lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 20 Jun 2007 22:30:35 -0700 (PDT)
From:	david@...g.hm
To:	Alexandre Oliva <aoliva@...hat.com>
cc:	Andrew McKay <amckay@...rs.ca>,
	Alan Cox <alan@...rguk.ukuu.org.uk>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Al Viro <viro@....linux.org.uk>,
	Bernd Schmidt <bernds_cb1@...nline.de>,
	Ingo Molnar <mingo@...e.hu>,
	Daniel Hazelton <dhazelton@...er.net>,
	Greg KH <greg@...ah.com>,
	debian developer <debiandev@...il.com>,
	Tarkan Erimer <tarkan@...one.net.tr>,
	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: Dual-Licensing Linux Kernel with GPL V2 and GPL V3

On Thu, 21 Jun 2007, Alexandre Oliva wrote:

> On Jun 20, 2007, david@...g.hm wrote:
>
>> On Wed, 20 Jun 2007, Alexandre Oliva wrote:
>>> Subject: Re: Dual-Licensing Linux Kernel with GPL V2 and GPL V3
>>>
>>> On Jun 20, 2007, Andrew McKay <amckay@...rs.ca> wrote:
>>>
>>>> However, I don't see how this would ever require a company like Tivo
>>>> or Mastercard to have their networks play nice with a unit that has
>>>> been modified by the end user, potentially opening up some serious
>>>> security holes.
>>>
>>> Which is why the GPLv3 doesn't make the requirement that you stated.
>
>> so if the BIOS checked the checksum of the boot image and if it found
>> it wasn't correct would disable the video input hardware but let you
>> boot the system otherwise it would be acceptable to you and the GPLv3?
>
> I don't think so, but IANAL.  What do you think?  Here's what I
> think to be the relevant passages.
>
>  [...] The information must suffice to ensure that the continued
>  functioning of the modified object code is in no case prevented or
>  interfered with solely because modification has been made.
>
>  [...]
>
>  The requirement to provide Installation Information does not include
>  a requirement to continue to provide support service, warranty, or
>  updates for a work that has been modified or installed by the
>  recipient, or for the User Product in which it has been modified or
>  installed.  Network access may be denied when the modification
>  itself materially and adversely affects the operation of the network
>  or violates the rules and protocols for communication across the
>  network.

Ok, so if refusing to run software that's tampered with isn't acceptable, 
and disabling the hardware that would be needed to talk on the network 
isn't acceptable. how exactly can they prevent a system that's been 
tampered with from accessing their network? (something even you say they 
have a right to do)

asking a device that's running software that you haven't verified to give 
you a checksum of itself isn't going to work becouse the software can just 
lie to you.

you claim they have this right, but then claim to prohibit every possible 
method of them excercising that right.

pick one side or the other, you don't get both.

David Lang
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ