Re: seccomp mess, continued, status update

2020-02-23 Thread Hal Murray via devel
> Wouldn't it be simpler to ude a base image in the CI that isn't buggy? Maybe. I don't know that area. If that is the only place we test seccomp, then yes, we should switch to Fedora or Debian. If that is testing if we can build on Alpine, then it has found a bug but the bug is in Alpine

Re: seccomp mess, continued, status update

2020-02-23 Thread Eric S. Raymond via devel
Hal Murray via devel : > > Fedora fixed their problem. seccomp now builds and works on both Fedora and > Arch. > > But now it won't build on Alpine. It looks like the same problem that Fedora > had. The problem is a bug in a header file. Copying the ppoll bits from a > Fedora header file

seccomp mess, continued, status update

2020-02-23 Thread Hal Murray via devel
Fedora fixed their problem. seccomp now builds and works on both Fedora and Arch. But now it won't build on Alpine. It looks like the same problem that Fedora had. The problem is a bug in a header file. Copying the ppoll bits from a Fedora header file fixes the problem. The CI checker

Re: seccomp tangle

2020-02-23 Thread Eric S. Raymond via devel
Hal Murray via devel : > Should we drop secomp? It's a pain to maintain. We're a security-focused prodict. I don't think it would be good optics to drop a layer of defense just because it's a pain to maintain. > How many people use it? Richard: do you turn it on for the Debian builds? I have

Re: NTS-KE req fail

2020-02-23 Thread Achim Gratz via devel
Udo van den Heuvel via devel writes: > Ah, thanks, then I find: > > NTSc: certificate invalid: 10=>certificate has expired How about you post the log for the whole key exchange and not always just a single line and the another one in the next mail? Here's what that looks like here:

seccomp tangle

2020-02-23 Thread Hal Murray via devel
[Was Subject: Re: Is there a clean way for waf to test for the distro?] > Are you really, absolutely, positively sure that you can't check for the > feature itself directly. If you start going down the distro-checking path, > things get very messy, very fast. For example, is "Linux Mint" like

Re: NTS-KE req fail

2020-02-23 Thread Hal Murray via devel
> NTSc: certificate invalid: 10=>certificate has expired > is that a local expiration or a remote one? That's your client side saying that it thinks the remote certificate has expired. You could get the same error if your system clock was set into the far future. The local certificate (if

Re: NTS-KE req fail

2020-02-23 Thread Udo van den Heuvel via devel
On 23-02-2020 11:30, Achim Gratz via devel wrote: > Udo van den Heuvel via devel writes: >> ntpd[2256]: NTSc: NTS-KE req to pi4.rellim.com took 0.370 sec, fail > > You'd need the /^NTSc: / lines immediately preceding this to figure out > where it failed. There is no full separation of all the

Re: NTS-KE req fail

2020-02-23 Thread Achim Gratz via devel
Udo van den Heuvel via devel writes: > ntpd[2256]: NTSc: NTS-KE req to pi4.rellim.com took 0.370 sec, fail You'd need the /^NTSc: / lines immediately preceding this to figure out where it failed. There is no full separation of all the different fail modes however, for instance a failed

NTS-KE req fail

2020-02-23 Thread Udo van den Heuvel via devel
Hello, What does a line of ntpd[2256]: NTSc: NTS-KE req to pi4.rellim.com took 0.370 sec, fail signify? A remote issue? Or a local failure? What is failing exactly? Kind regards, Udo ___ devel mailing list devel@ntpsec.org