summaryrefslogtreecommitdiffstats
path: root/zarb-ml/mageia-dev/2011-June/006076.html
diff options
context:
space:
mode:
Diffstat (limited to 'zarb-ml/mageia-dev/2011-June/006076.html')
-rw-r--r--zarb-ml/mageia-dev/2011-June/006076.html173
1 files changed, 173 insertions, 0 deletions
diff --git a/zarb-ml/mageia-dev/2011-June/006076.html b/zarb-ml/mageia-dev/2011-June/006076.html
new file mode 100644
index 000000000..c45a5fcc5
--- /dev/null
+++ b/zarb-ml/mageia-dev/2011-June/006076.html
@@ -0,0 +1,173 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
+<HTML>
+ <HEAD>
+ <TITLE> [Mageia-dev] Update of backport, policy proposal
+ </TITLE>
+ <LINK REL="Index" HREF="index.html" >
+ <LINK REL="made" HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Update%20of%20backport%2C%20policy%20proposal&In-Reply-To=%3C4E0931F8.4000504%40laposte.net%3E">
+ <META NAME="robots" CONTENT="index,nofollow">
+ <META http-equiv="Content-Type" content="text/html; charset=us-ascii">
+ <LINK REL="Previous" HREF="006048.html">
+ <LINK REL="Next" HREF="006164.html">
+ </HEAD>
+ <BODY BGCOLOR="#ffffff">
+ <H1>[Mageia-dev] Update of backport, policy proposal</H1>
+ <B>andre999</B>
+ <A HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Update%20of%20backport%2C%20policy%20proposal&In-Reply-To=%3C4E0931F8.4000504%40laposte.net%3E"
+ TITLE="[Mageia-dev] Update of backport, policy proposal">andr55 at laposte.net
+ </A><BR>
+ <I>Tue Jun 28 03:44:24 CEST 2011</I>
+ <P><UL>
+ <LI>Previous message: <A HREF="006048.html">[Mageia-dev] Update of backport, policy proposal
+</A></li>
+ <LI>Next message: <A HREF="006164.html">[Mageia-dev] Update of backport, policy proposal
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#6076">[ date ]</a>
+ <a href="thread.html#6076">[ thread ]</a>
+ <a href="subject.html#6076">[ subject ]</a>
+ <a href="author.html#6076">[ author ]</a>
+ </LI>
+ </UL>
+ <HR>
+<!--beginarticle-->
+<PRE>Michael Scherer a &#233;crit :
+
+&gt;&gt;<i> However I would favour notifying those who have installed previous versions of these backports, of
+</I>&gt;&gt;<i> the availability of newer versions.
+</I>&gt;<i>
+</I>&gt;<i> The question is &quot;how&quot;.
+</I>
+Good question :)
+We could send emails to those who have contributed to the backport issue (bugzilla or
+madb), including the requester and packager. The latter may not be the same as packaged
+the previous backport.
+We could also add a mechanism in rpmdrake and/or urpmi which gives a user the choice of
+opting in to notification when they install a backport.
+
+&gt;&gt;<i> For security issues, I'm not sure that it is important how we find out.
+</I>&gt;&gt;<i> As far as responsibility, I think the main responibility should be by the packager, but it could be
+</I>&gt;&gt;<i> useful for the security team to monitor it, to find an alternate packager if necessary.
+</I>&gt;&gt;<i> (Presumably from those who have tested or installed the package.)
+</I>&gt;&gt;<i> (I don't know who monitors security issues now, I just assume the security team.)
+</I>&gt;&gt;<i>
+</I>&gt;&gt;<i> However I think that such packages should be tested as normally for backports, and then treated as
+</I>&gt;&gt;<i> security updates, to be automatically applied.
+</I>&gt;<i>
+</I>&gt;<i> If we place it in a repository that is enabled by default, we will
+</I>&gt;<i> basically do a version upgrade for every people that have it enabled.
+</I>&gt;<i>
+</I>&gt;<i> If this is updates, this would violate our own policy.
+</I>&gt;<i>
+</I>&gt;<i> If we place in backports, it is not enabled by default.
+</I>
+I have a response to that below.
+
+&gt;&gt;<i> This is because those who have installed the backport in question have decided to accept a higher
+</I>&gt;&gt;<i> degree of risk. However a security issue can be a much greater risk, and is something that is
+</I>&gt;&gt;<i> normally resolved automatically. So by installing a security bug fix automatically for a backport,
+</I>&gt;&gt;<i> we are essentially maintaining the level of risk already assumed by the user.
+</I>&gt;<i>
+</I>&gt;<i> So that basically mean &quot;unsupported&quot;.
+</I>
+The intent is to support for security issues.
+
+&gt;<i> There is even more tricky problems :
+</I>&gt;<i> Let's take a software that release soon, release often. Let's say a voip
+</I>&gt;<i> software.
+</I>&gt;<i>
+</I>&gt;<i> Someone install version 1.0 from release. So far, so good, but he hear
+</I>&gt;<i> that 1.1 is out, and he install it from backport ( after requesting ).
+</I>&gt;<i> He is satisfied, then the developers of our voip software decide to
+</I>&gt;<i> create a version 2.0, with a completely new interface but the ui is yet
+</I>&gt;<i> unfinished and untranslated, so our user cannot use it. Yet, someone
+</I>&gt;<i> request a backport, and let's assume we do it.
+</I>&gt;<i>
+</I>&gt;<i> With our current scheme, our user will not be affected and he doesn't
+</I>&gt;<i> want to upgrade. So he keep the version 1.1.
+</I>&gt;<i>
+</I>&gt;<i> A security issue is discovered, in 1.X and 2.X.
+</I>&gt;<i>
+</I>&gt;<i> 1.0-2 is sent to release update, with security fix.
+</I>&gt;<i> 2.1 is sent to backport, as the packager follow the list.
+</I>&gt;<i>
+</I>&gt;<i> What should be done for the user :
+</I>&gt;<i> Force upgrade to the next major release ?
+</I>&gt;<i> Ask him to revert to release update ?
+</I>&gt;<i> Tell him &quot;this is not supported&quot; ?
+</I>&gt;<i>
+</I>&gt;<i> Or maybe we should not have upgraded to 2.0 if we knew that current user
+</I>&gt;<i> would refuse it ?
+</I>
+All these points you raise are interesting. After reflexion, I think this will work :
+
+1) A condition of backports is that the backport packager commits to packaging any
+security updates that arise. (s/he could designate an alternate.)
+(I would expect that most backports would not be very vulnerable, but of course any
+dealing with Internet access or arbitrary 3-party files are more likely to be.)
+
+2) Backports would not be removed from repos when a newer backport arrives, except those
+affected by security updates.
+This allows reverting to previous backports if a user finds a problem with a backport on
+their system.
+
+3) Security fixes must be created for all affected backports.
+This means that if 4 backports exist for an application, and all 4 are affected by the
+security problem, we have to make 4 security fixes. If only 2 of 4 are affected, those
+2 would require security fixes.
+
+4) Security fixes would be applied automatically by the security update mechanism.
+Only the corresponding update repo need be activated for this to happen.
+However, security fixes from backports would only be applied to specific backports.
+So for version 1.0 in release, and versions 1.1 , 1.2 and 1.3 in backports,
+with a security fix 1.0-1 for release,
+we would also create fixes 1.1-1 , 1.2-1 , and 1.3-1
+to be applied to backports 1.1 , 1.2 and 1,3 respectively (assuming all are affected).
+
+These security fixes for backports could be in the backport repo if properly tracked by
+the security update mechanism.
+This means that there has to be a modification of the security update mechanism to
+ensure that the updates to backports are only applied to the appropriate backport.
+
+
+Does this sound workable ?
+
+--
+Andr&#233;
+</PRE>
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+<!--endarticle-->
+ <HR>
+ <P><UL>
+ <!--threads-->
+ <LI>Previous message: <A HREF="006048.html">[Mageia-dev] Update of backport, policy proposal
+</A></li>
+ <LI>Next message: <A HREF="006164.html">[Mageia-dev] Update of backport, policy proposal
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#6076">[ date ]</a>
+ <a href="thread.html#6076">[ thread ]</a>
+ <a href="subject.html#6076">[ subject ]</a>
+ <a href="author.html#6076">[ author ]</a>
+ </LI>
+ </UL>
+
+<hr>
+<a href="https://www.mageia.org/mailman/listinfo/mageia-dev">More information about the Mageia-dev
+mailing list</a><br>
+</body></html>