Re: Sponsoring a Tails hackfest?
Steve Langasek wrote (04 May 2014 08:27:44 GMT) :
> But since it's a derivative rather than a pure blend, how do we know
> that in /this/ case, the work at the sprint is going to
> benefit Debian?
With my Debian developer hat on, I thank you very much for asking this
Actually, nothing guarantees that *any* sponsored sprint is going to
benefit Debian. The people organizing a sprint state "we'll work on
$blah", we make sure that $blah would benefit Debian, and then we
trust them to do what they committed to, and finally we check their
report and are happy that so much good work was done :)
In the case at hand, all what Tails can say is "we're going to work on
Tails". I agree there is definitely an important stretch from this
statement, to trusting it will benefit Debian... at least for anyone
not familiar of the Tails project's track record withing Debian, and
the challenges it faces.
I'll try, with my Tails developer hat on, to provide some insight that
might help addressing this trust matter. I think there are three
aspects to this question.
First, we (Tails contributors) are doing as much as we reasonably can
directly within Debian for ethical reasons. We simply think it's the
right thing to do. But I agree that all this good will is not a good
enough reason to trust that a Tails hackfest + summit will
Second, as well-informed people have mentioned a few times in this
thread already, our track record on this topic is pretty good. A Tails
hackfest + summit will benefit Debian because our past work has very
often been done in a way that did, and I see no reason why this time
would be an exception.
Third, this is not only a matter of being nice, willing to give back,
and loving Debian (hint: we are * 3). It's also a simple matter of
necessity for the Tails project. Even if we could financially afford
hiring a dozen new skilled contributors (hint: we cannot) to create
and maintain a large delta (and then, optionally, boast about the
added value our product provides compared to Debian), our current
project (organizational, social) structure would not handle it.
I don't think we can reasonably change this structure radically any
time soon, and we have no plans to even try. So, we *have to* not only
work close to Debian, but simply, many times, *within* Debian.
I believe the two last points should be enough to trust that a Tails
hackfest + summit will benefit Debian in some way.
> The website has a very admirable statement about minimizing the
> delta with Debian, but is the size of this delta published and
> tracked anywhere?
Not really. Taking the upcoming 1.1 release as a basis, our delta is
1. Six packages for Tails-specific software (liveusb-creator,
tails-greeter, tails-iuk, tails-perl5lib, tails-persistence-setup
2. Three packages that are not really Tails-specific, but that can
probably never be uploaded to Debian for legal reasons.
3. Four modified packages:
- dbus-python: we should definitely report a bug upstream about why
and how we patch it, and how. That's a failure on our side.
- iceweasel: we add the Tor Browser's patchset. Previous attempts
to work within Debian to have this packaged have failed.
- tor: backport of 2 or 3 upstream patches that are important for
us; will disappear once upstream 0.2.4.22 is out.
- vidalia: we patch it to hide some parts of the UI that are
useless, or harmful, in the context of Tails. Our attempt at
finding someone to add configuration settings to do the same
failed (we found someone, signed a contract, and then they
disappeared). This piece of software has no active upstream
anymore, which does not help.
4. One package (torbutton) that was removed from Debian for good
reasons (needs a browser with Tor Browser's patchset applied), but
is definitely needed in Tails.
5. Six backports that would be a huge pain to properly maintain in
wheezy-backports, as discussed with the Debian Haskell team:
haskell-cmdargs, haskell-data-pprint, haskell-hledger,
haskell-hledger-lib, haskell-pretty-show, and haskell-tabular.
6. Our (quite large) live-build configuration tree, that includes
mainly configuration files and scripts to modify the system.
Some bits of it could be upstream'd relatively easily if there is
demand. But the major bits (e.g. torified DNS resolution) are
basically impossible to add to a general purpose distribution like
Debian, in any way that would be useful and not dangerous, because
it is very hard to guarantee anything when the system administrator
can install any combination among 30k packages, that may suddenly
start breaking what our stuff achieves, and we want to avoid
providing wrong feelings of security.
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc