lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Sun, 7 Dec 2008 08:55:42 +0100
From:	Pavel Machek <pavel@...e.cz>
To:	devzero@....de
Cc:	linux-kernel@...r.kernel.org
Subject: Re: odd habits with binary blobs.....

On Wed 2008-12-03 22:40:51, devzero@....de wrote:
> hello, 
> 
> i gave r1soft`s new/free "hot copy" a try today and .... failed:
> 
> vserver2:/tmp/usr/sbin # ./hcp-setup
> Gathering kernel information
> Gathering kernel information complete.
> Error: A network error occurred connecting to 'kmod32.r1soft.com'
> 
> what a pain....trying to setup a linux kernel module, the installer wants to phone home - and fails.
> 
> but it`s even worse - http://wiki.r1soft.com/display/LTR1D/hcp-setup tells:
> 
> BUILDING HOT COPY DRIVER FROM SOURCE
> 
> hcp-setup will tar up your kernel source tree or headers and upload them to an R1Soft build server over HTTPS using XML-RPC. Once your system's kernel headers or source have been uploaded the R1Soft build server will compile a Hot Copy device driver as a kernel module and hcp-setup will automatically download it to your system.
> 
> In order for hcp-setup to work your Linux server must have HTTPS Internet access to kmod32.r1soft.com (32-bit systems) and kmod64.r1soft.com (64-bit systems)
> 
> 
> how weird is THAT?
> 
> did anybody ever come across such "build binary blobs remotely" system ?
> 
> 
> ok, disqualified.  won`t touch it again, as i also don`t know what REALLY is transferred to the vendor - but i wonder what kernel devs think about such build system and what in-kernel alternative exists for this. (i think it doesn`t exist - but maybe somebody working on that ?)
> 

Hmm. Gcc was not really designed to prevent .c source from exploiting
it.

So I guess you could have some phun :-).

									Pavel
-- 
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ