LTS (was: Bits from the Security Team)

2014-03-19 Thread Christoph Biedl
Moritz Muehlenhoff wrote... LTS - --- * Anyone interested in contributing, please get in touch with t...@security.debian.org. We'll setup an initial coordination list with all interested parties. All policies / exact work will be sorted out there. Ups, I have to admit, it took

Re: LTS (was: Bits from the Security Team)

2014-03-19 Thread Julien Cristau
On Wed, Mar 19, 2014 at 20:54:42 +0100, Christoph Biedl wrote: Moritz Muehlenhoff wrote... LTS - --- * Anyone interested in contributing, please get in touch with t...@security.debian.org. We'll setup an initial coordination list with all interested parties. All policies /

Re: Bits from the Security Team

2014-03-19 Thread Holger Levsen
Hi, On Montag, 17. März 2014, Moritz Muehlenhoff wrote: When doing security work you'll inevitably run into svn at some point, e.g. when digging for upstream fixes (also also cvs, hg, bzr etc)... well, true, but still, it's more appealing if ones primary VCS is sane. Holger (and yay

Re: Bits from the Security Team

2014-03-18 Thread Christoph Biedl
Didier 'OdyX' Raboud wrote... I was trying to say that there is no policy currently in place to ensure that skip-upgrades actually work, Agreed. If LTS is going to be a permanent thing, this has to change. For any squeeze-lts to jessie upgrades, the ride might become a bit bumpy although I

Re: Bits from the Security Team

2014-03-18 Thread Russ Allbery
Christoph Biedl debian.a...@manchmal.in-ulm.de writes: Didier 'OdyX' Raboud wrote... and at least one maintainer has already started to cleanup pre-wheezy stuff from his packages [0]. [0] I'd be surprised to be the only one, who knows. Just in this thread, I've counted two :) I cleaned up

Re: Bits from the Security Team

2014-03-18 Thread Christoph Biedl
Moritz Muehlenhoff wrote... With the current level of commitment an LTS is unlikely. Um, not good. Awaiting your announced separate message, then it's time for those who promised commitment back in last August to prove they are still interested. Christoph -- To UNSUBSCRIBE, email to

Re: Bits from the Security Team

2014-03-17 Thread Holger Levsen
Hi, On Mittwoch, 5. März 2014, Moritz Muehlenhoff wrote: Security release workflow - * We're currently using Subversion. We discussed changing to git, but git doesn't offer significant benefit for our purpose so we decided to stick with it. I think you've missed

Re: Bits from the Security Team

2014-03-17 Thread Moritz Muehlenhoff
On Mon, Mar 17, 2014 at 10:33:32AM +0100, Holger Levsen wrote: Hi, On Mittwoch, 5. März 2014, Moritz Muehlenhoff wrote: Security release workflow - * We're currently using Subversion. We discussed changing to git, but git doesn't offer significant benefit for

Re: Bits from the Security Team

2014-03-17 Thread Didier 'OdyX' Raboud
Hi, Le lundi, 17 mars 2014, 10.33:32 Holger Levsen a écrit : I think you've missed one significant benefit here: (I believe) for quite many people by now it's a showstoper to join a team which is using subversion for it's workflow. git-svn usage is a manpage away: once you've learned `git svn

Re: Bits from the Security Team

2014-03-11 Thread Didier 'OdyX' Raboud
Le lundi, 10 mars 2014, 22.00:09 Christoph Biedl a écrit : The problem is that there is no policy in place to make us support oldstable-to-testing upgrades. If there's interest, that'd need to be decided with a more firm policy than encourage maintainers. Would you have preferred to read

Re: Bits from the Security Team

2014-03-11 Thread Ian Jackson
Simon McVittie writes (Re: Bits from the Security Team): On the other hand, going directly from oldoldstable to stable pulls in 4 years of changes, and I think that's likely to result in having to keep too many workarounds and too much cruft for too long, and having to hold back progress

Re: Bits from the Security Team

2014-03-11 Thread Ian Jackson
Didier 'OdyX' Raboud writes (Re: Bits from the Security Team): I was trying to say that there is no policy currently in place to ensure that skip-upgrades actually work, and at least one maintainer has already started to cleanup pre-wheezy stuff from his packages [0]. People encouraging

Re: Bits from the Security Team

2014-03-10 Thread Ian Jackson
Paul Wise writes (Re: Bits from the Security Team): Debian doesn't support skipping releases right now and I expect if we support releases for a longer amount of time that won't change. But, in practice, skip upgrades often work anyway. I'd encourage maintainers not to gratuitously break them

Re: Bits from the Security Team

2014-03-10 Thread Moritz Mühlenhoff
Christoph Biedl debian.a...@manchmal.in-ulm.de schrieb: Matthias Urlichs wrote... IMHO the decision to designate release N to be a LTS release has too be made at release time of N+1 _at_the_latest_, so maintainers know that they may not remove their old upgrade script snippets. Agreed, but

Re: Bits from the Security Team

2014-03-10 Thread Moritz Mühlenhoff
On Thu, Mar 06, 2014 at 09:00:13AM +0800, Paul Wise wrote: * There are quite some vulnerabilities which are addressed in Debian, but for which no CVE identifier has been assigned. Perhaps we could encourage those submitting security bugs to X-Debbugs-CC the oss-sec list? That would

Re: Bits from the Security Team

2014-03-10 Thread Matthias Urlichs
Hi, Skipping releases will not be possible/supported Oh, it's certainly *possible*. The question is, how painful an experience fixing the resulting problems will be … However, LTS releases should support upgrades from one LTS to the next. That's kindof what I'd expect, and Ubuntu certainly

Re: Bits from the Security Team

2014-03-10 Thread Didier 'OdyX' Raboud
Le lundi, 10 mars 2014, 13.52:59 Ian Jackson a écrit : Paul Wise writes (Re: Bits from the Security Team): Debian doesn't support skipping releases right now and I expect if we support releases for a longer amount of time that won't change. But, in practice, skip upgrades often work

Re: Bits from the Security Team

2014-03-10 Thread Simon McVittie
On 10/03/14 15:44, Matthias Urlichs wrote: However, LTS releases should support upgrades from one LTS to the next. That's kindof what I'd expect, and Ubuntu certainly shows that it's possible. I think LTS is being used to mean two different things here. Debian releases are already more like

Re: Bits from the Security Team

2014-03-10 Thread Matthias Urlichs
Hi, Simon McVittie: Does Ubuntu support upgrading directly from old-old-LTS to current-LTS, e.g. from hardy to precise or from lucid to trusty? Not that I know of, no. Ubuntu's Wikipedia page doesn't seem to think so. A direct upgrade from squeeze to jessie would be of a similar magnitude.

Re: Bits from the Security Team

2014-03-10 Thread Philipp Kern
On 2014-03-10 17:32, Matthias Urlichs wrote: Simon McVittie: Ubuntu's Wikipedia page doesn't seem to think so. A direct upgrade from squeeze to jessie would be of a similar magnitude. Well, yes, except that I continue to hope that with a LTS release in our archive the non-LTS releases would

Re: Bits from the Security Team

2014-03-10 Thread Christoph Biedl
Didier 'OdyX' Raboud wrote... I, for one, have been routinely dropping transitional binary packages that were in the latest stable; they were needed to migrate from (the releases which are now) oldstable to stable but are only archive noise now. Delaying that cleanup for an additional

Re: Bits from the Security Team

2014-03-10 Thread Salvatore Bonaccorso
Hi, On Sat, Mar 08, 2014 at 07:36:23PM +0100, Christoph Biedl wrote: Moritz Muehlenhoff wrote... Security archive - * In order to avoid bottlenecks and to open up the security process further we're planning to allow maintainers which are not part of the

Re: Bits from the Security Team

2014-03-09 Thread Yves-Alexis Perez
On Sun, Mar 09, 2014 at 06:50:36AM +0800, Paul Wise wrote: On Sat, 2014-03-08 at 18:23 +0100, Florian Weimer wrote: * Moritz Muehlenhoff: I agree we should stick with dpkg-buildflags until this is fixed upstream. Gentoo Hardened tried to upstream this a year ago, but apparently this

Re: Bits from the Security Team

2014-03-09 Thread Christoph Biedl
Matthias Urlichs wrote... IMHO the decision to designate release N to be a LTS release has too be made at release time of N+1 _at_the_latest_, so maintainers know that they may not remove their old upgrade script snippets. Agreed, but given the long intervals between releases: Waiting until

Re: Bits from the Security Team

2014-03-08 Thread Florian Weimer
* Moritz Muehlenhoff: I agree we should stick with dpkg-buildflags until this is fixed upstream. Gentoo Hardened tried to upstream this a year ago, but apparently this didn't make the cut yet: http://gcc.gnu.org/ml/gcc-patches/2012-09/msg00473.html This is interesting. One potential

Re: Bits from the Security Team

2014-03-08 Thread Christoph Biedl
Moritz Muehlenhoff wrote... Security archive - * In order to avoid bottlenecks and to open up the security process further we're planning to allow maintainers which are not part of the security team to release security updates on their own. This applies to packages

Re: Bits from the Security Team

2014-03-08 Thread Craig Small
On Fri, Mar 07, 2014 at 01:57:17PM +0100, Stephan Seitz wrote: On Thu, Mar 06, 2014 at 12:21:06PM +1100, Craig Small wrote: You apparently can have a special group that can see everything. Aren’t there PAM modules which can grant capabilities to certain users? No idea, adduser thisuser

Re: Bits from the Security Team

2014-03-08 Thread Paul Wise
On Sat, 2014-03-08 at 18:23 +0100, Florian Weimer wrote: * Moritz Muehlenhoff: I agree we should stick with dpkg-buildflags until this is fixed upstream. Gentoo Hardened tried to upstream this a year ago, but apparently this didn't make the cut yet:

Re: Bits from the Security Team

2014-03-08 Thread Paul Wise
On Sun, Mar 9, 2014 at 2:36 AM, Christoph Biedl wrote: Moritz Muehlenhoff wrote... LTS - --- * At the moment it seems likely that an extended security support timespan for squeeze is possible. The plan is to go ahead, sort out the details as as it happens, and see how this works out and

Re: Bits from the Security Team

2014-03-08 Thread Matthias Urlichs
Hi, Paul Wise: Debian doesn't support skipping releases right now and I expect if we support releases for a longer amount of time that won't change. We don't yet do any testing for upgrades from oldstable2testing etc so there will probably be some broken things, perhaps we should? Prepare

Re: Bits from the Security Team

2014-03-08 Thread intrigeri
Paul Wise wrote (08 Mar 2014 23:49:22 GMT) : We don't yet do any testing for upgrades from oldstable2testing etc so there will probably be some broken things, perhaps we should? https://piuparts.debian.org/ See also the Jenkins upgrade tests:

Re: Bits from the Security Team

2014-03-07 Thread Moritz Muehlenhoff
On Thu, Mar 06, 2014 at 05:33:42AM +0100, Matthias Klose wrote: Am 06.03.2014 02:00, schrieb Paul Wise: * The distribution hardening using dpkg-buildflags is coming along nicely. Unfortunately this doesn't apply to binaries compiled outside of the package building system. It would be

Re: Bits from the Security Team

2014-03-07 Thread Stephan Seitz
On Thu, Mar 06, 2014 at 12:21:06PM +1100, Craig Small wrote: On Thu, Mar 06, 2014 at 12:54:00AM +0100, Vincent Danjean wrote: I'm not sure I will let this setup (hidepid=1) on my computers. My current POV (that can change) is that I prefer to be able to do the maximum of thing as a normal

Re: Bits from the Security Team

2014-03-07 Thread Stephan Seitz
On Thu, Mar 06, 2014 at 04:32:34PM +0100, Guido Günther wrote: Luckily this is not the case. :) root can see other users' /proc entries just fine. Perhaps the documentation should be improved. I should have checked the code first. If I read that correctly CAP_SYS_PTRACE is necessary here. I've

Re: Bits from the Security Team

2014-03-07 Thread Matthias Urlichs
Hi, Stephan Seitz: I did a „setcap cap_sys_ptrace+eip /usr/lib/nagios/plugins/check_procs”, but a normal user can’t still check for running programs of another user. What did I wrong? check_procs is a script, not a real executable. Since starting an interpreter with capabilities (or

Re: Bits from the Security Team

2014-03-07 Thread Stephan Seitz
On Fri, Mar 07, 2014 at 02:51:41PM +0100, Matthias Urlichs wrote: I did a „setcap cap_sys_ptrace+eip /usr/lib/nagios/plugins/check_procs”, but a normal user can’t still check for running programs of another user. What did I wrong? check_procs is a script, not a real executable. Wrong.

Re: Bits from the Security Team

2014-03-07 Thread Vincent Danjean
On 05/03/2014 22:33, Jakub Wilk wrote: hidepid=1 means users may not access any /proc/pid/ directories but their own. Even that is strange. I just tried. Processus that are not mine are not shown anymore by ps, but even some of mine disappeared! (mostly urxvt ones) See this example (the [] in

Re: Bits from the Security Team

2014-03-07 Thread Jakub Wilk
* Vincent Danjean vdanjean...@free.fr, 2014-03-07, 15:41: hidepid=1 means users may not access any /proc/pid/ directories but their own. Even that is strange. I just tried. Processus that are not mine are not shown anymore by ps, but even some of mine disappeared! (mostly urxvt ones) $ ls

Re: Bits from the Security Team

2014-03-07 Thread Jakub Wilk
* Stephan Seitz stse+deb...@fsing.rootsland.net, 2014-03-07, 15:25: But I think capabilities are a safer solution than s-bit. Maybe, maybe not. Many capabilities, including CAP_SYS_PTRACE, can be easily elevated to full root. Adding capabilities to software that wasn't specifically designed

Re: Bits from the Security Team

2014-03-07 Thread Kevin Chadwick
previously on this list Matthias Urlichs contributed: I did a „setcap cap_sys_ptrace+eip /usr/lib/nagios/plugins/check_procs”, but a normal user can’t still check for running programs of another user. What did I wrong? check_procs is a script, not a real executable. Since

Re: Bits from the Security Team

2014-03-07 Thread Julien Cristau
On Fri, Mar 7, 2014 at 18:41:02 +0100, Jakub Wilk wrote: * Vincent Danjean vdanjean...@free.fr, 2014-03-07, 15:41: hidepid=1 means users may not access any /proc/pid/ directories but their own. Even that is strange. I just tried. Processus that are not mine are not shown anymore by ps,

Re: Bits from the Security Team

2014-03-06 Thread Jakub Wilk
* Moritz Muehlenhoff j...@debian.org, 2014-03-05, 20:03: * Since Wheezy the Linux kernel features a security mechanism which nullifies many symlink attacks (fs.protected_symlinks). For the lazy, documentation of protected_symlinks: When the value in this file is 0, no restrictions are placed

Re: Bits from the Security Team

2014-03-06 Thread Guido Günther
Hi Jakub, On Wed, Mar 05, 2014 at 10:33:23PM +0100, Jakub Wilk wrote: * Guido Günther a...@sigxcpu.org, 2014-03-05, 20:54: [..snip..] I looked at the docs and as I read them this would affect uid 0 as well. Luckily this is not the case. :) root can see other users' /proc entries just fine.

Re: Bits from the Security Team

2014-03-05 Thread Guido Günther
Hi, the work of the security team is very, very much appreciated! On Wed, Mar 05, 2014 at 08:03:01PM +0100, Moritz Muehlenhoff wrote: * We're planning to request for hidepid to be enabled by default (to 1). This will squash an entire class of information leaks. If you have any comments or

Re: Bits from the Security Team

2014-03-05 Thread Jakub Wilk
* Guido Günther a...@sigxcpu.org, 2014-03-05, 20:54: * We're planning to request for hidepid to be enabled by default (to 1). This will squash an entire class of information leaks. If you have any comments or objections, please get in touch with us. For the lazy, this is documentation for

Re: Bits from the Security Team

2014-03-05 Thread Paul Wise
On Thu, Mar 6, 2014 at 3:03 AM, Moritz Muehlenhoff wrote: * We're planning to request for hidepid to be enabled by default (to 1). This will squash an entire class of information leaks. If you have any comments or objections, please get in touch with us. Apparently this breaks suspend

Re: Bits from the Security Team

2014-03-05 Thread Vincent Danjean
On 05/03/2014 22:33, Jakub Wilk wrote: * Guido Günther a...@sigxcpu.org, 2014-03-05, 20:54: I looked at the docs and as I read them this would affect uid 0 as well. Luckily this is not the case. :) root can see other users' /proc entries just fine. Perhaps the documentation should be

Re: Bits from the Security Team

2014-03-05 Thread Paul Wise
A lot of this is really great news, thanks for your work! On Thu, Mar 6, 2014 at 3:03 AM, Moritz Muehlenhoff wrote: * In some cases source packages get renamed, These renames currently need to be tracked manually. We're planning to automate these. If anyone wants to help and implement

Re: Bits from the Security Team

2014-03-05 Thread Russ Allbery
Paul Wise p...@debian.org writes: Perhaps we could encourage those submitting security bugs to X-Debbugs-CC the oss-sec list? I don't think the list would really appreciate that. Most of the CVE requests it currently gets have been vetted by either a developer of the software or by the

Re: Bits from the Security Team

2014-03-05 Thread Craig Small
On Thu, Mar 06, 2014 at 12:54:00AM +0100, Vincent Danjean wrote: I'm not sure I will let this setup (hidepid=1) on my computers. My current POV (that can change) is that I prefer to be able to do the maximum of thing as a normal user (top, ps, read log (I'm in the adm group), ...) ans switch

Re: Bits from the Security Team

2014-03-05 Thread Matthias Klose
Am 06.03.2014 02:00, schrieb Paul Wise: * The distribution hardening using dpkg-buildflags is coming along nicely. Unfortunately this doesn't apply to binaries compiled outside of the package building system. It would be great if we could adopt the Ubuntu approach of just enabling the

Re: Bits from the Security Team

2014-03-05 Thread Paul Wise
On Thu, Mar 6, 2014 at 12:33 PM, Matthias Klose wrote: This should not be enabled in the distro itself, and if, then not before it can be enabled upstream. From my point of view it was a mistake to enable it this way before getting this upstream. However it is a lot of work to get the

Re: Bits from the Security Team

2014-03-05 Thread Yves-Alexis Perez
On Thu, Mar 06, 2014 at 07:51:28AM +0800, Paul Wise wrote: On Thu, Mar 6, 2014 at 3:03 AM, Moritz Muehlenhoff wrote: * We're planning to request for hidepid to be enabled by default (to 1). This will squash an entire class of information leaks. If you have any comments or objections,

Re: Bits from the Security Team (for those that care about bits)

2011-01-26 Thread Goswin von Brederlow
Thijs Kinkhorst th...@debian.org writes: * Issues in specific packages We further discussed some specific problematic packages. One example is ia32-libs, which is difficult because it includes 100+ other source packages. This will be handled better for Squeeze: we'll have to ensure it's as

Re: Bits from the Security Team (for those that care about bits)

2011-01-26 Thread Michael Gilbert
On Wed, 26 Jan 2011 14:47:52 +0100, Goswin von Brederlow wrote: Thijs Kinkhorst th...@debian.org writes: * Issues in specific packages We further discussed some specific problematic packages. One example is ia32-libs, which is difficult because it includes 100+ other source packages.

Re: Bits from the Security Team (for those that care about bits)

2011-01-25 Thread Wouter Verhelst
On Sun, Jan 23, 2011 at 11:32:07PM +0100, Thijs Kinkhorst wrote: * README.test Although many packages include a test suite that is run after package build, there are packages that do not have such a suite, or not one that can be run as part of the build process. It was proposed to

autopkgtest (was Re: Bits from the Security Team (for those that care about bits)

2011-01-24 Thread Holger Levsen
Hi, On Montag, 24. Januar 2011, Iustin Pop wrote: Second, README.test are designed for human consumption, whereas a standardisation of how to invoke the tests would allow for much more automation. E.g. piuparts would not only be able to test that the install succeeds, but the automated tests

Re: Bits from the Security Team (for those that care about bits)

2011-01-24 Thread Michael Hanke
On Mon, Jan 24, 2011 at 07:48:18AM +0100, Iustin Pop wrote: IMHO what would be a sufficient first step would be much simpler: - being able to know if a package does offer build post-install tests - how to run such tests - for post-install tests, what are the depedencies (Test-Depends? ;-)

Re: Bits from the Security Team (for those that care about bits)

2011-01-24 Thread Philip Ashmore
On 24/01/11 02:52, Paul Wise wrote: * README.test An alternative is to just provide *-test Debian packages. If the package exists then building it is the same as running a test of the packages it requires to be installed - maybe just the * package, but it could also be an integration test.

Re: autopkgtest (was Re: Bits from the Security Team (for those that care about bits)

2011-01-24 Thread Iustin Pop
On Mon, Jan 24, 2011 at 10:37:26AM +0100, Holger Levsen wrote: Hi, On Montag, 24. Januar 2011, Iustin Pop wrote: Second, README.test are designed for human consumption, whereas a standardisation of how to invoke the tests would allow for much more automation. E.g. piuparts would not only

Re: Bits from the Security Team (for those that care about bits)

2011-01-24 Thread Stefan Fritsch
On Monday 24 January 2011, Iustin Pop wrote: This is a very good idea, but I think it could be taken two steps further. These are just some ideas I have but did not explore in depth, so take them with a grain of salt. First, tests run during a package build are good, but they do not ensure,

Re: Bits from the Security Team (for those that care about bits)

2011-01-23 Thread Iustin Pop
On Sun, Jan 23, 2011 at 11:32:07PM +0100, Thijs Kinkhorst wrote: Hi! In the weekend 14-16 January 2011, the Debian Security Team convened in Linux Hotel, Essen. We discussed many things, a lot of security work was done and of course the necessary socialising wasn't forgotten. We'd like to

Re: Bits from the Security Team (for those that care about bits)

2011-01-23 Thread Michael Hanke
On Mon, Jan 24, 2011 at 12:19:32AM +0100, Iustin Pop wrote: First, tests run during a package build are good, but they do not ensure, for example, that the package as installed is working OK. I've been thinking that (also) providing tests to be run after the package is installed (and not on

Re: Bits from the Security Team (for those that care about bits)

2011-01-23 Thread Raphael Geissert
Michael Hanke wrote: On Mon, Jan 24, 2011 at 12:19:32AM +0100, Iustin Pop wrote: Second, README.test are designed for human consumption, whereas a standardisation of how to invoke the tests would allow for much more automation. E.g. piuparts would not only be able to test that the install

Re: Bits from the Security Team (for those that care about bits)

2011-01-23 Thread Paul Wise
On Mon, Jan 24, 2011 at 7:19 AM, Iustin Pop ius...@debian.org wrote: First, tests run during a package build are good, but they do not ensure, for example, that the package as installed is working OK. I've been thinking that (also) providing tests to be run after the package is installed (and

Re: Bits from the Security Team (for those that care about bits)

2011-01-23 Thread Iustin Pop
On Mon, Jan 24, 2011 at 10:52:54AM +0800, Paul Wise wrote: On Mon, Jan 24, 2011 at 7:19 AM, Iustin Pop ius...@debian.org wrote: First, tests run during a package build are good, but they do not ensure, for example, that the package as installed is working OK. I've been thinking that

Re: Bits from the Security Team (for those that care about bits)

2011-01-23 Thread Iustin Pop
On Sun, Jan 23, 2011 at 06:45:56PM -0500, Michael Hanke wrote: On Mon, Jan 24, 2011 at 12:19:32AM +0100, Iustin Pop wrote: First, tests run during a package build are good, but they do not ensure, for example, that the package as installed is working OK. I've been thinking that (also)

Re: Bits from Testing Security team

2008-06-30 Thread Steffen Joeris
On Sat, 28 Jun 2008 08:45:54 pm Holger Levsen wrote: Hi Testing Security team, thanks for the announce-mail and your work! On Wednesday 25 June 2008 11:08, Nico Golde wrote: General security support for testing [...] kernel. Also, we would like

Re: Bits from Testing Security team

2008-06-28 Thread Holger Levsen
Hi Testing Security team, thanks for the announce-mail and your work! On Wednesday 25 June 2008 11:08, Nico Golde wrote: General security support for testing [...] kernel. Also, we would like to state that packages that are not security supported for

Re: Bits from Testing Security team

2008-06-25 Thread Enrico Zini
On Wed, Jun 25, 2008 at 11:08:50AM +0200, Nico Golde wrote: testing. This list includes all packages in contrib and non-free, as well as the ones that are marked unsupported (for example, kfreebsd). Hi. You mention packages that are marked unsupported: where is that mark stored? I'm asking

Re: Bits from the Security Team

2008-03-14 Thread Moritz Muehlenhoff
Steve Langasek wrote: The Security Team is now using Request Tracker to coordinate work and our RT processes have already been refined a lot. If you're a package maintainer working towards a security update, you're now encouraged to open a ticket directly. You will be kept in CC during the

Re: Bits from the Security Team

2008-03-14 Thread Moritz Muehlenhoff
On 2008-03-11, Don Armstrong [EMAIL PROTECTED] wrote: On Sun, 09 Mar 2008, Moritz Muehlenhoff wrote: If you're opening a ticket for a security problem which is publicly known, e.g. if it's announced on the project web site, please open a ticket in the Security queue. These issues will be

Re: Bits from the Security Team

2008-03-14 Thread Don Armstrong
On Fri, 14 Mar 2008, Moritz Muehlenhoff wrote: This doesn't intend to duplicate information from the BTS. The RT queues even contain direct links to the BTS. RT is used to distribute work among the members of the security team and to keep pending issues more organized. You could actually do

Re: Bits from the Security Team

2008-03-14 Thread Nico Golde
Hi Don, * Don Armstrong [EMAIL PROTECTED] [2008-03-14 20:42]: On Fri, 14 Mar 2008, Moritz Muehlenhoff wrote: [...] The secondary reason is that it's very useful to see in a single location the exact status of non-embargoed security bugs; using RT means that someone who is interested has to

Re: Bits from the Security Team

2008-03-13 Thread Guido Günther
Hi Moritz, On Sun, Mar 09, 2008 at 11:05:11PM +0100, Moritz Muehlenhoff wrote: The Security Team is now using Request Tracker to coordinate work and our RT processes have already been refined a lot. If you're a package maintainer working towards a security update, you're now encouraged to

Re: Bits from the Security Team

2008-03-13 Thread Florian Weimer
* Guido Günther: Hi Moritz, On Sun, Mar 09, 2008 at 11:05:11PM +0100, Moritz Muehlenhoff wrote: The Security Team is now using Request Tracker to coordinate work and our RT processes have already been refined a lot. If you're a package maintainer working towards a security update, you're

Re: Bits from the Security Team

2008-03-10 Thread Steve Langasek
Hi Moritz, On Sun, Mar 09, 2008 at 11:05:11PM +0100, Moritz Muehlenhoff wrote: Use of RT = The Security Team is now using Request Tracker to coordinate work and our RT processes have already been refined a lot. If you're a package maintainer working towards a security update,

Re: Bits from the Security Team

2008-03-10 Thread Thijs Kinkhorst
On Mon, March 10, 2008 09:24, Steve Langasek wrote: If you're opening a ticket for a security problem which is publicly known, e.g. if it's announced on the project web site, please open a ticket in the Security queue. These issues will be visible publicly. As far as I can see, this

Re: Bits from the Security Team

2008-03-10 Thread Raphael Hertzog
On Mon, 10 Mar 2008, Thijs Kinkhorst wrote: On Mon, March 10, 2008 09:24, Steve Langasek wrote: If you're opening a ticket for a security problem which is publicly known, e.g. if it's announced on the project web site, please open a ticket in the Security queue. These issues will be visible

Re: Bits from the Security Team

2008-03-10 Thread Steve Langasek
On Mon, Mar 10, 2008 at 09:28:24AM +0100, Thijs Kinkhorst wrote: On Mon, March 10, 2008 09:24, Steve Langasek wrote: If you're opening a ticket for a security problem which is publicly known, e.g. if it's announced on the project web site, please open a ticket in the Security queue. These

Re: Bits from the Security Team

2008-03-10 Thread Don Armstrong
On Sun, 09 Mar 2008, Moritz Muehlenhoff wrote: If you're opening a ticket for a security problem which is publicly known, e.g. if it's announced on the project web site, please open a ticket in the Security queue. These issues will be visible publicly. Is there any particular reason why we're

Re: Bits from the Security Team

2008-03-09 Thread Noah Meyerhans
On Sun, Mar 09, 2008 at 11:05:11PM +0100, Moritz Muehlenhoff wrote: * You need to be familiar with how the wide variety Debian packages are maintained, patched and built. If you're not scared by packages generating their patch series by applying sed statements from cdbs include files

Re: Bits from the Security Team

2007-10-31 Thread Francesco P. Lovergine
On Tue, Oct 30, 2007 at 09:04:12PM +0100, Moritz Muehlenhoff wrote: Embedded code copies Developers are encouraged to communicate amongst their colleague developers for cases where their packages have code in common with other packages. For example a package which

Re: Bits from the Security Team

2007-10-31 Thread Florian Weimer
* Francesco P. Lovergine: On Tue, Oct 30, 2007 at 09:04:12PM +0100, Moritz Muehlenhoff wrote: Embedded code copies Wouldn't be the case to add a suitable control field, as proposed in a previous thread for that case? For various reasons, we need something that can be

Re: Bits from the Security Team

2007-10-20 Thread Lars Wirzenius
pe, 2007-10-19 kello 18:29 +0200, Adrian von Bidder kirjoitti: Seriously: I think exactly this kind of not really much new stuff going on, but here's what we're continuing to do kind of information should be more visible, because it, too, is valuable information to somebody who is not

Re: Bits from the Security Team

2007-10-20 Thread Steve Kemp
On Sat Oct 20, 2007 at 12:00:23 +0300, Lars Wirzenius wrote: pe, 2007-10-19 kello 18:29 +0200, Adrian von Bidder kirjoitti: Seriously: I think exactly this kind of not really much new stuff going on, but here's what we're continuing to do kind of information should be more visible,

Re: Bits from the Security Team

2007-10-20 Thread Steve Kemp
On Fri Oct 19, 2007 at 18:29:46 +0200, Adrian von Bidder wrote: That you like pies is important. :) Though in the specific case of the security team, the flow of security updates is an indication that the team is working Yes, this is what I think too. Could've cc:ed you at least.

Re: Bits from the Security Team

2007-10-19 Thread Adrian von Bidder
On Friday 19 October 2007 17.52:29 Steve Kemp wrote: I don't believe that post contains significant new information, (except that I like pies!), and as such I didn't believe it deserved massive visibility. That you like pies is important. Seriously: I think exactly this kind of not

Re: Bits from the Security Team

2007-10-19 Thread Moritz Muehlenhoff
Adrian von Bidder wrote: http://blog.steve.org.uk/articles/2007/10/19/as-i-move-on-through-the-year= =20 which is really a Bits from the Security Team. Full Bits will appear soon. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble

Bits from the Security Team

2007-10-19 Thread Adrian von Bidder
Hi everybody, Allow me to point out the message at http://blog.steve.org.uk/articles/2007/10/19/as-i-move-on-through-the-year which is really a Bits from the Security Team. Why is - once again - a message that I'd consider appropriate for d-d, or perhaps even d-d-a (though I admit

Re: Bits from the Security Team

2007-10-19 Thread Steve Kemp
On Fri Oct 19, 2007 at 17:36:21 +0200, Adrian von Bidder wrote: Allow me to point out the message at http://blog.steve.org.uk/articles/2007/10/19/as-i-move-on-through-the-year which is really a Bits from the Security Team. Why is - once again - a message that I'd consider appropriate