Language Selection

English French German Italian Portuguese Spanish

More on Masterbaiting Monkeys

Filed under

Why give this fanboy nonsense publicity?

It's a blatant untruth on Torvalds's part, born of complete ignorance of the way in which OpenBSD's actually maintained, made in full knowledge of the fact that anything he says about the *BSDs (and OpenBSD in particular) will be parroted by every idiot who fancies he might have something to gain by blindly uncritical Linux advocacy.

re: nonsense

Well, I think the first article I saw on the subject sums it up for me:

Linus is known for being the best coder he can be, and backing his words up. When Linus went after the Gnome developers and their clique, he backed up his firestorm with actual code. Linus is seen as being rude in the light that there is something behind the rudeness.

And I just happen to agree with him. So many times security issues are blown out of proportion. Most of the time they are obscure issues that would never be exploited in the every day life, but let's make a big deal out of them giving crackers more information to use against us. Yes, the security issues should be known and fixed, but as Linus said, just as any other bug. Many other times they are used by Microsoft people to prove Linux isn't any more secure than Windows.

Should Linus have used that metaphor? Well, no, probably not. But he is entitled to express his opinion and make his point. I just wouldn't have been so rude about it.

As far as linking to the headlines - that's what I do. I don't have to agree with them and many times I don't like the articles I link to. But I'm not into censorship. I'm always catching hell for linking to articles that "insult" Linux or OSS. But folks need to know the good and the bad. They need to know what other folks are saying. Some may want to go to the site and comment. It'd get pretty boring around here if I ignored everything somebody thinks I shouldn't link to. I try to please the crowd, but you can't. You can't please everybody all the time. I just do the best I can with what I know how.

re: re: nonsense

Well I pretty much side with Security.

If you're driving down the road at 70 mph, and your tire blows out just as you notice your glovebox won't stay shut, are you: A) more worried about the blown out tire that might cause you to careen out of control and maybe die, or Cool more worried about the glovebox because that annoys your passenger? Obviously some problems are more important then others.

Security - especially at the enterprise level - is the PRIMARY concern. PERIOD. And the fact that it's obscure and MIGHT not be exploited is a very weak (and stupid) security practice (if your business has 15 entrances - do you leave one door unlocked because maybe a thief is too lazy to check all 15 doors?)

Also, it's sad when the developer of Linux states that "all bugs" are equal. Since they are pretty much are all equally IGNORED, for proof, look at pretty much any 6 month rush-to-release distro.

Because of that, I for one, am GLAD that security problems get the hype and attention. I don't want a possible exploit vector ignored for 3 or 4 releases because it's just another bug.

re: re: nonsense

Yes, of course, you're right. I was a bit flippant with that original remark due to being on the defensive. I went too far the other way to try and justify my actions.

re: nonsense

> But folks need to know the good and the bad.

No, they just need to be well-informed. Isn't the fact that you can apply years of knowledge and judgement (and therefore a measure of discrimination) what distinguishes from automated aggregators?

> So many times security issues are blown out of proportion. Most of the time they are obscure issues that
> would never be exploited in the every day life, but let's make a big deal out of them giving crackers
> more information to use against us.

I'd have thought full disclosure was necessary to any serious, open source security auditing. It's certainly established policy with every other major FLOSS OS.

In any event, the distinction between (in Torvalds's words) "boring normal bugs" and security bugs is ultimately unfounded, provided, that is, your security policy's proactive (as in the case of OpenBSD) rather than than reactive (as is largely the case with Linux). I quote:

"During our ongoing auditing process we find many bugs, and endeavor to fix them even though exploitability is not proven. We fix the bug, and we move on to find other bugs to fix. We have fixed many simple and obvious careless programming errors in code and only months later discovered that the problems were in fact exploitable."

re: re: nonsense

well, "well-informed" was exactly what I meant. It's what I try to do.

> I'd have thought full disclosure was necessary to any serious, open source security auditing. It's certainly established policy with every other major FLOSS OS.

yes, you're right. Of course it is.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Canonical Patches Nvidia Graphics Drivers Vulnerability in All Ubuntu Releases

It's time to update your Ubuntu Linux operating system if you have a Nvidia graphics card running the Nvidia Legacy 340 or 304 binary X.Org drivers provided on the official software repositories. Read more

Long-term Embedded Linux Maintenance andd New Device From CompuLab

  • Long-term Embedded Linux Maintenance Made Easier
    The good old days when security breaches only happened to Windows folk are fading fast. Malware hackers and denial of service specialists are increasingly targeting out of date embedded Linux devices, and fixing Linux security vulnerabilities was the topic of several presentations at the Embedded Linux Conference Europe (ELCE) in October. One of the best attended was “Long-Term Maintenance, or How to (Mis-)Manage Embedded Systems for 10+ Years” by Pengutronix kernel hacker Jan Lübbe. After summarizing the growing security threats in embedded Linux, Lübbe laid out a plan to keep long-life devices secure and fully functional. “We need to move to newer, more stable kernels and do continuous maintenance to fix critical vulnerabilities,” said Lübbe. “We need to do the upstreaming and automate processes, and put in place a sustainable workflow. We don’t have any more excuses for leaving systems in the field with outdated software.”
  • CompuLab Has Upgraded Their Small Form Factor "IPC" Line To Kabylake
    HARDWARE -- Our friends and Linux-friendly PC vendor, CompuLab, have announced a new "IPC" line-up of their small form factor computers now with Intel Kabylake processors. In the past on Phoronix we tested CompuLab's Intense-PC (IPC) and then the IPC2 with Haswell processors, among other innovative PCs from CompuLab. Now they are rolling out the IPC3 with Intel's latest Kabylake processors.
  • Fanless mini-PC runs Linux Mint on Kaby Lake
    Compulab launched a rugged “IPC3” mini-PC that runs Linux on dual-core, 7th Gen Core i7/i5 CPUs, and also debuted three GbE-equipped FACE expansion modules. Compulab has opened pre-orders starting at $693 for the first mini-PCs we’ve seen to offer the latest, 14nm-fabricated 7th Generation Intel Core “Kaby Lake” processors. The passively cooled, 190 x 160 x 40mm IPC3 (Intense PC 3), which is available in up to industrial temperature ranges, follows two generations of similarly sized IPC2 mini-PCs. There’s the still available, 4th Gen “Haswell” based IPC2 from 2014 and the apparently discontinued 5th Gen “Broadwell” equipped IPC2 from 2015.
  • Compulab IPC3 is a tiny, fanless PC with Intel Kaby Lake CPU
    Compulab is an Israeli company that makes small, fanless computers for home or commercial use. The company’s latest mini PC aimed at enterprise/industrial usage is called the IPC3, and it has a die-cast aluminum case with built-in heat sinks for passive cooling and measures about 7.4″ x 6.3″ x 1.6″.

Games for GNU/Linux

  • Imperium Galactica II: Alliances released for Linux & SteamOS, seems native too
    Imperium Galactica II: Alliances [GOG, Steam] just released for Linux & SteamOS and it looks like it's a native version. Note: My friends at GOG sent over a copy, so big thanks to them. There's no sign of DOSBox or Wine and I had no idea this game had ever been ported to Linux. Pretty awesome really for a game like this to get a proper Linux build when it gets a new release.
  • Nearly five years after the Kickstarter, Carmageddon still isn’t on Linux despite the stretch goal being reached
    The problem here, for me, is that they later did a revamp of the title called Carmageddon: Max Damage. This was to fix some problems, boost sales again and port it to consoles. Carmageddon: Max Damage also never made it to Linux. Fun fact, they actually released a trailer where they just run over a ton of penguins, make from that what you will: Not saying this was trolling the entire Linux gaming community, but it sure felt like it after their previous trolling attempts directed at our official Twitter account.
  • Valve Rolls Out New Steam Client Stable Update with Promised Linux Changes, More
    Today Valve announced the availability of a new stable update of the Steam Client for all supported platforms, including the company's SteamOS operating system for Steam Machines, as well as GNU/Linux, macOS, and Microsoft Windows. Bringing all the new features during the Beta stages of development, the new Steam Client update improves the interaction between the Steam runtime and your GNU/Linux distribution's libraries. This is a huge and long-anticipated milestone for the Steam Client, which, unfortunately, did not work out-of-the-box on all Linux-based operating systems.

Robolinux 8.7.1 Linux OS Is Out and It's Based on Debian GNU/Linux 8.7 "Jessie"

The developers of the Robolinux GNU/Linux distribution have announced today, January 18, 2017, the release and immediate availability of a new stable update based on the latest Debian GNU/Linux 8 "Jessie" operating system series. Still offering a free installer, the Robolinux 8.7.1 "Raptor" edition is now available for download with the usual Cinnamon, MATE 3D, Xfce 3D, and LXDE flavors. It's based on the recently released Debian GNU/Linux 8.7.1 "Jessie" operating system, which means that it ships with its newest Linux 3.16 kernel and over 170 bug fixes and security patches. The GRUB bootloader and login screens have been refreshed too. Read more