EPEL epel beta report: 20140320 changes

2014-03-20 Thread EPEL Beta Report
Compose started at Thu Mar 20 08:15:02 UTC 2014

Broken deps for x86_64
--
2ping-2.0-2.el7.noarch requires perl(Digest::CRC)
RemoteBox-1.7-1.el7.noarch requires rdesktop
RemoteBox-1.7-1.el7.noarch requires perl-Gtk2
bodhi-server-0.9.8-2.el7.noarch requires python-simplemediawiki
bodhi-server-0.9.8-2.el7.noarch requires python-fedora-turbogears
1:centerim-4.22.10-14.el7.x86_64 requires perl(Time::ParseDate)
check-mk-1.2.2p2-2.el7.x86_64 requires mod_python
chemtool-1.6.14-1.el7.x86_64 requires openbabel
chm2pdf-0.9.1-13.el7.noarch requires python-chm
chm2pdf-0.9.1-13.el7.noarch requires htmldoc
docker-registry-0.6.5-1.el7.noarch requires redis
docker-registry-0.6.5-1.el7.noarch requires python-rsa
docker-registry-0.6.5-1.el7.noarch requires python-redis
docker-registry-0.6.5-1.el7.noarch requires python-keystoneclient
docker-registry-0.6.5-1.el7.noarch requires python-glanceclient
docker-registry-0.6.5-1.el7.noarch requires python-backports-lzma
globus-gram-job-manager-pbs-1.6-7.el7.x86_64 requires torque-client
globus-gram-job-manager-sge-1.7-2.el7.x86_64 requires gridengine
koji-vm-1.8.0-2.el7.noarch requires python-virtinst
lxc-templates-0.9.0-3.el7.x86_64 requires dpkg
lxc-templates-0.9.0-3.el7.x86_64 requires debootstrap
lxc-templates-0.9.0-3.el7.x86_64 requires busybox
mate-desktop-1.8.0-2.el7.x86_64 requires mate-panel
mate-desktop-1.8.0-2.el7.x86_64 requires mate-control-center-filesystem
mate-screensaver-1.8.0-1.el7.x86_64 requires mate-keyring-pam
mate-settings-daemon-1.8.0-1.el7.x86_64 requires 
mate-control-center-filesystem
mate-themes-1.8.1-0.1.git20140304.5a900ef.el7.noarch requires 
gtk2-engines
mate-themes-1.8.1-0.1.git20140304.5a900ef.el7.noarch requires 
gtk-murrine-engine
mcollective-common-2.4.1-1.el7.noarch requires rubygem(systemu)
mcollective-common-2.4.1-1.el7.noarch requires rubygem(stomp)
nf3d-0.8-2.el7.noarch requires python-visual
openpgpkey-milter-0.3-1.el7.noarch requires python-pymilter
openpgpkey-milter-0.3-1.el7.noarch requires python-gnupg
php-phpseclib-crypt-aes-0.3.5-2.el7.noarch requires 
php-pear(phpseclib.sourceforge.net/Crypt_Rijndael) = 0:0.3.0
plowshare-0.9.4-0.46.20140112git.el7.noarch requires caca-utils
python-tgcaptcha2-0.2.0-5.el7.noarch requires python-fedora-turbogears
qt4pas-2.5-3.el7.x86_64 requires fpc-src
rabbitvcs-core-0.16-1.el7.noarch requires python-dulwich
rabbitvcs-core-0.16-1.el7.noarch requires pysvn
rabbitvcs-nautilus-0.16-1.el7.x86_64 requires nautilus-python
rabbitvcs-thunar-0.16-1.el7.x86_64 requires thunarx-python
rabbitvcs-thunar-0.16-1.el7.x86_64 requires thunar
rubygem-gssapi-1.1.2-3.el7.noarch requires rubygem(ffi) = 0:1.0.1
rubygem-mizuho-0.9.20-2.el7.noarch requires rubygem(sqlite3)
rubygem-rspec-2.14.1-1.el7.noarch requires rubygem(rspec-mocks) = 
0:2.14.1
rubygem-rspec-2.14.1-1.el7.noarch requires rubygem(rspec-expectations) 
= 0:2.14.1
rubygem-rspec-2.14.1-1.el7.noarch requires rubygem(rspec-core) = 
0:2.14.1
rubygem-simplecov-0.7.1-8.el7.noarch requires rubygem(simplecov-html) 
= 0:0.7.1
rubygem-simplecov-0.7.1-8.el7.noarch requires rubygem(multi_json) = 
0:1.0
rubygem-term-ansicolor-1.2.2-3.el7.noarch requires rubygem(tins)  0:1
rubygem-term-ansicolor-1.2.2-3.el7.noarch requires rubygem(tins) = 
0:0.8
spectrwm-2.5.0-1.el7.x86_64 requires xlockmore
spectrwm-2.5.0-1.el7.x86_64 requires dmenu



Broken deps for ppc64
--
2ping-2.0-2.el7.noarch requires perl(Digest::CRC)
RemoteBox-1.7-1.el7.noarch requires rdesktop
RemoteBox-1.7-1.el7.noarch requires perl-Gtk2
bodhi-server-0.9.8-2.el7.noarch requires python-simplemediawiki
bodhi-server-0.9.8-2.el7.noarch requires python-fedora-turbogears
1:centerim-4.22.10-14.el7.ppc64 requires perl(Time::ParseDate)
check-mk-1.2.2p2-2.el7.ppc64 requires mod_python
chemtool-1.6.14-1.el7.ppc64 requires openbabel
chm2pdf-0.9.1-13.el7.noarch requires python-chm
chm2pdf-0.9.1-13.el7.noarch requires htmldoc
cloud-init-0.7.2-8.el7.noarch requires python-requests
cloud-init-0.7.2-8.el7.noarch requires dmidecode
docker-registry-0.6.5-1.el7.noarch requires redis
docker-registry-0.6.5-1.el7.noarch requires python-rsa
docker-registry-0.6.5-1.el7.noarch requires python-requests
docker-registry-0.6.5-1.el7.noarch requires python-redis
docker-registry-0.6.5-1.el7.noarch requires python-keystoneclient
docker-registry-0.6.5-1.el7.noarch requires 

Re: EPEL Project collaboration and supplementary arch support

2014-03-20 Thread Dennis Gilmore
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, 18 Mar 2014 13:40:42 +0100
Simone Caronni negativ...@gmail.com wrote:

 Hello,
 
 On 18 March 2014 11:54, Jim Perrin jper...@centos.org wrote:
 
  Specifically we intend to continue producing for the i686
  architecture, as well as adding ARMv7 builds. These additional
  builds will allow users with legacy hardware (or 32bit cloud
  images) to migrate to newer versions while addressing the growing
  demand for ARM support.
 
  EPEL provides a valuable resource to CentOS (and other builds), and
  since a number of projects based on CentOS rely heavily on EPEL, we
  would like to request that support for these additional
  architectures be added to EPEL via a 'secondary arch'.
 
 
 as a contributor I would really like to have i686 as one of the main
 architectures. With the current situation, there's no chance to
 rebuild many of the packages that could benefit of RHEL 7 multilib
 support. RHEL 7 supports 32 bit programs, but we're not really able
 to use them in EPEL.
 
 Quick example: I maintain Steam for Fedora, and would like to add it
 also to the RPMFusion's EPEL repository; but the package is 32 bit
 only and there is currently no way to package 32 bit dependencies
 (like SDL2) into EPEL 7.

EPEL doesnt support multilib at all. so its really not going to help
you here.

Dennis
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
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=pL6W
-END PGP SIGNATURE-
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: EPEL and SCL

2014-03-20 Thread Matthew Miller
On Thu, Mar 20, 2014 at 04:15:18PM -0600, Stephen John Smoogen wrote:
 I have been thinking about this and wondering if SCL's might be better
 under Robyn's EPIC (Extra Packages for Infrastructure and Clouds) which
 would be something that could have less rigid rules for keeping going for
 12 years that would be more in line with SCL's 2-3 year lifetimes. I was
 going to bring it up as a FLOCK talk to get the ball running with possible
 interaction with the CentOS group (maybe joining with their SCL
 operations). Does that make sense?

It makes a ton of sense to me, at least.

-- 
Matthew Miller--   Fedora Project--mat...@fedoraproject.org
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: EPEL and SCL

2014-03-20 Thread Karsten Wade
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 03/20/2014 05:30 PM, Dennis Jacobfeuerborn wrote:
 I've never heard of this EPIC repository and google doesn't seem to
 know it either. Where can this be found?

It doesn't exist, it's an idea that Robyn has floated semi-seriously
as a way to provide a repo that moves faster than EPEL. Rather than
try to jam fast-moving stuff in to EPEL, the idea was to do an Extra
Packages for Infrastructure and Cloud (EPIC) that had a different,
faster-moving charter. EPIC would target the *EL platform just as EPEL
does.

For the record, *I* think EPIC is an epic name.

- - Karsten
- -- 
Karsten 'quaid' Wade.^\  CentOS Doer of Stuff
http://TheOpenSourceWay.org\  http://community.redhat.com
@quaid (identi.ca/twitter/IRC)  \v' gpg: AD0E0C41
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlMrl2oACgkQ2ZIOBq0ODEH7kQCggq4gnXeYjG5xich1BLbkRwZh
KT4An2qmT0p6XO99pMXuFCeQCgsnj/r7
=X822
-END PGP SIGNATURE-
___
epel-devel mailing list
epel-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Yet another bug caused by SELinux

2014-03-20 Thread Kevin Kofler
Hi,

GHC (Haskell) was broken for (at least) over a year because of a bug in the 
workaround for stupid SELinux restrictions:
https://ghc.haskell.org/trac/ghc/ticket/7629
https://bugzilla.redhat.com/show_bug.cgi?id=907515

How much breakage will we have to suffer until people finally realize that 
SELinux is a horribly flawed idea?

Kevin Kofler

PS: Et ceterum censeo SELinux esse delendum.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: GCJ [was: pdftk retired?]

2014-03-20 Thread Andrew Haley
On 03/19/2014 10:59 PM, Andrew Hughes wrote:
 - Original Message -
 On 03/08/2014 03:37 AM, Orcan Ogetbil wrote:
 On Fri, Mar 7, 2014 at 9:32 AM, Jaroslav Reznik wrote:

 Sorry I am missing something. Why can't we keep the old pdftk that
 works with itext2?

 Check the whole thread - because of GCJ dependency. iText is second
 issue. The first could be fixed by rewrite of offending part of code
 to Java but someone would have to do it first. That's how I understand
 this situation.


 The only things I read in the thread are GCJ is abandoned and we
 really want to get rid of GCJ. Am I supposed to come to the
 conclusion that the GCJ package is dropped from Fedora? If so, where
 is this decision made? Why was it made without consulting GCJ users?

 The problem is more to do with upstream maintainership.  If GCJ is to
 be used in the future it needs to be updated to a current version of
 the Java class library, but that's a lot of work.  GCJ is still a
 pretty good compiler for the Java language, but it's stuck at JDK5
 (ish).
 
 And JDK5 might be good enough for the use required. It doesn't claim
 to be anything more than that, so I don't see the harm in leaving it there.

Speaking as the upstream maintainer, I do.

Andrew.


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Yet another bug caused by SELinux

2014-03-20 Thread H . Guémar
2014-03-20 12:22 GMT+01:00 Kevin Kofler kevin.kof...@chello.at:
 Hi,

 GHC (Haskell) was broken for (at least) over a year because of a bug in the
 workaround for stupid SELinux restrictions:
 https://ghc.haskell.org/trac/ghc/ticket/7629
 https://bugzilla.redhat.com/show_bug.cgi?id=907515

 How much breakage will we have to suffer until people finally realize that
 SELinux is a horribly flawed idea?

 Kevin Kofler

 PS: Et ceterum censeo SELinux esse delendum.

Hi,

according to the RHBZ ticket, there was a fix but it was not timely
applied to the package.
Rather than SELinux, I'd say that the fault lies with the crazy
updates policy that plague us.

regards,
H.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: What will happen to XFCE, LXDE, Mate, Cinnemon in Fedora.Next

2014-03-20 Thread Bastien Nocera
- Original Message -
 Workstation might implement easy installation of alternative desktops in
 the GNOME Software app at some point.

Urgh. This is just moving the problem from the installer/media selection to the
software installer. Just what would we gain by doing that given that there will
still be other desktops in the repos, and other spins?
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: fail2ban + firewalld suggestions needed

2014-03-20 Thread Richard Shaw
On Wed, Mar 19, 2014 at 10:57 PM, Orion Poplawski or...@cora.nwra.comwrote:

 On 03/19/2014 09:10 PM, Richard Shaw wrote:
  Ok using Jonathan's suggestion for the settings from a clean install I'm
  getting an error whether I use the systemd backend or not...
 
 [12698]: ERROR   ipset
  create fail2ban-sshd hash:ip timeout 600
  firewall-cmd --direct --add-rule ipv4 filter INPUT 0 -p tcp -m multiport
  --dports ssh -m set --match-set fail2ban-sshd src -j REJECT
  --reject-with icmp-port-unreachable -- stderr: '/bin/sh: ipset: command
  not found\n'


 Currently we're missing a requires on ipset.



Ok, is installing ipset sufficient or do I need to enable the service as
well?

Thanks,
Richard
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Bug 1052192] perl-IO-Socket-IP-0.25 is available

2014-03-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1052192

Petr Šabata psab...@redhat.com changed:

   What|Removed |Added

 Status|MODIFIED|CLOSED
   Fixed In Version||perl-IO-Socket-IP-0.26-1.fc
   ||20
 Resolution|--- |CURRENTRELEASE
Last Closed||2014-03-20 09:04:37



-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=6KezxlYnQXa=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Re: fail2ban + firewalld suggestions needed

2014-03-20 Thread Jonathan Underwood
On 20 March 2014 13:04, Richard Shaw hobbes1...@gmail.com wrote:
 On Wed, Mar 19, 2014 at 10:57 PM, Orion Poplawski or...@cora.nwra.com
 wrote:

 On 03/19/2014 09:10 PM, Richard Shaw wrote:
  Ok using Jonathan's suggestion for the settings from a clean install I'm
  getting an error whether I use the systemd backend or not...
 
 [12698]: ERROR   ipset
  create fail2ban-sshd hash:ip timeout 600
  firewall-cmd --direct --add-rule ipv4 filter INPUT 0 -p tcp -m multiport
  --dports ssh -m set --match-set fail2ban-sshd src -j REJECT
  --reject-with icmp-port-unreachable -- stderr: '/bin/sh: ipset: command
  not found\n'


 Currently we're missing a requires on ipset.



 Ok, is installing ipset sufficient or do I need to enable the service as
 well?

Installing ipset should be sufficient to start the fail2ban service.
But, you'll need to have selinux-policy-3.12.1-135 or later installed,
otherwise you'll hit this:

https://bugzilla.redhat.com/show_bug.cgi?id=1069640
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Strange ssh / openldap linking problem

2014-03-20 Thread Richard W.M. Jones
Well this bug has reappeared on my machine.  openldap depends on
openldap-devel.

$ ll /usr/lib64/libldap*
lrwxrwxrwx. 1 root root 10 Feb 25 22:59 /usr/lib64/libldap-2.4.so.2 - 
libldap.so
-rwxr-xr-x. 1 root root 340608 Feb  4 09:08 /usr/lib64/libldap-2.4.so.2.10.2
lrwxrwxrwx. 1 root root 12 Feb 25 22:59 /usr/lib64/libldap_r-2.4.so.2 - 
libldap_r.so
-rwxr-xr-x. 1 root root 365848 Feb  4 09:08 /usr/lib64/libldap_r-2.4.so.2.10.2
lrwxrwxrwx. 1 root root 23 Feb 25 23:09 /usr/lib64/libldap_r.so - 
libldap_r-2.4.so.2.10.2
lrwxrwxrwx. 1 root root 21 Feb 25 23:09 /usr/lib64/libldap.so - 
libldap-2.4.so.2.10.2

$ for f in /usr/lib64/libldap*; do echo -n $f comes from ; rpm -qf $f; done
/usr/lib64/libldap-2.4.so.2 comes from openldap-2.4.39-2.fc20.x86_64
/usr/lib64/libldap-2.4.so.2.10.2 comes from openldap-2.4.39-2.fc20.x86_64
/usr/lib64/libldap_r-2.4.so.2 comes from openldap-2.4.39-2.fc20.x86_64
/usr/lib64/libldap_r-2.4.so.2.10.2 comes from openldap-2.4.39-2.fc20.x86_64
/usr/lib64/libldap_r.so comes from openldap-devel-2.4.39-2.fc20.x86_64
/usr/lib64/libldap.so comes from openldap-devel-2.4.39-2.fc20.x86_64

This breaks libguestfs when it happens.

I've noticed that lots of people have hit this bug before:

https://bugzilla.redhat.com/show_bug.cgi?id=240253
https://bugzilla.redhat.com/show_bug.cgi?id=248065
https://bugzilla.redhat.com/show_bug.cgi?id=249866
https://bugzilla.redhat.com/show_bug.cgi?id=447645
https://bugzilla.redhat.com/show_bug.cgi?id=460307
https://bugzilla.redhat.com/show_bug.cgi?id=693716
https://bugzilla.redhat.com/show_bug.cgi?id=1028557

It's obviously a longstanding packaging bug in openldap and I think it
needs to be fixed.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: fail2ban + firewalld suggestions needed

2014-03-20 Thread Przemek Klosowski

On 03/20/2014 12:24 AM, Orion Poplawski wrote:

On 03/19/2014 02:56 PM, Matthew Miller wrote:

On Wed, Mar 19, 2014 at 02:32:40PM -0600, Orion Poplawski wrote:

Hmm, I like this alternative a lot.  I'm probably taking this too
far, but I'm thinking of:

fail2ban-server - core components with minimal deps

fail2ban-firewalld - firewalld support/configuration - requires firewalld
fail2ban-hostsdeny - tcp_wrappers hosts.deny support - requires tcp_wrappers
fail2ban-mail  - mail actions- requires /usr/bin/mail
fail2ban-sendmail  - sendmail actions- requires 
/usr/sbin/sendmail
fail2ban-shorewall - shorewall support   - requires shorewall
fail2ban-systemd   - systemd journal configuration

fail2ban - default component - installs -firewalld,-sendmail,-systemd
fail2ban-all - installs everything - also requires /usr/bin/whois

Comments?

That _might_ be going overboard. But it certainly does allow a lot of
flexibility. Somewhere there is a balance between that flexibility and the
extra packaging work and potential user confusion, and I'm not exactly sure
where that line is in this case. :)

This seemed reasonable to me so I've gone with it in rawhide now.
Testing welcome.



I am concerned that this looks like configuring the fail2ban package by 
installing more packages. If we started doing it everywhere multiple 
packages interact, it would combinatorially explode  the number of 
packages and make the system harder to maintain, not easier. Among other 
things, it would make managing the subsystem on Fedora different than 
everywhere else including upstream.


It's certainly a neat trick (down with obscure config files!), but the 
approach does not scale. Taking this to extreme, we'd be doing yum 
install emacs-vim-mode.


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: fail2ban + firewalld suggestions needed

2014-03-20 Thread Jonathan Underwood
On 20 March 2014 16:17, Przemek Klosowski przemek.klosow...@nist.gov wrote:
 I am concerned that this looks like configuring the fail2ban package by
 installing more packages. If we started doing it everywhere multiple
 packages interact, it would combinatorially explode  the number of packages
 and make the system harder to maintain, not easier. Among other things, it
 would make managing the subsystem on Fedora different than everywhere else
 including upstream.

I tend to agree here - personally I think one sensible default
configuration is sufficient, and then let users adjust/taylor that
configuration for their needs. RPM is the wrong layer for
configuration management IMO - this also pertains to the recent
discussions  regarding diverging configs for the different projects.
RPM should lay down files, and then a proper config management service
should configure/customise software (Puppet,ansible, what have you).
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Przemek Klosowski

On 03/20/2014 01:21 AM, Chris Murphy wrote:

On Mar 19, 2014, at 7:51 PM, Adam Williamson awill...@redhat.com wrote:


On Wed, 2014-03-19 at 15:57 -0700, Andrew Lutomirski wrote:

More complex than trying to mirror a FAT ESP partition across multiple
boot disks, keeping it properly synchronized, because RAID isn't
supported?

You can in theory just have a bunch of RAID-1 (mirrored) ESPs, because
of how RAID-1 works; each individual member can also be mounted as if it
was just a plain old partition, which is how the firmware will mount it.

This shouldn't be done. It's a source of corruption to treat an md raid1 device 
as a plain volume, rather than as a degraded md device. If the plain partition 
volume is modified, its mdadm metadata won't be updated, so when the array is 
finally assembled, mdadm has no idea member devices are not sync'd, and also 
has no way to resolve the ambiguity.
Right, but UEFI doesn't write to itit just uses them to read the 
boot content. It would be better if UEFI could read software raid1 even 
if it was  degraded due to disk failures, but apparently it can't, so 
Adam's scheme is the only possibility.


I agree with you that nothing else but UEFI should mount those devices 
as  individual plain volumes, of course.


Because of this, at least one raid stack kernel maintainer wants to do away 
with the use of mdadm metadata v 1.0 by anaconda. It's v1.0 metadata that 
permits this plain old  partition treatment as a side effect.
It is a darn useful side effect. How else can you implement redundant 
boot that is transparently updated? I could (and did) try
multiple /boot partitions on separate drives by copying the partition 
content after updates, but it was fragile and I was never confident that 
it would work when I needed it. Adam's raid1 /boot just seems more 
reliable, especially if it became a designed feature.


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Andrew Lutomirski
On Thu, Mar 20, 2014 at 9:32 AM, Przemek Klosowski
przemek.klosow...@nist.gov wrote:
 On 03/20/2014 01:21 AM, Chris Murphy wrote:
 You can in theory just have a bunch of RAID-1 (mirrored) ESPs, because
 of how RAID-1 works; each individual member can also be mounted as if it
 was just a plain old partition, which is how the firmware will mount it.

 This shouldn't be done. It's a source of corruption to treat an md raid1
 device as a plain volume, rather than as a degraded md device. If the plain
 partition volume is modified, its mdadm metadata won't be updated, so when
 the array is finally assembled, mdadm has no idea member devices are not
 sync'd, and also has no way to resolve the ambiguity.

 Right, but UEFI doesn't write to itit just uses them to read the boot
 content. It would be better if UEFI could read software raid1 even if it was
 degraded due to disk failures, but apparently it can't, so Adam's scheme is
 the only possibility.

Um.

EFI_FILE_PROTOCOL's Write method sounds suspiciously like it writes to
a filesystem.


 Because of this, at least one raid stack kernel maintainer wants to do away
 with the use of mdadm metadata v 1.0 by anaconda. It's v1.0 metadata that
 permits this plain old  partition treatment as a side effect.

 It is a darn useful side effect. How else can you implement redundant boot
 that is transparently updated? I could (and did) try
 multiple /boot partitions on separate drives by copying the partition
 content after updates, but it was fragile and I was never confident that it
 would work when I needed it. Adam's raid1 /boot just seems more reliable,
 especially if it became a designed feature.


I think you may be confusing /boot and ESP (aka /boot/efi).  They are
not the same thing.

You get a transparently updated list of kernels by doing it exactly
the way that Chris suggested.  You have /boot on md raid with metadata
1.1 or 1.2.  Or you have /boot on any other sensible RAID backing
store, where sensible means that everything that mounts it knows that
it's RAID.

Then you stick something *that never changes* into each copy of the
ESP.  And you don't even pretend that ESP is RAID -- it's simply a
bunch of FAT filesystems that *are not mounted read/write* except for
when the bootloader is reinstalled.  And you do *not* reinstall the
bootloader just because you have a new kernel.

All of the RAID devices are only ever accessed by RAID drivers.  All
of the ESP non-RAID filesystems are treated as the crappy FAT
filesystems that they are and are almost never written by Linux
userspace.

--Andy
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Adam Williamson
On Thu, 2014-03-20 at 12:32 -0400, Przemek Klosowski wrote:

 Adam's scheme is the only possibility.

 Adam's raid1 /boot just seems more 
 reliable, especially if it became a designed feature.

It's not my plan, it's the anaconda developers'. I only described it.
Actually it took them like 15 minutes to get it into my dumb brain. :)
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Adam Williamson
On Wed, 2014-03-19 at 23:21 -0600, Chris Murphy wrote:

 Therefore I don't think software RAID is a solution.

Well, this is new: I'm fairly sure you were the one who filed a bug
requesting it in the first damn place.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Adam Williamson
On Thu, 2014-03-20 at 09:49 -0700, Andrew Lutomirski wrote:

 Um.
 
 EFI_FILE_PROTOCOL's Write method sounds suspiciously like it writes to
 a filesystem.

Sure, UEFI has the capability, but it's not going to be used when simply
booting the system normally. All the firmware does in that case is mount
the partition and execute the bootloader it finds there.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Yet another bug caused by SELinux

2014-03-20 Thread Adam Williamson
On Thu, 2014-03-20 at 12:35 +0100, H. Guémar wrote:
 2014-03-20 12:22 GMT+01:00 Kevin Kofler kevin.kof...@chello.at:
  Hi,
 
  GHC (Haskell) was broken for (at least) over a year because of a bug in the
  workaround for stupid SELinux restrictions:
  https://ghc.haskell.org/trac/ghc/ticket/7629
  https://bugzilla.redhat.com/show_bug.cgi?id=907515
 
  How much breakage will we have to suffer until people finally realize that
  SELinux is a horribly flawed idea?
 
  Kevin Kofler
 
  PS: Et ceterum censeo SELinux esse delendum.
 
 Hi,
 
 according to the RHBZ ticket, there was a fix but it was not timely
 applied to the package.
 Rather than SELinux, I'd say that the fault lies with the crazy
 updates policy that plague us.

I don't know how you figure that. The update for F20 was submitted on
01-29 and pushed stable on 02-17. For F19 it was submitted 01-29 and
pushed stable on 03-19. Both updates could have been pushed stable as
early as 02-06: as ghc is not a critpath package, the update policy
requires only a 7 day wait unless karma is posted.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Andrew Lutomirski
On Thu, Mar 20, 2014 at 10:01 AM, Adam Williamson awill...@redhat.com wrote:
 On Thu, 2014-03-20 at 12:32 -0400, Przemek Klosowski wrote:

 Adam's scheme is the only possibility.

 Adam's raid1 /boot just seems more
 reliable, especially if it became a designed feature.

 It's not my plan, it's the anaconda developers'. I only described it.
 Actually it took them like 15 minutes to get it into my dumb brain. :)

Can you all please try to make sure you're talking about the same thing?

I believe that Chris is suggesting /boot as raid1 and ESP not mounted.

Adam and Przemek seem to be talking about /boot on RAID1 (I've never
heard anyone say that /boot as RAID is a bad idea) but I think
something's very confused about my understanding of your opinions
about how the ESP should or does work.  Can one or both of you please
describe, unambiguously, how you think the ESP should be created, when
and if it should be mounted, what filesystem and/or raid config should
be used to mount it, and what should happen when a kernel is updated?

 Sure, UEFI has the capability, but it's not going to be used when simply
 booting the system normally. All the firmware does in that case is mount
 the partition and execute the bootloader it finds there.

Why not?  It's completely safe when the OS is Mac OS or Windows.  It's
sometimes safe when the OS is Linux.  It's even possibly useful: you
might want to have an ESP bootloader, shim, or whatever that logs
errors.  I bet there's at least one UEFI firmware out there that backs
up settings to ESP and/or backs up a whole firmware image to ESP.

It would be a shame for a Linux RAID install to corrupt the ESP just
because you did something unusual in various UEFI menus.

--Andy
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Yet another bug caused by SELinux

2014-03-20 Thread Adam Williamson
On Thu, 2014-03-20 at 12:22 +0100, Kevin Kofler wrote:
 Hi,
 
 GHC (Haskell) was broken for (at least) over a year because of a bug in the 
 workaround for stupid SELinux restrictions:
 https://ghc.haskell.org/trac/ghc/ticket/7629
 https://bugzilla.redhat.com/show_bug.cgi?id=907515
 
 How much breakage will we have to suffer until people finally realize that 
 SELinux is a horribly flawed idea?

Of course restrictions implemented for security reasons will cause
issues. I don't know why you keep posting cases and acting as if this
will be news to someone. They happen, we get them fixed, everyone's
lives improve.

On the timeline of this one: as I read the reports, it was reported to
upstream on 2013-01-25. It was reported to Fedora on 2013-02-04. The
reporter tracked down and fixed the issue upstream on 2013-03-26. So one
month and 22 days after it was reported to Fedora, a patch was available
and could have been backported. In fact the patch was only backported to
Fedora 19 on 2014-01-29. The delay from 2013-03-26 to 2014-01-29 was the
Fedora maintainer's. Not to throw stones - maintainers are all busy -
just to note the facts: this issue could have been resolved much faster,
and SELinux is not the reason why it wasn't.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Andrew Lutomirski
On Thu, Mar 20, 2014 at 10:07 AM, Andrew Lutomirski l...@mit.edu wrote:
 On Thu, Mar 20, 2014 at 10:01 AM, Adam Williamson awill...@redhat.com wrote:
 Sure, UEFI has the capability, but it's not going to be used when simply
 booting the system normally. All the firmware does in that case is mount
 the partition and execute the bootloader it finds there.

 Why not?  It's completely safe when the OS is Mac OS or Windows.  It's
 sometimes safe when the OS is Linux.  It's even possibly useful: you
 might want to have an ESP bootloader, shim, or whatever that logs
 errors.  I bet there's at least one UEFI firmware out there that backs
 up settings to ESP and/or backs up a whole firmware image to ESP.

 It would be a shame for a Linux RAID install to corrupt the ESP just
 because you did something unusual in various UEFI menus.

The standard EFI Shell can do exactly this.  It has commands like
'edit' and 'mkdir'.  I think that using them should not cause
filesystem corruption.

--Andy
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Lennart Poettering
Heya!

I wonder whether it wouldn't be time to say goodbye to tcpwrappers in
Fedora. There has been a request in systemd upstream to disable support
for it by default, but I am not sure I want to do that unless we can
maybe say goodbye to it for the big picture too.

Why would we get rid of them? 

Well, to make things simpler, primarily. They have not seen any
development since 2003 (that's 11 years I mind you, an eternity in IT).

I doubt there are many people even using them anymore, firewalls are
more comprehensive and a lot more powerful, and while every admin knows
firewalls, I figure only very few know tcpd/tcpwrap, and even fewer ever
actively make use of them...

The API is awful, too, with lot's of open-coded structures, feature
checks in the headers, fixed length strings, globally exported variables,
non-namespaced symbols, really weird exported compatibility wrappers for
OS calls...

I'd propose we make a clear cut, and just start disabling it in all
services that link to it, instead of letting rot on in Fedora for all
eternity.

It's bad code, little used, crufty. We have much better stuff now, and
that enables us to say goodbye to the old mess...

I figure there will be a bit of opposition to this change, thus I
thought I start the discussion on the fedora ML first. Unless there are
major concerns I will propose a feature about this in the next few
days. If somebody wants to join me on this and put his name on the
feature proposal I'd be delighted!

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Adam Williamson
On Thu, 2014-03-20 at 10:07 -0700, Andrew Lutomirski wrote:
 On Thu, Mar 20, 2014 at 10:01 AM, Adam Williamson awill...@redhat.com wrote:
  On Thu, 2014-03-20 at 12:32 -0400, Przemek Klosowski wrote:
 
  Adam's scheme is the only possibility.
 
  Adam's raid1 /boot just seems more
  reliable, especially if it became a designed feature.
 
  It's not my plan, it's the anaconda developers'. I only described it.
  Actually it took them like 15 minutes to get it into my dumb brain. :)
 
 Can you all please try to make sure you're talking about the same thing?

 I believe that Chris is suggesting /boot as raid1 and ESP not mounted.

He is also giving feedback on the ESP-as-RAID1 idea. He's both doing
that *and* proposing an alternative, which may be what you're missing. I
don't think anyone but you is confused about the alternative ideas here.

 Adam and Przemek seem to be talking about /boot on RAID1 (I've never
 heard anyone say that /boot as RAID is a bad idea) but I think
 something's very confused about my understanding of your opinions
 about how the ESP should or does work.  Can one or both of you please
 describe, unambiguously, how you think the ESP should be created, when
 and if it should be mounted, what filesystem and/or raid config should
 be used to mount it, and what should happen when a kernel is updated?

I thought I already did. Just go back and read my original mail again.
And again, it's nothing about what I think, I was simply describing a
potential design which had been explained to me by someone else.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

EPEL and SCL

2014-03-20 Thread Remi Collet
Hi,

RHSCL 1.0 is GA since September.

RHSCL 1.1 Beta is released today:
http://developerblog.redhat.com/2014/03/20/rhscl-1-1-beta-available-apache-mongodb/

As EPEL is the common repository to find additional packages for RHEL, I
really think it should also be possible to provide additional packages
for RHSCL.

For now the Fedora Guidelines are still under discussion.

Most of the discussion is about the tree layout (/var, /etc/, ...).
This Guidelines will probably need more work/time before approval :(

Of course, if some new SCL (new, as not in upstream product) will come
to EPEL, it will have to follow the same Guidelines.

But, for additional packages for existing collections (I mean extending
RHSCL), thinks can be simpler. We only have to use the tree as defined
in the RHSCL collection (in the meta-package).

I really hope we can find some solution.

Of course, we need to ensure, with rel-eng, that we are able to build
those packages.


So, time to raise the discussion.


Remi.


P.S. you will notice that whatever we decide, things will happen (and
have already start), we just need to know if we want to see this in EPEL
or outside.
___
epel-devel mailing list
epel-de...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/epel-devel


Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Chris Murphy

On Mar 20, 2014, at 10:32 AM, Przemek Klosowski przemek.klosow...@nist.gov 
wrote:

 It is a darn useful side effect. How else can you implement redundant boot 
 that is transparently updated?

For /boot, rather than /boot/efi, use metadata v1.2 and a bootloader that 
understands v1.2 metadata. GRUB2 has for some time.


Chris Murphy

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Paul Wouters

On Thu, 20 Mar 2014, Lennart Poettering wrote:


I wonder whether it wouldn't be time to say goodbye to tcpwrappers in
Fedora.


I'd be happy to see those go.

Those who depend on it though, should see some failed closed
behaviour, so their service does not suddenly become more exposed.

Paul
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 03/20/2014 11:59 AM, Paul Wouters wrote:
 On Thu, 20 Mar 2014, Lennart Poettering wrote:
 
 I wonder whether it wouldn't be time to say goodbye to
 tcpwrappers in Fedora.
 
 I'd be happy to see those go.
 
 Those who depend on it though, should see some failed closed 
 behaviour, so their service does not suddenly become more exposed.
 
 Paul

Yeah I am not sure you are going to be able to make a totally clean
cut, there are some of us out there who still use this and it works,
despite however much crap it is underneath the covers.

A fail closed would be a decent first step, but as I said dropping it
altogether without some mitigation would be a bad move I believe.

Just my two cents,

- -Erinn
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJTKy9KAAoJEFg7BmJL2iPOqhgH/AxzMlqVHGn2p2GBHkVsvDCY
jjtA7/GDiWWHaOWykKIPFsxu+SiULux1JbcIop0qIsWsb8wbeQjrC/9tMIpRPb5n
Zsx3Zpk4YfWabEjSuhSjIYBqkbhh/5OQNYHLmeaTMR6rd8/N9MMrwlrxBjRtSLlG
ghxQ3BcqCdVR4hdFdBGkaTi1MXxjxcXVpcoOK/1vU63r9VeTz0UMGpC7heXA3d1O
4cuFY2D9zvu4y78UEC8RqM/p4pv3b6dAmNmatAilc4tiCUgQUt03n2K1TUVctsc0
zvDmx+bFeu6A8RnRNGddkvSKrv/qG96qKHucQ1tLCNvcZ1sdeLkMvurSeq+Pdkw=
=/0ol
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Stephen John Smoogen
On 20 March 2014 11:34, Lennart Poettering mzerq...@0pointer.de wrote:

 Heya!

 I wonder whether it wouldn't be time to say goodbye to tcpwrappers in
 Fedora. There has been a request in systemd upstream to disable support
 for it by default, but I am not sure I want to do that unless we can
 maybe say goodbye to it for the big picture too.

 Why would we get rid of them?

 Well, to make things simpler, primarily. They have not seen any
 development since 2003 (that's 11 years I mind you, an eternity in IT).

 I doubt there are many people even using them anymore, firewalls are
 more comprehensive and a lot more powerful, and while every admin knows
 firewalls, I figure only very few know tcpd/tcpwrap, and even fewer ever
 actively make use of them...


Actually they are used quite a bit in various service worlds. Mainly for
ssh and email for dealing with scanners. [DenyHosts is a boon in this
area.] The reason for using a secondary tool is that depth of security.
Over the years I have found that there are multiple of attacks which will
nullify one layer of protection at one point or another. Having a second
level or third level of protection is a boon when this happens.

At the enterprise level firewalls can come under a different set of change
control rules than something like tcpwrappers which is considered
application level. While I would like to be able to make a simple change in
a firewall, I can end up spending a month until I can. Application controls
are usually an hour or so signoff. This means that if tcp-wrappers is going
then something will need to be able to replace it to meet that large scale
concern. [Automatic firewall controls like firewalld have to be disabled or
put into a manual changes only mode in these areas for change control
purposes. ]

I can't argue on the code maintainability or layout. Not my area of
expertise. I can say that if tcpd/libtcpwrappers were to go away that
something equivalent would need to be built to replace it for the ability
to fine tune at a layer below the firewall.




 The API is awful, too, with lot's of open-coded structures, feature
 checks in the headers, fixed length strings, globally exported variables,
 non-namespaced symbols, really weird exported compatibility wrappers for
 OS calls...

 I'd propose we make a clear cut, and just start disabling it in all
 services that link to it, instead of letting rot on in Fedora for all
 eternity.

 It's bad code, little used, crufty. We have much better stuff now, and
 that enables us to say goodbye to the old mess...

 I figure there will be a bit of opposition to this change, thus I
 thought I start the discussion on the fedora ML first. Unless there are
 major concerns I will propose a feature about this in the next few
 days. If somebody wants to join me on this and put his name on the
 feature proposal I'd be delighted!

 Lennart

 --
 Lennart Poettering, Red Hat
 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel
 Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct




-- 
Stephen J Smoogen.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Martin Langhoff
On Thu, Mar 20, 2014 at 1:34 PM, Lennart Poettering mzerq...@0pointer.dewrote:

 I wonder whether it wouldn't be time to say goodbye to tcpwrappers in
 Fedora. There has been a request in systemd upstream to disable support


As Stephen points out, they are used. Does systemd+xinetd match their
functionality?

cheers,


m
-- 
 martin.langh...@gmail.com
 -  ask interesting questions
 - don't get distracted with shiny stuff  - working code first
 ~ http://docs.moodle.org/en/User:Martin_Langhoff
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Lennart Poettering
On Thu, 20.03.14 13:59, Paul Wouters (p...@nohats.ca) wrote:

 Those who depend on it though, should see some failed closed
 behaviour, so their service does not suddenly become more exposed.

Well, this sounds like something to cover in the release notes, plus a
check in fedup or so that tells people about this should
/etc/hosts.{allow,deny} have changed from shipped defaults or so.

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Lennart Poettering
On Thu, 20.03.14 14:31, Martin Langhoff (martin.langh...@gmail.com) wrote:

 On Thu, Mar 20, 2014 at 1:34 PM, Lennart Poettering 
 mzerq...@0pointer.dewrote:
 
  I wonder whether it wouldn't be time to say goodbye to tcpwrappers in
  Fedora. There has been a request in systemd upstream to disable support
 
 
 As Stephen points out, they are used. Does systemd+xinetd match their
 functionality?

No. systemd is not a firewall. It currently supports libwrap checks for
socket activated services. And I'd really like to get rid of that...

I have no doubt that some people use them, however I am also pretty sure
that they are massively awful, and not worth the trouble, and that I'd
prefer not to see this crap in the default install. However, since the
library is currently hooked into a lot of services (starting with
systemd itself) I currently cannot do rpm -e.

I mean, I really don't mind that tcpd/tcpwrap stays in the archives, if
people want to make use of that. I am simply proposing to not link
agains them anymore for everything that is in the default system.

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Lennart Poettering
On Thu, 20.03.14 12:20, Stephen John Smoogen (smo...@gmail.com) wrote:

  I doubt there are many people even using them anymore, firewalls are
  more comprehensive and a lot more powerful, and while every admin knows
  firewalls, I figure only very few know tcpd/tcpwrap, and even fewer ever
  actively make use of them...
 
 
 Actually they are used quite a bit in various service worlds. Mainly for
 ssh and email for dealing with scanners. [DenyHosts is a boon in this
 area.] The reason for using a secondary tool is that depth of
 security.

Well, all mails servers as well as sshd have much better ways to do
such filtering. sshd has Match,  Postfix for example has
smtpd_client_restrictions=, and so on.

Again, I have no doubt that some people still use tcpwrappers. But I'd
argue that is clearly the excpetion, not the rule, and they'd better use
something different, and that we should be creating an excellent distro,
instead of a one that features horrible software...

 Over the years I have found that there are multiple of attacks which will
 nullify one layer of protection at one point or another. Having a second
 level or third level of protection is a boon when this happens.

Well, it certainly makes sense to combine a firewall with let's say
selinux with maybe postfix/ssh acls. Then you already have three layers
of protection, of very good protection. But of all possible options
tcpwrap is the absolute worst choice. And we should be able to deprecate
and remove stuff from our core OS if we think it is crap.

I mean, there are two sides of the medal: sure multiple layers of
protection might be a good thing, but you also make things a lot more
complex with each one, and you involve more possibly exploitable code --
and tcpwrap is simply bad code, that's a fact. So you have to balance
things out: is something a layer that is worth the trouble? Or does
having it around make things worse? I am of the opinion that tcpwrap
indeed does make things worse.

Sure, three layers of condoms probably make sex safer, but then again,
if one of them is made of 10 year old half-decomposed goat intestines,
then maybe the sex is a lot less fun, too...

 At the enterprise level firewalls can come under a different set of change
 control rules than something like tcpwrappers which is considered
 application level. While I would like to be able to make a simple change in
 a firewall, I can end up spending a month until I can. Application controls
 are usually an hour or so signoff. This means that if tcp-wrappers is going
 then something will need to be able to replace it to meet that large scale
 concern. [Automatic firewall controls like firewalld have to be disabled or
 put into a manual changes only mode in these areas for change control
 purposes. ]

Well, that really sounds like a specific issue of your
company... Really, I don't think the question whether the bureaucracy of
some hypothetical company makes a distinction between tcwrap and
firewalls has no place in the discussion whether we should support
tcpwrap in our distro or not.

 I can't argue on the code maintainability or layout. Not my area of
 expertise. I can say that if tcpd/libtcpwrappers were to go away that
 something equivalent would need to be built to replace it for the ability
 to fine tune at a layer below the firewall.

Why? Other than your hypothetical bureaucracy, is there anything that
tcpwrap can do that firewalls can't do, that really deserves to be
supported? I really can't see anything... [1]

tcpd comes from a time when there weren't local firewalls available in
all Unix systems, so they built something like them in userspace. But
that time is long long gone, and pretty much any Linux installation I
know nowadays has a firewall compiled into the kernel...

Lennart



[1] well, sure tcpwrap resolves DNS dynamically and can use that for
access control, but people who bind access control to DNS really should
find a different job than administrator...

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Florian Weimer
* Stephen John Smoogen:

 Actually they are used quite a bit in various service worlds. Mainly for
 ssh and email for dealing with scanners. [DenyHosts is a boon in this
 area.]

I believe DenyHosts is unmaintained as well:

  https://bugzilla.redhat.com/show_bug.cgi?id=1045983

 At the enterprise level firewalls can come under a different set of change
 control rules than something like tcpwrappers which is considered
 application level.

I think it's difficult to generalize in this area.  There is no
inherent reason why an iptables-based local packet filter has to
follow the same sign-off rules as a device on the forwarding path.

From my POV, it is kind of neat that you can grant access to *.enyo.de
and deny every thing else.  This is quite helpful against scanners and
worms, and programs like OpenSSH rely on tcpwrappers to implement
this.  It's not clear to me if this has to happen at the systemd
level, though.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: fail2ban + firewalld suggestions needed

2014-03-20 Thread Matthew Miller
On Thu, Mar 20, 2014 at 12:17:46PM -0400, Przemek Klosowski wrote:
 fail2ban-server - core components with minimal deps
 fail2ban-firewalld - firewalld support/configuration - requires firewalld
 fail2ban-hostsdeny - tcp_wrappers hosts.deny support - requires 
 tcp_wrappers
 fail2ban-mail  - mail actions- requires 
 /usr/bin/mail
 fail2ban-sendmail  - sendmail actions- requires 
 /usr/sbin/sendmail
 fail2ban-shorewall - shorewall support   - requires shorewall
 fail2ban-systemd   - systemd journal configuration
 
 fail2ban - default component - installs -firewalld,-sendmail,-systemd
 fail2ban-all - installs everything - also requires /usr/bin/whois
 I am concerned that this looks like configuring the fail2ban package
 by installing more packages. If we started doing it everywhere

It looks like that, but the split is largely based on dependencies, and I
can see situations for each case where you might want to avoid pulling these
things in but still would want fail2ban. The systemd one is the exception,
because the journal isn't optional in Fedora. And I think I'd combine mail
and sendmail (because the /usr/sbin/sendmail command can be provided by a
lot of alternatives, including the very lightweight ssmtp).

And maybe hostsdeny should be part of the main server package, as it really
just manipulates /etc/hosts.deny, which is part of the mandatory 'setup'
package.


-- 
Matthew Miller--   Fedora Project--mat...@fedoraproject.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Lennart Poettering
On Thu, 20.03.14 20:06, Florian Weimer (f...@deneb.enyo.de) wrote:

 * Stephen John Smoogen:
 
  Actually they are used quite a bit in various service worlds. Mainly for
  ssh and email for dealing with scanners. [DenyHosts is a boon in this
  area.]
 
 I believe DenyHosts is unmaintained as well:
 
   https://bugzilla.redhat.com/show_bug.cgi?id=1045983
 
  At the enterprise level firewalls can come under a different set of change
  control rules than something like tcpwrappers which is considered
  application level.
 
 I think it's difficult to generalize in this area.  There is no
 inherent reason why an iptables-based local packet filter has to
 follow the same sign-off rules as a device on the forwarding path.
 
 From my POV, it is kind of neat that you can grant access to *.enyo.de
 and deny every thing else.  

Binding access control to DNS sounds insecure like hell..

 This is quite helpful against scanners and
 worms, and programs like OpenSSH rely on tcpwrappers to implement
 this.  It's not clear to me if this has to happen at the systemd
 level, though.

OpenSSH can do this on its own without involving tcpwrap:

https://raymii.org/s/tutorials/Limit_access_to_openssh_features_with_the_Match_keyword.html

It sounds like a much better choice to stick to that instead of
involving tcpwrap, and we should push our users to understand that...

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Lennart Poettering
On Wed, 19.03.14 18:51, Adam Williamson (awill...@redhat.com) wrote:

  More complex than trying to mirror a FAT ESP partition across multiple
  boot disks, keeping it properly synchronized, because RAID isn't
  supported?
 
 You can in theory just have a bunch of RAID-1 (mirrored) ESPs, because
 of how RAID-1 works; each individual member can also be mounted as if it
 was just a plain old partition, which is how the firmware will mount it.
 The anaconda devs have thought about this, and are planning to implement
 it. On the UEFI side you just write entries for each of the ESPs into
 the EFI boot manager. If one of them fails, then the firmware will boot
 from the next in line.

I'd really stay away from doing anything RAID related with the ESP.

We really shouldn't have the same partition multiple times with the same
uuid and stuff. That is a call for trouble. 

This is a really awful idea. Really, things like the pre-kernel boot
logic should be kept simple, and what you are suggesting there is just
frickin' crazy.

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Florian Weimer
* Lennart Poettering:

 From my POV, it is kind of neat that you can grant access to *.enyo.de
 and deny every thing else.  

 Binding access control to DNS sounds insecure like hell..

Additional restrictions are fine, for this purpose:

 This is quite helpful against scanners and worms,

(And with DNSSEC, it wouldn't be so insecure anymore, you don't even
need a secured reverse tree before it can be effective.)

 OpenSSH can do this on its own without involving tcpwrap:

 https://raymii.org/s/tutorials/Limit_access_to_openssh_features_with_the_Match_keyword.html

 It sounds like a much better choice to stick to that instead of
 involving tcpwrap, and we should push our users to understand that...

The nice thing about tcpwrappers is that it runs extremely early,
typically before any application code is exposed.  Something in the
guts of OpenSSH really isn't comparable.  It's not immediately obvious
how you'd block logins altogether.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Adam Williamson
On Thu, 2014-03-20 at 20:20 +0100, Lennart Poettering wrote:
 On Wed, 19.03.14 18:51, Adam Williamson (awill...@redhat.com) wrote:
 
   More complex than trying to mirror a FAT ESP partition across multiple
   boot disks, keeping it properly synchronized, because RAID isn't
   supported?
  
  You can in theory just have a bunch of RAID-1 (mirrored) ESPs, because
  of how RAID-1 works; each individual member can also be mounted as if it
  was just a plain old partition, which is how the firmware will mount it.
  The anaconda devs have thought about this, and are planning to implement
  it. On the UEFI side you just write entries for each of the ESPs into
  the EFI boot manager. If one of them fails, then the firmware will boot
  from the next in line.
 
 I'd really stay away from doing anything RAID related with the ESP.
 
 We really shouldn't have the same partition multiple times with the same
 uuid and stuff. That is a call for trouble. 
 
 This is a really awful idea. Really, things like the pre-kernel boot
 logic should be kept simple, and what you are suggesting there is just
 frickin' crazy.

Sigh, for the fourth time, I'm not suggesting it. It's not my idea. I'm
not going to defend it. I'm relaying a design that was outlined to me by
the anaconda devs. The motivation is that there have been multiple
requests to make it possible to have a redundant boot chain on native
UEFI installs, as you can on native BIOS installs.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Stephen John Smoogen
On 20 March 2014 13:05, Lennart Poettering mzerq...@0pointer.de wrote:

 On Thu, 20.03.14 12:20, Stephen John Smoogen (smo...@gmail.com) wrote:

   I doubt there are many people even using them anymore, firewalls are
   more comprehensive and a lot more powerful, and while every admin knows
   firewalls, I figure only very few know tcpd/tcpwrap, and even fewer
 ever
   actively make use of them...
  
  
  Actually they are used quite a bit in various service worlds. Mainly for
  ssh and email for dealing with scanners. [DenyHosts is a boon in this
  area.] The reason for using a secondary tool is that depth of
  security.

 Well, all mails servers as well as sshd have much better ways to do
 such filtering. sshd has Match,  Postfix for example has
 smtpd_client_restrictions=, and so on.


And now I need to have X number applications special syntax to
whitelist/blacklist a site. I need to change X files to make that change.
Each of those could be a separate change control process depending on the
size of the organization. Or I have 1 file that I can make a change to
which has usually one syntax and one set of reviews.



 Again, I have no doubt that some people still use tcpwrappers. But I'd
 argue that is clearly the excpetion, not the rule, and they'd better use
 something different, and that we should be creating an excellent distro,
 instead of a one that features horrible software...


Look I am not saying it isn't horrible to look at from a coding side. From
a systems administrators side it does stuff in a very clean, easily audited
way. It is also a nice key place where every application is actually using
the same syntax versus each custom version. Having spent several ITIL
meetings where you have to explain the syntax of each application to
non-sysadmins, then prove that the change is correct, then prove that the
change is easily backed out, and then other parts.. having 1 syntax to do
that versus doing every applications custom version makes it a lot easier
to deal with.

I am not saying rip it out, but I am saying that you need something that
replaces that one syntax, one file control, simple syntax method.



  Over the years I have found that there are multiple of attacks which will
  nullify one layer of protection at one point or another. Having a second
  level or third level of protection is a boon when this happens.

 Well, it certainly makes sense to combine a firewall with let's say
 selinux with maybe postfix/ssh acls. Then you already have three layers
 of protection, of very good protection. But of all possible options
 tcpwrap is the absolute worst choice. And we should be able to deprecate
 and remove stuff from our core OS if we think it is crap.

 I mean, there are two sides of the medal: sure multiple layers of
 protection might be a good thing, but you also make things a lot more
 complex with each one, and you involve more possibly exploitable code --
 and tcpwrap is simply bad code, that's a fact. So you have to balance
 things out: is something a layer that is worth the trouble? Or does
 having it around make things worse? I am of the opinion that tcpwrap
 indeed does make things worse.

 Sure, three layers of condoms probably make sex safer, but then again,
 if one of them is made of 10 year old half-decomposed goat intestines,
 then maybe the sex is a lot less fun, too...


I don't see the need to make such crude references.



  At the enterprise level firewalls can come under a different set of
 change
  control rules than something like tcpwrappers which is considered
  application level. While I would like to be able to make a simple change
 in
  a firewall, I can end up spending a month until I can. Application
 controls
  are usually an hour or so signoff. This means that if tcp-wrappers is
 going
  then something will need to be able to replace it to meet that large
 scale
  concern. [Automatic firewall controls like firewalld have to be disabled
 or
  put into a manual changes only mode in these areas for change control
  purposes. ]

 Well, that really sounds like a specific issue of your
 company... Really, I don't think the question whether the bureaucracy of
 some hypothetical company makes a distinction between tcwrap and
 firewalls has no place in the discussion whether we should support
 tcpwrap in our distro or not.



I am giving you a standard enterprise problem. You are constantly going on
about how systemd solves enterprise level problems and enterprises will
love them. I am giving you a standard problem that tcpwrappers solves and
you need to come up with some sort of replacement for them.  Most real
problems enterprise administrators deal with are people oriented and this
is a tool which deals with those problems in a way that is clean and clear.


All I am trying to do is point them out to you so that you don't end up
having to spend all of 2016 recoding a replacement because it became a deal
breaker for the various enterprise downstreams. If you want 

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Matthew Miller
On Thu, Mar 20, 2014 at 08:06:26PM +0100, Florian Weimer wrote:
 I believe DenyHosts is unmaintained as well:

fail2ban is maintained, does basically the same thing, can use iptables and
optionally firewalld, and can watch the systemd journal. Maybe that could go
in the release notes.

I think in general that part of the reason tcp_wrappers has rotted is that
interfaces to packet filtering tools have gotten better and easier over the
past two decades.

I'm basically in favor of this, with a big star put by Stephen Smoogen's
concern about enterprise defense-in-depth policies. But just so no one is
surprised if I say this later, unless there is overwhelming feedback that
it's time for it to go now, I think it's reasonable to declare it deprecated
for F21, with release notes, warnings in hosts.allow and hosts.deny, updates
in the documentation (which current recommends using both in conjunction)
http://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd
and so on. Then if that goes smoothly and gets positive (or, zero) user
feedback, we can remove it for F22.

-- 
Matthew Miller--   Fedora Project--mat...@fedoraproject.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Hans de Goede
Hi,

On 03/20/2014 07:45 PM, Lennart Poettering wrote:
 On Thu, 20.03.14 14:31, Martin Langhoff (martin.langh...@gmail.com) wrote:
 
 On Thu, Mar 20, 2014 at 1:34 PM, Lennart Poettering 
 mzerq...@0pointer.dewrote:

 I wonder whether it wouldn't be time to say goodbye to tcpwrappers in
 Fedora. There has been a request in systemd upstream to disable support


 As Stephen points out, they are used. Does systemd+xinetd match their
 functionality?
 
 No. systemd is not a firewall. It currently supports libwrap checks for
 socket activated services. And I'd really like to get rid of that...
 
 I have no doubt that some people use them, however I am also pretty sure
 that they are massively awful, and not worth the trouble, and that I'd
 prefer not to see this crap in the default install. However, since the
 library is currently hooked into a lot of services (starting with
 systemd itself) I currently cannot do rpm -e.
 
 I mean, I really don't mind that tcpd/tcpwrap stays in the archives, if
 people want to make use of that. I am simply proposing to not link
 agains them anymore for everything that is in the default system.

So as an innocent bystander who happens to be reading along this thread,
I see 2 sides to the story here:

Lennart says:
1) It is horrible code
2) It really really is horrible horrible code
3) And there are other ways to achieve the same goal, so lets kill it

Others say:
1) There may be other ways but non so easily central managed with with
a unified syntax for all services

The argument which the others are making actually sounds a lot like
a lot of the arguments in favor of systemd (wrt standardizing, etc.).

And I'm getting the feeling that Lennart is not as much opposed to the
functionality of tcp-wrappers, as that he *really* hates the code.

So maybe a solution would be to write a libwrap2 instead ?

So offer something with equivalent functionality (and config file
syntax compatibility), with a nice modern clean API and then systemd
and others can be moved over to that 1 by 1, and once we've no more
users left we can kill of the old beast ?

Note I've nothing to do with anything in this discussion, but I
just noticed a certain trend in it and I hope the above may lead
to a more fruitful discussion.

Regards,

Hans
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: rfc: EFI System partition, FAT32, repair and non-persistent mount

2014-03-20 Thread Chris Murphy

On Mar 20, 2014, at 1:39 PM, Adam Williamson awill...@redhat.com wrote:

 Sigh, for the fourth time, I'm not suggesting it. It's not my idea. I'm
 not going to defend it. I'm relaying a design that was outlined to me by
 the anaconda devs. The motivation is that there have been multiple
 requests to make it possible to have a redundant boot chain on native
 UEFI installs, as you can on native BIOS installs.

Sure but the burden is on whatever installs to or modifies the ESP. Anaconda 
needs to create the required ESPs on each selected device, install the 
bootloader to each ESP, and then either:

a. mount and call grub2-mkconfig on each ESP in turn
b. write a basic forwarding grub.cfg on each ESP, and grub2-mkconfig in the 
normal location /boot/grub2.

For kernel updates:

a. means either the kernel package or grubby must be capable of finding and 
mounting each ESP, and updating their grub.cfg's.
b. means doing nothing new. Grubby updates grub.cfg at /boot/grub2, which is 
made redundant by virtue of whatever the underlying scheme is for the boot 
volume.


The b. path is easier for both single device and multiple device installs than 
what we have now; and it essentially eliminate needing to update or sync ESPs, 
and therefore no need to auto or persistently mount it. It kills multiple birds 
with one stone. (Sorry birds.)


Chris Murphy
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 03/20/2014 01:55 PM, Hans de Goede wrote:
 Hi,
 
 On 03/20/2014 07:45 PM, Lennart Poettering wrote:
 On Thu, 20.03.14 14:31, Martin Langhoff
 (martin.langh...@gmail.com) wrote:
 
 On Thu, Mar 20, 2014 at 1:34 PM, Lennart Poettering
 mzerq...@0pointer.dewrote:
 
 I wonder whether it wouldn't be time to say goodbye to
 tcpwrappers in Fedora. There has been a request in systemd
 upstream to disable support
 
 
 As Stephen points out, they are used. Does systemd+xinetd match
 their functionality?
 
 No. systemd is not a firewall. It currently supports libwrap
 checks for socket activated services. And I'd really like to get
 rid of that...
 
 I have no doubt that some people use them, however I am also
 pretty sure that they are massively awful, and not worth the
 trouble, and that I'd prefer not to see this crap in the default
 install. However, since the library is currently hooked into a
 lot of services (starting with systemd itself) I currently cannot
 do rpm -e.
 
 I mean, I really don't mind that tcpd/tcpwrap stays in the
 archives, if people want to make use of that. I am simply
 proposing to not link agains them anymore for everything that is
 in the default system.
 
 So as an innocent bystander who happens to be reading along this
 thread, I see 2 sides to the story here:
 
 Lennart says: 1) It is horrible code 2) It really really is
 horrible horrible code 3) And there are other ways to achieve the
 same goal, so lets kill it
 
 Others say: 1) There may be other ways but non so easily central
 managed with with a unified syntax for all services
 
 The argument which the others are making actually sounds a lot
 like a lot of the arguments in favor of systemd (wrt standardizing,
 etc.).
 
 And I'm getting the feeling that Lennart is not as much opposed to
 the functionality of tcp-wrappers, as that he *really* hates the
 code.
 
 So maybe a solution would be to write a libwrap2 instead ?
 
 So offer something with equivalent functionality (and config file 
 syntax compatibility), with a nice modern clean API and then
 systemd and others can be moved over to that 1 by 1, and once we've
 no more users left we can kill of the old beast ?
 
 Note I've nothing to do with anything in this discussion, but I 
 just noticed a certain trend in it and I hope the above may lead to
 a more fruitful discussion.
 
 Regards,
 
 Hans
 

Hans,
Now that is just too entirely rational ;).

This sounds like a wonderful solution, but someone has to be willing
to write the thing.

- -Erinn

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJTK0hrAAoJEFg7BmJL2iPOsnwH/0q5Kf7GvOMKaAemk9y/mYmE
nsB0QHt8nVhWTOd+T4O726loBZlE5pEzhdFTseIROYsmrSsKaKl7DR44CuVSOyXp
q0+TDkT17YxpbrM1OqZWFVW3osbvQo2dohgwaCovviOOiKKHprSC/teTRJ3eKjZI
B1Ymw6PnxzAdyNkrisWqgSpTCCTKvqCLDqLXVRLpC8K/3rj5IY7h8CPg2Ny3ORZI
vL6bP4cAfvdS3wmKeSSIPzvRroPORSWTVJ3IOkvX3NBuWweaIh5nxqP1kiLbkx5G
a8akc48Lhq1DKD0L7aAOHzPb4gtBDw6YnkJu6soCBA0eguRUhyMSMMwrcZBqkoI=
=k0nE
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Oron Peled

On Thursday 20 March 2014 19:45:32 Lennart Poettering wrote:
 No. systemd is not a firewall. It currently supports libwrap checks for
 socket activated services. And I'd really like to get rid of that...

Confession: I've never bothered looking in tcpwrappers code/api, so
I'll take your assessment that this code should be thrown away...

However, the functionality *at the service level* has its value,
as a complement to firewall rules which are global by nature.

Let's look at familiar NON-tcpwrappers examples:
 * Every sane network service allows you to bind to specific interfaces
   although you could protect them via firewall rules.

   It's not *only* security, but also flexibility (e.g: running several
   instances on several [physical or virtual] network interfaces).

   Sometimes it's just extra *safety* (e.g: you don't want an internal
   DHCP server to answer hosts on the corporate network by mistake).

 * You mentioned yourself the sshd Match keyword. Again, it's not just
   security per-se, but the softer ability to control a network
   resource *at the service level*.

 * xinetd also support some socket control options (besides optional
   tcpwrappers integration). E.g: per_source or cps directives.

 * Last, a somewhat theoretical example. User-level services.
   (e.g: screen sharing of personal desktop like krfb).
   The non-root user may not have global control on the host and firewall
   but may want to set limits who can bother him/her.

   (it's theoretical simply because current implementations doesn't
give the user any such control ;-)

So is there any chance to have similar functionality?
 * IMO, exact feature/syntax parity with tcpwrappers isn't important at all.

 * However, *some* optional socket control/limits in service.socket file
   would go a long way.

 * If this happens to be implemented in a small library with sane API,
   it may even contribute to the direct replacement of tcpwrappers
   in other network services that need similar features...

Thanks,


-- 
Oron Peled Voice: +972-4-8228492
o...@actcom.co.il  http://users.actcom.co.il/~oron

The wonderful thing about standards is that there are so many of
them to choose from.
-- Grace Murray Hopper

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Stephen John Smoogen
On 20 March 2014 13:55, Hans de Goede hdego...@redhat.com wrote:

 Hi,

 On 03/20/2014 07:45 PM, Lennart Poettering wrote:
  On Thu, 20.03.14 14:31, Martin Langhoff (martin.langh...@gmail.com)
 wrote:
 
  On Thu, Mar 20, 2014 at 1:34 PM, Lennart Poettering 
 mzerq...@0pointer.dewrote:
 
  I wonder whether it wouldn't be time to say goodbye to tcpwrappers in
  Fedora. There has been a request in systemd upstream to disable support
 
 
  As Stephen points out, they are used. Does systemd+xinetd match their
  functionality?
 
  No. systemd is not a firewall. It currently supports libwrap checks for
  socket activated services. And I'd really like to get rid of that...
 
  I have no doubt that some people use them, however I am also pretty sure
  that they are massively awful, and not worth the trouble, and that I'd
  prefer not to see this crap in the default install. However, since the
  library is currently hooked into a lot of services (starting with
  systemd itself) I currently cannot do rpm -e.
 
  I mean, I really don't mind that tcpd/tcpwrap stays in the archives, if
  people want to make use of that. I am simply proposing to not link
  agains them anymore for everything that is in the default system.

 So as an innocent bystander who happens to be reading along this thread,
 I see 2 sides to the story here:

 Lennart says:
 1) It is horrible code
 2) It really really is horrible horrible code
 3) And there are other ways to achieve the same goal, so lets kill it

 Others say:
 1) There may be other ways but non so easily central managed with with
 a unified syntax for all services

 The argument which the others are making actually sounds a lot like
 a lot of the arguments in favor of systemd (wrt standardizing, etc.).

 And I'm getting the feeling that Lennart is not as much opposed to the
 functionality of tcp-wrappers, as that he *really* hates the code.

 So maybe a solution would be to write a libwrap2 instead ?

 So offer something with equivalent functionality (and config file
 syntax compatibility), with a nice modern clean API and then systemd
 and others can be moved over to that 1 by 1, and once we've no more
 users left we can kill of the old beast ?

 Note I've nothing to do with anything in this discussion, but I
 just noticed a certain trend in it and I hope the above may lead
 to a more fruitful discussion.


Yes I agree Hans. I think this is the rational and correct course. I also
realize that it isn't Lennart's job to do so even if I wish he would.


-- 
Stephen J Smoogen.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Matthew Miller
On Thu, Mar 20, 2014 at 03:50:07PM -0400, Matthew Miller wrote:
 it's time for it to go now, I think it's reasonable to declare it deprecated
 for F21, with release notes, warnings in hosts.allow and hosts.deny, updates

And by declare, I mean decide collectively to declare -- sorry if that
was unclear.




-- 
Matthew Miller--   Fedora Project--mat...@fedoraproject.org
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Miloslav Trmač
2014-03-20 20:55 GMT+01:00 Hans de Goede hdego...@redhat.com:

 Lennart says:
 1) It is horrible code
 2) It really really is horrible horrible code
 3) And there are other ways to achieve the same goal, so lets kill it

 Others say:
 1) There may be other ways but non so easily central managed with with
 a unified syntax for all services


Yes.  It's notable that almost every widely-used network server that
doesn't use tcp_wrappers has needed to add a very similar set of options;
so we shouldn't expect that tcp_wrappers were removed users would stop
using or asking for that kind of functionality.

Centralizing the language, semantics and implementation is clearly a better
UI and better design.  Not only for the common case of the same option has
a different name in the other daemon, but also for the corner cases like
error behavior where various independent implementations differ in
surprising ways.  Such surprises are great starting points for attackers
looking to bypass policy.

From the users' POV, moving from tcp_wrappers to per-daemon configuration
is a clear step backwards.  If the implementers' POV differs, that's a
reason to change the implementation, not to discard the feature.
Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Philip Prindeville

On Mar 20, 2014, at 12:31 PM, Martin Langhoff martin.langh...@gmail.com wrote:

 On Thu, Mar 20, 2014 at 1:34 PM, Lennart Poettering mzerq...@0pointer.de 
 wrote:
 I wonder whether it wouldn't be time to say goodbye to tcpwrappers in
 Fedora. There has been a request in systemd upstream to disable support
 
 As Stephen points out, they are used. Does systemd+xinetd match their 
 functionality?
 
 cheers,
 
 
 m

I have to say that there are certain out-of-the-box services that it’s nice to 
be able to block access at the application-level, which would be hard to do at 
the transport or network layer.

RPC-based services being the most obvious, but also things like FTP or TFTP or 
VNC or X that don’t always have port numbers that are easily expressed…  Then 
there’s filtering on DNS hostname suffixes, etc… NIS+ membership...

I’m fine with seeing systemd being decoupled from them, but I’d like to see 
legacy services continue to work with tcpwrappers (libwrap).

-Philip


-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Richard W.M. Jones
On Thu, Mar 20, 2014 at 10:48:53PM +0200, Oron Peled wrote:
 
 On Thursday 20 March 2014 19:45:32 Lennart Poettering wrote:
  No. systemd is not a firewall. It currently supports libwrap checks for
  socket activated services. And I'd really like to get rid of that...
 
 Confession: I've never bothered looking in tcpwrappers code/api, so
 I'll take your assessment that this code should be thrown away...

I did just look at the code, and it doesn't look too bad to me.  I'd
be interested hearing about specific problems with it.

  http://gitweb.dragonflybsd.org/dragonfly.git/tree?f=contrib/tcp_wrappers

On the other hand, I'll note that Arch dropped tcp_wrappers support in 2011.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Lennart Poettering
On Thu, 20.03.14 20:36, Florian Weimer (f...@deneb.enyo.de) wrote:

  OpenSSH can do this on its own without involving tcpwrap:
 
  https://raymii.org/s/tutorials/Limit_access_to_openssh_features_with_the_Match_keyword.html
 
  It sounds like a much better choice to stick to that instead of
  involving tcpwrap, and we should push our users to understand that...
 
 The nice thing about tcpwrappers is that it runs extremely early,
 typically before any application code is exposed.  Something in the
 guts of OpenSSH really isn't comparable.  It's not immediately obvious
 how you'd block logins altogether.

Well, the thing though is that the OpenSSH code is not as bad as
tcpwrap. I'd much rather have OpenSSH handle this than tcpwrap...

And if it's not immediately obvious, then we can certainly fix that
with adding more docs, or explaining this in the release notes?

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Lennart Poettering
On Thu, 20.03.14 13:44, Stephen John Smoogen (smo...@gmail.com) wrote:

  Well, all mails servers as well as sshd have much better ways to do
  such filtering. sshd has Match,  Postfix for example has
  smtpd_client_restrictions=, and so on.
 
 And now I need to have X number applications special syntax to
 whitelist/blacklist a site. I need to change X files to make that change.
 Each of those could be a separate change control process depending on the
 size of the organization. Or I have 1 file that I can make a change to
 which has usually one syntax and one set of reviews.

Well, if you filter in postfix or ssh, then you have a domain-specific,
powerful language there. You can not only match on source addresses, but
also on user names, groups, authentication methods, connection features
SASL schemes, crypto algorithms, ... It's a very good thing being able
to control this in a unified, but domain-specific way. There are also
proper firewalls, for traffic-level filtering. But where's the place for
tcpwrappers in all of this? It's neither really generic, nor
domain-specific, and also crappy code. We really don't need 3 layers
checking the very same thing...

postfix and sshd have mechanisms to filter for on specific domain each,
however covering a multitude of domain-specific high-level, matches and
actions.

A firewall has mechanisms to filter for all domains, however only
covering a smaller number of generic, low-level matches and actions.

tcpwrap otoh is somewhere in the middle, it's neither really generic,
nor really powerful. It's not a convincing, a very redundant option,
since it gets you very little features on top of a firewall, and is not
that universal either.

 Look I am not saying it isn't horrible to look at from a coding side. From
 a systems administrators side it does stuff in a very clean, easily audited
 way. It is also a nice key place where every application is actually using
 the same syntax versus each custom version. Having spent several ITIL
 meetings where you have to explain the syntax of each application to
 non-sysadmins, then prove that the change is correct, then prove that the
 change is easily backed out, and then other parts.. having 1 syntax to do
 that versus doing every applications custom version makes it a lot easier
 to deal with.

If you want that unified language that can actually cover all kinds of
apps and traffic, then use a firewall. It is truly universal (unlike
tcpwrappers), and at least as powerful...

 I am not saying rip it out, but I am saying that you need something that
 replaces that one syntax, one file control, simple syntax method.

Let that be the firewall. It does the same thing, just better.

 I am giving you a standard enterprise problem. You are constantly going on
 about how systemd solves enterprise level problems and enterprises will
 love them. I am giving you a standard problem that tcpwrappers solves and
 you need to come up with some sort of replacement for them.  Most real
 problems enterprise administrators deal with are people oriented and this
 is a tool which deals with those problems in a way that is clean and
 clear.

Yupp, here's my replacement: a proper firewall.

And no, it's not a standard enterprise problem that firewalls need
higher people's sign-off than tcpwrappers in your theoretic firewall..

 All I am trying to do is point them out to you so that you don't end up
 having to spend all of 2016 recoding a replacement because it became a deal
 breaker for the various enterprise downstreams. If you want to make this a
 You dare question me? then fine, I can go do something else and know in
 the future that you aren't really looking for feedback.

You know, we have more powerful replacements both high-level (in
postfix, sshd, ...) and lower-level, we really don't need tcp wrappers.

I posted this here for feedback, and yes I got it, please understand
though at I will at least try to convince you that tcpwrap is a
dead-end. I mean, take it as an indication that I am actually taking
your feedback seriously, that I spend a lot of time arguing against
it. If I wouldn't take it seriously I wouldn't have started this
discussion and would certainly not have replied to this message...

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Reindl Harald


Am 21.03.2014 01:00, schrieb Lennart Poettering:
 On Thu, 20.03.14 13:44, Stephen John Smoogen (smo...@gmail.com) wrote:
 
 Well, all mails servers as well as sshd have much better ways to do
 such filtering. sshd has Match,  Postfix for example has
 smtpd_client_restrictions=, and so on.

 And now I need to have X number applications special syntax to
 whitelist/blacklist a site. I need to change X files to make that change.
 Each of those could be a separate change control process depending on the
 size of the organization. Or I have 1 file that I can make a change to
 which has usually one syntax and one set of reviews.
 
 Well, if you filter in postfix or ssh, then you have a domain-specific,
 powerful language there. You can not only match on source addresses, but
 also on user names, groups, authentication methods, connection features
 SASL schemes, crypto algorithms

what has this to do with I have 1 file that I can make a change to
which has usually one syntax and one set of reviews?




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Martin Langhoff
On Thu, Mar 20, 2014 at 8:00 PM, Lennart Poettering mzerq...@0pointer.dewrote:

 A firewall has mechanisms to filter for all domains, however only
 covering a smaller number of generic, low-level matches and actions.


From a usability PoV, /etc/hosts.{allow,deny} is good. I wonder if teaching
firewalld to support some of that functionality would help here.

cheers,


m
-- 
 martin.langh...@gmail.com
 -  ask interesting questions
 - don't get distracted with shiny stuff  - working code first
 ~ http://docs.moodle.org/en/User:Martin_Langhoff
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Martin Langhoff
On Thu, Mar 20, 2014 at 8:04 PM, Martin Langhoff
martin.langh...@gmail.comwrote:

 On Thu, Mar 20, 2014 at 8:00 PM, Lennart Poettering 
 mzerq...@0pointer.dewrote:

 A firewall has mechanisms to filter for all domains, however only
 covering a smaller number of generic, low-level matches and actions.


 From a usability PoV, /etc/hosts.{allow,deny} is good. I wonder if
 teaching firewalld to support some of that functionality would help here.


To clarify: what I mean is that firewalld could parse the legacy files,
interpreting the rules that are translatable, failing safely for those that
are are not.

cheers,



m
-- 
 martin.langh...@gmail.com
 -  ask interesting questions
 - don't get distracted with shiny stuff  - working code first
 ~ http://docs.moodle.org/en/User:Martin_Langhoff



-- 
 martin.langh...@gmail.com
 -  ask interesting questions
 - don't get distracted with shiny stuff  - working code first
 ~ http://docs.moodle.org/en/User:Martin_Langhoff
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Lennart Poettering
On Thu, 20.03.14 20:55, Hans de Goede (hdego...@redhat.com) wrote:

  I mean, I really don't mind that tcpd/tcpwrap stays in the archives, if
  people want to make use of that. I am simply proposing to not link
  agains them anymore for everything that is in the default system.
 
 So as an innocent bystander who happens to be reading along this thread,
 I see 2 sides to the story here:
 
 Lennart says:
 1) It is horrible code
 2) It really really is horrible horrible code
 3) And there are other ways to achieve the same goal, so lets kill it

I am not just saying other ways, but *better* ways.

I am also saying that keeping this around makes the OS unnecessarily more 
complex.

 Others say:
 1) There may be other ways but non so easily central managed with with
 a unified syntax for all services
 
 The argument which the others are making actually sounds a lot like
 a lot of the arguments in favor of systemd (wrt standardizing, etc.).

Well the difference here is pretty much that there was no
pre-existing standardization effort for the areas that systemd covered
really. 

However, there's a technically much better, established, better
understood alternative to tcpwrappers, and that's a firewall.

 And I'm getting the feeling that Lennart is not as much opposed to the
 functionality of tcp-wrappers, as that he *really* hates the code.

I am actually against this as seperate functionality too. Go high-level
with service-specific filtering. Or go low-level with a firewall. Don't
waste your time with tcpwrap...

 So maybe a solution would be to write a libwrap2 instead ?

Oh, please no. We already have firewalls for this.

If you want to write new code: I think it would be a lot nicer to simply
write a converter for hosts.allow and hosts.deny into iptables rules,
plus some warnings if DNS and IDENT matches are used.

 So offer something with equivalent functionality (and config file
 syntax compatibility), with a nice modern clean API and then systemd
 and others can be moved over to that 1 by 1, and once we've no more
 users left we can kill of the old beast ?

Nope. In systemd we already support one subsystem for filtering just
fine, it's called a firewall. I am looking for a way to simplify things,
and remove unnecessary redundancies. And just rewriting something that
is redundant and a bad idea in the first place, certainly doesn't help
there...

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Reindl Harald


Am 21.03.2014 01:17, schrieb Lennart Poettering:
 On Thu, 20.03.14 20:55, Hans de Goede (hdego...@redhat.com) wrote:
 So offer something with equivalent functionality (and config file
 syntax compatibility), with a nice modern clean API and then systemd
 and others can be moved over to that 1 by 1, and once we've no more
 users left we can kill of the old beast ?
 
 Nope. In systemd we already support one subsystem for filtering just
 fine, it's called a firewall. I am looking for a way to simplify things,
 and remove unnecessary redundancies. And just rewriting something that
 is redundant and a bad idea in the first place, certainly doesn't help
 there...

http://en.wikipedia.org/wiki/Defence_in_depth#Non-military_examples



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Lennart Poettering
On Thu, 20.03.14 20:04, Martin Langhoff (martin.langh...@gmail.com) wrote:

 On Thu, Mar 20, 2014 at 8:00 PM, Lennart Poettering 
 mzerq...@0pointer.dewrote:
 
  A firewall has mechanisms to filter for all domains, however only
  covering a smaller number of generic, low-level matches and actions.
 
 
 From a usability PoV, /etc/hosts.{allow,deny} is good. I wonder if teaching
 firewalld to support some of that functionality would help here.

I don't see how these files would have a good usability. It has all
this fancy support for good old IDENT user names!

I mean, in this day and age we should not consider an ACL language well
designed if it basically pushes users to use IDENT and DNS for
authentication. (And no, don't say the words DNSSEC, nobody sets that
up, we don't have it as default, and tcpwrap doesn't check wether DNSSEC
is enabled either, before trusting a hostname...).

Quite frankly, about 70% of tcpwrappers is security theater. It gives
you a fake sense of security with DNS and IDENT checks and that kind of
stuff.

The other 30% (i.e. simple IP range checks), are much better done in a
real firewall.

An no, a language designed like that doesn't have good
usability. Somebody who is new to all of this, and reads the man page
will set up matches against DNS names and IDENT, and then feel
secure. That's doesn't provide good usability, that's simply
misleading the user. Giving a promise of security, while being completely
conceptually broken and easily compromisable, if working at all...

BTW, I asked the other distros about this. ArchLinux has removed tcpwrap
from their distro 2 years ago. Suse is making babysteps for removing it
(the original patch to disable it by default in systemd came from
them). Debian (of course...) loves it though.

Lennart

-- 
Lennart Poettering, Red Hat
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: fail2ban + firewalld suggestions needed

2014-03-20 Thread Richard Shaw
On Thu, Mar 20, 2014 at 8:54 AM, Jonathan Underwood 
jonathan.underw...@gmail.com wrote:

 On 20 March 2014 13:04, Richard Shaw hobbes1...@gmail.com wrote:
  On Wed, Mar 19, 2014 at 10:57 PM, Orion Poplawski or...@cora.nwra.com
  wrote:
 
  On 03/19/2014 09:10 PM, Richard Shaw wrote:
   Ok using Jonathan's suggestion for the settings from a clean install
 I'm
   getting an error whether I use the systemd backend or not...
  
  [12698]: ERROR   ipset
   create fail2ban-sshd hash:ip timeout 600
   firewall-cmd --direct --add-rule ipv4 filter INPUT 0 -p tcp -m
 multiport
   --dports ssh -m set --match-set fail2ban-sshd src -j REJECT
   --reject-with icmp-port-unreachable -- stderr: '/bin/sh: ipset:
 command
   not found\n'
 
 
  Currently we're missing a requires on ipset.
 
 
 
  Ok, is installing ipset sufficient or do I need to enable the service as
  well?

 Installing ipset should be sufficient to start the fail2ban service.
 But, you'll need to have selinux-policy-3.12.1-135 or later installed,
 otherwise you'll hit this:

 https://bugzilla.redhat.com/show_bug.cgi?id=1069640


Thanks, that indeed seem to be enough. I'm seeing banned IPs not in the
log, I have to assume that they're being banned successfully though...

Thanks,
Richard
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Maybe it's time to get rid of tcpwrappers/tcpd?

2014-03-20 Thread Paul Wouters

On Fri, 21 Mar 2014, Lennart Poettering wrote:


I mean, in this day and age we should not consider an ACL language well
designed if it basically pushes users to use IDENT and DNS for
authentication. (And no, don't say the words DNSSEC, nobody sets that
up, we don't have it as default, and tcpwrap doesn't check wether DNSSEC
is enabled either, before trusting a hostname...).


we kinda do have dnssec per default. All DNS servers installed per
default do DNSSEC. Installing dnssec-trigger makes that even more
pervasive.

But I agree decisions based on DNS/reverse and IDENT are long dead.


The other 30% (i.e. simple IP range checks), are much better done in a
real firewall.


I agree.

Paul
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: fail2ban + firewalld suggestions needed

2014-03-20 Thread Orion Poplawski
On 03/20/2014 01:12 PM, Matthew Miller wrote:
 On Thu, Mar 20, 2014 at 12:17:46PM -0400, Przemek Klosowski wrote:
 fail2ban-server - core components with minimal deps
 fail2ban-firewalld - firewalld support/configuration - requires firewalld
 fail2ban-hostsdeny - tcp_wrappers hosts.deny support - requires 
 tcp_wrappers
 fail2ban-mail  - mail actions- requires 
 /usr/bin/mail
 fail2ban-sendmail  - sendmail actions- requires 
 /usr/sbin/sendmail
 fail2ban-shorewall - shorewall support   - requires shorewall
 fail2ban-systemd   - systemd journal configuration

 fail2ban - default component - installs -firewalld,-sendmail,-systemd
 fail2ban-all - installs everything - also requires /usr/bin/whois
 I am concerned that this looks like configuring the fail2ban package
 by installing more packages. If we started doing it everywhere
 
 It looks like that, but the split is largely based on dependencies, and I
 can see situations for each case where you might want to avoid pulling these
 things in but still would want fail2ban. The systemd one is the exception,
 because the journal isn't optional in Fedora. And I think I'd combine mail
 and sendmail (because the /usr/sbin/sendmail command can be provided by a
 lot of alternatives, including the very lightweight ssmtp).

Yeah, I probably should just add the systemd config file to the main
package.

The -mail actions explicitly depend on /usr/bin/mail command which is
only provided by mailx as far as I can tell.

 
 And maybe hostsdeny should be part of the main server package, as it really
 just manipulates /etc/hosts.deny, which is part of the mandatory 'setup'
 package.

Yeah, but there's and entertaining thread about removing it...


-- 
Orion Poplawski
Technical Manager 303-415-9701 x222
NWRA/CoRA DivisionFAX: 303-415-9702
3380 Mitchell Lane  or...@cora.nwra.com
Boulder, CO 80301  http://www.cora.nwra.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: What will happen to XFCE, LXDE, Mate, Cinnemon in Fedora.Next

2014-03-20 Thread Tim Lauridsen
On Thu, Mar 20, 2014 at 12:40 PM, Bastien Nocera bnoc...@redhat.com wrote:

 - Original Message -
  Workstation might implement easy installation of alternative desktops in
  the GNOME Software app at some point.

 Urgh. This is just moving the problem from the installer/media selection
 to the
 software installer. Just what would we gain by doing that given that there
 will
 still be other desktops in the repos, and other spins?


The most common user case would to install a spin with DE you want to use.
I dont think it matter much if Gnome software support installation of
evironments.
most other DE spins uses LightDM, so if you want a more lightweight DE, you
don't
install the Gnome Desktop first and then install ex. XCFE.

It would ofcause be nice if you can make a netinstall of LXDE, XFCE, Mate,
Cinnemon, KDE etc using anaconda netinst

Tim
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Bug 1078438] Templated types are causing Could not find a typemap for C type

2014-03-20 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078438

Petr Pisar ppi...@redhat.com changed:

   What|Removed |Added

   Keywords||Patch
 Status|NEW |ASSIGNED
 Blocks|1032056 |
 Depends On|1032181 |




Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=1032056
[Bug 1032056] Slic3r 1.0.0RC1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1032181
[Bug 1032181] Templated types are causing Could not find a typemap for C
type
-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=UMBAM2ErJra=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Broken dependencies: perl-Language-Expr

2014-03-20 Thread buildsys


perl-Language-Expr has broken dependencies in the rawhide tree:
On x86_64:
perl-Language-Expr-0.19-4.fc19.noarch requires 
perl(:MODULE_COMPAT_5.16.2)
On i386:
perl-Language-Expr-0.19-4.fc19.noarch requires 
perl(:MODULE_COMPAT_5.16.2)
On armhfp:
perl-Language-Expr-0.19-4.fc19.noarch requires 
perl(:MODULE_COMPAT_5.16.2)
Please resolve this as soon as possible.


--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

[389-devel] Please review: [389 Project] #47748: Simultaneous adding a user and binding as the user could fail in the password policy check

2014-03-20 Thread Noriko Hosoi

https://fedorahosted.org/389/ticket/47748

https://fedorahosted.org/389/attachment/ticket/47748/0001-Ticket-47748-Simultaneous-adding-a-user-and-binding-.patch

389 Project wrote:

Comment:

  Bug description: In do_bind, bind_target_entry is retrieved from the
  DB or the entry cache.  There was a small window that the entry failed
  to retrieve from there but the bind procedure in the backend (be_bind)
  succeeds.  In the case, NULL bind_target_entry is passed to the Pass-
  word Policy check and it fails.

  Fix description: If be_bind returns SUCCESS and bind_target_entry is
  NULL, retrieve bind_target_entry agian, which is guaranteed since the
  entry was retrieved in the backend and placed in the entry cache.



--
389-devel mailing list
389-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/389-devel

Re: Taskotron Data Interfaces

2014-03-20 Thread Kamil Paral
 Some liberties will likely need to be taken with this concept when
 interfacing with external systems, the important part is that any
 single component from the trigger to the runner and reporting systems
 should be isolate-able by using a simple mock object/system fed by
 dictionaries.

This is a good goal.

 Trigger
 ===
 
 The trigger is a piece of code which is responsible for starting the
 process of task execution. 

In this whole email you say 'task'. Do you mean 'check' in our usual 
terminology, or something else? Especially when describing the data structures.

 In our initial implementation, it will
 listen for fedmsgs and based on the content of those messages, schedule
 jobs with buildbot. The interface in this case is:
 
 {
 'item': name of item - envr, update id, koji tag, etc.,
 'item_type': koji_build, koji_tag, bodhi_update,
 'taskname': task to be scheduled,
 'arch': arch needed for execution, x86_64, i386 etc.
 }

So this is data sent from Trigger to Buildbot, right?

 
 
 Buildbot
 
 
 When jobs are scheduled by the trigger using the above data, buildbot
 will queue the task and delegate execution to an appropriate client
 machine based on the input data. The git repo corresponding to the
 taskname will be cloned on the client 

We will need to do some optimization here, otherwise the git servers won't be 
happy.

 but buildbot will add some input
 data. The resultant interface will be:
 
 {
 'item': name of item,
 'item_type': type of item,
 'build_id': uuid of buildbot build, used for logs and results,
 'yamlfile': taskname.yml
 }

The yaml file is in the git repo, so I assume all the git repos are going to be 
cloned on the server as well, not just clients, right?

It makes sense, because the Trigger also needs to know what checks are 
available, therefore it must be available on the server.

 
 
 Runner
 ==
 
 The runner is responsible for taking the specified yaml file and
 executing the directives contained within. In the case of CLI operation
 where there is no build_id, a sensible default will be used instead to
 indicate a filler value (-1000 for example).

What is -1000? Maybe just use None? Or don't include the field at all.

 
 When running a task, the runner will copy most of its own input as the
 task's input:
 
 {
 'item': name of item,
 'item_type': type of item,
 'build_id': uuid of buildbot build, used for logs and results
 }
 
 While the runner is responsible for running a task, each task is
 responsible for its own reporting mechanism. The output from the runner
 itself is in the form of execution information only and does not
 necessarily parallel the result of the executed task.
 
 {
 'execution_status': OK or NOT_OK,

Is this determined purely from the check exit code, or somehow else?

 'status': status message, possibly including any exeptions

What goes here?

 }
 
 
 Task
 
 
 I won't go too far into detail for this as it is being discussed in
 phabricator:
  - https://phab.qadevel.cloud.fedoraproject.org/T84
 
 I think that I've captured all that we've been talking about but I'm
 sure that Josef or Kamil will correct me if I've missed something :)
 
 The primary idea is that tasks will generate a list of TAP results
 which can be farther processed into ResultsDB submissions or Bodhi
 comments (for now). While TAP isn't scrictly a dictionary, it is a
 reasonably well defined output format and when TAP13 is used with
 embedded YAML, we end up with something that doesn't diverge too much
 from a dictionary.
 
 Example TAP output (stolen from D26):
 
 ok - $CHECKNAME for Koji build xchat-0.5-1.fc20
   ---
   details:
 output: |-
   xchat.x86_64: W: file-not-utf8 /usr/share/doc/xchat/ChangeLog
   xchat.x86_64: W: non-conffile-in-etc
/etc/gconf/schem/apps_xchat_url_handler.schemas
   xchat.x86_64: W: no-manual-page-for-binary xchat
   item: xchat-0.5-1.fc20
   outcome: PASSED
   summary: 5 ERRORS, 10 WARNINGS
   type: koji_build
   ...
   not ok - $CHECKNAME for Bodhi update foobar-1.2-3.fc20  # FAIL

Just a note, this line and the ok line below should be aligned with the very 
first line.

   ---
   item: foobar-1.2-3.fc20
   outcome: FAILED
   summary: dependency error
   type: bodhi_update
   ...
   ok - $CHECKNAME for Yum repository f20-updates
   ---
   item: f20-updates
   outcome: INFO
   summary: 2 stale updates
   type: yum_repository
   ...

We will need to add some additional lines here, e.g. log_url (computed from 
build_id). I'd like to do that transparently in our library without the user 
needing to care about anything.

 
 Example ResultsDB post (stolen from T84):
 
 {
 outcome: 'NEEDS_INSPECTION',
 testcase_name: 'upgradepath',
 summary: 'not ok upgradepath for build foo-1.2-3.fc20'
 result_data: {
  'item': 'foo-1.2-3.fc20',
  'type': 'koji_build',
  },
 

Re: Taskotron Data Interfaces

2014-03-20 Thread Kamil Paral
  The trigger is a piece of code which is responsible for starting the
  process of task execution.
 
 In this whole email you say 'task'. Do you mean 'check' in our usual
 terminology, or something else? Especially when describing the data
 structures.

Now I realized that we started to use 'check' in the code, but all our git 
repos are named 'task-*', and some of the READMEs use that term as well. 
Another thing to put in sync?
___
qa-devel mailing list
qa-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/qa-devel