Re: Community survey on network stack for Trixie

2024-09-05 Thread Marc Haber
On Thu, 5 Sep 2024 14:48:49 +0200, Lukas Märdian 
wrote:
>But for the
>release where we switch our network stack, we should definitely keep it
>around, to give sysadmins some time to adopt to the new recommended tooling.

Or to keep the old tooling, yes. Te default is a default for new
installs. As a distribution that supports upgrades, we have to. We are
not Red Hat where the recommended way to go from one major release to
the next one is a full reinstall.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Community survey on network stack for Trixie

2024-09-05 Thread Marc Haber
On Wed, 4 Sep 2024 21:29:58 +0200, Daniel Baumann 
wrote:
>"wild idea": how about just removing ifupdown/ifupdown2/ifupdown-ng and
>decluttering/improving documentation instead then?

I don't see a problem with keeping ifupdown{2,-ng,} if none of those
packages is part of the default install and we remove it from the
beginner- and intermediate-level docs.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Community survey on network stack for Trixie

2024-09-04 Thread Marc Haber
On Wed, 4 Sep 2024 11:27:45 +0200, Chris Hofstaedtler
 wrote:
>* Marco d'Itri  [240903 14:04]:
>> My position is that I am happy for Debian to have the option of netplan 
>> but I do not think that it should be installed by default, because it is 
>> an abstraction which adds complexity and that nobody asked for other 
>> than its developers.
>> 
>> And this is an orthogonal issue with deciding if ifupdown is appropriate 
>> for a modern system (I have been using it for close to 30 years and at 
>> this point I think that it has served its purpose and there are better 
>> defaults...).
>
>I want to echo all of this. All my customers sites are currently
>migrating away from ifupdown to networkd, and they don't need or
>want an intermediate layer.
>
>For the desktop(-like) systems, NetworkManager works nicely, again
>without a need for an intermediate layer.

This, and this.

>Again, having the option is nice. But I don't see netplan as a
>useful default.

And, choosing Netplan as a default doesn't solve the issue, since we'd
still have to decide what we'd use below it by default, leaving us
with the same hard decision: NetworkManager which bears its mock name
NetworkDamager for a reason, systemd-networkd which is kind of
unsuitable for desktop(-like) systems, comes from the much-hated
systemd world (thus igniting a systemd debate everywhere it is
mentioned) and contains way to much not-invented-here code regarding
IPv6, or ifupdown, which is outdated if I'm being friendly, and a
Debianism.

Greetings
Marc
-- 

Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Community survey on network stack for Trixie

2024-09-04 Thread Marc Haber
On Wed, 4 Sep 2024 13:28:30 +0200, Daniel Baumann 
wrote:
>On 9/3/24 18:24, Lukas Märdian wrote:
>> The nice thing about Netplan is that it [...] functions as a
>> layer on top.
>
>I don't understand what actual problem netplan is trying to solve.

I am also missing that piece of information. At the moment, I see
netplan as an implementation of RFC 1925 Clause 6a, with a very
friendly and motivated upstream. When I feel evil, I'd say it's just
another Ubuntuism.

That's not enough for me to consider Netplan. So I'm going to stay
with network manager on my mobile boxes that need Wi-Fi, and
systemd-networkd on everything else.

I happen to LOVE the orthogonality of systemd-networkd: One file per
network layer, one file per interface, and the cross product of that.
That makes configuration management SO easy.

Greetings
Marc
-- 
--------
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: DEP18 follow-up: What would be the best path to have all top-150 packages use Salsa CI?

2024-08-25 Thread Marc Haber
On Sun, 25 Aug 2024 13:31:45 +0200, Fabio Fantoni
 wrote:
>Actually I push keeping "UNRELEASED" even in cases where is near sure to 
>be ready because I want see salsa CI result and do fixes/improvements if 
>needed before release, shortly after in major of case I did a release 
>commit with only finalize the d/changelog and I skip salsa CI on that 
>(with "-o ci.skip" on git push) to avoid waste salsa CI resource for 
>same result of the previous.
>
>Will tag2upload be usable in that case (with CI skipped on latest commit 
>with only finalize of d/changelog, and successfull of the previous) or 
>will there be a need for salsa CI successfully completedon the specific 
>release commit?

CI could skip if only changelog changed. That would be helpful for my
packages and my workflow as well.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Request for feedback on draft: DEP-18: Enable true open collaboration on all Debian packages

2024-08-01 Thread Marc Haber
On Thu, 1 Aug 2024 18:36:29 +0100, Luca Boccassi 
wrote:
>On Thu, 1 Aug 2024 at 18:16, Marc Haber  wrote:
>>
>> On Thu, 1 Aug 2024 12:23:43 +0100, Luca Boccassi 
>> wrote:
>> >The vast majority of people who
>> >are forced to use emails do so for work via a
>> >work-mediated/administered interface that tries to make it somewhat
>> >tolerable, like Outlook or Gmail.
>>
>> This must be the least accurate statement about Outlook that I have
>> ever read. Outlook does not have a single feature that makes email
>> more tolerable in any way. Au contraire. The feature called threading
>> is incompatible with the rest of the world and not even very useful in
>> an outlook-only environment, the search function finds everything but
>> the mail you're looking for, and Outlook's disability to quote
>> decently is notorious for having led to the whole world generating
>> only top-posting replies.
>>
>> Outlook is essentially responsible for making email so much worse
>> today than it was in the 1990s.
>>
>> Even Salsa's and github's praised way to communitate in an MR is
>> VASTLY inferior to a decently threading mail client like mutt or even
>> Thunderbird.
>>
>> I violently disagree with the rest of the message as well and am not
>> willing to spoil the rest of my day by replying in detail. I'd prefer
>> learning a bit more Slowfoxtrot later tonight.
>
>Again, please understand that outside of the bubble of tech nerds of
>the 70s/80s, saying out loud phrases such as "The only right way to
>collaborate is reading and writing emails is in my terminal" means
>getting looked at like being a dinosaur just escaped from a museum.
>The rest of the universe just doesn't work like that, sorry. There's
>nothing wrong with being a dinosaur for an individual of course, we
>will all become one at some point, but optimizing for making dinosaurs
>happy from the simple perspective of demographics is a sure way for a
>project to slowly slide into irrelevance. The fact that the project
>membership has just about managed to remain flat while the tech sector
>absolutely exploded in size should send shivers down everyone's
>spines.

Now that you have added personal insult while not adding anything for
the cause, I recuse myself from continuing this situation. I am happy
that I don't need to collaborate with you in my Debian efforts.

-- 

Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Request for feedback on draft: DEP-18: Enable true open collaboration on all Debian packages

2024-08-01 Thread Marc Haber
On Thu, 1 Aug 2024 12:23:43 +0100, Luca Boccassi 
wrote:
>The vast majority of people who
>are forced to use emails do so for work via a
>work-mediated/administered interface that tries to make it somewhat
>tolerable, like Outlook or Gmail.

This must be the least accurate statement about Outlook that I have
ever read. Outlook does not have a single feature that makes email
more tolerable in any way. Au contraire. The feature called threading
is incompatible with the rest of the world and not even very useful in
an outlook-only environment, the search function finds everything but
the mail you're looking for, and Outlook's disability to quote
decently is notorious for having led to the whole world generating
only top-posting replies.

Outlook is essentially responsible for making email so much worse
today than it was in the 1990s.

Even Salsa's and github's praised way to communitate in an MR is
VASTLY inferior to a decently threading mail client like mutt or even
Thunderbird.

I violently disagree with the rest of the message as well and am not
willing to spoil the rest of my day by replying in detail. I'd prefer
learning a bit more Slowfoxtrot later tonight.

Best regards
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: what about Netplan?

2024-07-15 Thread Marc Haber
On Mon, 15 Jul 2024 15:35:32 +0200, Lukas Märdian 
wrote:
>I don't want people to think too much in terms of "sd-networkd VS Netplan",
>but rather in terms of "sd-networkd PLUS Netplan". Contributors to Netplan
>naturally build up knowledge in sd-networkd (and NetworkManager), so we would
>actually have more minds knowledgeable about our network stack.

Other than being fully RFC 1925 6a compliant, why do we need that
layer then? And why do we need it in the installer, which is only
geared to supposed the most easy network configurations?

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: default network management tools

2024-07-11 Thread Marc Haber
On Thu, 11 Jul 2024 13:48:06 +0200, Marco d'Itri  wrote:
>On Jul 11, Matthias Urlichs  wrote:
>
>> On 11.07.24 08:13, Marc Haber wrote:
>> > Therefore, you could change
>> > configuration while the Interfacce was up and then just say "ifdown ;
>> > ifup" and be fine. No network configuration software up to today has
>> > THAT feature.
>> Shouldn't "systemctl reload systemd-networkd" do exactly that?
>Indeed, it does.

When I tried it last time, it didnt remove changed addresses, just
added the new ones. Maybe it grew that functionality in the mean time
and I didnt notice.

Greetings
Marc
-- 

Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: ifupdown maintenance

2024-07-10 Thread Marc Haber
On Wed, 10 Jul 2024 23:15:24 +0200, Ansgar ?  wrote:
>On Thu, 2024-07-11 at 05:14 +0900, Simon Richter wrote:
>> It is supported *now*, but the roadmap is unclear -- that support could 
>> be discontinued at any moment, and it would not be the first time a 
>> feature Debian relied on was removed.
>
>I understand your fears about the uncertainty of future developments.
>After all ifupdown is without doubt in a bit problematic state due to
>isc-dhcp-client no longer being supported, a feature Debian relied on,
>and as far as we know the support for alternatives like dhcpcd-base
>could end at any time as well.

Pulling the plug on isc-dhcp-client was not a nice move of ISC in the
first place. I can understand why isc-dhcp-server was replaced by kea,
but deprecating the client was, well, an unfriendly act.

While there are numerous alternative implementations of DHCP client,
the Linux world seems to be without a working DHCP relay
implementation in those days. That's REALLY bad for an installation
with Linux routers.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: default network management tools (was: ifupdown maintenance)

2024-07-10 Thread Marc Haber
On Wed, 10 Jul 2024 18:36:19 +0200, Bernd Zeimetz 
wrote:
>yes please, I would love to see Debian switch from ifupdown to
>NM/networkd. ifupdown was the perfect tool for the time it was created
>in, but things have advanced, and imho now is a good time to switch.

I agree. Nothing has yet reached the ease-of-use-level¹ of ifupdown
paired with ifupdown-scripts-zg2 that I maintained and used in the
2000 years, but I eventually decided to drop that easy-of-use for
networkd, lowering my workload significantly.

Greetings
Marc

¹ ifupdown-scripts-zg2 cached commands needed for the takedown of the
interface when it was brought up and didnt need the interface
configuration to take it down. Therefore, you could change
configuration while the Interfacce was up and then just say "ifdown ;
ifup" and be fine. No network configuration software up to today has
THAT feature.
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Suggestions about i386 support

2024-06-14 Thread Marc Haber
On Fri, 14 Jun 2024 21:04:23 +0200, Ben Hutchings
 wrote:
>But we definitely should
>discourage users from using i386 kernel packages on 64-bit-capable
>hardware, if we don't drop them entirely.  I keep meaning to implement
>a boot-time warning about that...

We could build that into the update-grub kernel snippet, with the
advantage that it would be easier to get rid of the warning locally.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Illegal Instruction Using sudo in Bookworm on i686

2024-06-09 Thread Marc Haber
On Sun, 09 Jun 2024 20:39:27 -0500, r...@neoquasar.org wrote:
>Based on these NEW i686-class systems being available, are people more willing 
>to spend the time to support them, knowing that the code will be used on 
>hardware still supported by its manufacturer, still under warranty, still in 
>production use, etc.?

It is not enough to be willing. It is necessary to actually do. I
think that once i686 (re)qualifies as release arch, it will be (again)
one.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Illegal Instruction Using sudo in Bookworm on i686

2024-06-09 Thread Marc Haber
On Sat, 08 Jun 2024 07:25:49 +, Laszlo Merenyi
 wrote:
>I was able to make sudo (and visudo) executable working on this CPU, by 
>recompiling the sudo-1.9.15p5 source code package on the target with manually 
>removed "-fcf_protection" hardening option.
>
>I did not yet met any other program in Bookworm's i386 release having similar 
>"illegal instruction" issue. So, by using a recompiled sudo, Bookworm seems to 
>work on Vortex86DX3.

I am part of the sudo maintainer team in Debian. Sudo is a security
relevant software, and in the team we decided that it is more
important to have a maximally hardened binary than to run on hardware
that doesnt have official support.

I'd rather not weaken sudo security for all over supporting a tiny
part of the hardware base. Also, the bug is a toolchain topic in my
opinion, sudo is just a user of the problematic toolchain features.

I'm open for arguments though. Please also see #1043281 which has most
of the technical points there.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: DEP17 /usr-move: debootstrap set uploaded

2024-06-06 Thread Marc Haber
On Thu, 6 Jun 2024 09:28:52 +0200, Helmut Grohne 
wrote:
>Thanks for bearing with me and also thanks to all the people (release
>team and affected package maintainers in particular) who support this
>work.

Thank you for doing this work. I have rarely seen a change of this
magnitude in Debian that was managed on this professional level. I
especially praise the way you have communicated the progress.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Suggestion

2024-05-31 Thread Marc Haber
On Fri, 31 May 2024 18:35:53 +, nino He?i 
wrote:
>My suggestion is regarding locales. Currently we get to chose locale based 
>on choices of language and keyboard layout and here in lies the problem. 
>Rather than offer locales based on our selections don't,just list all of 
>them in installer and let us users chose which one we want.

The "expert" install offers just this and it can be preseeded
accordingly. My routine choice is en_US.UTF-8, en_GB.UTF-8¹ and
de_DE.UTF-8 with en_US being the default.

|[2/5131]mh@swivel:~ $ < /etc/locale.gen grep -vE '^(#.*|)$'
|de_DE.UTF-8 UTF-8
|en_GB.UTF-8 UTF-8
|en_US.UTF-8 UTF-8
|[3/5132]mh@swivel:~ $ locale
|LANG=de_DE.UTF-8
|LANGUAGE=en
|LC_CTYPE="de_DE.UTF-8"
|LC_NUMERIC=de_DE.UTF-8
|LC_TIME=de_DE.UTF-8
|LC_COLLATE="de_DE.UTF-8"
|LC_MONETARY=de_DE.UTF-8
|LC_MESSAGES=en_US.UTF-8
|LC_PAPER=de_DE.UTF-8
|LC_NAME=de_DE.UTF-8
|LC_ADDRESS=de_DE.UTF-8
|LC_TELEPHONE=de_DE.UTF-8
|LC_MEASUREMENT=de_DE.UTF-8
|LC_IDENTIFICATION="de_DE.UTF-8"
|LC_ALL=
|[4/5132]mh@swivel:~ $

Greetings
Marc

¹ some software comes with its English translation in en_GB and if
that's not present it falls back to the ugly de_DE translation
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Bug#966621: Make /tmp/ a tmpfs and cleanup /var/tmp/ on a timer by default [was: Re: systemd: tmpfiles.d not cleaning /var/tmp by default]

2024-05-29 Thread Marc Haber
On Wed, 29 May 2024 14:35:27 +0300, Hakan Bay?nd?r
 wrote:
>I'll kindly disagree here. I'd rather not have to go back to every 
>system and make sure that they all behave the way I want after doing a 
>periodic, completely boring "apt-get upgrade".

This change is likely to come to the majority of our installations
("stable") with a release upgrade, which is never boring, but one of
the most exciting things that can happen to a Debian stable system.

People doing this responsibly read the release notes before beginning,
and those release notes have in the past contained things that needed
doing manually in the process such as the well-known "please upgrade
kernel first and reboot" during one udev/systemd upgrade.

Ubuntu seems to have put the release notes in an automatism disguise
called do-release-upgrade which probably changes from release to
release regarding what specialty is in the store for this update. We
don't have that, we ask our users to read the release notes.

Greetings
Marc
-- 
--------
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Bug#966621: Make /tmp/ a tmpfs and cleanup /var/tmp/ on a timer by default [was: Re: systemd: tmpfiles.d not cleaning /var/tmp by default]

2024-05-29 Thread Marc Haber
On Wed, 29 May 2024 00:44:29 +0200, Marco d'Itri  wrote:
>On May 28, Andreas Metzler  wrote:
>> I think it is bad choice to deliberately have different behavior for
>> freshly installed and upgraded systems. Offering upgrades has always
>> been one of the major selling points of Debian, and imho this
>> implicitely includes that you do not get a worse or second class Debian
>> installation when you upgrade it than if you installed from scratch.
>I strongly disagree: it is a bad choice to change on upgrades a default 
>which may cause data loss.

I also think that a change of this kind is release notes material. A
system having been updated for two decades is bound to carry some
cruft.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: MBF: drop dependencies on system-log-daemon

2024-05-28 Thread Marc Haber
On Mon, 27 May 2024 15:08:38 +0100, Simon McVittie 
wrote:
>I know fail2ban and logcheck do read plain-text logs (although as
>mentioned, fail2ban already has native Journal-reading support too), and I
>would guess that fwlogwatch, snort and xwatch probably also read the logs.

Those files could use alternatively journal-brief, which also nicely
handles the issue of having a "cursor". With journal-brief a package
could explicitly ask for all log entries since the last run without
having to implement their own method.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Suggestions about i386 support

2024-05-20 Thread Marc Haber
On Sun, 19 May 2024 20:19:12 +0200, Ben Hutchings
 wrote:
>The plan is to keep i386 as a partial architecture that can be used as
>a "foreign architecture" on systems where amd64 is the main
>architecture.

Many people using ancient hardware such as a T60 thinkpad say that's
not enough for them. I can partly understand both sides though.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: About i386 support

2024-05-19 Thread Marc Haber
On Sun, 19 May 2024 15:03:18 +0200, Victor Gamper
 wrote:
>I believe I could swap out the processor on my T60,
>however, I'd both need to have that processor and
>make sure that it is actually possible. It still would
>not really make sense on a platform that only supports
>3G of physical RAM.
>
>Anyways, if the only reason why i386 cd images are not
>supported anymore is the lack of contributors,
>I'd be willing to contribute in that area, if it's possible.

If you don't personally care about that T60, because it's the notebook
your mom gave you for your 16th birthday or so, you would probably be
better served with buying another old T-Thinkpad that can run amd64
AND suport amounts of memory that haven't totally fallen out of time.

Ten year old 64bit Notebooks such as the T420 or T430 (three years
younger than your T60) sell for below 100 Euros. Is that a problem?

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Any volunteers for lintian co-maintenance?

2024-05-10 Thread Marc Haber
On Thu, 09 May 2024 13:57:28 -0700, Soren Stoutner 
wrote:
>However, I personally find lintian to be one of the most helpful tools in 
>Debian packaging. 

+1.

The fact that it doesn perform well on large packages is bad, but that
doesnt make it less useful for smaller packages.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Make /tmp/ a tmpfs and cleanup /var/tmp/ on a timer by default [was: Re: systemd: tmpfiles.d not cleaning /var/tmp by default]

2024-05-08 Thread Marc Haber
On Tue, 07 May 2024 22:29:30 +0100, Richard Lewis
 wrote:
>Holger Levsen  writes:
>> I'm a bit surprised how many people seem to really rely on data in /tmp
>> to survive for weeks or even months. I wonder if they backup /tmp?
>
>I use /tmp for things that fall somewhere between "needs a backup" and
>"unimportant, can be deleted whenever".

For me there is a difference between /tmp and /var/tmp. On all my
systems, /tmp has been a tmpfs for decades, /var/tmp being used for
data that is too large for tmpfs.

Even losing /tmp would probably affect some of my running programs
including the X11 session.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: finally end single-person maintainership

2024-04-12 Thread Marc Haber
On Wed, 10 Apr 2024 22:44:25 +0200, Andreas Tille 
wrote:
>'Require' is probably the wrong word.  I simply have heard from several
>potential young contributors that they feel blocked by the tooling and
>specifically not everything in Git. 

That does not only apply to young contributors. I am an old fart and I
still shy back from packages where I need to familiarize myself with
an uncommon packaging toolchain.

>> then pull them,
>> maybe into different branches,
>
>git-buildpackage maintains two or three branches:  The main packaging
>branch and an upstream branch.  The pristine-tar branch is optional (but
>default in the teams I'm working in)

And not (any more?) default in the tools, thus easily forgotten.

Greetings
MArc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: finally end single-person maintainership

2024-04-12 Thread Marc Haber
On Tue, 9 Apr 2024 20:51:45 +0200, Gioele Barabucci 
wrote:
>Asking maintainers "to use git" means: please push your changes, even 
>those unreleased to a public git repository (salsa, github, codeberg, 
>your own domain...), so other people can contribute 1) knowing that they 
>are working against the same sources the maintainer has on their hard 
>drive, and 2) using git-based workflows.

To have this actually work, I'd like to have published best-practice
things such like "branches with a 'wip-' prefix can have their history
rewritten any time" so that I can use git rebase --autosquash
--interactive to fix my commit errors even on branches that I have
already pushed without feeling bad for doing so.

>dgit is both a Web interface to browse git repositories as wells as a 
>system to access the Debian archive as if it were a git repository, so 
>you can "dgit push" a branch and have the resulting binary uploaded to 
>the archive. (Yes, I'm simplifying here, but that's the gist.)

It is also not well documented for a beginner. I think that the dgit
docs are fine for someone who is already familiar with the tool and
has been using it for some time, but I have tried to read myself into
dgit multiple times and utterly failed with that.

>Salsa is a forge, i.e. a combination of a Web interface, a git server, 
>and a set of integrated features. In comparison to dgit, salsa has, like 
>most forges:
>
>* Merge requests: where people can suggest changes and discuss them with 
>line-based comments (accessible via email, no need to use the Web interface)
>
>* Continuous integration pipelines: as soon as you push a commit, 
>Salsa-CI will try to build a package, cross build it, test it against 
>piuparts, lintian a bunch of other QA tools (kudos to the Salsa-CI 
>developers).
>
>* Integrations with two dozen tools (irc, jenkins, mattermost, bugzilla, 
>but funnily enough not BTS).
>
>* Project specific wikis, snippets, Docker images.
>
>* And with tag2upload salsa fulfills 50% of dgit functionality.

And, a web interface which make the learning curve a lot less steep.

Greetings
Marc
-- 

Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: finally end single-person maintainership

2024-04-12 Thread Marc Haber
On Fri, 12 Apr 2024 09:26:10 +, Mike Gabriel
 wrote:
>Also regarding gbp, my packaging workflow does not require it  
>(debian/-folder-only in Git). Being enforced to use some other pkg'ing  
>style would reduce my fun and end up with less productivity, I fear.  
>The gbp workflow has its pros, but for me it is a too complex overhead  
>without much gain to the end result (the uploaded package).

The debian/-only layout was quite common in the svn days and back then
we had adequate tooling to support that but those tools have rotted
away, it feels unnatural to me, and, frankly, exim's debian/-only
layout (that I introduced myself fifteen^wtwenty years ago) is the
main reason why I am a mostly inactive member on the exim team since I
still don't know any more how to properly build the package.

Greetings
Marc
-- 
--------
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: finally end single-person maintainership

2024-04-12 Thread Marc Haber
On Tue, 9 Apr 2024 18:37:23 +, Holger Levsen
 wrote:
>- I also think disallowing single-person maintainership would be very unwise,
>  though I agree team maintenance in general is probably better than
>  single-person maintainership.

Agreed.

>  Still disallowing single-person maintainership
>  doesnt make a team and motivation lost is often motivation lost forever.

Agreed. It is too easy for three singel maintainers to form a pro
forma team where everyone works on their packages and not on the
others'. You cannot enforce team work.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



About Package Maintenance (was: Question to all candidates: What are your technical goals)

2024-04-08 Thread Marc Haber
This is the continuation of a thread from debian-vote, that originated
from a question about technical goals to the DPL candidates
(https://lists.debian.org/debian-vote/2024/04/msg4.html).

I will try to quote generously to deliver context.

On Thu, Apr 04, 2024 at 12:38:34PM +0200, Andreas Tille wrote:
> Am Wed, Apr 03, 2024 at 05:53:46PM +0200 schrieb Marc Haber:
> > On Wed, Apr 03, 2024 at 10:37:37AM +0200, Andreas Tille wrote:
> > > I see a big problem that we do not follow common standards.  While we
> > > have some teams with strict policies setting those standards internally
> > > to a different level of strictness there is no Debian wide consensus
> > > about things like
> > > 
> > >   A. Packages should be maintained on Salsa
> > >   B. Lets use dh (if possible - I was told there are exceptions)
> > >   C. Commit to latest packaging standards
> > >   D. Make more than one person responsible for a package
> > >   E. General QA work of contributors not mentioned as Maintainer /
> > >  Uploader
> > > 
> > >   [I will reference these items below by their letters]
> > > 
> > > I'm addressing this in the paragraph "Packaging standards" of my
> > > platform.  I'm also very concerned about packages who don't get
> > > any attention any more ("smelly packages") which has two major
> > > reasons:
> > > 
> > >   1. We do not have contributors with free capacity to care for
> > >  problems in other peoples packages
> > >   2. Even if we had those the strict ownership of packages pevents
> > >  that new contributors can step in.  When reading the paragraph
> > >  about NMUs in developers reference[1] this is probably
> > >  sensible for actively maintained packages - but what about
> > >  those packages which do not show any activity for years?
> > 
> > I think this can't just be seen by looking at the statistiks. Many small
> > packages do their job and don't need constant attention as long as they
> > still build and work.
> 
> I agree that pure statistics is not telling the whole story.  However,
> those statistics give some feeling about the issue which for sure needs
> to be verified on case-by-case basis.  I can assure you that I usually
> inspect the list of smelly packages[1] whether there are hits for my
> name (currently one false positive and one package where I'm forced to
> use cdbs) but also look for packages I might be able to salvage from
> there.  I've found some impressive hits for this purpose in the past
> that are supporting my point besides stupid statistics.

I agree with your reasoning here, and I don't see an attack against my
packaging practise here. It is important feedback to me that will help
me to adjust my view on my duties as package maintainer.

[apg, console-log, dnstop]

> > Those three packages I decided not to put work into until there is a
> > technical reason for doing so. I do have all three on the radar and they
> > will properly move to salsa and be modernized once there will be a
> > change to the code or an RC bug regarding packaging. Until then, I have
> > more important things to do.
> 
> Thanks for going into detail about these which I neither wanted nor
> expected in this granularity.  I had no doubt that there are more
> important things for you.  I honestly tried to investigate by using
> these examples is the following:  In case there might be people out
> there who have time and energy to fix this kind of things,  how can we
> enable them to take this work from your shoulders to enable you
> concentrating on more important stuff.

I'm always open to patches, MRs or more involvement of more people. I
doubt that thos three packages are going to get any in the future, and I
surely hope that any external help that I might get from others will be
regarding more important packages that I maintain like sudo or adduser.

I would like to elaborate a bit about adduser, where team collaboration
has worked like a charm.

I seldomly set myself in the Maintainer field any more, even if I am the
only person who has worked on the package in years. Having a
packages.debian.org mailing list in the Maintainer field enables random
people to subscribe to the full stream of package-related e-mails, which
allows interested parties to just peek in and see what's going on, and
also allows inofficial team building. For my most important packages, I
write about my plans to package@p.d.o and am soliciting for comments,
and I still do this while I know that I am mostly talking to myself.

In adduser, this has enabled two people to informally j

Re: Debian openssh option review: considering splitting out GSS-API key exchange

2024-04-04 Thread Marc Haber
On Thu, 4 Apr 2024 13:25:04 +0200, Stephan Seitz
 wrote:
>Am Di, Apr 02, 2024 at 13:30:43 +0200 schrieb Marc Haber:
>>from being vulnerable to the current xz-based attack. Just having to
>>dump an ALL: ALL into /etc/hosts.deny is vastly easier than having to
>>maintain a packet filter.
>
>Stupid question, but if you put „ALL: ALL” into hosts.deny, couldn’t you 
>stop the ssh daemon instead? ALL: ALL will block your ssh access, so it 
>doesn’t matter if the daemon is running or not.

Of course there are sshd: lines in hosts.allow for "my" networks.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Debian openssh option review: considering splitting out GSS-API key exchange

2024-04-04 Thread Marc Haber
On Thu, 4 Apr 2024 13:03:50 +0200, Florian Lohoff  wrote:
>I personally moved to nftables which is nearly as simple once you get
>your muscle memory set.

So you have dedicated packet filters on every machine you run, even if
sshd is the only network-facing service?

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Debian openssh option review: considering splitting out GSS-API key exchange

2024-04-03 Thread Marc Haber
On Wed, 03 Apr 2024 14:10:37 +0100, "Jonathan Dowland"
 wrote:
>On Tue Apr 2, 2024 at 12:30 PM BST, Marc Haber wrote:
>> Please don't drop the mechanism that saved my¹ unstable installations
>> from being vulnerable to the current xz-based attack. Just having to
>> dump an ALL: ALL into /etc/hosts.deny is vastly easier than having to
>> maintain a packet filter.
>
>For you and fellow greybeards, perhaps: I'd be surprised if many people
>younger than us have even heard of tcp wrappers. I don't think the
>muscle memory of a diminishing set of users is a strong argument,
>especially given it's a preference rather than a requirement, and
>alternatives do exist.

It is possible to have that alternative not present without being
noticed (for example, a firewall build script failing, but sshd start
nof failing), whilea security measure built into the very daemon is
way harder to be accidentally disabled while keeping the daemon
running.

I have spent weeks if not months of my life building firewalls that
fail to the safe side (have it "all closed" if something fails during
build), lost them all when we got migrated to nft to do its inadequate
tooling, while hosts.deny and hosts.allow is done in seconds even if
you don't have orchestration.

If there are arguments for keeping tcp-wrappers-compatible security in
sshd, it is NOT muscle memory, it is a techincal founded and solid
preference.

Greetings
Marc
-- 

Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: Debian openssh option review: considering splitting out GSS-API key exchange

2024-04-02 Thread Marc Haber
On Tue, 2 Apr 2024 01:30:10 +0100, Colin Watson 
wrote:
>We carry a patch to restore support for TCP wrappers, which was dropped
>in OpenSSH 6.7 (October 2014); see
>https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-April/032497.html
>and thread.  That wasn't long before the Debian 8 (jessie) freeze, and
>so I patched it back in "temporarily", but then I dropped the ball on
>organizing a proper transition. 

Please don't drop the mechanism that saved my¹ unstable installations
from being vulnerable to the current xz-based attack. Just having to
dump an ALL: ALL into /etc/hosts.deny is vastly easier than having to
maintain a packet filter.

Greetings
Marc

¹ and probably thousands others
-- 
--------
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: proposal: dhcpcd-base as standard DHCP client starting with Trixie

2024-03-13 Thread Marc Haber
On Mon, 11 Mar 2024 07:02:38 +0200, Martin-Éric Racine
 wrote:
>Meanwhile a bare minimal system needs a non-GUI solution and swaping
>which DHCP client gets pulled by ifupdown is the simplest, least
>disruptive way of accomplishing this.

Most bare minimal non-GUI systems run fine with systemd-networkd in my
world.

Greetings
Marc
-- 
----
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: How to ask efficiently for removal of 32 bit architectures of about 40 packages (Was: reverse dependenc)

2024-03-13 Thread Marc Haber
On Mon, 11 Mar 2024 20:26:40 +, Holger Levsen
 wrote:
>foo="bin1
>bin2
>bin3"
>
>$file=/some/path/to/bugreport_without_package_line.txt
>tmpfile=$(mktemp)
>
>for package in $foo ; do
>   ( echo "package: $package" ;
> cat $file ) > $tmpfile
>   do mutt -s "RM: remove $package" -i tmpfile $package
>   sleep 15m
>done
>rm $tmpfile
>
>with 40 packages this is just a 10h running script ;)

A very nice example for Koehntopp's rule: "Verwende perl¹. shell will
man können, dann aber nicht verwenden"²

Greetings
Marc

¹ it would be python nowadays, the saying is 25 years old
² "Use perl. You want to know how to write shell scripts, but not
actually do it"
-- 

Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: usrmerge breaks POSIX

2024-02-15 Thread Marc Haber
On Thu, 15 Feb 2024 00:05:36 +0100, Vincent Lefevre
 wrote:
>This is invalid. See
>
>  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817168

That doesnt answer the question asked, it is a bug from 2016 that was
fixed since then, and I am one of those who fails to see the
connection between the subject of this thread and the nebulous claims
you make in the messages AND obviously refuse to explain your
reasoning if asked.

Russ and Ansgar are among the brightest people in Debian, so if they
don't understand what you mean, I suggest answering their question
instead of throwing more fog.

Greetings
Marc
-- 
--------
Marc Haber |   " Questions are the | Mailadresse im Header
Rhein-Neckar, DE   | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 6224 1600402



Re: /usr-move: Do we support upgrades without apt?

2023-12-21 Thread Marc Haber
On Thu, Dec 21, 2023 at 11:19:48AM -0300, Antonio Terceiro wrote:
> On Thu, Dec 21, 2023 at 10:41:57AM +0100, Helmut Grohne wrote:
> > Is it ok to call upgrade scenarios failures that cannot be reproduced
> > using apt unsupported until we no longer deal with aliasing?
> 
> I think so, yes. I don't think it's likely that there are people doing
> upgrades on running systems not using apt.

Do those GUI frontends that work via packagekit or other frameworks
count as "using apt"? I now that WE recommend using apt in a text
console outside of X, but even many of our own users do what their
Desktop Environment does, and our downstreams like *b*nt* recommend
other ways to upgrade as well.

Greetings
Marc

-- 
-----
Marc Haber | "I don't trust Computers. They | Mailadresse im Header
Leimen, Germany|  lose things."Winona Ryder | Fon: *49 6224 1600402
Nordisch by Nature |  How to make an American Quilt | Fax: *49 6224 1600421



Re: Reaction to potential PGP schism

2023-12-15 Thread Marc Haber
On Thu, 14 Dec 2023 23:00:41 +0100, Joerg Jaspert 
wrote:
>On 17077 March 1977, Stephan Verbücheln wrote:
>
>> How can Debian deal with this? Should Debian intervene to prevent the
>> worst?
>
>We, as Debian, look and wait what comes out. And then *MAY* at some
>point decide to add (or switch to) a new thing, if that appears better. 

In summary, this is bad news for the security of people, since there
will be ANOTHER competing and incompatible standard which will make
finding a basis for communication significantly harder, raising the
bar for a beginner even higher than it is already today.

Sad Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: What would help the most?

2023-10-29 Thread Marc Haber
On Fri, 27 Oct 2023 14:00:45 -0500, Lukasz Szybalski
 wrote:
>What is the minimum most value thing that would help YOU accomplish your
>goals for Debian ?

I do not quite understand the question, so my answer might be a bit
off.

I'd like to have conffile management improved. Debian is already
better than other distributions in this regard, but I'd still have a
few additional features. For example having some kind of interactive
merge function that could be invoked during package installation
instead of the "do you want their conffile, your conffile, an editor
or a shell" prompt.

I'd like to have better tooling for conffile handling in maintainer
scripts, some convergence of dpkg and ucf, possibly a more declarative
approach or more boilerplate code that is easier to debug.

And I'd like Debian packages to make consequent use of this mechanism
which is one that makes Debian special.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Illegal Instruction Using sudo in Bookworm on i686

2023-10-18 Thread Marc Haber
On Tue, 17 Oct 2023 10:57:41 -0500, Justin  wrote:
>Similar issue in Gentoo:
>https://bugs.gentoo.org/show_bug.cgi?id=862201 
><https://bugs.gentoo.org/show_bug.cgi?id=862201>
>
>Similar issue in FreeBSD, more recent, but different processor:
>https://forums.freebsd.org/threads/illegal-instruction-after-12-4-upgrade-i386.89353/
> 
><https://forums.freebsd.org/threads/illegal-instruction-after-12-4-upgrade-i386.89353/>
>
>Relevant GCC commit:
>https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=77d372abec0fbf2cfe922e3140ee3410248f979e
> 
><https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=77d372abec0fbf2cfe922e3140ee3410248f979e>

The corresponding Debian issue are probably #1004893 and #1043281
which was boiled down to a GCC issue, #1005863 and
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104713

As the sudo maintainer, I am reluctant to turn off a hardening feature
to support ancient CPUs. I would be reluctant to do that for a normal
package, but ESPECIALLY for a package like sudo which is installed
nearly everywhere and contains an suid root binary.

I am willing to consider arguments and Ctte advice, but as things are
now I am fine with the current state.

Greetings
Marc
-- 
------ !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: /usr/-only image

2023-09-12 Thread Marc Haber
On Tue, 12 Sep 2023 14:37:10 +0900, Simon Richter 
wrote:
>The problem isn't so much the location of the configuration file, but 
>the method used to merge default, distro-provided and system-specific 
>configuration, and how much deviation from the default configuration is 
>expected.
>
>I'd argue that udev and systemd are kind of special here in that they 
>mostly provide a registry for other components to hook into, and that 
>the majority of users stick with the default configuration.

I'd go so far that the systemd/udev way is a strategy to cope with
nearly non-existent conffile handling on non-Debian distributions. We
didn't do ourselves a favor by blindly adopting this scheme, while
we're having a vastly superior package managed that handles conffiles
and conffile changes so nicely.

Please considernot throwing this advantage away for the rest of our
distribution.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: DEP-5 copyright with different licenses for two parts of the same file

2023-08-30 Thread Marc Haber
On Tue, 29 Aug 2023 09:45:36 -0700, Russ Allbery 
wrote:
>This is the intended purpose of "and": cases where one file is covered by
>multiple licenses simultaneously. 

Thank you. I missed the "Syntax" paragraph in the DEP-5 specification.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



DEP-5 copyright with different licenses for two parts of the same file

2023-08-29 Thread Marc Haber
Hi,

in daemon(1), I have a file with has two contradicting licenses in the
same file. See
https://salsa.debian.org/debian/daemon/-/blob/master/libslack/getopt.c

>From the wording of the second copyright notice, I think it is clear
that that notice applies to the POD documentation included in the file
while the actual code is LGPL. Upstream confirms that this is the
intention and agrees that this is somehow suboptimally worded.

Now, how do I write this in a DEP-5 copyright file? Having two stanzas
for the same file gets flagged by Lintian as an Error, and the DEP-5
syntax doesn't seem to allow to mention two Licenses in the License:
line.

Any hints woule be appreciated.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -----
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: DEP 17: Improve support for directory aliasing in dpkg

2023-04-27 Thread Marc Haber
On Thu, 27 Apr 2023 12:53:31 +0200, Helmut Grohne 
wrote:
>failing
>our Code of Conduct

The thread went CoC and died. End of discussion for me.

-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Upgrade package from init script to Systemd, move config folder

2023-04-27 Thread Marc Haber
On Thu, 27 Apr 2023 08:20:34 +0200, Simon Richter 
wrote:
>On Wed, Apr 26, 2023 at 04:25:19PM +0200, Marc Haber wrote:
>> I am not sure whether it is doing non-systemd users a favor to keep a
>> probably outdated, bitrotting and untested init script in the
>> canonical place. My gut feeling is that it might be better to ship the
>> old init script in /usr/share/doc/package/examples unless the package
>> maintainer is reasonably sure that the init script will actually work.
>
>No, that is worse, because if an updated init script is shipped as an
>example only, I will not even get a notification that I might want to
>change my installed init script.

You have a point here. Maybe it would be a good idea to have a
standardized function in /lib/lsb/init-functions that emits a warning
that the package maintainer has changed the mechanism to invoke the
daemon and that the init script might need additional work, so that a
lazy maintainer like me might just call that function to give the
local admin a heads-up.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: DEP 17: Improve support for directory aliasing in dpkg

2023-04-27 Thread Marc Haber
On Thu, 27 Apr 2023 07:58:35 +0200, Simon Richter 
wrote:
>On Thu, Apr 27, 2023 at 12:34:06AM +0200, Helmut Grohne wrote:
>> At some point the question becomes: Do we want that complexity inside
>> dpkg (aka DEP 17 or some variant of it) or outside of dpkg (i.e. what
>> we're talking about here). It seems clear at this time, that complexity
>> is unavoidable.
>
>My gut feeling is that returning to "dpkg's model is an accurate
>representation of the file system" will be less complex to manage
>long-term. For this to work, the model needs to be able to express
>reality, so I guess we can't avoid updating dpkg.

My gut feeling is that we are wasting prescious time of numerous
skilled Debian Developers to find ugly workarounds to something that
should be done in dpkg, but isnt being done because one dpkg
maintainer has decided to not go the way the project has decided to
go.

This inability to find consensus, to take decisions, accept and follow
them is one of the most central problems that Debian has.

Greetings
Marc
-- 
------ !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Upgrade package from init script to Systemd, move config folder

2023-04-26 Thread Marc Haber
On Mon, 24 Apr 2023 15:48:02 +0100, Matthew Vernon
 wrote:
>One thing I'd say is: please keep the init script in your package, so
>that people using inits other than systemd can continue to use it.

I am not sure whether it is doing non-systemd users a favor to keep a
probably outdated, bitrotting and untested init script in the
canonical place. My gut feeling is that it might be better to ship the
old init script in /usr/share/doc/package/examples unless the package
maintainer is reasonably sure that the init script will actually work.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Bug#995189: RFH: isc-dhcp

2023-03-08 Thread Marc Haber
On Tue, 07 Mar 2023 20:26:20 +0100, Ansgar  wrote:
>Only the client and relay are no longer maintained upstream. The server
>is still maintained and there is no need to drop it from Debian.

They pulled the plug on relay and client from now to immediately, with
no obvious replacement on the relay side, and then announced EOL for
the server for end of 2022, leaving the world without the reference
implementation.

This is really bad.

Grüße
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Yearless copyrights: what do people think?

2023-02-22 Thread Marc Haber
On Wed, 22 Feb 2023 15:40:49 +0100, Jonas Smedegaard 
wrote:
>Quoting Daniel Baumann (2023-02-22 14:30:11)
>> while having copyright information centrally available per package in
>> d/copyright is definitly a usefull service, is providing the *years*
>> really a service worth providing?
>> 
>> personally I don't think so: for packages with non-trivial d/copyright,
>> it's a significant effort to keep the years in sync with the upstream
>> sources.
>
>Ensuring that debian/copyright stays correct take some effort, but that
>is required to re-examine anyway for each new upstream release.
>
>I dare question that examining copyright *years* in particular is
>noticably larger effort than the general required examination.

If copyright inspection is like three quarters of the effort necessary
to get, for example, a new sudo into Debian, then we are doing things
wrong and setting our priorities wrong. This is indrecibly frustrating
and time consuming busy work that doesn't require my qualification at
all, and I REALLY have other things to do than that.

It is especially frustrating when we're obviously being holier than
the pope, when for example translators submit translations for very
obviously non-FSF software with "Copyright Free Software Foundation"
or with boilerplate copypaste headers stating a license that is
totally different from the package that is being translated etc.

Strictly, as a maintainer I MUST reject such translations because a po
file also contains work by the original author which a translator
cannot arbitrarily relicense, not even accidentally by just not paying
proper attention.

>> (and I doubt that all our source packages have accurate d/copyright,
>> even less so when it comes to the year-information.)

Amen.

While I understand that having debian/copyright is vitally important,
we NEED to relax our rules to reduce the effort necessary since it's
demotivating busy work that I feel noone cares about.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Configuration files, local changes, and "managed section" markers

2023-02-15 Thread Marc Haber
On Tue, 14 Feb 2023 11:23:55 -0800, Russ Allbery 
wrote:
>I think the right answer (which as is often the case involves a lot more
>work) is to break the configuration file into separate parts, one of which
>is a true configuration file in the Policy definition and the other of
>which is the settings that are needed by the upstream software but that
>aren't a configuration file in the Debian sense (and thus aren't
>user-modifiable), put the latter in /usr, and convince the program to load
>them both in some way.

I must say that I really like the idea of having "managed sections",
allowing half-conffiles which is much easier to handle for non-complex
cases where configuration is just a few lines and which would appear
overly complex if we'd split that into conffile and non-conffile.

The "split it" approach is something that comes naturally to someone
who has been heavily socialized in the Debian Universe because we
handle conffiles on a file level. It feels unnatural and clumsy for
someone who is not familiar with the deep historic reasons for us to
do it like that.

The issue is, however, a lot more complicated than one would might
think, imagine a structured configuration file like a systemd unit or
an icinga or bind or ISC DHCP config file which would need multiple
"managed sections", and the special case of a setting moving from
managed to non-managed in the package or at the local admin's
discretion.

<---rant--->
On the other hand, putting non-changing configuration in /usr reminds
me of the systemd way to handle things, with a complicated combination
of "if an identically named file is in /etc, it overrides the
package-delivered configuration entirely without the local admin
noticing that there was an upstream change" and "put configuration
snippets in a magic place in /etc and it will augment the
package-delivered configuration without the local admin notiting that
the upstram changed in a way that is incompatible with the local
augumentation". This way to handle things was of course invented in
the Red Hat world because rpm's conffile handling is so vastly
inferior to what we have available for 25 years now, and sadly we have
taken this over 1:1 into Debian, not making use of your vastly
superior methods here in favor of being compatible with Red Hat's
worse solution.


>If the right fix isn't available, I would be tempted to convert the whole
>configuration handling to ucf or something similar that has built-in
>functionality to try to handle cases like this.

ucf is actually what dpkg should have been, I'd recommend it
wholeheartedly, but we need more automation for that.

Debian's way to handle conffiles is the best the Linux world has. That
doesn't mean that we don't have room to improve. And sadly, we haven't
moved a single inch here in 15 years.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: need we support unshadowed passwords from the installer

2023-01-14 Thread Marc Haber
On Fri, 13 Jan 2023 21:11:40 -0500, nick black
 wrote:
>i'm absolutely not suggesting we stop supporting NIS or other
>programs which rely on unshadowed passwords. it's a big ol'
>tent, and we have more than enough room for you to carry forth
>the torch of Solaris 2. i just don't think this belongs in the
>installer anymore.

Amen. NIS-based systems usually have professional administrators who
are well able to change the configuration.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Help setting dbconfig-common for MariaDB, not MySQL

2023-01-03 Thread Marc Haber
On Mon, 2 Jan 2023 17:08:25 +0100, Paul Gevers 
wrote:
>Hi Marc,
>
>On 02-01-2023 16:58, Marc Haber wrote:
>> On Mon, 2 Jan 2023 16:31:17 +0100, Paul Gevers 
>> wrote:
>>> On 02-01-2023 14:21, Alessandro Vesely wrote:
>>>> A user complained that MySQL doesn't work, because it misses the INET6
>>>> type that the example settings use.
>>>
>>> And is this an absolute must? (It's an example after all?)
>> 
>> It is. We need to stop having "disable IPv6" as measure 1 if something
>> doesn't work right. It's the default IP protocol for a decade.
>
>Are you saying that MySQL doesn't support IPv6? Or just that the "INET6 
>type" in the context of MariaDB is a MariaDB specific implementation of 
>something? (Sorry, I didn't investigate and assumed the latter).

I didn't investigate and assumed some kind of the former.

Anyway, since we have a diversion between MySQL and MariaDB here that
causes dbconfig-common to trip over an IPv6 issue, I see the usual
solution coming over the horizon and wanted to object against that
one.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Help setting dbconfig-common for MariaDB, not MySQL

2023-01-02 Thread Marc Haber
On Mon, 2 Jan 2023 16:31:17 +0100, Paul Gevers 
wrote:
>On 02-01-2023 14:21, Alessandro Vesely wrote:
>> A user complained that MySQL doesn't work, because it misses the INET6 
>> type that the example settings use.
>
>And is this an absolute must? (It's an example after all?)

It is. We need to stop having "disable IPv6" as measure 1 if something
doesn't work right. It's the default IP protocol for a decade.

Greetings
Marc
-- 
------ !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-11-28 Thread Marc Haber
On Mon, 28 Nov 2022 15:50:56 +, Benjamin Drung 
wrote:
>On Tue, 2022-07-19 at 08:49 +0200, Marc Haber wrote:
>> We implemented that change last week, and promptly a bug report
>> (#1014901) appeared, giving what we consider good arguments to change
>> this back to 0700. Here is what the adduser team considers possible
>> documentation for this, and we itend to include this in NEWS.Debian as a
>> rationale for the change.
>> 
>> [...]
>> 
>> As mode 0700 provides both the most secure, unsurprising default, and is
>> in line with most other major distributions, the adduser team considers
>> the matter to be settled; any further discussion should come prepared
>> with rationale, support, convincing use cases and a significant public
>> discussion period.
>
>Ubuntu changed the default DIR_MODE to 0750 in January 2021 [1] with the
>same intention than Debian now. I like to see Debian and Ubuntu agree on
>one default DIR_MODE to keep the package difference small and make
>documentation shareable.

See NEWS.Debian for adduser 3.123 and the "default for DIR_MODE"
chapter in
https://salsa.debian.org/debian/adduser/-/blob/master/debian/README ¹.
I am tired of this discussion and will not change this decision until
overridden by the ctte.

Greetings
Marc

¹ the next upload will have this README actually installed to the
package, I apologize for this bug
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: transition to usrmerge to start around 2022-09-15 (next Thursday)

2022-09-11 Thread Marc Haber
On Sun, 11 Sep 2022 11:08:44 -0400, Marvin Renich 
wrote:
>* Ansgar  [220910 09:37]:
>> the transition to usrmerge as described in [1] is planned to start
>> around 2022-09-15 (next Thursday).
>[snip]
>> We will send an announcement to debian-devel-announce@ once the upload
>> to unstable happens.
>
>What is the point in waiting until after the upload to send to
>debian-devel-announce?  I would think that most users running
>testing/unstable would want prior notice, and you shouldn't assume that
>all users will read their mail before performing a routine
>update/upgrade cycle on the morning after the upload.  I don't think
>everyone running testing/unstable reads debian-devel, so I think it
>would be appropriate to send to -announce at least one (two?) day(s)
>before the upload.

And, is there a solution for the existing conflict with the dpkg
maintainer?

Greetings
Marc
-- 
------ !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Comments on proposing NEW queue improvement (Re: Current NEW review process saps developer motivation

2022-08-30 Thread Marc Haber
On Mon, 29 Aug 2022 00:15:27 -0400, Scott Kitterman
 wrote:
>If I look at a package and determine it's only in New due to a new binary 
>package name and that means the project has prohibited me from looking for 
>other issues in the package until some time later when it's not in New, then I 
>feel pretty precisely like I'm prohibited from doing something.

You could just not look at the packagein binNEW until you, with your
private hat on, had the time to look at the copyright file before
putting the ftpmaster hat on back again. Can mere mortals look at
packages in binNEW to inspect them for bugs in debian/copyright?

Of course, that would just circumvent the decision of the project and
not gain us anything.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Epoch for node-markdown-it

2022-08-22 Thread Marc Haber
On Mon, 22 Aug 2022 14:55:13 +0200, Wouter Verhelst
 wrote:
>Someone using 22.something rather than 12.something in a version number,
>to me, sounds like someone making a "serious mistake".
>
>So this is *exactly* what epochs are meant for!

Exactly my feeling. In the last years, we have been taking away the
reasons for using epochs one by one, making me wonder whether we
should keep that component of our version numbers in the first place
..

>The something+reallysomethingelse convention is evil and should never
>have been invented in the first place. It's extremely confusing to
>users, and an epoch is *hidden* from them.

... because it has been totally confusing to me since I started using
Debian that epochs are not always shown.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: adduser default for sgid home directories

2022-07-28 Thread Marc Haber
On Wed, 27 Jul 2022 16:10:18 +0200, Wouter Verhelst
 wrote:
>On Mon, Jul 25, 2022 at 07:06:59PM +0200, Marc Haber wrote:
>> I don't like the idea of messing with old NEWS entries at all.
>
>I'm trying to understand why you feel this way.

It feels like rewriting history. Maybe the similiarity of the format
to debian/changelog AND the fact that the same tool is used to edit
supports that.

[correct rationale snipped]

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: adduser default for sgid home directories

2022-07-25 Thread Marc Haber
On Mon, 25 Jul 2022 09:05:55 -0700, Josh Triplett
 wrote:
>Matt Barry wrote:
>> On Mon, 2022-07-25 at 14:37 +0100, Colin Watson wrote:
>> > On Sun, Jul 24, 2022 at 12:34:31PM -0400, Matt Barry wrote:
>> > > Anyway, its been released at this point, so the issue is moot :)
>> >
>> > Regardless of the rest of the discussion, this isn't entirely true.
>> > Yes, people following unstable will have already seen the NEWS entry
>> > and
>> > apt-listchanges won't show it again for that version, but it's still
>> > possible to edit it retroactively so that (for example) people
>> > upgrading
>> > between stable releases see improved text.  That can sometimes be
>> > worthwhile.
>> >
>>
>> That is a good point, and probably something we should plan to do.
>
>In particular, it may make sense to edit this NEWS entry and the
>previous one, to avoid presenting two entries to stable users for two
>different successive changes, rather than just one effective change.

I don't like the idea of messing with old NEWS entries at all.

In this case, an exception might be warranted, but we need to have the
long explanation somewhere in the package for the next round of this
issue that is expected in the 2030ies.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Please test adduser from experimental

2022-07-22 Thread Marc Haber
Hi,

the adduser team has recently done an experimental upload fixing another
bunch of long-standing bugs. Those changes might influence adduser's
behavior in package maintainer scripts and I would like to ask you to
try adduser 3.124 from experimental if you do "weird things" with groups
in your maintainer scripts or if you are using group-related
configuration in adduser.conf.

The changes will also affect the way new non-system users are placed
into their respective groups.

The most important things that were changed are:

- We have clarified adduser's behavior regarding primary and
  supplemental groups.
- If USERGROUPS=no, it is now possible to specify the group for all
  users either with its GID or with its name (USERS_GROUP vs USERS_GID)
- If USERGROUPS=yes, USERS_GROUP and USERS_GID will be used to specify
  a supplementary group
- it is also possible to not have a group for all users at all
- --add_extra_groups is now --add-extra-groups for consistency of
  option spelling (old spelling still allowed, but deprecated)
- there is now a --firstgid and a --lastgid option to influence the GIDs
  chosen for usergroups

Greetings
Marc

-- 
-----
Marc Haber | "I don't trust Computers. They | Mailadresse im Header
Leimen, Germany|  lose things."Winona Ryder | Fon: *49 6224 1600402
Nordisch by Nature |  How to make an American Quilt | Fax: *49 6224 1600421



Re: how about telegram channel

2022-07-19 Thread Marc Haber
On Tue, 19 Jul 2022 21:01:22 +0200, Bartosz Fenski 
wrote:
>I'm tired of keeping VPS just to have IRC client and to be honest I 
>think modern solutions like Telegram are simply easier and much more 
>practical nowadays.

It would also be simply easier and much more practical nowadays to
ship an official installer that allows installation on modern hardware
without hiding our head away in "we're fully free, but sadly we dont
run on modern hardware unless you ditch that and use those unofficial
images"

That being said, I'll consider using a non-free chat service once we
start shipping needed firmware on official media.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



adduser default for sgid home directories (was: Seeking consensus for some changes in adduser)

2022-07-18 Thread Marc Haber
Back in March, I wrote in ,
https://lists.debian.org/debian-devel/2022/03/msg00304.html:
> My post-discussion answer to question (1c) is yes, but I am still open
> for arguments. If noone convinces me, the default for DIR_MODE will be
> changed to 2700 (see (4) below).
> 
> (...)
> 
> A setgid bit on a non-group-readable directory might seem strange
> though. Are there arguments against doing so aside from the ugly "S" in
> ls output?

We implemented that change last week, and promptly a bug report
(#1014901) appeared, giving what we consider good arguments to change
this back to 0700. Here is what the adduser team considers possible
documentation for this, and we itend to include this in NEWS.Debian as a
rationale for the change.

Please comment.

Suggested Documentation Text Follows:
In adduser 3.122, we implemented code that allows setting the default
for the mode bits of the home directory of a newly created system user
independently of the mode bits of the home directory of a newly created
non-system user (SYS_DIR_MODE vs DIR_MODE).

This was in part done to finally solve #643559, which requested setting
the sgid bit for the home directory of a non-system user by default, in
order to ease setting access permissions of shared workspaces in
multi-user systems. This default has oscillated back in forth in adduser
multiple times since the 1990ies, because both ways to set this bit by
default have advantages and disadvantages.  After a preliminary request
for comment (see
https://lists.debian.org/debian-devel/2022/03/msg00098.html), the
default value for DIR_MODE was changed to 2700 in adduser 3.122 (July
2022).  Sadly, though the technical reasoning for NOT setting the bit
have largely not survived the last two decades, here remain some use
cases impacted by the change which we were not fully aware of. 

Promptly, #1014901 was filed, requesting that DIR_MODE be changed to
0700, effectively causing home directories of non-system users to be
created without the sgid bit. The biggest point in the reasoning is that
having the sgid bit set will need special measures to keep the home
directory's group ownership from propagating to file system images,
chroots, and archives, causing wrong file ownership/permissions in those
entities, which in turn might propagate to different systems and cause
security-related effects there.  The bug report gives instructions to
reproduce the behavior.

System administrators who run multi-user environments which require
shared workspaces have tools at their disposal to change the default
behavior as their individual needs require, and likely are aware of how
to work around any issues that arise as part of that configuration; it
is also very possible that such systems may be managed using
configuration management software.  In an age of general purpose use on
one end, and single purpose containers on the other, this is unlikely to
be the majority of newly installed systems.

So what remains is the decision to provide a sane default for a system
that is installed by an end-user, who may not understand or be aware of
this setting at all, but who still might use Internet HOW-TOs to build
chroots, images or archives, inadvertently causing security issues on
third-party systems.  The clear and unsurprising solution is to leave
the sgid bit for newly created users off by default.  This is also
important to keep the support effort for other packages down. Users
surprised by the behavior might file bugs against other packages,
increasing the effort necessary to support those other packages.

In adduser 3.123, DIR_MODE will be changeed to 0700, flipping the
default for the sgid bit once again to the value we have had for the
majority of Debian's existence period. With this change, Debian is
re-joining ranks again with ALL other major Linux distributions, none of
which setting the sgid bit on home directories to 1 (research done in
July 2022).

As the root user and its home directory is created by other means, this
primarily affects the one user that can be created in the Installer
before there is any possibility to configure adduser. Those users will
now again have the sgid bit of the home directory set to 0.  Again,
system administrators have the tools and documentation to configure
their systems as their individual requirements dictate (using DIR_MODE,
and/or fixing those initial directories).

As mode 0700 provides both the most secure, unsurprising default, and is
in line with most other major distributions, the adduser team considers
the matter to be settled; any further discussion should come prepared
with rationale, support, convincing use cases and a significant public
discussion period.

Greetings
Marc

-- 
-----
Marc Haber | "I don't trust Computers. They | Mailadresse im Header
Leimen, Germany|  lose things."Winona Ryder | Fon: 

Re: Bug#1014908: ITP: gender-guesser -- Guess the gender from first name

2022-07-14 Thread Marc Haber
On Thu, 14 Jul 2022 12:54:52 +0100, Steve McIntyre 
wrote:
>And I see you uploaded ~immediately - why even bother with an ITP?

Is it proper procedure to upload without an ITP?

-- 
-- !! No courtesy copies, please !! -----
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: [adduser] default group for 'dynamically allocated system users'

2022-07-06 Thread Marc Haber
On Wed, 06 Jul 2022 15:21:03 -0400, Matt Barry 
wrote:
>On Mon, 2022-07-04 at 09:12 +0200, Marc Haber wrote:
>> adduser has been putting newly created 'dynamically allocated system
>> users' (adduser --system) into the nogroup group. It is also
>> documented to do so. There is an ancient bug report complaining about
>> this, and I think this is a valid complaint. However,
>> /usr/share/doc/base-passwd/users-and-groups.txt.gz says that no files
>> should ever be owned by nogroup, making adduser do the right thing in
>> its current state.
>> 
>> Can you come up with a better default for users created with adduser
>> --system without requesting a dedicated group?
>
>One idea worth considering, imho, is what the reporter [0] suggests:
>make --group the default for --system.

I don't like that idea at all, it'll introduce an avalanche of new
groups. That should be in the responsibility of the individual package
maintainer.

>Sysadmin hat, I can think of situations
>where having a dedicated service group is useful (eg. giving r/o access
>to logs).

We do have the adm group for that.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Bug#1014372: ITP: journal-brief -- Show interesting new systemd journal entries

2022-07-04 Thread Marc Haber
Package: wnpp
Severity: wishlist
Owner: Marc Haber 
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name: journal-brief
  Version : 1.1.8
  Upstream Author : Tim Waugh 
* URL : https://github.com/twaugh/journal-brief
* License : GPL-2+
  Programming Lang: Python
  Description : Show interesting new systemd journal entries

 This program can be used to show entries from the systemd
 journal with configurable, flexible filters. Cursor files
 are used to keep information about when journal-brief was
 run for the last time and starts from there. journal-brief
 can output to stdout or send via SMTP.
 .
 journal-brief can, for example, be used to send out e-mail
 after a systemd timer was run, imitating cron's behavior.



[adduser] populating users group even in a usergroups system?

2022-07-04 Thread Marc Haber
Hi,

/usr/share/doc/base-passwd/users-and-groups.txt.gz currently suggests
that the 'users' group is only populated on a system without
usergroups. This would make the users group empty when adduser changes
to having usergroups on by default.

I am now wondering whether a new non-system user should end up in the
users group automatically even if it has its own group created, making
adduser's behavior regarding the users group independent of whether
usergroups are used or not.

What do you think?

Greetings
Marc

P.S.. If adduser gets changed, I will file a bug against base-passwd
to have the docs updated as well, of course
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



[adduser] default group for 'dynamically allocated system users'

2022-07-04 Thread Marc Haber
Hi,

adduser has been putting newly created 'dynamically allocated system
users' (adduser --system) into the nogroup group. It is also
documented to do so. There is an ancient bug report complaining about
this, and I think this is a valid complaint. However,
/usr/share/doc/base-passwd/users-and-groups.txt.gz says that no files
should ever be owned by nogroup, making adduser do the right thing in
its current state.

Can you come up with a better default for users created with adduser
--system without requesting a dedicated group?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Firmware - what are we going to do about it?

2022-06-01 Thread Marc Haber
On Wed, 1 Jun 2022 15:21:01 +, "Andrew M.A. Cater"
 wrote:
>Basic tasks include networking - many IBM and Dell servers use(d) Broadcom
>chipsets which wouldn't work without a non-free driver. Been caught out like
>that installing in a data centre: can't get networking to work to get the 
>drivers I need for the network card.

PXE boot will work and load a kernel and a doctored initrd that
contains the non-free firmware. Been there, done that, for thousands
of machines.

It would be so nice if Debian would offer such an initrd out of the
box.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Firmware - what are we going to do about it?

2022-06-01 Thread Marc Haber
On Wed, 1 Jun 2022 09:41:35 +0300, Hakan Bay?nd?r 
wrote:
>As a person who's handling a lot of servers, I can tell that most high 
>performance hardware is running either load-on-boot (generally ethernet 
>and other network cards) or persistent (generally storage and RAID 
>contollers) non-free firmware blobs.
>
>First category can perform basic tasks without firmware, but servers 
>being servers, this low performance mode is undesirable barring 
>light-load servers which is both a minority and a contradiction to the 
>word server in my profession.

A machine that can boot and install debian without needing the
firmware blob is already one step better than a machine that needs an
install medium with firmware.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Project Improvements

2022-05-25 Thread Marc Haber
On Wed, 25 May 2022 20:21:03 +0200, David Kalnischkies
 wrote:
>apt actually marks dependencies
>of packages in section metapackages as manually installed if the
>metapackage is removed due to the removal of one of its dependencies
>– but doesn't if you decide to remove the metapackage explicitly.

That sounds nice and it's probably good to avoid accidental mass
removals, but it makes the "manual" mark kind of a misnomer.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: shim-signed (was: Firmware - what are we going to do about it?)

2022-04-26 Thread Marc Haber
On Sat, 23 Apr 2022 18:21:47 +0100, Steve McIntyre 
wrote:
>We don't have good docs around this in general (hey, it's security
>software - it's against the law to write good and complete docs!), but
>I've certainly discussed this with a few folks over the years.

It would be great to have that written down somewhere to tell poeple
what they're actually doing.

>Alternatively, people can build replacement shim-signed packages using
>their own root of trust if desired. If we had a large enough number of
>users wanting a different root of trust, we could even offer our own
>different shim-signed package to match.

I would probably prefer to have grub an/or the kernel signed, avoiding
additional code, but maybe having some explanation would convince me
that the shim actually improves things additionally to adding
complexity.

>Better than that, our shim-signed source package always double-checks
>things here. At build time it removes the Microsoft signature and
>compares that shim binary to the binary that we submitted for
>signing. We would spot immediately if there was any code added.

And if that check fails at build time, the Debian process refrains
from putting a Debian signature on the deb and from uploading? Can the
end user build the shim herself, remove the signature from the signed
shim and compare the binary, preferably in a documented way?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: shim-signed (was: Firmware - what are we going to do about it?)

2022-04-26 Thread Marc Haber
On Sat, 23 Apr 2022 13:54:59 +0200, Ansgar  wrote:
>On Sat, 2022-04-23 at 12:21 +0200, Marc Haber wrote:
>> >Is the presence of shim-signed on the install media enough to make
>> >people feel somehow contaminated?
>>
>> I think so, yes. Personally, I don't care too much but i can
>> understand why some people might.
>
>Why?

If only I knew. I myself don't feel to comfortable to rely on
Microsoft being able to pull the plug on us any time. I don't know
whether they can, but I imagine some kind of revocation mechanism
being in place.

And it's anther lay of indirection. While RFC compliant (1925, 6a)
this introduces another possible attach vector since shim-signed might
have to do its own check about the kernel to load. I do not know zilch
about the shim, but this might be an issue for people.

> Because it contains a third-party signature for which the private
>key is not included in Debian? The same is true for signatures in
>debian-archive-keyring, debian-keyring, ca-certificates, wireless-
>regdb, and many other packages.

A running system doesn't rely on any of those.

>If we were to include more signatures in binary packages (e.g., a
>signed manifest listing files (with hashes) shipped by the package,
>signed executables, an embedded signature for the .deb itself), would
>that be a problem?
>
>We do include signatures for source packages (*.dsc and also for
>upstream tarballs) as well.

I would LOVE to have an easier possibility to check the actual
uploader's signature for anything in the archive short of squatting on
every changes file ever visible.

>> We can compile shim-signed and compare the signed code with our own
>> object code, can't we?  That we we would only have to worry about the
>> validity and benignness of the signature and not worry about having
>> undocumented functionality in the signed code.
>
>Debian's buildds build shim (binary package: shim-unsigned); the binary
>generated by Debian is then signed by Microsoft's key.

And we have a mechanism to check whether the code is actually the
same?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



shim-signed (was: Firmware - what are we going to do about it?)

2022-04-23 Thread Marc Haber
On Fri, 22 Apr 2022 11:16:42 +0200, Philip Hands 
wrote:
>I understand the urge to insist upon absolute DFSG purity in the media
>we produce, but when it comes to wanting to avoid every last shred of
>data that we could not regenerate ourselves, I think we crossed that
>line some time ago.
>
>I'm thinking of shim-signed, which is included in our official media.
>
>Despite being free software in source form, it is signed by Microsoft,
>and can only be expected to work with that signature ... which we cannot
>create.
>
>On most (all?) hardware one is able to avoid UEFI secure-boot, so won't
>need to use shim-signed, but I'd imagine that some hardware insists on
>secure-boot, or the opt-outs are somehow broken and so is not usable
>without shim-signed.

Excuse me for asking a user question on -devel, but do we have any
docs where someone explains how much a security trade off is
shim-signed relativ to the optimum? I think that using shim-signed is
surely worse than a directly signed kernel, but I don't know whether I
can tell my system (or shim-signed?) to accept MY or Debian's signed
kernel without the Microsoft intermediate signature, and whether this
is any more secure than running an encrypted system without secure
boot at all.

Do we have docs for that?

>Is the presence of shim-signed on the install media enough to make
>people feel somehow contaminated?

I think so, yes. Personally, I don't care too much but i can
understand why some people might.

>If not, is the problem having other blobs of data on the media that we
>also cannot generate, or is it the licensing of that data, or something
>else?

We can compile shim-signed and compare the signed code with our own
object code, can't we?  That we we would only have to worry about the
validity and benignness of the signature and not worry about having
undocumented functionality in the signed code.

>If it ensures that fewer people abandon Debian out of frustration with
>the install then I'd suggest that it will actually result in less
>non-free software being used overall, as will having the option to
>enable only non-free-firmware without also enabling non-free.

Those are the people who use Ubuntu without even trying Debian because
somebody told them that Debian is SO hard to install.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Firmware - what are we going to do about it?

2022-04-23 Thread Marc Haber
On Thu, 21 Apr 2022 10:12:19 -0700, Russ Allbery 
wrote:
>I've been a Debian Developer for quite some time and can usually manage to
>figure out most tasks like this, and providing separate firmware to the
>installer has completely defeated me every time I've tried it.  I've spent
>frustrated hours trying to follow the documentation and doing things that
>look right only to have the installer say that there's no firmware visible
>without any clue as to how to debug the errors.  Every time I have tried
>this, I have eventually given up and found the non-free images, which just
>worked.

Amen. I know one installation with a five digit number of Debian
systems that uses a hacked installer with the Kernel from CentOS
because that one just works. I have talked to the guy who did that
operation (one of the most competent IT people I know) and he said
nearly the same as Russ said.

>If this is going to be the solution, it has to be WAY easier to do.

Yes, absolutely.

Greetings
Marc
-- 
------ !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Keep both images but stop pretending no-free is unofficial

2022-04-19 Thread Marc Haber
On Tue, 19 Apr 2022 08:21:10 -0600, Sam Hartman 
wrote:
>One valuable suggestion was to make sure users could easily select
>freedom if that's what they wanted.
>So I think a free installation image is important.

Would that not be possible by having an image WITH firmware and an
installer asking whether the user wants a free or a usable system?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -----
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-16 Thread Marc Haber
 on underlying tools (useradd) to reject really
unacceptable names.

For system accounts, the allowed chars are an optional leading
underscore, lower case letters, numbers, underscores, dashes. This means
that packages using names like Debian-exim or Foo will need to keep
their override-option active like today, but new packages using a system
account like _apt can use that name without having to override our
checks.

We still have packages using the dot syntax in chown shell scripts.
There is a new Lintian check to warn for that now, but I don't think
that Debian is ready today to allow dots in user names right now. Local
administrators who need a more permissive regexp for their local users
might change NAME_REGEX and take some responsibility to file bugs
against packages that break with that relaxed setting, but in the
default user accounts will still have to restrain themselves to ASCII
letters (lower and upper case), numbers, underscores, dashes, with
leading underscores not being allowed by the default regexp.

> (3)
> #625758
> --disabled-password just does not set a password for the newly created
> account (resulting in '*' in shadow) while --disabled-login places a '!'
> in shadow. On modern systems with PAM, both variants seem to be
> identical, allowing login via ssh. Aside from the documentation needing
> change to document reality, should we introduce a --no-set-password
> option and deprecate the two older options (to be removed in trixie+2)?

--disabled-password will result in a "*" in /etc/shadow, effectively
making it impossible to use any password based authentication. This will
also suppress the setting of a password during creation of a user
account, which we currently do by just calling passwd and leaving the
work to the subprocess.

--disabled-login will set the login shell to /usr/sbin/nologin,
disabling the account for most usages. This needs changes to the
documentation, we will do that and write an appropriate NEWS.Debian
entry as this may be relevant.

No other changes to options are planned in this regard.

Adduser does not support changing the password of an account that
already exists, there are no plans to change this.

> (4)
> #979385 #248130
> The default for SETGID_HOME is =no, with a comment from the last century
> that states that the default was changed from yes to no because of "bad
> side effects" this had. Does anybody have an idea which bad side effects
> could be meant by that, and what would we possibly break by changing the
> default to "yes"?

I do plan to set the default for DIR_MODE to have the setgid set and to
change SETGID_HOME to yes. SETGID_HOME is redundant if DIR_MODE exists,
so this is going to be deprecated, removed from the docs in trixie and
from the code in trixie+1.

I think it is safe to assume that the "bad side effects" mentioned in
the configuration file are historic and non longer relevant here.

> (5)
> #678615
> should all newly created non-system users be added to the users group
> even on a system with userprivate groups (as it is the default)?

> (6)
> #849265,
> https://alioth-lists.debian.net/pipermail/pkg-systemd-maintainers/2017-January/032300.html
> Should we really empty out the extra_groups list default?

This can be answered together, I plan to change EXTRA_GROUPS to just
contain "users" in the future. I am trying this setting on my personal
systems now.


What was not in the primary discussion:

deluser will grow a --lock option that will replace a user's shell with
/usr/bin/nologin.

There will be a configuration option chanding deluser's default behavior
to not actually delete a --system account but lock it.

That way, a package can call deluser --lock in postrm for remove, and
straight deluser in postrm for purge, while leaving the final decision
what should happen with system accounts on purge to the local
administrator. The default for said configuration option will depend on
the outcome of #1006912 which tries to change/adapt policy in this
regard.

Thank you for your time.

Greetings
Marc

-- 
-
Marc Haber | "I don't trust Computers. They | Mailadresse im Header
Leimen, Germany|  lose things."Winona Ryder | Fon: *49 6224 1600402
Nordisch by Nature |  How to make an American Quilt | Fax: *49 6224 1600421



Re: Q: systemd-timer vs cron

2022-03-14 Thread Marc Haber
On Mon, 14 Mar 2022 09:29:56 +0800, Paul Wise  wrote:
>The cron feature of sending the output via email by default isn't
>possible to get easily with systemd timers or systemd-cron, unless you
>modify every single timer to manually send email or use systemd-cron
>and have every single timer fail.

This is something that has been hindering migrations since I was
young: People identify one feature that is going away as vitally
important to them and use that to reject the movement, even if it's an
advance in sum. See NAT or DHCP for IPv6.

>Having everything in one file makes them more convenient to edit.

Same ;-)

>Being able to implicitly share environment variables between groups of
>crontab lines is more convenient.

Since Lennart seems to have decided not to get rid of the
EnvironmentFile setting, that can be replaced.

>Figuring out if there native systemd equivalents for features I've
>implemented manually, such as the lock and sleep times to ensure system
>load isn't high due to running everything at once or disabling jobs
>when the network isn't online.

I think that the equivalent of cron.daily in systemd timers would make
excessive use of start point randomization, that is going to take care
of load spikes. Additionally, it will take care of load spikes in VM
environments (see 07:35 when all machines begin their cron.daily
simultaneously). Migrating to more randomized times of daily runs is
also going to expose the case where certain cron jobs depend on each
other and only work if they're executed in exact order.

>Spending the time to migrate everything.

Yes, that's a point. Would it be an alternative to spend time on cron
and cronie patching and packaging?

Greetings
Marc
-- 
------ !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Q: systemd-timer vs cron

2022-03-14 Thread Marc Haber
On Sun, 13 Mar 2022 18:02:55 +0100, Christian Kastner 
wrote:
>On 2022-03-13 11:06, Marc Haber wrote:
>> The anti-systemd faction in Debian is cordially invited to step in,
>> bring cron and cronie up to shape, before asking the rest of the
>> Distribution to stick with essential system software that has been
>> unmaintained for years.
>
>I don't think that's a very constructive line of argument. As a former
>maintainer, it was evident that user crontabs (crontab -e) are still
>very popular, as are some other perhaps niche features, and I've never
>had the impression that anti-systemd has anything to do with it.

That was not my intention to say. And I didn't want to put your
maintenance work in a bad light. You had quite ambitioned plans and I
am sad that it didn't work out. And, given our personpower problem
regarding core packages, your plans are unlikely to go forward any
time soon with both cron and cronie being more or less maintainerless.

Not being a systemd fanboi myself, for many things I prefer having
mechanisms outside of systemd, but if an alternative is unlikely to
move forward any time soon, I'd seriously consider migrating to
something that IS moving forward, and that is systemd timers.

>And in all fairness, I did invest a lot of time maintaining it over the
>years before I stepped down recently. I spent hundreds of hours alone on
>converting our fork of Vixie cron from source format 1.0 to 3.0 (the
>cumulative 1.0 diff spanned more than two decades of changes) so that
>our fork can more easily be compared and merged with other cron forks,
>such as cronie.

That was very good work and I am sad to see that this work is unlikely
to be done soon.

>I completed that task a while ago, but then lost all motivation to
>continue further. The cron daemons all originate from the early 90s.
>systemd timers, being newer, just seem like a much cleaner
>implementation, and thus the way forward to me. I could no longer muster
>the time or energy to work on something I wasn't happy with, so I
>stepped down.

I fully understand.

>In my opinion, the way forward for cron would be for someone to adopt
>cronie, carry over any Debian patches not already included or equivalent
>(there aren't too many, last time I checked), and to make cronie the new
>default cron daemon.

That would be very good. Sadly I am not in a position to do that
myself because I lack the C skills. i surly hope that someone steps
in.

Thank you for caring about cron and cronie!

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-14 Thread Marc Haber
On Sun, 13 Mar 2022 20:52:47 -0600, Sam Hartman 
wrote:
>Let me try asking something more reasonable.
>If you end up tightening down world readableness, let me know so I can
>reject the umask patch, because I suspect if your decision to tighten
>down being world readable sticks, the 15 year old usergroups decision
>would need to be revalidated by someone who cared.

Wouldnt the umask patch be even more useful if we tightened down the
directory permissions?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Q: systemd-timer vs cron

2022-03-13 Thread Marc Haber
On Sun, 13 Mar 2022 08:47:27 +0100, Christian Kastner 
wrote:
>Unless cron finds a new maintainer (#984736), I don't think either of
>these are going to happen.

This looks like we all should migrate over to systemd timers as soon
as possible for everything, leaving the burden of keeping cron alive
to those systemd-free distributions.

The anti-systemd faction in Debian is cordially invited to step in,
bring cron and cronie up to shape, before asking the rest of the
Distribution to stick with essential system software that has been
unmaintained for years.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-13 Thread Marc Haber
On Sat, 12 Mar 2022 14:41:35 -0500, Michael Stone 
wrote:
>On Fri, Mar 11, 2022 at 10:16:24PM +0100, Marc Haber wrote:
>>[^[:alpha:]]chown[[:space:]][^[:space:]]+\.[^[:space:]] is found 829
>>times in Debian, mostly in docs and comments, but also in a few live
>>scripts. I think that we still have some way to go until we get rid of
>>the dot notation in chown calls.
>
>It also has to be a variable; if it's "root.root" or such, it doesn't 
>matter.

It matters if coreutils will at some time remove the dot notation,
making chown root.root an error. And I surely hope that this is the
end of the road we're progressing on.

>And remember, there are existing real-world debian systems that have 
>users with dots (regardless of local adduser policy; think ldap/ad for 
>example) so these are already issues that either need to be fixed or 
>don't really matter.

Yes, they need to be fixed, but it's a different can of beer if we
cannot say "hey, you changed our default, so you get to keep the
pieces of what got broken" but have to say "oops".

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-11 Thread Marc Haber
On Thu, 10 Mar 2022 17:38:20 -0800, Noah Meyerhans 
wrote:
>+1 to --disabled-login setting the shell to /usr/sbin/nologin with
>documentation being updated to reflect this.  I'd suggest a default
>behavior of a password of '*', with the ability to override it and
>prompt for a real password with a "--set-password".  Although honestly,
>I also wouldn't be opposed to requiring an extra step of calling
>'usermod' to set a password for a disabled account.  It's sort of a
>special case, and not one that has to be explicitly handled by adduser.

Noted. I will post a summary at the beginning of the new week.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-11 Thread Marc Haber
On Fri, 11 Mar 2022 10:45:50 -0500, Michael Stone 
wrote:
>I don't have a really strong preference either way. Maybe carry a patch 
>until just before freeze to bubble stuff up during testing? Maybe allow 
>an environment variable to override (either way?) to facilitate testing? 
>The problem is that the systems most likely to blow up (because they're 
>using ancient scripts) are also really unlikely to suddenly start using 
>dot usernames, so breaking them for the sake of correctness on other 
>systems seems gratuitous. If there isn't already, maybe some kind of 
>lintian script check (though that seems probably challenging for static 
>analysis)? In the end, there are already so many ways to shoot yourself 
>in the foot with shell scripts if you don't follow all the disorganized 
>rules every single time that letting this be the reason to disallow dot 
>usernames seems extreme.

[^[:alpha:]]chown[[:space:]][^[:space:]]+\.[^[:space:]] is found 829
times in Debian, mostly in docs and comments, but also in a few live
scripts. I think that we still have some way to go until we get rid of
the dot notation in chown calls.

This would be a nice idea for an MBF. Sadly I do not have the time to
do that. I have filed a wishlist bug for a lintian check.

Greetings
Marc
-- 
------ !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: adduser: disabling passwords, disabling logins

2022-03-11 Thread Marc Haber
On Thu, 10 Mar 2022 21:25:38 +, Simon McVittie 
wrote:
>  usermod: unlocking the user's password would result in a passwordless 
> account.
>  You should set a password with usermod -p to unlock this user's password.

So I can assume that usermod -p will also unlock a previously locked
account? I hate the inconsistent terminology that we have here.

Thanks for testing.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: systemd-sysusers [Re: Seeking consensus for some changes in adduser]

2022-03-11 Thread Marc Haber
On Thu, 10 Mar 2022 20:59:50 +0100, Michael Biebl 
wrote:
>have you considered a more declarative approach as provided by
>systemd-sysusers (8)?

No. This thread is about evolving adduser. Not getting rid of it.

514 packages in Debian match "adduser.*--system".

Feel free to offer a declarative thing and encourage maintainers to
migrate. adduser is going to continue to offer a stable interface for
existing packages for the time being. It has been adduser's goal for
20 years now to be as declarative as possible in a maintainer script
by doing everything necessary, just requiring the package to have one
line in the right place in the script.

Greetings
Marc

P.S.: I got involved with adduser 20 years ago because the then
debhelper maintainer brushed off my suggestion to have a dh call for
creating system users. Back then, this approach was as declarative as
it could get.
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-11 Thread Marc Haber
On Thu, 10 Mar 2022 13:17:26 -0800, Steve Langasek 
wrote:
>On Thu, Mar 10, 2022 at 06:37:58AM +0100, Marc Haber wrote:
>> On Thu, 10 Mar 2022 00:04:38 +0100, Ansgar  wrote:
>> >On Wed, 2022-03-09 at 17:29 -0500, Michael Stone wrote:
>> >> Those are actually unrelated--the big reason for the more permissive 
>> >> umask is to allow people to seamlessly work with other people in a
>> >> group, especially within setgid shared directories. Those shared 
>> >> directories can be anywhere, and are likely *not* in a single user's 
>> >> home.
>
>> >Setting a default ACL on project directories seems a technical better
>> >solution for this problem. It would only affect permissions of files
>> >that should intentionally be group-readable, not all files created
>> >anywhere.
>
>> Are we using ACLs bei Default already in other places of the Debian
>> system?
>
>We are using filesystem capabilities; and as far as I'm aware we have no
>filesystems that support fscaps extended attributes but NOT acls, nor am I
>aware of any archive formats that would preserve fscaps without also
>preserving acls.

Is this usage in a place that a user would consciously have to
interface with? I still raise my eyebrow when I see that "+"
somewhere.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-10 Thread Marc Haber
On Thu, 10 Mar 2022 00:01:36 +, Seth Arnold
 wrote:
>On Tue, Mar 08, 2022 at 05:49:04PM +0100, Marc Haber wrote:
>> (2)
>> #774046 #520037
>> Which special characters should we allow for account names?
>
>Please consider the leading character separately from the rest of the
>characters:
>
>- leading digits sometimes causes programs to parse a 'username' as an
>  'user id' instead; you can see some of this here:
>  https://github.com/systemd/systemd/issues/6237
>  I know I've seen more instances of this over the years.
>
>- leading dash may cause the username to be treated as command line
>  options in some programs. I've lost references to this happening.

Should those two restrictions apply for both system and user accounts?
Should they be overrideable?

>While you can argue these are bugs in the programs involved, they do
>happen in the wild. Thus, I'd like to suggest that the regex be more
>restrictive for the first character.

Noted.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-10 Thread Marc Haber
On Wed, 09 Mar 2022 21:34:33 +0100, Pierre-Elliott Bécue
 wrote:
>Considering many have replied, I'll stick to that one:
>Marc Haber  wrote on 08/03/2022 at 17:49:04+0100:
>> (3)
>> #625758
>> --disabled-password just does not set a password for the newly created
>> account (resulting in '*' in shadow) while --disabled-login places a '!'
>> in shadow. On modern systems with PAM, both variants seem to be
>> identical, allowing login via ssh. Aside from the documentation needing
>> change to document reality, should we introduce a --no-set-password
>> option and deprecate the two older options (to be removed in trixie+2)?
>
>How about --disabled-login => shell is set to /usr/sbin/nologin ?

I have noted that as one of the options for my summary. I assume that
in that case, the password should still be * to avoid creating an
active unlocked account with empty password?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-10 Thread Marc Haber
On Wed, 9 Mar 2022 17:29:01 -0500, Michael Stone 
wrote:
>On Tue, Mar 08, 2022 at 12:29:43PM -0700, Sam Hartman wrote:
>>I don't think it makes sense to move toward 0700 home directories and to
>>loosen the umask for usergroups.
>
>Those are actually unrelated--the big reason for the more permissive 
>umask is to allow people to seamlessly work with other people in a
>group, especially within setgid shared directories. Those shared 
>directories can be anywhere, and are likely *not* in a single user's 
>home.

Hence, no change needed in adduser? Or is that an argument for having
DIR_MODE=0700 in default?

>This was changed in coreutils to be posix-compliant more than 20 years 
>ago. The spec is that chown accepts user:group syntax, and chown will 
>always first attempt to split on ":". If there is no :, chown will try to 
>resolve the whole argument as a username (that is, regardless of whether 
>there's a "."). If the username isn't resolvable *and* it contains a 
>".", it will try to split on the first "." and use the left side as the 
>username and the right side as the group. So *only if* someone attempts 
>to use a dot-containing username in chown without a : and the 
>dot-containing username is invalid, then it might be interpreted as a 
>user.group spec.

>Now, if someone is trying to actually use user.group 
>syntax rather than the user:group syntax that's been standard for 20+ 
>years, that will definitely break in the presence of dot-containing 
>usernames.

... but just in the case that the same string exists both as the last
component of a dot-containing user name AND as a group name. All other
cases are defined.

How would the spec listed above behave for user names with more than
one dot?

> Given how common such usernames are on other systems, I'd 
>expect the breakage to be minimal by now, and a bug in anything still
>using that syntax. We could make coreutils print a deprecation warning, 
>but that's never really been useful in the past; probably better to just 
>error out any time a . is used for something other than a valid username 
>and drop the 20+ year old compatability code.

Do you want a coreutils bug to error out in the case of user.group
notation in chown? I guess it's due time. Would we go alone in Debian
or would you prefer that we try convincing upstream to finally go that
way? I am not convinced that Debian should derive from standard
behavior here, but you have the coreutils hat on and I would support
either decision.

And then we'd have to decide whether adduser may allow dot-containing
user names before coreutils made this change.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: adduser: disabling passwords, disabling logins

2022-03-10 Thread Marc Haber
On Thu, 10 Mar 2022 13:57:13 +0200, Wouter Verhelst
 wrote:
>On Wed, Mar 09, 2022 at 09:00:22PM +0100, Marc Haber wrote:
>> On Tue, 8 Mar 2022 18:40:11 +, Simon McVittie 
>> >--disabled-login: the new account has an empty password but is "locked";
>> >so password authentication will fail, but "unlocking" the account will
>> >result in login being accepted with a blank password (subject to other
>> >policies like ssh PermitEmptyPasswords and PAM nullok)
>> 
>> that way, --disabled-login doesnt sound desireable at all, it would
>> violate the principle of least surprise at least for me. I'd have
>> expected (and always believed) that a password of ! will also prevent
>> ssh-key logins from happening.
>
>I don't see how that follows from Simon's statement? AIUI, he's saying
>that that is true *until" you unlock the account (which essentially
>means dropping the "!" from the passwd file).
>
>Am I misreading something here?

I have re-read Simon's words and still have the interpretation that
unlocking an account that has been created with -disabled-login will
allow login without password, making the account completely open.
Maybe some native speaker might want to bring light into this by
choosing different words for what Simon wrote.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-10 Thread Marc Haber
On Thu, 10 Mar 2022 11:19:56 +0100, Harald Dunkel
 wrote:
>This is another trap: /etc/login.defs seems to define some ranges for
>"system" uids and gids. They are commented out by default, nevertheless
>they imply some configurability. Are changes in login.defs supposed to
>be respected by all packages, including passwd (useradd) and adduser?

fwiw, adduser has never been interested in this configuration. the
login.defs(5) manpage says that it is the "shadow password suite
configuration". I am not sure whether adduser should honor that
configuration. At least both configurations are in sync to each other.

Would it make sense that adduser reads login.defs if the respective
setting is not overridden in adduser.conf?

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-10 Thread Marc Haber
On Thu, 10 Mar 2022 09:28:24 +, Simon McVittie 
wrote:
>On Thu, 10 Mar 2022 at 06:37:58 +0100, Marc Haber wrote:
>> Are we using ACLs [by] Default already in other places of the Debian
>> system?
>
>For user-facing purposes I don't think so (although they're available to
>anyone who wants to set them),

I would rather not be the first one doing so.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Marc Haber
On Wed, 9 Mar 2022 14:35:52 -0600, Richard Laager 
wrote:
>If the admin can change the default DIR_MODE that applies to system user 
>home directories, then any postinst script doing `adduser --system` 
>needs to also explicitly chmod its home directory if it needs anything 
>more permissive than 700 or more restrictive than 755. This is true 
>today and remains true whether or not the default DIR_MODE is changed.

Anything that NEEDS to be written in postinst scripts is bad. I'd
rather implement a SYSTEM_DIR_MODE setting that applies to directories
created during creation of a --system user.

Would that help with the issue?

>> How would chown handle the dot case intelligently?
>
>Something along the lines of see if the user exists.

Michael Stone has elaborated on that topic and told us how chown
already behaves.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Marc Haber
On Thu, 10 Mar 2022 00:04:38 +0100, Ansgar  wrote:
>On Wed, 2022-03-09 at 17:29 -0500, Michael Stone wrote:
>> Those are actually unrelated--the big reason for the more permissive 
>> umask is to allow people to seamlessly work with other people in a
>> group, especially within setgid shared directories. Those shared 
>> directories can be anywhere, and are likely *not* in a single user's 
>> home.
>
>Setting a default ACL on project directories seems a technical better
>solution for this problem. It would only affect permissions of files
>that should intentionally be group-readable, not all files created
>anywhere.

Are we using ACLs bei Default already in other places of the Debian
system?

Greetings
Marc
-- 
------ !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: adduser: disabling passwords, disabling logins

2022-03-09 Thread Marc Haber
On Tue, 8 Mar 2022 18:40:11 +, Simon McVittie 
wrote:
>On Tue, 08 Mar 2022 at 17:49:04 +0100, Marc Haber wrote:
>> (3)
>> #625758
>> --disabled-password just does not set a password for the newly created
>> account (resulting in '*' in shadow) while --disabled-login places a '!'
>> in shadow. On modern systems with PAM, both variants seem to be
>> identical, allowing login via ssh.
>
>I assume you mean: allowing login via ssh if other steps have been taken
>to allow it, like creating and populating ~/.ssh/authorized_keys?

Yes, right.

>This ties in with the suggestion that system accounts should be "locked"
>(usermod -L -e 1) when the package that owns them is removed.

Yes.

>usermod -L
>edits the crypted password in /etc/shadow to prevent login, by prepending
>'!', which is not a possible crypt(3) output: so it seems the distinction
>between these options is something like:
>
>--disabled-password: the new account doesn't have a valid password, so
>password authentication will always fail
>
>--disabled-login: the new account has an empty password but is "locked";
>so password authentication will fail, but "unlocking" the account will
>result in login being accepted with a blank password (subject to other
>policies like ssh PermitEmptyPasswords and PAM nullok)

that way, --disabled-login doesnt sound desireable at all, it would
violate the principle of least surprise at least for me. I'd have
expected (and always believed) that a password of ! will also prevent
ssh-key logins from happening.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Marc Haber
On Wed, 9 Mar 2022 14:10:04 +0100, Harald Dunkel
 wrote:
>On 2022-03-08 17:49:04, Marc Haber wrote:
>> (1a) would it be necessary to handle --system accounts differently? I
>>   think yes.
>
>I think it would be helpful to define "system account" and "normal user".
>Neither adduser(8) nor useradd(8) provide a sufficient definition,
>especially wrt the existing network directory services (LDAP, AD, etc).

In adduser, a --system (sic!) account is one that is created using the
--system option. Basically, the biggest difference is that its UID is
allocated from a different UID range, see policy 9.2.2. I just see
that policy says "dynamically allocated system users and groups",
while it refers to uid 1000-5 as "dynamically alllocated user
accounts".

So I am happy that my (and adduser's) notion of system and user
accounts actually matches policy, but I agree that we need to be more
explicit in adduser, probably referring to Policy in the adduser docs.

>Is a "system user" supposed to be a local account, defined in /etc/passwd
>only?

That is not defined in policy, but it should. The current policy
editing process is based on a proponent suggesting an exact wording
with the policy editors just giving advice. Since I don't have a
strong position in this regard, I'm out here.

>Related question: How are naming collisions between local entries and
>the entries in a network directory service supposed to be handled?
>Something like
>
>   passwd: files sss
>
>in /etc/nsswitch.conf is not helpful, if a postinst script fails to
>create a local account due to the entry it has found in freeipa, for
>example. Not to mention that such a service might fail at boot time,
>if the directory service is not available (yet).

That is beyond adduser's scope. We're (as the adduser team) usually
weasel out of that topic by saying that a system refering to a
directory service is run by skilled staff, and we expect those people
to do their job. It's a small team, adduser has been in limbo for
years, so we need to concentrate on the traps that a novice or
unexperiences user might fall into while relying on skilled users to
work around the issues that we haven't found the time to fix.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Marc Haber
On Tue, 8 Mar 2022 17:02:06 -0600, Richard Laager 
wrote:
>On 3/8/22 10:49, Marc Haber wrote:
>> (1)
>> #202943, #202944, #398793, #442627, #782001
>> The bug reporters are requesting the default for DIR_MODE to be changed
>> from 0755 to 0700, making home directories readable for the user only.
>> Policy 10.9 states that directories should be 0755, but the policy
>> editors probably didn't have user home directories in mind when they
>> wrote that.
>
>As a data point, Ubuntu moved to 750 a year ago:
>https://ubuntu.com/blog/private-home-directories-for-ubuntu-21-04

I still see Ubuntu as targeted heavily at end-user systems used by
beginners. I don't think that all decisions that are good for Ubuntu
are good for Debian as well.

>> (1a) would it be necessary to handle --system accounts differently? I
>>   think yes. > (1b) should we stay with 0755 for --system accounts?
>
>I don't see why system accounts need to be different.

avahi-daemon has /var/run/avahi-daemon as its home directory and
places its socket there. I'd guess that having this directory not
accessible for the world will kind of influence the usability of the
daemon. We have many packages that are configured like that.

dnsmask even has /var/lib/misc as home, which is not even owned by the
account, so setting that one to 0750 would probably be even more
destructive.

No, that's trying too much.

>> (1c) does a change to 0700 for user accounts make sense?
>
>Yes.

Can we get consensus on that?

>> (1d) should it be 0751 (#398793)?
>
>Pro: That helps ~/public_html.
>
>Con: That seems like a trap for non-expert users. It _feels_ like other 
>people can't get at things, but they actually can, if they know the next 
>directory down. I (and probably everyone reading this list) understands 
>the "1" in 751, but do end users?

Point.

>> (1e) how about ~/public_html that would break with 0750?
>
>As a comment on the bug mentioned, public_html not a default thing. 
>Changing DIR_MODE and/or ACLs are also options for those who want a 
>~/public_html concept.

A webserver serving userdirs should be in the hands of a competent
admin, right?

>> All those bugs referenced have more or less heated exchanges ranging
>> from "it's fine" to "we should issue a DSA ASAP", most of them a decade
>> old, so the times might have changed since then. Please note that the
>> DIR_MODE _IS_ configurable in adduser, we're just discussing the
>> default (which also applies for home directories created while still
>> inside the Installer before a local admin can properly configure
>> adduser).
>
>I think there is merit to defaulting to the most secure (but still 
>reasonable) option, and letting people loosen it if desired.

Point.

>> (2)
>> #774046 #520037
>> Which special characters should we allow for account names?
>> 
>> People demand being able to use a dot (which might break scripts using
>> chown) and non-ASCII national characters in account names. The regex
>> used to verify non-system accounts is configurable, so the policy can be
>> locally relaxed at run-time.
>> 
>> For system-accounts, I'd like to stick to ASCII letters, numbers,
>> underscores.
>
>I support dashes, as was already discussed. That's already in use.
>
>I think the idea of dot in a username is perfectly reasonable on its 
>own. For some people this is very desirable. My wife, for example, uses 
>a dot in her email username as her first name plus my-now-her last 
>initial makes a word that is awkward. (This sort of problem is not 
>uncommon in usernames, especially at companies that make them via some 
>algorithm.)



>
>I always use colon for chown, which is what is documented, but I'm aware 
>it takes dot too. Is there any code in chown to handle the dot case 
>intelligently?

How would chown handle the dot case intelligently? At the moment, the
chown manpage doesn't contain the words "dot" or "period", but chown
root.root some-file will do the same like chown root:root some-file,
changing user and group.

>Non-ASCII does feel a little concerning to me (since those code paths 
>won't be exercised very often).

I think they would in non-latin countries.

>But to recognize my bias, I have no need for a non-ASCII username. I'd 
>probably feel quite differently if my name wasn't correctly 
>representable in ASCII. Put differently, if usernames were currently 
>required to be Han or Cyrillic characters, I'd certainly be up in arms 
>asking for Latin character support.

Yes, that's my feeling as well.

otoh, adduser can already be configured to be more relax

Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Marc Haber
On Tue, 8 Mar 2022 19:06:57 -0500, Timothy M Butterworth
 wrote:
>On Tue, Mar 8, 2022 at 6:18 PM Richard Laager  wrote:
>Please add support for "." so we can use first.last names as user
>names. Other Linux's are already doing this so it should not break
>anything.

Adduser can already be configured to allow that via a documented
interface. We're talking about the default here. The only point where
an account might be created before that configuration possibility
becomes available is the Installer.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Marc Haber
On Wed, 9 Mar 2022 00:12:25 +0200, Adrian Bunk 
wrote:
>On Tue, Mar 08, 2022 at 05:49:04PM +0100, Marc Haber wrote:
>>...
>> (2)
>> #774046 #520037
>> Which special characters should we allow for account names?
>> 
>> People demand being able to use a dot (which might break scripts using
>> chown) and non-ASCII national characters in account names. The regex
>> used to verify non-system accounts is configurable, so the policy can be
>> locally relaxed at run-time.
>> 
>> For system-accounts, I'd like to stick to ASCII letters, numbers,
>> underscores.
>>...
>
>There is a DD with the login 93sam, and this is already outside of 
>what systemd accepts.[1]

... as "User" option in system files. Not going to begin another
systemd flame war today.

Bugs like that look like they'll probably only relevant for accounts
that services run under.

>Non-ASCII characters in account names sound like a lot of breakage
>and CVEs to me.

Agreed, but people want that.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Marc Haber
On Tue, 08 Mar 2022 20:48:46 +0100, Ansgar  wrote:
>On Tue, 2022-03-08 at 12:29 -0700, Sam Hartman wrote:
>> > > > > 
>> Take a look at https://salsa.debian.org/vorlon/pam/-/merge_requests/3
>> 
>> According to the history of that patch, we have some old consensus to
>> move toward usergroups and a default umask of 0002 (except for root
>> which gets 0022).
>
>On systems that don't use usergroups for all/some users, doesn't this
>change make all files writable by other users by default?  That would
>seem like a very unsecure change on upgrades (or as a default).

Maybe we need to adapt that patch to only set umask to 002 if the
user's primary group is identically named.

>(Though I think the current world-readable by default is already quite
>bad. It seems like a unsafe choice on both single-user and multi-user
>systems...)

It surely references an administration style that sadly does not fit
these days.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Marc Haber
On Tue, 08 Mar 2022 12:29:43 -0700, Sam Hartman 
wrote:
>Take a look at https://salsa.debian.org/vorlon/pam/-/merge_requests/3

As far as I understand, that's a PR against pam setting umask.to 002
on login, 022 for root. Especially the bug reports referenced there
bring me directly and deeply into Debian-Ubuntu politics which is a
significant drain for me.

>According to the history of that patch, we have some old consensus to
>move toward usergroups and a default umask of 0002 (except for root
>which gets 0022).
>
>I was trusting the analysis in that merge request and assuming we
>actually did have such a consensus.

I am not aware of that. If we have consensus, then all the better.

>But I'd ask you to look into the history of usergroups in Debian as part
>of your decision process.

Where would I read up on that? I am not deeply enough in those
political things to be able to judge whether a discussion from 15
years ago is still valid today.

Greetings
Marc
-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | 
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



  1   2   3   4   5   6   7   8   9   10   >