Re: kernel/d-i/security/release meeting at DebConf6

2006-05-26 Thread Andreas Barth
* Sven Luther ([EMAIL PROTECTED]) [060526 10:20]:
 Well, it was my understanding that both those packages where living in a
 differnt section, namely etch and etch-whatever, which would take care of
 the problem. Failing that, it is easy enough to handle the problem in the same
 way as we want to handle the sid/etch kernel dichotomy, in case we froze on a
 2.6.16 kernel.

Both packages will have to live in etch.

Cheers,
Andi
-- 
  http://home.arcor.de/andreas-barth/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-26 Thread Sven Luther
On Thu, May 25, 2006 at 05:10:57PM -0700, Steve Langasek wrote:
 On Tue, May 23, 2006 at 07:08:41PM +0200, Sven Luther wrote:
  On Tue, May 23, 2006 at 09:47:08AM -0700, Steve Langasek wrote:
   On Mon, May 22, 2006 at 11:38:46PM +0200, Sven Luther wrote:
On Mon, May 22, 2006 at 01:52:47PM -0700, Steve Langasek wrote:
  Perhaps we disable new kernel features for etch 1/2?  e.g., limit 
  new
  feature to new hardware support.  For example, we wouldn't want to
  turn on something as drastic as preempt in a stable update.
 
 So how do you structure this?  I would expect that updates limited to 
 new
 hardware support shouldn't normally change the kernel ABI at all, 
 which
 makes it hard to make both the old and new kernel versions available 
 for
 installation.
 
 If it is a new kernel ABI (either because the version number has 
 simply been
 changed on it, or for other reasons), what gets done with out-of-tree 
 module
 packages?
 
If ever the new out-of-tree module and d-i kernel reunification is in 
place,
it will be easy enough to rebuild all packages which depend on the 
abi-changed
kernel.
 
   rebuilding them doesn't address the question of making them available 
   for
   both old and new kernels.  Since the assumption seems to be that etch 1/2
 
  Well, they will obviously have the abi number embedded in their package 
  name,
  and a virtual package / provides who will handle the transition, so this
  should be no real problem. It is a technology that is well proven and 
  mastered
  since years in debian. See the ocaml example.
 
 Er, the problem is that you're talking about keeping *two* sets of packages
 around.  That implies two source packages; at least some members of the ftp

Well, it was my understanding that both those packages where living in a
differnt section, namely etch and etch-whatever, which would take care of
the problem. Failing that, it is easy enough to handle the problem in the same
way as we want to handle the sid/etch kernel dichotomy, in case we froze on a
2.6.16 kernel.

 team don't like having source packages building binaries that aren't
 mentioned in debian/control of the source package, and keeping one source

I fail to see the problem here.

 package for two kernel versions, one of them added at a later date and for
 an undetermined version, pretty definitely means that one set of these
 binaries aren't mentioned in debian/control of the current source package.

No, see above.

 The ftp team might be ok with making an exception here, I'm just saying
 that's a conversation to have *before* release instead of when it comes time
 to do etch 1/2 and people suddenly realize there's no infrastructure to
 fully support both kernels.

Ah, yes, i fully agree with you about that. Like most of the discussions we
are having now should have been handled last fall :)

   uses a different upstream kernel version than etch, to be able to continue
   providing security support for the etch versions it seems that you need a
   separate source package (or a whole new suite in dak complete with w-b
   support!) for any packages being rebuilt against the etch 1/2 kernel.
 
  You need a source package, which will be able to generate its debian/control
  semi-automatically, to adjust to the kernel abi change, yes. This is also
  something we have done in the ocaml case recently. Needs some coordination 
  and
  policy for the out of tree modules, and maybe binNMUs who are able to
  regenerate the debian/control in this way, but nothing otherwordly.
 
 Changing the list of packages in debian/control in the standard debian/rules
 targets is almost always something we treat as an RC bug; so binNMUs are
 definitely out.

Indeed. But why be so inflexible ? Why not see that there are some limited
cases where this is useful, and this is one of them. What is so definitively
wrong in this case ? 

Also, the problem is not as you think, the idea is only to modify the
debian/control in an automated way in the source upload, so no, it would not
be binNMUs, but some kind of automated sourceNMUs.

We have the same problem in the ocaml case, and see what happened, despite our
care, some of the m68k packages where rebuilt with the older ocaml, the same
problem can happen here if we are not carefull and will cause a mess.

 Which means sourceful uploads, which means the binaries for the old kernel
 no longer correspond to the current source package, which means rene tags
 them as candidates for removal...

We can simply append some random tag to the new source-upload, or upload them
to a separate archive, and the problem goes away by itself.

There are always solution if there is the will to implement them :)

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-26 Thread Sven Luther
On Fri, May 26, 2006 at 11:39:30AM +0200, Andreas Barth wrote:
 * Sven Luther ([EMAIL PROTECTED]) [060526 10:20]:
  Well, it was my understanding that both those packages where living in a
  differnt section, namely etch and etch-whatever, which would take care of
  the problem. Failing that, it is easy enough to handle the problem in the 
  same
  way as we want to handle the sid/etch kernel dichotomy, in case we froze on 
  a
  2.6.16 kernel.
 
 Both packages will have to live in etch.

Ok, so we need to find a scheme which appends some tag or something to the
module names.

Ideally, this would be the full kernel version (2.6.16-2-flavour), which i
believe would be enough for our purpose.

kernel-package already does this for binary package, we only need to transpose
this to the source package too, and everyone is happy.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-24 Thread Andreas Barth
* dann frazier ([EMAIL PROTECTED]) [060524 05:33]:
 On Sun, May 21, 2006 at 10:46:44PM +0200, Sven Luther wrote:
  On Sun, May 21, 2006 at 01:09:45PM -0500, dann frazier wrote:
   Kernel udeb creation process (possibly using k-p?)
   -
   If we build all of the *existing* udebs from a single source, we outgrow
   the limit of the Binary: field in the control file.
  
  Huh ? This problem is known since over 2 years now, and i thought it was one
  of the things that where fixed earlier this year or late last year ?
 
 Immediately after I sent out the notes from this meeting, aba said
 he'd followed up with an ftp master (neuro, iirc).  From what he was
 told, it sounds like the information we had during this meeting was
 stale/inaccurate.

Actually, if I understood everything correct, the issue with the long
lines used to be that on the way from the buildd to the buildd
maintainer, the long line in the changes-file could be broken by MTAs,
and this has been fixed. The best way to test if this is all would be to
upload one source package producing all udebs to experimental, and see
what happens.

Cheers,
Andi
-- 
  http://home.arcor.de/andreas-barth/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-24 Thread Sven Luther
On Wed, May 24, 2006 at 10:27:14AM +0200, Andreas Barth wrote:
 * dann frazier ([EMAIL PROTECTED]) [060524 05:33]:
  On Sun, May 21, 2006 at 10:46:44PM +0200, Sven Luther wrote:
   On Sun, May 21, 2006 at 01:09:45PM -0500, dann frazier wrote:
Kernel udeb creation process (possibly using k-p?)
-
If we build all of the *existing* udebs from a single source, we outgrow
the limit of the Binary: field in the control file.
   
   Huh ? This problem is known since over 2 years now, and i thought it was 
   one
   of the things that where fixed earlier this year or late last year ?
  
  Immediately after I sent out the notes from this meeting, aba said
  he'd followed up with an ftp master (neuro, iirc).  From what he was
  told, it sounds like the information we had during this meeting was
  stale/inaccurate.
 
 Actually, if I understood everything correct, the issue with the long
 lines used to be that on the way from the buildd to the buildd
 maintainer, the long line in the changes-file could be broken by MTAs,
 and this has been fixed. The best way to test if this is all would be to
 upload one source package producing all udebs to experimental, and see
 what happens.

A, good thinking. Who volunteers for doing so ? I don't think i am the right
person, as i would again be seen as over-stepping my place, and stuff.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-24 Thread Sven Luther
On Wed, May 24, 2006 at 10:31:08AM +0200, Andreas Barth wrote:
 * Sven Luther ([EMAIL PROTECTED]) [060524 06:33]:
  Well, as a proof of my claims, the sarge d-i released with a known remote
  security hole, and there has been no (or maybe 1 by now ?) d-i update since
  then.
 
 You mean, a remote root exploitable hole? If so, which bug, and why
 wasn't that information sent to debian-release? Or is it just a remote
 DoS-issue?

Ah, i don't remember the details exactly. It was indeed a remote security
issue, but i don't remember if it was an exploit or a DoS kind of thingy. The
issue was well known by the release managers of the time, and the decision to
ship with it was taken in conjunction between the release managers and the d-i
team. The rationale was that d-i was going to install a newer kernel anyway,
and the system would be vulnerable only during the time of the install, which
still seemed unacceptable to me back then, altough a bit less so if it was
just a DoS, but my understanding of back then was that it was a hole. I may
have been wrong though.

The issue is widely documented on the lists, debian-boot, probably
debian-kernel, and maybe even debian-release in april 2005, as well as the
subsequent kernel changelog entry of the sarge kernel.

The problem back then was that the poor kernel state meant a 30+ days upgrade
path, which was partly caused by the kernel, but partly by the d-i folk too.

  And again this time, d-i freeze is scheduled
  first week of august, and this means we need to have the kernels frozen a 
  week
  or so before that. This is something like 5 month before the actual release
  date of etch.
 
 You are ignoring that we have scheduled a time to update the kernel
 again before release of etch.

Ah, nice. But would this include an abi-changing kernel upgrade ? I fear not,
given the trouble of abi changes for security upgrades. In any case, it
doesn't include an upstream kernel version bump in the planes i have read,
right ? 

We should be able to rebuild all those packages on all release arches within a
couple of days, a week at most, if we do it right. This doesn't seem to be
worth the effort to many in this discussion though, who prefer the status-quo.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-24 Thread Andreas Barth
* Sven Luther ([EMAIL PROTECTED]) [060524 11:23]:
 On Wed, May 24, 2006 at 10:31:08AM +0200, Andreas Barth wrote:
  You are ignoring that we have scheduled a time to update the kernel
  again before release of etch.
 
 Ah, nice. But would this include an abi-changing kernel upgrade ? I fear not,
 given the trouble of abi changes for security upgrades. In any case, it
 doesn't include an upstream kernel version bump in the planes i have read,
 right ? 

It would even allow a newer minor kernel version, so an abi-change
should be possible as well.


Cheers,
Andi
-- 
  http://home.arcor.de/andreas-barth/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-24 Thread Sven Luther
On Wed, May 24, 2006 at 11:35:00AM +0200, Andreas Barth wrote:
 * Sven Luther ([EMAIL PROTECTED]) [060524 11:23]:
  On Wed, May 24, 2006 at 10:31:08AM +0200, Andreas Barth wrote:
   You are ignoring that we have scheduled a time to update the kernel
   again before release of etch.
  
  Ah, nice. But would this include an abi-changing kernel upgrade ? I fear 
  not,
  given the trouble of abi changes for security upgrades. In any case, it
  doesn't include an upstream kernel version bump in the planes i have read,
  right ? 
 
 It would even allow a newer minor kernel version, so an abi-change
 should be possible as well.

Nice then, the question remains of how often and in what timeframe we can do
such. Imagine there is a security issue shortly before the release, will we
say like last time, let's ship with it, because we have not put into place the
procedure to handle it in a timely fashion ?

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-24 Thread Andreas Barth
* Sven Luther ([EMAIL PROTECTED]) [060524 11:52]:
 On Wed, May 24, 2006 at 11:35:00AM +0200, Andreas Barth wrote:
  * Sven Luther ([EMAIL PROTECTED]) [060524 11:23]:
   On Wed, May 24, 2006 at 10:31:08AM +0200, Andreas Barth wrote:
You are ignoring that we have scheduled a time to update the kernel
again before release of etch.
   
   Ah, nice. But would this include an abi-changing kernel upgrade ? I fear 
   not,
   given the trouble of abi changes for security upgrades. In any case, it
   doesn't include an upstream kernel version bump in the planes i have read,
   right ? 
  
  It would even allow a newer minor kernel version, so an abi-change
  should be possible as well.
 
 Nice then, the question remains of how often and in what timeframe we can do
 such. Imagine there is a security issue shortly before the release, will we
 say like last time, let's ship with it, because we have not put into place the
 procedure to handle it in a timely fashion ?

There will definitly be a time when it is too late to replace the kernel
without delaying the release (just consider that we e.g. notice after
starting the CD build that there is some issue). Also, we need a minimum
testing periode for the final kernel and the final installer. If we set
that minimum testing periode to something like 6 weeks (which seems sane
to me), we cannot update the installer later than mid of October, and
the kernel needs to be a little bit earlier, which is like the beginning
of October.


Cheers,
Andi
-- 
  http://home.arcor.de/andreas-barth/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-24 Thread Sven Luther
On Wed, May 24, 2006 at 12:04:59PM +0200, Andreas Barth wrote:
 * Sven Luther ([EMAIL PROTECTED]) [060524 11:52]:
  On Wed, May 24, 2006 at 11:35:00AM +0200, Andreas Barth wrote:
   * Sven Luther ([EMAIL PROTECTED]) [060524 11:23]:
On Wed, May 24, 2006 at 10:31:08AM +0200, Andreas Barth wrote:
 You are ignoring that we have scheduled a time to update the kernel
 again before release of etch.

Ah, nice. But would this include an abi-changing kernel upgrade ? I 
fear not,
given the trouble of abi changes for security upgrades. In any case, it
doesn't include an upstream kernel version bump in the planes i have 
read,
right ? 
   
   It would even allow a newer minor kernel version, so an abi-change
   should be possible as well.
  
  Nice then, the question remains of how often and in what timeframe we can do
  such. Imagine there is a security issue shortly before the release, will we
  say like last time, let's ship with it, because we have not put into place 
  the
  procedure to handle it in a timely fashion ?
 
 There will definitly be a time when it is too late to replace the kernel
 without delaying the release (just consider that we e.g. notice after
 starting the CD build that there is some issue). Also, we need a minimum
 testing periode for the final kernel and the final installer. If we set
 that minimum testing periode to something like 6 weeks (which seems sane
 to me), we cannot update the installer later than mid of October, and
 the kernel needs to be a little bit earlier, which is like the beginning
 of October.

Err, do you really need to retest everything when a kernel change only
includes a small set of security fixes ? I think 6 weeks may be overkill
there, unless naturally you are speaking of a version bump with a huge load of
changes.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-24 Thread Andreas Barth
* Sven Luther ([EMAIL PROTECTED]) [060524 12:14]:
 On Wed, May 24, 2006 at 12:04:59PM +0200, Andreas Barth wrote:
  There will definitly be a time when it is too late to replace the kernel
  without delaying the release (just consider that we e.g. notice after
  starting the CD build that there is some issue). Also, we need a minimum
  testing periode for the final kernel and the final installer. If we set
  that minimum testing periode to something like 6 weeks (which seems sane
  to me), we cannot update the installer later than mid of October, and
  the kernel needs to be a little bit earlier, which is like the beginning
  of October.
 
 Err, do you really need to retest everything when a kernel change only
 includes a small set of security fixes ? I think 6 weeks may be overkill
 there, unless naturally you are speaking of a version bump with a huge load of
 changes.

If it is a minimal patch, we will see. However, I don't think it's
usefull to discuss that now in theory. We need to see the patchset (and
also what amount of open issues there still is elsewhere) to decide what
to do.


Cheers,
Andi
-- 
  http://home.arcor.de/andreas-barth/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-23 Thread Geert Stappers

 [ keeping the cross-post and please keep it cross-posted ]

On Sun, May 21, 2006 at 01:09:45PM -0500, dann frazier wrote:
 hey,
   Frans Pop assembled an informal BoF at DebConf to discuss cross-team
 issues related to the kernel[1].
 
 We discussed the following topics:
 snip/
  * Non-free modules + firmware
  * External module packages
 Non-free modules + firmware
 ---
 It was noted that Bastian Blank is working on splitting non-free
 modules out of main into their own source package.
 
 frans It should happen pretty soon; we need the modules in non-free before
we do the d-i work; d-i will probably ask for an exception so that
d-i can install them as though they were in main because frans thinks
we won't have time for that (modules really won't be in main)
 
 This means that non-free modules will be on installer cds.  The needed
 exception would be to allow etch to be used as a transition period.
 
 manoj this isn't a release management decision, we don't want another GR
 aba a GR would be time consuming
 
 manoj what about a free and a non-free installer image, where the non-free
installer is in the non-free section


What work is done to get the Linux kernel completely libre?
Who is talking with hardware manufactures to GPL their code?


 aba 2-3 different options
  * images like today w/ non-free udebs
  * only put the modules on non-free, make users pick them up
  * dropping support for devices that require non-free fw completely
 
 manoj only option (for permitting non-free modules on the etch
installer) is a gr to once again modify our social contract
 
 suggestion was made to have users click-through to opt-in to use non-free
 firmware.  manoj believes this is still a violation of the social contract
 and will require a GR (because the non-free modules would still be on
 the media)
 
 manoj you can ask for an official interpretation of the social contract
from the project secretary.
 
 manoj suggests two different installers, but joeyh is concerned over 
 additional
 maintenance/support
 
 The deliver modules/users opt-in approach would give us enough time,
 but requires a GR.
 
 joeyh maybe keep it as a separate image that can be combined by the user,
   problem is that the solution varies with each installation method
   floppy install needs another floppy; netboot needs another layered
   initramfs
 
 joeyh multi-sessions could be used for cd installs
 
 In conclusion, we believe the following options exist:
  a) debian doesn't support this hardware
  b) GR to allow combining
  c) make users combine
 
 
 External module packages
 
 Its believed that if we solve the non-free external module package
 issue, we will also have solved this one.

Beside non-free will the external module package help
hardware manufactures to get their libre driver in Debian


 - divergence between official kernel packaging and kernel-package (k-p)
 
 The /lib/modules/$(uname -r)/build symlink issue was introduced by
 Manoj.  The attendees agreed to move this to a discussion thread on
 debian-kernel, in probably a week's time.

Please post  the outcome also to debian-boot



Cheers
Geert Stappers

 [1] http://lists.debconf.org/lurker/message/20060517.065113.4f39d60e.en.html


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-23 Thread Sven Luther
On Tue, May 23, 2006 at 09:10:54AM +0200, Geert Stappers wrote:
 
  [ keeping the cross-post and please keep it cross-posted ]
 
 On Sun, May 21, 2006 at 01:09:45PM -0500, dann frazier wrote:
  hey,
Frans Pop assembled an informal BoF at DebConf to discuss cross-team
  issues related to the kernel[1].
  
  We discussed the following topics:
  snip/
   * Non-free modules + firmware
   * External module packages
  Non-free modules + firmware
  ---
  It was noted that Bastian Blank is working on splitting non-free
  modules out of main into their own source package.
  
  frans It should happen pretty soon; we need the modules in non-free before
 we do the d-i work; d-i will probably ask for an exception so that
 d-i can install them as though they were in main because frans thinks
 we won't have time for that (modules really won't be in main)
  
  This means that non-free modules will be on installer cds.  The needed
  exception would be to allow etch to be used as a transition period.
  
  manoj this isn't a release management decision, we don't want another GR
  aba a GR would be time consuming
  
  manoj what about a free and a non-free installer image, where the non-free
 installer is in the non-free section
 
 What work is done to get the Linux kernel completely libre?
 Who is talking with hardware manufactures to GPL their code?

We did some work to make the drivers with non-free firmware at least be
distributable (many of them originally came with GPLed binary-only blobs), and
the manufacturers where rather open about this. That said, asking them to free
their actual firmware is something rather doubtful to work, especially given
the current situation of upstream linux deciding to ignore the issue.

By moving those drivers to non-free, we raise the user awareness of the issue,
and we should even document it during the install (a dialog saying this driver
is non-free because of blah-blah-blah maybe), and this should in the
mid-to-long term help out convince the manufacturers to go the free route.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-23 Thread Sven Luther
On Tue, May 23, 2006 at 09:47:08AM -0700, Steve Langasek wrote:
 On Mon, May 22, 2006 at 11:38:46PM +0200, Sven Luther wrote:
  On Mon, May 22, 2006 at 01:52:47PM -0700, Steve Langasek wrote:
Perhaps we disable new kernel features for etch 1/2?  e.g., limit new
feature to new hardware support.  For example, we wouldn't want to
turn on something as drastic as preempt in a stable update.
 
   So how do you structure this?  I would expect that updates limited to new
   hardware support shouldn't normally change the kernel ABI at all, which
   makes it hard to make both the old and new kernel versions available for
   installation.
 
   If it is a new kernel ABI (either because the version number has simply 
   been
   changed on it, or for other reasons), what gets done with out-of-tree 
   module
   packages?
 
  If ever the new out-of-tree module and d-i kernel reunification is in place,
  it will be easy enough to rebuild all packages which depend on the 
  abi-changed
  kernel.
 
 rebuilding them doesn't address the question of making them available for
 both old and new kernels.  Since the assumption seems to be that etch 1/2

Well, they will obviously have the abi number embedded in their package name,
and a virtual package / provides who will handle the transition, so this
should be no real problem. It is a technology that is well proven and mastered
since years in debian. See the ocaml example.

 uses a different upstream kernel version than etch, to be able to continue
 providing security support for the etch versions it seems that you need a
 separate source package (or a whole new suite in dak complete with w-b
 support!) for any packages being rebuilt against the etch 1/2 kernel.

You need a source package, which will be able to generate its debian/control
semi-automatically, to adjust to the kernel abi change, yes. This is also
something we have done in the ocaml case recently. Needs some coordination and
policy for the out of tree modules, and maybe binNMUs who are able to
regenerate the debian/control in this way, but nothing otherwordly.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-23 Thread Steve Langasek
On Mon, May 22, 2006 at 11:38:46PM +0200, Sven Luther wrote:
 On Mon, May 22, 2006 at 01:52:47PM -0700, Steve Langasek wrote:
   Perhaps we disable new kernel features for etch 1/2?  e.g., limit new
   feature to new hardware support.  For example, we wouldn't want to
   turn on something as drastic as preempt in a stable update.

  So how do you structure this?  I would expect that updates limited to new
  hardware support shouldn't normally change the kernel ABI at all, which
  makes it hard to make both the old and new kernel versions available for
  installation.

  If it is a new kernel ABI (either because the version number has simply been
  changed on it, or for other reasons), what gets done with out-of-tree module
  packages?

 If ever the new out-of-tree module and d-i kernel reunification is in place,
 it will be easy enough to rebuild all packages which depend on the abi-changed
 kernel.

rebuilding them doesn't address the question of making them available for
both old and new kernels.  Since the assumption seems to be that etch 1/2
uses a different upstream kernel version than etch, to be able to continue
providing security support for the etch versions it seems that you need a
separate source package (or a whole new suite in dak complete with w-b
support!) for any packages being rebuilt against the etch 1/2 kernel.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Re: kernel/d-i/security/release meeting at DebConf6

2006-05-23 Thread dann frazier
On Sun, May 21, 2006 at 10:46:44PM +0200, Sven Luther wrote:
 On Sun, May 21, 2006 at 01:09:45PM -0500, dann frazier wrote:
  Kernel udeb creation process (possibly using k-p?)
  -
  If we build all of the *existing* udebs from a single source, we outgrow
  the limit of the Binary: field in the control file.
 
 Huh ? This problem is known since over 2 years now, and i thought it was one
 of the things that where fixed earlier this year or late last year ?

Immediately after I sent out the notes from this meeting, aba said
he'd followed up with an ftp master (neuro, iirc).  From what he was
told, it sounds like the information we had during this meeting was
stale/inaccurate.  Hopefully someone will update this thread with the
accurate information so that we can revisit this discussion.  Many of
the attendees are still travelling (in fact, I'm replying to this
without a net connection, so it may be moot once it actually goes
out).  It'll probably be a few days before everyone makes it home, but
then we can continue with a more well-informed discussion.

  buildd issue - it'd be nice if we could be from an unpacked kernel, but you
  can't build-dep on that so its a FTBFS.
 
 Which is why it makes the most sense to build them from linux-2.6, but i won't
 argue this point here.

I think that the decision of whether or not to build them from
linux-2.6 is a separate issue.  If doing so is the right thing, let's
do it, if its not, let's fix the build issue.

 
  dannf suggested that maybe k-p can be configured to allow simple unapcking 
  of
  debs vs. all the postinst configuratin to allow autobuilders to deal with 
  udebs
  better; manoj thinks that this will be possible but further out in the 
  current
  k-p transition that allows for users to do more overriding of
  postinstallations by default.
 
 Mmm. But i don't see how this will play nice with the auto-builders. There is
 no way we can get this behaviour into the current set of deps/build-deps.
 Should we add another new kind (Source-dep: ?) ?

Well, the only problem (aiui) is that kernel installs want to do bad
things like run bootloaders, etc.  If we had a chroot parameter we
could tweak to turn this off, then wouldn't that solve this problem?

  manoj new kernel package will have some new features the kernel team might 
  like
   - versioning is messed up, manoj is integrating abi number, etc, into k-p
  
  dannf what if we split up centralized udeb source packages to manage a 
  certain
 set of archs
  
  The consensus was that the current udeb approach is suboptimal, but
  solving it cleanly won't be possible until etch+1.  None of the
  attendees considered this issue to be critical for etch, so the
  current plan is to status quo and wait till etch so that we can come
  up with a good solution.
 
 I strongly disagree with this. The non-solution of this issue means that we
 have a limited power to handle abi-breaking security and bug-fix patches, and
 impose unreasonable earliness on the kernel freeze for etch, as well as
 endangers security support during etch's lifetime after that. This was and is
 a problem with sarge, and we should not repeat that. We should have tackled
 this issue last fall though.

I sympathize with your concerns but, speaking as a person that does
security work and udeb maintenance for one architecture, I don't think
this is *that* big of a problem.  ABI changes are more painful, but
d-i work can be ignored when releasing a security update (in fact, we
did so last time) - its just point release that suffer, and those
schedules are more flexible (as far as our users are concerned).

Where this would help solve time critical issues is *before* the
release of etch, where a late change could cause us to miss a release
deadline.  However, the d-i team seemed to believe this was low-risk.

I do believe that our consensus was correct based on what we knew at
the time - however, it now sounds like this information may have been
incorrect so we should re-discuss.

-- 
dann frazier


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-23 Thread Sven Luther
On Tue, May 23, 2006 at 10:16:37PM -0500, dann frazier wrote:
 On Sun, May 21, 2006 at 10:46:44PM +0200, Sven Luther wrote:
  On Sun, May 21, 2006 at 01:09:45PM -0500, dann frazier wrote:
   Kernel udeb creation process (possibly using k-p?)
   -
   If we build all of the *existing* udebs from a single source, we outgrow
   the limit of the Binary: field in the control file.
  
  Huh ? This problem is known since over 2 years now, and i thought it was one
  of the things that where fixed earlier this year or late last year ?
 
 Immediately after I sent out the notes from this meeting, aba said
 he'd followed up with an ftp master (neuro, iirc).  From what he was
 told, it sounds like the information we had during this meeting was
 stale/inaccurate.  Hopefully someone will update this thread with the
 accurate information so that we can revisit this discussion.  Many of
 the attendees are still travelling (in fact, I'm replying to this
 without a net connection, so it may be moot once it actually goes
 out).  It'll probably be a few days before everyone makes it home, but
 then we can continue with a more well-informed discussion.

Notice that this issue was mentioned in a thread on debian-boot at least some
weeks ago, i am not sure, but it may even have been Joeyh who mentioned it. I
also mentioned it earlier, altough i was not 100% sure.

   dannf suggested that maybe k-p can be configured to allow simple 
   unapcking of
   debs vs. all the postinst configuratin to allow autobuilders to deal with 
   udebs
   better; manoj thinks that this will be possible but further out in the 
   current
   k-p transition that allows for users to do more overriding of
   postinstallations by default.
  
  Mmm. But i don't see how this will play nice with the auto-builders. There 
  is
  no way we can get this behaviour into the current set of deps/build-deps.
  Should we add another new kind (Source-dep: ?) ?
 
 Well, the only problem (aiui) is that kernel installs want to do bad
 things like run bootloaders, etc.  If we had a chroot parameter we
 could tweak to turn this off, then wouldn't that solve this problem?

Ah, that would indeed be a solution, we could easily implement something such,
together with Manoj, since i believe it involves kernel-package, and how the
/etc/kernel/*.d/ scripts are run.

Not sure if this is enough, as we would also obviously need support from the
buildd software.

   The consensus was that the current udeb approach is suboptimal, but
   solving it cleanly won't be possible until etch+1.  None of the
   attendees considered this issue to be critical for etch, so the
   current plan is to status quo and wait till etch so that we can come
   up with a good solution.
  
  I strongly disagree with this. The non-solution of this issue means that we
  have a limited power to handle abi-breaking security and bug-fix patches, 
  and
  impose unreasonable earliness on the kernel freeze for etch, as well as
  endangers security support during etch's lifetime after that. This was and 
  is
  a problem with sarge, and we should not repeat that. We should have tackled
  this issue last fall though.
 
 I sympathize with your concerns but, speaking as a person that does
 security work and udeb maintenance for one architecture, I don't think
 this is *that* big of a problem.  ABI changes are more painful, but
 d-i work can be ignored when releasing a security update (in fact, we
 did so last time) - its just point release that suffer, and those
 schedules are more flexible (as far as our users are concerned).

Well, as a proof of my claims, the sarge d-i released with a known remote
security hole, and there has been no (or maybe 1 by now ?) d-i update since
then.

 Where this would help solve time critical issues is *before* the
 release of etch, where a late change could cause us to miss a release
 deadline.  However, the d-i team seemed to believe this was low-risk.

Yeah, well, i disagree on this. Taking the last time as example, all
development on the kernel was frozen by the d-i team, and we released with
a known remote exploit in d-i. And again this time, d-i freeze is scheduled
first week of august, and this means we need to have the kernels frozen a week
or so before that. This is something like 5 month before the actual release
date of etch.

So, given these, i am dubious of any claim on the subject made by the d-i
team.

 I do believe that our consensus was correct based on what we knew at
 the time - however, it now sounds like this information may have been
 incorrect so we should re-discuss.

I have some trouble with this too, i believe that at least some in the meeting
must have known about this new information, and either forgot about it, or
chose to ignore it, or whatever.

Friendly,

Sven Luther
 
 -- 
 dann frazier
 
 ---
 Wanadoo vous informe que cet  

Re: kernel/d-i/security/release meeting at DebConf6

2006-05-22 Thread Steve Langasek
On Sun, May 21, 2006 at 01:09:45PM -0500, dann frazier wrote:
 hey,
   Frans Pop assembled an informal BoF at DebConf to discuss cross-team
 issues related to the kernel[1].  Attendees included:

Sorry I wasn't able to make this meeting, guys.

Random thoughts:

 Kernel Updates During Etch Lifetime
 ---
 This discussion is based upon the idea of providing an updated kernel
 with new hardware support during the etch *stable* release.  We've
 been referring to this update as etch and a half.

 Would we keep both the etch and etch 1/2 kernels?  Yes - we would not
 drop support for a stable kernel in a stable release.

 2 months was suggested for user testing of a kernel prior to including
 it in a point release.

 To enable this possibility, d-i will require some work.
 fjp said that, for d-i, the critical udeb is base-install which builds
 a list of available kernels and selects a default from that.  If a
 good default can be found, it will be installed.  If no default is
 found, it will just show the list of kernels it did find. (With
 medium priority it will always show the list, but with the default selected).
 base-install selects this default by taking the stem name of the
 kernel and the major version (kernel-image-2.4, linux-image-2.6).
 How the kernel is named will be very important.  What will also be important
 is what we expect to run after the kernel has been released.

 We want to use the same install kernel as the target, to avoid hitting bugs
 late in the install.  We would want to add the etch 1/2 kernel to the
 installer, and not drop the etch kernel from the installer.

 A blocker for d-i would be 2.6.12 - 2.6.14 style changes (devfs drop).
 Frans suggested talking with Marco D'itri (or perhaps GregKH) about planned
 udev stability.  Moritz is fairly sure that GregKH is planning to keep
 a stable interface.  Frans says Linus has also mentioned that he
 doesn't plan to accept breakages to this interface.

This isn't a blocker *just* for d-i.  Consider how painful the upgrade path
is from sarge to etch on account of the circular dependencies between the
kernel, udev, and initramfs generators.  This may be something we just have
to cope with for sarge-etch, but do you really want to compound the problem
by adding etch - etch 1/2 and/or etch 1/2 - etch+1 to the mix?

 Perhaps we disable new kernel features for etch 1/2?  e.g., limit new
 feature to new hardware support.  For example, we wouldn't want to
 turn on something as drastic as preempt in a stable update.

So how do you structure this?  I would expect that updates limited to new
hardware support shouldn't normally change the kernel ABI at all, which
makes it hard to make both the old and new kernel versions available for
installation.

If it is a new kernel ABI (either because the version number has simply been
changed on it, or for other reasons), what gets done with out-of-tree module
packages?

 Dropping 2.4 from Etch
 --
 aba noted that Holger had spoken with him earlier, and asked if it
 would be ok to do stable/2.4 maintenance by tracking the latest 2.4
 upstream instead of individual security issues.

 dannf noted that 2.4 has poor upstream security support.  Rough
 consensus was that we cannot support 2.4 in debian for security
 reasons.  If we drop it for etch, Frans would like to drop 2.4 support
 from the installer as well.  d-i will become easier w/o 2.4 support,
 but only if we drop sarge support in the etch installer.  Frans is ok
 with dropping this sarge support.

I agree with all of this, and had a similar discussion with Holger.

With no one stepping up to provide the needed security support for 2.4 in
etch, are there any further objections to beginning the process of removing
the 2.4 kernel packages from unstable?  Will someone on the kernel team be
willing to drive this?

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Re: kernel/d-i/security/release meeting at DebConf6

2006-05-22 Thread Sven Luther
On Mon, May 22, 2006 at 01:52:47PM -0700, Steve Langasek wrote:
  Perhaps we disable new kernel features for etch 1/2?  e.g., limit new
  feature to new hardware support.  For example, we wouldn't want to
  turn on something as drastic as preempt in a stable update.
 
 So how do you structure this?  I would expect that updates limited to new
 hardware support shouldn't normally change the kernel ABI at all, which
 makes it hard to make both the old and new kernel versions available for
 installation.
 
 If it is a new kernel ABI (either because the version number has simply been
 changed on it, or for other reasons), what gets done with out-of-tree module
 packages?

If ever the new out-of-tree module and d-i kernel reunification is in place,
it will be easy enough to rebuild all packages which depend on the abi-changed
kernel.

This means that all those out-of-tree modules need rebuilding, and maybe a
source change if they are hit by the abi breakage. They should thus be
included in the original etch 1/2 process, the same as with abi breaking
security upgrades.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel/d-i/security/release meeting at DebConf6

2006-05-21 Thread dann frazier
hey,
  Frans Pop assembled an informal BoF at DebConf to discuss cross-team
issues related to the kernel[1].  Attendees included:

  Micah Anderson (micah)
  Andreas Barth (aba)
  dann frazier (dannf)
  Joey Hess (joeyh)
  Moritz Muehlenhoff (jmm)
  Frans Pop (fjp)
  Manoj Srivastava (manoj)
  ...and a few other folks whose names I don't recall

We discussed the following topics:
 * Which kernel to release with Etch (2.6.16 from AB or current
   upstream)
 * Kernel Updates during Etch Lifetime
 * Dropping 2.4 from Etch
 * Non-free modules + firmware
 * External module packages
 * Divergence Between linux-2.6 packaging and kernel-package behavior
 * Kernel udeb creation process (possibly using k-p?)

This report is based upon notes I took during the meeting, and my
recollection.  Neither will be completely accurate; and no statements
attributed to an individual should be taken as a direct quote.

Which kernel to release with Etch
-
This discussion is related to a thread[2] on debian-kernel about which
kernel we will choose for etch.

Attendees expressed concern over choosing to move to a new 2.6.x
release shortly before etch releases - a kernel that has has a few
2.6.x.y releases would be preferred.

With respect to using the Adrian Bunk tree, attendees expressed
concern that this tree is unproven.  It is possible that Adrian has
underestimated the amount of energy it will take to maintain such a branch.
Success of this tree may depend upon the assistance of its consumers
(such as Debian).

It was noted that even if we stick with 2.6.16.x, the kernel team will
still need to limit ourselves to cherry picking patches once we
freeze, otherwise we may pull in new features/ABI breakages after the
freeze.

The current release schedule[3] has us freezing the kernel by July
30th.  However, aba noted that the kernel freeze is really just a
dependency of the d-i schedule.  According to Frans, a kernel freeze
of October 1 is necessary for d-i's final release candidate to remain
on schedule.

Andi noted that if we change the kernel later than mid/end July we'll
need to do more extensive testing of the sarge-etch upgrade than usual.

Kernel Updates During Etch Lifetime
---
This discussion is based upon the idea of providing an updated kernel
with new hardware support during the etch *stable* release.  We've
been referring to this update as etch and a half.

Would we keep both the etch and etch 1/2 kernels?  Yes - we would not
drop support for a stable kernel in a stable release.

2 months was suggested for user testing of a kernel prior to including
it in a point release.

To enable this possibility, d-i will require some work.
fjp said that, for d-i, the critical udeb is base-install which builds
a list of available kernels and selects a default from that.  If a
good default can be found, it will be installed.  If no default is
found, it will just show the list of kernels it did find. (With
medium priority it will always show the list, but with the default selected).
base-install selects this default by taking the stem name of the
kernel and the major version (kernel-image-2.4, linux-image-2.6).
How the kernel is named will be very important.  What will also be important
is what we expect to run after the kernel has been released.

We want to use the same install kernel as the target, to avoid hitting bugs
late in the install.  We would want to add the etch 1/2 kernel to the
installer, and not drop the etch kernel from the installer.

A blocker for d-i would be 2.6.12 - 2.6.14 style changes (devfs drop).
Frans suggested talking with Marco D'itri (or perhaps GregKH) about planned
udev stability.  Moritz is fairly sure that GregKH is planning to keep
a stable interface.  Frans says Linus has also mentioned that he
doesn't plan to accept breakages to this interface.

Perhaps we disable new kernel features for etch 1/2?  e.g., limit new
feature to new hardware support.  For example, we wouldn't want to
turn on something as drastic as preempt in a stable update.

We wouldn't want an etch 1/2 kernel that requires a large number of
changes to userspace packages.

Questions about X update issues were brought up; but Frans doesn't
think that will affect d-i.  What about alsa?

We should have a formal agreement about how we *would* do an etch  a
half ahead of time so we can make sure d-i has any features it should need. 
This should probably be discussed on -devel to get project-wide buyoff.

Frans thinks d-i can make necessary changes in a max of 2 months, but it
depends upon what other things may be going on at the time (etch+1
betas, etc)

We could make test d-i images available for stable like we currently do for
testing.  We probably don't need the extreme testing as for the first
release.

jmm, dannf  frans all seem to agree that we should use the etch
kernel as the default boot kernel, even after a etch 1/2 kernel is added.

jmm wondered if there ways we can 

Re: kernel/d-i/security/release meeting at DebConf6

2006-05-21 Thread Bastian Blank
[ drop debian-release from CC ]

On Sun, May 21, 2006 at 01:09:45PM -0500, dann frazier wrote:
 Kernel udeb creation process (possibly using k-p?)
 -
 If we build all of the *existing* udebs from a single source, we outgrow
 the limit of the Binary: field in the control file.

Which limit? The policy don't specify one and linux-2.6 already broke
the 10KiB.

 A second limitation exists in sarge's version of apt, which is what we might
 be running on ftp-master.  Not an issue if we start this with etch + 1
 this will create an upgrade problem for users. 

Which problem?

 udebs/deb creation is currently separate - is that a feature?

The decision was done before the kernel team was founded. So it is a
feature.

 manoj wonders if maybe kernel-package can do this work.  he wouldn't
 want to build the per-arch mapping into k-p, but might take these from
 lists on the file system 

As not all of the images are currently built with k-p and the number
will decrease in the future, this is not appropriate.

 Frans points out that his preference is to continue to keep udeb
 generation separate from the mainline kernel, to avoid having to do a
 full kernel release each time we shuffle udeb contents.

Currently we have the problem the other way around. We can't rebuild the
udebs for every update of the debs.

 Frans believes that sepearate source packages are more feasible for allowing
 this type of shuffling

If someone goes crazy, it may see this as GPL violation.

Bastian

-- 
Punishment becomes ineffective after a certain point.  Men become insensitive.
-- Eneg, Patterns of Force, stardate 2534.7


signature.asc
Description: Digital signature


Re: kernel/d-i/security/release meeting at DebConf6

2006-05-21 Thread Sven Luther
On Sun, May 21, 2006 at 01:09:45PM -0500, dann frazier wrote:
 Kernel udeb creation process (possibly using k-p?)
 -
 If we build all of the *existing* udebs from a single source, we outgrow
 the limit of the Binary: field in the control file.

Huh ? This problem is known since over 2 years now, and i thought it was one
of the things that where fixed earlier this year or late last year ?

 A second limitation exists in sarge's version of apt, which is what we might
 be running on ftp-master.  Not an issue if we start this with etch + 1
 this will create an upgrade problem for users. 

Why is this an issue ? The longer Binary: field will only be used in the
source package file, right, and as such, it should be no major problem if
sarge's apt has a problem with it.

The pure binary package file should be mostly ok, so sarge's apt should be
happy with this issue.

What am i missing here ? 

 buildd issue - it'd be nice if we could be from an unpacked kernel, but you
 can't build-dep on that so its a FTBFS.

Which is why it makes the most sense to build them from linux-2.6, but i won't
argue this point here.

 udebs/deb creation is currently separate - is that a feature?
 svenl has noted that a porter has to select modules twice - during the
 kernel build and during the udeb creation
 
 manoj wonders if maybe kernel-package can do this work.  he wouldn't
 want to build the per-arch mapping into k-p, but might take these from
 lists on the file system 
 
 joeyh notes that kernel-wedge could also support this additional functionality
 
 Frans points out that his preference is to continue to keep udeb
 generation separate from the mainline kernel, to avoid having to do a
 full kernel release each time we shuffle udeb contents.

Yep. Altough these days we upload .deb kernels more often than the d-i team
uploads .udeb packages of the same :)

 Frans believes that sepearate source packages are more feasible for allowing
 this type of shuffling

Indeed. but there is the FTBFS issue mentioned above and which needs solving.

 dannf suggested that maybe k-p can be configured to allow simple unapcking of
 debs vs. all the postinst configuratin to allow autobuilders to deal with 
 udebs
 better; manoj thinks that this will be possible but further out in the current
 k-p transition that allows for users to do more overriding of
 postinstallations by default.

Mmm. But i don't see how this will play nice with the auto-builders. There is
no way we can get this behaviour into the current set of deps/build-deps.
Should we add another new kind (Source-dep: ?) ?

 manoj new kernel package will have some new features the kernel team might 
 like
  - versioning is messed up, manoj is integrating abi number, etc, into k-p
 
 dannf what if we split up centralized udeb source packages to manage a 
 certain
set of archs
 
 The consensus was that the current udeb approach is suboptimal, but
 solving it cleanly won't be possible until etch+1.  None of the
 attendees considered this issue to be critical for etch, so the
 current plan is to status quo and wait till etch so that we can come
 up with a good solution.

I strongly disagree with this. The non-solution of this issue means that we
have a limited power to handle abi-breaking security and bug-fix patches, and
impose unreasonable earliness on the kernel freeze for etch, as well as
endangers security support during etch's lifetime after that. This was and is
a problem with sarge, and we should not repeat that. We should have tackled
this issue last fall though.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel/d-i/security/release meeting at DebConf6

2006-05-21 Thread Sven Luther
On Sun, May 21, 2006 at 10:10:51PM +0200, Bastian Blank wrote:
  Frans believes that sepearate source packages are more feasible for allowing
  this type of shuffling
 
 If someone goes crazy, it may see this as GPL violation.

Ah, excellent point. The source producing some of the .udeb kernel packages
are indeed missing in the archive, at least in a temporarily way, but it may
be longer for the less-actively-updated arches.

Bastian, i wonder what this 'it' is that you mention above :)

Friendly,

Sven Luther




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]