From Oldies@murphy.debian.org Tue Jan 2 08:20:05 2001
From: Oldies@murphy.debian.org (Oldies@murphy.debian.org)
Date: Tue, 02 Jan 2001 02:20:05 -0600
Subject: 01-01-2001
Message-ID: <36893.097280659720100.291204@localhost>
Oldies Online Casino - Happy New Year!!!
Oldies
Online
Casino
Would like to
welcome
you and your family a Happy New Year!

We Would also like
to offer ALL NEW & EXISTING Members a
Holiday 25% Bonus
Oldies Online
Casino offers Free no download Flash Internet
gambling, games include craps, keno, slots, video poker,
roulette and blackjack in real time. Play for fun or cash!
http://www.oldiesonlinecasino.com
to unsubscribe
click here
From johannes@caldera.de Thu Jan 4 12:40:04 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Thu, 4 Jan 2001 13:40:04 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
Message-ID: <20010104134004.A28627@caldera.de>
This proposal is also checked in into George Krafts Comment submission form
Problem:
LSB says nothing about File Permissions.
o This makes it possible to set up an LSB-conforming package
and a LSB conforming Linux system where the application can
not run on the linux system.
o LSB-conforming systems should be allowed to use very restrictive
permission schemes, not to make security and LSB a contradiction.
Consequences:
o LSB conforming applications should run with very restrictive
file permissions
o LSB-conforming systems should not be required to give much
file permissions.
Proposal:
In this proposal "System" means a "LSB compliant system" and
"application" means a "LSB compliant application".
I. Write Permissions
1. Directories
o The application must not depend on having directory write
permission outside /tmp, /var/tmp and his home directory.
o The application must not depend on owning these directories.
o The system may restrict directory write permissions for these
directories by setting the "sticky bit" for them.
( To prevent the application to remove "foreign" files,
e.g. a empty .rhosts file owned by root.)
2. Files
The application must not depend on file write permission on
files not owned by the user it runs under with the exeption
of its personal inbox /var/mail/
II. Read Permissions and Execute Permissions
o The application must not depend on having read permission to
every file and directory.
o The system must grant the permissions needed to use them
to all libraries, executables and data files mentioned in the
LSB document, and included standards.
III. Suid and Sgid Permissions
The application must not depend on suid/sgid permissions on a
file. Instead, the system is responsible that all system commands
are just doing their job right and have the permissions needed.
Rationale:
Let us make security officers happy. Lets give them the freedom
to take sgid/suid perms away, as long as they do not break
the systems funtionality.
IV. Removable Media (Cdrom, Floppy,...)
o LSB systems may use mount options "noauto", "nouser",
"nosuid" and "nodev" for removeable media. Also
"uid=X", "gid=X" may be used with a non-zero uid/gid value X.
Rationale: allow running applications from removable media, but
allow system to prevent application from bad behaviour.
V. Run-from-removable media applications
o They must not depend on logging in as user root.
VI.Installable applications (This paragraph should possibly be part
of Chapter VII. - Package Format and Installation)
These must not depend on BOTH to
o log in as user root
o run a self-supplied binary install routine
Rationale:
Let us make security officers less unhappy.
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
----- End forwarded message -----
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
----- End forwarded message -----
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From alan@lxorguk.ukuu.org.uk Thu Jan 4 15:02:10 2001
From: alan@lxorguk.ukuu.org.uk (Alan Cox)
Date: Thu, 4 Jan 2001 15:02:10 +0000 (GMT)
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010104134004.A28627@caldera.de> from "Johannes Poehlmann" at Jan 04, 2001 01:40:04 PM
Message-ID:
> I. Write Permissions
>
> 1. Directories
>
> o The application must not depend on having directory write
> permission outside /tmp, /var/tmp and his home directory.
s/his/its/
(language pedantry, not intended as a criticism)
> o The application must not depend on owning these directories.
> o The system may restrict directory write permissions for these
> directories by setting the "sticky bit" for them.
Including home ?
> ( To prevent the application to remove "foreign" files,
> e.g. a empty .rhosts file owned by root.)
> o The system must grant the permissions needed to use them
> to all libraries, executables and data files mentioned in the
> LSB document, and included standards.
Stop a moment. Grant to whom ? Do I grant perl the ability to the shadow
password file for example ;)
> o log in as user root
'root' isnt always the name used. There may be multiple priviledge levels -
how about 'log in as a privileged user'
(3 .sigs deleted - maintenance suggested 8))
Alan
From johannes@caldera.de Thu Jan 4 17:42:33 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Thu, 4 Jan 2001 18:42:33 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: ; from alan@lxorguk.ukuu.org.uk on Thu, Jan 04, 2001 at 03:02:10PM +0000
References: <20010104134004.A28627@caldera.de>
Message-ID: <20010104184232.B8891@caldera.de>
On Thu, Jan 04, 2001 at 03:02:10PM +0000, Alan Cox wrote:
> > o The application must not depend on having directory write
> > permission outside /tmp, /var/tmp and his home directory.
> s/his/its/
> (language pedantry, not intended as a criticism)
>
ACK
> > o The application must not depend on owning these directories.
> > o The system may restrict directory write permissions for these
> > directories by setting the "sticky bit" for them.
>
> Including home ?
>
Yes, as local sysadmin I want to be able to place a empty rhosts file
(owned by root) in home directories, to prevent users from opening
rsh security holes. To prevent the users from deleting .rhosts,
I need the sticky bit on the home directory.
> > o The system must grant the permissions needed to use them
> > to all libraries, executables and data files mentioned in the
> > LSB document, and included standards.
> Stop a moment. Grant to whom ? Do I grant perl the ability to the shadow
> password file for example ;)
OK, let "reword" this paragraph.
o The system must grant to the application the permissions needed
to use all libraries, executables and data files mentioned in the
LSB document and included standards.
> > o log in as user root
>
> 'root' isnt always the name used. There may be multiple priviledge levels -
> how about 'log in as a privileged user'
ACK
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From alan@lxorguk.ukuu.org.uk Thu Jan 4 17:50:14 2001
From: alan@lxorguk.ukuu.org.uk (Alan Cox)
Date: Thu, 4 Jan 2001 17:50:14 +0000 (GMT)
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010104184232.B8891@caldera.de> from "Johannes Poehlmann" at Jan 04, 2001 06:42:33 PM
Message-ID:
> > > o The system must grant the permissions needed to use them
> > > to all libraries, executables and data files mentioned in the
> > > LSB document, and included standards.
>
> > Stop a moment. Grant to whom ? Do I grant perl the ability to the shadow
> > password file for example ;)
> OK, let "reword" this paragraph.
>
> o The system must grant to the application the permissions needed
> to use all libraries, executables and data files mentioned in the
> LSB document and included standards.
That still says I have to give it /etc/shadow ;) Perhaps we need to define
public/private files ?
From gk4@us.ibm.com Thu Jan 4 18:46:33 2001
From: gk4@us.ibm.com (George Kraft)
Date: Thu, 4 Jan 2001 12:46:33 -0600
Subject: REVIEW for the newly posted LSB 0.4
Message-ID:
The newly posted LSB 0.4 is taking comments until Wednesday January 24th,
2001.
http://www.linuxbase.org/spec/lsbreview.html
The LSB workgroup will review comments on Tuesday January 30th, 2001 in New
York city. Please RSVP, then read the agenda and prepare in advance.
http://www.linuxbase.org/talks/20010130.html
Your input and participation in the online review and workgroup meeting is
welcomed.
George Kraft IV
gk4@us.ibm.com
From johannes@caldera.de Fri Jan 5 12:32:34 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Fri, 5 Jan 2001 13:32:34 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: ; from alan@lxorguk.ukuu.org.uk on Thu, Jan 04, 2001 at 05:50:14PM +0000
References: <20010104184232.B8891@caldera.de>
Message-ID: <20010105133234.A11612@caldera.de>
I hope we can fix it that way:
o The system must grant to the application the permissions needed
to use all system interfaces (ABIs) mentioned in the LSB document
and included standards.
Lets test this with Alans examle:
Chapter 15.1 (User Database) does not mention the shadow password file.
There is the sentence:
The passwd(5) user database should only be read and
updated form the following APIs: ....
This explicitly makes passwd a "non interface". By not even mentioning it,
the shadow file is made a "non interface" too, implicitly.
On Thu, Jan 04, 2001 at 05:50:14PM +0000, Alan Cox wrote:
> > > > o The system must grant the permissions needed to use them
> > > > to all libraries, executables and data files mentioned in the
> > > > LSB document, and included standards.
> > > Stop a moment. Grant to whom ? Do I grant perl the ability to the shadow
> > > password file for example ;)
> > OK, let "reword" this paragraph.
> >
> > o The system must grant to the application the permissions needed
> > to use all libraries, executables and data files mentioned in the
> > LSB document and included standards.
> That still says I have to give it /etc/shadow ;) Perhaps we need to define
> public/private files ?
> --
>
> To UNSUBSCRIBE, email to lsb-spec-request@lists.linuxbase.org
> with subject of "unsubscribe". Trouble? Email listmaster@lists.linuxbase.org
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From tytso@mit.edu Mon Jan 8 23:55:14 2001
From: tytso@mit.edu (tytso@mit.edu)
Date: Mon, 8 Jan 2001 18:55:14 -0500
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010104134004.A28627@caldera.de> (message from Johannes
Poehlmann on Thu, 4 Jan 2001 13:40:04 +0100)
References: <20010104134004.A28627@caldera.de>
Message-ID: <200101082355.f08NtEo10077@snap.thunk.org>
Date: Thu, 4 Jan 2001 13:40:04 +0100
From: Johannes Poehlmann
Problem:
LSB says nothing about File Permissions.
o This makes it possible to set up an LSB-conforming package
and a LSB conforming Linux system where the application can
not run on the linux system.
o LSB-conforming systems should be allowed to use very restrictive
permission schemes, not to make security and LSB a contradiction.
I'm not sure we want to go here. Permissions generally are a system
administrator issue much more than they are a distribution issue, and
trying to word things so that we don't prohibit perfectly sane
configurations might be very difficult. For example, there are probably
certain system users (like the one used by the imap daemon, or the one
used by the anonymous FTP daemon) who might have very restrictive
permissions schemes. Is this allowed? I would argue that an LSB
statement which prohibited this type of security precaution is broken,
and we shouldn't go there.
And even if we specify that "users" must be given such permissions,
maybe in some cases there will some set of users that should be given
very restrictive permissions.
My suggest is that we not try to address this "problem". If a
distribution sets such a highly restrictve set of permissions, the
system administrator can always "fix" the permissions very easily, and
if someone did try to sell such a super-secure distribution as a
desktop, market forces will probably solve the problem very quickly.
(And in a server environment, as a sysadmin I'd much rather have a
system which was oversecured, and which I could open up exactly what is
needed to allow applications to run, rather than a system which was
shipped "insecure out of the box".)
- Ted
From venom@cibs9.sns.it Tue Jan 9 09:37:31 2001
From: venom@cibs9.sns.it (V man)
Date: Tue, 9 Jan 2001 10:37:31 +0100 (CET)
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <200101082355.f08NtEo10077@snap.thunk.org>
Message-ID:
On Mon, 8 Jan 2001 tytso@mit.edu wrote:
> Date: Mon, 8 Jan 2001 18:55:14 -0500
> From: tytso@mit.edu
> To: johannes@caldera.de
> Cc: lsb-spec@lists.linuxbase.org
> Subject: Re: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir
> permissions
> Resent-Date: Tue, 9 Jan 2001 00:57:40 +0100
> Resent-From: lsb-spec@lists.linuxbase.org
>
> Date: Thu, 4 Jan 2001 13:40:04 +0100
> From: Johannes Poehlmann
>
> Problem:
>
> LSB says nothing about File Permissions.
>
> o This makes it possible to set up an LSB-conforming package
> and a LSB conforming Linux system where the application can
> not run on the linux system.
>
> o LSB-conforming systems should be allowed to use very restrictive
> permission schemes, not to make security and LSB a contradiction.
>
> I'm not sure we want to go here. Permissions generally are a system
> administrator issue much more than they are a distribution issue, and
> trying to word things so that we don't prohibit perfectly sane
> configurations might be very difficult.
Exactly! i would say that we should recognize it, maybe saying that
a kind of reasonable permission scheme is suggested (that is almost what
we say shipping with most distributions), and the system
manager is free
to use a mutch more restrictive one as mutch as a less restrictive one.
Luigi Genoni
From quinlan@transmeta.com Thu Jan 11 22:14:32 2001
From: quinlan@transmeta.com (Daniel Quinlan)
Date: Thu, 11 Jan 2001 14:14:32 -0800
Subject: lpr subset standard wanted
Message-ID: <200101112214.OAA10262@magnesium.transmeta.com>
If possible, I would like to document the subset of lpr functionality
that can be safely used by applications into the LDPS 1.1 portability
guidelines and perhaps the LSB specification as well.
Could someone investigate:
- CUPS
- BSD lpr
- GNU lpr
- lprng
and find out which options/features are supported by all of them
(and then, which options/features have the same behavior).
If you're interested in this task, please let me know.
A draft would need to be completed in one week if this is to make the
LDPS 1.1 beta. (The current target for LDPS 1.1 beta is January 25th.)
- Dan
From johannes@caldera.de Fri Jan 12 17:44:24 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Fri, 12 Jan 2001 18:44:24 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <200101082355.f08NtEo10077@snap.thunk.org>; from tytso@mit.edu on Mon, Jan 08, 2001 at 06:55:14PM -0500
References: <20010104134004.A28627@caldera.de> <200101082355.f08NtEo10077@snap.thunk.org>
Message-ID: <20010112184424.C14853@caldera.de>
Is it possible to misunderstand my proposal as
"bossing around" Distributions ?
> LSB says nothing about File Permissions.
> o This makes it possible to set up an LSB-conforming package
> and a LSB conforming Linux system where the application can
> not run on the linux system.
I fear that future LSB-compliant distributions could be bashed to dead
if say LSB-compliant oracle can not run on them because of
permission conflicts.
> o LSB-conforming systems should be allowed to use very restrictive
> permission schemes, not to make security and LSB a contradiction.
If we do not spec permissions at all, we will have a de facto standard
which says: All major ISV packages have to run, so give them the permissions
they need. This will force LSB compliant distributions to grant a lot
of file/dir permissions.
The proposal proper gives the Distro/Sysadmin the greatest possible
freedom on the cost of ISVs: If we forbid ISVs to demand certain
permissions the Distro/Admin has the FREEDOM to grant them or not.
> I'm not sure we want to go here. Permissions generally are a system
> administrator issue much more than they are a distribution issue, and
> trying to word things so that we don't prohibit perfectly sane
> configurations might be very difficult. For example, there are probably
> certain system users (like the one used by the imap daemon, or the one
> used by the anonymous FTP daemon) who might have very restrictive
> permissions schemes. Is this allowed? I would argue that an LSB
> statement which prohibited this type of security precaution is broken,
> and we shouldn't go there.
Ted, that is exactly the situation i want to prevent
> My suggest is that we not try to address this "problem". If a
> distribution sets such a highly restrictve set of permissions, the
> system administrator can always "fix" the permissions very easily, and
> if someone did try to sell such a super-secure distribution as a
> desktop, market forces will probably solve the problem very quickly.
Is this good ? Do we want future bad press for Linux and the LSB like:
"Standard Linux is open to XYZ-attack" ?
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From johannes@caldera.de Fri Jan 12 17:52:48 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Fri, 12 Jan 2001 18:52:48 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: ; from venom@cibs9.sns.it on Tue, Jan 09, 2001 at 10:37:31AM +0100
References: <200101082355.f08NtEo10077@snap.thunk.org>
Message-ID: <20010112185247.D14853@caldera.de>
On Tue, Jan 09, 2001 at 10:37:31AM +0100, V man wrote:
> On Mon, 8 Jan 2001 tytso@mit.edu wrote:
> > From: Johannes Poehlmann
> > LSB says nothing about File Permissions.
> >
> > o This makes it possible to set up an LSB-conforming package
> > and a LSB conforming Linux system where the application can
> > not run on the linux system.
> >
> > I'm not sure we want to go here. Permissions generally are a system
> > administrator issue much more than they are a distribution issue, and
> > trying to word things so that we don't prohibit perfectly sane
> > configurations might be very difficult.
> Exactly! i would say that we should recognize it, maybe saying that
> a kind of reasonable permission scheme is suggested (that is almost what
> we say shipping with most distributions), and the system
> manager is free
> to use a mutch more restrictive one as mutch as a less restrictive one.
Hi Luigi,
We need to keep the Distributions/system managers freedom, to be as
much restrictive or permissive he wants.
To guarantee this, we must forbid Third Party Software Vendors ("ISVs")
to demand more then a reasonable set of permissions.
If we fail to do so, major ISV packages will demand arbitrary permissions
and you as a Distributor had to grant them. If you do not, you will face
bad press like: "Paranoia Linux claims to be LSB compliant but fails to
execute LSB-compliant oracle/MSLinWord/Whatever".
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From venom@DarkStar.sns.it Fri Jan 12 22:40:44 2001
From: venom@DarkStar.sns.it (V-man)
Date: Fri, 12 Jan 2001 23:40:44 +0100 (CET)
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010112185247.D14853@caldera.de>
Message-ID:
On Fri, 12 Jan 2001, Johannes Poehlmann wrote:
> On Tue, Jan 09, 2001 at 10:37:31AM +0100, V man wrote:
>
> > On Mon, 8 Jan 2001 tytso@mit.edu wrote:
>
> > > From: Johannes Poehlmann
>
> > > LSB says nothing about File Permissions.
> > >
> > > o This makes it possible to set up an LSB-conforming package
> > > and a LSB conforming Linux system where the application can
> > > not run on the linux system.
> > >
> > > I'm not sure we want to go here. Permissions generally are a system
> > > administrator issue much more than they are a distribution issue, and
> > > trying to word things so that we don't prohibit perfectly sane
> > > configurations might be very difficult.
> > Exactly! i would say that we should recognize it, maybe saying that
> > a kind of reasonable permission scheme is suggested (that is almost what
> > we say shipping with most distributions), and the system
> > manager is free
> > to use a mutch more restrictive one as mutch as a less restrictive one.
>
> Hi Luigi,
>
> We need to keep the Distributions/system managers freedom, to be as
> much restrictive or permissive he wants.
>
> To guarantee this, we must forbid Third Party Software Vendors ("ISVs")
> to demand more then a reasonable set of permissions.
>
> If we fail to do so, major ISV packages will demand arbitrary permissions
> and you as a Distributor had to grant them. If you do not, you will face
> bad press like: "Paranoia Linux claims to be LSB compliant but fails to
> execute LSB-compliant oracle/MSLinWord/Whatever".
>
I understand this point, and you are right.
This, for what i see, means that we need to keep a really good
equilibrium.
For what i know, the traditional set of permission we see in other
older Unixes is not suitable, since it usually is too open, and it makes
even difficoult for sysadmins to adopt a more restrictive set.
So, we should identify clearly, for example, which file we consider that
just the sysadmin should access, and then establish a set where there is
no need for user application to access them, nor to use SUID bits to
access them anyway (and also forbit SUID for every user).
I know this is difficoult, but this should be the goal.
For example i discovered oracle to use suid bits (as oracle user, of
course), to do many things. Just immagine how many exploits.
Think to those applications that have to be installed as root user!
Bests
Luigi Genoni
From tkamppeter@mandrakesoft.com Sat Jan 13 20:02:20 2001
From: tkamppeter@mandrakesoft.com (Till Kamppeter)
Date: Sat, 13 Jan 2001 21:02:20 +0100
Subject: [Fwd: lpr subset standard wanted]
References: <3A5E3551.8BCF4B84@mandrakesoft.com>
Message-ID: <3A60B44C.1A120B8B@mandrakesoft.com>
This is a multi-part message in MIME format.
--------------E7ECA23A21EA33ED14C1408D
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
CUPS (www.cups.org)
-------------------
The command line commands (lpr, lpq, lprm, lpc, lp, cancel, ...) are
made as compatible as possible to both the System V and the BSD version
of LPD. The programs have also exactly the same names as the LPD
commands, so that one does not need to change the defaults of the
applications when one switches from LPD to CUPS. See the manual pages of
the commands (attached, use "bunzip2 ; man ./" to read
them). See also
www.cups.org/documentation.html
Note that some options (as e-mail notification in the end of the job)
are not implemented.
XPP (http://cups.sourceforge.net/xpp/) understands most of the lpr and
some of the lp options. About QtCUPS
(http://cups.sourceforge.net/qtcups/) I do not know.
Especially all programs ("lpr", "lp", "xpp", and "qtcups") accept
printing jobs both as file name supplied on the command line or as
standard input.
CUPS is also compatible to LPD servers when one runs the CUPS-LPD
mini-daemon. See
www.cups.org/sam.html#8_2
http://www.mandrakeuser.org/hardware/hcups4.html#lpdcl
It accesses to LPD servers, too:
www.cups.org/sam.html#8_3
http://www.mandrakeuser.org/hardware/hcups3.html#lpdsrv
CUPS can also generate an "/etc/printcap" file containing the names of
all printer queues, so that applications can set up a printer list, also
when they are made only for LPD.
But CUPS allows to set printing options in a very sophisticated way, so
I would not recommend, that programs have a hard-coded call of "lpr" (as
KDE 2) or even direct talking to a running LPD daemon (as LyX). I would
alway give the possibility for the user to enter a printing command line
and save it, so that that one can use every printing program including
graphical frontends (as XPP or QtCUPS). Best would be some spooler
independent way for the printing facility in the applications.
Till
Gael Duval wrote:
>
> If you have time and feel like to answer about Cups, if think it would
> be great!
> ------------------------------------------------------------------------
>
> Subject: lpr subset standard wanted
> From: Daniel Quinlan
> To: freestandards-ldps@lists.sourceforge.net, lsb-spec@lists.linuxbase.org
>
> If possible, I would like to document the subset of lpr functionality
> that can be safely used by applications into the LDPS 1.1 portability
> guidelines and perhaps the LSB specification as well.
>
> Could someone investigate:
>
> - CUPS
> - BSD lpr
> - GNU lpr
> - lprng
>
> and find out which options/features are supported by all of them
> (and then, which options/features have the same behavior).
>
> If you're interested in this task, please let me know.
>
> A draft would need to be completed in one week if this is to make the
> LDPS 1.1 beta. (The current target for LDPS 1.1 beta is January 25th.)
>
> - Dan
--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lpr-cups.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lpr-cups.1.bz2"
QlpoOTFBWSZTWdhHwNQAAU9fgAoQXGf/sH/33+4////wUAU6JmSLy4W6y50OaEoRDRpMSbEJ
iaGKMj1MRowgPUeSaGglCjATSZMp6JomQMQ0ANMhkDQAGERAp6GqaeJPQNJk0AGgB6gaAAcZ
MmTEYmAEyYJkANGEYAhgEikno0SBtTaTQA0xA0AAAAAQT9O/3vNdPh0fL0YwPu2eREbk+ZiQ
qPh6+OLdzFcE4Q94nCTfnsegeF7UakDt04LD4x9z/tP5bl0oIWoiKZBRG3aG6VfRSBG80cLh
fMj7Ssk2kaL9iBdhr7iv/T8T1/tV0pdMNeTc/Jx4KTcTiP53nbESEJyiJpOKmzoEy+xEfT4O
D17u9tu06ujDljLS1sUa5NFVaoMLmCDKXFPJjPOty7WWAiBaqS6NpCjV+tyoF+aIaCaCedn6
1mJ922si3Vx9Rf2gs0yF1qVxkw9ykNJkdcBjpbNS2ZvrjD0KGlW3Lk5quRljMVWTZUZja6Gd
KZQO/IxhvYa85MCk8N/eoCWeppOhcZwnrt8qMcOrxojUwiZxTiJsXY9M9uQNeLrhQBK+ZzmJ
BmsL07uf6s4S6ZihSgUH2Pzc1yQuk1WhvP33SbWbBBEfNxI9XKVMjn56dZ7B6JYowabGHDjd
1M0OtGIrcOsfah7SJxlgS5NVKvV76T+j0DAYItN4jmHwM7yKjk6uTRl5vLlNZcVEOvZi+fyY
vzde1LhpCC7F0Lkcwb9UpHVuaUgqJRKid/6lrQdv0eLhpn2mLsFpFRVt9dde6Vfxa4ZeB+XP
qvgVQdThQFxxCcVIG1RMECs7B9NwSvsdoiOzsKIKiKipl2YQyiQQZUiSMsGr+A9Zyy9VQqRq
oQmQG20xjbG0sRjXHyKKiPHBYfChTWqH061P52HdLJmJE8lGJwKliot849KI5EWy/uiYJB8G
jcDKx4H1u8qEgemGaAbpI7tdVabyGgB2NAbVwr4TYTdOH3uNVmLLTQzqCgkAghmVsMYC6FhT
CBFWBXompKvySG+v2MSd7tLZxVCXWj8Xe0INqKUNhCipSRDrwDBGL2a1E8gDqB/lxYq2MWXG
zNj+s9Jzuw50NTmmgLAdvWRmKTVmZ+tY3qCgotPTSKDqIZQnojbRd31ECuYLgleYNhoySjUR
AkyIUInKi662qmYmIqogy63KwxZIDsqaVOaFVdO3Jq41RT+QMIQTMuYskI1WrHXS0O6sNlov
0TTK3QNJQAMly0DYys+jkmEXWEqSQ4B2F9FWPDa/ti4LKKJo8ZEg0oPXB+05bnJwKnQizrHf
xjfRVXhg0ZcRkZo54+5RBrIBhrthSOhgTtQhAlbtExOyQYEwnRFtLdaIASgRvc1lhlm9pAop
tgBWSbtSCyDPH/CN/pw05ibz0kxHPd1QJHUFkdQQNwQCRjbVnKgGlC0PahPCXMOTlNV8WQhb
D0Gxjnmy5LwdPHTOgSc0qGtSBQ046k5+BmBjzEDCElEuA0iiyFyxyknC9VkZYmbaEDzBFdNh
umQVqCHHZUK9WJiWt+A1GTWUmBLSKA2wAwtiFb5hh61fpOgeqWdausid7PW9RvmhDtmzAF2z
sHF2NUkcOh1uLAnoii0URWMUvpdriqpjCWlG1YVRQMVAGWSDkIklioyKKlHwdjdaE1YmQHXs
0aWhaMtDmeOvROLCkqbLVEx5PQntCqdK6FTCklppbzMdxQtmJ7zViRIhOocb+noJ4VDARdLN
L2xTSCux/4u5IpwoSGwj4GoA
--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lpq-cups.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lpq-cups.1.bz2"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--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lprm-cups.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lprm-cups.1.bz2"
QlpoOTFBWSZTWZUatecAANVfgAoQVGf/sH/n3+4////gUAOjVvc26oaCoNTJGQ0ZQ9KaNtSe
pmo0aaMmhpp6jRk0NANIyTEJ5BTyMoMI0yAaGgGgAA00I1T1AnqMTyhoNBoAABpoAAc0ZMTA
BMRgRpgQYjBMmARgkSCaE1PSYU2k9QeppoGQAGgAAJQjpyZ6Bs0zJ+TtThrMRAoz5NtSZLTC
mEaSF/Q7x26P6DdM82bvPAgIDUIQQpBBB7C5yTvGC5AF+DIOA4ZRVuvvdei1BqxcSX7O/AKV
g9wXiyVNn9xKERWRClgRJJKIMrFM92PKNZxg5KtG9cWsj7v0GMS/ZWzk2IWkNTGszmwKJRDF
4WgiljEikG43DXVOwRP1BrqbbsL1ZvXB4Ut7EqFxSS+jC1GZmWdzK+bTPS1r7Vt5e/WQAmHw
XUqEiEoLl6XDIWzZiEdDkEaFoSjpD46r+9aY2OJ1UpnpnvOgdhAgGRxFjo4HfNZf7joJgMNm
2CZQ2+qLvcEy2BSKzR4yWUZhEBxsxtoaslqon1uDmGq0JMRLCRMQNGOq/XvgLA8TiTPY/VrM
Uw6E9ZmFlYUCwpOMEjdiWJvbKahKQRIoF4ekkBBPVw1a0W9lYb0Cp5hUIT7EV5VmFq9h5pCx
8F59PJeGNzpiBmjRfIryhbLRTMVMpAuqeml+qoYg0ryD0mLMVIFDcCBDNlBL9CYXD7O3Kztz
fMZXm5BCeCilfa71pURLou3i6rVeWHSpcKlvErFx+pA5KGGoFqBCLoZiE+mwIkPX8LGIwTdI
UkwVIsE2ejUa9sxXZ8bP4YpQfg+BAfG6k8oIpBE6ve+QwM79+L232/X3KYhmzENZGfKuFqlv
Pqnlqlnr89lsnq2rcfURrpyrcx1SlsJI7BJE59bYrh87bE+aFlq3rtM7dq4Y9PWw7n7zLluf
aNdVo0J397jmNzsKAk0dOVBvD177A9hFhC5IYLlKJbPip0qDIrG97zooNMOeYC5RZsgXJCOW
qbTaMa9k1zpZOiz4lUlBZooyHDh8bgdZKQm14GpyMmi6V0myIgGUnwsb/4ln3cOPSK9d5KOH
mp5hmk1jRZjcuzbdS4pCzJ25CW/tl/pi3+Ne0lhzGyWGHYtMGgahR16lmqShNtl0d/eBNhfB
GPMrWXlHz4QgtMULdxUVHe8OeRU0QHFJZ0urXqRYyT1Ihhs0+Aa0pllnMOg85VVB5MejQVgv
lpSQmWmZTad+V8zKtc7jQCnVUUFGVHdLDTYZYoTbssKVwmLiK+iDV5QVNX9mbS7BuRWBSK8T
vsPFtDYJltIkK49OgMbOUQR4ZolWLP8XckU4UJCVGrXn
--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lpc-cups.8.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lpc-cups.8.bz2"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--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lp.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lp.1.bz2"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--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="cancel.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="cancel.1.bz2"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--------------E7ECA23A21EA33ED14C1408D--
From kingdon@panix.com Sat Jan 13 19:28:16 2001
From: kingdon@panix.com (Jim Kingdon)
Date: Sat, 13 Jan 2001 14:28:16 -0500 (EST)
Subject: [Freestandards-ldps] Re: [Fwd: lpr subset standard wanted]
In-Reply-To: <3A60B44C.1A120B8B@mandrakesoft.com> (message from Till Kamppeter
on Sat, 13 Jan 2001 21:02:20 +0100)
References: <3A5E3551.8BCF4B84@mandrakesoft.com> <3A60B44C.1A120B8B@mandrakesoft.com>
Message-ID: <200101131928.OAA16161@panix6.panix.com>
> See the manual pages of the commands (attached, use "bunzip2 ;
> man ./" to read them).
I suspect we just want the lpr command. Although the CUPS lpr manpage
does look like a good place to start (-C, -J and -T seem to differ in
meaning somewhat; I'm not sure we want to standardize -r because of
the potential for losing someone's file in a paper jam, as noted in
the LPRng manpage; -o doesn't seem to be supported by LPRng). But
other than that the CUPS options seem to also be available in LPRng.
> CUPS is also compatible to LPD servers when one runs the CUPS-LPD
> mini-daemon. See
Not an LSB or LDPS issue, I don't think.
> I would not recommend, that programs have a hard-coded call of "lpr"
> (as KDE 2)
We might want to recommend that applications give the user the option
of specifying a command (as Netscape does). But we should also
recommend that they default to "lpr", as Netscape does (programs
should be able to print in a simple way without any configuration and
the "lpr" command line is the portable way to do that).
> even direct talking to a running LPD daemon (as LyX).
Heavens no. We don't want to require that an lpd daemon be present
any more than we require that an SMTP daemon be present (the latter
*was* the subject of much discussion).
See
http://cvs.sourceforge.net/cgi-bin/cvsweb.cgi/spec/command/sendmail.sgml?rev=1.1&content-type=text/x-cvsweb-markup&cvsroot=lsb
for what we have done vis-a-vis sendmail.
From mcneil@valinux.com Mon Jan 15 18:40:18 2001
From: mcneil@valinux.com (Scott McNeil)
Date: Mon, 15 Jan 2001 10:40:18 -0800
Subject: LinuxWorld New York
Message-ID: <3A634412.7F0FC9FA@valinux.com>
We still need volunteers to staff the FSG booth for the following
dates/times:
Wednesday, January 31
(1) 2pm - 4pm
(1) 4pm - 6pm
(1) 3pm - 4pm
Thursday, February 1
(1) 1pm - 2pm
(1) 2pm - 4pm
(2) 4pm - 6pm
Friday, February 2
(1) 12pm - 2pm
(1) 1pm - 3pm
(2) 2pm - 3pm
(1) 3pm - 5pm
Volunteers will receive a free pass to the show, IDG/LinuxWorld VIP
party, and at least one T-shirt from our generous Corporate Sponsors.
Scott
--
Scott McNeil
,
From gk4@us.ibm.com Fri Jan 19 20:59:25 2001
From: gk4@us.ibm.com (gk4@us.ibm.com)
Date: Fri, 19 Jan 2001 14:59:25 -0600
Subject: The review of LSB v0.4.2 ends this coming Thursday January 25th
Message-ID: <852569D9.0076C7EA.00@d54mta01.raleigh.ibm.com>
The review of LSB v0.4.2 ends this coming Thursday January 25th. Everyone
is encourage to read and comment on the specification.
http://www.linuxbase.org/spec/lsbreview.html
The LSB workgroup will be meeting on Tuesday January 30th in New York city
to review the comments and plan on the delivery of the LSB v1.0
specification.
http://www.linuxbase.org/talks/20010130.html
George Kraft IV
gk4@us.ibm.com
512-838-2688; t/l 678-2688
IBM Linux Technology Center
http://oss.software.ibm.com/developerworks/opensource/linux/
FSG's Linux Standard Base
http://sourceforge.net/projects/lsb/
From Johannes Poehlmann Tue Jan 23 14:07:43 2001
From: Johannes Poehlmann (Johannes Poehlmann)
Date: Tue, 23 Jan 2001 15:07:43 +0100
Subject: confcall followup: [PROPOSAL V2] (Ch.16 FHS) file/dir permissions
In-Reply-To: <20010104134004.A28627@caldera.de>; from johannes@caldera.de on Thu, Jan 04, 2001 at 01:40:04PM +0100
References: <20010104134004.A28627@caldera.de>
Message-ID: <20010123150743.A9860@caldera.de>
(As discussed in the last LSB conference call)
----------------------------------------------------------
Reworded proposal to add the following to chapter 16:
( comments from Alan Cox: changes of #3)
( comments from John Terpstra: Add #6)
In this Chapter "System" means a "LSB compliant system" and
"application" means a "LSB compliant (third party vendor) application".
1. Directory Write Permissions
o The application must not depend on having directory write
permission outside /tmp, /var/tmp and itīs home directory.
o The application must not depend on owning these directories.
o The system may restrict directory write permissions for these
directories by setting the "sticky bit" for them.
( To prevent the application to remove "foreign" files,
e.g. a empty .rhosts file owned by root.)
2. File Write Permissions
The application must not depend on file write permission on
files not owned by the user it runs under with the exeption
of its personal inbox /var/mail/
3. Read Permissions and Execute Permissions
o The application must not depend on having read permission to
every file and directory.
| o The system must grant to the application read and execute
| permissions needed to use all system interfaces (ABIs)
| mentioned in the LSB document and included standards.
4. Suid and Sgid Permissions
The application must not depend on suid/sgid permissions on a
file. Instead, the system is responsible that all system commands
are just correctly doing their job and have the permissions needed.
Rationale:
Let us make security officers happy. Lets give them the freedom
to take sgid/suid perms away, as long as they do not break
the systems funtionality.
| 5. Privileged users
|
| Application may not depend on running as a privileged user
|
| [ If we can not agree on that (which I am in favor of), let us
| at least state this as a minimum:
|
| If an application wants to run under a privileged user,
| then
| o The reasons must be outlined clearly
| o It must be prominently and verbatimly stated in all announcments
| of the application that "this application demands security
| privileges, which could infere with system security".
| o The application may not contain binary only software.
| ]
| 6. Changing permissions
|
| Application must not change permissions of files and
| directories not beeing part of their package
7. Removable Media (Cdrom, Floppy,...)
o The Systems may use mount options "noauto", "nouser",
"nosuid" and "nodev" for removeable media. Also
"uid=X", "gid=X" may be used with a non-zero uid/gid value X.
Rationale: allow running applications from removable media, but
allow systems to prevent application from bad behaviour.
8. Run-from-removable media applications
o They must not depend on logging in as a privileged user.
9. Installable applications (This paragraph should possibly be part
of Chapter VII. - Package Format and Installation)
On Installation, they must not depend on BOTH to
o log in as user root
o run a self-supplied binary install routine
Rationale:
Let us make security officers less unhappy.
Rationale/Problem:
LSB says nothing about File Permissions.
o This makes it possible to set up an LSB-conforming package
and a LSB conforming Linux system where the application can
not run on the linux system.
o LSB-conforming systems should be allowed to use very restrictive
permission schemes, not to make security and LSB a contradiction.
Consequences:
o LSB conforming applications should run with very restrictive
file permissions
o LSB-conforming systems should not be required to give much
file permissions.
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From orjrotbh@mail.ru Tue Jan 23 20:17:32 2001
From: orjrotbh@mail.ru (orjrotbh@mail.ru)
Date: Tue, 23 Jan 2001 12:17:32 -0800
Subject: Cheap developers for your project available
Message-ID: <200101232017.MAA31052@surfer.oakweb.com>
Dear IT Manager:
Please consider deploying our highly skilled off-shore programmers on your e-commerce and software development projects.
They develop software for:
ALL WINDOWS AND UNIX PLATFORMS
databases, networks, and languages, plus Perl, PHP, C++, ASP, Cold Fusion, Java, WAP, XML, MS Access, SQL, Shopping Carts, and the Internet.
Typical rates are $15 to $20 per hour.
They are fast, professional, inexpensive, cheap, and available immediately.
Please call me, or reply this e-mail.
http://softomate.da.ru
Thanks!
Paul USA: +1 (213) 5162593
PS. You are already removed!
PPS. In Europe? Please call +39 3480612212
From mcneil@valinux.com Wed Jan 24 00:40:22 2001
From: mcneil@valinux.com (Scott McNeil)
Date: Tue, 23 Jan 2001 16:40:22 -0800
Subject: FSG/LinuxWorld - Last Chance!
References: <3A634412.7F0FC9FA@valinux.com>
Message-ID: <3A6E2476.FB617C41@valinux.com>
All staff positions have been filled except for the following two:
Thursday, February 1: 4-6pm
Friday, February 2: 2-4pm
Volunteers receive free passes to the show, free passes to the huge IBM
party on Wednesday, free passes to the IDG VIP party on Thursday, free
admission to all four keynotes (including Dirk Hohndel & Larry
Augustin), free admission to the Golden Penguin Bowl (hosted by Nick
Petreley), a free T-shirt, and other stuff that is simply too amazing to
convey in ascii.
Just reply to this email with the time you are available to assist and
we will register you for the show.
See you next week!
Scott
--
Scott McNeil
Free Standards Group
www.freestandards.org
From johannes@caldera.de Wed Jan 24 16:55:13 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Wed, 24 Jan 2001 17:55:13 +0100
Subject: V4 [Partial withdrawal of PROPOSAL] Change Chapter 17 (cron)
Message-ID: <20010124175513.A1108@caldera.de>
1. We want to uphold one part of the proposal, which was already
sent out separately:
Date: Thu, 7 Dec 2000 16:02:25 +0100
From: Johannes Poehlmann
To: lsb-spec@lists.linuxbase.org
Subject: [PROPOSAL] Get rid of the cron.hourly dir
Message-ID: <20001207160225.A11177@caldera.de>
Our reasons are:
o because many parallel cron scripts cause a big computational load,
it should be possible to serialize these scripts.
This would be risky when using cron.hourly:
What if the serialized scripts need more time then one hour ?
o we want to allow cron to optimize away hourly disk accesses,
as vixie-cron with a patch from debian already does.
o implementing anacron-like functionality produces unnecessary
overhead if cron.hourly is in place (or the anacron-like
functionality had to be switched off for cron.hourly resulting
in inconsistent behaviour).
2. As a consensus could not be reached, we do withdraw the rest of
the mentioned proposal. Instead we propose to legalize our proposed
concept (using symbolic links to a common scripts repository)
as we would not like to give it up for Caldera OpenLinux.
proposed new (and shorter ..) wording:
The directories /etc/cron.daily, /etc/cron.weekly, /etc/cron.monthly
may also contain soft links to a centralized scripts repository.
If existing, this directory has to be named /etc/cron.scripts.
--------
Task for the proposal
http://sourceforge.net/pm/task.php?func=detailtask&project_task_id=18043&group_id=1107&group_project_id=3049
http://lists.debian.org/lsb-spec-0008/msg00000.html
lsb-spec mailing list: <20000801154116.A15227@caldera.de>
On Tue, Aug 01, 2000 at 03:41:59PM +0200, Johannes Poehlmann wrote:
> This Proposal is a repost of "Comments on Chapter 17 (cron)
> of the LSB Spec", sent out 2000 June 12 to the lsb-spec list
>
> =============================================
>
> PROPOSAL to change Chapter 17 of the LSB Spec:
>
> common script repository, init-like symlinks, directory naming
>
>
>
> 1 It is desirable to control the order of execution of the scripts
> put in one of the "periodic scripts directories" ( /etc/cron.daily etc.).
>
> This can be done by adapting the naming scheme used inside
> of /etc/init.d, using two digit prefixes, which control the order
> of execution.
>
> 2 It should be possible for the local sysadmin to move the scripts from
> one "periodic scripts dir." to one other, to control frequency of execution.
>
> 3. Both requirements 1. and 2. make it difficult for package managers to
> cleanly remove or update because the script names and path can change.
>
> 4. This is why Caldera uses a common cron script repository
> (/etc/cron.d/lib in OpenLinux 2.4) and uses soft links to these
> repository from the periodic scripts directories. (modeled
> after /etc/init.d/) The soft links must be named XXname, where
> XX is 2 digits and name is the name of the script pointed to.
>
> Example: /etc/cron.d/Daily/40cleandir ->../lib/cleandir
>
> The local system administrator now can rename and move these
> soft links inside the periodic scripts directories, but the
> package manager can get the information which soft links point
> to which script. As the scripts are part of a package, the
> package manager could completely control these soft links.
>
> 5. /etc Name space pollution
>
> The actual proposal enforces 5 cron related directories in /etc.
> (Or even 6 if our cron script repository idea is used). This can
> get even worse, if somebody wishes more periodic scripts directories,
> say /etc/cron.biweekly.
>
> This is why we propose to keep the historical place /etc/cron.d/
> and put the following directories inside:
>
> /etc/cron.d/
> Ķ
> +-Monthly periodic scripts directories (Capitalized Names)
> +-Weekly
> +-Daily
> +-Hourly
> +-[A-Z]* more periodic scripts directories allowed
> |
> +-scripts cron scripts repository
> +-tabs cron tab snippets dropped by packages
> ( is /etc/cron.d in the lsb-spec )
>
----- End forwarded message -----
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From mcneil@valinux.com Fri Jan 26 20:44:20 2001
From: mcneil@valinux.com (Scott McNeil)
Date: Fri, 26 Jan 2001 12:44:20 -0800
Subject: FSG LinuxWorld Speakers
References: <3A634412.7F0FC9FA@valinux.com>
Message-ID: <3A71E1A4.AB214832@valinux.com>
If you would like to speak at the San Francisco LinuxWorld in August
about the FSG, LSB, Li18, LDPS, FHS, etc. please let me know. I will
work with you to help make sure that your proposal gets approved.
All proposals are due no later then FEBRUARY 16, 2001.
http://www.linuxworldexpo.com/papers.html
IDG gives speakers free show passes, complimentary lunch each day of the
show, a cool jacket, T-shirt, bag or other show goodie, and usually some
other stuff.
Scott
--
Scott McNeil
Free Standards Group
www.freestandards.org
From wichert@cistron.nl Sat Jan 27 09:59:33 2001
From: wichert@cistron.nl (Wichert Akkerman)
Date: Sat, 27 Jan 2001 10:59:33 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010104184232.B8891@caldera.de>; from johannes@caldera.de on Thu, Jan 04, 2001 at 06:42:33PM +0100
References: <20010104134004.A28627@caldera.de> <20010104184232.B8891@caldera.de>
Message-ID: <20010127105933.B12907@cistron.nl>
Previously Johannes Poehlmann wrote:
> Yes, as local sysadmin I want to be able to place a empty rhosts file
> (owned by root) in home directories, to prevent users from opening
> rsh security holes. To prevent the users from deleting .rhosts,
> I need the sticky bit on the home directory.
A homedirectory is owned by the user anyway, so he can easily remove
that sticky bit. Or do you have home directories owned by root and
have a seperate group for each user?
Wichert.
--
_________________________________________________________________
/ Nothing is fool-proof to a sufficiently talented fool \
| wichert@cistron.nl http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0 2805 3CB8 9250 2FA3 BC2D |
From ke@suse.de Wed Jan 31 15:33:38 2001
From: ke@suse.de (Karl Eichwalder)
Date: 31 Jan 2001 16:33:38 +0100
Subject: Build the SPEC on SuSE Linux
Message-ID:
[I'm not subscribe to the list; please, Cc answers.]
At http://www.linuxbase.org/spec/build.html you're asking how to build
the spec on other distributions. Please, add this to the web page:
On SuSE Linux 7.1 (and ealier, but I didn't test it) you'll habe to
install the well know packages from the serie SGML with YaST or YaST2
(jade, docbkdsl, docbktls). If you're interested in PostScript out put,
please install from the serie TeX/LaTeX the teTeX packages and jadetex.
After installing these package, just call:
db2html spec.html
db22dvi spec.html
or
db2ps spec.html
For more options please try 'db2x.sh --help'.
It looks to me as if not all files are properly checked into the CVS
repository; these files are missing after a cvs co:
sysinit/sysinit.sgml
sgmlspec/sgmlspec.sgml
In addition, please fix this small syntactical error:
Index: command.sgml
===================================================================
RCS file: /cvsroot/lsb/spec/command/command.sgml,v
retrieving revision 1.10
diff -w -u -u -r1.10 command.sgml
--- command.sgml 2001/01/18 22:58:53 1.10
+++ command.sgml 2001/01/31 15:32:22
@@ -19,8 +19,6 @@
The behaviour of the interfaces described in this
section are specified by the following Standards.
-
-
--
Linux Frechet 2.2.18 #1 Fri Jan 19 22:10:35 GMT 2001 i686 unknown
4:21pm up 1 day, 6:05, 8 users, load average: 0.11, 0.27, 0.18
work : ke@suse.de
Karl Eichwalder home : keichwa@gmx.net
From tytso@mit.edu Wed Jan 31 12:40:52 2001
From: tytso@mit.edu (tytso@mit.edu)
Date: Wed, 31 Jan 2001 07:40:52 -0500
Subject: V4 [Partial withdrawal of PROPOSAL] Change Chapter 17 (cron)
In-Reply-To: <20010124175513.A1108@caldera.de> (message from Johannes
Poehlmann on Wed, 24 Jan 2001 17:55:13 +0100)
References: <20010124175513.A1108@caldera.de>
Message-ID: <200101311240.f0VCeq802735@snap.thunk.org>
Date: Wed, 24 Jan 2001 17:55:13 +0100
From: Johannes Poehlmann
Sorry for not getting back to you sooner; I've been way behind on my
e-mail lately....
1. We want to uphold one part of the proposal, which was already
sent out separately:
Date: Thu, 7 Dec 2000 16:02:25 +0100
From: Johannes Poehlmann
To: lsb-spec@lists.linuxbase.org
Subject: [PROPOSAL] Get rid of the cron.hourly dir
Message-ID: <20001207160225.A11177@caldera.de>
Our reasons are:
o because many parallel cron scripts cause a big computational load,
it should be possible to serialize these scripts.
This would be risky when using cron.hourly:
What if the serialized scripts need more time then one hour ?
Actually, the easy way to solve the computational load problem is to
observe that cron.hourly merely states that the scripts need to be run
about every 60 minutes; that the only guarantee which is made. But they
don't have to be all run at the same time; so instead of making them be
serialized, a cron program could simply make one run at 7 minutes after
the hour, and another run at 14 minutes after the hour, etc., and they
would be compliant. (And separating the start of each cron.daily entry
by 30 minutes would probably be a good idea too... this would be a very
easy option to add to the run-parts program.)
o we want to allow cron to optimize away hourly disk accesses,
as vixie-cron with a patch from debian already does.
I've in the past showned that it's possible to code cron such that it
doesn't require hourly disk accesses. (i.e., hold open a file
descriptor for the /etc/cron.hourly directory; then every hour or so, do
a fstat to check the modtime; this won't cause a disk access.)
Yes, it requires making a code change. On the other hand, enough other
changes need to be made to a Debian system (and I suspect most systems)
before they will be laptop battery friendly anyway, so this argument
doesn't seem to carry much weight, since at the moment, getting rid of
cron.hourly won't help you much anyway. I'm running Debian/Woody on my
laptop now, and....
* There's a crontab entry for exim which fires every 30 minutes,
regardless of whether you have networking up (dumb, dumb,
dumb, dumb). This causes the atime for the exim inode to be
modified, but worse yet, the fact that the crontab entry
specifies that the entry should run under the mail user, that
means that there are multiple syslog messages from the pam
message hitting /var/log/messages.
The fundamental issue is that running the exim -q needs to run
out of a special long-term running process, ala sendmail -bd,
if you want to avoid waking the disk every time you want to
try to flush the queue; merely running a non-root job out of
crontab guarantees disk activity (because of the syslog
writes), even if the program doesn't do anything else.
* The syslogd is configured to create syslogd mark messages
every 30 minutes (which of course is not synchronized with the
above 30 minute exim queue flush), which in combination to the
above causes the disks to spin up at least four times an hour.
There may have been other laptop unfriendly daemons that were causing my
disk to wake up, but at this point I gave up looking. Suffice it to say
that there were a lot of problems....
o implementing anacron-like functionality produces unnecessary
overhead if cron.hourly is in place (or the anacron-like
functionality had to be switched off for cron.hourly resulting
in inconsistent behaviour).
What sort of "unnecessary" overhead are you referring to? Is this the
need to spin up the disk to write anacron control entry file (i.e.,
/var/spool/anacron/cron.hourly)?
Note though that anacron doesn't support any granularity finer than one
day anyway, and so if a program were to put an entry into /etc/cron.d,
they wouldn't have anacron functionality anyway --- and even if you put
an entry into /etc/anacrontab (and the LSB doesn't guarantee the
presence of anacron), you can't get one hour resolution anyway. So not
having anacron functionality for cron.hourly doesn't seem like either a
huge inconsisntency, given that there's absolutely no way to provide
that sort of functionality anyway.....
If people really don't want cron.hourly, we can remove it at least for
LSB 1.0. But I would like to hear some other opinions about whether or
not we should keep cron.hourly. What do folks think?
- Ted
From Oldies@murphy.debian.org Tue Jan 2 08:20:05 2001
From: Oldies@murphy.debian.org (Oldies@murphy.debian.org)
Date: Tue, 02 Jan 2001 02:20:05 -0600
Subject: 01-01-2001
Message-ID: <36893.097280659720100.291204@localhost>
Oldies Online Casino - Happy New Year!!!
Oldies
Online
Casino
Would like to
welcome
you and your family a Happy New Year!

We Would also like
to offer ALL NEW & EXISTING Members a
Holiday 25% Bonus
Oldies Online
Casino offers Free no download Flash Internet
gambling, games include craps, keno, slots, video poker,
roulette and blackjack in real time. Play for fun or cash!
http://www.oldiesonlinecasino.com
to unsubscribe
click here
From johannes@caldera.de Thu Jan 4 12:40:04 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Thu, 4 Jan 2001 13:40:04 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
Message-ID: <20010104134004.A28627@caldera.de>
This proposal is also checked in into George Krafts Comment submission form
Problem:
LSB says nothing about File Permissions.
o This makes it possible to set up an LSB-conforming package
and a LSB conforming Linux system where the application can
not run on the linux system.
o LSB-conforming systems should be allowed to use very restrictive
permission schemes, not to make security and LSB a contradiction.
Consequences:
o LSB conforming applications should run with very restrictive
file permissions
o LSB-conforming systems should not be required to give much
file permissions.
Proposal:
In this proposal "System" means a "LSB compliant system" and
"application" means a "LSB compliant application".
I. Write Permissions
1. Directories
o The application must not depend on having directory write
permission outside /tmp, /var/tmp and his home directory.
o The application must not depend on owning these directories.
o The system may restrict directory write permissions for these
directories by setting the "sticky bit" for them.
( To prevent the application to remove "foreign" files,
e.g. a empty .rhosts file owned by root.)
2. Files
The application must not depend on file write permission on
files not owned by the user it runs under with the exeption
of its personal inbox /var/mail/
II. Read Permissions and Execute Permissions
o The application must not depend on having read permission to
every file and directory.
o The system must grant the permissions needed to use them
to all libraries, executables and data files mentioned in the
LSB document, and included standards.
III. Suid and Sgid Permissions
The application must not depend on suid/sgid permissions on a
file. Instead, the system is responsible that all system commands
are just doing their job right and have the permissions needed.
Rationale:
Let us make security officers happy. Lets give them the freedom
to take sgid/suid perms away, as long as they do not break
the systems funtionality.
IV. Removable Media (Cdrom, Floppy,...)
o LSB systems may use mount options "noauto", "nouser",
"nosuid" and "nodev" for removeable media. Also
"uid=X", "gid=X" may be used with a non-zero uid/gid value X.
Rationale: allow running applications from removable media, but
allow system to prevent application from bad behaviour.
V. Run-from-removable media applications
o They must not depend on logging in as user root.
VI.Installable applications (This paragraph should possibly be part
of Chapter VII. - Package Format and Installation)
These must not depend on BOTH to
o log in as user root
o run a self-supplied binary install routine
Rationale:
Let us make security officers less unhappy.
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
----- End forwarded message -----
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
----- End forwarded message -----
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From alan@lxorguk.ukuu.org.uk Thu Jan 4 15:02:10 2001
From: alan@lxorguk.ukuu.org.uk (Alan Cox)
Date: Thu, 4 Jan 2001 15:02:10 +0000 (GMT)
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010104134004.A28627@caldera.de> from "Johannes Poehlmann" at Jan 04, 2001 01:40:04 PM
Message-ID:
> I. Write Permissions
>
> 1. Directories
>
> o The application must not depend on having directory write
> permission outside /tmp, /var/tmp and his home directory.
s/his/its/
(language pedantry, not intended as a criticism)
> o The application must not depend on owning these directories.
> o The system may restrict directory write permissions for these
> directories by setting the "sticky bit" for them.
Including home ?
> ( To prevent the application to remove "foreign" files,
> e.g. a empty .rhosts file owned by root.)
> o The system must grant the permissions needed to use them
> to all libraries, executables and data files mentioned in the
> LSB document, and included standards.
Stop a moment. Grant to whom ? Do I grant perl the ability to the shadow
password file for example ;)
> o log in as user root
'root' isnt always the name used. There may be multiple priviledge levels -
how about 'log in as a privileged user'
(3 .sigs deleted - maintenance suggested 8))
Alan
From johannes@caldera.de Thu Jan 4 17:42:33 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Thu, 4 Jan 2001 18:42:33 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: ; from alan@lxorguk.ukuu.org.uk on Thu, Jan 04, 2001 at 03:02:10PM +0000
References: <20010104134004.A28627@caldera.de>
Message-ID: <20010104184232.B8891@caldera.de>
On Thu, Jan 04, 2001 at 03:02:10PM +0000, Alan Cox wrote:
> > o The application must not depend on having directory write
> > permission outside /tmp, /var/tmp and his home directory.
> s/his/its/
> (language pedantry, not intended as a criticism)
>
ACK
> > o The application must not depend on owning these directories.
> > o The system may restrict directory write permissions for these
> > directories by setting the "sticky bit" for them.
>
> Including home ?
>
Yes, as local sysadmin I want to be able to place a empty rhosts file
(owned by root) in home directories, to prevent users from opening
rsh security holes. To prevent the users from deleting .rhosts,
I need the sticky bit on the home directory.
> > o The system must grant the permissions needed to use them
> > to all libraries, executables and data files mentioned in the
> > LSB document, and included standards.
> Stop a moment. Grant to whom ? Do I grant perl the ability to the shadow
> password file for example ;)
OK, let "reword" this paragraph.
o The system must grant to the application the permissions needed
to use all libraries, executables and data files mentioned in the
LSB document and included standards.
> > o log in as user root
>
> 'root' isnt always the name used. There may be multiple priviledge levels -
> how about 'log in as a privileged user'
ACK
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From alan@lxorguk.ukuu.org.uk Thu Jan 4 17:50:14 2001
From: alan@lxorguk.ukuu.org.uk (Alan Cox)
Date: Thu, 4 Jan 2001 17:50:14 +0000 (GMT)
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010104184232.B8891@caldera.de> from "Johannes Poehlmann" at Jan 04, 2001 06:42:33 PM
Message-ID:
> > > o The system must grant the permissions needed to use them
> > > to all libraries, executables and data files mentioned in the
> > > LSB document, and included standards.
>
> > Stop a moment. Grant to whom ? Do I grant perl the ability to the shadow
> > password file for example ;)
> OK, let "reword" this paragraph.
>
> o The system must grant to the application the permissions needed
> to use all libraries, executables and data files mentioned in the
> LSB document and included standards.
That still says I have to give it /etc/shadow ;) Perhaps we need to define
public/private files ?
From gk4@us.ibm.com Thu Jan 4 18:46:33 2001
From: gk4@us.ibm.com (George Kraft)
Date: Thu, 4 Jan 2001 12:46:33 -0600
Subject: REVIEW for the newly posted LSB 0.4
Message-ID:
The newly posted LSB 0.4 is taking comments until Wednesday January 24th,
2001.
http://www.linuxbase.org/spec/lsbreview.html
The LSB workgroup will review comments on Tuesday January 30th, 2001 in New
York city. Please RSVP, then read the agenda and prepare in advance.
http://www.linuxbase.org/talks/20010130.html
Your input and participation in the online review and workgroup meeting is
welcomed.
George Kraft IV
gk4@us.ibm.com
From johannes@caldera.de Fri Jan 5 12:32:34 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Fri, 5 Jan 2001 13:32:34 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: ; from alan@lxorguk.ukuu.org.uk on Thu, Jan 04, 2001 at 05:50:14PM +0000
References: <20010104184232.B8891@caldera.de>
Message-ID: <20010105133234.A11612@caldera.de>
I hope we can fix it that way:
o The system must grant to the application the permissions needed
to use all system interfaces (ABIs) mentioned in the LSB document
and included standards.
Lets test this with Alans examle:
Chapter 15.1 (User Database) does not mention the shadow password file.
There is the sentence:
The passwd(5) user database should only be read and
updated form the following APIs: ....
This explicitly makes passwd a "non interface". By not even mentioning it,
the shadow file is made a "non interface" too, implicitly.
On Thu, Jan 04, 2001 at 05:50:14PM +0000, Alan Cox wrote:
> > > > o The system must grant the permissions needed to use them
> > > > to all libraries, executables and data files mentioned in the
> > > > LSB document, and included standards.
> > > Stop a moment. Grant to whom ? Do I grant perl the ability to the shadow
> > > password file for example ;)
> > OK, let "reword" this paragraph.
> >
> > o The system must grant to the application the permissions needed
> > to use all libraries, executables and data files mentioned in the
> > LSB document and included standards.
> That still says I have to give it /etc/shadow ;) Perhaps we need to define
> public/private files ?
> --
>
> To UNSUBSCRIBE, email to lsb-spec-request@lists.linuxbase.org
> with subject of "unsubscribe". Trouble? Email listmaster@lists.linuxbase.org
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From tytso@mit.edu Mon Jan 8 23:55:14 2001
From: tytso@mit.edu (tytso@mit.edu)
Date: Mon, 8 Jan 2001 18:55:14 -0500
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010104134004.A28627@caldera.de> (message from Johannes
Poehlmann on Thu, 4 Jan 2001 13:40:04 +0100)
References: <20010104134004.A28627@caldera.de>
Message-ID: <200101082355.f08NtEo10077@snap.thunk.org>
Date: Thu, 4 Jan 2001 13:40:04 +0100
From: Johannes Poehlmann
Problem:
LSB says nothing about File Permissions.
o This makes it possible to set up an LSB-conforming package
and a LSB conforming Linux system where the application can
not run on the linux system.
o LSB-conforming systems should be allowed to use very restrictive
permission schemes, not to make security and LSB a contradiction.
I'm not sure we want to go here. Permissions generally are a system
administrator issue much more than they are a distribution issue, and
trying to word things so that we don't prohibit perfectly sane
configurations might be very difficult. For example, there are probably
certain system users (like the one used by the imap daemon, or the one
used by the anonymous FTP daemon) who might have very restrictive
permissions schemes. Is this allowed? I would argue that an LSB
statement which prohibited this type of security precaution is broken,
and we shouldn't go there.
And even if we specify that "users" must be given such permissions,
maybe in some cases there will some set of users that should be given
very restrictive permissions.
My suggest is that we not try to address this "problem". If a
distribution sets such a highly restrictve set of permissions, the
system administrator can always "fix" the permissions very easily, and
if someone did try to sell such a super-secure distribution as a
desktop, market forces will probably solve the problem very quickly.
(And in a server environment, as a sysadmin I'd much rather have a
system which was oversecured, and which I could open up exactly what is
needed to allow applications to run, rather than a system which was
shipped "insecure out of the box".)
- Ted
From venom@cibs9.sns.it Tue Jan 9 09:37:31 2001
From: venom@cibs9.sns.it (V man)
Date: Tue, 9 Jan 2001 10:37:31 +0100 (CET)
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <200101082355.f08NtEo10077@snap.thunk.org>
Message-ID:
On Mon, 8 Jan 2001 tytso@mit.edu wrote:
> Date: Mon, 8 Jan 2001 18:55:14 -0500
> From: tytso@mit.edu
> To: johannes@caldera.de
> Cc: lsb-spec@lists.linuxbase.org
> Subject: Re: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir
> permissions
> Resent-Date: Tue, 9 Jan 2001 00:57:40 +0100
> Resent-From: lsb-spec@lists.linuxbase.org
>
> Date: Thu, 4 Jan 2001 13:40:04 +0100
> From: Johannes Poehlmann
>
> Problem:
>
> LSB says nothing about File Permissions.
>
> o This makes it possible to set up an LSB-conforming package
> and a LSB conforming Linux system where the application can
> not run on the linux system.
>
> o LSB-conforming systems should be allowed to use very restrictive
> permission schemes, not to make security and LSB a contradiction.
>
> I'm not sure we want to go here. Permissions generally are a system
> administrator issue much more than they are a distribution issue, and
> trying to word things so that we don't prohibit perfectly sane
> configurations might be very difficult.
Exactly! i would say that we should recognize it, maybe saying that
a kind of reasonable permission scheme is suggested (that is almost what
we say shipping with most distributions), and the system
manager is free
to use a mutch more restrictive one as mutch as a less restrictive one.
Luigi Genoni
From quinlan@transmeta.com Thu Jan 11 22:14:32 2001
From: quinlan@transmeta.com (Daniel Quinlan)
Date: Thu, 11 Jan 2001 14:14:32 -0800
Subject: lpr subset standard wanted
Message-ID: <200101112214.OAA10262@magnesium.transmeta.com>
If possible, I would like to document the subset of lpr functionality
that can be safely used by applications into the LDPS 1.1 portability
guidelines and perhaps the LSB specification as well.
Could someone investigate:
- CUPS
- BSD lpr
- GNU lpr
- lprng
and find out which options/features are supported by all of them
(and then, which options/features have the same behavior).
If you're interested in this task, please let me know.
A draft would need to be completed in one week if this is to make the
LDPS 1.1 beta. (The current target for LDPS 1.1 beta is January 25th.)
- Dan
From johannes@caldera.de Fri Jan 12 17:44:24 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Fri, 12 Jan 2001 18:44:24 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <200101082355.f08NtEo10077@snap.thunk.org>; from tytso@mit.edu on Mon, Jan 08, 2001 at 06:55:14PM -0500
References: <20010104134004.A28627@caldera.de> <200101082355.f08NtEo10077@snap.thunk.org>
Message-ID: <20010112184424.C14853@caldera.de>
Is it possible to misunderstand my proposal as
"bossing around" Distributions ?
> LSB says nothing about File Permissions.
> o This makes it possible to set up an LSB-conforming package
> and a LSB conforming Linux system where the application can
> not run on the linux system.
I fear that future LSB-compliant distributions could be bashed to dead
if say LSB-compliant oracle can not run on them because of
permission conflicts.
> o LSB-conforming systems should be allowed to use very restrictive
> permission schemes, not to make security and LSB a contradiction.
If we do not spec permissions at all, we will have a de facto standard
which says: All major ISV packages have to run, so give them the permissions
they need. This will force LSB compliant distributions to grant a lot
of file/dir permissions.
The proposal proper gives the Distro/Sysadmin the greatest possible
freedom on the cost of ISVs: If we forbid ISVs to demand certain
permissions the Distro/Admin has the FREEDOM to grant them or not.
> I'm not sure we want to go here. Permissions generally are a system
> administrator issue much more than they are a distribution issue, and
> trying to word things so that we don't prohibit perfectly sane
> configurations might be very difficult. For example, there are probably
> certain system users (like the one used by the imap daemon, or the one
> used by the anonymous FTP daemon) who might have very restrictive
> permissions schemes. Is this allowed? I would argue that an LSB
> statement which prohibited this type of security precaution is broken,
> and we shouldn't go there.
Ted, that is exactly the situation i want to prevent
> My suggest is that we not try to address this "problem". If a
> distribution sets such a highly restrictve set of permissions, the
> system administrator can always "fix" the permissions very easily, and
> if someone did try to sell such a super-secure distribution as a
> desktop, market forces will probably solve the problem very quickly.
Is this good ? Do we want future bad press for Linux and the LSB like:
"Standard Linux is open to XYZ-attack" ?
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From johannes@caldera.de Fri Jan 12 17:52:48 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Fri, 12 Jan 2001 18:52:48 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: ; from venom@cibs9.sns.it on Tue, Jan 09, 2001 at 10:37:31AM +0100
References: <200101082355.f08NtEo10077@snap.thunk.org>
Message-ID: <20010112185247.D14853@caldera.de>
On Tue, Jan 09, 2001 at 10:37:31AM +0100, V man wrote:
> On Mon, 8 Jan 2001 tytso@mit.edu wrote:
> > From: Johannes Poehlmann
> > LSB says nothing about File Permissions.
> >
> > o This makes it possible to set up an LSB-conforming package
> > and a LSB conforming Linux system where the application can
> > not run on the linux system.
> >
> > I'm not sure we want to go here. Permissions generally are a system
> > administrator issue much more than they are a distribution issue, and
> > trying to word things so that we don't prohibit perfectly sane
> > configurations might be very difficult.
> Exactly! i would say that we should recognize it, maybe saying that
> a kind of reasonable permission scheme is suggested (that is almost what
> we say shipping with most distributions), and the system
> manager is free
> to use a mutch more restrictive one as mutch as a less restrictive one.
Hi Luigi,
We need to keep the Distributions/system managers freedom, to be as
much restrictive or permissive he wants.
To guarantee this, we must forbid Third Party Software Vendors ("ISVs")
to demand more then a reasonable set of permissions.
If we fail to do so, major ISV packages will demand arbitrary permissions
and you as a Distributor had to grant them. If you do not, you will face
bad press like: "Paranoia Linux claims to be LSB compliant but fails to
execute LSB-compliant oracle/MSLinWord/Whatever".
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From venom@DarkStar.sns.it Fri Jan 12 22:40:44 2001
From: venom@DarkStar.sns.it (V-man)
Date: Fri, 12 Jan 2001 23:40:44 +0100 (CET)
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010112185247.D14853@caldera.de>
Message-ID:
On Fri, 12 Jan 2001, Johannes Poehlmann wrote:
> On Tue, Jan 09, 2001 at 10:37:31AM +0100, V man wrote:
>
> > On Mon, 8 Jan 2001 tytso@mit.edu wrote:
>
> > > From: Johannes Poehlmann
>
> > > LSB says nothing about File Permissions.
> > >
> > > o This makes it possible to set up an LSB-conforming package
> > > and a LSB conforming Linux system where the application can
> > > not run on the linux system.
> > >
> > > I'm not sure we want to go here. Permissions generally are a system
> > > administrator issue much more than they are a distribution issue, and
> > > trying to word things so that we don't prohibit perfectly sane
> > > configurations might be very difficult.
> > Exactly! i would say that we should recognize it, maybe saying that
> > a kind of reasonable permission scheme is suggested (that is almost what
> > we say shipping with most distributions), and the system
> > manager is free
> > to use a mutch more restrictive one as mutch as a less restrictive one.
>
> Hi Luigi,
>
> We need to keep the Distributions/system managers freedom, to be as
> much restrictive or permissive he wants.
>
> To guarantee this, we must forbid Third Party Software Vendors ("ISVs")
> to demand more then a reasonable set of permissions.
>
> If we fail to do so, major ISV packages will demand arbitrary permissions
> and you as a Distributor had to grant them. If you do not, you will face
> bad press like: "Paranoia Linux claims to be LSB compliant but fails to
> execute LSB-compliant oracle/MSLinWord/Whatever".
>
I understand this point, and you are right.
This, for what i see, means that we need to keep a really good
equilibrium.
For what i know, the traditional set of permission we see in other
older Unixes is not suitable, since it usually is too open, and it makes
even difficoult for sysadmins to adopt a more restrictive set.
So, we should identify clearly, for example, which file we consider that
just the sysadmin should access, and then establish a set where there is
no need for user application to access them, nor to use SUID bits to
access them anyway (and also forbit SUID for every user).
I know this is difficoult, but this should be the goal.
For example i discovered oracle to use suid bits (as oracle user, of
course), to do many things. Just immagine how many exploits.
Think to those applications that have to be installed as root user!
Bests
Luigi Genoni
From tkamppeter@mandrakesoft.com Sat Jan 13 20:02:20 2001
From: tkamppeter@mandrakesoft.com (Till Kamppeter)
Date: Sat, 13 Jan 2001 21:02:20 +0100
Subject: [Fwd: lpr subset standard wanted]
References: <3A5E3551.8BCF4B84@mandrakesoft.com>
Message-ID: <3A60B44C.1A120B8B@mandrakesoft.com>
This is a multi-part message in MIME format.
--------------E7ECA23A21EA33ED14C1408D
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
CUPS (www.cups.org)
-------------------
The command line commands (lpr, lpq, lprm, lpc, lp, cancel, ...) are
made as compatible as possible to both the System V and the BSD version
of LPD. The programs have also exactly the same names as the LPD
commands, so that one does not need to change the defaults of the
applications when one switches from LPD to CUPS. See the manual pages of
the commands (attached, use "bunzip2 ; man ./" to read
them). See also
www.cups.org/documentation.html
Note that some options (as e-mail notification in the end of the job)
are not implemented.
XPP (http://cups.sourceforge.net/xpp/) understands most of the lpr and
some of the lp options. About QtCUPS
(http://cups.sourceforge.net/qtcups/) I do not know.
Especially all programs ("lpr", "lp", "xpp", and "qtcups") accept
printing jobs both as file name supplied on the command line or as
standard input.
CUPS is also compatible to LPD servers when one runs the CUPS-LPD
mini-daemon. See
www.cups.org/sam.html#8_2
http://www.mandrakeuser.org/hardware/hcups4.html#lpdcl
It accesses to LPD servers, too:
www.cups.org/sam.html#8_3
http://www.mandrakeuser.org/hardware/hcups3.html#lpdsrv
CUPS can also generate an "/etc/printcap" file containing the names of
all printer queues, so that applications can set up a printer list, also
when they are made only for LPD.
But CUPS allows to set printing options in a very sophisticated way, so
I would not recommend, that programs have a hard-coded call of "lpr" (as
KDE 2) or even direct talking to a running LPD daemon (as LyX). I would
alway give the possibility for the user to enter a printing command line
and save it, so that that one can use every printing program including
graphical frontends (as XPP or QtCUPS). Best would be some spooler
independent way for the printing facility in the applications.
Till
Gael Duval wrote:
>
> If you have time and feel like to answer about Cups, if think it would
> be great!
> ------------------------------------------------------------------------
>
> Subject: lpr subset standard wanted
> From: Daniel Quinlan
> To: freestandards-ldps@lists.sourceforge.net, lsb-spec@lists.linuxbase.org
>
> If possible, I would like to document the subset of lpr functionality
> that can be safely used by applications into the LDPS 1.1 portability
> guidelines and perhaps the LSB specification as well.
>
> Could someone investigate:
>
> - CUPS
> - BSD lpr
> - GNU lpr
> - lprng
>
> and find out which options/features are supported by all of them
> (and then, which options/features have the same behavior).
>
> If you're interested in this task, please let me know.
>
> A draft would need to be completed in one week if this is to make the
> LDPS 1.1 beta. (The current target for LDPS 1.1 beta is January 25th.)
>
> - Dan
--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lpr-cups.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lpr-cups.1.bz2"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--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lpq-cups.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lpq-cups.1.bz2"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--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lprm-cups.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lprm-cups.1.bz2"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--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lpc-cups.8.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lpc-cups.8.bz2"
QlpoOTFBWSZTWeWHeFQAARlfgAoQVGf/8P/n3+4////gUAUCMvXRnGd67p68nXqGJTJT9KeR
oYVP0aEyCDI9TT1NkaR5NDSNPUGmiTAmmkBpNGiYQNBo0A0YmgZASmkxQ0QGppGUzU2UYRhG
ANRoANNBIkKaIyNNDRk0AaAAZNAAAASSE1NqaIek2oAekZHqGgMmgGgACIn5/cTHbpaRbma1
HxTczBwXBrN+KKH6YRzJokO0+wy4eP5/hHdXsW3dJDXn74uD7mlQ3OFGYgikkoWhJENvWhRe
wzZ/cfUWjFoFy9XaRhqforbkWwztLhbA9f6euMVcgaPo2S4eSzdwkEdzOGUKBIzFB5Bpx1/D
dhbQUpz1Fw2HhpUtsi5WebclHDhBEpLFLh9vMoibRg5ywnuWe9NYPqpmZKJFmwIEXPaLP6W+
e/SgcMtY+Ilj/cNDrZZ8zn5aYRmn1UTl3MKkM65yNZ0I7jtotZPIf3FmhRum2lZ2c3GRvqLY
abjYuF+rsqJyP69yAbZ2vXMShsiuXRrhSNpqzr+T0EkgpmXnobs0wrJUgLQY9O7qW98zjvXs
MVOisLXHGReO1AKGluk5yYSw0yXeYyADBfqcQJjM0epBwCMxcr3IOgSkPSHAZU48K4QMH1v+
jkFhaiw9wZQ6AjlIeJUHGzIq83DGOgUC6IY/jlva/TVscbMvbEUjBTORCncqiioop4oCfZ2q
8SKRBSkABXuhgG/HR8lYNCzsR0p7QcMFRCLG1expq7rGm4KXfkdrrraxEWXHOgvmiSgbwBZE
F8mDXT17ESWDoYgC7BhnIQfWb88C5D4kQupMauA9Yl+qiRBWxCkD2Bhs6y5EnkMRY8MnC6Zj
FYTHZXmz3LciCuTweTTpmMdoHJmVAme+dz3AQ22ViHUN23pGV30RODFE/4fI5McbSNdhvO5Q
cZS4gt0sQmb+BHL1uOgxorNmvOn8y3FGAIW9WVgQJYO/SOYo2k3q0mfZ22xLqQSmk6rmA8Ao
RdJ3/1BWQnubelSRIEIIFXvgJPkGlPQ523wrxApJdUK4Or32dhmTMl4FjlpfosQqcxpKKC4g
LuosIqb9UdbEQ1XBGqA8Ge2gyAMgF6kkOsFKbbok65JGBSdEUBmhcVGt9jaDYkRLDBbLqxnO
hCDo7s2iqw6Zve9A2J4sFLHBCcvyNEeq/fCUbxdhCaxCb7d5Id49bY9L/TqpTuINuzs747Vr
LdBVq/eQF/GBW7lBILCKRhAa9TtUVv8skjykcRRQnAoaF/B8EZPqrYdZzMxMyLVUWR0C3cLs
NkQ8CKs7OsE6gceoeZlYuMfemCYZC3oaiHjB0OnEOHPw7e1Qq6dGV6kT7oFaTwwMZWikZRnN
TUMYoVh03gmi3dpjbj3R9/f7BLXNeC2RDV1nIHFBnCFdusJzqdIJChhmNGBSpfRaiwq3G0V9
pFSoDY0O3Abq1XmwkWitCsVEilxTmjnHhylFUxOGBycbpopJlKLuRq+mj9SONWRilSOQWijC
X/JHLZFKLGGJwvWx2fWGm6288ZBkGJvtd5M0ajijxe0ghYbBtq+XGYuFIxraW2NJ2Z7ygJEm
nCESzzTGGTOUbGZskVDKlkPnxo309jQxFiYaO0oYPXU4SD4E478J5JXVg1YOKIRPPCeZHIMA
oAtpHTj8zm14Rim3T12zZpDvR48PEFaWEHONciIzsr7WoUCFX/F3JFOFCQ5Yd4VA
--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="lp.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="lp.1.bz2"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--------------E7ECA23A21EA33ED14C1408D
Content-Type: application/octet-stream;
name="cancel.1.bz2"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="cancel.1.bz2"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--------------E7ECA23A21EA33ED14C1408D--
From kingdon@panix.com Sat Jan 13 19:28:16 2001
From: kingdon@panix.com (Jim Kingdon)
Date: Sat, 13 Jan 2001 14:28:16 -0500 (EST)
Subject: [Freestandards-ldps] Re: [Fwd: lpr subset standard wanted]
In-Reply-To: <3A60B44C.1A120B8B@mandrakesoft.com> (message from Till Kamppeter
on Sat, 13 Jan 2001 21:02:20 +0100)
References: <3A5E3551.8BCF4B84@mandrakesoft.com> <3A60B44C.1A120B8B@mandrakesoft.com>
Message-ID: <200101131928.OAA16161@panix6.panix.com>
> See the manual pages of the commands (attached, use "bunzip2 ;
> man ./" to read them).
I suspect we just want the lpr command. Although the CUPS lpr manpage
does look like a good place to start (-C, -J and -T seem to differ in
meaning somewhat; I'm not sure we want to standardize -r because of
the potential for losing someone's file in a paper jam, as noted in
the LPRng manpage; -o doesn't seem to be supported by LPRng). But
other than that the CUPS options seem to also be available in LPRng.
> CUPS is also compatible to LPD servers when one runs the CUPS-LPD
> mini-daemon. See
Not an LSB or LDPS issue, I don't think.
> I would not recommend, that programs have a hard-coded call of "lpr"
> (as KDE 2)
We might want to recommend that applications give the user the option
of specifying a command (as Netscape does). But we should also
recommend that they default to "lpr", as Netscape does (programs
should be able to print in a simple way without any configuration and
the "lpr" command line is the portable way to do that).
> even direct talking to a running LPD daemon (as LyX).
Heavens no. We don't want to require that an lpd daemon be present
any more than we require that an SMTP daemon be present (the latter
*was* the subject of much discussion).
See
http://cvs.sourceforge.net/cgi-bin/cvsweb.cgi/spec/command/sendmail.sgml?rev=1.1&content-type=text/x-cvsweb-markup&cvsroot=lsb
for what we have done vis-a-vis sendmail.
From mcneil@valinux.com Mon Jan 15 18:40:18 2001
From: mcneil@valinux.com (Scott McNeil)
Date: Mon, 15 Jan 2001 10:40:18 -0800
Subject: LinuxWorld New York
Message-ID: <3A634412.7F0FC9FA@valinux.com>
We still need volunteers to staff the FSG booth for the following
dates/times:
Wednesday, January 31
(1) 2pm - 4pm
(1) 4pm - 6pm
(1) 3pm - 4pm
Thursday, February 1
(1) 1pm - 2pm
(1) 2pm - 4pm
(2) 4pm - 6pm
Friday, February 2
(1) 12pm - 2pm
(1) 1pm - 3pm
(2) 2pm - 3pm
(1) 3pm - 5pm
Volunteers will receive a free pass to the show, IDG/LinuxWorld VIP
party, and at least one T-shirt from our generous Corporate Sponsors.
Scott
--
Scott McNeil
,
From gk4@us.ibm.com Fri Jan 19 20:59:25 2001
From: gk4@us.ibm.com (gk4@us.ibm.com)
Date: Fri, 19 Jan 2001 14:59:25 -0600
Subject: The review of LSB v0.4.2 ends this coming Thursday January 25th
Message-ID: <852569D9.0076C7EA.00@d54mta01.raleigh.ibm.com>
The review of LSB v0.4.2 ends this coming Thursday January 25th. Everyone
is encourage to read and comment on the specification.
http://www.linuxbase.org/spec/lsbreview.html
The LSB workgroup will be meeting on Tuesday January 30th in New York city
to review the comments and plan on the delivery of the LSB v1.0
specification.
http://www.linuxbase.org/talks/20010130.html
George Kraft IV
gk4@us.ibm.com
512-838-2688; t/l 678-2688
IBM Linux Technology Center
http://oss.software.ibm.com/developerworks/opensource/linux/
FSG's Linux Standard Base
http://sourceforge.net/projects/lsb/
From Johannes Poehlmann Tue Jan 23 14:07:43 2001
From: Johannes Poehlmann (Johannes Poehlmann)
Date: Tue, 23 Jan 2001 15:07:43 +0100
Subject: confcall followup: [PROPOSAL V2] (Ch.16 FHS) file/dir permissions
In-Reply-To: <20010104134004.A28627@caldera.de>; from johannes@caldera.de on Thu, Jan 04, 2001 at 01:40:04PM +0100
References: <20010104134004.A28627@caldera.de>
Message-ID: <20010123150743.A9860@caldera.de>
(As discussed in the last LSB conference call)
----------------------------------------------------------
Reworded proposal to add the following to chapter 16:
( comments from Alan Cox: changes of #3)
( comments from John Terpstra: Add #6)
In this Chapter "System" means a "LSB compliant system" and
"application" means a "LSB compliant (third party vendor) application".
1. Directory Write Permissions
o The application must not depend on having directory write
permission outside /tmp, /var/tmp and itīs home directory.
o The application must not depend on owning these directories.
o The system may restrict directory write permissions for these
directories by setting the "sticky bit" for them.
( To prevent the application to remove "foreign" files,
e.g. a empty .rhosts file owned by root.)
2. File Write Permissions
The application must not depend on file write permission on
files not owned by the user it runs under with the exeption
of its personal inbox /var/mail/
3. Read Permissions and Execute Permissions
o The application must not depend on having read permission to
every file and directory.
| o The system must grant to the application read and execute
| permissions needed to use all system interfaces (ABIs)
| mentioned in the LSB document and included standards.
4. Suid and Sgid Permissions
The application must not depend on suid/sgid permissions on a
file. Instead, the system is responsible that all system commands
are just correctly doing their job and have the permissions needed.
Rationale:
Let us make security officers happy. Lets give them the freedom
to take sgid/suid perms away, as long as they do not break
the systems funtionality.
| 5. Privileged users
|
| Application may not depend on running as a privileged user
|
| [ If we can not agree on that (which I am in favor of), let us
| at least state this as a minimum:
|
| If an application wants to run under a privileged user,
| then
| o The reasons must be outlined clearly
| o It must be prominently and verbatimly stated in all announcments
| of the application that "this application demands security
| privileges, which could infere with system security".
| o The application may not contain binary only software.
| ]
| 6. Changing permissions
|
| Application must not change permissions of files and
| directories not beeing part of their package
7. Removable Media (Cdrom, Floppy,...)
o The Systems may use mount options "noauto", "nouser",
"nosuid" and "nodev" for removeable media. Also
"uid=X", "gid=X" may be used with a non-zero uid/gid value X.
Rationale: allow running applications from removable media, but
allow systems to prevent application from bad behaviour.
8. Run-from-removable media applications
o They must not depend on logging in as a privileged user.
9. Installable applications (This paragraph should possibly be part
of Chapter VII. - Package Format and Installation)
On Installation, they must not depend on BOTH to
o log in as user root
o run a self-supplied binary install routine
Rationale:
Let us make security officers less unhappy.
Rationale/Problem:
LSB says nothing about File Permissions.
o This makes it possible to set up an LSB-conforming package
and a LSB conforming Linux system where the application can
not run on the linux system.
o LSB-conforming systems should be allowed to use very restrictive
permission schemes, not to make security and LSB a contradiction.
Consequences:
o LSB conforming applications should run with very restrictive
file permissions
o LSB-conforming systems should not be required to give much
file permissions.
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From orjrotbh@mail.ru Tue Jan 23 20:17:32 2001
From: orjrotbh@mail.ru (orjrotbh@mail.ru)
Date: Tue, 23 Jan 2001 12:17:32 -0800
Subject: Cheap developers for your project available
Message-ID: <200101232017.MAA31052@surfer.oakweb.com>
Dear IT Manager:
Please consider deploying our highly skilled off-shore programmers on your e-commerce and software development projects.
They develop software for:
ALL WINDOWS AND UNIX PLATFORMS
databases, networks, and languages, plus Perl, PHP, C++, ASP, Cold Fusion, Java, WAP, XML, MS Access, SQL, Shopping Carts, and the Internet.
Typical rates are $15 to $20 per hour.
They are fast, professional, inexpensive, cheap, and available immediately.
Please call me, or reply this e-mail.
http://softomate.da.ru
Thanks!
Paul USA: +1 (213) 5162593
PS. You are already removed!
PPS. In Europe? Please call +39 3480612212
From mcneil@valinux.com Wed Jan 24 00:40:22 2001
From: mcneil@valinux.com (Scott McNeil)
Date: Tue, 23 Jan 2001 16:40:22 -0800
Subject: FSG/LinuxWorld - Last Chance!
References: <3A634412.7F0FC9FA@valinux.com>
Message-ID: <3A6E2476.FB617C41@valinux.com>
All staff positions have been filled except for the following two:
Thursday, February 1: 4-6pm
Friday, February 2: 2-4pm
Volunteers receive free passes to the show, free passes to the huge IBM
party on Wednesday, free passes to the IDG VIP party on Thursday, free
admission to all four keynotes (including Dirk Hohndel & Larry
Augustin), free admission to the Golden Penguin Bowl (hosted by Nick
Petreley), a free T-shirt, and other stuff that is simply too amazing to
convey in ascii.
Just reply to this email with the time you are available to assist and
we will register you for the show.
See you next week!
Scott
--
Scott McNeil
Free Standards Group
www.freestandards.org
From johannes@caldera.de Wed Jan 24 16:55:13 2001
From: johannes@caldera.de (Johannes Poehlmann)
Date: Wed, 24 Jan 2001 17:55:13 +0100
Subject: V4 [Partial withdrawal of PROPOSAL] Change Chapter 17 (cron)
Message-ID: <20010124175513.A1108@caldera.de>
1. We want to uphold one part of the proposal, which was already
sent out separately:
Date: Thu, 7 Dec 2000 16:02:25 +0100
From: Johannes Poehlmann
To: lsb-spec@lists.linuxbase.org
Subject: [PROPOSAL] Get rid of the cron.hourly dir
Message-ID: <20001207160225.A11177@caldera.de>
Our reasons are:
o because many parallel cron scripts cause a big computational load,
it should be possible to serialize these scripts.
This would be risky when using cron.hourly:
What if the serialized scripts need more time then one hour ?
o we want to allow cron to optimize away hourly disk accesses,
as vixie-cron with a patch from debian already does.
o implementing anacron-like functionality produces unnecessary
overhead if cron.hourly is in place (or the anacron-like
functionality had to be switched off for cron.hourly resulting
in inconsistent behaviour).
2. As a consensus could not be reached, we do withdraw the rest of
the mentioned proposal. Instead we propose to legalize our proposed
concept (using symbolic links to a common scripts repository)
as we would not like to give it up for Caldera OpenLinux.
proposed new (and shorter ..) wording:
The directories /etc/cron.daily, /etc/cron.weekly, /etc/cron.monthly
may also contain soft links to a centralized scripts repository.
If existing, this directory has to be named /etc/cron.scripts.
--------
Task for the proposal
http://sourceforge.net/pm/task.php?func=detailtask&project_task_id=18043&group_id=1107&group_project_id=3049
http://lists.debian.org/lsb-spec-0008/msg00000.html
lsb-spec mailing list: <20000801154116.A15227@caldera.de>
On Tue, Aug 01, 2000 at 03:41:59PM +0200, Johannes Poehlmann wrote:
> This Proposal is a repost of "Comments on Chapter 17 (cron)
> of the LSB Spec", sent out 2000 June 12 to the lsb-spec list
>
> =============================================
>
> PROPOSAL to change Chapter 17 of the LSB Spec:
>
> common script repository, init-like symlinks, directory naming
>
>
>
> 1 It is desirable to control the order of execution of the scripts
> put in one of the "periodic scripts directories" ( /etc/cron.daily etc.).
>
> This can be done by adapting the naming scheme used inside
> of /etc/init.d, using two digit prefixes, which control the order
> of execution.
>
> 2 It should be possible for the local sysadmin to move the scripts from
> one "periodic scripts dir." to one other, to control frequency of execution.
>
> 3. Both requirements 1. and 2. make it difficult for package managers to
> cleanly remove or update because the script names and path can change.
>
> 4. This is why Caldera uses a common cron script repository
> (/etc/cron.d/lib in OpenLinux 2.4) and uses soft links to these
> repository from the periodic scripts directories. (modeled
> after /etc/init.d/) The soft links must be named XXname, where
> XX is 2 digits and name is the name of the script pointed to.
>
> Example: /etc/cron.d/Daily/40cleandir ->../lib/cleandir
>
> The local system administrator now can rename and move these
> soft links inside the periodic scripts directories, but the
> package manager can get the information which soft links point
> to which script. As the scripts are part of a package, the
> package manager could completely control these soft links.
>
> 5. /etc Name space pollution
>
> The actual proposal enforces 5 cron related directories in /etc.
> (Or even 6 if our cron script repository idea is used). This can
> get even worse, if somebody wishes more periodic scripts directories,
> say /etc/cron.biweekly.
>
> This is why we propose to keep the historical place /etc/cron.d/
> and put the following directories inside:
>
> /etc/cron.d/
> Ķ
> +-Monthly periodic scripts directories (Capitalized Names)
> +-Weekly
> +-Daily
> +-Hourly
> +-[A-Z]* more periodic scripts directories allowed
> |
> +-scripts cron scripts repository
> +-tabs cron tab snippets dropped by packages
> ( is /etc/cron.d in the lsb-spec )
>
----- End forwarded message -----
--
______ ___
/ ___/__/ / Caldera (Deutschland) GmbH
/ /_/ _ / /__ Naegelsbachstr. 49c, 91052 Erlangen, Germany
/_____/_/ /____/ software developer / lsb project
==== /____/ ===== Dipl. Inf. Johannes Poehlmann, mail: jhp@caldera.de
Caldera OpenLinux phone: ++49 9131 7192 336, fax: ++49 9131 7192 399
From mcneil@valinux.com Fri Jan 26 20:44:20 2001
From: mcneil@valinux.com (Scott McNeil)
Date: Fri, 26 Jan 2001 12:44:20 -0800
Subject: FSG LinuxWorld Speakers
References: <3A634412.7F0FC9FA@valinux.com>
Message-ID: <3A71E1A4.AB214832@valinux.com>
If you would like to speak at the San Francisco LinuxWorld in August
about the FSG, LSB, Li18, LDPS, FHS, etc. please let me know. I will
work with you to help make sure that your proposal gets approved.
All proposals are due no later then FEBRUARY 16, 2001.
http://www.linuxworldexpo.com/papers.html
IDG gives speakers free show passes, complimentary lunch each day of the
show, a cool jacket, T-shirt, bag or other show goodie, and usually some
other stuff.
Scott
--
Scott McNeil
Free Standards Group
www.freestandards.org
From wichert@cistron.nl Sat Jan 27 09:59:33 2001
From: wichert@cistron.nl (Wichert Akkerman)
Date: Sat, 27 Jan 2001 10:59:33 +0100
Subject: [PROPOSAL] (Ch.16 FHS) be more specific on file/dir permissions
In-Reply-To: <20010104184232.B8891@caldera.de>; from johannes@caldera.de on Thu, Jan 04, 2001 at 06:42:33PM +0100
References: <20010104134004.A28627@caldera.de> <20010104184232.B8891@caldera.de>
Message-ID: <20010127105933.B12907@cistron.nl>
Previously Johannes Poehlmann wrote:
> Yes, as local sysadmin I want to be able to place a empty rhosts file
> (owned by root) in home directories, to prevent users from opening
> rsh security holes. To prevent the users from deleting .rhosts,
> I need the sticky bit on the home directory.
A homedirectory is owned by the user anyway, so he can easily remove
that sticky bit. Or do you have home directories owned by root and
have a seperate group for each user?
Wichert.
--
_________________________________________________________________
/ Nothing is fool-proof to a sufficiently talented fool \
| wichert@cistron.nl http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0 2805 3CB8 9250 2FA3 BC2D |
From ke@suse.de Wed Jan 31 15:33:38 2001
From: ke@suse.de (Karl Eichwalder)
Date: 31 Jan 2001 16:33:38 +0100
Subject: Build the SPEC on SuSE Linux
Message-ID:
[I'm not subscribe to the list; please, Cc answers.]
At http://www.linuxbase.org/spec/build.html you're asking how to build
the spec on other distributions. Please, add this to the web page:
On SuSE Linux 7.1 (and ealier, but I didn't test it) you'll habe to
install the well know packages from the serie SGML with YaST or YaST2
(jade, docbkdsl, docbktls). If you're interested in PostScript out put,
please install from the serie TeX/LaTeX the teTeX packages and jadetex.
After installing these package, just call:
db2html spec.html
db22dvi spec.html
or
db2ps spec.html
For more options please try 'db2x.sh --help'.
It looks to me as if not all files are properly checked into the CVS
repository; these files are missing after a cvs co:
sysinit/sysinit.sgml
sgmlspec/sgmlspec.sgml
In addition, please fix this small syntactical error:
Index: command.sgml
===================================================================
RCS file: /cvsroot/lsb/spec/command/command.sgml,v
retrieving revision 1.10
diff -w -u -u -r1.10 command.sgml
--- command.sgml 2001/01/18 22:58:53 1.10
+++ command.sgml 2001/01/31 15:32:22
@@ -19,8 +19,6 @@
The behaviour of the interfaces described in this
section are specified by the following Standards.
-
-
--
Linux Frechet 2.2.18 #1 Fri Jan 19 22:10:35 GMT 2001 i686 unknown
4:21pm up 1 day, 6:05, 8 users, load average: 0.11, 0.27, 0.18
work : ke@suse.de
Karl Eichwalder home : keichwa@gmx.net
From tytso@mit.edu Wed Jan 31 12:40:52 2001
From: tytso@mit.edu (tytso@mit.edu)
Date: Wed, 31 Jan 2001 07:40:52 -0500
Subject: V4 [Partial withdrawal of PROPOSAL] Change Chapter 17 (cron)
In-Reply-To: <20010124175513.A1108@caldera.de> (message from Johannes
Poehlmann on Wed, 24 Jan 2001 17:55:13 +0100)
References: <20010124175513.A1108@caldera.de>
Message-ID: <200101311240.f0VCeq802735@snap.thunk.org>
Date: Wed, 24 Jan 2001 17:55:13 +0100
From: Johannes Poehlmann
Sorry for not getting back to you sooner; I've been way behind on my
e-mail lately....
1. We want to uphold one part of the proposal, which was already
sent out separately:
Date: Thu, 7 Dec 2000 16:02:25 +0100
From: Johannes Poehlmann
To: lsb-spec@lists.linuxbase.org
Subject: [PROPOSAL] Get rid of the cron.hourly dir
Message-ID: <20001207160225.A11177@caldera.de>
Our reasons are:
o because many parallel cron scripts cause a big computational load,
it should be possible to serialize these scripts.
This would be risky when using cron.hourly:
What if the serialized scripts need more time then one hour ?
Actually, the easy way to solve the computational load problem is to
observe that cron.hourly merely states that the scripts need to be run
about every 60 minutes; that the only guarantee which is made. But they
don't have to be all run at the same time; so instead of making them be
serialized, a cron program could simply make one run at 7 minutes after
the hour, and another run at 14 minutes after the hour, etc., and they
would be compliant. (And separating the start of each cron.daily entry
by 30 minutes would probably be a good idea too... this would be a very
easy option to add to the run-parts program.)
o we want to allow cron to optimize away hourly disk accesses,
as vixie-cron with a patch from debian already does.
I've in the past showned that it's possible to code cron such that it
doesn't require hourly disk accesses. (i.e., hold open a file
descriptor for the /etc/cron.hourly directory; then every hour or so, do
a fstat to check the modtime; this won't cause a disk access.)
Yes, it requires making a code change. On the other hand, enough other
changes need to be made to a Debian system (and I suspect most systems)
before they will be laptop battery friendly anyway, so this argument
doesn't seem to carry much weight, since at the moment, getting rid of
cron.hourly won't help you much anyway. I'm running Debian/Woody on my
laptop now, and....
* There's a crontab entry for exim which fires every 30 minutes,
regardless of whether you have networking up (dumb, dumb,
dumb, dumb). This causes the atime for the exim inode to be
modified, but worse yet, the fact that the crontab entry
specifies that the entry should run under the mail user, that
means that there are multiple syslog messages from the pam
message hitting /var/log/messages.
The fundamental issue is that running the exim -q needs to run
out of a special long-term running process, ala sendmail -bd,
if you want to avoid waking the disk every time you want to
try to flush the queue; merely running a non-root job out of
crontab guarantees disk activity (because of the syslog
writes), even if the program doesn't do anything else.
* The syslogd is configured to create syslogd mark messages
every 30 minutes (which of course is not synchronized with the
above 30 minute exim queue flush), which in combination to the
above causes the disks to spin up at least four times an hour.
There may have been other laptop unfriendly daemons that were causing my
disk to wake up, but at this point I gave up looking. Suffice it to say
that there were a lot of problems....
o implementing anacron-like functionality produces unnecessary
overhead if cron.hourly is in place (or the anacron-like
functionality had to be switched off for cron.hourly resulting
in inconsistent behaviour).
What sort of "unnecessary" overhead are you referring to? Is this the
need to spin up the disk to write anacron control entry file (i.e.,
/var/spool/anacron/cron.hourly)?
Note though that anacron doesn't support any granularity finer than one
day anyway, and so if a program were to put an entry into /etc/cron.d,
they wouldn't have anacron functionality anyway --- and even if you put
an entry into /etc/anacrontab (and the LSB doesn't guarantee the
presence of anacron), you can't get one hour resolution anyway. So not
having anacron functionality for cron.hourly doesn't seem like either a
huge inconsisntency, given that there's absolutely no way to provide
that sort of functionality anyway.....
If people really don't want cron.hourly, we can remove it at least for
LSB 1.0. But I would like to hear some other opinions about whether or
not we should keep cron.hourly. What do folks think?
- Ted