Bug#983314: linux-base: perf fails to report that linux-perf-5.10 is not installed

2021-02-25 Thread Jose R Rodriguez
On Fri, 2021-02-26 at 06:47 +0100, Salvatore Bonaccorso wrote:
> Control: tags -1 + confirmed
> 
> Hi Bart,
> 
> On Mon, Feb 22, 2021 at 11:57:56AM +0100, Bart Martens wrote:
> > Package: linux-base
> > Version: 4.6
> > Severity: minor
> > File: /usr/bin/perf
> > 
> > Observed behavior:
> > 
> > $ perf
> > /usr/bin/perf: line 13: exec: perf_5.10: not found
> > 
> > Expected behavior:
> > 
> > $ perf
> > /usr/bin/perf: line 14: exec: perf_5.10: not found
> > E: linux-perf-5.10 is not installed.

FYI Debian Buster backports AMD64 provides 'Expected behavor' in a debian
packaging for 5.10.15-2 reiser4 build hack running in an AMD Epyc/Ryzen cloud
instance:
https://metztli.it/buster/perf.png

> 
> That's intersting, confirmed. The script is the same since the buster
> release without changes, but it looks it behaves differently in a buster
> vs.  unstable/bullseye environment when the replacement ${version%%-*}
> is involved after the version setting:
> 
> , [ perf-minimal ]
> > #!/bin/bash
> > 
> > version="$(uname -r)"
> > version="${version%%-*}"
> > shopt -s execfail
> > exec "perf_$version" "$@"
> > echo >&2 "E: not installed."
> > exit 1
> `
> 
> In an buster environment:
> 
> ++ uname -r
> + version=4.19.0-14-amd64
> + version=4.19.0
> + shopt -s execfail
> + exec perf_4.19.0
> ./perf-minimal: line 6: exec: perf_4.19.0: not found
> + echo 'E: not installed.'
> E: not installed.
> + exit 1
> 
> In an unstable environment:
> 
> bash -x ./perf-minimal 
> ++ uname -r
> + version=4.19.0-14-amd64
> + version=4.19.0
> + shopt -s execfail
> + exec perf_4.19.0
> ./perf-minimal: line 6: exec: perf_4.19.0: not found
> 
> Regards,
> Salvatore
> 

Best Professional Regards.

-- 
-- 
Jose R R
http://metztli.it
---
Download Metztli Reiser4: Debian Buster w/ Linux 5.9.16 AMD64
---
feats ZSTD compression https://sf.net/projects/metztli-reiser4/
---
or SFRN 5.1.3, Metztli Reiser5 https://sf.net/projects/debian-reiser4/
---
Official current Reiser4 resources: https://reiser4.wiki.kernel.org/



Processed: Re: Bug#983314: linux-base: perf fails to report that linux-perf-5.10 is not installed

2021-02-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #983314 [linux-base] linux-base: perf fails to report that linux-perf-5.10 
is not installed
Added tag(s) confirmed.

-- 
983314: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983314
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#983314: linux-base: perf fails to report that linux-perf-5.10 is not installed

2021-02-25 Thread Salvatore Bonaccorso
Control: tags -1 + confirmed

Hi Bart,

On Mon, Feb 22, 2021 at 11:57:56AM +0100, Bart Martens wrote:
> Package: linux-base
> Version: 4.6
> Severity: minor
> File: /usr/bin/perf
> 
> Observed behavior:
> 
> $ perf
> /usr/bin/perf: line 13: exec: perf_5.10: not found
> 
> Expected behavior:
> 
> $ perf
> /usr/bin/perf: line 14: exec: perf_5.10: not found
> E: linux-perf-5.10 is not installed.

That's intersting, confirmed. The script is the same since the buster
release without changes, but it looks it behaves differently in a buster
vs.  unstable/bullseye environment when the replacement ${version%%-*}
is involved after the version setting:

, [ perf-minimal ]
| #!/bin/bash
|
| version="$(uname -r)"
| version="${version%%-*}"
| shopt -s execfail
| exec "perf_$version" "$@"
| echo >&2 "E: not installed."
| exit 1
`

In an buster environment:

++ uname -r
+ version=4.19.0-14-amd64
+ version=4.19.0
+ shopt -s execfail
+ exec perf_4.19.0
./perf-minimal: line 6: exec: perf_4.19.0: not found
+ echo 'E: not installed.'
E: not installed.
+ exit 1

In an unstable environment:

bash -x ./perf-minimal 
++ uname -r
+ version=4.19.0-14-amd64
+ version=4.19.0
+ shopt -s execfail
+ exec perf_4.19.0
./perf-minimal: line 6: exec: perf_4.19.0: not found

Regards,
Salvatore



[bts-link] source package src:linux

2021-02-25 Thread debian-bts-link
#
# bts-link upstream status pull for source package src:linux
# see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
# https://bts-link-team.pages.debian.net/bts-link/
#

user debian-bts-l...@lists.debian.org

# remote status report for #983047 (http://bugs.debian.org/983047)
# Bug title: linux-image-5.10.0-3-amd64: Virtualbox Shared Folder vboxsf in 
5.10 is racy / unusable with git clone
#  * http://bugzilla.kernel.org/show_bug.cgi?id=211171
#  * remote status changed: (?) -> NEW
usertags 983047 + status-NEW

thanks



Processed: your mail

2021-02-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 983495 pending
Bug #983495 [src:linux] linux-image-amd64: Please enable ee1004 module
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
983495: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983495
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: bug 983372 is forwarded to https://lore.kernel.org/stable/fe6040b5-72a0-9882-439e-ea7fc0b39...@redhat.com/ ...

2021-02-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 983372 
> https://lore.kernel.org/stable/fe6040b5-72a0-9882-439e-ea7fc0b39...@redhat.com/
Bug #983372 [src:linux] linux-image-5.10.0-3-amd64: Graphic glitches / 
distortions when using Desktop (Plasma / KDE)
Set Bug forwarded-to-address to 
'https://lore.kernel.org/stable/fe6040b5-72a0-9882-439e-ea7fc0b39...@redhat.com/'.
> tags 983372 + upstream
Bug #983372 [src:linux] linux-image-5.10.0-3-amd64: Graphic glitches / 
distortions when using Desktop (Plasma / KDE)
Added tag(s) upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
983372: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983372
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: found 983508 in 1:1.3.4-4

2021-02-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 983508 1:1.3.4-4
Bug #983508 [nfs-common] nfs-common: Bullseys/Kernel 5.10 SAMBA AD/DC NFSv4 
Kerberos Problem with rpc.gssd
Marked as found in versions nfs-utils/1:1.3.4-4.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
983508: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983508
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#983372: Correction of Bug-Report

2021-02-25 Thread user2304
I unfortunately pasted the wrong link to the redhat forum for further
description of the bug.

The correct one:

https://bugzilla.redhat.com/show_bug.cgi?id=1925346

Kind regards,

user2304

--

mail: user2...@web.de



Re: please consider disabling obsolete crypto in 5.10 and later

2021-02-25 Thread Ard Biesheuvel
On Thu, 25 Feb 2021 at 11:35, Salvatore Bonaccorso  wrote:
>
> Hi Ard,
>
> On Mon, Feb 01, 2021 at 10:21:27PM +0100, Salvatore Bonaccorso wrote:
> > Hi Ard,
> >
> > On Sat, Jan 30, 2021 at 04:41:16PM +0100, Ard Biesheuvel wrote:
> > > L.S.,
> > >
> > > This is a request to consider disabling obsolete crypto in 5.10 and
> > > later Debian builds of the Linux kernel on any architecture.
> > >
> > > We are all familiar with the rigid rules when it comes to not breaking
> > > userspace by making changes to the kernel, but this rule only takes
> > > effect when anybody notices, and so I am proposing disabling some code
> > > downstream before removing it entirely.
> > >
> > > 5.10 introduces a new Kconfig symbol
> > >
> > > CONFIG_CRYPTO_USER_API_ENABLE_OBSOLETE
> > >
> > > which is enabled by default, but depends on support for the AF_ALG
> > > socket API being enabled. In turn, block ciphers that are obsolete and
> > > unlikely to be used anywhere have been made to depend on this new
> > > symbol.
> > >
> > > This means that these obsolete block ciphers will disappear entirely
> > > when the AF_ALG socket API is omitted, but we can get rid of these
> > > block ciphers explicitly too, by not setting the new symbol. I.e.,
> > > adding
> > >
> > > # CONFIG_CRYPTO_USER_API_ENABLE_OBSOLETE is not set
> > >
> > > to the kernel configs. Note that Fedora have already done so in release 
> > > 33 [0]
> > >
> > > The block ciphers in question are RC4, Khazad, SEED, and
> > > TEA/XTEA/XETA, none of which are used by the kernel itself, or known
> > > to be used via the socket API (although a change was applied to
> > > iwd/libell recently to get rid of an occurrence of RC4 - this change
> > > has already been pulled into bullseye afaik)
> > >
> > > Note that this is not a statement on whether these algorithms are
> > > secure or not -there is simply no point in carrying and shipping code
> > > that nobody uses or audits, but which can be autoloaded and exercised
> > > via an unprivileged interface.
> >
> > FTR (posteriori), we tried that in
> > https://salsa.debian.org/kernel-team/linux/-/commit/633e1992f7d915c22b2a2adea87981e7503bb737
> > (and is in the 5.10.12-1 upload to unstable).
>
> There were two reports which might be in the end related to that
> change:
>
> https://bugs.debian.org/979764
> https://bugs.debian.org/983508
>
> We have long that nfs-utils need to be updated, but the version was so
> outdated, that progress on updating to a newer version stalled, and
> could not be done in time for bulleye. Once bullseye is released I
> guess this really needs to be prioritzed in some way.
>
> Ard, have you any insight in the above, so, should we revert the above
> change for bullseye again?
>

Hello Salvatore,

I think the issue is the patch below. Having something that requires
RC4 and MD5 for security is an absolute joke in 2021, so I won't
recommend you reverting it. Instead, you should really fix nfs-utils
with priority.

-- 
Ard.




commit e33d2a7b3041d7f8cd1f0a2a4ca42a5bc112b14e
Author: Ard Biesheuvel 
Date:   Mon Aug 31 18:16:45 2020 +0300

SUNRPC: remove RC4-HMAC-MD5 support from KerberosV

The RC4-HMAC-MD5 KerberosV algorithm is based on RFC 4757 [0], which
was specifically issued for interoperability with Windows 2000, but was
never intended to receive the same level of support. The RFC says

  The IETF Kerberos community supports publishing this specification as
  an informational document in order to describe this widely
  implemented technology.  However, while these encryption types
  provide the operations necessary to implement the base Kerberos
  specification [RFC4120], they do not provide all the required
  operations in the Kerberos cryptography framework [RFC3961].  As a
  result, it is not generally possible to implement potential
  extensions to Kerberos using these encryption types.  The Kerberos
  encryption type negotiation mechanism [RFC4537] provides one approach
  for using such extensions even when a Kerberos infrastructure uses
  long-term RC4 keys.  Because this specification does not implement
  operations required by RFC 3961 and because of security concerns with
  the use of RC4 and MD4 discussed in Section 8, this specification is
  not appropriate for publication on the standards track.

  The RC4-HMAC encryption types are used to ease upgrade of existing
  Windows NT environments, provide strong cryptography (128-bit key
  lengths), and provide exportable (meet United States government
  export restriction requirements) encryption.  This document describes
  the implementation of those encryption types.

Furthermore, this RFC was re-classified as 'historic' by RFC 8429 [1] in
2018, stating that 'none of the encryption types it specifies should be
used'

Note that other outdated algorithms are left in place (some of which are
guarded by 

Re: please consider disabling obsolete crypto in 5.10 and later

2021-02-25 Thread Salvatore Bonaccorso
Hi Ard,

On Mon, Feb 01, 2021 at 10:21:27PM +0100, Salvatore Bonaccorso wrote:
> Hi Ard,
> 
> On Sat, Jan 30, 2021 at 04:41:16PM +0100, Ard Biesheuvel wrote:
> > L.S.,
> > 
> > This is a request to consider disabling obsolete crypto in 5.10 and
> > later Debian builds of the Linux kernel on any architecture.
> > 
> > We are all familiar with the rigid rules when it comes to not breaking
> > userspace by making changes to the kernel, but this rule only takes
> > effect when anybody notices, and so I am proposing disabling some code
> > downstream before removing it entirely.
> > 
> > 5.10 introduces a new Kconfig symbol
> > 
> > CONFIG_CRYPTO_USER_API_ENABLE_OBSOLETE
> > 
> > which is enabled by default, but depends on support for the AF_ALG
> > socket API being enabled. In turn, block ciphers that are obsolete and
> > unlikely to be used anywhere have been made to depend on this new
> > symbol.
> > 
> > This means that these obsolete block ciphers will disappear entirely
> > when the AF_ALG socket API is omitted, but we can get rid of these
> > block ciphers explicitly too, by not setting the new symbol. I.e.,
> > adding
> > 
> > # CONFIG_CRYPTO_USER_API_ENABLE_OBSOLETE is not set
> > 
> > to the kernel configs. Note that Fedora have already done so in release 33 
> > [0]
> > 
> > The block ciphers in question are RC4, Khazad, SEED, and
> > TEA/XTEA/XETA, none of which are used by the kernel itself, or known
> > to be used via the socket API (although a change was applied to
> > iwd/libell recently to get rid of an occurrence of RC4 - this change
> > has already been pulled into bullseye afaik)
> > 
> > Note that this is not a statement on whether these algorithms are
> > secure or not -there is simply no point in carrying and shipping code
> > that nobody uses or audits, but which can be autoloaded and exercised
> > via an unprivileged interface.
> 
> FTR (posteriori), we tried that in
> https://salsa.debian.org/kernel-team/linux/-/commit/633e1992f7d915c22b2a2adea87981e7503bb737
> (and is in the 5.10.12-1 upload to unstable).

There were two reports which might be in the end related to that
change:

https://bugs.debian.org/979764
https://bugs.debian.org/983508

We have long that nfs-utils need to be updated, but the version was so
outdated, that progress on updating to a newer version stalled, and
could not be done in time for bulleye. Once bullseye is released I
guess this really needs to be prioritzed in some way.

Ard, have you any insight in the above, so, should we revert the above
change for bullseye again?

Regards,
Salvatore



Bug#983508: nfs-common: Bullseys/Kernel 5.10 SAMBA AD/DC NFSv4 Kerberos Problem with rpc.gssd

2021-02-25 Thread J. Pfennig
Package: nfs-common
Version: 1:1.3.4-2.5+deb10u1
Severity: important
Tags: upstream

Dear Maintainers

There is a long standing bug (or wrong documentation) in rpc.gssd
Probably debian uses an outdated version (new upstream version).

I consider this bug as severe because it breaks backward compa-
tibility since debian bullseye. It might affect most SAMBA AD/DC
setups that were working with buster and fail with bulseye.


PROBLEM

The point is the nfs/... SPN (service principle name) that was
historically used to fill the kerberos machine credential cache.

The documentation explicitly states that rpc.gssd first tries
the (windows) machine account $/... then a SPN (or UPN?)
root/... then some others and FINALLY the nfs/... SPN. But this
is wrong, only nfs/... is recognized.

This creates a problem with SAMBA AD/DCs setups. Samba uses heimdal
kerberos. A difference between heimdal and MIT are the SPNs. So in
SAMBA you have to add a UPN (like the before mentioned root/...) 
and to attach the nfs/... SPN to the UPN. This is how it looks:

samba-tool user create --random-password --gid-number=100 \
 --gecos="nfs user" --unix-home=/tmp --login-shell=/usr/sbin/nologin \
 root/myhost.centauri.home
samba-tool user setexpiry --noexpiry root/myhost.centauri.home
samba-tool spn add nfs/myhost.centauri.home root/myhost.centauri.home

The exported keytab works fine (until kernel 5.9) and allows NFS4 with
kerberos security:

samba-tool domain exportkeytab xxx.keytab --principal MYHOST$
samba-tool domain exportkeytab xxx.keytab --principal root/myhost.centauri.home
samba-tool domain exportkeytab xxx.keytab --principal nfs/myhost.centauri.home

But as nfs/... SPN seems to be historic SAMBA only exports weak 
encryption keys for nfs/... whereas the machine account and the root/...
UPN have strong encryption:

klist -e -k /etc/krb5.keytab.old
Keytab name: FILE:/etc/krb5.keytab.old
KVNO Principal
 --
   1 alpha1$@CENTAURI.HOME (aes256-cts-hmac-sha1-96) 
   1 alpha1$@CENTAURI.HOME (aes128-cts-hmac-sha1-96) 
   1 alpha1$@CENTAURI.HOME (arcfour-hmac) 
   1 alpha1$@CENTAURI.HOME (des-cbc-md5) 
   1 alpha1$@CENTAURI.HOME (des-cbc-crc) 
   2 root/alpha1.centauri.h...@centauri.home (aes256-cts-hmac-sha1-96) 
   2 root/alpha1.centauri.h...@centauri.home (aes128-cts-hmac-sha1-96) 
   2 root/alpha1.centauri.h...@centauri.home (arcfour-hmac) 
   2 root/alpha1.centauri.h...@centauri.home (des-cbc-md5) 
   2 root/alpha1.centauri.h...@centauri.home (des-cbc-crc) 
   2 nfs/alpha1.centauri.h...@centauri.home (arcfour-hmac) 
   2 nfs/alpha1.centauri.h...@centauri.home (des-cbc-md5) 
   2 nfs/alpha1.centauri.h...@centauri.home (des-cbc-crc) 


SOLUTION

This was OK until kernel 5.9 only. Since 5.10 somebody disabled weak
encrytion in the kernel part of GSSAPI. Now debian's old rpc.gssd
fails. Probably creating a security problem as NFS mount now tries
NFS 3 (without kerberos).

The SAMBA documentation explains the SAMBA behaviour here:

   https://wiki.samba.org/index.php/Generating_Keytabs

The solution is to explicitly set the supported encryption for
the root/... UPN:

net ads enctypes set root/myhost.centauri.home 31

A newly created keytab now contains the required encryptions
for the nfs/... SPN. And now NFS4 works with 5.10 / bullseye.


CONCLUSION

The NFS4 / SAMBA / KERBEROS setup is extremly complacated, debian's
rpc.gssd is outdated or buggy and someone tried to improve security
by removing something from the kernel. NFS mounts on bullseye
systems may fall back to NFS3 without kerberos. Not good.


PLEASE

Give users a hint, a usefull error message, or fix rpc.gssd
It took me a long time to indentify the reported problem and I am
thankfull for a hint that I found in the univention bug tracker.

Yours Jürgen


-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
-- /etc/default/nfs-common --
NEED_STATD=no
STATDOPTS=
NEED_IDMAPD=yes
NEED_GSSD=yes
-- /etc/idmapd.conf --
[General]
Verbosity = 0
Pipefs-Directory = /run/rpc_pipefs
Domain = centauri.home
[Mapping]
Nobody-User = nobody
Nobody-Group = nogroup
-- /etc/fstab --

-- System Information:
Debian Release: 10.8
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.0-0.bpo.4-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE= 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages nfs-common depends on:
ii  adduser 3.118
ii  keyutils1.6-6
ii  libc6   2.28-10

Bug#979764: Problem now understood, but potential security problem

2021-02-25 Thread Jürgen Pfennig
Dear Maintainers

my bug report contained the neccessary information to understand the whole 
problem, but it is quite complex.


FIXING bullseye NFS4 Kerberos with SAMBA

Probably debian uses an outdated version of rpc.gssd , SAMBA behaves 100%
correctly and someone removed support for weak rpc.gssd encryption from
the 5.10 kernel.

In short: rpc.gssd wants a nfs/... SPN and SAMBA by default only writes
weak encryption keys for nfs/... into a keytab.

In SAMBA Kerberos SPNs are based on a UPN and you have to set encryption
types for the UPN to let samba export better encryption keys for the SPN:

net ads enctypes set root/alpha1.centauri.home 31

The samba behaviour is documented at:

https://wiki.samba.org/index.php/Generating_Keytabs


POTENTIAL SECURITY PROBLEM

Except from the debian rpc.gssd bug, what happens is not a bug but by
design. But there is no reasonable error message and backward compatibility
is broken.

Mount tries to use NFS3 if NFS4 fails. Does this create a security 
problem? Could a mount without kerberos using NFS3 happen in this
case? This would break security completely. Sorry, I never used NFS3.

Please close this bug if it does not create a security problem via NFS3.

I am going to report the rpc.gssd / SAMBA thing as a different bug.

Thanks
Jürgen