Bug#766306: torsocks: ERROR torsocks[13827]

2014-11-05 Thread intrigeri
Hi David,

unfortunately, the fix for #766306 (fd passing) makes torsocks fail to
build on kfreebsd-{amd64,i386}:

  https://buildd.debian.org/status/package.php?p=torsocks

May you please have a look?

Time-wise, I'd like to see this bug fixed in Jessie, and the deadline
to have a fix for an important bug is December 5, so it would be
good to have a fix that doesn't introduce regressions by, say,
November 20. Does it look doable to you?

Cheers,
--
intrigeri


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#766306: torsocks: ERROR torsocks[13827]

2014-11-05 Thread intrigeri
Please reply on #768140, sorry for the confusion.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-28 Thread intrigeri
Control: severity -1 important
Control: tag -1 + pending

Hi,

David Goulet wrote (23 Oct 2014 13:15:02 GMT) :
 On reason it might fail, this test needs Tor access thus the Internet
 :).

Indeed, that was it -- thanks! The test passes for me when I give
network access to my pbuilder build environment. I'm now testing
a 2.0.0-2 tentative package with this patch applied. If it works fine
for me, then I'll upload tomorrow.

Bumping severity, after discussing it with Lunar (who leaned the other
way) and making up my mind: on the one hand, not supporting some
usecases in torsocks is entirely acceptable; on the other hand,
aborting an application altogether, which can cause data loss, is no
good way to communicate your usecase is not supported to
a torsocks user.

Cheers,
-- 
intrigeri


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-23 Thread intrigeri
Hi David,

David Goulet wrote (22 Oct 2014 21:06:16 GMT) :
 Just pushed the update in the upstream git.

 https://gitweb.torproject.org/torsocks.git/commit/eb80d5cd10d10158b39c344ad035afe8d31a899f

 That commit *improves* drastrically Unix socket fd passing detection and
 adds a test also.

 I've been using it for the last hours, I'm confident that you can
 package it. Worst case, we'll issue a fix quickly :).

Thanks. This new test doesn't pass for me (with that commit applied on
top of Debian's 2.0.0-1):

  ./test_fd_passing  
  Failed 5/5 subtests 

Does it depend on any other unreleased commit on your master branch,
or something?

Cheers,
-- 
intrigeri


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-23 Thread David Goulet
On 23 Oct (08:02:36), intrigeri wrote:
 Hi David,
 
 David Goulet wrote (22 Oct 2014 21:06:16 GMT) :
  Just pushed the update in the upstream git.
 
  https://gitweb.torproject.org/torsocks.git/commit/eb80d5cd10d10158b39c344ad035afe8d31a899f
 
  That commit *improves* drastrically Unix socket fd passing detection and
  adds a test also.
 
  I've been using it for the last hours, I'm confident that you can
  package it. Worst case, we'll issue a fix quickly :).
 
 Thanks. This new test doesn't pass for me (with that commit applied on
 top of Debian's 2.0.0-1):
 
   ./test_fd_passing  
   Failed 5/5 subtests 
 
 Does it depend on any other unreleased commit on your master branch,
 or something?

Hrm! No... I ran that test for an full hour in a loop yesterday and it
*never* failed the full 5 sub-tests...

On reason it might fail, this test needs Tor access thus the Internet
:). Other way to find out what's failing, can you simply run it and
provide the output?

TORSOCKS_LOG_LEVEL=5 ./tests/test_fd_passing

Thanks!
David


signature.asc
Description: Digital signature


Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-22 Thread intrigeri
Hi David,

tester wrote (22 Oct 2014 04:08:42 GMT) :
 I was running bitmessage, and figured out it really isnt using the proxy, so I
 ran it using torsocks, it ran for along time, but then crashed with this error
 after I posted a message
 ERROR torsocks[13827]: [recvmsg] Inet socket passing detected. Aborting
 everything! A non Tor socket could be used thus leaking information. (in
 tsocks_recvmsg() at recv.c:87)

Does this ring a bell?

Cheers,
-- 
intrigeri


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-22 Thread David Goulet
On 22 Oct (11:07:02), intrigeri wrote:
 Hi David,
 
 tester wrote (22 Oct 2014 04:08:42 GMT) :
  I was running bitmessage, and figured out it really isnt using the proxy, 
  so I
  ran it using torsocks, it ran for along time, but then crashed with this 
  error
  after I posted a message
  ERROR torsocks[13827]: [recvmsg] Inet socket passing detected. Aborting
  everything! A non Tor socket could be used thus leaking information. (in
  tsocks_recvmsg() at recv.c:87)
 
 Does this ring a bell?

Yes. That means torsocks detected that the torified process received an
inet socket from an other process using the fd passing feature of Unix
socket thus stopped everything since it can't torify that socket.

I thought about a middle groud of simply denying the call and returning
an error but still printing an error.

Let me know if you would be open to try that. I can provide a trivial
patch quickly for testing.

Cheers!
David

 
 Cheers,
 -- 
 intrigeri


signature.asc
Description: Digital signature


Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-22 Thread intrigeri
Hi,

David Goulet wrote (22 Oct 2014 13:22:14 GMT) :
 Yes. That means torsocks detected that the torified process received an
 inet socket from an other process using the fd passing feature of Unix
 socket thus stopped everything since it can't torify that socket.

Thanks for the explanation :)

 I thought about a middle groud of simply denying the call and returning
 an error but still printing an error.

 Let me know if you would be open to try that. I can provide a trivial
 patch quickly for testing.

I'm not sure what would be best for user experience.

The problem with aborting the torsocks'ified application altogether is
that it can result in data loss -- right? If that's the case, then
this bug is actually release critical, and indeed the way you're
suggesting seems to be the way to go. In order to have it in Jessie
without needing to go through the unblock request process, we would
have to upload a fix in the next 2 days.

OTOH, merely returning+printing an error could be confusing, if the
application is poorly written and doesn't check the return value.
I guess that's someone else's problemâ„¢, but actually we have to care
a little bit, and I've no idea how widespread such problems can be in
the real world. Any idea?

Cheers!
-- 
intrigeri


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-22 Thread David Goulet
On 22 Oct (16:29:28), intrigeri wrote:
 Hi,
 
 David Goulet wrote (22 Oct 2014 13:22:14 GMT) :
  Yes. That means torsocks detected that the torified process received an
  inet socket from an other process using the fd passing feature of Unix
  socket thus stopped everything since it can't torify that socket.
 
 Thanks for the explanation :)
 
  I thought about a middle groud of simply denying the call and returning
  an error but still printing an error.
 
  Let me know if you would be open to try that. I can provide a trivial
  patch quickly for testing.
 
 I'm not sure what would be best for user experience.
 
 The problem with aborting the torsocks'ified application altogether is
 that it can result in data loss -- right? If that's the case, then
 this bug is actually release critical, and indeed the way you're
 suggesting seems to be the way to go. In order to have it in Jessie
 without needing to go through the unblock request process, we would
 have to upload a fix in the next 2 days.
 
 OTOH, merely returning+printing an error could be confusing, if the
 application is poorly written and doesn't check the return value.
 I guess that's someone else's problemâ„¢, but actually we have to care
 a little bit, and I've no idea how widespread such problems can be in
 the real world. Any idea?

Poor code is *very* widespread in the world unfortunately... However,
application using fd passing are usually a bit more resilient since it's
not a trivial feature to use and many errors are possible!

I think that once we detect FD passing (if inet), we could stop it,
close the passed socket and return something like EACCESS. This is not
documented in the man page unfortunately but Linux LSM return that error
code if denied (I just confirmed with the kernel code) so I think it
would be a good alternative.

In a nutshell, cleanup the received socket and return EACCESS?

If we agree on that, I can push a patch today!

David

 
 Cheers!
 -- 
 intrigeri


signature.asc
Description: Digital signature


Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-22 Thread intrigeri
David Goulet wrote (22 Oct 2014 14:42:14 GMT) :
 In a nutshell, cleanup the received socket and return EACCESS?
 If we agree on that, I can push a patch today!

I'm lacking the basic knowledge needed to clearly understand
everything about this proposal, but your reasoning looks sensible,
so... go! :)


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-22 Thread David Goulet
On 22 Oct (17:01:29), intrigeri wrote:
 David Goulet wrote (22 Oct 2014 14:42:14 GMT) :
  In a nutshell, cleanup the received socket and return EACCESS?
  If we agree on that, I can push a patch today!
 
 I'm lacking the basic knowledge needed to clearly understand
 everything about this proposal, but your reasoning looks sensible,
 so... go! :)

I guess you prefer an official release for that?


signature.asc
Description: Digital signature


Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-22 Thread intrigeri
David Goulet wrote (22 Oct 2014 15:19:58 GMT) :
 I guess you prefer an official release for that?

A commit applied to your HEAD would be enough, as long as it's
well tested.

Cheers,
-- 
intrigeri


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-22 Thread David Goulet
On 22 Oct (22:29:43), intrigeri wrote:
 David Goulet wrote (22 Oct 2014 15:19:58 GMT) :
  I guess you prefer an official release for that?
 
 A commit applied to your HEAD would be enough, as long as it's
 well tested.

Just pushed the update in the upstream git.

https://gitweb.torproject.org/torsocks.git/commit/eb80d5cd10d10158b39c344ad035afe8d31a899f

That commit *improves* drastrically Unix socket fd passing detection and
adds a test also.

I've been using it for the last hours, I'm confident that you can
package it. Worst case, we'll issue a fix quickly :).

Cheers!
David

 
 Cheers,
 -- 
 intrigeri


signature.asc
Description: Digital signature


Bug#766306: torsocks: ERROR torsocks[13827]

2014-10-21 Thread tester
Package: torsocks
Version: 2.0.0-1
Severity: normal

Dear Maintainer,

I was running bitmessage, and figured out it really isnt using the proxy, so I
ran it using torsocks, it ran for along time, but then crashed with this error
after I posted a message
ERROR torsocks[13827]: [recvmsg] Inet socket passing detected. Aborting
everything! A non Tor socket could be used thus leaking information. (in
tsocks_recvmsg() at recv.c:87)

thanks for your work :D

*** End of the template - remove these template lines ***



-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages torsocks depends on:
ii  libc6  2.19-11

Versions of packages torsocks recommends:
ii  tor  0.2.5.8-rc-1

torsocks suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org