From nobody Fri Dec 20 14:56:55 2024 X-Original-To: freebsd-arch@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YF9Vn610yz5Mflq for ; Fri, 20 Dec 2024 14:57:05 +0000 (UTC) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: from gndrsh.dnsmgr.net (pdx.rh.CN85.dnsmgr.net [65.75.216.6]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4YF9Vm5y4Tz4pRF; Fri, 20 Dec 2024 14:57:04 +0000 (UTC) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of freebsd-rwg@gndrsh.dnsmgr.net designates 65.75.216.6 as permitted sender) smtp.mailfrom=freebsd-rwg@gndrsh.dnsmgr.net; dmarc=pass (policy=none) header.from=gndrsh.dnsmgr.net Received: from gndrsh.dnsmgr.net (localhost [127.0.0.1]) by gndrsh.dnsmgr.net (8.13.3/8.13.3) with ESMTP id 4BKEutqU037181; Fri, 20 Dec 2024 06:56:55 -0800 (PST) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: (from freebsd-rwg@localhost) by gndrsh.dnsmgr.net (8.13.3/8.13.3/Submit) id 4BKEutl3037180; Fri, 20 Dec 2024 06:56:55 -0800 (PST) (envelope-from freebsd-rwg) From: "Rodney W. Grimes" Message-Id: <202412201456.4BKEutl3037180@gndrsh.dnsmgr.net> Subject: Re: Removing shar(1) In-Reply-To: To: Kyle Evans Date: Fri, 20 Dec 2024 06:56:55 -0800 (PST) CC: Robert Clausecker , freebsd-arch@FreeBSD.org X-Mailer: ELM [version 2.4ME+ PL121h (25)] List-Id: Discussion related to FreeBSD architecture List-Archive: https://lists.freebsd.org/archives/freebsd-arch List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-arch@FreeBSD.org MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII X-Spamd-Result: default: False [-2.53 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-0.996]; NEURAL_HAM_LONG(-0.97)[-0.966]; DMARC_POLICY_ALLOW(-0.50)[gndrsh.dnsmgr.net,none]; NEURAL_SPAM_SHORT(0.23)[0.232]; R_SPF_ALLOW(-0.20)[+ip4:65.75.216.0/23]; MIME_GOOD(-0.10)[text/plain]; MIME_TRACE(0.00)[0:+]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; ASN(0.00)[asn:10494, ipnet:65.75.216.0/23, country:US]; R_DKIM_NA(0.00)[]; MLMMJ_DEST(0.00)[freebsd-arch@FreeBSD.org]; RCVD_TLS_LAST(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCPT_COUNT_THREE(0.00)[3] X-Rspamd-Queue-Id: 4YF9Vm5y4Tz4pRF X-Spamd-Bar: -- > On 12/18/24 05:04, Robert Clausecker wrote: > > Hi Kyle, > > > > With shar no longer being recommended for the submission of new ports, > > I see no objection to removing this feature. However, tar(1) should > > keep the functionality. > > > > I make no proposal to remove it from tar- that'd be really annoying > after recommending people use tar(1) instead both here and in the patch > below. Isnt this a bit oxy-moronic? Remove shar, yet point people to the exact same behavior in another binary shipped with the system? Your basically leaving the foot shooting neck hanging rope in the system and doing zip to remove the fact this fucntionality should NOT be removed. Your basically breaking things without any increase in security. FIRM NO here. > > > We should consider replacing shar(1) by an implementation that just calls > > into tar(1) to do its job. > > > > Strongly prefer not to if we can avoid it (I'm not seeing any arguments > that we really need it to be a first-class citizen); I view that as > promoting functionality that we shouldn't be encouraging, along with > providing a manpage. Basically your just making it inconvinvient to get to the rope for those that do know how to not hang themselves. -- Rod Grimes rgrimes@freebsd.org