[MIR] inetutils-telnet
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
inetutils (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
netkit-telnet-ssl (Ubuntu) |
New
|
Undecided
|
Ubuntu Foundations Bugs |
Bug Description
Dear reviewers, this is my first MIR. I answered all questions very
carefully, but if something feels wrong, please look extra closely or
ask me (~dviererbe) to reinvestigate a given answer.
[Availability]
The package inetutils-telnet is already in Ubuntu universe.
The package inetutils-telnet build for the architectures it is designed to work on.
It currently builds and works for architetcures: amd64, arm64, armhf, i386, ppc64el, riscv64, s390x
Link to package [[https:/
[Rationale]
The package inetutils-telnet is required in Ubuntu main:
- The package inetutils-telnet will not generally be useful for a large part of
our user base, but is important/helpful still because it is commonly used for
network diagnostics, like protocol testing of SMTP services.
- Additionally telnet is still used for legacy industrial and scientific
equipment.
- Package inetutils-telnet covers similar use cases as netkit-telnet, but
is better because netkit-telnet has been dropped altogether from Debian,
thereby we want to replace it.
- The package inetutils-telnet is required in Ubuntu main no later than
April 13th 2023 due to the Ubuntu 23.04 Lunar Lobster release date.
[Security]
- Had security issues in the past:
- CVE-2019-0053 (needs triage)
- https:/
- most likely not relevant:
- CVE-2022-39028 (only related to telnetd)
- https:/
- https:/
- CVE-2020-10188 (related to netcat):
- https:/
- https:/
- CVE-2011-4862 (related to telnetd; not sure if relevant anymore)
- https:/
- https:/
- security issues were patched or reached end of life
- no `suid` or `sgid` binaries
- no executables in `/sbin` and `/usr/sbin`
- Package does not install services, timers or recurring jobs
- Packages does not open privileged ports (ports < 1024)
- Packages does not contain extensions to security-sensitive software
(filters, scanners, plugins, UI skins, ...)
- See list of files for:
- amd64: https:/
- arm64: https:/
- armhf: https:/
- i386: https:/
- ppc64el: https:/
- s390x: https:/
[Quality assurance - function/usage]
- The package works well right after install
[Quality assurance - maintenance]
- The package is maintained well in Debian/
not have too many, long-term & critical, open bugs
- Ubuntu https:/
- Debian https:/
- Upstream-Homepage: https:/
- Upstream-
- The package does not deal with exotic hardware we cannot support
[Quality assurance - testing]
- The package runs a test suite on build time, if it fails
it makes the build fail
- The package runs an autopkgtest, and its builds are currently passing on
amd64, arm64, armhf, i386, ppc64el, riscv64, s390x
- link to builds (logs can be accessed through the web UI)
https:/
- Link to autopkgtests https:/
- The package does have failing autopkgtests tests right now, but they
allways fail (See: https:/
This is okay because the failure occures at the inetutils-ping package.
The Foundations Team is working on a fix.
[Quality assurance - packaging]
- debian/watch is present and works
- debian/control defines a correct Maintainer field
- This package does not yield massive lintian Warnings, Errors
- Recent build log of inetutils: https:/
- Full output of `lintian --pedantic` is attached as an extra post to this bug.
- A lintian overrides is present, but ok because it is unused
- The lintian Error 'inetutils changes: bad-distributio
emitted in the build log, this is because the debian/changelog file
specifies 'unstable' as distribution.
- This package does not rely on obsolete or about to be demoted packages.
(The dependencies had recent updates and I could not find any open bug
ticket that indicates a upcoming demotion)
- This package has no python2 or GTK2 dependencies
- The package will be installed by default, but does not ask debconf
questions
- Packaging and build is easy, link to debian/rules: https:/
- There is still the complication that building/testing inetutils-telnet
can fail because of other inetutils-* packages.
[UI standards]
- Application is not end-user facing (does not need translation)
- End-user applications without desktop file, not needed because it is a
command line tool for sysadmins
[Dependencies]
- No further depends or recommends dependencies that are not yet in main
[Standards compliance]
- This package correctly follows FHS and Debian Policy
[Maintenance/Owner]
- Owning Team will be Ubuntu Foundations
- Ubuntu Foundations Bugs is already subscribed to the package
- This does not use static builds
- This does not use vendored code
- This package is not rust based
[Background information]
- The Package description explains the package well
- Debian transitioned its default `telnet` client from netkit-telnet to
inetutils-
having ubuntu-standard Recommend `netkit-telnet` instead of `telnet`.
But now, netkit-telnet has been dropped altogether from Debian and
process-removals is prompting us to also delete it from lunar.
(See: https:/
- other binary packages from this inetutils might be brought into main
accidentally, or even intentionally but with limited oversight, in the future.
- mixed main/universe is a foreign concept to users
Seeded in lunar.standard as a replacement for netkit-telnet:
https:/
Related branches
- Steve Langasek: Approve
-
Diff: 54 lines (+38/-0)2 files modifiedserver (+19/-0)
server-minimal (+19/-0)
- Steve Langasek: Approve
-
Diff: 54 lines (+38/-0)2 files modifieddesktop-common (+19/-0)
standard (+19/-0)
tags: | removed: rls-ll-incoming |
description: | updated |
Changed in inetutils (Ubuntu): | |
assignee: | nobody → Ioanna Alifieraki (joalif) |
tags: | added: sec-1893 |
Changed in netkit-telnet-ssl (Ubuntu): | |
assignee: | nobody → Ubuntu Foundations Bugs (foundations-bugs) |
tags: | added: rls-mm-incoming |
Changed in inetutils (Ubuntu): | |
status: | Incomplete → Fix Released |
Please, lets drop telnet from main rather than bring in rexecd, rcp, rsh, rshd, rlogin, tftp, tftpd, inetd, whois, talkd, talk, etc. A single telnet client is one thing; a dozen tools, many servers ,is entirely something else.
nc -t claims to support some portion of the telnet protocol:
-t Send RFC 854 DON'T and WON'T responses to RFC 854 DO
and WILL requests. This makes it possible to use nc to
script telnet sessions.
Would this be sufficient?
Thanks