[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-27 Thread Eric Desrochers
** Patch removed: "zesty_openssl_lp1674399.debdiff" https://bugs.launchpad.net/ubuntu/zesty/+source/openssl/+bug/1674399/+attachment/4868385/+files/zesty_openssl_lp1674399.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscrib

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-26 Thread Eric Desrochers
xenial_openssl_lp1674399.debdiff ** Patch added: "xenial_openssl_lp1674399.debdiff" https://bugs.launchpad.net/ubuntu/xenial/+source/openssl/+bug/1674399/+attachment/4868386/+files/xenial_openssl_lp1674399.debdiff -- You received this bug notification because you are a member of Ubuntu Touch

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-26 Thread Eric Desrochers
zesty_openssl_lp1674399.debdiff ** Patch added: "zesty_openssl_lp1674399.debdiff" https://bugs.launchpad.net/ubuntu/xenial/+source/openssl/+bug/1674399/+attachment/4868385/+files/zesty_openssl_lp1674399.debdiff -- You received this bug notification because you are a member of Ubuntu Touch se

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-26 Thread Eric Desrochers
Here's the highligh of the discussion I had in #ubuntu-release with infinity about my proposal in comment #6. For SRU, I had a talk with apw and rbasak about this bug a couples weeks ago LP: #1674399, could you please look at this bug and based on the Descriptions and comment #6 if this looks elig

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-26 Thread Eric Desrochers
Attaching Artful debdiff ** Patch added: "artful_openssl_lp1674399.debdiff" https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1674399/+attachment/4868343/+files/artful_openssl_lp1674399.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded package

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-26 Thread Eric Desrochers
[For SRU Verification team] Context : Previous IRC discussion with apw/rbasak about this case : https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1674399/comments/2 AMD released a new CPU called "Ryzen" that now support "Intel SHA extensions" technology. In current Ubuntu openssl package sh

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-25 Thread Eric Desrochers
** Description changed: [Impact] * Context: AMD added support in their processors for SHA Extensions[1] (CPU flag: sha_ni[2]) starting with Ryzen[3] CPU. Note that Ryzen CPU come in 64bit only (Confirmed with AMD representative). Current OpenSSL version in Ryzens still calls SHA

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-25 Thread Eric Desrochers
** Description changed: [Impact] * Context: AMD added support in their processors for SHA Extensions[1] (CPU flag: sha_ni[2]) starting with Ryzen[3] CPU. Note that Ryzen CPU come in 64bit only (Confirmed with AMD representative). Current OpenSSL version in Ryzens still calls SHA

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-25 Thread Eric Desrochers
Another test "Openssl speed" [Without patch] $ openssl speed sha1 Doing sha1 for 3s on 16 size blocks: 9969152 sha1's in 3.00s Doing sha1 for 3s on 64 size blocks: 8019164 sha1's in 3.00s Doing sha1 for 3s on 256 size blocks: 5254219 sha1's in 2.99s Doing sha1 for 3s on 1024 size blocks: 2217067

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-25 Thread Eric Desrochers
So far my test reveal the following : # Note that the below test has been made on a Ryzen system # [Without patch] * Generated a checksum of a big file (e.g. 5GB file) with openssl $ time /usr/bin/openssl dgst -sha256 /var/tmp/5Gfile SHA256(/var/tmp/5Gfile)= 8d448d81521cbc1bfdc04dd199d448bd3c

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-24 Thread Eric Desrochers
Debian bug : https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861145 ** Bug watch added: Debian Bug tracker #861145 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861145 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-24 Thread Eric Desrochers
** Changed in: openssl (Ubuntu Xenial) Assignee: (unassigned) => Eric Desrochers (slashd) ** Changed in: openssl (Ubuntu Zesty) Assignee: (unassigned) => Eric Desrochers (slashd) ** Changed in: openssl (Ubuntu Artful) Assignee: (unassigned) => Eric Desrochers (slashd) *

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-24 Thread Eric Desrochers
** Description changed: * Context AMD added support in their processors for SHA Extensions[1] (CPU flag: sha_ni[2]) starting with Ryzen[3] CPU. Note that Ryzen CPU come in 64bit only (Confirmed with AMD representative). Current OpenSSL version in Ryzens still calls SHA for SSSE3 routi

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-24 Thread Eric Desrochers
** Description changed: * Context - AMD added support in their processors for SHA Extensions[1] / CPU flag: - sha_ni[2] starting with Ryzen CPU. Current OpenSSL version in Ryzens - still calls SHA for SSSE3 routine as result a number of extensions were - effectively masked on Ryzen and shows

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-23 Thread Eric Desrochers
** Description changed: - AMD added support in their processors for SHA Extensions starting with - Ryzen CPU. Current OpenSSL version in Ryzens still calls SHA for SSSE3 - routine as result a number of extensions were effectively masked on - Ryzen and shows no improvement. + * Context - It has

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-21 Thread Eric Desrochers
** Also affects: openssl (Ubuntu Zesty) Importance: Undecided Status: New ** Also affects: openssl (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: openssl (Ubuntu Xenial) Status: New => Triaged ** Changed in: openssl (Ubuntu Zesty) Status: New =

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-04-21 Thread Eric Desrochers
** Description changed: + AMD added support in their processors for SHA Extensions starting with + Ryzen CPU. Current OpenSSL version in Ryzens still calls SHA for SSSE3 + routine and shows no improvement. + It has been brought to my attention that : "CPUID detection in OpenSSL does not prope

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Changed in: isc-dhcp (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: isc-dhcp (Ubuntu Xenial) Assignee: (unassigned) => Eric Desrochers (slashd) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Description changed: [Impact] In trusty, there is only 1 version of dhclient, including #define NSUPDATE, which introduce DDNS functionnality. The DDNS functionnality, generate 2 random extra ports between 1024-65535. Impact reported by users : "One impact of these random po

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Description changed: [Impact] In trusty, there is only 1 version of dhclient, including #define NSUPDATE, which introduce DDNS functionnality. The DDNS functionnality, generate 2 random extra ports between 1024-65535. Impact reported by users : "One impact of these random po

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Patch removed: "lp1176046_xenial.debdiff" https://bugs.launchpad.net/ubuntu/trusty/+source/isc-dhcp/+bug/1176046/+attachment/4864920/+files/lp1176046_xenial.debdiff ** Patch added: "lp1176046_xenial.debdiff" https://bugs.launchpad.net/ubuntu/trusty/+source/isc-dhcp/+bug/1176046/+attachm

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Patch added: "lp1176046_trusty.debdiff" https://bugs.launchpad.net/ubuntu/trusty/+source/isc-dhcp/+bug/1176046/+attachment/4864919/+files/lp1176046_trusty.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Patch added: "lp1176046_xenial.debdiff" https://bugs.launchpad.net/ubuntu/trusty/+source/isc-dhcp/+bug/1176046/+attachment/4864920/+files/lp1176046_xenial.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
@rbasak, * Un-version the "Replaces:" as discussed : DONE - Upgrade Trusty->Xenial with isc-client-dhcp pkg successfully completed with expected result - Upgrade Trusty->Xenial with isc-client-dhcp-noddns pkg successfully completed with expected result * Fix typo here and there : DONE * Add (L

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Description changed: [Impact] In trusty, there is only 1 version of dhclient, including #define NSUPDATE, which introduce DDNS functionnality. The DDNS functionnality, generate 2 random extra ports between 1024-65535. Impact reported by users : "One impact of these random po

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Description changed: [Impact] In trusty, there is only 1 version of dhclient, including #define NSUPDATE, which introduce DDNS functionnality. The DDNS functionnality, generate 2 random extra ports between 1024-65535. Impact reported by users : "One impact of these random po

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Patch added: "verif-xenial.debdiff" https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1176046/+attachment/4864794/+files/verif-xenial.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu. htt

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
** Patch added: "verif-trusty.debdiff" https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1176046/+attachment/4864795/+files/verif-trusty.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu. htt

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-04-19 Thread Eric Desrochers
Hi Robie, To answer your questions... * Are you proposing your debdiff in commit 40 as ready for upload to Trusty? No, here's the final one (that I sent you by email), but I will attach them to the LP bug now. verif-trusty.debdiff verif-xenial.debdiff * Or is it still in progress? No, I did b

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-03-27 Thread Eric Desrochers
** Changed in: openssl (Ubuntu) Assignee: Eric Desrochers (slashd) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssl in Ubuntu. https://bugs.launchpad.net/bugs/1674399 Title: OpenSSL

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-03-20 Thread Eric Desrochers
Here's some context after a conversation about this bug on channel : #ubuntu-release ... [10:01:50] hi SRU, I'm currently working on a case (no LP bug yet) about an OpenSSL bug on new AMD CPU (Ryzen) released last Feb ... where the SHA Extension routine is not called on AMD Ryzen cores. My

[Touch-packages] [Bug 1674399] Re: OpenSSL CPU detection for AMD Ryzen CPUs

2017-03-20 Thread Eric Desrochers
* Repository : https://github.com/openssl/openssl.git * Commits : 1aed5e1 crypto/x86*cpuid.pl: move extended feature detection. f8418d8 crypto/x86_64cpuid.pl: move extended feature detection upwards. - Eric -- You received this bug notification because you are a member of Ubuntu Touch seeded p

[Touch-packages] [Bug 1674399] [NEW] OpenSSL CPU detection for AMD Ryzen CPUs

2017-03-20 Thread Eric Desrochers
Public bug reported: It has been brought to my attention that : "CPUID detection in OpenSSL does not properly detect potential optimizations for AMD processors." After further verification on my side : Extended feature flags were not pulled on AMD processors, as result a number of extensions we

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-03-02 Thread Eric Desrochers
Feedback from the field about the test package of "isc-dhcp-client- noddns" I made for someone interested to give it a try before the SRU: "... we've tried it out and didn’t notice anything unusual, but I suspect we would only see problems if there are any if we ran it 1000s of times in ci. I als

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-03-02 Thread Eric Desrochers
Feedback from the field about the test package of "isc-dhcp-client- noddns" I made for someone interested to give it a try before the SRU: "... we've tried it out and didn’t notice anything unusual, but I suspect we would only see problems if there are any if we ran it 1000s of times in ci. I als

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-02-01 Thread Eric Desrochers
Quick note saying that the work is still in progress -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu. https://bugs.launchpad.net/bugs/1176046 Title: isc-dhcp dhclient listens on extra random ports St

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2017-01-27 Thread Eric Desrochers
Great thanks Andrew ! ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1648901 Title: SPNEGO crash on mec

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2017-01-27 Thread Eric Desrochers
@dwmw2, @Andrew Jorgensen, or anyone else affected by this bug. As you may have notice, there is currently a call for testing a proposed version of the source package "krb5". This is the last step before the package make its way into xenial- updates (final destination) Could you please try the p

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2017-01-23 Thread Eric Desrochers
As per a irc conversation with the SRU team (apw), The existing krb5 (1.13.2+dfsg-5ubuntu1) has a regressing ADT test so it stuck in -proposed. Thus, preventing krb5 (1.13.2+dfsg-5ubuntu2) to land in -proposed. SRU team are looking at this as we speak. - Eric -- You received this bug notifica

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2017-01-23 Thread Eric Desrochers
** Description changed: == SRU JUSTIFICATION == [Impact] * Chrome (and other things) crash (segfault) when Kerberos fails to authenticate. Thread 22 "Chrome_IOThread" received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x7fffdd687700 (LWP 14851)] spnego_gss_inq

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2017-01-16 Thread Eric Desrochers
** Tags removed: sts-sponsor -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1648901 Title: SPNEGO crash on mechanism failure Status in krb5 package in Ubuntu: Fix Released

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2017-01-11 Thread Eric Desrochers
Installing isc-dhcp-client-noddns on Trusty and then upgrade to Xenial with a local archive of a modified Xenial's isc-dhcp-client to replace isc-dhcp-client-noddns package to isc-dhcp-client during release upgrade from Trusty to Xenial work as expected with a completed successful release upgrade.

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-21 Thread Eric Desrochers
** Patch added: "V2_lp1648901_xenial.debdiff" https://bugs.launchpad.net/ubuntu/xenial/+source/krb5/+bug/1648901/+attachment/4794810/+files/V2_lp1648901_xenial.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 i

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-21 Thread Eric Desrochers
** Patch removed: "V2_lp1648901_xenial" https://bugs.launchpad.net/ubuntu/xenial/+source/krb5/+bug/1648901/+attachment/4794729/+files/V2_lp1648901_xenial.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubun

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-21 Thread Eric Desrochers
** Patch added: "V2_lp1648901_xenial" https://bugs.launchpad.net/ubuntu/xenial/+source/krb5/+bug/1648901/+attachment/4794729/+files/V2_lp1648901_xenial.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubuntu

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-20 Thread Eric Desrochers
** Changed in: isc-dhcp (Ubuntu Trusty) Importance: Medium => Wishlist ** Changed in: isc-dhcp (Ubuntu) Importance: High => Undecided -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu. https://bugs.laun

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-19 Thread Eric Desrochers
DEBDIFF for Xenial [1.13.2+dfsg-5ubuntu2] ** Patch added: "lp1648901_xenial" https://bugs.launchpad.net/ubuntu/xenial/+source/krb5/+bug/1648901/+attachment/4794021/+files/lp1648901_xenial.debdiff ** Tags added: sts sts-sponsor sts-sru -- You received this bug notification because you are a

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-19 Thread Eric Desrochers
Here a new version of the actual in progress... debdiff for Trusty. ** Patch added: "V2_debdiff_noddns_proposal_still_in_progress" https://bugs.launchpad.net/ubuntu/trusty/+source/isc-dhcp/+bug/1176046/+attachment/4793975/+files/V2_no_ddns_binary_pkg.debdiff ** Attachment removed: "debdiff_n

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-19 Thread Eric Desrochers
@rbasak, Yes, right this is exactly what I had in mind. Noted for "(no behavioural change from previous version)". -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu. https://bugs.launchpad.net/bugs/1176046

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-18 Thread Eric Desrochers
** Description changed: == SRU JUSTIFICATION == [Impact] - Chrome (and other things) crash (segfault) when Kerberos fails to + * Chrome (and other things) crash (segfault) when Kerberos fails to authenticate. Thread 22 "Chrome_IOThread" received signal SIGSEGV, Segmentation fault.

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-18 Thread Eric Desrochers
** Changed in: krb5 (Ubuntu) Assignee: Eric Desrochers (slashd) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1648901 Title: SPNEGO crash on mechan

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
** Description changed: == SRU JUSTIFICATION == [Impact] Chrome (and other things) crash (segfault) when Kerberos fails to authenticate. Thread 22 "Chrome_IOThread" received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x7fffdd687700 (LWP 14851)] spnego_gss_inqui

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
Great will then start the sru on monday. Thanks for the quick feedback. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1648901 Title: SPNEGO crash on mechanism failure Stat

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
** Description changed: == SRU JUSTIFICATION == [Impact] Chrome (and other things) crash (segfault) when Kerberos fails to authenticate. Thread 22 "Chrome_IOThread" received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x7fffdd687700 (LWP 14851)] spnego_gss_inqui

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
** Changed in: krb5 (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: krb5 (Ubuntu Xenial) Assignee: (unassigned) => Eric Desrochers (slashd) ** Changed in: krb5 (Ubuntu) Status: In Progress => Fix Released ** Changed in: krb5 (Ubuntu Xenial) St

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
** Description changed: == SRU JUSTIFICATION == [Impact] - Chrome (and other things) crash when Kerberos fails to authenticate: - https://bugs.chromium.org/p/chromium/issues/detail?id=554905 + Chrome (and other things) crash (segfault) when Kerberos fails to + authenticate. Thread 2

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
** Description changed: == SRU JUSTIFICATION == [Impact] Chrome (and other things) crash when Kerberos fails to authenticate: https://bugs.chromium.org/p/chromium/issues/detail?id=554905 Thread 22 "Chrome_IOThread" received signal SIGSEGV, Segmentation fault. [Switching to Thr

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
** Description changed: + == SRU JUSTIFICATION == + + [Impact] + + Chrome (and other things) crash when Kerberos fails to authenticate: + https://bugs.chromium.org/p/chromium/issues/detail?id=554905 + + Thread 22 "Chrome_IOThread" received signal SIGSEGV, Segmentation fault. + [Switching to Thr

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
I reviewed the src code of X/Y/Z and only X is affected. Y/Z already have the patch. Eric -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1648901 Title: SPNEGO crash on mech

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
dwmw2, Can you please give a try at this test package ? -- $ sudo add-apt-repository ppa:slashd/fix1648901 $ sudo apt-get update Install the necessary krb5 packages and then test your reproducer. -- Eric -- You received this bug notification because you are a member of Ubuntu Touch seeded pac

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
Ok tks that all I need for now. Will provide a test pkg on Monday for Xenial. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1648901 Title: SPNEGO crash on mechanism failure

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread Eric Desrochers
Dwmw2, On which ubuntu release are you experiencing the situation ? -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to krb5 in Ubuntu. https://bugs.launchpad.net/bugs/1648901 Title: SPNEGO crash on mechanism failure Status i

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-16 Thread Eric Desrochers
Hi andrew, dwmw2 et al, If I build a test package on Monday, will you be amenable to install/test it and then provide feedbacks before I start the SRU ? Addtionnaly, can you provide the detailed steps on how to reproduce the problem ? -- You received this bug notification because you are a memb

[Touch-packages] [Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-16 Thread Eric Desrochers
** Changed in: krb5 (Ubuntu) Importance: Undecided => Low ** Changed in: krb5 (Ubuntu) Assignee: (unassigned) => Eric Desrochers (slashd) ** Changed in: krb5 (Ubuntu) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubu

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-15 Thread Eric Desrochers
@caribou @rbasak Let me share the work (since rbasak seems to like the approach) I've done so far on my above recent proposal : isc-dhcp-client: dhclient with DDNS functionality enabled isc-dhcp-client-noddns : dhclient with DDNS functionality disabled This is a working debdiff, I think

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-13 Thread Eric Desrochers
Maybe we are not looking the situation the right way ... What if we look at this the opposite way ? "isc-dhcp-client" remains the same including the extra random bindings ports. and we introduce a new package "isc-dhcp-client-noddns" that change the dhclient behavior by overriding dhclient and i

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-12 Thread Eric Desrochers
@caribou, yes you are reading this correctly. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu. https://bugs.launchpad.net/bugs/1176046 Title: isc-dhcp dhclient listens on extra random ports Status in isc

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-11 Thread Eric Desrochers
I will evaluate/test the "debian/control" fields possible scenarios this week, and will update the LP with the outcome. rbasak, if you have any ideas/suggestion/piece of advise/... I'm all ears. Eric -- You received this bug notification because you are a member of Ubuntu Touch seeded packages,

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-11 Thread Eric Desrochers
7.6.1 Overwriting files in other packages It is usually an error for a package to contain files which are on the system in another package. However, if the overwriting package declares that it Replaces the one containing the file being overwritten, then dpkg will replace the file from the old pack

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-11 Thread Eric Desrochers
Hmm need to look more in depth but maybe this would work ? By mentionning the "earlier than" ootion. * 7.3 Packages which break other packages - Breaks normally a Breaks entry will have an "earlier than" version clause; such a Breaks is introduced in the version of an (implicit or explicit) depen

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-11 Thread Eric Desrochers
Rectification : I think we will need a mix of both world Recommends: and Break: . Need to check more in deep for implementation though (if applicable) Recommends: for next pkg upgrade and then rely on Breaks: or something similar to that for following pkg upgrade and release upgrade. -- You re

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-11 Thread Eric Desrochers
> This part sounds like it'll work well then, but I'm not sure about the change in release upgrade behaviour above. Good point ! What about "Breaks:" instead of "Recommends:" ? Package A breaks Package B when both packages cannot be simultaneously configured in a system. The package management s

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-10 Thread Eric Desrochers
I picked "Recommends:" based on following explanation : Package A recommends Package B, if the package maintainer judges that most users would not want A without also having the functionality provided by B. Ref: https://www.debian.org/doc/manuals/debian-faq/ch-pkg_basics.en.html Eric -- You re

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-10 Thread Eric Desrochers
> What will happen to existing Trusty users who are relying on the current ddns functionality? Existing Trusty user at next isc-dhcp-client pkg upgrade will automatically receive (Recommends: isc-dhcp-client-ddns). And for users bother by the extra random port they will simply have to apt-get pur

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-10 Thread Eric Desrochers
** Description changed: + [Impact] + + In trusty, there is only 1 version of dhclient, including #define NSUPDATE, which introduce DDNS functionnality. + The DDNS functionnality, generate 2 random extra ports between 1024-65535. + + Impact reported by users : + + "One impact of these random po

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-09 Thread Eric Desrochers
-ddns : dhclient with DDNS functionality enabled (with random extra ports) Eric ** Changed in: isc-dhcp (Ubuntu Trusty) Assignee: (unassigned) => Eric Desrochers (slashd) ** Changed in: isc-dhcp (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: isc-dhcp (Ubuntu

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-05 Thread Eric Desrochers
** Changed in: isc-dhcp (Ubuntu Trusty) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu. https://bugs.launchpad.net/bugs/1176046 Title: isc-dhcp dhclient listens on extra r

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-12-02 Thread Eric Desrochers
** Changed in: isc-dhcp (Ubuntu) Importance: Medium => High -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu. https://bugs.launchpad.net/bugs/1176046 Title: isc-dhcp dhclient listens on extra random por

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-28 Thread Eric Desrochers
** Tags removed: raring -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu. https://bugs.launchpad.net/bugs/1176046 Title: isc-dhcp dhclient listens on extra random ports Status in isc-dhcp package in Ubunt

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-28 Thread Eric Desrochers
> But perhaps it would be simpler to provide users a way to disable this functionality manually? Is there any kind of runtime configuration available? At runtime, it doesn't seem to have a way, for instance, I already tried the following without success: do-forward-updates false; # man dhclient.c

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-28 Thread Eric Desrochers
So long story short, starting with Xenial you have the possibility to install "isc-dhcp-client" which doesn't include the 2 extra port bindings, but if you need it for Dynamic DNS (DDNS) you can optionally install "isc-dhcp-client-ddns". On Trusty, "isc-dhcp-client" combine both. Will ask the SRU

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-28 Thread Eric Desrochers
So long story short, starting with Xenial you have the possibility to install "isc-dhcp-client" which doesn't include the 2 extra port bindings, but if you need it for Dynamic DNS (DDNS) you can optionally install "isc-dhcp-client-ddns". On Trusty, "isc-dhcp-client" combine both, and AFAIK, I don'

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-28 Thread Eric Desrochers
I was able to identify from where the port range list is initialize, and the decision is taken by binary package "libdns162" (source package "bind9")[1] which dhclient relies on. Basically, it randomly takes any port available between 1024 and 65535[2] So there is a port randomization mechanism

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-28 Thread Eric Desrochers
After more investigation, it seems like the 2 extra port-bindings port assignation decision is made by "libdns" itself. https://github.com/wklaebe/bind9/blob/ac1dcdd124a5abdec4969e2c33836d863bf73aa7/lib/dns/dispatch.c#L1921 -- You received this bug notification because you are a member of Ubun

[Touch-packages] [Bug 1639202] Re: Cannot enlist/commission machines in MAAS 2.1 with usb network adapter

2016-11-28 Thread Eric Desrochers
Hi Richard, Thanks for updating the bug with Dave's latest suggestion in order to isolate this particular situation. We will come back to you soon with the next steps. Regards, Eric -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscri

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-25 Thread Eric Desrochers
Rectification, after more investigation here what is happening : Trusty got the random port right away because NSUPDATE is enable at compile time in package "isc-dhcp-client" In Xenial and late (including debian) with commit [b1d5bab630a29f2ca94c458f9402aa43cc5975c4], a new pkg binary package is

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-24 Thread Eric Desrochers
The following debian[1] forum indicate that failover and tracing need to be disabled in order to disable NSUPDATE as well and I confirmed the steps, otherwise the build fails. I'm not too sure if this is the right way to fix this problem as I don't want to introduce new issues that will impact oth

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-24 Thread Eric Desrochers
Applying the Xenial "disable-nsupdate.patch" result in a failling build in Trusty. /<>/server/dhcpd.c:498: undefined reference to `trace_ddns_init' dhcpd-failover.o: In function `dhcp_failover_process_bind_update': /<>/server/failover.c:5225: undefined reference to `ddns_removals' Seems like fail

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-24 Thread Eric Desrochers
NSUPDATE is disabled in Xenial, will keep the same approach for Trusty and then test. More details can be found here : xenial/isc-dhcp-4.3.3/debian/patches/disable-nsupdate.patch description: undefine NSUPDATE author: cchip origin: http://forums.debian.net/viewtopic.php?f=10&t=95273 bug-debian:

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-24 Thread Eric Desrochers
** Changed in: isc-dhcp (Ubuntu) Status: Triaged => In Progress ** Changed in: isc-dhcp (Ubuntu) Assignee: (unassigned) => Eric Desrochers (slashd) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to isc-d

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-24 Thread Eric Desrochers
Then NSUPDATE has been re-enable with debian bug : https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798237 # changelog isc-dhcp (4.3.3-4) unstable; urgency=medium * Reenable NSUPDATE (closes: #798237) I will look at both changes, but most likely the one in #798237 seems more suitable for a wi

[Touch-packages] [Bug 1176046] Re: isc-dhcp dhclient listens on extra random ports

2016-11-24 Thread Eric Desrochers
Sound similar to debian bug : https://bugs.debian.org/cgi- bin/bugreport.cgi?bug=712503 The situation doesn't occur on Xenial (16.04 LTS), but present in Trusty (14.04) as a fix has been first introduce in Ubuntu with version : isc- dhcp (4.3.3-2) Trusty : #netstat -tulp | grep -i dhclient udp

[Touch-packages] [Bug 1607920] Re: zfs services fail on firstboot if zfs-utils is integrated into the deployment image

2016-10-13 Thread Eric Desrochers
Hi scotte, The fix is now released as shown in comment#25 & #26 Eric -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to sysvinit in Ubuntu. https://bugs.launchpad.net/bugs/1607920 Title: zfs services fail on firstboot if zfs

[Touch-packages] [Bug 1632766] Re: time in lxc ubuntu template

2016-10-12 Thread Eric Desrochers
After a talk with stgraber, this is a due to the fact that the Ubuntu LXC I build are using a pre-generated image which uses UTC by default. If you want to change the time on Xenial, in my case date command or other technic didn't have positive impact. The only thing that work so far is to unlink

[Touch-packages] [Bug 1632766] Re: time in lxc ubuntu template

2016-10-12 Thread Eric Desrochers
LXC Container has been created as follow : $ lxc-create -t download -n trusty -- --dist ubuntu --release trusty --arch amd64 $ lxc-create -t download -n xenial -- --dist ubuntu --release xenial --arch amd64 -- You received this bug notification because you are a member of Ubuntu Touch seeded p

[Touch-packages] [Bug 1632766] [NEW] time in lxc ubuntu template

2016-10-12 Thread Eric Desrochers
Public bug reported: With regard to github bug : --- adjust timezone to the host at creation time #47 https://github.com/lxc/lxc/issues/47 --- I still can reproduce the problem on different HW running Xenial with the LXC ubuntu image Trusty and Xenial. * Bare metal (xenial) $ date Wed Oct 12 11

[Touch-packages] [Bug 1607920] Re: zfs services fail on firstboot if zfs-utils is integrated into the deployment image

2016-10-06 Thread Eric Desrochers
Thanks scotte for the feedbacks. ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to sysvinit in Ubuntu. https://bugs.launchpad.net/bugs/1607920 Title: zfs services fail on firstboot if zfs-uti

[Touch-packages] [Bug 1607920] Re: zfs services fail on firstboot if zfs-utils is integrated into the deployment image

2016-10-05 Thread Eric Desrochers
@apw With regard to the translation The commit has been intensively tested in different scenarios/env/... and of course with the "ZFS Test Suite"[1] which include functionality, perf, and stress tests. All the tests were reported as successful. I hope this answer your questions and address

[Touch-packages] [Bug 1607920] Re: zfs services fail on firstboot if zfs-utils is integrated into the deployment image

2016-10-05 Thread Eric Desrochers
@apw To answer your question: "Also as you are changing MNTTAB is there any reason not to be using that here?" The "reading" is redirected to /proc/self/mounts and the "writing" to /etc/mtab, but if it doesn't exist, that's fine. ZFS just won't update /etc/mtab. Ideally, ZFS should be integrate

[Touch-packages] [Bug 1607920] Re: zfs services fail on firstboot if zfs-utils is integrated into the deployment image

2016-10-03 Thread Eric Desrochers
As per irc conversation with apw, I'm merging both LPs #1607920 & #1628279 into one debdiff. ** Patch added: "lp1607920_lp1628279_xenial.debdiff" https://bugs.launchpad.net/ubuntu/xenial/+source/zfs-linux/+bug/1607920/+attachment/4753590/+files/lp1607920_lp1628279_xenial.debdiff -- You recei

<    2   3   4   5   6   7   8   >