Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1300377imu; Wed, 23 Jan 2019 14:29:10 -0800 (PST) X-Google-Smtp-Source: ALg8bN5e7HJ+tlSLtpyCq4TJz0u4jT3z6kGZVSAGzT4NdOLmiSzve0u7hiHbRvT/Ywos8htooWZV X-Received: by 2002:a17:902:7443:: with SMTP id e3mr4108767plt.304.1548282550633; Wed, 23 Jan 2019 14:29:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548282550; cv=none; d=google.com; s=arc-20160816; b=VASz6+4JZymNmfW4uX7YUo4UCN9GLQNq03WeEAs6Pdy0/tMv1gtB9i4FsDOhol/WV3 mzPqJJt1slbNujH7WPm/k85b7x2CF//pGm5Pk5PKd2RwsV96lusULY+23gh38kKFTZgY eXnBpL3L/0O+z9d+cdi/wqHvsxyK5ctOoalpO0kyEGuINwT53ENJDeD0P2jNUZmvE0ZH yX+wRnsXtV3so7WjjsvLRr5eX8LQrd5cpuCQcmq3DT4EXyJxfJQvGtVQ9sVwXv5+v8sI FCpVZqhF9GtTPWMpj8hdvpTbYVoYmqPnJXqYPWGou/LHiOJigq9pWIKiEbkDLxiS/2wf RxjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:references :in-reply-to:subject:cc:to:from:date:content-transfer-encoding :dkim-signature:mime-version; bh=rXbCnKjdh20XjB75m/PwRZHQPOoJt/qEpiUPNreVhSQ=; b=vJ9941AMmOqlnNpnbvlU1RbKZzrwXrSVafx6O60CkOAdssYgc+SGKobVKDV8usTTNM 5LE4vqY4+R0K2hlOk6J5vT1qfssiAEGSTAID4g2IibfF2KwDv/7mnwMXhJmnIvowljM/ Pgt0Yri2AzYIARe6DKDD3oxX0nCvAIYylOOg11esBqBrR+dg8X5eUyp1SI1xGf14Ti9C HGyQHmelooYkwdu/ydVeh3M8YjVHeKqg8UpTrSP9eILRjriizY/L4UBKbcRGDWWO2VV4 DQIlYMZP4NX5z7e5EQ1cF6KfjTU/psoPxMLCbLotbOafKM8lOmxQXnSFhXZmaZBBbTl8 EUkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redchan.it header.s=mail header.b="jaJiztQ/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v141si20788935pfc.260.2019.01.23.14.28.54; Wed, 23 Jan 2019 14:29:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redchan.it header.s=mail header.b="jaJiztQ/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726744AbfAWW2t (ORCPT + 99 others); Wed, 23 Jan 2019 17:28:49 -0500 Received: from cock.li ([185.100.85.212]:38808 "EHLO cock.li" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726152AbfAWW2t (ORCPT ); Wed, 23 Jan 2019 17:28:49 -0500 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on cock.li X-Spam-Level: X-Spam-Status: No, score=0.7 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,NO_RECEIVED,NO_RELAYS shortcircuit=_SCTYPE_ autolearn=disabled version=3.4.2 MIME-Version: 1.0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=redchan.it; s=mail; t=1548282525; bh=yf/+IV/vn7/J86Ya2sqUAAyKoDrcBK4L9VNRaNJVFJo=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=jaJiztQ/YPoH/VbDXLgOXuSF20eDTjNzQQ71V18eTq373gOBLQlWxJ/1zPYCgwBH4 TeQA5zFUCdgO3fUop5RVJ5oN4563t1oHebCdWv55O7DNZZdX753Py6bexpvT/DJQxO 3cqJsqMq6U9Bii8u6IpisfcqL8J9278mG/EpwENiWzaoBE4HO07v5fgbyQdAt1HYSN 9CgaaGxxcOKUyAUpUSRWWvdd6rzWt1EH6gDJhpXPnaSzphkUiraA99OIjhwPmJJ/gR PV0eSYnCPx4hw6rcPtieo37ZPaNQ9sOJGjWp11eGrk4smT13ehhe4ETt9yZoBEZXPk uxAXXi9Ru0W4w== Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Wed, 23 Jan 2019 22:28:45 +0000 From: linuxgpletc@redchan.it To: Ivan Ivanov Cc: Linux Kernel Mailing List , freebsd-chat@freebsd.org, misc@openbsd.org, gentoo-user@lists.gentoo.org, rms@gnu.org, esr@thyrsus.com Subject: Re: GRSec is vital to Linux security In-Reply-To: References: Message-ID: <28315c204184b212a3a60cdd393c3fd3@redchan.it> X-Sender: linuxgpletc@redchan.it User-Agent: Roundcube Webmail/1.3.6 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019-01-23 20:46, Ivan Ivanov wrote: > Interesting point of view. Well, to be honest it seems to me that > Linux kernel sacrifices the security for the sake of progress, so it > is quite bloated at the moment and I am not sure that even GRSecurity > could fix it. Linux really needs to stop adding new features and > refactor itself to a smaller and more secure codebase before going > forward. Maybe 1 year break would be nice. This man speaks the truth. The constant flux reintroduces long-fixed bugs, like a constant inflowing tide. The code can never be stabilized due to the endless needless work of the worker-bee wage-slaves. Thus the code always has new hidden security errors. GRSecurity can barely keep up. A "feature" of the wage-slave era of Linux, that we did not have in the Hacker era of Linux (the people targeted by the CoC, who actually created the land where the wage-slave code churners now graze) "Free" workers from for-profit and government connected enterprises do not come with no-strings-attached, and the enterprises are not stupid: they refactor to get their way if an initial strategy isn't working. The only real flux of any significant magnitude that should occur is with the addition of new drivers. Instead code is ripped out and replaced everywhere for little to no real gain. That being said... GRSecurity's GPL violation is the most blatant upfront violation of the GPL I've ever seen (they put it in writing and don't try to hide it (you redistribute, we punish you)). They also do not deal with small businesses or people who would like to purchase a "license" from them. Only large businesses and government contracts. They're afraid that a small company would pay for 1 server "license" and then release the code, I think. Some people wonder why hasn't anyone penetrated their Download server and stolen the code back and released it? Maybe because GRSecurity knows what they're doing. If it were hosted on a vanilla linux server, it would be out by now. Remember: it's been well over a year. Not one leak of the code, not one penetration, nothing. They know how to secure a linux machine. Linus does not. He just allows endless useless flux, barely manages the project, places it all in the hands of the wage-slaves (who simply do their job for their company, not for the betterment of the thing (no passion)) and ousts the old Hackers who built the thing with Linus from the ground up originally. Legal action could be taken to stop GrSecurity's blatant violation; one could atleast sue for the profits. It is a non-seperable work, they are violating the "no additional restrictions" rule, in writing. They violated the copyright - it's as simple as that in the end. No one does a thing. Ofcourse the wage-slaves do not: they don't own their own code and don't have agency even over their own lives anyway. Their bosses could do something though, the companies that own the wage-slave's code. The Hackers, who's code still resides in the linux kernel AND/OR who's code was a predecessor of current code (even if it is not the same as their original code) also have standing. Nothing is done. It's as if the GPL is just worthless trash. It has not stopped GRSecurity from closing their derivative work of the kernel and threatening anyone who would redistribute the non-separable derivative work. They just laugh at Linus, the Hackers, and especially the wage-slaves. Didn't someone once say "Linux will be free forever" (hint: Lawrence Rosen). A piece of Linux isn't now... It hasn't panned out in reality.