Re: Proposal: Allowing access to dmesg for users in group adm

2020-08-16 Thread Geert Stappers
On Mon, Aug 17, 2020 at 03:50:37PM +1200, Matthew Ruffell wrote:
> Hello!
> 
> I am currently working on a downstream effort to get 
> CONFIG_SECURITY_DMESG_RESTRICT enabled in Ubuntu, and I would like to see if
> the Debian community is interested in carrying some of my proposed patches to
> Ubuntu.
> 
> Debian already has CONFIG_SECURITY_DMESG_RESTRICT enabled by default since
> Stretch, but the dmesg command is restricted to superuser only. This is
> inconsistent with regular logging, which is only restricted to users in group
> "adm".
> 
> For example, on a fresh Debian Buster system:
> 
> $ head -1 /etc/os-release 
> PRETTY_NAME="Debian GNU/Linux 10 (buster)"
> 
> DMESG_RESTRICT is enabled, and my user is in group adm:
> 
> $ grep -Rin "CONFIG_SECURITY_DMESG_RESTRICT" 
> /boot/config-4.19.0-10-cloud-amd64 
> 3130:CONFIG_SECURITY_DMESG_RESTRICT=y
> $ groups
> mruffell adm dip video plugdev
> 
> Permissions for kern.log and syslog are for members of adm:
> 
> $ ls -l /var/log/kern.log 
> -rw-r- 1 root adm 39414 Aug 11 21:44 /var/log/kern.log
> $ ls -l /var/log/syslog
> -rw-r- 1 root adm 60744 Aug 11 21:56 /var/log/syslog
> 
> I can read /var/log/kern.log and journalctl:
> 
> $ head -2 /var/log/kern.log
> Aug 11 21:44:44 debian kernel: [0.00] Linux version 
> 4.19.0-10-cloud-amd64 (debian-kernel at lists.debian.org) (gcc version 8.3.0 
> (Debian 8.3.0-6)) #1 SMP Debian 4.19.132-1 (2020-07-24)
> Aug 11 21:44:44 debian kernel: [0.00] Command line: 
> BOOT_IMAGE=/boot/vmlinuz-4.19.0-10-cloud-amd64 
> root=UUID=fb69ad1f-43c0-40a4-8ec0-bb07f1175c82 ro console=tty0 
> console=ttyS0,115200 earlyprintk=ttyS0,115200 elevator=noop 
> scsi_mod.use_blk_mq=Y
> 
> $ journalctl -t kernel | head -3
> -- Logs begin at Tue 2020-08-11 21:44:43 UTC, end at Tue 2020-08-11 22:12:30 
> UTC. --
> Aug 11 21:44:43 debian kernel: Linux version 4.19.0-10-cloud-amd64 
> (debian-kernel at lists.debian.org) (gcc version 8.3.0 (Debian 8.3.0-6)) #1 
> SMP Debian 4.19.132-1 (2020-07-24)
> Aug 11 21:44:43 debian kernel: Command line: 
> BOOT_IMAGE=/boot/vmlinuz-4.19.0-10-cloud-amd64 
> root=UUID=fb69ad1f-43c0-40a4-8ec0-bb07f1175c82 ro console=tty0 
> console=ttyS0,115200 earlyprintk=ttyS0,115200 elevator=noop 
> scsi_mod.use_blk_mq=Y
> 
> And yet, I cannot access dmesg:
> 
> $ dmesg
> dmesg: read kernel buffer failed: Operation not permitted
> $ ls -l /bin/dmesg
> -rwxr-xr-x 1 root root 84288 Jan 10  2019 /bin/dmesg
> 
> Users on Ubuntu are accustomed to running dmesg without any permissions, which
> is why my downstream proposal to Ubuntu contained the following:
> 
> I propose that we restrict access to dmesg to users in group 'adm' like so:
> 
> 1) CONFIG_SECURITY_DMESG_RESTRICT=y in the kernel.
> 2) Following changes to /bin/dmesg permissions in package 'util-linux'
> - Ownership changes to root:adm
> - Permissions changed to 0750 (-rwxr-x---)
> - Add cap_syslog capability to binary.
> 3) Add a commented out '# kernel.dmesg_restrict = 0' to
>/etc/sysctl.d/10-kernel-hardening.conf
>
> You can read my original proposal on ubuntu-devel if you are interested:
> https://lists.ubuntu.com/archives/ubuntu-devel/2020-June/041063.html
> 
> Would the Debian community also be interested in the changes to the dmesg
> binary in package util-linux?
> 
> An example debdiff of the suggested changes which implement 2) is below:
> https://launchpadlibrarian.net/492806625/lp1886112_util-linux_groovy.debdiff
> 
> This would allow any user in group adm to be able to run dmesg without
> becoming superuser, and see the same information already available in
> /var/log/kern.log, /var/log/syslog and journalctl.

Correct.


> Please let me know if you are interested,

Yes I'm interested in this feature


> as it enhances user experience when running dmesg,

Yes, it does feel strange to prefix a readonly actio as dmesg
with sudo.


> and there would be less delta between Debian and Ubuntu
> util-linux packages to maintain.

That is a nice extra

 
> Thanks,
> Matthew Ruffell


Groeten
Geert Stappers
DD
-- 
Silence is hard to parse



debian sid --> lxde

2020-08-16 Thread Tiago Zaniquelli

Hello everybody.

Yesterday I began to try install sid in my computer.

So, I have a buster installation and i changed the source.list to sid, 
like that:


"

# deb cdrom:[Debian GNU/Linux 10.2.0 _Buster_ - Official amd64 NETINST 
20191116-09:56]/ buster main


#deb cdrom:[Debian GNU/Linux 10.2.0 _Buster_ - Official amd64 NETINST 
20191116-09:56]/ buster main


deb http://deb.debian.org/debian/ sid main
deb-src http://deb.debian.org/debian/ sid main

#deb http://security.debian.org/debian-security buster/updates main
#deb-src http://security.debian.org/debian-security buster/updates main

# buster-updates, previously known as 'volatile'
#deb http://deb.debian.org/debian/ buster-updates main
#deb-src http://deb.debian.org/debian/ buster-updates main

# This system was installed using small removable media
# (e.g. netinst, live or single CD). The matching "deb cdrom"
# entries were disabled at the end of the installation process.
# For information about how to configure apt package sources,
# see the sources.list(5) manual.

"

After that I executed apt-update and apt full-upgrade, so after that 
show me that the "wicd" will removed, but I can't do that because if I 
do that I will lost the program that configure my WiFi.


So How I do to resolve that?

Regards,

Tiago Zaniquelli



Proposal: Allowing access to dmesg for users in group adm

2020-08-16 Thread Matthew Ruffell
Hello!

I am currently working on a downstream effort to get 
CONFIG_SECURITY_DMESG_RESTRICT enabled in Ubuntu, and I would like to see if
the Debian community is interested in carrying some of my proposed patches to
Ubuntu.

Debian already has CONFIG_SECURITY_DMESG_RESTRICT enabled by default since
Stretch, but the dmesg command is restricted to superuser only. This is
inconsistent with regular logging, which is only restricted to users in group
"adm".

For example, on a fresh Debian Buster system:

$ head -1 /etc/os-release 
PRETTY_NAME="Debian GNU/Linux 10 (buster)"

DMESG_RESTRICT is enabled, and my user is in group adm:

$ grep -Rin "CONFIG_SECURITY_DMESG_RESTRICT" /boot/config-4.19.0-10-cloud-amd64 
3130:CONFIG_SECURITY_DMESG_RESTRICT=y
$ groups
mruffell adm dip video plugdev

Permissions for kern.log and syslog are for members of adm:

$ ls -l /var/log/kern.log 
-rw-r- 1 root adm 39414 Aug 11 21:44 /var/log/kern.log
$ ls -l /var/log/syslog
-rw-r- 1 root adm 60744 Aug 11 21:56 /var/log/syslog

I can read /var/log/kern.log and journalctl:

$ head -2 /var/log/kern.log
Aug 11 21:44:44 debian kernel: [0.00] Linux version 
4.19.0-10-cloud-amd64 (debian-kernel at lists.debian.org) (gcc version 8.3.0 
(Debian 8.3.0-6)) #1 SMP Debian 4.19.132-1 (2020-07-24)
Aug 11 21:44:44 debian kernel: [0.00] Command line: 
BOOT_IMAGE=/boot/vmlinuz-4.19.0-10-cloud-amd64 
root=UUID=fb69ad1f-43c0-40a4-8ec0-bb07f1175c82 ro console=tty0 
console=ttyS0,115200 earlyprintk=ttyS0,115200 elevator=noop 
scsi_mod.use_blk_mq=Y

$ journalctl -t kernel | head -3
-- Logs begin at Tue 2020-08-11 21:44:43 UTC, end at Tue 2020-08-11 22:12:30 
UTC. --
Aug 11 21:44:43 debian kernel: Linux version 4.19.0-10-cloud-amd64 
(debian-kernel at lists.debian.org) (gcc version 8.3.0 (Debian 8.3.0-6)) #1 SMP 
Debian 4.19.132-1 (2020-07-24)
Aug 11 21:44:43 debian kernel: Command line: 
BOOT_IMAGE=/boot/vmlinuz-4.19.0-10-cloud-amd64 
root=UUID=fb69ad1f-43c0-40a4-8ec0-bb07f1175c82 ro console=tty0 
console=ttyS0,115200 earlyprintk=ttyS0,115200 elevator=noop 
scsi_mod.use_blk_mq=Y

And yet, I cannot access dmesg:

$ dmesg
dmesg: read kernel buffer failed: Operation not permitted
$ ls -l /bin/dmesg
-rwxr-xr-x 1 root root 84288 Jan 10  2019 /bin/dmesg

Users on Ubuntu are accustomed to running dmesg without any permissions, which
is why my downstream proposal to Ubuntu contained the following:

I propose that we restrict access to dmesg to users in group 'adm' like so:

1) CONFIG_SECURITY_DMESG_RESTRICT=y in the kernel.
2) Following changes to /bin/dmesg permissions in package 'util-linux'
- Ownership changes to root:adm
- Permissions changed to 0750 (-rwxr-x---)
- Add cap_syslog capability to binary.
3) Add a commented out '# kernel.dmesg_restrict = 0' to
   /etc/sysctl.d/10-kernel-hardening.conf
   
You can read my original proposal on ubuntu-devel if you are interested:
https://lists.ubuntu.com/archives/ubuntu-devel/2020-June/041063.html

Would the Debian community also be interested in the changes to the dmesg
binary in package util-linux?

An example debdiff of the suggested changes which implement 2) is below:
https://launchpadlibrarian.net/492806625/lp1886112_util-linux_groovy.debdiff

This would allow any user in group adm to be able to run dmesg without
becoming superuser, and see the same information already available in
/var/log/kern.log, /var/log/syslog and journalctl.

Please let me know if you are interested, as it enhances user experience
when running dmesg, and there would be less delta between Debian and Ubuntu
util-linux packages to maintain.

Thanks,
Matthew Ruffell



Bug#968523: ITP: libnsl -- Public client interface for NIS(YP) and NIS+

2020-08-16 Thread Aurelien Jarno
Package: wnpp
Severity: wishlist
Owner: Aurelien Jarno 
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-gl...@lists.debian.org

* Package name: libnsl
  Version : 1.3.0
  Upstream Author : Thorsten Kukuk 
* URL : https://github.com/thkukuk/libnsl
* License : LGPL-2.1, LGPL-2.1+, BSD-3-clause
  Programming Lang: C 
  Description : Public client interface for NIS(YP) and NIS+

This package contains the libnsl library, which contains the public
client interface for NIS(YP) and NIS+. This code was formerly part of
glibc, but is now standalone to be able to link against TI-RPC for IPv6
support.

glibc 2.32 removed support for linking against the libnsl.so.1 library,
although the library is still shipped. The libnsl library, providing
libnsl.so.2 (so that it is co-installable), now replaces it.

This package will be maintained within the glibc team.



Bug#968510: ITP: xref-el -- Library for cross-referencing commands in Emacs

2020-08-16 Thread Sean Whitton
Package: wnpp
Severity: wishlist
Owner: Sean Whitton 

* Package name: xref-el
  Version : 1.0.2
  Upstream Author : FSF
* URL : https://www.example.org/
* License : GPL-3+
  Programming Lang: Emacs Lisp
  Description : Library for cross-referencing commands in Emacs

This is a newer version of xref.el than the one included with Emacs 27.
I am packaging it as a dependency for the latest version of my package
project-el.

This is similar to seq-el and org-mode, which are also bundled with
Emacs, but where we have more recent versions available as a separate
package.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#968507: O: icon-naming-utils -- script for maintaining backwards compatibility of Tango Project

2020-08-16 Thread Philipp Kern
Package: wnpp
Severity: normal

I intend to orphan the icon-naming-utils package.

Last upstream release was 11 years ago. There is effectively no churn in
this package. It is also a required build dependency for a bunch of icon
themes:

# Broken Build-Depends:
extra-xdg-menus: icon-naming-utils
gnome-icon-theme: icon-naming-utils (>= 0.8.7)
human-icon-theme/non-free: icon-naming-utils (>= 0.8.1)
mate-icon-theme: icon-naming-utils (>= 0.8.7)
mate-themes: icon-naming-utils
metatheme-gilouche: icon-naming-utils
moblin-icon-theme: icon-naming-utils
sugar-artwork: icon-naming-utils
suru-icon-theme: icon-naming-utils
tangerine-icon-theme/non-free: icon-naming-utils (>= 0.7.1)
tango-icon-theme: icon-naming-utils (>= 0.8.90)

The package description is:
 Tango is a project to create a new cross-desktop and cross-platform icon
 theme, using a standard style guide, and the new Icon Naming Specification.
 This package contains the perl script for maintaining backwards
 compatibility.



Re: Britney misses builds for architecture not listed in control

2020-08-16 Thread Adam D. Barratt
On Sun, 2020-08-16 at 15:51 +0200, Attila Szalay wrote:
> I have a relatively new package (BoxFort). In the beginning, I used
> the "any" architecture in the control so it was (tried to be)
> compiled on all architectures. But from the build logs, I
> realized that currently the package can only be compiled/used in a
> very few architectures (amd64, arm64, i386) because of various
> reasons.
> 
> Also, a bit late, I learned that if I have a package with only a
> static library inside, I do not need the lib package, only the -dev.
> So I dropped the lib package for the next upstream version and
> limited the architecture to the reliable 4 and uploaded it to the new
> pool.
> 
> But for some reason (either because the dropped lib package or post-
> initial arch change) the Britney miss the "armel" and the "armhf"
> architectures and not let the package arrive at testing.

It's the latter. You stopped building the binary package on those
architectures but the old binary packages are still in unstable. You
could check this yourself on e.g. the ftp-master mirror (or by looking
at the relevant packages files):

$ dak ls boxfort -S
boxfort| 0.0.0-git20200105-3e16c0a-2 | unstable   | source
boxfort| 0.0.0-git20200105-3e16c0a-6 | unstable   | source
boxfort| 0.0.0-git20200808-ac0507b-2 | unstable   | source
libboxfort | 0.0.0-git20200105-3e16c0a-2 | unstable   | armel
libboxfort | 0.0.0-git20200105-3e16c0a-6 | unstable   | armhf
libboxfort-dev | 0.0.0-git20200105-3e16c0a-2 | unstable   | armel
libboxfort-dev | 0.0.0-git20200105-3e16c0a-6 | unstable   | armhf
libboxfort-dev | 0.0.0-git20200808-ac0507b-2 | unstable   | amd64, arm64, i386

> What can be done to fix this situation?

You need to ask ftp-master to remove the old binaries, via an
appropriately-titled ftp.debian.org bug.

Regards,

Adam



Britney misses builds for architecture not listed in control

2020-08-16 Thread Attila Szalay
Hi,

I have a relatively new package (BoxFort). In the beginning, I used the
"any" architecture in the control so it was (tried to be) compiled on all
architectures. But from the build logs, I realized that currently the
package can only be compiled/used in a very few architectures (amd64,
arm64, i386) because of various reasons.

Also, a bit late, I learned that if I have a package with only a static
library inside, I do not need the lib package, only the -dev. So I dropped
the lib package for the next upstream version and limited the architecture
to the reliable 4 and uploaded it to the new pool.

But for some reason (either because the dropped lib package or post-initial
arch change) the Britney miss the "armel" and the "armhf" architectures and
not let the package arrive at testing.

What can be done to fix this situation?


Bug#968495: ITP: c-evo -- empire building game

2020-08-16 Thread Peter
Package: wnpp
Severity: wishlist
Owner: Peter Blackman 
X-Debbugs-CC: debian-devel@lists.debian.org

* Package name    : c-evo
  Version : 1.2.0
  Upstream Author : Jiri Hajda 
* URL : http://www.c-evo.org/ https://app.zdechov.net/c-evo/
* License : GPL2+
  Programming Lang: FPC / Lazarus
  Description : Empire Building Game

A civilization style turn based strategy game, of the Civ2 era.

C-evo has some similarities to FreeCiv, but substantial differences too.
1) City sprawl in C-evo is a losing strategy. You must build large cities to 
win.
2) Combat is completely deterministic, no random element.
3) Much tougher AI opponents.
4) Combat units must be designed, with chosen attack, defence & speed 
parameters.
 Cost is roughly the product of all three,
 so designs must specialise to keep costs reasonable.


Peter



signature.asc
Description: OpenPGP digital signature