IV International Conference of Unix at Uninet
  • Presentation
  • Register
  • Program
  • Organizing Comittee
  • Listing of registered people
  • Translators team
Closing ceremony

truluxwilly, yeah, ok ;)
marcelotrulux, OK?
damjanHow about including CIFS in 2.4?
damjanIs it non-distubing enough?
willycan't you people wait 6 minutes for the q&a session to
officially start? ;-)
damjansory
truluxmarcelo, ok, i was just wondering for your opinion, some
people think that i'm doing a worthy job backporting selinux, others think i
got perverted by some time of nonsense idea and others just say it may be OK
willytrulux: there's no reason that marcelo has to accept your
backport for it to be useful, of course.
truluxand backporting it it's not my first priority, anyway, it's a
thing i like to do to learn, when you are young you like those things ;)
truluxwilly, yes, i was just wondering for his opinion
truluxand also, but this one is offtopic in a not reasonable
manner, ask for help to someone who wants to care on it
willypersonally, I think you'd be best off chasing down problems in
2.6 that prevent Debian from using it ... though I appreciate that's a lot
less fun ;-)
truluxrotfl
EricBAOLism detected - shields up.
marcelotrulux, sure your backport will be useful for a lot of
people - just not a candidate for v2.4 inclusion, as willy says.
marceloThey are different things :)
truluxmarcelo, and how's the policies for patches and enhancements
acceptance for 2.6?
truluxi want also to talk about some ideas, about NX
implementations and other stuff, dunno if i would get kicked before or after
of each question
trulux;)
rieldoes anybody want to ask the first question ?
truluxdavej, i've backported the selinux hooks for mount contexts
used in Fedora, what changes are needed outside the LSM/SE structure to make
them working smoothly?
truluxriel, hands up
trulux:)
Daediuslol
REALlala..
joined #qc
renegregkh: what is your opinion of the current state of the device
model? anyspecific directions you want it to go which it isn't yet?
davejooh, good one.
mjtanother question: where's Rusty? ;)
mcrI have been using User-Mode-Linux for nightly regression testing
of the KLIPS IPsec code. This has proven very effective. I would like to see
more use of UML for regression testing of non-hardeware driver related items.
Perhaps the assembled people could tell us what is keeping them from testing
more extensively with UML.
weaselNot a very technical question, but one regarding release
policy. Currently it often takes many weeks
weaseluntil known security problems get fixed not only in BK, but in
a release. Do you intent to make use
truluxriel, what's the opinion of the kernel hackers on NX
implementations and memory protection enhancements: Exec Shield, PaX.... etc?
weaselof x.y.z.N releases wich fix such critical bugs quickly in the
future, or at least make patches more
weaselwidely known?
truluxalso, is there any intenttion on providing a CSRNG as optional
replacement for the standard RNG?
willycould you expand 'CS' in that context?
EricBIt seems that most vendors now ship their own kernel. Is this
becoming a problem or are the vendors being good about submitting patches for
inclusion in linux?
damjangregkh: while on the device model, is power management all
right, but drivers implement it poorly or it needs work too?
REALlala..
truluxwilly, Cryptographic Strong Random Number Generator
renegregkh: thank you
willytrulux: SHA-1 is cryptographically strong ;-)
gregkhrene: you're welcome.
truluxwilly, SHA1 has collisions AFAIK
willyyou're thinking either of MD5 or of SHA-0; in either case, you
can't control enough of the entropy being mixed into the entropy pool to matter
truluxand also, random.c doesn't have complex entropy pool feeding
routines
truluxwilly, let me give you the address of jlcooke's Fortuna CSRNG
patch
willyoh.  jlcooke is a crank, ignore him ;-)
truluxwilly, lol
truluxwilly, http://jlcooke.ca/random/
truluxi noticed the patch by an email from him, asking for inclusion
in hardened debian kernel sources
mb_Maybe you want to read this on MD5|SHAx collisions:
http://www.rsasecurity.com/rsalabs/node.asp?id=2738
truluxmb_, from RSA ... why they should want to say it's not?
truluxmb_, there were lots of comments on that
truluxanyway, i don't care of that, i simply change to another thing
which people does not talk worst on it
trulux(aes256 and sha256)
mb_trulux: tiger?
truluxmb_, i wa stalking about this: http://jlcooke.ca/random/
Hackers. "Q&A about linux kernel. Closing Ceremony". '
truluxriel, what about my question about NX implementations?
rieltrulux: in a minute
truluxkay
roelwith the new development model, having a less stable-on-all-times
kernel, won't we depend even more on patched distribution kernels?
duckymarcelo hello, nice day, what about your experiences as the 2.4
kernel mantainer?
truluxriel, also, is the FreeBSD jails port going to be integrated
into the kernel?
trulux<riel> however, I think that the security conscious (aka
paranoid) system administrators are not the main target for these patches
truluxriel, not really.i think the so-called zero-day exploits are a
good example to show up the priority of applying those enhancements
truluxsure there are people having a few archives of them
truluxalso, the line is no straight, and maybe we have many "enemies"
that could put money, effort and people in researching on those security breaks
truluxto expose negative results on the open source or free software
movement
truluxeven in any of its related projects
truluxand compromising, weaking, fscking, messing up stuff over there
and there
truluxwithout difficulties
rieltrulux: good point, you are right about zero day exploits
truluxriel, there are no conspiracys, but there are some parts
interested on mess and f*ck up our work
truluxconspiracies
truluxand get money back from it
rielwant me to answer your BSD jail question in a bit ?
truluxriel, yes, if you want ;)
rielthere are a few other questions "in the queue" first, though
truluxok
truluxnp, i will continue making noise here ;)
roelwhat about projects like linux from scratch?
roelthere's no distribution kernel there
benkriel :) is bsd distributions have tools for pkg managing
diferents than pkg_tool? than could make the task easier like gentoo does?
warrenroel, linux from scratch is not for serious production use.  Or
rather you have too much time on your hands if you do.
mb_I've been always running vanilla kernels and I had very few
crashes (once a year was often). Now directly after the new development model
started, I have crashes every week. At the moment I have a crash per day at
least, gregkh
roelnot true, you can make a very good production server with it
gregkhmb_: report the bugs at bugzilla.kernel.org so we know to fix
them.
warrenmb_, anecdotal accounts of individuals are not indicative of an
overall trend.
mb_yeah, but it is a fact as I describe it here.
mb_I do that. gregkh
gregkhmb_: then report it so it is fixed.  otherwise it never will
be. This is a community.
gregkhmb_: great.
duckywhat do you think about, whats the most strong barrier to the
enterprises to migrate all their servers to 2.6
mcrlong live the IBM mainframe!
truluxducky, when they use specific stuff
truluxand less than 4 cpus
trulux;)
mcrducky, the totally untested IPsec stack.
truluxmcr, THAT'S WHEN NOT USING oPENSWAN
truluxoops
truluxsorry of the caps
EricBwow
truluxEricB, that's the thing that happens when you turn
window-to-window and coding stuff in other place
trulux"i forgot the caps" ;D
EricBI don't have a capslock :)
mcrtrulux, 2.6 has a broken ipsec stack. that's something that keeps
people from migrating. if you can't run 2.6 on the desktops or the gateways,
then why bother with the servers...
truluxyeah
truluxanother reason to add to my I-Apologize-for file in the topdir
of the selinux backport
warrendavej, -ac kernels are not always "stable" only feaures
weaselthanks
davejwarren: *nod* a more conservative approach would be a useful
thing to have.
duckythanks mcr
EricBit would be nice to at least see official security patches even
if a security point release is never created
truluxEricB, it could be great to create a team of volunteers to
maintain an official secured vanilla kernel
truluxwith secured meaning: having security enahncements and so on
truluxriel, what do you think?
gregkhtrulux: step up and do it.
willyI'm mulling over volunteering for that position
EricBnot even enhancements just patches to the current point release
mcrwasn't there a distro that planned exactly that? I met a guy at
OLS... seatle or something.
EricBfor known problems
warrentrulux, a while ago somebody began a site with "only bugfix
patches" for each kernel. Don't know if they continued.
EricBsomething very basic to get buy until the next point release
where those patches would be included
duckythanks a lot :)
truluxgregkh, i can do it, but maybe i'm not the best one
truluxanyway, i'm a good kamikaze in effort terms
EricBthat would eliminate the lag time between security fixes as well
as alowing people like -ac to keep not have to worry about people using their
release for basic security fixes
willyNeed more questions ;-)
willy(please repeat it if you asked one that hasn't been answered yet)
EricBIs there going to be any effort made to split up the source by
arch? Most people only need one or two
truluxbtw, it would be great to provide an official wiki on the
kernel sites to write collaborative-style documentation, etc
gregkhEricB: that's in the lkml FAQ.
mcrQ: my question wasn't answered by anyone other than riel. I'd like
to know if the others have thought of using UML.
EricBoh :)
EricBsorry.
rielmcr: people have used it, I know some cluster developers are
truluxgregkh, we can try to make some movements for that, what do you
think that should be done first?
left #qc
gregkhmcr: I can't use uml, due to the driver work.
gregkhtrulux: i have no idea, good luck.
truluxgregkh, heh a good luck does not help a lot, i'm in lack of
infrastructure
rieldoes anybody else (who has not asked a question yet) want to ask
a question ?
mb_What about the BKL. Can we expect that there will be the day when
it disappears? Is work going on there?
EricBgregkh Yeah I feel like kind of a dipshit now :)
gregkhEricB: don't.
duckywhat about the ideas about the aperture of the 2.7 tree, what
features should it have?
truluxwilly, what do you mean by someone in charge of security
bugfixes?
willytrulux: someone who maintains a -secure tree, basically.  Watch
for patches going into the kernel that're security related and produce a tree
based on that.
duckythanks marcelo :)
EricBwilly I think that's a great idea
truluxwilly, it would be great, what type of security enhancements
among the bugfixes?
gregkhtrulux: ah, it's a slippery slope down from there...
willyIf I were doing it, I'd only include actual bugfixes.
renegregkh: I believe the console stuff is still a big BKL user? I
believe it's likely to move to (early-)userspace?
willyie nothing that wouldn't go into Linus' tree.
gregkhrene: I don't know.  there's no big performance need for the
console stuff :)
renewhile on the topic. where _is_ early userspace? :)
renegregkh: some sanity need, though...
truluxwilly, and where it could be hosted?
mb_When I looked at the VFS code I saw lots of lock_kernels() which
protect the not so often used operations (others then open/read and write).
Aren't they a candidate to go away soon?
warrenQ: Are we still plagued by VM balancing problems?  Will there
ever be an end to it?
tklauserHow do driver developers and lowlevel hackers test their
code? Isn't it difficult to debug code at such a low level?
warrentklauser, that's what users are for. =)
tklauserwarren: *g*
tklauserYeah, but I mean one can't put out a driver which doesn't run
at all and leave it to the users to test it.
tklauserwilly: Thanks for your answer.
damjanWhat's the general feeling amongst the main kernel hackers
about user-space filesystems (like FUSE), will it go in mainline? Also what
about per-user (or per process) VFS namespaces ... Also what about overlay
mounts?
renegregkh: thanks for the ml pointer. didn't know there _was_ a ml...
gregkhtklauser: I've done just that before, and then debugged by
email as I didn't have the hardware to even test it.
rieldoes anybody else have a question ?
rielwe should probably close this session some time within the next
20 minutes, so now is the time te ask ...
drizzdWill the upstream kernel ever be capable to provide hard real
time scheduling?
tklausergregkh: So basically you just have to have enough experience
(and maybe confidence in your code) to do something just right from the
beginning and then just leave it to other people to test it?
kroczriel: how hard would it be to run grsecurity with xen?
EricB:)
warrenQ: On the topic of filesystems, what will it take to enable use
of mount --bind -o ro to have a filesystem read-only in one location,
read-write in another simultaneously? Existing patches (from vserver authors)
against 2.6 were rejected a few months ago. Any further work in this
direction?
gregkhtklauser: sure, whatever you feel comfortable with.  It depends
if you can handle public criticism or not :)
tklausergregkh: OK. Thanks for your answer.
ducky:)
kroczwhat parts of the linux kernel does Xen patch?
EricBIs there going to be any move for copy on write file copies?
This would beat the pants off of LVM snap for taking db backups
tklauserkrocz: AFAIK Xen doesn't patch the kernel at all.
renegregkh: where is the klibc ml? google isn't finding it for me,
only hitting lkml
warrenQ: What about the ext3 COW stuff discussed a few months ago.  
Is there any possibility of making this work transparently in the future
upstream kernel?
damjanI also have a question about improving robustness of the
kernel, if you got processes stucked somewhere in the kernel (waiting on NFS,
CIFS or bad CD) the only thing you can do is a restart ... can something be
done about it? Another example is a usb-hdd (sd_mod + usb-storage) with
reiserfs on it... the laptop got suspended, the usb-hdd removed (although
mounted) ... but that operation had bad effects on /dev/hda3 (/home) because
it was also reiserfs...
tklauserkrocz: Sorry I mixed that. You may want to read
http://www.cl.cam.ac.uk/Research/SRG/netos/xen/faq.html
gregkhrene: http://www.zytor.com/mailman/listinfo/klibc
renethank you

Generated by irclog2html.pl by Jeff Waugh - find it at freshmeat.net!

The Organizing Comittee

Email UsMore information


© 2004 - www.uninet.edu - Contact Organizing Comittee - Valid XHTML - Valid CSS - Based on a Design by Raul Pérez Justicia