Re: Debian openssh option review: considering splitting out GSS-API key exchange

2024-04-03 Thread Michael Stone

On Tue, Apr 02, 2024 at 01:30:10AM +0100, Colin Watson wrote:

  * add dependency-only packages called something like
openssh-client-gsskex and openssh-server-gsskex, depending on their
non-gsskex alternatives
  * add NEWS.Debian entry saying that people need to install these
packages if they want to retain GSS-API key exchange support
  * add release note saying the same

* for Debian trixie+1 (or maybe after the next Ubuntu LTS, depending on
  exact timings):

  * add separate openssh-gsskex source package, carrying gssapi.patch
in addition to whatever's in openssh, and whose binary packages
Conflicts/Replaces/Provides the corresponding ones from openssh
  * add some kind of regular CI to warn about openssh-gsskex being out
of date relative to openssh
  * drop gssapi.patch from openssh, except for small patches to
configuration file handling to accept the relevant options with
some kind of informative warning (compare
https://bugs.debian.org/152657)


To speed things up for those who really want it, perhaps make 
openssh-client/server dependency-only packages on 
openssh-client/server-nogss? People can choose the less-compatible 
version for this release if they want to, and the default can change 
next release. Pushing back the ability to install the unpatched version 
for a few more years seems suboptimal.




Re: Linking coreutils against OpenSSL

2023-11-11 Thread Michael Stone

On Sat, Nov 11, 2023 at 11:50:31AM +0100, Andreas Metzler wrote:

you seem to have missed/deleted the paragraph where Ansgar suggested how
to do this *without* tradeoff. ("explicitly disable/enable build options
per arch")


No, I didn't. That was in my original email and is one of the 
possibilities for future versions depending on the feedback from people 
testing to guide whether it makes sense to make this per-arch rather 
than global.




Re: Linking coreutils against OpenSSL

2023-11-10 Thread Michael Stone

On Fri, Nov 10, 2023 at 03:10:42PM +0100, Ansgar wrote:

Please avoid producing different results depending on the build
environment. That just results in non-reproducible issues in unclean
environments (suddenly different dependencies, different features,
...).


I think that is an acceptable tradeoff at this time; the only difference 
will be the dependencies, but that is the intent. Automated buildd 
packages should be stable. Based on further experience and feedback, one 
of the other options could be chosen instead. (I'm particularly 
interested in hearing from people who compare the different builds on 
arm, as that is where there's been an assertion of a performance 
regression.)




Re: Linking coreutils against OpenSSL

2023-11-10 Thread Michael Stone

On Fri, Nov 10, 2023 at 10:38:13AM +, Luca Boccassi wrote:

Per-architecture dependencies are possible though, so maybe starting
to add the libssl dependency only on amd64 is a good starting point,
and then users of other architectures can request to be added too if
it is beneficial for them.


I haven't seen any objections to the basic idea, so I'm starting here: 
coreutils 9.4-2 will link to libcrypto if there's a gpl-compatible 
version available at build time, but I've added the build-dependency as 
linux-amd64 only for now. That should make it fairly straightforward for 
people to control the linking on other architectures by controlling 
their build environment. Going forward, depending on feedback, I can 
roll this back, expand the build-dep, and/or make the configure option 
also depend on the arch.




Re: Potential MBF: packages failing to build twice in a row

2023-08-14 Thread Michael Stone

On Mon, Aug 14, 2023 at 09:40:52PM +0100, Wookey wrote:

On 2023-08-14 10:19 -0400, Michael Stone wrote:

On Thu, Aug 10, 2023 at 02:38:17PM +0200, Lucas Nussbaum wrote:
> On 08/08/23 at 10:26 +0200, Helmut Grohne wrote:
> > Are we ready to call for consensus on dropping the requirement that
> > `debian/rules clean; dpkg-source -b` shall work or is anyone interested
> > in sending lots of patches for this?
>
> My reading of the discussion is that there's sufficient interest for
> ensuring that building-source-after-successful-binary-build works.

my reading said that there was interest in making sure that binary builds
work repeatedly, and almost no interest in making sure that building source
from a rules/clean works. certainly not thousands of packages worth of busy
work level of interest.


Yes. You are right. I (and most of the others who expressed an
interest in having this working) mostly care about doing a binary
build repeatedly. But doesn't this amount to much the same thing?


no, not really. a lot of benign changes (like copying in new autoconf 
stuff) can happily be made multiple times, which doesn't affect building 
at all but causes busy work to undo.



dpkg-source will moan if the source has changed and tell you about the
nice patch it has made. OK, it will let some things slide as just
warnings, so 'builds binary twice' is a somewhat less stringent target
than 'leaves exactly the original pristine source'. I would have to check
the details, but I'm not sure how much difference this makes in
practice?


we don't know, since the test was "regenerate source"--a thing very few 
people care about--rather than "build twice" which is the thing people 
do seem to care about. It seems likely that the difference is thousands 
of packages.


I'm somewhat concerned we magically went from "should we do an MBF" to 
"I just did an MBF" without any real consensus in the middle. This being 
so painfully obvious that the MBF itself basically says there's no 
consensus. 



Re: Potential MBF: packages failing to build twice in a row

2023-08-14 Thread Michael Stone

On Thu, Aug 10, 2023 at 02:38:17PM +0200, Lucas Nussbaum wrote:

On 08/08/23 at 10:26 +0200, Helmut Grohne wrote:

Are we ready to call for consensus on dropping the requirement that
`debian/rules clean; dpkg-source -b` shall work or is anyone interested
in sending lots of patches for this?


My reading of the discussion is that there's sufficient interest for
ensuring that building-source-after-successful-binary-build works.


my reading said that there was interest in making sure that binary 
builds work repeatedly, and almost no interest in making sure that 
building source from a rules/clean works. certainly not thousands of 
packages worth of busy work level of interest.




Re: Proposed MBF - removal of pcre3 by Bookworm

2023-07-01 Thread Michael Stone

On Sat, Jul 01, 2023 at 09:44:27AM -0400, Michael Stone wrote:

On Thu, Jun 29, 2023 at 08:55:11PM +0100, Matthew Vernon wrote:
Bookworm is now out; I will shortly be increasing the severity of 
the outstanding bugs to RC, with the intention being to remove 
src:pcre3 from Debian before the trixie release.


You don't think that marking packages for removal two weeks after the 
bug is filed is a little much?


Apologies, the original bug report apparently slipped under the radar.



Re: Proposed MBF - removal of pcre3 by Bookworm

2023-07-01 Thread Michael Stone

On Thu, Jun 29, 2023 at 08:55:11PM +0100, Matthew Vernon wrote:
Bookworm is now out; I will shortly be increasing the severity of the 
outstanding bugs to RC, with the intention being to remove src:pcre3 
from Debian before the trixie release.


You don't think that marking packages for removal two weeks after the 
bug is filed is a little much?




Re: OpenMPI 5.0 to be 32-bit only ?

2023-02-15 Thread Michael Stone

On Wed, Feb 15, 2023 at 11:29:25AM +, Alastair McKinstry wrote:
The counterpoint is if someone does a high-core-count 32-bit arch for 
HPC; x32 could (have been) such an architecture, but its development 
looks stalled.


That may have been a possibility 15-20 years ago, but today anything 
calling itself "HPC" is working with datasets large enough that trying 
to use 32 bit pointers would be far more trouble than it's worth; x32 is 
of interest to container services far more than HPC, IMO. (Even the GPUs 
have working sets above 4GB currently--the days of a viable 32 bit 
architecture in this space are entirely in the rear view mirror.)


I personally think it makes far more sense to excise MPI from 
architectures where it will never realistically be used than it does to 
try to keep it going just to have it.




Re: Firmware GR result - what happens next?

2022-10-19 Thread Michael Stone

On Fri, Oct 14, 2022 at 10:52:01AM +0200, Santiago Ruano Rincón wrote:

5. transitional packages along with a helper package (that fails or
success during install) to prompt the user so they add non-free-firmware
section when needed.

Is there any reason why you are not considering 5.?


The danger we're trying to avoid is that a system with a working 
"something" (say, networking) gets upgraded, user reboots (or machine 
crashes, or there's a power failure, etc, etc.), the working "something" 
is now a not-working "something", and fixing it is really hard for the 
user who has no idea what happened and maybe doesn't have a network or a 
console or whatever any more. A package that fails during install will 
prevent the upgrade from completing, but will leave things in an 
in-between state until some action is taken, the upgrade restarted, and 
the upgrade manages to finish successfully. What happens if the 
reboot/crash/powercycle/etc happens during that in-between state? How do 
you make a firmware helper package that reliably prevents a kernel 
installation when the kernel doesn't have any dependencies on the 
firmware package, and also doesn't yank out the old working firmware, 
etc. I'm sure you can make the install explode, but making it reliably 
explode at just the right time seems harder. I guess this could all 
work, but I'm seeing a lot of potential for partial installs/failures 
with this approach and I suspect this would require transition code in a 
number of packages' preinsts, not a discrete "helper package".




Re: Firmware GR result - what happens next?

2022-10-03 Thread Michael Stone

On Sun, Oct 02, 2022 at 08:21:31PM +0100, Steve McIntyre wrote:

Plus, as Shengjing Zhu points out: we already expect people to manage
the sources.list anyway on upgrades.


We also try to avoid silent install problems that might or might not 
result in a system that doesn't boot properly.




Re: Firmware GR result - what happens next?

2022-10-02 Thread Michael Stone

On Sun, Oct 02, 2022 at 03:53:00PM +0100, Steve McIntyre wrote:

On Sun, Oct 02, 2022 at 04:43:47PM +0200, Michael Biebl wrote:

What's the plan for upgraded systems with an existing /etc/apt/sources.list.
Will the new n-f-f section added on upgrades automatically(if non-free was
enabled before)?


So this is the one bit that I don't think we currently have a good
answer for. We've never had a specific script to run on upgrades (like
Ubuntu do), so this kind of potentially breaking change doesn't really
have an obvious place to be fixed.


Is there a reason to not continue to make the packages available in 
non-free? I don't see a reason to force any change on existing systems.




Re: Switch default from PulseAudio to PipeWire (and WirePlumber) for audio

2022-09-30 Thread Michael Stone

On Thu, Sep 29, 2022 at 04:26:45PM +0200, Vincent Bernat wrote:

On 2022-09-29 15:01, Michael Stone wrote:

On Wed, Sep 28, 2022 at 09:02:15PM -0600, Sam Hartman wrote:

* Finally, I can use bluetooth on linux with reasonably good audio
 quality!


Aren't they both using the same backend? ldac/aptx weren't in 
pulseaudio for a long time, but they are now. Or is there something 
else?


Pipewire has AAC, but not in Debian because libfdk-aac is still 
considered non-free by us while everyone else, including the FSF, 
consider it free.


but that wouldn't be a distinction between pulseaudio and pipewire in 
debian, right?




Re: Switch default from PulseAudio to PipeWire (and WirePlumber) for audio

2022-09-29 Thread Michael Stone

On Wed, Sep 28, 2022 at 09:02:15PM -0600, Sam Hartman wrote:

* Finally, I can use bluetooth on linux with reasonably good audio
 quality!


Aren't they both using the same backend? ldac/aptx weren't in pulseaudio 
for a long time, but they are now. Or is there something else?




Re: Switch default from PulseAudio to PipeWire (and WirePlumber) for audio

2022-09-15 Thread Michael Stone

On Thu, Sep 15, 2022 at 06:13:35PM +0530, Nilesh Patra wrote:

As far as I can see, the latest "new upstream" upload to unstable was
in "2021-08-25" which is more than an year from now, post which there
have been few bug fix uploads.

More notable upload has been the one that enables gstreamer support
I'm not sure if this is what you are pointing towards with "hasn't stood still"


https://tracker.debian.org/news/1306307/accepted-pulseaudio-150dfsg1-4-source-into-unstable/

Ofcourse the maintainers of this package are doing an excellent job
but from upstream release pov, it is still kind of standing still.


So from the user perspective it's gained new functionality and also not 
broken what works. I can think of worse problems.




Re: Switch default from PulseAudio to PipeWire (and WirePlumber) for audio

2022-09-15 Thread Michael Stone

On Tue, Sep 13, 2022 at 07:25:12PM +0200, Michael Biebl wrote:

Am 13.09.22 um 18:17 schrieb Antoine Beaupré:

I also have the feeling that pipewire has already gone beyond what
pulseaudio is capable of in terms of Bluetooth support, but I might be
mistaken on that.


Interesting. What do you have in mind here? Supported codecs? AptX?
I had more success with PA in the past here, but that experience is 
anecdotal.


PA also hasn't stood still, and PA+bluetooth is now working much better 
than it did even a few months ago.




Re: RFC: Switch default from netkit-telnet(d) to inetutils-telnet(d)

2022-07-20 Thread Michael Stone

On Wed, Jul 20, 2022 at 05:15:07PM +0200, Adam Borowski wrote:

Available in the archive yes, installed by default no way.
That makes this current thread mostly moot, as when not installed by
default (or a metapackage) you don't need any particular implementation
to be blessed.


I think the original email outlined why dicussion was necessary: 
determining which source package provides the "telnet" and "telnetd" 
packages. Regardless of whether they're installed by default, changing 
the implementation behind a binary package does warrant 
notice/discussion.


This got derailed by additional commentary about whether they deserve to 
exist at all, but that's incidental to the original question. (For 
which, I think, there has been consensus.)




Re: RFC: Switch default from netkit-telnet(d) to inetutils-telnet(d)

2022-07-19 Thread Michael Stone

On Sun, Jul 17, 2022 at 01:49:53AM -0400, Timothy M Butterworth wrote:

Telnet is old, insecure and should not be used any more. What is the point of
packaging a Telnet daemon when everyone should be using SSH. Telnet Client I
can see because a person may need to connect to a router or switch that is
still using telnet or hasn't had SSH Certificates generated yet.


I personally use telnet to connect to systems whose ssh implementations 
are old enough that they are no longer interoperable with current ssh. 
Every system will eventually become an old system, and telnet has a much 
better record of working over the long term than does ssh. Security 
concerns have a place in determining defaults, but not in banning 
software that other people find useful in a context that might not 
matter to you.




ifupdown/dhcp

2022-05-08 Thread Michael Stone

[apologies to package aliases getting this twice due to autocomplete fail]

I've been trying to make sense of the NEWS item in isc-dhcp-client 
(that alternatives are needed) in combination with the functionality 
of ifupdown and what the implications are for debian upgrades 
generally.


isc-dhcp-client as of the last upgrade is telling users to stop using 
it (the default dhcp client for debian).


ifupdown (the traditional tool for managing networking on debian 
systems) has a Recommends on "isc-dhcp-client | dhcp-client". 
"dhcp-client" is a virtual package provided by "dhcpcanon" (version 
0.8.5, which hasn't been touched in 4 years), "isc-dhcp-client", and 
"dhcpcd5" (which will trash a working configuration managed by 
ifupdown if installed, as it will try to take over interfaces 
currently set, e.g., to manual). This seems suboptimal at best.


I believe that ifupdown will attempt to use udhcpd if installed, which 
should be a mostly-transparent change (except for the potential loss 
of lease information and any customization of dhclient scripts) but it 
isn't even on the ifupdown recommends list.


ifupdown also (used to?) use pump, but that package went away a long 
time ago.


So what's the path forward, maintaining compatibility and not breaking 
systems upgrading from current stable? Do we come up with a dhcpcd5 
variant that *only* touches interfaces it is directed to touch via 
/etc/network/interfaces? Do we add udhcpcd to the "dhcp-client" 
virtual package and/or make it the default for ifupdown? Do we fork 
isc's dhcp suite and just continue to use dhclient? Revive pump? 
Something else?




Re: Seeking consensus for some changes in adduser

2022-03-13 Thread Michael Stone

On Sun, Mar 13, 2022 at 11:09:24AM +0100, Marc Haber wrote:

On Sat, 12 Mar 2022 14:41:35 -0500, Michael Stone 
wrote:

And remember, there are existing real-world debian systems that have
users with dots (regardless of local adduser policy; think ldap/ad for
example) so these are already issues that either need to be fixed or
don't really matter.


Yes, they need to be fixed, but it's a different can of beer if we
cannot say "hey, you changed our default, so you get to keep the
pieces of what got broken" but have to say "oops".


I don't think we can say that now, unless we also say that all the tools 
we have for integrating with external directory services shouldn't be 
used, and also retroactively change the documentation for adduser.conf 
to say that you shouldn't use the characters that the man page says you 
can. In general debian doesn't just say "hey, you changed our default, 
so you get to keep the pieces of what got broken" for configurations 
documented as valid.




Re: Q: systemd-timer vs cron

2022-03-12 Thread Michael Stone

On Sat, Mar 12, 2022 at 03:19:52PM +0800, Paul Wise wrote:

Hideki Yamane wrote:


Is there any suggestion or guideline for pacakges that contain
both systemd-timer unit setting and cronjob? Don't they conflict
or not


Do what apt does; make the cron job exit successfully without doing
anything when run on systemd, move most of what is being run into a
script or program in /usr, then call that from the timer and cron job.

Alternatively, make the cron job exit successfully without doing
anything when run on systemd, then have the timer call the cron job
with a --run-on-systemd argument that makes it run under systemd.


These are still somewhat annoying in practice because of the log 
entries for CRON running something pointlessly.




Re: Seeking consensus for some changes in adduser

2022-03-12 Thread Michael Stone

On Fri, Mar 11, 2022 at 10:16:24PM +0100, Marc Haber wrote:

[^[:alpha:]]chown[[:space:]][^[:space:]]+\.[^[:space:]] is found 829
times in Debian, mostly in docs and comments, but also in a few live
scripts. I think that we still have some way to go until we get rid of
the dot notation in chown calls.


It also has to be a variable; if it's "root.root" or such, it doesn't 
matter. I did a similar search, mostly found false positives (e.g., perl 
or ruby scripts not actually calling chown(1). The one real example I 
found in a cursory glance is from /usr/bin/humfsify in 
uml-utilities...but it's also an example of my point about "so many ways 
to break shell scripts if you don't follow every semi-documented rule 
every time": 
find file_metadata -type d | xargs chown $user.$group
so, yeah, that'll break if $user has a dot--but it's already broken if 
there's a file/directory with a space. So are dots the straw that breaks 
the camel's back?


And remember, there are existing real-world debian systems that have 
users with dots (regardless of local adduser policy; think ldap/ad for 
example) so these are already issues that either need to be fixed or 
don't really matter.




Re: Seeking consensus for some changes in adduser

2022-03-11 Thread Michael Stone

On Thu, Mar 10, 2022 at 09:33:00PM +0100, Marc Haber wrote:

On Wed, 9 Mar 2022 17:29:01 -0500, Michael Stone 
wrote:

On Tue, Mar 08, 2022 at 12:29:43PM -0700, Sam Hartman wrote:

I don't think it makes sense to move toward 0700 home directories and to
loosen the umask for usergroups.


Those are actually unrelated--the big reason for the more permissive
umask is to allow people to seamlessly work with other people in a
group, especially within setgid shared directories. Those shared
directories can be anywhere, and are likely *not* in a single user's
home.


Hence, no change needed in adduser? Or is that an argument for having
DIR_MODE=0700 in default?


It's simply a statement that the default mode for home directories and 
the default umask are separate decisions.



This was changed in coreutils to be posix-compliant more than 20 years
ago. The spec is that chown accepts user:group syntax, and chown will
always first attempt to split on ":". If there is no :, chown will try to
resolve the whole argument as a username (that is, regardless of whether
there's a "."). If the username isn't resolvable *and* it contains a
".", it will try to split on the first "." and use the left side as the
username and the right side as the group. So *only if* someone attempts
to use a dot-containing username in chown without a : and the
dot-containing username is invalid, then it might be interpreted as a
user.group spec.



Now, if someone is trying to actually use user.group
syntax rather than the user:group syntax that's been standard for 20+
years, that will definitely break in the presence of dot-containing
usernames.


... but just in the case that the same string exists both as the last
component of a dot-containing user name AND as a group name. All other
cases are defined.

How would the spec listed above behave for user names with more than
one dot?


It splits on the first dot, which is why scripts could break. E.g., if 
you use user.group syntax and user happens to be us.er, then you end up 
trying to use us.er.group and that will fail. Semi-randomly, for 
whichever users happen to have dots, so it'll be a pain to debug.



Given how common such usernames are on other systems, I'd
expect the breakage to be minimal by now, and a bug in anything still
using that syntax. We could make coreutils print a deprecation warning,
but that's never really been useful in the past; probably better to just
error out any time a . is used for something other than a valid username
and drop the 20+ year old compatability code.


Do you want a coreutils bug to error out in the case of user.group
notation in chown? I guess it's due time. Would we go alone in Debian
or would you prefer that we try convincing upstream to finally go that
way? I am not convinced that Debian should derive from standard
behavior here, but you have the coreutils hat on and I would support
either decision.


I don't have a really strong preference either way. Maybe carry a patch 
until just before freeze to bubble stuff up during testing? Maybe allow 
an environment variable to override (either way?) to facilitate testing? 
The problem is that the systems most likely to blow up (because they're 
using ancient scripts) are also really unlikely to suddenly start using 
dot usernames, so breaking them for the sake of correctness on other 
systems seems gratuitous. If there isn't already, maybe some kind of 
lintian script check (though that seems probably challenging for static 
analysis)? In the end, there are already so many ways to shoot yourself 
in the foot with shell scripts if you don't follow all the disorganized 
rules every single time that letting this be the reason to disallow dot 
usernames seems extreme.




Re: Seeking consensus for some changes in adduser

2022-03-10 Thread Michael Stone

On Thu, Mar 10, 2022 at 06:28:57PM +0100, Vincent Bernat wrote:

❦ 10 March 2022 11:34 -05, Michael Stone:

It was always configurable, but was enabled out of the box in hamm...


My system was installed on Potato if I remember correctly (or maybe
Woody, but definitely not older than Potato). But maybe my home was
imported from a SuSE installation and I tweaked something.


Likely--a number of other distributions went with a common user group as 
I recall.




Re: Seeking consensus for some changes in adduser

2022-03-10 Thread Michael Stone

On Thu, Mar 10, 2022 at 05:06:32PM +0100, Vincent Bernat wrote:

❦ 10 March 2022 11:21 +01, Philip Hands:


On systems that don't use usergroups for all/some users, doesn't this
change make all files writable by other users by default?  That would
seem like a very unsecure change on upgrades (or as a default).


AFAIK systems that don't use usergroups are already not running in
standard Debian configuration, since we default to USERGROUPS_ENAB being
'yes' in login.defs (and likewise USERGROUPS 'yes' in adduser.conf).


Has it always been the case? On my oldest system, my primary group is "users".


It was always configurable, but was enabled out of the box in hamm...



Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Michael Stone

On Thu, Mar 10, 2022 at 12:04:38AM +0100, Ansgar wrote:

On Wed, 2022-03-09 at 17:29 -0500, Michael Stone wrote:

Those are actually unrelated--the big reason for the more permissive
umask is to allow people to seamlessly work with other people in a
group, especially within setgid shared directories. Those shared
directories can be anywhere, and are likely *not* in a single user's
home.


Setting a default ACL on project directories seems a technical better
solution for this problem.


Not really--that requires ACL support, and ACL management tends to be a 
PITA for actual people.



It would only affect permissions of files
that should intentionally be group-readable, not all files created
anywhere.


With usergroups, group-readable is a no-op unless you've done something 
to change the group.




Re: Seeking consensus for some changes in adduser

2022-03-09 Thread Michael Stone

On Tue, Mar 08, 2022 at 12:29:43PM -0700, Sam Hartman wrote:

I don't think it makes sense to move toward 0700 home directories and to
loosen the umask for usergroups.


Those are actually unrelated--the big reason for the more permissive 
umask is to allow people to seamlessly work with other people in a
group, especially within setgid shared directories. Those shared 
directories can be anywhere, and are likely *not* in a single user's 
home.


On Wed, Mar 09, 2022 at 09:00:14PM +0100, Marc Haber wrote:

On Tue, 8 Mar 2022 17:02:06 -0600, Richard Laager 
wrote:

I think the idea of dot in a username is perfectly reasonable on its
own. For some people this is very desirable. My wife, for example, uses
a dot in her email username as her first name plus my-now-her last
initial makes a word that is awkward. (This sort of problem is not
uncommon in usernames, especially at companies that make them via some
algorithm.)

I always use colon for chown, which is what is documented, but I'm aware
it takes dot too. Is there any code in chown to handle the dot case
intelligently?


How would chown handle the dot case intelligently? At the moment, the
chown manpage doesn't contain the words "dot" or "period", but chown
root.root some-file will do the same like chown root:root some-file,
changing user and group.


This was changed in coreutils to be posix-compliant more than 20 years 
ago. The spec is that chown accepts user:group syntax, and chown will 
always first attempt to split on ":". If there is no :, chown will try to 
resolve the whole argument as a username (that is, regardless of whether 
there's a "."). If the username isn't resolvable *and* it contains a 
".", it will try to split on the first "." and use the left side as the 
username and the right side as the group. So *only if* someone attempts 
to use a dot-containing username in chown without a : and the 
dot-containing username is invalid, then it might be interpreted as a 
user.group spec. Now, if someone is trying to actually use user.group 
syntax rather than the user:group syntax that's been standard for 20+ 
years, that will definitely break in the presence of dot-containing 
usernames. Given how common such usernames are on other systems, I'd 
expect the breakage to be minimal by now, and a bug in anything still
using that syntax. We could make coreutils print a deprecation warning, 
but that's never really been useful in the past; probably better to just 
error out any time a . is used for something other than a valid username 
and drop the 20+ year old compatability code.


On Wed, Mar 09, 2022 at 02:35:52PM -0600, Richard Laager wrote:

Something along the lines of see if the user exists.

If I was to take a stab at an implementation (Python-ish pseudocode 
here; yes I know chown is C):


group = None
if ':' in arg:
   (user, group) = arg.split(':')
elif '.' in arg:
   # This could be:
   #   user.group
   #   us.er.group
   #   user.gr.oup
   #   us.er.gr.oup
   # Or user and/or group could have multiple dots.

   # Idea A) Exactly one dot can mean either user.group or us.er
   arg_split = arg.split(',', 2)
   if len(arg_split) == 3:
   # There was more than one dot.
   user = arg
   else:
   # Split on dot.
   (user, group) = arg.split('.')
   if not getent(user):
   # Treat the whole thing as a username.
   user = arg
   group = None

# Idea B) Loop over each possible split and see if any work.


I think this is much more fragile/less predictable than the current 
behavior as the results will be dramatically different depending on the 
exact combination of valid users & groups. Better to just make sure 
you stick with the standard user:group representation.




Re: Legal advice regarding the NEW queue

2022-02-02 Thread Michael Stone

On Wed, Feb 02, 2022 at 10:16:36PM +0500, Andrey Rahmatullin wrote:

On Wed, Feb 02, 2022 at 12:12:30PM -0500, Michael Stone wrote:

On Wed, Feb 02, 2022 at 11:39:11AM -0500, The Wanderer wrote:
> Doesn't that, then, lead to the suggestion that any package entering
> unstable without having undergone NEW review (which, in the revised
> model, might be every new package) should automatically have a bug filed
> against it requesting suitable review, and that bug should be treated as
> a blocker for entering testing?

Not really, since anyone in the world could close said bug (including the
uploader).

This applies to any RC bug.


Yes, but in this case it means that we wouldn't have that minimal 
standard of at least one person other than the uploader having ever 
reviewed the package--which I think is a fairly low bar that we should 
meet. (It would be even better if we could add reviews for changes, but 
at any rate I don't think we should go backward here.)




Re: Legal advice regarding the NEW queue

2022-02-02 Thread Michael Stone

On Wed, Feb 02, 2022 at 11:39:11AM -0500, The Wanderer wrote:

Doesn't that, then, lead to the suggestion that any package entering
unstable without having undergone NEW review (which, in the revised
model, might be every new package) should automatically have a bug filed
against it requesting suitable review, and that bug should be treated as
a blocker for entering testing?


Not really, since anyone in the world could close said bug (including 
the uploader).




Re: Legal advice regarding the NEW queue

2022-02-02 Thread Michael Stone

On Wed, Feb 02, 2022 at 09:39:02AM -0600, John Goerzen wrote:


On Tue, Feb 01 2022, Russ Allbery wrote:


I would hate to entirely lose the quality review that we get via NEW, but
I wonder if we could regain many those benefits by setting up some sort of
peer review system for new packages that is less formal and less
bottlenecked on a single team than the current NEW processing setup.


This is a fantastic idea.

In fact, it wouldn't have to bottleneck packages at all.  I mean, if a
quality issue is found in NEW, wouldn't the same be an RC bug preventing
a transition to testing?


I'm not sure "nobody ever looked at this" is a suitable criteria for 
inclusion in a stable release. We sort of have that problem now in 
crusty corners of the archive if someone uploads a bad change, but at 
least there's been one review at some point in the package's lifetime.




Re: Future of /usr/bin/which in Debian?

2021-09-21 Thread Michael Stone

On Tue, Sep 21, 2021 at 09:00:52AM +0100, Jonathan Dowland wrote:

On Mon, Sep 20, 2021 at 11:02:49AM -0400, Michael Stone wrote:
It seems to install to /usr/bin/which.gnu, implying that you could 
upload /usr/bin/which.bsd if you so desire; what's the issue?


I think we should have just one which implementation in the archive. We
should (have) pick(ed) the best one for Debian. I believe (perhaps
unfairly... I'd love to be proven wrong) that the GNU implementation was
uploaded very quickly, without the BSD implementation being considered.
Perhaps the GNU one is the best fit for our needs. It would have been
nice to see that there was an evaluation.


I think it doesn't matter how many which implementations are in debian. 
If you want something with specific portable semantics, just use command 
-v. The remaining consumers of which are either programs that (ipso 
facto) don't care about semantic corner cases or are humans who want to 
use which just because, and probably have strong opinions on how it 
should behave (as, apparently, you do). We can't satisfy everybody with 
one implementation, and I see no technical reason that we'd even try to 
do so.




Re: Future of /usr/bin/which in Debian?

2021-09-20 Thread Michael Stone

On Mon, Sep 20, 2021 at 02:38:06PM +0100, Jonathan Dowland wrote:

On Fri, Aug 20, 2021 at 11:03:50AM +0800, YunQiang Su wrote:

For such a simple tool, do we really need such many versions?


At least you've asked the question. I'd love to think that there was a
proper evaluation of BSD which versus GNU which prior to the latter
being uploaded to NEW, and there's a compelling reason that the GNU one
was chosen; but if so there's no evidence of that on -devel. :(


It seems to install to /usr/bin/which.gnu, implying that you could 
upload /usr/bin/which.bsd if you so desire; what's the issue?




Re: Epoch bump request for ksh

2021-09-11 Thread Michael Stone

On Fri, Sep 10, 2021 at 10:04:08PM +0530, Anuradha Weeraman wrote:

> 2) If you do go ahead with switching to the community distribution, then
> "93u+m" is part of the name, not the version number, so I'd suggest:

[...]

Correction: rushed the last email, I meant to say that I agree that 93u+m
is not part of the version per se. I just thought that it would be good
to include, just for specificity.  However, amending the proposed version
as suggested since it makes sense:

1:1.0.0~beta.1-1


Hmm. If the project refers to itself as 93u+m does it make sense to 
package it as ksh instead of something like ksh93u+m? This reminds me 
of when debian first packaged openssh as "ssh" because that's what the 
predecessor package and the binary were called but in the long run 
renamed it to "openssh". (And with a new name the version/epoch question 
is moot.)




Re: Bug#992692: general: Use https for {deb,security}.debian.org by default

2021-09-10 Thread Michael Stone

On Fri, Sep 10, 2021 at 08:02:42PM +0200, David Kalnischkies wrote:

On Fri, Sep 10, 2021 at 11:08:38AM -0400, Michael Stone wrote:

On Fri, Sep 10, 2021 at 04:33:42PM +0200, David Kalnischkies wrote:
> On Thu, Sep 09, 2021 at 08:53:21AM -0400, Michael Stone wrote:
> > The only thing I could see that would be a net gain would be to generalizes
> > sources.list more. Instead of having a user select a specific protocol and
> > path, allow the user to just select high-level objects. Make this a new
> > pseudo-protocol for backward compatibility, and introduce something like
> >   deb apt:// suite component[s]
> > so the default could be something like
> >   deb apt:// bullseye main
> >   deb apt:// bullseye/updates main
> > then the actual protocols, servers, and paths could be managed by various
> > plugins and overridden by configuration directives in apt.conf.d. For
>
> In this scheme the Debian bullseye main repo has the same 'URI' as the
> Darts bullseye main repo. So, you would need to at least include an
> additional unique identifier of the likes of Debian and Darts, but
> who is to assign those URNs?
> (Currently we are piggybacking on the domain name system for this)

I have no idea what darts is, so I don't have an answer. :)


"Darts" was just a play on "bullseye". It is not hard to imagine
a repository which has the same suite and component(s) but is not
Debian itself. As a pseudo-random [= its in an other topic here] real
example you can take Wine (https://dl.winehq.org/wine-builds/debian/).
So to what is "deb apt:// bullseye main" referring? Debian or Wine?

And to pre-empt the most common response: As an apt dev I can assure you
that we won't accept a solution involving "I am on Debian, so it means
Debian" as that is impossible to correctly guess programmatically (for
example on derivatives using a small overlay repo).


I'd considered adding a scope to the model, e.g., apt://debian.org but 
removed it for simplicity. If that was a desired feature then there'd 
either have to be some sort of well-known path or such a distribution 
would need to provide a policy plugin for that scope. Alternatively, 
they could just use the existing http/https/whatever syntax in 
sources.list for their overlay if they didn't want to bother. Same for 
third party repos. 


> > their thing, and a plugin like auto-apt-proxy can override defaults to do
> > something more complicated, using more policy-friendly .d configurations
> > rather than figuring out a way to rewrite some other package's configuration
> > file.
>
> JFTR: auto-apt-proxy has nothing to do with sources. It is true that
> apt-cacher-ng (and perhaps others) have a mode of operation in which you
> prefix the URI of your (in that case caching) proxy to the URI of the
> actual repo, but that isn't how a proxy usually operates and/or is
> configured.

I have no idea what you're saying here.


And I have no idea if you know what you are talking about.

auto-apt-proxy already uses an interface apt provides to configure the
proxy at runtime. It isn't in the business of modifying sources.list nor
has it any interest in that. So you using it as an example for a plugin
who could use your proposed scheme to modify the sources at runtime
makes no sense.


The concern I was responding to was that switching to https breaks the 
case of using auto-apt-proxy to cache the transaction. Just turning the 
proxy on and off isn't sufficient if the default sources.list uses https 
instead of http--you'd currently have to both turn the proxy on *and* 
change sources.list from http to https. Hence my musings on whether it's 
possible/desirable to separate the configuration of what to use as a 
transport from the configuration of what repository is desired.


More generally, if we're talking about changing the default way that 
people interact with debian it just seems like a good time to ponder 
whether specifying sources the same way we did in 1998 makes sense given 
how many changes there have been to expectations about how we use
internet resources. Maybe the answer is yes, and I'm not arguing that 
there has to be a change or that what I threw out as a possibility is 
the right answer, but it does seem worth considering.




Re: Bug#992692: general: Use https for {deb,security}.debian.org by default

2021-09-10 Thread Michael Stone

On Fri, Sep 10, 2021 at 04:33:42PM +0200, David Kalnischkies wrote:

On Thu, Sep 09, 2021 at 08:53:21AM -0400, Michael Stone wrote:

The only thing I could see that would be a net gain would be to generalizes
sources.list more. Instead of having a user select a specific protocol and
path, allow the user to just select high-level objects. Make this a new
pseudo-protocol for backward compatibility, and introduce something like
  deb apt:// suite component[s]
so the default could be something like
  deb apt:// bullseye main
  deb apt:// bullseye/updates main
then the actual protocols, servers, and paths could be managed by various
plugins and overridden by configuration directives in apt.conf.d. For


In this scheme the Debian bullseye main repo has the same 'URI' as the
Darts bullseye main repo. So, you would need to at least include an
additional unique identifier of the likes of Debian and Darts, but
who is to assign those URNs?
(Currently we are piggybacking on the domain name system for this)


I have no idea what darts is, so I don't have an answer. :)


Also, but just as an aside, whatever clever system you think of apt
could be using, you still need a rather simple system for the likes of
tools which come before apt like the installers/bootstrappers as they
are not (all) using apt, especially not in the very early stages, and
a mapping between them.


I'm not sure why you think I need that? The goal of my musings is to 
separate the definition of what set of debian packages to use from the 
decision of how to get those packages *when using apt*, so that there 
are fewer things to consider in the common case, and to allow new 
capabilities in uncommon cases. If someone's using some other tool, why 
would anyone assume that the same configuration syntax would work? Just 
use the same configuration file you use now, and ignore all of this. If 
you want configurations to match across tools, then ignore all of this 
again and keep the same sources.list syntax you're already using that 
presumably does what you want.



If someone wants to use tor by default but fall back to https if it's
unreachable, they can do that. If someone wants to use a local proxy via
http but https if they're not on their local network, they can do that. New
installations could default to https, existing installations can keep doing


You can do most of the fallback part with the mirror method backed by
a local file. It is of no concern to apt how that file comes to be, so
you could create it out of a massive amount of options or simply by
hand. I do think if the creation is tool-based it shouldn't be apt
as I envision far too many unique snowflakes for a one-size-fits-all
approach.


The intent would be to make it easier to plug other tools into apt,
not to have the apt codebase do everything.


their thing, and a plugin like auto-apt-proxy can override defaults to do
something more complicated, using more policy-friendly .d configurations
rather than figuring out a way to rewrite some other package's configuration
file.


JFTR: auto-apt-proxy has nothing to do with sources. It is true that
apt-cacher-ng (and perhaps others) have a mode of operation in which you
prefix the URI of your (in that case caching) proxy to the URI of the
actual repo, but that isn't how a proxy usually operates and/or is
configured.


I have no idea what you're saying here. 



Re: Bug#992692: general: Use https for {deb,security}.debian.org by default

2021-09-10 Thread Michael Stone

On Fri, Sep 10, 2021 at 09:33:56AM +0200, Helmut Grohne wrote:

Laptops of end-user systems are the target, but also developers. When
people gather at a place (conference, hackspace, private meetup, etc.)
downloading of .debs should just work quickly by default. Many such
sites could easily provide a local cache and a number even do. BSPs tend
to have a blackboard with information including the local mirror to use.
Seriously, how many people change their mirror when they go to a BSP? If
we installed auto-apt-proxy by default, much of the local caching would
just work.


I think you'd get a lot of pushback on installing auto-apt-proxy by 
default. If that's a proposal, make it seperately and not in this 
thread. 


The thing we seem to be disagreeing on is what is more important? https
by default or quick and efficient downloads? Some may think that our
CDN can handle the load just fine and the effects of caching are
peanuts. I can attest that those peanuts are 4TB/year (equivalent to 8
days waiting for downloads) for me.



I see that we've given up on a global network of independently-managed
mirrors and that CDNs are way easier at this time. While initially CDNs
had bad reliability issues, those have completely vanished in my
experience. On the other hand, local caching still outperforms CDNs by a
factor of 10 or so. I'd love to make it the default.


I use a cache out of habit and to be a good netizen, but my internet 
connection is fast enough these days that it's basically a noop at best 
and a slight slowdown at worst. I had to move the cache from slow/cheap 
spinning disk to reasonably fast SSD to get to that point. If you're 
downloading the same stuff over and over (e.g., for testing or somesuch) 
it can be a big win, especially for VMs on a virtualized network 
connection, or if you're managing a large infrastructure, but 
for normal use with a couple of instances? It's just not worth the 
trouble. 



Re: Bug#992692: general: Use https for {deb,security}.debian.org by default

2021-09-10 Thread Michael Stone

On Fri, Sep 10, 2021 at 12:00:57PM +0200, Timo Röhling wrote:

* Michael Stone  [2021-09-08 19:25]:
I think the issue isn't certificate validation, it's that https 
proxy requests are made via CONNECT rather than GET. You could 
theoretically rewrite the proxy mechanism to MITM the CONNECT, but 
that wouldn't be a drop-in replacement. I suppose you could instead 
add an apt option to pass the https request to the proxy via GET 
instead of using CONNECT, but I think that also won't necessarily 
work on an existing proxy.

apt-cacher-ng has a second mode of operation where you can prefix
the source URL with the proxy URL, i.e.

deb http://proxyhost:3142/deb.debian.org/debian unstable main

Maybe we could introduce this as an "official" APT proxy mode, where
http(s)://REPO gets replaced by http://PROXY_URL/REPO (and the proxy
can decide whether or not to fetch via HTTPS as an implementation
detail)?


I'd much rather see something more like I proposed earlier (splitting the 
selection of what suites/components to install from the policy of how to 
obtain them) rather than further layering+confusing these two concepts 
within sources.list.




Re: Bug#992692: general: Use https for {deb,security}.debian.org by default

2021-09-09 Thread Michael Stone

On Thu, Sep 09, 2021 at 02:54:21PM +0200, Timo Röhling wrote:

* Michael Stone  [2021-09-09 08:32]:
I'm honestly not sure who the target audience for auto-apt-proxy 
is--apparently someone who has an infrastructure including a 
proxy, possibly the ability to set dns records, etc., but can't 
change defaults at install time or via some sort of runtime 
configuration management?

The same reason you might want to deploy WPAD instead of preconfiguring
proxy settings in web browsers: flexibility. For example, we use
auto-apt-proxy for laptops which roam between different networks.
It's simple to configure, has virtually no maintenance overhead and
degrades gracefully.
None of that speaks to whether an organization that deploys such a 
thing has the ability to manage other configuration settings, even 
if for some settings there's a desire for additional flexibility.

I don't understand your point.

You asked for a target audience for auto-apt-proxy. I gave you a
legitimate (and real-world) example for such a deployment. Why
should it matter whether or not an organization has other
configuration facilities?


Because the controversy concerning changing the default is over whether 
it's reasonable for someone using auto-apt-proxy to have to manage 
additional configuration settings. If the target audience is someone who 
has the ability to manage the infrastructure required by auto-apt-proxy 
but not the ability to manage anything else then I guess it's a valid 
criticism (but I have trouble envisioning that). If the auto-apt-proxy 
target audience can manage both the proxy infrastructure *and* 
sources.list (either at install time or run time) then the criticism is 
basically academic and not generally a real-world issue.




Re: Bug#992692: general: Use https for {deb,security}.debian.org by default

2021-09-09 Thread Michael Stone

On Thu, Sep 09, 2021 at 11:54:44AM +0530, Pirate Praveen wrote:

Why can't auto-apt-proxy ask this as a debconf question? I also like 
auto-apt-proxy but I agree with  this, someone needing auto-apt-proxy should be 
able to change the default as well.


I don't really see why adding another debconf question would be better 
than just preseeding the existing one.


The only thing I could see that would be a net gain would be to 
generalizes sources.list more. Instead of having a user select a 
specific protocol and path, allow the user to just select high-level 
objects. Make this a new pseudo-protocol for backward compatibility, and 
introduce something like

  deb apt:// suite component[s]
so the default could be something like
  deb apt:// bullseye main
  deb apt:// bullseye/updates main
then the actual protocols, servers, and paths could be managed by 
various plugins and overridden by configuration directives in 
apt.conf.d. For existing configurations it's a no-op but it allows more 
flexibility & new plugins/protocols in the future without having to 
micromanage sources.list. If someone wants to use tor by default but 
fall back to https if it's unreachable, they can do that. If someone 
wants to use a local proxy via http but https if they're not on their 
local network, they can do that. New installations could default to 
https, existing installations can keep doing their thing, and a plugin 
like auto-apt-proxy can override defaults to do something more 
complicated, using more policy-friendly .d configurations rather than 
figuring out a way to rewrite some other package's configuration file.




Re: Bug#992692: general: Use https for {deb,security}.debian.org by default

2021-09-09 Thread Michael Stone

On Thu, Sep 09, 2021 at 08:36:28AM +0200, Timo Röhling wrote:

* Michael Stone  [2021-09-08 19:12]:
Why not simply automate setting it at install time using preseed? 
I'm honestly not sure who the target audience for auto-apt-proxy 
is--apparently someone who has an infrastructure including a proxy, 
possibly the ability to set dns records, etc., but can't change 
defaults at install time or via some sort of runtime configuration 
management?

The same reason you might want to deploy WPAD instead of preconfiguring
proxy settings in web browsers: flexibility. For example, we use
auto-apt-proxy for laptops which roam between different networks.
It's simple to configure, has virtually no maintenance overhead and
degrades gracefully.


None of that speaks to whether an organization that deploys such a thing 
has the ability to manage other configuration settings, even if for 
some settings there's a desire for additional flexibility.




Re: Bug#992692: general: Use https for {deb,security}.debian.org by default

2021-09-08 Thread Michael Stone

On Wed, Sep 08, 2021 at 03:56:14PM +0200, Ansgar wrote:

On Wed, 2021-09-08 at 15:41 +0200, Helmut Grohne wrote:

On Wed, Sep 08, 2021 at 02:01:03PM +0200, Ansgar wrote:
> So what do you suggest then? Tech-ctte as with merged-/usr? Or a
> GR? Or
> something else?

I propose that the proponents pay the cost. In this case, it is a bit
unclear what that means precisely (which likely is the reason they
haven't done it already). At the very least though, apt install
auto-apt-proxy should continue to work on a default installation in a
sensible way.


I can file a bug for auto-apt-proxy to include an apt.conf snippet
saying

 Acquire::https::Verify-Peer false;

That clearly makes it work again


I think the issue isn't certificate validation, it's that https proxy 
requests are made via CONNECT rather than GET. You could theoretically 
rewrite the proxy mechanism to MITM the CONNECT, but that wouldn't be a 
drop-in replacement. I suppose you could instead add an apt option to 
pass the https request to the proxy via GET instead of using CONNECT, 
but I think that also won't necessarily work on an existing proxy.


If we're imagining apt options, something like 
Acquire::https::Force-Proxy-HTTP true;
would probably be more useful for this specific case (not that I think 
it's a great idea--too much potential for surprise).




Re: Bug#992692: general: Use https for {deb,security}.debian.org by default

2021-09-08 Thread Michael Stone

On Wed, Sep 08, 2021 at 01:09:13PM +0200, Helmut Grohne wrote:

Enabling https by default quite simply breaks the simple recipe of
installing auto-apt-proxy. Would you agree with auto-apt-proxy's
postinst automatically editing your sources.list to drop the s out of
https? The answer repeatedly given in this thread to do so manually is
very unsatisfying.


Why not simply automate setting it at install time using preseed? I'm 
honestly not sure who the target audience for auto-apt-proxy 
is--apparently someone who has an infrastructure including a proxy, 
possibly the ability to set dns records, etc., but can't change defaults 
at install time or via some sort of runtime configuration management?




Re: Realtek RTL8723DE, RTL8821CE, RTL8822BE and RTL8822CE chipsets

2021-04-05 Thread Michael Stone

On Sat, Apr 03, 2021 at 08:03:23PM +0500, Andrey Rahmatullin wrote:

On Sat, Apr 03, 2021 at 10:37:37AM -0400, Michael Stone wrote:

> > > Not sure what hardware you are talking about but the majority of WiFI
> > > hardware is supported by the mainline kernels, at least after you load
> > > their firmware.
> >
> > I assume you haven't tried very much wifi hardware. Realistically, the state
> > of wifi support is still terrible. The best thing to do is try to buy
> > something known to be supported, but that's relatively difficult for most
> > people because the name on the box generally has nothing to do with the
> > chips inside the box.
> Can you please list some unsupported chips in addition to these specific
> Realtek ones?

It would be easier for you to list ones that you've actually tested and know
work.


OK, whatever.


It's a serious request. In 20 years of trying different wireless devices
I've had just one that's completely reliable under linux (atheros 
qca6174 chipset) even if it's a little slow (only 2x2 mimo, and possibly 
hampered by the laptop's antenna configuration). It's older 802.11ac; I 
haven't ever seen a working 802.11ax. (Not saying it doesn't exist, just 
that I haven't seen it--hence the question!) I've seen lots of reports 
of reliable devices, but they tend to be things that are either ancient, 
or hard to find, or simply don't work as well for me as for others 
(apparently). I've personally used a lot of devices that mostly worked, 
until they hung or started going really slow or in some other way 
behaved much worse than the phone sitting next to the laptop (ironically 
running linux). I've heard good things about the intel adapters, but 
AFAIK they aren't available in USB so if someone didn't happen to get a 
laptop with that solution integrated it's not a simple end-user 
addition.


IMO, wifi is the last major pain point to a fully functional linux 
sytem. Most other things these days you can just buy a something off the 
shelf at the local electronics store and odds are all the pieces will 
work out of the box. But wifi still requires a good bit of research, and 
isn't something a novice will find simple unless they get lucky on their 
components or bought something from a specialty retailer that focuses on 
linux systems.




Re: Realtek RTL8723DE, RTL8821CE, RTL8822BE and RTL8822CE chipsets

2021-04-03 Thread Michael Stone

On Thu, Apr 01, 2021 at 11:52:46AM +0500, Andrey Rahmatullin wrote:

On Wed, Mar 31, 2021 at 10:38:11PM -0400, Michael Stone wrote:

On Tue, Mar 30, 2021 at 10:20:03PM +0500, Andrey Rahmatullin wrote:
> Not sure what hardware you are talking about but the majority of WiFI
> hardware is supported by the mainline kernels, at least after you load
> their firmware.

I assume you haven't tried very much wifi hardware. Realistically, the state
of wifi support is still terrible. The best thing to do is try to buy
something known to be supported, but that's relatively difficult for most
people because the name on the box generally has nothing to do with the
chips inside the box.

Can you please list some unsupported chips in addition to these specific
Realtek ones?


It would be easier for you to list ones that you've actually tested and 
know work.




Re: Realtek RTL8723DE, RTL8821CE, RTL8822BE and RTL8822CE chipsets

2021-03-31 Thread Michael Stone

On Tue, Mar 30, 2021 at 10:20:03PM +0500, Andrey Rahmatullin wrote:

Not sure what hardware you are talking about but the majority of WiFI
hardware is supported by the mainline kernels, at least after you load
their firmware.


I assume you haven't tried very much wifi hardware. Realistically, the 
state of wifi support is still terrible. The best thing to do is try to 
buy something known to be supported, but that's relatively difficult for 
most people because the name on the box generally has nothing to do with 
the chips inside the box.




Re: How should we handle greenbone-security-assistant?

2020-12-18 Thread Michael Stone

On Fri, Dec 18, 2020 at 09:11:42AM +0100, Raphael Hertzog wrote:

And at least anyone that is not installing the latest version can have
an idea of whether it's important/urgent for them to upgrade or not.


I think the software in question is a good example where there's 
basically no value in having an old version packaged. Who the heck wants 
to know if something has year old vulnerabilities but doesn't care about 
current vulnerabilities? 



Re: Release status of i386 for Bullseye and long term support for 3 years?

2020-12-18 Thread Michael Stone

On Wed, Dec 16, 2020 at 02:47:22PM -0500, Devops PK Carlisle LLC wrote:

I understand your point about 32 bit being updated forever,  and perhaps
it does not need to be. Perhaps the happy medium would be to freeze it
at some point, but leave it available as-is so that legacy software with
32 bit dependencies can still be installed and run. In other words, no
longer developing for 32 bit does not mean that it cannot be found.
Perhaps a different repository, with disclaimer(?) so that users can
enable it if desired?


http://archive.debian.org/

:)



Re: Release status of i386 for Bullseye and long term support for 3 years?

2020-12-15 Thread Michael Stone

On Sun, Dec 13, 2020 at 11:40:29AM -0500, Devops PK Carlisle LLC wrote:

Being philosophically opposed to throwing a good machine into a
landfill, I tend to hang on to equipment for a long time. My
play/experimentation and last-ditch backup box is a 10 year old laptop.


I hear that, but at least around here it's literally possible to grab 
machines that are less than 10 years old that are on their way to the 
landfill. So scratch your itch by saving a machine less than 10 years 
old, then throw the really old one away instead. I'm unconvinced that 
running a stable of unneeded old machines is either great from a waste 
standpoint or something that should dictate the direction of the 
project. Debian isn't devoted specifically to supporting functionally 
obsolete hardware indefinitely, and when obsolete hardware makes it hard 
to move forward we need to just drop it. There are other projects which 
do strive to support old hardware indefinitely, and I highly recommend 
looking at one of those if hardware you want to use is no longer 
supported by debian. I personally run netbsd on some of my nostalgia 
hardware, but there are other options that may work better for you 
depending on what you're trying to do.




Re: What to do when DD considers policy to be optional? [kubernetes]

2020-04-08 Thread Michael Stone

On Wed, Apr 08, 2020 at 10:36:17PM +0200, Thomas Goirand wrote:

I don't agree with this *at all*. It is not in the interest of our users
to be forced to update the software they use for their infrastructure
every few months.


Isn't that the user's decision, when they decided to adopt a tool that 
requires this deployment model? Or, if they're not clear about what 
adopting this tool means, I agree that isn't in their interest for them 
to see that there's a debian package and be fooled into thinking it 
doesn't require this deployment model just because there's a zombie 
package in debian stable which will be essentially unsupported and will 
completely cut them off from the tool's community. Putting it into 
debian provides zero benefit, and they could get the same "stability" 
guarantee by just keeping a copy of a two year old third party .deb and 
never updating it.




Re: Epoch version for google-authenticator

2020-03-11 Thread Michael Stone

On Sun, Mar 01, 2020 at 01:06:13PM +0800, SZ Lin (林上智) wrote:

Hi all,

I'm working on fixing bugs (including RC) on google-authenticator[1] which
name should be "google-authenticator-libpam" instead.

[1] https://packages.debian.org/source/sid/google-authenticator
[2] https://github.com/google/google-authenticator-libpam

I intend to import the new upstream release, but the current upstream version
changed the versioning scheme and thus epoch is needed to avoid the latest
version lower than the previous one, as shown below.

=
Previous version: 20170702-2
Proposed version: 1:1.08-1
=


Have you considered something like 20200301+1.08-1 ?



Re: Y2038 - best way forward in Debian?

2020-03-06 Thread Michael Stone

On Fri, Mar 06, 2020 at 07:46:26AM +0100, Eduard Bloch wrote:

So, wouldn't a restart of the i386 architecture under a different name
give an excelent opportunity to get rid of many of such workarounds?


In theory, sure...but I don't see that there's any actual demand for a 
new/clean i386 architecture in 2038.




Re: Y2038 - best way forward in Debian?

2020-02-13 Thread Michael Stone

On Thu, Feb 13, 2020 at 04:08:22PM +0100, Andrej Shadura wrote:

On Thu, 13 Feb 2020, 10:40 YunQiang Su,  wrote:
   just redefine time_t to 64bit may also cause a problem:
      a bad designed and old network protocol which aims  only target 32bit
   system,
      a binary data packet, may contain time_t:
           struct {
               int a;
               time_t b;
           }
   just define time_t to 64 will break this protocol, although it is bad
   designed.

   Currently, the major task of 32bit ports is to keep compatible with
   old system/binary.
   Should we really want to break them?


Aren't such things already broken on amd64?


If they're trying to talk, then yes. On-disk structures are probably 
much more common than network protocols and not necessarily already 
addressed. Even stuff like last(1) or who(1) would need changes if you 
redefine the size of a time_t. And these aren't simple changes--files 
which weren't intended to be portable don't generally store anything 
about how big their time_t is, so you need heuristics to figure that out 
and then make some tough decisions about how to proceed. (E.g., in the 
case of wtmp you'd probably not want to just start writing larger 
records halfway through a file, but you also have a very large number of 
programs that can potentially write those records and upgrading them 
simultaneously is impossible. A file with mixed record sizes is probably 
not 100% recoverable.) 



Re: Y2038 - best way forward in Debian?

2020-02-13 Thread Michael Stone

On Thu, Feb 13, 2020 at 10:29:35AM +0100, Ansgar wrote:

For arm* and mips*, we mostly seem to be talking about special-purpose
systems where just switching to a new architecture/port doesn't seem to
be that much as a problem as for i386.  I think rebuilding the world and
breaking ABI might thus be acceptable there.


Historically those systems have had major issues with upgrades due to 
things like proprietary kernel patches that aren't available for newer 
releases. In practical terms, would trying to avoid a new architecture 
provide much benefit (especially in terms of the amount of work it would 
take)? I suspect that if you have a 25 year old embedded system in 2038, 
the availability of a 64 bit time interface in the C library of a 
general purpose linux distribution that's compiled for your CPU's 
instruction set is going to be the least of your maintenance problems.



i386 seems different.


i386 should just stay a relic. I don't see any use case for i386 in 2038 
that doesn't involve trying to run a binary that can't be recompiled, 
and the only solution for that involves virtualization of the old ABI in 
a time-shifted environment.




Re: Debian With Alternate Init Systems

2020-02-10 Thread Michael Stone

On Mon, Feb 10, 2020 at 06:27:55PM +0100, Svante Signell wrote:

Not much space for other init systems than systemd within Debian. I was hoping
for too much. Let's move on with our lives.


I think we'd all appreciate if you would do that and stop sending 
messages about systemd!




Re: Y2038 - best way forward in Debian?

2020-02-07 Thread Michael Stone

On Fri, Feb 07, 2020 at 02:46:19PM +0200, Wouter Verhelst wrote:

On Fri, Feb 07, 2020 at 10:31:16AM +, Simon McVittie wrote:

On Fri, 07 Feb 2020 at 09:28:24 +0200, Wouter Verhelst wrote:
> Why not? This seems like the type of problem that SONAMEs are made for.
> What am I missing?

SONAMEs are set by the upstream developer in their build system


Yes, I am aware of that, thank you. I meant to say that this feels like
something upstream could do a SONAME bump for.

I'm wondering why they chose not to.


You'd have to bump the soname for almost every library on the system.



Re: Heads up: persistent journal has been enabled in systemd

2020-02-06 Thread Michael Stone

On Thu, Feb 06, 2020 at 08:09:13PM +0100, Svante Signell wrote:

On Thu, 2020-02-06 at 13:41 -0500, Michael Stone wrote:

On Thu, Feb 06, 2020 at 07:22:07PM +0100, Svante Signell wrote:
> On a Debian sytem _not_ running systemd:
>
> du -sh /var/log
> 74M/var/log
>
> And the binary logs from systemd would of course be much smaller
> since
> they are binary. Any numbers?

It looks like you just proved that this discussion doesn't matter
for
your use case. Can we stop this now?


Of course it matters. It is about the _default_ setting, or have Iunderstood 
this thread wrongly?


You seem to have misunderstood this thread wrongly in many ways. It's 
not clear what you hope to accomplish by continuing. If you just want 
everyone to know that you dislike systemd, congratulations: you've 
accomplished that. Now please move on.



Numbers for systemd installations, please!


No, you're wasting everyone's time with this irrelevant digression.



Re: Heads up: persistent journal has been enabled in systemd

2020-02-06 Thread Michael Stone

On Thu, Feb 06, 2020 at 07:22:07PM +0100, Svante Signell wrote:

On a Debian sytem _not_ running systemd:

du -sh /var/log
74M /var/log

And the binary logs from systemd would of course be much smaller since
they are binary. Any numbers?


It looks like you just proved that this discussion doesn't matter for 
your use case. Can we stop this now?




Re: Heads up: persistent journal has been enabled in systemd

2020-02-06 Thread Michael Stone

On Thu, Feb 06, 2020 at 04:49:31PM +0100, Simon Richter wrote:

I'd expect servers and embedded systems to be vastly underrepresented in
both of these statistics, but that doesn't mean these use cases are in any
way uninteresting to the project.


Please stop beating the dead horse of whether debian is going to use 
systemd. FWIW, I find it even more useful on servers than on single-user 
machines and have it installed on orders of magnitude more servers than 
single-user machines. IOW, you're simply projecting your own prejudices 
and continuing to derail this thread into another pointless discussion 
about the merits of systemd.




Re: Heads up: persistent journal has been enabled in systemd

2020-02-05 Thread Michael Stone

On Thu, Feb 06, 2020 at 09:50:36AM +1100, Dmitry Smirnov wrote:

On Thursday, 6 February 2020 9:04:33 AM AEDT Michael Stone wrote:

Nobody said "exclusively" except you!


It was suggested that default will change and I'm concerned about that.


And yet you said "exclusively" and generally argued in a confrontational 
manner that seems unwilling to accept a minor change because you just 
don't want to consider use cases other than your own habits.



Either option has benefits and
disadvantages, but for some reason you're arguing as though 1) only your
particular use cases matter


Nonsense. It is not "my case" but established default that remained stable
for as long as I can remember. That would be for about a decade.


Well, my memory goes back more than twice as long and I remember it 
changing before. I remember not being particularly happy with rsyslog 
when it became the default, but it didn't really matter that much so it 
didn't particularly bother me either. rsyslog was (and is) one of 
*several* alternatives, and has advantages and disadvantages compared to 
each of them.



and 2) continuing to use rsyslog isn't an option if the default changes.


No. I just don't want default to change.


Nothing is worse for the debian project than for every single suggestion 
that something change be met with opposition that boils down to 
opposition to change. Things have changed before, they will change 
again, and honestly the impact of most of those changes is very small 
(for either better or worse) and certainly they are not things that 
should be met with the level of emotional response that they are. If 
anything has changed for the worse in the project it's this sense we 
aren't allowed to change things anymore.




Re: Heads up: persistent journal has been enabled in systemd

2020-02-05 Thread Michael Stone

On Thu, Feb 06, 2020 at 08:40:29AM +1100, Dmitry Smirnov wrote:

On Thursday, 6 February 2020 6:59:38 AM AEDT Nikolaus Rath wrote:

I would venture that for every user who is grateful that
/var/log/mail.log collects all the various mail-related logs, there is
another user that curses about non being able to separate (out of the
box) the logs from all the programs that consider themselves
mail-related, and another user who struggles to remember in which
logfile $DIFFICULT_TO_CLASSIFY_PROGRAM might be writing its logs.


There are log readers like "lnav" and "multitail" that will become useless
without traditional log files. "lnav" tails multiple logs by default and IMHO
provides a very useful interface.

Exclusively relying on systemd logging facilities limits ways in which we can
analyse logs.


Nobody said "exclusively" except you! Either option has benefits and 
disadvantages, but for some reason you're arguing as though 1) only your 
particular use cases matter and 2) continuing to use rsyslog isn't an 
option if the default changes.




Re: Heads up: persistent journal has been enabled in systemd

2020-02-05 Thread Michael Stone

On Wed, Feb 05, 2020 at 01:32:41PM +, Scott Kitterman wrote:

My impression so far is that the journalctl interface is a regression from what 
we have now in every way I care about.


Great! Good thing you can just keep using rsyslogd. 



Re: Y2038 - best way forward in Debian?

2020-02-04 Thread Michael Stone

On Tue, Feb 04, 2020 at 03:17:50PM +0100, Ansgar wrote:

At least for i386, I expect it to be used mostly for legacy
applications (and legacy installations).  So breaking ABI by switching
to a "new" architecture or by just changing major libraries like libc6
probably diminishes its value so much that there would no longer be any
use for it: one could just switch to amd64 instead of i386t.


Yes, for x86 in particular I don't see any reason to try to rebuild 
x86-2038 vs x32 for whatever niche might be filled by a 32 bit ILP.




Re: Heads up: persistent journal has been enabled in systemd

2020-02-02 Thread Michael Stone

On Sun, Feb 02, 2020 at 02:35:19PM +, Anthony DeRobertis wrote:

On February 2, 2020 12:02:33 PM UTC, Simon khng  
wrote:

Why was rsyslog used as the persistent storage instead of journald for
previous Debian distribution?


rsyslog has been the default Debian log storage since before switching to 
systemd, possibly since before systemd existed (it was syslogd, but would have 
to check if it was rsyslog or some other implementation).


Way back at the beginning there was syslogd, that got combined early on 
with klogd into the sysklogd package, rsyslogd replaced it on default 
installs in lenny (released 2009). So yes, the reason is that it 
predates systemd. :)




Re: migration from cron.daily to systemd timers

2020-01-09 Thread Michael Stone

On Wed, Jan 08, 2020 at 07:12:17PM -0800, Russ Allbery wrote:

Michael Stone  writes:

On Thu, Jan 09, 2020 at 02:09:12AM +, Paul Wise wrote:



This is the main reason I haven't switched to systemd timers for my
personal crontab, I have some jobs that generate output (diffs of
various things mostly) but don't fail. There doesn't appear to be any
tool to monitor a tool and send a mail if it generates output or fails,
in the way that cron does.



mail -E ?


Specifically:

   ExecStart=/bin/sh -c '/path/to/job | /usr/bin/mail -E'

in the service unit triggered by the timer unit should work, I think.
(I've not tested it.)


May need something like 

(job || echo Job failed) 2>&1 | mail -E 


or even

(job 2>&1 || echo Job failed) | tee /dev/stderr | mail -E

depending on the specific requirements, but in general this should be 
pretty straightforward




Re: migration from cron.daily to systemd timers

2020-01-08 Thread Michael Stone

On Thu, Jan 09, 2020 at 02:09:12AM +, Paul Wise wrote:

This is the main reason I haven't switched to systemd timers for my
personal crontab, I have some jobs that generate output (diffs of
various things mostly) but don't fail. There doesn't appear to be any
tool to monitor a tool and send a mail if it generates output or
fails, in the way that cron does.


mail -E ?



Re: migration from cron.daily to systemd timers

2020-01-08 Thread Michael Stone

On Wed, Jan 08, 2020 at 10:36:02AM -0800, Russ Allbery wrote:

Could you be specific about what you prefer about a cron job over a
systemd timer unit?  If it's just that you are familiar with cron jobs and
not systemd timer units, I'm sympathetic but I don't think that's a very
strong argument for the additional complexity you're asking for.  Other
software in Debian is already using systemd timer units, so you're likely
to have to become familiar with them at some point regardless.  But if
there is some other concrete use case, I'd love to talk about it in
specific detail rather than just in generalities.


As a third party with no particular ax to grind on this, I do wonder 
what the advantage is to adding another mechanism for this particular 
use case, given the need to somehow handle upgrades involving an 
existing (presumably working?) solution. 



Re: migration from cron.daily to systemd timers

2020-01-08 Thread Michael Stone

On Wed, Jan 08, 2020 at 05:15:36PM +0100, Daniel Leidert wrote:

It seems I misread this part at first.


So maybe you should slow down on the emails?




Re: TZ=UTC wrong?

2019-10-31 Thread Michael Stone

On Wed, Oct 30, 2019 at 05:01:56PM +0100, Guillem Jover wrote:

This indeed works in Debian, but I think it's strictly speaking
incorrect according to POSIX, and as such is non-portable.


It's non portable in a way which hasn't been relevant in more than 20 
years and as such isn't worth wasting time over. The POSIX TZ spec is 
irrelevant to real systems except insofar as it can be used to explain 
unexpected behavior when people make a typo.




Re: Bypassing the 2/3/4GB virtual memory space on 32-bit ports

2019-08-20 Thread Michael Stone

On Tue, Aug 20, 2019 at 04:21:43PM +0100, Luke Kenneth Casson Leighton wrote:

that 32-bit hardware is consigned to landfill.  debian has a far
higher impact (as a leader, due to the number of ports) than i think
anyone realises.  if debian says "we're dropping 32 bit hardware",
that's it, it's done.


That's their decision, but I think the correct answer is that 32 bit 
hardware is rapidly moving to a place where it's not applicable to a 
general purpose operating system. From your long list of hardware, 
there's not much that I'd want to run firefox on, for example. 

So, if your hardware isn't right for a general purpose OS...run a 
specialized OS. netbsd still has a vax port...



to give you some idea of how influential debian really is: one of
*the* most iconic processors that AMD, bless 'em, tried desperately
for about a decade to End-of-Life, was the AMD Geode LX800.   the
reason why it wouldn't die is because up until around 2013, *debian
still supported it* out-of-the-box.


IMO, debian wasn't what kept geode going. Long term contracts involving 
embedded devices (which don't usually run debian) are more influential 
then the state of OS support. In fact, the geode EoL has been pushed 
back to 2021, regardless of the lack of debian support. Considering how 
many of these embedded boards are still running windows XP, having an up 
to date general purpose OS simply doesn't seem to be a major factor.




Re: Making mailcap optional ?

2019-08-15 Thread Michael Stone

On Thu, Aug 15, 2019 at 08:29:45AM +0900, Charles Plessy wrote:

Please let me know your thoughts (perhaps after waiting a day or two to
let your thoughts mature).


I don't really see a benefit to this. A system capable of running a 
"modern desktop environment" isn't going to notice the "overhead" of 
mailcap.




Re: Please stop hating on sysvinit (was Re: do packages depend on lexical order or {daily,weekly,monthly} cron jobs?)

2019-08-08 Thread Michael Stone

On Thu, Aug 08, 2019 at 01:08:41PM -0700, Russ Allbery wrote:

Simon Richter  writes:


In the same way, we could have had automatic restart of services through
sysvinit easily: an include mechanism that allows additional inittab
lines to be pulled from /etc/inittab.d/* would be trivial to
implement. That it hasn't been done is not because no one has thought
about it in the last thirty years, but because its use is rather
limited.


Er, well... speaking as someone who tried to keep daemons running via
inittab and then gave up and tried using monit for a while, and then
switched to djb daemontools (all back before systemd existed), I'm not
sure this is quite right.  Those who tried to use this facility quickly
discovered that sysvinit was rather bad at it, and therefore started using
something else.


Yup. Regardless of those who keep insisting that systemd doesn't add 
anything to a server environment, people happily using it for servers 
disagree. I assume those who insist that sysvinit did everything right 
simply either forget the problems it had or just accepted its 
limitations.



Note that this is not a statement about Linux sysvinit specifically -- my
experiences were originally on Solaris.  The flaws in using inittab to
keep services running were universal among UNIX implementations.


And until we got rid of legacy limitations, there was no way forward 
because everything was met with "but this is how its always worked and 
you'll never manage to change things on those other systems".




Re: Generating new IDs for cloning

2019-08-08 Thread Michael Stone

On Thu, Aug 08, 2019 at 06:16:31PM +0200, Marc Haber wrote:

On Thu, 8 Aug 2019 11:50:07 -0400, Michael Stone 
wrote:

On Thu, Aug 08, 2019 at 11:41:52AM -0400, Marvin Renich wrote:

* Michael Stone  [190808 08:42]:

On Thu, Aug 08, 2019 at 08:37:16AM -0400, Marvin Renich wrote:
> Does anyone know what applications use this file for what purpose?  Is
> this a systemd-ism?

man machine-id


The man page says what it is (a unique, random ID for the machine) and
how to initialize it, but says nothing about why it exists. What
applications expect it to be there?



From the man page:


  The machine ID does not change based on local or network configuration
  or when hardware is replaced. Due to this and its greater length, it
  is a more useful replacement for the gethostid(3) call that POSIX
  specifies.
[...]
  When a machine is booted with systemd(1) the ID of the machine will be
  established. If systemd.machine_id= or --machine-id= options (see
  first section) are specified, this value will be used. Otherwise, the
  value in /etc/machine-id will be used. If this file is empty or
  missing, systemd will attempt to use the D-Bus machine ID from
  /var/lib/dbus/machine-id, the value of the kernel command line option
  container_uuid, the KVM DMI product_uuid (on KVM systems), and finally
  a randomly generated UUID.


What Marvin says: That doesn't explain anything.


I guess I need you to say what's confusing. It's an ID that doesn't 
change. You can look up gethostid to get a little more background. If 
you need an ID for a host it's useful. If you don't need an ID for a 
host, then it's not so useful. Once upon a time (gethostid(3) alludes to 
this) it was thought that an IPv4 would be a good unique ID, but with 
the rise of NAT it quickly became useless and hence the search for an 
alternative. The second paragraph is pretty clear that machine-id is one 
of a number of possible seeds for systemd to set the machine's ID. The 
rest of the file talks about how applications can use an API to get a 
constant ID based on the machine ID and that applications should 
generally not use the contents of the machine-id file directly. So to 
find out what applications use the file you'd have to look for 
references to the various APIs (such as 
sd_id128_get_machine_app_specific or dbus-uuidgen) which themselves use 
/etc/machine-id




Re: Generating new IDs for cloning

2019-08-08 Thread Michael Stone

On Thu, Aug 08, 2019 at 11:41:52AM -0400, Marvin Renich wrote:

* Michael Stone  [190808 08:42]:

On Thu, Aug 08, 2019 at 08:37:16AM -0400, Marvin Renich wrote:
> Does anyone know what applications use this file for what purpose?  Is
> this a systemd-ism?

man machine-id


The man page says what it is (a unique, random ID for the machine) and
how to initialize it, but says nothing about why it exists. What
applications expect it to be there?



From the man page:


  The machine ID does not change based on local or network configuration
  or when hardware is replaced. Due to this and its greater length, it
  is a more useful replacement for the gethostid(3) call that POSIX
  specifies.
[...]
  When a machine is booted with systemd(1) the ID of the machine will be
  established. If systemd.machine_id= or --machine-id= options (see
  first section) are specified, this value will be used. Otherwise, the
  value in /etc/machine-id will be used. If this file is empty or
  missing, systemd will attempt to use the D-Bus machine ID from
  /var/lib/dbus/machine-id, the value of the kernel command line option
  container_uuid, the KVM DMI product_uuid (on KVM systems), and finally
  a randomly generated UUID.



Re: Generating new IDs for cloning

2019-08-08 Thread Michael Stone

On Thu, Aug 08, 2019 at 08:37:16AM -0400, Marvin Renich wrote:

Does anyone know what applications use this file for what purpose?  Is
this a systemd-ism?


man machine-id



Re: duplicate popularity-contest ID

2019-08-07 Thread Michael Stone

On Wed, Aug 07, 2019 at 04:02:14PM +0100, Ian Jackson wrote:

Michael Stone writes ("Re: duplicate popularity-contest ID"):

I guess the question is what is the point of the popcon statistics.
Insofar as they're used to determine defaults, skewing them toward
custom images (which likely do not care about defaults) is probably a
mistake.


popcon is a really bad way to determine defaults because it is so
heavily skewed by existing defaults.

More useful uses of popcon include: estimating the downside, if some
package is (or may become) broken or removed; and, maybe, estimating
the user preferences between different non-default leaf packages.

For me, if I were doing (say) RC bugfixing and was considering asking
for a removal, even a moderate popcon figure would give me pause.
Conversely, a low popcon figure would encourage me to consult on
removing the package.


I don't think popcon is a good reason to pause if there are valid 
concerns suggesting removal is a good thing, for the exact reason that 
it's skewed to propagating existing practice. I'm not sure there's any 
really good use for popcon, but I'll continue to believe that any value 
it does have is more related to how many unique configurations it 
reflects rather than how many duplicate instances it can hold. 



Re: duplicate popularity-contest ID

2019-08-07 Thread Michael Stone

On Wed, Aug 07, 2019 at 09:31:34AM +0200, Marc Haber wrote:

On Tue, 6 Aug 2019 11:33:42 +, Bill Allombert
 wrote:

Yesterday I received the same popcon ID 2600 times, and 4700 differents ID were 
received
two times and 22000 ID were received exactly once.

I understand the need for totally identical systems, but then probably
it does not make sense for them to report to popcon.


Why? Does a node in a cluster count less than a desktop installation?
If so, why do we not value the input of our biggest users while
putting so much focus on installations in a market segment that we're
losing anyway?


I guess the question is what is the point of the popcon statistics. 
Insofar as they're used to determine defaults, skewing them toward 
custom images (which likely do not care about defaults) is probably a 
mistake. 



Accepted argus-clients 1:3.0.8.2-5 (source amd64) into unstable

2019-08-06 Thread Michael Stone
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 06 Aug 2019 11:18:50 -0400
Source: argus-clients
Binary: argus-client argus-client-dbgsym
Architecture: source amd64
Version: 1:3.0.8.2-5
Distribution: unstable
Urgency: low
Maintainer: Michael Stone 
Changed-By: Michael Stone 
Description:
 argus-client - IP network transaction auditing tool
Changes:
 argus-clients (1:3.0.8.2-5) unstable; urgency=low
 .
   * update debhelper dependencies
Checksums-Sha1:
 0ada104af2916b3d06bf76405d29e99a86a5871d 1921 argus-clients_3.0.8.2-5.dsc
 03aa066585bff865edb2b9659230fd20633d299a 22964 
argus-clients_3.0.8.2-5.debian.tar.xz
 783da1c5e6e72d64711a2a094a1420eefca51cdc 26949400 
argus-client-dbgsym_3.0.8.2-5_amd64.deb
 0afed548c4b9c7ef592fd85003f6f73606503b8d 3420908 
argus-client_3.0.8.2-5_amd64.deb
 c268695e66dfdf244977abb849a9228372c31d9f 7619 
argus-clients_3.0.8.2-5_amd64.buildinfo
Checksums-Sha256:
 d7c7a1901f1b22b6bb51b0ba398b93da939fce4da86344cce6868856b26c9274 1921 
argus-clients_3.0.8.2-5.dsc
 fddb17a98246e68b611bb917405451fe20675861f1499935b98f535f79981b08 22964 
argus-clients_3.0.8.2-5.debian.tar.xz
 4c2b98b56e884ea1facff941b1f9b7b42740500df434615e133c39d7ba2bbc07 26949400 
argus-client-dbgsym_3.0.8.2-5_amd64.deb
 4324cda66a0e9334de3a06cb5ac7cf2fedd10f126fd307c6e0d9c5d6468637e4 3420908 
argus-client_3.0.8.2-5_amd64.deb
 eac0a58640e82b6b628c2b9244ba1cc36caa68952631e562cbbb676880e23c5a 7619 
argus-clients_3.0.8.2-5_amd64.buildinfo
Files:
 aaf2f53f1c897198447d1657a0c5bd52 1921 utils optional 
argus-clients_3.0.8.2-5.dsc
 d9b567b1d859bda61bbed418d514bf42 22964 utils optional 
argus-clients_3.0.8.2-5.debian.tar.xz
 bd324b84aab21ec45d30c8e37d8507c0 26949400 debug optional 
argus-client-dbgsym_3.0.8.2-5_amd64.deb
 1cb4516fdf4d3410322ceb55b20f9325 3420908 utils optional 
argus-client_3.0.8.2-5_amd64.deb
 cedbff36a276e505ab9fe8f6f054 7619 utils optional 
argus-clients_3.0.8.2-5_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=sW0k
-END PGP SIGNATURE-



Accepted argus-clients 1:3.0.8.2-4 (source amd64) into unstable

2019-08-06 Thread Michael Stone
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 06 Aug 2019 10:33:16 -0400
Source: argus-clients
Binary: argus-client argus-client-dbgsym
Architecture: source amd64
Version: 1:3.0.8.2-4
Distribution: unstable
Urgency: low
Maintainer: Michael Stone 
Changed-By: Michael Stone 
Description:
 argus-client - IP network transaction auditing tool
Closes: 932984 933029
Changes:
 argus-clients (1:3.0.8.2-4) unstable; urgency=low
 .
   * updated debhelper systemd boilerplate (Closes: #933029)
   * fix hardcoded path to rabins (Closes: #932984)
   * Update standards-version to 4.4.0
Checksums-Sha1:
 6b5ff70290139aafaff0709a3eeb75554748d691 1941 argus-clients_3.0.8.2-4.dsc
 808df65ab7c90ea74a8215fcd77d6b8d46ccb4e2 22956 
argus-clients_3.0.8.2-4.debian.tar.xz
 3d6ebee3414db0e76e07a2f7c1251ce6595ff7c6 26949660 
argus-client-dbgsym_3.0.8.2-4_amd64.deb
 31056cf10770e56ff7d52dcefa9b04235838fb91 3422644 
argus-client_3.0.8.2-4_amd64.deb
 578c381e5e5075313ba594592164f7b9f5108c41 7643 
argus-clients_3.0.8.2-4_amd64.buildinfo
Checksums-Sha256:
 6dbb65d21fd00d9fc2dc091f818c19af70eb9e53593088fbad1c8b1eac6f2032 1941 
argus-clients_3.0.8.2-4.dsc
 9dc07a78ec46078702f8dcd7a65edff4731fec54bb64e61dd6c4473f6f47105f 22956 
argus-clients_3.0.8.2-4.debian.tar.xz
 0c8060f54c5cf20646595f5444e9e2b618f4417e2100576d4d21caead1655e8c 26949660 
argus-client-dbgsym_3.0.8.2-4_amd64.deb
 967cce3870ea4380de0e2cba67e212d2d5cbafc46c8bd9c976474f65112d511b 3422644 
argus-client_3.0.8.2-4_amd64.deb
 c25c5296dc006855ffd64e4b1f5c272c007830a035256fc1bf41278f15da7502 7643 
argus-clients_3.0.8.2-4_amd64.buildinfo
Files:
 8d1253ce8a2dc23971d5789426699c4f 1941 utils optional 
argus-clients_3.0.8.2-4.dsc
 9ba07da9b6a4bee3618b2847258b2449 22956 utils optional 
argus-clients_3.0.8.2-4.debian.tar.xz
 6d4a9b6ffc9310856c74ed4b27abaa93 26949660 debug optional 
argus-client-dbgsym_3.0.8.2-4_amd64.deb
 62c1b12f11734679d9b669d70313c7e4 3422644 utils optional 
argus-client_3.0.8.2-4_amd64.deb
 fafd048d3c4622093acc66f6715a3b28 7643 utils optional 
argus-clients_3.0.8.2-4_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEAtUxX/EfDh4C9hqs3PoR/94FAl1JlsAACgkQ9hqs3PoR
/97IRQ//cn0kRKq67Pof9SIWQut95nhWB1XrCwzQcPQ16x3ds2c27QqtcSZNTghI
DHfS2SJY+l+KIlZrYxPicOP9f7SyG5i3UKZ1if0+ffTZAshbLkXNvDp8fEmEqlis
q2+od4apFpWu2flfyjO1W486cgtD9YEgm5IOGHYJqXrAlJk/PslejQIgmmFz5Kj0
/ViuL+a2o+dSCPK74An+zV8NTfbJl8S+GyUbLBuk59dd6Qev22NIkIKVnsnLxSkE
hh+AeuiBuv98k2/RqEe34CqJ7mKTqI5y+fZySbmeHjOE9SZ4Or+E6OyqNFxPK+cD
Gv0vzc9TAmbT/He2oYJA5HC5ITwEAt+Zbc27PQLPHjznyFQiY0LucYF9QVI9Rb4A
5JOCxLzGeZb6etpZBvavuPBUWtr4NPrgY/L1sA63lhs/hddGoizhCxFETJlftt5P
QAgZFA2Mr0DFiVZTkFWNAWj+2rEXqTwhAPFUQfRduijx2mJakEKe932DgNxq45gI
OP5FCJ5BQhDEWbqnH/WZFJpd69clS6uBjnhKVFiKrIK5/ULY+DLc2mk/n9Q8dqul
ur0orVZ2CjDnscHpOkcjeqqCa5ImB7HrHUG4+IIt4Tb70RXJN3lWwMDkksvp5Y9r
vZNLCB5wty2TU0A0UcoixNucICustfFtpCFxa6V2lnwCtWPngmQ=
=rFEX
-END PGP SIGNATURE-



Re: getting rid of "testing"

2019-06-26 Thread Michael Stone

On Wed, Jun 26, 2019 at 02:23:40PM -0500, Andrej Shadura wrote:

On Wed, 26 Jun 2019 at 14:13, Michael Stone  wrote:


On Wed, Jun 26, 2019 at 03:10:27PM +0200, Philip Hands wrote:
>I'm perfectly capable of typing slink when I meant stretch.  The coming
>era of b* releases is going to be a right pain for me.

FWIW, I still confuse bo and buzz. :)


How about buzz and buzzter? :)


They're all terrible. I routinely say squeeze when I mean stretch, and 
then when I log in somewhere and see stretch I wonder why it's running 
such an old release. :(




Re: getting rid of "testing"

2019-06-26 Thread Michael Stone

On Wed, Jun 26, 2019 at 03:10:27PM +0200, Philip Hands wrote:

I'm perfectly capable of typing slink when I meant stretch.  The coming
era of b* releases is going to be a right pain for me.


FWIW, I still confuse bo and buzz. :)



Re: getting rid of "testing"

2019-06-26 Thread Michael Stone

On Wed, Jun 26, 2019 at 01:29:44PM -0300, Antonio Terceiro wrote:

As a data point, having "stable" and "testing" stay around is very
useful for CI purposes. For example on ci.debian.net all our setup uses
"stable" and "testing" instead of the release codenames, and it's useful
to have a system that does not need manual intervention when the meaning
of "stable" and "testing" changes.


Ideally, a mapping of what is currently "stable" or "testing" or at 
other levels of support would be easy to determine programatically, so 
you could avoid manual intervention for those cases and make it easy to 
support other cases without having to either manually configure things 
*or* make a bunch of new ugly symlinks.




Re: getting rid of "testing"

2019-06-26 Thread Michael Stone

On Wed, Jun 26, 2019 at 04:13:00PM +0100, Ian Jackson wrote:

Andreas Tille writes ("Re: getting rid of "testing""):

 I never really understood why we need these codenames.

Simon McVittie wrote:
| Back when the release team decided on a per-release basis whether
| this was a "major" or "minor" release, we had the excuse that we had
| to use a codename for testing because we didn't know whether etch
| would be released as Debian 3.2 or Debian 4.0

I was around at the time and I have a vague recollection which roughly
matches Simon's.  


Not just that: after the faux-release debacle there was a push to avoid 
numbers in case someone polluted one. We're much less dependent on CD 
vendors these days, of course.




Re: getting rid of "testing"

2019-06-26 Thread Michael Stone

On Wed, Jun 26, 2019 at 09:01:03AM +0800, Paul Wise wrote:

I also should mention that I use all of stable stable-updates
proposed-updates and the equivalents for old/oldold. I have them in
the apt sources of a chdist so I can easily look up old versions, do
apt-file searches on old versions, look up non-amd64 architecture info
etc.


Wouldn't it be nicer to have a reliable and simple source of version 
ordering rather than relying on ugly names and symlinks? As a bonus, it 
would be useful for a lot more things and for more than n-2 
calculations.




Re: getting rid of "testing"

2019-06-25 Thread Michael Stone

On Tue, Jun 25, 2019 at 09:43:02PM +0500, Andrey Rahmatullin wrote:

On Tue, Jun 25, 2019 at 12:40:01PM -0400, Michael Stone wrote:

> and so on - i take the older releases only as reference.

I just do something like look at https://packages.debian.org/ssh
Or, if I'm really curious about versions, then something like
http://snapshot.debian.org/package/openssh/

rmadison(1) and https://tracker.debian.org/ are probably better.


Those are also good options for additional use cases. :) At any rate, 
putting every release ever into sources.list is generally not the best 
available mechanism.




Re: getting rid of "testing"

2019-06-25 Thread Michael Stone

On Tue, Jun 25, 2019 at 06:28:13PM +0200, Alf Gaida wrote:

On 25.06.19 17:48, Michael Stone wrote:
oldoldstable has the value of demonstrating some of what's wrong 
with the current system


Can you please explain, i don't get it - maybe i to new at this. For 
me file like /etc/apt/sources.lists.d/debian.list:


wow, that slows down every package operation on the system as you 
download or search 6+ versions of everything. 


and so on - i take the older releases only as reference.


I just do something like look at https://packages.debian.org/ssh
Or, if I'm really curious about versions, then something like 
http://snapshot.debian.org/package/openssh/


If you've got some kind of weird requirement to have everything local, 
I'd still rather see something like "debian8" in the output than 
"oldoldstable"--a name that changes over time and is therefore relative 
to both a reference system and a specific system at the time that entry 
was created. If I want a specific version of a package, it will only be 
in "oldoldstable" up until "oldoldstable" is something entirely 
different. I'm still not understanding a use case where that's an 
advantage.




Re: getting rid of "testing"

2019-06-25 Thread Michael Stone

On Tue, Jun 25, 2019 at 06:06:55PM +0200, Benjamin Drung wrote:

Am Dienstag, den 25.06.2019, 11:48 -0400 schrieb Michael Stone:

On Tue, Jun 25, 2019 at 05:01:48PM +0200, Alf Gaida wrote:
> Only a few remarks as former simple user and now maintainer:
> * Please don't mix things: release names has a value, distribution
> names like oldoldstable, oldstable, stable, testing, unstable has
> their value too

oldoldstable has the value of demonstrating some of what's wrong
with
the current system


Then running wheezy will be fine once buster is released, because
oldoldstable will point to jessie and wheezy won't have a release name
any more?

Some admins ask: "How many reboots until the next Debian release?"
Others ask: "How many Debian releases until the next reboot?"
I can images systems that are getting bought, setup, and after several
years shutdown and retired without rebooting or dist-upgrading them.


I have no idea what you're trying to say, sorry.



Re: getting rid of "testing"

2019-06-25 Thread Michael Stone

On Tue, Jun 25, 2019 at 05:01:48PM +0200, Alf Gaida wrote:

Only a few remarks as former simple user and now maintainer:
* Please don't mix things: release names has a value, distribution 
names like oldoldstable, oldstable, stable, testing, unstable has 
their value too


oldoldstable has the value of demonstrating some of what's wrong with 
the current system




Re: getting rid of "testing"

2019-06-25 Thread Michael Stone

On Tue, Jun 25, 2019 at 02:38:43PM +0200, Bastian Blank wrote:

On Tue, Jun 25, 2019 at 08:03:49AM -0400, Michael Stone wrote:

Having "stable" in sources.list is broken, because one day stuff goes from
working to not working, which requires manual intervention, at which point
someone could have just changed the name.


Once I had unattended-upgrades do the upgrade to the new stable for me
over night on quite a few systems, almost everything still worked.


"almost" covers quite a lot of territory, and is the reason it's best 
not to have the upgrade happen accidentally. 



Re: getting rid of "testing"

2019-06-25 Thread Michael Stone

On Tue, Jun 25, 2019 at 08:07:51PM +0800, Paul Wise wrote:

On Tue, Jun 25, 2019 at 8:04 PM Michael Stone wrote:

Having "stable" in sources.list is broken, because one day stuff goes
from working to not working, which requires manual intervention, at
which point someone could have just changed the name. Having codenames
in sources.list is broken, because even people who have been developers
for two decades can't remember which release is which without looking it
up. (Which is harder than it should be; maybe we should have had
/etc/debian-releasenames or somesuch from the beginning. lsb_release -a
is helpful when available but doesn't have context, and many users don't
know it exists.)


Personally, I can remember the names and their order much better than
which version goes with which codename or suite :)


Well, every problem domain has its rainman :) For the rest of us, 
there's google. 



Re: getting rid of "testing"

2019-06-25 Thread Michael Stone

On Tue, Jun 25, 2019 at 11:09:06AM +0100, Ian Jackson wrote:

~Ansgar writes ("getting rid of "testing""):

Related to that I would like to be able to write something like

  deb http://deb.debian.org/debian debian11 main
  deb http://security.debian.org/debian-security debian11-security main

in sources.list as codenames confuse people.


Yes, please, absolutely.  And this should be the default.


+1

Having "stable" in sources.list is broken, because one day stuff goes 
from working to not working, which requires manual intervention, at 
which point someone could have just changed the name. Having codenames 
in sources.list is broken, because even people who have been developers 
for two decades can't remember which release is which without looking it 
up. (Which is harder than it should be; maybe we should have had 
/etc/debian-releasenames or somesuch from the beginning. lsb_release -a 
is helpful when available but doesn't have context, and many users don't 
know it exists.) 



Re: .deb format: let's use 0.939, zstd, drop bzip2

2019-05-10 Thread Michael Stone

On Fri, May 10, 2019 at 05:42:45PM +0200, Marc Haber wrote:

On Fri, 10 May 2019 07:42:52 -0400, Michael Stone 
wrote:

This is really not a property worth preserving.


I disagree. I frequently unpack .debs on .rpm Systems, especially when
I want to see how the rather nice behavior that I find in Debian is
implemented to see whether I can implant that hotness into the .rpm
world.


And there are easily installed tools which I have every confidence will 
be updated to work with any new format so your ability to do so won't be 
diminished in the least. Just like I can unpack rpms on a deb system.




Re: .deb format: let's use 0.939, zstd, drop bzip2

2019-05-10 Thread Michael Stone

On Fri, May 10, 2019 at 05:18:18AM +0200, Guillem Jover wrote:

be updated anyway to support any new format. It also destroys some of the
nice properties of the 2.x format, namely:

 - Not requiring special tools to build/extract.


This is really not a property worth preserving. I think it would be 
fairly easy to get significant performance improvements if we dropped 
the archive nesting, and all it would cost is losing a bullet point that 
nobody really cares about all that much. I remember when this was one of 
the "reasons" to advocate .deb over .rpm but in the real world people
just apt install rpm and the anecdotes about this one time somebody 
wanted to unpack a deb on an ancient sunos box aren't worth slowing down 
every install until the end of time.




Re: .deb format: let's use 0.939, zstd, drop bzip2

2019-05-08 Thread Michael Stone

On Thu, May 09, 2019 at 07:37:55AM +0800, Paul Wise wrote:

On Thu, May 9, 2019 at 1:38 AM Adam Borowski wrote:


Thus, even though we'd want to stick with xz for the official archive, speed
gains from zstd are so massive that it's tempting to add support for it,
at least for non-official uses, possibly also for common Build-Depends.


Could we use custom zstd dictionaries on a per-architecture basis to
further reduce the size of zstd packages, possibly allowing it to beat
xz?


In theory, sure. Have any test results? My gut tells me that wouldn't 
buy much but numbers matter more. 



Re: Please drop anacron from task-desktop

2019-03-08 Thread Michael Stone

On Sat, Mar 09, 2019 at 12:02:05AM +0200, Adrian Bunk wrote:

On Fri, Mar 08, 2019 at 02:38:07PM -0500, Michael Stone wrote:

On Fri, Mar 08, 2019 at 08:01:35PM +0100, Christian Kastner wrote:
> I intended to post a transition proposal here soon, but it's not ready
> yet... but long story short: I believe we would be far better off moving
> to cronie than maintaining our old fork.

One question worth asking is which distributions plan to maintain cron
moving forward--will some of the systemd-focused ones start dropping it in
favor of timers? (No point in migrating to fedora's cronie, for example, if
they stop using it in a year or two.)


Upstream systemd lacks crontab support, and 3rd party systemd-based
replacements are not 100% compatible with cron/cronie/bcron/...


What does that have to do with whether other distributions stop 
supporting crontabs?




Re: Please drop anacron from task-desktop

2019-03-08 Thread Michael Stone

On Fri, Mar 08, 2019 at 08:01:35PM +0100, Christian Kastner wrote:

I intended to post a transition proposal here soon, but it's not ready
yet... but long story short: I believe we would be far better off moving
to cronie than maintaining our old fork.


One question worth asking is which distributions plan to maintain cron 
moving forward--will some of the systemd-focused ones start dropping it 
in favor of timers? (No point in migrating to fedora's cronie, for 
example, if they stop using it in a year or two.)




Re: Please drop anacron from task-desktop

2019-03-07 Thread Michael Stone

On Thu, Mar 07, 2019 at 09:02:23PM +0100, Holger Wansing wrote:

I'm actually wondering if this is a good idea..

There are lot of other packages installing cronjobs and people, I would
assume, expect that they will run.

I would personally revert his patch as long as all the cronjobs have not
a corresponding systemd .timer


Any thoughts on this?


What's the downside to having anacron there if a .timer supersedes the 
cron job? 



Accepted coreutils 8.30-3 (source amd64) into unstable

2019-02-28 Thread Michael Stone
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 28 Feb 2019 10:30:31 -0500
Source: coreutils
Binary: coreutils coreutils-dbgsym
Architecture: source amd64
Version: 8.30-3
Distribution: unstable
Urgency: medium
Maintainer: Michael Stone 
Changed-By: Michael Stone 
Description:
 coreutils  - GNU core utilities
Closes: 923420
Changes:
 coreutils (8.30-3) unstable; urgency=medium
 .
   * Fix renameat2 patch (Closes: #923420)
Checksums-Sha1:
 7a110d042666df380eaf2338d6e324a42fdf8d55 1861 coreutils_8.30-3.dsc
 09a9761b2c781fee706833bc99e40c9cdc41689f 32808 coreutils_8.30-3.debian.tar.xz
 34e12929f616575f998aa86d557712ab1b251123 7168128 
coreutils-dbgsym_8.30-3_amd64.deb
 8317de329a7ba1c6148b66b7f00fbaeb4f5b12df 7078 coreutils_8.30-3_amd64.buildinfo
 df3e8007a3bcb8db05ac55277676936ccb1c9435 2707932 coreutils_8.30-3_amd64.deb
Checksums-Sha256:
 106031a57a2ab2ba46b61083035e2ccb438c85a2b3506a8198b67868dde1546d 1861 
coreutils_8.30-3.dsc
 9179d45fb51d07a8743c4d58464459330eb6d4b489d59641d70c3bd9f579b694 32808 
coreutils_8.30-3.debian.tar.xz
 44409552e5699b21b6a55443d6115cd5b9bf5b6e2c2bdfab71d213a0f0a6354c 7168128 
coreutils-dbgsym_8.30-3_amd64.deb
 fd5f9230ea263fc763537c86d6a296f778345ced6d80ed973fb985f47b2b96dd 7078 
coreutils_8.30-3_amd64.buildinfo
 ae6e5cd6e9aaf74d66edded3931a7a6c916625b8b890379189c75574f6856bf4 2707932 
coreutils_8.30-3_amd64.deb
Files:
 8e7167ff50149c83192535df18eee396 1861 utils required coreutils_8.30-3.dsc
 f68506bc07552eee03c7652cb38431e8 32808 utils required 
coreutils_8.30-3.debian.tar.xz
 da01e2c62a06720f9ec4da1a47d65d54 7168128 debug optional 
coreutils-dbgsym_8.30-3_amd64.deb
 b8c27d1c7c86c979cb75a4f4cd9e427f 7078 utils required 
coreutils_8.30-3_amd64.buildinfo
 4a658a39c2810530df6642d22f65ddd1 2707932 utils required 
coreutils_8.30-3_amd64.deb

-BEGIN PGP SIGNATURE-
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=cBft
-END PGP SIGNATURE-



Accepted coreutils 8.30-2 (source amd64) into unstable

2019-02-26 Thread Michael Stone
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 26 Feb 2019 07:15:19 -0500
Source: coreutils
Binary: coreutils coreutils-dbgsym
Architecture: source amd64
Version: 8.30-2
Distribution: unstable
Urgency: medium
Maintainer: Michael Stone 
Changed-By: Michael Stone 
Description:
 coreutils  - GNU core utilities
Closes: 915559
Changes:
 coreutils (8.30-2) unstable; urgency=medium
 .
   * Use renameat glibc function that can be intercepted by fakechroot
 (Closes: #915559)
   * Above requires autoreconf turned on again
Checksums-Sha1:
 07343587915d2976873e066fed2284a58260c50e 1861 coreutils_8.30-2.dsc
 74c27198720a3025d3caa5504c4d13e9e1e7d72e 32368 coreutils_8.30-2.debian.tar.xz
 86cefd574b3891e00b1ba49c21a885ed1df1a6c1 7164580 
coreutils-dbgsym_8.30-2_amd64.deb
 4d9378ddfeb4f3b9f1ef4dbca0c87d4b5cd7df52 7078 coreutils_8.30-2_amd64.buildinfo
 35863c2c0ae6275d6d3f30dc637608bf336d859a 2706740 coreutils_8.30-2_amd64.deb
Checksums-Sha256:
 450506ba6b417a827344d2083b1d0e00dfef2ca9546a1eec645652f068b84aeb 1861 
coreutils_8.30-2.dsc
 58bea49dc60fcbc89fcdf86c46dd3ebd2cba0c15b92daf699dc9f5c3c78bd362 32368 
coreutils_8.30-2.debian.tar.xz
 a4284a0094e197e5aea0561b22c8ab6ce2f6e634d91cbb6a1ce021ea8ab7bbf5 7164580 
coreutils-dbgsym_8.30-2_amd64.deb
 45cd84262a4b6d5b3057130c8437d32deb08dfab6a4d2537d49bb400aec29cca 7078 
coreutils_8.30-2_amd64.buildinfo
 1d1fbed93b80b4ed2b236ea33a49bfbad3a110de46479bb10f6722eda620a994 2706740 
coreutils_8.30-2_amd64.deb
Files:
 df8f803183d6783726fbc47eb06e75fe 1861 utils required coreutils_8.30-2.dsc
 efce4b43803d108ad4a65f3c16ce4643 32368 utils required 
coreutils_8.30-2.debian.tar.xz
 f563a47f7ff3b5c7043f7bc5feb0f6d7 7164580 debug optional 
coreutils-dbgsym_8.30-2_amd64.deb
 2ad479e422aee83e1c71dda4ac51321c 7078 utils required 
coreutils_8.30-2_amd64.buildinfo
 35f4d378eafcc91e413354cd81ec6b12 2706740 utils required 
coreutils_8.30-2_amd64.deb

-BEGIN PGP SIGNATURE-
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=skoj
-END PGP SIGNATURE-



Re: FYI/RFC: early-rng-init-tools

2019-02-25 Thread Michael Stone

On Mon, Feb 25, 2019 at 03:53:09PM +, Ben Hutchings wrote:

The major input into the new seed file contents is the old seed file
contents.


Yes, I'd just drop the seed file once used, then have a scheduled job 
write a new one at some point in the future if the random quality is
high enough. If you reboot twice in a row the second boot won't get 
seeded, but that's better than a package that introduces potentially 
insecure random seeding by default. Maybe add a non-default option to 
allow seed reuse with a lot of warnings, but don't do it by default.




Re: Bug#877900: How to get 24-hour time on en_US.UTF-8 locale now?

2019-02-07 Thread Michael Stone

On Thu, Feb 07, 2019 at 10:21:49PM +0100, Ansgar wrote:

(And you get 24-hour time, but very strange Endian in C.UTF-8:
 WEEKDAY MMM DD HH:MM:SS TZ 
while en_US.UTF-8 has at least DD MMM ...  Having
 -MM-DD HH:MM:SS[+]
instead would be much nicer if we were to create an arbitrary set of new
rules for a new universal "en" locale ;-) )


Exactly: using "C" implies compatability with the old POSIX rules, "en" 
implies you can do whatever you want. :)




  1   2   3   4   5   >