Bug#741573: Investigation of the bug log

2015-06-23 Thread Sam Hartman
You are copied on this message because you raised objections noted by the policy editors during the discussion of menu policy or seconded the proposal in #707851. The TC is currently evaluating a request to review that proposal and the process surrounding it. If you seconded the proposal, I'd lik

Bug#741573: Investigation of the bug log

2015-06-23 Thread Sam Hartman
> "Lisandro" == Lisandro Damián Nicanor Pérez Meyer > writes: Lisandro> Hi Sam! A long time has passed since then and I should re Lisandro> read the full and extensive bug log to assert whatever you Lisandro> want to ask. But I can be sure on one thing: at the time Lisand

Bug#803962: config-package-dev: Requires leading slashes in debian/*.displace

2015-11-03 Thread Sam Hartman
Package: config-package-dev Version: 5.1.2 Severity: normal Hi. According to the dh_configpackage man page, the paths in debian/*.displace need not have a leading slash, just like other debhelper inputs. However, the code generates errors like the following if you leave out the leading slash. d

Bug#804093: krb5-clients: Error message from telnet.krb5 is strange

2015-11-04 Thread Sam Hartman
You should be aware that Debian 7.x is the last version of Debian that has krb5-clients. The package has been desupported and is no longer maintained and has been removed from future versions of Debian. The Kerberos telnet application is insecure. While I don't know of specific security problems w

Bug#757953: libverto: autoreconf to update config.{sub, guess} and libtool.m4 to fix FTBFS for ppc64el port

2014-09-10 Thread Sam Hartman
> "Andreas" == Andreas Barth writes: Andreas> * ravi (r...@linux.vnet.ibm.com) [140910 13:56]: >> We have also successfully verified building "libverto" source >> package on ppc64el build machine after applying attached patch. Andreas> As ppc64el is now in Debian, I'd be will

Bug#746578: libpam-systemd to flip dependencies - proposal

2014-11-04 Thread Sam Hartman
> "josh" == josh writes: josh> I wouldn't necessarily suggest using this as an argument josh> against the proposed resolution. Instead, I'd recommend josh> making sure that cgmanager is just as harmless under systemd josh> as systemd-shim 8-4 currently is, by making it not r

Bug#746578: libpam-systemd to flip dependencies - proposal

2014-11-05 Thread Sam Hartman
I don't think this matters for the vote, and apologies because there's probably a better place to send this advice. I was thinking last night about the apt and debootstrap resolver issues and was wondering whether the following solution might help. I realize the issue is minor and is more about

Bug#763569: git-dpm generates incorrect patches with the ident gitattribute

2014-11-09 Thread Sam Hartman
I've been working with this a bit more. One possibility would be to add an export option or some git dpm option to generate a dsc or a tree that could be used to generate a dsc. At that point you could either add the changes as a final patch or unapply them. What I'm doing now is running dpkg-so

Bug#763569: git-dpm generates incorrect patches with the ident gitattribute

2014-11-09 Thread Sam Hartman
>>>>> "Bernhard" == Bernhard R Link writes: Bernhard> * Sam Hartman [141109 19:15]: >> I've been working with this a bit more. One possibility would be >> to add an export option or some git dpm option to generate a dsc >>

Bug#758600: shibboleth-sp2-utils: postinst fails on initial installation

2014-11-10 Thread Sam Hartman
I'd like to better understand the severity issue. Are you saying that there's no order I can install shibboleth and apache in wheezy that will work? I.E. even if I manually install the module first? -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscr

Bug#761868: ITP: moonshot-gss-eap -- A GSS-API Mechanism for the Extensible Authentication Protocol

2014-09-16 Thread Sam Hartman
package: wnpp severity: wishlist owner: hartm...@debian.org x-debbugs-cc: debian-de...@lists.debian.org source: git://git.project-moonshot.org/mech_eap.git license: BSD-3-Clause Description: Project moonshot provides federated access to a wide range of applications. This package adds a GSS-API m

Bug#745322: Using -isystem for krb5 headers breaks mixed MIT/heimdal applications

2014-09-22 Thread Sam Hartman
Convince heimdal to emit -Isystem as well? Just to play nice? -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#760411: ITP: moonshot-ui -- Project Moonshot Identity Manager

2014-09-03 Thread Sam Hartman
package: wnpp severity: wishlist owner: hartm...@debian.org URL: http://www.project-moonshot.org/ source: git://git.project-moonshot.org/moonshot-ui.git license: BSD-3-Clause Description: This package manages the Moonshot identity store, permitting users to add and remove identities as well as to

Bug#766194: debhelper: dh_installinit should gain option to ignore start failures

2014-10-21 Thread Sam Hartman
package: debhelper version: 9.20141003 severity: wishlist I suspect a lot of folks will be writing systemd service units in the future. While writing units for krb5-kdc, I ran across an issue. On first install, until you set up your database, it's kind of expected that krb5-kdc will fail to sta

Bug#766298: ROM: Not Suitable for Inclusion in Jessie

2014-10-21 Thread Sam Hartman
package: moonshot-trust-router severity: serious justification: ROM version: 1.4.1-1 Based on upstream discussion, the trust router without FreeRADIUS integration does not provide sufficient value to expend the effort for supporting for the length of the Jessie release. Since we're not willing to

Bug#762906: Bug#764669: Bug#762906: krb5-auth-dialog debug output

2014-10-22 Thread Sam Hartman
Perhaps, although I'll note that the krb5 maintainers are unaware of what's exactly going on in 764669. So, feel free to merge, but if you actually have an idea of the problem, please enlighten us, as we don't see that behavior at all. --Sam -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@

Bug#766476: ROM: Security Review Required before inclusion in Jessie

2014-10-23 Thread Sam Hartman
package: moonshot-gss-eap version: 0.9.2-1 severity: serious >From the TODO.debian: * Give the security team a change to comment on the included code from wpa_supplicant. There's really no other way; their ABI is not stable enough that it would make sense to build eap shared libraries out o

Bug#765871: does not start with new openssl version

2014-10-23 Thread Sam Hartman
control: owner -1 ! Aaaargh. I am going to disable the openssl version check entirely because freeradius has no business getting in the way of Debian security updates. Thanks for the heads up and I hope to have an upload tonight. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debia

Bug#760804: serf: FTBFS: Directory /usr/include/mit-krb5 found where file expected.

2014-10-23 Thread Sam Hartman
Hi. I seem to have missed this somehow. I don't think the -config interface is well defined. In particular, I don't think it's clear what flags can be included in foo-config output and what cannot. When including the -isystem patch, we evaluated and made sure all the compilers in Debian could pa

Bug#766569: Please reduce time for freeradius 2.2.5+dfsg-0.2

2014-10-23 Thread Sam Hartman
soname, Closes: #765871 * Non-Maintainer Upload -- Sam Hartman Thu, 23 Oct 2014 21:45:36 -0400 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#765803: Status of prompting / notification on upgrade for init system switch?

2014-10-23 Thread Sam Hartman
> "Josh" == Josh Triplett writes: Josh> - It can't check for generated lines for serial consoles or Josh> similar; finish-install can generate various additional Josh> inittab lines, which the check should include. Since when did systemd actually handle these correctly? I've gene

Bug#766569: Please reduce time for freeradius 2.2.5+dfsg-0.2

2014-10-24 Thread Sam Hartman
control: tags -1 -moreinfo > "Adam" == Adam D Barratt writes: Adam> Control: tags -1 + moreinfo >> freeradius (2.2.5+dfsg-0.2) unstable; urgency=high >> >> * Disable OpenSSL version check; Debian will maintain ABI >> stability or change the soname, Closes: #765871 * Non-

Bug#494381: (no subject)

2014-10-25 Thread Sam Hartman
source: gnome-orca source-version: 3.14 Yeah, I agree this no longer seems to be an issue. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#763569: git-dpm generates incorrect patches with the ident gitattribute

2014-09-30 Thread Sam Hartman
on 3.9.5, no changes * New upstream version, Closes: #740857, #691770 - Include dictionary.mikrotik, Closes: #672200 Author: Sam Hartman Bug-Debian: http://bugs.debian.org/661915 Bug-Debian: http://bugs.debian.org/669741 Bug-Debian: http://bugs.debian.org/672200 Bug-Debian: http://bugs.d

Bug#763806: krb5-kdc: initscript should dependency towards slapd

2014-10-02 Thread Sam Hartman
Are you using systemd or sysvinit? If you have krb5-kdc-ldap installed, I'd expect that we already have a dependency on slapd set up with an innserv-override in krb5-kdc-ldap. If you are using systemd this is a known problem. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org

Bug#763806: krb5-kdc: initscript should dependency towards slapd

2014-10-02 Thread Sam Hartman
> "Russ" == Russ Allbery writes: Russ> The real long-term solution is to convert both services to use Russ> systemd socket activation. Josh Tripplet (SP?) and I had a long conversation about socket activation at Debconf. my position is that socket activation is a bad choice for net

Bug#763806: krb5-kdc: initscript should dependency towards slapd

2014-10-02 Thread Sam Hartman
>>>>> "Russ" == Russ Allbery writes: Russ> Sam Hartman writes: >> my position is that socket activation is a bad choice for network >> services where the primary user of the socket is non-local. The >> issue is that in

Bug#763806: krb5-kdc: initscript should dependency towards slapd

2014-10-02 Thread Sam Hartman
>>>>> "Russ" == Russ Allbery writes: Russ> Sam Hartman writes: >> Are you using systemd or sysvinit? >> If you have krb5-kdc-ldap installed, I'd expect that we already >> have a dependency on slapd set up with an innserv-

Bug#769499: syslog-ng-core fails to enable systemd service unit

2014-11-13 Thread Sam Hartman
package: syslog-ng-core severity: important version:3.3.5-4 justification: does not enable systemd unit. syslog-ng-core's postinst does not enable its syslog unit. I'm guessing that including systemd in the dh sequence is not quite doing enough to actually turn it on. Unfortunately dh-systemd i

Bug#769499: syslog-ng-core fails to enable systemd service unit

2014-11-14 Thread Sam Hartman
>>>>> "Simon" == Simon McVittie writes: Simon> On 14/11/14 03:50, Sam Hartman wrote: >> # Automatically added by dh_installinit if [ -x >> "/etc/init.d/syslog-ng" ]; then update-rc.d syslog-ng defaults 10 >> 90 >

Bug#812131: krb5: Please package 1.14 (willing to provide assistance)

2016-02-12 Thread Sam Hartman
I've done the import and rebase and have confirmed the result builds. I need to adjust symbols files, pull in a few patches from the 1.14 branch, etc. But progress is happening here.

Bug#812131: krb5: Please package 1.14 (willing to provide assistance)

2016-02-15 Thread Sam Hartman
Hi. I've pushed an experimental, upstream and pristine-tar branch. I think the package is more or less ready to build for experimental, except that I'd like to merge in the patches to splint out slave support into its own package and to include init scripts there. I've picked up most of the patche

Bug#813126: Fixes for stretch?

2016-02-23 Thread Sam Hartman
I have an upgrade to 1.14 (plus these patches and a few others) sitting on the experimental branch of the git repo. I had be planning to push that to experimental and then if there were no problems through to sid and stretch. I had not been planning to make a specific upload to sid. I guess it w

Bug#815677: krb5-kdc: kdb5_util fails to load propagated database under heavy load

2016-02-25 Thread Sam Hartman
I've merged the patch into the 1.14 upload I'm preparing.

Bug#815677: krb5-kdc: kdb5_util fails to load propagated database under heavy load

2016-02-25 Thread Sam Hartman
> "Christopher" == Christopher Odenbach writes: Christopher> Hi, Christopher> Any chance to see this small change in jessie? I think it would be a good idea, but realistically unless I'm preparing another jessie update I probably won't get to it. I don't mind if someone else does.

Bug#813126: krb5: Memory leak caused by supplying a null principal name in request

2016-01-29 Thread Sam Hartman
How can a memory leak be grave?

Bug#812131: krb5: Please package 1.14 (willing to provide assistance)

2016-02-03 Thread Sam Hartman
Hi. I hope to get to this in the next week or so; sorry about the delay.

Bug#808293: freeradius stopped working after kernel upgrade

2016-01-07 Thread Sam Hartman
control: -1 severity important I'm not sure what the best way to avoid freeradius being pulled out of jessie is besides dropping the severity. If tagging it wheezy and bringing the severity back up would work feel free to do that. Is anyone seeing this with jessie or is this a wheezy-only issue?

Bug#819017: kadm5.acl stub should be provided as is

2016-03-22 Thread Sam Hartman
Not really. The acl is clearly not a conffile, because there is no default that is correct for a majority of sites. So, it's not appropriate to ship in a package, but instead should be created by a postinst somewhere. (I've been planning to get rid of krb5_newrealm and move realm setup into postins

Bug#819017: kadm5.acl stub should be provided as is

2016-03-22 Thread Sam Hartman
Policy says that one package can't mess with another package's configuration. That is, it's not really OK from a policy POV for anything besides krb5 to mess with the configuration files for krb5. However, you can of course coordinate other things. I can dig up specific citations if you'd like. bu

Bug#816548: krb5: [INTL:de] Initial German translation

2016-03-02 Thread Sam Hartman
control: tags -1 moreinfo I'm confused. krb5 has had a de.po for several years. Why are you sending in an initial po again?

Bug#816548: krb5: [INTL:de] Initial German translation

2016-03-02 Thread Sam Hartman
control: tags -1 -moreinfo O, you're talking about upstream translations for the source (error messages), not for debconf. I'm sorry. Thanks very much, and yes I do know what to do with this.

Bug#773228: CVE-2014-5354: kadmin crashes on keyless principals

2014-12-15 Thread Sam Hartman
control: severity -1 important It might be worth getting these two into jessie if the release team is willing. I think pre-approved fixes are valid until KJanuary 5 and so we should figure out how to get pre-approval if you agree. --sam -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lis

Bug#862051: Refer #862051 to ctte

2017-05-25 Thread Sam Hartman
> "David" == David Bremner writes: David> Philip Hands writes: >> I presume we'd want to continue providing /usr/bin/nodejs for >> people that have switched to using that, so that might as well >> continue to be the name of the binary, since that gives us a >> 'node' syml

Bug#871908: dgit fails to work when .git is a reference not a directory

2017-08-12 Thread Sam Hartman
source package libradsec dpkg-buildpackage: info: source version 0.0.5-3 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Sam Hartman dpkg-buildpackage: info: host architecture amd64 fakeroot debian/rules clean dh clean --with autoreconf --pa

Bug#871909: dgit gbp-build fails if user specifies --git-builder

2017-08-12 Thread Sam Hartman
package: dgit version: 3.12 What I'm really trying to do is to have dgit build my package with sbuild, checking out the pristine-tar if necessary. Why do I like that better than dgit fetch to guarantee I have the tarball? Well, perhaps I trust my local state more than the archive (I understand I'l

Bug#871908: dgit fails to work when .git is a reference not a directory

2017-08-12 Thread Sam Hartman
> "Ian" == Ian Jackson writes: That bug appears to be about a case where there are submodules in the repository I give to dgit as input. My case is different. I have a super-repository of a lot of related packages with each submodule corresponding to one complete Debian package. It seems lik

Bug#872056: jessie-pu: package krb5/1.12.1+dfsg-19+deb8u2

2017-08-13 Thread Sam Hartman
r CVE-2016-3120 (kdc crash on restrict_anon_to_tgt), , Closes: +#832572 + * fix for CVE-2016-3119: remote DOS with ldap for authenticated +attackers, Closes: #819468 + * Prevent requires_preauth bypass (CVE-2015-2694), Closes: #783557 + + -- Sam Hartman Sun, 13 Aug 2017 18:02:34 -0400

Bug#871908: dgit fails to work when .git is a reference not a directory

2017-08-14 Thread Sam Hartman
Hi. I will check this later today once I finish catching up from debconf at $dayjob. That said: 1) I did already confirm that if you handle .git correctly, everything else works. That is, I moved the git directory to be a directory, changed .git/config to remove a no-longer-necessary override o

Bug#871908: dgit fails to work when .git is a reference not a directory

2017-08-14 Thread Sam Hartman
Hi. I tested with dgit 4.1 and it worked well enough to dgit build-source. I did not check through a full push mostly because I don't have any packages to push ATM. However if it works that well, I think it is conclusive.

Bug#871909: dgit gbp-build fails if user specifies --git-builder

2017-08-14 Thread Sam Hartman
> "Sean" == Sean Whitton writes: Sean> Hello, Sean> On Mon, Aug 14 2017, Ian Jackson wrote: >> There are three situations I think: >> >> 1. fetch. There is a pristine-tar branch available somewhere. >> You want to avoid downloading the .orig, and instead use >>

Bug#872760: asterisk-opus: uninstallable in unstable

2017-08-20 Thread Sam Hartman
Package: asterisk-opus Version: 13.7+20161113-3 Severity: grave Justification: renders package unusable The asterisk package in unstable provides asterisk-1fb7f5c06d7a2052e38d021b3d8ca151 but asterisk-opus depends on asterisk-fa819827cbff2ea35341af5458859233 It looks like this is a system that

Bug#872760: asterisk-opus: uninstallable in unstable

2017-08-21 Thread Sam Hartman
OK, if the checksum doesn't change regularly, I can understand why the current arrangement makes sense. It would bxe great to get asterisk-opus rebuilt though:-)

Bug#863260: kstart: k5start does not recognize network changes

2017-06-09 Thread Sam Hartman
I wonder if your nss stack is somehow caching something about the network and the name servers and that kstart process is no longer able to resolve KDCs. It would be interesting to set KRB5_TRACE to a file, run kstart such that it is failing and see what specifically is not working. My bet is on DN

Bug#836127: Call for Votes for new TC member

2017-06-19 Thread Sam Hartman
===BEGIN The Technical Committee recommends that Niko Tyni be appointed by the Debian Project Leader to the Technical Committee. N: Recommend to Appoint Niko Tyni F: Further Discussion ===END I vote N>F signature.asc Description: PGP signature

Bug#872056: jessie-pu: package krb5/1.12.1+dfsg-19+deb8u2

2017-08-27 Thread Sam Hartman
I just uploaded the jessie update after fixing the extra comma in the changelog. I did run tests covering these security updates. I found that some of the tests included in make check were already failing on jessie and were still failing after this update. It looks like this may be related to pa

Bug#873563: CVE-2017-11462 -- automatic sec context deletion could lead to double-free

2017-08-29 Thread Sam Hartman
Wait... Is that actually even legal under RFC 1964? Doesn't this lead to leaks for correctly written applications? --Sam

Bug#873563: CVE-2017-11462 -- automatic sec context deletion could lead to double-free

2017-08-29 Thread Sam Hartman
Ah, looked at the commit. Yeah. This makes sense. This is somewhat of a behavior change. Do we want to just bring this into unstable, or do we want to backport it to stable releases? It seems like there is a possibility of problems in either direction.

Bug#754462: Bug#862051: nodejs (6.11.2~dfsg-1) experimental; urgency=medium

2017-08-29 Thread Sam Hartman
> "Thorsten" == Thorsten Glaser writes: Thorsten> Hi, >> * Restore /usr/bin/node following CTTE #862051 Let's try to drop >> /usr/bin/nodejs before buster. Replaces and Conflicts >> nodejs-legacy. Closes: #754462. Thorsten> please do NOT completely replace an ABI betwee

Bug#873563: CVE-2017-11462 -- automatic sec context deletion could lead to double-free

2017-08-29 Thread Sam Hartman
OK, let's give the security team some context. RFC 2744 specifies some kind of unfortunate behavior for error handling. gss_init_sec_context and gss_accept_sec_context have an in/out context parameter (pointer to pointer). You initialize the pointed to value to null the first time through. It ge

Bug#754462: Bug#862051: nodejs (6.11.2~dfsg-1) experimental; urgency=medium

2017-08-29 Thread Sam Hartman
> "Didier" == Didier 'OdyX' Raboud writes: Didier> For good reasons, Debian forcibly introduced a special-case Didier> when Node.js first appeared in a stable release through only Didier> shipping it under /usr/bin/nodejs. That forced hundreds of Didier> projects to cope wit

Bug#862051: [Pkg-javascript-devel] Bug#754462: Bug#862051: nodejs (6.11.2~dfsg-1) experimental; urgency=medium

2017-08-31 Thread Sam Hartman
> "Julien" == Julien Puydt writes: Julien> Hi, Le 31/08/2017 à 13:52, Jérémy Lal a écrit : >> How about printing a "nice" warning explaining it would be a good >> idea to move to /usr/bin/node ? Then in next next release drop >> the nodejs symlink. Julien> May I suggest t

Bug#754462: Bug#862051: nodejs (6.11.2~dfsg-1) experimental; urgency=medium

2017-08-31 Thread Sam Hartman
> "Dominique" == Dominique Dumont writes: Dominique> On Thursday, 31 August 2017 13:58:23 CEST Thorsten Glaser wrote: >> > How about printing a "nice" warning explaining it would be a >> good idea to > move to /usr/bin/node ? >> >> That will break scripts that do: >>

Bug#829671: Custom real addition doesn't seem to work

2017-09-05 Thread Sam Hartman
Hi. d-i preseeding. I'd be happy to work with you if we can remove that from the equation. I'd also be interested in why DNS srv lookups aren't good enough for you. If I had krb5-config to do again, I probably wouldn't support adding realms at all. The goals of krb5-config may not be entirely wh

Bug#866712: moonshot-gss-eap FTBFS on arm64: libeap/src/utils/common.h:429:0: error: "__bitwise" redefined [-Werror]

2017-07-10 Thread Sam Hartman
I'm starting the process of updating to new upstream. I think that is reasonably likely to fix this. If not, I'll look into the issue after the update. I'm OK if moonshot-gss-eap falls out of testing for a few weeks. --Sam

Bug#868035: krb5: [patch]: ldap sasl auth support

2017-07-11 Thread Sam Hartman
Thanks for bringing this to my attention. I'll definitely fix, although I'll end up applying a somewhat different patch because of the build profiles support included in 1.15.1. SASL, like LDAP would create a cycle in stage1 builds. I expect a new version soon. I don't have a good test environmen

Bug#868121: libgssapi-krb5-2: obsolete conffile left behind

2017-07-12 Thread Sam Hartman
I'm not actually sure I particularly want it removed from the system. It's fair that it should be removed on purge though and I'll at least do that.

Bug#861218: libgssapi-krb5-2: soname-independent files in shared library package (policy 8.2)

2017-07-23 Thread Sam Hartman
I'll remove it in purge.; there's another bug open effectively for that. However, I think it is generally a good thing if the file exists. Because of the dpkg bug we no longer install it, but I think our users are better served by leaving the file on upgrades.

Bug#869260: CVE-2017-11368

2017-07-23 Thread Sam Hartman
Take a look at the stretch branch of git://git.debian.org/git/pkg-k5-afs/debian-krb5-2013.git Shall I upload that to stable-security?

Bug#869260: CVE-2017-11368

2017-07-24 Thread Sam Hartman
Actually, on that note, why does this bug merit a DSA? It like the other bugs is a simple KDC crash from an authenticated attacker. It seems like it should be handled the same.

Bug#869260: CVE-2017-11368

2017-07-25 Thread Sam Hartman
I can absolutely prepare a stable point update request for stretch. Is there still going to be a last point release to jessie? If so I'll look into that too; I'd definitely like to get an update in.

Bug#862051: Call for vote on allowing nodejs to provide /usr/bin/node

2017-07-30 Thread Sam Hartman
=== Resolution === The Technical Committee recognises that circumstances change in ways that make previous resolutions no longer appropriate. In 2012, it was resolved that the nodejs package should not provide /usr/bin/node due to the historical conflict with the ax25-node package.

Bug#766298: An update on trust router and release status

2017-08-09 Thread Sam Hartman
> "Petter" == Petter Reinholdtsen writes: >> I think shortly after the release of buster, we can close this >> bug and let moonshot-trust-router migrate into testing. Petter> Did this time arrive? Mostly. I'm working through all the moonshot software and updating it to new upstr

Bug#871720: stretch-pu: package krb5/1.15-1

2017-08-10 Thread Sam Hartman
to fix handling of explicitly specified v4 wildcard +address; regression over previous versions, Closes: #860767 + * Fix SRV lookups to respect udp_preference_limit, regression over +previous versions with OTP, Closes: #856307 + + -- Sam Hartman Wed, 09 Aug 2017 12:19:50 -0400 + krb5 (1.

Bug#856307: krb5-user: kinit fails for OTP user when using kdc discovery via DNS

2017-04-17 Thread Sam Hartman
It's almost certainly impossible to get 1.15.1 into a point release of stretch. I think though the interesting question is whether this fix should go into stretch. In general, only important or release critical fixes can be included after the freeze. When you filed this bug as normal rather than i

Bug#856307: krb5-user: kinit fails for OTP user when using kdc discovery via DNS

2017-04-17 Thread Sam Hartman
OK. OK. If a couple of folks indicate this is an issue for them then it's a simple enough fix it could be uploaded during the stretch lifecycle.

Bug#860520: Voting for TC Chair

2017-04-19 Thread Sam Hartman
> > The chair of the Debian Technical Committee will be: > > A: Keith Packard > B: Didier Raboud > C: Tollef Fog Heen > D: Sam Hartman > E: Phil Hands > F: Margarita Manterola > G: David Bremner > ===END=== I vote B > F > D > C = E = A = G signature.asc Description: PGP signature

Bug#860767: Failure to bind to addresses on some ipv4 only configurations

2017-04-19 Thread Sam Hartman
package: krb5-kdc version: 1.15-1 severity: important tags: fixed-upstream krb5-kdc can fail to work at all on some systems where getaddrinfo(NULL) returns a v6 wildcard address. Depending on kernel modules and socket configuration, you can get address family not supported even though v4 is worki

Bug#841294: Overrule maitainer of "global" to package a new upstream version

2016-12-09 Thread Sam Hartman
> "Didier" == Didier 'OdyX' Raboud writes: Didier> That code is now in Debian (experimental), so yes, I do Didier> expect you to act in good faith and report bugs you see. You Didier> are obviously quite versed in how 'global' works, and that's Didier> undoubtedly valuable to

Bug#841294: Overrule maitainer of "global" to package a new upstream version

2016-12-09 Thread Sam Hartman
> "Colin" == Colin Watson writes: Colin> As a maintainer who has sometimes had cause to do similar Colin> things, I'm concerned at the standard being applied here. Colin> Could you perhaps review the history around groff 1.18.1.1 -> Colin> 1.20 for comparison? This is a case

Bug#846583: cloud.debian.org: AWS Image should enable DHCPv6 client

2016-12-10 Thread Sam Hartman
I've played with systemd-networkd a bit. It seems capable enough to handle this use case, but it has some significant drawbacks. It's not very backward compatible with expected sysadmin patterns. That is, as a sysadmin, I'd expect ifup and ifdown to work. I expect to be able to do things like ifd

Bug#830978: Sam's Comments on What I Source Code

2016-07-28 Thread Sam Hartman
I was working on the following comments in hopes of turning them into a draft resolution for the TC. The TC adopted not to take that approach, but I thought I'd submit these as my individual opinion in the interest of sharing them and starting discussion. In #730978, the Technical Committee was a

Bug#830344: How should the TC help with a project roadmap?

2016-08-03 Thread Sam Hartman
I'm not really advocating that the TC would be a very good help promote your ideas team. However, I'm struck by the following even if I don't entirely know what to make of it. > "Ian" == Ian Jackson writes: Ian> * To be accessible and approachable, and not judgemental. Ian> * To

Bug#833398: vmdebootstrap: correcting broken after custom packages fails to pass yes

2016-08-03 Thread Sam Hartman
Package: vmdebootstrap Version: 1.5-1 Severity: normal ERROR: command failed: ['chroot', '/tmp/tmpuio60u', 'apt-get', '-f', '--no-remov e', 'install'] Reading package lists... Building dependency tree... Correcting dependencies... Done The following additional packages wi

Bug#851628: Bugs on First CD/DVD for Jessie 8.5, 8.6, 8.7

2017-01-17 Thread Sam Hartman
Why does mountability matter anyway? The interesting question is whether it boots on the target system, right? Why do we care if it mounts on a third mac?

Bug#851628: Bugs on First CD/DVD for Jessie 8.5, 8.6, 8.7

2017-01-17 Thread Sam Hartman
>>>>> "Thomas" == Thomas Schmitt writes: Thomas> Hi, Thomas> Sam Hartman wrote: >> Why do we care if it mounts on a third mac? Thomas> I care in my role as upstream of xorriso. OK. I'd ask that when interacting with end users, you

Bug#852039: pam_p11: crashes with tokens that require login

2017-01-20 Thread Sam Hartman
and dirty patch to rescan after login. From 1392f5c0f1822e7c306ae6d9bdd3ede6f90b37c2 Mon Sep 17 00:00:00 2001 From: Sam Hartman Date: Fri, 20 Jan 2017 17:24:05 -0500 Subject: [PATCH] Read certs again on token login PKCS11_login destroys all certs and keys retrieved from the token. So after logging

Bug#852039: [pkg-opensc-maint] Bug#852039: pam-p11: diff for NMU version 0.1.5-6.1

2017-01-24 Thread Sam Hartman
If your upload goes in tomorrow, it will superceed mine which will never get processed. If you miss a day, yours will still replace mine.

Bug#852448: x11-common: ssh-agent socket removed from /tmp for long-running sessions

2017-01-24 Thread Sam Hartman
Package: x11-common Version: 1:7.7+18 Severity: important Hi. In the brave new world of systemd, /tmp tends to get cleaned fairly aggressively even while users are logged in. I've found that after a few days my ssh agent socket gets cleaned up, and I get grumpy typing long pass phrases and unabl

Bug#852448: x11-common: ssh-agent socket removed from /tmp for long-running sessions

2017-01-24 Thread Sam Hartman
> "Branden" == Branden Robinson writes: Branden> Your patch looks good, except that I would quote the Branden> expansion of $XDG_RUNTIME_DIR when invoking mkdir. If Branden> $XDG_RUNTIME_DIR contains whitespace, the shell will Branden> tokenize it in a surprising way and creat

Bug#852448: x11-common: ssh-agent socket removed from /tmp for long-running sessions

2017-01-24 Thread Sam Hartman
>>>>> "Julien" == Julien Cristau writes: Julien> On 01/24/2017 03:51 PM, Sam Hartman wrote: >> Package: x11-common Version: 1:7.7+18 Severity: important >> >> Hi. In the brave new world of systemd, /tmp tends to get cleaned >

Bug#853262: /usr/bin/convert: imagemagik fails to auto-detect xwd image format

2017-01-30 Thread Sam Hartman
Package: imagemagick-6.q16 Version: 8:6.9.7.0+dfsg-2 Severity: normal In the past, if you passed an xwd file in on stdin using a command like convert - /tmp/bar.jpg it worked. It still works if you do convert xwd:- /tmp/foo.jpg. What seems to have broken is the autodetection of xwd from file. as

Bug#846002: blends-tasks must be priority:standard and not make a mess out of tasksel menu

2017-01-31 Thread Sam Hartman
> "Ole" == Ole Streicher writes: Hi. If you go back one meeting further, my interpretation is that the consensus of the committee seems to be that ultimately this decision belongs to the installer team. That is, in this case, a number of members on the TC seem to believe that the installer t

Bug#853744: cloud-init needs net-tools

2017-01-31 Thread Sam Hartman
> "Marco" == Marco d'Itri writes: Marco> On Jan 31, Ross Vandegrift wrote: >> Recently, net-tools was made optional. Since cloud-init does not >> depend on net-tools, this causes breakage: Marco> Please do not apply this patch! Fix cloud-init to use ip(8) Marco> instead.

Bug#846002: blends-tasks must be priority:standard and not make a mess out of tasksel menu

2017-01-31 Thread Sam Hartman
>>>>> "Ole" == Ole Streicher writes: Ole> Hi Sam, Am 31.01.2017 um 16:26 schrieb Sam Hartman: >> If you go back one meeting further, my interpretation is that the >> consensus of the committee seems to be that ultimately this >> de

Bug#853744: cloud-init needs net-tools

2017-01-31 Thread Sam Hartman
>>>>> "Marco" == Marco d'Itri writes: Marco> On Jan 31, Sam Hartman wrote: >> Why? I can understand "it would be nice if cloud-init used ip >> instead", but you seem to have a preference stronger than that. Marco> To

Bug#846002: blends-tasks must be priority:standard and not make a mess out of tasksel menu

2017-02-01 Thread Sam Hartman
> "Ole" == Ole Streicher writes: Georg commented that if we're going to delegate to D-I, we should hurry up and do so unless this turn into another TC failure. I personally think we've taken long enough this is already a TC failure and have expressed regret for my actions that contributed to

Bug#846002: Call for votes on resolution for #846002 (blends-tasks)

2017-02-03 Thread Sam Hartman
I vote A -> FD for the blends-tasks vote. signature.asc Description: PGP signature

Bug#846002: blends-tasks must be priority:standard and not make a mess out of tasksel menu

2017-02-03 Thread Sam Hartman
Hi, first, you've made the point that you were hoping the TC would help the blends team and the d-i team work together. I think that Phil's suggestions for a technical approach are quite good, and I hope that will move forward in the buster cycle. With regard to stretch, I honestly don't think th

Bug#766298: An update on trust router and release status

2016-12-19 Thread Sam Hartman
There was a trust router release in October. At one level, this release is probably functional enough that it would be nice to have included in stretch. At another level,there have been enough upstream bugs files that I don't think it's stable enough to include and support for the lifetime of

<    1   2   3   4   5   6   7   8   9   10   >