Bug#1076703: amd64-microcode: Please clarify how to check if I'm running the latest microcode

2024-09-05 Thread Matt Taggart
 their system when there isn't one 
(since AMD only updates selectively within families)


The decoder table they maintain there is helpful, as are some of the 
tables on wikipedia. Rather than put anything like that in the debian 
package, maybe just link to those as long as they are being maintained.


2) that prompted me to look at the arch wiki and found this general 
microcode page

  https://wiki.archlinux.org/title/Microcode
which suggests looking for "CPU0" in the boot messages to get the 
smpboot line (with family/model/stepping) and microcode (with 
patch_level). That might be the easiest way for the user to do it, no 
converting dec->hex, and doesn't depend on extra packages like cpuid


3) bonus points if this stuff could be made more consistent between 
amd64-microcode and intel-microcode, lots of people have to deal with 
both and it sucks to have to figure out two systems. Intel's format is 
even worse than AMDs....


Sorry for the giant brain dump, this has been collecting in my brain for 
a while. Let me know what you think and if you want any help crafting or 
reviewing documentation to add.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1074600: openarc: abandoned upstream

2024-07-01 Thread Matt Taggart

Package: openarc
Version: 1.0.0~beta3+dfsg-1~exp4

* The upstream openarc project has not had a commit to master branch 
since Sept 21, 2018. (there is a develop branch last Oct 16, 2020)

* There are many unresolved issues in it's issue tracker
* It seems this implementation was mainly just experimental
* Debian updates are just packaging or policy related
* popcon shows only 20 installs

It's only in experimental currently, so maybe that's ok that it stay 
there if someone cares enough, but otherwise I think it could be removed 
from Debian.


Possible alternatives:
* fastmail's implementation 
https://github.com/fastmail/authentication_milter  RFP #1036235

* opendkim gained some ARC support in 1.4.0 (2021-01-28)
* rspamd has an ARC module, config is here 
https://github.com/rspamd/rspamd/blob/master/conf/modules.d/arc.conf


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1071970: usertag for pcre3

2024-06-12 Thread Matt Taggart

Hi,

It looks like Matthew Vernon helpfully created a usertag to track the 
remaining pcre3 package bugs:


https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=obsolete-pcre3;users=matthew-pcre...@debian.org

Currently:
- 11 Serious, patch available
- 8 Serious, unclassified
- 1 Normal, unclassified
- 9 Serious, forwarded

and a whole lot of Resolved, yay!

--
Matt Taggart
m...@lackof.org



Bug#1073087: pcre2: update homepage

2024-06-12 Thread Matt Taggart

Package: pcre2
Version: 10.43-1
Severity: wishlist

The https://pcre.org/ page is

1) pretty out of date, it lists 10.39 as the latest release, uses old 
URLs, etc


2) it's not clear if it's maintained by the project or someone else. At 
the bottom it says:


"Please note that neither this website nor the SourceForge download 
repositories are maintained by Philip."


3) The Sourceforge page it points to is also out of date

4) Several of the links on the page point to
  https://github.com/PhilipHazel/pcre2
which now redirects to
  https://github.com/PCRE2Project/pcre2

I think the package homepage in debian/control and other places should 
be updated to the https://github.com/PCRE2Project/pcre2 URL.


I started looking into this due to this issue:

 Long-term maintenance of PCRE2
 https://github.com/PCRE2Project/pcre2/issues/426

I suspect whoever takes it over will also take over that github project 
and the URL should remain stable.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1072182: delta: upstream location and 2020-06-22 release

2024-05-29 Thread Matt Taggart

Package: delta
Version: 2006.08.03-13

Maybe the upstream for delta is now

https://github.com/dsw/delta

There was a release on 2020-06-22 which is newer than what the package 
is using, although looking at the commits it's mostly just documentation 
changes.


popcon doesn't show many people using this, but if you care about it 
please adopt it!


--
Matt Taggart
m...@lackof.org



Bug#1070270: riseup-vpn: client no longer works due to cert verification problem

2024-05-15 Thread Matt Taggart



On 5/10/24 07:26, Nilesh Patra wrote:


Going for an upload to unstable followed by an s-p-u.


[2]: https://people.debian.org/~nilesh/riseup-vpn-stable/


I was finally able to install 0.21.11+ds1-5+deb12u1 from the above on my 
bookworm test system and it fixed things and the vpn is working again!

An upload to s-p-u would be great.

Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1070270: riseup-vpn: client no longer works due to cert verification problem

2024-05-02 Thread Matt Taggart

Package: riseup-vpn
Version: 0.21.11+ds1-5+b1
Severity: grave

When attempting to run the bookworm riseup-vpn package, it fails to 
connect to riseup's servers and gives the following output:


2024/05/01 18:21:23 Error fetching eip v3 
json:https://api.black.riseup.net/3/config/eip-service.json


My understanding is that this is due to the package failing to be able 
to verify the current LetsEncrypt cert that host is using. More details at


https://0xacab.org/leap/bitmask-vpn/-/issues/768

(supposedly the current upstream snap has this fixed, but I haven't 
tried it)


As this breaks what the package is supposed to do (at least when using 
riseup as provider, maybe there is a way to point it elsewhere?) I think 
this is grave. Also I think it might be a good candidate for being fixed 
in a stable release update.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#945203: fwupd: Cannot update firmware

2024-04-20 Thread Matt Taggart
I also ran into this "No space left on device" error, but in a different 
situation.


I knew that a particular Dell laptop I was working on had firmware 
available via fwupd, so I had the bright idea to boot Debian Live and 
install fwupd to update it.


But I realized some firmware images (maybe _all_ system BIOS images?) 
actually work by writing things into the EFI partition, to be updated 
upon reboot (like how MS Windows also does it). So my bright idea didn't 
work, since I didn't yet have a drive installed with an EFI partition. 
But due to the error being about "No space" I wasted some time trying to 
resolve that, before realizing the real issue. After I had a proper 
Debian install with EFI it worked fine.


So I think part of the issue here is that fwupd should better detect 
when it's completely missing things it needs to be successful and give 
an improved error and maybe point to documentation about how it works.


In my case it was "no EFI partition", but others in this bug report have 
alluded to things like efivars, the BIOS locking things down, etc. So 
some additional sanity checks of these things would be nice.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#966288: [Pkg-puppet-devel] Bug#966288: mcollective - RM for bullseye?

2024-04-01 Thread Matt Taggart
The last mcollective release was v.3.1.2 tagged on Oct 14, 2018, and 
zero commits after that, so is effectively dead upstream.


Here are the popcon stats
  https://qa.debian.org/popcon.php?package=mcollective

I think it could probably be removed from debian now.

This bug mentioned "bolt" as a possible replacement, that seems to be this:
  https://www.puppet.com/docs/bolt/latest/bolt.html
  https://github.com/puppetlabs/bolt

That project has recent commits and releases.

I searched in debian and found:

bolt - system daemon to manage thunderbolt 3 devices
bolt-lmm - Efficient large cohorts genome-wide Bayesian mixed-model 
association testing

bolt-16 - Post-link optimizer
golang-github-boltdb-bolt-dev - low-level key/value database for Go

So it's a popular name it seems.

WNPP doesn't list anything related.

--
Matt Taggart
m...@lackof.org



Bug#1068201: mcollective: Homepage out of date

2024-04-01 Thread Matt Taggart

Package: mcollective
Version: 2.12.5+dfsg-1.1
Severity: minor

The listed Homepage of
  http://projects.puppetlabs.com/projects/mcollective
currently redirects to
  https://tickets-archive.ops.puppetlabs.net/projects/mcollective
which doesn't resolve.

A search for "mcollective" finds
  https://forge.puppet.com/modules/puppet/mcollective
  https://github.com/voxpupuli/puppet-mcollective

Also in the README.md in that github project there are links to things like
  https://www.puppet.com/docs/mcollective/deploy/standard.html
that are broken. But the link
  https://www.puppet.com/docs/mcollective
redirects to the above forge link.

I guess they moved stuff around but didn't setup all the needed redirects.

So I guess the debian package should update Homepage, but also look for 
any broken links and fix them (in upstream would be ok I think, no need 
for debian patch IMO).


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#238687: popularity-contest: popularity contest should provide subarch info.

2024-01-13 Thread Matt Taggart
It's been quite a while since this bug was discussed, but I have another 
use case where it might be interesting...


There has been some recent discussion about "Architecture Variants" and 
in particular amd64 variants. Fedora and Ubuntu are both working on 
experiments with the goal of being able to optimize for newer versions 
of the amd64 architecture (and potentially dropping older variants at 
some point as well). Here is a page that gathers info on this idea for 
Debian


https://wiki.debian.org/ArchitectureVariants

Knowing information about which variants our installed base is using 
would help make these decisions easier. The past i386 decisions were a 
little easier because there were particular packages we could look at to 
get those numbers.


Side note
In addition to this bug, it seems there are some other cases where 
people would like to press popcon into service to gather other things:


kernel modules
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=202675

report arch only
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545000

report foreign architectures
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931764

Package versions
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=97045

aptitude auto flag
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=313194

package config file data
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816281

We can understand why it is tempting to want to do so. But there are 
also privacy and scope implications. So maybe the first step is a clear 
policy of what is appropriate for popcon to do, and the things that 
aren't should be WONTFIX.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#912725: virtinst: Please demote virtinst recommends on virt-viewer to suggests

2023-12-26 Thread Matt Taggart

Hi,

This bug was opened 5 years ago, but it is still the case as of version 
1:4.1.0-3 that virtinst Recommends virt-viewer and pulls in tons of 
packages that are unneeded in many cases. On my currently freshly 
installed bookworm system (with libvirt already installed):


0 upgraded, 350 newly installed, 0 to remove and 0 not upgraded.
Need to get 243 MB of archives.
After this operation, 854 MB of additional disk space will be used.

vs

0 upgraded, 45 newly installed, 0 to remove and 0 not upgraded.
Need to get 12.4 MB of archives.
After this operation, 52.6 MB of additional disk space will be used.

It's definitely a common use case to use virtinst without virt-viewer 
and it would be nice if this was fixed.


Interestingly, the virt-manager package only Suggests virt-viewer but, 
if anything, I would think the dependency would be stronger there? So 
maybe Recommends or even Depends? But I guess it's possible to use 
virt-manager to manage VMs without ever needing to launch virt-viewer, 
so maybe Suggests is correct there as well.


For those running into this, the work around is to use 
'--no-install-recommends' as Karl mentioned in the original report.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1059499: libguestfs-tools: mention tools in description

2023-12-26 Thread Matt Taggart

Package: libguestfs-tools
Severity: wishlist
Version: 1:1.50.1-4+b3

This is only a wishlist suggestion and you are free to ignore/modify/etc...

It might be nice if the libguestfs-tools package description included a 
list of the more popular tools in this package so running things like 
'apt-cache search virt-builder' find it. But I guess I would not list 
them _all_, so maybe the ones that are often mentioned in documentation 
and maybe a generic catch-all like "contains many virt-* utilities for 
interacting with and manipulating VM disk images".


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1053180: openssl: Make RSA decryption API safe to use with PKCS#1 v1.5 padding (Marvin/Bleichenbacher)

2023-09-28 Thread Matt Taggart

Package: openssl
Version: 3.0.11-1

Recently "The Marvin Attack" aka Bleichenbacher timing attack has been 
in the news again:

  https://people.redhat.com/~hkario/marvin/

CVE-2022-4304 was already fixed in all but buster:
  https://security-tracker.debian.org/tracker/CVE-2022-4304

But the page references an API level pull request upstream:
  https://github.com/openssl/openssl/pull/13817

and there is also this corresponding issue:
  https://github.com/openssl/openssl/issues/13421

The history on that issue is long and complicated and it's not clear to 
me if this has been fixed and if so on what releases? Maybe someone with 
more knowledge of this can make more sense of it?


If it hasn't been fixed this bug can track it.
If it has been fixed it would be nice to have something in changelog or 
NEWS mentioning it.


But separate from that, it would be good to move away from this old 
potentially hazardous method. Is there some way of determining what 
software in Debian might be using this (via openssl API) so those things 
could get fixed as well?


Not much can be done about non-Debian software running on Debian, but we 
want old software to continue to function (at least for a while, 
eventually some sort of logged warning might be nice).


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#973411: spectre-meltdown-checker: Inconsistent output compared to Debian's security tracker

2023-09-19 Thread Matt Taggart

Hi Patrick,

spectre-meltdown-checker has had some updates in this detection code 
since you filed this bug. If you still have access to the hardware you 
generated that report on, could you run a newer version and see if it 
fixes your issue?
(also it might be interesting to test with the old microcode if that is 
still installed, and then newer)


Please report back what you find and also lscpu output so we know what 
CPU this is in particular.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1043321: spectre-meltdown-checker: support for downfall, inception

2023-08-08 Thread Matt Taggart

Package: spectre-meltdown-checker
Version: 0.45-2
Severity: wishlist

There is an upstream issue requesting support for the new Downfall 
architecture vulnerability:


https://downfall.page/
https://github.com/speed47/spectre-meltdown-checker/issues/465

and also AMD Inception

https://comsec.ethz.ch/research/microarch/inception/
https://github.com/speed47/spectre-meltdown-checker/issues/466

--
Matt Taggart
m...@lackof.org



Bug#1042111: chromium: Web Environment Integrity

2023-07-26 Thread Matt Taggart

Package: chromium
Version: 115.0.5790.102-2

Engineers working for Google have proposed a standard named

   Web Environment Integrity

details available at
https://github.com/RupertBenWiser/Web-Environment-Integrity/blob/main/explainer.md

There have been hundreds of articles, social media posts, etc discussing 
this, here is a page that gives a good summary of the events so far:


https://interpeer.io/blog/2023/07/google-vs-the-open-web/

Initially it was a standards proposal, but now it looks that it's 
already implemented


https://github.com/chromium/chromium/commit/6f47a22906b2899412e79a2727355efa9cc8f5bd

Debian needs to figure out if this is something we want in chromium (at 
all, disabled at build time, disabled at runtime, etc).


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#952411: chromium: coming ScrollToTextFragment in Chrome 80

2023-07-26 Thread Matt Taggart

I just rediscovered #952411 which I filed on 23 Feb 2020. Here's an update.

This "ScrollToTextFragment" feature seems to have been added.
Currently on 115.0.5790.98-1~deb11u1 if I go to the following example

https://en.wikipedia.org/w/index.php?title=Cat&oldid=916388819#:~:text=Claws-,Like%20almost,the%20Felidae%2C,-cats

it does scroll to the targeted text and highlight it. That example is 
taken from the draft of the spec at


https://github.com/WICG/scroll-to-text-fragment

Here is a simplified example:

https://www.debian.org/#:~:text=Additional-,information,Debian,-Community

It's also easy to generate similar by selecting some text on a page, 
right-click and "Copy link to highlight".


Notes:
* these URLs seem to do nothing on current firefox-esr
* it looks like Brave disabled it by default
* maybe going into HTML? https://github.com/whatwg/html/issues/8282

Here is the upstream spec issue discussing the privacy implications of this

https://github.com/WICG/scroll-to-text-fragment/issues/76

and discussion about creating ways to disable

https://github.com/WICG/scroll-to-text-fragment/issues/122

Since there is currently no easy way to disable, this lead to someone 
making an extension to disable. "disable-google-search-text-highlights"


I have not attempted to determine if the privacy concerns have been 
addressed or the level of potential threat, someone more familiar with 
this area should do that.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1034814: debian-installer: bootable flag not toggling

2023-04-30 Thread Matt Taggart

On 4/25/23 01:59, Pascal Hambourg wrote:

On 25/04/2023 at 03:24, Matt Taggart wrote:


When in the partitioning and editing a partition, if I am on the 
"bootable" option and select, it does not toggle but remains "no". The 
screen flashes, bot no change. I have not yet checked what ends up in 
the partition table after the install.


Is it a GPT partition table ?


Yes, GPT and EFI, 512gb nvme drive.

GPT is the default partition table type with EFI boot or disk size above 
2 TiB. In GPT, "boot" and "esp" parted flags are equivalent and both 
represent the "EFI system partition" type (IMO this is a big mess).


Being used to doing non-GPT/EFI installs for so long, I did what I have 
always done and toggled the bootable flag on the /boot partition. When 
it didn't change, I tried again and it still didn't change. So it was 
less a bug of it not functioning that it was confusing for the user.



If this should be fixed, not sure how.
- Set/unset the "esp" flag at the same time as the "boot" flag if GPT ?
- Hide the "bootable" option if GPT > - Map the "bootable" option to the 
"legacy_boot" parted flag instead of
"boot" if GPT ? (AFAIK only syslinux/extlinux uses this flag)


IMO "hide the bootable option if GPT" (but maybe that is non-trivial).
Alternatively the value could be displayed as "GPT" and not change when 
toggled.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#999811: HAVEGED is obsolete starting from linux kernel 5.6

2023-04-26 Thread Matt Taggart

On 4/26/23 06:16, Cyril Brulebois wrote:

Control: severity -1 important

Matt Taggart  (2023-04-25):

As reported in #999811 the haveged package is obsolete starting in
linux 5.6 and newer, as the kernel adopted a similar algorithm and
also stopped blocking /dev/random reads.

I am upgrading severity to serious because I believe this is release
critical for bookworm.


No, thanks.


OK.

There may still be reasons to keep haveged in Debian, I do not know.
(do all archs have these >5.6 features? is it still needed in
addition?)


https://bugs.debian.org/1034361#12

1+ month into the hard freeze isn't when you suddenly want to remove a
dependency of the installer.


Sorry, I hadn't seen that bug :(

Post-bookworm I guess...

Thanks,

--
Matt Taggart
m...@lackof.org



Bug#999811: HAVEGED is obsolete starting from linux kernel 5.6

2023-04-26 Thread Matt Taggart

severity 999811 serious
thanks

As reported in #999811 the haveged package is obsolete starting in linux 
5.6 and newer, as the kernel adopted a similar algorithm and also 
stopped blocking /dev/random reads.


I am upgrading severity to serious because I believe this is release 
critical for bookworm.


There may still be reasons to keep haveged in Debian, I do not know. (do 
all archs have these >5.6 features? is it still needed in addition?)

If so:
* sid has 1.9.14, upstream is 1.9.18, several existing debian bugs are fixed
* debian should adopt/implement something like the 
contrib/Fedora/haveged.service unit file mentioned that checks the 
kernel version before deciding to run.
* the vast majority of debian systems with haveged installed probably no 
longer need it on bullseye or newer. If the package will remain, the 
README.Debian should be updated and/or NEWS.Debian to let people know. 
If it's going to be removed from Debian, I'm not sure if it's better to 
have one last version that informs the user, to silently go away, or 
maybe something in the release notes?


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#792456: encrypted swap broken in last several debian releases

2023-04-24 Thread Matt Taggart
The last few debian releases (buster and bullseye at least) configuring 
encrypted swap has been broken for me. I don't know if it's the same as 
what the user in #792456 is seeing, but likely.


I have most recently tested it in Bookworm RC1 and here is what I did:
* run by hand partitioning
* create 3 partitions: boot, swap, lvm
* configure encryption: enable encryption for swap and lvm partitions
  * configure swap to use serpent and random passphrase
  * configure lvm partition to use serpent and key
  * finish
* mark lvm encrypted partition to be used for lvm, configure lvm, setup 
root and var partition

* configure boot partition to be ext4 mounted at /boot
* finish partitioning
* receive error about failure to setup swap

Sorry for the short report, I will try to redo it and capture logs, but 
I wanted to report this ASAP.


My workaround has been to allocate the partition but mark it do not use 
and then finish the setup by hand after install.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1034814: debian-installer: bootable flag not toggling

2023-04-24 Thread Matt Taggart

Package: debian-installer
Version: bookworm-DI-rc1

When in the partitioning and editing a partition, if I am on the 
"bootable" option and select, it does not toggle but remains "no". The 
screen flashes, bot no change. I have not yet checked what ends up in 
the partition table after the install.


Sorry for the crappy report, I will try to provide more details when I 
get a chance to repeat it.


--
Matt Taggart
m...@lackof.org



Bug#1034418: util-linux: fstrim.timer not enabled for upgraded systems

2023-04-18 Thread Matt Taggart

On 4/15/23 15:35, Chris Hofstaedtler wrote:


This behavior might follow the principle of least surprise, but I think for
SSD based systems it is losing out on the benefits of TRIM/discard (improved
i/o latency, flash wear).


Yes. Also it is - to the best of my knowledge - the only way of not
destroying possible admin configuration on upgrades.


I can think of a few situations:

A) installed system pre-bullseye, so not enabled by default. System does 
not have a /etc/systemd/system/timers.target.wants/fstrim.timer symlink.

  1) admin unaware of it, would benefit from it, might want it
  2) admin aware of it, chose not to not have it enabled
B) installed system bullseye or later, enabled by default. If the system 
is lacking the symlink, that means it was explicitly disabled by admin.


My guess is A1 vastly outnumbers A2 and B, but that those may be non-zero.
Does the differentiation between "disabled" and "masked" make any 
difference here? Would an admin that doesn't want it have explicitly 
masked it?


I thought of another case where it would be good to have it enabled by 
default: for virtual machines that use a copy on write filesystem and 
set discard=unmap to tell the virtualization that those blocks can be 
dropped on discard, potentially saving a lot of disk space. fstrim.timer 
not being enabled in the Debian VM hurts the virtualization host(even 
those not running Debian).


I guess it's already documented in README.Debian. Maybe it would be 
interesting to have something in the Bookworm release notes?


--
Matt Taggart
m...@lackof.org



Bug#1034418: util-linux: fstrim.timer not enabled for upgraded systems

2023-04-14 Thread Matt Taggart

Package: util-linux
Version: 2.36.1-8+deb11u1

I recently noticed on my existing bullseye systems that fstrim.timer is 
not enabled by default:


===
# systemctl status fstrim.timer
● fstrim.timer - Discard unused blocks once a week
 Loaded: loaded (/lib/systemd/system/fstrim.timer; disabled; vendor 
preset: enabled)

 Active: inactive (dead)
Trigger: n/a
   Triggers: ● fstrim.service
   Docs: man:fstrim

# systemctl list-timers fstrim.timer
NEXT LEFT LAST PASSED UNIT ACTIVATES

0 timers listed.
Pass --all to see loaded but inactive timers, too.
===

Here's what it looks like when I enable it:
===
# systemctl enable --now fstrim.timer
Created symlink /etc/systemd/system/timers.target.wants/fstrim.timer → 
/lib/systemd/system/fstrim.timer


# systemctl status fstrim.timer
● fstrim.timer - Discard unused blocks once a week
 Loaded: loaded (/lib/systemd/system/fstrim.timer; enabled; vendor 
preset: enabled)

 Active: active (waiting) since Fri 2023-04-14 16:39:49 UTC; 19s ago
Trigger: Mon 2023-04-17 00:23:13 UTC; 2 days left
   Triggers: ● fstrim.service
   Docs: man:fstrim

Apr 14 16:39:49 foo systemd[1]: Started Discard unused blocks once a week.

# systemctl list-timers fstrim.timer
NEXTLEFTLAST PASSED UNIT ACTIVATES
Mon 2023-04-17 00:23:13 UTC 2 days left n/a  n/afstrim.timer 
fstrim.service


1 timers listed.
Pass --all to see loaded but inactive timers, too.
===

It looks this way on all my bullseye systems that were older and 
dist-upgraded to bullseye. I only have one system that was installed 
directly with bullseye and it appeared to be running there (but maybe I 
enabled it by hand at some point and forgot?). I have not checked on 
testing/unstable (fresh install or dist-upgrade).


Looking in the Debian changelog I see in the 2.35.1-2 entry:

"* Enable fstrim.timer by default"

and that seems to correspond to this commit:

https://salsa.debian.org/debian/util-linux/-/commit/b0f405a45b6ea0608ecb51e8b8d68ec1715a83e7

which adds:

  dh_installsystemd --package=util-linux fstrim.timer

Here is the generated section from postinst:
===
# End automatically added section
# Automatically added by dh_installsystemd/13.3.4
if [ "$1" = "configure" ] || [ "$1" = "abort-upgrade" ] || [ "$1" = 
"abort-deconfigure" ] || [ "$1" = "abort-remove" ] ; then

# This will only remove masks created by d-s-h on package removal.
deb-systemd-helper unmask 'fstrim.timer' >/dev/null || true

# was-enabled defaults to true, so new installations run enable.
if deb-systemd-helper --quiet was-enabled 'fstrim.timer'; then
# Enables the unit on first installation, creates new
# symlinks on upgrades if the unit file has changed.
deb-systemd-helper enable 'fstrim.timer' >/dev/null || true
else
# Update the statefile to add new symlinks (if any), 
which need to be

# cleaned up on purge. Also remove old symlinks.
deb-systemd-helper update-state 'fstrim.timer' 
>/dev/null || true

fi
fi
===

So I guess if fstrim.timer was installed at some point but not enabled, 
upgrades would "update-state" but not enable the service?


Was fstrim.timer delivered in buster but not enabled?

This behavior might follow the principle of least surprise, but I think 
for SSD based systems it is losing out on the benefits of TRIM/discard 
(improved i/o latency, flash wear). Given that it only runs once a week, 
I think also there is minimal risk (but it might cause a multiple 
seconds decrease in i/o speed depending on drive).


Can you think of a way this could be enabled for upgraded systems as well?

Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1023205: request to backport memtest86

2022-11-29 Thread Matt Taggart

Fabio Fantoni writes...

> I didn't think about that. I thought new upstream releases are only
> done for special packages which otherwise have no security support
> like Firefox or PHP
>
> But I'll do that now.

This bug is #1023205 but I note there has been no response so far.

I would like to be able to use the new 6.00-1 version in stable as the 
existing version there does not work on many systems, modern but also 
even those 5+ years old. I think there is a good argument for including 
in a stable update, but either way can we get a decision and have it 
available in stable proposed updates or backports soon?


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1024186: linux: consider deprecating unprivileged_userns_clone

2022-11-15 Thread Matt Taggart

Package: linux
Version: 6.0.8-1
Severity: wishlist

In #898446 the decision was made to enable unprivileged_userns_clone by 
default and this shipped in bullseye. In the course of discussion bwh 
suggested:


  So I think we should do something like this:

  * Document user.max_user_namespaces in procps's shipped
/etc/sysctl.conf
  * Set kernel.unprivileged_userns_clone to 1 by default, and deprecate
it (log a warning if it's changed)
  * Document the change in bullseye release notes

The default did get changed, but the other things haven't been done yet.

FYI: I do not know the current state of the upstream patch but I do 
still see it in 
debian/patches/debian/add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by-default.patch


Assuming Debian will not keep it, I propose:
* bookworm should warn users still setting it that's it deprecated
* bookworm should still properly disable it for users setting it to 0
* bookworm release notes should document it going away and the alternative
* bookworm procps should include an example in the default sysctl.conf 
and ps(1) proc(5) manpages

* trixie should remove it and release notes document
* it might also be useful to document in the above which common cases 
require that unpriv userns is enabled, maybe to avoid some footguns


How does that sound?

As a side note:
* desktop machines seem pretty dependent on unpriv userns by now so the 
default should remain enabled
* there are still recent CVEs enabled by unpriv userns, disabling it on 
systems that don't need it is still worthwhile


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#673004: does not connect to HP iLO 2

2022-10-04 Thread Matt Taggart

tags 673004 wontfix
close 673004
thanks

This bug is from 2012. I'm not sure what the problem was at the time, 
but by now any such old HP iLO device identifying as version 
"mpSSH_0.1.0" is unlikely to support a set of ciphers/Kex/MACs/etc to 
allow a recent version of openssh in debian to be able to connect to it, 
even with work-arounds. The world has moved on.


If you are on a current version of debian and encounter problems 
connecting to such a device, first ensure that your devices firmware is 
the latest version and then open a new bug with detailed debugging info 
(and know that the answer still might be "sorry, the manufacturer 
stopped updating it and we can't support connecting to it").


Good luck,

--
Matt Taggart
m...@lackof.org



Bug#774711: openssh-server: insecure algorithms reported by ssh-audit

2022-10-04 Thread Matt Taggart

Thanks for the ssh-audit report output!
There has been a very long discussion of default settings in #774711 
(which now includes ssh-audit's recommendations)


Since you generated this report the following has happened:

* 1:8.8p1-1:
  "This release disables RSA signatures using the SHA-1 hash algorithm
   by default.  (Existing RSA keys may still be used and do not need
   to be replaced; see NEWS.Debian if you have problems connecting to
   old SSH servers.)"
* 1:8.9p1-1:
  "ssh(1): stricter UpdateHostkey signature verification logic on the
   client-side. Require RSA/SHA2 signatures for RSA hostkeys except when
   RSA/SHA1 was explicitly negotiated during initial KEX.
   ssh(1), sshd(8): fix signature algorithm selection logic for
   UpdateHostkeys on the server side. The previous code tried to prefer
   RSA/SHA2 for hostkey proofs of RSA keys, but missed some cases. This
   will use RSA/SHA2 signatures for RSA keys if the client proposed
   these algorithms in initial KEX."
* 1:9.0p1-1:
  "use the hybrid Streamlined NTRU Prime + x25519 key exchange method
   by default ("sntrup761x25519-sha...@openssh.com"). The NTRU algorithm
   is believed to resist attacks enabled by future quantum computers and
   is paired with the X25519 ECDH key exchange (the previous default) as
   a backstop against any weaknesses in NTRU Prime that may be
   discovered in the future. The combination ensures that the hybrid
   exchange offers at least as good security as the status quo."
* sk-ssh-ed25...@openssh.com is the defaults lists now

The rest of ssh-audit's recommendations from your report are still 
valid, see #774711 for more info


--
Matt Taggart
m...@lackof.org



Bug#774711: update of debian openssh crypto defaults

2022-10-04 Thread Matt Taggart
'-','*' syntax, it is possible to specify 
configuration changes relative to the default, in a way that 
future-proofs the config for additions/removals in future upstream 
versions. Right now that might look something like


==
Ciphers -3des-cbc,aes*-cbc,rijndael-...@lysator.liu.se

KexAlgorithms -ecdh-sha2-nistp*,,
diffie-hellman-group14-*,diffie-hellman-group1-sha1

MACs -umac-64*,hmac-sha1*,umac-...@openssh.com,
hmac-sha2-256,hmac-sha2-512

HostKeyAlgorithms -ecdsa-sha2-nistp*, sk-ecdsa-sha2-nistp*,
ssh-rsa-cert-...@openssh.com,ssh-rsa
==

But one might choose to explicitly list the things to enable to prevent 
surprises (at the risk of continuing to support something that upstream 
drops from the default).


When I set out to write this, I was hoping everything in the original 
report had been dealt with by now, there has been a lot of progress 
upstream. But it seems there are still a few things left, let push to 
get this done!


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1020385: sysdig: upstream site

2022-09-20 Thread Matt Taggart

Package: sysdig
Version: 0.29.3-1
Severity: minor

Homepage:
It appears the http server for the domain sysdig.org now redirects to 
sysdig.com. That host is not listening on https, so browsers attempting 
to go direct to https won't get the redirect.


Also the page https://sysdig.com/opensource/ points to the following:
  https://github.com/draios/sysdig

So maybe:
* update the Homepage in debian/control to https://sysdig.com
* adjust Source in debian/copyright to https://github.com/draios/sysdig

Thanks,

--
Matt Taggart
m...@lackof.org



Bug#774711: OpenSSH settings hardening

2022-08-17 Thread Matt Taggart

Hi,

Some updates on OpenSSH config hardening

1) The ssh-audit tool that Mathew Binkley pointed out has been forked 
and updated and lives at


  https://github.com/jtesta/ssh-audit

2) The sshaudit.com site now uses the above version.

3) The sshaudit.com site also now provides a hardening guide

  https://www.ssh-audit.com/hardening_guides.html

that was inspired by the original stribika.github.io page mentioned here.

I like Mathew's idea of aiming for a config that scores well, with 
commented out configs for enabling compatibility for older clients.


--
Matt Taggart
m...@lackof.org



Bug#526469: manpage missing for sysfs.conf

2022-08-03 Thread Matt Taggart

On 8/3/22 16:28, Guillem Jover wrote:


What about something like the attached page?


Looks great!
I guess "These file" in the second paragraph should be "These files" to 
be consistent with the first. It's a little confusing since you might be 
talking about sysfs.conf or files in /etc/sysfs.d/... I checked to see 
what sysctl does and they have separate manpages for sysctl.conf and 
sysctl.d, so I guess that's an option too.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#750425: libsysfs2: memory leaks detected in libsysfs

2022-08-03 Thread Matt Taggart

This bug is from 2014, but I did just notice these commits to upstream

https://github.com/linux-ras/sysfsutils/commit/085bba6bab1ccaa89041639a7e070390fdea440a

that look like they probably fix this. However it looks like they 
happened _after_ the 2.1.1 release.


It would be good to confirm those commits fix the leaks (and maybe 
confirm there aren't any others introduced since 2014) and then also for 
upstream to release a new version with the fixes.


Thanks,

--
Matt Taggart
m...@lackof.org



Bug#1016610: sysfsutils: systemd service

2022-08-03 Thread Matt Taggart

Package: sysfsutils
Version: 2.1.1-1
Severity: wishlist

It might be nice if sysfsutils provided a systemd service file. I guess 
it would be a simple oneshot service.


I was thinking maybe the existing systemd-sysctl.service file would be a 
useful starting point, but then I realized that systemd seems to provide 
that itself (rather than procps):


$ dpkg -L systemd |grep sysctl
/etc/sysctl.d
/lib/systemd/system/systemd-sysctl.service
/lib/systemd/systemd-sysctl
/usr/lib/sysctl.d
/usr/lib/sysctl.d/50-pid-max.conf
/usr/share/man/man5/sysctl.d.5.gz
/usr/share/man/man8/systemd-sysctl.service.8.gz
/etc/sysctl.d/99-sysctl.conf
/lib/systemd/system/sysinit.target.wants/systemd-sysctl.service
/usr/share/man/man8/systemd-sysctl.8.gz

So having systemd do it is another option I guess. But procps is 
Priority: important and sysfsutils is Priority: optional, so sysfs isn't 
necessarily installed on all systems with systemd like procps is. So now 
I am unsure which is the best way to implement.


What do you think?

Thanks,

--
Matt Taggart
m...@lackof.org



Bug#473413: sysfsutils and events

2022-08-03 Thread Matt Taggart
The sysfsutils bugs #562939 and #473413 are sort of similar, both 
involve what sysfs should do upon particular dynamic (not at boot) events.


I think this is maybe something better handled by udev? It already knows 
how to do things by matching keys in sysfs. But I don't know about 
modifying sysfs attribs triggered by udev events.


I guess an argument could be made that sysfs is at a lower level than 
udev and that maybe a better analogy is modprobe. But modprobe is a 
userspace utility that loads the module and can check for module 
parameters before doing so. In the sysfs case we're expecting that once 
a new /sys/ interface shows up, if there exist things in 
/etc/sysfs.{conf,d/*} that match it should apply them? I'm not sure how 
that should be implemented.


--
Matt Taggart
m...@lackof.org



Bug#526469: manpage missing for sysfs.conf

2022-08-03 Thread Matt Taggart

Here are some notes about documenting sysfs.conf

* sysfs(2) is about the syscall and isn't helpful in this context
* sysfs(5) (in manpages package) explains a little about sysfs, but not 
how to interact with it.
* The kernel documentation 
https://www.kernel.org/doc/Documentation/filesystems/sysfs.txt is 
targetted at people writing sysfs interfaces and mostly not useful, but 
mentions that interfaces need to be documented in ABI 
https://www.kernel.org/doc/Documentation/ABI/stable/ and that might be 
useful to mention as a place where users can read about how to interact 
with various parts.
* The default delivered sysfs.conf file has some comments at the top 
about general syntax and examples.

* should document /etc/sysfs.d/ and how to use it (load order, etc)
* should maybe explain the difference between sysfs and sysctl

So I think a sysfs.conf manpage could be pretty simple, mostly the 
comments already in the default file and some pointers to the other places.


--
Matt Taggart
m...@lackof.org



Bug#527397: [approx] Please add IPv6 support by default (inetd.conf change)

2022-07-25 Thread Matt Taggart

Here's an update on approx and IPv6:

* approx 5.4-1 (08 Dec 2013) first added the systemd socket files, but 
the postinst was still using update-inetd. This release also added an 
example xinetd conffile
* approx 5.7-3 removed the use of update-inetd in the postinst to enable 
the service. The patch included in this bug (and blocked by #24043) is 
no longer relevant.
* Users still using /etc/inetd.conf style inetd servers can add the tcp6 
entry themselves and that will work.
* (Most) users using the systemd socket files which use "ListenStream" 
will get IPv4 and IPv6 (unless BindIPv6Only is set)
* I don't know how xinetd will handle it (how does the provided example 
specify what port to listen on?)


So I think the spirit of the original wishlist bug "Please add IPv6 
support by default" is met by systemd doing that by default, and there 
are ways for enabling support on the other inetd servers.


So I think this can be closed, yay!

--
Matt Taggart
m...@lackof.org



Bug#943752: memtest86+: Please switch source tree

2021-02-11 Thread Matt Taggart

The coreboot fork of memtest86+ at

https://review.coreboot.org/q/project:memtest86plus

has commits as recently as Aug 31 2020 (although I don't see those if I 
clone https://review.coreboot.org/memtest86plus directly).


I don't know if that project is related to or coordinating with the 
recent upstream 5.31b changes. I can't find an upstream source code repo 
or bug tracker. It would be good if people could collaborate on these 
things...


There is a suggestion on the coreboot project ideas page to take the 
memtest86+ suite and make it more generic payload that could run on 
non-x86 platforms as well


https://doc.coreboot.org/contributing/project_ideas.html#libpayload-based-memtest-payload

That would be a great goal (but maybe just getting a common working code 
base would be a good start).


--
Matt Taggart
tagg...@debian.org



Bug#780174: memtest86 nonfree

2021-02-11 Thread Matt Taggart

Is it time for memtest86 (not memtest86+) to either:

a) fork from the last free version
b) move to nonfree (if allowed)
c) be removed from debian in favor of memtest86+

?

memtest86+ has recently been seeing some updates (although the new stuff 
is still in beta and buggy). Also while searching I found this idea in 
the coreboot wiki to make a memory tester payload that wasn't x86 
specific (well, might still have x86 specific support, but would also 
work elsewhere) 
https://doc.coreboot.org/contributing/project_ideas.html#libpayload-based-memtest-payload


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#123150: bb audio still causes video to stop iff pulseaudio is installed

2021-01-16 Thread Matt Taggart

On 1/16/21 10:25 AM, Axel Beckert wrote:


Matt: You said, you had the issue also on the console. Could you check
if that "pasuspender -- env PULSE_SERVER= bb" command workarounds the
issue for you on the virtual console, too? Maybe there's more virtual
console support from pulseaudio nowadays…


When I run that on a vc I get a brief error flash by about not being 
able to open an audio device and then BB runs, but no audio (even though 
I selected it). But at least it doesn't hang.


--
Matt Taggart
tagg...@debian.org



Bug#974533: new upstream (20201110 ) for RAPL/Platypus fixes

2020-12-09 Thread Matt Taggart
When will this get fixed in buster? I had thought it might go into the 
buster stable release update but I don't see it (but also it's non-free 
so weird).


--
Matt Taggart
tagg...@debian.org



Bug#976792: libwireshark11: library is huge

2020-12-07 Thread Matt Taggart

Package: libwireshark11
Version: 2.6.8-1.1
Severity: normal

Is it normal for libwireshark.so.11.1.8 to be almost 80MB? It's by far 
the largest library on my system. The next largest is libLLVM-7.so.1 at 
58MB, and then some other toolkit and compiler libs below 50MB and then 
it drops off quickly with 99% of system libraries being under 1MB.
strip(1) doesn't seem to reduce it, but maybe there is some bloat in 
there that's not supposed to be?


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#917128: udev 240 breaks network interface naming

2020-10-30 Thread Matt Taggart
I am seeing this bug on buster, currently udev 241-7~deb10u4. Somehow I 
wound up with /etc/systemd/network/*.link files that I did not create 
(maybe a postinst migration script did?).


To get my old working config working again I did:
* rm /etc/systemd/network/*
* rm /etc/udev/rules.d/70-*
* add net.ifnames=0 to cmdline

and now I'm not getting the renamed interfaces and my vlans work as they 
did in stretch.


It would be nice if this could be fixed in buster.

Also...
I'd be willing to move to the new systemd way of setting up vlans, but I 
can't find a good tutorial of how to do so in Debian. The best docs I've 
found so far was this Arch wiki link


https://wiki.archlinux.org/index.php/VLAN

but that seems like maybe it's more complicated than it needs to be. So 
this is also a wishlist for better docs of the "right" way to be doing 
this in buster and newer.


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#958883: unattended-upgrades pegs CPU at 100% for an extended period

2020-07-31 Thread Matt Taggart
I am also seeing unattended upgrade consume 100% CPU. Attached is a 
image of the cpu usage that started upon upgrade to buster. Each time uu 
runs the system has 30-40mins of 100% cpu spinning.


The system is running the current buster version, 1.11.2.

I see:
#958883 (this bug) - fixed in 2.4, might be the same issue?
#899366 - fixed in 1.4
#960966 - still open but strace seems different

The last things I see in strace -f are:


recvmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=NULL, 
iov_len=0}], msg_iovlen=1, msg_controllen=0, 
msg_flags=MSG_CTRUNC|MSG_TRUNC|MSG_CMSG_CLOEXEC}, 
MSG_PEEK|MSG_TRUNC|MSG_CMSG_CLOEXEC) = 20
recvmsg(5, {msg_name={sa_family=AF_NETLINK, nl_pid=0, 
nl_groups=}, msg_namelen=128->12, msg_iov=[{iov_base={{len=20, 
type=NLMSG_DONE, flags=NLM_F_MULTI, seq=0, pid=31505}, 0}, iov_len=20}], 
msg_iovlen=1, msg_controllen=0, msg_flags=MSG_CTRUNC|MSG_CMSG_CLOEXEC}, 
MSG_CMSG_CLOEXEC) = 20

brk(0x79c5000)  = 0x79c5000
brk(0x7a1f000)  = 0x7a1f000
mmap(NULL, 1052672, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x7f257770d000

mremap(0x7f257770d000, 1052672, 2101248, MREMAP_MAYMOVE) = 0x7f257750c000
mremap(0x7f257750c000, 2101248, 4198400, MREMAP_MAYMOVE) = 0x7f257710b000


I considered trying 2.5 from testing but it wants to pull in newer apt 
and some other things.

Is a backport of 2.5 to buster possible for testing?
Let me know if you want me to try anything.
This seems important enough to fix in a stable update.

--
Matt Taggart
tagg...@debian.org



Bug#890343: default qdisc

2020-07-14 Thread Matt Taggart
Regarding the default qdisc setting, here's an interesting article in 
Phoronix about fq_pie


Linux 5.9 To Allow Defaulting To FQ-PIE Queuing Discipline For Fighting 
Bufferbloat

https://www.phoronix.com/scan.php?page=news_item&px=Linux-5.9-FQ-PIE-QDISC

I think this only means it's possible for it to be set as the default in 
5.9, I don't know what the upstream kernel will ship with as a default.


The Debian default needs to be updated, fq_codel would be a good choice, 
maybe fq_pie is a good choice starting in 5.9 as well.


Any comments on this or my previous questions from April? What needs to 
happen for this to change?


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#964488: UDD: browse upstream versions

2020-07-07 Thread Matt Taggart

Package: qa.debian.org
User: qa.debian@packages.debian.org
Usertags: udd
Version: 20200707
Severity: wishlist

I would like a way to browse upstream versions in different ways. I 
don't know how much is already in the database but here are some fields 
I've thought of.


For packages with a newer upstream:
* time since latest debian upload to present. (aka how much newer in 
time is upstream)
* time since upstream with a greater version than debian latest (aka how 
long the package could have been updated, would need to know when uscan 
detected versions)
* how many new upstream versions have happened since the current debian 
latest (this might require info about multiple uscan results?).
* delta from debian version to upstream version (arbitrary and can't be 
compared package to package, but might still be interesting)


Maybe there are more?

Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#890343: linux: make fq_codel default for default_qdisc

2020-04-23 Thread Matt Taggart

On 4/23/20 4:24 PM, Noah Meyerhans wrote:

On Thu, Apr 23, 2020 at 03:34:06PM -0700, Matt Taggart wrote:

fq_codel is better in every way than pfifo_fast and I am unaware of any
reason why it would not be a better default. (but don't trust me, ask the
kernel networking experts)


Isn't CAKE supposed to be even better than fq_codel, including better
handling of both large numbers of flows (e.g. busy routers) and small
systems with limited resources.

https://www.bufferbloat.net/projects/codel/wiki/Cake/

If we consider a change (which I think we should), is there a reason we
wouldn't go with CAKE?


In net/sched/Kconfig, the options for NET_SCH_DEFAULT are:
 fq, codel, fq_codel, sfq, pfifo_fast

Also Documentation/admin-guide/sysctl/net.rst explains:

  default_qdisc
  -

  The default queuing discipline to use for network devices. This allows
  overriding the default of pfifo_fast with an alternative. Since the 


  default queuing discipline is created without additional parameters so
  is best suited to queuing disciplines that work well without
  configuration like stochastic fair queue (sfq), CoDel (codel) or fair
  queue CoDel (fq_codel). Don't use queuing disciplines like
  Hierarchical Token Bucket or Deficit Round Robin which require setting
  up classes and bandwidths. Note that physical multiqueue interfaces
  still use mq as root qdisc, which in turn uses this default for its
  leaves. Virtual devices (like e.g. lo or veth) ignore this setting and
  instead default to noqueue.

CAKE, while better for AQM, requires interface specific parameters and 
so won't work for a default (and also is generally used in conjunction 
with fq_codel)


--
Matt Taggart
tagg...@debian.org



Bug#890343: linux: make fq_codel default for default_qdisc

2020-04-23 Thread Matt Taggart
#890343 was originally opened against systemd asking to install the 
upstream systemd sysctl.d/50-default.conf file that sets:


net.core.default_qdisc = fq_codel

As explained in #950701 (and the systemd debian changelog) the debian 
systemd maintainers felt that systemd in debian should not be changing 
kernel policies (and I agree).

So #890343 was reassigned to linux to consider changing the default.

fq_codel is better in every way than pfifo_fast and I am unaware of any 
reason why it would not be a better default. (but don't trust me, ask 
the kernel networking experts)


Can we change it?

Related thoughts:
* ubuntu issue, looks like maybe they already switched by default due to 
the systemd change? 
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/1773157
* another ubuntu issue that might help 
https://bugs.launchpad.net/ubuntu/+bug/940541
* are there other related defaults that should change too? like tcp_ecn, 
syncookies, BBR, etc

* what are upstream kernel defaults and why?

--
Matt Taggart
tagg...@debian.org



Bug#123150: bb audio still causes video to stop

2020-03-29 Thread Matt Taggart
I am still seeing the problem with bb audio causing video to stop. The 
audio keeps playing but the video freezes. Answering no to the initial 
music prompt allows the video to work the whole way through.


Same problem both under X and in virtual console.

Running:

buster
bb: 1.3rc1-11
libmikmod3: 3.3.11.1-4

--
Matt Taggart
tagg...@debian.org



Bug#952411: chromium: coming ScrollToTextFragment in Chrome 80

2020-02-23 Thread Matt Taggart

Package: chromium
Version: 80.0.3987.106-1

I just saw this article about a new feature coming in Chrome 80,

https://www.forbes.com/sites/gordonkelly/2020/02/23/google-chrome-80-upgrade-deep-linking-update-chrome-browser/

That seems like something we want to not include in debian chromium.
I ran a grep on the current unstable source and this is what it found.

$ rgrep ScrollToTextFr
third_party/blink/renderer/core/page/scrolling/text_fragment_anchor.cc: 
// https://wicg.github.io/ScrollToTextFragment/#should-allow-text-fragment
third_party/blink/renderer/core/frame/fragment_directive.idl:// 
https://github.com/WICG/ScrollToTextFragment


Based on those I then searched for "TextFragment" which found a lot more 
(but I don't know which are relevent).


Maybe someone who understands the chromium source can investigate further.

Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#951232: smokeping: document apache setup

2020-02-12 Thread Matt Taggart

Package: smokeping
Version: 2.7.3-2
Severity: wishlist

smokeping upstream doesn't really provide much documentation on how to 
setup smokeping in apache. The debian package at least provides the 
/etc/apache2/conf-available/smokeping.conf file which helps a lot.


In addition to that, here are some things I had to do:

* install alias module so that ScriptAlias and Alias work
* install mpm_prefork and cgi modules (is there a way to use event or 
worker?)

* setup SSL with letsencrypt
  - install the ssl module, and also the mime module since ssl uses
  AddType and socache_shmcb module
  - if you are doing this and using the webserver itself to provide
   proof of controlling the host you might need to exclude the
   .well-known dir with something like:
 RedirectMatch ^/(?!.well-known.*)$ 
https://example.com/smokeping/smokeping.cgi

* install authz_core module since "Require all granted" is used
* I also password protected mine which required: auth_basic,
   authn_core, authn_file

The webserver section of the upstream install document at
https://oss.oetiker.ch/smokeping/doc/smokeping_install.en.html
mentions:

   The important thing is, to have a webserver which allows you to run
   CGI and preferably FastCGI scripts. If you are using Apache I
   strongly recommend using the suexec system for running CGI scripts as
   a particular user.

   See http://httpd.apache.org/mod_fcgid/mod/mod_fcgid.html and
   http://httpd.apache.org/docs/2.2/mod/mod_suexec.html for more
   information on this.

It would be nice to document how to do this and maybe switch the 
conf-available to use that method.


Maybe these things could be made into a README.apache that could be 
included. It could start with


"The smokeping package includes an apache config at 
/etc/apache2/conf-available/smokeping.conf that is enabled by default." 
and the talk about the needed modules and maybe how to a2disconf it and 
Include it in another conf instead, etc.


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#948844: debmake: option for git maintained packages

2020-01-25 Thread Matt Taggart

On 1/25/20 9:31 AM, Sean Whitton wrote:

Hello Matt, others,

On Mon 13 Jan 2020 at 02:05PM -08, Matt Taggart wrote:


I am working on creating a new package and I have chosen use the
'dgit-maint-merge' method of packaging (see dgit-maint-merge(7) in the
dgit package).

This method (and some of the other dgit(1) recommended methods)
generates the initial packaging out of a checked out git repository,
rather than an unpacked upstream tarball in a versioned directory and
orig tarball.


I have only ever used debmake to generate the contents of debian/, after
I've already got the upstream source into git myself.  Are you asking
for debmake to do that for you if you provide it with an upstream git
repo clone URI?


I am following the the "When upstream tags releases in git" section of 
dgit-maint-merge(7) and when I get to the "Now go ahead and 
Debianise..." section I'd like to be able to run debmake, but it's 
expecting the source dir to have a particular name and the orig tarball 
to exist.



s/debhelper/debmake/ right?


Yes, sorry.

1) don't create debian/patches/

2) don't create debian/source/local-options

3) I'm not sure if watch is needed

4) create debian/source/options containing:
single-debian-patch
auto-commit

5) create debian/source/patch-header with a description of how to get
changes to the upstream source. I guess this should be a template that
fills in package name and git repo?

For #3 and #4 see the dgit-maint-merge(7) manpage for examples and
explanation.


I think that debmake might not be the right place for (2), (4) and (5).
Instead, I think a 'maintmerge' script in the dgit package should do
that setup, so that non-debmake users can take advantage.  See #852226.


debmake is already creating a template for (2).
I like the idea of putting these steps in a dgit script though and 
having the dgit-maint-merge(7) manpage explain how to use it. Then maybe 
debmake could add a basic mode to handle the other remaining things.


--
Matt Taggart
tagg...@debian.org



Bug#949456: vmdb2: grub failure with mklabel gpt

2020-01-20 Thread Matt Taggart

Package: vmdb2
Version: 0.13.2+git20191220-1

When I use the example yaml config at

https://vmdb2-manual.liw.fi/#getting-started

I get the following error:

Exec: ['chroot', '/tmp/tmpyacmp7io', 'grub-install', '--target=i386-pc', 
'--no-nvram', '--force-extra-removable', '--no-floppy', 
'--modules=part_msdos part_gpt', 
'--grub-mkdevicemap=/boot/grub/device.map', '/dev/loop0']
ERROR: Command failed: chroot /tmp/tmpyacmp7io grub-install 
--target=i386-pc --no-nvram --force-extra-removable --no-floppy 
--modules=part_msdos part_gpt --grub-mkdevicemap=/boot/grub/device.map 
/dev/loop0

b''
b"Installing for i386-pc platform.\ngrub-install: warning: this GPT 
partition label contains no BIOS Boot Partition; embedding won't be 
possible.\ngrub-install: warning: Embedding is not possible.  GRUB can 
only be installed in this setup by using blocklists.  However, 
blocklists are UNRELIABLE and their use is discouraged..\ngrub-install: 
error: will not proceed with blocklists.\n"

Something went wrong, cleaning up!


If I change the mklabel step to use msdos instead of gpt then it works.

From IRC:

 ...It is, of course, missing a magic number in the device... 
But, yes, it makes sense that the generated image is not listed in 
/boot/grub/device.map


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#949455: vmdb2: new copy-file step

2020-01-20 Thread Matt Taggart

Package: vmdb2
Version: 0.13.2+git20191220-1
Severity: wishlist

I would like to be able to use the new copy-file step listed at

https://vmdb2-manual.liw.fi/#step-copy-file

It looks like it was added here

http://git.liw.fi/vmdb2/commit/?id=eabf1e8fc87fa581db997f2506a9ad708f1420e3

but that it didn't make it in the current version in unstable. So when 
it makes sense, please consider a new version in unstable (and maybe a 
buster backport when it goes into testing).


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#948844: debmake: option for git maintained packages

2020-01-13 Thread Matt Taggart
I also realized for dgit-maint-merge debhelper might want to do the 
following differently:


1) don't create debian/patches/

2) don't create debian/source/local-options

3) I'm not sure if watch is needed

4) create debian/source/options containing:
  single-debian-patch
  auto-commit

5) create debian/source/patch-header with a description of how to get 
changes to the upstream source. I guess this should be a template that 
fills in package name and git repo?


For #3 and #4 see the dgit-maint-merge(7) manpage for examples and 
explanation.


--
Matt Taggart
tagg...@debian.org



Bug#948844: debmake: option for git maintained packages

2020-01-13 Thread Matt Taggart

Package: debmake
Version: 4.3.1-1
Severity: wishlist

I am working on creating a new package and I have chosen use the 
'dgit-maint-merge' method of packaging (see dgit-maint-merge(7) in the 
dgit package).


This method (and some of the other dgit(1) recommended methods) 
generates the initial packaging out of a checked out git repository, 
rather than an unpacked upstream tarball in a versioned directory and 
orig tarball.


I would like debmake to have an option to support this method and just 
setup the debian directory with the templates filled in. Maybe such an 
option would require -p and -u to get the package name and version since 
it might not be able to determine them from the directory/tarball, that 
would be OK I think. It might also not be able to distinguish between 
debian native and upstream packages either, so might default to upstream 
unless -n is specified.


What do you think?

Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#944686: spectre-meltdown-checker: support for new TAA CVE-2019-11135

2019-11-13 Thread Matt Taggart
Package: spectre-meltdown-checker
Version: 0.42-2
Severity: wishlist

It looks like upstream added some changes for the new TAA vulnerability
CVE-2019-11135, made some other fixes since 0.42, updated the mcedb,
etc. but hasn't yet issued a new release. It looks like maybe they are
still working on solving #314 first?

Anyway hopefully a new upstream is coming soon and it would be good to
make available for stretch/buster.

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#933217: RM: check-mk -- RoQA, RC-Buggy, unmaintained, no reverse dependency

2019-10-08 Thread Matt Taggart
On 10/8/19 2:06 PM, Moritz Mühlenhoff wrote:
> On Mon, Sep 30, 2019 at 09:34:46AM -0700, Matt Taggart wrote:
>> Hi,
>>
>>
>> I think it's fine for check-mk to be removed from unstable, if it does
>> end up in Debian again it will be repackaged and should go through NEW
>> again anyway.
> 
> Ack, I've just filed a removal bug. I suppose the version from
> experimental should be removed as well?

Yes.

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#933217: RM: check-mk -- RoQA, RC-Buggy, unmaintained, no reverse dependency

2019-09-30 Thread Matt Taggart
Hi,

Thanks for opening this bug, this should have been discussed a while ago.

check-mk in debian was originally packaged and uploaded for Debian when
it was a pretty basic nagios add-on. Since then upstream has both
continued to add features and automation layers above that basic
functionality (OMD, BI, etc) and also at the same time made a commercial
business out of selling support and added non-FOSS components.

It is now very difficult to support the check-mk core functionality as
it's packaged in Debian. I began packaging the 1.4.0 stable release and
realized that the levels of integration of the core functionality and
the higher layers were going to make it nearly impossible to untangle.

For check-mk to continue in Debian we'd need to either:

1) fork the "Checkmk Raw Edition (CRE)" and work to remove the
dependencies and non-FOSS integration, maintaining the fork over time
and merging changes made to the core agents.

2) repackage the FOSS components, adopting all of upstream's levels of
automation and integration as a monolithic package and no longer just be
an add-on for other monitoring system.

My own use of check-mk involved using a puppet module to automatically
configure checks for new systems as they were added, by automatically
editing config files. This does not work well with the "full stack"
model where the administrator is expected to do things via a UI. So
option #2 is not interesting to me, and option #1 sounds like a lot of
work. What I need to do next is investigate icinga2's equivalent
functionality and see if that's a good replacement option.

I think it's fine for check-mk to be removed from unstable, if it does
end up in Debian again it will be repackaged and should go through NEW
again anyway.

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#695873: memtest86+: Serial console does not work

2019-08-13 Thread Matt Taggart
I have also confirmed the patch to fix serial console that was sent to
#695873 works. I was applying it to 5.01-3, building on buster,
installed and booted fine. Please apply.

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#931866: debirf: dpkg-divert warnings

2019-07-11 Thread Matt Taggart
Package: debirf
Version: 0.38
Severity: minor

I noticed some warnings when running debirf on buster

dpkg-divert: warning: please specify --no-rename explicitly, the default
will change to --rename in 1.20.x
Removing 'diversion of /sbin/ldconfig to /sbin/ldconfig.REAL by fakechroot'
dpkg-divert: warning: please specify --no-rename explicitly, the default
will change to --rename in 1.20.x
Removing 'diversion of /usr/bin/ldd to /usr/bin/ldd.REAL by fakechroot'

Buster released with dpkg 1.19.7, so probably this will break once dpkg
development resumes in testing.

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#931863: debirf: buster build fails to create initrd

2019-07-11 Thread Matt Taggart
Package: debirf
Version: 0.38

When running a debirf build on a buster machine, building a stable
(buster) rescue image, everything works up until creating the initrd

...
debirf> modules complete
debirf> creating debirf initrd ('nested')...
cp: cannot stat '/home/taggart/debirf/rescue/root/lib/klibc-*': No such
file or directory

-- 
Matt Taggart
tagg...@debian.org



Bug#930966: RFP: pwnat -- allows clients behind NATs to communicate

2019-06-23 Thread Matt Taggart
Package: wnpp
Severity: wishlist

* Package name: pwnat
  Version : 0.3
  Upstream Author : Samy Kamkar 
* URL : https://samy.pl/pwnat/
* License : GPL
  Programming Lang: C
  Description : allows clients behind NATs to communicate

Pronounced "poe-nat", a tool that allows any number of clients behind
NATs to communicate with a server behind a separate NAT with *no* port
forwarding *no* DMZ setup, and *no* 3rd party involvement. The server
does not need to know anything about the clients trying to connect.

The same author wrote a similar tool, chownat https://samy.pl/chownat/ ,
which might make sense for whomever packages this to also package.


-- 
Matt Taggart
tagg...@debian.org



Bug#576359: usb bootdrive utilities in Debian

2019-02-15 Thread Matt Taggart
Today I was looking for utilities to create bootable USB drives. In WNPP
I discovered quite a few ITP/RFPs for these types of tools:

https://bugs.debian.org/cgi-bin/bugreport.cgi?915458
multibootusb -- A cross platform utility to create multi boot live Linux
on a removable USB disk

https://bugs.debian.org/cgi-bin/bugreport.cgi?576359
usb-creator-to-be-renamed -- startup disk creator#718301
fedora-liveusb-creator -- Cross-platform tool for installing live
operating systems on to USB flash drives

https://bugs.debian.org/cgi-bin/bugreport.cgi?732647
mintstick -- USB stick formatter and ISO image writer

https://bugs.debian.org/cgi-bin/bugreport.cgi?831981
mkusb - Tool to make boot drives.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718301
fedora-liveusb-creator -- Cross-platform tool for installing live
operating systems on to USB flash drives (now MediaWriter)

https://bugs.debian.org/cgi-bin/bugreport.cgi?869875
woeusb -- Bootable USB Storage Creator for Windows Installer/PE

And already in debian there is debootstick and some other efi/iso tools.

Some of these are old and may not be supported/useful any more.
Some of these may be distro/OS specific,
But hopefully there is one that is being maintained and is generic
enough to replace what the others do so we don't need to maintain all
these things.

Submitters/participants, please reply to your bugs (trim cc list
accordingly) and let us know what's going on with these.

-- 
Matt Taggart
tagg...@debian.org



Bug#869875: ITP: woeusb

2019-02-15 Thread Matt Taggart
I was looking at #869875 since I was looking for something like woeusb.
The upstream packaging was able to produce a debian package with some
minor modifications (to follow normal debian process rather than
upstream's package build process and mk-build-deps/gdebi stuff).

I was looking at how it works and discovered in the source that it does
a wget from a github url in order to grab a raw uefi-ntfs image file

  https://github.com/slacka/WoeUSB/blob/master/src/woeusb#L1167

that repository in turn gets it from the uefi-ntfs project

  https://github.com/pbatard/uefi-ntfs

which also depends on EfiFS

  https://github.com/pbatard/efifs

Obviously this is bad for security/Free Software/reliability reasons.

But all of the above appear to be Free Software, so it might be possible
to package them and have that image file available via a binary package
at runtime when woeusb needs it.

Thanks,

-- 
Matt Taggart
tagg...@debian.org



signature.asc
Description: OpenPGP digital signature


Bug#920766: postfix: support for client TLS connection reuse coming in 3.4

2019-01-28 Thread Matt Taggart
Package: postfix
Version: 3.3.2-1
Severity: wishlist

According to
  http://www.postfix.org/TLS_README.html#client_tls_reuse
postfix version 3.4 gains support for doing Client-side TLS connection
reuse.

I was attempting to setup a "slow" transport for a domain(I'm looking at
you orange.fr) that tuned connection settings and then realized it
wasn't effective because the connections were TLS and not getting reused.

It looks like 3.4 is still in development upstream currently. Consider
this a wishlist request to get it in unstable and eventually
buster-backports once it's possible.

Thanks!

-- 
Matt Taggart
tagg...@debian.org



Bug#919725: cryptsetup: switch to LUKS2 by default for new installs

2019-01-18 Thread Matt Taggart
Package: cryptsetup
Version: 2:2.0.6-1
Severity: wishlist

LUKS2 format was introduced in 2:2.0.0~rc0-1 which went into debian on
03 Oct 2017. There was some discussion on the debian-boot list during
the libcryptsetup transition about the format

https://lists.debian.org/debian-boot/2017/12/msg00231.html

including a comment,

  "feel free to poke us again for partman-crypto when the new format
  looks mature enough so that we see about adding support for it."

Is it ready to become the default for new installs yet?

I started thinking about this when I saw that Fedora is planning on
moving to it by default

https://www.phoronix.com/scan.php?page=news_item&px=Fedora-30-LUKS2-Default

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#870094: problems with stretch gqrx-sdr

2018-12-23 Thread Matt Taggart
 => /usr/lib/x86_64-linux-gnu/libXxf86vm.so.1 
(0x7f1970bad000)

libdrm.so.2 => /usr/lib/x86_64-linux-gnu/libdrm.so.2 
(0x7f197099d000)
libpcre.so.3 => /lib/x86_64-linux-gnu/libpcre.so.3 (0x7f197072a000)
libudev.so.1 => /lib/x86_64-linux-gnu/libudev.so.1 (0x7f1970709000)
	libboost_timer.so.1.62.0 => 
/usr/lib/x86_64-linux-gnu/libboost_timer.so.1.62.0 (0x7f1970502000)

libXau.so.6 => /usr/lib/x86_64-linux-gnu/libXau.so.6 
(0x7f19702fe000)
	libXdmcp.so.6 => /usr/lib/x86_64-linux-gnu/libXdmcp.so.6 
(0x7f19700f8000)

libbsd.so.0 => /lib/x86_64-linux-gnu/libbsd.so.0 (0x7f196fee2000)
libuuid.so.1 => /lib/x86_64-linux-gnu/libuuid.so.1 (0x7f196fcdd000)
libXi.so.6 => /usr/lib/x86_64-linux-gnu/libXi.so.6 (0x7f196facd000)
	libselinux.so.1 => /lib/x86_64-linux-gnu/libselinux.so.1 
(0x7f196f8a3000)

liblzma.so.5 => /lib/x86_64-linux-gnu/liblzma.so.5 (0x7f196f67d000)
liblz4.so.1 => /usr/lib/x86_64-linux-gnu/liblz4.so.1 
(0x7f196f46b000)
	libgcrypt.so.20 => /lib/x86_64-linux-gnu/libgcrypt.so.20 
(0x7f196f15b000)

libFLAC.so.8 => /usr/lib/x86_64-linux-gnu/libFLAC.so.8 
(0x7f196eee4000)
libogg.so.0 => /usr/lib/x86_64-linux-gnu/libogg.so.0 
(0x7f196ecdb000)
	libvorbis.so.0 => /usr/lib/x86_64-linux-gnu/libvorbis.so.0 
(0x7f196eaad000)
	libvorbisenc.so.2 => /usr/lib/x86_64-linux-gnu/libvorbisenc.so.2 
(0x7f196e804000)

libresolv.so.2 => /lib/x86_64-linux-gnu/libresolv.so.2 
(0x7f196e5ed000)
	libgpg-error.so.0 => /lib/x86_64-linux-gnu/libgpg-error.so.0 
(0x7f196e3d9000)

===

So it seems to be using 1.62 boost libraries (rather than the 1.67 also 
provided in stretch).


--
Matt Taggart
tagg...@debian.org



Bug#916736: debirf: rescue could include stress-ng

2018-12-17 Thread Matt Taggart
Package: debirf
Version: 0.38
Severity: wishlist

It would be nice if the rescue image could include the stress-ng package
for system load testing.
(PS there is also the stressapptest package, but at brief glance
stress-ng seems to have more features)
(PPS the stressant package, which is built on debirf, includes stress-ng
and some other good tools. that might be a reason for/against debirf
doing so)

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#910111: RFP: solid -- set of conventions and tools for building decentralized social applications based on Linked Data principles

2018-10-02 Thread Matt Taggart
Package: wnpp
Severity: wishlist

* Package name: solid
  Version : varies
  Upstream Author : varies
* URL : https://solid.mit.edu/
* License : MIT
  Programming Lang: node.js, etc
  Description : set of conventions and tools for building
decentralized social applications based on Linked Data principles

Solid (derived from "social linked data") is a proposed set of
conventions and tools for building decentralized social applications
based on Linked Data principles. Solid is modular and extensible and it
relies as much as possible on existing W3C standards and protocols.

At a glance, here is what Solid offers...
* True data ownership: Users should have the freedom to choose where
their data resides and who is allowed to access it. By decoupling
content from the application itself, users are now able to do so.
* Modular design: Because applications are decoupled from the data they
produce, users will be able to avoid vendor lock-in, seamlessly
switching between apps and personal data storage servers, without losing
any data or social connections.
* Reusing existing data:
Developers will be able to easily innovate by creating new apps or
improving current apps, all while reusing existing data that was
created by other apps.

In addition to the main Solid webpage, Inrupt(a startup company created
to work on Solid) has some good pages
https://solid.inrupt.com/

Solid has server implementations, tools, apps, etc. The main repository is
https://github.com/solid

* node-solid-server is the server reference implementation
* there are various libraries for doing things like authorization, ACLs,
OpenID, etc
* There are some apps listed at https://github.com/solid/solid-apps

Whomever takes this on will need to determine which components make
sense to include in debian in order to provide a reasonable support for
developing and deploying Solid applications.

On https://solid.inrupt.com/community under "Packaging" they state they
would like to get distro packages created.

-- 
Matt Taggart
tagg...@debian.org



Bug#910109: Subject: RFP: faircoin -- a digital currency that is powered by a cooperative grassroots movement

2018-10-02 Thread Matt Taggart
Package: wnpp
Severity: wishlist

* Package name: faircoin
  Version : 2.0.1
  Upstream Author : Thomas König 
* URL : https://fair-coin.org/
* License : MIT/X
  Programming Lang: C
  Description : a digital currency that is powered by a cooperative
grassroots movement

FairCoin implements fair value exchange on a global level. Our
innovative Proof-of-Cooperation (PoC) blockchain mechanism is the unique
consensus algorithm developed for FairCoin. It requires much less energy
than other blockchains but also enables faster transactions.

https://github.com/faircoin/faircoin

-- 
Matt Taggart
tagg...@debian.org



Bug#907892: libcache-memcached-fast-perl: upstream URL update

2018-09-03 Thread Matt Taggart
Package: libcache-memcached-fast-perl
Version: 0.25-1

Hi,
The upstream URLs listed in control (and also the upstream README) are
out of date.

The page in control: http://openhack.ru/Cache-Memcached-Fast
doesn't seem to work anymore.

In README:
http://search.cpan.org/dist/Cache-Memcached-Fast/ now redirects to
https://metacpan.org/release/Cache-Memcached-Fast

https://github.com/kroki/Cache-Memcached-Fast now now redirects to
https://github.com/JRaspass/Cache-Memcached-Fast

For Homepage I guess use the metacpan page?

Thanks,

-- 
Matt Taggart
tagg...@debian.org




signature.asc
Description: OpenPGP digital signature


Bug#901083: lxmusic: something causes system to go OOM

2018-06-08 Thread Matt Taggart
Package: lxmusic
Version: 0.4.7-1

Up front I apologize that this bug report is vague and mostly anecdotal.
Maybe I will have more luck tracking it down later or maybe others will.

I discovered that if I have lxmusic running and also do video/audio a
lot in my browser, the system will go OOM and become totally
unresponsive for 10-15mins until the OOM killer manages to kill the
right things.

I'm not sure if the bug is in lxmusic or if it's just tickling a bug in
pulseaudio or the particular drivers for my system or what. I just know
that if I don't run lxmusic then the problem doesn't happen.

To repeat the problem: have lxmusic running, audio paused, and then
watch a bunch of youtube videos in chromium.

I hope to have time to try narrowing down the problem, but as this is my
main work desktop that is fairly disruptive.

In case it matters, my audio devices are:
00:03.0 Audio device [0403]: Intel Corporation Xeon E3-1200 v3/4th Gen
Core Processor HD Audio Controller [8086:0c0c] (rev 06)
00:1b.0 Audio device [0403]: Intel Corporation 8 Series/C220 Series
Chipset High Definition Audio Controller [8086:8c20] (rev 04)

-- 
Matt Taggart
tagg...@debian.org



Bug#898358: sympa: dependency differences from upstream

2018-05-10 Thread Matt Taggart

Package: sympa
Version: 6.2.32~dfsg-1

I was reviewing upstream src/lib/Sympa/ModDef.pm, and comparing with the 
package Depends and found the following differences in dependencies in 
debian/control that I didn't understand. Maybe there are reasons for 
them or maybe they need to be added?


Missing Depends:
ModDef.pm   debian package name

Clone   libclone-perl (but pulled in via libdbd* ->
libdbi-perl -> libclone-perl)
Crypt::Eksblowfish  libcrypt-eksblowfish-perl
Data::Password  libdata-password-perl
DateTime::TimeZone  libdatetime-timezone-perl (but pulled in
 via libdatetime-format-mail-perl ->
 libdatetime-perl -> libdatetime-timezone-perl )
Encode::Locale  libencode-locale-perl
List::Util::XS  N/A, ModDef.pm says:
# The pure-perl version of Scalar::Util::looks_like_number() was unstable.
# To force using XS version, check existence of List::Util::XS.
URI::Escape liburi-perl

Depends but not in ModDef.pm:
libmsgcat-perl

libcrypt-ciphersaber-perl is in recommends, the text in ModDef.pm says:
Crypt::CipherSaber
this module provides reversible encryption of user passwords in the 
database.

Useful when updating from old version with password reversible encryption,
or if secure session cookies in non-SSL environments are required.

Is that always used or optional?

--
Matt Taggart
tagg...@debian.org



Bug#897931: preseed: add tests for additional url= bare host cases

2018-05-04 Thread Matt Taggart
Package: preseed
Version: 20180504
Severity: wishlist

The preseed file I have been using (for quite a few releases now) relies
on the behavior documented at

 https://www.debian.org/releases/stable/i386/apbs02.html.en#preseed-auto

where if url= does not list a protocol then http is assumed, and does
not end in / then default path is added.

I was trying to debug something and was looking through the preseed
source and realized that package/preseed/01-auto-install.t could use a
couple more test cases:

1) url= with a bare hostname like "url=server.example.org"
2) url= with a bare IP like "url=10.0.0.5"
3) I guess IPv6 is possible too? "url=fd00:9:152:48:1822::162:199"
(or maybe it's "url=[fd00:9:152:48:1822:ffff:162:199]"?)

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#896508: ganeti-instance-debootstrap: provide config files for various debian releases

2018-04-21 Thread Matt Taggart
Package: ganeti-instance-debootstrap
Version: 0.16-5
Severity: wishlist

Currently ganeti-instance-debootstrap, in variants.list, only lists a
'default' variant (and provides the variants/default.conf for it). Could
it also provide support for specific releases by name. I think the
current stable, oldstable, and maybe testing and unstable release names.
I don't know if it works but maybe the generic names work too? So
variants.list could contain

default
jessie
stretch
buster
sid
oldstable
stable
testing
unstable

and the variants/ dir contain conf files for them (or symlinks).

Then with 'gnt-instance add -o ' one could use debootstrap+whatever to
get the various things.

The only downside I can think of is having to maintain that list over time.
What do you think?

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#774711: openssh 7.6 changes

2018-04-20 Thread Matt Taggart
Hi,

Just a quick update on #774711. As pre-announced in earlier releases,
OpenSSH 7.6 did drop support for some old unsafe crypto options:

* dropped SSHv1 protocol support
* removed hmac-ripemd160 MAC
* removed arcfour, blowfish and CAST ciphers
* refuses RSA keys <1024 bits in length
* does not offer CBC ciphers by default

As far as I know, the following potentially unsafe things are still
supported in 7.7:

Keys:
* NIST curves

Kex:
* NIST curves
* diffie-hellman-group14-sha1
* diffie-hellman-group-exchange-sha1 (min 2048 now at least)

MACs:
* sha1
* umac-64

Debian users wanting to drop support for the legacy crypto options
mentioned previously in this bug can use the following:

===
HostKeyAlgorithms ssh-ed25519-cert-...@openssh.com, ssh-ed25519,\
ssh-rsa-cert-...@openssh.com, ssh-rsa-cert-...@openssh.com,ssh-rsa

KexAlgorithms curve25519-sha...@libssh.org,\
diffie-hellman-group-exchange-sha256

Ciphers chacha20-poly1...@openssh.com,aes256-...@openssh.com,
aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr

MACs hmac-sha2-512-...@openssh.com,hmac-sha2-256-...@openssh.com,\
umac-128-...@openssh.com,hmac-sha2-512,hmac-sha2-256,\
umac-...@openssh.com
===


-- 
Matt Taggart
tagg...@debian.org



Bug#892803: di-netboot-assistant: unsigned daily images

2018-03-14 Thread Matt Taggart

On 03/13/2018 10:28 PM, Cyril Brulebois wrote:


What extra security would signing images bring here?


For me, assurance that nobody had interfered with the daily image that I 
will use to install a system. Many systems I install with a daily are 
for testing and get thrown away rather quickly (although often I don't 
know in advance which ones will end up sticking around longer).


One reason in the past I have installed systems with a daily build that 
I know will stick around is due to needing support for new hardware at 
install time, where I couldn't just get an older install on the system 
with a stable d-i and then upgrade the kernel post-install. Usually 
things like drivers for a disk controller, newish filesystem features, 
or network drivers for doing a network install.


The testing alpha/beta/rc releases _do_ get signed right? Maybe that's a 
better solution for the above case where I need something newer than 
stable, but testing would in most cases be "new enough".


But still thinking about daily...
d-i.d.o does use https and has it's own Let's Encrypt issued cert, I 
think I could verify the cert and then check that the netboot.tar.gz 
matches the one published in

  https://d-i.debian.org/daily-images/amd64/daily/SHA256SUMS
Looking at the code, it looks like d-n-a already does the latter part I 
guess to prevent cases of download corruption, broken mirrors, etc.


The default di-sources.list uses https for the daily images. And the 
code uses either wget or curl, both of which default to verifying certs 
via the normal system ca list. So it's already doing quite a bit to 
verify even the daily image sources. That's good, but if I was an 
attacker trying to mitm, I'd just need to find the weakest link in the 
CA cartel to issue me a d-i.d.o cert I could use for my mitm mirror.


This is a corner case for sure and if there is no reasonable way to 
solve it I think that's OK.


I think if I wanted to prove to myself the daily image came from debian, 
I could verify the cert used for d-i.d.o was indeed the known debian 
owned one, download the netboot.tar.gz/SHA256SUMS and stick them in the 
cache, and then use the --offline flag.


--
Matt Taggart
tagg...@debian.org



Bug#892803: di-netboot-assistant: unsigned daily images

2018-03-13 Thread Matt Taggart

Package: di-netboot-assistant
Version: 0.51
Severity: minor

When attempting to install a daily image I get the following


# di-netboot-assistant install daily --arch=amd64
I: Processing daily/amd64.
I: Downloading 'SHA256SUMS'.
E: Could not download 
'https://d-i.debian.org/daily-images/amd64/daily/../../../../Release' 
and/or 'Release.gpg'.


  * * * * * * * * * * * * WARNING * * * * * * * * * * * * *
  *   *
  *  Could not verify/find the signature of the release.  *
  *   *
  * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

  Download and install the image anyway? [y|N]:


In the package provided di-sources.list file, in the daily section, 
there are the following comments,


  ## Daily netboot DI images (not signed?!?). Read:
  # https://d-i.debian.org/daily-images/build-logs.html
  # http://wiki.debian.org/DebianInstaller/Today

which is a hint that this is likely to fail.

It would be nice if the d-i daily's were signed, even if they had to use 
a different key that I would then need to install on the system so that 
this di-netboot-assistant check could use. Is there already a bug open 
requesting daily image signing? If not then maybe this one can be cloned 
and reassigned to the right place.


But until something like that is possible I suggest a couple things:

* add something to the error message detecting when installing daily and 
explaining it's known that daily images currently aren't signed
* add some sort of override option for daily images to skip the check, 
printing a warning. This would allow for calling di-netboot-assistant 
from other tools (scripts, puppet, etc)
* update the comments in di-sources.list explaining dailys aren't signed 
and will result in the warning prompt
* the 'Today' URL in the comments no longer exists, I couldn't find a 
good replacement


--
Matt Taggart
m...@lackof.org



Bug#892800: di-netboot-assistant: errors when $HOME not set

2018-03-12 Thread Matt Taggart

Package: di-netboot-assistant
Version: 0.51
Severity: minor

I have a puppet module that calls di-netboot-assistant to setup d-i 
images. When puppet runs the command, $HOME is not set. Because 
di-netboot-assistant uses "set -u" (line 3) when it attempts to use 
$HOME (line 56), the script exist with an error


 /usr/bin/di-netboot-assistant: line 56: HOME: unbound variable

It's easy to repeat, just 'unset HOME'. Removing the -u from the set 
allows it to work fine (since the if on line 56 is just false when $HOME 
isn't set).


--
Matt Taggart
tagg...@debian.org



Bug#789247: di-netboot-assistant: broken deb.d.o urls

2018-03-12 Thread Matt Taggart

On 03/10/2018 04:22 AM, Andreas B. Mundt wrote:


Hm, the /debian/ should be inserted by the following in
'/etc/di-netboot-assistant/di-netboot-assistant.conf' [1]:

#Download Mirror
# The variable MIRROR_REGEXPS contain a list of space separated sed
# regular expression, to rewrite di-sources.list URLs, to match your
# prefered mirror.  For example:
MIRROR_REGEXPS="s=://deb.debian.org/=://deb.debian.org/debian/="

I was already wondering why not to use the correct URL in
'di-sources.list', but kept that as it works fine for me.  Can you
check if you have the line in 'di-netboot-assistant.conf'?  Perhaps
it's there for historical reasons and we can/should remove it.


Oh...
I had just grabbed the latest di-sources.list to use on an older version 
of the package, I didn't know about that regexp thing in the config file...


It's sort of a nice feature, it makes using a local mirror/proxy easier 
(assuming you know you can use that). But I suspect most mirrors would 
have a debian/ dir and if a user had one that _didn't_ then the regexp 
could be setup the other way to strip it out.


So my vote would be fix the URLs in di-sources.list, comment out 
MIRROR_REGEXP in the conf, change it's regexps to provide an example of 
how it could be used.


I guess the only concern is the existing conffiles that are out there 
and if that would break existing installs. If you changed both sources 
and conf at the same time, hopefully it would be clear. I guess if you 
go that route, wait until one of them needs another change anyway?


--
Matt Taggart
tagg...@debian.org



Bug#789247: di-netboot-assistant: broken deb.d.o urls

2018-03-09 Thread Matt Taggart

It looks like the deb.debian.org URLs in di-sources.list need to be updated

E: Can't download 'stretch' for 'amd64' 
(http://deb.debian.org/dists/stretch/main/installer-amd64/current/images/MD5SUMS).


The URL should have a leading 'debian/' in the path, ie

http://deb.debian.org/dists/stretch/main/installer...

I don't know if this is just some mirrors or everywhere, but not having 
it resulted in an error for me (it resolved to cdn-aws.deb.debian.org)


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#888804: iproute2: some upstream URLs broken

2018-01-29 Thread Matt Taggart

Package: iproute2
Version: 4.14.1-2
Severity: wishlist

The Homepage header in debian/control lists

  https://wiki.linuxfoundation.org/networking/iproute2

but that page is 404. It's probably not supposed to be, there is a link 
to the same thing on


  https://wiki.linuxfoundation.org/networking/start

In the source package README it also lists

  http://www.linuxfoundation.org/collaborate/workgroups/networking/iproute2

but that seems to redirect to the same 404 URL as well.
The source README also lists this url for git:

  git://git.kernel.org/pub/scm/linux/kernel/git/shemminger/iproute2.git

which I was able to clone and has updates as of today so must be up to 
date... but I don't see it listed at https://git.kernel.org/. There is


  https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/

which seems to be just as up to date, but I'm not sure which is 
considered canonical.


The Download URL listed in the source README is
  http://www.kernel.org/pub/linux/utils/net/iproute2/

and that works and appears to be up to date.

FYI- The wikipedia page also has the same broken links
  https://en.wikipedia.org/wiki/Iproute2

Probably upstream needs to fix things?

--
Matt Taggart
tagg...@debian.org



Bug#886367: intel-microcode: more meltdown/spectre info

2018-01-04 Thread Matt Taggart

I read that RHEL is already issuing microcode updates for RHEL7.
I read it second hand at
https://lists.bufferbloat.net/pipermail/cerowrt-devel/2018-January/08.html

But maybe there is an official URL somewhere?
I found the following pages
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://access.redhat.com/articles/3311301

But I couldn't find any reference to microcode versions.

--
Matt Taggart
tagg...@debian.org



Bug#886368: intel-microcode: copyright URLs out of date

2018-01-04 Thread Matt Taggart

Package: intel-microcode
Version: 3.20171117.1
Severity: wishlist

The two upstream download URLs listed in the copyright file no longer 
work (and are also http URLs). Searching I found the following


https://downloadcenter.intel.com/download/27337/Linux-Processor-Microcode-Data-File

but I suspect that URL might be specific to the 20171117 version.
Hopefully you can find a more generic URL for the latest version.

Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#886367: intel-microcode: coming updates for meltdown/spectre

2018-01-04 Thread Matt Taggart

Package: intel-microcode
Version: 3.20171117.1
Severity: grave

It's been rumored that Intel will be releasing microcode updates to 
(partially?) mitigate some of the effects of meltdown and spectre. It 
appears that the latest version on the website is still 20171117.


Any news of what this will be and when it will happen?

Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#764636: Badblocks does not support large disks

2017-12-18 Thread Matt Taggart

There is a similar bug in Red Hat Bugzilla,

https://bugzilla.redhat.com/show_bug.cgi?id=1306522

which is "CLOSED WONTFIX" and indicates that upstream doesn't support 
badblocks on large devices (maybe doesn't support badblocks at all?)


Maybe #76636 should do the same?

--
Matt Taggart
tagg...@debian.org



Bug#882797: samba: time machine support

2017-11-26 Thread Matt Taggart

Package: samba
Version: 2:4.7.3+dfsg-1
Severity: wishlist

I was searching for support for using Apple's (proprietary) Time Machine 
MacOS backup system over the network to a Debian system.


In the past Time Machine used Apple's AFP and people were successful 
using the netatalk software (with some tweaks on the client) to make 
this work.


But I just found this forum post that indicated that Apple is moving 
away from AFP and to SMB instead,


https://discussions.apple.com/message/30723500#message30723500

The thread indicates that Apple has talked to the samba project about 
what is needed to support this. I searched and I found this upstream bug,


https://bugzilla.samba.org/show_bug.cgi?id=12380

So it's coming in 4.8!
This is a wishlist bug to help others that might be looking for the same 
info. I'd love to help test this once 4.8 goes into 
experimental/unstable, maintainers please let us know when people can 
help test.


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#685878: netatalk 3 and time machine support

2017-11-26 Thread Matt Taggart
I did some more reading about netatalk support for Apple Time Machine 
backups. I found this post that mentions apple plans to phase out AFP in 
favor of SMB over the long term.


https://discussions.apple.com/message/30723500#message30723500

AFP will continue to be supported for quite a while due to it's use in 
older versions of MacOS, and devices like Time Capsule, etc. But the 
future will be SMB.


It's would still be useful to have the newer netatalk3 in debian (and 
derivatives) to quickly be able to support the existing things out 
there, the SMB stuff isn't ready yet and I predict netatalk will still 
be useful for many years.


The above post mentions that Apple has talked to the samba project about 
what things will be needed in order to support Time Machine via SMB. I 
found this bug in the samba bug tracker


https://bugzilla.samba.org/show_bug.cgi?id=12380

which mentions it should become available in samba 4.8 (currently not 
yet released or in Debian).


--
Matt Taggart
tagg...@debian.org



Bug#685878: netatalk 3

2017-11-26 Thread Matt Taggart

Hi,

Any update on netatalk 3? Upstream appears to be 3.1.11 now.

Regarding Joseph's comment about support for DDP, while it would be nice 
to maintain that, I don't think it should hold up getting version 3 in 
the archive. I think the number of people that need version 4 is many 
times greater than those that need DDP.


If needed another netatalk 2 source package could be created later. But 
I would worry about upstream security support, whoever wants to take on 
such a task would need to own supporting it.
Upstream _did_ do a 2.2.6 release on 30 Jun 2017, so maybe they are 
still providing _some_ support?


BTW when poking around I found references to this github page

  https://github.com/Netatalk/Netatalk

Did upstream move there? Or is it a fork/clone? There are issues in the 
issue tracker there too.


Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#879166: knot-resolver: update Homepage

2017-10-19 Thread Matt Taggart

Package: knot-resolver
Version: 1.3.3-1
Severity: wishlist

Hi,

It looks like knot-resolver has it's own Homepage now

https://www.knot-resolver.cz/

Please consider updating debian/{control,copyright}

Thanks,

--
Matt Taggart
tagg...@debian.org



Bug#879162: getdns: new upstream available

2017-10-19 Thread Matt Taggart

Package: getdns
Version: 1.1.0-2
Severity: wishlist

Hi,

It looks like there is a new getdns upstream version 1.2.0 with some 
cool new features


https://getdnsapi.net/releases/

Please consider updating, and also backporting to stretch once it enters 
testing.


Thanks!

--
Matt Taggart
tagg...@debian.org



Bug#865497: CVE-2017-9781 not yet fixed in 1.2.8p26-1?

2017-10-06 Thread Matt Taggart

On 10/06/2017 02:28 PM, Salvatore Bonaccorso wrote:

Control: notfixed -1 1.2.8p26-1

Hi!

On Fri, Oct 06, 2017 at 09:09:03PM +, Debian Bug Tracking System wrote:

This is an automatic notification regarding your Bug report
which was filed against the src:check-mk package:

#865497: check-mk: CVE-2017-9781: reflected XSS in webapi.py


I looked up the source for 1.2.8p26-1.

The fix for CVE-2017-9781 is

http://git.mathias-kettner.de/git/?p=check_mk.git;a=commitdiff;h=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1

which does not yet seem to be applied to 1.2.8p26-1?

Can you please double-check?


Note, there is a second CVE now for check-mk, that one got addressed
in 1.2.8p26, but it's not clear yet in which version in was
introduced.

Hi,

You are right, the fix for CVE-2017-9781, which upstream calls "werk 
#4757" is _not_ in 1.2.8p26. I was confused with upstream #5208 when I 
wrote the changelog that closed the bug.


Upstream lists the following security related fixes for 1.2.8
==
#5208
http://mathias-kettner.com/check_mk_werks.php?werk_id=5208&HTML=yes
http://git.mathias-kettner.de/git/?p=check_mk.git;a=commitdiff;h=673360408b90f99bd54cf936091cff08d979a057

#4902
http://mathias-kettner.com/check_mk_werks.php?werk_id=4902&HTML=yes
http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=96e39a0f024d9b2b521576c1eb71aca7fb3e818d

#7661 (fixed in 1.4.0p8, supposedly fixed in 1.2.8p25?)
http://mathias-kettner.com/check_mk_werks.php?werk_id=7661&HTML=yes

#7631
http://mathias-kettner.com/check_mk_werks.php?werk_id=7631&HTML=yes

#3970 (fixed in 1.2.8p14)
http://mathias-kettner.com/check_mk_werks.php?werk_id=3970&HTML=yes

#3855 (fixed in 1.2.8p11)
http://mathias-kettner.com/check_mk_werks.php?werk_id=3855&HTML=yes

#3743 (fixed in 1.2.8p10)
http://mathias-kettner.com/check_mk_werks.php?werk_id=3743&HTML=yes

Full list of changes for 1.2.8p26
=
http://mathias-kettner.com/check_mk_werks.php?edition_id=raw&branch=1.2.8&version=1.2.8p26&HTML=yes

Full list of changes for 1.4.0p14
=
http://mathias-kettner.com/check_mk_werks.php?edition_id=raw&branch=1.4.0&version=1.4.0p14&HTML=yes

which additionally lists

#4757 (as you mentioned above, fixed in 1.4.0p6)
http://mathias-kettner.com/check_mk_werks.php?werk_id=4757&HTML=yes
http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=14a5b79c6f549502244a60146ed6831dc3473f2a

#7643 (only in 1.4 and newer)
http://mathias-kettner.com/check_mk_werks.php?werk_id=7643&HTML=yes

So I think the Debian 1.2.8p16 package is only missing #4757.

I will ask upstream if they intend to fix #4757 in the 1.2.8 series.
Unfortunately due to how the upstream tarball/build works, it is tricky 
to patch upstream files. If upstream doesn't intend to include this fix 
I can generate a patch to make it work.


I had started working on packaging 1.4.0 as a way to fix these security 
bugs (and even did an upload to experimental) but I recently learned 
from upstream that:


"The use of Check_MK without OMD environment and customization of paths 
is explicitly not supported anymore."


ie you can't use check-mk stand-alone, you have to use OMD (and 
livestatus/WATO/multisite, the whole stack) and you have to use 
upstream's installer to upstream's paths. It's very much the "network 
appliance" model (or flatpak, docker image, etc)
I don't know if we'll be able to make this work in Debian. (not to 
mention that nagios is gone and icinga1 will go away at some point)


That prompted me to go back to 1.2.8 and package the latest release 
there in order to at least have something working without the security bugs.


--
Matt Taggart
tagg...@debian.org



Bug#721190: debirf: additional rescue packages

2017-09-15 Thread Matt Taggart
Just an update on #721190,

The following mentioned in this bug have been added:
dmidecode
ethtool
fancontrol
flashrom
initramfs-tools-core
inteltool
lm-sensors
memtester
msrtool
ntfs-3g
nvramtool
rsync
socat
squashfs-tools
superiotool
usbutils
wget

also added and useful:
btrfs-progs

removed, but can maybe be readded:
scsitools (#686881)

I would still like to see:
cpuburn
cramfsprogs
hwclock
ssh (#834476)

maybe interesting contrib/non-free:
intel-microcode (non-free)
iucode-tool (contrib)
other firmware stuff to make NICs work

Also mentioned in this bug were bz2 or xz support; support for creating xz 
images got added but maybe it's useful to have the utilities available in 
rescue too? Since p7zip has support for various formats, maybe p7zip (or 
p7zip-full)?

I don't think this bug should live forever as the place for rescue suggestions, 
maybe we should decide on these remaining things and close it, opening another 
if needed.

Thanks,

-- 
Matt Taggart
tagg...@riseup.net


signature.asc
Description: PGP signature


Bug#865820: vim-common: Change of behaviour for default value of mouse is annoying

2017-07-18 Thread Matt Taggart
I am also annoyed by the new default of mouse=a, but the proposed 
workaround of 'touch ~/.vimrc' isn't enough for a couple reasons:

1) I want to be able to turn it off system wide, not just per user
2) By creating an empty .vimrc I'm potentially losing out on upstream
defaults that I _do_ want.

Is there another way to accomplish those things? Adding 'set mouse=' to 
/etc/vim/vimrc doesn't seem to work.

-- 
Matt Taggart
tagg...@debian.org



Bug#554794: badblocks -c and -n

2017-07-11 Thread Matt Taggart
Theodore Ts'o writes:
> I have to ask --- ***why*** are you (and other people) running
> badblocks in 2017?  Badblocks as a thing started becoming irrelevant
> for e2fsprogs's purpose sometime around 2003-2005, when SATA was
> introduced, and drive electronics were smart enough that they could be
> largely counted upon to do automatic bad block redirection in the
> drive.

Personally I use it for a few things:

1) as a way of forcing the drive to test every block and force to to
internally reallocate any sectors that are marginal _before_ the drive
is in production. The SMART tests are supposed to do this, but they
are opaque and up to the vendor to implement correctly. If I use
badblocks -w I know each (O/S visible) block gets tested 5 times.

2) as a way of exercising/burning-in the mechanism to avoid deploying a
drive that is likely to fail. I time the badblock run and if the time
diverges significantly from other drives of the same model, I know
something is wrong. As a side benefit it exercises other components in
the path, io controller, ram, cpu. The SMART tests should also work
for this, but again it's hard to measure.
(side note, I remember ~2000 someone (VA Linux Systems? joeyh?
cerberus?) having a tool that did burn-in on their servers by running
cpuburn in parallel with a bunch of copies of badblocks running on the
(then SCSI) drives.)

3) as a cheap and easy way to wipe data from drives. Using -w with it's
5 different patterns is a good way of ensuring the data is
unrecoverable before reusing/recycling the drive.

If you know of better options for these tasks I'm happy to switch to
something other than badblocks.

Thanks,

-- 
Matt Taggart
tagg...@debian.org



Bug#554794: badblocks -c and -n

2017-07-10 Thread Matt Taggart
#554794 concerns the time it takes to run badblocks for any particular
value of the -c option (count of blocks to do at once).

At the time (2009) it wasn't clear if larger values of -c improved runtime,
although one user (in 2011) reports 10% improvement.

The current -c (block count) default is 64 blocks.
The current -b (block size) default is 1024 bytes.

AFAICT the last time they were increased was 2004 (#232240, -c from 16 to
64).

A related bug (#764636) when running badblocks on a 14tb device was solved
by switching to -b 4096.

Given the device size increases and RAM/CPU improvements since all these
things occurred, is there any value to increasing the defaults? Does anyone
have any data? If not then what tests would be valuable?

I often run many badblocks instances at once on separate SATA devices (so
no bus contention), what are the optimal settings for that case?

Thanks,

--
Matt Taggart
tagg...@debian.org




pgp0xF0cpiIyb.pgp
Description: PGP signature


Bug#865497: Wheezy update of check-mk?

2017-06-22 Thread Matt Taggart
Hi Raphael!

Raphael Hertzog writes:
> Hello Matt,
> 
> The Debian LTS team would like to fix the security issues which are
> currently open in the Wheezy version of check-mk:
> https://security-tracker.debian.org/tracker/CVE-2017-9781
> 
> Would you like to take care of this yourself?
> 
> The code in wheezy is different from the 1.4.x version which has been
> patched upstream but I believe that a similar issue must exist since
> I have seen no HTML escaping in any code showing errors.

The commit message explicitly references the 1.4 branch, but I also
see that the code exists in 1.2.8p16 (buster/sid).

For buster/sid I will update to new 1.4 based upstream with the patch.

The 1.2.6p12-1 based versions in wheezy-backports-sloppy and
jessie-backports are different still, but we should push to make those
go away by getting buster fixed and backporting that to w-b-s, j-b-s,
and w-b.

I agree that the code is pretty different in 1.1.12p7-1 (wheezy). I
would appreciate help generating a patch for that that version.

> That said it really depends on whether user input ends
> up in the error message associated to the various exceptions
> and it's hard to tell from a quick look at the code without trying.
> 
> The traceback itself seems to be output in %s but that doesn't
> prevent XSS.
> 
> In any case, if you mant to handle this yourself, please follow the
> workflow we have defined here:
> https://wiki.debian.org/LTS/Development
> 
> If that workflow is a burden to you, feel free to just prepare an
> updated source package and send it to debian-...@lists.debian.org
> (via a debdiff, or with an URL pointing to the source package,
> or even with a pointer to your packaging repository), and the members
> of the LTS team will take care of the rest. Indicate clearly whether you
> have tested the updated package or not.
> 
> If you don't want to take care of this update, it's not a problem, we
> will do our best with your package. Just let us know whether you would
> like to review and/or test the updated package before it gets released.
> 
> You can also opt-out from receiving future similar emails in your
> answer and then the LTS Team will take care of check-mk updates
> for the LTS releases.

The check-mk source package is sort of weird, it uses tarballs within
the orig.tar.gz, so using a normal debian package diff, or even
patching at configure time doesn't work, it has to happen after the
install step runs setup.sh. I am happy for the LTS team to prepare the
wheezy update and I can help with testing. I will work on uploading a
fixed 1.4 version to sid in the next day.

Sound OK?

-- 
Matt Taggart
tagg...@debian.org



Bug#202675: popularity-contest: Should collect and report kernel modules used

2017-04-18 Thread Matt Taggart
Having popcon gather information about used kernel modules would be
very helpful for a wishlist bug I just filed, #860570

  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860570

(in addition to the other reasons previously mentioned)

Thanks,

-- 
Matt Taggart
tagg...@debian.org



  1   2   3   4   5   6   7   8   >