Development discussion of WireGuard
 help / color / mirror / Atom feed
From: David Anderson <dave@natulte.net>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Cc: WireGuard mailing list <wireguard@lists.zx2c4.com>
Subject: Re: (Unofficial) wireguard packages for Debian Stretch (testing)
Date: Mon, 13 Feb 2017 20:55:45 -0800	[thread overview]
Message-ID: <CAMx+r7XsHgrxy+1T4ndqzSebA6Ds4XTjQrD9VmoCWAtJkLygHw@mail.gmail.com> (raw)
In-Reply-To: <874lzzqai9.fsf@alice.fifthhorseman.net>

[-- Attachment #1: Type: text/plain, Size: 3430 bytes --]

On Sun, Feb 12, 2017 at 3:01 PM, Daniel Kahn Gillmor <dkg@fifthhorseman.net>
wrote:

> On Fri 2017-02-10 19:23:50 -0500, David Anderson wrote:
> > In case it's of use to anyone, I've built wireguard packages for Debian
> > testing. I wanted to play with wireguard on my Debian Stretch systems,
> but
> > wireguard is currently locked to Sid only until 1.0 brings API stability
> > guarantees.
> >
> > So, I set up a cronjob that rebuilds the Sid source package on a Stretch
> > system, and the result is wireguard packages that track the latest
> release,
> > but don't pull in unstable versions of libc and whatnot when you try to
> > install them, as would happen if you tried to install via package
> pinning.
> >
> > Naturally, you have only my word that the packages are unmodified
> rebuilds
> > of Debian's original package, and you're trusting packagecloud to not
> > tamper with the packages (it's their signing keys, not mine) so caveat
> > emptor. It works for me, it might work for you as well.
> >
> > With the warnings and disclaimers out of the way, here's the repo:
> > https://packagecloud.io/danderson/wireguard?filter=debs
>
> I appreciate your interest in getting wider distribution for wireguard,
> David, but i'm not convinced this approach makes much sense.
>
> It seems like a lot of extra work compared to just putting wireguard
> into stretch-backports once stretch is released.
>

"Once stretch is released" could be a few months still, right? It's only
just gone into final freeze. I agree that once it's released, backports is
definitely the right way to distribute.


> Until stretch releases, people running testing should be able to just
> add the unstable repository and pin it to be lower priority than testing
> (see apt_preferences(5)).
>

So, I'd initially tried doing this, by adding the unstable repository at a
negative priority. What turned me off is that even with that low
preference, attempting to install the wireguard packages seemed to pull in
some core system libraries (libc and such) from unstable as well. And while
I'm excited about wireguard, I'm not "install unstable base libraries"
excited :).

That said, it's quite possible I was just not using the preference system
correctly. If it's possible to express "Install *only* wireguard-* from
unstable, never anything else", then I agree, that's definitely the way to
go.


>
> Using this standard approach, users won't need to:
>
>  a) add a new key to their apt configuration, which increases the attack
>     surface for all installed packages (btw, the proposed shell pipe
>     into "apt-key add -" is deprecated, see for example commentary at
>     https://bugs.debian.org/853858)
>
>  b) be dependent on some alternate suite of build daemons -- if debian
>     supports your build environment, the buildds will have the wireguard
>     packages.
>
> So I don't see much to recommend the proposed approach by comparison,
> and i don't think that it should be documented as a recommended approach
> upstream, unless there are clearer benefits that i'm missing here.  In
> that case, i'd like to know what those benefits are :)
>

Fair enough, I defer to your greater experience with Debian packaging.
Fortunately, packagecloud's stats say that there were no installs from my
repository, so assuming I can get pinning to work properly, the only
systems that need cleanup are my own.

Cheers,
- Dave


>
>          --dkg
>

[-- Attachment #2: Type: text/html, Size: 4828 bytes --]

  parent reply	other threads:[~2017-02-14  4:41 UTC|newest]

Thread overview: 26+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-02-11  0:23 David Anderson
2017-02-11  9:03 ` Jason A. Donenfeld
2017-02-11  9:49   ` David Anderson
2017-02-11 10:04     ` Jason A. Donenfeld
2017-02-11 10:15       ` David Anderson
2017-02-11 10:17         ` Jason A. Donenfeld
2017-02-11 11:48           ` David Anderson
2017-02-11 13:28             ` Jason A. Donenfeld
2017-02-11 16:27             ` Baptiste Jonglez
2017-02-11 21:38               ` David Anderson
2017-02-11 12:32     ` Jason A. Donenfeld
2017-02-11 21:36       ` David Anderson
2017-02-12  2:40         ` David Anderson
2017-02-12 13:42           ` Jason A. Donenfeld
2017-02-12 23:01 ` Daniel Kahn Gillmor
2017-02-12 23:37   ` Jason A. Donenfeld
2017-02-14  4:55   ` David Anderson [this message]
2017-02-14 15:50     ` Daniel Kahn Gillmor
2017-02-15 21:31       ` Baptiste Jonglez
2017-02-17  2:46         ` Daniel Kahn Gillmor
2017-02-17  8:15           ` Baptiste Jonglez
2017-02-17 13:32             ` Jason A. Donenfeld
2017-02-17  3:14       ` David Anderson
2017-02-17 19:49         ` Daniel Kahn Gillmor
2017-02-20 23:53           ` David Anderson
2017-02-21  0:53             ` Ibrahim Tachijian

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAMx+r7XsHgrxy+1T4ndqzSebA6Ds4XTjQrD9VmoCWAtJkLygHw@mail.gmail.com \
    --to=dave@natulte.net \
    --cc=dkg@fifthhorseman.net \
    --cc=wireguard@lists.zx2c4.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).