Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Debian Bug Software Linux

Debian Refuses To Push Timezone Update For NZ DST 435

Jasper Bryant-Greene writes "Although a tzdata release that includes New Zealand's recent DST changes (2007f) has been out for some time, Debian are refusing to push the update from testing into the current stable distribution, codenamed Etch, on the basis that 'it's not a security bug.' This means that unless New Zealand sysadmins install the package manually, pull the package from testing, or alter the timezone to 'GMT-13' manually, all systems running Debian Etch in New Zealand currently have the incorrect time, as DST went into effect this morning. As one of the last comments in the bug report says, 'even Microsoft are not this silly.' The final comment (at this writing), from madcoder, says 'The package sits in volatile for months. Please take your troll elsewhere.'"
This discussion has been archived. No new comments can be posted.

Debian Refuses To Push Timezone Update For NZ DST

Comments Filter:
  • by Lennie ( 16154 ) on Sunday September 30, 2007 @08:10AM (#20800419)
    It's in volatile (where it should be), it's just one line in /etc/apt/sources.list, which should probably already be there and an apt-get update && apt-get -u install tzdata

    done.
  • by Lennie ( 16154 ) on Sunday September 30, 2007 @08:32AM (#20800509)
    It's Debian policy to update stable in point-releases, to have security updates through security.debian.org and packages that _need_ regular code updates (like the clamav virus scanner) in volatile. This timezone change is in volatile.

    Nothing to see here, move along.
  • by Anonymous Coward on Sunday September 30, 2007 @08:44AM (#20800557)
    It's in volatile repository.

    Volatile is specificly designed to take into account things like this. It's for updates to packages, like anti-virus software, and similar things that change over time.

    Nobody actually reads the fucking articles do they? The guy that posted the article is a troll and selectively took quotes out of context.

    What SlashDot says:
    "Although a tzdata release that includes New Zealand's recent DST changes (2007f) has been out for some time, Debian are refusing to push the update from testing into the current stable distribution, codenamed Etch, on the basis that 'it's not a security bug.' This means that unless New Zealand sysadmins install the package manually, pull the package from testing, or alter the timezone to 'GMT-13' manually, all systems running Debian Etch in New Zealand currently have the incorrect time, as DST went into effect this morning. As one of the last comments in the bug report says, 'even Microsoft are not this silly.' The final comment (at this writing), from madcoder, says 'The package sits in volatile for months. Please take your troll elsewhere.'"

    What is actually in the Bug Report:
    ----SNIP----
    The fix is already in the volatile archive (see
    http://volatile.debian.org/ [debian.org] in the etch-proposed-update archive and it
    will also appear in the next release of etch. Alternatively you can also
    download the new version by hand and use dpkg -i.
    ----SNIP----

    ALSO:
    ----SNIP----
    >>> I would recommend re-opening this bug and upgrading its severity until the fix has been
    >>> applied.
    >> That won't change anything as it is now out of control of the glibc team.
    >>
    >
    > And these mission-critical updates aren't put into security, why?
    >

    Because it's not a security bug.
    ----SNIP----

    NO SHIT. It's _not_ a security bug. Why should the Debian Security team be forced to deal with something that is not security? Think about it for a whole two seconds.

    The tzdata was updated a long time ago and is in a Debian repository that is specificly setup to deal with changes like this.
    The person who filed the bug report doesn't like this and thinks that the package should be in the security fix repository.

    It's fucking stupid. It's not a security bug. The package has been fixed for a long time. It doesn't have to be installed manually. It CAN be installed manually.

    Get a grip people.

  • by Anonymous Coward on Sunday September 30, 2007 @09:00AM (#20800681)
    No. Interest is paid for durations, not points in time. The exact point in time at which interest is calculated is negligible, as long as the duration is calculated correctly, and that is a time-zone independent calculation: (b+t)-(a+t)=b-a.
  • by Aladrin ( 926209 ) on Sunday September 30, 2007 @09:08AM (#20800719)
    There have been studies that showed it doesn't really reduce energy usage. The only thing left is having more daylight for your picnics.

    http://www.google.com/search?client=opera&rls=en&q=daylight+savings+time+doesn't+save+energy&sourceid=opera&ie=utf-8&oe=utf-8 [google.com]
  • by Bloater ( 12932 ) on Sunday September 30, 2007 @09:23AM (#20800805) Homepage Journal
    > In this case: bling = my computer knowing what time it is.

    If you're running debian then it was apparently updated automatically ages ago. The article seems to be about a bug reported by somebody who chose to turn off updates except for security fixes. Naturally, then, they didn't get this update - they then asked for these things to be considered security bugs in future.

    I disagree with the bug reporter. Anywhere time is used in a security mechanism (and there are many) it should be using UTC or be robust against timesaving measures (eg, only be used for approximate deadlines to improve odds). In which case a timesaving change is not needed for security. Security bugs are therefore in the application not the time metadata (except adjustments to UTC which definitely *would* be security issues).

    In short - debian users' arses (and clocks) are covered just fine.
  • by fbjon ( 692006 ) on Sunday September 30, 2007 @09:24AM (#20800815) Homepage Journal
    You're right, it's not bleeding-edge but rather a volatile feature. Hence the fix is in volatile [debian.org], just like TFS says.


    It all sounds like a shitstorm in a chamber pot to me.

  • Re:WTF (Score:2, Informative)

    by fmaresca ( 739871 ) on Sunday September 30, 2007 @09:53AM (#20801029)
    Ubuntu, although Debian based, it's a completely different distro, and it's goal it's aimed at a different target. Ubuntu is capable of push updates/upgrades largely because the quality assurance is made upstream (in Debian itself).

    Basically, as a sysadmin you have at least five different options using Debian or Debian-derived distros:

    1) Stable (codename Etch): you are at the topline in terms of stability/security, although the packages here are not the latest upstream releases. You have to handmade some things now and then. Fixes and regular updates through security/updates and volatile. Aimed at production servers. Scheduled releases.
    2) Testing (codename Lenny): you are in middle land between top stability and latest releases. For some time now, security fixes are available in security/updates. May you have a develop system to test your things with the newer versions of software before they make into stable. Frequent updates.
    3) Unstable (codename Sid): latest versions from upstream, new packages. Aimed as a development/maintainers, sid has no security updates, so your in your own here. Most of the time is usable in day to day work as a desktop. Lots of updates every day. You will be busy apt-getting.
    4) Mixed system: you have the possibility to start from one of stable/testing/unstable and mix into it packages for other releases, getting specific versions of some packages and letting the rest of the system follow the default release version.
    5) Debian derived distro (like Ubuntu): may it have different targets, or narrowed ones, like desktop users, or some language speakers, or software collections and tools for specific disciplines, or any other purpose. If you're in any of these segments, may be you have to consider using one of them. Outside this segments, your best choice probably is one of the above. Also, different distros has different policies regarding updating, software included, versions and integration testings, so you must read their documentation carefully.

    So, if as a sysadmin you don't have time or knowledge to deal with this kind of things, and your choice was stable, you're plain wrong. Stable _is_ for sysadmins who knowns what are doing, and _do_ it.
    Now, if you're very busy, and have no time to cope with this sysadmin duties, may be you have to had choose Lenny (testing), because (although I'm not recommending it to production environments) it's perhaps the best trade off between stability/security (as mentioned above, has security updates) and newer upstream versions and ease of maintain. Tools like cron-apt exists to make your life easier if you're short of resources/time/IT people or you're lazzy.

    Regarding of the timeline in releases of Etch, this is how the world is. If the original report was filled near the end of the pointed release preparation, there was no chances of updating the package for _that_ release, so it will be included in the next one. So, this updated package is ready available in Lenny/Sid, but has to wait for the next Etch release to be available there, and this is why Ubuntu has it updated in a week _after_ Debian maintainers updated the package in Lenny/Sid. This is possible for Ubuntu because it has nothing like stable.

    Regarding other posts about how this kind of things (quality, security and stability control) are making difficult the wider adoption of GNU/Linux, please go and grab any other OS out there that fullfills your expectations in every aspect; we'll be here waiting for your comments about it.

  • by thegnu ( 557446 ) <thegnu@noSpam.gmail.com> on Sunday September 30, 2007 @10:06AM (#20801113) Journal

    I understand the reasoning behind putting it in volatile, but why not enable volatile by default during installation?

    Debian is considered the stable distribution. They move glacially slow, and are, if you use their stable repo, stable as hell. If you want bleeding edge by default, install their bleeding edge version.

    Otherwise, if you want Debian, install Debian.

    Oh, and in response to the even-Microsoft-would-not-be-so-foolish comment: Of course not. They demonstrated their level-headed thinking when they charged $4000 for a time zone update for Windows 2000. A server OS. When you can do it for free [slyck.com] if you know how. Debian should charge NZers $4000 Canadian (OUCH!), then they would be respected.
  • Re:My god! (Score:4, Informative)

    by swillden ( 191260 ) * <shawn-ds@willden.org> on Sunday September 30, 2007 @10:13AM (#20801165) Journal

    Or configure NTP.

    That won't address the issue at all. NTP makes sure the system clock is synchronized with UTC. The issue here is how much offset from UTC should be used for times that are displayed to users.

  • by DrYak ( 748999 ) on Sunday September 30, 2007 @10:20AM (#20801209) Homepage

    It's in volatile (where it should be)

    The whole FA is a big mis-understanding of what the various repositories are and what they purpose are.

    • stable - litteraly means stable, as in mountain rocks. Once a distribution hits this status, it normally shouldn't change a bit.
    • non-US - the USA have some pretty wierd laws concerning patents and cryptography. There are a lot of software that can be made available in the USA (because it infringes patent that can only exist in the USA system, or because it is a cryptographic software whose strengh is declared too high and considered as a weapon), but the same software can safely be used everywhere else in the world. non-US contains software that is as imuable as stable, but that is specifically banned in the USA.
    • updates or security - as it names implies, standart updates release for stable version of debian, only provide fixes to bugs that could be abused for exploits. All fixes retain the same exact version, only patching the hole (i.e.: firefox 2.0.0.1 isn't upgraded to firefox 2.0.0.6. Instead it's iceweasel 2.0.0.1-1 that is patched to 2.0.0.1-2 the exact same source code, except for the security fix). In the very unlikely case that after 3 fucking years of development in testing state, there is still a bug that prevents a program to start, the corrected version (same version just patched) will appear here.
    • volatile - this are packages that can change version, because their functionnality needs it. Virus scanning engine clamav is there for exemple (because to catch new threats, some times the engine it self needs to be updated, not only the signatures). Timezone goes there too (a computer won't be hacked with a bad timetable. therefore it's not in security)
    • volatile-sloppy - for non critical upgrades. Gaim/Pidgin goes there for exemple. It's not critical to the function of the computer, but never the less, IM network companies like microsoft regularily changes their protocoles just to break compatibility with 3rd party clients. Thus clients needs to be upgraded to newer versions from time to time. But because newer version MAY break some compatibility with older distribution, older config files, or old user scripts, it is separated from volatile.
    • backports - newer version of software, for those who constantly whine because Debian release are 3 years appart. Usually it's package from testing recompiled in stable environment
    • testing - This is much closer to what other distribution call a release. It has more up to date packages, but isn't completly bleeding edge, is somewhat stable. This will become the next stable once everyone in debian is happy and decide to definitely freeze it
    • vendors, like samba or 3rd parties maintain their own repositories with software compiled against stable, if you like updating your software to latest version.

    More information about voltile, at the corresponding debian site [debian.org].

    Debian is quite popular among some admins because of this. You know, once you install debian on a server, that your installation will still get critical security fixes for the next 3-4 years. But nothing else will change a bit. 0% chance that an upgrade may break your configuration file. 0% risks that all the scripts that you manually wrote will suddenly stop functionning because of subtle differences between version 1.8.6.9 and 1.8.6.10 in some obscure software. (which are things that could occasionally happen with other distribution ) NO dependency hell once you start using updated software (like a 3rd party repository targeting a library version 2.0.9, but the distro having updated to 2.0.11. Very rarely it can happen between openSUSE and packman).

    But as AC said in this thread, maybe the installation procedure of Debian should give

  • Comment removed (Score:4, Informative)

    by account_deleted ( 4530225 ) on Sunday September 30, 2007 @10:32AM (#20801273)
    Comment removed based on user account deletion
  • by johnw ( 3725 ) on Sunday September 30, 2007 @11:47AM (#20801779)

    All the commercial OSs release the update, yet someone that controls something that is non-profit decides he is right and everyone else is wrong. The reason the commercial OSs release it? Because people use it!
    You seem to have failed to read the article. The Debian people *have* released the necessary package ages ago, and it will be rolled into the next release of Etch. The OP's complaint is that they didn't put it in the security updates. Since it isn't a security update it would have been quite wrong to put it in the security updates.

    The complaint amounts to "You should have put it in the wrong place because I was looking in the wrong place and didn't find it." People who actually bother to think about what they're doing use Debian precisely *because* you can rely on them sticking to the rules.
  • by pherthyl ( 445706 ) on Sunday September 30, 2007 @12:24PM (#20802023)
    That's why I love it too. I really don't like the distributions where you get a big bunch of packages as a release, which you are then basically stuck with until the next release (at which point you have to upgrade and cross your fingers, or reinstall). Like Ubuntu, you get a whole ton of packages, and there are always a few that have a subtle bug. But since you're on one release, you don't get the fix until six months later (of course, you can install it separately, but it's a pain). With Debian, if an app is broken in some way, I get the fix as soon as that developer releases a new version, without affecting any other package.

    And it's really not that complicated to use. Even things like nvidia drivers are just a m-a autoinstall nvidia away. Sometimes it takes a while, but eventually I find Debian makes things like that very simple and integrated.
  • by HiThere ( 15173 ) <charleshixsn@@@earthlink...net> on Sunday September 30, 2007 @01:17PM (#20802379)
    This is the debian *STABLE* branch. In testing I imagine they would do it quickly...well, within a week.

    The point is, stable is supposed to be stable, and only changed for very good cause (which this is), and then only after considerable testing...which this hasn't had. An exception is made for security fixes because it's considered *necessary* to patch vulnerabilities. Otherwise, no. Even if you don't see how it could cause a problem, you don't include changes without considerable review and testing. That's what stable means.

    OTOH, if you choose to import it from another repository...it's your choice. And simple to do. (I'll grant that I don't understand the "volitile" response. The repositories I'm aware of are stable, testing, unstable, and experimental. Presumably volitile has something to do with the stable branch.)

    Given all that...I don't see how the timezone file could cause a problem, and I don't see why it should have set in the volitile repository for weeks. Perhaps nobody would test it before they needed it?
  • by julesh ( 229690 ) on Sunday September 30, 2007 @01:55PM (#20802619)
    "This update is not security-related"

    Yes, in fact, it is. Have you ever heard of log timestamps?


    If you are using log timestamps for security-sensitive applications, you really should be using UTC (or at least a timezone that doesn't have daylight saving changes), because otherwise you will get ambiguities cropping up: there is a one hour window every year for which the timestamps will repeat an hour later making it impossible in some circumstances to tell when exactly stamps left during these two hours occurred. This has substantially worse security consequences than merely not adjusting your clock for DST, which can always be corrected for later.

  • by novakreo ( 598689 ) on Sunday September 30, 2007 @02:09PM (#20802679) Homepage

    This means that unless New Zealand sysadmins install the package manually, pull the package from testing, or alter the timezone to 'GMT-13' manually
    I hope no one actually follows the summary's suggestion of manually setting GMT-13 as the timezone. Given that NZ is now GMT+13, you'd be 26 hours behind.
  • by cortana ( 588495 ) <sam@robots[ ]g.uk ['.or' in gap]> on Sunday September 30, 2007 @02:54PM (#20802991) Homepage
    There is no difference between what happened then and what is happening now. In both cases, the update is being rolled into the next point release of the stable distribution. Note that this has nothing to do with security updates.

    It is a shame that the updated tzdata package did not enter the Debian ("etch") 4.0r1 point release... I would welcome an explanation for why this was the case, but then again this is Slashdot, not LWN. :)
  • by ewen ( 218843 ) on Sunday September 30, 2007 @03:14PM (#20803085) Homepage

    The person who filed the bug report doesn't like this and thinks that the package should be in the security fix repository.

    FTR, actually that's not the case. Someone else who stumbled onto the problem near the last minute doesn't like the fact that it didn't go into the main repository or security repository. I -- the person who filed the original bug -- am perfectly happy with the fix going into the volatile archive, and patched the servers I manage months ago. (I think it's rather unfortunate it missed the 4.0r1 point release, and unfortunate (but understandable) that there's no patch for Debian Sarge ("oldstable"), but otherwise the situation seems to have been handled fine. For Debian Sarge it works okay to take the NZ or Pacific/Auckland timezone file from a patched Etch system and put it onto the Sarge system.)

    Ewen

  • by igb ( 28052 ) on Sunday September 30, 2007 @03:40PM (#20803285)
    Protocols mandate close synch of UTC. If they required clock-on-the-wall time to be synchronized then they wouldn't work across time zone boundaries. I manage a network with staff in six timezones, between UTC-8 and UTC+9, some of them with non-integer offsets, with (from memory) four different sets of DST rules, including one (Japan) that doesn't do daylight saving. I know about the timezones because I'm a clock geek sad enough to know the difference between UTC and GMT. But I don't need my systems to understand it (aside from shouting at bloody Apple for thinking BST, UTC+1, is called BDT). That's because everything that cares about timing (Clearcase, WebDAV, SVN, NFS, Make...) works in UTC.
  • by 26199 ( 577806 ) * on Sunday September 30, 2007 @03:51PM (#20803385) Homepage

    Actually it's correct. The POSIX standard specifies the timezones backwards.

    See, e.g.: http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=4813746 [sun.com]

    Clever, eh?

  • by xenocide2 ( 231786 ) on Sunday September 30, 2007 @05:47PM (#20804127) Homepage
    Have you actually used Debian testing? Or Debian at all? I admit it's a complex beast, and gotten more complex since I left, as this whole article revolves around a misunderstanding between sysadmins and developers. New packages start off in unstable (or experimental if the uploader thinks it's too buggy to consider for regular use), and if, after ten days without a major bug report, the package is placed in testing. Unstable is a rocky ride, but so many people use it that most developers are highly concerned about regressions like tab completion core dumping. So much so that during one cycle the DPL announced an unstable freeze until the new stable was released.

    This misunderstanding about timezones is based on where changes go. Security updates to packages in stable go to the "security" repo. Things like clamav definitions change on a regular basis and reside in volatile. This particular repo is news to me, but I don't admin Debian boxes. The developers believe the update should belong in volatile and not security. That is all. Stable remains stable.
  • by petermgreen ( 876956 ) <plugwash.p10link@net> on Sunday September 30, 2007 @09:10PM (#20805367) Homepage
    the sensationalist /. summary asside lets get some facts.

    it is not a security update so it doesn't go in the security repositry
    it is already in the volatile repositry
    it is already in etch-pryoposed-updates which means it will probablly be in the next point release of etch

    pushing a point release of stable is not something that has been taken lighly, lots of CDs to build and push out to mirrors, lots and lots of testing.

    Sure the US changes got better treatment, how much of that was luck and how much of it was being one of the largest (in terms of computer using population) countries arround is hard to tell.

    If you can't live with the way debian stable releases work choose another distro. If you can't manage your IT infrastructure such that deploying local patches is not unreasonably difficult fire your IT staff.

The use of money is all the advantage there is to having money. -- B. Franklin

Working...