Re: [Letsencrypt-devel] Certbot in Debian Stretch

2016-11-30 Thread Peter Eckersley
On Wed, Nov 30, 2016 at 10:34:11PM +0100, Christian Seiler wrote:
 
> Ah, and I ran my strace earlier with -e open,access, but after
> rechecking it, it does in fact check for the file's existence
> via stat(). I should remember to use -e open,access,stat when
> checking for file access with strace. [1]
> 
> And I just checked, putting post-hook = ... in there actually
> seems to work (renew -vvv says it won't run the post hook
> because nothing is to be renewed, but it won't print that
> message if I comment the line out). I do think you could also
> improve the documentation for the 'renew' command to mention
> that these hooks can be put in the central configuration file,
> and to recommend to people to do that instead of supplying
> them on the command line - that way people won't have the idea
> of modifying the cron job / systemd service for this kind of
> thing.

Defining hooks in cli.ini doesn't actually work in 0.9.3, but it sort of works
in git master, and will be properly solved for 0.10.0:

https://github.com/certbot/certbot/issues/3394
https://github.com/certbot/certbot/issues/3394#issuecomment-258579483

> 
> I've now created /etc/letsencrypt/cli.ini and removed my
> drop-in that modifies the systemd service. Thanks, this thread
> has already helped me make my setup saner. :)
> 
> Regards,
> Christian
> 
> [1] Probably should add openat,fstatat,faccessat to the list
> as well.
> 
> 

-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Re: [Letsencrypt-devel] Certbot in Debian Stretch

2016-11-30 Thread Peter Eckersley
On Wed, Nov 30, 2016 at 04:19:40PM +0100, Christian Seiler wrote:
> On 11/30/2016 02:33 PM, Virgo Pärna wrote:
> > On Fri, 25 Nov 2016 15:41:45 +0100, Christian Seiler <christ...@iwakd.de> 
> > wrote:
> >>
> >> is not an issue (it works fine), but I had modified the cron job to
> >> pass --renew-hook and --post-hook to certbot. (As far as I can tell,
> >> there's no way of setting these in a configuration file.) The only
> > 
> > I think that /etc/letsencrypt/cli.ini is supposed to work for it.
> 
> As far as I am aware this is non-standard, and all examples with
> that file name I could find would do
> 
> certbot --config /etc/letsencrypt/cli.ini
> 
> However, certbot --help paths clearly states that --config has no
> default value, so by default certbot does not read that file, and
> strace confirms it. Actually, the only files read in by certbot
> in /etc/letsencrypt are /etc/letsencrypt/renewal/$certname.conf
> and /etc/letsencrypt/archive/$certname/cert$N.pem.

The help is wrong there; that's an instance of this bug:

https://github.com/certbot/certbot/issues/3734
https://bugs.python.org/issue28742

I'm adding the --config flag you noticed as another case of that bug.  We'll
try to get a fix for that (which will probably require vendorng the argparse
library) included in upstream Certbot before Stretch freezes ;)

-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Re: [Letsencrypt-devel] Certbot in Debian Stretch

2016-11-30 Thread Peter Eckersley
On Tue, Nov 29, 2016 at 09:59:06AM +0100, Daniel Pocock wrote:
 
> This would probably mean making sure the client is checking the network
> API version and giving the user helpful, distro-specific instructions if
> there is a mismatch, e.g. a Debian user would see a message "The Let's
> Encrypt API no longer supports your client version, it is now essential
> for you to install certbot by (running apt-get upgrade | using
> $RELEASE_N-backports)"
> 
> To get the message exactly right, it would be useful if the certbot
> utility would actually check the apt catalog for both an SRU and
> backport and tell the user exactly which one is sufficient to get them
> going again.

We actually have some code that generates specific instructions of that exact 
sort;
it powers the Web application at https://certbot.eff.org/ ; the source code is
here:

https://github.com/certbot/website/tree/master/_scripts/instruction-widget

Unfortunately, it's written in the wrong language (JavaScript rather than Go)
for us to be able to easily have the boulder server return errors that send
these instructions to old copies of Certbot. So what we'd probably do is
tell people, "please install a copy of Cerbot greater than X; you can go
to https://certbot.eff.org/ if you need advice on how to do that on your OS"

-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Re: [Letsencrypt-devel] Certbot in Debian Stretch

2016-11-28 Thread Peter Eckersley
On Thu, Nov 24, 2016 at 02:45:26PM +0100, Ondřej Surý wrote:
 
> Peter, there's one more question embedded within what you have already
> asked:
>
> - would new versions of python-certbot and python-acme require new python
> libraries? If yes (or maybe), then the answer would be: go with
> stretch-backports.  But if you can use whatever will be in next Debian
> stable, it might be feasible to negotiate with Debian release team to push
> the new upstream releases via s-p-u. (However I am not speaking for or on
> behalf of the release team.)

We believe that we can avoid having new versions of python-certbot and
python-acme depend on new version of Python libraries. In general, we've been
trying to relax our dependencies upstream, rather than adding new ones.

Over the course of five years it's possible that we'll add new features that
do use new libraries or versions of libraries, but I think we can ensure
that the features are optional and the depenencies are not strict (ie,
they're only Recommends: or Suggests: in Debian packaging terms)

-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Re: [Letsencrypt-devel] Certbot in Debian Stretch

2016-11-28 Thread Peter Eckersley
On Thu, Nov 24, 2016 at 05:37:05PM +0200, Adrian Bunk wrote:
> On Thu, Nov 24, 2016 at 02:45:26PM +0100, Ondřej Surý wrote:
> > On Thu, Nov 24, 2016, at 13:39, Philipp Kern wrote:
> > > So if you, as an upstream maintainer, have a change that is needed for
> > > compatibility with changes in network APIs and the change is reviewable
> > > by humans, a stable update could be possible. It's still on a
> > > case-by-case basis, so you would need to ask and the Release Team cannot
> > > approve what they do not know about.
> > 
> > There are more cases where Debian stable is getting new upstream
> > releases.
> > It's mostly to keep up with the security (MySQL, PHP),
> >...
> 
> These are long-term supported upstream stable branches.
> 
> Debian cannot just sacrifice stability by throwing the latest upstream 
> release of some random packages into stable.

That's not what we asked for; we're only interested in having a subset of our
upstream releases taken into Debian stable, and only after we know from
extensive field testing that they're not breaking anything.

We'd be willing to consider defining an upstream stable release series to
formalize this, if the Debian community views that as especially important.

-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Re: [Letsencrypt-devel] Certbot in Debian Stretch

2016-11-28 Thread Peter Eckersley
On Fri, Nov 25, 2016 at 12:48:35PM +0100, Christian Seiler wrote:
 
> Note that per backports rules, $RELEASE_N-backports must track
> $RELEASE_N_PLUS_1, so if you remove certbot from Stretch, you'll
> also have to remove it from jessie-backports.

Thank you for pointing this out Christian. This policy removes what might have
been the simplest option, and seems to mean that we'll want to work hard on a 
plan
where Certbot is in Stretch in a way that works both for us upstream and for
the Debian release team.

-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Re: [Letsencrypt-devel] Certbot in Debian Stretch

2016-11-28 Thread Peter Eckersley
On Sat, Nov 26, 2016 at 09:35:46AM +0800, Paul Wise wrote:
> On Tue, Nov 22, 2016 at 9:40 AM, Peter Eckersley wrote:
> 
> > currently working with an ACME backwards compatibilty window of 6-12 months,
> > but probably not longer than that.
> 
> I note that letsencrypt 0.4.1-1 (before the rename to certbot) is
> available in Ubuntu xenial, which is scheduled for 5 years of support,
> terminating in 2021.
> 
> https://people.canonical.com/~ubuntu-archive/madison.cgi?package=letsencrypt+certbot
> https://wiki.ubuntu.com/Releases

Ubuntu developers have told us that they're likely to take a Xenial SRU to
Certbot 0.9.3 shortly:

https://bugs.launchpad.net/ubuntu/+source/python-letsencrypt/+bug/1640978
 

-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Re: [Letsencrypt-devel] Certbot in Debian Stretch

2016-11-23 Thread Peter Eckersley
On Wed, Nov 23, 2016 at 09:57:19AM +0100, Thijs Kinkhorst wrote:
 
> I'm a bit surprised by this policy. To my knowledge, concepts like automation
> and "hassle-free" are central to the Let's Encrypt concept. Obviously are
> online for more than a year, so installing Let's Encrypt certificates on them
> is not quite automated or hassle-free if you need to upgrade certbot several
> times during the projected lifetime of the server.
> 
> Is it really necessary to have such, in my opinion, really short API
> lifetimes?
> Surely you want to extend and develop it, but this can be done while keeping
> compatibility with existing clients in the field.

I think this is a pretty profound strategic and philosophical question :)

What I hear from the boulder development team is that supporting old versions
of the protocol on the server side will greatly complicate their work: they'll
either have to maintain many more code paths within a given application (to
support different call semantics in different versions of the protocol) or
support multiple instances of the CA application talking to the same back-end
databases. In one case they'd have to stick with an old version of the Go
language, because Go 1.7's standard library implemented better CSR checking,
which exposed a Certbot CSR formatting bug.

The boulder team's philosophy is to deal with these engineering difficulties
by being fairly agressive in pushing clients to take regular updates. They're
willing to maintain support for prior protocol versions, but only for a
limited amount of time. I think that "get everyone to run the latest and
most-correct code" approach is a fairly common attitude especially amongst
security-focussed projects.

But there are of course drawbacks: it makes life harder for projects that (in
relative terms) place a higher priority on stability vs security. And that's a
legitimate choice for many purposes.

So Let's Encrypt definitely wants to get to a place where we have some very
stable APIs for other people to code against. We're trying to do that with the
Certbot command line itself, working hard to ensure that if people upgrade, it
doesn't break scripts they might have written around the client. And in the
long run, I suspect ACME will mature and stabilise too.  But it's especially
tricky to expect long-run-future-compatibility from a service that's only been
online for a year.

-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Re: Certbot, Ring in Debian Stretch

2016-11-22 Thread Peter Eckersley
On Tue, Nov 22, 2016 at 08:23:59AM +0100, Daniel Pocock wrote:
> 
> I'd like to suggest an additional point relevant to all of the options: how
> well does the certbot client react when it is no longer usable?  Does the
> protocol include a mechanism to check the version?  Does the client give an
> explicit error telling the user to update the client and can it be tweaked
> so that Debian users are shown a message about getting the latest package
> from stable-backports?  Or will the user see some random error that doesn't
> mention the client version at all?
>

ACME includes an explicit versioning mechanism for inherently-breaking
protocol changes, and also a User Agent string that an be employed for
finer-grained conditional responses.

To date, we have never incremented the explicit versioning mechanism, but
there have been a couple of incompatibilities that could be characterised as
Certbot bugs which the Let's Encrypt servers initially tolerated, but
eventually stopped tolerating.

In this case: https://github.com/certbot/certbot/issues/2528 the server will
today send an error message, and buggy clients would print that error
instructing the user to upgrade Certbot and/or OpenSSL to fix the problem.
Note, however, that if Certbot is running in a renewal cron job, the sys admin
might miss that message.

In this case: https://github.com/certbot/certbot/issues/2768
the server was able to use the User Agent string to avoid sending incompatible
messages to older Certbot versions.

For cases in the future where ACME is intentionally being revised in an 
inherently
incompatible way, we would change the protocol's endpoint URI, and begin a 6-12
month compatibility window with the previous version.

In all cases we do have the option of sending email to the registered account
email addresses associated with older clients that are about to be
incompatible, provided that sys admins chose to give us an email address when
they created their Let's Encrypt accounts.


 
 

-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Certbot in Debian Stretch

2016-11-21 Thread Peter Eckersley
Hi!

I'm an upstream developer for Certbot, previously known as the Let's Encrypt
client (https://certbot.eff.org). Certbot is a flexible and very popular way
to get certificates from Let's Encrypt; it's issued about 300,000 currently
active TLS certs to Debian servers (and a lot more to Ubuntu servers). We hope
that over time, a lot of server software can be well-integrated with Certbot
in order to use authenticated TLS connections by default (see
https://certbot.eff.org/docs/using.html#plugins for some of the integration
efforts to date).

We're writing to figure out a plan for Certbot versioning and updates for
Stretch's stable lifetime. Certbot is still a fairly rapidly-improving,
not-quite-1.0 piece of software. The ACME protocol that it uses to talk to Let's
Encrypt is also rapidly evolving through an IETF working group
(https://datatracker.ietf.org/wg/acme/charter/), and the Let's Encrypt
server-side codebase (https://github.com/letsencrypt/boulder) is 
currently working with an ACME backwards compatibilty window of 6-12 months,
but probably not longer than that.

In order to both ensure that Certbot remains compatible with the deployed
Let's Encrypt service, and to ensure that users have as good an experience as
possible when they use Certbot, we do not think it would be wise to support a
specific version of Certbot from the Stretch freeze early next year through to
the EOL of that release.

There seem to be a few options available:

1. Leave Certbot out of the Debian Stretch release, and rely on
backports as the recommended way to run Certbot on Debian. That's what we
currently do with Jessie:

https://certbot.eff.org/#debianjessie-apache

2. Periodically declare a released version of Certbot to be well-tested,
stable, and free of detectable regressions or breakage of existing workflows,
and include it in Stretch's stable-updates repo.  We're currently trying the
Ubuntu equivalent of this process out with a proposed xenial SRU from
letsencrypt 0.4.1 to Certbot 0.9.3:

https://bugs.launchpad.net/ubuntu/+source/python-letsencrypt/+bug/1640978

We expect that such updates would occur every ~3-6 months. If the Debian
development community agreed to such a plan, we'd feel comfortable working
with it.

3. Someone could maintain a fork of a near-future Certbot release for the ~5
year lifecycle of the Stretch Debian release. The upstream team definitely
doesn't think this is a good idea, and we don't have the resources to support
such an effort.

Looking at the three options above, I think we'd default to doing 1, but we
would be open to pursuing option 2 if the Debian developer community supports
it, and think there could be advantages in terms of allowing other packages to
assume that Certbot is installable, or even Depend: on it, for enabling TLS.


-- 
Peter Eckersleyp...@eff.org
Chief Computer Scientist  Tel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993



Re: User-Agent strings, privacy and Debian browsers

2007-09-22 Thread Peter Eckersley
Yes and no.  Although IP addresses are a better tracking mechanism than
User-Agent strings, each of them makes the other more effective.  If you
always browse from one IP, and all the other people at that IP use
Windows, then this doesn't help you.  

But maybe you use open wifi networks, and other Debian users also use
those networks.  Maybe there are other Debian users behind your NAT.
Maybe your friends come over sometimes and they also use Debian.  In
those cases, standardising the User-Agent string increases the size of
your anonymity sets for various activities.

On Sep 21, Roberto C. Sánchez [EMAIL PROTECTED] wrote:


 It would be sort of pointless unless we could find a way to all browse
 from the same IP address.
 
 Regards,
 
 -Roberto


-- 
Peter Eckersley[EMAIL PROTECTED]
Staff TechnologistTel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: User-Agent strings, privacy and Debian browsers

2007-09-22 Thread Peter Eckersley
On Sep 22, Marco D'Itri [EMAIL PROTECTED] wrote:

 On Sep 22, Peter Eckersley [EMAIL PROTECTED] wrote:
 
  This means, in practice, that many sites will be able to track
  Debian users by their User-Agent, even if (say) the user is blocking
  cookies or limiting them to a single session and is changing IP
  address regularly.

 This is highly debateable. There may be tens or thousands of users of
 the same package visiting a web site.

I've seen reports from very large sites indicating that User-Agent
strings are almost as useful as cookies for tracking their users.

  Would there be any serious harm in terms of browser debugging?  Are

 Yes. For no real gain, it would make debugging harder and make
 statistics much less useful.

When do you need statistics about how many Debian users are using which
versions of which browser package?

As for debugging, I agree that there's an issue here, which is why I
asked the question.  But some evidence would be useful... does anyone
know any browser or site bugs that have been solved because the site
operator could see the version of a random visiting Debian browser?

--
Peter Eckersley[EMAIL PROTECTED]
Staff TechnologistTel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: User-Agent strings, privacy and Debian browsers

2007-09-22 Thread Peter Eckersley
On Sat, Sep 22, 2007  at 11:36:41 +0100, Mark Brown wrote:
 
  This means, in practice, that many sites will be able to track
  Debian users by their User-Agent, even if (say) the user is blocking
  cookies or limiting them to a single session and is changing IP
  address regularly.
 
 I would strongly expect that any user sufficiently concerned about
 these issues to take active steps like those would be willing to use
 things like either the user agent configuration availialbe one way or
 another in most browsers or something like privoxy (possibly in
 conjunction with tor) which will do the same things and more.

I think this misunderstands the problem.  Having stronger privacy is
like an insurance policy: most of the people who end up having needed it
never knew they were going to need it.  So they weren't going to have
gone out and installed Privoxy (maybe with Tor) /and/ then examined it
closely enough to realise that it doesn't alter their User-Agent by
default, and configured it to masquerade as Firefox on Windows or
something. 

Which brings us to a separate point: it's no use to have Privoxy
configured to block User-Agent strings, since that means you'll be the
one person with no User-Agent, which gives you an even smaller anonymity
sets than the default debian packages.  Yes, smart users will copy
Firefox on Windows, which works -- so long as there isn't one little
thing about their browser which gives away their platform.  Cos then,
they can be identified as the one guy running Iceweasel masquerading as
Firefox on Windows.  Also, plenty of debian users would have 

It really does help to have larger groups of people whose browsers are
behaving the same way by default.  In the case of Privoxy, this would
mean having all of the default Privoxy distributions (and especially
those that are shipped with Tor) use a single User-Agent.  We were also
planing to send those trivial Privoxy configuration patches, it'd be
great if we could get the community to standardise on Mozilla/5.0
(Privoxy) or something.

-- 
Peter Eckersley[EMAIL PROTECTED]
Staff TechnologistTel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



User-Agent strings, privacy and Debian browsers

2007-09-21 Thread Peter Eckersley
Consider for a moment a typical User-Agent string sent by a Debian web browser:

Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.6) Gecko/20070802 Iceape/1.1.4 
(Debian-1.1.4-1)

Unfortunately, the fact that this information identifies a specific
package and version of that package means that Debian users (already a
select group) have their browsing identities further distinguished by
their User-Agent strings.

This means, in practice, that many sites will be able to track Debian
users by their User-Agent, even if (say) the user is blocking cookies or
limiting them to a single session and is changing IP address regularly.

What do people think of picking a single User-Agent string for all
versions of all of Debian's Gecko-based browsers?

Would there be any serious harm in terms of browser debugging?  Are
there many sites which usefully treat different Gecko browsers
differently?

As a far more hypothetical question, what would people think of picking
a single User-Agent for Gecko-based browsers for a larger set of
GNU/Linux distributions?  Obviously, there is much more politics there,
because any distributions that joined would be losing the ability to
measure their desktop market share by looking at web statistics.

-- 
Peter Eckersley[EMAIL PROTECTED]
Staff TechnologistTel  +1 415 436 9333 x131
Electronic Frontier FoundationFax  +1 415 436 9993


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: An idea from a Debian user

2005-03-17 Thread Peter Eckersley
On Thu, Mar 17, 2005 at 12:28:55PM +1100, Evan Cox wrote:

 My idea is to create a frontend program that is similar to the profile
 'Midnight Commander' in Konqueror (ie screen splint into 3/4 top and
 1/4 CLI) that begins with  iconised area relevant to the
 administration task, and ends with a screen of relevant commands for
 the appropriate task and when appropriate some GUI features.  
 
 From my point of view, a program like this would be a fantastic
 learning 
 assistant in the crossover from point and click to CLI, and add a
 central administration section to Debian.   
 
This sort of thing could be a great teaching tool. It is not so much
related to a distribution like debian, but to the *nix command line in
general.  Command line shells are extremely powerful, but they were
never designed in a coherent and though-out fashion, so they're much
harder to learn than, for example, an elegant programming language.

The problem with your proposal is that it's an extremely large and
complicated task if you want to do it properly.  It isn't going to
happen unless someone (probably not debian) puts extensive
effort into it.

It might also be easier to implement a new, less crufty, command line
shell (and programmatic interface to standard command line tools) from
scratch while one was at it. 

-- 
Peter Eckersley
Department of Computer Science mailto:[EMAIL PROTECTED] 
IP Research Institute of Australia http://www.cs.mu.oz.au/~pde
The University of Melbourne   


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Solving the compression dilema when rsync-ing Debian versions

2001-01-08 Thread Peter Eckersley
On Mon, Jan 08, 2001 at 08:27:53AM +1100, Sam Couter wrote:
 Otto Wyss [EMAIL PROTECTED] wrote:
  
  So why not solve the compression problem at the root? Why not try to
  change the compression in a way so it does produce a compressed result
  with the same (or similar) difference rate as the source? 
 
 Are you going to hack at *every* different kind of file format that you
 might ever want to rsync, to make it rsync friendly?
 
 Surely it makes more sense to make rsync able to more efficiently deal with
 different formats easily.

I think you reach the right conclusion, but for the wrong reason.

Either you fix rsync for each of n file formats, or you fix n file formats
for rsync :)

The advantage of doing it in rsync-land is that you can do a better job; you
apply the inverse of the compression format at both ends, calculate the
differences, and re-apply compression (probably gzip rather than the original
algorithm, but it depends) to these.  Trying to hack compression algorithms to
fit rsync is in general a bad idea.  Rusty could probably get away with it for
gzip, because it is very simple - decompression of gzip is interpreting codes
like repeat the 17 characters you saw 38 characters ago.

Other, more sophisticated algorithms, like bzip2 (go and read about the
Burrows-Wheeler Transform, it's amazing ;) would be much harder to hack in any
reasonable way.

--

| |= -+- |= |
|  |-  |  |- |\

Peter Eckersley
([EMAIL PROTECTED])
http://www.cs.mu.oz.au/~pde

for techno-leftie inspiration, take a look at
http://www.computerbank.org.au/


pgp8KT0vs0T0R.pgp
Description: PGP signature


Re: Solving the compression dilema when rsync-ing Debian versions

2001-01-08 Thread Peter Eckersley
On Mon, Jan 08, 2001 at 11:58:26PM +1100, Peter Eckersley wrote:
 On Mon, Jan 08, 2001 at 08:27:53AM +1100, Sam Couter wrote:
  Otto Wyss [EMAIL PROTECTED] wrote:
   
   So why not solve the compression problem at the root? Why not try to
   change the compression in a way so it does produce a compressed result
   with the same (or similar) difference rate as the source? 
  
  Are you going to hack at *every* different kind of file format that you
  might ever want to rsync, to make it rsync friendly?
  
  Surely it makes more sense to make rsync able to more efficiently deal with
  different formats easily.
 
 I think you reach the right conclusion, but for the wrong reason.
 
 Either you fix rsync for each of n file formats, or you fix n file formats
 for rsync :)
 
 The advantage of doing it in rsync-land is that you can do a better job; you
 apply the inverse of the compression format at both ends, calculate the
 differences, and re-apply compression (probably gzip rather than the original

smacks self in head

That wasn't very clear of me, was it?  Gzip compression is fine for
transferring data on the wire.  At the other end, you still need to reuse the
original algorithm.  Re-applying compression is, of course, a potential
problem (as someone pointed out in another thread, even gzip is not in general
re-applicable).

So more correctly, an rsync module is better where it's possible...

 algorithm, but it depends) to these.  Trying to hack compression algorithms to
 fit rsync is in general a bad idea.  Rusty could probably get away with it for
 gzip, because it is very simple - decompression of gzip is interpreting codes
 like repeat the 17 characters you saw 38 characters ago.

--
Peter Eckersley http://www.cs.mu.oz.au/~pde 
([EMAIL PROTECTED])  TLI:  http://www.computerbank.org.au
~sig temporarily conservative pending divine intervention~
GPG fingerprint: 30BF 6A78 2013 DCFA 5985  E255 9D31 4A9A 7574 65BC


pgp4KnkuuM3vN.pgp
Description: PGP signature


Re: Obsolete software in /usr/local

2001-01-06 Thread Peter Eckersley
On Sat, Jan 06, 2001 at 08:23:29PM -0400, Ben Armstrong wrote:
 On Sat, Jan 06, 2001 at 03:49:07PM -0500, Greg Stark wrote:
  I've been meaning to bring this up for a while: 
  Why on earth was this change ever made?
 
 I can't speak for whoever made the change, but I suspect that it is
 because LD_LIBRARY_PATH can be used to support libraries in /usr/local/lib
 for programs in /usr/local/bin without messing up anything that ships with
 Debian.  Otherwise, there exists the possibility that the wrong library
 will be used.  This is especially of concern for developers, who may be
 putting things in /usr/local/bin and /usr/local/lib to test before
 releasing a package.  We would not want their local libraries to be linked
 in official Debian packages.

That doesn't seem like an elegant explanation.  Wouldn't it make more
sense to have a script to make sure that a Debian package hasn't got
links to whacky non-standard libraries?

The current behaviour is rather non-intuitive, and, as Greg said, lots
of sysadmins will change it (after wasting time trying to find out
what's going on).

 
 In any event, looking in bugs.debian.org for the old bug that this change
 closed might give you more info than this rough guess.
 

The bug isn't there anymore.  Does anyone remember what it was?

-- 

| |= -+- |= |
|  |-  |  |- |\

Peter Eckersley
([EMAIL PROTECTED])
http://www.cs.mu.oz.au/~pde

for techno-leftie inspiration, take a look at
http://www.computerbank.org.au/


pgpR54rMNVxQn.pgp
Description: PGP signature


Re: lilo.conf

2001-01-06 Thread Peter Eckersley
On Sat, Jan 06, 2001 at 04:12:54AM +0100, Mathias Gygax wrote:
 On Sam, Jan 06, 2001 at 01:52:17 +1100, Russell Coker wrote:
  I'll try and make the next version do what you
  require.
  
 well it's not necessary, but what about a boot message like:
 
 
 _-_
 _--   __  _
  ___ ___--  \
  \
 -__| _)
  __-/ \
  ___-___--  \  o /)\
--___  ---\__/  /
 -__\ --_  /\
--__--__ \_/   \_/\
|   /  |
|  |___|
|  | ((_(_)| )_)
-:-=] Debian GNU/Linux [=-:-|  \_((_(_)|/(_)
\ (
 \_)
 
 :*)
 
Argh.

This is terrible.  There's no /usr/share/ascii-art!  What has Debian
been doing all these years?

I guess we could resort to

append=init=/usr/games/fortune ascii-art

to salvage some kind of credibility...

-- 

Peter Eckersley
([EMAIL PROTECTED])
http://www.cs.mu.oz.au/~pde

for techno-leftie inspiration, take a look at
http://www.computerbank.org.au/




Re: Bug#80343: general: Lack of policy on which files should be owned by which user

2000-12-27 Thread Peter Eckersley
On Tue, Dec 26, 2000 at 12:38:28PM +0200, Eray Ozkural (exa) wrote:
 Hamish Moffatt wrote:
  
  On Tue, Dec 26, 2000 at 04:43:53AM +0200, Eray Ozkural (exa) wrote:
   I like using groups to give different sets of rights and I'm
   annoyed by Debian giving every user his own group. Is that
   reall necessary?
  
  No, but it's a good idea. It makes it much easier to work in
  directories shared with other users (but not all users), because
  you don't have to keep changing your umask all the time, or
  even worse, fixing file permissions because you (or somebody
  else) forgot to change their umask.
  
 
 I always thought it was a paranoid kind of security feature
 in Debian. I might be wrong of course.
 
 How does giving every user his own group makes it easier for
 him to share files without system administrator's intervention?
 I couldn't guite get it, sorry I just woke up but I simply
 don't understand it. A small example?
 

Other people have provided most of the really useful reasons, but
another one, which is denies access rather than providing it:

If my I want a file to be readable by everybody *except* user fred, I
can set permissions:

[EMAIL PROTECTED]:~ ls -l plot-against-fred
-rwr--1 pde  fred  1 Dec 27 17:12 plot-against-fred

Of course, I need root access to do it :(

-- 

| |= -+- |= |
|  |-  |  |- |\

Peter Eckersley
([EMAIL PROTECTED])
http://www.cs.mu.oz.au/~pde

for techno-leftie inspiration, take a look at
http://www.computerbank.org.au/


pgpPI0gcYjqqT.pgp
Description: PGP signature


Re: List of packages needing a new maintainer

2000-12-26 Thread Peter Eckersley
On Tue, Dec 26, 2000 at 04:50:58PM +0100, Martin Michlmayr wrote:

 RFA: gdict -- small GTK app to retrieve definitions from MIT's dictionary 
 server

Ummm...

it *seems* like gdict has been swallowed by gnome-utils.

If that weren't the case, I would have volunteered.

-- 

| |= -+- |= |
|  |-  |  |- |\

Peter Eckersley
([EMAIL PROTECTED])
http://www.cs.mu.oz.au/~pde

for techno-leftie inspiration, take a look at
http://www.computerbank.org.au/


pgpUW4UzSBT45.pgp
Description: PGP signature


Re: Need to clone machines efficiently - help?

2000-12-25 Thread Peter Eckersley
On Mon, Dec 25, 2000 at 12:15:50AM -0800, Erik Winn wrote:

 Hi Folks,
 
  I have just started working with a group here in Portland that is taking in 
 old machines and recycling them - putting linux on as the OS (of course ;}). 
 See http://www.freegeek.org for more. Its a non-profit all volunteer thing; 
 and actually one of the people has posted to one of these lists before ... 
 but, apparently things kinda (lamely, IMO) drifted toward a mandrake system 
 -- I think I can turn that around with a little help; I am putting in some 
 good time there and I think that when the realities of maintaining and 
 upgrading rpm systems hits they may change their minds.

Cool...

we've got an established organisation doing this in Australia now:

http://www.computerbank.org.au

We're using Debian for all of our systems.

 
  Here is the first obstacle - not really a big one, but I spent all day 
 digging around and couldn't really find any tools for this one: we want to be 
 able to clone the machines easily over the local net. Mandrake has a tricky 
 boot floppy that asks only for the eth0 config and then runs a bunch of perl 
 to do the rest of the install non-interactively. I haven't started reading 
 the scripts yet (that's plan B), instead I was hoping that someone had come 
 up with something similar for debian. We are looking at hundreds of boxes 
 already and its really just begun.

This was extremely difficult for us at first, simply because the
hardware we got was so variable that no standard install was really
possible.  There was one small shipment of machines with identical disks
which we cloned using dd :).

Things have got much better lately, since we started receiving corporate
donations of largeish groups of modern PCs with similar hardware.  The
way we've ended up doing it is this:

* A debian mirror server
* Customised task packages

So we start a normal debian install, but then pick
task-computerbank-whatever and it's done.

A custom task package might play really well with an automated
installer, if your hardware is sufficiently uniform to support one.

 
  This is really not a huge task - it would just make a nice splash over here 
 if we could come up with something ...
 
  I would greatly appreciate recieving help/ideas/advice on this - Note 
 however that I am not actually subscribed to the list at present (sorry, just 
 too much at the moment ) so you can reply to me personally if you like.
 
  Thanks very much in advance! I hope we can get this to happen.
 

Good luck with your project.  Take a look at Computerbank, and if the
goals are close enough, perhaps we should start considering
international affiliations (Computerbank has several chapters in
different cities, and we've found that this has certainly been to our
advantage - international links would be even better).

-- 

| |= -+- |= |
|  |-  |  |- |\

Peter Eckersley
([EMAIL PROTECTED])
http://www.cs.mu.oz.au/~pde

for techno-leftie inspiration, take a look at
http://www.computerbank.org.au/


pgp4lKXf5Bgzz.pgp
Description: PGP signature