From owner-freebsd-standards@FreeBSD.ORG Mon Sep 27 15:11:47 2004 Return-Path: Delivered-To: freebsd-standards@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 8028C16A4CE; Mon, 27 Sep 2004 15:11:47 +0000 (GMT) Received: from mail.dt.e-technik.uni-dortmund.de (mail.dt.E-Technik.Uni-Dortmund.DE [129.217.163.1]) by mx1.FreeBSD.org (Postfix) with ESMTP id B177C43D1F; Mon, 27 Sep 2004 15:11:46 +0000 (GMT) (envelope-from ma@dt.e-technik.uni-dortmund.de) Received: from localhost (localhost [127.0.0.1])98F9240960; Mon, 27 Sep 2004 17:11:45 +0200 (CEST) Received: from mail.dt.e-technik.uni-dortmund.de ([127.0.0.1]) by localhost (krusty [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 15454-03; Mon, 27 Sep 2004 17:11:45 +0200 (CEST) Received: from m2a2.dyndns.org (p54854C50.dip.t-dialin.net [84.133.76.80]) EF2F4408A0; Mon, 27 Sep 2004 17:11:44 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by merlin.emma.line.org (Postfix) with ESMTP id 4DE5BD621C; Mon, 27 Sep 2004 17:11:42 +0200 (CEST) Received: from merlin.emma.line.org ([127.0.0.1]) by localhost (m2a2.dyndns.org [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 22884-04; Mon, 27 Sep 2004 17:11:42 +0200 (CEST) Received: by merlin.emma.line.org (Postfix, from userid 500) id E64CAD621B; Mon, 27 Sep 2004 17:11:41 +0200 (CEST) To: Scott Long In-Reply-To: <415812AD.2090901@FreeBSD.org> (Scott Long's message of "Mon, 27 Sep 2004 07:16:29 -0600") References: <415720FD.8080603@samsco.org> <415812AD.2090901@FreeBSD.org> From: Matthias Andree Date: Mon, 27 Sep 2004 17:11:41 +0200 Message-ID: User-Agent: Gnus/5.110003 (No Gnus v0.3) Emacs/21.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Virus-Scanned: by amavisd-new at dt.e-technik.uni-dortmund.de cc: re@FreeBSD.org cc: standards@FreeBSD.org cc: Matthias Andree cc: current@FreeBSD.org Subject: Re: FreeBSD 5.3-BETA6 available X-BeenThere: freebsd-standards@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Standards compliance List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Sep 2004 15:11:47 -0000 Scott Long writes: >> 1. /bin/sh "unset" is still in violation of IEEE Std 1003.1, 2004 >> edition. FIX IS AVAILABLE, bug has been open for many months, has >> persisted in BETA4 and 5. >> http://www.freebsd.org/cgi/query-pr.cgi?pr=standards/45738 >> http://lists.freebsd.org/pipermail/freebsd-current/2004-September/037819.html > > I'll defer this to the standards folks. Finally someone picks these up -- much appreciated, thank you very much, it's a relief to be at least heard. The fix for this has been pending for almost two years now, was filed against 4.7, the fix is _trivial_ and was filed on 2002-11-26. Given that this has been lying unattended for another ten days on -standards already, can't we just commit this on probation and back out as problems arise in BETA7? I cannot imagine anyone relying on the bug in /bin/sh, but some test scripts in third-party software stumble across this when trying to sanitize their environment and need to resort to ugly workarounds such as SOMEVAR= ; unset SOMEVAR. The standard is clear, see 5th paragraph in DESCRIPTION of http://www.opengroup.org/onlinepubs/009695399/utilities/unset.html (Julian Elischer inquired if someone had taken interest last Tuesday but the report is still assigned to freebsd-bugs, so he hasn't claimed it yet, so I presume he hasn't sufficient interest or commit permission to address this.) >> 2. tcpdump IPv6CP segfaults are still open as of BETA5, FIX IS >> AVAILABLE: >> http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/71453 >> > > Looks pretty straight-forward. Anyone want to import the fix from the > tcpdump CVS tree? I don't have a commit bit (nor am I asking for one but I'd take one if someone insisted). >> 3. data corruption on unaligned block access bug, kern/60313, >> is still open and unpatched AFAICS > > Is this actually an issue in FreeBSD 5? In the audit trail of the PR, > Bruce Evans seems to concede that GEOM checks block alignment > properly. I'll try again with a current beta and follow up on this with what I've found; at the time I filed it, there was a problem with a different symptom. If someone else has a SCRATCH partition that can lose all data, (comment out swap and reboot then you'll have one), a test program is part of http://www.freebsd.org/cgi/query-pr.cgi?pr=60313 -- if someone checks first, please Cc: me to avoid duplicated effort. >> 4. NIS is still faulty in pretending users aren't there when in fact >> NIS >> cannot tell if an account exists; bin/46866 is still open and unpatched > > While it's a compelling argument to follow the Solaris behavior, it's > also a compelling argument to have a reasonable timeout on password > lookups. The problem is that the system cannot communicate the difference between "temporary failure, try again" and "no such user", and can lead, for instance, to a bogus _PERMANENT_ reject of a mail, which, in turn, can trigger an unsubscription -- to name just one failure case I've experienced. >> 5. default inetd configuration denial of service bug, conf/33670, is >> still >> open and unpatched AND A LAST CHANCE TO FIX NOW > > inetd is not turned on by default. OK, I'll consider this closed. Feel free to close conf/33670; I'd suggest that the inetd documentation mentions that an connection rate limit doesn't bound the absolute client count and can result in DoS. > What do OpenBSD and NetBSD do? > What does Linux do with xinetd? Depends on the distribution. I cannot say anything about OpenBSD or NetBSD, SuSE Linux 9.1 doesn't automatically start services from inside inetd or xinetd AFAICS. >> 6. (portsmgr issue) no "yes or no" or whatsoever for my inquires >> whether >> ports/72017 can be committed in spite of the freeze. It's a >> bugfix-only update. >> Please state which of these will be fixed before 5.3-RELEASE and what >> further help is needed with these. Pav has claimed this and is waiting for portmgr approval which I already asked about when filing the bug, no-one stirred themselves yet. -- Matthias Andree Encrypted mail welcome: my GnuPG key ID is 0x052E7D95 (PGP/MIME preferred)