Package: wnpp; Maintainer for wnpp is wnpp@debian.org;
Reply or subscribe to this bug.
View this report as an mbox folder, status mbox, maintainer mbox
Report forwarded
to debian-bugs-dist@lists.debian.org, debian-devel@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Fri, 11 Jul 2014 22:09:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Toni Mueller <support@oeko.net>:
New Bug report received and forwarded. Copy sent to debian-devel@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Fri, 11 Jul 2014 22:09:06 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: wnpp Severity: wishlist Owner: Toni Mueller <toni@debian.org> * Package name : libressl Version : 2.0.0 Upstream Author : The OpenBSD project, the OpenSSL project et al. * URL : http://www.libressl.org/ * License : BSD, OpenSSL, SSLeay, Public Domain. Programming Lang: C Description : SSL library, forked from OpenSSL LibreSSL strives to maintain API compatibility with OpenSSL, but do away with all the cruft. After a long series of OpenSSL problems, recently highlighted by the infamous Heartbleed bug, a group inside OpenBSD decided to fork OpenSSL and adapt the code to modern coding standards. Along the way, a lot of compatibility with older architectures and toolchains was discarded.
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sat, 12 Jul 2014 01:12:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Steven Chamberlain <steven@pyro.eu.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sat, 12 Jul 2014 01:12:05 GMT) (full text, mbox, link).
Message #10 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
This is good to see already :) I expect it builds fine on GNU/Linux, with GCC and Clang, unless hardening options are used, then these warnings would be treated as errors: > In file included from md5/md5_locl.h:98:0, > from md5/md5_dgst.c:60: > md5/md5_dgst.c: In function 'md5_block_data_order': > ./md32_common.h:237:66: warning: right-hand operand of comma expression has no effect [-Wunused-value] > # define HOST_c2l(c,l) ((l)=*((const unsigned int *)(c)), (c)+=4, l) > ^ > md5/md5_dgst.c:107:2: note: in expansion of macro 'HOST_c2l' > HOST_c2l(data,l); X( 0)=l; HOST_c2l(data,l); X( 1)=l; > ^ > ./md32_common.h:213:41: warning: right-hand operand of comma expression has no effect [-Wunused-value] > l|=(((unsigned long)(*((c)++))) ), \ > ^ > sha/sha256.c:245:3: note: in expansion of macro 'HOST_c2l' > HOST_c2l(data,l); T1 = X[0] = l; ROUND_00_15(0,a,b,c,d,e,f,g,h); > ^ We'd want to configure with --disable-silent-rules, if debhelper scripts don't already do that. Compiling on GNU/kFreeBSD is possible (and potentially GNU/Hurd) but requires the attached patch *and* a solution for getentropy: 1. try to use getentropy_linux.c - but would have to disable use of Linux-specific sysctls and headers; it is dangerous to rely on only /dev/random, so we should implement replacement sysctls to use on FreeBSD - that could be a bit messy 2. create a new getentropy_freebsd.c - but seems silly as FreeBSD itself does not need it (see solution 3); also does not help GNU/Hurd 3. (my preference) link with libbsd, which already provides a arc4random_buf and so getentropy is not needed at all - WARNING: the libbsd arc4random implementation still uses RC4 at the moment (as on FreeBSD), but OpenBSD has already changed it to use ChaCha20 (see Bug #747671); we'd also want to make sure libbsd's entropy gathering is at least as robust as in getentropy_linux.c Regards, -- Steven Chamberlain steven@pyro.eu.org
[libressl-kfreebsd.patch (text/x-patch, attachment)]
Message sent on
to Toni Mueller <support@oeko.net>:
Bug#754513.
(Sat, 12 Jul 2014 01:12:08 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sat, 12 Jul 2014 05:48:09 GMT) (full text, mbox, link).
Acknowledgement sent
to md@Linux.IT (Marco d'Itri):
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sat, 12 Jul 2014 05:48:09 GMT) (full text, mbox, link).
Message #18 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Jul 12, Toni Mueller <support@oeko.net> wrote: > * Package name : libressl I am highly doubtful at best. What are your plans exactly? Would it have the same SONAME of openssl and conflict+provide it? Would it be a totally different library which packages would build-depend on? Which packages are supposed to use it? -- ciao, Marco
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sat, 12 Jul 2014 11:27:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sat, 12 Jul 2014 11:27:04 GMT) (full text, mbox, link).
Message #23 received at 754513@bugs.debian.org (full text, mbox, reply):
On Sat, Jul 12, 2014 at 12:06:27AM +0200, Toni Mueller wrote: > Package: wnpp > Severity: wishlist > Owner: Toni Mueller <toni@debian.org> > > * Package name : libressl > Version : 2.0.0 > Upstream Author : The OpenBSD project, the OpenSSL project et al. > * URL : http://www.libressl.org/ > * License : BSD, OpenSSL, SSLeay, Public Domain. > Programming Lang: C > Description : SSL library, forked from OpenSSL > > > LibreSSL strives to maintain API compatibility with OpenSSL, but > do away with all the cruft. > > After a long series of OpenSSL problems, recently highlighted by > the infamous Heartbleed bug, a group inside OpenBSD decided to > fork OpenSSL and adapt the code to modern coding standards. > Along the way, a lot of compatibility with older architectures > and toolchains was discarded. I assume that since it's named libressl that the soname will contain "libressl.so"? What about the crypto library? librecrypto.so? What are you doing with the binaries, include files, man pages, ...? Will they conflict with the ones from openssl? If you're interested in maintaining such a package, why did you never respond to the RFH for openssl? Kurt
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Sat, 12 Jul 2014 11:57:13 GMT) (full text, mbox, link).
Acknowledgement sent
to Toni Mueller <toni@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Sat, 12 Jul 2014 11:57:14 GMT) (full text, mbox, link).
Message #28 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi Kurt, On Sat, Jul 12, 2014 at 01:25:47PM +0200, Kurt Roeckx wrote: > What are you doing with the binaries, include files, man pages, > ...? Will they conflict with the ones from openssl? my intention is to package this stuff so one can have both openssl and libressl installed in parallel. libressl currently has libraries with these sonames: libssl.so.26 libcrypto.so.29 > If you're interested in maintaining such a package, why did you > never respond to the RFH for openssl? There are a number of reasons for that, but one has been that I was unhappy about the perceived 'closedness' of the project, and my general feeling that I would like to have an alternative to openssl, which has been festering for several years now. For a while, I was hoping for libgnutls, but after the wakeup call, sent by heartbeat, I tried to figuere out which would be the best way forward, and I generally trust the OpenBSD folks, who are the vast majority behind LibreSSL, much more with respect to their ability to understand security and pursuing a "no backdoors" philosophy than most other people. FWIW, I have well over a decade of very good experience with OpenBSD, although I prefer Debian for most purposes, including a general slant towards "copyleft" (GPL) instead of "copyright" (BSD). They simply provide one of the, or the one, most viable alternatives to OpenSSL, thus helping to break down the obviously unhealthy monopoly that currently is OpenSSL. @Marco et al: I'll answer your other questions RSN, but the first portable release has only appeared yesterday, so it'll take some time until the dust settles. And no, I don't think we should go into production and switch to LibreSSL right now. But we should definitely have it. @Kurt: That should imho go to devel@, not only to you and the BTS. Kind regards, --Toni++
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sat, 12 Jul 2014 12:18:24 GMT) (full text, mbox, link).
Acknowledgement sent
to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sat, 12 Jul 2014 12:18:24 GMT) (full text, mbox, link).
Message #33 received at 754513@bugs.debian.org (full text, mbox, reply):
On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote: > > Hi Kurt, > > On Sat, Jul 12, 2014 at 01:25:47PM +0200, Kurt Roeckx wrote: > > What are you doing with the binaries, include files, man pages, > > ...? Will they conflict with the ones from openssl? > > my intention is to package this stuff so one can have both openssl and > libressl installed in parallel. libressl currently has libraries with > these sonames: > > libssl.so.26 > libcrypto.so.29 I don't really like it, since it could potentionally clash with the ones provided by openssl. But it seems unlikely that openssl will ever use that as soname. I had the feeling openbsd didn't care much about ABI stability, and that being at 26 and 29 already doesn't give me a good feeling either. I hope you don't have to go and change the binary package names each time you upload a new version. > > If you're interested in maintaining such a package, why did you > > never respond to the RFH for openssl? > > There are a number of reasons for that, but one has been that I was > unhappy about the perceived 'closedness' of the project I was never very happy with it either. But it has very recently changed, and I think it's going in the right direction. I'm now also in the openssl development team. > I generally trust > the OpenBSD folks, who are the vast majority behind LibreSSL, much more > with respect to their ability to understand security and pursuing a "no > backdoors" philosophy than most other people. I'm not really sure what you mean by this. I'm pretty sure the openssl development team has a pretty good understanding of security and I don't see anybody adding a backdoor in it. > FWIW, I have well over a > decade of very good experience with OpenBSD Not everybody has the same experience with them. > although I prefer Debian > for most purposes, including a general slant towards "copyleft" (GPL) > instead of "copyright" (BSD). They simply provide one of the, or the > one, most viable alternatives to OpenSSL, thus helping to break down the > obviously unhealthy monopoly that currently is OpenSSL. I think GnuTLS is actually a better alternative and wish there were more people developing and using it. > @Kurt: That should imho go to devel@, not only to you and the BTS. I did intend to send it to the list, but forgot to Cc it, so doing that now. Kurt
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sat, 12 Jul 2014 12:27:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sat, 12 Jul 2014 12:27:12 GMT) (full text, mbox, link).
Message #38 received at 754513@bugs.debian.org (full text, mbox, reply):
On Sat, Jul 12, 2014 at 02:15:13PM +0200, Kurt Roeckx wrote: > On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote: > > There are a number of reasons for that, but one has been that I was > > unhappy about the perceived 'closedness' of the project > > I was never very happy with it either. But it has very recently > changed, and I think it's going in the right direction. I'm now > also in the openssl development team. I'm not sure that you saw this, but we recently published a roadmap document: https://www.openssl.org/about/roadmap.html Kurt
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Sat, 12 Jul 2014 12:51:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Toni Mueller <toni@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Sat, 12 Jul 2014 12:51:05 GMT) (full text, mbox, link).
Message #43 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi Kurt, [ I have trimmed the Cc list - we are all on devel@, anyway, right? ] On Sat, Jul 12, 2014 at 02:15:13PM +0200, Kurt Roeckx wrote: > On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote: > > On Sat, Jul 12, 2014 at 01:25:47PM +0200, Kurt Roeckx wrote: > > > What are you doing with the binaries, include files, man pages, > > > ...? Will they conflict with the ones from openssl? > > > > my intention is to package this stuff so one can have both openssl and > > libressl installed in parallel. libressl currently has libraries with > > these sonames: > > > > libssl.so.26 > > libcrypto.so.29 > > I don't really like it, since it could potentionally clash with > the ones provided by openssl. But it seems unlikely that openssl > will ever use that as soname. > > I had the feeling openbsd didn't care much about ABI stability, > and that being at 26 and 29 already doesn't give me a good feeling > either. I hope you don't have to go and change the binary package > names each time you upload a new version. Actually, these version numbers typically correspond with the version numbers in the rest of their system. As libressl is currently under heavy development, it is imho not to be expected to have that stable ABI you are asking for. OTOH, one guy already switched his entire Linux system over, so far with no visible adverse effects. > I was never very happy with it either. But it has very recently > changed, and I think it's going in the right direction. I'm now > also in the openssl development team. Good. That does help to improve my trust with it. > I'm not really sure what you mean by this. I'm pretty sure the > openssl development team has a pretty good understanding of > security and I don't see anybody adding a backdoor in it. Ok, but for whatever reason, they have an imho not as shiny track record, as has OpenBSD. Which is no wonder, given all the revelations we have had recently, but hey, sometimes one has to make a decision. > > FWIW, I have well over a decade of very good experience with OpenBSD > > Not everybody has the same experience with them. Yes. Not everybody has an intention to use LibreSSL, either, but regarding crypto, they usually know their stuff well above average. See eg. their OpenSSH, which has seen very widespread adoption. > I think GnuTLS is actually a better alternative and wish there > were more people developing and using it. But developing GnuTLS is a full-time job, and then there's the control problem with the FSF - you are certainly aware about the problems the original upstream ran into when he wanted to break loose from the FSF (for a reason I have forgotten). LibreSSL is a much lower-hanging fruit, as it is supposed to be mostly, or entirely, plug-compatible with OpenSSL. To me, the playing field largely looks like this atm: * GnuTLS, with an API incompatible with OpenSSL, thus requiring huge amounts of work to make significant use of it. * MatrixSSL, which once had a dubious license, and which still did not come out too well in the SSL lib comparison I recently saw (see the list archive), * the now newly staffed OpenSSL project, with their mixed track record (eg. "FIPS"), and now * LibreSSL, which sounds much like an OpenSSL on a diet, and with some exercise, and promising thrust behind it, but mostly simply a drop-in. And I guess the BoringSSL people will chime in sooner or later, too... Kind regards, --Toni++
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Sat, 12 Jul 2014 13:06:10 GMT) (full text, mbox, link).
Acknowledgement sent
to Toni Mueller <toni@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Sat, 12 Jul 2014 13:06:10 GMT) (full text, mbox, link).
Message #48 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi, On Sat, Jul 12, 2014 at 07:43:44AM +0200, Marco d'Itri wrote: > On Jul 12, Toni Mueller <support@oeko.net> wrote: > > * Package name : libressl > I am highly doubtful at best. in which respect, and why? > What are your plans exactly? My plan is to first build the package(s) and upload to experimental, so people can start to play with it. > Would it have the same SONAME of openssl and conflict+provide it? I would like to make it co-installable with OpenSSL, but in general, this should be a drop-in replacement until APIs really diverge in a visible way. Yes, it would provide 'openssl', but I intend to place them into a different directory, so you might have to use LD_PATH to get them. Whether it has to conflict with openssl, I'll figure out that later, if otherwise the case would arise that a binary might get libssl from one package, and libcrypto from the other. So far, it looks like a recompile could be necessary. But since the upstream package has seen the light of day only yesterday (see http://article.gmane.org/gmane.os.openbsd.announce/186 for the announcement), things are not yet stable. For the technical side of the discussion, you can read http://dir.gmane.org/gmane.os.openbsd.tech). > Would it be a totally different library which packages would > build-depend on? Packages currently build-depending on openssl should be able to build-depend on "openssl-dev | libressl-dev". For recent versions of OpenSSH, it already works, and another user writes: "Just switched my slackware 14.1 box over to libressl instead of openssl and it's working great so far, no problems at all." So I guess usability is already good. But imho, it does have to stand the test of time, and receive independent review, and much more exposure. Which is one reason why I think it is a very good idea to expose it to the Debian and related communities. Kind regards, --Toni++
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sat, 12 Jul 2014 14:03:07 GMT) (full text, mbox, link).
Acknowledgement sent
to Steven Chamberlain <steven@pyro.eu.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sat, 12 Jul 2014 14:03:07 GMT) (full text, mbox, link).
Message #53 received at 754513@bugs.debian.org (full text, mbox, reply):
On Jul 12, Toni Mueller <support@oeko.net> wrote: > On Sat, Jul 12, 2014 at 07:43:44AM +0200, Marco d'Itri wrote: > > On Jul 12, Toni Mueller <support@oeko.net> wrote: > > > * Package name : libressl > > I am highly doubtful at best. > > in which respect, and why? I think some people are jumping ahead to "oh no! we're replacing OpenSSL?". That's something to be have some rough plan for in case we eventually want to do that. But for now I don't think it's a reason not to package it or even allow it into sid/testing. > > What are your plans exactly? > > My plan is to first build the package(s) and upload to experimental, so > people can start to play with it. It is definitely an interesting piece of software, with some different design choices being made here and there. It even adds some new features (new ciphers and elliptic curves for example) and the utilities are useful standalone (such as for an SSL CA). People can start to play around with it and maybe to try to rebuild packages against it locally. It couldn't be a drop-in replacement for OpenSSL's libssl and libcrypto because the ABI will differ. The source API is being kept as similar as possible so in theory: > Packages currently build-depending on openssl should be able to > build-depend on "openssl-dev | libressl-dev". that sounds like it should just work. Or otherwise, it could reveal if a package uses some 'unsafe' part of the API that OpenBSD has removed during their cleanup. Any incompatibilities or run-time differences are likely interesting to both SSL libraries as it could indicate a bug somewhere. Probably only a minority of people would want to rebuild many packages on their system against LibreSSL. But having it packaged, and co-installable helps people who want to do this. Similarly there is support in the Exim packaging to rebuild with OpenSSL instead of GnuTLS. Regards, -- Steven Chamberlain steven@pyro.eu.org
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 03:54:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Thomas Goirand <zigo@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 03:54:05 GMT) (full text, mbox, link).
Message #58 received at 754513@bugs.debian.org (full text, mbox, reply):
On 07/12/2014 08:46 PM, Toni Mueller wrote: > As libressl is currently under > heavy development, it is imho not to be expected to have that stable ABI > you are asking for. Well, I don't agree with this view. If LibreSSL pretends to be a replacement for OpenSSL, then they should care about being ABI compatible, so we can easily switch from one implementation to the other. Just like for MariaDB / MySQL in fact (not sure if these are still ABI compatible though). If that's not the case, then it looses a lot of its purpose. As Kurt wrote, GNUTLS becomes a better alternative then. > OTOH, one guy already switched his entire Linux > system over, so far with no visible adverse effects. And then? This gives no clue if he had to rebuild everything that build-depended on OpenSSL... On 07/13/2014 01:15 AM, Russ Allbery wrote: > If you start using both for different packages, then you end up with > shared libraries conflicting over which libssl they want to use, and > then bad things start happening. Exactly! I fully agree with you on this. This reminds me issues I had with mod-log-sql linked to MySQL and php as well, and when they were built against different versions... BOOM! I certainly do *not* want this kind of things to happen in Debian. Therefore, I'd very much prefer if we used OpenSSL *or* LibreSSL, but not have the choice between the 2, otherwise, that's a recipe for disaster. Please don't upload LibreSSL to Sid *ever*, unless we collectively decide that we are switching away from OpenSSL (and for which a discussion would have to start). Cheers, Thomas Goirand (zigo)
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 06:21:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Matthias Urlichs <matthias@urlichs.de>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 06:21:05 GMT) (full text, mbox, link).
Message #63 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi,
Thomas Goirand:
> Well, I don't agree with this view. If LibreSSL pretends to be a
> replacement for OpenSSL, then they should care about being ABI
> compatible, so we can easily switch from one implementation to the
> other.
That depends. If the ABI in question includes calls or constants which are
the security equivalent of gets() or scanf("%s") or …, then no.
> As Kurt wrote, GNUTLS becomes a better alternative then.
Does gnutls have an openssl shim which actually works as a generic
replacement? I dimly recall a couple of not-so-nice incompatibilities …
> Therefore, I'd very much prefer if we used OpenSSL *or* LibreSSL, but not
> have the choice between the 2, otherwise, that's a recipe for disaster.
>
Well …
> Please don't upload LibreSSL to Sid *ever*, unless we collectively
> decide that we are switching away from OpenSSL (and for which a
> discussion would have to start).
>
… while IMHO it's possible to safely mix openssl and libressl if we prepare
for that (i.e. make sure that _everything_ in libressl is only exported
with properly versioned symbols), again IMHO the time and effort required
for _that_ would be better spent evaluating the changes both projects made
and then deciding which of the two shall be in Debian.
Both efforts have started fairly recently, so it's kind of premature to do
that now; and while IANARTM (Release Team Member) transitioning the whole
of Debian to libressl closer to the release would not be a good idea even
if we decide it's (going to be) the better alternative.
--
-- Matthias Urlichs
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 10:27:13 GMT) (full text, mbox, link).
Acknowledgement sent
to Jeroen Dekkers <jeroen@dekkers.ch>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 10:27:13 GMT) (full text, mbox, link).
Message #68 received at 754513@bugs.debian.org (full text, mbox, reply):
At Sat, 12 Jul 2014 14:46:45 +0200, Toni Mueller wrote: > On Sat, Jul 12, 2014 at 02:15:13PM +0200, Kurt Roeckx wrote: > > > I'm not really sure what you mean by this. I'm pretty sure the > > openssl development team has a pretty good understanding of > > security and I don't see anybody adding a backdoor in it. > > Ok, but for whatever reason, they have an imho not as shiny track > record, as has OpenBSD. Which is no wonder, given all the revelations we > have had recently, but hey, sometimes one has to make a decision. OpenSSL was part of OpenBSD before they created the LibreSSL fork, so how isn't OpenSSL part of the OpenBSD track record? > > I think GnuTLS is actually a better alternative and wish there > > were more people developing and using it. > > But developing GnuTLS is a full-time job, and then there's the control > problem with the FSF - you are certainly aware about the problems the > original upstream ran into when he wanted to break loose from the FSF > (for a reason I have forgotten). LibreSSL is a much lower-hanging fruit, > as it is supposed to be mostly, or entirely, plug-compatible with > OpenSSL. To me, the playing field largely looks like this atm: > > * GnuTLS, with an API incompatible with OpenSSL, thus requiring huge > amounts of work to make significant use of it. It depends on how you look at it. If you see the OpenSSL API as something that isn't really well designed then other libraries not copying the API is actually a good thing. > * MatrixSSL, which once had a dubious license, and which still did not > come out too well in the SSL lib comparison I recently saw (see the > list archive), > * the now newly staffed OpenSSL project, with their mixed track > record (eg. "FIPS"), and now > * LibreSSL, which sounds much like an OpenSSL on a diet, and with some > exercise, and promising thrust behind it, but mostly simply a > drop-in. You forget one of the big problems with OpenSSL that LibreSSL doesn't fix: the license. It actually makes the mess even bigger, given that some of the GPL exceptions only talk about "the OpenSSL library" and don't exempt OpenSSL-derived code. So even if LibreSSL is a drop-in for OpenSSL we can't replace OpenSSL with LibreSSL for those projects. You also forget to list two other TLS libraries: * NSS, in my opinion the biggest downside of NSS is that it includes NSPR. This both increases the code size a lot and makes the API less nice if I remember correctly. * PolarSSL, which I really like from a technical point of view. Featurewise it is pretty complete (the only major feature it doesn't implement is DTLS AFAICS), while being one tenth the size of OpenSSL / GnuTLS: https://en.wikipedia.org/wiki/Comparison_of_TLS_implementations#Code_size_and_dependencies PolarSSL is also used by OpenVPN-NL, the hardened OpenVPN version that is used by the Dutch government. The downsides are that it looks like it doesn't have a stable API and contributing needs copyright assignment because it is dual-licensed. Kind regards, Jeroen Dekkers
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 10:33:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Thomas Goirand <zigo@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 10:33:04 GMT) (full text, mbox, link).
Message #73 received at 754513@bugs.debian.org (full text, mbox, reply):
On 07/13/2014 02:17 PM, Matthias Urlichs wrote: > Does gnutls have an openssl shim which actually works as a generic > replacement? I dimly recall a couple of not-so-nice incompatibilities As much as I understand, it's a complete alternative with a different API, I don't think there's a compatibility layer (though I didn't look). > while IMHO it's possible to safely mix openssl and libressl if we prepare > for that (i.e. make sure that _everything_ in libressl is only exported > with properly versioned symbols), again IMHO the time and effort required > for _that_ would be better spent evaluating the changes both projects made > and then deciding which of the two shall be in Debian. > > Both efforts have started fairly recently, so it's kind of premature to do > that now; and while IANARTM (Release Team Member) transitioning the whole > of Debian to libressl closer to the release would not be a good idea even > if we decide it's (going to be) the better alternative. I fully agree with what's above. Thomas
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 10:57:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Hommey <mh@glandium.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 10:57:05 GMT) (full text, mbox, link).
Message #78 received at 754513@bugs.debian.org (full text, mbox, reply):
On Sun, Jul 13, 2014 at 08:17:51AM +0200, Matthias Urlichs wrote:
> Hi,
>
> Thomas Goirand:
> > Well, I don't agree with this view. If LibreSSL pretends to be a
> > replacement for OpenSSL, then they should care about being ABI
> > compatible, so we can easily switch from one implementation to the
> > other.
>
> That depends. If the ABI in question includes calls or constants which are
> the security equivalent of gets() or scanf("%s") or …, then no.
>
> > As Kurt wrote, GNUTLS becomes a better alternative then.
>
> Does gnutls have an openssl shim which actually works as a generic
> replacement? I dimly recall a couple of not-so-nice incompatibilities …
>
> > Therefore, I'd very much prefer if we used OpenSSL *or* LibreSSL, but not
> > have the choice between the 2, otherwise, that's a recipe for disaster.
> >
> Well …
>
> > Please don't upload LibreSSL to Sid *ever*, unless we collectively
> > decide that we are switching away from OpenSSL (and for which a
> > discussion would have to start).
> >
> … while IMHO it's possible to safely mix openssl and libressl if we prepare
> for that (i.e. make sure that _everything_ in libressl is only exported
> with properly versioned symbols)
Contrary to what you seem to believe, this only really works if *both*
libraries have versioned symbols. Otherwise, you can end up with
libraries linked against the unversioned one using symbols from the
versioned one at run time when both are loaded in the same address
space.
Mike
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 11:15:04 GMT) (full text, mbox, link).
Acknowledgement sent
to "Bernhard R. Link" <brlink@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 11:15:04 GMT) (full text, mbox, link).
Message #83 received at 754513@bugs.debian.org (full text, mbox, reply):
* Mike Hommey <mh@glandium.org> [140713 12:55]: > > … while IMHO it's possible to safely mix openssl and libressl if we prepare > > for that (i.e. make sure that _everything_ in libressl is only exported > > with properly versioned symbols) > > Contrary to what you seem to believe, this only really works if *both* > libraries have versioned symbols. Otherwise, you can end up with > libraries linked against the unversioned one using symbols from the > versioned one at run time when both are loaded in the same address > space. Actually, "both having versioned symbols" is not enough. It is either "both must always have had versioned symbols" or "both must have versioned symbols now and every binary linked against either must have been built (or rebuilt) after the symbols got versioned". Bernhard R. Link -- F8AC 04D5 0B9B 064B 3383 C3DA AFFC 96D1 151D FFDC
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 12:03:13 GMT) (full text, mbox, link).
Acknowledgement sent
to Matthias Urlichs <matthias@urlichs.de>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 12:03:13 GMT) (full text, mbox, link).
Message #88 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi, Bernhard R. Link: > * Mike Hommey <mh@glandium.org> [140713 12:55]: > > Contrary to what you seem to believe, this only really works if *both* > > libraries have versioned symbols. Otherwise, you can end up with > > libraries linked against the unversioned one using symbols from the > > versioned one at run time when both are loaded in the same address > > space. > > Actually, "both having versioned symbols" is not enough. > It is either "both must always have had versioned symbols" or > "both must have versioned symbols now and every binary linked against > either must have been built (or rebuilt) after the symbols got > versioned". > Bah. Thanks for the correction. However, it seems that the current OpenSSL package _does_ have fully-versioned symbols, at least if I understand "objdump -T" correctly. So the situation may not be as dire as this thread suggests. -- -- Matthias Urlichs
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 13:51:11 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Hommey <mh@glandium.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 13:51:11 GMT) (full text, mbox, link).
Message #93 received at 754513@bugs.debian.org (full text, mbox, reply):
On Sun, Jul 13, 2014 at 02:02:18PM +0200, Matthias Urlichs wrote: > Hi, > > Bernhard R. Link: > > * Mike Hommey <mh@glandium.org> [140713 12:55]: > > > Contrary to what you seem to believe, this only really works if *both* > > > libraries have versioned symbols. Otherwise, you can end up with > > > libraries linked against the unversioned one using symbols from the > > > versioned one at run time when both are loaded in the same address > > > space. > > > > Actually, "both having versioned symbols" is not enough. > > It is either "both must always have had versioned symbols" or > > "both must have versioned symbols now and every binary linked against > > either must have been built (or rebuilt) after the symbols got > > versioned". > > > Bah. Thanks for the correction. > > However, it seems that the current OpenSSL package _does_ have > fully-versioned symbols, at least if I understand "objdump -T" > correctly. > > So the situation may not be as dire as this thread suggests. Well, it kind of is. Because those versioned symbols in openssl come from a debian patch, afaict. So while debian may be fine (as long as all build-rdeps have been rebuilt since openssl got those versioned symbols), other distros aren't covered, as well as binaries not compiled on debian. Mike
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 14:36:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Thomas Goirand <zigo@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 14:36:04 GMT) (full text, mbox, link).
Message #98 received at 754513@bugs.debian.org (full text, mbox, reply):
On 07/13/2014 09:48 PM, Mike Hommey wrote: > On Sun, Jul 13, 2014 at 02:02:18PM +0200, Matthias Urlichs wrote: >> Hi, >> >> Bernhard R. Link: >>> * Mike Hommey <mh@glandium.org> [140713 12:55]: >>>> Contrary to what you seem to believe, this only really works if *both* >>>> libraries have versioned symbols. Otherwise, you can end up with >>>> libraries linked against the unversioned one using symbols from the >>>> versioned one at run time when both are loaded in the same address >>>> space. >>> >>> Actually, "both having versioned symbols" is not enough. >>> It is either "both must always have had versioned symbols" or >>> "both must have versioned symbols now and every binary linked against >>> either must have been built (or rebuilt) after the symbols got >>> versioned". >>> >> Bah. Thanks for the correction. >> >> However, it seems that the current OpenSSL package _does_ have >> fully-versioned symbols, at least if I understand "objdump -T" >> correctly. >> >> So the situation may not be as dire as this thread suggests. > > Well, it kind of is. Because those versioned symbols in openssl come > from a debian patch, afaict. So while debian may be fine (as long as all > build-rdeps have been rebuilt since openssl got those versioned > symbols), other distros aren't covered, as well as binaries not > compiled on debian. Why should we care about other distros? Do they have an impact on us? Thomas
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 17:21:09 GMT) (full text, mbox, link).
Acknowledgement sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 17:21:09 GMT) (full text, mbox, link).
Message #103 received at 754513@bugs.debian.org (full text, mbox, reply):
On Sun, 13 Jul 2014, Matthias Urlichs wrote: > for that (i.e. make sure that _everything_ in libressl is only exported > with properly versioned symbols), again IMHO the time and effort required PLEASE PLEASE PLEASE PLEASE PLEASE take this to the portable libressl upstream *and make it true* for the Linux targets. Now. Before people start shipping for real non-versioned-symbols versions of libressl everywhere and third party closed-source applications pick on that. And please use a libressl-specific symbol version (LIBRESSLxy, for example). > that now; and while IANARTM (Release Team Member) transitioning the whole > of Debian to libressl closer to the release would not be a good idea even > if we decide it's (going to be) the better alternative. Indeed. -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 18:39:10 GMT) (full text, mbox, link).
Acknowledgement sent
to Matthias Urlichs <matthias@urlichs.de>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 18:39:10 GMT) (full text, mbox, link).
Message #108 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi, Mike Hommey: > Well, it kind of is. Because those versioned symbols in openssl come > from a debian patch, afaict. So while debian may be fine (as long as all > build-rdeps have been rebuilt since openssl got those versioned > symbols), other distros aren't covered, as well as binaries not > compiled on debian. > I am, frankly, not at all concerned with binaries not compiled on Debian at this point. Data point: Fedora uses a different symbol versioning scheme for openssl, so openssl-linked binaries from there won't run on Debian anyway. It's far more imperative to educate upstream (in general, not just openssl – but them in particular) about the fact that adding versioning to their libraries is a Very Good Idea which will save them (and, more to the point, anybody using their code) a whole lot of hassle – as well as potential security holes – if/when their ABI changes. -- -- Matthias Urlichs
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 20:09:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 20:09:04 GMT) (full text, mbox, link).
Message #113 received at 754513@bugs.debian.org (full text, mbox, reply):
On Sun, 13 Jul 2014, Matthias Urlichs wrote: > I am, frankly, not at all concerned with binaries not compiled on Debian > at this point. Data point: Fedora uses a different symbol versioning > scheme for openssl, so openssl-linked binaries from there won't run on > Debian anyway. > > It's far more imperative to educate upstream (in general, not just openssl > – but them in particular) about the fact that adding versioning to their > libraries is a Very Good Idea which will save them (and, more to the point, > anybody using their code) a whole lot of hassle – as well as potential > security holes – if/when their ABI changes. Meanwhile, we could try to get ever distro with a clue together, map the versioned symbol diffs that already exist, and see if we can come up with a plan to at least do downstream versioning in a compatible way. -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 20:45:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Steven Chamberlain <steven@pyro.eu.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 20:45:05 GMT) (full text, mbox, link).
Message #118 received at 754513@bugs.debian.org (full text, mbox, reply):
On 12/07/14 02:09, Steven Chamberlain wrote: > [...] these warnings would be treated as errors: > >> > In file included from md5/md5_locl.h:98:0, >> > from md5/md5_dgst.c:60: >> > md5/md5_dgst.c: In function 'md5_block_data_order': >> > ./md32_common.h:237:66: warning: right-hand operand of comma expression has no effect [-Wunused-value] >> > # define HOST_c2l(c,l) ((l)=*((const unsigned int *)(c)), (c)+=4, l) >> > ^ A new upstream release LibreSSL 2.0.1 already addressed that: basically stop using -Werror in the portable library because many compilers have warnings that OpenBSD's compiler does not, and I guess they did not think the warnings legitimate or worth the effort of 'fixing' right now. This new version brings in many small changes from the still-ongoing cleanup. ABI versions bumped to libcrypto 30.0.0 and libssl 27.0.0. AFAICT only private_RC4_set_key was removed, and ssl_version_string added to the respective libraries' exported symbols. Am I right in thinking Debian would not bump its own SONAME if there were unimportant ABI changes, like these seem to be? Regards, -- Steven Chamberlain steven@pyro.eu.org
Message sent on
to Toni Mueller <support@oeko.net>:
Bug#754513.
(Sun, 13 Jul 2014 20:45:08 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 22:21:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Steven Chamberlain <steven@pyro.eu.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 22:21:04 GMT) (full text, mbox, link).
Message #126 received at 754513@bugs.debian.org (full text, mbox, reply):
On 12/07/14 12:53, Toni Mueller wrote: > my intention is to package this stuff so one can have both openssl and > libressl installed in parallel. libressl currently has libraries with > these sonames: > > libssl.so.26 > libcrypto.so.29 If the ABI is already different, there's no need for the library names to exactly match what the Debian OpenSSL package has or what OpenBSD uses? Actually I think you should avoid it, to avoid any confusion. Perhaps use libssl-openbsd.so.26, libcrypto-openbsd.so.30 just like we did in src:freebsd-libs? Or pick anything else that sounds better. The "openssl" binary built by LibreSSL sources will also need to be renamed, if they're to be co-installable. To "libressl" I presume? AFAIK the command-line apps have not changed significantly (except bugfixes) so could be a drop-in replacement someday (much easier than switching libraries). Regards, -- Steven Chamberlain steven@pyro.eu.org
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Sun, 13 Jul 2014 22:45:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Sun, 13 Jul 2014 22:45:05 GMT) (full text, mbox, link).
Message #131 received at 754513@bugs.debian.org (full text, mbox, reply):
On Sun, Jul 13, 2014 at 08:36:30PM +0200, Matthias Urlichs wrote: > Hi, > > Mike Hommey: > > Well, it kind of is. Because those versioned symbols in openssl come > > from a debian patch, afaict. So while debian may be fine (as long as all > > build-rdeps have been rebuilt since openssl got those versioned > > symbols), other distros aren't covered, as well as binaries not > > compiled on debian. > > > I am, frankly, not at all concerned with binaries not compiled on Debian > at this point. Data point: Fedora uses a different symbol versioning > scheme for openssl, so openssl-linked binaries from there won't run on > Debian anyway. > > It's far more imperative to educate upstream (in general, not just openssl > - but them in particular) about the fact that adding versioning to their > libraries is a Very Good Idea which will save them (and, more to the point, > anybody using their code) a whole lot of hassle - as well as potential > security holes - if/when their ABI changes. I plan to try and get them to use symbol versioning, at least on those platforms that support it. This will probably be just like the patch currently in Debian. I don't plan to add multiple versions of a symbol to try and keep the same soname since that probably won't work on all platforms. We also plan to reduce the risk of breaking the ABI. Now a lot of structs are public and we would like to make them private and provide functions for those things that people want to access. This will all probably take some time. PS: If you use dlopen()/dlsym() to load functions, symbol versioning doesn't help unless you use dlvsym() which is a glibc extension. Kurt
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Mon, 14 Jul 2014 13:51:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Juliusz Chroboczek <jch@pps.univ-paris-diderot.fr>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Mon, 14 Jul 2014 13:51:05 GMT) (full text, mbox, link).
Message #136 received at 754513@bugs.debian.org (full text, mbox, reply):
> I would like to make it co-installable with OpenSSL, but in general,
> this should be a drop-in replacement until APIs really diverge in a
> visible way. Yes, it would provide 'openssl', but I intend to place them
> into a different directory, so you might have to use LD_PATH to get
> them.
That reminds me of what we were trying to do with Xaw in the late 1990s.
Short story -- we tried and we failed. I wish you better luck, but I fear
that you're setting on a course that will bring you a lot of pain.
In the late 1990s, the only widget set that was free, usable and vendor-
neutral was Xaw , which was fairly functional but whose appearance was
already somewhat dated.
https://en.wikipedia.org/wiki/X_Athena_Widgets
There were two "drop in" libraries that were meant to provide binary
compatibility with Xaw but with a more pleasant appearance, called Xaw3d
and (I think) NextAw. Branden Robinson's plan was to allow the user to
select the appearance by setting LD_LIBRARY_PATH to point at one or the
other of the Xaw libraries.
It worked reasonably well as long as the user was just using the sample
applications provided with X. However, real applications would sometimes
subclass widgets, which would cause them to crash unpredictably. Whenever
we got a crash report against an Xaw application, the first question was
"does unsetting LD_LIBRARY_PATH fix it?".
After XFree86 changed the Xaw ABI with Xaw6, Branden finally gave up, and
agreed to make Xaw3d an independent library that applications could link
against rather than a drop-in replacement. Then Xaw got obsoleted by Gtk+,
and the point became moot.
History does not necessarily repeat itself, of course. Thanks for
listening to an old man's story.
-- Juliusz
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Mon, 14 Jul 2014 17:12:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Mon, 14 Jul 2014 17:12:04 GMT) (full text, mbox, link).
Message #141 received at 754513@bugs.debian.org (full text, mbox, reply):
On Mon, 14 Jul 2014, Kurt Roeckx wrote: > I plan to try and get them to use symbol versioning, at least on > those platforms that support it. This will probably be just like Thank you. > the patch currently in Debian. I don't plan to add multiple > versions of a symbol to try and keep the same soname since that > probably won't work on all platforms. We want _all_ visible libressl symbols versioned, but that's for protective namespacing, and not for backwards binary compatibility. That's why it should be a libressl-specific symbol version, since full guaranteed *internal* ABI compatibility with openssl is not really happening. We've been through this hell with libpng, libsasl, and openssl itself... I still think we should forbid any libraries with unversioned symbols in Debian, unless they're guaranteed to never be linked by other libraries (including nss modules and the like). Solaris got this idea right nearly two decades ago. Use of symbol versioning for providing several versions of the same symbol for backwards binary compatibility (like it is done by glibc) has its own problems and limitations. Those were rehearsed ad nauseam some years ago, and that's _not_ what we're talking about here, anyway. > We also plan to reduce the risk of breaking the ABI. Now a lot of > structs are public and we would like to make them private and > provide functions for those things that people want to access. Seems sensible. > This will all probably take some time. As long as you don't mean to wait to deploy symbol versioning. It becomes *really* painful after a while. Changes to symbol versioning requires everyone to recompile everything that uses the library. It is bad enough when you go from unversioned to versioned symbols (the binary will still run but you get a warning about it every time), but it is hell when you switch[1] symbol versioning decoupled from a major soname bump, because everything that is not recompiled with the new symbols will fail to runtime link, requiring coordinated transitions/flag-days to avoid this. [1] as in change the namespace, and _not_ as in provide a new version of symbols while also providing the older versions of the symbol around. -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Mon, 14 Jul 2014 17:30:09 GMT) (full text, mbox, link).
Acknowledgement sent
to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Mon, 14 Jul 2014 17:30:09 GMT) (full text, mbox, link).
Message #146 received at 754513@bugs.debian.org (full text, mbox, reply):
On Mon, Jul 14, 2014 at 02:09:55PM -0300, Henrique de Moraes Holschuh wrote: > On Mon, 14 Jul 2014, Kurt Roeckx wrote: > > I plan to try and get them to use symbol versioning, at least on > > those platforms that support it. This will probably be just like > > Thank you. > > > the patch currently in Debian. I don't plan to add multiple > > versions of a symbol to try and keep the same soname since that > > probably won't work on all platforms. > > We want _all_ visible libressl symbols versioned, but that's for protective > namespacing, and not for backwards binary compatibility. That's why it > should be a libressl-specific symbol version, since full guaranteed > *internal* ABI compatibility with openssl is not really happening. If it wasn't clear, I was talking about openssl not libressl. But libressl really should use symbol versions too. The patch in Debian's openssl should be a good starting point, but you need to rename the symbol version to something else. If you change the soname you also want to change the symbol versions, so keep that in mind when picking the version you're going to use. Kurt
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Mon, 14 Jul 2014 17:39:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Mon, 14 Jul 2014 17:39:12 GMT) (full text, mbox, link).
Message #151 received at 754513@bugs.debian.org (full text, mbox, reply):
On Mon, 14 Jul 2014, Kurt Roeckx wrote: > On Mon, Jul 14, 2014 at 02:09:55PM -0300, Henrique de Moraes Holschuh wrote: > > On Mon, 14 Jul 2014, Kurt Roeckx wrote: > > > I plan to try and get them to use symbol versioning, at least on > > > those platforms that support it. This will probably be just like > > > > Thank you. > > > > > the patch currently in Debian. I don't plan to add multiple > > > versions of a symbol to try and keep the same soname since that > > > probably won't work on all platforms. > > > > We want _all_ visible libressl symbols versioned, but that's for protective > > namespacing, and not for backwards binary compatibility. That's why it > > should be a libressl-specific symbol version, since full guaranteed > > *internal* ABI compatibility with openssl is not really happening. > > If it wasn't clear, I was talking about openssl not libressl. I see. > But libressl really should use symbol versions too. The patch in > Debian's openssl should be a good starting point, but you need to > rename the symbol version to something else. If you change the > soname you also want to change the symbol versions, so keep that > in mind when picking the version you're going to use. i.e. get the soname into the symbol version string. -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Mon, 14 Jul 2014 18:51:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Toni Mueller <toni@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Mon, 14 Jul 2014 18:51:04 GMT) (full text, mbox, link).
Message #156 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi Thomas,
On Sun, Jul 13, 2014 at 11:52:24AM +0800, Thomas Goirand wrote:
> On 07/12/2014 08:46 PM, Toni Mueller wrote:
> > As libressl is currently under
> > heavy development, it is imho not to be expected to have that stable ABI
> > you are asking for.
>
> Well, I don't agree with this view. If LibreSSL pretends to be a
> replacement for OpenSSL, then they should care about being ABI
> compatible,
but they are only partially compatible already. The one thing that
appears to stick out is that libressl has *no* support for egd, and on
purpose (ie, it will not come back). And the other is arc4random().
> so we can easily switch from one implementation to the
> other. Just like for MariaDB / MySQL in fact (not sure if these are
> still ABI compatible though). If that's not the case, then it looses a
> lot of its purpose. As Kurt wrote, GNUTLS becomes a better alternative then.
If your application does not use things which are deemed deprecated,
then it should be quite compatible, but by ripping out tons of old
stuff, they of course also break something, at some point. The whole API
becomes smaller simply because of that (I don't think this will be
offset by the added features in other areas, like adding better cipher
suites).
As for GnuTLS, all I read so far is that it requires a *lot* of work to
make a single application which has been developed together with
OpenSSL, compatible with GnuTLS, because apparently almost everything
differs to the point that it is unfeasible or impossible to have a
compatibility layer. That turns smaller adjustments in applications into
developing entirely different interfaces for each application, while
GnuTLS itself still lacks a lot of features. At the face of it, that
sounds like it is at least an order of magnitude more work, but likely
even much more than that. And add to that that GnuTLS apparently works
incorrectly almost half of the time (which translates to a significant
security *downgrade* in my eyes), there is a huge amount of work set for
those who would really try to fix it (ignoring the row between the
upstream author and the FSF aside for the moment).
> > OTOH, one guy already switched his entire Linux
> > system over, so far with no visible adverse effects.
>
> And then? This gives no clue if he had to rebuild everything that
> build-depended on OpenSSL...
That I don't know, but I have posed this question to the guy who made
that statement. I'll keep you posted.
> On 07/13/2014 01:15 AM, Russ Allbery wrote:
> > If you start using both for different packages, then you end up with
> > shared libraries conflicting over which libssl they want to use, and
> > then bad things start happening.
>
> Exactly! I fully agree with you on this.
I do not think that accidentically using one library when one wanted to
use the other will be an issue. FWIW, I've been told that a separate
"libressl.so" is in the making, and if so, binary incompatibility can be
taken for granted.
> This reminds me issues I had with mod-log-sql linked to MySQL and php
> as well, and when they were built against different versions... BOOM!
> I certainly do *not* want this kind of things to happen in Debian.
> Therefore, I'd very much prefer if we used OpenSSL *or* LibreSSL, but
> not have the choice between the 2, otherwise, that's a recipe for
> disaster.
Ummm... what was "BOOM" exactly, please? Because within a release,
OpenSSL ("letter") versions should all be compatible with each other.
> Please don't upload LibreSSL to Sid *ever*, unless we collectively
> decide that we are switching away from OpenSSL (and for which a
> discussion would have to start).
Well... as I said, I'm first and foremost planning to get it into
experimental, and then we can see what it really is, fix the packaging
etc.pp., and evaluate the package along the way. And while I hold the
OpenBSD developers in very high esteem, I am still a bit wary that the
package might be not as secure as we wish it to be, and therefore guess
that we want to evaluate the package thoroughly for some time before the
discussion about switching over can even start in a reasonable manner.
Having said that, I value all of your input, but feel not halfway as
much trigger happy as some of you seem to think I am.
Kind regards,
--Toni++
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Mon, 14 Jul 2014 20:12:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Toni Mueller <toni@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Mon, 14 Jul 2014 20:12:08 GMT) (full text, mbox, link).
Message #161 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi Jeroen, On Sun, Jul 13, 2014 at 12:22:49PM +0200, Jeroen Dekkers wrote: > At Sat, 12 Jul 2014 14:46:45 +0200, Toni Mueller wrote: > > Ok, but for whatever reason, they have an imho not as shiny track > > record, as has OpenBSD. Which is no wonder, given all the revelations we > > have had recently, but hey, sometimes one has to make a decision. > > OpenSSL was part of OpenBSD before they created the LibreSSL fork, so > how isn't OpenSSL part of the OpenBSD track record? it is in the way that they include it, and it also contributed a significant amount of all patches that were required over the years, but the typical way OpenBSD operates - from my perspective - is, they include something (eg. Sendmail), and once they get fed up with it for whatever reason, unless they find something acceptable out there (eg. nginx instead of Apache, or nsd(?)+unbound instead of BIND), they start to roll their own. A few releases later, the old stuff is being demoted or removed entirely (eg. for RAIDframe -> softraid, the switchover period where you could choose was more than four years, afair). Such changes do happen in a disruptive manner, as there is usually nothing that aids you in converting your setup from the old to the new software. > It depends on how you look at it. If you see the OpenSSL API as > something that isn't really well designed then other libraries not > copying the API is actually a good thing. Yes and no, but if it is more than ten times the amount of work, it is likely never getting done, for the simple reason that everyone is lacking resources. > You forget one of the big problems with OpenSSL that LibreSSL doesn't > fix: the license. Granted. Due to the amount of inherited code, it can't. We'll see how things evolve as the amount of inherited code will dwindle. > It actually makes the mess even bigger, given that > some of the GPL exceptions only talk about "the OpenSSL library" and > don't exempt OpenSSL-derived code. So even if LibreSSL is a drop-in > for OpenSSL we can't replace OpenSSL with LibreSSL for those projects. Yes. Thanks for pointing this out. > You also forget to list two other TLS libraries: > > * NSS, in my opinion the biggest downside of NSS is that it includes > NSPR. This both increases the code size a lot and makes the API less > nice if I remember correctly. Hmmm... yes. I was under the impression that not very many people were using it, but looking at my system, NSS + NSPR ~ 3,5MB, while libssl1.0.0 comes in at ~3MB. Add ~1MB for sqlite3 and zlib1g in the case of NSS... > * PolarSSL, which I really like from a technical point of > view. Featurewise it is pretty complete (the only major feature it > doesn't implement is DTLS AFAICS), while being one tenth the size of > OpenSSL / GnuTLS: > https://en.wikipedia.org/wiki/Comparison_of_TLS_implementations#Code_size_and_dependencies > PolarSSL is also used by OpenVPN-NL, the hardened OpenVPN version > that is used by the Dutch government. > The downsides are that it looks like it doesn't have a stable API > and contributing needs copyright assignment because it is > dual-licensed. It still gets 5 out of 16 answers wrong, as per the comparison sheet included here: https://www.cs.utexas.edu/~shmat/shmat_oak14.pdf Kind regards, --Toni++
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Mon, 14 Jul 2014 20:30:13 GMT) (full text, mbox, link).
Acknowledgement sent
to Steven Chamberlain <steven@pyro.eu.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Mon, 14 Jul 2014 20:30:13 GMT) (full text, mbox, link).
Message #166 received at 754513@bugs.debian.org (full text, mbox, reply):
On 14/07/14 21:08, Toni Mueller wrote: >> > You forget one of the big problems with OpenSSL that LibreSSL doesn't >> > fix: the license. > Granted. Due to the amount of inherited code, it can't. We'll see how > things evolve as the amount of inherited code will dwindle. So, merely as a result of the licensing, we could have a fascinating situation whereby: * BSD-licensed software contemplates switching from OpenSSL to LibreSSL * GNU-licensed software keeps using OpenSSL with license exception, or maybe someday switches to GnuTLS So, this reduces the amount of software that could potentially switch from OpenSSL from LibreSSL. And since BSD and GNU software are unable to link against each other, it reduces the likelihood that something will indirectly link against OpenSSL and LibreSSL at the same time (the situation Russ Allbery described). So actually I think this simplifies things. Regards, -- Steven Chamberlain steven@pyro.eu.org
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Wed, 16 Jul 2014 02:09:09 GMT) (full text, mbox, link).
Acknowledgement sent
to Paul Tagliamonte <paultag@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Wed, 16 Jul 2014 02:09:09 GMT) (full text, mbox, link).
Message #171 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Sat, Jul 12, 2014 at 12:06:27AM +0200, Toni Mueller wrote: > Package: wnpp > Severity: wishlist > Owner: Toni Mueller <toni@debian.org> > > * Package name : libressl > Version : 2.0.0 > Upstream Author : The OpenBSD project, the OpenSSL project et al. > * URL : http://www.libressl.org/ > * License : BSD, OpenSSL, SSLeay, Public Domain. > Programming Lang: C > Description : SSL library, forked from OpenSSL > > > LibreSSL strives to maintain API compatibility with OpenSSL, but > do away with all the cruft. > > After a long series of OpenSSL problems, recently highlighted by > the infamous Heartbleed bug, a group inside OpenBSD decided to > fork OpenSSL and adapt the code to modern coding standards. > Along the way, a lot of compatibility with older architectures > and toolchains was discarded. I didn't see this yet in the thread, so: https://www.agwa.name/blog/post/libressls_prng_is_unsafe_on_linux http://arstechnica.com/security/2014/07/only-a-few-days-old-openssl-fork-libressl-is-declared-unsafe-for-linux/ http://lwn.net/Articles/605509/ (Pick your news source) Flame-ingly yours, Paul -- .''`. Paul Tagliamonte <paultag@debian.org> | Proud Debian Developer : :' : 4096R / 8F04 9AD8 2C92 066C 7352 D28A 7B58 5B30 807C 2A87 `. `'` http://people.debian.org/~paultag `- http://people.debian.org/~paultag/conduct-statement.txt
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Wed, 16 Jul 2014 18:57:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Steven Chamberlain <steven@pyro.eu.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Wed, 16 Jul 2014 18:57:08 GMT) (full text, mbox, link).
Message #176 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On 16/07/14 03:06, Paul Tagliamonte wrote: > I didn't see this yet in the thread, so: > https://www.agwa.name/blog/post/libressls_prng_is_unsafe_on_linux What's most interesting is that someone spent such effort to look for this; that there are so many eyes now on both the original OpenSSL and the new LibreSSL code. Both projects ought to benefit from this. This was a real, but totally contrived issue with many preconditions: * initial 'grandparent' process initialises LibreSSL's PRNG, then forks * first-forked process does not use the PRNG yet, but forks again * grandparent uses the PRNG for things and then exits, freeing up the pid to be re-used * second-forked 'grandchild' process might coincidentally get the same pid as its grandparent * grandchild uses the PRNG for things; LibreSSL would not realise it has forked if the pid is the same, so does not reseed - PRNG output would be repeated from what the grandparent got before it exited - possibly having security impact The other major concern was about scary entropy-gathering code, implemented in LibreSSL Portable for Linux as a last resort for when /dev/urandom can't be read. I agree that it's too risky, or: too difficult to prove safe and robust in any conceivable situation. Debian's major OpenSSL bug was able to happen undetected for a while out of similar circumstances. A compile-time ifdef already allows to disable this fallback code and raise SIGKILL instead, crashing the calling process. As part of the LibreSSL port to GNU/kFreeBSD and Hurd I would actually have asked that we do this anyway in Debian, at least for those platforms. It seems extreme, but the point is that something must be wrong on the system if we get to the fallback code - /dev/urandom missing from a chroot, or fd's exhausted, and the kernel not having a reliable sysctl interface like OpenBSD's to get random bytes in the first place. Regards, -- Steven Chamberlain steven@pyro.eu.org
[signature.asc (application/pgp-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Wed, 16 Jul 2014 20:15:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Guillem Jover <guillem@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Wed, 16 Jul 2014 20:15:04 GMT) (full text, mbox, link).
Message #181 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi! On Wed, 2014-07-16 at 19:54:38 +0100, Steven Chamberlain wrote: > The other major concern was about scary entropy-gathering code, > implemented in LibreSSL Portable for Linux as a last resort for when > /dev/urandom can't be read. I agree that it's too risky, or: too > difficult to prove safe and robust in any conceivable situation. > Debian's major OpenSSL bug was able to happen undetected for a while out > of similar circumstances. > > A compile-time ifdef already allows to disable this fallback code and > raise SIGKILL instead, crashing the calling process. As part of the > LibreSSL port to GNU/kFreeBSD and Hurd I would actually have asked that > we do this anyway in Debian, at least for those platforms. kFreeBSD does have a supported sysctl for this: CTL_KERN KERN_ARND. (As does NetBSD which has two, KERN_URND and KERN_ARND.) Thanks, Guillem
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Wed, 16 Jul 2014 21:00:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Steven Chamberlain <steven@pyro.eu.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Wed, 16 Jul 2014 21:00:04 GMT) (full text, mbox, link).
Message #186 received at 754513@bugs.debian.org (full text, mbox, reply):
(This may seem a little off-topic for the ITP but please bear with me...) On 16/07/14 21:13, Guillem Jover wrote: > kFreeBSD does have a supported sysctl for this: CTL_KERN KERN_ARND. > (As does NetBSD which has two, KERN_URND and KERN_ARND.) Actually yes, we would certainly want to use that. But is there any conceivable way it could fail? (sysctl calls can return an error code). What could we do then? We'd need to figure this out if we want the prospective libressl package to build on GNU/kFreeBSD on Hurd. Currently it won't build, because it needs either a kernel-specific getentropy implementation, or arc4random. libbsd's arc4random.c, I'm guessing was based on older OpenSSH Portable sources. If reading /dev/urandom fails, it uses only gettimeofday, getpid, and uninitialised bytes from the stack (as a seed to the PRNG). LibreSSL Portable on Linux has the new, scary fallback mechanism instead, more comprehensive, but I honestly don't like that approach. It's too difficult to estimate how much entropy it could really gather, or potential failure cases. And we wouldn't even know when the fallback was being used. Native OpenBSD would actually raise SIGKILL if their sysctl fails. (Their cvsweb is down - quoting inline from arc4random.c instead) : > _rs_stir(void) > [...] > if (getentropy(rnd, sizeof rnd) == -1) > raise(SIGKILL); libevent's arc4stir is different again; it's defined to return an int, with -1 indicating a failure of all attempts to seed: * from /dev/urandom * from /proc/sys/kernel/random/uuid * using a kernel-specific sysctl These arc4random implementations also differ in which stream cipher they use also (RC4 originally, ChaCha20 in newer OpenBSD code). As a result of all this mess, I think we should be looking to converge on a single arc4random implementation, in a place such as libbsd, but make sure it is up to the task first. If arc4random is available and LDFLAGS include -lbsd, LibreSSL Portable will actually use it instead of the bundled implementation. I'm guessing OpenSSH Portable would do this too (I can see it being tested for by ./configure in the buildd log). Regards, -- Steven Chamberlain steven@pyro.eu.org
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Wed, 16 Jul 2014 21:21:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Steven Chamberlain <steven@pyro.eu.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Wed, 16 Jul 2014 21:21:04 GMT) (full text, mbox, link).
Message #191 received at 754513@bugs.debian.org (full text, mbox, reply):
Oh, and note that OpenSSH Portable uses RAND_bytes from libssl to seed its arc4random implementation. So AFAICT if you were to link OpenSSH Portable against LibreSSL Portable, it would get really crazy: /dev/urandom or sysctl or scary fallback -> LibreSSL Portable getentropy -> LibreSSL Portable arc4random.c (ChaCha-20) -> LibreSSL RAND_bytes -> OpenSSH Portable arc4random.c (ChaCha-20) -> OpenSSH with the stream cipher, seeding and stirring all happening twice. So I really like the idea of both getting an arc4random implementation from one place, such as libbsd. Regards, -- Steven Chamberlain steven@pyro.eu.org
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Mon, 21 Jul 2014 12:12:21 GMT) (full text, mbox, link).
Acknowledgement sent
to Brent Cook <busterb@gmail.com>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Mon, 21 Jul 2014 12:12:21 GMT) (full text, mbox, link).
Message #196 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi, I noticed the ITP for libressl and wanted to ask a few questions: 1. I'm setting up pbuilder to do some automated testing, could I have access to the prototype debian package control files for libressl? 2. Do you have a more automated way of generating that symbol versioning script, and are you planning on pushing that upstream? Currently, we're bumping the major on ABI changes (note we're at 30 and 27), so I'm not entirely following the need to version individual symbols. Some of libressl's non-opaque structs have also changed in size or layout compared to openssl. 3. I'm looking at some of the warnings on gcc 4.9 mentioned above. They look like dead code that's simply not caught by the other compilers we tested, we will review fixing that. Also, please do not replace arc4random in libressl. We'll have to figure out what to do about the circular dependency with openssh, but replacing with the version from libbsd is really not the way to go at the moment. Please at least ping tech@openbsd.org (or you can report on the github mirror), if you're making any changes to the way the library handles OS compatibility.
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Mon, 21 Jul 2014 12:32:26 GMT) (full text, mbox, link).
Acknowledgement sent
to Steven Chamberlain <steven@pyro.eu.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Mon, 21 Jul 2014 12:32:26 GMT) (full text, mbox, link).
Message #201 received at 754513@bugs.debian.org (full text, mbox, reply):
Hi Brent, Thank you very much for your input here. On 21/07/14 13:10, Brent Cook wrote: > Also, please do not replace arc4random in libressl. We'll have to figure > out what to do about the circular dependency with openssh OK, let's see what the OpenSSH Portable team comes up with... Having embedded copies of arc4random.c in different packages though (libressl, openssh, libevent, libbsd) is not great. It would be nice to someday package it into a re-usable library for all of Debian to use, and for ensuring it always stays up-to-date with upstream. (The one in LibreSSL Portable is currently the most up-to-date; I realise other/older versions of it are unsafe for some use cases). > replacing > with the version from libbsd is really not the way to go at the moment Agreed, there are serious problems with the arc4random in libbsd at the moment (I'm looking at our options to fix this). But if we could someday split out arc4random, then libbsd would seem like a good place to put it. Regards, -- Steven Chamberlain steven@pyro.eu.org
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org, Toni Mueller <toni@debian.org>:
Bug#754513; Package wnpp.
(Mon, 21 Jul 2014 17:03:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Brent Cook <busterb@gmail.com>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org, Toni Mueller <toni@debian.org>.
(Mon, 21 Jul 2014 17:03:05 GMT) (full text, mbox, link).
Message #206 received at 754513@bugs.debian.org (full text, mbox, reply):
On Jul 21, 2014, at 7:31 AM, Steven Chamberlain <steven@pyro.eu.org> wrote: > Hi Brent, > > Thank you very much for your input here. > > On 21/07/14 13:10, Brent Cook wrote: >> Also, please do not replace arc4random in libressl. We'll have to figure >> out what to do about the circular dependency with openssh > > OK, let's see what the OpenSSH Portable team comes up with... > > Having embedded copies of arc4random.c in different packages though > (libressl, openssh, libevent, libbsd) is not great. It would be nice to > someday package it into a re-usable library for all of Debian to use, > and for ensuring it always stays up-to-date with upstream. > > (The one in LibreSSL Portable is currently the most up-to-date; I > realise other/older versions of it are unsafe for some use cases). > >> replacing >> with the version from libbsd is really not the way to go at the moment > > Agreed, there are serious problems with the arc4random in libbsd at the > moment (I'm looking at our options to fix this). But if we could > someday split out arc4random, then libbsd would seem like a good place > to put it. OK. Someone, whom I think is a libbsd maintainer, expressed interest in updating libbsd as well: https://github.com/busterb/libressl/issues/5 In the short term, we are doing some refactoring to make arc4random even more portable in LibreSSL, and will be adding support for the new Linux getrandom syscall if/when it lands as well. I wonder if libc integration would be the best integration path, since not everything that integrates arc4random/arc4random_buf uses an external library to provide that functionality. Take libevent2, which also embeds its own implementation if the system does not have it. If there was a secure arc4random implementation that all apps could use on Linux without any special libraries, that would kill a few birds with one stone. > Regards, > -- > Steven Chamberlain > steven@pyro.eu.org
Changed Bug title to '"RFP: libressl -- SSL library, forked from OpenSSL"' from 'ITP: libressl -- SSL library, forked from OpenSSL'
Request was from Toni Mueller <toni@debian.org>
to control@bugs.debian.org.
(Fri, 06 Feb 2015 12:48:08 GMT) (full text, mbox, link).
Removed annotation that Bug was owned by Toni Mueller <toni@debian.org>.
Request was from Bart Martens <bartm@debian.org>
to control@bugs.debian.org.
(Sat, 07 Feb 2015 15:42:21 GMT) (full text, mbox, link).
Changed Bug title to 'RFP: libressl -- SSL library, forked from OpenSSL' from '"RFP: libressl -- SSL library, forked from OpenSSL"'
Request was from David Prévot <taffit@debian.org>
to control@bugs.debian.org.
(Fri, 20 Mar 2015 00:48:04 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Mon, 16 Oct 2017 16:33:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Colin Watson <cjwatson@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Mon, 16 Oct 2017 16:33:07 GMT) (full text, mbox, link).
Message #217 received at 754513@bugs.debian.org (full text, mbox, reply):
On Sat, Jul 12, 2014 at 12:06:27AM +0200, Toni Mueller wrote:
> * Package name : libressl
> Version : 2.0.0
> Upstream Author : The OpenBSD project, the OpenSSL project et al.
> * URL : http://www.libressl.org/
> * License : BSD, OpenSSL, SSLeay, Public Domain.
> Programming Lang: C
> Description : SSL library, forked from OpenSSL
>
>
> LibreSSL strives to maintain API compatibility with OpenSSL, but
> do away with all the cruft.
>
> After a long series of OpenSSL problems, recently highlighted by
> the infamous Heartbleed bug, a group inside OpenBSD decided to
> fork OpenSSL and adapt the code to modern coding standards.
> Along the way, a lot of compatibility with older architectures
> and toolchains was discarded.
[I won't quote everything, but people replying to this should probably
read the bug log in the BTS first.]
This was some years ago, and in the meantime Toni said it was too much
for them at the moment and retitled the bug to RFP.
In the meantime, the situation with OpenSSH is becoming critical.
OpenSSL has moved to a new API in version 1.1 which does a much better
job of making internal data structures opaque, but requires significant
changes to application code. (LibreSSL has not yet adopted this API.)
OpenSSH needs to continue working on OSes that only have OpenSSL 1.0,
not to mention with LibreSSL.
While there does exist a skeletal compatibility layer linked from the
upstream wiki [1], the OpenSSL developers explicitly don't want to
maintain this properly [2], and the OpenSSH developers say that it is
"unversioned, incomplete, barely documented, and seems to be
unmaintained" [3]. Kurt Roeckx proposed a patch to add a compatibility
shim [4], and a number of other projects have done something similar,
but the OpenSSH developers have explicitly said that they do not want to
take that approach [5].
It's not currently clear to me whether anyone has explicitly talked with
the OpenSSL developers about this problem from the point of view of the
OpenSSH developers, rather than just as users trying to get OpenSSH to
compile against the new version.
Furthermore, the OpenSSL maintainers in Debian now want to drop their
1.0 compatibility packages, which the Debian OpenSSH packages rely on.
I can't exactly fault them for wanting to reduce their maintenance
burden, but it is going to put me in a very difficult position soon; and
I assume that they don't actually want to break OpenSSH either.
The OpenSSH developers are starting to talk about bundling LibreSSL to
avoid this problem [3], noting that OpenBSD and Apple already link
OpenSSH against LibreSSL. (Note that OpenSSH only uses libcrypto, not
libssl, so while this has all the usual problems of bundling, the
exposure isn't quite as horrific as it might first seem.)
At the moment I can see the following somewhat realistic paths forward:
* Convince people to keep OpenSSL 1.0 on life support in Debian for a
while longer. This probably only postpones the problem, but it might
be helpful anyway. One possibility which might help would be to
split libcrypto into separate runtime and development packages, and
then drop just libssl 1.0; this would allow keeping around packages
which only use libcrypto, while still being able to make progress on
packages that use libssl, which AIUI is the more pressing problem.
* Convince people to package LibreSSL for Debian in parallel. As noted
in the log of this bug, there are some problems to solve there, both
technical and political, but they don't seem insurmountable. Of
course it would mean another SSL implementation in the archive, which
I realise is probably not the favourite outcome for the security
team.
* Accept an upstream bundling of LibreSSL (still hypothetical, but
plausible). I'm sure this would also not be the security team's
favourite outcome, although presumably only a subset of LibreSSL CVEs
would apply to OpenSSH, and it wouldn't be making it available as a
general-purpose library.
* Take Kurt's patch to switch to the 1.1 API. Fedora have done this.
I'm extremely reluctant to do this because it's a >3000-line patch
touching most of OpenSSH's cryptographic internals, which is bound to
produce lots of difficult conflicts on pretty much every new upstream
release. We carry another patch of a similar size (GSS-API key
exchange), but at least the bulk of that is a matter of plugging new
mechanisms into relatively general interfaces, and I more or less
understand how it all works; even so, that patch alone has delayed my
uploads of some new upstream releases by weeks or more. The 1.1 API
patch would probably be more than I can cope with maintaining for the
long term.
I have heard suggested or thought of some other plans that I don't think
are viable and I will not pursue:
* Switch to PKIX-SSH, an OpenSSH fork with 1.1 support. This fork adds
new features, making it a one-way transition. With all due respect,
as far as I can tell it's a one-person fork with very limited uptake
compared to OpenSSH, and I don't think it would be wise to switch
Debian over to it. (If somebody wants to package it separately for
the extra features, that's their affair, but it wouldn't solve the
problem at hand.)
* Start a team to maintain an OpenSSL 1.1 compatibility layer myself.
Ingo Schwarze persuaded me on openssl-unix-dev that this was a bad
idea. I would be happy if the OpenSSL developers carried this
forward as a proper project rather than just as an unversioned
tarball dump, but I'm not in a position to tell them what to do.
* Configure OpenSSH using --without-openssl, and use only its internal
crypto functions. I mention this mainly for completeness, but if you
do this you only get a very limited feature set (e.g. only ED25519
keys); it's a long way off being viable.
Out of all of these, I think the option that I think has the fewest
downsides overall is to convince people to package LibreSSL, but I'm not
myself in a position to contribute to that effort.
Does anyone have thoughts or other options, or want to help?
[1] https://wiki.openssl.org/index.php/OpenSSL_1.1.0_Changes
[2] https://mta.openssl.org/pipermail/openssl-users/2017-April/005540.html
[3] https://lists.mindrot.org/pipermail/openssh-unix-dev/2017-October/036346.html
[4] https://github.com/openssh/openssh-portable/pull/48
[5] Sorry, I don't have a link for this right now; if needed I can trawl
back through openssh-unix-dev history for it.
--
Colin Watson [cjwatson@debian.org]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Mon, 16 Oct 2017 17:18:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Mon, 16 Oct 2017 17:18:05 GMT) (full text, mbox, link).
Message #222 received at 754513@bugs.debian.org (full text, mbox, reply):
On Mon, Oct 16, 2017 at 05:29:09PM +0100, Colin Watson wrote: > > While there does exist a skeletal compatibility layer linked from the > upstream wiki [1], the OpenSSL developers explicitly don't want to > maintain this properly [2], and the OpenSSH developers say that it is > "unversioned, incomplete, barely documented, and seems to be > unmaintained" [3]. Kurt Roeckx proposed a patch to add a compatibility > shim [4], and a number of other projects have done something similar, > but the OpenSSH developers have explicitly said that they do not want to > take that approach [5]. My understanding is they would only be happy if we turn that file into a library they can link to. It would require that all the functions get renamed, which should be easy to do in a header file. > It's not currently clear to me whether anyone has explicitly talked with > the OpenSSL developers about this problem from the point of view of the > OpenSSH developers, rather than just as users trying to get OpenSSH to > compile against the new version. The question we got asked is to add that compatibility in the openssl 1.0 package, which really doesn't solve anything. Kurt
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Mon, 16 Oct 2017 17:18:18 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Stone <mstone@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Mon, 16 Oct 2017 17:18:18 GMT) (full text, mbox, link).
Message #227 received at 754513@bugs.debian.org (full text, mbox, reply):
On Mon, Oct 16, 2017 at 05:29:09PM +0100, Colin Watson wrote: >Out of all of these, I think the option that I think has the fewest >downsides overall is to convince people to package LibreSSL, but I'm not >myself in a position to contribute to that effort. > >Does anyone have thoughts or other options, or want to help? My understanding is that the libressl project does not support a release for the length of a debian release cycle, and does not commit to API stability for debian-cycle periods. (The openbsd model historically is to break ABI and even API between releases, in order to minimize compatability code, which works with their rebuild-the-world release model.) Is there any sign that if debian packages libressl in order to use openssh, debian would not end up being the de facto maintainers of an unsupported years-old libressl release by the end of a debian stable release cycle (not to mention debian LTS)? I think that in practical terms that would leave us worse off than settling on a compatability layer that's shared with other distributions. Mike Stone
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Mon, 16 Oct 2017 20:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Sebastian Andrzej Siewior <sebastian@breakpoint.cc>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Mon, 16 Oct 2017 20:03:03 GMT) (full text, mbox, link).
Message #232 received at 754513@bugs.debian.org (full text, mbox, reply):
On 2017-10-16 17:29:09 [+0100], Colin Watson wrote: > [I won't quote everything, but people replying to this should probably > read the bug log in the BTS first.] It was a lot to read and "they" stumbled over details. > While there does exist a skeletal compatibility layer linked from the > upstream wiki [1], the OpenSSL developers explicitly don't want to > maintain this properly [2], and the OpenSSH developers say that it is > "unversioned, incomplete, barely documented, and seems to be > unmaintained" [3]. Kurt Roeckx proposed a patch to add a compatibility > shim [4], and a number of other projects have done something similar, > but the OpenSSH developers have explicitly said that they do not want to > take that approach [5]. It has never been explained what it is that upstream wants. I get the impression, that they want a compat/shim layer and things have to work https://lists.mindrot.org/pipermail/openssh-unix-dev/2016-November/035456.html https://lists.mindrot.org/pipermail/openssh-unix-dev/2016-November/035497.html I didn't even figure out if they want to alter their code or not. > It's not currently clear to me whether anyone has explicitly talked with > the OpenSSL developers about this problem from the point of view of the > OpenSSH developers, rather than just as users trying to get OpenSSH to > compile against the new version. Kurt is aware of the situation, he is part of upstream. It might be that OpenSSH is playing hard to get. > At the moment I can see the following somewhat realistic paths forward: > > * Accept an upstream bundling of LibreSSL (still hypothetical, but > plausible). I'm sure this would also not be the security team's > favourite outcome, although presumably only a subset of LibreSSL CVEs > would apply to OpenSSH, and it wouldn't be making it available as a > general-purpose library. 4.13. Convenience copies of code > I have heard suggested or thought of some other plans that I don't think > are viable and I will not pursue: > > * Switch to PKIX-SSH, an OpenSSH fork with 1.1 support. This fork adds > new features, making it a one-way transition. With all due respect, > as far as I can tell it's a one-person fork with very limited uptake > compared to OpenSSH, and I don't think it would be wise to switch > Debian over to it. I am somehow in favour of that as I expressed it in #828475. It looks like a one man show, yes, but it looks maintained for more than a decade. Maybe we could check with Fedora/Red Hat what they think about switching to that fork. However a larger user basis does not solve the problem what should be done if PKIX-SSH dies / becomes unmaintained two weeks after the Buster release. And this seems to be your only concern. > (If somebody wants to package it separately for > the extra features, that's their affair, but it wouldn't solve the > problem at hand.) I don't see a reason to package PKIX-SSH if OpenSSH (the root problem) remains. > * Start a team to maintain an OpenSSL 1.1 compatibility layer myself. > Ingo Schwarze persuaded me on openssl-unix-dev that this was a bad > idea. I would be happy if the OpenSSL developers carried this > forward as a proper project rather than just as an unversioned > tarball dump, but I'm not in a position to tell them what to do. this unversioned tar file provides a handful accessors. Instead of accessing ctx->keylength there is a function to be used. That function's content is the direct access to the struct. I don't know what could be there maintained except to add new functions now and then. You can't have it as a .so library and it makes no sense to update that header file because two helpers were added which you don't need. And I assume that most project will drop that header file around 2020 once 1.0.2 gets end of life (like a lot project dropped their 1.0.0 and earlier compat layer while preparing for 1.1). > * Configure OpenSSH using --without-openssl, and use only its internal > crypto functions. I mention this mainly for completeness, but if you > do this you only get a very limited feature set (e.g. only ED25519 > keys); it's a long way off being viable. So no RSA key authentification and probably no gssapi. Sebastian
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Mon, 16 Oct 2017 22:18:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Guus Sliepen <guus@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Mon, 16 Oct 2017 22:18:03 GMT) (full text, mbox, link).
Message #237 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Mon, Oct 16, 2017 at 05:29:09PM +0100, Colin Watson wrote:
> > * Package name : libressl
[...]
> Furthermore, the OpenSSL maintainers in Debian now want to drop their
> 1.0 compatibility packages, which the Debian OpenSSH packages rely on.
> I can't exactly fault them for wanting to reduce their maintenance
> burden, but it is going to put me in a very difficult position soon; and
> I assume that they don't actually want to break OpenSSH either.
Sounds like a great opportunity: the libressl package can fill the 1.0
API void left behind without libressl and openssl packages having to
conflict with each other (except possibly for the -dev packages).
Personally I think LibreSSL is in a much better shape than OpenSSL, and
despite fears of OpenBSD only caring about themselves, I have found that
it is easier to compile LibreSSL for various platforms (even non-POSIX
ones) than OpenSSL. And that APIs might be broken more easily by LibreSSL
is ridiculous, as it is OpenSSL iself that has changed its API in a
non-backwards compatible way that is now causing this discussion.
> The OpenSSH developers are starting to talk about bundling LibreSSL to
> avoid this problem [3], noting that OpenBSD and Apple already link
> OpenSSH against LibreSSL. (Note that OpenSSH only uses libcrypto, not
> libssl, so while this has all the usual problems of bundling, the
> exposure isn't quite as horrific as it might first seem.)
I'd strongly favor having proper packages for LibreSSL. I'd happily
switch tinc over to depending on them instead of on OpenSSL packages.
> * Take Kurt's patch to switch to the 1.1 API. Fedora have done this.
> I'm extremely reluctant to do this because it's a >3000-line patch
> touching most of OpenSSH's cryptographic internals, which is bound to
> produce lots of difficult conflicts on pretty much every new upstream
> release.
If it was only needed temporarily until OpenSSH implemented OpenSSL 1.1
compatibility, I'd say fine, but if that's not going to happen, then I'd
avoid going down this road.
> * Switch to PKIX-SSH, an OpenSSH fork with 1.1 support. This fork adds
> new features, making it a one-way transition. With all due respect,
> as far as I can tell it's a one-person fork with very limited uptake
> compared to OpenSSH, and I don't think it would be wise to switch
> Debian over to it.
I agree.
> * Start a team to maintain an OpenSSL 1.1 compatibility layer myself.
> Ingo Schwarze persuaded me on openssl-unix-dev that this was a bad
> idea. I would be happy if the OpenSSL developers carried this
> forward as a proper project rather than just as an unversioned
> tarball dump, but I'm not in a position to tell them what to do.
That sounds just as bad as maintaining a patch for OpenSSH to support
OpenSSL 1.1.
> Out of all of these, I think the option that I think has the fewest
> downsides overall is to convince people to package LibreSSL, but I'm not
> myself in a position to contribute to that effort.
>
> Does anyone have thoughts or other options, or want to help?
Since I'd be a user of it I'd be willing to help.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen <guus@debian.org>
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Tue, 17 Oct 2017 02:24:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Stone <mstone@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Tue, 17 Oct 2017 02:24:03 GMT) (full text, mbox, link).
Message #242 received at 754513@bugs.debian.org (full text, mbox, reply):
On Tue, Oct 17, 2017 at 12:05:30AM +0200, Guus Sliepen wrote: >despite fears of OpenBSD only caring about themselves, I have found that >it is easier to compile LibreSSL for various platforms (even non-POSIX >ones) than OpenSSL. And that APIs might be broken more easily by LibreSSL >is ridiculous, as it is OpenSSL iself that has changed its API in a >non-backwards compatible way that is now causing this discussion. It is not ridiculous to point out that LibreSSL is released every six months and supported for one year after release, while OpenSSL is supported for at least 2 years, and 5 years for LTS releases. It's not unrealistic to think that a Debian stable could release with a LibreSSL that's already unsupported upstream. It is also not ridiculous to point out that a number of distributions have an interest in long term maintenance of released versions of OpenSSL, while there is no such community around LibreSSL. You are correct, though, that the OpenSSL and LibreSSL code bases will continue to diverge, from both directions. I think that's the biggest impediment to creating an OpenSSL 1.0 compatability layer for OpenSSH--over time, neither OpenSSL nor LibreSSL have any interest in confining themselves to that API, and it's clear that OpenSSH will track LibreSSL's API rather than the old OpenSSL API in the long term. As I continue to think about it, it may actually end up being better to embed a constrained subset of LibreSSL in OpenSSH than worry about either maintaining the entire LibreSSL package over a period of years, or fork. Mike Stone
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Tue, 17 Oct 2017 10:54:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Colin Watson <cjwatson@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Tue, 17 Oct 2017 10:54:03 GMT) (full text, mbox, link).
Message #247 received at 754513@bugs.debian.org (full text, mbox, reply):
On Mon, Oct 16, 2017 at 10:00:50PM +0200, Sebastian Andrzej Siewior wrote:
> On 2017-10-16 17:29:09 [+0100], Colin Watson wrote:
> > While there does exist a skeletal compatibility layer linked from the
> > upstream wiki [1], the OpenSSL developers explicitly don't want to
> > maintain this properly [2], and the OpenSSH developers say that it is
> > "unversioned, incomplete, barely documented, and seems to be
> > unmaintained" [3]. Kurt Roeckx proposed a patch to add a compatibility
> > shim [4], and a number of other projects have done something similar,
> > but the OpenSSH developers have explicitly said that they do not want to
> > take that approach [5].
> It has never been explained what it is that upstream wants. I get the
> impression, that they want a compat/shim layer and things have to work
> https://lists.mindrot.org/pipermail/openssh-unix-dev/2016-November/035456.html
> https://lists.mindrot.org/pipermail/openssh-unix-dev/2016-November/035497.html
Ingo replied to me privately (but giving me permission to use the
information any way I saw fit) with this:
Here is one example of a posting where it is explained
in a comment:
https://plus.google.com/u/0/+IngoSchwarze/posts/WQ9ouupTVgx
In other words, an officially maintained library that *uses* the
OpenSSL-1.0 API (i.e. links against existing existing libcrypto
lbraries) and that *exports* the OpenSSL-1.1 API for application
programs to link against, such that application programs using the
OpenSSL-1.1 API can run on systems providing an OpenSSL-1.0 library.
> I didn't even figure out if they want to alter their code or not.
https://lists.mindrot.org/pipermail/openssh-unix-dev/2017-October/036370.html
> > It's not currently clear to me whether anyone has explicitly talked with
> > the OpenSSL developers about this problem from the point of view of the
> > OpenSSH developers, rather than just as users trying to get OpenSSH to
> > compile against the new version.
>
> Kurt is aware of the situation, he is part of upstream. It might be that
> OpenSSH is playing hard to get.
I don't see any benefit in conducting a discussion in which we assume
bad faith. There are different opinions on what makes for a good API
transition, and pressures coming from different choices upstream
(remembering that Debian's immediate upstream for OpenSSH is OpenSSH
Portable, which itself has OpenBSD as an upstream) and from available
development and review time, but simplifying that as "playing hard to
get" isn't particularly helpful.
> > At the moment I can see the following somewhat realistic paths forward:
> >
> > * Accept an upstream bundling of LibreSSL (still hypothetical, but
> > plausible). I'm sure this would also not be the security team's
> > favourite outcome, although presumably only a subset of LibreSSL CVEs
> > would apply to OpenSSH, and it wouldn't be making it available as a
> > general-purpose library.
>
> 4.13. Convenience copies of code
I helped to draft that section, so I'm aware of what it says. Note that
it's a "should", and that it's not currently in the list of release
standards for packages in buster
(https://release.debian.org/buster/rc_policy.txt). According to our
current policy standards, it would certainly be a bug to have an
embedded copy, it might well make various people cross with me, but it's
something we're allowed to trade off against other considerations if
they're sufficiently compelling.
We could, for example, reasonably embed LibreSSL for a while and then
switch to an externally-packaged library if it looks like API stability
will be good enough for our needs.
--
Colin Watson [cjwatson@debian.org]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Tue, 17 Oct 2017 11:21:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Colin Watson <cjwatson@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Tue, 17 Oct 2017 11:21:03 GMT) (full text, mbox, link).
Message #252 received at 754513@bugs.debian.org (full text, mbox, reply):
On Mon, Oct 16, 2017 at 01:07:43PM -0400, Michael Stone wrote: > My understanding is that the libressl project does not support a release for > the length of a debian release cycle, and does not commit to API stability > for debian-cycle periods. The LibreSSL website currently says one year. One relevant data point is that OpenSSH 7.6p1 seems to build and run fine against LibreSSL 2.0.0 (the first public release, from July 2014), so I'm not very concerned about API stability from the point of view of OpenSSH. Your wider concerns may well be reasonable for an externally-packaged library though; I don't have enough experience with SSL library maintenance to be able to say. -- Colin Watson [cjwatson@debian.org]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Tue, 17 Oct 2017 20:30:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Guus Sliepen <guus@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Tue, 17 Oct 2017 20:30:03 GMT) (full text, mbox, link).
Message #257 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Mon, Oct 16, 2017 at 10:21:10PM -0400, Michael Stone wrote:
> On Tue, Oct 17, 2017 at 12:05:30AM +0200, Guus Sliepen wrote:
> > despite fears of OpenBSD only caring about themselves, I have found that
> > it is easier to compile LibreSSL for various platforms (even non-POSIX
> > ones) than OpenSSL. And that APIs might be broken more easily by LibreSSL
> > is ridiculous, as it is OpenSSL iself that has changed its API in a
> > non-backwards compatible way that is now causing this discussion.
>
> It is not ridiculous to point out that LibreSSL is released every six months
> and supported for one year after release, while OpenSSL is supported for at
> least 2 years, and 5 years for LTS releases.
That is certainly not ridiculous. But, I had a look at the release plan
for OpenSSL at https://www.openssl.org/policies/releasestrat.html, and
it seems there only is one LTS release, namely 1.0.2, which will be
supported until the very end of 2019. 1.1.0 is only supported until
September 2018. In that context it is strange that we switched to 1.1.0
in stretch already. Let's hope there is an LTS for 1.1.x in time for
buster.
> It's not unrealistic to think
> that a Debian stable could release with a LibreSSL that's already
> unsupported upstream. It is also not ridiculous to point out that a number
> of distributions have an interest in long term maintenance of released
> versions of OpenSSL, while there is no such community around LibreSSL.
Maybe not currently for Debian or Fedora derivatives, but some
distributions (Alpine, OpenELEC amongst others) have switched to
LibreSSL as the default, and some (Gentoo, unsurprisingly) have it as an
option.
I see two main forces determining which fork of a library will be used:
either distributions themselves will choose based on technical and other
merits, or important applications will favor one of the forks, forcing
the decision for distributions. OpenSSH is now applying some force, I
have no idea what programs are out there that can only work with
OpenSSL. I assume those that moved to OpenSSL 1.1 and ditched OpenSSL
1.0 compatibility, but I wonder how many there are.
It would be interesting to recompile all packages that Build-Depend:
libssl-dev with LibreSSL, and see what actually breaks...
> As I continue to think about it, it may actually end up being better to
> embed a constrained subset of LibreSSL in OpenSSH than worry about either
> maintaining the entire LibreSSL package over a period of years, or fork.
I don't see why it couldn't be in its own package even if OpenSSH was
the only user. It doesn't change the maintenance burden.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen <guus@debian.org>
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Tue, 17 Oct 2017 22:00:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Sebastian Andrzej Siewior <sebastian@breakpoint.cc>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Tue, 17 Oct 2017 22:00:03 GMT) (full text, mbox, link).
Message #262 received at 754513@bugs.debian.org (full text, mbox, reply):
On 2017-10-17 11:51:19 [+0100], Colin Watson wrote: > > I didn't even figure out if they want to alter their code or not. > > https://lists.mindrot.org/pipermail/openssh-unix-dev/2017-October/036370.html let me check. > I don't see any benefit in conducting a discussion in which we assume > bad faith. There are different opinions on what makes for a good API > transition, and pressures coming from different choices upstream > (remembering that Debian's immediate upstream for OpenSSH is OpenSSH > Portable, which itself has OpenBSD as an upstream) and from available > development and review time, but simplifying that as "playing hard to > get" isn't particularly helpful. I'm sorry. Sebastian
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Wed, 18 Oct 2017 00:00:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Stone <mstone@debian.org>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Wed, 18 Oct 2017 00:00:04 GMT) (full text, mbox, link).
Message #267 received at 754513@bugs.debian.org (full text, mbox, reply):
On Tue, Oct 17, 2017 at 10:26:06PM +0200, Guus Sliepen wrote: >On Mon, Oct 16, 2017 at 10:21:10PM -0400, Michael Stone wrote: >> On Tue, Oct 17, 2017 at 12:05:30AM +0200, Guus Sliepen wrote: >> > despite fears of OpenBSD only caring about themselves, I have found that >> > it is easier to compile LibreSSL for various platforms (even non-POSIX >> > ones) than OpenSSL. And that APIs might be broken more easily by LibreSSL >> > is ridiculous, as it is OpenSSL iself that has changed its API in a >> > non-backwards compatible way that is now causing this discussion. >> >> It is not ridiculous to point out that LibreSSL is released every six months >> and supported for one year after release, while OpenSSL is supported for at >> least 2 years, and 5 years for LTS releases. > >That is certainly not ridiculous. But, I had a look at the release plan >for OpenSSL at https://www.openssl.org/policies/releasestrat.html, and >it seems there only is one LTS release, namely 1.0.2, which will be >supported until the very end of 2019. 1.1.0 is only supported until >September 2018. In that context it is strange that we switched to 1.1.0 >in stretch already. Let's hope there is an LTS for 1.1.x in time for >buster. I'd expect a 1.1.1 release with a relatively small delta (no major API changes, and a relatively straightforward backporting effort) from 1.1. The LTS is most valuable for an API branch no longer being actively developed, and if 1.1.1 was followed by 1.2, I'd expect LTS for 1.1.1. >> It's not unrealistic to think >> that a Debian stable could release with a LibreSSL that's already >> unsupported upstream. It is also not ridiculous to point out that a number >> of distributions have an interest in long term maintenance of released >> versions of OpenSSL, while there is no such community around LibreSSL. > >Maybe not currently for Debian or Fedora derivatives, but some >distributions (Alpine, OpenELEC amongst others) have switched to >LibreSSL as the default, and some (Gentoo, unsurprisingly) have it as an >option. Without getting into a discussion of various distributions, suffice it to say that these are not ones known for long term binary support. >> As I continue to think about it, it may actually end up being better to >> embed a constrained subset of LibreSSL in OpenSSH than worry about either >> maintaining the entire LibreSSL package over a period of years, or fork. > >I don't see why it couldn't be in its own package even if OpenSSH was >the only user. It doesn't change the maintenance burden. Because the parts of libressl used in openssh (a subset of libcrypto) historically have had fewer problems then the mess of stuff in libssl. The attack surface of that subset of functions in ssh is a lot lower than "any package that uses ssl and happens to link to libressl". Mike Stone
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Sun, 20 Jan 2019 12:51:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Harald Dunkel <harri@afaics.de>:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Sun, 20 Jan 2019 12:51:06 GMT) (full text, mbox, link).
Message #272 received at 754513@bugs.debian.org (full text, mbox, reply):
metoo. I'd love to see libressl available for Debian. Newer versions of opensmtpd (coming from the OpenBSD world as well) dropped support for openssl in favor of libressl, see. https://poolp.org/posts/2018-11-03/opensmtpd-released-and-upcoming-filters-preview/ Regards Harri
Added indication that bug 754513 blocks 920489
Request was from Ryan Kavanagh <rak@debian.org>
to 920489-submit@bugs.debian.org.
(Sat, 09 Feb 2019 15:33:06 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Tue, 21 May 2019 22:30:02 GMT) (full text, mbox, link).
Acknowledgement sent
to stefania.wilson@theired.org:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Tue, 21 May 2019 22:30:03 GMT) (full text, mbox, link).
Message #279 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Dear Friends, We would like to invite you to submit research article in the 9th Joint International Conference organised by Institute of Research Engineers and Doctors at Bangkok, Thailand. The theme for the 2019 Thailand conference is to bring together innovative academics and industrial experts to a common forum. We would be delighted to have you present at this conference to hear what the technology experts and researchers have to share about the technology advancements and their impact on our daily lives. Joint International Conference Consists of following tracks: <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ0kZOkA8zwmBw5059xFSw23aX4SAORUOgHwPLRUeVWuJLnuKKxAXPiWhrGzQEt2djLiKd0WMgrYaiJz7OYYck79MG_inkNQNIlK6vY0LRsEK9Q2> Track 1: 9th International Conference on Advances in Computing, Electronics and Communication - ACEC <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ0kZOkA8zwmBw5059xFSw23aX4SAORUOgHwPLRUeVWuJTtXmNH8L4MPUeEZPAI5QAX17xaCGy9Gl7KDsUTQeQfRtgPQ6nNCKEv8fmq8xFXlNbQ2> Official Website: www.acec.theired.org <http://tracking.theired.org/tracking/click?d=BWpoVaFv7Pbn0M65fQyf_XY3oA3MzLnKtXDQbwXQ5AzWz167TACqqifSy4d8r9-5Xi_CWyxttRjwCRYhmpptEzIA71hdDFKm2-595FeP8vRZrB0jA-3WT8Cnex6rP2TKwQ2> Track 2: 9th International Conference On Advances in Civil, Structural and Environmental Engineering - ACSEE <http://tracking.theired.org/tracking/click?d=BWpoVaFv7Pbn0M65fQyf_XY3oA3MzLnKtXDQbwXQ5AzWz167TACqqifSy4d8r9-50egmeC5eGyZLecWM0bo6soV_onBsKn52JHCCzajcwv3wlf7rceMgJTJLdSjWMvG81w2> Official Website: www.acsee.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ1EFCqSVXRKP8-d33R9Jfv8nuUIXiKXGJyKgPipN48TMPNuaQMNAFnhCkTPS0MCjnzlwE-6gUH4xS9eOdrKtOaojgAMMOQj6CR_wkX6EVGyF-Q2> Track 3: 9th International Conference On Advances in Mechanical and Robotics Engineering - AMRE <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ1EFCqSVXRKP8-d33R9Jfv8nuUIXiKXGJyKgPipN48TM1v9K3BGbHedQk6mMecyg7wN91L7EfCHvdOGLAZeznHSl1VlnrBKSlgJ1U_Yoyvif3A2> Official Website: www.amre.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ6vygbBb3Xk_s1tXPjRxL-9O219jxjbsYQ2tdWrB0rhuovVdwDCWX8Jmmzw6bAb1s6AdVcmtmtYHzty0yZTAZh8prgg4z364j3Vva_0zDZnPzA2> Track 4: 9th International Conference On Advances in Social Science, Management and Human Behaviour - SMHB <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ6vygbBb3Xk_s1tXPjRxL-9O219jxjbsYQ2tdWrB0rhuF5w8UJ0tfOjViakOsamZp_SmVORD0_vLLgyQfUHu3YNT4WQiC0mH-Pf1lqzC7Gu0Kg2> Official Website: www.smhb.theired.org Conference Venue: Hotel Lebua at State Tower, Bangkok, Thailand Conference Date: 03 - 04 August 2019 Abstract/ Full Paper Submission For Review: 10 June 2019 About Publication: All the registered papers will proudly be published by IRED-CPS and stored in the SEEK digital Library <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFhcnr0XCagTCd8xvCHyt1vGIfyiyIvhm-TW2ju6CvfrgK8gt8iXU5ojOVJ8pm92xReyu_ImUQA9bJzjBgYEzU9M9kMWvUAHWpPrtYtcn_rHT3A2> (www.seekdl.org). Each Paper will be assigned DOI (Digital Object Identifier) from CROSSREF. The Proc. will be submitted to ISI Thomson for Review and Indexing. Proc. will also be published in International Journals with ISSN Numbers. Remote Presentation via Skype can also be arranged. We would also like to share some conference photographs of previous held International conference that has been worldwide. Kindly refer to the below link to access the conference photographs. <http://tracking.theired.org/tracking/click?d=Yc8Niga1PEek6kjwbnvKhxolNzm1nz5ClcB7_yzWKsZffGm3ZdHBDUf2F7hYW03qCP4FEvmMkLxSFHg9ixvabX-RL38m_KW58aqI5sQ-bhcS8ySv0V4CC8QoRPGFIbReGDtIbZH1FmV1B_0oz9NNrTU1> <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFsMnj-CAjt3iR8vsZa-g7QfwukYUcHvAWr2pTPTjqSl1T0LLljYzFP83IQToZa8SylITjnYMPHjaqp7ChH2dnUZBTB1TUdg56AZTTfs_W6Xcjg2> https://gallery.theired.org/previous-conferences/ We Request you to forward this email to your colleagues/Researchers/students in order to promote the conference. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Please take the time to explore the website for more details, check on important dates, and keep yourself up to date on recent changes. Registered Papers (IRED Extended paper guidelines applicable) will be published in the various issues of International journals. Prospective authors are invited to submit full (original) research papers; which are NOT submitted or published or under consideration anywhere in other conferences or journals; in electronic format via email. Thanks Much Stefania Wilson NEWS Division IRED If you no longer wish to receive mail from us, you can <http://tracking.theired.org/tracking/unsubscribe?msgid=zu0MmoxyNd1G7z6jLv-n7A2> unsubscribe IRED Headquarter, 42 Broadway, Suite 12-217, New York, NY 10004, USA Tel: +1-(212) 901-3781 | Fax: +1-(212) 901-3786
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Wed, 22 May 2019 22:42:02 GMT) (full text, mbox, link).
Acknowledgement sent
to stefania.wilson@theired.org:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Wed, 22 May 2019 22:42:02 GMT) (full text, mbox, link).
Message #284 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Dear Friends, We would like to invite you to submit research article in the 9th Joint International Conference organised by Institute of Research Engineers and Doctors at University of Westminster, London, UK. The theme for the 2019 UK conference is to bring together innovative academics and industrial experts to a common forum. We would be delighted to have you present at this conference to hear what the technology experts and researchers have to share about the technology advancements and their impact on our daily lives. Joint International Conference Consists of following tracks: <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJyU_aMDrx6JCbEXXFdsmgXMnXY-rigg41rnQVz0bZDxGeQW5GQmRL4oPh0b3mWZpLhpTiUjxbiwND5JHUPr89MYRTCicX_dM_mNq9bVWxNskow2> Track 1: 9th International Conference on Advances in Computing, Control and Networking - ACCN <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJyU_aMDrx6JCbEXXFdsmgXMnXY-rigg41rnQVz0bZDxGAne1oHviImgAw0K5kGSXjpJNHnyaRqfAIPL4RVbhrNozsKilDQPXlb6AKpGvrcFR8w2> Official Webiste: www.accn.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ-66gin6ghmi_nTQ8RWvRbjg4nrDouzpvCTS69qAbYp98b3QagV943Lq9BzyOPbvi7zGGiqlSaIyxdVONYoEBTu0JN29iDcZnjj1qFyclxqSdQ2> Track 2: 9th International Conference On Advances in Civil, Structural and Mechanical Engineering - ACSM <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ-66gin6ghmi_nTQ8RWvRbjg4nrDouzpvCTS69qAbYp9lQs0x6eLZUQmCPtY159ACwhpRM5kGiibTr14ylE7T8os8cjU9N92LHZduuv7sO9TuA2> Official Webiste: www.acsm.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ79lbEBkJHofgsE-G4EmRkodJM2BaYPj7SjnMq1WsmS-Crfgj_mhjfCQ0mCGtuxx-B9MolglnMXiJuXhaeQcraJ1TdrPbpfiSxjDlMzkuoYYng2> Track 3: 9th International Conference On Advances in Applied Science and Environmental Technology - ASET <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ79lbEBkJHofgsE-G4EmRkodJM2BaYPj7SjnMq1WsmS-u3OMWOiYQi2un5oPSbjKG05w4v2z_tnFOAs_fJnyOBuvAr2RphtOx4UCnZir2T2mHA2> Official Webiste: www.aset.theired.org <http://tracking.theired.org/tracking/click?d=QM81x6k1RxgNs031BT7L67rYPp4ChBKmPGLUl-R67pOOZc1EIXvH5UOxuh54IONbXM0rn9NkzEW3yvzYPsxxQhW-ims9LoeIMEUszHpH_Dcfl10jJi222xIdFjx_8kKYmw2> Track 4: 9th International Conference On Advances in Economics, Social Science and Human Behaviour Study - ESSHBS <http://tracking.theired.org/tracking/click?d=9z9hOpXCgxLxIZYyyr-71J7OaA-h7vIfrRdr87efQLiD3IgPa7w7JrGg-rYERxn_A4DyRyX4JMMT2K3Uiiwk4Rc01USwzaKCUqCBGFg8Fu0oRYnh8TNISb5uJviFUiDNLA2> <http://tracking.theired.org/tracking/click?d=QM81x6k1RxgNs031BT7L67rYPp4ChBKmPGLUl-R67pOOZc1EIXvH5UOxuh54IONb8YuF5mOCRLITSEanXvU6Cadyjv31styGfkxTJZQi5rhAEQ7vjMBywTV9LgKMMH1K2g2> Official Webiste: www.esshbs.theired.org Conference Venue: University of Westminster, London, UK Conference Date: 20 - 21 July 2019 Abstract/ Full Paper Submission For Review: 10 June 2019 About University of Westminster (Conference Venue): --The University of Westminster is a public university in London, United Kingdom. Its antecedent institution, the Royal Polytechnic Institution, was founded in 1838 and was the first polytechnic institution in the UK. Westminster was awarded university status in 1992 meaning it could award its own degrees. --Its headquarters and original campus are in Regent Street in the City of Westminster area of central London, with additional campuses in Fitzrovia, Marylebone and Harrow. It operates the Westminster International University in Tashkent in Uzbekistan. --Westminster's academic activities are organised into seven faculties and schools, within which there are around 45 departments. The University has numerous centres of research excellence across all the faculties, including the Communication and Media Research Institute, whose research is ranked in the Global Top 40 by the QS World University Rankings. Westminster had an income of £170.4 million in 2012/13, of which £4.5 million was from research grants and contracts. --Westminster is a member of the Association of Commonwealth Universities, the Association of MBAs, EFMD, the European University Association and Universities UK. About Publication: All the registered papers will proudly be published by IRED-CPS and stored in the SEEK digital Library <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFhcnr0XCagTCd8xvCHyt1vHHzhTIg_GBgJEgxcSdkZeewzEXebcaSJ9tvAuc9Jv94OSEohScqv4LK07snbazhj-dgHrpR9j7lOtm2AiIdIeppw2> (www.seekdl.org). Each Paper will be assigned DOI (Digital Object Identifier) from CROSSREF. The Proc. will be submitted to ISI Thomson for Review and Indexing. Proc. will also be published in International Journals with ISSN Numbers. Remote Presentation via Skype can also be arranged. We would also like to share some conference photographs of previous held International conference that has been worldwide. Kindly refer to the below link to access the conference photographs. <http://tracking.theired.org/tracking/click?d=Yc8Niga1PEek6kjwbnvKhxolNzm1nz5ClcB7_yzWKsZffGm3ZdHBDUf2F7hYW03qKLAk65iSiRdpJ8c3SD_WMHrHSCTFUA6Mu8zgNO_K97B1pRJc4Kq7wQESsm24gdsdIvJ8fBZhh597eiefSGzP4Ro1> <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFsMnj-CAjt3iR8vsZa-g7QfOKlLdOWuN_cb0KYxRyvnnUWZ4IODFN4PdNxI7EmOQ3ouWNsZ-6QMe9HfBKaspaPMrN4JA_4rF2a0LRyr6AtPlhA2> https://gallery.theired.org/previous-conferences/ We Request you to forward this email to your colleagues/Researchers/students in order to promote the conference. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Please take the time to explore the website for more details, check on important dates, and keep yourself up to date on recent changes. Registered Papers (IRED Extended paper guidelines applicable) will be published in the various issues of International journals. Prospective authors are invited to submit full (original) research papers; which are NOT submitted or published or under consideration anywhere in other conferences or journals; in electronic format via email. Thanks Much Stefania Wilson NEWS Division IRED If you no longer wish to receive mail from us, you can <http://tracking.theired.org/tracking/unsubscribe?msgid=W7z_P8zmoB16PhZBTbqrcg2> unsubscribe IRED Headquarter, 42 Broadway, Suite 12-217, New York, NY 10004, USA Tel: +1-(212) 901-3781 | Fax: +1-(212) 901-3786
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Sat, 25 May 2019 19:39:02 GMT) (full text, mbox, link).
Acknowledgement sent
to stefania.wilson@theired.org:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Sat, 25 May 2019 19:39:02 GMT) (full text, mbox, link).
Message #289 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Dear Friends, We would like to invite you to submit research article in the 9th Joint International Conference organised by Institute of Research Engineers and Doctors at Bangkok, Thailand. The theme for the 2019 Thailand conference is to bring together innovative academics and industrial experts to a common forum. We would be delighted to have you present at this conference to hear what the technology experts and researchers have to share about the technology advancements and their impact on our daily lives. Joint International Conference Consists of following tracks: <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ0kZOkA8zwmBw5059xFSw21OOXu7T_6eV1rIBk_rLwWwNoCr6uEDERAaHvk8TduccMpShPq2GJSoRTBiMyrgw9yKGVQ3CsZ0Y_fTVN0NF7BsiQ2> Track 1: 9th International Conference on Advances in Computing, Electronics and Communication - ACEC <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ0kZOkA8zwmBw5059xFSw21OOXu7T_6eV1rIBk_rLwWw897bZm7DS_z4cwHOePRgZSbbaDJZbz6t4uVIwxtucPqzg9-9fHQMNdep6bzXVuV57A2> Official Website: www.acec.theired.org <http://tracking.theired.org/tracking/click?d=BWpoVaFv7Pbn0M65fQyf_XY3oA3MzLnKtXDQbwXQ5AwIeVaefrr1ex97QMNtpuooMVqJmlrC5YYDK9N71PWUQdeMXQS8QUfrBa6jpASyTBLpCPqiIfJuc1qN2DbaWEyZ2w2> Track 2: 9th International Conference On Advances in Civil, Structural and Environmental Engineering - ACSEE <http://tracking.theired.org/tracking/click?d=BWpoVaFv7Pbn0M65fQyf_XY3oA3MzLnKtXDQbwXQ5AwIeVaefrr1ex97QMNtpuoo6hkhmx_HZhw2sO3zBeMExBCeWbrd8luu5PFJKG4uAi48FUEOtLk6CiCQJFd-X8h43w2> Official Website: www.acsee.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ1EFCqSVXRKP8-d33R9Jfv9ui_d9qRq_MbysdLtFtK_TuTJtsWeimNQN6_w0065KI_q5gvgng4j8ag54E0ERZ8LcftdKxEQFg2Snsa9hpGcGiQ2> Track 3: 9th International Conference On Advances in Mechanical and Robotics Engineering - AMRE <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ1EFCqSVXRKP8-d33R9Jfv9ui_d9qRq_MbysdLtFtK_TiWfHpBNR5faCYan95Fd3Pn4y1MefyjldCVpgifC1MyZufmdHq0T8Gz6dA9eYpAMKeQ2> Official Website: www.amre.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ6vygbBb3Xk_s1tXPjRxL--LnlCEkN5b-32511fefdGdpCbn7TA4F2Ma-aTvXirpiEtbCNcvx5kjJwd-Xp_JHeUMTbbHO8vnCZJkFOmTe08NXQ2> Track 4: 9th International Conference On Advances in Social Science, Management and Human Behaviour - SMHB <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ6vygbBb3Xk_s1tXPjRxL--LnlCEkN5b-32511fefdGd0-FvD1nDZ_4G8MEEpWW8hFIzVQRGA5dTmmB0uuJ3ea3ViA3nYJgwsACqmIeAEFN8Kw2> Official Website: www.smhb.theired.org Conference Venue: Hotel Lebua at State Tower, Bangkok, Thailand Conference Date: 03 - 04 August 2019 Abstract/ Full Paper Submission For Review: 10 June 2019 About Publication: All the registered papers will proudly be published by IRED-CPS and stored in the SEEK digital Library <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFhcnr0XCagTCd8xvCHyt1vFM4VF_XW0i0c2lTxblBrkjNrGGcl2_hFZs16xU12UNSCwVw4SRvPcXubgkj24m4K3XK8crIbQn91DGacE611Z8tw2> (www.seekdl.org). Each Paper will be assigned DOI (Digital Object Identifier) from CROSSREF. The Proc. will be submitted to ISI Thomson for Review and Indexing. Proc. will also be published in International Journals with ISSN Numbers. Remote Presentation via Skype can also be arranged. We would also like to share some conference photographs of previous held International conference that has been worldwide. Kindly refer to the below link to access the conference photographs. <http://tracking.theired.org/tracking/click?d=Yc8Niga1PEek6kjwbnvKhxolNzm1nz5ClcB7_yzWKsZffGm3ZdHBDUf2F7hYW03qM6zv0WyCMfmTxkKWqVaq9uUQd69DCVXI8FrEUiQr-FaInKPRFCtCOkW1Fxf3ZFlin9R4b56KvvQmhQuK_rGGJqY1> <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFsMnj-CAjt3iR8vsZa-g7QdhB-VYdK9Zq_u2gdVI3_X-S6vAH3fnNcIIskj50lxCZ26hFVQvQAjogbjEv3H1D8DBc8D5pTebuvTmNePreQFzGw2> https://gallery.theired.org/previous-conferences/ We Request you to forward this email to your colleagues/Researchers/students in order to promote the conference. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Please take the time to explore the website for more details, check on important dates, and keep yourself up to date on recent changes. Registered Papers (IRED Extended paper guidelines applicable) will be published in the various issues of International journals. Prospective authors are invited to submit full (original) research papers; which are NOT submitted or published or under consideration anywhere in other conferences or journals; in electronic format via email. Thanks Much Stefania Wilson NEWS Division IRED If you no longer wish to receive mail from us, you can <http://tracking.theired.org/tracking/unsubscribe?msgid=O6wzWAia8cvqT_P5LHOpkw2> unsubscribe IRED Headquarter, 42 Broadway, Suite 12-217, New York, NY 10004, USA Tel: +1-(212) 901-3781 | Fax: +1-(212) 901-3786
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Mon, 27 May 2019 12:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to stefania.wilson@theired.org:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Mon, 27 May 2019 12:57:03 GMT) (full text, mbox, link).
Message #294 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Dear Friends, We would like to invite you to submit research article in the 9th Joint International Conference organised by Institute of Research Engineers and Doctors at University of Westminster, London, UK. The theme for the 2019 UK conference is to bring together innovative academics and industrial experts to a common forum. We would be delighted to have you present at this conference to hear what the technology experts and researchers have to share about the technology advancements and their impact on our daily lives. Joint International Conference Consists of following tracks: <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJyU_aMDrx6JCbEXXFdsmgXOrwrK90sPdmzEbqcbxFDQJ1x5ujWJsu_YCI-rOR0qqnoez3jHgCuTdRBZRIpS_PvRnP2Uo0e05tdBk5loDKFmj1w2> Track 1: 9th International Conference on Advances in Computing, Control and Networking - ACCN <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJyU_aMDrx6JCbEXXFdsmgXOrwrK90sPdmzEbqcbxFDQJgH5VrX2lsJfUs9B4jFxG1abGJ7xalR7OSDb5ngB5Pg6eZktbiEBxQtBw6NgIpyFUeg2> Official Webiste: www.accn.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ-66gin6ghmi_nTQ8RWvRbi4NdyoMBREKAYE-BILekSXULDGeP_EtfKMo3JqTRxuoP8d9bo5TS5WvWK9pq_2_bA0ODZBQ0NWxvGdAdOcNGVctg2> Track 2: 9th International Conference On Advances in Civil, Structural and Mechanical Engineering - ACSM <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ-66gin6ghmi_nTQ8RWvRbi4NdyoMBREKAYE-BILekSXjDhvu6a-8YdPE8qB8Zsyc2Z3bks922mScDqLRIu7NFhYpNsXsG2fQN1EegaZUI8HEQ2> Official Webiste: www.acsm.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ79lbEBkJHofgsE-G4EmRkrpU8CVFf-nHPkM_VObP3rpNSssTDmXeMSOR9d351ow0vSygJ0Yr7ePxrVGdhSgFx8OB00GG_Q3N1XrRIHK_Qajqw2> Track 3: 9th International Conference On Advances in Applied Science and Environmental Technology - ASET <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ79lbEBkJHofgsE-G4EmRkrpU8CVFf-nHPkM_VObP3rpzr-x24NhMtIvGjHIMdNyJLB7uCVisQKwJ1UQTEQ5O9bSj5y1K9EF5z9vVVJdTqa6IA2> Official Webiste: www.aset.theired.org <http://tracking.theired.org/tracking/click?d=QM81x6k1RxgNs031BT7L67rYPp4ChBKmPGLUl-R67pNZCLBTB0Qkq4wd0S06UJ6LeRLgq0uHRPF_j4rci52xIgDWwS35YnvSMGEs_dIgUtLqKDlXvjSDvLfomKQn9MSwtA2> Track 4: 9th International Conference On Advances in Economics, Social Science and Human Behaviour Study - ESSHBS <http://tracking.theired.org/tracking/click?d=9z9hOpXCgxLxIZYyyr-71J7OaA-h7vIfrRdr87efQLghXOlVrLETbWVxsZb8lhvqwXSwWKjkelGGrAp89bXo9waSnEOUOZuLr8-kBAunueXTWOj6w1UPxak1ZB8hF6IvBg2> <http://tracking.theired.org/tracking/click?d=QM81x6k1RxgNs031BT7L67rYPp4ChBKmPGLUl-R67pNZCLBTB0Qkq4wd0S06UJ6LligDNnXXzPXWujBHhzLYiKUp8RVS00DE5RkFmG2uua018PEIeotMGJcIVP66kxLsrw2> Official Webiste: www.esshbs.theired.org Conference Venue: University of Westminster, London, UK Conference Date: 20 - 21 July 2019 Abstract/ Full Paper Submission For Review: 10 June 2019 About University of Westminster (Conference Venue): --The University of Westminster is a public university in London, United Kingdom. Its antecedent institution, the Royal Polytechnic Institution, was founded in 1838 and was the first polytechnic institution in the UK. Westminster was awarded university status in 1992 meaning it could award its own degrees. --Its headquarters and original campus are in Regent Street in the City of Westminster area of central London, with additional campuses in Fitzrovia, Marylebone and Harrow. It operates the Westminster International University in Tashkent in Uzbekistan. --Westminster's academic activities are organised into seven faculties and schools, within which there are around 45 departments. The University has numerous centres of research excellence across all the faculties, including the Communication and Media Research Institute, whose research is ranked in the Global Top 40 by the QS World University Rankings. Westminster had an income of £170.4 million in 2012/13, of which £4.5 million was from research grants and contracts. --Westminster is a member of the Association of Commonwealth Universities, the Association of MBAs, EFMD, the European University Association and Universities UK. About Publication: All the registered papers will proudly be published by IRED-CPS and stored in the SEEK digital Library <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFhcnr0XCagTCd8xvCHyt1vGCW5jvO2Ao1cmy0WHmyajKdHwo9RPJpUe1OVXrPkvimKFao3KEbSe2bDVG5NnpajXlpmDQru7N-NXuCNLYwry6Jw2> (www.seekdl.org). Each Paper will be assigned DOI (Digital Object Identifier) from CROSSREF. The Proc. will be submitted to ISI Thomson for Review and Indexing. Proc. will also be published in International Journals with ISSN Numbers. Remote Presentation via Skype can also be arranged. We would also like to share some conference photographs of previous held International conference that has been worldwide. Kindly refer to the below link to access the conference photographs. <http://tracking.theired.org/tracking/click?d=Yc8Niga1PEek6kjwbnvKhxolNzm1nz5ClcB7_yzWKsZffGm3ZdHBDUf2F7hYW03qZ8vjSBw9-H1ruGX7ZqEfy5J38yyP3ZLBGfNAGwvGL7kId2Pjo4tU_fVjuHJnvSmTXHpLyc6pyOKAjyK31IuVMqM1> <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFsMnj-CAjt3iR8vsZa-g7Qd8612KqpU-cc_ExasuoCXaP6zsz7ZkgwT0ONOIP8TFtqfHLna_wMtQrzCIzul8obAxV-U8b0c44DzS_W_EgAxUBg2> https://gallery.theired.org/previous-conferences/ We Request you to forward this email to your colleagues/Researchers/students in order to promote the conference. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Please take the time to explore the website for more details, check on important dates, and keep yourself up to date on recent changes. Registered Papers (IRED Extended paper guidelines applicable) will be published in the various issues of International journals. Prospective authors are invited to submit full (original) research papers; which are NOT submitted or published or under consideration anywhere in other conferences or journals; in electronic format via email. Thanks Much Stefania Wilson NEWS Division IRED If you no longer wish to receive mail from us, you can <http://tracking.theired.org/tracking/unsubscribe?msgid=ECwaXkqTQbHrnbVi-Pb8bQ2> unsubscribe IRED Headquarter, 42 Broadway, Suite 12-217, New York, NY 10004, USA Tel: +1-(212) 901-3781 | Fax: +1-(212) 901-3786
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Thu, 30 May 2019 22:24:02 GMT) (full text, mbox, link).
Acknowledgement sent
to stefania.wilson@theired.org:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Thu, 30 May 2019 22:24:03 GMT) (full text, mbox, link).
Message #299 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Dear Friends, We would like to invite you to submit research article in the 9th Joint International Conference organised by Institute of Research Engineers and Doctors at Bangkok, Thailand. The theme for the 2019 Thailand conference is to bring together innovative academics and industrial experts to a common forum. We would be delighted to have you present at this conference to hear what the technology experts and researchers have to share about the technology advancements and their impact on our daily lives. Joint International Conference Consists of following tracks: <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ0kZOkA8zwmBw5059xFSw20ThG9jt-Esa-WV3LBJFGGKi-HVh4Mc4u92QN4L9cWS1aVLbgx9lussY2YMAM3g7mJHmmskT_F1VcuYYU8ol0Yx8w2> Track 1: 9th International Conference on Advances in Computing, Electronics and Communication - ACEC <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ0kZOkA8zwmBw5059xFSw20ThG9jt-Esa-WV3LBJFGGKtWHPpxJgtwrdujs12xWoxHY81OT2CnHjx-ZvQABq1U_RddokaxIFfgne017QBYbAEw2> Official Website: www.acec.theired.org <http://tracking.theired.org/tracking/click?d=BWpoVaFv7Pbn0M65fQyf_XY3oA3MzLnKtXDQbwXQ5AxACEBvasZR6AMbnpHLumyZTfySRThkyd6UqobCp1lYetAooFQkllQUUr8qzPc9H02_ivWEdsxAtSNm6m6DuFTeDQ2> Track 2: 9th International Conference On Advances in Civil, Structural and Environmental Engineering - ACSEE <http://tracking.theired.org/tracking/click?d=BWpoVaFv7Pbn0M65fQyf_XY3oA3MzLnKtXDQbwXQ5AxACEBvasZR6AMbnpHLumyZxf0EqwuX0VRM3ClxylynqWKKYgGZuRibFtmIZ0r_Y8ldu1TFV5R8DPT2yhLNRRijpA2> Official Website: www.acsee.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ1EFCqSVXRKP8-d33R9Jfv9GM-s4KTe7oVlzcsmkZ_zomLFZCK5j-Zt6GpqhuPsYDqGmn8UFieRe1e_bJUaoFeZCBerJccZiaFcMIT0J_5wL2g2> Track 3: 9th International Conference On Advances in Mechanical and Robotics Engineering - AMRE <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ1EFCqSVXRKP8-d33R9Jfv9GM-s4KTe7oVlzcsmkZ_zo17Nf26DBew__vvHIR87w2by-B06kCmO2HWB-WMqmI61sLGSdEc1fXm9D3CFygjtM2g2> Official Website: www.amre.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ6vygbBb3Xk_s1tXPjRxL-82Vcj9B77lnhYlHwg_-kq59xcchrTjOOeIDwx3VmOqxHkc_-Ofm_Nxp4nfOMNkyScKaiHgigHKIZnvg8Znqs2K8A2> Track 4: 9th International Conference On Advances in Social Science, Management and Human Behaviour - SMHB <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ6vygbBb3Xk_s1tXPjRxL-82Vcj9B77lnhYlHwg_-kq5umyGPWJexbYsa3sIMIdnqlz4XT2OJFOowzeb9DFm90TK7TkMYdNOAw37nHZ_27cSbA2> Official Website: www.smhb.theired.org Conference Venue: Hotel Lebua at State Tower, Bangkok, Thailand Conference Date: 03 - 04 August 2019 Abstract/ Full Paper Submission For Review: 10 June 2019 About Publication: All the registered papers will proudly be published by IRED-CPS and stored in the SEEK digital Library <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFhcnr0XCagTCd8xvCHyt1vEE5ivnf8zoIdW3p4KqbSii1IOylWjisGXNnfPyZMYxYdWeUp_83JHubI0EkU37Peqj_5HFXwcZZbmQgE_ohC9E_Q2> (www.seekdl.org). Each Paper will be assigned DOI (Digital Object Identifier) from CROSSREF. The Proc. will be submitted to ISI Thomson for Review and Indexing. Proc. will also be published in International Journals with ISSN Numbers. Remote Presentation via Skype can also be arranged. We would also like to share some conference photographs of previous held International conference that has been worldwide. Kindly refer to the below link to access the conference photographs. <http://tracking.theired.org/tracking/click?d=Yc8Niga1PEek6kjwbnvKhxolNzm1nz5ClcB7_yzWKsZffGm3ZdHBDUf2F7hYW03q3W6dOqqEb25XEOv4tBABX7IneClEvGgW59ZI6iAE1H6X9jjWAAeFZolbHnWQrZkpV9QnPhVQ9TZ-7EA7EeHnECc1> <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFsMnj-CAjt3iR8vsZa-g7Qe8JKBZcPk_Xb24L2y1wgXnNoNZhuJ-gHSBB1J3xqrX_byK5odi8A_gAp_YqmRBZRGTYMhCocE-Aci906tE6lReBw2> https://gallery.theired.org/previous-conferences/ We Request you to forward this email to your colleagues/Researchers/students in order to promote the conference. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Please take the time to explore the website for more details, check on important dates, and keep yourself up to date on recent changes. Registered Papers (IRED Extended paper guidelines applicable) will be published in the various issues of International journals. Prospective authors are invited to submit full (original) research papers; which are NOT submitted or published or under consideration anywhere in other conferences or journals; in electronic format via email. Thanks Much Stefania Wilson NEWS Division IRED If you no longer wish to receive mail from us, you can <http://tracking.theired.org/tracking/unsubscribe?msgid=EoR3JFOZXgf-4IoyVK_xYg2> unsubscribe IRED Headquarter, 42 Broadway, Suite 12-217, New York, NY 10004, USA Tel: +1-(212) 901-3781 | Fax: +1-(212) 901-3786
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Fri, 14 Jun 2019 20:27:07 GMT) (full text, mbox, link).
Acknowledgement sent
to stefania.wilson@theired.org:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Fri, 14 Jun 2019 20:27:07 GMT) (full text, mbox, link).
Message #304 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Dear Friends, We would like to invite you to submit research article in the 9th Joint International Conference organised by Institute of Research Engineers and Doctors at University of Westminster, London, UK. The theme for the 2019 UK conference is to bring together innovative academics and industrial experts to a common forum. We would be delighted to have you present at this conference to hear what the technology experts and researchers have to share about the technology advancements and their impact on our daily lives. Joint International Conference Consists of following tracks: <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJyU_aMDrx6JCbEXXFdsmgXPfyIasenPV8AgOqoKGAtDJfA6kyNhK_Rpn2wnwPqO73MCR5Of-lELOpo4ntA8F7B_TUysEukgGnvPRWspzdmQWDg2> Track 1: 9th International Conference on Advances in Computing, Control and Networking - ACCN <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJyU_aMDrx6JCbEXXFdsmgXPfyIasenPV8AgOqoKGAtDJHhG47RpnO-bEOoTLdkUwe1wTjuEAE2f5KGiW4POWu6IcyrngJjV2ecQ6Dr1cljhifg2> Official Webiste: www.accn.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ-66gin6ghmi_nTQ8RWvRbj7iOy-L3pJzbJDoax_f_TIoT_BLRyaUB6hr4RL95uy7zjcwHcs8WNzKR0HfTHJ823nzFz8cRo0bgTJKURiT2h3Zg2> Track 2: 9th International Conference On Advances in Civil, Structural and Mechanical Engineering - ACSM <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ-66gin6ghmi_nTQ8RWvRbj7iOy-L3pJzbJDoax_f_TIoi77SxETGY3Sgi38w_OAQG-FPgWPzQv0k6fTqjswf3McshKCHs0hGdQj6pPcGz9VvQ2> Official Webiste: www.acsm.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ79lbEBkJHofgsE-G4EmRkpSB29kGS9y1elDXIsWhbQkFCVPDHJxVKEUagOHGoH5nnE1S4PtMm2Lb1QpkIeN9Q0I0ZHnVpaSvMI6HE6NDtKB_w2> Track 3: 9th International Conference On Advances in Applied Science and Environmental Technology - ASET <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ79lbEBkJHofgsE-G4EmRkpSB29kGS9y1elDXIsWhbQkSIRuIDW2-BzDySogUfe4sq6Mu7Il6dq2e0iCLq4nr2e5vX0jAOWoiRdQ6iGo4brVlw2> Official Webiste: www.aset.theired.org <http://tracking.theired.org/tracking/click?d=QM81x6k1RxgNs031BT7L67rYPp4ChBKmPGLUl-R67pMFMM6a6uAPA765RXnt-p6xcfAg-VHJT861W07w2HOIOsah_8r1RB5tLImPpTBjgP4YB0B6eGGVUuDKvwqF_DwEgg2> Track 4: 9th International Conference On Advances in Economics, Social Science and Human Behaviour Study - ESSHBS <http://tracking.theired.org/tracking/click?d=9z9hOpXCgxLxIZYyyr-71J7OaA-h7vIfrRdr87efQLirrZ5KQAnILygugpgKylFK1WnF5RGjU7L1z12GHD_ud_GG-FhJC9DYyV4plKVaiYXoP2GX4os8PH9EYu8t1rPFUA2> <http://tracking.theired.org/tracking/click?d=QM81x6k1RxgNs031BT7L67rYPp4ChBKmPGLUl-R67pMFMM6a6uAPA765RXnt-p6x6eAUs1jsRy6tsQexve4TlUSyiPsjbsDXoLcDK6m2pXQWeEH8I-WucWvwH4JS7VF1_g2> Official Webiste: www.esshbs.theired.org Conference Venue: University of Westminster, London, UK Conference Date: 20 - 21 July 2019 Abstract/ Full Paper Submission in Final Round For Review: 23 June 2019 *Paper Acceptance will be sent on or before: 26 June 2019 About University of Westminster (Conference Venue): --The University of Westminster is a public university in London, United Kingdom. Its antecedent institution, the Royal Polytechnic Institution, was founded in 1838 and was the first polytechnic institution in the UK. Westminster was awarded university status in 1992 meaning it could award its own degrees. --Its headquarters and original campus are in Regent Street in the City of Westminster area of central London, with additional campuses in Fitzrovia, Marylebone and Harrow. It operates the Westminster International University in Tashkent in Uzbekistan. --Westminster's academic activities are organised into seven faculties and schools, within which there are around 45 departments. The University has numerous centres of research excellence across all the faculties, including the Communication and Media Research Institute, whose research is ranked in the Global Top 40 by the QS World University Rankings. Westminster had an income of £170.4 million in 2012/13, of which £4.5 million was from research grants and contracts. --Westminster is a member of the Association of Commonwealth Universities, the Association of MBAs, EFMD, the European University Association and Universities UK. About Publication: All the registered papers will proudly be published by IRED-CPS and stored in the SEEK digital Library <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFhcnr0XCagTCd8xvCHyt1vGRhUP6MeRTC4YcMUnN5zMTJZGT_PtHlg-68ngWG41hd--0QcM25r-ge3mmLH0ZqjC-Oymdnedjojp81e2picsIYw2> (www.seekdl.org). Each Paper will be assigned DOI (Digital Object Identifier) from CROSSREF. The Proc. will be submitted to ISI Thomson for Review and Indexing. Proc. will also be published in International Journals with ISSN Numbers. Remote Presentation via Skype can also be arranged. We would also like to share some conference photographs of previous held International conference that has been worldwide. Kindly refer to the below link to access the conference photographs. <http://tracking.theired.org/tracking/click?d=Yc8Niga1PEek6kjwbnvKhxolNzm1nz5ClcB7_yzWKsZffGm3ZdHBDUf2F7hYW03qcpVaja61WPPxUidWVj5UyXxiHJf5Hllic6nWyEIiHwkWpI1VUlpKmQWe4XR1w-oXS5GQxvo5l8_or_nJ4dE7DW41> <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFsMnj-CAjt3iR8vsZa-g7QdsqsMnZHVm3PICi3JJcNStjAoFNvw4XMFX5K8vsZjV40D5VwwBZV1YmYUtg_OhWiPPu9sWcfgRSjfPt8Hzhg26lw2> https://gallery.theired.org/previous-conferences/ We Request you to forward this email to your colleagues/Researchers/students in order to promote the conference. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Please take the time to explore the website for more details, check on important dates, and keep yourself up to date on recent changes. Registered Papers (IRED Extended paper guidelines applicable) will be published in the various issues of International journals. Prospective authors are invited to submit full (original) research papers; which are NOT submitted or published or under consideration anywhere in other conferences or journals; in electronic format via email. Thanks Much Stefania Wilson NEWS Division IRED If you no longer wish to receive mail from us, you can <http://tracking.theired.org/tracking/unsubscribe?msgid=i-nYmNS6M4Wq9_HeQVz7bg2> unsubscribe IRED Headquarter, 42 Broadway, Suite 12-217, New York, NY 10004, USA Tel: +1-(212) 901-3781 | Fax: +1-(212) 901-3786
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Tue, 18 Jun 2019 20:03:02 GMT) (full text, mbox, link).
Acknowledgement sent
to stefania.wilson@theired.org:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Tue, 18 Jun 2019 20:03:03 GMT) (full text, mbox, link).
Message #309 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Dear Friends, We would like to invite you to submit research article in the 9th Joint International Conference organised by Institute of Research Engineers and Doctors at University of Westminster, London, UK. The theme for the 2019 UK conference is to bring together innovative academics and industrial experts to a common forum. We would be delighted to have you present at this conference to hear what the technology experts and researchers have to share about the technology advancements and their impact on our daily lives. Joint International Conference Consists of following tracks: <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJyU_aMDrx6JCbEXXFdsmgXOTWbQ1KHpiDQjTkb3ZdG28aDs7aKikBClet5XZxgYE_quBvH96JbmUSfILir_X1KJhNagyUFf4jNOgzoDP6hklIw2> Track 1: 9th International Conference on Advances in Computing, Control and Networking - ACCN <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJyU_aMDrx6JCbEXXFdsmgXOTWbQ1KHpiDQjTkb3ZdG28dSVVjgo-ZcD6DQH0UfgqYbhjeBdMuT-QKtdbdPRphXAlkJv67cLMBnRcWxfSlublKw2> Official Webiste: www.accn.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ-66gin6ghmi_nTQ8RWvRbioC6oS8Une77mY5pYTqurjl0KUNbhZ-uF8_ewPRG5-QgD-9QXGnWKqe24qoPQH5qxBBh0kcEYt49EIri29ah0IDA2> Track 2: 9th International Conference On Advances in Civil, Structural and Mechanical Engineering - ACSM <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ-66gin6ghmi_nTQ8RWvRbioC6oS8Une77mY5pYTqurjEUTP2DfuV-7Tt35fZmlFEgGk2ZCO4J_HV0VuIqfDa4zJpo2dX9M4pVDvAFF0L1bG_A2> Official Webiste: www.acsm.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ79lbEBkJHofgsE-G4EmRkrIU8SJUNAng43Auv9GpPBjWXEXJ72k7W6DePjA28NLoX9SZcJWMzxDR2B9PgkNXNzdp4g6x2k_YQHWjfM9W53Dpw2> Track 3: 9th International Conference On Advances in Applied Science and Environmental Technology - ASET <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ79lbEBkJHofgsE-G4EmRkrIU8SJUNAng43Auv9GpPBj2myW50um50xyfmvqzXAPnsphsBk3vZH2vSAAdgGJRmE6vY-EVq9ELds-p3Smi8QxdA2> Official Webiste: www.aset.theired.org <http://tracking.theired.org/tracking/click?d=QM81x6k1RxgNs031BT7L67rYPp4ChBKmPGLUl-R67pMJ9yc-Lvak-GbRdewPvJOrwS9XnWRrQv-vcJjp-nx3uNe3uS5nPv9IM72LJbkcnad6qzM3szPGvN1UJ6dgUL_KHw2> Track 4: 9th International Conference On Advances in Economics, Social Science and Human Behaviour Study - ESSHBS <http://tracking.theired.org/tracking/click?d=9z9hOpXCgxLxIZYyyr-71J7OaA-h7vIfrRdr87efQLiDnWgqQAGjtkUDIsgwPdxnSWOVc4k1Aew1ig162d7QaqzKtgxIeTtsi7go6xW1KEDKPu-QKOvrLZoiHCKuPdQXEA2> <http://tracking.theired.org/tracking/click?d=QM81x6k1RxgNs031BT7L67rYPp4ChBKmPGLUl-R67pMJ9yc-Lvak-GbRdewPvJOrpsgDbOzRKB3Dx2PGO6f7yqnBEUcGmUVVMpAu4fh8I8NIYc1ZQN56-vRwOYjrIu7saQ2> Official Webiste: www.esshbs.theired.org Conference Venue: University of Westminster, London, UK Conference Date: 20 - 21 July 2019 Abstract/ Full Paper Submission in Final Round For Review: 23 June 2019 *Paper Acceptance will be sent on or before: 26 June 2019 About University of Westminster (Conference Venue): --The University of Westminster is a public university in London, United Kingdom. Its antecedent institution, the Royal Polytechnic Institution, was founded in 1838 and was the first polytechnic institution in the UK. Westminster was awarded university status in 1992 meaning it could award its own degrees. --Its headquarters and original campus are in Regent Street in the City of Westminster area of central London, with additional campuses in Fitzrovia, Marylebone and Harrow. It operates the Westminster International University in Tashkent in Uzbekistan. --Westminster's academic activities are organised into seven faculties and schools, within which there are around 45 departments. The University has numerous centres of research excellence across all the faculties, including the Communication and Media Research Institute, whose research is ranked in the Global Top 40 by the QS World University Rankings. Westminster had an income of £170.4 million in 2012/13, of which £4.5 million was from research grants and contracts. --Westminster is a member of the Association of Commonwealth Universities, the Association of MBAs, EFMD, the European University Association and Universities UK. About Publication: All the registered papers will proudly be published by IRED-CPS and stored in the SEEK digital Library <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFn0uAU0bmpabPhTxjfyDz3ln2zgtyHpvmls90tQKfqEKQsE7MNEp1YiMOa6h-Bzxh2VefdT69Npuk3PumD6IeRVv_61M_w5qW4O6kpQnp_WVEg2> (www.seekdl.org). Each Paper will be assigned DOI (Digital Object Identifier) from CROSSREF. The Proc. will be submitted to ISI Thomson for Review and Indexing. Proc. will also be published in International Journals with ISSN Numbers. Remote Presentation via Skype can also be arranged. We would also like to share some conference photographs of previous held International conference that has been worldwide. Kindly refer to the below link to access the conference photographs. <http://tracking.theired.org/tracking/click?d=Yc8Niga1PEek6kjwbnvKhxolNzm1nz5ClcB7_yzWKsZffGm3ZdHBDUf2F7hYW03qdnyZgDVN8j5D22InyxqjJ4xnMEqn8XPMMTyozcNVHbgfyXCyh6eZ1rWmnqbADVnNjjMbYIoNfVaLiKGQ3eBixmw1> <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFnCxZSpW06syO3KWtG8jD8u2SmagczjX7axnuiE3DQxuu4hNMAz9GTAzB5zNy0ob2daMe5I8U6N5ACyY23DqC06RqvSCCBDA9aKCHmaIzF7SxA2> https://gallery.theired.org/previous-conferences/ We Request you to forward this email to your colleagues/Researchers/students in order to promote the conference. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Please take the time to explore the website for more details, check on important dates, and keep yourself up to date on recent changes. Registered Papers (IRED Extended paper guidelines applicable) will be published in the various issues of International journals. Prospective authors are invited to submit full (original) research papers; which are NOT submitted or published or under consideration anywhere in other conferences or journals; in electronic format via email. Thanks Much Stefania Wilson NEWS Division IRED If you no longer wish to receive mail from us, you can <http://tracking.theired.org/tracking/unsubscribe?msgid=-LRIyMtZ1KByiPvaxluprw2> unsubscribe IRED Headquarter, 42 Broadway, Suite 12-217, New York, NY 10004, USA Tel: +1-(212) 901-3781 | Fax: +1-(212) 901-3786
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, wnpp@debian.org:
Bug#754513; Package wnpp.
(Tue, 25 Jun 2019 23:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to stefania.wilson@theired.org:
Extra info received and forwarded to list. Copy sent to wnpp@debian.org.
(Tue, 25 Jun 2019 23:03:03 GMT) (full text, mbox, link).
Message #314 received at 754513@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
<http://tracking.theired.org/tracking/click?d=q7ffcc3hdKlkh3Viyt4MhrOzEX29Gn1I0EpiqssyNsPM0YzC7pq0kqJa1uFvuM_sBb1kpWzRZj8VVZbcc_t7phGeOLD0dqoIiBlzNHaVB5Dh1OtzQpHtl--4CBUEA9id0g2> Dear Friends, We would like to invite you to submit research article in the 9th Joint International Conference organised by Institute of Research Engineers and Doctors at Bangkok, Thailand. The theme for the 2019 Thailand conference is to bring together innovative academics and industrial experts to a common forum. We would be delighted to have you present at this conference to hear what the technology experts and researchers have to share about the technology advancements and their impact on our daily lives. Joint International Conference Consists of following tracks: <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ0kZOkA8zwmBw5059xFSw21sF6y_jIRl_AWlALcMrOjy2BZvzSdSrbPA1VmTXNiBfCwqTL-NHbVh-pQd9tIaKkUWuUBVruqI_7_YDBwFQaag3g2> Track 1: 9th International Conference on Advances in Computing, Electronics and Communication - ACEC <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ0kZOkA8zwmBw5059xFSw21sF6y_jIRl_AWlALcMrOjyY33Itq5iufAzRcM-oD0kAPat-5qAVoKgORof5bwGqu2IyyEaZU_nj50sU6D1pbuQCA2> Official Website: www.acec.theired.org <http://tracking.theired.org/tracking/click?d=BWpoVaFv7Pbn0M65fQyf_XY3oA3MzLnKtXDQbwXQ5AwFM7lGR5dIVN-BWxsm9a9_mDQOgoCSARt77NLTxpOQ_xkr7LPEn0T5d9-OMpOI2YrtZfLwo4NYIDpMro3c6b7zjQ2> Track 2: 9th International Conference On Advances in Civil, Structural and Environmental Engineering - ACSEE <http://tracking.theired.org/tracking/click?d=BWpoVaFv7Pbn0M65fQyf_XY3oA3MzLnKtXDQbwXQ5AwFM7lGR5dIVN-BWxsm9a9_bn-nxjn7e2qRfxrkiYe6ZA1Q_VL_bWpdb1au_bKLpU1FAr2p-3kqWvzQgUVfyUcu8A2> Official Website: www.acsee.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ1EFCqSVXRKP8-d33R9Jfv86XgLwtEVCS98bzyGs8XgmZ-Y7k63C60rkC64QHZ__RFAVhuhZsZBCSdxACu0-aNpjI_cShyhj4oc2930a3U0TOA2> Track 3: 9th International Conference On Advances in Mechanical and Robotics Engineering - AMRE <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ1EFCqSVXRKP8-d33R9Jfv86XgLwtEVCS98bzyGs8XgmXrQWb7hmbyDkaBsU-mhm3nrTpzP52YptszWIXmuZDnECLesJh2pn6DqhAN45_PgLMQ2> Official Website: www.amre.theired.org <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ6vygbBb3Xk_s1tXPjRxL-8Vp2rhlYc7pfzyNCwQR2jHLuNRXnCFJlVdFtddd1YInwV28elQob7ZUeDFhWlePKSE7qhREi5oNyZPbbpRS2-cKg2> Track 4: 9th International Conference On Advances in Social Science, Management and Human Behaviour - SMHB <http://tracking.theired.org/tracking/click?d=IEK2eAAWLBWf6oUPKZVvJ6vygbBb3Xk_s1tXPjRxL-8Vp2rhlYc7pfzyNCwQR2jH46WXTcBzQiRosO4xsgt4GNKsrRGYKogb66eget-zdrWUC-lQH4e-S2Hyhva-K_kYNg2> Official Website: www.smhb.theired.org Conference Venue: Hotel Lebua at State Tower, Bangkok, Thailand Conference Date: 13 - 14 September 2019 Abstract/ Full Paper Submission For Review: 14 July 2019 About Publication: All the registered papers will proudly be published by IRED-CPS and stored in the SEEK digital Library <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFn0uAU0bmpabPhTxjfyDz3lajy_v3ROk4ifJuU-3pDMP2o1GCWiCuOIl6pki4CVGNRa5MpCGtkPrI8PHePLQpO9dwYVfozGJokC5uYp74pxx3g2> (www.seekdl.org). Each Paper will be assigned DOI (Digital Object Identifier) from CROSSREF. The Proc. will be submitted to ISI Thomson for Review and Indexing. Proc. will also be published in International Journals with ISSN Numbers. Remote Presentation via Skype can also be arranged. We would also like to share some conference photographs of previous held International conference that has been worldwide. Kindly refer to the below link to access the conference photographs. <http://tracking.theired.org/tracking/click?d=Yc8Niga1PEek6kjwbnvKhxolNzm1nz5ClcB7_yzWKsZffGm3ZdHBDUf2F7hYW03qj-2z4LTXD4QGQZ0TU5Ypmrlxl3dCxHrbYg3fhoAe6p5HY4Gz0CuccIxgUyGoyOaCg0aqYPCbx4g2vz50I02c5_81> <http://tracking.theired.org/tracking/click?d=1pvogq7UozbvCOeMr_RdFnCxZSpW06syO3KWtG8jD8vnfBDOP-_ttoW8qervgdZzMVSZmK7BbY2HFUR75wAbKBDD2nWnuMbPupxlKDScRF2MK5RkRBQ1AhEvO7IbFdvn2Q2> https://gallery.theired.org/previous-conferences/ We Request you to forward this email to your colleagues/Researchers/students in order to promote the conference. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Please take the time to explore the website for more details, check on important dates, and keep yourself up to date on recent changes. Registered Papers (IRED Extended paper guidelines applicable) will be published in the various issues of International journals. Prospective authors are invited to submit full (original) research papers; which are NOT submitted or published or under consideration anywhere in other conferences or journals; in electronic format via email. Thanks Much Stefania Wilson NEWS Division IRED If you no longer wish to receive mail from us, you can <http://tracking.theired.org/tracking/unsubscribe?msgid=H6HmVbLq6QABvmmKoEv2Lg2> unsubscribe IRED Headquarter, 42 Broadway, Suite 12-217, New York, NY 10004, USA Tel: +1-(212) 901-3781 | Fax: +1-(212) 901-3786
[Message part 2 (text/html, inline)]
Send a report that this bug log contains spam.
Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.