Re: Questions around Justice and Our Current CoC procedures

2022-02-21 Thread Enrico Zini
On Mon, Feb 21, 2022 at 08:51:51AM -0800, Felix Lechner wrote:
> On Mon, Feb 21, 2022 at 8:29 AM Steve McIntyre  wrote:
> >
> > This is getting worrying. Russ expressed sympathy about the bad
> > effects that warnings could have on people, and you've somehow
> > misinterpreted that as a direct attack on you.
> 
> Thank you, but despite your condescending tone I retain the right to
> interpret who expresses sympathy for me, and who does not.

Then you need to start taking responsibility for creating conflict when
there was none, which is sadly something I see as a recurring pattern in
the way you participate in Debian interactions.

Is this something you'd acknowledge and would be willing to work on?


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Keysigning in times of COVID-19

2020-08-06 Thread Enrico Zini
Hello,

we have people approaching Debian with a lack of GPG signatures, and we
generally cannot ask them to travel and meet other developers in person
to get their key signed.

Technically, we are not requiring that people meet a DD in person, only
that people have their key signed by a DD.

Technically, every DD has their own policies for signing keys, which
could go from not requiring meeting in person at all, to requiring to
meet in person multiple times. It might require to check a government
issued photo ID, or it might not.

Practically, I feel like most of the time people's policies match what
are the perceived expectations of the rest of the project. Meeting in
person has always been a good safe bet, if only for the reson that it's
been accepted without question for many years.

It's time to review those expectations.

For example, speaking of myself only, if my goal is to raise the cost of
impersonation or sock puppet identities, then probably signing someone's
key after having worked with them online for a significant time, would
require a much higher cost than showing up at a keysigning party with a
fake ID good enough to fool me.

Others may have other policies, and are likely to be acceptable.

As DAM, I would have a problem if someone automatically signed the keys
of every stanger who asked them nicely in an email. At the same time, I
am open to the idea of policies that do not require meeting people in
person.

I think the world has changed enough in the last months that currently
perceived project expectations about key signing are getting out of
alignment with practical realities, and it might be time to explore
other options.

I do not intend to ask people to break their sensible signing policies
so that people can get into Debian. I'm interested instead in exploring
what signing policies people may have, or may be considering, that have
been staying out of our narrative because we've always been having a
specific standard one that worked.

What do you think could be alternative key signing policies, that would
be acceptable to you, that would not require traveling and meeting face
to face?


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Debian infra services and tools looking for programming contributions

2020-05-23 Thread Enrico Zini
On Thu, May 21, 2020 at 03:36:15PM -0300, Antonio Terceiro wrote:

> Not the part where I need your help. I'm looking for people who maintain
> or contribute to a Debian infrastructure service or tool that could use
> some help with programming, have the availability to provide some
> mentoring for someone who is already a programmer but not necessarily
> already involved with Debian, and would like your project to be
> highlighted in such a talk.

nm.debian.org:

 - code is at https://salsa.debian.org/nm-team/nm.debian.org
   and it has a README explaining how to deploy a local development
   version
 - Python, Django, or JavaScript[1] front-end help is always welcome
 - Plenty of issues to pick from 
https://salsa.debian.org/nm-team/nm.debian.org/-/issues
   and https://bugs.debian.org/nm.debian.org
 - People with experience with the code hang out in #debian-newmaint on
   OFTC

contributors.debian.org:
 
 - code is at https://salsa.debian.org/nm-team/contributors.debian.org
   and it has a README explaining how to deploy a local development
   version
 - Python, Django, or JavaScript[1] front-end help is always welcome
 - Plenty of issues to pick from 
https://salsa.debian.org/nm-team/contributors.debian.org/-/issues
   and https://bugs.debian.org/nm.debian.org
 - People with experience with the code hang out in #debian-newmaint on
   OFTC

debtags.debian.org
 - code is at https://salsa.debian.org/debtags-team/debtagsd
 - some issues at https://bugs.debian.org/debtags.debian.org
 - I'm barely managing to look after the site these days because all the
   others have more pressing issues for me to deal with
 - it has great fun potential if someone wanted to take it over up and
   play with things like gamification of tagging contributions, or
   playing package search front-ends
 - contact point: sadly, only me

sso.debian.org:

 - code is at https://salsa.debian.org/debsso-team/debsso
 - it's hard to deploy a local development version
 - it's mostly there as legacy, now that we can use Salsa as OIDC
   provider. To do a nice thing, it needs to be made to support Salsa
   OIDC, too, so that services that still only authenticate with client
   certs don't need to depend on the crumbling former-alioth setup.
 - contact point: mostly me


Enrico

[1] the UI is a Bootstrap4 layout keep as uncomplicated as possible
-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Testing Discourse for Debian

2020-04-12 Thread Enrico Zini
On Sat, Apr 11, 2020 at 03:05:12PM -0700, Sean Whitton wrote:

> Right now I can rely on my notmuch database to pull basically any Debian
> discussion, because it includes the BTS, lists, and mail which I was
> CCed on or received through an alias like ftpmaster@.  And one can
> easily incorporate mboxes from master.d.o or bugs.d.o to get any missing
> context.[1]

I think archival's a very good point, especially for a DEP-like
discussion. You also implicitly propose an archiveal format that I like,
namely some kind of email mailbox.

I'd say that having a mailbox for archival would not be necessarily
needed during a discussion, and would make sense once the discussion is
declared closed.

Discourse has some email gatewaying, which as far as I understand loses
some metainformation like reactions or polls. It would be something I
thing should be preserved from an archival point of view.

Does Discourse have some kind of export feature, that one could
postprocess to get for example a mailbox of annotated emails?


> Could you say more about how you think Discourse would have changed how
> the discussion went?

Things that the current list discussion doesn't easily give:

 - +1 kind of feedback, or simple agreement, tends to unexpressed:
   people only reply if they have a problem with things, and shut up
   otherwise.
   
   For example, the recent Salsa as OIDC provider discussion had a
   relatively small amount of people contributing: does it mean that a
   lot of people just agree, or does it mean that only few people care?

   Silent assent and only negative feedback is a very demotivating
   process to go through putting a proposal up for discussion.

 - Some kind of weighting of posts. Sometimes I wonder: "is it just me,
   or this objection is not that relevant?", and I have no real way to
   know, besides maybe polling my social bubble, which could be biased.

   Ranking of perceived importants of topics or aspects discussed might
   have helped me manage the energy I put into the whole discussion,
   going into more detail where I could see there was more interest or
   concern.


> I am concerned that the problem is basically a social one, and so cannot
> be solved just by using a different software stack to host discussions.

Ish. I think there are may social aspects involved, and the same time
the process that we currently use has technical or traditional limits
which filter against various kinds of feedback which people would
socially be happy to give.

I follow list discussions and some messages make me go "yay! Standing
ovation!" and some messages I skip after reading part of the first line,
and some messages make me furious. Socially we might able to express
that in a way that feeds into the quality and direction of discussions,
but technically, we currently cannot.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-12 Thread Enrico Zini
On Sat, Apr 11, 2020 at 09:47:39PM +0200, Tollef Fog Heen wrote:

> We quite regularly have upstreams getting access for weird architecture
> failures.  There's no particular reason for those people to have salsa
> accounts.

I understand those are temporary accounts. Do those cases need an
arbitrary name from the LDAP namespace?

Several places I worked with use a pool of time-limited accounts from a
guestNNN namespace, for example: that could address your use case
without overlapping with anything else.


> It does to me, since suddenly we have to care about what's on salsa,
> something we've never had to care about before.

As I said in 20200409181701.3qqsn5sqq3xbu...@enricozini.org, no, you
don't need to care about anything: you keep doing what you want, and we
deal with it.


So far, I only received requests to keep the status quo as it is
indefinitely, and very little in terms of counterprosals actionable now,
besides theoretical new software solutions to be explored, that would
address the problems I am having.

I want to be very clear on this: I have no intention of keeping the
status quo as it is now: either it becomes something that I can manage,
or I'll stop managing it.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Testing Discourse for Debian

2020-04-11 Thread Enrico Zini
On Fri, Apr 10, 2020 at 07:59:59PM +0100, Neil McGovern wrote:

> For a little while, I've been keen to see how we can improve our
> communication methods, both to make it more accessible to newcomers and to
> take advantage of more featureful tooling than has been traditionally
> possible with email lists.
> 
> As such, I set up an instance of Discourse[0] at
> https://discourse.debian.net, and am now asking for a wider input on if
> this is something the project wishes to use and if I should spend my
> time pursuing.

The recent difficult discussion on SSO here on -project made me think of
a use case for which Discourse might be just the thing: Debian
Enhancement Proposals[0].

I get the impression that having proposals discussed/peer reviewed on
Discourse might be easier and more pleasant than on lists. For example,
it would give a way to express agreement with something more visible
than silence, it would give a way to get visible feedback other than
negative, and give some measure of perceived relevance to the various
contributions made to the discussion.

I'm not sure if I would be motivated right now, or ever, to have another
round of "peer review" like the one I just had, on a list. Discourse
seems like it might be a venue for peer review that wouldn't make me
feel like leaving the project after a couple of days of interaction.


Enrico

[0] https://dep-team.pages.debian.net/deps/dep0/
-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Wrapping up the Salsa as OIDC provider proposal

2020-04-10 Thread Enrico Zini
0407182106.t772yp2ry3tl5...@shell.thinkmo.de



* Non-DDs will eat up names in a namespace so far reserved for DDs

I think it's not a problem if Debian contributors get to choose a
username and keep it.

I would argue it's an improvement to have usernames that don't have to
change as one's membership status is gained or lost.

See: https://lists.debian.org/20200408130828.izn7jdyufch7k...@enricozini.org
and: https://lists.debian.org/20200408131839.ispzcuzwwof2k...@enricozini.org



* If we drop the requirement of having "-guest" for non-DD users on
  Salsa, how can one tell if a user is a DD?

Waldi has a prototype ready for showing official membership status
prominently and directly on a user's page, with information synced from
nm.debian.org.

Making sure that only current DDs have access to certain repositories is
a problem that can be solved independently from account naming policies.



* Will nm.d.o have a field which reflects the username on salsa?

Yes, finally! It's been really painful not to have that so far.



* How do we avoid namespace clashes between LDAP and Salsa?

The two namespaces start in sync for non-guest accounts. nm.debian.org
will forward the Salsa username to LDAP when new LDAP accounts are
created, and will ask people who don't have an LDAP account, to choose a
Salsa account name that is free in LDAP.

This means that LDAP remains independent from Salsa and DSA remains
fully in control over the user account namespace. It is the Salsa
namespace that will have to adapt to what is free on LDAP's side, the
moment someone with a Salsa account requests an account in LDAP.

For people who get an account in LDAP and later want to rename their
Salsa account, the option remains to register a new account to keep the
old name locked.

See: https://lists.debian.org/20200409072447.ci2xnvtnwv5as...@enricozini.org
and: https://lists.debian.org/20200409181701.3qqsn5sqq3xbu...@enricozini.org



* Currently client certificates can be used to connect outside of
  browsers

OIDC is a common standard, and there are standard ways to address this
kind of use cases.

Some services outside browsers (like dovecot) support OIDC.

Services providing APIs normally offer API keys for interacting with the
APIs.

See: http://lists.debian.org/20200407182106.t772yp2ry3tl5...@shell.thinkmo.de



* Proposed conclusion

I could not see any reason why this proposal would make the situation
*worse* than the status quo, or any reason this proposal would block
further migration to something else in the future.

I therefore consider it a useful iterative improvement over what we
have, and see no reason to block it.

I will start working with Waldi on getting it implemented, tracking
progress at https://salsa.debian.org/debsso-team/oidc

Anyone who would like to help, please get in touch!


Enrico

[1] https://salsa.debian.org/bisco-guest/nacho
-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-10 Thread Enrico Zini
On Wed, Apr 08, 2020 at 02:23:47PM +0200, Ole Streicher wrote:

> I don't know the exact proposed rules here, but I could imagine that
> without these rules anyone cann fill the namespace of nice Debian user
> names.

If you're talking spam account flooding the namespaces, they can be
cleaned up from time to time.

If you're talking about legitimate Debian contributors not yet
interested in becoming DDs, using up names that people interested now in
becoming DDs would like to have, I think it's not a problem if the
people who registered the name first gets to keep it.


> And there is the danger that someone hijacks the user name of a
> Debian user who is still not on Salsa. Or an emeritus name or so.

The proposed workflow is that:

 - you register a name on Salsa
 - after you go through nm.d.o, it becomes your name on LDAP

By default, when you become a DD you have the same username on Salsa,
and so it's taken by you and nobody can register it, even if you become
emeritus.

If you decide to rename your Salsa account, then yes somebody else can
take it, and it's fair enough. If somebody takes it over maliciously,
the account can be locked.

If you decide to rename your account but don't want somebody else to
register your old name, you can register it yourself after the rename,
to keep control of it.


> I would also like to have a visible distinction between "trusted" names
> (where the owner is verified via key) and random names, in one way or
> the other.

The official membership status synced from nm.debian.org can, with some
work, be made visible in the user's page.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-10 Thread Enrico Zini
On Fri, Apr 10, 2020 at 09:40:45AM +0200, Enrico Zini wrote:

> If you or someone else eventually will manage to introduce a Single Sign
> On system that would take us to a next step of being able to advocate
> developers, take packaging actions, update the ssh key you use to access
> debian.org machines, all via a web interface, I really look forward to
> that!

Incidentally, if you could eventually manage to make a viable proposal
for a SSO system that DSA and ftp-master considered secure enough to
enable building web UIs that could do things like, for example, but not
limited to:

 - advocate people on nm.d.o without needing to paste a
   GPG-inline-signed statement into a web form
 - move a package from experimental to unstable with one click
 - trigger a binNMU
 - vote for a GR by ranking options in a web form

Then I think that it would be a compelling enough innovation that you
won't have to be afraid of any amount of "good enough" for whatever
other system will be in place by then.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-10 Thread Enrico Zini
On Mon, Apr 06, 2020 at 02:34:03PM -0500, Michael Lustfield wrote:

> I was previously involved with a company that audited various git-hosting
> services. I'm stuck behind a very strict (saw it brutally enforced) NDA, so
> please forgive the lack of specifics. Gitlab is a tool that gets many things
> right, and many things wrong. Access control is an area where I have seen some
> critical bugs. Some of those bugs lead me to not trust it as a non-internal
> authentication source.

I normally assume anything with a huge codebase to be full of holes, so
I'd say you haven't told me anything surprising.

The current sso.debian.org codebase has been written by one person (me),
deployed by one person (me), audited by nobody, and as far as I'm aware,
nobody besides me has ever read the code. I think that's a scarier
picture than Gitlab: at least Gitlab is somehow widely deployed, has
regular updates, and has people maintaining it in production and sending
patches, which gives it a limited amount of scrutiny.

I still claim introducing gitlab as OIDC provider is not going to make
matters /worse/, and, I repeat, that's the only claim I've been trying
to get validated here.

If you are concerned that Debian critical operations could be depending
on a single signon platform which does not have the track record of
security that we would like, then we're already dealing with that: the
whole world controlled by sso.debian.org is designed under the
assumption of not being secure enough.

You can't get sso.debian.org access with your Debian master password:
you need a web password instead, which does not give you access to the
rest of db.debian.org.

With a sso certificate, for example, you can't change your status in
Debian, you can't advocate a person, you can't AM approve, you can't DAM
approve, you can't upload packages, you can't vote, you can't read
debian-private, you can't gain shell access to debian.org machines: we
require a GPG signature from a key in the Debian keyring for all those
operations. That is not going to change.

If you or someone else eventually will manage to introduce a Single Sign
On system that would take us to a next step of being able to advocate
developers, take packaging actions, update the ssh key you use to access
debian.org machines, all via a web interface, I really look forward to
that!

That's not what we're trying to do here. We're not there now, and it's
not going to change with introducing Salsa as an OIDC provider.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-10 Thread Enrico Zini
On Thu, Apr 09, 2020 at 05:09:19AM -0500, Michael Lustfield wrote:

> It also appears that there is an intent to drop -guest naming. I haven't seen
> any technical discussion about this beyond learning about the current
> structure. I am very concerned that this will have significant consequences in
> regard to DSA-managed LDAP.

Are you concerned or do you have specific issues in mind?

Do you have actual issues that have not been addressed in
20200409072447.ci2xnvtnwv5as...@enricozini.org and
20200409181701.3qqsn5sqq3xbu...@enricozini.org ?


> Meanwhile, there are now five people with an interest in doing what we can to
> rectify the situation. It's unfortunate that we weren't aware of the stall a
> year ago, but we're here now, and I don't intend to work slowly. I'm confident
> you're aware of my "requirements gathering" phase. Design has been roughly
> discussed and I'm now taking a day to bury myself in documentation. Since I'm
> still playing the social distancing game, you can probably guess where my
> weekend priorities will be. :)

I don't know how many times I repeated that I have no intention of
standing in your way, I wish you great success, I look forward to having
a healthy and long-lived team that takes care of a great and official
Signle Sign On system in Debian. I *want* to be able to stop worrying
about this and focus on maintaining the services I need to maintain.

Could you please meanwhile not stand in the way of trying to fix the
status quo enough that I feel safe in keeping the services I maintain
online?

I've been in a horrible situation for more than a year waiting
helplessly for this to happen, and I have a chance to get out of that
pit while not getting in your way. Can you give me a good, practical
reason why you seem want me to stop with that?


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-09 Thread Enrico Zini
On Thu, Apr 09, 2020 at 07:46:21PM +0200, Tollef Fog Heen wrote:

> > For guest accounts opened by DSA directly, it can be pretty much the
> > same: you can use the current Salsa account name of the person as the
> > username for the guest account.
> 
> I don't think we want to make the Debian LDAP service subservient to
> salsa's, which this effectively would.  (People requesting guest
> accounts might also not have salsa accounts.)

You don't have to, and I wouldn't consider LDAP subservient to anything:
if you create an account in LDAP that exists on Salsa, when the Salsa
user wants a guest account or to become DD, we'll ask them to rename
their Salsa account because the LDAP one is already taken.

The idea is to leave DSA free to implement whatever policy they want and
manage their LDAP namespaces as they see fit. When people want to create
accounts in them, they adapt according to the rules DSA sets.
nm.debian.org tries to validate as much as possible according to those
rules, to make thinks smoother. What we can't validate, we deal with it
on a case by case basis.

This is pretty much what what happens today: DSA gets to refuse (and
does refuse) account names arbitrarily without providing explanations
even when we ask, and we suck it up and deal with it. This is not
something we outside DSA can change, and it's not something I expect
will change.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-09 Thread Enrico Zini
On Wed, Apr 08, 2020 at 04:06:25PM +, Luca Filipozzi wrote:

> Another view point: I don't think that one's username should change as
> one's role(s) with the organization changes. If we could avoid that...

Agreed!


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-09 Thread Enrico Zini
On Wed, Apr 08, 2020 at 03:48:43PM +, Luca Filipozzi wrote:

> > If you're instead generally expressing a fear that once we migrate to
> > Salsa, we'll be in a local optimum that is going to be considered good
> > enough to be worth bothering migrating to anything else, then I would
> > argue that the problem wouldn't be having moved to Salsa as an OIDC
> > provider, and rather that the next step that is proposed wouldn't be
> > bringing enough compelling advantages to the problem at hand.
> 
> Indeed, a local optimum is worrisome.

If you mean that we should block a workable proposal for incremental
improvement in case it turns out to be good enough, I think I don't want
that.

What we have /now/ is unsustainable, to the point that I'm afraid and
ashamed of keeping some of the services I'm responsible for online.

We have come up a proposal that could be deployed in a couple of weeks
of off-working-hours straightforward work, with no need to deploy
any new infrastructural component. It can solve the urgent issues.

Then we can talk about a better, long-term, technically excellent,
actively supported and sustainable solution, and by all means, I'd like
to see that.

We could also do a post-mortem of why we have had what sounded like a
good solution for more than one year and never managed to get it
deployed. Not for pointing fingers: for avoiding getting in such a
stalled situation in the future.

I am not at all in the mood for any of that, though, while I find myself
starting responding to users' requests for help by apologising for the
state things are.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-09 Thread Enrico Zini
On Wed, Apr 08, 2020 at 08:50:00PM +0200, Tollef Fog Heen wrote:

> > There's another flow.  Contributors interact with DSA in some process I
> > do not fully understand to get guest accounts on porter boxes etc.
> 
> https://dsa.debian.org/doc/guest-account/
> 
> I'd like to see a proposal on how to avoid namespace clashes between
> guest and non-DD salsa accounts?

For guest accounts opened on request via nm.debian.org, the idea is
requesting an account name that is the same as the Salsa account name.
Any requirement mismatches can be fixed by renaming the Salsa account
name prior to LDAP account creation.

For guest accounts opened by DSA directly, it can be pretty much the
same: you can use the current Salsa account name of the person as the
username for the guest account.

In case later a person decides to rename their Salsa account after
having a corresponding one in LDAP, see 
20200408130828.izn7jdyufch7k...@enricozini.org


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-08 Thread Enrico Zini
On Wed, Apr 08, 2020 at 03:00:31PM +, Luca Filipozzi wrote:

> > Question: is there something in the proposed Salsa plan that somehow
> > blocks experimenting with, introducing, or migrating to Keycloak in the
> > future?
> 
> The further we go down one path, the harder, in my opinion, to change
> later.

I think we're not really going "down one path": we're trying to dig
ourselves "out of one pit".

I'll have to repeat the question: is there something specific in the
proposed Salsa plan, that somehow blocks experimenting with,
introducing, or migrating to Keycloak or some other solution in the
future?

From what I can see so far, we're starting a migration to OIDC, removing
one of 3 user databases, adopting more standards, and doing some general
cleanup along the way, which makes me think Salsa could be considered an
iterative step towards a migration to anything else.

If you're instead generally expressing a fear that once we migrate to
Salsa, we'll be in a local optimum that is going to be considered good
enough to be worth bothering migrating to anything else, then I would
argue that the problem wouldn't be having moved to Salsa as an OIDC
provider, and rather that the next step that is proposed wouldn't be
bringing enough compelling advantages to the problem at hand.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-08 Thread Enrico Zini
On Wed, Apr 08, 2020 at 10:05:19AM -0400, Sam Hartman wrote:

> I don't think it blocks your proposal, but I do think that having
> something to audit repos and make sure only current dds have access to
> certain repos is a valuable user no]eed.
> And I think the current-status-permission check need is also valid and
> probably more critical.

Sure. I seriously think we don't have enough audit tools in Debian, and
I'm strongly in favour of having more.

With regards of current-status-permission, I checked with waldi, and
with some extra work it is possible to add some visible information to
the user's page, synced from nm.debian.org, about their official
membership status: we can totally have that.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-08 Thread Enrico Zini
On Wed, Apr 08, 2020 at 08:25:06PM +0800, Shengjing Zhu wrote:

> > I understand you want to recognize DDs from other contributors, but why?
> > Does it help you with permissions, does it help understand who someone
> > is, or is it a habit that has been there since Alioth?
> 
> For me, it's easier to trust a DD than a non-DD, so I'll grant a role
> with higher permission if they request to join a team/project.

I think this has ups and downs.

Currently, if someone doesn't have -guest on Salsa, they are either
active DDs or locked accounts. The moment a non-"-guest" person loses
their DD status, their account gets locked.

This is currently causing trouble: when one loses DD status, suddenly
they lose access to all their repositories until they get readded to
everything with a new -guest account. For repositories that only they
controlled, this requires admin intervention and headaches.

This has happened, and it's serious enough to make Salsa not suitable
for hosting long-term projects at the moment: I don't want to build my
projects' ecosystem on something which locks me out the moment I decide
to go emeritus, or the moment I get my Debian membership temporarily
suspended for whatever reason.

I would argue that it would make more sense to grant roles and
permissions to people based on their past contributions and reputation,
rather than based on current status.

I agree that with the current proposal, the use case of "grant a person
permission based on their status, which is somehow revoked or blocked if
the status goes away" becomes something we might not be able to do.

In my opinion this change, rather than opening a new problem, fixes an
old, nasty one instead.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-08 Thread Enrico Zini
On Wed, Apr 08, 2020 at 08:45:32PM +0800, Shengjing Zhu wrote:

> Sigh, but it makes sense too. Will nm.d.o have a field which reflects
> the username on salsa?

It finally will, yes! \o/

It's been quite painful not having that mapping so far.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-08 Thread Enrico Zini
On Wed, Apr 08, 2020 at 08:04:59PM +0800, Shengjing Zhu wrote:

> > 1. Can you still keep the "-guest" enforcement, so it's still easy to
> > recognize who is DD or not on salsa?
> 
> The reason why I ask for this is because
> 1. If a -guest account is added to a project in salsa Debian group,
> the group name is also shown on the personal profile.
> 2. Users can make their profile private, so you don't know what group
> they belong to.
> 3. To search in the Debian group member page takes too many steps.
> 
> If there's an easy way I'm not aware of, then I'm fine with it.

I checked with waldi, and with some extra work it is possible to add
some visible information to the user's page, synced from nm.debian.org,
about their official membership status.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-08 Thread Enrico Zini
On Wed, Apr 08, 2020 at 07:50:22PM +0800, Shengjing Zhu wrote:

> 1. Can you still keep the "-guest" enforcement, so it's still easy to
> recognize who is DD or not on salsa?

I'll leave answering these questions to Waldi / Salsa admins.

I would like to stick to investing energy in solving problems that we
really have, though, so I'm curious: do you have specific reasons in
mind for asking to preserve the "-guest" enforcement on Salsa?


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-08 Thread Enrico Zini
On Wed, Apr 08, 2020 at 04:51:49AM +, Paul Wise wrote:

> Is there any documentation and diagrams on the typical request flows
> between the browser the servers involved that happens with OIDC?
> Is there an OIDC demo site somewhere so that I can see the requests
> between the browser and the servers involved and see which browser
> features OIDC uses and requires in practice?

My goal in this discussion is to see if there are blockers for moving in
the direction that me and Waldi proposed, or to discover unexpected ways
in which what we propose would make the situation worse than it is now.

I would like to keep this discussion focused on ACK/NACK, so that me and
waldi and whoever may want to join the work, can go ahead and start
putting together implementation schedule and get things moving.

Are your questions an expression of curiosity about the OIDC protocol,
or about hinting that there is something there that you consider a
blocker to be discussed before we start working?


> > However, I don't know how a moderation workflow should work.
> 
> I'd like to see this happen via a "welcome" team. You register an
> account with a paragraph about why you're signing up, your account
> gets moderated and you receive a welcome email from the team with tips
> related to your signup paragraph and to the service where you started
> the registration flow, for eg people starting their registration on
> the wiki might get a link to the wiki editor guide.
> 
> https://wiki.debian.org/Welcome

I would definitely like to see the Welcome Team take off, and I would
prefer not to derail what seems like a workable plan about improving the
broken Single Sign-On situation, into a discussion about a Debian
Welcome Team.

I'd love to have a healty, active, and pervasive Welcome Team, and maybe
Salsa's an excellent opportunity for Welcome Team contributions.

Unless you think having a functional Welcome Team onboard should be
considered a blocker for moving on with SSO improvements, could we
postpone this to a later point?


I'd like to keep this round of discussion focused on two points:

 - is the current situation broken?
 - with this proposal, does it become less broken? 

That the current situation is broken seems to be generally agreed.

I haven't yet seen anything that convinced me that what we are proposing
would make it more broken, or would prevent further opportunities for
moving on.

If no serious blockers show up, in a few days I would start to go ahead.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-07 Thread Enrico Zini
On Tue, Apr 07, 2020 at 03:20:52PM +, Paul Wise wrote:

> I'd like to learn a bit about what the effects for Debian account
> holders and service admins will be.

Thanks, I'll answer where I can.

I understand that you're exploring all possible corner cases that might
change and we might have to document or generally be aware of, and are
not implying that any change in the areas you explore should be
considered blockers for migrations away from the status quo.


> > - Salsa becomes primary source of user info and authentication for secondary
> >   services via OpenID Connect (OAuth2), for both DDs and non-DDs, replacing
> >   sso.debian.org.
> 
> It sounds like the answer is no, but does Salsa, Keycloak or
> LemonLDAP::NG support TLS client certs?

At least as a transition period, I intend to add OIDC authentication to
sso.debian.org via libapache2-mod-auth-openidc or something equivalent,
so that services that haven't migrated to OIDC can keep working.

I guess the same can be done authenticating against Keycloak, LLNG, or
most other things we might end up using, although I hope that if
sso.debian.org ends up not being needed, we can turn it off after
transitions have transitioned: I'm a big fan of reducing the amount of
custom code that I have to maintain.


> So it sounds like Debian would be switching our SSO authentication
> protocol from TLS client certs directly supported by TLS clients to
> something based on HTTP redirects, referrers and cookies and that
> requires a browser in order to login?

Technically yes. Practically, things like OIDC are standard setups, and
there are standard ways to deal with non-browser access, like API keys.

nm.debian.org for example already supports API keys without the need of
a client certificate.


> Is it intended that service maintainers each implement OpenID Connect
> etc within their service code using existing libraries, or should we
> use something like the mod_auth_openidc Apache module to pass
> authentication details to service code.
> 
> https://github.com/zmartzone/mod_auth_openidc

I suppose each service can choose as they see fit. The apache module
would provide a handy migration strategy from the current sso, keeping
things handled at the web server level.

Each service can decide what to do according to what options are
provided by their underlying frameworks: OIDC is a widely supported and
adopted standard, and it could be that using the corresponding
functionality of Django or whatever framework one has, turns out to be
easier for development and maintenance than the web server module.

Both options would be available, anyway.

If we really find out that we need a CA issuing client certs for some
kinds of services, we can still keep maintaining sso.debian.org: it's a
simple enough codebase and I think most people would be able to pick it
up and maintain it as a CA service for our SSO federation.

Note that I'm not aware of anything using sso.debian.org certificates
outside a browser. I wrote and published example code to do that years
ago, and haven't seen any adoption or even feedback.


> Can services using non-HTTP protocols be authenticated with OpenID Connect 
> etc?
> 
> Is it intended that there be moderation at account creation time? In
> our experience with the Debian wiki, a large amount of spammers
> attempt to sign up. I hear that Salsa gets a lot of spammers signing
> up too and those are manually cleaned up if they do something spammy.
> For the wiki we found the best way to prevent spammers from signing up
> is human moderation. Even that doesn't always help as I've let
> spammers sign up before based on the content of their signup emails,
> but it is a good start. One very nice aspect of the wiki signup
> moderation is that the team can respond to aspects of the signup
> email, welcoming the applicant with pointers to documentation,
> suggestions of ideas on how to help, mailing lists to join and so on.

I defer to Salsa people for this part.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-07 Thread Enrico Zini
On Tue, Apr 07, 2020 at 09:14:11AM -0500, Michael Lustfield wrote:

> I can very much appreciate a desire to get a replacement rolled out as quickly
> as possible. The more I learn about the current situation [1], the more 
> alarming
> it is. However, please don't consider the work Lucas and I are doing as
> stalling. I was unaware that the whole effort stalled. I'm currently between
> contracts and have plenty of free time to make something happen.
> 
> I also like to think of a myself as a good masochist. You can expect me to
> stick around for the long term. :)

That's great, and I also don't want the Salsa improvement we proposed to
be a blocker for further developments.

As far as I'm concerned, we could get started with migrating services to
OIDC consumers[1], unblocking new non-DD access to services, and
cleaning up the status quo a bit.

Sooner or later, your and Luca's work (or somebody else's, or all of
them) can get validated, and can pick it the situation from where we
left it and keep improving.


[1] or even simply libapache2-mod-auth-openidc, since the current cert
system is handled by apache anyway


> Aside from the security concern I raised earlier, it's largely a "gut feeling"
> that comes from seeing how quickly legacy quirks develop in any new 
> deployment.
> If Salsa needs to make any assumption or enforcements that Alioth did not,
> those will need to be accounted for in the new solution. Additionally, we
> already have a clean path 

I don't understand what you mean with "any assumption of enforcements".


> Something that comes to mind is what it would take to migrate accounts from
> Salsa to somewhere else. Does gitlab provide user exports? As unfortunate as 
> it
> is that alioth's DB is now a flat-file managed by hand, it provides a very
> simple and easy way to import all of that data.

Gitlab does indeed provide user exports: some more details are in the
"Exit strategy" part of the proposal Waldi posted.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-07 Thread Enrico Zini
On Tue, Apr 07, 2020 at 03:28:07PM +0200, Xavier wrote:

> With a SSO, I don't think it's a good thing to have a protected app as
> user database (even if it's possible). Then migration consists to
> extract gitlab accounts and push them in LDAP (2 branches, one for DD,
> one for guests)

Ok, please help me to see where that would be an issue.

The current status of accounts, is that:

 - There is only one LDAP server, DSA-managed, on db.debian.org, which
   has accounts that do not end in "-guest". They may be DD or ex-DD
   accounts, or "guest accounts" created for non-DDs who need to have
   temporary access to porterboxes

 - There are accounts ending in "-guest" (that are not "guest
   accounts"), that are not managed by DSA, and used to be on Alioth's
   separate LDAP when alioth existed.
   
 - "-guest" accounts for purposes on sso.debian.org authentication are
   now stored on a hand-maintained text file that is exported somehow to
   serve as an apache authentication source for sso.debian.org

 - "-guest" accounts on Salsa are stored on Salsa's user database

We currently have all sorts of overlaps and corner cases:

 - "guest accounts" in LDAP that do not end in "-guest" and are for
   non-DDs
 - "-guest" accounts in Salsa for DDs and ex-DDs, with the part before
   "-guest" not matching the LDAP account name.

I wonder if we have the same "-guest" accounts in Salsa and in the
sso.debian.org text file, that are controlled by different people?

With the Salsa proposal:

 - the text file disappears, reducing the count of user databases from 3
   to 2
 - LDAP remains as it is, and Salsa remains as it is
 - DD accounts remain on LDAP
 - We gain an explicit mapping between LDAP accounts and Salsa accounts,
   via nm.debian.org, that we currently do not have
 - People who gain or lose DD status can keep using their Salsa account
   without needing to migrate from "something-guest" to "something", or
   from "something" to "something-guest"

With the Salsa proposal the only change from here that I can see is that
we would start to have non-DD accounts on Salsa that do not end with
"-guest", like we already have non-DD accounts on LDAP now that do not
end with "-guest".

I still don't see how the Salsa proposal makes adoption of a new system
harder than what we have now: removing one user database and introducing
a mapping between the remaining two, seem to me to make further
adoptions actually easier.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-07 Thread Enrico Zini
On Tue, Apr 07, 2020 at 02:31:31PM +0200, Xavier wrote:

> > I'll ask you the same question I asked Luca: is there something in the
> > Salsa proposal that would prevent further experimentation with LLNG and
> > eventually possibly integrating it into the ecosystem, or migrating to
> > it?
> 
> No, just to migrate accounts

Could you give some more detail of what you mean?


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-07 Thread Enrico Zini
On Tue, Apr 07, 2020 at 12:20:40PM +0200, Xavier wrote:

> Resume of proposition:
>  * all users managed by SSO; self-registration authorized with "-guest"
>in a distinct LDAP branch
>  * GitLab becomes a slave of SSO using SAML (or OIDC)
>  * other applications are protected by handlers/GateKeepers. If LLNG is
>chosen, just to add few lines in Nginx configuration
>  * new applications can be protected using handlers, SAML, CAS, OIDC,...
> 
> 

I greatly appreciate yours and Luca's and Michael's proposals, and
offers of help.

I would like to avoid stalling progress on sso on things like analysis
paralysis, or like sorting out deployment details, as happened in the
last years.

I'll ask you the same question I asked Luca: is there something in the
Salsa proposal that would prevent further experimentation with LLNG and
eventually possibly integrating it into the ecosystem, or migrating to
it?

If not, then we could start with that, which requires no deployment of
new software, and on which we can make progress immediately, and buy
time for everyone to work out the perfect solution, meanwhile moving on
from an unsustainable status quo.

As a side effect of an interim on Salsa, services can begin to migrate
from client certificates to OIDC, switching to a mode widely used,
usable, and flexible standard, which I wouldn't be surprised if it would
make things easier when moving to something else later on.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-07 Thread Enrico Zini
On Mon, Apr 06, 2020 at 07:07:26PM +, Luca Filipozzi wrote:

> > I don't know keycloak: what are the maintenance costs, and what would be
> > the benefits over time?
> > 
> > Right now, with the proposal waldi just posted, we have very little to
> > no added maintenance cost, possibly negative maintenance cost once we
> > take sso.debian.org and the current handcrafted salsa subscription thing
> > offline. The amount of code deployed compared to the status quo would go
> > *down*. The user interface and user experience for the lot would be good
> > and well known. Gitlab's codebase, while large and complex, is widely
> > deployed, and we already have know-how about it in Debian.
> 
> Having just joined this conversation, the above is an argument that is
> difficult to refute: one can always argue that 'one in the hand is
> better than one in the bush'.

Yes :/  I think that's more or less where we are now, unfortunately,
after a year or more failing to find people to deploy and maintain
alternatives.

On one hand, client certificate handling in browsers gets worse over
time, and the current sso solution is effectively running on people
collecting all sorts of workaround instructions in the excellent wiki
page at https://wiki.debian.org/DebianSingleSignOn

On the other hand, signing in for non-DDs is a major hurdle that takes
literally weeks, when one can find out how to do it at all. We DDs care
little about that, it's Not Our Problem. That barrier makes joining
nm.debian.org to become a DD a challenge in itself. Other things like
managing one's own information on contributors.debian.org are just not
worth the challenge, and I'm planning to take contributors.d.o offline
soon, because I/we can't, ethically and legally, publish people's
information without giving those people a reasonable chance to control
it.


> My DSA colleagues asked for demo and I'm building that up, currently. I
> view this as a positive but not definitive step in the maintenance
> questions.
> 
> I appreciate that the idea of using keycloak as an IdB requires everyone
> to shift perspective.
> 
> Let me know if you have appetite (or not*) to discuss the above.

Personally I'm interested in anything that works and that I can have a
very good confidence that somebody will maintain over time.

I care about maintenance and sustainability more than about anything
else, because I'm the one who's been forced to set up and maintain SSO
in Debian mostly alone for 8 years, because everybody else walked away
from it and I could not.

OIDC supports various authentication sources, and the Salsa plan
decouples OIDC from LDAP allowing them to evolve independently, removes
custom nonstandard components, and includes the option of migrating away
to something else in the future. In my understanding it enables
experimentation with other systems rather than blocking it.

Question: is there something in the proposed Salsa plan that somehow
blocks experimenting with, introducing, or migrating to Keycloak in the
future?


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Salsa as authentication provider for Debian

2020-04-06 Thread Enrico Zini
On Mon, Apr 06, 2020 at 04:09:38PM +, Luca Filipozzi wrote:

> That said, please consider an approach that would see keycloak used as
> an idenitity broker, allowing external users to create accounts using
> social identities that are then promoted to full Debian identities (in
> LDAP) if they complete the onboarding process. Could be used as
> replacement for debsso, could be used for wiki, could be used for
> debconf, could be used for salsa.

I don't know keycloak: what are the maintenance costs, and what would be
the benefits over time?

Right now, with the proposal waldi just posted, we have very little to
no added maintenance cost, possibly negative maintenance cost once we
take sso.debian.org and the current handcrafted salsa subscription thing
offline. The amount of code deployed compared to the status quo would go
*down*. The user interface and user experience for the lot would be good
and well known. Gitlab's codebase, while large and complex, is widely
deployed, and we already have know-how about it in Debian.

I would not want to see a workable proposal that we could implement over
the next two weeks and that we have the resources to maintain long-term,
blocked by something that risks getting us stuck with sso.d.o for
another bunch of years until we get it right, and possibly ending up
being maintained long term by a team with a dwindling bandwidth and bus
factor.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: FTP Team -- call for volunteers

2020-03-16 Thread Enrico Zini
On Sat, Mar 14, 2020 at 05:41:38PM -0400, Roberto C. Sánchez wrote:

> The fact is that given the length of time packages can wait for NEW
> processing and the amount of effort package maintainers put into
> packaging, it is understandable that they would be frustrated at the
> rejection of a package.  That said, it does not make flaming the FTP an
> acceptable response and is certainly not going to produce any positive
> result.  But it is not clear that it would be possible to prevent such a
> thing.

I would like to change the strategy we currently use in Debian to deal
with structural issues, from what seems like "people yell abuse out of
frustration and teams survive by bearing with it", to something else.

I would ideally like to cut on the abuse, and invest in help (both
asking for, offering, and accepting help) in dealing with both routine
and structural issues.

I mean, *abuse in the project cannot possinly be part of routine work*.
Please let the Community Team know of instances so they can talk to
people, and please let DAM know of particularly bad instances, like
personal threats, if they happen.

However, if we have a structural issue that causes frustration, having
the community team helping people in keeping their cool and DAM taking
action on people with a tendency to losing it bad, does not make the
structural issue sustainable.

For this reason, thank you for asking for help! I hope people who
volunteer can expect better working conditions than what was offered in
the call, and I hople that one can have a path of growth in the team
from something that looks like grunts who do the routine work under
enemy fire, to someone who can get appreciation for their work, over
time develop understanding and agency in the team, and eventually can
help to shape it.

I don't mean for this to be specific to the FTP team. I guess this
thread gave me an opportunity to voice my more general thoughts.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Lenovo X395 Support Latest Debian Version

2020-02-11 Thread Enrico Zini
On Tue, Feb 11, 2020 at 10:07:58PM +0100, Christian Kastner wrote:

> I am very positively surprised by this effort. It's rare (to me) for a
> vendor claiming Linux support to show even a modicum of interest beyond
> a very specific configuration.

Quite. Same here.

Just today the maker of my fancy business laptop[1], that is not Lenovo,
told me that to replace a swollen battery under warranty I have to
either ship it off-site and spend at least 10 working days without it,
or give them 375€+VAT for someone to come change it on-site, because
they consider the battery on this one as non-user-replaceable.

My first thought after reading their mail and Mark's post here, was that
I could keep the swollen battery, and put that money, or the money I
would lose in a 10 working days downtime, into the piggy bank for a new
Lenovo laptop...


Enrico

[1] who does kindly sponsor DebConf, for which I'm grateful, but still
fails to officially support Debian on it :-/
-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: possibly exhausted ftp-masters (Re: Do we still value contributions?

2019-12-29 Thread Enrico Zini
On Sun, Dec 29, 2019 at 03:15:07PM +0600, Judit Foglszinger wrote:

> Maybe instead of saying "you shouldn't have done that",
> rather explain which parts of questions asked in one specific process
> one found sufficient to approve the NM as a DAM and why,
> so there is some more orientation and more insight,
> what exactly DAM finds important to ask.
> 
> On the other hand given that quite some people find their process
> a valuable experience, it would be sad to reduce it to the bare minimum,
> as long an AM takes the effort to ensure, that
> the NM is not forced to do unnecessary things they rather wouldn't want to do.
> (if some stuff is more clearly optional, it might also easier for DAM to skip 
> it)

Thanks! I like the angle of documenting what was found sufficient,
rather than what was not needed.

Probably the documentation shouldn't be public, to avoid applicants to
build an expectations of a bare minimum work required and then get angry
at the AM if the AM feels like asking more than that, but it could be,
for example, a monthly post to the am@ alias.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: possibly exhausted ftp-masters (Re: Do we still value contributions?

2019-12-29 Thread Enrico Zini
On Sat, Dec 28, 2019 at 02:35:50PM +, Sean Whitton wrote:

> On Sat 28 Dec 2019 at 08:21am -05, Roberto C. Sánchez wrote:
> 
> > Oh, wow.  I've been doing this wrong all along.  I am not sure how I
> > developed the impression that it was necessary to distinguish different
> > copyright holders (even same copyright holders with different copyright
> > years), but your approach is most certainly simpler and more compact.
> 
> Right.  This is the sort of overdocumentation that I worry our
> machine-readable copyright format implicitly encourages us to do.

I see similar things on nm.debian.org, which I ended up calling in my
head something like "the law of inflation of bureaucracy".

That is, I see that when people are asked to do some work, that later
will be checked by someone else, over time there is a tendency for the
perceived amount of work to inflate.

I guess the incentives are such that doing one bit less feels like
making it more likely that review will fail, and doing one bit more
feels like making it more likely that review will pass.

The result over time is an increase in the amount effort that both
people who are doing the work and people who are doing the checking end
up putting into the system.

For example, an Application Manager in the NM process will tend to err
for asking a question more, that DAM will have to read.

I haven't yet seen easy ways of introducing a feedback mechanism to
counter this: saying "you didn't need to do this" feels to me like
arbitrarily undervaluing someone's work, and maybe the person really
found it important to do it.

I would be very much interested in reasoning about this.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Some thoughts about Diversity and the CoC

2019-12-22 Thread Enrico Zini
On Sat, Dec 21, 2019 at 02:44:41PM -0600, Gunnar Wolf wrote:

> I am always sad and disheartened when this kind of threads erupt. And
> I can only imagine how this hurts people that cannot just sympathize
> with you, but suffer instead in their own bodies and lifes the
> discrimination. I am a believer of social change towards inclusiveness
> and acceptance, but it's a long and very gradual process.

I agree that inclusiveness and gradual growth and patience are really
important, and are the main way in which a project as wide as Debian can
mature.

However.

We are talking about being on the receiving end of a steady stream of
"you don't belong here", "your identity is not valid", "you don't have a
right to exist",

Gradual growth and patience work in a community, if the people being
invalidated can rely on getting support, protection, and an affirmation
of their validity.

If we do *not* offer this, we *cannot* ask people for patience.

Otherwise, it would be (and it is) asking disempowered people to perform
on par with everybody else, while bearing the punches from the trolls,
while being patient with the confusion of the innocent, and while being
expected to politely and patiently educate the privileged ones.

It would be like, in a school, expecting that the kid who most gets
beaten up, be responsible for solving the bullying problem for everybody
else.

The responsibility for a healty community, where everyone can feel
included and accepted, is nominally the responsibility of everyone in
the community. In practice, however, it is *primarily* the
responsibility of the people who are *in a position of privilege and
power* within that community.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Some thoughts about Diversity and the CoC

2019-12-16 Thread Enrico Zini
On Mon, Dec 16, 2019 at 06:28:41PM -0800, Russ Allbery wrote:

> (I realize that this can be kind of frustrating for people who aren't
> native English speakers, because those rules can provide the structure
> that they rely on to express themselves in English.)

In my experience, this mostly becomes frustrating in bullyish
environments, where people are putting more effort in debating me and
competing on who is more "right". There, an apparent language mistake
means that people will be delighted to disregard everything I was trying
to say, and instead point a finger and laungh at me having been WRONG.

"You make a good point but your grammar is WRONG, and now I'll divert
the conversation into patronisingly explaining it to you" is a great
classic when speaking to people with a confrontational attitude and a
fragile ego, who can't just say "I like your point" and build on it.

I've seen it work also the other way round, where in bullyish
environments people intentionally make "innocent" mistakes if they help
"take the other person down a notch".

In an environemnt where people are putting more effort in cooperating,
and working together towards a common goal, even a language mistake that
would render an entire point incomprehensible or absurd, would end up
into not much more than "wait, I don't get it, you mean to say $THIS?"
"uh, ah, lol, no, sorry, I meant $THAT", and work and life go on without
even a significant break of the flow.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Some thoughts about Diversity and the CoC

2019-12-13 Thread Enrico Zini
On Fri, Dec 13, 2019 at 10:49:12AM +0100, Bernd Zeimetz wrote:

> No, either we have a CoC or not.
> If it goes so much against your believes, humanity or whatever else,
> that you can't answer in a sane language, ask somebody else to answer
> in your name. Especially when you are in a team that wants to keep
> the CoC upright.

If one focuses on Tina instead of looking at Gerardo's history of
behaviour on Debian list, and is actually in common faith trying to make
sense of an extreme reaction, I suggest these links for a bit of
context:

 * https://en.wikipedia.org/wiki/Sealioning
 * https://en.wikipedia.org/wiki/Tone_policing
 * 
https://blog.valerieaurora.org/2019/01/09/repost-how-calls-for-civility-are-harming-tech-companies/

TL;DR: there is a widespread form of oppression which consists in
politely but relentlessly asking minorities to justify themselves.

As long as we allow it to happen in Debian list, as I observe that we
do, I do expect that somebody loses it at some point. I believe that the
person who engages in sealioning, and those who enable them to continue
doing so, should at least get to share in the blame.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Community Team - where we want to go

2019-10-23 Thread Enrico Zini
On Mon, Oct 21, 2019 at 07:37:16AM -0400, Sam Hartman wrote:

> > * In extreme incidents or after repeated harmful behaviour or Code of
> >   Conduct violations, writing reports for relevant teams (e.g. Planet
> >   admins, listmasters, DAM), to summarise relevant incidents along
> >   with analysis and suggested possible courses of action; and
> 
> my understanding from cambridge is that DAM would prefer not to get
> recommendations on what to do in such cases.
> Is DAM happy with the suggested possible courses of action language?
> Even if not, it's fine to keep if other teams would appreciate that
> feedback.

Thanks, good catch!

I would prefer to receive on the DAM side a collection or list of
pointers to relevant things, and anything I could use to decide what to
do, and I fear that receiving suggestions on what to do would make
things more complicated.

This is because if feel that if we receive a suggestion, not only we
still need to figure out a course of action independently of what the
reporter(s) suggests, but then we also need to deal with a conflict with
the reporter(s) if the course of action that we choose is different from
what was suggested.

We might of course find it helpful or important, depending on cases, to
reach out to the reporter(s) or other people involved to discuss
possible course of actions.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Community Team - where we want to go

2019-10-14 Thread Enrico Zini
On Mon, Oct 14, 2019 at 01:40:34PM +0200, Enrico Zini wrote:

> Posting draft team missions where one has to read between the lines
> about possible institutional conflicts and other unsaid issues, is
> emphatically /NOT/ a way to build trust within the project.

To make it clear: I think the draft team mission that was posted is a
great start for a discussion, and I think we need teams to support
people in Debian, and I think we need a good way to escalate different
interpretation of the CoC.

What I think is not a way to build trust, is what Guillerme's reading
of Tina's message was implying. I think those things hurt everyone and
destroy good efforts, and I strongly wanted to push the discussion back
to the idea of constucting something together.

I see how my message could be read as implying that the whole draft
Steve posted is not a good way to build trust. To the contrary, I
consider it a good way to put cards on the table, and to start to work
out together how they should be arranged.

I was afraid I was hearing that some cards might not be kept on the
table, and I wanted to strongly object to that.

If all the cards are on the table, by all means, let's all find a good
way to put them together!


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Community Team - where we want to go

2019-10-14 Thread Enrico Zini
On Sat, Oct 12, 2019 at 04:04:49AM +0200, Guillem Jover wrote:

> > Once you do that I'll be happy to work with you just as I would any
> > other group approaching changing/renewing/creating a delegation.
[...]
> But then I see no reason at all why they need to do that now. Even though
> they have already stated so, and the mail you reply to went as far as
> mentioning a timetable of around 12 months, which TBH I pretty much
> interpreted as a tactful way to say “once the current DPL term is over”.

If one wants a delegation from a DPL, I'd expect them to work *with* the
DPL, as the DPL is the person responsible for delegations.

If a team has an issue with a DPL, I expect them to acknowledge the
issue, state their long term plans and why they wouldn't work with the
current DPL, state what they'd like to do in an interim situation,
propose a GR.

Posting draft team missions where one has to read between the lines
about possible institutional conflicts and other unsaid issues, is
emphatically /NOT/ a way to build trust within the project.

I think the responsibility of interpreting the CoC should go to people
who we can trust not to wield it like a club, who are clearly named, and
so on. A delegation provides this.

Currently, as I understand it, interpretation of the CoC is the
responsibility of the DPL, overridable by GR. Needing to read between
the lines of a proposal like this, instantly makes me think of attempts
to grab that power away from the DPL. Of trying to force a self-written
delegation on the first DPL who gets distracted for a moment. This is
most emphatically /NOT/ a way to build trust within the project.

I have seen, in other communities, successful power grabbing attempts
done by emptional blackmail, refusals to take no for an answer, and
similar kinds of social pressure. I don't at all mean to imply that it
is what is happening here, and I trust at least some of the member of
the (AH|Community) team enough to believe it is actually not the case.

Still, I most emphatically do not want to have to read things between
the lines in a discussion like this one. Not when power is involved. Not
when trust is involved.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Community Team - where we want to go

2019-10-10 Thread Enrico Zini
On Wed, Oct 09, 2019 at 10:26:39PM +0100, Steve McIntyre wrote:

I join other respondents, with a risk of redundancy, with a few notes
due to the decision of not having delegated powers and being an
undelegated advisory group.


> The (CT) is the team responsible for interpreting the Code of Conduct
> (CoC) when necessary.

I feel strongly against this: "The team" hints at being the only team,
and "Responsible" hints at having power.

I believe strongly that anyone who is /the/ person/team responsible for
interpreting the Code of Conduct needs to gain that responsibility from
an official delegation, and absent a delegation, I believe that the only
person ultimately responsible for interpreting the CoC when necessary is
the DPL, overridable by a GR.

However, I also believe that any member of the Debian community is
responsible for upholding the Code of Conduct, and I'm fine with the
idea that one or more people or groups could make themselves available
to help with CoC interpretation or supporting people if things get
heated.

At that point, however, the CoC interpretation is not a responsibility
but an offer of help, whose value can maybe come from experience and
reputation of a person or team members inside the project.


> Finally, the CT will also work in combination with event organisers to
> deploy incident response teams on the ground and ensure that the CoC
> is observed for Debian events.

In the same light as above, I suggest s/work/make itself available/, as
any other group could make themselves available to event organisers to
help with Debian or event-specific CoC.


> Responsibilities include
> 

I agree with what Mathias Behrle wrote about this session.


> Examples of things the team does *not* do
> =
> 
>  * Remove blogs from community forums like Planet Debian

This I think is something the team could actually do, just as any Debian
Developer could do it, having commit access to the planet config.


>  * Take punitive measures or actions against members of the Community.

I find this point a bit tricky, because I think that what is "punitive"
is up for subjective interpretation. For example, feeling forced to
engage with individuals wearing a Community Team badge could already be
seen by some as a punitive measure.

You may want to remove this point entirely, as it's mostly covered by
the other examples of what the team does not do.

 - - -

Some more general feedback points.

I suggest to review your notes with the idea that there could be two or
more such teams in Debian posting the same set of notes, and they
shouldn't conflict.

Also, given the idea that there can be multiple groups doing this, the
name "Community Team" sounds possibly problematic name to me, as it
hints indeed at being /the/ team for Debian Community issues, which
could potentially be setting the wrong kinds of expectations.

Although I would prefer a name that would make it explicit that we're
talking about /a/ /self-appointed/ group, I wouldn't consider the naming
a blocker: I know names are hard, and I don't want you all to spend your
energy picking names.

Still, I'd acknowledge and keep in mind that the name does sound
ambitious, and as a consequence I'd expect you all to be extremely
careful in all team descriptions and team actions to make it clear that
you are /a/ community team, not /the/ community team.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: GR proposal: mandating VcsGit and VcsBrowser for all packages, using the "gbp patches unapplied" layout, and maybe also mandating hosted on Salsa

2019-09-25 Thread Enrico Zini
On Tue, Sep 24, 2019 at 08:27:15PM -0400, Sam Hartman wrote:

> But I think having recommendations available when people are new, when
> they are looking for what to do when writing new tools, when the trade
> offs don't matter, is really important.  I think it's important enough
> that it's worth time for a quick vote (and I do believe we can
> efficiently handle GRs).

I agree with your message, and I'd like to expand on "when people are
new". I probably don't qualify as new in Debian, and I maintain some
package outside of teams. For those packages, I suffer from the lack of
a team policy that gives me a default way of doing things unless I have
better ideas.

Also, as over time my packaging practices have become outdated, I have
found it both difficult and frustrating to engage on a quest for
figuring out "how does one do this thing nowadays?"[1], and if there
were default recommendations available, I would have considered them a
boon[2].

When the upstream is straightforward and I'm not engaging in innovating
packaging practices, I'm significantly happier having a default script
that I can follow, instead of reinventing or refiguring out the wheel
every time I have an upload to make[3].

So, maybe I'm not new in Debian, but Debian is often new to me, When
there's no team to provide me with some well thought defaults, I could
use a well documented set of well thought defaults to work with.


Enrico

[1] if one finds themselves in a similar position, a good way of staying
up to date is to become Application Manager. AMs routinely learn a
lot from applicants
[2] maybe with some policy-style upgrading checklists
[3] the things I maintain don't need frequent uploads, and it's become
sort of my expectation that for each upload that I make I need to
plan some nontrivial yak shaving time to figure out which of my
assumptions have become invalid since the last one
-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: debian-private leaked on pastebin, worried

2019-08-05 Thread Enrico Zini
On Mon, Aug 05, 2019 at 12:50:27PM +0200, Geert Stappers wrote:

> And I think he worries more about Debian then the majority of us.
> That is something that does worry me.

I this this is more obsession[1] than worry: when one worries about
someone or something, one doesn't go on stalking and harassing them.


Enrico

[1] 
https://www.quora.com/Whats-the-difference-between-being-obsessed-with-someone-and-being-in-love-with-them
-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Results of the Antiharassment Team Survey

2019-07-13 Thread Enrico Zini
eople who we expect to moderate it, and generally those people are
too busy keeping the service running to also deal with the moderation.
Or possibly, the expertise needing to keep a service running is not the
same expertise needed in being an effective moderator for the service.

Also, moderation isn't the same thing as antiharassment, and is
something that possibly has more to do with editioral choices than with
personal conduct. For example, I haven't met a single person who doesn't
regularly skip the frequent CRAN posts on planet, and I think planet
would be destroyed if every single person who syndicates their blog on
it started to post montly summaries of their work, but I certainly
wouldn't call those posts inappropriate content.

Still, the confusion with moderation as editorial choices to keep the
signal-to-noise ration of a given medium optimal and moderation as
stopping inappropriate behaviour, and the confusion between who is
running a service and who is moderating it, means that it's just easier
at the moment to do no moderation at all, and I think we're missing out.


Then I'd like people who can do early intervention with short temporary
bans from lists or the bts when people get heated. I'd like it to be ok
to be kicked out from lists for a few days, and since everyone might
have a bad day every once in a while, It might even get to a point when
most people who have been in Debian for more than a decade could count
one or two short bans from a list in their history. It'd be better than
being able to count having flooded one or two threads in an extremely
embarassing way and having everything archived everywhere across the
internet for everyone to see.

It'd be more akin to asking a person to take a step back and count to
ten, than to tell a person that they are a harasser who is abusing
people. I'd see value in having this teams also being a team able
to add "and are you ok? Wanna talk?", now that they have someone's
attention, but I'd rather have one or the other, than try to have both
and end up with none.

I think this role would also need some delegation, to allow people who
run the services to act on their requests without the need to double
check them every time.


I would guess that all these needs of mine are needs that are more or
less shared by many in Debian, like a static charge building in the air,
and now that we are waving a lightning rod in that general direction, we
get a request for *everything* coming through: mediation, early
intervention, moderation, safety net, confidentiality, interpreting the
CoC, being reactive, being proactive, be nonjudgemental, pronounce
judgements.


I'm super happy that we are having this discussion, and that we are
starting to deconstruct and map the gaps that we want to fill. I don't
think we'll be able to fill them all, and least to fill them all with
one team, and incremental improvement is better than no improvement.

If we can get someone who interprets the CoC, but doesn't do mediation
or moderation, I think that's better than the status quo.

If we can't have a mediation team, we can start a collection of links
for conflict resolution that anyone in Debian can read, and add to
Developers' Reference a section on how to help when people seem to be in
trouble, and how to ask for help. I think that'd be better than the
status quo.

And so on. Debian is going to be around for a long long time: we'll have
the solutions to all our problems when they're ready. In the meantime,
I'm super excited that we're working on them!


Enrico


[1] I make no assumptions on directionality of help in a conflict: I
think there is a stage at the beginning when everyone could use
help. Even if one party turns aggressive, it may happen out of
frustration from not being heard, for example.
See https://en.wikipedia.org/wiki/Tone_policing
[2] Or maybe that it's good to expect that if I don't postpone sending
my emails when I have a bad day, I'll get 20 mails from random
people telling me to take some long breath before posting next time.
That sounds healthy actually. I'd like to expect that those 20
emails are not harsh, though, because harsh replies don't generally
help with recovering from a bad day.
[3] https://en.wikipedia.org/wiki/Bystander_effect
[4] I'd like to document an invitation never to be alone in Debian, and
always have a few friends/teammates at hand you're comfortable with,
who can help you weather a bad day, or support you and help you to
respond if you find yourself on the receiving end of something
unpleasant.
[5] There would be the team mailing list or IRC channel, but sometimes
one could use some confidentiality.
[6] *sends a mail*
"Failure to assume good faith!"
    *takes one penalty card*
[7] https://joeyh.name/blog/entry/thread_patterns/
-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Debian Easter shake down

2019-04-22 Thread Enrico Zini


Joerg, Jonny,

Christmas was so much fun, lets do it all again
Hang some developers over the side of the ship for a good shakedown
and make them give us all their Easter eggs

Enrico


--
  ,''`.
 : :'  : Enrico Zini
 `. `'`  Debian Account Manager
   `-


---

Take your mailboxes with you. Free, fast and secure Mail  Cloud: 
https://www.eclipso.eu - Time to change!




Re: Appeal procedure for DAM actions

2019-01-08 Thread Enrico Zini
On Tue, Jan 08, 2019 at 01:21:20PM +0200, Jonathan Carter wrote:

> If I read the original text correctly in item 1 above, it seems that
> only the person who's rights got revoked can appeal?

Yes, correct.

> If that's the case, are you talking about multiple appeals from people
> who have had their membership revoked, or is it that I interpreted it
> wrong and that anyone can appeal?

I'm clarifying the corner case in which two people have had their
membership revoked, and are in a position to appeal in overlapping time
frames.

This should almost never happen, but given that we have waived the time
limit for the cases in the last 6 months, we have potentially
overlapping time frames now.


Enrico who unfortunately cannot run this kind of procedure through
   valgrind --tool=helgrind

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Appeal procedure for DAM actions

2019-01-08 Thread Enrico Zini
On Mon, Jan 07, 2019 at 11:27:35PM +0100, Joerg Jaspert wrote:

> 1. Appealing DAM decisions
> --
> Any person who had their Debian membership suspended or revoked by DAM may
> appeal the decision. They must request the appeal within 30 days, stating
> why they disagree with the decision in a mail to DAM. DAM will notify the
> New Members Committee (NMC)[1][2] and Front Desk.

In case two people appeal at the same time, the NMC should not have to
discuss multiple issues in parallel.

if an appeal is requested while another appeal is already ongoing,
starting the later appeal is delayed until after the committee has
finished voting on the previous ones.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Planet Debian revisions

2019-01-02 Thread Enrico Zini
On Wed, Jan 02, 2019 at 05:39:58PM +0200, Jonathan Carter wrote:

>  4. Avoid posting personal fights or insults. Planet Debian is not an
> appropriate medium for this.

If I'm still on time, I'd suggest: "personal fights, insults, or slurs",
as I'm not sure how much we can give for granted that everyone
understands that using slurs counts as insulting.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Censorship in Debian

2018-12-26 Thread Enrico Zini
Hi,

On Wed, Dec 26, 2018 at 01:13:53AM +0900, Norbert Preining wrote:

> For those not aware of the issue, here is *my* view onto the events.
> AH and DAM can answer and provide their own interpretation. I will try
> to stay as objective as it is possible for me.

As written in the message we sent you, none of the issues linked, taken
singularly, would be worth of taking action, but taken all together they
represent a long recurring trend.

The reason we took action is because:

> our impression is that you seem to ignore the issues raised
> while attacking the people who raise them.

That is not an acceptable behaviour in a community that is built by the
cooperation of a diverse range of skills and people.

Also, we could see, while considering the situation, that this kind of
trend is not just a thing of the past. As we wrote here:

> On nov 27, the antiharassment team removed your blog post from Planet
> again, because of yet another reiteration of these problems. Your
> response, even though it was framed like asking questions, again it read
> as an accusation to the people, a delegated team in this case, who, once
> again, called you out.
>
> On dec 4, you have unilaterally readded yourself to Planet Debian.

This was another, recent repetition of the trend of attacking the people who
raised issues instead of listening to them. In particular, this part of
your reply to the antiharassment team, that you chose to leave out when
reposting it here on -project:

> Question 4: several people feel uncomfortable
> -
> If you consider the harassment team different from a hidden military
> court or a gulag general, I expect that those who have deposed complains
> do not remain anonymous. Please let me know who initiated this
> procedure.


I hope this helps make sense of our decision.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini 


signature.asc
Description: PGP signature


Re: Automatic downloading of non-free software by stuff in main

2017-12-01 Thread Enrico Zini
On Fri, Dec 01, 2017 at 08:22:58PM +0500, Andrey Rahmatullin wrote:

> > Debian ought to be a good upstream for everyone, not just "me"
> > (whoever me is).
> Our users are declared our priority, our downstreams aren't.

It never occurred to me that our downstreams could be considered as not
being a part of our users. Is that a common understanding?


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini <enr...@enricozini.org>


signature.asc
Description: PGP signature


Re: Emeritus status, and email forwarding

2017-11-15 Thread Enrico Zini
On Wed, Nov 15, 2017 at 01:45:52PM +0100, Mattia Rizzolo wrote:

> In many cases (such this particular one) people don't have a viable gpg
> key anymore in the keyring: that means they can't email
> chan...@db.debian.org to update their LDAP details (theoretically, they
> might still know the LDAP password and do it from there, but in practice
> all the people who reach that point already forgot it).
> So there is really a very technical issue to overcome for your proposal.

I would be ok with saying that emeritus people who have a valid gpg key
can still have email forwarding, exporting the emeritus keyring
alongside the other keyrings, and handling email forwarding
configuration changes via chan...@db.debian.org, and key replacements as
usual.

It would exclude people who don't have a viable gpg key anymore in the
keyring, or who are not interested in maintaining one, but that is
already the case mostly anywhere in Debian, and I don't see it as a
blocker for keeping forwarding working as long as someone is emeritus
and has a key in the emeritus keyring.

I would also be ok saying that people whose keys in the emeritus keyring
become invalid over time, because they expire or because they are not
replaced when needed, move to "removed" status after a while.


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini <enr...@enricozini.org>


signature.asc
Description: PGP signature


Re: Inappropriate content on planet.debian.org and need of evolution of documentation and CoC

2017-04-06 Thread Enrico Zini
hurt again.

Also, almost any post can be NSFW for some values of Work. For example,
I know there are workplaces where talking about Free Software would not
be safe. So there needs to be some kind of political judgement made
about when to say "if Planet is usafe for your workplace, it's our
problem" and when to say "if Planet is usafe for your workplace, it's
your problem", and I don't think a policy could cover enough corner
cases to be the place where such choices are made.

Rather than have policies, I'd like to have guidelines, and an editorial
team who's trusted and empowered to make calls on a case by case basis.
Who can say "we temporarily removed your feed because post X caused Y,
can you remove the post from the feed, or change it so that it doesn't
cause Y?" or "no, your feed can't be on Planet Debian, full stop". And
if the team at some point loses the trust of the project, we look for a
new team.


Enrico

[1]: I don't really care about each and every single release of GNU R
libraries or of Gammu, or about the lists of last month's Free Software
activities of a self-selected group of people. But then I avidly read
nageru's news and intricate development details even though I know I'll
never use it myself. Le cœur a ses raisons que la raison ne connaît
point.
-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini <enr...@enricozini.org>


signature.asc
Description: PGP signature


Re: Formal declaration of weak package ownership in source packages (was: Replace the TC power to depose maintainers)

2016-12-11 Thread Enrico Zini
On Tue, Dec 06, 2016 at 03:42:57PM +, Ian Jackson wrote:

> > It's a lot simpler to keep this metadata outside source package.
> I endorse this product and/or service.

Here's one way to quickly build a service like this:

 - Configure the web server to accept Debian's SSO credentials:
   
https://wiki.debian.org/DebianSingleSignOn#Documentation_for_web_application_owners
 - Set up a Django site using RemoteUserMiddleware, but trusting
   SSL_CLIENT_S_DN_CN instead of REMOTE_USER:
   https://docs.djangoproject.com/en/1.10/howto/auth-remote-user/
   (see the CustomHeaderMiddleware example)
 - Create the model and CRUD pages for the extra info you want to
   maintain about developers, with ForeignKey to
   django.contrib.auth.get_user_model()
 - Export your data with django-rest-framework


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini <enr...@enricozini.org>


signature.asc
Description: PGP signature


Re: moving to usergroups

2015-10-16 Thread Enrico Zini
On Fri, Oct 16, 2015 at 11:09:34AM +0200, Peter Palfrader wrote:

> Therefore I propose to:
>  - create, for each user in the Debian LDAP, a group named like the
>user.
>  - Make the primary group for each user their corresponding group.
>  - Make their former primary group (Debian, guest) a supplementary
>group.
> 
> This would require adapting all scripts that currently rely on the gid
> field to tell if somebody is a DD.  They would have to change their
> filter/condition from e.g. gidNumber=800 to supplementaryGid=Debian.
> (Note that supplementaryGid is a multi-value field.)
> 
> Comments/suggestions/concerns?

As far as I'm concerned, go for it. I do check gidNumber on
nm.debian.org in a couple of places, and I'll happily fix it.


Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini <enr...@enricozini.org>



Re: Debian Project Leader Election 2015 Results

2015-04-17 Thread Enrico Zini
On Thu, Apr 16, 2015 at 10:41:52PM +0100, Jonathan McDowell wrote:

  I get the numbers from nm.debian.org, both at https://nm.debian.org/api
  and https://nm.debian.org/public/findperson/
 Sadly this list is trivially proved inaccurate; the list for Debian
 Developer, Uploading includes stew who was moved to emeritus back in
 January:
 https://anonscm.debian.org/cgit/keyring/keyring.git/commit/?id=b768c0a3506631ddeacf4c80ba8f3be6995e8a8f
 and finger s...@db.debian.org correctly returns no active fingerprint
 for the user.
 Copying Enrico who can no doubt comment more about the expected accuracy
 of nm.debian.org; AIUI it's still a work in progress in terms of being
 entirely up to date all the time.

nm.debian.org is supposed to be the authoritative source, but Debian did
not grow with having a single membership database, so in practice it
needs to be kept manually in sync with changes coming from LDAP and the
keyrings.

Examples of membership related changes that can happen without
nm.debian.org knowing are DSA adding a guest account, keyring-maint
creating a DM (the current workflow skips FD entirely), keyring-maint
replacing a key, keyring-maint removing a compromised key.

Keeping it in sync manually is work, and I'm the only one who has been
doing it. I've recently fallen behind, because syncing DMs from keyring
changes is nontrivial[1] work and a lot new DMs piled up, and there is a
large amount of 1024-4096 key changes pending, too.

Now that keyring-maint has introduced machine-parsable and signed git
logs, the sync with keyring can be automated somehow. It's a Simple
Matter Of Programming, I already got started, but I'm the only one
writing code.

After that is done, we're left with the problem of DMs: the current
workflow skips nm.debian.org entirely, so the data sources for new DMs
are the keyring and RT, and none of them has information about alioth
account names, which would be needed for sso.debian.org to work, so new
DMs currently require extra manual intervention to be able to log into
sites like nm.d.o and contributors.d.o, or DebConf.

Also, if we want to be strict and have DAM really responsible and
authoritative for new accounts, some of the syncing from DSA and
keyrings need manual approval anyway, otherwise keyring-maint and DSA
people will be able to create/remove developers without DAM knowing.
I do not think that is a risk that we have at the moment, though, but
it's a thought.

There are ideas flying around. One is that DMs have a name in LDAP, or
that the workflow for DM starts by filling in a form on nm.debian.org,
which would simplify *a lot* of things, since most of the procedure
for becoming DMs is made of mechanical steps.

If we're not in a super hurry, we can make this all happen during
Debconf at the latest. Or during a DebCamp sprint: we can organise a
sprint about that, if there are other people interested in working on
it.



[1] nm.debian.org needs to have the first/middle/last name split that
LDAP has, so I need to work out that split from full names in key
UIDs, among other things, which is nontrivial:

http://www.kalzumeus.com/2010/06/17/falsehoods-programmers-believe-about-names/

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Debian Project Leader Election 2015 Results

2015-04-17 Thread Enrico Zini
On Fri, Apr 17, 2015 at 10:00:56AM +0100, Jonathan McDowell wrote:

  As far as I know relying on the keyring and ldap has always been
  incorrect.  The number was always off by a few.
 
 I've never quite understood why LDAP isn't accurate, but I couldn't
 figure out a simple query and even
 '((gidNumber=800)(!(shadowExpire=1))(objeass=debianDeveloper))'
 gives 988 entries of which some are incorrect.
[...]
 The astute will notice that this leaves 981 keys, whereas I counted 983
 keys in the keyrings. It turns out there are 2 DDs who have removed 1024
 bit keys but who have locked LDAP accounts (issue with SSH key on one,
 DSA locked on the other as comments).
 
 Anyway. The 2 things to take away are a) yes, it's depressingly hard to
 work out how many voting members Debian has and b) the answer is 986 at
 present.

Indeed. We have multiple user databases, each with its own sets of
corner cases. We cannot currently univocally identify a person by
account name (DMs and Debian Contributors do not have one), by alioth
account name (a person can have many), by GPG key (a DD can have none,
in case they just revoked a stolen one), by full name (hi Brian
Nelson(s) and Luca Bruno(s)), by email (it changes). LDAP login can be
disabled when one becomes emeritus or temporarily after a case of abuse.
DSA can create guest accounts.

In nm.debian.org's nightly maintenance I run a lot of code that computes
differences between these data sources, so we have the capability of
tracking things, and the possibility of manually tweaking nm.debian.org
to really fit the bill. But since we have also a need for manual tweaks,
it gets out of date.

  It's was my understanding that DAM says that nm.debian.org is
  authoritative.
 That is the eventual goal but at present various pieces of information
 are manually updated. Enrico and keyring-maint have been working on
 making it easier for nm.d.o to track keyring changes but there's still
 more to be done before this is complete. There's a vague plan to get
 this done during DebConf if not before.

And indeed that'd be the way forward as I see it: reduce the need for
manual intervention as much as possible, so that routine takes care of
itself, and manual intervention is only needed for corner cases, which
are hopefully few and far apart in time.


Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: About the recent DD retirements

2015-01-22 Thread Enrico Zini
On Wed, Jan 21, 2015 at 06:46:16PM -0800, Russ Allbery wrote:

 about it).  But there are still a lot of hard and interesting problems,
 which are worth working on.  So, one, we need to figure out how to make
 those problems apparent and provide people leverage to work on them.  But
 we should also consider that the project has a lot of appeal for people

I volunteer one such problems: packaging collections of packages.

simple-cdd is a tool that tries to make it easy to create subsets of
Debian: you give it a debian version to build from (wheezy, jessie..), a
list of packages, some debconf preseedings, and you get an ISO image.

To do that it coordinates reprepro, debian-cd and a bunch of other
utilities. I've recently been porting simple-cdd to python, and in the
process I refactored it so that it contains more internal documentation.
The list of relevant environment variables to control the process is
quite daunting: 
http://anonscm.debian.org/cgit/collab-maint/simple-cdd.git/tree/build-simple-cdd?h=topython#n277

There's nontrivial work to be done there, and the result means making it
easy to build package collections to support all sorts of interesting
deployment and distribution workflows, with d-i images, live images,
preinstalled tarballs, docker contains or what have you.

And then it gets deployed and it's a standard Debian, well known, with
clean upgrade paths and security support.


Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Reminder: Removing 2048 bit keys from the Debian keyrings

2014-11-09 Thread Enrico Zini
On Sat, Nov 08, 2014 at 10:19:02PM +0100, Richard Hartmann wrote:

 That seems to have happened in similar form a few times already; given
 the context, it's reasonable to expect them to poke -project,
 -private, or just anyone on their own.

I know at least one of the people listed who is already taking action,
currently managed to get one DD signature (me) and several other paths
to the strongly connected set, and will probably wait until closer to
the deadline to do the key update, hoping for opportunities for more DD
sigs.

Therefore I would not claim that all of the people listed there are
sitting there doing nothing. I like that Jonathan's mail was worded as
an invitation to offer help.


Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Update to reimbursement procedure (now: max 3 months after expense)

2014-10-07 Thread Enrico Zini
On Tue, Oct 07, 2014 at 08:12:49AM +0200, Lucas Nussbaum wrote:

 Providing a rough estimate should not be a problem, given it is already
 required to get pre-approval.

If it's already required to get pre-approval, why ask to send it again?


Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


--
To UNSUBSCRIBE, email to debian-project-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141007071834.ga18...@enricozini.org



Re: Reverting to GNOME for jessie's default desktop

2014-08-08 Thread Enrico Zini
On Thu, Aug 07, 2014 at 03:29:26PM -0700, Don Armstrong wrote:

 Specifically: 1) Would you want the default CD/DVD image to use a GNOME
 even if GNOME was unable to fit on a single image? 2) Would the GNOME
 team consider a less-complete DE for cases where image size is a
 restriction?

How hard/sane would it be to have XFCE as default on installation CDs
and Gnome3 as default on installation DVDs or netinst CDs?

That way, people with disconnected, old computer get XFCE which has a
higher chance of working there. People with computers that either
have a DVD or a fast network connection, would instead default to the
heavier/more-feature-complete desktop.


Enrico either way, I use lxde :P

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: keybase.io

2014-04-05 Thread Enrico Zini
On Fri, Apr 04, 2014 at 07:27:36PM -0400, Paul R. Tagliamonte wrote:

 +1 russ.
 This is true of the dropbox daemon too. Are we to throw out DDs with dropboxd
 installed? Wine?

...skype, steam, flashplugin-nonfree[1].

Code git-cloned without checking signatures on tags[2] or doing some
auditing[3].

Random cool vim plugins git pulled from random people on github with
fancy selfies[4].

ssh -X or -Y to a remote host, then run X apps.

I've recently got worried about common practices I see around me, and
started considering running a Hardening Debian Development BOF at the
next Debian event I'm going to participate. The intention would be to
see how to address those issues, but with a strong awareness on
usability[5].


Ciao,

Enrico

[1] for example, https://lists.debian.org/debian-vote/2014/03/msg00246.html
skype and adobe can be trusted or course, it's not as if some random
government wouldn't have motivation and means to tweak with their
code.
[2] As if people nowadays signed their tags. Or tagged releases. Or
released at all. Who needs QA? Code review? The coolest features are
in master, implemented an hour ago.
[3] http://underhanded.xcott.com/
[4] luckily, this is disabled by default, but hell if I found a warning
about it: 
https://github.com/scrooloose/syntastic/blob/master/syntax_checkers/html/w3.vim
(also found in /usr/share/vim/addons/syntax_checkers/html/w3.vim)
[5] https://www.schneier.com/blog/archives/2009/08/security_vs_usa.html
-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: keybase.io

2014-04-05 Thread Enrico Zini
On Sat, Apr 05, 2014 at 12:45:53PM -0700, Russ Allbery wrote:

 If someone would write up a good step-by-step guide for how to isolate
 one's web browser in a VM running on the same host, so that you can still
 get reasonable display performance but have a real separation boundary
 between the web browser and the rest of the system, I for one would be
 extremely grateful.  The same technique would work for things like Skype.
 
 I'm sure it's possible, but I don't know enough about the various
 virtualization systems to be able to figure it out quickly, and I've yet
 to get interested enough to spend several days figuring out a method.

By all means, I'd love that. This is where I got to.

Keith Packard assured me that running software in a nested X server like
Xephyr is a way to prevent them from accessing the outside X session,
and I considered it an interesting way of running skype, as a dedicated
user, after checking that my home dir permissions are sound.

Still, skype also wants access to hardware like a webcam, and I haven't
yet felt like putting in effort to audit udev rules, and figuring out
what having access to webcam hardware really allows one to do[1].


[1] Instinctively, that should only be get images out of the webcam;
that wasn't the case for firewire[2]. Also, how is the LED light
next to my webcam wired? Can the webcam be turned on leaving the LED
switched off? [3]
[2] And I grew up thinking that video hardware would just drive some
video output, while nowadays on a Raspberry PI it'll read FAT
filesystems on an SD card, parse config files and boot the system.
[3] Anyway, there is no activity LED for the microphone. Can I have a
panel applet thingie which shows if some process is reading from a
microphone or webcam device?

Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: State of the debian keyring

2014-02-28 Thread Enrico Zini
On Fri, Feb 28, 2014 at 01:59:23PM +0100, Yves-Alexis Perez wrote:

 It doesn't really change anything, does it? Sure, uploads are not the
 only way to check someone is active, but still, people with no upload
 since 2012 and a 1024{D,R} key is likely a candidate for direct contact.

It would probably be expected of me to point out that there is more to
contributing to Debian than just package uploads[1].

On the other hand, in my opinion even active people should be candidates
for direct contact[2], when they look like they're lagging behind what's
expected and announced to debian-devel-announce.


Ciao,

Enrico

[1] https://contributors.debian.org/sources/
[2] Especially helpful and polite direct contact, rather than direct
contact to the head with a knobby stick :)
-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: State of the debian keyring

2014-02-25 Thread Enrico Zini
On Mon, Feb 24, 2014 at 06:51:37PM -0800, Russ Allbery wrote:

 Brute-forcing the key just requires compute cycles.  There is essentially
 no chance of discovery and no risky activity at all until you start
 actually using the key.

...which reminds me of http://www.enricozini.org/2008/tips/audit-uploads/
which was a prototype of creating an audit log of key usage in debian.

However, for the audit log to be usable as an audit log without giving a
false sense of security, it should be complete, and really cover all
instances of key usage in Debian.

This means hooking into any place where a signature verification or a
decryption actually happens in Debian: I can think of uploads,
db.debian.org, voting, keyring requests, RT tickets filed, emails
received by lists or the BTS: are there more?

I see the job as not so much technically complex[1] as socially complex:
since I would not trust auditing an incomplete audit log, I fear that a
missing or badly implemented data source could invalidate all the
system.

So I can't just open vim and write the code: auditing key usage in
package uploads requires someone who knows dak inside out, and can
commit to maintaining notification triggers in all obscure corners where
keys are used, now and in future updates of the ftp-master toolchain.
Same goes for any other bit of Debian.

The starting point for this work is probably this, then: is it just me,
feeling that we have a problem here, or am I actually in the good
company of people who can do their bit?


Ciao,

Enrico

[1] For realtime auditing, we now have a rabbitmq server. Or collection
could be decoupled in one audit log per team, which are then aggregated
by a separate project. Or they can be submitted to a central collection
point, like a new ad-hoc bit of contributors.debian.org. I don't see
anything technically difficult here.
-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: State of the debian keyring

2014-02-24 Thread Enrico Zini
On Sun, Feb 23, 2014 at 05:46:53PM +0300, Cyril Brulebois wrote:

 (It took me like 4 years to switch to my current 4k key, partly because
 I didn't feel the urge to switch, and partly because I would have hated
 wasting your time with a malformed request.)

It also took me a long while to switch because I didn't understand that
it was already this urgent, so my mode of operation was let's collect
sigs for the time being, and switch when I hear another call.

I think it would be useful to see an update to debian-devel-announce,
explaining what's the current vulnerability status of 1024bit keys, and
asking to please switch NOW.

As a potential follow-up plan, I propose this one:

After a month or two, we can start mailing people directly, starting
from the most active, asking why they haven't migrated yet, and asking
them to please tell others to migrate if they see a 1024 key around.

After another month or two, we can start taking keys off the keyring,
starting from the less active people, and announcing each batch of
removed keys to d-d-a.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Disabled authenticated access to nm.d.o and contributors.d.o late tomorrow

2014-02-18 Thread Enrico Zini
On Mon, Feb 17, 2014 at 11:20:02AM +0100, Enrico Zini wrote:

 Some more changes are needed for sso.debian.org; as a consequence we
 expect logged-in access not to work from sometimes tonight (UTC) until
 late afternoon tomorrow (UTC).

Today things did not happen as we planned yesterday.

I have now disabled authenticated access to nm.d.o and contributors.d.o
until I we can fix the outstanding issues that we have.

Work on the fix does not fully depend on me, so I cannot estimate how
long it is going to take to bring that functionality back online. I hope
it is going to be just a matter of a couple of days.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: mailing list auto subscriptions

2014-02-06 Thread Enrico Zini
On Wed, Feb 05, 2014 at 09:43:12PM +, Lars Wirzenius wrote:

 I don't have an opinion on whether having DAM send a mail to
 $list-subscr...@lists.debian.org (for some set of lists) instead of
 just one mail with a pointer to the lists.debian.org subscription
 page, except for this: I would expect someone who's just been through
 the process to become a DM or a DD to already be subscribed to those
 lists, if they're interested.

And so it should be. In the default NM conversations[1] we have this:

  debian-announce: Major public announcements
  debian-devel-announce: Major announcements to the developer community
  These two lists are must-subscribes. Everything else is optional.

So if one hasn't already subscribed before then, there's another chance
to do it.

If anyone knows of people being DM or DD who have't heard of those two
announce lists, or aren't subscribed to them, I'd like to figure out
why, just in case we need to improve our templates.

In my experience, ignorance tends not to be considered an excuse for
something that was posted to debian-devel-announce, so I consider it
something to care about. My current understanding, though, at least
looking at the people I know, is that contributors tend to be already
subscribed without needing to be explicitly told.


Ciao,

Enrico

[1] 
http://anonscm.debian.org/viewvc/nm/trunk/nm-templates/nm_pp2.txt?view=markup

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: GR: Selecting the default init system for Debian

2014-01-19 Thread Enrico Zini
On Sun, Jan 19, 2014 at 12:04:17PM +, Ian Jackson wrote:

 My reasons are quite different to yours: to summarise, it seems to me
 that the init system decision involves political questions as well as
 technical ones.

I would gladly vote an option that says: technically, we trust what the
TC says; politically, we are concerned about some of our upstreams'
choices. A technical endorsement need not also be a political one.

I would like to keep the technical and political issues as distinct as
possible, though. I am not interested in spending time evaluating each
option to form a technical opinion on what the best choice would be, and
I'm extremely happy that the TC are doing that for me.

I do have personal opinions on some of the upstreams' choices, but I
believe that they should not get in the way of a technical decision.

A constructive thing that we may do as a project to address the
political side of the matter, is to add to our technical decision a list
of things that we wish our upstreams would do to make all our lives
easier in the future.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Debian services and Debian infrastructure

2014-01-07 Thread Enrico Zini
On Tue, Jan 07, 2014 at 08:32:23AM -0500, Brian Gupta wrote:

 Well the toolset that people in the fast moving startup world are using to
 provide devs with a local dev environment that very much approximates their
 multinode prod envs is a combination of vagrant, virtualbox, and the puppet/
 chef code used to provision those environments. (Basically a toolset to
 automate the provisioning of local VMs that are configured like their
 production machines).
 
 I don't know enough about DSA infrastructure or the issues to say whether or
 not this would work for us, but it may be worth investigating.

Our production environments are debian stable+backports, and all web
application dependencies should be debian packages from
stable+backports.

I don't think we need any fast moving startup infrastructure: just
debootstrap, puppet to configure the VM (or a copy of the server's
apache configuration), and apt-get.

We are a distribution, and already we do very good integration work.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Debian services and Debian infrastructure

2014-01-05 Thread Enrico Zini
On Sun, Jan 05, 2014 at 12:05:18PM +0100, Raphael Hertzog wrote:

  1. to improve communication between DSA and service maintainers
 + have an archived, public list where (prospective) service maintainers
   can engage with DSA about stuff they are planning/thinking about.
   (Maybe recycle debian-admin@l.d.o, or use debian-services-admin@l.d.o?)
 debian-services-admin@l.d.o seems to be rather appropriate for this (it's
 unlikely that this kind of discussion would generate so much mail that the
 list could no longer serve its current purpose).

debian-services-admin@l.d.o seems to me, too, to be the perfect place
for it.

 It would also be helpful to have a document explaining their usual
 requirements. It would pro-actively direct the service maintainers towards
 choices that are acceptable to DSA.
 
 Things like:
 - use PostgreSQL if you need a DB
 - keep in mind that DSA likes to ensure high-availability, so make it easy
   to run a replicate of your service
 - avoid dependencies not in stable or stable-backports
 - avoid X, Y, Z for security reasons
 - etc.

Also agreed. It sounds to me like a specifications of the production
environment where things will be deployed, and it's something that as a
developer I should see sooner rather than later.

  2. to improve the tracking of services
 + request wiki pages from maintainers that detail who are the contact 
   points, what the service does, what are its requirements. State a
   service level agreement (informative of expectations, not punitive,
   of course)
 + have service maintainers create similar pages for services in 
   development, to provide some kind of incubation process during which
   DSA can provide feedback.
 
 This would be good to have but (someone|DSA) would have to prod service
 maintainers to get this started, otherwise it will never happen. This
 requirement could also be mentioned in the document I suggested earlier.

I think we already have something very close to this description here:
https://wiki.debian.org/Services


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Google contacting (harassing?) new DDs

2013-12-10 Thread Enrico Zini
Hello,

it looks like as soon as one becomes DD, an email arrives from Google
recruiters.

I understand that some people may find it interesting, and some people
find it annoying. My experience with just ignoring their email was that
I was contacted again.

I am toying with the idea of contacting companies with aggressive
recruiting policies like Google asking them to please leave us in peace,
and offering instead to maintain a wiki page of recruiting contacts for
companies that like the taste of DD blood. Something like:

  These companies consider Debian Developers as especially interesting
  people to recruit. If you are a Debian Developer and looking for a
  job, you can reach them using the contacts below:

Google: f...@google.com
Facebook: b...@facebook.com
Amazon: b...@amazon.com
Canonical: g...@canonical.com
...

  and so on.

Comments?


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Google contacting (harassing?) new DDs

2013-12-10 Thread Enrico Zini
On Tue, Dec 10, 2013 at 06:14:51PM +0100, Daniel Pocock wrote:

 Even if one major employer politely agreed not to do this, it is worth
 remembering that there are gazillions of tiny little agencies out
 there.  Most operate at arm's length from the big employers, giving
 themselves more latitude in their choice of tactics, to put it
 politely.  We would probably never be able to stop all of them
 trawling through Debian membership/contact data.

I'm not much interested in stopping spam, but in just making it better
for everyone involved. People may not want to be contacted now, but at
the same time may not want to train their spamfilter to delete job
offers.

On the recruiter's side, they would only get offers from people actually
motivated to take up a job with them.

On our side, we hopefully lighten the burden somewhat[1], and we get to
know that the people not playing by the book are probably also not
playing by a whole lot of other books, which may be another source of
interesting information regarding a potential employer.


Ciao,

Enrico

[1] from my personal experience, negotiating an alternative solution
with Google alone would get rid of a significant percentage of
potential harassment here. I would assume that Google is an entity
we can talk with, with a reasonable hope of success.

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: The tell me if I'm being stupid statement

2013-12-05 Thread Enrico Zini
On Thu, Dec 05, 2013 at 01:30:17PM +0800, Paul Wise wrote:

 Do we need explicit statements like this? I always had the impression
 that everyone feels free to ask people to improve their behaviour (at
 least in recent years) and that most people don't have a problem being
 asked to improve their behaviour.

Agreed. It really should be expected to be the default, with no need of
stating explicit consent to it.

In part, because no smoking signs just make smokers want to smoke
more[1].

In part because it sort of implies that the default is that you can't
tell a friend if they're being stupid unless they have an explicit
statement in the signature saying that you can.

It would make logical sense, in this respect to have a signature saying
Please don't tell me if I'm being stupid: I know I am[2] but I don't
see this being usefully picked up anytime soon.


Ciao,

Enrico

[1] http://blogs.villagevoice.com/runninscared/2011/05/no_smoking_sign.php
[2] and a procmail filter handling mail with such a signature appropriately
-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Code of Conduct: picking up

2013-11-29 Thread Enrico Zini
On Thu, Nov 28, 2013 at 12:19:57PM +0100, Thorsten Glaser wrote:

   Following the Code of Conduct I will probably be punished for making
   jokes about the different gender, different religion, different
   political opinion, and maybe even different OS. Where is the border,
   where is the limit.
 
 This is true. While many of such jokes are probably something
 undesirable, some people go actively against any and all jokes
 of that matter (I’ve had that Arabic script crashing Apple’s
 text thingy in my .sig for a while, and got told off for it
 very brusquely, so I had to remember to actively switch .sig
 for when writing to Debian lists; and there are other cases
 that aren’t even that “offensive”).

As was pointed out at the time, that was not a violation of some code of
conduct, but a violation of the DMUP[1], which you were supposed to have
read, understood and signed the moment you became a Debian Developer.

The DMUP is not a ritual about politeness, but a prerequisite that makes
it possible for Debian to run its infrastructure.

I invite you to please take a moment to read it again. Further mistakes
of that kind from you will not be tolerated, as far as I am concerned.

[1] http://www.debian.org/devel/dmup


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Debian tech tree

2013-09-09 Thread Enrico Zini
Hello,

this should look familiar to many people:
http://www.civfanatics.com/images/civ2/poster/civ2chart.jpg

I had the odd idea that we could have a similar thing for Debian:

Packaging
  unlocks
  Sponsored NMUs
unlocks
  DD, uploading (link to below)
  Sponsored uploads
unlocks
DM
  unlocks
  DD, uploading
unlocks
Sponsoring uploads
  unlocks
  Debian Mentors
Unsupervised NMUs
Application Manager
Voting
Delegations
[...]

Making cool infographics
  unlocks
  Web team
unlocks
  DD, non uploading
  [...]

I don't know if a work like this can ever be finished, since Debian is
continuously changing, so I don't know how feasible it is to have a cool
artsy layout, but then that isn't my field of expertise.

I'd love to see this tried.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Result of the Code of Conduct BOF at Debconf

2013-08-13 Thread Enrico Zini
On Tue, Aug 13, 2013 at 08:20:28PM +0200, Wouter Verhelst wrote:

   slap others with the code of conduct. Enrico also raised a number of
   other points, but I'm afraid I'll have to say that I forgot much of
   it; I'll have to ask him to raise them again on the list.

Sure. I thought discussing this CoC was difficult because I feel that
its design goal hasn't been defined very clearly, and so everyone tries
to stretch it in different directions depending on their personal
feelings and priorities.

I think that a work like this needs to start with an analysis of who the
users of such a document are, what are their goals, how the document
could help them. Once it is clear what problem we're trying to solve,
whom we're talking to and what is in it for them, then it gets
remarkably easier to write good stuff.

If we are trying to create a document that people can be pointed at when
they're having a bad day, then we should keep in mind that the document
will be read by someone who, well, is having a bad day. It should treat
the reader with the utmost respect, be extremely coincise, and offer
useful reminders. Whoops, I screwed up, what can I do to limit the
damage? -- I'd be curious to see what a document like that would look
like.

If we are trying to document the bits of the status quo that work, so
that they are proposed as a baseline standard, then we're addressing
newcomers and people who have just been on the wrong side of someone's
bad day. People could use it to realise when someone is deviating from
some standard, and decide whether the deviation is creative or
destructive.

I don't think that a document could be written that fits both goals, so
I would pick one goal at a time and focus on creating something that
does the job for that, and that thing only.

If I were to try and reverse-engineer the users and goals of the CoC
that was proposed, I'd get the feeling of something written by
old-timers to express their frustration about what it is that makes
discussion difficult. I think that's also a worthwhile document to
write, but it shouldn't be called a CoC. It would rather be the
description of a problem that we're trying to solve.

If it were a piece of software, I'd say that we've jumped straight into
writing code, without spending enough time understanding the
requirements, and agreeing on them.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Revising the Code of Conduct

2013-05-21 Thread Enrico Zini
On Tue, May 21, 2013 at 10:32:09AM +0200, Wouter Verhelst wrote:

 So, without further ado, here's my draft:
[...]

As a general principle, I object to any attempt to codify good
behaviour. The DCG, which I thank Lars for mentioning, was attempting to
give clues and reasonable expectations to people looking for them, not
to give rules for people to enforce.

It is hard to define what is good behaviour in our environment. I'd
even think that being unable to define and enforce good behaviour is a
prerequisite where creativity is sought.

Please note that a society where every single citizen is well behaved,
and every single deviant is promptly corrected, is a police state.
Bruce Schneier's Liars and outliers has some very interesting thoughts
on this.

I tend to work well in communities that are generally made of adults
endowed with reasonable judgement and common sense, rather than
communities of misbehaved kids in need of supervision. Adding rules
tends to nudge things towards the latter.

People who don't act like adults should just be treated as such and be
politely asked to grow up, keeping in mind that all of us may
occasionally slip into a childish behaviour on the occasional bad day,
and often all that is required to recover is a friend who kindly gives
the right feedback.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


I caught up with debtags patch reviews

2013-03-21 Thread Enrico Zini
Hello,

the previous patch review interface for debtags.debian.net was rather
cumbersome to use and I fell behind approving patches to go in the
Packages file.

In the last 3 days I've created a new interface, which is much swifter
to use. In less than an hour, I managed to catch up with all the
backlog, and I've just uploaded the reviewed tag data, well in time for
Wheezy.

I know some people were frustrated by the lack of migration of tags from
debtags.debian.net to the archive. The situation has now greatly
improved \o/


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: DEP 12: Per-package machine-readable metadata about Upstream

2013-01-04 Thread Enrico Zini
On Thu, Jan 03, 2013 at 04:51:02PM -0800, Russ Allbery wrote:

 My point, rather, is that a bunch of the stuff that's being discussed as
 relevant to debian/upstream can change independent of any functional
 change in the package, and therefore the proposal raises the question of
 whether we want to put even more non-functional metadata directly into the
 source package instead of somewhere with lighter-weight update processes.
 I think this is particularly relevant to any information that isn't
 specific to a particular upstream version of the package.

This currently happens with Debtags, since tags are changed at
debtags.debian.net and not in package source files: Tag fields are
injected by dak directly into Packages through an override file.

It's a bit of a hack and we already discussed some ways of improving it;
afaik it's the only existing example of a field that can change
independently of functional changes in the packages.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: DEP 12: Per-package machine-readable metadata about Upstream

2013-01-03 Thread Enrico Zini
On Thu, Jan 03, 2013 at 04:57:56PM +0100, Guillem Jover wrote:

 option. The first fields that come to mind could be Homepage,
 Maintainer and Description (and for the latter this has already happened
 somewhat). But then this does not require a split in the source format,
 but only in the archive indices, and possibly in the package managers
 frontends.

I'll throw in a few more data points.

Other such existing fields that come to mind are Tags, and Vcs-*

Possible new fields that haven't been introduced so far are: Popcon,
Rating, upstream BTS type and URL, extra keywords for full text search
indexing, date+time the package has first entered the archive, and/or
the release; datetime that version of the package has been
built/uploaded.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Review of personal information sources in Debian

2012-08-20 Thread Enrico Zini
On Mon, Aug 20, 2012 at 10:37:57AM +0800, Paul Wise wrote:

 Added info about wiki.d.o/forums.d.n user information access policies.

Thanks.

 How much detail do you want on the data available?

The use cases I can see for the page are:

 1. someone trying to manage their own identity online (say, changing
name after a wedding, adopting a pseudonym, tidying things up with
middle names or transliterations...)
 2. someone working in infrastructure, trying to link things together
somehow.

So I'd say, what is stored where? who can see the data? how do I
get the data? how do I change the data?


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Feedback on your Whois system proposal - Was: Re: Review of personal information sources in Debian

2012-08-20 Thread Enrico Zini
On Fri, Aug 17, 2012 at 05:13:10PM -0400, Michael Gilbert wrote:
 On Thu, Aug 16, 2012 at 8:52 AM, Enrico Zini wrote:
  Recklessly exposing too much information outside the context in which it
  was published can in some cases turn people away from contributing. If
[...]
 Couldn't most of these problems be solved by making the system opt-in
 (i.e. requiring the user to do some manual configuration under his
 alioth home with the ability to enable only the appropriate bits that
 he/she wants)?

I don't like you opted in so now I do whatever I want with your data,
either.

opt-in could be useful for some odd features, but I think it's more
useful to allow people (within reason) to manage their information (both
in terms of being informed, and in terms of being able to change it),
and to be careful when playing with things that are visible by search
engine robots.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Review of personal information sources in Debian

2012-08-18 Thread Enrico Zini
On Thu, Aug 16, 2012 at 02:33:55PM +0200, Enrico Zini wrote:

 In terms of implementation, I see an overlap with nm.debian.org,
 portfolio.debian.net and db.debian.org.

...and the Debian Maintainer Dashboard (http://udd.debian.org/dmd.cgi),
thanks today's Misc Developer News.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Review of personal information sources in Debian

2012-08-17 Thread Enrico Zini
On Fri, Aug 17, 2012 at 11:22:55AM +0200, Olivier Berger wrote:

 Here you go : http://wiki.debian.org/ContributorsInformationSources
 Others, I haven't re-read the thread, to add other contributions to the
 discussion to the wiki page.
 Feel free to edit it at will.

I've added MIA and Carnivore, mostly as stubs, which were mentioned to
me in a private email.

UDD was also mentioned to me, but I don't know if it should be added to
that list. It probably shouldn't if it's just an alternative interface
to existing data sources.

However, it probably should if it is storing unique information, or if
it is distributing information to a larger audience than the original
data sources. For example, UDD exports carnivore data to anyone who has
an alioth account, but can carnivore itself be accessed by people who
just have an alioth account?


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Review of personal information sources in Debian

2012-08-17 Thread Enrico Zini
On Tue, Jul 31, 2012 at 12:57:29PM -0600, Paul Wise wrote:

 wiki.d.o: email/jabber address, name, page subscriptions, timezone,
 other settings.
 
 forums.d.n: email, various contact addresses/URLs.
 
 carnivore: stores other email addresses that might be unknown to the
 keyring  LDAP.

Added to http://wiki.debian.org/ContributorsInformationSources mostly as
stubs. Could you please have a go at the details?


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Review of personal information sources in Debian

2012-08-16 Thread Enrico Zini
 already thinking of adding alternate emails from MIA to
nm.d.o, which would improve the portfolio and DDPO links and the default
minechangelogs search.

The only information we would then miss would be badges and stats. I
guess that, for those, what we most need is a way of collecting them: a
standard REST API that various pieces of Debian infrastructure can
implement, perhaps?

Once the data is collected, where it is displayed becomes a detail: it
could be a stand-alone site linked by nm.d.o and portfolio.d.o, it could
be nm.d.o itself, or both. I guess that boils down to what technologies
whomever is doing the work is comfortable working with.

Regardless of the final implementation, I think network APIs are a must,
so that even if you make your own website, I can still easily show
badges on nm.d.o pages if I feel like, and you can get personal info
from nm.d.o without needing to keep your own database in sync.


  P.P.S.
  Have you seen https://wiki.mozilla.org/Badges ?
 
 Hah, no. I didn't know about that! It looks very nice, and it's a very
 similar concept. Although it probably doesn't make much sense in
 trying to integrate with them.

I was looking at it mainly as a standard protocol to handle badge
information. Even if we don't care about integrating with them, what
would you think of just reusing their technology?


 Also, it's not like this is a great idea that came to me overnight. We
 have something very similar in spirit at work, and that's where my
 idea came from.

Sure, and no matter where it comes from, I think it's a good idea, it's
great that you're working on taking it to Debian.


Ciao,

Enrico

[1] http://www.enricozini.org/2012/debian/more-diversity-in-skills/
-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Feedback on your Whois system proposal - Was: Re: Review of personal information sources in Debian

2012-08-16 Thread Enrico Zini
On Thu, Aug 16, 2012 at 10:38:10AM +0200, Olivier Berger wrote:

 I think Ohloh.net provides, for instance an interesting comparison to
 your proposal (see my profile for instance [0]). In case you didn't know
 it, I suggest to check its features for inspiration.

While I agree with most of what you said, I feel the need of a warning
before taking ohloh too seriously as an inspiration.

In my experience, ohlog has severe privacy issues: I once wrote them
saying that they were misrepresenting my work skills and politely asking
to please not show any information about my online persona, and they
basically replied telling me to fuck off. They didn't use the f word,
but they have been just as offensive.

We must not assume that, since there are public logs of VCSes or uploads
available for one's Debian work, then the person contributing to Debian
cannot have some reasonable objections on how that data is processed and
displayed, especially when processing changes the meaning of the data
somehow.

For example, if I uploaded a package at 9pm yesterday, we can safely
assume I'm happy that the world knows that I uploaded a package at 9pm
yesterday. But we cannot, for example, assume that I also meant to
publish information about when I usually do Debian work, or when I'm
usually at home, or whether I like to do work or have fun during Italian
national holidays.

Similarly, if me and you commit patches to the same project, we don't
necessarily mean to tell the world that we are friends, or coworkers.

Suppose we had jobs at competing companies, and there were a nice page,
easy to find in Google, that said enr...@magnets4u.com and
oliv...@allaboutmagnets.com are friendly working together! just because
we both commit to a software that's used by both our companies: first
thing, we'd be expecting a call from our bosses, which might or might
not be able to understand the logic of what's really going on.

Recklessly exposing too much information outside the context in which it
was published can in some cases turn people away from contributing. If
ohloh were actually being taken seriously by people in my professional
circle, I would probably have to consider going through the extra
trouble of not using my real identity while contributing to Free
Software. We do not want that.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Review of personal information sources in Debian

2012-08-13 Thread Enrico Zini
On Mon, Aug 13, 2012 at 03:22:02PM +0100, Martín Ferrari wrote:

 Sounds like you may be working on something like that, and in that
 case I'd be interested in being involved. I think a service that
 provides a centralised database of identities, which allows each
 person to tailor how their identity is exposed, would be very helpful,
 and would allow to improve many other services that currently rely on
 incomplete identity information, specially for non-D[DM]s.

Indeed: nm.debian.org is currently the authoritative database for the
status of people contributing to Debian, and it already tracks, for
example, DMs and people with guest account.

It kind of lends itself to be such a centralised place. I've already
been giving some thinking at allowing people to tailor how their
identity is exposed, and that was one of the reasons for doing this
review.

Code is at http://anonscm.debian.org/gitweb/?p=nm/nm2.git;a=summary

What did you have in mind?


Ciao,

Enrico


P.S.
I did see your blog entry and wanted to get in touch, then I got
sidetracked by other things. It's great you got in touch!

P.P.S.
Have you seen https://wiki.mozilla.org/Badges ?
-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Review of personal information sources in Debian

2012-07-30 Thread Enrico Zini
Hello,

I've recently done a review of personal information sources in Debian,
which I'd like to share here both because I don't think this has been
done before, and to check if I missed anything.

These are all the places I can think of, where we store personal
information:

 - LDAP
 - nm.debian.org
 - the Debian keyring
 - alioth.debian.org (for -guest accounts)
 - debian/ directory in packages (control and changelog)
 - mailing list archives

Let's go into details.


 * Mailing lists, packages, alioth

One has total control over the email address used to post to mailing
lists, over their alioth -guest account information, and over what
information is used in debian/control and debian/changelog.

Everything goes as long as uploads are signed with the GPG key of a DD
(or DM), who takes responsibility for what goes in.


 * The OpenPGP key in the Debian keyring

Not much to say here: your key goes in the keyring with whatever
information you put into it, and is publicly exported.

For the key to enter the keyring in the first place, some ID check is
required, generally in the form of having other DDs sign some identities
on your key.

http://keyring.debian.org/ has details on managing it.


 * LDAP

LDAP is the place where we turn to for real life needs, and where we
would like to have real personal information.

A subset of LDAP contents (first/middle/last names, key fingerprint,
irc/jabber/icq contact info if provided) are publicly exported via
db.debian.org, both on the web and over finger.

The real name from LDAP is also exported via the GForge interface in
Alioth: https://alioth.debian.org/users/enrico and via nm.debian.org:
https://nm.debian.org/public/person/enrico


 * nm.debian.org

nm.debian.org is only storing NM related information, and piggybacks on
LDAP for personal information. The idea is that we want to reduce
maintenance costs, so we try to reuse existing information sources.

The site is most notably the authoritative place to know the status of a
person in Debian (DD, DM, ...). It also stores all information related
to changes of status, like advocates, process history and AM history,
which is publicly exported only partially, so that the process log can
be updated freely without worrying of it showing up in internet search
results.

It's partial (DM processes aren't yet tracked, for example) but getting
better. 

Given that it acknowledges someone's status in the project, it lends
itself to be used to credit someone's contributions and reputation. For
example, I find myself using the People search function a lot, combined
with the DDPO and Portfolio links, as well as the changelogs link once
you're logged in.

It has been pointed out, and I agree, that we should not publish real
names unless where necessary, so that one can associate their
Debian-related reputation with the online persona they prefer: for
example, one may be known in the general developer community mostly via
a nickname, and would prefer Debian-related search results to also show
up under that nickname.


Did I miss anything in this review? Is everything represented correctly?


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Fwd: Today the public review period for ADMS.F/OSS v0.3 began

2012-05-11 Thread Enrico Zini
On Fri, May 11, 2012 at 02:25:13PM +0200, Olivier Berger wrote:

 You may be interested in knowing that a draft of a vocabulary intended
 to be used for describing software developped in forges, or listed in
 catalogues has been published by a working group attached to the
 European Commission (ISA programme), for review by the public.
 
 I imagine it could well be used some day to publish metadata about
 Debian distributions and or software packaged in Debian on the Semantic
 Web (for instance to interlink records of an upstream software, some
 user reviews, its debian packages, and other distributions', etc.).

I'm sorry I don't have the time to participate personally, but should
you need something to complement Trove categories, there are several
facets in Debtags that are pretty well defined and useful.

These are general purpose facets that are imo ready for prime time, and
very useful: role, implemented-in, interface, system, uitoolkit,
works-with, works-with-format, hardware.

These are domain-specific facets that support important use cases:
accessibility, admin, devel, field, game, iso15924, mail, network,
protocol, office, science, security, sound, web.

The use facet is one with a lot of potential, but which requires more
thinking: it could be a good starting point for an interesting
discussion.

If you need anything debtags-related, you know where to find me: I hope
I'll be able to respond in a timely manner.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Diversity statement for the Debian Project

2012-04-07 Thread Enrico Zini
On Thu, Apr 05, 2012 at 10:32:21PM +0200, Francesca Ciceri wrote:

 It doesn't matter how you define yourself or how others define you: 
 we welcome you.  We welcome contributions from everyone 

Moar nitpicking: s/define/perceive/g

That gives: It doesn't matter how you perceive yourself or how others
perceive you: we welcome you.

This is after feedback from a respected friend on a private IRC channel,
who pointed out that the concept of definitions has unwelcome
connotations.


Ciao,

Enrico trying to prove that the draft is perfect by constantly trying to
suggest improvements: http://en.wikipedia.org/wiki/Perfection#Paradoxes

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Diversity statement for the Debian Project

2012-04-05 Thread Enrico Zini
On Thu, Apr 05, 2012 at 10:32:21PM +0200, Francesca Ciceri wrote:

 The Debian Project welcomes and encourages participation by everyone.
 
 It doesn't matter how you define yourself or how others define you: 
 we welcome you.  We welcome contributions from everyone 
 as long as they interact constructively with our
 community. 
 
 While much of the work for our project is technical in nature,
 we value and encourage contributions to Debian from those with
 expertise in other areas and welcome such contributors in our community.

I love how this is increasing in awesomeness as it is decreasing in
size.

I feel like suggesting two minor patches, labor limae if anything:

 s/contributions to Debian/contributions/
 s/expertise in other areas/expertise in other areas,/
 s/welcome such contributors in our community/welcome them in our community/

which would give:

 While much of the work for our project is technical in nature,
 we value and encourage contributions from those with
 expertise in other areas, and welcome them in our community.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Diversity statement for the Debian Project

2012-03-23 Thread Enrico Zini
On Fri, Mar 23, 2012 at 02:28:58PM +0100, Francesca Ciceri wrote:

 But I'd also like to have some inputs from you all, on it.

Since one of my responsibilities in Debian is to actually discriminate
people, I feel like I should contribute :)

I like your idea. Such a statement is IMO a direct consequence of
defining ourselves a universal operating system, and of having DFSG5
and DFSG6 in our Social Contract; but it's good that we spell it out.

I also like the draft, and I'd happily accept it as it is. This is the
extra input I can give:

 The Debian Project welcomes and encourages participation by everyone.
 We are committed to being a community that everyone feels good about
 joining. Although we may not be able to satisty everyone, we will always
 work to treat everyone well.

 Whenever any participant has made a mistake, we expect them to take
 responsibility for it. If someone has been harmed or offended, it is our
 responsibility to listen carefully and respectfully, and do our best to
 right the wrong.

I can think of another thing that we care about, which I don't see
mentioned here: We expect people to be constructive members of the
community.

That is something that we have learnt to pay attention to, over the
years.

 Although this list cannot be exhaustive, we explicitly honour diversity
 in age, culture, ethnicity, genotype, gender identity or expression,
 language, national origin, neurotype, phenotype, political beliefs,
 profession, race, religion, sexual orientation, socio-economic status,
 subculture and technical ability.

I could see elsewhere in this thread how detailed lists are a fantastic
bikeshedding magnet; I wish I had an idea on how to get away with a list
and just say what part of universal do you not get?. But I don't have
any good idea to offer, and that list does the job.

I fully agree with Russ at
http://lists.debian.org/debian-project/2012/03/msg00054.html
and I wonder if it's just enough to replace technical ability with
skillset, and field of expertise.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: New DDs introductions ?

2011-05-25 Thread Enrico Zini
On Wed, May 25, 2011 at 03:40:34PM +0200, Stefano Zacchiroli wrote:

 On Wed, May 25, 2011 at 02:23:51PM +0200, Olivier Berger wrote:
  Is there any tradition to self introductions to the project, for
  instance via -project list ?
 
 Not to my recalling, but it'd be a nice tradition to establish indeed. I
 personally see no drawbacks in posting introduction on this list: 1) it
 has low traffic, 2) introducing new project members to the project
 discussion list seems (at least borderline) on topic, and 3) the flow of
 new DDs is not high enough to risk spam-ing anyone (IMHO at least).

One of the reasons a shortened AM report, with bio, is posted to
d-newmaint is to serve as a bit of an introduction (other reasons are to
allow people to say yeah or oh noes!!.

Of course that happens at AM approval time, not at account creation
time, so I understand if that isn't enough. But it'd be sort of nice to
merge the two things.

Could it be something we can automate once we work on the new nm website
at debconf?


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Better visibility of what can you do with Debian on the?Debian main page

2011-04-15 Thread Enrico Zini
On Fri, Apr 15, 2011 at 08:56:46AM +0200, Andreas Tille wrote:

 was intended (and even if I do not like it personally - it is real).  So
 why not using the name app store for a large set of applications where
 you can cherry pick from?

I tried to post about it yesterday, but it doesn't seem to have been
noticed: http://lists.debian.org/debian-project/2011/04/msg00054.html

There is already a name: AppStream. It comes with code and standards:
http://distributions.freedesktop.org/wiki/AppStream

It's as good as any other, and I don't see the need to invent another
one.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Better visibility of what can you do with Debian on the?Debian main page

2011-04-15 Thread Enrico Zini
On Fri, Apr 15, 2011 at 12:02:17PM +0200, Andreas Tille wrote:

  There is already a name: AppStream. It comes with code and standards:
  http://distributions.freedesktop.org/wiki/AppStream
  
  It's as good as any other, and I don't see the need to invent another
  one.
 
 I did not understand your mail in a way to use the term AppStream in
 front of non-geeks to explain what Debian means.  My intend was to use a
 commonly used word to explain what Debian is.  I know that the meaning
 of this word is stretched a bit - but that's the fate of words sometimes
 ...

Sorry, I think I misunderstood the thread, I thought you wanted to
redesign the current web views of Debian packages so that it is somehow
more trendy/modern, but I now realised you only want to find it a
trendier/more modern name.

I stand corrected.

However, if after finding it a new name you'd like to keep going and add
things like ratings, comments, tag clouds and whatnot, you can go back
to my messages in this thread and know where to start :)


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Better visibility of what can you do with Debian on the Debian main page

2011-04-14 Thread Enrico Zini
On Tue, Apr 12, 2011 at 05:47:18PM +0200, Adrian von Bidder wrote:

 My proposal (which is orthogonal) is linking to applications, just to show 
 that Debian is not just an operating system as defined on our title page 
 (set of basic programs and utilities that make your computer run.)

It seems odd not to see the AppStream project mentioned here: I think
that is the direction in which to focus these kinds of efforts:

   http://www.enricozini.org/2011/debian/appinstaller2011/

I'm chiming in with a few links and comments, and I urge you to have a
good look because most of what you are talking about has been
prototyped, or at least standardised in a cross-distro way:

   http://distributions.freedesktop.org/wiki/AppStream/Implementation

Although in AppStream you will see that the main point is to build an
application installer, as a precondition for that there is a need to
build standard ways of accessing extra useful information like
screenshots, various kinds of ratings, tags and user comments.

Those standards could and should be used to build all sorts of other
things, including fancy web-based application browsers:

  http://www.enricozini.org/2011/debian/pkgshelf/

In fact, you can take the graph at
http://distributions.freedesktop.org/wiki/AppStream/Implementation
and replace 'Software Center' and 'PackageKit' with 'Website': this
gives you pretty much the architecture you need.

I suggest you do exactly that: you'll find code and people to talk to,
and it's a development effort that is likely to be shared with other
groups and built upon.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: non-uploading Debian New Maintainer process

2010-11-08 Thread Enrico Zini
On Mon, Nov 08, 2010 at 01:01:38PM +0100, Gerfried Fuchs wrote:

  4. Is it correct that now, the DNM process takes one year ?
  (See Applicants in Process on https://nm.debian.org/)
 
  It always did depend and always will depend on the individual applying,
 what they have done and how well they are prepared for the process. Also
 it is a sign of still too less AMs.

I should also add that the Applicants in Process page does not show
all those applicants that got through in a month or less: by its very
nature (it shows applicants in process, not applicants processed) if one
looks at that page one would mainly see those applications that get
stuck on something for a reason or another.

That is to say, that page is in no way representative of the average
experience with the NM process.


  And they will advocate others to become non-uploading DD's  :)
 
  How would a non-uploading DD advocate someone for getting uploading
 rights? This is the only part of your mail that actually stirred some
 thoughts in me.

Advocacies are now reviewed by Front Desk before being accepted.
If a non-uploading DD advocates somebody for having upload rights we'll
just, as usual, read it and see if we should ask for more information or
more advocates before assigning to an AM.

Likely it will be the case, but the world being crazy and unpredictable,
I wouldn't be surprised if some rare case happened when it will be
perfectly clear that that won't be needed.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Debian training and code review

2010-09-19 Thread Enrico Zini
On Thu, Sep 16, 2010 at 01:13:45PM -0500, Raphael Geissert wrote:

  Am 16.09.2010 09:40, schrieb Enrico Zini:
  I'd love it to see it eventually go a step up, like having some review
  process by people with especially strong experience, and having them
  published by an own blog (à-la debian-administration) where they can be
  archived and searched. But that's just one of the many improvements the
  idea can start to collect once it starts happening.
 
 I though about having a specialised blog too, before suggesting the wiki 
 page. The advantage of the wiki page is that the documents can be 
 collectively pre-screened and evolved. 

Nothing prevents to have both: start on the wiki, when the content is
judged to be good enough the wiki page is blogged, then let it stay as
a wiki page to be improved further. Attach more bits of workflow to make
it eventually end up on flossmanuals, developers' reference complements
and so on.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: Debian training and code review

2010-09-16 Thread Enrico Zini
On Wed, Sep 15, 2010 at 08:47:33PM -0500, Raphael Geissert wrote:

 Random though: we could encourage people to write about different topics, 
 post them to a wiki page (wiki.d.o/education/topic/sub-topic if 
 necessary) and then post it on a blog that is syndicated by planet (a 
 personal blog should be enough, a persistent copy would be at the wiki 
 anyway.)

A series of posts on -planet about best practices would be a very
welcome thing indeed, and a quick way to get this started right now by
everybody who'd like to do it.

I'd love it to see it eventually go a step up, like having some review
process by people with especially strong experience, and having them
published by an own blog (à-la debian-administration) where they can be
archived and searched. But that's just one of the many improvements the
idea can start to collect once it starts happening.


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


Re: A team to grant rights on collab-maint?

2010-06-15 Thread Enrico Zini
On Mon, Jun 14, 2010 at 12:45:32PM +0200, Raphael Hertzog wrote:

 Now I would like to stop dealing with those requests and thus I would like
 a team of people to replace me.

Do you have a way to know what percentage of non-DDs who can commit to
collab-maint are DMs?


Ciao,

Enrico

-- 
GPG key: 4096R/E7AD5568 2009-05-08 Enrico Zini enr...@enricozini.org


signature.asc
Description: Digital signature


  1   2   >