lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070620175627.319a6c55@the-village.bc.nu>
Date:	Wed, 20 Jun 2007 17:56:27 +0100
From:	Alan Cox <alan@...rguk.ukuu.org.uk>
To:	Andrew McKay <amckay@...rs.ca>
Cc:	Alexandre Oliva <aoliva@...hat.com>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Al Viro <viro@....linux.org.uk>,
	Bernd Schmidt <bernds_cb1@...nline.de>,
	Ingo Molnar <mingo@...e.hu>,
	Daniel Hazelton <dhazelton@...er.net>,
	Greg KH <greg@...ah.com>,
	debian developer <debiandev@...il.com>, david@...g.hm,
	Tarkan Erimer <tarkan@...one.net.tr>,
	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: Dual-Licensing Linux Kernel with GPL V2 and GPL V3

> Secondly GPLv3 will cause companies like TIVO, router companies, security 
> companies to not adopt Linux as an operating system, because they can't secure 
> their system.  Placing code in a ROM so they can't upgrade their own systems is 

You've made an important mistake. You said "their system". Now its "our
code" and "whoever bought the units' hardware" so it isn't their anything.

You've made a second mistake I think by assuming that vendor held keys
"improve" security and must be vendor held and secret for it to work. In
fact vendor owned key systems that cannot be changed usually reduce
security.

There are very very good reasons for having vendor owned secret keys.
There are also very very good reasons for being able to rekey or disable
the key on your box.

Ask people whose product vendor went bankrupt. With the ability to
override/replace the keys they could have maintained their system
securely instead they could make no updates and the boxes were left
insecure.

RPM for example intentionally follows this approach. RPM will check keys
and the keys for different vendors/projects will not be released. However
you can add keys, remove keys or even tell rpm "forget the key checking".

A silly example that rather makes the point is the X-Box. Using a bug in
a game you can get into the X-box system and run Linux instead. As the
owner of an X-box you can't fix the bug in the game because you don't
know the signing key, but if you could change or add keys you could stop
the "problem" occurring.

The Xbox is perhaps an oddity in that the insecurity is widely preferred
by the owners but the situation applies in cases where the owner would
prefer the reverse were true.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ