Bug#692734: unblock: ettercap/0.7.5-4

2013-01-09 Thread Neil McGovern
Hi,

 365 files changed, 23718 insertions(+), 14033 deletions(-)

This isn't something that can be reviewed, especially with the large
number of unrelated changes to (for example build system switch!) the
package.

The options remaining are:
* Backport specific fixes for the version in testing
* Remove the package

Could you please indicate if you wish to do the first or the second.

Thanks,
Neil

On Tue, Jan 08, 2013 at 11:03:59PM +, Barak A. Pearlmutter wrote:
 That is a matter of release policy.
 
 I believe I've made clear my own recommended action, listed the
 alternative possibilities I consider realistic, and given supporting
 reasoning.  After that, this becomes a matter for the release team to
 decide.  They can take my recommendation, or do something else, as they
 wish.
 
 It is ridiculous process-over-sense to say that the release team should
 ask me, via your sending me your interpretation of their policy
 document, to ask them to do something which you think they've already
 decided to do.  (Especially when I don't think what you seem to think
 they've already decided to do is the best option.)  After all, if they
 have decided to do something, they can just do it.  We're trying to
 produce a good operating system here, not an improv parody of paralyzing
 procedure-heavy bureaucratic inertia.
 
  It's a bit frustrating to see that the release gets delayed because of
  situations like these.
 
 Ettercap is a minor leaf package.  This issue is not a release delayer.
 
   --Barak.
 
 
 -- 
 To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: http://lists.debian.org/871udvs2e8@cs.nuim.ie
 
 

-- 


signature.asc
Description: Digital signature


Bug#692734: unblock: ettercap/0.7.5-4

2013-01-09 Thread Barak A. Pearlmutter
As I've stated previously, I don't believe that backporting fixes is
really feasible.  There are too many, they are mixed with
non-security-related modifications, there would be enormous opportunity
for error, and ongoing security maintenance would be quite difficult.
Some background: upstream development stalled, and a new team has (with
the blessing of the retired old team) taken over.  The new team is
willing to do security updates on their versions, but it is not
realistic to expect them to be able to do security patches for an
ancient version full of backported patches.

On the other hand, I personally don't see any disadvantage to letting
0.7.5* in and pulling it if there is a problem, instead of just pulling
it preemptively in case there is a problem.  So that is my
recommendation.  The choice, however, is with the release team.

--Barak.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87mwwixvvq@cs.nuim.ie



Bug#692734: unblock: ettercap/0.7.5-4

2013-01-09 Thread Neil McGovern
On Wed, Jan 09, 2013 at 02:40:25PM +, Barak A. Pearlmutter wrote:
 As I've stated previously, I don't believe that backporting fixes is
 really feasible.  There are too many, they are mixed with
 non-security-related modifications, there would be enormous opportunity
 for error, and ongoing security maintenance would be quite difficult.

Do you have CVE numbers, BTS references or any further detail? These
very changes make it not suitable for update when we've been frozen for
over 6 months.

 Some background: upstream development stalled, and a new team has (with
 the blessing of the retired old team) taken over.  The new team is
 willing to do security updates on their versions, but it is not
 realistic to expect them to be able to do security patches for an
 ancient version full of backported patches.

No, that's what we expect *you* to do as the maintainer. If you feel you
cannot support software for the length of the stable release, then it's
simple: find help or let's not have it in a stable release.

 On the other hand, I personally don't see any disadvantage to letting
 0.7.5* in and pulling it if there is a problem, instead of just pulling
 it preemptively in case there is a problem.

Because by that stage a number of people will have already installed it
and we have provided a commitment to have it in the release.

 So that is my recommendation.  The choice, however, is with the
 release team.
 

That's not going to happen. So, can you please let me know if you're
going to backport the fixes, or if I should remove it from wheezy.

Neil


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130109152458.gn6...@halon.org.uk



Bug#692734: unblock: ettercap/0.7.5-4

2013-01-09 Thread Barak A. Pearlmutter
 Do you have CVE numbers, BTS references or any further detail?

No, I don't believe any such processes were engaged.  But examination of
the actual changes shows many potentially security-relevant deltas.  The
tool is most commonly used in friendly networks to look for
vulnerabilities, so this does not render it useless.  But I would be
surprised if it were not possible to create hostile traffic that would
at the very least crash the tool, and likely subvert it.

 So, can you please let me know if you're going to backport the fixes,
 or if I should remove it from wheezy.

As I've already said repeatedly, I don't think backporting all and only
the security-relevant patches is a realistic option.

I could go back to the old build system while keeping the updated C
sources.  This would dramatically reduce the delta count, but seems
silly.

--Barak.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87ehhuxr92@cs.nuim.ie



Bug#692734: unblock: ettercap/0.7.5-4

2013-01-09 Thread Moritz Muehlenhoff
On Wed, Jan 09, 2013 at 03:24:58PM +, Neil McGovern wrote:
 On Wed, Jan 09, 2013 at 02:40:25PM +, Barak A. Pearlmutter wrote:
  As I've stated previously, I don't believe that backporting fixes is
  really feasible.  There are too many, they are mixed with
  non-security-related modifications, there would be enormous opportunity
  for error, and ongoing security maintenance would be quite difficult.
 
 Do you have CVE numbers, BTS references or any further detail? These
 very changes make it not suitable for update when we've been frozen for
 over 6 months.

I'm not aware of any security issues in Ettercap and the release announcement
of 0.7.5 doesn't mention them either.

The 0.7.4 release mentions several buffer overflows, but this version is
already in testing.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130109183800.ga15...@inutil.org



Bug#692734: unblock: ettercap/0.7.5-4

2013-01-09 Thread Barak A. Pearlmutter
 I'm not aware of any security issues in Ettercap and the release
 announcement of 0.7.5 doesn't mention them either.

 The 0.7.4 release mentions several buffer overflows, but this version
 is already in testing.

Well, that depends on *which* 0.7.4 you mean, NG-0.7.4 vs v0.7.4, but in
any case, even just peeking at the very tip of the 0.7.5 tree in git we
immediately see something highly suspicious:

$ cd ettercap
$ git log --pretty=oneline --deco --graph v0.7.5| head -5

*   9e82ea656a5cbecc79823143907564cd4b446573 (tag: v0.7.5) Merge branch 
'ettercap_rc'
|\
| *   302152524ccd09ac4252d5f33c617cc6e9ed9545 Merge pull request #29 from 
kholia/o5logon-fixes
| |\
| | * b510c1520a64372fffd04449413bb0255598d149 Fix crash with Nmap generated 
packets, catch login failures
...^


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/871uduxe7y@cs.nuim.ie



Bug#692734: unblock: ettercap/0.7.5-4

2013-01-08 Thread Barak A. Pearlmutter
That is a matter of release policy.

I believe I've made clear my own recommended action, listed the
alternative possibilities I consider realistic, and given supporting
reasoning.  After that, this becomes a matter for the release team to
decide.  They can take my recommendation, or do something else, as they
wish.

It is ridiculous process-over-sense to say that the release team should
ask me, via your sending me your interpretation of their policy
document, to ask them to do something which you think they've already
decided to do.  (Especially when I don't think what you seem to think
they've already decided to do is the best option.)  After all, if they
have decided to do something, they can just do it.  We're trying to
produce a good operating system here, not an improv parody of paralyzing
procedure-heavy bureaucratic inertia.

 It's a bit frustrating to see that the release gets delayed because of
 situations like these.

Ettercap is a minor leaf package.  This issue is not a release delayer.

--Barak.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/871udvs2e8@cs.nuim.ie



Bug#692734: unblock: ettercap/0.7.5-4

2012-12-23 Thread John Paul Adrian Glaubitz
Hi,

 A new upstream version 0.7.5 of ettercap (a network sniff/attack tool)
 fixes a variety of security issues.  It does not seem practical to me
 to backport the fixes, because many of them are made on top of
 non-security-related changes, and teasing them apart etc would be a
 great deal of work and also quite error-prone.

 The upstream team is very eager to get the new version in place, and I
 find their reasoning compelling.

Well, as a Debian Developer you should know that during a freeze, no
new upstream releases are allowed into testing. You should therefore
either cherrypick the fixes or request a removal of the package from
testing.

I am pretty sure that the new upstream release has little to no
chances to get into testing, so I would like to ask you to take one of
the two aforementioned actions.

It's a bit frustrating to see that the release gets delayed because of
situations like these. The relase policy has been known for a long
time and you should adhere to it.

Cheers,

Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121223154504.ga27...@physik.fu-berlin.de



Bug#692734: unblock: ettercap/0.7.5-4

2012-12-02 Thread Julien Cristau
On Thu, Nov  8, 2012 at 11:46:33 +, Barak A. Pearlmutter wrote:

 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: unblock
 
 Hello release team,
 
 please unblock package ettercap.
 
 A new upstream version 0.7.5 of ettercap (a network sniff/attack tool)
 fixes a variety of security issues.  It does not seem practical to me
 to backport the fixes, because many of them are made on top of
 non-security-related changes, and teasing them apart etc would be a
 great deal of work and also quite error-prone.
 
I think it's too late to get a new upstream, with an entirely rewritten
build system, into wheezy.

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#692734: unblock: ettercap/0.7.5-4

2012-11-08 Thread Barak A. Pearlmutter
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hello release team,

please unblock package ettercap.

A new upstream version 0.7.5 of ettercap (a network sniff/attack tool)
fixes a variety of security issues.  It does not seem practical to me
to backport the fixes, because many of them are made on top of
non-security-related changes, and teasing them apart etc would be a
great deal of work and also quite error-prone.

The upstream team is very eager to get the new version in place, and I
find their reasoning compelling.

This is briefly alluded to in BTS 691465.

Note that ettercap is a leaf package (nothing depends on it) so there
is no real down-side to allowing 0.7.5 to progress to testing and then
having a show-stopping problem pop up.  In that case it would likely
be pulled ... which I think we'd have to do anyway if 0.7.5 is not
allowed into testing, since in that case we'll have known latent
security issues.

On the other hand, with 0.7.5 we have an active (quite pro-active in
fact) and highly responsive upstream team eager to fix any issues that
we might bring to their attention.

--Barak.
--
Barak A. Pearlmutter
 Hamilton Institute  Dept Comp Sci, NUI Maynooth, Co. Kildare, Ireland
 http://www.bcl.hamilton.ie/~barak/


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/E1TWQZ7-0003h9-9x@port-kdr.hamilton.local