Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-17 Thread The Doctor
On Fri, Nov 17, 2023 at 11:00:07AM +0100, Olivier Certner wrote:
> Hi Glen,
> 
> > I also agree we cannot prevent people from downloading the images,
> > installers, whatever before the announcement.  That is the lovely race
> > condition with which we have to live at the moment.
> 
> Yes, and given that, I don't think you did anything wrong.
> 
> It seems that the race is the same for freebsd-update(8), according to "The 
> Doctor".  But maybe in this case it is easier to fix, perhaps if installing 
> the metadata signaling the new release to it can be delayed, by contrast with 
> big files containing the actual data (I don't know how freebsd-update(8) 
> works, so this is just a guess).
> 
> > The alternative would be to say nothing at all.
> 
> I really hope you and re@ will never choose this way.
>  
> > Either way, it is a productivity, communication drain.  It is
> > a lose-lose situation no matter how one looks at it given the above
> > context.  We either get chastised for being "too open" into insights
> > delaying an official announcement, or for being "not open enough" when
> > there is silence from RE when a release does not meet its scheduled
> > announcement date.
> 
> IMHO, a delay should always be announced (perhaps unless it's only a few 
> days).  If it is too hard to decide on the right level of details, then only 
> mention that some (potential or verified) problem is being looked upon, but 
> don't let that prevent you from communicating.
> 
> As for people saying that they have already installed the "release", I'd 
> suggest to have some text on the website (https://www.freebsd.org/releng/ 
> perhaps) explaining that images on mirrors can appear in advance of release 
> announcements and that they should not be considered as official until the 
> official mail is sent, and just kindly point them to it.  I hope this can 
> contribute to at least attenuating the drain you're experiencing.
> 
> Regards.
> 
> -- 
> Olivier Certner
> 
> 

just a suggestion for the future is that to have some sort of 
gpg/gpg check in freebsd-update .

-- 
Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ; unsubscribe from Google Groups to be seen
Lest we forget 11 Nov 2023 Beware https://mindspring.com



Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-17 Thread Jamie Landeg-Jones
Glen Barber  wrote:

> No.  It merely suggests the release is not officially official yet.

Ok. Thanks for the clarification.

Jamie.



Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-17 Thread Olivier Certner
Hi Glen,

> I also agree we cannot prevent people from downloading the images,
> installers, whatever before the announcement.  That is the lovely race
> condition with which we have to live at the moment.

Yes, and given that, I don't think you did anything wrong.

It seems that the race is the same for freebsd-update(8), according to "The 
Doctor".  But maybe in this case it is easier to fix, perhaps if installing the 
metadata signaling the new release to it can be delayed, by contrast with big 
files containing the actual data (I don't know how freebsd-update(8) works, so 
this is just a guess).

> The alternative would be to say nothing at all.

I really hope you and re@ will never choose this way.
 
> Either way, it is a productivity, communication drain.  It is
> a lose-lose situation no matter how one looks at it given the above
> context.  We either get chastised for being "too open" into insights
> delaying an official announcement, or for being "not open enough" when
> there is silence from RE when a release does not meet its scheduled
> announcement date.

IMHO, a delay should always be announced (perhaps unless it's only a few days). 
 If it is too hard to decide on the right level of details, then only mention 
that some (potential or verified) problem is being looked upon, but don't let 
that prevent you from communicating.

As for people saying that they have already installed the "release", I'd 
suggest to have some text on the website (https://www.freebsd.org/releng/ 
perhaps) explaining that images on mirrors can appear in advance of release 
announcements and that they should not be considered as official until the 
official mail is sent, and just kindly point them to it.  I hope this can 
contribute to at least attenuating the drain you're experiencing.

Regards.

-- 
Olivier Certner





Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-16 Thread Glen Barber
On Thu, Nov 16, 2023 at 09:22:52PM +, Jamie Landeg-Jones wrote:
> > Ok.  I do not know what exactly is your point, but releases are never
> > official until there is a PGP-signed email sent.  The email is intended
> > for the general public of consumers of official releases, not "yeah,
> > but"s.
> 
> Foe a recent new build, I just went to the ftp site to grab the latest rc,
> only to see 14.0-release there, so I grabbed and installed that, many
> hours before your original mail went out.
> 
> No biggy, I generally track stable, but does this mean we can't rely
> on the download sites without checking out the lists first? It's not
> like I was plaing sneaky by doing "guess the URL" or anything like that.
> 

No.  It merely suggests the release is not officially official yet.

Glen



signature.asc
Description: PGP signature


Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-16 Thread Jamie Landeg-Jones
> Ok.  I do not know what exactly is your point, but releases are never
> official until there is a PGP-signed email sent.  The email is intended
> for the general public of consumers of official releases, not "yeah,
> but"s.

Foe a recent new build, I just went to the ftp site to grab the latest rc,
only to see 14.0-release there, so I grabbed and installed that, many
hours before your original mail went out.

No biggy, I generally track stable, but does this mean we can't rely
on the download sites without checking out the lists first? It's not
like I was plaing sneaky by doing "guess the URL" or anything like that.

Jamie



Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-16 Thread The Doctor
On Thu, Nov 16, 2023 at 12:07:36AM -0500, Glen Barber wrote:
> And if there is a reason to reissue a release, the update will reflect such.
> 
> So to answer your latter question, yes.  Unless it needs to be replaced.
> 
> Glen
> Sent from my phone.
> Please excuse my brevity and/or typos.
> 
> > On Nov 15, 2023, at 11:38 PM, The Doctor  wrote:
> > 
> > ???On Thu, Nov 16, 2023 at 12:30:30AM +, Glen Barber wrote:
> >>> On Wed, Nov 15, 2023 at 08:39:39AM -0800, John Baldwin wrote:
> >>> On 11/14/23 8:52 PM, Glen Barber wrote:
>  On Tue, Nov 14, 2023 at 08:10:23PM -0700, The Doctor wrote:
> > On Wed, Nov 15, 2023 at 02:27:01AM +, Glen Barber wrote:
> >> On Tue, Nov 14, 2023 at 05:15:48PM -0700, The Doctor wrote:
> >>> On Tue, Nov 14, 2023 at 08:36:54PM +, Glen Barber wrote:
>  We are still waiting for a few (non-critical) things to complete 
>  before
>  the announcement of 14.0-RELEASE will be ready.
>  
>  It should only be another day or so before these things complete.
>  
>  Thank you for your understanding.
>  
> >>> 
> >>> I always just installed my copy.
> >>> 
> >> 
> >> Ok.  I do not know what exactly is your point, but releases are never
> >> official until there is a PGP-signed email sent.  The email is intended
> >> for the general public of consumers of official releases, not "yeah,
> >> but"s.
> >> 
> > 
> > Howver if you do a freebsd-update upgrade, you can upgrade.
> > 
> > Is that suppose to happen?
> > 
>  
>  That does not say that the freebsd-update bits will not change *until*
>  the official release announcement has been sent.
>  
>  In my past 15 years involved in the Project, I think we have been very
>  clear on that.
>  
>  A RELEASE IS NOT FINAL UNTIL THE PGP-SIGNED ANNOUNCEMENT IS SENT.
>  
>  I mean, c'mon, dude.
>  
>  We really, seriously, for all intents and purposes, cannot be any more
>  clear than that.
>  
>  So, yes, *IF* an update necessitates a new freebsd-update build, what
>  you are running is *NOT* official.
>  
>  For at least 15 years, we have all said the same entire thing.
> >>> 
> >>> Yes, but, if at this point we had to rebuild, it would have to be 14.0.1
> >>> or something (which we have done a few times in the past).  It would be
> >>> too confusing otherwise once the bits are built and published (where
> >>> published means "uploaded to our CDN").  It is the 14.0 release bits,
> >>> the only question is if for some reason we had a dire emergency that
> >>> meant we had to pull it at the last minute and publish different bits
> >>> (under a different release name).
> >>> 
> >>> Realistically, once the bits are available, we can't prevent people from
> >>> using them, it's just at their own risk to do so until the project says
> >>> "yes, we believe these are good".  Granted, they are under the same risk
> >>> if they are still running the last RC.  The best way to minimize that
> >>> risk going forward is to add more automation of testing/CI to go along
> >>> with the process of building release bits so that the build artifacts
> >>> from the release build run through CI and are only published if the CI
> >>> is green as that would give us greater confidence of "we believe these
> >>> are good" before they are uploaded for publishing.
> >>> 
> >> 
> >> You are correct on all points.  If there were a need to re-roll 14.0, it
> >> would indeed necessitate a release/14.0.1 tag.  Note, release/14.0.0 has
> >> not yet been tagged, and I find it extremely unlikely that it will be
> >> necessary to rebuild from a release/14.0.1 tag.
> >> 
> >> I also agree we cannot prevent people from downloading the images,
> >> installers, whatever before the announcement.  That is the lovely race
> >> condition with which we have to live at the moment.
> >> 
> >> My email was intended to be informative.  Period.
> >> 
> >> There were no suggestions that 14.0-RELEASE was not yet final.  And to
> >> be fair, I had to personally deal with the fallout of a release "too
> >> soon", notably 11.0-RELEASE, where I thought a critical issue had been
> >> addressed, but I was wrong.
> >> 
> >> My only point, in being overly open to the public on the delay, is that
> >> we (the Release Engineering Team) are not yet ready to rubber-stamp this
> >> as complete, as there are some outstanding items that are pending that
> >> have not yet completed.
> >> 
> >> The alternative would be to say nothing at all.
> >> 
> >> Either way, it is a productivity, communication drain.  It is
> >> a lose-lose situation no matter how one looks at it given the above
> >> context.  We either get chastised for being "too open" into insights
> >> delaying an official announcement, or for being "not open enough" when
> >> there is silence from RE when a release does not meet its scheduled
> >> 

Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-15 Thread Glen Barber
And if there is a reason to reissue a release, the update will reflect such.

So to answer your latter question, yes.  Unless it needs to be replaced.

Glen
Sent from my phone.
Please excuse my brevity and/or typos.

> On Nov 15, 2023, at 11:38 PM, The Doctor  wrote:
> 
> On Thu, Nov 16, 2023 at 12:30:30AM +, Glen Barber wrote:
>>> On Wed, Nov 15, 2023 at 08:39:39AM -0800, John Baldwin wrote:
>>> On 11/14/23 8:52 PM, Glen Barber wrote:
 On Tue, Nov 14, 2023 at 08:10:23PM -0700, The Doctor wrote:
> On Wed, Nov 15, 2023 at 02:27:01AM +, Glen Barber wrote:
>> On Tue, Nov 14, 2023 at 05:15:48PM -0700, The Doctor wrote:
>>> On Tue, Nov 14, 2023 at 08:36:54PM +, Glen Barber wrote:
 We are still waiting for a few (non-critical) things to complete before
 the announcement of 14.0-RELEASE will be ready.
 
 It should only be another day or so before these things complete.
 
 Thank you for your understanding.
 
>>> 
>>> I always just installed my copy.
>>> 
>> 
>> Ok.  I do not know what exactly is your point, but releases are never
>> official until there is a PGP-signed email sent.  The email is intended
>> for the general public of consumers of official releases, not "yeah,
>> but"s.
>> 
> 
> Howver if you do a freebsd-update upgrade, you can upgrade.
> 
> Is that suppose to happen?
> 
 
 That does not say that the freebsd-update bits will not change *until*
 the official release announcement has been sent.
 
 In my past 15 years involved in the Project, I think we have been very
 clear on that.
 
 A RELEASE IS NOT FINAL UNTIL THE PGP-SIGNED ANNOUNCEMENT IS SENT.
 
 I mean, c'mon, dude.
 
 We really, seriously, for all intents and purposes, cannot be any more
 clear than that.
 
 So, yes, *IF* an update necessitates a new freebsd-update build, what
 you are running is *NOT* official.
 
 For at least 15 years, we have all said the same entire thing.
>>> 
>>> Yes, but, if at this point we had to rebuild, it would have to be 14.0.1
>>> or something (which we have done a few times in the past).  It would be
>>> too confusing otherwise once the bits are built and published (where
>>> published means "uploaded to our CDN").  It is the 14.0 release bits,
>>> the only question is if for some reason we had a dire emergency that
>>> meant we had to pull it at the last minute and publish different bits
>>> (under a different release name).
>>> 
>>> Realistically, once the bits are available, we can't prevent people from
>>> using them, it's just at their own risk to do so until the project says
>>> "yes, we believe these are good".  Granted, they are under the same risk
>>> if they are still running the last RC.  The best way to minimize that
>>> risk going forward is to add more automation of testing/CI to go along
>>> with the process of building release bits so that the build artifacts
>>> from the release build run through CI and are only published if the CI
>>> is green as that would give us greater confidence of "we believe these
>>> are good" before they are uploaded for publishing.
>>> 
>> 
>> You are correct on all points.  If there were a need to re-roll 14.0, it
>> would indeed necessitate a release/14.0.1 tag.  Note, release/14.0.0 has
>> not yet been tagged, and I find it extremely unlikely that it will be
>> necessary to rebuild from a release/14.0.1 tag.
>> 
>> I also agree we cannot prevent people from downloading the images,
>> installers, whatever before the announcement.  That is the lovely race
>> condition with which we have to live at the moment.
>> 
>> My email was intended to be informative.  Period.
>> 
>> There were no suggestions that 14.0-RELEASE was not yet final.  And to
>> be fair, I had to personally deal with the fallout of a release "too
>> soon", notably 11.0-RELEASE, where I thought a critical issue had been
>> addressed, but I was wrong.
>> 
>> My only point, in being overly open to the public on the delay, is that
>> we (the Release Engineering Team) are not yet ready to rubber-stamp this
>> as complete, as there are some outstanding items that are pending that
>> have not yet completed.
>> 
>> The alternative would be to say nothing at all.
>> 
>> Either way, it is a productivity, communication drain.  It is
>> a lose-lose situation no matter how one looks at it given the above
>> context.  We either get chastised for being "too open" into insights
>> delaying an official announcement, or for being "not open enough" when
>> there is silence from RE when a release does not meet its scheduled
>> announcement date.
>> 
>> Glen
>> 
>> 
> 
> What ahappened was that I inititated the freebsd-upgrade RELEASE upgrade 
> command.
> 
> question should that RELEASe been released?
> 
> -- 
> Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca
> Yahweh, King & country!Never 

Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-15 Thread Glen Barber
Thank you for that.

Glen
Sent from my phone.
Please excuse my brevity and/or typos.

> On Nov 15, 2023, at 11:17 PM, Rich Reynolds  wrote:
> 
> On 11/15/23 20:19, Pete Wright wrote:
>>> On 11/15/23 16:30, Glen Barber wrote:
>>> The alternative would be to say nothing at all.
>>> 
>>> Either way, it is a productivity, communication drain.  It is
>>> a lose-lose situation no matter how one looks at it given the above
>>> context.  We either get chastised for being "too open" into insights
>>> delaying an official announcement, or for being "not open enough" when
>>> there is silence from RE when a release does not meet its scheduled
>>> announcement date.
>> Glen I appreciate your transparency and the efforts you have done to keep 
>> everyone in the loop.  I think people get excited about new releases, which 
>> is probably a good thing.  IMHO i feel you've been striking a good balance.
>> As an operator these updates are really helpful for me as it allows me to 
>> adjust timelines on my end for updating my fleet of servers. You and the RE 
>> team do an incredible job - and personally I am thankful for the caution and 
>> common sense you all bring to this complex process.
>> Cheers,
>> -pete
>> -- 
>> Pete Wright
>> p...@nomadlogic.org
>> @nomadlogicLA
> +1 from a retired RE manager
> yet another hard thankless job in the development chain...
> 
> -- 
> When you beleve in things. that you don't understand,
> then you suffer, superstition ain't the way.
> Stevie Wonder - 1972
> 




Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-15 Thread The Doctor
On Thu, Nov 16, 2023 at 12:30:30AM +, Glen Barber wrote:
> On Wed, Nov 15, 2023 at 08:39:39AM -0800, John Baldwin wrote:
> > On 11/14/23 8:52 PM, Glen Barber wrote:
> > > On Tue, Nov 14, 2023 at 08:10:23PM -0700, The Doctor wrote:
> > > > On Wed, Nov 15, 2023 at 02:27:01AM +, Glen Barber wrote:
> > > > > On Tue, Nov 14, 2023 at 05:15:48PM -0700, The Doctor wrote:
> > > > > > On Tue, Nov 14, 2023 at 08:36:54PM +, Glen Barber wrote:
> > > > > > > We are still waiting for a few (non-critical) things to complete 
> > > > > > > before
> > > > > > > the announcement of 14.0-RELEASE will be ready.
> > > > > > > 
> > > > > > > It should only be another day or so before these things complete.
> > > > > > > 
> > > > > > > Thank you for your understanding.
> > > > > > > 
> > > > > > 
> > > > > > I always just installed my copy.
> > > > > > 
> > > > > 
> > > > > Ok.  I do not know what exactly is your point, but releases are never
> > > > > official until there is a PGP-signed email sent.  The email is 
> > > > > intended
> > > > > for the general public of consumers of official releases, not "yeah,
> > > > > but"s.
> > > > > 
> > > > 
> > > > Howver if you do a freebsd-update upgrade, you can upgrade.
> > > > 
> > > > Is that suppose to happen?
> > > > 
> > > 
> > > That does not say that the freebsd-update bits will not change *until*
> > > the official release announcement has been sent.
> > > 
> > > In my past 15 years involved in the Project, I think we have been very
> > > clear on that.
> > > 
> > > A RELEASE IS NOT FINAL UNTIL THE PGP-SIGNED ANNOUNCEMENT IS SENT.
> > > 
> > > I mean, c'mon, dude.
> > > 
> > > We really, seriously, for all intents and purposes, cannot be any more
> > > clear than that.
> > > 
> > > So, yes, *IF* an update necessitates a new freebsd-update build, what
> > > you are running is *NOT* official.
> > > 
> > > For at least 15 years, we have all said the same entire thing.
> > 
> > Yes, but, if at this point we had to rebuild, it would have to be 14.0.1
> > or something (which we have done a few times in the past).  It would be
> > too confusing otherwise once the bits are built and published (where
> > published means "uploaded to our CDN").  It is the 14.0 release bits,
> > the only question is if for some reason we had a dire emergency that
> > meant we had to pull it at the last minute and publish different bits
> > (under a different release name).
> > 
> > Realistically, once the bits are available, we can't prevent people from
> > using them, it's just at their own risk to do so until the project says
> > "yes, we believe these are good".  Granted, they are under the same risk
> > if they are still running the last RC.  The best way to minimize that
> > risk going forward is to add more automation of testing/CI to go along
> > with the process of building release bits so that the build artifacts
> > from the release build run through CI and are only published if the CI
> > is green as that would give us greater confidence of "we believe these
> > are good" before they are uploaded for publishing.
> > 
> 
> You are correct on all points.  If there were a need to re-roll 14.0, it
> would indeed necessitate a release/14.0.1 tag.  Note, release/14.0.0 has
> not yet been tagged, and I find it extremely unlikely that it will be
> necessary to rebuild from a release/14.0.1 tag.
> 
> I also agree we cannot prevent people from downloading the images,
> installers, whatever before the announcement.  That is the lovely race
> condition with which we have to live at the moment.
> 
> My email was intended to be informative.  Period.
> 
> There were no suggestions that 14.0-RELEASE was not yet final.  And to
> be fair, I had to personally deal with the fallout of a release "too
> soon", notably 11.0-RELEASE, where I thought a critical issue had been
> addressed, but I was wrong.
> 
> My only point, in being overly open to the public on the delay, is that
> we (the Release Engineering Team) are not yet ready to rubber-stamp this
> as complete, as there are some outstanding items that are pending that
> have not yet completed.
> 
> The alternative would be to say nothing at all.
> 
> Either way, it is a productivity, communication drain.  It is
> a lose-lose situation no matter how one looks at it given the above
> context.  We either get chastised for being "too open" into insights
> delaying an official announcement, or for being "not open enough" when
> there is silence from RE when a release does not meet its scheduled
> announcement date.
> 
> Glen
> 
> 

What ahappened was that I inititated the freebsd-upgrade RELEASE upgrade 
command.

question should that RELEASe been released?

-- 
Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ; unsubscribe from Google Groups to be seen
Lest we forget 11 Nov 2023 Beware https://mindspring.com



Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-15 Thread Glen Barber
On Wed, Nov 15, 2023 at 07:19:39PM -0800, Pete Wright wrote:
> 
> 
> On 11/15/23 16:30, Glen Barber wrote:
> > The alternative would be to say nothing at all.
> > 
> > Either way, it is a productivity, communication drain.  It is
> > a lose-lose situation no matter how one looks at it given the above
> > context.  We either get chastised for being "too open" into insights
> > delaying an official announcement, or for being "not open enough" when
> > there is silence from RE when a release does not meet its scheduled
> > announcement date.
> Glen I appreciate your transparency and the efforts you have done to keep
> everyone in the loop.  I think people get excited about new releases, which is
> probably a good thing.  IMHO i feel you've been striking a good balance.
> 
> As an operator these updates are really helpful for me as it allows me to
> adjust timelines on my end for updating my fleet of servers. You and the RE
> team do an incredible job - and personally I am thankful for the caution and
> common sense you all bring to this complex process.
> 

Thank you very much, Pete, for your email on this.  It is appreciated by
all of us involved in FreeBSD releases.

Best regards,

Glen



signature.asc
Description: PGP signature


Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-15 Thread Pete Wright



On 11/15/23 16:30, Glen Barber wrote:

The alternative would be to say nothing at all.

Either way, it is a productivity, communication drain.  It is
a lose-lose situation no matter how one looks at it given the above
context.  We either get chastised for being "too open" into insights
delaying an official announcement, or for being "not open enough" when
there is silence from RE when a release does not meet its scheduled
announcement date.
Glen I appreciate your transparency and the efforts you have done to 
keep everyone in the loop.  I think people get excited about new 
releases, which is probably a good thing.  IMHO i feel you've been 
striking a good balance.


As an operator these updates are really helpful for me as it allows me 
to adjust timelines on my end for updating my fleet of servers. You and 
the RE team do an incredible job - and personally I am thankful for the 
caution and common sense you all bring to this complex process.


Cheers,
-pete

--
Pete Wright
p...@nomadlogic.org
@nomadlogicLA


Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-15 Thread Glen Barber
On Wed, Nov 15, 2023 at 08:39:39AM -0800, John Baldwin wrote:
> On 11/14/23 8:52 PM, Glen Barber wrote:
> > On Tue, Nov 14, 2023 at 08:10:23PM -0700, The Doctor wrote:
> > > On Wed, Nov 15, 2023 at 02:27:01AM +, Glen Barber wrote:
> > > > On Tue, Nov 14, 2023 at 05:15:48PM -0700, The Doctor wrote:
> > > > > On Tue, Nov 14, 2023 at 08:36:54PM +, Glen Barber wrote:
> > > > > > We are still waiting for a few (non-critical) things to complete 
> > > > > > before
> > > > > > the announcement of 14.0-RELEASE will be ready.
> > > > > > 
> > > > > > It should only be another day or so before these things complete.
> > > > > > 
> > > > > > Thank you for your understanding.
> > > > > > 
> > > > > 
> > > > > I always just installed my copy.
> > > > > 
> > > > 
> > > > Ok.  I do not know what exactly is your point, but releases are never
> > > > official until there is a PGP-signed email sent.  The email is intended
> > > > for the general public of consumers of official releases, not "yeah,
> > > > but"s.
> > > > 
> > > 
> > > Howver if you do a freebsd-update upgrade, you can upgrade.
> > > 
> > > Is that suppose to happen?
> > > 
> > 
> > That does not say that the freebsd-update bits will not change *until*
> > the official release announcement has been sent.
> > 
> > In my past 15 years involved in the Project, I think we have been very
> > clear on that.
> > 
> > A RELEASE IS NOT FINAL UNTIL THE PGP-SIGNED ANNOUNCEMENT IS SENT.
> > 
> > I mean, c'mon, dude.
> > 
> > We really, seriously, for all intents and purposes, cannot be any more
> > clear than that.
> > 
> > So, yes, *IF* an update necessitates a new freebsd-update build, what
> > you are running is *NOT* official.
> > 
> > For at least 15 years, we have all said the same entire thing.
> 
> Yes, but, if at this point we had to rebuild, it would have to be 14.0.1
> or something (which we have done a few times in the past).  It would be
> too confusing otherwise once the bits are built and published (where
> published means "uploaded to our CDN").  It is the 14.0 release bits,
> the only question is if for some reason we had a dire emergency that
> meant we had to pull it at the last minute and publish different bits
> (under a different release name).
> 
> Realistically, once the bits are available, we can't prevent people from
> using them, it's just at their own risk to do so until the project says
> "yes, we believe these are good".  Granted, they are under the same risk
> if they are still running the last RC.  The best way to minimize that
> risk going forward is to add more automation of testing/CI to go along
> with the process of building release bits so that the build artifacts
> from the release build run through CI and are only published if the CI
> is green as that would give us greater confidence of "we believe these
> are good" before they are uploaded for publishing.
> 

You are correct on all points.  If there were a need to re-roll 14.0, it
would indeed necessitate a release/14.0.1 tag.  Note, release/14.0.0 has
not yet been tagged, and I find it extremely unlikely that it will be
necessary to rebuild from a release/14.0.1 tag.

I also agree we cannot prevent people from downloading the images,
installers, whatever before the announcement.  That is the lovely race
condition with which we have to live at the moment.

My email was intended to be informative.  Period.

There were no suggestions that 14.0-RELEASE was not yet final.  And to
be fair, I had to personally deal with the fallout of a release "too
soon", notably 11.0-RELEASE, where I thought a critical issue had been
addressed, but I was wrong.

My only point, in being overly open to the public on the delay, is that
we (the Release Engineering Team) are not yet ready to rubber-stamp this
as complete, as there are some outstanding items that are pending that
have not yet completed.

The alternative would be to say nothing at all.

Either way, it is a productivity, communication drain.  It is
a lose-lose situation no matter how one looks at it given the above
context.  We either get chastised for being "too open" into insights
delaying an official announcement, or for being "not open enough" when
there is silence from RE when a release does not meet its scheduled
announcement date.

Glen




signature.asc
Description: PGP signature


Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-15 Thread John Baldwin

On 11/14/23 8:52 PM, Glen Barber wrote:

On Tue, Nov 14, 2023 at 08:10:23PM -0700, The Doctor wrote:

On Wed, Nov 15, 2023 at 02:27:01AM +, Glen Barber wrote:

On Tue, Nov 14, 2023 at 05:15:48PM -0700, The Doctor wrote:

On Tue, Nov 14, 2023 at 08:36:54PM +, Glen Barber wrote:

We are still waiting for a few (non-critical) things to complete before
the announcement of 14.0-RELEASE will be ready.

It should only be another day or so before these things complete.

Thank you for your understanding.



I always just installed my copy.



Ok.  I do not know what exactly is your point, but releases are never
official until there is a PGP-signed email sent.  The email is intended
for the general public of consumers of official releases, not "yeah,
but"s.



Howver if you do a freebsd-update upgrade, you can upgrade.

Is that suppose to happen?



That does not say that the freebsd-update bits will not change *until*
the official release announcement has been sent.

In my past 15 years involved in the Project, I think we have been very
clear on that.

A RELEASE IS NOT FINAL UNTIL THE PGP-SIGNED ANNOUNCEMENT IS SENT.

I mean, c'mon, dude.

We really, seriously, for all intents and purposes, cannot be any more
clear than that.

So, yes, *IF* an update necessitates a new freebsd-update build, what
you are running is *NOT* official.

For at least 15 years, we have all said the same entire thing.


Yes, but, if at this point we had to rebuild, it would have to be 14.0.1
or something (which we have done a few times in the past).  It would be
too confusing otherwise once the bits are built and published (where
published means "uploaded to our CDN").  It is the 14.0 release bits,
the only question is if for some reason we had a dire emergency that
meant we had to pull it at the last minute and publish different bits
(under a different release name).

Realistically, once the bits are available, we can't prevent people from
using them, it's just at their own risk to do so until the project says
"yes, we believe these are good".  Granted, they are under the same risk
if they are still running the last RC.  The best way to minimize that
risk going forward is to add more automation of testing/CI to go along
with the process of building release bits so that the build artifacts
from the release build run through CI and are only published if the CI
is green as that would give us greater confidence of "we believe these
are good" before they are uploaded for publishing.

--
John Baldwin




Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-15 Thread Glen Barber
Well, today is your yesterday, so we might not be ready for another more 
tomorrows your time, yesterdays, my time.  Or something.

Glen
Sent from my phone.
Please excuse my brevity and/or typos.

> On Nov 15, 2023, at 2:39 AM, matti k  wrote:
> 
> On Wed, 15 Nov 2023 04:52:31 +
> Glen Barber  wrote:
> 
 Ok.  I do not know what exactly is your point, but releases are
 never official until there is a PGP-signed email sent.  The email
 is intended for the general public of consumers of official
 releases, not "yeah, but"s.
 
> 
>> That does not say that the freebsd-update bits will not change *until*
>> the official release announcement has been sent.
>> 
>> In my past 15 years involved in the Project, I think we have been very
>> clear on that.
>> 
>> A RELEASE IS NOT FINAL UNTIL THE PGP-SIGNED ANNOUNCEMENT IS SENT.
>> 
>> I mean, c'mon, dude.
>> 
>> We really, seriously, for all intents and purposes, cannot be any more
>> clear than that.
>> 
>> So, yes, *IF* an update necessitates a new freebsd-update build, what
>> you are running is *NOT* official.
>> 
>> For at least 15 years, we have all said the same entire thing.
> 
> Here I have been tracking 14.0 release candidates
> 
> Reminds me of when slashdot would announce a new release days before it
> was actually released and then someone would remind them of that
> 
> I am using an Australian mirror so will probably need to wait an extra
> day to be on the safe side  :-)
> 
> 
> 
> 




Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-14 Thread matti k
On Wed, 15 Nov 2023 04:52:31 +
Glen Barber  wrote:

> > > Ok.  I do not know what exactly is your point, but releases are
> > > never official until there is a PGP-signed email sent.  The email
> > > is intended for the general public of consumers of official
> > > releases, not "yeah, but"s.
> > >
 
> That does not say that the freebsd-update bits will not change *until*
> the official release announcement has been sent.
> 
> In my past 15 years involved in the Project, I think we have been very
> clear on that.
> 
> A RELEASE IS NOT FINAL UNTIL THE PGP-SIGNED ANNOUNCEMENT IS SENT.
> 
> I mean, c'mon, dude.
> 
> We really, seriously, for all intents and purposes, cannot be any more
> clear than that.
> 
> So, yes, *IF* an update necessitates a new freebsd-update build, what
> you are running is *NOT* official.
> 
> For at least 15 years, we have all said the same entire thing.

Here I have been tracking 14.0 release candidates

Reminds me of when slashdot would announce a new release days before it
was actually released and then someone would remind them of that

I am using an Australian mirror so will probably need to wait an extra
day to be on the safe side  :-)







Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-14 Thread Glen Barber
On Tue, Nov 14, 2023 at 08:10:23PM -0700, The Doctor wrote:
> On Wed, Nov 15, 2023 at 02:27:01AM +, Glen Barber wrote:
> > On Tue, Nov 14, 2023 at 05:15:48PM -0700, The Doctor wrote:
> > > On Tue, Nov 14, 2023 at 08:36:54PM +, Glen Barber wrote:
> > > > We are still waiting for a few (non-critical) things to complete before
> > > > the announcement of 14.0-RELEASE will be ready.
> > > > 
> > > > It should only be another day or so before these things complete.
> > > > 
> > > > Thank you for your understanding.
> > > >
> > > 
> > > I always just installed my copy.
> > > 
> > 
> > Ok.  I do not know what exactly is your point, but releases are never
> > official until there is a PGP-signed email sent.  The email is intended
> > for the general public of consumers of official releases, not "yeah,
> > but"s.
> >
> 
> Howver if you do a freebsd-update upgrade, you can upgrade.
> 
> Is that suppose to happen?
> 

That does not say that the freebsd-update bits will not change *until*
the official release announcement has been sent.

In my past 15 years involved in the Project, I think we have been very
clear on that.

A RELEASE IS NOT FINAL UNTIL THE PGP-SIGNED ANNOUNCEMENT IS SENT.

I mean, c'mon, dude.

We really, seriously, for all intents and purposes, cannot be any more
clear than that.

So, yes, *IF* an update necessitates a new freebsd-update build, what
you are running is *NOT* official.

For at least 15 years, we have all said the same entire thing.

Glen



signature.asc
Description: PGP signature


Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-14 Thread The Doctor
On Wed, Nov 15, 2023 at 02:27:01AM +, Glen Barber wrote:
> On Tue, Nov 14, 2023 at 05:15:48PM -0700, The Doctor wrote:
> > On Tue, Nov 14, 2023 at 08:36:54PM +, Glen Barber wrote:
> > > We are still waiting for a few (non-critical) things to complete before
> > > the announcement of 14.0-RELEASE will be ready.
> > > 
> > > It should only be another day or so before these things complete.
> > > 
> > > Thank you for your understanding.
> > >
> > 
> > I always just installed my copy.
> > 
> 
> Ok.  I do not know what exactly is your point, but releases are never
> official until there is a PGP-signed email sent.  The email is intended
> for the general public of consumers of official releases, not "yeah,
> but"s.
>

Howver if you do a freebsd-update upgrade, you can upgrade.

Is that suppose to happen?

> Glen
> 



-- 
Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ; unsubscribe from Google Groups to be seen
Lest we forget 11 Nov 2023 Beware https://mindspring.com



Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-14 Thread Glen Barber
On Tue, Nov 14, 2023 at 05:15:48PM -0700, The Doctor wrote:
> On Tue, Nov 14, 2023 at 08:36:54PM +, Glen Barber wrote:
> > We are still waiting for a few (non-critical) things to complete before
> > the announcement of 14.0-RELEASE will be ready.
> > 
> > It should only be another day or so before these things complete.
> > 
> > Thank you for your understanding.
> >
> 
> I always just installed my copy.
> 

Ok.  I do not know what exactly is your point, but releases are never
official until there is a PGP-signed email sent.  The email is intended
for the general public of consumers of official releases, not "yeah,
but"s.

Glen



signature.asc
Description: PGP signature


Re: [HEADS-UP] Quick update to 14.0-RELEASE schedule

2023-11-14 Thread The Doctor
On Tue, Nov 14, 2023 at 08:36:54PM +, Glen Barber wrote:
> We are still waiting for a few (non-critical) things to complete before
> the announcement of 14.0-RELEASE will be ready.
> 
> It should only be another day or so before these things complete.
> 
> Thank you for your understanding.
>

I always just installed my copy.

> Glen
> On behalf of: re@
> 



-- 
Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ; unsubscribe from Google Groups to be seen
Lest we forget 11 Nov 2023 Beware https://mindspring.com



Re: Heads up: s/u_intXX_t/uintXX_t/ in sys/cam

2023-07-24 Thread Warner Losh
I have just pushed this update into -current. It compiles and boots for me.
It should be a giant nop. I plan on MFCing this in a few days unless
there's unanticipated turbulence.

I have not updated the SIM drivers because most of the u_intXX_t use in
these drivers are not related to CAM interfaces. And many of these drivers
are vendor code, to various degrees.

I think this is the ideal time: Before the 14 branch, when all I need to do
is merge to 13 since 12 is about to go out of support. There will never be
a better time.

Please let me know if I missed anything. or there are problems.

Warner

On Fri, Jul 7, 2023 at 3:12 PM Warner Losh  wrote:

> I plan on finally biting the bullet and moving to the standard uintXX_t.
>
> I plan on doing this next week, before we branch 14.
>
> I also plan on  MFC'ing these changes (or rather running the same script
> and tagging that commit as a MFC).
>
> This has been talked about forever, and now seems like we have a good lull
> in things to do it.
>
> Comments?
>
> Warner
>
>


Re: HEADS-UP: PIE enabled by default on stable/13

2022-01-30 Thread Marcin Wojtas
Hi,


pon., 24 sty 2022 o 20:48 Marek Zarychta
 napisał(a):
>
> Hello Marcin
> W dniu 24.01.2022 o 19:43, Marcin Wojtas pisze:
> > Hi Marek,
> >
> > pon., 24 sty 2022 o 08:17 Marek Zarychta
> >  napisał(a):
> >>
> >> W dniu 24.01.2022 o 07:42, Marcin Wojtas pisze:
> >>> +freebsd-stable@
> >>>
> >>> niedz., 23 sty 2022 o 11:36 Marcin Wojtas  napisał(a):
> 
>  Hi,
> 
>  As of 396e9f259d962 the base system binaries are now built as 
>  position-independent executable (PIE) by default, for 64-bit 
>  architectures. Thanks to that enabling ASLR can be done simply
>  by sysctls knobs when booting the kernel.
> 
>  If you track stable/13 and normally build WITHOUT_CLEAN you'll need to 
>  do one initial clean build -- either run `make cleanworld` or set 
>  WITH_CLEAN=yes.
> 
>  The change is a pure MFC of the changes integrated to -CURRENT early 
>  2021 and no issues are expected, but in case any problems are observed, 
>  please issue a PR and/or let me know in this thread.
> 
>  Best regards,
>  Marcin
> >>>
> >>
> >> Thanks for enabling this. If I understand it correctly we got some
> >> improvements mentioned here[1] and it doesn't imply that ASLR has to be
> >> enabled, especially kern.elf64.aslr.pie_enable can be still set to 0 ?
> >>
> >
> > Currently it still remains opt-in on stable/13 and is disabled by default.
> >
> > Best regards,
> > Marcin
>
> Thanks for the answer. I am not willing to turn ASLR on at this point,
> but rather asking if my world, already built with PIE, will bring any
> other enhancements or improvements?
>

If your world is already built with PIE, the MFC'ed patches should
make no difference at all.

Best regards,
Marcin

> >
> >>
> >> [1] https://www.mail-archive.com/freebsd-current@freebsd.org/msg183605.html
> >>
> >
> With kind regards,
>
> --
> Marek Zarychta



Re: HEADS-UP: PIE enabled by default on stable/13

2022-01-24 Thread Marek Zarychta

Hello Marcin
W dniu 24.01.2022 o 19:43, Marcin Wojtas pisze:

Hi Marek,

pon., 24 sty 2022 o 08:17 Marek Zarychta
 napisał(a):


W dniu 24.01.2022 o 07:42, Marcin Wojtas pisze:

+freebsd-stable@

niedz., 23 sty 2022 o 11:36 Marcin Wojtas  napisał(a):


Hi,

As of 396e9f259d962 the base system binaries are now built as 
position-independent executable (PIE) by default, for 64-bit architectures. 
Thanks to that enabling ASLR can be done simply
by sysctls knobs when booting the kernel.

If you track stable/13 and normally build WITHOUT_CLEAN you'll need to do one 
initial clean build -- either run `make cleanworld` or set WITH_CLEAN=yes.

The change is a pure MFC of the changes integrated to -CURRENT early 2021 and 
no issues are expected, but in case any problems are observed, please issue a 
PR and/or let me know in this thread.

Best regards,
Marcin




Thanks for enabling this. If I understand it correctly we got some
improvements mentioned here[1] and it doesn't imply that ASLR has to be
enabled, especially kern.elf64.aslr.pie_enable can be still set to 0 ?



Currently it still remains opt-in on stable/13 and is disabled by default.

Best regards,
Marcin


Thanks for the answer. I am not willing to turn ASLR on at this point, 
but rather asking if my world, already built with PIE, will bring any 
other enhancements or improvements?






[1] https://www.mail-archive.com/freebsd-current@freebsd.org/msg183605.html




With kind regards,

--
Marek Zarychta


OpenPGP_signature
Description: OpenPGP digital signature


Re: HEADS-UP: PIE enabled by default on stable/13

2022-01-24 Thread Marcin Wojtas
Hi Marek,

pon., 24 sty 2022 o 08:17 Marek Zarychta
 napisał(a):
>
> W dniu 24.01.2022 o 07:42, Marcin Wojtas pisze:
> > +freebsd-stable@
> >
> > niedz., 23 sty 2022 o 11:36 Marcin Wojtas  napisał(a):
> >>
> >> Hi,
> >>
> >> As of 396e9f259d962 the base system binaries are now built as 
> >> position-independent executable (PIE) by default, for 64-bit 
> >> architectures. Thanks to that enabling ASLR can be done simply
> >> by sysctls knobs when booting the kernel.
> >>
> >> If you track stable/13 and normally build WITHOUT_CLEAN you'll need to do 
> >> one initial clean build -- either run `make cleanworld` or set 
> >> WITH_CLEAN=yes.
> >>
> >> The change is a pure MFC of the changes integrated to -CURRENT early 2021 
> >> and no issues are expected, but in case any problems are observed, please 
> >> issue a PR and/or let me know in this thread.
> >>
> >> Best regards,
> >> Marcin
> >
>
> Thanks for enabling this. If I understand it correctly we got some
> improvements mentioned here[1] and it doesn't imply that ASLR has to be
> enabled, especially kern.elf64.aslr.pie_enable can be still set to 0 ?
>

Currently it still remains opt-in on stable/13 and is disabled by default.

Best regards,
Marcin

>
> [1] https://www.mail-archive.com/freebsd-current@freebsd.org/msg183605.html
>



Re: HEADS-UP: PIE enabled by default on stable/13

2022-01-23 Thread Marek Zarychta

W dniu 24.01.2022 o 07:42, Marcin Wojtas pisze:

+freebsd-stable@

niedz., 23 sty 2022 o 11:36 Marcin Wojtas  napisał(a):


Hi,

As of 396e9f259d962 the base system binaries are now built as 
position-independent executable (PIE) by default, for 64-bit architectures. 
Thanks to that enabling ASLR can be done simply
by sysctls knobs when booting the kernel.

If you track stable/13 and normally build WITHOUT_CLEAN you'll need to do one 
initial clean build -- either run `make cleanworld` or set WITH_CLEAN=yes.

The change is a pure MFC of the changes integrated to -CURRENT early 2021 and 
no issues are expected, but in case any problems are observed, please issue a 
PR and/or let me know in this thread.

Best regards,
Marcin




Thanks for enabling this. If I understand it correctly we got some 
improvements mentioned here[1] and it doesn't imply that ASLR has to be 
enabled, especially kern.elf64.aslr.pie_enable can be still set to 0 ?



[1] https://www.mail-archive.com/freebsd-current@freebsd.org/msg183605.html

--
Marek Zarychta


OpenPGP_signature
Description: OpenPGP digital signature


Re: HEADS-UP: PIE enabled by default on stable/13

2022-01-23 Thread Marcin Wojtas
+ freebsd-stable@, apologies for the noise.

niedz., 23 sty 2022 o 11:36 Marcin Wojtas  napisał(a):
>
> Hi,
>
> As of 396e9f259d962 the base system binaries are now built as 
> position-independent executable (PIE) by default, for 64-bit architectures. 
> Thanks to that enabling ASLR can be done simply
> by sysctls knobs when booting the kernel.
>
> If you track stable/13 and normally build WITHOUT_CLEAN you'll need to do one 
> initial clean build -- either run `make cleanworld` or set WITH_CLEAN=yes.
>
> The change is a pure MFC of the changes integrated to -CURRENT early 2021 and 
> no issues are expected, but in case any problems are observed, please issue a 
> PR and/or let me know in this thread.
>
> Best regards,
> Marcin



Re: HEADS-UP: PIE enabled by default on stable/13

2022-01-23 Thread Marcin Wojtas
+freebsd-stable@

niedz., 23 sty 2022 o 11:36 Marcin Wojtas  napisał(a):
>
> Hi,
>
> As of 396e9f259d962 the base system binaries are now built as 
> position-independent executable (PIE) by default, for 64-bit architectures. 
> Thanks to that enabling ASLR can be done simply
> by sysctls knobs when booting the kernel.
>
> If you track stable/13 and normally build WITHOUT_CLEAN you'll need to do one 
> initial clean build -- either run `make cleanworld` or set WITH_CLEAN=yes.
>
> The change is a pure MFC of the changes integrated to -CURRENT early 2021 and 
> no issues are expected, but in case any problems are observed, please issue a 
> PR and/or let me know in this thread.
>
> Best regards,
> Marcin



Re: HEADS-UP: ASLR for 64-bit executables enabled by default on main

2021-12-10 Thread Mark Johnston
On Fri, Dec 10, 2021 at 06:35:47PM +0100, Marcin Wojtas wrote:
> Hi Daniel
> 
> 
> pt., 10 gru 2021 o 10:16 Daniel O'Connor  napisał(a):
> >
> >
> >
> > > On 17 Nov 2021, at 09:00, Marcin Wojtas  wrote:
> > > As of b014e0f15bc7 the ASLR (Address Space Layout
> > > Randomization) feature becomes enabled for the all 64-bit
> > > binaries by default.
> >
> > Firstly, thank your for your efforts here, it is appreciated :)
> >
> > I am finding that the lang/sdcc port is crashing with a seg fault and the 
> > core dump is no help to me at all:
> > [freebsd14 7:06] /usr/ports/lang/sdcc/work/sdcc-4.0.0/device/lib >sudo gdb 
> > ../../bin/sdcc sdcc.core
> > GNU gdb (GDB) 11.1 [GDB v11.1 for FreeBSD]
> > 
> > Reading symbols from ../../bin/sdcc...
> > [New LWP 100122]
> > Core was generated by `../../bin/sdcc -I../../device/include 
> > -I../../device/include/mcs51 -mds390 --nos'.
> > Program terminated with signal SIGSEGV, Segmentation fault.
> > Invalid permissions for mapped object.
> > #0  0x000804e3fbc0 in setrlimit () from /lib/libc.so.7
> > (gdb) info thread
> >   Id   Target Id Frame
> > * 1LWP 1001220x000804e3fbc0 in setrlimit () from 
> > /lib/libc.so.7
> > (gdb) bt
> > #0  0x000804e3fbc0 in setrlimit () from /lib/libc.so.7
> > Backtrace stopped: Cannot access memory at address 0x7f87fd08
> >
> > If I disable ASLR (via proccontrol) then it does not crash, but I am not 
> > sure how I can debug it further.
> >
> > I've raised a bug https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260303 
> > if you (or anyone else) has suggestions for what to try.
> >
> 
> Thanks for filing the ticket. Let's continue the conversation there.

I left a comment there.  The gist of it is that there are several
lingering problems with the stack gap implementation, and I think we
should re-disable it on main until there's some consensus on how to
proceed.



Re: HEADS-UP: ASLR for 64-bit executables enabled by default on main

2021-12-10 Thread Marcin Wojtas
Hi Daniel


pt., 10 gru 2021 o 10:16 Daniel O'Connor  napisał(a):
>
>
>
> > On 17 Nov 2021, at 09:00, Marcin Wojtas  wrote:
> > As of b014e0f15bc7 the ASLR (Address Space Layout
> > Randomization) feature becomes enabled for the all 64-bit
> > binaries by default.
>
> Firstly, thank your for your efforts here, it is appreciated :)
>
> I am finding that the lang/sdcc port is crashing with a seg fault and the 
> core dump is no help to me at all:
> [freebsd14 7:06] /usr/ports/lang/sdcc/work/sdcc-4.0.0/device/lib >sudo gdb 
> ../../bin/sdcc sdcc.core
> GNU gdb (GDB) 11.1 [GDB v11.1 for FreeBSD]
> 
> Reading symbols from ../../bin/sdcc...
> [New LWP 100122]
> Core was generated by `../../bin/sdcc -I../../device/include 
> -I../../device/include/mcs51 -mds390 --nos'.
> Program terminated with signal SIGSEGV, Segmentation fault.
> Invalid permissions for mapped object.
> #0  0x000804e3fbc0 in setrlimit () from /lib/libc.so.7
> (gdb) info thread
>   Id   Target Id Frame
> * 1LWP 1001220x000804e3fbc0 in setrlimit () from 
> /lib/libc.so.7
> (gdb) bt
> #0  0x000804e3fbc0 in setrlimit () from /lib/libc.so.7
> Backtrace stopped: Cannot access memory at address 0x7f87fd08
>
> If I disable ASLR (via proccontrol) then it does not crash, but I am not sure 
> how I can debug it further.
>
> I've raised a bug https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260303 if 
> you (or anyone else) has suggestions for what to try.
>

Thanks for filing the ticket. Let's continue the conversation there.

Best regards,
Marcin



Re: HEADS-UP: ASLR for 64-bit executables enabled by default on main

2021-12-10 Thread Daniel O'Connor via freebsd-current



> On 17 Nov 2021, at 09:00, Marcin Wojtas  wrote:
> As of b014e0f15bc7 the ASLR (Address Space Layout
> Randomization) feature becomes enabled for the all 64-bit
> binaries by default.

Firstly, thank your for your efforts here, it is appreciated :)

I am finding that the lang/sdcc port is crashing with a seg fault and the core 
dump is no help to me at all:
[freebsd14 7:06] /usr/ports/lang/sdcc/work/sdcc-4.0.0/device/lib >sudo gdb 
../../bin/sdcc sdcc.core
GNU gdb (GDB) 11.1 [GDB v11.1 for FreeBSD]

Reading symbols from ../../bin/sdcc...
[New LWP 100122]
Core was generated by `../../bin/sdcc -I../../device/include 
-I../../device/include/mcs51 -mds390 --nos'.
Program terminated with signal SIGSEGV, Segmentation fault.
Invalid permissions for mapped object.
#0  0x000804e3fbc0 in setrlimit () from /lib/libc.so.7
(gdb) info thread
  Id   Target Id Frame
* 1LWP 1001220x000804e3fbc0 in setrlimit () from /lib/libc.so.7
(gdb) bt
#0  0x000804e3fbc0 in setrlimit () from /lib/libc.so.7
Backtrace stopped: Cannot access memory at address 0x7f87fd08

If I disable ASLR (via proccontrol) then it does not crash, but I am not sure 
how I can debug it further.

I've raised a bug https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260303 if 
you (or anyone else) has suggestions for what to try.

Thanks.

--
Daniel O'Connor
"The nice thing about standards is that there
are so many of them to choose from."
 -- Andrew Tanenbaum




Re: HEADS-UP: ASLR for 64-bit executables enabled by default on main

2021-11-21 Thread Ed Maste
On Sat, 20 Nov 2021 at 20:00, Ed Maste  wrote:
>
> On Thu, 18 Nov 2021 at 13:09, Li-Wen Hsu  wrote:
> >
> > The mkimg ones are a bit tricky, it seems the output is changed in
> > each run. We may need a way to generate reproducible results..
>
> Hopefully fixed by 036af1053acd6cae68c5fb6bed30508f2e40be13.

The mkimg failures are indeed fixed by the above commit - it was just
a latent bug in mkimg.

I've opened PR 259968 as a tracking bug for outstanding issues found
as a result of enabling ASLR by default, and submitted a PR for each
of the three outstanding issues.



Re: HEADS-UP: ASLR for 64-bit executables enabled by default on main

2021-11-20 Thread Ed Maste
On Thu, 18 Nov 2021 at 13:09, Li-Wen Hsu  wrote:
>
> The mkimg ones are a bit tricky, it seems the output is changed in
> each run. We may need a way to generate reproducible results..

Hopefully fixed by 036af1053acd6cae68c5fb6bed30508f2e40be13.



Re: HEADS-UP: ASLR for 64-bit executables enabled by default on main

2021-11-19 Thread Kristof Provost


> On 18 Nov 2021, at 11:43, Marcin Wojtas  wrote:
> czw., 18 lis 2021 o 19:07 Li-Wen Hsu  napisał(a):
>> 
>>> On Wed, Nov 17, 2021 at 6:30 AM Marcin Wojtas  wrote:
>>> 
>>> As of b014e0f15bc7 the ASLR (Address Space Layout
>>> Randomization) feature becomes enabled for the all 64-bit
>>> binaries by default.
>>> 
>>> Address Space Layout Randomization (ASLR) is an exploit mitigation
>>> technique implemented in the majority of modern operating systems.
>>> It involves randomly positioning the base address of an executable
>>> and the position of libraries, heap, and stack, in a process's address
>>> space. Although over the years ASLR proved to not guarantee full OS
>>> security on its own, this mechanism can make exploitation more difficult
>>> (especially when combined with other methods, such as W^X).
>>> 
>>> Tests on the tier 1 64-bit architectures demonstrated that the ASLR is
>>> stable and does not result in noticeable performance degradation,
>>> therefore it is considered safe to enable this mechanism by default.
>>> Moreover its effectiveness is increased for PIE (Position Independent
>>> Executable) binaries. Thanks to commit 9a227a2fd642 ("Enable PIE by
>>> default on 64-bit architectures"), building from src is not necessary
>>> to have PIE binaries and it is enough to control usage of ASLR in the
>>> OS solely by setting the appropriate sysctls. The defaults were toggled
>>> for the 64-bit PIE and non-PIE executables.
>>> 
>>> As for the drawbacks, a consequence of using the ASLR is more
>>> significant VM fragmentation, hence the issues may be encountered
>>> in the systems with a limited address space in high memory consumption
>>> cases, such as buildworld. As a result, although the tests on 32-bit
>>> architectures with ASLR enabled were mostly on par with what was
>>> observed on 64-bit ones, the defaults for the former are not changed
>>> at this time. Also, for the sake of safety the feature remains disabled
>>> for 32-bit executables on 64-bit machines, too.
>>> 
>>> The committed change affects the overall OS operation, so the
>>> following should be taken into consideration:
>>> * Address space fragmentation.
>>> * A changed ABI due to modified layout of address space.
>>> * More complicated debugging due to:
>>>  * Non-reproducible address space layout between runs.
>>>  * Some debuggers automatically disable ASLR for spawned processes,
>>>making target's environment different between debug and
>>>non-debug runs.
>>> 
>>> The known issues (such as PR239873 or PR253208) have been fixed in
>>> HEAD up front, however please pay attention to the system behavior after
>>> upgrading the kernel to the newest revisions.
>>> In order to confirm/rule-out the dependency of any encountered issue
>>> on ASLR it is strongly advised to re-run the test with the feature
>>> disabled - it can be done by setting the following sysctls
>>> in the /etc/sysctl.conf file:
>>> kern.elf64.aslr.enable=0
>>> kern.elf64.aslr.pie_enable=0
>>> 
>>> The change is a result of combined efforts under the auspices
>>> of the FreeBSD Foundation and the Semihalf team sponsored
>>> by Stormshield.
>>> 
>>> Best regards,
>>> Marcin
>> 
>> Thanks very much for working on this. FYI, there are some test cases
>> seem to be affected by this:
>> 
>> https://ci.freebsd.org/job/FreeBSD-main-amd64-test/19828/testReport/
>> 
>> The mkimg ones are a bit tricky, it seems the output is changed in
>> each run. We may need a way to generate reproducible results..
>> 
>> I'm still checking them, but hope more people can join and fix them.
>> 
> 
> Thanks for bringing this up! Apart from
> sys.netpfil.common.dummynet.pf_nat other are 23 are new.

I’ve just managed to reproduce that one locally (it only happens if ipfw is 
also loaded) and will dig in soon. It’s not going to be aslr related. You can 
ignore that failure. 

Kristof 



Re: HEADS-UP: ASLR for 64-bit executables enabled by default on main

2021-11-18 Thread Marcin Wojtas
Hi,

czw., 18 lis 2021 o 19:07 Li-Wen Hsu  napisał(a):
>
> On Wed, Nov 17, 2021 at 6:30 AM Marcin Wojtas  wrote:
> >
> > As of b014e0f15bc7 the ASLR (Address Space Layout
> > Randomization) feature becomes enabled for the all 64-bit
> > binaries by default.
> >
> > Address Space Layout Randomization (ASLR) is an exploit mitigation
> > technique implemented in the majority of modern operating systems.
> > It involves randomly positioning the base address of an executable
> > and the position of libraries, heap, and stack, in a process's address
> > space. Although over the years ASLR proved to not guarantee full OS
> > security on its own, this mechanism can make exploitation more difficult
> > (especially when combined with other methods, such as W^X).
> >
> > Tests on the tier 1 64-bit architectures demonstrated that the ASLR is
> > stable and does not result in noticeable performance degradation,
> > therefore it is considered safe to enable this mechanism by default.
> > Moreover its effectiveness is increased for PIE (Position Independent
> > Executable) binaries. Thanks to commit 9a227a2fd642 ("Enable PIE by
> > default on 64-bit architectures"), building from src is not necessary
> > to have PIE binaries and it is enough to control usage of ASLR in the
> > OS solely by setting the appropriate sysctls. The defaults were toggled
> > for the 64-bit PIE and non-PIE executables.
> >
> > As for the drawbacks, a consequence of using the ASLR is more
> > significant VM fragmentation, hence the issues may be encountered
> > in the systems with a limited address space in high memory consumption
> > cases, such as buildworld. As a result, although the tests on 32-bit
> > architectures with ASLR enabled were mostly on par with what was
> > observed on 64-bit ones, the defaults for the former are not changed
> > at this time. Also, for the sake of safety the feature remains disabled
> > for 32-bit executables on 64-bit machines, too.
> >
> > The committed change affects the overall OS operation, so the
> > following should be taken into consideration:
> > * Address space fragmentation.
> > * A changed ABI due to modified layout of address space.
> > * More complicated debugging due to:
> >   * Non-reproducible address space layout between runs.
> >   * Some debuggers automatically disable ASLR for spawned processes,
> > making target's environment different between debug and
> > non-debug runs.
> >
> > The known issues (such as PR239873 or PR253208) have been fixed in
> > HEAD up front, however please pay attention to the system behavior after
> > upgrading the kernel to the newest revisions.
> > In order to confirm/rule-out the dependency of any encountered issue
> > on ASLR it is strongly advised to re-run the test with the feature
> > disabled - it can be done by setting the following sysctls
> > in the /etc/sysctl.conf file:
> > kern.elf64.aslr.enable=0
> > kern.elf64.aslr.pie_enable=0
> >
> > The change is a result of combined efforts under the auspices
> > of the FreeBSD Foundation and the Semihalf team sponsored
> > by Stormshield.
> >
> > Best regards,
> > Marcin
>
> Thanks very much for working on this. FYI, there are some test cases
> seem to be affected by this:
>
> https://ci.freebsd.org/job/FreeBSD-main-amd64-test/19828/testReport/
>
> The mkimg ones are a bit tricky, it seems the output is changed in
> each run. We may need a way to generate reproducible results..
>
> I'm still checking them, but hope more people can join and fix them.
>

Thanks for bringing this up! Apart from
sys.netpfil.common.dummynet.pf_nat other are 23 are new. I checked a
couple of next builds and the results seems to be consistent. There
are:

lib.libc.sys.setrlimit_test.setrlimit_stack
lib.libc.regex.exhaust_test.regcomp_too_big
sys.kern.coredump_phnum_test.coredump_phnum
and 20 of usr.bin.mkimg.*

We will also check and try to fix the new issues (however any help
would be appreciated), it may be also worth to create dedicated
tickets in bugzilla.

Best regards,
Marcin



Re: HEADS-UP: ASLR for 64-bit executables enabled by default on main

2021-11-18 Thread Li-Wen Hsu
On Wed, Nov 17, 2021 at 6:30 AM Marcin Wojtas  wrote:
>
> As of b014e0f15bc7 the ASLR (Address Space Layout
> Randomization) feature becomes enabled for the all 64-bit
> binaries by default.
>
> Address Space Layout Randomization (ASLR) is an exploit mitigation
> technique implemented in the majority of modern operating systems.
> It involves randomly positioning the base address of an executable
> and the position of libraries, heap, and stack, in a process's address
> space. Although over the years ASLR proved to not guarantee full OS
> security on its own, this mechanism can make exploitation more difficult
> (especially when combined with other methods, such as W^X).
>
> Tests on the tier 1 64-bit architectures demonstrated that the ASLR is
> stable and does not result in noticeable performance degradation,
> therefore it is considered safe to enable this mechanism by default.
> Moreover its effectiveness is increased for PIE (Position Independent
> Executable) binaries. Thanks to commit 9a227a2fd642 ("Enable PIE by
> default on 64-bit architectures"), building from src is not necessary
> to have PIE binaries and it is enough to control usage of ASLR in the
> OS solely by setting the appropriate sysctls. The defaults were toggled
> for the 64-bit PIE and non-PIE executables.
>
> As for the drawbacks, a consequence of using the ASLR is more
> significant VM fragmentation, hence the issues may be encountered
> in the systems with a limited address space in high memory consumption
> cases, such as buildworld. As a result, although the tests on 32-bit
> architectures with ASLR enabled were mostly on par with what was
> observed on 64-bit ones, the defaults for the former are not changed
> at this time. Also, for the sake of safety the feature remains disabled
> for 32-bit executables on 64-bit machines, too.
>
> The committed change affects the overall OS operation, so the
> following should be taken into consideration:
> * Address space fragmentation.
> * A changed ABI due to modified layout of address space.
> * More complicated debugging due to:
>   * Non-reproducible address space layout between runs.
>   * Some debuggers automatically disable ASLR for spawned processes,
> making target's environment different between debug and
> non-debug runs.
>
> The known issues (such as PR239873 or PR253208) have been fixed in
> HEAD up front, however please pay attention to the system behavior after
> upgrading the kernel to the newest revisions.
> In order to confirm/rule-out the dependency of any encountered issue
> on ASLR it is strongly advised to re-run the test with the feature
> disabled - it can be done by setting the following sysctls
> in the /etc/sysctl.conf file:
> kern.elf64.aslr.enable=0
> kern.elf64.aslr.pie_enable=0
>
> The change is a result of combined efforts under the auspices
> of the FreeBSD Foundation and the Semihalf team sponsored
> by Stormshield.
>
> Best regards,
> Marcin

Thanks very much for working on this. FYI, there are some test cases
seem to be affected by this:

https://ci.freebsd.org/job/FreeBSD-main-amd64-test/19828/testReport/

The mkimg ones are a bit tricky, it seems the output is changed in
each run. We may need a way to generate reproducible results..

I'm still checking them, but hope more people can join and fix them.

Best,
Li-Wen



Re: [HEADS UP] Rename of the vendor/openzfs branch

2021-06-08 Thread Li-Wen Hsu
On Tue, Jun 8, 2021 at 7:45 PM Li-Wen Hsu  wrote:
>
> Hello,
>
> As mentioned in the "OpenZFS imports, status update":
>
> https://lists.freebsd.org/archives/freebsd-git/2021-June/13.html
>
> We're going to rename the current openzfs vendor branch,
> vendor/openzfs, to vendor/openzfs/legacy

The renaming has been done:

https://cgit.freebsd.org/src/log/?h=vendor/openzfs/legacy

If you have a local branch tracking vendor/openzfs, please refer to
the previous mail for migration.

https://lists.freebsd.org/archives/freebsd-git/2021-June/15.html

Best,
Li-Wen



Re: HEADS-UP: PIE enabled by default on main

2021-03-01 Thread John Kennedy
On Sun, Feb 28, 2021 at 09:40:54AM -0500, Shawn Webb wrote:
> ... The point of ASLR is to combine it with W^X. Without W^X, ASLR makes
> no sense. FreeBSD recently gained a W^X implementation that requires
> opt-in. ...

  I'm not plugged into the right places to catch some of these things up
front.  Like PIE, I trip across how to enable them after the fact by finding
people talking about it here.

  My google-fu is getting a lot of bad hits, but I assume this is referring
to making writable memory non-executable (above and beyond malloc()'s M_EXEC
flag with it's disclaimers).  What are the keyword/feature/knobs to get
better informed and opt-in?

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-28 Thread Konstantin Belousov
On Sat, Feb 27, 2021 at 08:34:11PM -0800, Ihor Antonov wrote:
> > 
> > But isn't it well-known that ASLR/ASR/any-related-buzzwork does not add
> > any security, except imaginary?  The only purpose of it is to have a
> > check-list item ticked green.
> 
> I don't know if I should parse this as sarcasm (or any other form of
> "humor") or is a serious statement? But this does leave me with a whole
> bunch of questions..
> 
> If this is really how Konstantin is describing it then is it OK to say
> about this to the whole Internet? Why FreeBSD Foundation is paying for
> meaningless work then? Why members of the Core team do this work?  Does
> this mean that FreeBSD is working to satisfy the silly needs of some fat
> customer? What about project independence and not being controlled by
> big money?
What fat customer?
Other than that (and tone, of course), you formulate right the core of
the issue.  ASLR is useless as a stop-gap measure, exploits work around
it with full success since XP SP3, but the myth about its importance
is so widely circulating that we have to spend a lot of efforts first
developing the feature, and then similar amount of efforts to productize
it.  The later means to make it available to general public without
introducing a breakage.

We tried to do as you said, not implement but explain, you see the attempts
to list research papers below the thread.  It does not work.  This is the
case where security theater wins.

In fact, switch to PIE itself is somewhat useful. For instance,
- rtld direct execution mode benefits from it
- kernel image activator might optimize/compact address space
- emulation tools like valgrind have more freedom loading the image as well,
- static linkers can do some optimizations only possible for DSO-like and
  not binary
and so on. But I would never call it a 'huge security advance'.

> 
> Where can I read about ASLR and security myths? 
> Why not spend time and explain why this does not work?
Because spending time explaining why it does not work does not work.
People read check-lists and not explanations, esp. if check-lists are
provided by somebody not interested in explanation, but to pursue a
red/green line in the check-list.

And I do not even start on the quality of the 'alternative' implementations.

> 
> 
> > You clearly should mean something useful and much more important than that,
> > when stating that FreeBSD made a huge step forward.  So I want to be aware
> > of the advance.
> 
> Why attack a person who was really happy for the project?
> This DOES sound a agressive, even for a sarcastic joke..
> I am saying this someone who shares the same native language with Mr. 
> Belousov,
> it is not a "language/culture" difference thing.
I do not see how supposed sharing of native language with me makes it
legitimate to express your emotions as mine statements.

> 
> -
> just your regular user who reads mailing list ocassionally
> ___
> freebsd-current@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-28 Thread Shawn Webb
On Sat, Feb 27, 2021 at 10:29:14PM -0700, Warner Losh wrote:
> On Sat, Feb 27, 2021 at 9:34 PM Ihor Antonov  wrote:
> 
> > >
> > > But isn't it well-known that ASLR/ASR/any-related-buzzwork does not add
> > > any security, except imaginary?  The only purpose of it is to have a
> > > check-list item ticked green.
> >
> > I don't know if I should parse this as sarcasm (or any other form of
> > "humor") or is a serious statement? But this does leave me with a whole
> > bunch of questions..
> >
> > If this is really how Konstantin is describing it then is it OK to say
> > about this to the whole Internet? Why FreeBSD Foundation is paying for
> > meaningless work then? Why members of the Core team do this work?  Does
> > this mean that FreeBSD is working to satisfy the silly needs of some fat
> > customer? What about project independence and not being controlled by
> > big money?
> >
> > Where can I read about ASLR and security myths?
> 
> Why not spend time and explain why this does not work?
> >
> 
> Not to rise to the baitiness of all these leading questions (they really
> are quite contrary to how our community usually comports itself, but for
> the sake of civil discourse, I'll ignore)
> 
> I'll bet it has something to do with the many known ASLR attacks.  One is
> chronicled in https://www.vusec.net/projects/anc/ and elsewhere, which show
> how MMU side channels can defeat ASLR. Or maybe he's familiar with the
> offset2lib attack against Linux 64-bit ASLR documented in this paper
> https://cybersecurity.upv.es/attacks/offset2lib/offset2lib-paper.pdf.
> There's many others as well that show the shortcomings of ASLR and disclose
> ways to defeat it using various clever means.

Problem with these papers is that they put ASLR on a pedestal it
doesn't deserve. If you take a look at PaX's original ASLR paper,
you'll learn that ASLR was not designed to protect against local
attacks. You'll also learn that the infoleak weakness was already
postulated, even in its initial design and implementation. Attacks
against the MMU require local code execution--for example, javascript
in a browser. ASLR was never meant to protect against such a case. We
must take the original design into account when discussing ASLR's
valid shortcomings.

The point of ASLR is to combine it with W^X. Without W^X, ASLR makes
no sense. FreeBSD recently gained a W^X implementation that requires
opt-in.

When combined with W^X, exploit authors must chain together multiple
vulnerabilities in order to successfully exploit. The combination of
ASLR and W^X have forever changed the very foundation of exploitation.
Both, when combined, do their job well--that of raising the economic
cost of successful remote exploitation.

Now that FreeBSD has both a form of ASLR known as ASR and a W^X
implementation, FreeBSD can move on to other exploit mitigations, such
as CFI and SafeStack (both of which are already integrated in some
form in HardenedBSD.)

This is likely to be my only response to this thread as I'm incredibly
tired of rehashing the same arguments, especiall with regards to kib@,
over the span of many years.

Thanks,

-- 
Shawn Webb
Cofounder / Security Engineer
HardenedBSD

GPG Key ID:  0xFF2E67A277F8E1FA
GPG Key Fingerprint: D206 BB45 15E0 9C49 0CF9  3633 C85B 0AF8 AB23 0FB2
https://git-01.md.hardenedbsd.org/HardenedBSD/pubkeys/src/branch/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc


signature.asc
Description: PGP signature


Re: HEADS-UP: PIE enabled by default on main

2021-02-28 Thread Toomas Soome via freebsd-current


> On 28. Feb 2021, at 13:27, dmilith .  wrote:
> 
> First of all - ALSR is designed as mitigation for external attacks,
> not internal ones (logged in user).
> Second - Linux and FreeBSD both have weak implementations in
> comparison to PAX-driven ones. Try attacking the system with
> Grsecurity or HardenedBSD (both use the strongest ASLR available
> AFAIK).
> 
> Saying that security mitigation features that affect no performance
> are "meaningless", is just ridiculous or at least just irresponsible.
> It's like telling C programmers that stack protection or out of bounds
> checks are bad, cause there's nothing wrong with random SEGFAULTS from
> time to time…
> 


You seem to forget that those mechanisms are there exactly because programmers 
are not caring about random faults from time to time:D With correct code, one 
would not need mechanisms like ALSR. 

rgds,
toomas

> 
> On 28/02/2021, Ihor Antonov  wrote:
>> On 2021-02-27 22:29, Warner Losh wrote:
>>> On Sat, Feb 27, 2021 at 9:34 PM Ihor Antonov 
>>> wrote:
>>> 
> 
> But isn't it well-known that ASLR/ASR/any-related-buzzwork does not
> add
> any security, except imaginary?  The only purpose of it is to have a
> check-list item ticked green.
 
 I don't know if I should parse this as sarcasm (or any other form of
 "humor") or is a serious statement? But this does leave me with a whole
 bunch of questions..
 
 If this is really how Konstantin is describing it then is it OK to say
 about this to the whole Internet? Why FreeBSD Foundation is paying for
 meaningless work then? Why members of the Core team do this work?  Does
 this mean that FreeBSD is working to satisfy the silly needs of some
 fat
 customer? What about project independence and not being controlled by
 big money?
 
 Where can I read about ASLR and security myths?
>>> 
>>> Why not spend time and explain why this does not work?
 
>>> 
>>> Not to rise to the baitiness of all these leading questions (they really
>>> are quite contrary to how our community usually comports itself, but for
>>> the sake of civil discourse, I'll ignore)
>>> 
>>> I'll bet it has something to do with the many known ASLR attacks.  One is
>>> chronicled in https://www.vusec.net/projects/anc/ and elsewhere, which
>>> show
>>> how MMU side channels can defeat ASLR. Or maybe he's familiar with the
>>> offset2lib attack against Linux 64-bit ASLR documented in this paper
>>> https://cybersecurity.upv.es/attacks/offset2lib/offset2lib-paper.pdf.
>>> There's many others as well that show the shortcomings of ASLR and
>>> disclose
>>> ways to defeat it using various clever means.
>> 
>> Warner, thanks for the links. They are indeed interesting.
>> 
 You clearly should mean something useful and much more important than
 that,
>>> 
>>> Maybe he'd like to understand how PIE accomplishes better security give
>>> the
>>> known ASLR weaknesses. And rather than take a sarcastic tone, he asked
>>> for
>>> more details that back up the earlier claims of improved security so we
>>> could all learn something.
>> 
>> The conclusion of the paper in the second link clearly says:
>> 
>>We present a new weakness on the current implementationof the ASLR
>>Linux systems which affects PIE compiled ex-ecutables.  Applications
>>compiled with PIE are consideredto be more robust since it makes
>>attacks more difficult.
>> 
>> Which I read as ASLR and PIE work better together. This is the same what
>> Gordon was saying.
>> 
>> The whole situation is wrong on 2 different levels.
>> 
>> First: saying that ASLR is not perfect and can be broken is not the same
>> thing as saying "The only purpose of it is to have a check-list item ticked
>> green"
>> 
>> There are no perfect security measures, and you guys (kernel and OS
>> developers) should know that better than us (users). Hackers find new
>> exploits, developers find ways to mitigate them and cycle repeats. Just
>> the fact that ASLR can be broken is not the reason to not have it.
>> 
>> Second: look at this exchange from a distance
>> 
>> Ed: we are enabling security feature X, please rebuild your worlds..
>> Godron: great progress! go team!
>> Konstantin: why do you think this is great progress? (implying it is
>> not)
>> Gordon: well, I heard feature X works best with feature Y
>> Konstantin: feature Y is useless checkbox, next time you speak make sure
>> you say something useful!
>> 
>> Considering the fact that Konstantin himself worked on ASLR this is at
>> least confusing.. Also does this also mean that feature X (PIE) is also
>> useless checkbox?
>> 
>> Konstantin, Ed, Warner - I dunno what is going on in your house (Core) but
>> it does not look good form the outside. You are sending mixed signals to
>> your auditory.
>> 
>> 
>> ___
>> freebsd-current@freebsd.org mailing list
>> https://lists.freebsd.org/mailman/listinfo/freebsd-current

Re: HEADS-UP: PIE enabled by default on main

2021-02-28 Thread dmilith .
First of all - ALSR is designed as mitigation for external attacks,
not internal ones (logged in user).
Second - Linux and FreeBSD both have weak implementations in
comparison to PAX-driven ones. Try attacking the system with
Grsecurity or HardenedBSD (both use the strongest ASLR available
AFAIK).

Saying that security mitigation features that affect no performance
are "meaningless", is just ridiculous or at least just irresponsible.
It's like telling C programmers that stack protection or out of bounds
checks are bad, cause there's nothing wrong with random SEGFAULTS from
time to time…


On 28/02/2021, Ihor Antonov  wrote:
> On 2021-02-27 22:29, Warner Losh wrote:
>> On Sat, Feb 27, 2021 at 9:34 PM Ihor Antonov 
>> wrote:
>>
>> > >
>> > > But isn't it well-known that ASLR/ASR/any-related-buzzwork does not
>> > > add
>> > > any security, except imaginary?  The only purpose of it is to have a
>> > > check-list item ticked green.
>> >
>> > I don't know if I should parse this as sarcasm (or any other form of
>> > "humor") or is a serious statement? But this does leave me with a whole
>> > bunch of questions..
>> >
>> > If this is really how Konstantin is describing it then is it OK to say
>> > about this to the whole Internet? Why FreeBSD Foundation is paying for
>> > meaningless work then? Why members of the Core team do this work?  Does
>> > this mean that FreeBSD is working to satisfy the silly needs of some
>> > fat
>> > customer? What about project independence and not being controlled by
>> > big money?
>> >
>> > Where can I read about ASLR and security myths?
>>
>> Why not spend time and explain why this does not work?
>> >
>>
>> Not to rise to the baitiness of all these leading questions (they really
>> are quite contrary to how our community usually comports itself, but for
>> the sake of civil discourse, I'll ignore)
>>
>> I'll bet it has something to do with the many known ASLR attacks.  One is
>> chronicled in https://www.vusec.net/projects/anc/ and elsewhere, which
>> show
>> how MMU side channels can defeat ASLR. Or maybe he's familiar with the
>> offset2lib attack against Linux 64-bit ASLR documented in this paper
>> https://cybersecurity.upv.es/attacks/offset2lib/offset2lib-paper.pdf.
>> There's many others as well that show the shortcomings of ASLR and
>> disclose
>> ways to defeat it using various clever means.
>
> Warner, thanks for the links. They are indeed interesting.
>
>> > You clearly should mean something useful and much more important than
>> > that,
>>
>> Maybe he'd like to understand how PIE accomplishes better security give
>> the
>> known ASLR weaknesses. And rather than take a sarcastic tone, he asked
>> for
>> more details that back up the earlier claims of improved security so we
>> could all learn something.
>
> The conclusion of the paper in the second link clearly says:
>
> We present a new weakness on the current implementationof the ASLR
> Linux systems which affects PIE compiled ex-ecutables.  Applications
> compiled with PIE are consideredto be more robust since it makes
> attacks more difficult.
>
> Which I read as ASLR and PIE work better together. This is the same what
> Gordon was saying.
>
> The whole situation is wrong on 2 different levels.
>
> First: saying that ASLR is not perfect and can be broken is not the same
> thing as saying "The only purpose of it is to have a check-list item ticked
> green"
>
> There are no perfect security measures, and you guys (kernel and OS
> developers) should know that better than us (users). Hackers find new
> exploits, developers find ways to mitigate them and cycle repeats. Just
> the fact that ASLR can be broken is not the reason to not have it.
>
> Second: look at this exchange from a distance
>
> Ed: we are enabling security feature X, please rebuild your worlds..
> Godron: great progress! go team!
> Konstantin: why do you think this is great progress? (implying it is
> not)
> Gordon: well, I heard feature X works best with feature Y
> Konstantin: feature Y is useless checkbox, next time you speak make sure
> you say something useful!
>
> Considering the fact that Konstantin himself worked on ASLR this is at
> least confusing.. Also does this also mean that feature X (PIE) is also
> useless checkbox?
>
> Konstantin, Ed, Warner - I dunno what is going on in your house (Core) but
> it does not look good form the outside. You are sending mixed signals to
> your auditory.
>
>
> ___
> freebsd-current@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
>


-- 
--
Daniel Dettlaff
Versatile Knowledge Systems
verknowsys.com
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-27 Thread Ihor Antonov
On 2021-02-27 22:29, Warner Losh wrote:
> On Sat, Feb 27, 2021 at 9:34 PM Ihor Antonov  wrote:
> 
> > >
> > > But isn't it well-known that ASLR/ASR/any-related-buzzwork does not add
> > > any security, except imaginary?  The only purpose of it is to have a
> > > check-list item ticked green.
> >
> > I don't know if I should parse this as sarcasm (or any other form of
> > "humor") or is a serious statement? But this does leave me with a whole
> > bunch of questions..
> >
> > If this is really how Konstantin is describing it then is it OK to say
> > about this to the whole Internet? Why FreeBSD Foundation is paying for
> > meaningless work then? Why members of the Core team do this work?  Does
> > this mean that FreeBSD is working to satisfy the silly needs of some fat
> > customer? What about project independence and not being controlled by
> > big money?
> >
> > Where can I read about ASLR and security myths?
> 
> Why not spend time and explain why this does not work?
> >
> 
> Not to rise to the baitiness of all these leading questions (they really
> are quite contrary to how our community usually comports itself, but for
> the sake of civil discourse, I'll ignore)
> 
> I'll bet it has something to do with the many known ASLR attacks.  One is
> chronicled in https://www.vusec.net/projects/anc/ and elsewhere, which show
> how MMU side channels can defeat ASLR. Or maybe he's familiar with the
> offset2lib attack against Linux 64-bit ASLR documented in this paper
> https://cybersecurity.upv.es/attacks/offset2lib/offset2lib-paper.pdf.
> There's many others as well that show the shortcomings of ASLR and disclose
> ways to defeat it using various clever means.

Warner, thanks for the links. They are indeed interesting. 

> > You clearly should mean something useful and much more important than
> > that,
> 
> Maybe he'd like to understand how PIE accomplishes better security give the
> known ASLR weaknesses. And rather than take a sarcastic tone, he asked for
> more details that back up the earlier claims of improved security so we
> could all learn something.

The conclusion of the paper in the second link clearly says:

We present a new weakness on the current implementationof the ASLR
Linux systems which affects PIE compiled ex-ecutables.  Applications
compiled with PIE are consideredto be more robust since it makes
attacks more difficult.

Which I read as ASLR and PIE work better together. This is the same what 
Gordon was saying. 

The whole situation is wrong on 2 different levels.

First: saying that ASLR is not perfect and can be broken is not the same
thing as saying "The only purpose of it is to have a check-list item ticked 
green"

There are no perfect security measures, and you guys (kernel and OS
developers) should know that better than us (users). Hackers find new
exploits, developers find ways to mitigate them and cycle repeats. Just
the fact that ASLR can be broken is not the reason to not have it.

Second: look at this exchange from a distance

Ed: we are enabling security feature X, please rebuild your worlds..
Godron: great progress! go team!
Konstantin: why do you think this is great progress? (implying it is
not)
Gordon: well, I heard feature X works best with feature Y
Konstantin: feature Y is useless checkbox, next time you speak make sure
you say something useful!

Considering the fact that Konstantin himself worked on ASLR this is at
least confusing.. Also does this also mean that feature X (PIE) is also
useless checkbox?

Konstantin, Ed, Warner - I dunno what is going on in your house (Core) but 
it does not look good form the outside. You are sending mixed signals to
your auditory.


___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-27 Thread Warner Losh
On Sat, Feb 27, 2021 at 9:34 PM Ihor Antonov  wrote:

> >
> > But isn't it well-known that ASLR/ASR/any-related-buzzwork does not add
> > any security, except imaginary?  The only purpose of it is to have a
> > check-list item ticked green.
>
> I don't know if I should parse this as sarcasm (or any other form of
> "humor") or is a serious statement? But this does leave me with a whole
> bunch of questions..
>
> If this is really how Konstantin is describing it then is it OK to say
> about this to the whole Internet? Why FreeBSD Foundation is paying for
> meaningless work then? Why members of the Core team do this work?  Does
> this mean that FreeBSD is working to satisfy the silly needs of some fat
> customer? What about project independence and not being controlled by
> big money?
>
> Where can I read about ASLR and security myths?

Why not spend time and explain why this does not work?
>

Not to rise to the baitiness of all these leading questions (they really
are quite contrary to how our community usually comports itself, but for
the sake of civil discourse, I'll ignore)

I'll bet it has something to do with the many known ASLR attacks.  One is
chronicled in https://www.vusec.net/projects/anc/ and elsewhere, which show
how MMU side channels can defeat ASLR. Or maybe he's familiar with the
offset2lib attack against Linux 64-bit ASLR documented in this paper
https://cybersecurity.upv.es/attacks/offset2lib/offset2lib-paper.pdf.
There's many others as well that show the shortcomings of ASLR and disclose
ways to defeat it using various clever means.

> You clearly should mean something useful and much more important than
> that,
> > when stating that FreeBSD made a huge step forward.  So I want to be
> aware
> > of the advance.
>
> Why attack a person who was really happy for the project?
> This DOES sound a agressive, even for a sarcastic joke..
> I am saying this someone who shares the same native language with Mr.
> Belousov,
> it is not a "language/culture" difference thing.
> just your regular user who reads mailing list ocassionally
>

Maybe he'd like to understand how PIE accomplishes better security give the
known ASLR weaknesses. And rather than take a sarcastic tone, he asked for
more details that back up the earlier claims of improved security so we
could all learn something.

Warner
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-27 Thread Ihor Antonov
> 
> But isn't it well-known that ASLR/ASR/any-related-buzzwork does not add
> any security, except imaginary?  The only purpose of it is to have a
> check-list item ticked green.

I don't know if I should parse this as sarcasm (or any other form of
"humor") or is a serious statement? But this does leave me with a whole
bunch of questions..

If this is really how Konstantin is describing it then is it OK to say
about this to the whole Internet? Why FreeBSD Foundation is paying for
meaningless work then? Why members of the Core team do this work?  Does
this mean that FreeBSD is working to satisfy the silly needs of some fat
customer? What about project independence and not being controlled by
big money?

Where can I read about ASLR and security myths? 
Why not spend time and explain why this does not work?


> You clearly should mean something useful and much more important than that,
> when stating that FreeBSD made a huge step forward.  So I want to be aware
> of the advance.

Why attack a person who was really happy for the project?
This DOES sound a agressive, even for a sarcastic joke..
I am saying this someone who shares the same native language with Mr. Belousov,
it is not a "language/culture" difference thing.

-
just your regular user who reads mailing list ocassionally
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-27 Thread Konstantin Belousov
On Fri, Feb 26, 2021 at 08:32:26PM +0100, Gordon Bergling wrote:
> On Fri, Feb 26, 2021 at 08:57:55PM +0200, Konstantin Belousov wrote:
> > On Fri, Feb 26, 2021 at 07:34:03PM +0100, Gordon Bergling wrote:
> > > On Thu, Feb 25, 2021 at 03:58:07PM -0500, Ed Maste wrote:
> > > > As of 9a227a2fd642 (main-n245052) base system binaries are now built
> > > > as position-independent executable (PIE) by default, for 64-bit
> > > > architectures. PIE executables are used in conjunction with address
> > > > randomization as a mitigation for certain types of security
> > > > vulnerabilities.
> > > > 
> > > > If you track -CURRENT and normally build WITHOUT_CLEAN you'll need to
> > > > do one initial clean build -- either run `make cleanworld` or set
> > > > WITH_CLEAN=yes.
> > > > 
> > > > No significant user-facing changes are expected from this change, but
> > > > there are some minor ones. For example, `file` will indicate that
> > > > binaries are PIE by reporting something like `ELF 64-bit LSB pie
> > > > executable` rather than `ELF 64-bit LSB executable`. Also, for most
> > > > workloads no notable performance impact is expected.
> > > > 
> > > > For almost all ports this should result in no change. There are a
> > > > small number of ports that use base system /usr/share/mk
> > > > infrastructure and thus inherit the base system default, and some of
> > > > those initially failed to build. Those found during an exp-run in
> > > > PR253275 have been addressed or have patches waiting.
> > > > 
> > > > Please watch out for any new issues after you next update the base
> > > > system and/or ports, and report issues via a Bugzilla PR or in reply
> > > > here.
> > > 
> > > Thats a huge step forward in terms on security.
> > Can you explain why?
> > 
> > Thanks.
> 
> I can try. Enabling PIE for every 64bit architecture is in that matter a step
> forward in security as it enables ASLR for further adoption.

But isn't it well-known that ASLR/ASR/any-related-buzzwork does not add
any security, except imaginary?  The only purpose of it is to have a
check-list item ticked green.

You clearly should mean something useful and much more important than that,
when stating that FreeBSD made a huge step forward.  So I want to be aware
of the advance.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-26 Thread Gordon Bergling
On Fri, Feb 26, 2021 at 08:57:55PM +0200, Konstantin Belousov wrote:
> On Fri, Feb 26, 2021 at 07:34:03PM +0100, Gordon Bergling wrote:
> > On Thu, Feb 25, 2021 at 03:58:07PM -0500, Ed Maste wrote:
> > > As of 9a227a2fd642 (main-n245052) base system binaries are now built
> > > as position-independent executable (PIE) by default, for 64-bit
> > > architectures. PIE executables are used in conjunction with address
> > > randomization as a mitigation for certain types of security
> > > vulnerabilities.
> > > 
> > > If you track -CURRENT and normally build WITHOUT_CLEAN you'll need to
> > > do one initial clean build -- either run `make cleanworld` or set
> > > WITH_CLEAN=yes.
> > > 
> > > No significant user-facing changes are expected from this change, but
> > > there are some minor ones. For example, `file` will indicate that
> > > binaries are PIE by reporting something like `ELF 64-bit LSB pie
> > > executable` rather than `ELF 64-bit LSB executable`. Also, for most
> > > workloads no notable performance impact is expected.
> > > 
> > > For almost all ports this should result in no change. There are a
> > > small number of ports that use base system /usr/share/mk
> > > infrastructure and thus inherit the base system default, and some of
> > > those initially failed to build. Those found during an exp-run in
> > > PR253275 have been addressed or have patches waiting.
> > > 
> > > Please watch out for any new issues after you next update the base
> > > system and/or ports, and report issues via a Bugzilla PR or in reply
> > > here.
> > 
> > Thats a huge step forward in terms on security.
> Can you explain why?
> 
> Thanks.

I can try. Enabling PIE for every 64bit architecture is in that matter a step
forward in security as it enables ASLR for further adoption.

Thank You, again.

--Gordon

> > Thanks for the efforts and anyone involved.


signature.asc
Description: PGP signature


Re: HEADS-UP: PIE enabled by default on main

2021-02-26 Thread Konstantin Belousov
On Fri, Feb 26, 2021 at 07:34:03PM +0100, Gordon Bergling wrote:
> On Thu, Feb 25, 2021 at 03:58:07PM -0500, Ed Maste wrote:
> > As of 9a227a2fd642 (main-n245052) base system binaries are now built
> > as position-independent executable (PIE) by default, for 64-bit
> > architectures. PIE executables are used in conjunction with address
> > randomization as a mitigation for certain types of security
> > vulnerabilities.
> > 
> > If you track -CURRENT and normally build WITHOUT_CLEAN you'll need to
> > do one initial clean build -- either run `make cleanworld` or set
> > WITH_CLEAN=yes.
> > 
> > No significant user-facing changes are expected from this change, but
> > there are some minor ones. For example, `file` will indicate that
> > binaries are PIE by reporting something like `ELF 64-bit LSB pie
> > executable` rather than `ELF 64-bit LSB executable`. Also, for most
> > workloads no notable performance impact is expected.
> > 
> > For almost all ports this should result in no change. There are a
> > small number of ports that use base system /usr/share/mk
> > infrastructure and thus inherit the base system default, and some of
> > those initially failed to build. Those found during an exp-run in
> > PR253275 have been addressed or have patches waiting.
> > 
> > Please watch out for any new issues after you next update the base
> > system and/or ports, and report issues via a Bugzilla PR or in reply
> > here.
> 
> Thats a huge step forward in terms on security.
Can you explain why?

Thanks.

> Thanks for the efforts and anyone involved.
> 
> --Gordon


___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-26 Thread Gordon Bergling
On Thu, Feb 25, 2021 at 03:58:07PM -0500, Ed Maste wrote:
> As of 9a227a2fd642 (main-n245052) base system binaries are now built
> as position-independent executable (PIE) by default, for 64-bit
> architectures. PIE executables are used in conjunction with address
> randomization as a mitigation for certain types of security
> vulnerabilities.
> 
> If you track -CURRENT and normally build WITHOUT_CLEAN you'll need to
> do one initial clean build -- either run `make cleanworld` or set
> WITH_CLEAN=yes.
> 
> No significant user-facing changes are expected from this change, but
> there are some minor ones. For example, `file` will indicate that
> binaries are PIE by reporting something like `ELF 64-bit LSB pie
> executable` rather than `ELF 64-bit LSB executable`. Also, for most
> workloads no notable performance impact is expected.
> 
> For almost all ports this should result in no change. There are a
> small number of ports that use base system /usr/share/mk
> infrastructure and thus inherit the base system default, and some of
> those initially failed to build. Those found during an exp-run in
> PR253275 have been addressed or have patches waiting.
> 
> Please watch out for any new issues after you next update the base
> system and/or ports, and report issues via a Bugzilla PR or in reply
> here.

Thats a huge step forward in terms on security. Thanks for the efforts and
anyone involved.

--Gordon


signature.asc
Description: PGP signature


Re: HEADS-UP: PIE enabled by default on main

2021-02-26 Thread David Wolfskill
On Thu, Feb 25, 2021 at 09:22:43PM -0500, Ed Maste wrote:
> On Thu, 25 Feb 2021 at 19:23, John Kennedy  wrote:
> >
> >   Not sure if Ed Maste just wants to make sure that all the executables
> > are rebuilt as PIE (vs hit-and-miss) or there is a sneaker corner-case that
> > he knows about.
> 
> The issue is that without a clean build you may have some .o files
> left around that are built without PIE enabled (i.e., compiled without
> -fPIE), and attempting to link them into a PIE executable will fail
> with an error like:
> 
> ld: error: can't create dynamic relocation R_X86_64_32 against local
> symbol in readonly segment; recompile object files with -fPIC or pass
> '-Wl,-z,notext' to allow text relocations in the output
> 

FWIW, my source update from:

FreeBSD freebeast.catwhisker.org 14.0-CURRENT FreeBSD 14.0-CURRENT #1194 
main-n245061-c861373bdff9: Thu Feb 25 04:09:17 PST 2021 
r...@freebeast.catwhisker.org:/common/S4/obj/usr/src/amd64.amd64/sys/GENERIC  
amd64 145 145

to:

FreeBSD freebeast.catwhisker.org 14.0-CURRENT FreeBSD 14.0-CURRENT #1195 
main-n245107-172f2fc11cc5: Fri Feb 26 04:01:22 PST 2021 
r...@freebeast.catwhisker.org:/common/S4/obj/usr/src/amd64.amd64/sys/GENERIC  
amd64 145 145

this morning was quite uneventful.  I did nothing special -- just
the normal META_MODE build I always do.  Rebooted; started X11
(built under stable/12, as with all of the ports save x11/nvidia-driver)...
things Just Worked. :-)

(Above was from one machine; I actually updated 3 machines in parallel.)

Peace,
david
-- 
David H. Wolfskill  da...@catwhisker.org
It is supremely disingenuous to claim a lack of jurisdiction, then 
proceed to participate in a decision on the same matter.

See https://www.catwhisker.org/~david/publickey.gpg for my public key.


signature.asc
Description: PGP signature


Re: HEADS-UP: PIE enabled by default on main

2021-02-26 Thread Dimitry Andric
On 26 Feb 2021, at 03:22, Ed Maste  wrote:
> 
> On Thu, 25 Feb 2021 at 19:23, John Kennedy  wrote:
>> 
>>  Not sure if Ed Maste just wants to make sure that all the executables
>> are rebuilt as PIE (vs hit-and-miss) or there is a sneaker corner-case that
>> he knows about.
> 
> The issue is that without a clean build you may have some .o files
> left around that are built without PIE enabled (i.e., compiled without
> -fPIE), and attempting to link them into a PIE executable will fail

Hmm, maybe it is time for a ".pieo" extension? (I disliked .pico at
first, but now I see the sense in it; might as well make clear that
plain ".o" is meant for 'static' object files.)

-Dimitry



signature.asc
Description: Message signed with OpenPGP


Re: HEADS-UP: PIE enabled by default on main

2021-02-25 Thread Greg 'groggy' Lehey
On Thursday, 25 February 2021 at 21:22:43 -0500, Ed Maste wrote:
> On Thu, 25 Feb 2021 at 19:23, John Kennedy  wrote:
>>
>>   Not sure if Ed Maste just wants to make sure that all the executables
>> are rebuilt as PIE (vs hit-and-miss) or there is a sneaker corner-case that
>> he knows about.
>
> The issue is that without a clean build you may have some .o files
> left around that are built without PIE enabled (i.e., compiled without
> -fPIE), and attempting to link them into a PIE executable will fail
> with an error like:
>
> ld: error: can't create dynamic relocation R_X86_64_32 against local symbol 
> in readonly segment; recompile object files with -fPIC or pass 
> '-Wl,-z,notext' to allow text relocations in the output

Ah, thanks.  That makes more sense.

Greg
--
Sent from my desktop computer.
See complete headers for address and phone numbers.
This message is digitally signed.  If your Microsoft mail program
reports problems, please read http://lemis.com/broken-MUA


signature.asc
Description: PGP signature


Re: HEADS-UP: PIE enabled by default on main

2021-02-25 Thread Ed Maste
On Thu, 25 Feb 2021 at 19:23, John Kennedy  wrote:
>
>   Not sure if Ed Maste just wants to make sure that all the executables
> are rebuilt as PIE (vs hit-and-miss) or there is a sneaker corner-case that
> he knows about.

The issue is that without a clean build you may have some .o files
left around that are built without PIE enabled (i.e., compiled without
-fPIE), and attempting to link them into a PIE executable will fail
with an error like:

ld: error: can't create dynamic relocation R_X86_64_32 against local
symbol in readonly segment; recompile object files with -fPIC or pass
'-Wl,-z,notext' to allow text relocations in the output

I am not aware of any configuration that would link successfully, but
then have some run-time failure. If it builds it should work.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-25 Thread Ed Maste
On Thu, 25 Feb 2021 at 18:10, Greg 'groggy' Lehey  wrote:
>
> This details worries me.  How compatible are PIE executables with
> non-PIE executables?  Can I run PIE executables on older systems?  Can
> I run older executables on a PIE system?

There is no issue mixing PIE and non-PIE binaries, and they introduce
no additional constraints on running on older kernels.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-25 Thread John Kennedy
On Fri, Feb 26, 2021 at 10:10:28AM +1100, Greg 'groggy' Lehey wrote:
> On Thursday, 25 February 2021 at 15:58:07 -0500, Ed Maste wrote:
> > As of 9a227a2fd642 (main-n245052) base system binaries are now built
> > as position-independent executable (PIE) by default, for 64-bit
> > architectures. ...
> >
> > If you track -CURRENT and normally build WITHOUT_CLEAN you'll need to
> > do one initial clean build -- either run `make cleanworld` or set
> > WITH_CLEAN=yes.
> 
> This details worries me.  How compatible are PIE executables with
> non-PIE executables?  Can I run PIE executables on older systems?  Can
> I run older executables on a PIE system?

  Assuming we're basically talking about WITH_PIE=YES in /etc/src.conf, I've 
been doing this since 2020/08/04 (12.1 -> 12.2 -> 13/14).  I don't think
I've associated any problems with PIE.  I've certainly got lots of non-PIE
ports linked against base libraries (but ELF 64-bit LSB shared object, vs
ELF 64-bit LSB pie executable).  The E in PIE is executable.

  Not sure if Ed Maste just wants to make sure that all the executables
are rebuilt as PIE (vs hit-and-miss) or there is a sneaker corner-case that
he knows about.

  I can't say that I've had an opportunity to try the scenario I think you're
looking at.  My "older" crossovers are +/- a __FreeBSD_version bump.

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS-UP: PIE enabled by default on main

2021-02-25 Thread Greg 'groggy' Lehey
On Thursday, 25 February 2021 at 15:58:07 -0500, Ed Maste wrote:
> As of 9a227a2fd642 (main-n245052) base system binaries are now built
> as position-independent executable (PIE) by default, for 64-bit
> architectures. PIE executables are used in conjunction with address
> randomization as a mitigation for certain types of security
> vulnerabilities.
>
> If you track -CURRENT and normally build WITHOUT_CLEAN you'll need to
> do one initial clean build -- either run `make cleanworld` or set
> WITH_CLEAN=yes.

This details worries me.  How compatible are PIE executables with
non-PIE executables?  Can I run PIE executables on older systems?  Can
I run older executables on a PIE system?

Greg
--
Sent from my desktop computer.
See complete headers for address and phone numbers.
This message is digitally signed.  If your Microsoft mail program
reports problems, please read http://lemis.com/broken-MUA


signature.asc
Description: PGP signature


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-04 Thread Conrad Meyer
Typo:

On Mon, Jan 4, 2021 at 5:25 PM Conrad Meyer  wrote:
> SHA1 has always, by design, been vulnerable to a 2^80 resource attack :-).

2^160 for a specific hash.  2^80 if you're just trying to find any collision.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-04 Thread Conrad Meyer
On Mon, Jan 4, 2021 at 1:44 PM Ryan Stone  wrote:
> FWIW, a coworker of mine had a little hobby of introducing commits
> into our internal repro that had hashes that all started with
> deadc0de.  As I understand it, it was able to do this by adding an
> bogus attribute with the right value to the commit object.

Yeah, the git commit object is essentially text with some headers, and
the git tools are all permissive of unrecognized headers.  You can
create a "visually identical" commit (same commit message, parent
commit(s), author/committer/dates, etc) by just adding an extra header
with an arbitrary value and brute force on that value to find a vanity
prefix.  This isn't anything related to the SHA1 attacks, it's just
brute-forcing the output of a truncated SHA1 to a 1-in-2^32 result.

E.g., https://github.com/cemeyer/gitbrutec does it by injecting a
header named "x-gitbrutec-nonce."

$ git cat-file -p 009
tree 4e778673b8af45ecd4c62e8b1d1438d06db7f440
parent 0080b4fc4c2066fa05641e73d5f0985c15ea
author Conrad Meyer  1590357489 -0700
committer Conrad Meyer  1590357489 -0700
x-gitbrutec-nonce YYZSKGIQCLLXGE

Use 'git update-ref' in post-commit example
...

> Now,
> brute-forcing 8 digits in the hash is one thing and doing it for all
> 40 is quite another, but I suspect that this demonstrates that it's
> *possible* to do it for a git hash, given enough computing resources.

SHA1 has always, by design, been vulnerable to a 2^80 resource attack :-).

Best,
Conrad
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-04 Thread Ryan Stone
On Mon, Jan 4, 2021 at 3:44 PM Poul-Henning Kamp  wrote:
> Shattered is less impressive when you take into account that you
> can stuff as much much garbage into a PDF file as you need, without
> affecting the files normal function.
>
> Compact data formats, formats which leave no wiggle-room and do not
> offer extension-space for "attic-junk", are much harder to produce
> *meaningful* collisions for.
>
> (I take no opinion in where git is on that spectrum.)

FWIW, a coworker of mine had a little hobby of introducing commits
into our internal repro that had hashes that all started with
deadc0de.  As I understand it, it was able to do this by adding an
bogus attribute with the right value to the commit object.  Now,
brute-forcing 8 digits in the hash is one thing and doing it for all
40 is quite another, but I suspect that this demonstrates that it's
*possible* to do it for a git hash, given enough computing resources.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-04 Thread Poul-Henning Kamp

John-Mark Gurney writes:

> SHAttered[1] (2017) created two valid PDF documents which had the same
> SHA-1 hash.  The issue was that they were able to choose the entire
> document.

Shattered is less impressive when you take into account that you
can stuff as much much garbage into a PDF file as you need, without
affecting the files normal function.

Compact data formats, formats which leave no wiggle-room and do not
offer extension-space for "attic-junk", are much harder to produce
*meaningful* collisions for.

(I take no opinion in where git is on that spectrum.)

This is why I am very sceptical of the recent fashion of "GREASING"
which the TLS WG have invented:  To me that sounds like somebody
is allocating wiggle-room for advanced cryptographic skullduggery.

-- 
Poul-Henning Kamp   | UNIX since Zilog Zeus 3.20
p...@freebsd.org | TCP/IP since RFC 956
FreeBSD committer   | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-04 Thread John-Mark Gurney
RW wrote this message on Fri, Jan 01, 2021 at 16:56 +:
> On Thu, 31 Dec 2020 21:25:08 -0500
> grarpamp wrote:
> 
> > > Is there any reason to think [bittorrent] insecure?  
> > 
> > Cost under $50k of compute to break sha-1, 
> 
> AFAIK you cannot break SHA-1 in the sense of creating data that
> matches a specific hash. What you can do is create a collision between
> two blocks of data, varying both blocks in the process. This makes
> SHA-1 unsuitable for digital signatures.

TL;DR: No, SHA-1 is broken.  PERIOD.

SHAttered[1] (2017) created two valid PDF documents which had the same
SHA-1 hash.  The issue was that they were able to choose the entire
document.

The paper released in 2019[2] and implemented in 2020 allows for
chosen-prefix attacks[3] which means that SHA-1 is broken.

It allows the creation of a different message prefix, but results in
the same hash.  Before this, git was "secure" in that objects were
prepended w/ length and size, but w/ this latest attack, those
can now be changed as well, allowing someone to wholesale replace
a file in git w/ a different length, and the SHA-1 hash being
the same.

> A *third-party* attacker cannot create a bogus torrent using a
> collision attack against SHA-1 because the attacker would need to match
> a specific hash value. 

Wrong, see above.

> What may be possible is that the creator of the legitimate torrent
> might create two torrents with the same hash, but this seems very
> contrived and not very useful. It has all sorts of problems as a way of
> delivering targeted malware.

Again, wrong.

[1] 
https://en.wikipedia.org/wiki/SHA-1#SHAttered_%E2%80%93_first_public_collision
[2] 
https://en.wikipedia.org/wiki/SHA-1#Birthday-Near-Collision_Attack_%E2%80%93_first_practical_chosen-prefix_attack
[3] 
https://en.wikipedia.org/wiki/Collision_attack#Chosen-prefix_collision_attack

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 "All that I will do, has been done, All that I have, has not."
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-02 Thread grarpamp
>> Though it can help attribute that to a source,

Meaning to source 'account', vs say weak old CVSROOT
that any could text edit on 200 account box, claim bitrot, etc.
Whether inspiration came from the pet dog's bug report
is moot, more secure systems narrow into accounts that
would then be examined for sensibility post. Even better before
then, said fun audit teams raise the cost to compromising
all N randomly changing slots on it, much harder to game than
a single endpoint. Audit counters by a bit different path than the
IT-people problems, does insert time in the process, yet can also
payoff by quality, and by rotating participants gaining broader
experience with entire codebase, and can even payout from said
10x crypto pot for bugs. Defense in depth, many knobs in the
orchestra, turn to set how you want, yet consider before leaving
any set too near zero.

Good that git monotone hashtrees keys TLS sigs pubkey
fingerprints pins TOTP automated lint coverage fuzzing zfs-skein,
etc displacing equivalents of legacy telnet CVSROOT, in some
OS and projects finally, and that development, being users too,
have interest benefit in, and can contribute to that areas and
transitions too.

Happy hacking in 2021 :)
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-02 Thread Poul-Henning Kamp

grarpamp writes:

> > No amount of cryptography can or will protect against that.
>
> Though it can help attribute that to a source,

No.

You would end up with the committer saying "it came in as a bug-report,
I looked at it, and it looked sensible so I committed it."

Unless you are going to *enforce* (how?!) that all committers only
commit patches they received under full cryptographic & biometric
custody from verified communications partners, it will always end
up being unattributable.

Even if you were able to pin the blame on a particular committer,
that person would simply cease to exist, because it was only a cover
identity to begin with.

> > As interesting as this thread has been (not!)
>
> Contrare.
> [...]
> Defense in depth.

... is a lot harder than most IT-people realize, because most
IT-people almost invariably ignore the entire human and political
aspect of the problem.

See also:  "Operation Orchestra" by yours truly.

-- 
Poul-Henning Kamp   | UNIX since Zilog Zeus 3.20
p...@freebsd.org | TCP/IP since RFC 956
FreeBSD committer   | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-02 Thread Mark Linimon
Folks, please change the Subject: line here.  This has now become a
thread of only tangiental interest to a typical FreeBSD developer
(in this case, typified by me :-) )

mcl
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-02 Thread grarpamp
> No amount of cryptography can or will protect against that.

Though it can help attribute that to a source,
else ignore rainbow books and go back to telnet,
root password 'root', CVS, no backups, logs, etc.

> As interesting as this thread has been (not!)

Contrare.
Equally as interesting as thread's and
other details, is how to attend that too.
Luck playing guess the mole and trying to
SF-86 and p2p everyone only goes so far.
Stronger layered yet is a [change] audit group,
selected randomly and randomly rotated through,
all who must approve.
And to provide alt eyes and counter self project bias,
a review trade market with other OS projects denominated
in LOC [fair weighted by spaghetti and doc ratios].
Pay for more coverage by foundation holding back
1/4 of its crypto donations and mining as investment.

Defense in depth.

Have fun.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-01 Thread Poul-Henning Kamp
As interesting as this thread has been (not!), let me remind everybody
that the cheapest, easiest and most efficient and profitable way
for a Nation State Actor to trojan the FreeBSD code-base, is to
assign an employee to a deniable job, and have them become a FreeBSD
committer.

No amount of cryptography can or will protect against that.

-- 
Poul-Henning Kamp   | UNIX since Zilog Zeus 3.20
p...@freebsd.org | TCP/IP since RFC 956
FreeBSD committer   | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-01 Thread Shawn Webb
On Sat, Jan 02, 2021 at 08:37:14AM +0800, Li-Wen Hsu wrote:
> On Sat, Jan 2, 2021 at 4:25 AM Christian Weisgerber  
> wrote:
> >
> > On 2021-01-01, Shawn Webb  wrote:
> >
> > > This is why I asked FreeBSD to provide anonymous read-only ssh://
> > > support for git. I'm very grateful they support it.
> > >
> > > One thing that I need to do with the HardenedBSD infrastructure is
> > > publish on our site the ssh pubkeys of the server (both RSA and
> > > ed25519). I plan to do that sometime this coming week. I wonder if it
> > > would be a good idea for FreeBSD to do the same
> >
> > The draft FreeBSD Git docs have the SSH fingerprints of the Git
> > servers.
> > https://github.com/bsdimp/freebsd-git-docs/blob/main/URLs.md
> >
> > Here's one from my own ~/.ssh/known_hosts:
> > SHA256:y1ljKrKMD3lDObRUG3xJ9gXwEIuqnh306tSyFd1tuZE git.freebsd.org (ED25519)
> 
> And the ssh-keys file is available on the project site, signed with
> security-officer's key:
> 
> https://www.freebsd.org/internal/ssh-keys.asc
> 
> And in that file's header:
> """
> Note that all machines listed below also have signed SSHFP records in
> DNS.  If you have a DNSSEC-aware resolver and set VerifyHostKeyDNS to
> "ask" or "yes" in ~/.ssh/config, OpenSSH will verify host keys against
> these SSHFP records.
> """

Awesome! Thanks for the clarification!

Thanks,

-- 
Shawn Webb
Cofounder / Security Engineer
HardenedBSD

GPG Key ID:  0xFF2E67A277F8E1FA
GPG Key Fingerprint: D206 BB45 15E0 9C49 0CF9  3633 C85B 0AF8 AB23 0FB2
https://git-01.md.hardenedbsd.org/HardenedBSD/pubkeys/src/branch/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc


signature.asc
Description: PGP signature


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-01 Thread Li-Wen Hsu
On Sat, Jan 2, 2021 at 4:25 AM Christian Weisgerber  wrote:
>
> On 2021-01-01, Shawn Webb  wrote:
>
> > This is why I asked FreeBSD to provide anonymous read-only ssh://
> > support for git. I'm very grateful they support it.
> >
> > One thing that I need to do with the HardenedBSD infrastructure is
> > publish on our site the ssh pubkeys of the server (both RSA and
> > ed25519). I plan to do that sometime this coming week. I wonder if it
> > would be a good idea for FreeBSD to do the same
>
> The draft FreeBSD Git docs have the SSH fingerprints of the Git
> servers.
> https://github.com/bsdimp/freebsd-git-docs/blob/main/URLs.md
>
> Here's one from my own ~/.ssh/known_hosts:
> SHA256:y1ljKrKMD3lDObRUG3xJ9gXwEIuqnh306tSyFd1tuZE git.freebsd.org (ED25519)

And the ssh-keys file is available on the project site, signed with
security-officer's key:

https://www.freebsd.org/internal/ssh-keys.asc

And in that file's header:
"""
Note that all machines listed below also have signed SSHFP records in
DNS.  If you have a DNSSEC-aware resolver and set VerifyHostKeyDNS to
"ask" or "yes" in ~/.ssh/config, OpenSSH will verify host keys against
these SSHFP records.
"""

Best,
Li-Wen
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-01 Thread RW
On Thu, 31 Dec 2020 21:25:08 -0500
grarpamp wrote:


> > Is there any reason to think [bittorrent] insecure?  
> 
> Cost under $50k of compute to break sha-1, 

AFAIK you cannot break SHA-1 in the sense of creating data that
matches a specific hash. What you can do is create a collision between
two blocks of data, varying both blocks in the process. This makes
SHA-1 unsuitable for digital signatures.

A *third-party* attacker cannot create a bogus torrent using a
collision attack against SHA-1 because the attacker would need to match
a specific hash value. 

What may be possible is that the creator of the legitimate torrent
might create two torrents with the same hash, but this seems very
contrived and not very useful. It has all sorts of problems as a way of
delivering targeted malware.

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-01 Thread Christian Weisgerber
On 2021-01-01, Shawn Webb  wrote:

> This is why I asked FreeBSD to provide anonymous read-only ssh://
> support for git. I'm very grateful they support it.
>
> One thing that I need to do with the HardenedBSD infrastructure is
> publish on our site the ssh pubkeys of the server (both RSA and
> ed25519). I plan to do that sometime this coming week. I wonder if it
> would be a good idea for FreeBSD to do the same

The draft FreeBSD Git docs have the SSH fingerprints of the Git
servers.
https://github.com/bsdimp/freebsd-git-docs/blob/main/URLs.md

Here's one from my own ~/.ssh/known_hosts:
SHA256:y1ljKrKMD3lDObRUG3xJ9gXwEIuqnh306tSyFd1tuZE git.freebsd.org (ED25519)

-- 
Christian "naddy" Weisgerber  na...@mips.inka.de
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2021-01-01 Thread Shawn Webb
On Thu, Dec 31, 2020 at 09:25:08PM -0500, grarpamp wrote:
> > There is already HTTPS to protect the "authenticity" of the magnet
> > link.
> 
> No. FreeBSD fails to publish signed fingerprints of their TLS pubkeys,
> therefore users can't pin them down, therefore any MITM can bypass
> CA game and MITM attack users at will, feed them bogus infohash,
> isos, git repo tofu, pkg, etc. MITM is bad, MITM is in use,
> and MITM fails when sig'd, verified, and pinned.

There's also nation states that require use of a nation state-owned
root CA cert so that they can MITM every single SSL/TLS connection.
Connections that don't use/support their custom trusted root cert are
either blocked or reported (or both). In this case, MITM isn't
theoretically broken, it's broken in practice. And, it's broken in the
worst case scenario: downloading source code that the nation state can
modify in-transit.

This is why I asked FreeBSD to provide anonymous read-only ssh://
support for git. I'm very grateful they support it. I also use it for
HardenedBSD's sync scripts due to my own distrust of browser-based
SSL/TLS PKI, even in the USA.

One thing that I need to do with the HardenedBSD infrastructure is
publish on our site the ssh pubkeys of the server (both RSA and
ed25519). I plan to do that sometime this coming week. I wonder if it
would be a good idea for FreeBSD to do the same (note: I'm not trying
to commit FreeBSD to do any work; I'm just spitballing ideas.)

Thanks,

-- 
Shawn Webb
Cofounder / Security Engineer
HardenedBSD

GPG Key ID:  0xFF2E67A277F8E1FA
GPG Key Fingerprint: D206 BB45 15E0 9C49 0CF9  3633 C85B 0AF8 AB23 0FB2
https://git-01.md.hardenedbsd.org/HardenedBSD/pubkeys/src/branch/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc


signature.asc
Description: PGP signature


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-31 Thread grarpamp
> There is already HTTPS to protect the "authenticity" of the magnet
> link.

No. FreeBSD fails to publish signed fingerprints of their TLS pubkeys,
therefore users can't pin them down, therefore any MITM can bypass
CA game and MITM attack users at will, feed them bogus infohash,
isos, git repo tofu, pkg, etc. MITM is bad, MITM is in use,
and MITM fails when sig'd, verified, and pinned.

> Yes, someone could vandalize the wiki page but I'm now
> subscribed and will notice it...

Only if they go through your front door.

> Also, magnet links are not officially supported the project.
> provide them because I think it's useful, and there are some people
> who request them...

transmission-bt, aria2, etc fast, easy, distributed sharing.
But needs backed by real sigs.

> It's difficult to educate people on these points..

Especially when poor examples to observe and learn from
continue among infrastructures and even educators.

> snapaid was designed to make it even easier...

So they've learned some provider specific edge tool,
not general gpg, or even wider security. Oh well.

> Is there any reason to think [bittorrent] insecure?

Cost under $50k of compute to break sha-1, multiply
that by SolarWinds size distribution clouds under tofu,
collect your winnings based on your node count.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-31 Thread RW
On Thu, 31 Dec 2020 11:39:08 -0800
John-Mark Gurney wrote:

> grarpamp wrote this message on Wed, Dec 30, 2020 at 00:55 -0500:
> > > signatures of the magnet links  
> > 
> > Signing torrent.asc, with stronger or even same hash as BT
> > protocol, still serve purpose of authenticate torrent file back
> > to a signer to the degree therein, caveat their platform security,
> > caveat sha-1 inside torrent still being abuseable by third party,
> > caveat etc
> One of the large parts of security is that not everyone knows the
> in's and out's of security, so people who don't know, will have heard
> that SHA-1 is a cryptographic hash, and assume that something is
> secure when using it.  

Is there any reason to think it's insecure?  Even if a collision attack
can be make to work against bittorrent, the attacker would need to have
control over the contents of the legitimate torrent as well as the
bogus one.

It wouldn't be "abuseable by third party".
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-31 Thread John-Mark Gurney
grarpamp wrote this message on Wed, Dec 30, 2020 at 00:55 -0500:
> > signatures of the magnet links
> 
> Signing torrent.asc, with stronger or even same hash as BT
> protocol, still serve purpose of authenticate torrent file back
> to a signer to the degree therein, caveat their platform security,
> caveat sha-1 inside torrent still being abuseable by third party,
> caveat etc. With no torrent.asc there is nothing directly saying
> the torrent file / infohash itself went through freebsd project.
> Whether torrent or git or else, there can be useable scope
> and case for such "stronger over weaker" constructions.

There is already HTTPS to protect the "authenticity" of the magnet
link.  Yes, someone could vandalize the wiki page but I'm now
subscribed and will notice it...

Also, magnet links are not officially supported the project..  I
provide them because I think it's useful, and there are some people
who request them...

One of the large parts of security is that not everyone knows the
in's and out's of security, so people who don't know, will have heard
that SHA-1 is a cryptographic hash, and assume that something is secure
when using it.  It's difficult to educate people on these points..

> gpg offers better hash algos than sha-1 these days,
> all users should look into configuring and using it,
> same goes for abandoning the old [a]symmetric algos
> and weaker keys, made with old weak /dev/random, etc.
> 
> One cannot sign or verify anything without knowing gpg first :)

snapaid was designed to make it even easier...

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 "All that I will do, has been done, All that I have, has not."
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-29 Thread grarpamp
>> SHA-256 arrives, if you look at the git history.

> git's SHA-256 [...] requiring a super new git version to even test it out.

It's "in" current release 2.30.0 and before, duly caveated as experimental
and not fully featured yet...

git-init(1)
   --object-format=
   Specify the given object format (hash algorithm) for the
   repository. The valid values are sha1 and (if enabled) sha256.
   sha1 is the default.

> continue to test how well it works and monitor the
> ecosystem for a transition in a few years when it is robust..

Sure, though perhaps freebsd may then find to enjoy a more
middle lead, ahead than the rather later move of svn->git,
and being already git it will be far less work.

There should be some freebsd press release when the
current git deploy is all done, as new people from outside
will like to know last big OS is on git and then use it more too.

> signatures of the magnet links

Signing torrent.asc, with stronger or even same hash as BT
protocol, still serve purpose of authenticate torrent file back
to a signer to the degree therein, caveat their platform security,
caveat sha-1 inside torrent still being abuseable by third party,
caveat etc. With no torrent.asc there is nothing directly saying
the torrent file / infohash itself went through freebsd project.
Whether torrent or git or else, there can be useable scope
and case for such "stronger over weaker" constructions.

gpg offers better hash algos than sha-1 these days,
all users should look into configuring and using it,
same goes for abandoning the old [a]symmetric algos
and weaker keys, made with old weak /dev/random, etc.

One cannot sign or verify anything without knowing gpg first :)

And even port called "age" is of simple utility too.
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-29 Thread Chris

On 2020-12-29 20:59, Chris wrote:

On 2020-12-29 16:46, John-Mark Gurney wrote:

Steffen Nurpmeso wrote this message on Tue, Dec 29, 2020 at 22:04 +0100:

 |SolarWinds supply chain attack, being able to smuggle a modified file
 |into a git repo, say an OS's build server, such that the tools don't
 |know the tree is modified is a real problem...

SHA-256 arrives, if you look at the git history.  Until then
signing a git tag even with SHA-1 is better than being unsealed.


Actually, no it is not.  It provides a false sense a security.  SHA-1
should only be used as a checksum (detecting non-malicous corruption)
now.

There's a reason I stopped signing (and even removed the historical
signatures) of the magnet links that I produce for FreeBSD.

This is also why I expanded the snapaid tool to support releases, to
make it extermely easy to verify signatures:
https://www.funkthat.com/gitea/jmg/snapaid


This attack, well, interesting that FreeBSD with so many
developers with ssh push hasn't been soiled more often.  I am


And that is why it isn't a major problem yet, in that there are
additional layers of security, both ssh and https that help
ensure integrity of the repo in transit...


cautious regarding such, there is a tremendous amount of
propaganda against Russia and China going on .. and then who
tapped the cables, who has the budget, hmm.  I have read one US
national security alert report once, and all i could see was


I am well aware of this, and infact, the reason I've been pushing
for better security like this IS because of the actions of the NSA...
I used to get lunch on a weekly basis across the street from one
of the early revealed NSA wiretap rooms.

OK I've been pondering this since last night. If this is a reasonable
concern, and given all that's already gone into coercing git into
something FreeBSD friendly. Is it reasonable to consider putting all
that effort that's already been excreted, and what would need to be
done. To cobble up a FreeBSD version? [tongue-in-cheek]
fuk-git -- FreeBSDUsersCare-git. Sorry. It's a strain. But I needed

face-palm; that was: fuc-git. A failed attempt at wit. :-(
the rest holds true.

that acronym.
Seriously tho. It wouldn't be that hard to provide sha384(1) at a minimum.
Better; hmac-sha384, or any of a number of other digests. I'm just
thinking that if everyone pitched in, what with all the other work
that's already been done. It'd all get done on a timeline that wouldn't
leave the FreeBSD repo unsafe.
Mind you; much of this is all conceptual. But I just thought (hoped) it
might be worth while.

--Chris
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-29 Thread Chris

On 2020-12-29 16:46, John-Mark Gurney wrote:

Steffen Nurpmeso wrote this message on Tue, Dec 29, 2020 at 22:04 +0100:

 |SolarWinds supply chain attack, being able to smuggle a modified file
 |into a git repo, say an OS's build server, such that the tools don't
 |know the tree is modified is a real problem...

SHA-256 arrives, if you look at the git history.  Until then
signing a git tag even with SHA-1 is better than being unsealed.


Actually, no it is not.  It provides a false sense a security.  SHA-1
should only be used as a checksum (detecting non-malicous corruption)
now.

There's a reason I stopped signing (and even removed the historical
signatures) of the magnet links that I produce for FreeBSD.

This is also why I expanded the snapaid tool to support releases, to
make it extermely easy to verify signatures:
https://www.funkthat.com/gitea/jmg/snapaid


This attack, well, interesting that FreeBSD with so many
developers with ssh push hasn't been soiled more often.  I am


And that is why it isn't a major problem yet, in that there are
additional layers of security, both ssh and https that help
ensure integrity of the repo in transit...


cautious regarding such, there is a tremendous amount of
propaganda against Russia and China going on .. and then who
tapped the cables, who has the budget, hmm.  I have read one US
national security alert report once, and all i could see was


I am well aware of this, and infact, the reason I've been pushing
for better security like this IS because of the actions of the NSA...
I used to get lunch on a weekly basis across the street from one
of the early revealed NSA wiretap rooms.

OK I've been pondering this since last night. If this is a reasonable
concern, and given all that's already gone into coercing git into
something FreeBSD friendly. Is it reasonable to consider putting all
that effort that's already been excreted, and what would need to be
done. To cobble up a FreeBSD version? [tongue-in-cheek]
fuk-git -- FreeBSDUsersCare-git. Sorry. It's a strain. But I needed
that acronym.
Seriously tho. It wouldn't be that hard to provide sha384(1) at a minimum.
Better; hmac-sha384, or any of a number of other digests. I'm just
thinking that if everyone pitched in, what with all the other work
that's already been done. It'd all get done on a timeline that wouldn't
leave the FreeBSD repo unsafe.
Mind you; much of this is all conceptual. But I just thought (hoped) it
might be worth while.

--Chris
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-29 Thread John-Mark Gurney
Steffen Nurpmeso wrote this message on Tue, Dec 29, 2020 at 22:04 +0100:
>  |SolarWinds supply chain attack, being able to smuggle a modified file
>  |into a git repo, say an OS's build server, such that the tools don't
>  |know the tree is modified is a real problem...
> 
> SHA-256 arrives, if you look at the git history.  Until then
> signing a git tag even with SHA-1 is better than being unsealed.

Actually, no it is not.  It provides a false sense a security.  SHA-1
should only be used as a checksum (detecting non-malicous corruption)
now.

There's a reason I stopped signing (and even removed the historical
signatures) of the magnet links that I produce for FreeBSD.

This is also why I expanded the snapaid tool to support releases, to
make it extermely easy to verify signatures:
https://www.funkthat.com/gitea/jmg/snapaid

> This attack, well, interesting that FreeBSD with so many
> developers with ssh push hasn't been soiled more often.  I am

And that is why it isn't a major problem yet, in that there are
additional layers of security, both ssh and https that help
ensure integrity of the repo in transit...

> cautious regarding such, there is a tremendous amount of
> propaganda against Russia and China going on .. and then who
> tapped the cables, who has the budget, hmm.  I have read one US
> national security alert report once, and all i could see was

I am well aware of this, and infact, the reason I've been pushing
for better security like this IS because of the actions of the NSA...
I used to get lunch on a weekly basis across the street from one
of the early revealed NSA wiretap rooms.

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 "All that I will do, has been done, All that I have, has not."
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-29 Thread Steffen Nurpmeso
John-Mark Gurney wrote in
 <20201229011939.gu31...@funkthat.com>:
 |Steffen Nurpmeso wrote this message on Wed, Dec 23, 2020 at 17:24 +0100:
 |>|Then there's also the point that the repo is (looks like it) using
 |>|SHA-1 hashes, which are effectively broken, so depending upon them
 |>|to validate the tree is questionable anyways.
 |> 
 |> git uses the hardened SHA-1 for sure, which is, as far as i know,
 |> at least safe against the known attack.
 |> I .. have not tracked this, but i think upgrading to SHA-256 is
 |> possible, once this will become standard.  Just even more
 |> metadata, then.  I have not looked into this, still in progress.
 |
 |A new attack came out earlier this year:
 |https://eprint.iacr.org/2020/014.pdf

Impressive document.  Not a mathematician here, but still.

 |>From the paper:
 |> In particular, chosen-prefix collisions can break signature schemes and
 |> handshake security in secure channel protocols (TLS, SSH), if generated
 |> extremely quickly.
 |
 |The previous attack in 2017 did not break SHA-1 enough to render it's
 |use by git vulnerable, but the writing was on the wall for SHA-1...
 |
 |I believe this new attack makes git's use a SHA-1 vulnerable...
 |The type/length prefix that prevented the previous attacks from
 |working is not effective against the new attack...
 |
 |Also, the cost of the attack is not great ($45k), considering the recent

Ha.

 |SolarWinds supply chain attack, being able to smuggle a modified file
 |into a git repo, say an OS's build server, such that the tools don't
 |know the tree is modified is a real problem...

SHA-256 arrives, if you look at the git history.  Until then
signing a git tag even with SHA-1 is better than being unsealed.

This attack, well, interesting that FreeBSD with so many
developers with ssh push hasn't been soiled more often.  I am
cautious regarding such, there is a tremendous amount of
propaganda against Russia and China going on .. and then who
tapped the cables, who has the budget, hmm.  I have read one US
national security alert report once, and all i could see was
a supposed russian who logged into an open management console, and
immediately logged out again (if the session was printed
correctly).  On some software where this login possibility was
publicly announced as being a problem months before.  (I read
around once i read this report.) So given that the software would
at least log such login attempts it could even have been seen as
a kind reminder, whatever.  Maybe not.  Was it "national security
alert"?, i think yes.  Well.  It is always easy to point with
fingers at someone else.  But as always, situation is horror.

--steffen
|
|Der Kragenbaer,The moon bear,
|der holt sich munter   he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-28 Thread Warner Losh
On Mon, Dec 28, 2020, 6:19 PM John-Mark Gurney  wrote:

> Steffen Nurpmeso wrote this message on Wed, Dec 23, 2020 at 17:24 +0100:
> >  |Then there's also the point that the repo is (looks like it) using
> >  |SHA-1 hashes, which are effectively broken, so depending upon them
> >  |to validate the tree is questionable anyways.
> >
> > git uses the hardened SHA-1 for sure, which is, as far as i know,
> > at least safe against the known attack.
> > I .. have not tracked this, but i think upgrading to SHA-256 is
> > possible, once this will become standard.  Just even more
> > metadata, then.  I have not looked into this, still in progress.
>
> A new attack came out earlier this year:
> https://eprint.iacr.org/2020/014.pdf
>
> From the paper:
> > In particular, chosen-prefix collisions can break signature schemes and
> > handshake security in secure channel protocols (TLS, SSH), if generated
> > extremely quickly.
>
> The previous attack in 2017 did not break SHA-1 enough to render it's
> use by git vulnerable, but the writing was on the wall for SHA-1...
>
> I believe this new attack makes git's use a SHA-1 vulnerable...
> The type/length prefix that prevented the previous attacks from
> working is not effective against the new attack...
>
> Also, the cost of the attack is not great ($45k), considering the recent
> SolarWinds supply chain attack, being able to smuggle a modified file
> into a git repo, say an OS's build server, such that the tools don't
> know the tree is modified is a real problem...
>

Yea. The git transition team knew about these issues (though the referenced
paper is new). Too bad git's SHA-256 stuff is too immature to use yet at
scale, coupled with requiring a super new git version to even test it out.
Plus, much of the greater git ecosystem simply doesn't support SHA-256 yet.
We should, as a project, continue to test how well it works and monitor the
ecosystem for a transition in a few years when it is robust...

Warner

-- 
>   John-Mark Gurney  Voice: +1 415 225 5579
>
>  "All that I will do, has been done, All that I have, has not."
> ___
> freebsd-current@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
>
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-28 Thread John-Mark Gurney
Steffen Nurpmeso wrote this message on Wed, Dec 23, 2020 at 17:24 +0100:
>  |Then there's also the point that the repo is (looks like it) using
>  |SHA-1 hashes, which are effectively broken, so depending upon them
>  |to validate the tree is questionable anyways.
> 
> git uses the hardened SHA-1 for sure, which is, as far as i know,
> at least safe against the known attack.
> I .. have not tracked this, but i think upgrading to SHA-256 is
> possible, once this will become standard.  Just even more
> metadata, then.  I have not looked into this, still in progress.

A new attack came out earlier this year:
https://eprint.iacr.org/2020/014.pdf

>From the paper:
> In particular, chosen-prefix collisions can break signature schemes and
> handshake security in secure channel protocols (TLS, SSH), if generated
> extremely quickly.

The previous attack in 2017 did not break SHA-1 enough to render it's
use by git vulnerable, but the writing was on the wall for SHA-1...

I believe this new attack makes git's use a SHA-1 vulnerable...
The type/length prefix that prevented the previous attacks from
working is not effective against the new attack...

Also, the cost of the attack is not great ($45k), considering the recent
SolarWinds supply chain attack, being able to smuggle a modified file
into a git repo, say an OS's build server, such that the tools don't
know the tree is modified is a real problem...

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 "All that I will do, has been done, All that I have, has not."
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-28 Thread John-Mark Gurney
Kurt Jaeger wrote this message on Wed, Dec 23, 2020 at 13:15 +0100:
> Hi!
> 
> > It's also hard to collect ALL the keys of the devs at any point in
> > time to decide if that key is authorized to sign a commit in the
> > repo...
> 
> We do have most of the keys in docs/share/pgpkeys/ plus history.
> 
> > Like if a dev starts in 2021, any commits made by that
> > dev prior to 2021 should not be "valid"..  Then there's also the
> > issue that people's keys change over time, and now you need to know
> > what time period each key was valid for, otherwise a compromised key
> > could be used to insert malicious changes into your/the tree...
> 
> If we manage keys plus their history in the doc repo, this seems
> to be solved.

The data is there, but are you going to write a tool such that it can
be verified?

Then you have the job of verifying the doc repo to make sure that the
keys you have is valid, where does the root of trust come from there?

Not saying it isn't possible, it's just a LOT of work to make it
useful...

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 "All that I will do, has been done, All that I have, has not."
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-26 Thread grarpamp
> We do have most of the keys in docs/share/pgpkeys/ plus history.

https://git.kernel.org/pub/scm/docs/kernel/ksmap
https://git.kernel.org/pub/scm/docs/kernel/pgpkeys
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Rainer Hurling
Am 23.12.20 um 21:55 schrieb Ulrich Spörlein:
> On Wed, 2020-12-23 at 12:19:47 -0800, John Kennedy wrote:
>> On Mon, Dec 21, 2020 at 12:47:38PM -0800, John Kennedy wrote:
>>> On Wed, Dec 16, 2020 at 05:46:35PM -0700, Warner Losh wrote:
>>> > The FreeBSD project will be moving it's source repo from subversion
>>> to git
>>> > starting this this weekend. The docs repo was moved 2 weeks ago.
>>> The ports
>>> > repo will move at the end of March, 2021 due to timing issues. ...
>>>
>>>   I filed Bug 252028 (sys/conf/newvers.sh: git "-dirty" even when
>>> clean),
>>> but that's just a trivial issue with my source tree being marked -dirty
>>> when it isn't, and that would have been part of r368709 anyway.  All my
>>> other git nits have been my own (refs/notes and origin name).
>>
>>  Warner/others, up to r368820, we had log entries that looked like this:
>>
>> commit 3cc0c0d66a065554459bd2f9b4f80cc07426464a
>> Author: Li-Wen Hsu 
>> Date:   Sun Dec 20 02:59:44 2020 +
>> 
>>     Mark the repository as being converted to Git.
>> 
>>     This is the last Subversion commit to src.
>> 
>>     Sponsored by:   The FreeBSD Foundation
>> 
>> Notes:
>>     svn path=/head/; revision=368820
>>
>>  Now, our git logs look like this:
>>
>> commit 17eba5e32a2cf7a217bb9f1e5dcca351f2b71cfc
>> Author: Ed Maste 
>> Date:   Tue Dec 22 23:31:15 2020 -0500
>> 
>>     newvers.sh: fix sense of git dirty check
>> 
>>     Previously we reported -dirty for an unmodified tree, and no
>> -dirty if
>>     there were changes.
>> 
>>     PR: 252028
>>     Reported by:    John Kennedy
>>
>>  (Specifically, no Notes: with revision= value)
> 
> Yes, these notes are merely pointers to the SVN revisions. Without SVN,
> we will of course not get any new notes.
> 
>>  For the kernel I compiled today, the uname output dumps out:
>>
>> FreeBSD 13.0-CURRENT #245 r368820+878d53410f75-c255274(main): ...
>>
>>  Last kernel was (-dirty since fixed):
>>
>> FreeBSD 13.0-CURRENT #244
>> r368820+3cc0c0d66a06-c255241(main)-dirty: ...
>>
>>  So, the r368820-value isn't being updated for it to find anymore. 
>> The middle
>> value corresponds to the git commit and does have value (878d53410f75
>> is your
>> "UPDATING: Announce git transition", 3cc0c0d66a06 was the "Mark the
>> repository
>> as being converted to Git" r368820 commit).
> 
> Yeah, that's a bug in newvers.sh, thanks for pointing that out. It finds
> "some" note in the last 10k revs and then uses that, instead of properly
> falling back to counting from HEAD, which would result in -c255126 or
> something around that.

I built HEAD this afternoon and got 'FreeBSD 13.0-CURRENT #0
92be2847e84-c255272(main): Wed Dec 23 17:39:31 CET 2020'. The counting
seems more correct here?

> We'll fix it ...
> 
> Cheers
> Uli
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Ulrich Spörlein

On Wed, 2020-12-23 at 12:19:47 -0800, John Kennedy wrote:

On Mon, Dec 21, 2020 at 12:47:38PM -0800, John Kennedy wrote:

On Wed, Dec 16, 2020 at 05:46:35PM -0700, Warner Losh wrote:
> The FreeBSD project will be moving it's source repo from subversion to git
> starting this this weekend. The docs repo was moved 2 weeks ago. The ports
> repo will move at the end of March, 2021 due to timing issues. ...

  I filed Bug 252028 (sys/conf/newvers.sh: git "-dirty" even when clean),
but that's just a trivial issue with my source tree being marked -dirty
when it isn't, and that would have been part of r368709 anyway.  All my
other git nits have been my own (refs/notes and origin name).


 Warner/others, up to r368820, we had log entries that looked like this:

commit 3cc0c0d66a065554459bd2f9b4f80cc07426464a
Author: Li-Wen Hsu 
Date:   Sun Dec 20 02:59:44 2020 +

Mark the repository as being converted to Git.

This is the last Subversion commit to src.

Sponsored by:   The FreeBSD Foundation

Notes:
svn path=/head/; revision=368820

 Now, our git logs look like this:

commit 17eba5e32a2cf7a217bb9f1e5dcca351f2b71cfc
Author: Ed Maste 
Date:   Tue Dec 22 23:31:15 2020 -0500

newvers.sh: fix sense of git dirty check

Previously we reported -dirty for an unmodified tree, and no -dirty 
if
there were changes.

PR: 252028
Reported by:John Kennedy

 (Specifically, no Notes: with revision= value)


Yes, these notes are merely pointers to the SVN revisions. Without SVN, 
we will of course not get any new notes.



 For the kernel I compiled today, the uname output dumps out:

FreeBSD 13.0-CURRENT #245 r368820+878d53410f75-c255274(main): ...

 Last kernel was (-dirty since fixed):

FreeBSD 13.0-CURRENT #244 r368820+3cc0c0d66a06-c255241(main)-dirty: ...

 So, the r368820-value isn't being updated for it to find anymore.  The middle
value corresponds to the git commit and does have value (878d53410f75 is your
"UPDATING: Announce git transition", 3cc0c0d66a06 was the "Mark the repository
as being converted to Git" r368820 commit).


Yeah, that's a bug in newvers.sh, thanks for pointing that out. It finds 
"some" note in the last 10k revs and then uses that, instead of properly 
falling back to counting from HEAD, which would result in -c255126 or 
something around that.


We'll fix it ...

Cheers
Uli
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread John Kennedy
On Mon, Dec 21, 2020 at 12:47:38PM -0800, John Kennedy wrote:
> On Wed, Dec 16, 2020 at 05:46:35PM -0700, Warner Losh wrote:
> > The FreeBSD project will be moving it's source repo from subversion to git
> > starting this this weekend. The docs repo was moved 2 weeks ago. The ports
> > repo will move at the end of March, 2021 due to timing issues. ...
> 
>   I filed Bug 252028 (sys/conf/newvers.sh: git "-dirty" even when clean),
> but that's just a trivial issue with my source tree being marked -dirty
> when it isn't, and that would have been part of r368709 anyway.  All my
> other git nits have been my own (refs/notes and origin name).

  Warner/others, up to r368820, we had log entries that looked like this:

commit 3cc0c0d66a065554459bd2f9b4f80cc07426464a
Author: Li-Wen Hsu 
Date:   Sun Dec 20 02:59:44 2020 +

Mark the repository as being converted to Git.

This is the last Subversion commit to src.

Sponsored by:   The FreeBSD Foundation

Notes:
svn path=/head/; revision=368820

  Now, our git logs look like this:

commit 17eba5e32a2cf7a217bb9f1e5dcca351f2b71cfc
Author: Ed Maste 
Date:   Tue Dec 22 23:31:15 2020 -0500

newvers.sh: fix sense of git dirty check

Previously we reported -dirty for an unmodified tree, and no -dirty 
if
there were changes.

PR: 252028
Reported by:John Kennedy

  (Specifically, no Notes: with revision= value)

  For the kernel I compiled today, the uname output dumps out:

FreeBSD 13.0-CURRENT #245 r368820+878d53410f75-c255274(main): ...

  Last kernel was (-dirty since fixed):

FreeBSD 13.0-CURRENT #244 r368820+3cc0c0d66a06-c255241(main)-dirty: ...

  So, the r368820-value isn't being updated for it to find anymore.  The middle
value corresponds to the git commit and does have value (878d53410f75 is your
"UPDATING: Announce git transition", 3cc0c0d66a06 was the "Mark the repository
as being converted to Git" r368820 commit).

  How do you plan on referencing distinct patches now?  If the revision number
is going away, we might as well yank it out since it'll be r368820 forever.

  For my git projects, I often use a "git tag -a" (annotated) commit at useful
milestones, but I'm not sure what you're using it for:

[git describe]
vendor/bc/3.2.3-255270-g3f3cc995a35a

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Renato Botelho

On 23/12/20 15:20, Michael Grimm wrote:

Renato Botelho  wrote:


If you want to switch to a different already existing branch, as svn switch 
does, you should look at git-checkout.

It can be a bit expensive due to the size of src repository so if you do work 
on multiple branches too often you can improve it using git-worktree.


If I understand git-worktree(1) correctly I will most probably not need it, 
because I will only follow one single branch stable/12, and soon stable/13. Or 
do I miss something important?


You are correct.  You can clone stable/12 now and when it's time just do

# git checkout stable/13

--
Renato Botelho
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Michael Grimm
Renato Botelho  wrote:

> If you want to switch to a different already existing branch, as svn switch 
> does, you should look at git-checkout.
> 
> It can be a bit expensive due to the size of src repository so if you do work 
> on multiple branches too often you can improve it using git-worktree.

If I understand git-worktree(1) correctly I will most probably not need it, 
because I will only follow one single branch stable/12, and soon stable/13. Or 
do I miss something important?

Thanks and regards,
Michael
 
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Michael Grimm
Warner Losh  wrote:
> On Wed, Dec 23, 2020 at 7:32 AM Michael Grimm  wrote:

>> With svn I used:
>>svn switch svn://svn.freebsd.org/base/stable/NEW /usr/src
>> 
>> For git I found:
>>git branch -m stable/OLD stable/NEW
>>or
>>git branch -M stable/OLD stable/NEW
> 
> I think the answer is a simple "git checkout NEW". This will replace the
> current tree at branch OLD with the contents of branch NEW.


Thanks to all of you pointing me away from renaming a branch instead of simply 
checking out the branch of interest.


> git branch -m is different and changes what the branch means. If you did
> what you suggested then you'd be renaming the OLD brnach to NEW, which
> isn't what I think you're asking about.

No, I will not apply anything before having it understood. In this case I 
looked into git-branch(1) because I believed this the command to be. Haven't 
found git-checkout(1) :-( Sorry for the noise.

Now, stable/13 may come, I am ready to switch ;-)

Thanks again and regards,
Michael
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Warner Losh
On Wed, Dec 23, 2020 at 7:32 AM Michael Grimm  wrote:

> Hi,
>
> Warner Losh  wrote:
>
> > The FreeBSD project will be moving it's source repo from subversion to
> git
> > starting this this weekend.
>
> First of all I'd like to thank all those involved in this for their
> efforts.
>
> Following
> https://github.com/bsdimp/freebsd-git-docs/blob/main/mini-primer.md form
> your other mail I was able to migrate from svn to git without running into
> any issues.
>
> Right now I am learning how to use git the way I sed svn before. I am just
> following 12-STABLE in order to build world and kernel. I am not
> developing, neither am I committing.
>
> I wonder how one would switch from a currently used branch (OLD) to
> another branch (NEW).
>
> With svn I used:
> svn switch svn://svn.freebsd.org/base/stable/NEW /usr/src
>
> For git I found:
> git branch -m stable/OLD stable/NEW
> or
> git branch -M stable/OLD stable/NEW
>
> git-branch(1):
>With a -m or -M option,  will be renamed to .
> If
> had a corresponding reflog, it is renamed to match
>, and a reflog entry is created to remember the branch
>renaming. If  exists, -M must be used to force the
> rename to
>happen.
>
> I don't understand that text completely, because I don't know what a
> reflog is, yet ;-)
>
> Thus: Should I use "-m" or "-M" in my scenario when switching from
> stable/12 to stable/13 in the near future?
>

I think the answer is a simple "git checkout NEW". This will replace the
current tree at branch OLD with the contents of branch NEW.

git branch -m is different and changes what the branch means. If you did
what you suggested then you'd be renaming the OLD brnach to NEW, which
isn't what I think you're asking about.

Warner
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Brooks Davis
On Tue, Dec 22, 2020 at 06:32:43PM -0800, John-Mark Gurney wrote:
> Steffen Nurpmeso wrote this message on Fri, Dec 18, 2020 at 19:28 +0100:
> > Brooks Davis wrote in
> >  <20201218175241.ga72...@spindle.one-eyed-alien.net>:
> >  |On Thu, Dec 17, 2020 at 05:53:20PM -0800, Thomas Mueller wrote:
> >  |>>> I hope we don't have to start signing all commits.  saltstack/salt has
> >  |>>> that policy, and it's extremely annoying.
> >  |> 
> >  |>> Have to? Not currently. As with all process changes, there will be
> >  |>> community discussion around the different points.
> >  |> 
> >  |>> Warner
> >  |> 
> >  |> I hope not!
> >  |> 
> >  |> Signatures, at least in email messages, are just an annoyance as \
> >  |> I see them.
> >  |> 
> >  |> I don't even know how do sign an email message or make use of a 
> > signatur\
> >  |> e in a message I receive.
> >  |> 
> >  |> I have never made a commit to a repository, so would not be familiar \
> >  |> with signatures there; imagine it would be a barrier.
> >  |
> >  |Signed commits have no practicl effect on users of a repo.
> > 
> > Well you can verify integrity of a repository regardless of how it
> > was distributed, this is why it is done, right.
> > 
> >   #?0$ git log --oneline --show-signature -1 v14.9.20.ar
> >   16a21755 (...)
> >   gpg: Signature made Sun 13 Dec 2020 12:43:44 AM CET
> >   gpg:using RSA key DF082F6AEEC8C2FF
> >   gpg: Good signature from "Steffen Nurpmeso "
> >   Bump S-nail v14.9.20.ar ("Sombre Tit (Trauermeise)"), 2020-12-12
> > 
> >   #?0$ git tag -v v14.9.20.ar; echo $?
> >   object 16a21755fd1fade2b15fdb78a592f12169c3453f
> >   type commit
> >   tag v14.9.20.ar
> >   tagger Steffen Nurpmeso  1607816624 +0100
> >   
> >   Bump S-nail v14.9.20.ar ("Sombre Tit (Trauermeise)"), 2020-12-12
> >   gpg: Signature made Sun 13 Dec 2020 12:43:44 AM CET
> >   gpg:using RSA key DF082F6AEEC8C2FF
> >   gpg: Good signature from "Steffen Nurpmeso "
> >   0
> 
> TL;DR I don't see any reason for devs to sign commits.
> 
> I could see use for RE (or another entity) to occasionally (weekly?)
> sign the repo (say COPYRIGHT or UPDATING), and it would be nice for
> them to sign all the tags used for releases, but having every dev
> would both make the dev's life difficult...

I think RE signing releases makes some sense.  Routine signing of commits
eliminates lots of potentially useful workflows if you also want linear
history.  In particular it makes it impractical to implement any form of
commit-automatically-after-CI type workflows because rebase looses the
signature.

-- Brooks


signature.asc
Description: PGP signature


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Warner Losh
On Wed, Dec 23, 2020 at 3:35 AM Marek Zarychta <
zarych...@plan-b.pwste.edu.pl> wrote:

> W dniu 17.12.2020 o 01:46, Warner Losh pisze:
> > Greetings,
> >
> > The FreeBSD project will be moving it's source repo from subversion to
> git
> > starting this this weekend. The docs repo was moved 2 weeks ago. The
> ports
> > repo will move at the end of March, 2021 due to timing issues.
> >
> > The short version is that we're switching the version control we're
> using.
> > This switch will preserve much of the current FreeBSD development
> workflow.
> > After the switch, the subversion repo will become almost read-only. All
> > future work will be done in git, however as a transition aide we'll be
> > replaying the MFCs to stable/11, stable/12 and the related releng
> branches
> > for the life of those branches.
> >
> > For more detailed information, please see
> > https://github.com/bsdimp/freebsd-git-docs/ for the current
> documentation.
> >
> > Please see https://wiki.freebsd.org/git for the latest detailed schedule
> > (please note that this schedule is subject to change).
> >
> > Warner
> > ___
> > freebsd-current@freebsd.org mailing list
> > https://lists.freebsd.org/mailman/listinfo/freebsd-current
> > To unsubscribe, send any mail to "
> freebsd-current-unsubscr...@freebsd.org"
> >
>
> Will the project utilize gitatributes(5) to support ident as $Id:$ in
> git repository?
>

There are no plans. $Id$, as implemented in git, records the wrong
information. Rather than a commit hash, it's the blob object hash which can
be hard to puzzle out. It would cause way more confusion were we to use it.
Plus, when I did experiments with it, it was slow and difficult to work
with. Given these issues, we've opted to not use it. Plus there's no
documented way to change $Id$ to $FreeBSD$ in an easy way, and the
filtering stuff looked extra fragile.


> In file header, we have now only $FreeBSD$ since svn tags disappeared
> after the transition. Adding ident tags to certain files which are
> updated by mergemaster(8) or etcupdated(8) would be appreciated.
>

mergemaster and etcupdate can cope without them.

Warner
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Steffen Nurpmeso
John-Mark Gurney wrote in
 <20201223023242.gg31...@funkthat.com>:
 |Steffen Nurpmeso wrote this message on Fri, Dec 18, 2020 at 19:28 +0100:
 |> Brooks Davis wrote in
 |>  <20201218175241.ga72...@spindle.one-eyed-alien.net>:
 |>|On Thu, Dec 17, 2020 at 05:53:20PM -0800, Thomas Mueller wrote:
 ...
 |>|Signed commits have no practicl effect on users of a repo.
 |> 
 |> Well you can verify integrity of a repository regardless of how it
 |> was distributed, this is why it is done, right.
 ...

 |TL;DR I don't see any reason for devs to sign commits.
 |
 |I could see use for RE (or another entity) to occasionally (weekly?)
 |sign the repo (say COPYRIGHT or UPDATING), and it would be nice for
 |them to sign all the tags used for releases, but having every dev
 |would both make the dev's life difficult...

Sure.  Signing at least releases makes a lot of sense.
Your idea of periodically sealing the tree is interesting, because
it can even be automatized (dependent on the key).
stable/ patch pumpkins could sign at least the last commit they
cherry pick back to stable, aren't ehy in distress already :)

 |It's also hard to collect ALL the keys of the devs at any point in
 |time to decide if that key is authorized to sign a commit in the
 |repo...  Like if a dev starts in 2021, any commits made by that
 |dev prior to 2021 should not be "valid"..  Then there's also the
 |issue that people's keys change over time, and now you need to know
 |what time period each key was valid for, otherwise a compromised key
 |could be used to insert malicious changes into your/the tree...
 |
 |Then there's also the point that the repo is (looks like it) using
 |SHA-1 hashes, which are effectively broken, so depending upon them
 |to validate the tree is questionable anyways.

git uses the hardened SHA-1 for sure, which is, as far as i know,
at least safe against the known attack.
I .. have not tracked this, but i think upgrading to SHA-256 is
possible, once this will become standard.  Just even more
metadata, then.  I have not looked into this, still in progress.

Imho: devs should show "muchos cojones".
I am sure you appreciate a daunting post, i think it is ok to
quote this post from openssl-...@openssl.org ("Re: Attribution of
pull requests in git"):

  Theodore Ts'o wrote in
   <20140426145907.ga1...@thunk.org>:
   |On Sat, Apr 26, 2014 at 11:29:39AM +0100, Ben Laurie wrote:
   |> I just noticed that if I merge a pull request, then both author and
   |> committer are set to whoever made the pull request.
   |
   |Are you using github, or git using its standard pull request workflow?
   |
   |In the standard git workflow, the author and committer is set to the
   |person who merged the pull.  The person who requested the pull request
   |is recorded in the signed git tag.  For example, I recently signed a
   |git tag:
   |
   |% git tag -s ext4_for_linus_stable
   |
   | 

Wonderful.

   |% git push ssh://gitol...@ra.kernel.org/pub/scm/linux/kernel/git/tytso/e\
   |xt4.git tags/ext4_for_linus_stable
   |
   |   

Ah yes.
Correct enough for German public law television at its best!

   |% git request-pull origin git://git.kernel.org/pub/scm/linux/kernel/git/\
   |tytso/ext4.git tags/ext4_for_linus_stable > /tmp/pull
   |
   |(I have aliases and shell scripts for most of this, but I've expanded
   |all of this out for clarity.)
   |
   |Then I e-mailed the following to Linus, and then after he merged the
   |pull request, when I pulled down his tree, tou can see the following:
   |
   |% git show --pretty=fuller --show-signature  origin
   |commit 9ac03675010a69507c0a9d832d6a722e07d35cc6
   |merged tag 'ext4_for_linus_stable'
   |gpg: Signature made Sun 20 Apr 2014 10:23:16 PM EDT using RSA key ID \
   |C11804F0
   |gpg: Good signature from "Theodore Ts'o "
   |gpg: aka "Theodore Ts'o "
   |gpg: aka "Theodore Ts'o "
   |Merge: a798c10 0a04b24
   |Author: Linus Torvalds 
   |AuthorDate: Sun Apr 20 20:43:47 2014 -0700
   |Commit: Linus Torvalds 
   |CommitDate: Sun Apr 20 20:43:47 2014 -0700

   ...

   |The advantage of doing this way is that git will detach the signature
   |from the tag, and save it in the merge conflict, so years later, the
   |cryptographic accountability chain is preserved in the git tree.
   |
   |Cheers,

Hope that helps.
I personally sign releases and (at least the head of a bunch of)
commits to [master] and [stable] (it is a git alias which does
it).  Looser that i am i have a setup-privacy script on an
encrypted partition that loads keys, unfortunately not even root
can kill -SOMESIG to cause all ssh-agents etc to unload and clear
the loaded keys, therefore i hook acpi and do something like

   if command -v ssh-add >/dev/null 2>&1; then
  for a in /tmp/ssh-*/agent.*; do
 [ -e "$a" ] || continue
 act '( SSH_AUTH_SOCK="$a" ssh-add -D ) /dev/null 2>&1 &'
  done
   fi

Luckily i do not yet use per-user private temporary directories.
All in all it 

Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Lev Serebryakov

On 23.12.2020 18:04, Lev Serebryakov wrote:

On 23.12.2020 17:32, Michael Grimm wrote:


git-branch(1):
    With a -m or -M option,  will    be renamed to . 
If

==

     had a corresponding reflog, it is renamed to    match
    , and    a reflog entry is created to remember the branch
    renaming. If     exists,    -M must    be used    to force 
the rename to
    happen.

I don't understand that text completely, because I don't know what a reflog is, 
yet ;-)

Thus: Should I use "-m" or "-M" in my scenario when switching from stable/12 to 
stable/13 in the near future?

You should not use any options if you want to switch your working copy to new 
branch. `-m` and `-M` *renames* branch!

 I'm idiot today, it is `git checkout ` of course.

--
// Lev Serebryakov
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Lev Serebryakov

On 23.12.2020 17:32, Michael Grimm wrote:


git-branch(1):
With a -m or -M option,  will  be renamed to . If

==

 had a corresponding reflog, it is renamed to  match
, and  a reflog entry is created to remember the branch
renaming. If   exists, -M must be used to force the rename to
happen.

I don't understand that text completely, because I don't know what a reflog is, 
yet ;-)

Thus: Should I use "-m" or "-M" in my scenario when switching from stable/12 to 
stable/13 in the near future?

You should not use any options if you want to switch your working copy to new 
branch. `-m` and `-M` *renames* branch!

--
// Lev Serebryakov
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Renato Botelho

On 23/12/20 11:32, Michael Grimm wrote:

Hi,

Warner Losh  wrote:


The FreeBSD project will be moving it's source repo from subversion to git
starting this this weekend.


First of all I'd like to thank all those involved in this for their efforts.

Following https://github.com/bsdimp/freebsd-git-docs/blob/main/mini-primer.md 
form your other mail I was able to migrate from svn to git without running into 
any issues.

Right now I am learning how to use git the way I sed svn before. I am just 
following 12-STABLE in order to build world and kernel. I am not developing, 
neither am I committing.

I wonder how one would switch from a currently used branch (OLD) to another 
branch (NEW).

With svn I used:
svn switch svn://svn.freebsd.org/base/stable/NEW /usr/src

For git I found:
git branch -m stable/OLD stable/NEW
or
git branch -M stable/OLD stable/NEW

git-branch(1):
With a -m or -M option,  will  be renamed to . If
 had a corresponding reflog, it is renamed to  match
, and  a reflog entry is created to remember the branch
renaming. If   exists, -M must be used to force the rename to
happen.

I don't understand that text completely, because I don't know what a reflog is, 
yet ;-)

Thus: Should I use "-m" or "-M" in my scenario when switching from stable/12 to 
stable/13 in the near future?


git-branch is used to create/delete/rename branches.  If you want to 
switch to a different already existing branch, as svn switch does, you 
should look at git-checkout.


It can be a bit expensive due to the size of src repository so if you do 
work on multiple branches too often you can improve it using git-worktree.


--
Renato Botelho
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Michael Grimm
Hi,

Warner Losh  wrote:

> The FreeBSD project will be moving it's source repo from subversion to git
> starting this this weekend. 

First of all I'd like to thank all those involved in this for their efforts.

Following https://github.com/bsdimp/freebsd-git-docs/blob/main/mini-primer.md 
form your other mail I was able to migrate from svn to git without running into 
any issues.

Right now I am learning how to use git the way I sed svn before. I am just 
following 12-STABLE in order to build world and kernel. I am not developing, 
neither am I committing.

I wonder how one would switch from a currently used branch (OLD) to another 
branch (NEW).

With svn I used:
svn switch svn://svn.freebsd.org/base/stable/NEW /usr/src

For git I found:
git branch -m stable/OLD stable/NEW
or
git branch -M stable/OLD stable/NEW

git-branch(1):
   With a -m or -M option,  will be renamed to . If
had a corresponding reflog, it is renamed to match
   , and a reflog entry is created to remember the branch
   renaming. If  exists, -M must be used to force the rename to
   happen.

I don't understand that text completely, because I don't know what a reflog is, 
yet ;-)

Thus: Should I use "-m" or "-M" in my scenario when switching from stable/12 to 
stable/13 in the near future?

Thanks and regards,
Michael

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Kurt Jaeger
Hi!

> It's also hard to collect ALL the keys of the devs at any point in
> time to decide if that key is authorized to sign a commit in the
> repo...

We do have most of the keys in docs/share/pgpkeys/ plus history.

> Like if a dev starts in 2021, any commits made by that
> dev prior to 2021 should not be "valid"..  Then there's also the
> issue that people's keys change over time, and now you need to know
> what time period each key was valid for, otherwise a compromised key
> could be used to insert malicious changes into your/the tree...

If we manage keys plus their history in the doc repo, this seems
to be solved.

-- 
p...@opsec.eu+49 171 3101372Now what ?
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-23 Thread Marek Zarychta
W dniu 17.12.2020 o 01:46, Warner Losh pisze:
> Greetings,
> 
> The FreeBSD project will be moving it's source repo from subversion to git
> starting this this weekend. The docs repo was moved 2 weeks ago. The ports
> repo will move at the end of March, 2021 due to timing issues.
> 
> The short version is that we're switching the version control we're using.
> This switch will preserve much of the current FreeBSD development workflow.
> After the switch, the subversion repo will become almost read-only. All
> future work will be done in git, however as a transition aide we'll be
> replaying the MFCs to stable/11, stable/12 and the related releng branches
> for the life of those branches.
> 
> For more detailed information, please see
> https://github.com/bsdimp/freebsd-git-docs/ for the current documentation.
> 
> Please see https://wiki.freebsd.org/git for the latest detailed schedule
> (please note that this schedule is subject to change).
> 
> Warner
> ___
> freebsd-current@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
> 

Will the project utilize gitatributes(5) to support ident as $Id:$ in
git repository?

In file header, we have now only $FreeBSD$ since svn tags disappeared
after the transition. Adding ident tags to certain files which are
updated by mergemaster(8) or etcupdated(8) would be appreciated.

Best regards,
-- 
Marek Zarychta
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-22 Thread John-Mark Gurney
Steffen Nurpmeso wrote this message on Fri, Dec 18, 2020 at 19:28 +0100:
> Brooks Davis wrote in
>  <20201218175241.ga72...@spindle.one-eyed-alien.net>:
>  |On Thu, Dec 17, 2020 at 05:53:20PM -0800, Thomas Mueller wrote:
>  |>>> I hope we don't have to start signing all commits.  saltstack/salt has
>  |>>> that policy, and it's extremely annoying.
>  |> 
>  |>> Have to? Not currently. As with all process changes, there will be
>  |>> community discussion around the different points.
>  |> 
>  |>> Warner
>  |> 
>  |> I hope not!
>  |> 
>  |> Signatures, at least in email messages, are just an annoyance as \
>  |> I see them.
>  |> 
>  |> I don't even know how do sign an email message or make use of a signatur\
>  |> e in a message I receive.
>  |> 
>  |> I have never made a commit to a repository, so would not be familiar \
>  |> with signatures there; imagine it would be a barrier.
>  |
>  |Signed commits have no practicl effect on users of a repo.
> 
> Well you can verify integrity of a repository regardless of how it
> was distributed, this is why it is done, right.
> 
>   #?0$ git log --oneline --show-signature -1 v14.9.20.ar
>   16a21755 (...)
>   gpg: Signature made Sun 13 Dec 2020 12:43:44 AM CET
>   gpg:using RSA key DF082F6AEEC8C2FF
>   gpg: Good signature from "Steffen Nurpmeso "
>   Bump S-nail v14.9.20.ar ("Sombre Tit (Trauermeise)"), 2020-12-12
> 
>   #?0$ git tag -v v14.9.20.ar; echo $?
>   object 16a21755fd1fade2b15fdb78a592f12169c3453f
>   type commit
>   tag v14.9.20.ar
>   tagger Steffen Nurpmeso  1607816624 +0100
>   
>   Bump S-nail v14.9.20.ar ("Sombre Tit (Trauermeise)"), 2020-12-12
>   gpg: Signature made Sun 13 Dec 2020 12:43:44 AM CET
>   gpg:using RSA key DF082F6AEEC8C2FF
>   gpg: Good signature from "Steffen Nurpmeso "
>   0

TL;DR I don't see any reason for devs to sign commits.

I could see use for RE (or another entity) to occasionally (weekly?)
sign the repo (say COPYRIGHT or UPDATING), and it would be nice for
them to sign all the tags used for releases, but having every dev
would both make the dev's life difficult...

It's also hard to collect ALL the keys of the devs at any point in
time to decide if that key is authorized to sign a commit in the
repo...  Like if a dev starts in 2021, any commits made by that
dev prior to 2021 should not be "valid"..  Then there's also the
issue that people's keys change over time, and now you need to know
what time period each key was valid for, otherwise a compromised key
could be used to insert malicious changes into your/the tree...

Then there's also the point that the repo is (looks like it) using
SHA-1 hashes, which are effectively broken, so depending upon them
to validate the tree is questionable anyways.

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 "All that I will do, has been done, All that I have, has not."
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-22 Thread Mark Millard



On 2020-Dec-22, at 13:31, Mark Millard  wrote:



> On 2020-Dec-22, at 13:06, bob prohaska  wrote:
> 
>> On Tue, Dec 22, 2020 at 09:34:25PM +0100, Ronald Klop wrote:
>>> 
>>> what does "pkg install git" do for you? NB: I use "pkg install git-lite".
>>> Prevents about 1000 dependencies.
>>> 
>> 
>> That seems to have worked. It reported something about package management
>> not being installed, but after a prompt installed pkg-static and set
>> up a version of git which seems to run. Svnlite had been working without
>> this step. 
>> 
>> This is for a Pi2B v 1.1, arm v7 only.
> 
> Ahh. As far as I know armv7 ports have been building right along. It was
> arm64 that had the old build system fail as I understand.
> 
>> Using the "mini git primer" at https://hackmd.io/hJgnfzd5TMK-VHgUzshA2g
>> I tried to clone stable/12 expecting that the -beta would be gone.
>> 
>> It looks as if I'm still jumping the gun. Although 
>> cgit.freegbsd.org replies to ping, using
>> 
>> bob@www:/usr % git clone cgit.freebsd.org -b stable/12 freebsd-src
>> 
>> reports:
>> 
>> fatal: repository 'cgit.freebsd.org' does not exist
>> 
>> This is just a rehearsal, so I can wait, but if I've 
>> made other mistakes please point them out.
> 
> cgit.freebsd.org is not for getting clones from, just like svnweb.freebsd.org
> was not for getting svn from.
> 
> Using main as an example, not stable/12 . . .
> 
> The bottom of the page https://cgit.freebsd.org/src/ shows 3 URL's for
> use in cloning src:
> 
> Clone
> https://git.FreeBSD.org/src.git
> anon...@git.freebsd.org:src.git
> g...@gitrepo.freebsd.org:src.git

Hmm. It turns out that the last 2 are links on that page and the
links expand out to:

https://cgit.freebsd.org/src/anon...@git.freebsd.org:src.git
and:
https://cgit.freebsd.org/src/g...@gitrepo.freebsd.org:src.git

So it seems that there are ways to clone that involve referencing
cgit.freebsd.org .

> The last two are not explicit about notation like ssh: prefixes.
> 
> I cloned FreeBSD's src.git via:
> 
> git clone -o freebsd --config 
> remote.freebsd.fetch='+refs/notes/*:refs/notes/*' 
> ssh://anon...@git.freebsd.org/src.git freebsd-src
> 
> Other than using the ssh: style, I got the command notation from
> part of:
> 
> https://github.com/bsdimp/freebsd-git-docs/blob/main/src-cvt.md
> 
> The remote.freebsd.fetch related material allows for finding the svn version
> numbers for the older content.
> 
> Checking out stable/12 from the clone should be possible after the above, but
> that is not what I've been doing.
> 


===
Mark Millard
marklmi at yahoo.com
( dsl-only.net went
away in early 2018-Mar)

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: HEADS UP: FreeBSD src repo transitioning to git this weekend

2020-12-22 Thread Mark Millard



On 2020-Dec-22, at 13:06, bob prohaska  wrote:

> On Tue, Dec 22, 2020 at 09:34:25PM +0100, Ronald Klop wrote:
>> 
>> what does "pkg install git" do for you? NB: I use "pkg install git-lite".
>> Prevents about 1000 dependencies.
>> 
> 
> That seems to have worked. It reported something about package management
> not being installed, but after a prompt installed pkg-static and set
> up a version of git which seems to run. Svnlite had been working without
> this step. 
> 
> This is for a Pi2B v 1.1, arm v7 only.

Ahh. As far as I know armv7 ports have been building right along. It was
arm64 that had the old build system fail as I understand.

> Using the "mini git primer" at https://hackmd.io/hJgnfzd5TMK-VHgUzshA2g
> I tried to clone stable/12 expecting that the -beta would be gone.
> 
> It looks as if I'm still jumping the gun. Although 
> cgit.freegbsd.org replies to ping, using
> 
> bob@www:/usr % git clone cgit.freebsd.org -b stable/12 freebsd-src
> 
> reports:
> 
> fatal: repository 'cgit.freebsd.org' does not exist
> 
> This is just a rehearsal, so I can wait, but if I've 
> made other mistakes please point them out.

cgit.freebsd.org is not for getting clones from, just like svnweb.freebsd.org
was not for getting svn from.

Using main as an example, not stable/12 . . .

The bottom of the page https://cgit.freebsd.org/src/ shows 3 URL's for
use in cloning src:

Clone
https://git.FreeBSD.org/src.git
anon...@git.freebsd.org:src.git
g...@gitrepo.freebsd.org:src.git

The last two are not explicit about notation like ssh: prefixes.

I cloned FreeBSD's src.git via:

git clone -o freebsd --config remote.freebsd.fetch='+refs/notes/*:refs/notes/*' 
ssh://anon...@git.freebsd.org/src.git freebsd-src

Other than using the ssh: style, I got the command notation from
part of:

https://github.com/bsdimp/freebsd-git-docs/blob/main/src-cvt.md

The remote.freebsd.fetch related material allows for finding the svn version
numbers for the older content.

Checking out stable/12 from the clone should be possible after the above, but
that is not what I've been doing.

===
Mark Millard
marklmi at yahoo.com
( dsl-only.net went
away in early 2018-Mar)

___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


  1   2   3   4   5   6   7   8   9   10   >