/srv/irclogs.ubuntu.com/2010/02/22/#ubuntu-meeting.txt

=== edson is now known as ecanto
=== mhall119|work is now known as mhall119|SCaLE8x
Speedy2www.search2.net07:43
elkyIs that a typo or are you spamming us?07:44
vishelky: spam07:44
elkyit does appear that now07:44
vishelky: i'v just reported it to the ops, its been happening in several channels07:45
elkyYeah, i noted. I was going to see if they were a human who could be reasoned with.07:46
dholbachgood morning07:49
=== cypher_ is now known as czajkowski
=== jamie is now known as JamieBennett
=== ShadowChild is now known as lukjad86
=== DJones_ is now known as DJones
=== fader|away is now known as fader_
=== ikt_ is now known as ikt
=== fader_ is now known as fader|away
=== fader|away is now known as fader_
=== fader_ is now known as fader|lunch
=== fader|lunch is now known as fader_
mdeslaurjdstrand, kees: meeting?18:00
keesmdeslaur: ah, yes.  it's that time, isn't it?18:01
keesjdstrand: ready?18:01
mdeslaurkees: my calendar thinks it is :)18:01
jdstrando/18:01
kees:)18:01
jdstrandyes18:01
keesokidoky18:01
keesthis week, OOo publication, and then going to check for any low-hanging fruit18:01
persiaIf there's time in the agenda, can I grumble a bit about community integration at the end?18:02
keesI'd like to finish some of the qrt stuff I had on my plate (like the additional RNG tests)18:02
keespersia: totally18:02
mdeslaurpersia: yes18:02
persiaTHanks.18:02
keesprobably going to start another kernel update cycle soon too18:02
keeslooks like we made feature freeze pretty well.18:03
keesthat's it from me.  mdeslaur, you're up.18:03
mdeslaurI just published pidgin updates. I plan on attacking the new squid issue, and the ffmpeg updates next.18:03
mdeslaurbesides that, I'm on community, so have been going down the sponsoring list18:04
mdeslaurthat's pretty much it18:04
* jjohansen fades in late18:04
jdstrandso I guess I'm up next18:04
jdstrandI am triager this week18:05
jdstrandI plan to talk to soren walk me through kvm-autotest to see how we can use it in QRT for our gui applications. it should be totally doable18:06
keesoooh, I was just thinking about that today in the shower -- I wanted to see if I could build an OOo test18:06
jdstrandkees: exactly (though for me it was firefox)18:06
keesI worry about use having different resolutions, languages, installed applications in our VMs, though.18:07
mdeslaurwouldn't Mago be more appropriate for that?18:07
jdstrandI looked at it a it on my own last week, but it was not...18:07
jdstrandobvious...18:07
keesyeah18:07
jdstrandhow to use it in that capacity18:07
jdstrandsoren gave that presentation at the sprint and seems to think it shouldn't be a problem-- so I'm hopeful :)18:07
persiaMago requires accessibility support.  kvm-autotest requires reliable display parameters (which kvm can provide).18:08
jdstrandmdeslaur: I looked at Mago a bit, but didn't find documentation on how to really get into it18:08
jdstrandplus what persia mentioned18:08
* robbiew sneaks in the back door :/18:08
mdeslaurI'm just kind of afraid with kvm-autotest that it will be hard to always have a 100% reproducable environment18:09
jdstrandI plan to see what is next on the 'what CVE to fix next' list, and do that18:09
=== noy_ is now known as noy
jdstrandmdeslaur: I think we can with snapshots, etc18:09
jdstrandmdeslaur: anyway, I'm investigating right now, not integrating :)18:10
mdeslaurok, fair enough :)18:10
mdeslaurjdstrand: don't forget, I run my VMs at 1920x108018:10
jdstrandmdeslaur: if you have some good resources for mago, I'd like them too18:10
keesjdstrand: if you start getting somewhere with it, let me know and I can "reproduce locally"  :)18:10
keesmdeslaur: seriously?18:10
mdeslaurkees: no18:10
keeshah18:10
jdstrandmdeslaur: well, I take you point. these would likely have to be 'special' VMs anyway (ie, kvm-autotest and libvirt doesn't make sense afaict)18:11
mdeslauroh, okay18:11
jdstrandbut anyway, we'll see-- I just thought there might be something there, and soren is willing to walk me through it18:11
* kees hopes to re-use the libvirt-configured VMs18:12
mdeslaurjdstrand: don't forget to bug soren as much as possible while he's still on the payroll :)18:12
jdstrandkees: me too... we'll see18:12
jdstrandI might be able to wrap stuff, etc, like I did with vm-tools. but like I said, I've barely looked at it :)18:13
jdstrandanyhoo18:13
jdstrandif I have time, I'd like to see if I can clean up the apparmor abstractions, esp for firefox/evince18:14
jdstrandthat's it for duties. I do have two items to bring up-- one is I'm fairly sure related to what persia wants to talk about18:14
jdstrandpersia: why don't you go ahead?18:14
persiaProbably :)18:15
persiaOK.  jdstrand and I have been having a productive conversation in a thread at https://lists.ubuntu.com/archives/ubuntu-motu/2010-February/006550.html18:15
persiaSummarised, the TB and DMB have approved a proposal that significantly limits the scope of "MOTU".18:15
persiaSo, since "MOTU" no longer maps well to "community supported", I'd like to see some initiative from the wider security team (potentially including current members of MOTU SWAT) to define a process that supports the entire archive wihout relying on the scope of MOTU.18:16
keessounds good to me.18:19
jdstrandthat makes sense to me, but, tbh, it is clear to me how "community supported" is being defined in the new world. I guess "not in officially supported" is one definition, but there then is a team surrounding "not officially supported"18:19
jdstranderr18:19
jdstrands/is/isn't/18:19
* persia much prefers "not supported by Canonical" to "not officially supported", but yes, this needs thought.18:19
jdstrandfair enough18:19
keeswe'll have the help of the Supported: tag in the packages files18:19
persiaIt's going to be a bit before everything is implemented, so there's time, but it seems appropriate to start thinking about it now so that we don't get caught later.18:20
jdstrandyeah, that defines our responsibilities18:20
mdeslaurpersia: Is there anything you see that would need changing in our current process?18:20
* kees mumbles something about syncSource ACLs in LP18:21
jdstrandpersia: also, not pointing fingers or being judgemental, but motu-swat has not been active for a while. the reasons are numerous and in part due to lack of process from ubuntu-security (which should all be fixed now)18:21
persiamdeslaur: Were I designing the process, and noting that my understanding of your process is entirely based on jdstrand7s email, I'd probably only do the following:18:21
keesno amount of our process can reduce the bottleneck that is LP's lack of ACLs, though.18:21
persia1) declare an inclusive security group with responsibility for everything (although some members may concentrate in certain areas).18:22
keesbut, outside of that, I'd agree: we've tuned the process to eliminate human bottlenecks as much as possible18:22
persia2) encourage all members of that group to actively review and sponsor stuff.18:22
jdstrandkees: yes, but if more people submitted patches and more people joined ubuntu-security-sponsors, I think we could handle the publishing bits ok18:22
persia3) have a restricted set that is responsible for pocket copies and USN releases.18:22
jdstrand(I'd love to see the volume of community supported patches be a real problem for us)18:22
persiaI think that's mostly a matter of making sure submitters feel entitled as part of the team.18:23
mdeslaurpersia: this is the team that has responsibility of reviewing everything: https://launchpad.net/~ubuntu-security-sponsors18:23
persiaI know that when we do stuff in MOTU that involves telling people that submitting patches makes them Ubuntu Developers, we get more patches.18:23
keespersia: 3 exists, 2's element of "encourage" hasn't happened, though we've asked the community team for help there. 1 exists as ubuntu-security-sponsors, IIUC18:23
persiakees: I think you're right, and that it's just a matter of semantics and communication.18:24
jdstrandwell, the ubuntu-security team itself is how it is due to ACLs and requiring the possibility for embargoed issues.18:24
jdstrandit could I guess be a subteam in this whole thing...18:24
jdstrandkees: your understanding is correct on '1'18:25
keespersia: our problem has traditionally been that of motivating others; we're usually utterly slammed for time, and doing coaching, blogging, etc can be very time-consuming.18:25
jdstrandkeep in mind, that the new process for sponsoring security uploads is just that: new this cycle. I personally wanted to see how it worked for a little bit to make sure it was sane18:25
jdstrandhowever, we are fully integrated into the MOTU pages now-- from dholbach's reports, to Sponsoring pages to how you can help18:26
persiaI understand entirely :)  I just wanted to raise the point, because while I think all the process stuff jdstrand mentioned in the email was good, I found some of the phrasing and language exclusive, and based on previous meeting logs, though it was pervasive in the sematics of the team, rather than being jdstrand's email.18:26
jdstrandthe only thing that wasn't done was an email to ubuntu-motu@ and ubuntu-devel@18:26
mdeslaurpersia: right now, we always have one team member who is on active community-sponsoring duty, so if a bug is opened and a debdiff submitted, it will get reviewed and uploaded in a few days.18:27
persiamdeslaur: Right.  I think that's great.  I just want to highlight that there are likely to be other groups than MOTU active in universe, and that this probably has implications related to the semantics of your communications.18:27
jdstrandpersia: there is a difference between canonical supported and community supported, and a necessary exclusivity in some ways-- it is our team's job to take care of canonical supported pacakges. our name is on the USN, it is in the emails to bugtraq, etc. in some ways, submitting a debdiff for a package in main is a lot like just giving us a VCS link to a fix18:29
jdstrandpersia: that said, I don't want to appear as exclusive18:29
persiaHeh.18:29
persiaI understand the difficulty, and don't want to complicate things :)18:30
jdstrandthat didn't come out quite right18:30
jdstrandI want people involved, but there is very much a difference between a community supported package and a canonical supported, from our point of view18:30
persiaThere are differences between the set of things that is done related to embargoes and USNs and pocket copies.18:30
jdstrandI'm not sure that matters though-- there is so much to do in community supported packages that just isn't happening now18:30
persiaI'm less confident there's a meaningful difference between "main" and "universe" for stuff that isn't embargoed.18:31
persia(because any dev can upload it)18:31
keesthere is -- it's an SRU18:31
jdstrandpersia: are we talking about stable releases or devel?18:31
keesso, when something goes into main, we're responsible for it.18:31
persiaDon't you do both?18:31
jdstrandpersia: stable and devel? yes18:31
jdstrandpersia: but we are directly responsible for main/restricted18:32
jdstrandfor stable18:32
jdstrandin fact, a supported configuration is running an Ubuntu system with -security but without -updates18:32
persiaRight.  I think we havea  close to common understanding of stuff.18:33
persiaI agree there needs to be a distinction for certain folks active in security.18:33
jdstrandsure-- I think it is perhaps a matter of perspective, and my language is tainted by my perspective18:33
persiaI just think there needs to be a distro-wide security team of some sort (which may well be ubuntu-security-sponsors) that is highlighted as a central team, rather than relying on each developer team to grow it's own security folk.18:34
persiaMine too :)18:34
keesI'm actually not convinced that's the right thing to do.18:34
keesI think each developer team needs to know how to handle stable security updates.18:34
keesthey're much more familiar with the code and how to test18:35
persiaOK.  How do we deal with security for stuff not handled by the restricted set of security developers then?18:35
keesI'm not saying we shouldn't have a general security team, but I don't think we should discourage security work by devel teams18:35
persiacan we convince each team to grow a security representative?  Or would we do better to have a central coordnation team that reached out when CVEs were published?18:35
persiaJust as a semantic note: I consider teams to be massively overlapped, so I'd hope that individual developers might participate in several teams.18:36
keesI think each team should at least have a security representative -- perhaps the same person that deals with SRUs.18:36
jdstrandkees: I was not trying to discourage anyone, and would hope that people from the dev teams would provide patches for their stuff (with testing)18:36
keesjdstrand: right, i was replying persia's "rather than relying on each developer team to grow it's own security folk."18:37
persiaOK.  This could work.  In that case, there *should* be a MOTU swat, but each developer team should also havea  similar body.18:37
jdstrandah18:37
keessince I *do* want devteams to grow security folk18:37
keespersia: I think that would be ideal, yes.  however, we've had a very hard time growing either type of person.  :)18:38
persiaI don't think we need to continue having a hard time :)18:38
persiaJust petition the tech board to add a requirement that devteams nominate some -security and -updates contacts.18:38
jdstrandthe devel release is often much more exciting than a stable release for most people18:38
keespersia: how would that be tracked in LP/18:39
persiaAnd that those contacts are expected to participate in discussions with the central -updates and -security teams (so they'd be at this meeting).18:39
keess#/#?#18:39
persiakees: Nominees would be added to ubuntu-security-sponsors and fill roles similar to that of motu swat today.18:39
keesI'm looking for a way for an outsider to answer the question "who is the security contact for [team]?" when looking at LP.18:40
jdstrandpersia: so anyone could provide the debdiff (including the devteam) and then the rep from the devteam in ubuntu-security-sponsors could ack it18:40
jdstrand?18:40
persiakees: A wiki page?18:41
persiajdstrand: And with luck the security rep from the devteam helps in other ways, but yes.18:41
keespersia: okay, seems disconnected from LP a bit, but it's the best we've got.18:41
persiakees: The other alternative is to have special teams like ubuntu-desktop-security, but I don't think that scales.18:41
keesthe issue is finding someone that can help with testing.  no one likes testing ancient stable releases.  :(18:41
persiaLP needs to get smarter before we have that feature.18:42
persiaThat's why you get the TB to require devteams to nominate someone :)18:42
jdstrandyeah, last stable is about as far back as people like to test18:42
keesI want to avoid this person from becoming a bottleneck, though, and I worry that might become socially tricky.18:42
kees"You never checked with me about this patch!"   "You weren't online."  etc18:43
jdstrandI can imagine an ack on a patch, but waiting on testing18:43
persiakees: Could we work around that by a combination of "Ubuntu doesn't have maintainers" and allowing a devteam to nominate several members rather than one if coordination may be an issue?18:43
jdstrandkees: I think that should be solved be our sponsorship process18:43
jdstrand(it, ACKs, etc in LP)18:44
keesI guess my entire opinion is best summarized by "I would love more people participating, but since that number is approaching zero, I see no reason to impose groups/lists/etc"18:44
persiaFair.  I'm just concerned about the packages that are no longer cared for by MOTU slipping through the cracks.18:44
mdeslaurkees: I agree with that...once we actually _get_ debdiffs we can start looking how to increase sponsoring, etc.18:45
keeswel, to be honest, they already are slipping through the cracks.18:45
persiaOK, maybe I'm approaching this from the wrong direction then.18:45
persia(and feel free to change topic if time is short)18:45
keesstefanlsd and jstrand helped a great deal to close the crack with the sync-finder and sync-doer, though18:45
persiaPerhaps we ought think about "How do we extend the security process to more actively encourage patch submissions from devteams to the security team?"18:46
jdstrandpersia: that is the question18:46
keesbut, I mean, the list is huge even after that: http://people.canonical.com/~ubuntu-security/cve/universe.html18:46
persiaAs long as we answer that question in a way that works with Archive Reorg, all my concerns about MOTU SWAT are resolved.18:47
jdstrandpersia: that is what we tried to do with our recent procedural changes (so it isn't a wholly new process)18:47
keespersia: right, I like that.  I like _anything_ that'll get more people helping.18:47
persiaOK.  So, I suggest that explicity expecting devteams to actively track at least open CVEs in their packagesets is a place to start.18:47
persiaUntil MOTU's responsibility gets smaller, I'm unsure MOTU SWAT can keep up, but it sets a model that means that as new devteams are formed, they are already participating in the process.18:48
james_wintegration with harvest could be a good idea18:48
persiaThat also skips the requirement for specific nominees, etc. (although if you add a request to report in this meeting, a natural nominee will likely emerge)18:48
keespersia: yeah, I do like the idea of solidifying "expecting devteams to actively track at least open CVEs in their packagesets"18:50
jdstrandI'm not sure what that will get us, but we'll see18:51
persiakees: And would you be willing to add "expecting devteams to report on the progress of such tracking during the weekly security team meeting"?18:51
keespersia: sure, I guess that would be good.18:51
persiaWell, that combination matches my preferred mental model well enough that I'm completely satisfied :)18:52
keespersia: where should these suggested idea be presented?  TB or DMB?18:52
keesI assume TB18:52
persiaTB: it'S the TB that is responsible for approving devteams.  The DMB only approves membership changes in devteams if so delegated.18:53
* kees nods18:53
persiajdstrand: did you have anything else on this, or shall we move to the second of your "two things"?18:53
jdstrandpersia: I'm pretty much of the same mind as everyone-- more involvement is good. how we get there is rather secondary to me18:54
keespersia: I've added this to the TB agenda now: https://wiki.ubuntu.com/TechnicalBoardAgenda18:55
jdstrandsimply put, I don't have anything else18:55
persiakees: Excellent :)18:55
keesjdstrand: oh, I thought you had a second item, non-overlapping with persia?18:55
jdstrandkees: I do, I was letting go of persia's sleeve is all18:56
keeshah, ok18:56
jdstrandthe other thing is a bit of a clarification on security support in -backports18:56
jdstrandspecifically bug #41184918:56
ubottuLaunchpad bug 411849 in hardy-backports "Please backport security fix for USN-812-1 in subversion 1.5" [Undecided,In progress] https://launchpad.net/bugs/41184918:56
jdstrandmy understanding was that it is up to the backports team to do this type of thing18:57
keesI agree 100%18:57
jdstrandalright, so, so I guess that is it on that then18:58
jdstrandubuntu-security got dragged into that bug and it seemed at least worth reviewing18:58
keesjdstrand: yeah, backports is not our problem in the least, IMO.18:58
jdstrandI agree (and responded as such in the bug)18:59
keesif anyone feels differently, I'm all ears, but my operating principle has been to ignore -backports totally.18:59
keesokay, cool18:59
keesanyone have anything else?19:00
mdeslaurnot me19:00
keesthanks everyone!19:00
jdstrando19:01
jdstrando/19:01
=== Pricey_ is now known as Pricey
=== fader_ is now known as fader|away

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!