[gentoo-dev] News item for review: python-exec package move

2013-11-06 Thread Michał Górny
Please review the following news item. I would prefer committing it
as soon as I get an ACK from all the relevant parties since the issue
is hitting users pretty hard.


Title: python-exec package move
Author: Michał Górny mgo...@gentoo.org
Content-Type: text/plain
Posted: 2013-xx-xx
Revision: 1
News-Item-Format: 1.0
Display-If-Installed: dev-python/python-exec

Due to the recent issues which caused dev-python/python-exec:0 being
removed prematurely [1], we had to perform an urgent package move.
Since we could not use the automatic updates support in portage, users
will notice two python-exec packages and possibly blockers.

Currently, dev-lang/python-exec is the real package that contains
python-exec and that will be used in the future. dev-python/python-exec
is kept for compatibility with dependencies in already-installed
packages.

In the most favorable scenario, the package will be upgraded correctly
on your next world update. However, you need to make sure to pass
the '--deep' (-D) and '--update' (-u) options to emerge. If you don't
want to perform a complete world update, you may as well manually
upgrade dev-python/python-exec:

  emerge -1 dev-python/python-exec

This will cause portage to update both python-exec packages and resolve
the blockers properly.

Please note that if you applied any kind of package-specific
modifications to dev-python/python-exec (such as applying keywords
through 'package.accept_keywords'), you will need to copy them to
dev-lang/python-exec as well.

If you applied keywords to dev-python/python-exec in order to unmask
Python 3.3 on a stable system, please consider removing the keywords
and reading our wiki page that explains how to properly unmask USE
flags [2].

We apologize for all the inconveniences.

[1]:https://bugs.gentoo.org/show_bug.cgi?id=489440
[2]:https://wiki.gentoo.org/wiki/Python/PYTHON_TARGETS#Unmasking_non-stable_implementation_on_a_stable_system

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


[gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Ian Stakenvicius
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi all...  Mozilla had a bug recently (
http://bugs.gentoo.org/show_bug.cgi?id=489838 ) that I think has much
wider implications for all packages, and I would like to discuss how
to best address this.

The synopsis of the situation is that the latest firefox ebuild now
depends on icu, specifically icu-50.1 or above.  When this version of
firefox was added to the tree, the lowest version of icu in the tree
was icu-51.0 -- in fact, icu-48 through icu-50 were dropped from the
tree about 2 months prior to the new firefox being added.

The bug that was filed, is that a user didn't do a full emerge -uDN
@world prior to emerging (upgrading?) firefox, and they had icu-49
already installed.  Because the firefox dep didn't have a minimum
version, portage didn't see upgrading icu as a requirement before
firefox emerged.

I fully agree with the user and other commenters on the bug, that
after --sync'ing a user should be able to 'emerge [-u] firefox' and
all necessary dependency updates would be applied.

However, it's been a long-standing general practise that if there are
no deps in the tree older than what is necessary for a package, that
package doesn't need to have a minimum version on the dependency atom.
 As such, issues similar to this are probably lying in wait all other
the place in the tree.

To mitigate this, i see three possibilities:

1 - make it clear in documentation for end users that they need to
emerge -uDN @world after a --sync, otherwise they may see breakage and
if they do it's not a bug when an emerge -uDN @world fixes it.  IMO
this is not a desirable solution but it best matches what is
unofficially required now.

2 - make a policy for developers that they need to add minimum
versions on dependency atoms so that their package will trigger
dependency updates, for all dependencies that have in the last year
(**) had a version in the tree older than what the package needs.
This is the most correct solution, but requires all devs to do the work.

3 - change portage behaviour s.t. somehow when resolving dependencies
it does not consider installed atoms that are missing from the tree to
be valid at satisfying a dependency of a package.  This would resolve
the issue without dev's as a whole needing to do anything different,
but would also have unforseen consequences since this is a major
behavioural change for portage's dependency resolution.

Thoughts?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iF4EAREIAAYFAlJ6XSIACgkQ2ugaI38ACPAWtgEAsiXy5LmYriPMeRanleI7fqNK
faU2TwOpvykeYfEwpqQA/AirKpkPwpSp6tGau1PPjeOIGUuz6dZgnL8KkZ/J9JEa
=VUYT
-END PGP SIGNATURE-



Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Kent Fredric
On 7 November 2013 04:15, Ian Stakenvicius a...@gentoo.org wrote:


 The bug that was filed, is that a user didn't do a full emerge -uDN
 @world prior to emerging (upgrading?) firefox, and they had icu-49
 already installed.  Because the firefox dep didn't have a minimum
 version, portage didn't see upgrading icu as a requirement before
 firefox emerged.


Theres another scenario not listed here which can still happen:

The end user has a copy of icu-49.ebuild somewhere in their portage layout
still.

Either this is due to a published overlay containing it, or them locally
maintaining their own private overlay.

The update world thing *may* still work in such a circumstance, but you'd
have to change the policy to say Update to a something that is in ::gentoo
before merging packages from ::gentoo, which is getting a bit logically
messy.

Even then, it may not be apparent that there is a problem, for instance, if
they have the overlay in place, *AND* they've locally masked newer versions
of icu, for some reason ( perhaps they have 3rd party software they're
locally maintaining that requires an older version of icu ).

Here, the *only* sane approach is for firefox to declare it needs a certain
version of icu as a minimum, regardless of what is, and what isn't visible
in tree, so that the end user at very least gets told firefox needs this,
and its then their responsibility to sort out the problem if they've caused
one.

-- 
Kent


Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Ian Stakenvicius
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/11/13 10:26 AM, Kent Fredric wrote:
 
 On 7 November 2013 04:15, Ian Stakenvicius a...@gentoo.org 
 mailto:a...@gentoo.org wrote:
 
 
 The bug that was filed, is that a user didn't do a full emerge
 -uDN @world prior to emerging (upgrading?) firefox, and they had
 icu-49 already installed.  Because the firefox dep didn't have a
 minimum version, portage didn't see upgrading icu as a requirement
 before firefox emerged.
 
 
 Theres another scenario not listed here which can still happen:
 
 The end user has a copy of icu-49.ebuild somewhere in their
 portage layout still.
 
 Either this is due to a published overlay containing it, or them
 locally maintaining their own private overlay.

Yes, however there's no way to keep overlays (especially unofficial
ones) from messing with what portage does, and IMO there shouldn't be
- -- I think we've made it clear that conflicts arising between in-tree
and overlay packages (whether they be deps or not) are for the
end-users to resolve.

That said, I agree:

 Here, the *only* sane approach is for firefox to declare it needs
 a certain version of icu as a minimum, regardless of what is, and
 what isn't visible in tree, so that the end user at very least gets
 told firefox needs this, and its then their responsibility to
 sort out the problem if they've caused one.

Option #2 to me also seems to be the way to go..

If we can reach a consensus here, adding some text to the devmanual or
developer guide should suffice, yes?

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iF4EAREIAAYFAlJ6YykACgkQ2ugaI38ACPApYgD/fx1QrWxlBWOxJX5lsIqS1DVp
E3ClB9ketAWsPt7LmqMBAI1mVm/td9BLyfSGSP+Qi43kTzR+TISwecvPmqnvsKYE
=W3Ul
-END PGP SIGNATURE-



Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Alexis Ballier
On Wed, 2013-11-06 at 10:15 -0500, Ian Stakenvicius wrote:
 However, it's been a long-standing general practise that if there are
 no deps in the tree older than what is necessary for a package, that
 package doesn't need to have a minimum version on the dependency atom.
  As such, issues similar to this are probably lying in wait all other
 the place in the tree.

this is a common misconception: ebuilds must have min. deps matching
their requirements (exactly because of this problem)

it can be fixed on the user side by 'emerge -uDN world' meanwhile but
this doesn't mean the ebuild doesn't have a bug, even if minor

Alexis.




Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Paweł Hajdan, Jr.
On 11/6/13 7:15 AM, Ian Stakenvicius wrote:
 The synopsis of the situation is that the latest firefox ebuild now
 depends on icu, specifically icu-50.1 or above.  When this version of
 firefox was added to the tree, the lowest version of icu in the tree
 was icu-51.0 -- in fact, icu-48 through icu-50 were dropped from the
 tree about 2 months prior to the new firefox being added.
 
 The bug that was filed, is that a user didn't do a full emerge -uDN
 @world prior to emerging (upgrading?) firefox, and they had icu-49
 already installed.  Because the firefox dep didn't have a minimum
 version, portage didn't see upgrading icu as a requirement before
 firefox emerged.

I've seen things like that happening.

I wouldn't really create yet another policy (it doesn't make things
happen). I'd leave it up to the maintainer: it'd be fine to declare it
not a bug, and it'd also be fine to fix.

I'm generally leaning toward fixing and adding the minimum version to
deps. Helps the users, and doesn't really hurt maintainability.

Paweł



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [warning] the bug queue has 89 bugs

2013-11-06 Thread Tom Wijsman
On Wed,  6 Nov 2013 14:00:02 +0200 (EET)
Alex Alexander wi...@gentoo.org wrote:

 Our bug queue has 89 bugs!
 
 If you have some spare time, please help assign/sort a few bugs.
 
 To view the bug queue, click here: http://bit.ly/m8PQS5

Is this notice automated? Feel free to ping us (b-w) as well or instead.

Thank you to everyone whom helped along here and there.

Spent a full two hours on helping to empty the queue; there are some
bugs with pending information left, and one I don't know how to assign.

-- 
With kind regards,

Tom Wijsman (TomWij)
Gentoo Developer

E-mail address  : tom...@gentoo.org
GPG Public Key  : 6D34E57D
GPG Fingerprint : C165 AF18 AB4C 400B C3D2  ABF0 95B2 1FCD 6D34 E57D


signature.asc
Description: PGP signature


Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Alan McKinnon
On 06/11/2013 17:26, Kent Fredric wrote:
 
 On 7 November 2013 04:15, Ian Stakenvicius a...@gentoo.org
 mailto:a...@gentoo.org wrote:
 
 
 The bug that was filed, is that a user didn't do a full emerge -uDN
 @world prior to emerging (upgrading?) firefox, and they had icu-49
 already installed.  Because the firefox dep didn't have a minimum
 version, portage didn't see upgrading icu as a requirement before
 firefox emerged.
 
 
 Theres another scenario not listed here which can still happen:
 
 The end user has a copy of icu-49.ebuild somewhere in their portage
 layout still.
 
 Either this is due to a published overlay containing it, or them locally
 maintaining their own private overlay.
 
 The update world thing *may* still work in such a circumstance, but
 you'd have to change the policy to say Update to a something that is in
 ::gentoo before merging packages from ::gentoo, which is getting a bit
 logically messy.
 
 Even then, it may not be apparent that there is a problem, for instance,
 if they have the overlay in place, *AND* they've locally masked newer
 versions of icu, for some reason ( perhaps they have 3rd party software
 they're locally maintaining that requires an older version of icu ).
 
 Here, the *only* sane approach is for firefox to declare it needs a
 certain version of icu as a minimum, regardless of what is, and what
 isn't visible in tree, so that the end user at very least gets told
 firefox needs this, and its then their responsibility to sort out the
 problem if they've caused one.

I agree with this sentiment. It's always been my view that the needs of
a package are driven by the package itself, not by the tree.

Rationale: A package will build and run as long as it's own requirements
are met regardless of what the tree states.

We have layman overlays and user's own overlays. Whilst these are not
100% supported by Gentoo they are not banned either. They are also not
barely tolerated, it's more a case of overlays are not a problem and
users are welcome to use them as long as they don't conflict with or
break the tree for that user.

This needn't be onerous. Presumably ebuild maintainers read the README
and Changelog, these often state the versions of deps the package
supports. Take that information and put it in the ebuild. Maintainers
are under no obligation to provide the absolute minimum version of a
dep, only at least one that will work. If the user decides to make other
versions available to his system by whatever means, then portage can
deal with it by and large transparently.


-- 
Alan McKinnon
alan.mckin...@gmail.com




Re: [gentoo-dev] [warning] the bug queue has 89 bugs

2013-11-06 Thread Alex Alexander
On Wed, Nov 6, 2013 at 6:08 PM, Tom Wijsman tom...@gentoo.org wrote:

 On Wed,  6 Nov 2013 14:00:02 +0200 (EET)
 Alex Alexander wi...@gentoo.org wrote:

  Our bug queue has 89 bugs!
 
  If you have some spare time, please help assign/sort a few bugs.
 
  To view the bug queue, click here: http://bit.ly/m8PQS5

 Is this notice automated? Feel free to ping us (b-w) as well or instead.

 Thank you to everyone whom helped along here and there.

 Spent a full two hours on helping to empty the queue; there are some
 bugs with pending information left, and one I don't know how to assign.


It's automated, check runs once a day.

Good work everyone, queue is down to 9 bugs at the moment :)

Cheers,
-- 
Alex Alexander
+ wired
+ www.linuxized.com
+ www.leetworks.com


Re: [gentoo-dev] News item for review: python-exec package move

2013-11-06 Thread Tom Wijsman
On Wed, 6 Nov 2013 16:12:47 +0100
Michał Górny mgo...@gentoo.org wrote:

 Please note that if you applied any kind of package-specific
 ^ have applied

 If you applied keywords to dev-python/python-exec in order to unmask
^ have applied

 Python 3.3 on a stable system, please consider removing the keywords
   ^ these

Other than that it looks perfect; it also seems to take into account
the users having problems in the forums [1], for which the original
instructions you gave did not appear to work. +1 for the details! :)

 [1]: http://forums.gentoo.org/viewtopic-t-974412.html

-- 
With kind regards,

Tom Wijsman (TomWij)
Gentoo Developer

E-mail address  : tom...@gentoo.org
GPG Public Key  : 6D34E57D
GPG Fingerprint : C165 AF18 AB4C 400B C3D2  ABF0 95B2 1FCD 6D34 E57D


signature.asc
Description: PGP signature


Re: [gentoo-dev] News item for review: python-exec package move

2013-11-06 Thread Dirkjan Ochtman
On Wed, Nov 6, 2013 at 4:12 PM, Michał Górny mgo...@gentoo.org wrote:
 Please review the following news item. I would prefer committing it
 as soon as I get an ACK from all the relevant parties since the issue
 is hitting users pretty hard.

LGTM.

I have two questions that should not block this news item from going live:

- I tend to upgrade with emerge -uavD --changed-use world, and this
didn't solve the blocker for me by itself. I had to emerge -C
python-exec, then run the upgrade to get it to work. Yet the news item
seems to state that -uD should have been enough.

- How come we did not think this news item was necessary before we did
the package move? Obviously everything would have been better had this
news item gone out with the package move, instead of one week later.

Cheers,

Dirkjan



Re: [gentoo-dev] News item for review: python-exec package move

2013-11-06 Thread Michał Górny
Dnia 2013-11-06, o godz. 18:14:57
Dirkjan Ochtman d...@gentoo.org napisał(a):

 On Wed, Nov 6, 2013 at 4:12 PM, Michał Górny mgo...@gentoo.org wrote:
  Please review the following news item. I would prefer committing it
  as soon as I get an ACK from all the relevant parties since the issue
  is hitting users pretty hard.
 
 LGTM.
 
 I have two questions that should not block this news item from going live:
 
 - I tend to upgrade with emerge -uavD --changed-use world, and this
 didn't solve the blocker for me by itself. I had to emerge -C
 python-exec, then run the upgrade to get it to work. Yet the news item
 seems to state that -uD should have been enough.

Well, I have no idea why this happens for some people. Unless you were
playing with keywords, it simply should work.

 - How come we did not think this news item was necessary before we did
 the package move? Obviously everything would have been better had this
 news item gone out with the package move, instead of one week later.

I think we focused on my little testing that showed that portage can
handle blockers with '-uD' and assumed users will be able to understand
the blocker message.

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


Re: [gentoo-dev] News item for review: python-exec package move

2013-11-06 Thread Michał Górny
Update 1:
- applied comments from TomWij,
- changed the wording to reflect that 'emerge @world' may not work,
- shortened the wiki URI,
- added contact info in case of more issues.

Title: python-exec package move
Author: Michał Górny mgo...@gentoo.org
Content-Type: text/plain
Posted: 2013-11-07
Revision: 1
News-Item-Format: 1.0
Display-If-Installed: dev-python/python-exec

Due to the recent issues which caused dev-python/python-exec:0 to be
removed prematurely [1], we had to perform an urgent package move.
Since we could not use the automatic updates support in portage, users
will notice two python-exec packages and possibly blockers.

Currently, dev-lang/python-exec is the real package that contains
python-exec and that will be used in the future. dev-python/python-exec
is a virtual package that is kept for compatibility with dependencies
in already-installed packages.

In the most favorable scenario, the package will be upgraded correctly
on your next world update if you use the '--deep' (-D) and '--update'
(-u) options. If you don't want to perform a complete world update
or if it fails for you, you may as well manually upgrade
dev-python/python-exec:

  emerge -1 dev-python/python-exec

This will cause portage to update both python-exec packages and resolve
the blockers properly.

Please note that if you have applied any kind of package-specific
modifications to dev-python/python-exec (such as applying keywords
through 'package.accept_keywords'), you will need to copy them to
dev-lang/python-exec as well.

If you have applied keywords to dev-python/python-exec in order
to unmask Python 3.3 on a stable system, please consider removing
the keywords and reading our wiki page that explains how to properly
unmask USE flags [2].

We apologize for all the inconveniences. If you have any more issues
with python-exec, please do not hesitate to contact as at #gentoo-python
IRC channel (@freenode) or the gentoo-pyt...@lists.gentoo.org mailing
list.

[1]:https://bugs.gentoo.org/show_bug.cgi?id=489440
[2]:https://wiki.gentoo.org/wiki/Unmasking_non-stable_Python_implementations

-- 
Best regards,
Michał Górny


signature.asc
Description: PGP signature


Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread yac
On Wed, 06 Nov 2013 16:48:54 +0100
Alexis Ballier aball...@gentoo.org wrote:

 On Wed, 2013-11-06 at 10:15 -0500, Ian Stakenvicius wrote:
  However, it's been a long-standing general practise that if there
  are no deps in the tree older than what is necessary for a package,
  that package doesn't need to have a minimum version on the
  dependency atom. As such, issues similar to this are probably lying
  in wait all other the place in the tree.
 
 this is a common misconception: ebuilds must have min. deps matching
 their requirements (exactly because of this problem)
 
 it can be fixed on the user side by 'emerge -uDN world' meanwhile but
 this doesn't mean the ebuild doesn't have a bug, even if minor
 
 Alexis.

When I started contributing via sunrise, I've been
adding the minimal versions of dependencies as declared by upstream
but I met with very strict enforcement of the policy to not
specify minimal version if all the ones in current tree satisfies.

Is it documented somewhere or is it just unwritten consensus?

What I see is only Ebuild Policy [1e] which doesn't deal with this.

.. [1e] http://www.gentoo.org/proj/en/devrel/handbook/handbook.xml?part=2chap=1

---
Jan Matějka| Gentoo Developer
https://gentoo.org | Gentoo Linux
GPG: A33E F5BC A9F6 DAFD 2021  6FB6 3EBF D45B EEB6 CA8B


signature.asc
Description: PGP signature


Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Ian Stakenvicius
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/11/13 12:56 PM, yac wrote:
 On Wed, 06 Nov 2013 16:48:54 +0100 Alexis Ballier
 aball...@gentoo.org wrote:
 
 On Wed, 2013-11-06 at 10:15 -0500, Ian Stakenvicius wrote:
 However, it's been a long-standing general practise that if
 there are no deps in the tree older than what is necessary for
 a package, that package doesn't need to have a minimum version
 on the dependency atom. As such, issues similar to this are
 probably lying in wait all other the place in the tree.
 
 this is a common misconception: ebuilds must have min. deps
 matching their requirements (exactly because of this problem)
 
 it can be fixed on the user side by 'emerge -uDN world' meanwhile
 but this doesn't mean the ebuild doesn't have a bug, even if
 minor
 
 Alexis.
 
 When I started contributing via sunrise, I've been adding the
 minimal versions of dependencies as declared by upstream but I met
 with very strict enforcement of the policy to not specify minimal
 version if all the ones in current tree satisfies.
 
 Is it documented somewhere or is it just unwritten consensus?
 
 What I see is only Ebuild Policy [1e] which doesn't deal with
 this.
 
 .. [1e]
 http://www.gentoo.org/proj/en/devrel/handbook/handbook.xml?part=2chap=1

 
I searched as well, and couldn't find anything documented one way or
the other, either.  I concluded that it's unwritten consensus.

That's the main reason I wanted to start this discussion -- to
effectively start documenting it and get dev's all on the same page.
To be honest I think it should be policy or at least a written-down
guideline, that dev's should do this within reason -- if an
older-than-minimum version of something has been in the tree within
the past year.  Gone for more than a year should be safe, I expect.



-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iF4EAREIAAYFAlJ6hKMACgkQ2ugaI38ACPB8RwD/aYX0JSAeb1xsWVejdf65jPVP
QSIYlCp5v/gdYw88kdMA/22f9UHoBep+iwJq5uYeHLmJFMRYRELnihBhNJkzM5rE
=3xf4
-END PGP SIGNATURE-



Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Mike Gilbert
On Wed, Nov 6, 2013 at 1:04 PM, Ian Stakenvicius a...@gentoo.org wrote:
 On 06/11/13 12:56 PM, yac wrote:
 On Wed, 06 Nov 2013 16:48:54 +0100 Alexis Ballier
 aball...@gentoo.org wrote:

 On Wed, 2013-11-06 at 10:15 -0500, Ian Stakenvicius wrote:
 However, it's been a long-standing general practise that if
 there are no deps in the tree older than what is necessary for
 a package, that package doesn't need to have a minimum version
 on the dependency atom. As such, issues similar to this are
 probably lying in wait all other the place in the tree.

 this is a common misconception: ebuilds must have min. deps
 matching their requirements (exactly because of this problem)

 it can be fixed on the user side by 'emerge -uDN world' meanwhile
 but this doesn't mean the ebuild doesn't have a bug, even if
 minor

 Alexis.

 When I started contributing via sunrise, I've been adding the
 minimal versions of dependencies as declared by upstream but I met
 with very strict enforcement of the policy to not specify minimal
 version if all the ones in current tree satisfies.

 Is it documented somewhere or is it just unwritten consensus?

 What I see is only Ebuild Policy [1e] which doesn't deal with
 this.

 .. [1e]
 http://www.gentoo.org/proj/en/devrel/handbook/handbook.xml?part=2chap=1


 I searched as well, and couldn't find anything documented one way or
 the other, either.  I concluded that it's unwritten consensus.

 That's the main reason I wanted to start this discussion -- to
 effectively start documenting it and get dev's all on the same page.
 To be honest I think it should be policy or at least a written-down
 guideline, that dev's should do this within reason -- if an
 older-than-minimum version of something has been in the tree within
 the past year.  Gone for more than a year should be safe, I expect.


I don't think a time limit is necessary here. If there is an
identified incompatibility, we should update DEPEND.

Note that I do not expect devs to go out of their way to test for the
oldest supported version of a dependency; they just shouldn't close
bugs as INVALID of someone else has done the work.



Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Rich Freeman
On Wed, Nov 6, 2013 at 11:15 AM, Alan McKinnon alan.mckin...@gmail.com wrote:
 I agree with this sentiment. It's always been my view that the needs of
 a package are driven by the package itself, not by the tree.

 Rationale: A package will build and run as long as it's own requirements
 are met regardless of what the tree states.


++, and to all that follows.

I wouldn't go hunting down and bugging devs for every atom that
doesn't specify a minimum version - this stuff isn't always easy to
find.  However, if somebody offers a minimum version I'd consider it a
valid bug.

I think giving the resolver as much information as possible will only
tend to reduce issues, especially in a distro like Gentoo where doing
things differently is the norm.

Rich



Re: [gentoo-dev] Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread yac
On Wed, 6 Nov 2013 13:22:13 -0500
Mike Gilbert flop...@gentoo.org wrote:

 On Wed, Nov 6, 2013 at 1:04 PM, Ian Stakenvicius a...@gentoo.org
 wrote:
  On 06/11/13 12:56 PM, yac wrote:
  On Wed, 06 Nov 2013 16:48:54 +0100 Alexis Ballier
  aball...@gentoo.org wrote:
 
  On Wed, 2013-11-06 at 10:15 -0500, Ian Stakenvicius wrote:
  However, it's been a long-standing general practise that if
  there are no deps in the tree older than what is necessary for
  a package, that package doesn't need to have a minimum version
  on the dependency atom. As such, issues similar to this are
  probably lying in wait all other the place in the tree.
 
  this is a common misconception: ebuilds must have min. deps
  matching their requirements (exactly because of this problem)
 
  it can be fixed on the user side by 'emerge -uDN world' meanwhile
  but this doesn't mean the ebuild doesn't have a bug, even if
  minor
 
  Alexis.
 
  When I started contributing via sunrise, I've been adding the
  minimal versions of dependencies as declared by upstream but I met
  with very strict enforcement of the policy to not specify minimal
  version if all the ones in current tree satisfies.
 
  Is it documented somewhere or is it just unwritten consensus?
 
  What I see is only Ebuild Policy [1e] which doesn't deal with
  this.
 
  .. [1e]
  http://www.gentoo.org/proj/en/devrel/handbook/handbook.xml?part=2chap=1
 
 
  I searched as well, and couldn't find anything documented one way or
  the other, either.  I concluded that it's unwritten consensus.
 
  That's the main reason I wanted to start this discussion -- to
  effectively start documenting it and get dev's all on the same page.
  To be honest I think it should be policy or at least a written-down
  guideline, that dev's should do this within reason -- if an
  older-than-minimum version of something has been in the tree within
  the past year.  Gone for more than a year should be safe, I expect.
 
 
 I don't think a time limit is necessary here. If there is an
 identified incompatibility, we should update DEPEND.
 
 Note that I do not expect devs to go out of their way to test for the
 oldest supported version of a dependency; they just shouldn't close
 bugs as INVALID of someone else has done the work.
 

+1 very much.

---
Jan Matějka| Gentoo Developer
https://gentoo.org | Gentoo Linux
GPG: A33E F5BC A9F6 DAFD 2021  6FB6 3EBF D45B EEB6 CA8B


signature.asc
Description: PGP signature


Re: [gentoo-dev] friendly reminder wrt net virtual in init scripts

2013-11-06 Thread Thomas D.
Hi,

Michael Orlitzky wrote:
 You should disable OCSP anyway. In Firefox, it's under,
 
   Edit - Preferences - Advanced - Encryption - Validation
 
 The OCSP protocol is itself is vulnerable to MITM attacks, which is cute
 when you consider its purpose.
 
 Moreover, it sends the address of every website you visit to a third
 party, which is the real reason to disable it IMO.

This is going OT but I cannot leave this statement uncommented, because
from my knowledge this is wrong/you are hiding important information
everyone should know about:

First, if you tell people they should disable OCSP you should also tell
these people the consequences: When you disable OCSP in Firefox, there
is *no* other way to know if a certificate was revoked or not. This is
because Firefox *never* downloaded any CRLs. Furthermore, they removed
the possibility to do that [1,2].

If you don't have the possibility to check a certificate for revocation,
the whole trust system cannot work because there is no way to tell
someone Yes, it is nice that you trust me (=you trust the CA) and I
said you can trust this certificate (=the CA you trust has signed the
certificate in question) but now I changed my mind (=the CA has revoked
the certificate) so please don't trust this certificate anymore. Please
read Would you knowingly trust an irrevocable SSL certificate? [3].
And yes, this is a *real* problem, see [7].


Yes, there is a known MITM attacks against OCSP, see [4]. But this is
only possible due to bad default settings: Just change your OCSP setting
to *require* a valid answer. In Firefox:

  Edit - Preferences - Advanced - Certificates - Validation

Make sure

  When an OCSP server connection fails, treat the certificate
  as invalid

is checked (or you can just set security.OCSP.require to TRUE).

If you are aware about any other know attacks, please share.


Regarding your privacy concerns:
No, your OCSP-enabled browser won't share the address (URL) with the
OCSP responder. Your browser will use the site's certificate serial
number to ask the OCSP responder if the certificate is still valid. Yes,
the company who is running the OCSP responder is able to log You [IP,
UA...] requested status for certificates with the serial number 0x1,
0x2, 0x3 and because the OCSP responder needs some basic knowledge
about the certificates it should provide answers for, the operator may
know that the certificate with the serial number 0x1 has the Common Name
(CN) www.mysecretsite.invalid and 0x2 was issued for
www.mydarksecrets.invalid or 0x3 was for www.facebook.com, but the
operator doesn't know the URL you visited.


I don't say OCSP is perfect. For example an OCSP check will delay the
initial SSL handshake, because your browser has to connect to the OCSP
responder when it has received the certificate from the server you are
connecting to. Depending on your connection and the OCSP responder, this
may take some time [5].

But the CRL system doesn't work anymore (and was never working in
Firefox, unless you manually added all the CRL distribution points for
your CA and Sub CAs...), because VerSign and other big SSL companies are
providing 20 MB CRLs. Imagine you would use your phone to visit a
website using some kind of mobile connection and it would have to fetch
50+ MBs in CRLs before the website will open...

Google for example decided some time ago to disable CRL checks too. They
will download CRLs for you and are planing to release these centralized
CRLs with normal updates. See [6].

They are improving OCSP. The next big thing is OCSP stapling [8,9] which
is now supported by all major browsers and patches are available for
most web servers.
OCSP stapling was developed to save the extra round trip to the OCSP
responder, but OCSP stapling-enabled websites will also increase your
privacy, because you don't longer have to tell the OCSP responder the
certificate (CN) you want to check.


If you are still really concerned about what OCSP may do to your
privacy, may I ask if you are also concerned about DNS servers? If not,
what's the difference between an OCSP responder which you ask for a
serial number, which can be resolved to a CN and a DNS server which you
ask for a ... CN? :)
Also, you are trusting a CA to secure your connections, but you don't
trust the same CA due to privacy concerns?


So please, don't just tell anybody to turn off OCSP. Tell them why you
may think they should do that. But also tell them about the new risks
they have to deal with so that they are able to decide on their own if
they want to disable OCSP or not.

PS: As long as you are trusting CAs and don't manage the trust of any
certificate you are using on your own I recommend to enable OCSP in all
your browsers and to treat any kind of invalid OCSP responses as a hard
failure, because I want to know if I can trust the certificate used to
secure my communication or not.

If you don't trust any CA, we don't have to talk about things like OCSP
or CRL and revocation...




Re: [gentoo-dev] News item for review: python-exec package move

2013-11-06 Thread Pacho Ramos
El mié, 06-11-2013 a las 18:20 +0100, Michał Górny escribió:
 Dnia 2013-11-06, o godz. 18:14:57
 Dirkjan Ochtman d...@gentoo.org napisał(a):
 
  On Wed, Nov 6, 2013 at 4:12 PM, Michał Górny mgo...@gentoo.org wrote:
   Please review the following news item. I would prefer committing it
   as soon as I get an ACK from all the relevant parties since the issue
   is hitting users pretty hard.
  
  LGTM.
  
  I have two questions that should not block this news item from going live:
  
  - I tend to upgrade with emerge -uavD --changed-use world, and this
  didn't solve the blocker for me by itself. I had to emerge -C
  python-exec, then run the upgrade to get it to work. Yet the news item
  seems to state that -uD should have been enough.
 
 Well, I have no idea why this happens for some people. Unless you were
 playing with keywords, it simply should work.
 
  - How come we did not think this news item was necessary before we did
  the package move? Obviously everything would have been better had this
  news item gone out with the package move, instead of one week later.
 
 I think we focused on my little testing that showed that portage can
 handle blockers with '-uD' and assumed users will be able to understand
 the blocker message.
 

I have also had strange blockers, maybe due python-3.3 (but I have
unmasked it properly I think :/). I only could resolve it by installing:
dev-lang/python-exec-0.

I don't understand why 0.3.1 isn't enough :(




Re: [gentoo-dev] News item for review: python-exec package move

2013-11-06 Thread Ian Stakenvicius
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/11/13 02:56 PM, Pacho Ramos wrote:
 El mié, 06-11-2013 a las 18:20 +0100, Michał Górny escribió:
 Dnia 2013-11-06, o godz. 18:14:57 Dirkjan Ochtman
 d...@gentoo.org napisał(a):
 
 On Wed, Nov 6, 2013 at 4:12 PM, Michał Górny
 mgo...@gentoo.org wrote:
 Please review the following news item. I would prefer
 committing it as soon as I get an ACK from all the relevant
 parties since the issue is hitting users pretty hard.
 
 LGTM.
 
 I have two questions that should not block this news item from
 going live:
 
 - I tend to upgrade with emerge -uavD --changed-use world, and
 this didn't solve the blocker for me by itself. I had to emerge
 -C python-exec, then run the upgrade to get it to work. Yet the
 news item seems to state that -uD should have been enough.
 
 Well, I have no idea why this happens for some people. Unless you
 were playing with keywords, it simply should work.
 
 - How come we did not think this news item was necessary before
 we did the package move? Obviously everything would have been
 better had this news item gone out with the package move,
 instead of one week later.
 
 I think we focused on my little testing that showed that portage
 can handle blockers with '-uD' and assumed users will be able to
 understand the blocker message.
 
 
 I have also had strange blockers, maybe due python-3.3 (but I have 
 unmasked it properly I think :/). I only could resolve it by
 installing: dev-lang/python-exec-0.
 
 I don't understand why 0.3.1 isn't enough :(
 
 


I run mostly mixed-keywords systems, and i noticed that the blocker
messages were entirely useless and confusing, but that i just needed
to keyword dev-lang/python-exec due to the fact that it was in the
deplist of one of my other keyworded packages.  After I did that
emerge -uDN @world just worked.  Note that dev-python/python-exec
had already been keyworded for the same reason, and I didn't remove
that keyword.




-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iF4EAREIAAYFAlJ6oAYACgkQ2ugaI38ACPA2SQD/V/u5DJLPjgYblMpmgOQWSUm6
xlJlC+YOyh2MKekWRdsBAJqjMgqeK3UJlkMbcN4G1JTzs883ugMaeq8ZeKES4lmq
=QEMm
-END PGP SIGNATURE-



Re: [gentoo-dev] friendly reminder wrt net virtual in init scripts

2013-11-06 Thread mingdao
On Wed, Nov 06, 2013 at 08:11:52PM +0100, Thomas D. wrote:
 Hi,
 
 Michael Orlitzky wrote:
  You should disable OCSP anyway. In Firefox, it's under,
  
Edit - Preferences - Advanced - Encryption - Validation
  
  The OCSP protocol is itself is vulnerable to MITM attacks, which is cute
  when you consider its purpose.
  
  Moreover, it sends the address of every website you visit to a third
  party, which is the real reason to disable it IMO.
 
 This is going OT but I cannot leave this statement uncommented, because
 from my knowledge this is wrong/you are hiding important information
 everyone should know about:
 
 First, if you tell people they should disable OCSP you should also tell
 these people the consequences: When you disable OCSP in Firefox, there
 is *no* other way to know if a certificate was revoked or not. This is
 because Firefox *never* downloaded any CRLs. Furthermore, they removed
 the possibility to do that [1,2].
 
 If you don't have the possibility to check a certificate for revocation,
 the whole trust system cannot work because there is no way to tell
 someone Yes, it is nice that you trust me (=you trust the CA) and I
 said you can trust this certificate (=the CA you trust has signed the
 certificate in question) but now I changed my mind (=the CA has revoked
 the certificate) so please don't trust this certificate anymore. Please
 read Would you knowingly trust an irrevocable SSL certificate? [3].
 And yes, this is a *real* problem, see [7].
 
 
 Yes, there is a known MITM attacks against OCSP, see [4]. But this is
 only possible due to bad default settings: Just change your OCSP setting
 to *require* a valid answer. In Firefox:
 
   Edit - Preferences - Advanced - Certificates - Validation
 
 Make sure
 
   When an OCSP server connection fails, treat the certificate
   as invalid
 
 is checked (or you can just set security.OCSP.require to TRUE).
 
 If you are aware about any other know attacks, please share.
 
 
 Regarding your privacy concerns:
 No, your OCSP-enabled browser won't share the address (URL) with the
 OCSP responder. Your browser will use the site's certificate serial
 number to ask the OCSP responder if the certificate is still valid. Yes,
 the company who is running the OCSP responder is able to log You [IP,
 UA...] requested status for certificates with the serial number 0x1,
 0x2, 0x3 and because the OCSP responder needs some basic knowledge
 about the certificates it should provide answers for, the operator may
 know that the certificate with the serial number 0x1 has the Common Name
 (CN) www.mysecretsite.invalid and 0x2 was issued for
 www.mydarksecrets.invalid or 0x3 was for www.facebook.com, but the
 operator doesn't know the URL you visited.
 
 
 I don't say OCSP is perfect. For example an OCSP check will delay the
 initial SSL handshake, because your browser has to connect to the OCSP
 responder when it has received the certificate from the server you are
 connecting to. Depending on your connection and the OCSP responder, this
 may take some time [5].
 
 But the CRL system doesn't work anymore (and was never working in
 Firefox, unless you manually added all the CRL distribution points for
 your CA and Sub CAs...), because VerSign and other big SSL companies are
 providing 20 MB CRLs. Imagine you would use your phone to visit a
 website using some kind of mobile connection and it would have to fetch
 50+ MBs in CRLs before the website will open...
 
 Google for example decided some time ago to disable CRL checks too. They
 will download CRLs for you and are planing to release these centralized
 CRLs with normal updates. See [6].
 
 They are improving OCSP. The next big thing is OCSP stapling [8,9] which
 is now supported by all major browsers and patches are available for
 most web servers.
 OCSP stapling was developed to save the extra round trip to the OCSP
 responder, but OCSP stapling-enabled websites will also increase your
 privacy, because you don't longer have to tell the OCSP responder the
 certificate (CN) you want to check.
 
 
 If you are still really concerned about what OCSP may do to your
 privacy, may I ask if you are also concerned about DNS servers? If not,
 what's the difference between an OCSP responder which you ask for a
 serial number, which can be resolved to a CN and a DNS server which you
 ask for a ... CN? :)
 Also, you are trusting a CA to secure your connections, but you don't
 trust the same CA due to privacy concerns?
 
 
 So please, don't just tell anybody to turn off OCSP. Tell them why you
 may think they should do that. But also tell them about the new risks
 they have to deal with so that they are able to decide on their own if
 they want to disable OCSP or not.
 
 PS: As long as you are trusting CAs and don't manage the trust of any
 certificate you are using on your own I recommend to enable OCSP in all
 your browsers and to treat any kind of invalid OCSP responses as a hard
 failure, because I want to know if I 

[gentoo-dev] Re: Policy-level discussion for minimum versions on dependencies

2013-11-06 Thread Duncan
Rich Freeman posted on Wed, 06 Nov 2013 13:28:13 -0500 as excerpted:

 I think giving the resolver as much information as possible will only
 tend to reduce issues, especially in a distro like Gentoo where doing
 things differently is the norm.

++ to both you and Alan McK's thoughts.

Meanwhile, I like that last subsentence.  Maybe time for a new Gentoo 
slogan?

Gentoo: Where doing things differently is the norm!

Hey, Apple can think different, we can DO different! =:^)

-- 
Duncan - List replies preferred.   No HTML msgs.
Every nonfree program has a lord, a master --
and if you use the program, he is your master.  Richard Stallman




[gentoo-dev] Re: friendly reminder wrt net virtual in init scripts

2013-11-06 Thread Duncan
Thomas D. posted on Wed, 06 Nov 2013 20:11:52 +0100 as excerpted:

 Michael Orlitzky wrote:
 You should disable OCSP anyway. In Firefox, it's under,
 
   Edit - Preferences - Advanced - Encryption - Validation
 
 The OCSP protocol is itself is vulnerable to MITM attacks, which is
 cute when you consider its purpose.
 
 Moreover, it sends the address of every website you visit to a third
 party, which is the real reason to disable it IMO.
 
 This is going OT but I cannot leave this statement uncommented, because
 from my knowledge this is wrong/you are hiding important information
 everyone should know about:

Thanks.  I was going to reply with something like this, but your reply 
was far better than mine would have been. =:^)

-- 
Duncan - List replies preferred.   No HTML msgs.
Every nonfree program has a lord, a master --
and if you use the program, he is your master.  Richard Stallman




[gentoo-dev] OCSP Was: friendly reminder wrt net virtual in init scripts

2013-11-06 Thread Duncan
mingdao posted on Wed, 06 Nov 2013 14:13:34 -0600 as excerpted:

 Thanks for the detailed explanation, Thomas.
 
 Now, if any one of us turned off OCSP as Michael suggested, what should
 one do after turning it back on? Could there now be certificates trusted
 there which should not be?

AFAIK, no... except possibly for any ongoing connections and any possible 
overrides you did during the off time.  New connections will 
automatically be checked again.

Meanwhile, another question for Thomas.  Is this certificate stapling 
the same thing google chrome is now doing for the google site, that 
enabled it to detect the (I think it was) Iranian and/or Chinese CA 
tampering, allowing them to say a google cert was valid that was 
actually their MitM cert, as appeared in the tech-news a few months ago?  
Or was that something different?

I had interpreted (well, I think I read, but either the journalist could 
have been mixed up too, or maybe I was misinterpreting what I read, 
either way the effect on my understanding is the same) the certificate 
stapling referred to at the time as indicating that google configured 
the certs for their own sites into chrome as shipped itself, effectively 
hard-coding them, NOT as google handling its own OCSP requests, as OCSP 
cert stapling does.  So now I'm wondering if I interpreted wrong then, or 
if there's actually two different things being referred to as certificate 
stapling, here.

-- 
Duncan - List replies preferred.   No HTML msgs.
Every nonfree program has a lord, a master --
and if you use the program, he is your master.  Richard Stallman




[gentoo-dev] Suggestion: support the Dev team with system resources

2013-11-06 Thread Denis M.
Hello gentoo-dev@,

Starting with a little intro, I'm currently providing a Gentoo VM to a
gentoo dev (Agostino Sarubbo (ago)) for the purpose of
testing/stabilizing/keywording packages, which is part of his task as a
developer and being part of the AT team. I've been running the VM for
him for a couple of months now and AFAIK he's been giving it a great use
;-).

The main idea here is to allow Gentoo contributors and members (not
necessary) of the Gentoo community, to be able to support the developer
team providing their spare system resources, by, for example, running a
Virtual Machine (or any sort of xen, kvm, virtualbox, vmware,
whatever...) instance where the devs can run tasks they'd normally
wouldn't be able to run with their systems, because:

* They're doing some other tests at the moment
* They're on ~arch and need stable
* They're not on the architecture needed for that testing
* Their system is not 'powerful' enough
* etc...


The purpose of doing this is that the developers that have the time and
dedication would be able to run a couple of different tests
concurrently, on different 'instances' provided by the community. That
will greatly, IMHO, improve the team's performance and not only in the
AT field.

The instances provided wouldn't forcefully need to meet any specific
minimum requirements (this would be decided once (and if) this gets
accepted), but a dual core system with 512MB ram would be somewhat an
acceptable instance for the bigger arches (x86  amd64), and maybe lower
specs for the other arches[1]. As an example here, I'm giving Ago a
VirtualBox VM with 2GB ram and 4 virtual CPUs.

Also, for the contributors there shouldn't be any minimum uptime to
meet, they'll run the instances the time they use their systems, and if
they leave them idle all day/night that would just be better, although
they should be able to specify to the team normally the hours their
systems would be usable by the devs.

There should be a list of users that are able to share their resources
and each dev(s) would be given a certain number of instances depending
on their needs and such.

I know that you might think that doing this will lower the contributor's
desktop experience (as VMs tend to be somewhat heavy while compiling).
The usage of the AUTOGROUP kernel scheduler and cgroups tends to make
the desktop very much usable under high CPU pressure.

Please review this, and if you agree that it'd be a good idea come with
any suggestions to make it happen as well as with any other
thoughts/sys-specs/instances we should be looking for. If you don't
think this is a good idea or that it won't profit the Gentoo dev team,
please tell me why.


Regards,
Denis M. (Phr33d0m)


PS: This is a re-send as I firstly sent it without subscribing to the ML. So 
sorry if you receive it 2 times.

[1] I apologize if this statement is wrong, it's based of my 0 knowledge
on the other arches and the resources they need.







signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] Suggestion: support the Dev team with system resources

2013-11-06 Thread Andreas K. Huettel
Am Donnerstag, 7. November 2013, 00:18:19 schrieb Denis M.:
 Hello gentoo-dev@,
 
 Starting with a little intro, I'm currently providing a Gentoo VM to a
 gentoo dev (Agostino Sarubbo (ago)) for the purpose of
 testing/stabilizing/keywording packages, which is part of his task as a
 developer and being part of the AT team. I've been running the VM for
 him for a couple of months now and AFAIK he's been giving it a great use
 ;-).
 
 The main idea here is to allow Gentoo contributors and members (not
 necessary) of the Gentoo community, to be able to support the developer
 team providing their spare system resources, by, for example, running a
 Virtual Machine (or any sort of xen, kvm, virtualbox, vmware,
 whatever...) instance where the devs can run tasks they'd normally
 wouldn't be able to run with their systems, because:
 
...

I appreciate the idea, but security-wise it's pretty dangerous - given that 
you as a Gentoo dev are doing sensitive work that may affect many people on a 
machine not controlled by you yourself nor Gentoo Infra.

Call me paranoid, but please no. And in absolutely no case one should commit 
to the tree from such a machine, even with stuff like agent forwarding.

-- 

Andreas K. Huettel
Gentoo Linux developer 
dilfri...@gentoo.org
http://www.akhuettel.de/



signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-dev] Suggestion: support the Dev team with system resources

2013-11-06 Thread Denis M.
On 11/07/2013 12:37 AM, Andreas K. Huettel wrote:
 Am Donnerstag, 7. November 2013, 00:18:19 schrieb Denis M.:
 Hello gentoo-dev@,

 Starting with a little intro, I'm currently providing a Gentoo VM to a
 gentoo dev (Agostino Sarubbo (ago)) for the purpose of
 testing/stabilizing/keywording packages, which is part of his task as a
 developer and being part of the AT team. I've been running the VM for
 him for a couple of months now and AFAIK he's been giving it a great use
 ;-).

 The main idea here is to allow Gentoo contributors and members (not
 necessary) of the Gentoo community, to be able to support the developer
 team providing their spare system resources, by, for example, running a
 Virtual Machine (or any sort of xen, kvm, virtualbox, vmware,
 whatever...) instance where the devs can run tasks they'd normally
 wouldn't be able to run with their systems, because:

 ...

 I appreciate the idea, but security-wise it's pretty dangerous - given that 
 you as a Gentoo dev are doing sensitive work that may affect many people on a 
 machine not controlled by you yourself nor Gentoo Infra.

I completely agree with this, but it's not entirely true. Why? I'll give
the example of the AT team:

1. You sync the tree before you start your work (that way you verify the
tree is clean).
2. Then you start testing the packages or bugs you're after, which in
matter of security is meaningless because testing packages is usually
just compiling and running to see if it works as expected.
2.1. Apply random patches to fix if there's an issue.
2.2. goto 2.
3. etc...

I see no issue in this in matter of security.

Another example would be devs testing packages under development
(internal usage in gentoo), for example how new versions of
openrc/systemd/glibc/whatever can affect X.

I do understand your concern, although I wouldn't call you paranoid as
it's just normal to not trust a system that's not completely under your
control, but as I said, you don't really... 'care' about it/that.


 Call me paranoid, but please no. And in absolutely no case one should commit 
 to the tree from such a machine, even with stuff like agent forwarding.


Of course! Commiting or any other form of direct communication with the
gentoo infra. (either commit to tree or `git push`-ing to any of the
other gentoo repos) would be highly discouraged, and I didn't, in any
moment, think someone would think of doing that :P.

The idea behind this is using the provided instance only and exclusively
for testing something you'd normally can't do on your system.


Regards,
Denis M.



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] friendly reminder wrt net virtual in init scripts

2013-11-06 Thread Thomas D.
Hi,

mingdao wrote:
 Now, if any one of us turned off OCSP as Michael suggested, what should one do
 after turning it back on? Could there now be certificates trusted there which
 should not be?

Well, only your current browser session can be affected. For Firefox:

  History - Clear Recent History - Details

In the dialog, just check Active logins and click Clear Now.

This should clear any existing SSL state cache.


For Chrome it is a bit harder, because Chrome doesn't offer such an
option AFAIK (see [1]). Also, it depends on the SSL backend you are using.


PS: To enable OCSP in Chrome, go to chrome://settings/advanced

  Security
Manage Certificates...
  Check for server certificate revocation

It is disabled by default, due to performance concerns :(



See also:
=
[1] http://code.google.com/p/chromium/issues/detail?id=90454


-- 
Regards,
Thomas




signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] friendly reminder wrt net virtual in init scripts

2013-11-06 Thread Michael Orlitzky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 11/06/2013 02:11 PM, Thomas D. wrote:
 
 This is going OT but I cannot leave this statement uncommented,
 because from my knowledge this is wrong/you are hiding important
 information everyone should know about:

I figure everyone here is smart enough to google OCSP before
unchecking the box. This isn't the place to argue that the CA system
is broken, but I will respond to a few points.


 Yes, there is a known MITM attacks against OCSP, see [4]. But this
 is only possible due to bad default settings: Just change your OCSP
 setting to *require* a valid answer. In Firefox:
 
 ...
 
 If you are aware about any other know attacks, please share.
 

Replay attacks, mentioned in the RFC (or Google). These could be
mitigated, but no one has bothered.



 Regarding your privacy concerns: No, your OCSP-enabled browser
 won't share the address (URL) with the OCSP responder. Your browser
 will use the site's certificate serial number to ask the OCSP
 responder if the certificate is still valid. Yes, the company who
 is running the OCSP responder is able to log You [IP, UA...]
 requested status for certificates with the serial number 0x1, 0x2,
 0x3 and because the OCSP responder needs some basic knowledge 
 about the certificates it should provide answers for, the operator
 may know that the certificate with the serial number 0x1 has the
 Common Name (CN) www.mysecretsite.invalid and 0x2 was issued for 
 www.mydarksecrets.invalid or 0x3 was for www.facebook.com, but
 the operator doesn't know the URL you visited.

This is a long way of saying it sends the address of every website
you visit to a third party.



 They are improving OCSP. The next big thing is OCSP stapling [8,9]
 which is now supported by all major browsers and patches are
 available for most web servers. OCSP stapling was developed to save
 the extra round trip to the OCSP responder, but OCSP
 stapling-enabled websites will also increase your privacy,
 because you don't longer have to tell the OCSP responder the 
 certificate (CN) you want to check.

That's cool, but it doesn't exist now and won't for years. And as a
visitor you have no way of knowing whether the server supports it (==
your privacy will be kept).



 If you are still really concerned about what OCSP may do to your 
 privacy, may I ask if you are also concerned about DNS servers? If
 not, what's the difference between an OCSP responder which you ask
 for a serial number, which can be resolved to a CN and a DNS server
 which you ask for a ... CN? :)

Only two DNS servers are involved; mine and those of the domain I'm
visiting.


 Also, you are trusting a CA to secure your connections, but you
 don't trust the same CA due to privacy concerns?

You're conflating two things here. I trust AES to keep my connection
safe. I don't send my data to the CA.


 If you don't trust any CA, we don't have to talk about things like
 OCSP or CRL and revocation...

Well there we agree. Why would you trust the CAs? You don't know them
personally and you aren't their customer.

Do you trust the governments of the USA and China? (Hint: you
shouldn't.) If the answer is no, then you don't trust the CA system.
So whether or not you trust them to revoke that authentication is a
moot point.

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)

iQIcBAEBAgAGBQJSeuYkAAoJEBxJck0inpOigpUP/3AqhOXf3D5nPzHZumJw9iv6
/9eXu2MMgoZTdwILAc0GnlSwnstTgaI/WZYFHRsU24DQsCQxCMr8VnJnirRNv0Zz
EB+fu3i991e85BloxaZaC3nDcJ5cDB3WjEOfUi4adHVEaY71eAKlwge2P9jG2t9B
60HslYxK9pBhmCzqfpxViunSZV36w4mGOSB9X8ajagkklW4BGzP508czzX0KU/HH
zBxhRxowuLKzIKQZ0R996bEk7b0STadNbTllSyF4850Iftm9Aj+smYHXmbO5wT1I
lYWJGP11bAZfbObstG+ZepST98FxsZGke80LicydNIvZ13tnqYLYERYdxb9GVMB/
/hO4wi53ltvEtb6/7uy/ec3jg5x8V3e6ZidHu/4ObToYZF4gzsNZ8agLazFEHA54
Xpk3+nh8ypJPBdBiJZuuYQckUFwXzTpEXqpfb5X6c38F6pOxNElexuAa57coIqoy
M8ZsMoTr3oCYsRC5lRFmb6uv9WZZDi6iRSTh5z78fzxc3/ynF7SYmJIQEIKzZDnn
FxEAjjhLrJtFCkfFWd1GaIJjrwLjcX+laMJrx6zqkjG3BvQRGTvO2md5m7WoX0v9
0MmxfMsjkQpDV7e/w4gxNG6aZzf1kvBZXPhdFuLJM1NEbD40xoJC90E+y9LsENbV
++m0ObSQf+JfCMcqH0BS
=PbZR
-END PGP SIGNATURE-



Re: [gentoo-dev] OCSP Was: friendly reminder wrt net virtual in init scripts

2013-11-06 Thread Thomas D.
Hi,

Duncan wrote:
 Meanwhile, another question for Thomas.  Is this certificate stapling 
 the same thing google chrome is now doing for the google site, that 
 enabled it to detect the (I think it was) Iranian and/or Chinese CA 
 tampering, allowing them to say a google cert was valid that was 
 actually their MitM cert, as appeared in the tech-news a few months ago?  
 Or was that something different?
 
 I had interpreted (well, I think I read, but either the journalist could 
 have been mixed up too, or maybe I was misinterpreting what I read, 
 either way the effect on my understanding is the same) the certificate 
 stapling referred to at the time as indicating that google configured 
 the certs for their own sites into chrome as shipped itself, effectively 
 hard-coding them, NOT as google handling its own OCSP requests, as OCSP 
 cert stapling does.  So now I'm wondering if I interpreted wrong then, or 
 if there's actually two different things being referred to as certificate 
 stapling, here.

No, OCSP Stapling is something else.

Guess you are talking about HSTS and SSL pinning [1,2]: In Google
Chrome, they hard coded some certificates/certificate meta data [3]
which must be present in every certificate used for any Google site.

If you connect to a Google site for example and this site will use a
certificate from a CA not specified in [3] (depending on the service,
they may also verify against a list of known fingerprints like EV SSL is
working), connection will be terminated and the browser will send some
details to Google so they get noticed.



See also:
=
[1]
http://blog.chromium.org/2011/06/new-chromium-security-features-june.html

[2] https://www.imperialviolet.org/2011/05/04/pinning.html

[3] http://www.googblogs.com/uncategorized/changes-to-our-ssl-certificates/


-- 
Regards,
Thomas




signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] OCSP was: friendly reminder wrt net virtual in init scripts

2013-11-06 Thread Alex Xu
On 06/11/13 08:00 PM, Michael Orlitzky wrote:
 On 11/06/2013 02:11 PM, Thomas D. wrote:
 
 This is going OT but I cannot leave this statement uncommented,
 because from my knowledge this is wrong/you are hiding important
 information everyone should know about:
 
 I figure everyone here is smart enough to google OCSP before
 unchecking the box. This isn't the place to argue that the CA system
 is broken, but I will respond to a few points.

I figure everyone here is smart enough not to spread knowingly-incorrect
propaganda.

 
 Yes, there is a known MITM attacks against OCSP, see [4]. But this
 is only possible due to bad default settings: Just change your OCSP
 setting to *require* a valid answer. In Firefox:
 
 ...
 
 If you are aware about any other know attacks, please share.
 
 
 Replay attacks, mentioned in the RFC (or Google). These could be
 mitigated, but no one has bothered.
 
 
 
 Regarding your privacy concerns: No, your OCSP-enabled browser
 won't share the address (URL) with the OCSP responder. Your browser
 will use the site's certificate serial number to ask the OCSP
 responder if the certificate is still valid. Yes, the company who
 is running the OCSP responder is able to log You [IP, UA...]
 requested status for certificates with the serial number 0x1, 0x2,
 0x3 and because the OCSP responder needs some basic knowledge 
 about the certificates it should provide answers for, the operator
 may know that the certificate with the serial number 0x1 has the
 Common Name (CN) www.mysecretsite.invalid and 0x2 was issued for 
 www.mydarksecrets.invalid or 0x3 was for www.facebook.com, but
 the operator doesn't know the URL you visited.
 
 This is a long way of saying it sends the address of every website
 you visit to a third party.

Addresses, in the context of web browsing, are commonly understood to
mean URLs, which include protocol, name, port, and path.

OCSP only sends the name portion. Thus, the statement was a long way
of saying you are wrong..

 
 
 They are improving OCSP. The next big thing is OCSP stapling [8,9]
 which is now supported by all major browsers and patches are
 available for most web servers. OCSP stapling was developed to save
 the extra round trip to the OCSP responder, but OCSP
 stapling-enabled websites will also increase your privacy,
 because you don't longer have to tell the OCSP responder the 
 certificate (CN) you want to check.
 
 That's cool, but it doesn't exist now and won't for years. And as a
 visitor you have no way of knowing whether the server supports it (==
 your privacy will be kept).

DH3, and incorrect. Firefox, Apache, and nginx all support OCSP stapling
RIGHT NOW.

 
 If you are still really concerned about what OCSP may do to your 
 privacy, may I ask if you are also concerned about DNS servers? If
 not, what's the difference between an OCSP responder which you ask
 for a serial number, which can be resolved to a CN and a DNS server
 which you ask for a ... CN? :)
 
 Only two DNS servers are involved; mine and those of the domain I'm
 visiting.

Not necessarily. Your name server may in fact not be a recursive name
server, but delegate some portion to a recursive name server.

 
 Also, you are trusting a CA to secure your connections, but you
 don't trust the same CA due to privacy concerns?
 
 You're conflating two things here. I trust AES to keep my connection
 safe. I don't send my data to the CA.

You're conflating two things here. If you trust the CA, you trust them
not to perform a MitM attack.

 
 If you don't trust any CA, we don't have to talk about things like
 OCSP or CRL and revocation...
 
 Well there we agree. Why would you trust the CAs? You don't know them
 personally and you aren't their customer.
 
 Do you trust the governments of the USA and China? (Hint: you
 shouldn't.) If the answer is no, then you don't trust the CA system.
 So whether or not you trust them to revoke that authentication is a
 moot point.
 

False dichotomy.



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] friendly reminder wrt net virtual in init scripts

2013-11-06 Thread Thomas D.
Hi,

Michael Orlitzky wrote:
 If you are aware about any other know attacks, please share.
 
 Replay attacks, mentioned in the RFC (or Google). These could be
 mitigated, but no one has bothered.

The OCSP response is signed. The signature contains a time stamp. If
your clock is right, replay attacks are only possible for the expected
lifespan of the response. But because it is expected that an OCSP
response is valid for x hours, it is not a real problem.

But sadly there are some CA which are serving pre-generated OCSP
responses which are valid for 7 days (like their CRLs). 7 days can be
very long... :(


 This is a long way of saying it sends the address of every website
 you visit to a third party.

See Alex's reply. I wanted to make it clear to everyone, that the
address isn't the full URL.


 If you are still really concerned about what OCSP may do to your 
 privacy, may I ask if you are also concerned about DNS servers? If
 not, what's the difference between an OCSP responder which you ask
 for a serial number, which can be resolved to a CN and a DNS server
 which you ask for a ... CN? :)
 
 Only two DNS servers are involved; mine and those of the domain I'm
 visiting.

Again, please see Alex's reply. Also, if you are using your *own* DNS
server, you are *special*. But most people will use the DNS server from
their ISP. And I wasn't talking about *special* people who are able to
run everything in their own trusted environment.


 Also, you are trusting a CA to secure your connections, but you
 don't trust the same CA due to privacy concerns?
 
 You're conflating two things here. I trust AES to keep my connection
 safe. I don't send my data to the CA.

CAs not only issue certificates. They should also make sure that they
only issue secure certificates:

  - Require a secure signing algorithm
  - Require a secure key size

You could use the best algorithm available. But if the certificate's
private key is shared with others, others are able to decrypt the
captured secure traffic.

The CAB forum for example says that no CA is allowed to create the key
used for any issued customer certificate.

So when you are using a pre-populated list of trusted CAs you are also
expecting that these CAs are doing their jobs right.

IF you don't do that, you shouldn't use them.


 If you don't trust any CA, we don't have to talk about things like
 OCSP or CRL and revocation...
 
 Well there we agree. Why would you trust the CAs? You don't know them
 personally and you aren't their customer.
 
 Do you trust the governments of the USA and China? (Hint: you
 shouldn't.) If the answer is no, then you don't trust the CA system.
 So whether or not you trust them to revoke that authentication is a
 moot point.

Well, that's another discussion. As said before, we don't have to talk
about these things if you don't trust a system called Web of trust :)

But because most people live in this (broken) system (this is
reality!), do you still think telling them they should disable OCSP,
which will actually disable an important feature (again, without OCSP
you are unable to check a certificate for revocation in Firefox) and
make them vulnerable to a new threat is a good thing?


-- 
Regards,
Thomas



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] OCSP was: friendly reminder wrt net virtual in init scripts

2013-11-06 Thread Gordon Pettey
On Wed, Nov 6, 2013 at 7:36 PM, Alex Xu alex_y...@yahoo.ca wrote:
 On 06/11/13 08:00 PM, Michael Orlitzky wrote:
 On 11/06/2013 02:11 PM, Thomas D. wrote:

 This is going OT but I cannot leave this statement uncommented,
 because from my knowledge this is wrong/you are hiding important
 information everyone should know about:

 I figure everyone here is smart enough to google OCSP before
 unchecking the box. This isn't the place to argue that the CA system
 is broken, but I will respond to a few points.

 I figure everyone here is smart enough not to spread knowingly-incorrect
 propaganda.

 Regarding your privacy concerns: No, your OCSP-enabled browser
 won't share the address (URL) with the OCSP responder. Your browser
 will use the site's certificate serial number to ask the OCSP
 responder if the certificate is still valid. Yes, the company who
 is running the OCSP responder is able to log You [IP, UA...]
 requested status for certificates with the serial number 0x1, 0x2,
 0x3 and because the OCSP responder needs some basic knowledge
 about the certificates it should provide answers for, the operator
 may know that the certificate with the serial number 0x1 has the
 Common Name (CN) www.mysecretsite.invalid and 0x2 was issued for
 www.mydarksecrets.invalid or 0x3 was for www.facebook.com, but
 the operator doesn't know the URL you visited.

 This is a long way of saying it sends the address of every website
 you visit to a third party.

 Addresses, in the context of web browsing, are commonly understood to
 mean URLs, which include protocol, name, port, and path.

 OCSP only sends the name portion. Thus, the statement was a long way
 of saying you are wrong..

A bit of additional consideration:

Given the above statement and RFC 2560, OCSP sends the certificate serial,
not the name. With the availability of Wildcard certificates and the
subjectAltName parameter, with many certificates that serial will not let the
CA actually know which domain you are visiting.