Please try if you need :) It's convenience for us. Thank you. The security working group will have a bi-weekly meeting tomorrow, and we'll decide the packages that are proposed as the proposal of this time. I'll create the proposal using the following option after that meeting. Kent -----Original Message----- From: kazuhiro3.hayashi@... <kazuhiro3.hayashi@...> Sent: Tuesday, January 14, 2020 1:26 PM To: Kento Yoshida <kento.yoshida.wz@...>; jan.kiszka@...; cip-dev@...; dinesh.kumar@... Subject: RE: [cip-dev] [cip-core] Update PDP to 3.0 (was: RE: [cip-core] Package Proposal #1 (Security packages))
Hello Kent, Dinesh,
Here is a minor update of generate-proposal.py: "-a" option is newly supported to append packages to the existing proposal file. $ ./generate-proposal.py -a existing-proposal.yml
It may be useful when users want to restart creating proposal from an existing incomplete file, or append several packages to an existing proposal file which another person created, etc.
PDP revision is updated to 3.1, but all functions are compatible with 3.0. If a same source package is appended by -a option, the old proposal information in the existing-proposal will be overwritten.
Please try if you need :)
Best regards, Kazu
Hi,
Could you try the updated script to create a new proposal including the origin 21 security packages + their dependencies? Sure. Now, the security working group is re-checking the proposed packages and their dependency.
Actually, our original proposal consisted of a non-well-maintained package. In addition, as Jan mentioned, there was also waste such as both python 2.7 and 3 are included.
We are preparing a proposal without these defect.
Best regards, Kent
-----Original Message----- From: kazuhiro3.hayashi@... <kazuhiro3.hayashi@...> Sent: Thursday, January 9, 2020 9:05 PM To: jan.kiszka@...; Kento Yoshida <kento.yoshida.wz@...>; cip-dev@...; dinesh.kumar@... Subject: RE: [cip-dev] [cip-core] Update PDP to 3.0 (was: RE: [cip-core] Package Proposal #1 (Security packages))
Hello,
PDP and the helper scripts have been updated to 3.0.
* Add a rule to satisfy all run-time dependencies for the proposed binary packages
https://gitlab.com/cip-project/cip-core/cip-pkglist/commit/6867b5b41b cf618d4b e3955f302df8dbb3114050#c284394f3826d472fb70f72e2ef4ef9fe9606660_8 0
_78 * Add a script (check_deps.py) to check the dependencies * (Minor update): Caching CVE and apt data to reduce the initialization time of generate-proposal.py
Kent, Dinesh,
Could you try the updated script to create a new proposal including the origin 21 security packages + their dependencies?
Please let me know if you find some issues.
Best regards, Kazu
Hello CIP core members,
If you have any objections about the following approach, please let me know *by the next IRC meeting (on Jan 9th)*.
We are already updating cip-pkglist based on the following approach and will create the new "proposal.yml" for the security packages ASAP.
Best regards, Kazu
Hello Jan, Kent, and all CIP core members,
Anyway, I will create and share a sample of proposal.yml with the flat package set, please review that and confirm if it matches your opinion of
the "CIP maintained packages".
I would like to confirm that the following solution can satisfy our
requirements.
Examples: * proposal*.yml: The package proposal file that a proposer is creating using
"generate-proposal.py"
* pkglist_buster.yml: Existing "supported" package list, that was created/updated before (See the attached files. All information except "bin_pkgs" are dropped to simplify.)
Solution: 0. Use the same YML format as Kent's proposal (Don't change the current YML format) 1. Add a new script "check-deps.py" to check if binary packages in "depends:" are included in
either "proposal.yml" or "pkglist_buster.yml" 2. "generate-proposal.py" runs "check-deps.py" at the end and proposer needs to
add more packages to "proposal.yml" if unmet dependencies are reported by "check-deps.py"
3. The proposer can request the package proposal only if "check-deps.py" reports nothing
In the attached examples, the initial proposal "proposal1.yml" has an unmet dependency (= lsb-base).
"check-deps.py" reports this then the proposer add "lsb-base" source package and binary package to the second proposal "proposal2.yml", which satisfies all run-time dependencies so can be
proposed to cip-dev.
What do you think? If OK, we will update the scripts in https://gitlab.com/cip-project/cip-core/cip-pkglist based on the above solution.
Best regards, Kazu
Hello Jan and CIP core members,
Hi all,
On 20.12.19 10:58, kazuhiro3.hayashi@... wrote:
suricata: bin_pkgs: suricata: depends: - dpkg - python - python-simplejson I'm missing the new dependencies in the top-list. Didn't we agree on
listing them flat?
This, e.g., pulls python, currently even v2 - anything but a trivial package. Or did I miss that we have this
in
our list already?
@kazuhiro3.hayashi@... and @Dinesh Kumar, Do you need a script modification to address this issue?
We need to reconsider the format of proposal.yml (and scripts as well). It seems not to be reviewed enough.
Actually, proposals for run-time dependencies package of top-lists are still in preparation and are under
investigation
in the security working group.
The automatic outputs of the script have been used as it is for the
dependencies package displayed in this proposal.
We can only decide about package sets which have their runtime dependencies already fulfilled with the existing package set (where is that now, BTW?) or include these dependencies in
the set.
I'm assuming the "existing package set" is the list of packages that are
already accepted by CIP.
If so, there is no such list because this is the first proposal. Then let's define that base (minimal debootstrap) first before adding further packages. OK, let's start from defining this base.
Also, it's difficult for me to agree with the opinion that "all runtime dependencies must be fullfilled with the existing package set" because 1) Some dependency (binary) packages are not functionally necessary from the CIP's long-term support point of view (debconf, debian-archive-keyring, etc.) Anything that a Debian package requires needs to be present - otherwise the package becomes broken. I can't imagine we want to propose that to our users. Weaker dependencies are obviously
optional.
Yes, anything required by Debian package needs to be "present", but it is not always necessary to "maintain" their source (e.g. Request them to Debian Extended LTS).
I think that there are two kinds in our "support" levels: (1) Just make the package available (present) in CIP at least 10 years (2) (1) + Keep watching the latest bugs and security issues and fixing them aggressively I was understanding that the CIP package list we are discussing is for clarifying the packages like (2). However, if no one in CIP care about the difference between (1) and (2), we should simply define the package list including all binary package
dependencies, like Jan mentioned.
If we should run into a package that seems to require more than it should, let's improve it by proposing a break-up upstream. Or by repackaging it in meta-debian / isar-cip-core. But that should come first before proposing it here. It would be better if the both profiles can have such improved packages, but actually changing upstream (Debian) takes much time and effort and repackaging by ourselves may bring big impacts to package compatibilities, especially in the generic profile.
2) The list including all dependencies may become big for CIP's "OSBL" (e.g. If following this, the security package proposal pulls around 90 packages finally) Anything in that range still seems reasonable from a maintenance perspective - provided there are no "challenging" packages included. But we should still check if that number is seriously needed,
though.
OK, let's discuss about this number in the future proposal.
Anyway, I will create and share a sample of proposal.yml with the flat package set, please review that and confirm if it matches your opinion of
the "CIP maintained packages".
Kazu
Jan
I only checked suricata because of the outstanding python dependency, but there might be more issue. This needs to be checked carefully again. Yes, we need to share the concrete examples of packages, PDP steps, and
the format of yml.
I will prepare this and will share in the next week.
So, please suspend this proposal process until requirements of all
members become clear.
Kazu
Jan
Best regards, Kent -----Original Message----- From: cip-dev <cip-dev-bounces@...> On Behalf Of Jan Kiszka Sent: Thursday, December 19, 2019 7:48 PM To: kazuhiro3.hayashi@...; cip-dev@... Subject: Re: [cip-dev] [cip-core] Package Proposal #1 (Security packages)
On 09.12.19 14:54, kazuhiro3.hayashi@... wrote:
Hello CIP Core members,
I would like to start the "review" phase (Phase 2) of the attached
package proposal.
https://gitlab.com/cip-project/cip-core/cip-pkglist/blob /ma ster/doc/pd p.md#phase-2-proposal-review
The packages are proposed by CIP security WG to satisfy their required
features.
See the "reason" fields in the proposal for more details.
Please reply with you opinion, agree or disagree. If you cannot agree to add specific packages, please show the reasons
as well.
Due Date: December 23rd (We can extend this due date if more time required for reviews, please let me know if any requests)
[...]
chrony: bin_pkgs: chrony: depends: - init-system-helpers - adduser - iproute2 - lsb-base - ucf - libc6 - libcap2 - libedit2 - libnettle6 - libseccomp2 in_target: 'True' n_cve: '10' reason: For supporting IEC-62443-4-2 certification for CR 2.11,
2.11(1)
security_criteria: network::server, network::service Why still chrony, why not simply systemd timers? Legacy?
suricata: bin_pkgs: suricata: depends: - dpkg - python - python-simplejson I'm missing the new dependencies in the top-list. Didn't we agree on listing them flat? This, e.g., pulls python, currently even
v2 - anything but a trivial package. Or did I miss that we have this in our
list already?
Jan
-- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux
-- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux
_______________________________________________ cip-dev mailing list cip-dev@... https://lists.cip-project.org/mailman/listinfo/cip-dev
|