[Tails-dev] Fix in tails-greeter

2013-09-03 Thread Andres Gomez Ramirez
Hi,

I just want to start contributing to Tails, so I selected an easy task:

https://labs.riseup.net/code/issues/5332

I have attached a patch for this.

cheers,

kurono




From cb204e5019823fcefca2d3191dc8ebacc3e64d96 Mon Sep 17 00:00:00 2001
From: kurono 
Date: Wed, 4 Sep 2013 00:13:10 +0200
Subject: [PATCH] Feature #5332

---
 glade/persistencewindow.glade |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/glade/persistencewindow.glade b/glade/persistencewindow.glade
index f4d8487..278ea7d 100644
--- a/glade/persistencewindow.glade
+++ b/glade/persistencewindow.glade
@@ -300,7 +300,7 @@
   
 True
 False
-gtk-info
+gtk-warning
 1
   
   
-- 
1.7.9.5

___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Please review'n'merge bugfix/unmount-persistent-volume-on-shutdown (#6228)

2013-09-03 Thread anonym
03/09/13 20:36, intrigeri wrote:
>> 2. Next, let me cite your git commit message:
> 
>>> The upstream live-boot initscript (shipped by live-config) doesn't know 
>>> about
>>> our persistent mounts (/live/persistence/*), since they are performed from 
>>> GDM,
>>> and not further moved to the same place as mounts done during initramfs are
>>> (/lib/live/mount/persistence/*).
> 
>> So, instead of patching boot-init.sh, why don't we make Tails Greeter
>> mount its persistent volumes in the same directory as live-boot? My
>> understanding is that our mount point is just an artifact of us using an
>> old (development) version of live-boot, which used that directory, at
>> the time Tails Greeter was extended with persistence support, but I may
>> be wrong.
> 
> I cannot find where *we* would be specifying /live/persistence as the
> mountpoint -- isn't live-boot doing this all by itself, and
> mount'ing --move to /lib/live/mount/persistence later?

I was confusing the fact that Tails Greeter, not live-persist, unlocks
the LUCKS volume with a similar-looking fantasy where it's Tails
Greeter, not live-persist, that mounts the unlocked volume. In the
latter case the live-boot code that live-persist runs would actually
reuse the mountpoint, and we'd get what I suggest. Sorry for the
confusion, I should have looked it up.

>> so I merged this into stable (and devel).
> 
> Great! I've updated the ticket accordingly, so that you know how to do
> it yourself next time:
> https://labs.riseup.net/code/issues/6228#note-12
> 
> However... I can't see this branch merged into stable and devel.
> I see other branches that were merged today, but not this one.
> Perhaps you forgot to push?

I did push... with the wrong branch merged. This is now reverted and the
correct branch is merged and pushed. Sorry for making it more difficult
to write the 0.20.1 changelog...

Cheers!

___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Limiting i2psvc to UDP through firewall

2013-09-03 Thread anonym
03/09/13 18:53, intrigeri wrote:
> Hi,
> 
> sajol...@pimienta.org wrote (31 Aug 2013 14:00:08 GMT) :
>> A Whisperback bug report is suggesting us to limit the user i2psvc to
>> send UDP through the firewall.
> 
> Looks mostly good (once it has comments), only one question below.
>
>> Here is a patch for that.

Unfortunately the premise of this patch is wrong; I2P uses *both* UDP
and TCP transport over the "clear" Internet [1]. If anything this change
will make Tails I2P clients stand out.

[1] http://www.i2p2.de/protocols.html (see the "Transport layer" bullet)

>> It also adds missing ports 7654 7658 for the
>> user amnesia to access some i2p services.
> 
> Once some commit message tells me what problem this solves, and what
> "some i2p services" are, then I'm happy to review this part.
> The design doc would need an update, likely, but this can probably
> wait for a future iteration.

For the record, the I2P FAQ has a comprehensive list of all ports (local
and external) used by I2P:

http://www.i2p2.de/faq.html#ports

TCP lo port 7654 is for I2CP [1], a client protocol, that no application
shipped in Tails depends on. I don't see any harm in white-listing it,
but it'll only be useful for users that actually install some
(non-supported) application that uses I2CP, and hence I don't see much
of a reason to either.

[2] http://www.i2p2.de/i2cp

TCP lo port 7658 gives local access to the I2P web server that can be
enabled to serve a personal eepsite (i.e. it's akin to a http Tor hidden
service), but a placeholder site is shown it's disabled. Note that the
I2P webserver is disabled by default in Tails. I suppose this would be
handy for users that enable it, but I'm not sure we want to support
that, especially since we're in hidden mode.

>> +outerface ! lo mod owner uid-owner i2psvc {
>> +proto udp ACCEPT;
>> +}
> 
> Any specific reason to only restrict on !lo?
> In other words, does I2P need to do TCP on the loopback interface?

I2P doesn't start any UDP lo listeners so such a restriction looks like
a valid firewall lockdown step. I think i2psvc at least needs access to
the service wrapper (TCP lo port 32000+, the first free one) for being
able to shut down cleanly.

---

While the above makes it clear that there's room for some more
fine-grained white-listing of which lo ports i2psvc (and debian-tor for
that matter) can access, I sadly think there's nothing in this patch
really worth merging at this point. Sorry, anonymous contributor. :(

Cheers!

___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Please review'n'merge bugfix/unmount-persistent-volume-on-shutdown (#6228)

2013-09-03 Thread intrigeri
hi,

anonym wrote (03 Sep 2013 17:43:42 GMT) :
> My tests show that an old Tails install that consistently had to do
> recovery after boot consistently didn't have to do recovery once
> upgraded to a version with the fix. With "consistently" I mean something
> like "three reboots", in boot cases (well, an extra we're you get a
> recovery for the latter scenario since it'd have to do deal with the
> mess from the last shutdown with the older version).

I'm glad you confirm this patch fixes the problem.

> I do, however, have a two questions:

> 1. I don't see how this unmounting performed in boot-init.sh deals with
> removing LUKS' DM mappings, which should prevent TailsData from being
> unmounted cleanly. The mappings are unmounted, and after that there's a
> sync, but is that enough? I don't see any mentions of recovery for the
> TailsData partition in syslog, so maybe it's all fine. Just something
> for consideration.

I believe that umount is enough to ensure the data is written to disk.

> 2. Next, let me cite your git commit message:

>> The upstream live-boot initscript (shipped by live-config) doesn't know about
>> our persistent mounts (/live/persistence/*), since they are performed from 
>> GDM,
>> and not further moved to the same place as mounts done during initramfs are
>> (/lib/live/mount/persistence/*).

> So, instead of patching boot-init.sh, why don't we make Tails Greeter
> mount its persistent volumes in the same directory as live-boot? My
> understanding is that our mount point is just an artifact of us using an
> old (development) version of live-boot, which used that directory, at
> the time Tails Greeter was extended with persistence support, but I may
> be wrong.

I cannot find where *we* would be specifying /live/persistence as the
mountpoint -- isn't live-boot doing this all by itself, and
mount'ing --move to /lib/live/mount/persistence later?

> so I merged this into stable (and devel).

Great! I've updated the ticket accordingly, so that you know how to do
it yourself next time:
https://labs.riseup.net/code/issues/6228#note-12

However... I can't see this branch merged into stable and devel.
I see other branches that were merged today, but not this one.
Perhaps you forgot to push?

> Sorry for the delay!

No worries, we're still far enough from the freeze to handle
a one-liner patch :)

Cheers!
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Please review'n'merge feature/More_uniq_built_iso_name_in_jenkins

2013-09-03 Thread bertagaz
On Tue, Sep 03, 2013 at 08:03:48PM +0200, intrigeri wrote:
> Hi,
> 
> berta...@ptitcanardnoir.org wrote (02 Sep 2013 10:59:48 GMT) :
> > Branch: feature/More_uniq_built_iso_name_in_jenkins
> > Ticket: #6248 (https://labs.riseup.net/code/issues/6248)
> 
> > 64f39f1 Use more unique iso name when building from jenkins.
> 
> > This commit introduces more unique iso name when building in jenkins so
> > that we will be able to keep several isos per day in our CI environment.
> 
> Yeah :)
> 
> [...]

All remarks have been corrected in a commit pushed in the same branch.
Didn't want to debate :)

bert.
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Impossible to install some packages on Tails through plain apt

2013-09-03 Thread intrigeri
Hi,

sajol...@pimienta.org wrote (31 Aug 2013 14:21:44 GMT) :
> So we might want to either:

> - Say this is a problem in general, and instead remove all those
> packages at the end of the build than setting them a -1
> pin priority.

OK, and sorry for causing this mess in the first place.
Well, I guess it was a useful optimization for a while.

And perhaps some day, live-build (or whatever we use by then) will
support preferences.d, and we can drop these -1 sections into
a dedicated file that we delete at the end of the build.

> - Review this list of packages on an ad-hoc basis.

I don't get what would be the goal of this review.

> I'm ready to propose a branch to implement any of those options.

Awesome!

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Trash on persistent volume

2013-09-03 Thread Alan
Hi,

On Sat, 31 Aug 2013 15:43:13 +0200 sajol...@pimienta.org wrote:
> As pointed out in a Whisperback report, there is currently no way of
> emptying the trash stored in the persistent volume without interacting
> with hidden files. I think that's an important usability issue.
> 
I confirm this issue and filed it as
https://labs.riseup.net/code/issues/6254

> When deleting a file from the Persistent folder it goes into a folder
> named `.Trash-1000` in the same Persistent folder.
> 
> Doing right-click on the Trash icon on the desktop, and choosing
> "Empty Trash" does not remove those files. Restarting Tails does not
> remove those files either. You have to know where those files are and
> navigate to that hidden folder in order to free space on your USB
> stick.
> 
> Without talking about the implementation details, what we could do is:
> 
> - Keep this trash on the USB stick, and have it persistent. But still
> have it taken into account when doing "Empty Trash".

That's what I would expect. That's in trash-spec[1] and is supposed to
be GNOME defaults behaviour on removable devices.

> - Move files out of the persistent volume into the main trash when
> doing "Move to trash" on the Persistent folder. So that trash won't be
> persistent and will be merged with the main trash. The files are
> removed whenever Tails is shut down.

Why not, but it's not what I would expect. That's also supported by
Freedesktop "Trash Can" specification[1].

> - Automatically empty the trash of the Persistent folder when shutting
> down; right before unmounting the persistence volume. I understand
> that this will not work when doing an emergency shutdown.
> 
I don't think this idea is as user friendly as the others are.

I'm up to have a look at this but I don't promise any deadline for now.
It someone feels like doing it, don't hesitate!

[1]. http://freedesktop.org/wiki/Specifications/trash-spec/

Cheers
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Please review'n'merge bugfix/unmount-persistent-volume-on-shutdown (#6228)

2013-09-03 Thread anonym
03/09/13 15:08, intrigeri wrote:
> intrigeri wrote (22 Aug 2013 13:25:18 GMT) :
>> please review'n'merge bugfix/unmount-persistent-volume-on-shutdown,
>> that fixes ticket #6228, into stable and devel.

My tests show that an old Tails install that consistently had to do
recovery after boot consistently didn't have to do recovery once
upgraded to a version with the fix. With "consistently" I mean something
like "three reboots", in boot cases (well, an extra we're you get a
recovery for the latter scenario since it'd have to do deal with the
mess from the last shutdown with the older version).

I do, however, have a two questions:

1. I don't see how this unmounting performed in boot-init.sh deals with
removing LUKS' DM mappings, which should prevent TailsData from being
unmounted cleanly. The mappings are unmounted, and after that there's a
sync, but is that enough? I don't see any mentions of recovery for the
TailsData partition in syslog, so maybe it's all fine. Just something
for consideration.

2. Next, let me cite your git commit message:

> The upstream live-boot initscript (shipped by live-config) doesn't know about
> our persistent mounts (/live/persistence/*), since they are performed from 
> GDM,
> and not further moved to the same place as mounts done during initramfs are
> (/lib/live/mount/persistence/*).

So, instead of patching boot-init.sh, why don't we make Tails Greeter
mount its persistent volumes in the same directory as live-boot? My
understanding is that our mount point is just an artifact of us using an
old (development) version of live-boot, which used that directory, at
the time Tails Greeter was extended with persistence support, but I may
be wrong.

If this makes sense, perhaps we should re-work
feature/consistent-peristence-path (also in the Tails Greeter repo) to
use the same persistence path, and then drop this chroot patch?

---

Even if 1 is something we care about this branch only makes the
situation better, and 2 is something we'd want in a new feature for a
major release, not a bugfix release like 0.20.1, so I merged this into
stable (and devel).

>> I've assigned the ticket to anonym for review, since he's the one who
>> knows our persistence code best, but I'm sure many others would be
>> able to grep for "recovery" in dmesg output, and confirm this patch
>> does what it pretends to :)
> 
> Ping? anonym, do you think you can do this in time for the freeze, or
> should I nag someone else?

Sorry for the delay!

Cheers!

___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Please review'n'merge feature/More_uniq_built_iso_name_in_jenkins

2013-09-03 Thread intrigeri
Hi,

berta...@ptitcanardnoir.org wrote (02 Sep 2013 10:59:48 GMT) :
> Branch: feature/More_uniq_built_iso_name_in_jenkins
> Ticket: #6248 (https://labs.riseup.net/code/issues/6248)

> 64f39f1 Use more unique iso name when building from jenkins.

> This commit introduces more unique iso name when building in jenkins so
> that we will be able to keep several isos per day in our CI environment.

Yeah :)

> +# * if jenkins build from a branch: 
> tails-$ARCH-$BRANCH-$VERSION-$COMMIT-$TIME.iso

s/jenkins/Jenkins/
s/build/builds/ for consistency with the above lines.

> +if [ ! -z "$JENKINS_URL" ]; then

`! -z' can simply be called `-n'.

> +
> BUILD_BASENAME="tails-${LB_ARCHITECTURE}-${CLEAN_GIT_BRANCH}-${AMNESIA_VERSION}-${GIT_SHORT_ID}-${AMNESIA_NOW}"

I'd rather see the time/date ($AMNESIA_NOW) inserted *before* the
commit ID, so that lexical sorting is still equivalent (among builds
from a given branch * version) to time-based sorting.

> +AMNESIA_NOW="`TZ=UTC date '+%Y%m%dT%H%MZ'`"

`date --utc' looks more robust to me, but it surely can be debatted.

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Improving Tails USB Installer messages when upgrading

2013-09-03 Thread Alan
Hi,

On Tue, 27 Aug 2013 19:44:16 +0200 sajol...@pimienta.org wrote:
> Someone sent us a Whisperback bug report to point the fact that the
> message of Tails USB Installer should be more reassuring when doing an
> upgrade on a USB stick with persistence.
> 
> "Your device already contains a LiveOS.
> If you continue, this will be overwritten.
> Press 'Next' if you wish to continue."
> 
> The installer doesn't actually specify that the persistent storage
> will be kept. This seems to be an important UX problem.
> 
I agree.

> A suggestion would be to have Tails USB Installer look at the USB
> stick and see if there's already a persistence volume. If there is,
> it should warn you that the Tails OS will get overwritten but the
> persistence volume will remain the same.
> 
Not sure I find it relevant to put energy to implement the checks. But
why not?

> Otherwise, without even changing the logic, the installer could have a
> line somewhere saying that the persistent storage will not be erased.
> 
That seems me easy and improving the situation (nearly) as much as the
other proposal; Something like:

Your device already contains a live operation system like Tails.
If you continue, this will be overwritten by a new Tails
version. Your persistent partition will be preserved.
Press 'Next' if you wish to continue.

> If we agree on that, I volunteer to do a preliminary patch.
> 
Either way you choose, i'll be happy to review it.

Cheers
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Installing Tails onto USB-Stick

2013-09-03 Thread Alan
Hi,
> 
> >  * I believe some kind of `sync' must be issued with `dd' too,
> > perhaps with oflags or something, isn't it?
> 
> I never experienced the need to do anything more than plain `dd`. Did
> you? I know Alan is a big `dd` fan, so I'm putting him in explicit
> copy as well so he speak out.
> 
No idea. I just use `dd  && sync`.

Cheers
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Trash on persistent volume

2013-09-03 Thread intrigeri
Possibly related: https://bugzilla.gnome.org/show_bug.cgi?id=604015

(Note the trash-cli package, if we need to go this far.)

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Should we avoid using the word bug?

2013-09-03 Thread intrigeri
Hi,

winterfa...@riseup.net wrote (25 Aug 2013 11:03:50 GMT) :
> I want to propose some wording improvements for whisperback and
> corresponding documentation.

I'm glad you do :)

> Right now, the desktop icon read as "Report a bug". Bug is a real and
> recognized word for software error, but it is also a real and recognized
> word for a kind of surveillance device secretly recording audio [1]. I
> therefore believe that the word "bug" may be confusing in the context of
> Tails.

> I don't know what applies for English, but in Swedish non-technical people
> tend to believe you talk about the listening device when you say "bugg". I
> think this mistake may exist in more languages, so I propose to change the
> desktop icon to read as "Report an error" instead.

> Likewise I want the text inside whisperback that now reads "Help us fix
> your bug!" to read "Help us fix your software error!" or even "Help us fix
> your software bug!". And similar for other instances of the word "bug".

I've no strong opinion about the whole thing, but I'd rather use
"problem" than "error".

Most "bugs" reported to Tails are really features (as in: result from
design choices), or problems caused by sub-optimal documentation and
reading. In both cases, they are real problems in the experience of
the reporter, but are not really software bugs.

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Trash on persistent volume

2013-09-03 Thread intrigeri
hi,

sajol...@pimienta.org wrote (31 Aug 2013 13:43:13 GMT) :
> As pointed out in a Whisperback report, there is currently no way of
> emptying the trash stored in the persistent volume without interacting
> with hidden files. I think that's an important usability issue.

Agreed.

> Without talking about the implementation details, what we could do is:

> - Keep this trash on the USB stick, and have it persistent. But still
> have it taken into account when doing "Empty Trash".

Hmm. This looks perfect. I guess upstream has already discussed this
3 times and decided against it for some good reason, or?

> - Move files out of the persistent volume into the main trash when doing
> "Move to trash" on the Persistent folder. So that trash won't be
> persistent and will be merged with the main trash. The files are removed
> whenever Tails is shut down.

This is likely too heavy on memory to be a reasonable
solution, unfortunately.

> - Automatically empty the trash of the Persistent folder when shutting
> down; right before unmounting the persistence volume. I understand that
> this will not work when doing an emergency shutdown.

This would seem acceptable to me. I'd be happier if we didn't have to
add more code to get some reasonable result, though.

Another way would be to just disable Trash on the persistent volume.
I've not read the Trash specification [1], and I've not tested it
either, but I've seen $someone_on_the_Internet suggest that creating
$PERSISTENCE/.Trash and/or $PERSISTENCE/.Trash-1000 as *regular* files
would be enough to achieve this.

[1] http://standards.freedesktop.org/trash-spec/trashspec-latest.html

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Limiting i2psvc to UDP through firewall

2013-09-03 Thread intrigeri
Hi,

sajol...@pimienta.org wrote (31 Aug 2013 14:00:08 GMT) :
> A Whisperback bug report is suggesting us to limit the user i2psvc to
> send UDP through the firewall.

Looks mostly good (once it has comments), only one question below.

> Here is a patch for that.

> It also adds missing ports 7654 7658 for the
> user amnesia to access some i2p services.

Once some commit message tells me what problem this solves, and what
"some i2p services" are, then I'm happy to review this part.
The design doc would need an update, likely, but this can probably
wait for a future iteration.

> +outerface ! lo mod owner uid-owner i2psvc {
> +proto udp ACCEPT;
> +}

Any specific reason to only restrict on !lo?
In other words, does I2P need to do TCP on the loopback interface?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Point the "Report a bug" desktop launcher to "Help & Support"?

2013-09-03 Thread intrigeri
Hi,

I hereby propose we have the "Report a bug" desktop shortcut link to
the local version of the "Help & Support" web page (either in Yelp or
in Iceweasel, I guess). WhisperBack could still be started from the
Applications menu.

(Below, I'm freely quoting someone else to support this proposal.
I hope you don't mind!)

The path we would like to see users go through is visiting the Tails
web site, and:

  Help & Support → Found a problem? → Found a bug?

This path includes: checking whether the problem is known already,
upgrading if needed, reading the bug reporting guidelines, etc.

Alternatively, we could simply remove this launcher on the grounds
that we already have a "Tails documentation" one.

Thoughts?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Improving Tails USB Installer messages when upgrading

2013-09-03 Thread intrigeri
Hi,

sajol...@pimienta.org wrote (27 Aug 2013 17:44:16 GMT) :
> The installer doesn't actually specify that the persistent storage will
> be kept. This seems to be an important UX problem.

Agreed.

> A suggestion would be to have Tails USB Installer look at the USB stick
> and see if there's already a persistence volume. If there is, it should
> warn you that the Tails OS will get overwritten but the persistence
> volume will remain the same.

This looks slightly over-engineered to me.

> Otherwise, without even changing the logic, the installer could have a
> line somewhere saying that the persistent storage will not be erased.

I like it: let's just add something along the lines of "Any persistent
volume on this stick will remain unchanged" (rephrased by our Great
Master of the Style Guide :) at upgrade time, regardless of whether
persistence is present or not.

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Please review bugfix/fix_virtualbox_dkms_build

2013-09-03 Thread intrigeri
Hi,

sajol...@pimienta.org wrote (25 Aug 2013 12:23:20 GMT) :
> If we think it is too hackish, we might try to apply the patch the
> hopefully fixes the build directly on older versions:

> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704130
> https://www.virtualbox.org/changeset/39224/

I think the "install libc6 and friends from unstable, then downgrade"
process is too hackish, and I don't want to be a release manager when
it breaks horribly due to changes in Debian unstable eight hours
before I build the final ISO.

> I need some guidance on what we think the best strategy would be here.

I propose we rebuild VirtualBox 4.2.16-dfsg-1~bpo70+1 in a Squeeze +
Xorg/squeeze-backports environment, upload the result to
squeeze-sloppy-backports, and use it: no version mismatch, we get
closer to what we'll get once based on Wheezy, we get closer to
#5606 (add virtualbox host software), and we don't have to carry the
packages in our APT repository. I'm glad to provide some guidance to
anyone who wants to do it, and I'll do the uploads as needed.

What do you think?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Please review'n'merge bugfix/unmount-persistent-volume-on-shutdown (#6228)

2013-09-03 Thread intrigeri
intrigeri wrote (22 Aug 2013 13:25:18 GMT) :
> please review'n'merge bugfix/unmount-persistent-volume-on-shutdown,
> that fixes ticket #6228, into stable and devel.

> I've assigned the ticket to anonym for review, since he's the one who
> knows our persistence code best, but I'm sure many others would be
> able to grep for "recovery" in dmesg output, and confirm this patch
> does what it pretends to :)

Ping? anonym, do you think you can do this in time for the freeze, or
should I nag someone else?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Fwd: Bug#719297 closed by Jérémy Bobbio (Bug#719297: fixed in ruby-packetfu 1.1.8-1)

2013-09-03 Thread intrigeri
hi,

ruby-packetfu was accepted in unstable => anonym, I'll let you update
the blueprint & tickets accordingly.


--- Begin Message ---
This is an automatic notification regarding your Bug report
which was filed against the wnpp package:

#719297: ITP: ruby-packetfu -- PacketFu is a mid-level packet

It has been closed by Jérémy Bobbio .

Their explanation is attached below along with your original report.
If this explanation is unsatisfactory and you have not received a
better one in a separate message then please contact Jérémy Bobbio 
 by
replying to this email.


-- 
719297: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719297
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-packetfu
Source-Version: 1.1.8-1

We believe that the bug you reported is fixed in the latest version of
ruby-packetfu, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 719...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
J�r�my Bobbio  (supplier of updated ruby-packetfu package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 24 Aug 2013 19:25:47 +0200
Source: ruby-packetfu
Binary: ruby-packetfu
Architecture: source all
Version: 1.1.8-1
Distribution: unstable
Urgency: low
Maintainer: Debian Ruby Extras Maintainers 

Changed-By: J�r�my Bobbio 
Description: 
 ruby-packetfu - PacketFu is a mid-level packet manipulation library for Ruby
Closes: 719297
Changes: 
 ruby-packetfu (1.1.8-1) unstable; urgency=low
 .
   * Initial release. (Closes: #719297)
Checksums-Sha1: 
 2e38645c227f5a4c0f41b27b644a10f4abfc6169 2094 ruby-packetfu_1.1.8-1.dsc
 8e58d0ff4b34ad9c75b51b63b87daafa23e8629d 750686 ruby-packetfu_1.1.8.orig.tar.gz
 7fe275eba27ca2193280fc34c6a230efdc329a3e 2786 
ruby-packetfu_1.1.8-1.debian.tar.gz
 80a5ceb40121fe41b0e3e695f2b2966464b9e3e5 682248 ruby-packetfu_1.1.8-1_all.deb
Checksums-Sha256: 
 dde5e9c7ca09ee427332c57fc830eab8d05398db8e3ed6a33386f653e7a4ede8 2094 
ruby-packetfu_1.1.8-1.dsc
 648c6d7c8764db2b14bdfc89f2b74f00c8c324556a9cc550afd1798c6e0a7be6 750686 
ruby-packetfu_1.1.8.orig.tar.gz
 d512c4f4418fb881ee45a08622eccc153fa473c82a2a8d992efb0d852c6abd60 2786 
ruby-packetfu_1.1.8-1.debian.tar.gz
 233e7c52cb51af19f6f2c2f9c3d6f0388cbd2bf0d5d830a8a497b1dab0d1659e 682248 
ruby-packetfu_1.1.8-1_all.deb
Files: 
 cc7495bdede675022514c2d784072309 2094 ruby optional ruby-packetfu_1.1.8-1.dsc
 d7f4a01f4cb24e446be59296e55e0e44 750686 ruby optional 
ruby-packetfu_1.1.8.orig.tar.gz
 fd688eca534e9fb4438877176b27991d 2786 ruby optional 
ruby-packetfu_1.1.8-1.debian.tar.gz
 abebdd0ef3e0da3759f6f0df57b731d3 682248 ruby optional 
ruby-packetfu_1.1.8-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=Tjbx
-END PGP SIGNATURE End Message ---
--- Begin Message ---
Package: wnpp
Severity: wishlist
X-Debbugs-Cc: pkg-ruby-extras-maintain...@lists.alioth.debian.org, 
tails-dev@boum.org

* Package name: ruby-packetfu
  Version : 1.1.8
  Upstream Author : Tod Beardsley
* URL or Web page : https://github.com/todb/packetfu & 
https://rubygems.org/gems/packetfu
* License : BSD
  Description : PacketFu is a mid-level packet manipulation library for Ruby

We at Tails [1] are using packetfu as part of our Cucumber-powered
test suite.

Teaser: you can help anonymity online today -- maintain packetfu in
Debian, and help us automatically ensure that Tails does not leak any
non-Tor connection :)

[1] https://tails.boum.org/

Cheers,
-- 
  intrigeri
--- End Message ---
--- End Message ---

-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum

[Tails-dev] Fwd: Bug#719301 closed by Jérémy Bobbio (Bug#719301: fixed in ruby-rjb 1.4.8-1)

2013-09-03 Thread intrigeri
hi,

ruby-rjb is now in Debian unstable :)

anonym, I'll let you update the blueprint (and possibly relevant
tickets) accordingly.

--- Begin Message ---
This is an automatic notification regarding your Bug report
which was filed against the wnpp package:

#719301: ITP: rjb -- RJB is a Ruby Java Bridge

It has been closed by Jérémy Bobbio .

Their explanation is attached below along with your original report.
If this explanation is unsatisfactory and you have not received a
better one in a separate message then please contact Jérémy Bobbio 
 by
replying to this email.


-- 
719301: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719301
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-rjb
Source-Version: 1.4.8-1

We believe that the bug you reported is fixed in the latest version of
ruby-rjb, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 719...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
J�r�my Bobbio  (supplier of updated ruby-rjb package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 13 Aug 2013 23:30:16 +0200
Source: ruby-rjb
Binary: ruby-rjb
Architecture: source amd64
Version: 1.4.8-1
Distribution: unstable
Urgency: low
Maintainer: Debian Ruby Extras Maintainers 

Changed-By: J�r�my Bobbio 
Description: 
 ruby-rjb   - Ruby-Java bridge using Java Native Interface
Closes: 719301
Changes: 
 ruby-rjb (1.4.8-1) unstable; urgency=low
 .
   * Initial release (Closes: #719301)
Checksums-Sha1: 
 0587c46f31adb3778050afceff35be9ae3125f7b 1999 ruby-rjb_1.4.8-1.dsc
 9589935ace3c8d84ed054eabeeb4737262ec166a 66244 ruby-rjb_1.4.8.orig.tar.gz
 22d6277fed1e95ee472b6a6d9060299d6120af8a 5482 ruby-rjb_1.4.8-1.debian.tar.gz
 69554e81450154608c5f1ed36f1746e9f1d7110f 53190 ruby-rjb_1.4.8-1_amd64.deb
Checksums-Sha256: 
 cb5203394ea1754e30ad98e66f4993cd4626021836816864b45d6318f406b732 1999 
ruby-rjb_1.4.8-1.dsc
 f1cf8fd18f186e37d0060b09a431d4fbf6177c1c8edd61a214b4cf1ab4d1e90e 66244 
ruby-rjb_1.4.8.orig.tar.gz
 ec28e19ce30bc1cc27278f2ce16c7e7df2a0fee87513fea1dd89555a8fd55243 5482 
ruby-rjb_1.4.8-1.debian.tar.gz
 49dd36c2d3e9d59db991b6d62486a16312ba42bb022629c0a89281b5863e2b26 53190 
ruby-rjb_1.4.8-1_amd64.deb
Files: 
 35aa21a6c4429a7209838041c30ed16e 1999 ruby optional ruby-rjb_1.4.8-1.dsc
 42a618bb467dd33a869638d5adada8a9 66244 ruby optional ruby-rjb_1.4.8.orig.tar.gz
 da1f21dd2c772c32c13f60d9fda73768 5482 ruby optional 
ruby-rjb_1.4.8-1.debian.tar.gz
 ef407a620ac8e72f4e61fd5791fb7d2f 53190 ruby optional ruby-rjb_1.4.8-1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=R/Mz
-END PGP SIGNATURE End Message ---
--- Begin Message ---
Package: wnpp
Severity: wishlist
X-Debbugs-Cc: pkg-ruby-extras-maintain...@lists.alioth.debian.org, 
tails-dev@boum.org

* Package name: rjb
  Version : 1.4.5
  Upstream Author : arton Tajima
* URL or Web page : http://rjb.rubyforge.org/
* License : LGPL
  Description : RJB is a Ruby Java Bridge

We at Tails [1] have been porting the Sikuli gem to use RJB instead of
JRuby, as the latter is becoming totally unmaintainable for us.

Teaser: help us streamline the Tails dev / test / release process, so
that we spend less time preparing releases (every 6 weeks!), and have
more time to develop useful features :)

[1] https://tails.boum.org/

Cheers,
-- 
  intrigeri
--- End Message ---
--- End Message ---

-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Tails 0.20 release schedule

2013-09-03 Thread intrigeri
anonym wrote (29 Aug 2013 11:41:54 GMT) :
>> Could you please update tickets that were fixed by the release (start
>> with "Fixed commiting" ones, we have a custom query ready to list
>> them)?

> Done.

Thanks :)

>> If the release doc wasn't updated after the Redmine migration,
>> please ping me (or do it :).

> Done, see commit dced30f.

Great. Improved and (hopefully) completed with 9783fac and fb05159.

Cheers!
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev