link necessary to construct an all-IPv6 path to the 
destination servers.


Jeff


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: IPv6 for Fedora services?

2009-08-23 Thread Jeff Garzik

On 08/24/2009 01:17 AM, David JM Emmett wrote:

On 24 Aug 2009, at 02:47, Jeff Garzik jgar...@pobox.com wrote:


On 08/23/2009 06:59 PM, David JM Emmett wrote:

A rather large ballache would also be ip6tables - I saw no mention in
your post - thought I'd throw it out there also.


Are you saying that IPv4 rules would need IPv6 counterparts, or something more?



That is why ip6tables exists ;)


Yes; I would hope that a Linux kernel developer who has worked 
extensively in network (me) and the entire infrastructure team knows this.


Was trying to determine if your point is simply remember ipv6 rules, 
or something more detailed and explicit...


Regards,

Jeff


P.S.  Please don't top-post.

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: IPv6 for fedora services?

2009-08-17 Thread Jeff Garzik

On 08/16/2009 01:37 PM, Dennis Gilmore wrote:

While this is the completely wrong list to ask something like this on. fedora-
infrastructre list is the correct place.  there is currently no plans to roll


My apologies.  I have just subscribed to this list, and will re-send my 
query there.


It seemed to me that there was some relevance to fedora-devel, as we 
would need to get the IPv6-enabled technology in place, before the 
Fedora sysadmins can deploy it.




out IPv6 our upstream providers do no provide IPv6 connectivity. we could look
at using SIXXS or someone like it for ipv6 tunnels. but as of right now its
not being actively worked on. We do need to look into it at some point
however.  some mirrors are available via ipv6 . it would be nice to have
mirror lists available via it.  some services i know dont support ipv6.


Thanks,

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


IPv6 for Fedora services?

2009-08-17 Thread Jeff Garzik


Is there any IPv6 plan for *.fedoraproject.org ?

One plan chosen by projects (including wikimedia) is a staged rollout, 
like this:


1) enable IPv6 reachability and  records for DNS servers
2) enable IPv6 for small-audience or developer-only services, such as 
cvs/svn/git services

3) enable IPv6 for primary services, such as public web

Such staged rollouts attempt to balance the potential for service 
disruption due to end-user misconfiguration, with pushing technological 
progress foward.


As of today, for months, the DNS root servers are reachable via IPv6 and 
have  records.


Any chance we could look at step #1 or #2 for Fedora?

I am hoping that Fedora can be a leader rather than a follower in 
deploying this new technology.


Jeff

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: IPv6 for Fedora services?

2009-08-17 Thread Jeff Garzik

On 08/17/2009 10:01 AM, Mike McGrath wrote:

On Mon, 17 Aug 2009, Jeff Garzik wrote:

Is there any IPv6 plan for *.fedoraproject.org ?



There is currently no plan.


What needs to be done to create a plan, and move forward?

Jeff



___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


IPv6 for fedora services?

2009-08-16 Thread Jeff Garzik


Is there any IPv6 plan for *.fedoraproject.org ?

One plan that projects (including wikimedia) have chosen is a staged 
rollout,


1) enable IPv6 reachability and  records for DNS servers
2) enable IPv6 for small-audience or developer-only services, such as 
cvs/svn/git services

3) enable IPv6 for primary services, such as public web

Such staged rollouts attempt to balance the potential for service 
disruption due to end-user misconfiguration, with pushing technological 
progress foward.


As of today, for months, the DNS root servers are reachable via IPv6 and 
have  records.


Any chance we could look at step #1 or #2 for Fedora?

Jeff




--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Updates lacking descriptions

2009-08-13 Thread Jeff Garzik

Richard W.M. Jones wrote:

Now I agree that extending RPM to add metadata to mark the upstream
changelog file or URL would be an excellent idea.  It's a one-off
change to specfiles and means that we don't need to write the same
thing in every update - a win all round.

Suggestions:

  %doc(changelog): ChangeLog.txt
  Changelog-URL: http://example.com/changes.html


How would that work for changelogs stored in a git repository?

Jeff




--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: [ANNOUNCE] New Mixer Handling in PA 0.9.16/F12

2009-07-30 Thread Jeff Garzik

Lennart Poettering wrote:

Doing digital grabbing of is very reliable these days. The analog path
is just completely obsolete.


I guess it's an open question why HDA touts multi-analog and hw mixing 
as modern features, then :)


Modern hardware isn't all PCM either...

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: [ANNOUNCE] New Mixer Handling in PA 0.9.16/F12

2009-07-30 Thread Jeff Garzik

Lennart Poettering wrote:

On Thu, 30.07.09 19:06, Jeff Garzik (jgar...@pobox.com) wrote:


Lennart Poettering wrote:

Doing digital grabbing of is very reliable these days. The analog path
is just completely obsolete.
I guess it's an open question why HDA touts multi-analog and hw mixing  
as modern features, then :)


Oh does it? How about adding some references to this claim? Might be
actually convincing then.


http://www.intel.com/design/chipsets/hdaudio.htm

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: [ANNOUNCE] New Mixer Handling in PA 0.9.16/F12

2009-07-30 Thread Jeff Garzik

Lennart Poettering wrote:

On Thu, 30.07.09 19:37, Jeff Garzik (jgar...@pobox.com) wrote:


Lennart Poettering wrote:

On Thu, 30.07.09 19:06, Jeff Garzik (jgar...@pobox.com) wrote:


Lennart Poettering wrote:

Doing digital grabbing of is very reliable these days. The analog path
is just completely obsolete.
I guess it's an open question why HDA touts multi-analog and hw 
mixing  as modern features, then :)

Oh does it? How about adding some references to this claim? Might be
actually convincing then.

http://www.intel.com/design/chipsets/hdaudio.htm


Where do you see hardware mixing mentioned there? Or multi-analog?

I certainly cannot see that mentioned directly or indirectly in any
way on that page. 


Try the programmer's guide, for one.

If you are going to whine about googling, don't expect to be spoonfed 
knowledge you should already know.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: [ANNOUNCE] New Mixer Handling in PA 0.9.16/F12

2009-07-29 Thread Jeff Garzik

Lennart Poettering wrote:

On Wed, 29.07.09 09:47, Jeff Garzik (jgar...@pobox.com) wrote:


mixing is certainly the smallest part of it. Plese don't forget that
mixing is not exactly the most complex operation on earth.
Please don't forget that hardware mixing... is more than just mixing.  
Modern audio hardware can offload sample rate conversion, attenuation,  
3D processing, and other goodies.


Interesting in which parallel universe you must be living.

Modern audio hardware is usually locked to a specific sample rate, got
rid of all mixer controls by going to 24bit and letting the CPU
attenuate using the 8bit extra headroom. And 3d processing, and other
goodies aren't avilable in newer hw designs anymore either. In fact
haven't been available since quite some time in any design
anymore. (With the excption of those creative cards)


bzzt, sorry, thanks for playing.

The world has more to offer than 2005-era motherboard audio locked at 48K.

If you keeping bringing up Microsoft as a shining example, it might 
behoove you examine how DirectSound has evolved for modern audio.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: [ANNOUNCE] New Mixer Handling in PA 0.9.16/F12

2009-07-29 Thread Jeff Garzik

Adam Williamson wrote:

On Wed, 2009-07-29 at 08:51 -0500, Dr. Diesel wrote:


This is supported by the zillions of forum messages asking how to fix
or remove pulseaudio.  Not to mention the billion post thread here on
devel. 


In my experience, this is a more common pattern:

$POOR_NEWBIE: I have a problem with audio.
$RANDOM_'HELPFUL'_PERSON: Oh, you need to remove PulseAudio!

Removing PA is far too often jumped on as the 'obvious' fix for
resolving any kind of audio problem whatsoever. Even if it had nothing
to do with PA in the first place.


And?  Random helpful person quickly becomes ignored person, if the 
advice fails to work.


Problem is...  removing or disabling PA often -does- solve a problem.

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: F12 mass rebuild status

2009-07-29 Thread Jeff Garzik

Jesse Keating wrote:

http://jkeating.fedorapeople.org/failed-f12-rebuilds.html


chunkd should be fixed as soon as wait-repo permits :)

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: fedora 11 worst then ever release

2009-07-28 Thread Jeff Garzik

Adam Williamson wrote:

On Sun, 2009-07-26 at 13:50 +0200, Ralf Corsepius wrote:

The worst about it: Unless rel-eng finally releases updated Fedroa 11 
isos, the shameful situation about F11 installs will not see much 
improvements, because anaconda being FIXED UPSTREAM/RAWHIDE doesn't 
help FC11 users.


That would be why we've been rolling updates.img files for the most
serious anaconda issues, and documenting them on the Common Issues page.


IMO kernel issues should influence installer image updates, too...

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Updated Anaconda packages

2009-07-27 Thread Jeff Garzik

Rahul Sundaram wrote:

On 07/28/2009 01:11 AM, David Cantrell wrote:


The problem here is when do you stop generating new media to fix bugs in
F-11's installer and start working on F-12?  Never?  A week after F-11 GA?
What determines if an installer bug gets a fix in F-11 vs. not?

It's a gigantic waste of time for the installer team to release updates to
F-11's installer.  We can address those bugs in rawhide and have them
fixed in
the next stable release. 


Can you push the fixes as updates for Anaconda in Fedora 11? Fedora
Unity isn't the only one doing updated images. It is increasingly
becoming useful to have updated Anaconda packages available within the
official repository as updates. If the Anaconda team doesn't want to do
it, hand over that work to Jeroen van Meeuwen. He has already
volunteered to take care of it and since he is doing it anyway for the
unity images, his work could benefit more people. The only thing you got
to do is give him commit access.



Honestly, I always thought Fedora install images should be regenerated 
far more frequently.


I think back to my days as a Solaris sysadmin in the late 90's, where 
ordering the latest media kit (CD-ROM) from Sun meant I got a fresh 
installer, fresh kernel, and all recommended patches.


Even in the face of known Linux kernel bugs, people always seemed 
reluctant to regenerate the Fedora install images.  I think Fedora would 
better serve its users by being much more willing to update install 
images after initial release.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: F12 Alpha Blocker Bug Meeting: Friday 2009-07-24

2009-07-23 Thread Jeff Garzik

Adam Williamson wrote:
What: F12Alpha Blocker bug meeting 
(https://bugzilla.redhat.com/show_bug.cgi?id=f12alpha)

When: Friday, 2009-07-24 @ 15:00 UTC (11 AM EDT)
Where: #fedora-bugzappers

Yes, ladies and gentlemen, tomorrow marks the second blocker bug review
meeting for Fedora 12 Alpha. Please do come along to provide your
insight and wisdom as we go through the list of bugs blocking the Alpha
release (and probably do a quick sweep of those blocking the final
release, too). If you are aware of any bugs you think should block the
Alpha, please do set them to block 'F12Alpha' - and come to the meeting,
if you can, to chime in when we discuss them.



I can't come to the meeting, but I just added this one:
https://bugzilla.redhat.com/show_bug.cgi?id=512377

Upgrading nfs-utils disrupts ALL active NFS clients, and further, 
prevents them from re-connecting after the upgrade.


Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: F12 Alpha Blocker Bug Meeting: Friday 2009-07-24

2009-07-23 Thread Jeff Garzik

Adam Williamson wrote:

On Thu, 2009-07-23 at 17:53 -0400, Jeff Garzik wrote:

Adam Williamson wrote:
What: F12Alpha Blocker bug meeting 
(https://bugzilla.redhat.com/show_bug.cgi?id=f12alpha)

When: Friday, 2009-07-24 @ 15:00 UTC (11 AM EDT)
Where: #fedora-bugzappers

Yes, ladies and gentlemen, tomorrow marks the second blocker bug review
meeting for Fedora 12 Alpha. Please do come along to provide your
insight and wisdom as we go through the list of bugs blocking the Alpha
release (and probably do a quick sweep of those blocking the final
release, too). If you are aware of any bugs you think should block the
Alpha, please do set them to block 'F12Alpha' - and come to the meeting,
if you can, to chime in when we discuss them.


I can't come to the meeting, but I just added this one:
https://bugzilla.redhat.com/show_bug.cgi?id=512377

Upgrading nfs-utils disrupts ALL active NFS clients, and further, 
prevents them from re-connecting after the upgrade.


Going on strict criteria, this probably isn't an Alpha blocker (as it
doesn't stop the critical functions of the system working). It certainly
looks like a final release blocker, though. Anyway, I'll leave it on the
list and we'll discuss it at the meeting tomorrow and take appropriate
action. Thanks for contributing to the process!


[tone note:  not a sarcastic question...]

What are critical functions of the system?

I'd say access to one's filesystem is quite critical.  :)

Either way things go...  thanks!

Jeff


--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: F12 Alpha Blocker Bug Meeting: Friday 2009-07-24

2009-07-23 Thread Jeff Garzik

Jesse Keating wrote:

On Thu, 2009-07-23 at 18:12 -0400, Jeff Garzik wrote:

[tone note:  not a sarcastic question...]

What are critical functions of the system?

I'd say access to one's filesystem is quite critical.  :)

Either way things go...  thanks!


Outside the less popular cases of nfs mounted / or /home, you do not
need access to NFS mounted filesystems in order to login and update your
system.


Agreed -- though the consequences are quite severe in those cases.



https://fedoraproject.org/wiki/Critical_Path_Packages_Proposal speaks to
some of what we consider the critical path.


Thanks!

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


koji buildroot inconsistencies? chain-build does not fix...

2009-07-21 Thread Jeff Garzik


Fighting against in-buildroot-or-not? dependencies ;-)

I have three packages,
cld depends: none
chunkd  depends: cld
tabled  depends: cld chunkd

1) I updated all three packages in cvs devel (rawhide), and tagged them.

2) 'make build' on cld succeeded
   http://koji.fedoraproject.org/koji/taskinfo?taskID=1490075

3) Waited 45 minutes.

4) 'make build' on chunkd failed, because it was building against an
   outdated cld package.
   http://koji.fedoraproject.org/koji/taskinfo?taskID=1490259

5) So, I try chain-build, which is supposed to get dependencies right:

$ cd /spare/repo/fedora/tabled/devel# Fedora CVS for tabled
$ make chain-build CHAIN='cld : chunkd :'

   this fails, because cld is already built (step #2).

   http://koji.fedoraproject.org/koji/taskinfo?taskID=1490341

6) So, ok, I try chain-build without cld, since koji tells me it is
   already built:

$ make chain-build CHAIN='chunkd :'

   this fails, for the same reason as step #4 -- outdated cld.

   http://koji.fedoraproject.org/koji/taskinfo?taskID=1490371


If I build assuming up-to-date cld is in rawhide, it fails.
If I build NOT assuming up-to-date cld in rawhide, it fails.

How to fix this paradox?

I guess this is punishment for not using chain-build from the beginning...

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


review req: remaining 2 cloud computing daemons (simple, I promise)

2009-07-19 Thread Jeff Garzik


My little cloud computing project has three small server daemons, plus 
client libs, ready for Fedora.


Thanks to Mike Bonnet, the first package of three, cld, is now in 
rawhide (BZ# 511934).


The remaining two packages, chunkd (BZ# 511941) and tabled (BZ# 
511944), are practically the same as cld in package structure, build 
system, etc.  They are all small packages, around 10k LOC each IIRC.


I hope all that means it would be a quick and easy review for...  some 
helpful volunteer like you, gentle reader!  :)  Can anyone help me out?


Also, as mentioned in another thread, tabled requires both chunkd 
and cld in rawhide simply to build in koji.  Clearing that build 
dependency would be most helpful.


project homepage: http://hail.wiki.kernel.org/

cld (done): https://bugzilla.redhat.com/show_bug.cgi?id=511938
chunkd: https://bugzilla.redhat.com/show_bug.cgi?id=511941
tabled: https://bugzilla.redhat.com/show_bug.cgi?id=511944

Thanks,

Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: koji build dependencies in cloud computing project?

2009-07-16 Thread Jeff Garzik

Pete Zaitcev wrote:

On Thu, 16 Jul 2009 16:12:30 -0500, Dennis Gilmore den...@ausil.us wrote:

On Thursday 16 July 2009 03:58:37 pm Jeff Garzik wrote:



cld and chunkd built just fine in koji, but tabled does not:  it
BuildRequires both cld and chunkd.



Its not possible  you can only build against what is released in fedora


Do I understand it right that CLD has to get into Rawhide first, then?
And once it's established there, chunk and tabled can move in?


Until you submit your next batch of chunkd work upstream, both cld and 
chunkd are independent of any other dependencies...   :)   tabled can 
move in after those two, it appears.


Jeff



--
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list