lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 31 Jul 2006 18:13:01 +0200
From:	Thomas Ilnseher <illth@....de>
To:	linux-kernel@...r.kernel.org
Subject: GPL violation

Hello.

I wanted to inform you about a possible linux kernel GPL violation.

I have bought an ALLNET ALL6250  Network Attached Storage device
some months ago. This device is obviously linux based.

Some days ago, they released the "sources". (do not trust the dates on 
their homepage!)

they can be found here:

http://www.allnet.de/ftp/pub/allnet/nas/all6250/

the files in charge are :

ALL6250_GPL.tgz <http://www.allnet.de/ftp/pub/allnet/nas/all6250/ALL6250_GPL.tgz>  
and
ALL6250_GPL_V1.10.tgz <http://www.allnet.de/ftp/pub/allnet/nas/all6250/ALL6250_GPL_V1.10.tgz>


they both contain a vanilla (!) 2.4.24 kernel archive:

tom:~/NAS/sources> diff -uNr linux-2.4.24/ ALT/NH230/linux-2.4.24/
tom:~/NAS/sources>


where linux-2.4.24 is the vanilla 2.4.24 kernel tree from www.kernel.org.


However, i have managed to get some shell access to that device, and get 
it's dmesg output
(attached to this mail).

this clearly shows that:
the firmware is based upon 2.4.21(as opposed to 2.4.24)
and has some modification to run on that hardware.

i have grepped the linux tree for strings
"Premier Microelectronics Development", "NH230", "NH200" "_gpio" and so on,
but could not find anything.

I am pretty much pissed off now as that mans i still can't upgrade the 
box to support NFS :(

sincerly,

Thomas Ilnseher

PS: I'm not signed up to the LKML, so please CC me.




View attachment "dmesg.txt" of type "text/plain" (5341 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ