[Bug 2008789] Re: [MIR] inetutils

Mark Esler 2008789 at bugs.launchpad.net
Tue Mar 28 19:34:56 UTC 2023


It appears that Debian dropped netkit-telnet for netkit-telnet-ssl.

https://packages.debian.org/sid/telnet-ssl

> SSL telnet replaces normal telnet using SSL authentication and
encryption. It interoperates with normal telnetd in both directions. It
checks if the other side is also talking SSL, if not it falls back to
normal telnet protocol.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to inetutils in Ubuntu.
https://bugs.launchpad.net/bugs/2008789

Title:
  [MIR] inetutils

Status in inetutils package in Ubuntu:
  New

Bug description:
  Dear reviewers, this is my first MIR. I answered all questions very
  carefully, but if something feels wrong, please look extra closely or
  ask me (~dviererbe) to reinvestigate a given answer.

  [Availability]
  The package inetutils-telnet is already in Ubuntu universe.
  The package inetutils-telnet build for the architectures it is designed to work on.
  It currently builds and works for architetcures: amd64, arm64, armhf, i386, ppc64el, riscv64, s390x
  Link to package [[https://launchpad.net/ubuntu/+source/inetutils|inetutils]]

  [Rationale]
   The package inetutils-telnet is required in Ubuntu main:
   - The package inetutils-telnet will not generally be useful for a large part of
     our user base, but is important/helpful still because it is commonly used for
     network diagnostics, like protocol testing of SMTP services.
   - Additionally telnet is still used for legacy industrial and scientific
     equipment.
   - Package inetutils-telnet covers similar use cases as netkit-telnet, but
     is better because netkit-telnet has been dropped altogether from Debian,
     thereby we want to replace it.

   - The package inetutils-telnet is required in Ubuntu main no later than
     April 13th 2023 due to the Ubuntu 23.04 Lunar Lobster release date.

  [Security]
   - Had security issues in the past:
     - CVE-2019-0053 (needs triage)
       - https://ubuntu.com/security/CVE-2019-0053
     - most likely not relevant:
       - CVE-2022-39028 (only related to telnetd)
         - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39028
         - https://ubuntu.com/security/CVE-2022-39028
       - CVE-2020-10188 (related to netcat):
         - https://www.openwall.com/lists/oss-security/2018/12/13/2
         - https://www.openwall.com/lists/oss-security/2018/12/14/8
       - CVE-2011-4862 (related to telnetd; not sure if relevant anymore)
         - https://ubuntu.com/security/CVE-2011-4862
         - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862
     - security issues were patched or reached end of life

   - no `suid` or `sgid` binaries
   - no executables in `/sbin` and `/usr/sbin`
   - Package does not install services, timers or recurring jobs
   - Packages does not open privileged ports (ports < 1024)
   - Packages does not contain extensions to security-sensitive software
     (filters, scanners, plugins, UI skins, ...)
   - See list of files for:
     - amd64: https://packages.ubuntu.com/lunar/amd64/inetutils-telnet/filelist
     - arm64: https://packages.ubuntu.com/lunar/arm64/inetutils-telnet/filelist
     - armhf: https://packages.ubuntu.com/lunar/armhf/inetutils-telnet/filelist
     - i386: https://packages.ubuntu.com/lunar/i386/inetutils-telnet/filelist
     - ppc64el: https://packages.ubuntu.com/lunar/ppc64el/inetutils-telnet/filelist
     - s390x: https://packages.ubuntu.com/lunar/s390x/inetutils-telnet/filelist

  [Quality assurance - function/usage]
   - The package works well right after install

  [Quality assurance - maintenance]
   - The package is maintained well in Debian/Ubuntu/Upstream and does
     not have too many, long-term & critical, open bugs
     - Ubuntu https://bugs.launchpad.net/ubuntu/+source/inetutils/+bug
     - Debian https://bugs.debian.org/cgi-bin/pkgreport.cgi?src=inetutils
     - Upstream-Homepage: https://www.gnu.org/software/inetutils/
     - Upstream-Bugtracker: https://lists.gnu.org/archive/html/bug-inetutils/
   - The package does not deal with exotic hardware we cannot support

  [Quality assurance - testing]
   - The package runs a test suite on build time, if it fails
     it makes the build fail

   - The package runs an autopkgtest, and its builds are currently passing on
     amd64, arm64, armhf, i386, ppc64el, riscv64, s390x
   - link to builds (logs can be accessed through the web UI)
     https://launchpad.net/ubuntu/lunar/+builds?build_text=inetutils&build_state=built&arch_tag=all
   - Link to autopkgtests https://autopkgtest.ubuntu.com/packages/i/inetutils

   - The package does have failing autopkgtests tests right now, but they
     allways fail (See: https://bugs.launchpad.net/ubuntu/+source/inetutils/+bug/2009814)
     This is okay because the failure occures at the inetutils-ping package.
     The Foundations Team is working on a fix.

  [Quality assurance - packaging]
   - debian/watch is present and works
   - debian/control defines a correct Maintainer field

   - This package does not yield massive lintian Warnings, Errors
   - Recent build log of inetutils: https://launchpad.net/ubuntu/lunar/+builds?build_text=inetutils&build_state=all&arch_tag=all
   - Full output of `lintian --pedantic` is attached as an extra post to this bug.
   - A lintian overrides is present, but ok because it is unused
   - The lintian Error 'inetutils changes: bad-distribution-in-changes-file lunar-amd64'
     emitted in the build log, this is because the debian/changelog file
     specifies 'unstable' as distribution.

   - This package does not rely on obsolete or about to be demoted packages.
     (The dependencies had recent updates and I could not find any open bug
     ticket that indicates a upcoming demotion)
   - This package has no python2 or GTK2 dependencies

   - The package will be installed by default, but does not ask debconf
     questions

   - Packaging and build is easy, link to debian/rules: https://git.launchpad.net/ubuntu/+source/inetutils/tree/debian/control
   - There is still the complication that building/testing inetutils-telnet
     can fail because of other inetutils-* packages.

  [UI standards]
    - Application is not end-user facing (does not need translation)
    - End-user applications without desktop file, not needed because it is a
      command line tool for sysadmins

  [Dependencies]
   - No further depends or recommends dependencies that are not yet in main

  [Standards compliance]
   - This package correctly follows FHS and Debian Policy

  [Maintenance/Owner]
   - Owning Team will be Ubuntu Foundations
   - Ubuntu Foundations Bugs is already subscribed to the package

   - This does not use static builds
   - This does not use vendored code
   - This package is not rust based

  [Background information]
   - The Package description explains the package well
   - Debian transitioned its default `telnet` client from netkit-telnet to
     inetutils-telnet. This transition was postponed in Ubuntu for kinetic by
     having ubuntu-standard Recommend `netkit-telnet` instead of `telnet`.
     But now, netkit-telnet has been dropped altogether from Debian and
     process-removals is prompting us to also delete it from lunar.
     (See: https://packages.debian.org/bookworm/telnet)
   - other binary packages from this inetutils might be brought into main
     accidentally, or even intentionally but with limited oversight, in the future.
   - mixed main/universe is a foreign concept to users

  Seeded in lunar.standard as a replacement for netkit-telnet:
  https://git.launchpad.net/~ubuntu-core-dev/ubuntu-seeds/+git/platform/commit/?h=lunar&id=349619dc49fdd0695c0bd7f9ae72f535809c2657

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/inetutils/+bug/2008789/+subscriptions




More information about the foundations-bugs mailing list