Language Selection

English French German Italian Portuguese Spanish

More on Masterbaiting Monkeys

Why give this fanboy nonsense publicity?

It's a blatant untruth on Torvalds's part, born of complete ignorance of the way in which OpenBSD's actually maintained, made in full knowledge of the fact that anything he says about the *BSDs (and OpenBSD in particular) will be parroted by every idiot who fancies he might have something to gain by blindly uncritical Linux advocacy.

re: nonsense

Well, I think the first article I saw on the subject sums it up for me:

Linus is known for being the best coder he can be, and backing his words up. When Linus went after the Gnome developers and their clique, he backed up his firestorm with actual code. Linus is seen as being rude in the light that there is something behind the rudeness.

And I just happen to agree with him. So many times security issues are blown out of proportion. Most of the time they are obscure issues that would never be exploited in the every day life, but let's make a big deal out of them giving crackers more information to use against us. Yes, the security issues should be known and fixed, but as Linus said, just as any other bug. Many other times they are used by Microsoft people to prove Linux isn't any more secure than Windows.

Should Linus have used that metaphor? Well, no, probably not. But he is entitled to express his opinion and make his point. I just wouldn't have been so rude about it.

As far as linking to the headlines - that's what I do. I don't have to agree with them and many times I don't like the articles I link to. But I'm not into censorship. I'm always catching hell for linking to articles that "insult" Linux or OSS. But folks need to know the good and the bad. They need to know what other folks are saying. Some may want to go to the site and comment. It'd get pretty boring around here if I ignored everything somebody thinks I shouldn't link to. I try to please the crowd, but you can't. You can't please everybody all the time. I just do the best I can with what I know how.

re: re: nonsense

Well I pretty much side with Security.

If you're driving down the road at 70 mph, and your tire blows out just as you notice your glovebox won't stay shut, are you: A) more worried about the blown out tire that might cause you to careen out of control and maybe die, or Cool more worried about the glovebox because that annoys your passenger? Obviously some problems are more important then others.

Security - especially at the enterprise level - is the PRIMARY concern. PERIOD. And the fact that it's obscure and MIGHT not be exploited is a very weak (and stupid) security practice (if your business has 15 entrances - do you leave one door unlocked because maybe a thief is too lazy to check all 15 doors?)

Also, it's sad when the developer of Linux states that "all bugs" are equal. Since they are pretty much are all equally IGNORED, for proof, look at pretty much any 6 month rush-to-release distro.

Because of that, I for one, am GLAD that security problems get the hype and attention. I don't want a possible exploit vector ignored for 3 or 4 releases because it's just another bug.

re: re: nonsense

Yes, of course, you're right. I was a bit flippant with that original remark due to being on the defensive. I went too far the other way to try and justify my actions.

re: nonsense

> But folks need to know the good and the bad.

No, they just need to be well-informed. Isn't the fact that you can apply years of knowledge and judgement (and therefore a measure of discrimination) what distinguishes tuxmachines.org from automated aggregators?

> So many times security issues are blown out of proportion. Most of the time they are obscure issues that
> would never be exploited in the every day life, but let's make a big deal out of them giving crackers
> more information to use against us.

I'd have thought full disclosure was necessary to any serious, open source security auditing. It's certainly established policy with every other major FLOSS OS.

In any event, the distinction between (in Torvalds's words) "boring normal bugs" and security bugs is ultimately unfounded, provided, that is, your security policy's proactive (as in the case of OpenBSD) rather than than reactive (as is largely the case with Linux). I quote:

"During our ongoing auditing process we find many bugs, and endeavor to fix them even though exploitability is not proven. We fix the bug, and we move on to find other bugs to fix. We have fixed many simple and obvious careless programming errors in code and only months later discovered that the problems were in fact exploitable."

re: re: nonsense

well, "well-informed" was exactly what I meant. It's what I try to do.

> I'd have thought full disclosure was necessary to any serious, open source security auditing. It's certainly established policy with every other major FLOSS OS.

yes, you're right. Of course it is.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

digiKam 7.7.0 is released

After three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. Read more

Dilution and Misuse of the "Linux" Brand

Samsung, Red Hat to Work on Linux Drivers for Future Tech

The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. Read more

today's howtos

  • How to install go1.19beta on Ubuntu 22.04 – NextGenTips

    In this tutorial, we are going to explore how to install go on Ubuntu 22.04 Golang is an open-source programming language that is easy to learn and use. It is built-in concurrency and has a robust standard library. It is reliable, builds fast, and efficient software that scales fast. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel-type systems enable flexible and modular program constructions. Go compiles quickly to machine code and has the convenience of garbage collection and the power of run-time reflection. In this guide, we are going to learn how to install golang 1.19beta on Ubuntu 22.04. Go 1.19beta1 is not yet released. There is so much work in progress with all the documentation.

  • molecule test: failed to connect to bus in systemd container - openQA bites

    Ansible Molecule is a project to help you test your ansible roles. I’m using molecule for automatically testing the ansible roles of geekoops.

  • How To Install MongoDB on AlmaLinux 9 - idroot

    In this tutorial, we will show you how to install MongoDB on AlmaLinux 9. For those of you who didn’t know, MongoDB is a high-performance, highly scalable document-oriented NoSQL database. Unlike in SQL databases where data is stored in rows and columns inside tables, in MongoDB, data is structured in JSON-like format inside records which are referred to as documents. The open-source attribute of MongoDB as a database software makes it an ideal candidate for almost any database-related project. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MongoDB NoSQL database on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

  • An introduction (and how-to) to Plugin Loader for the Steam Deck. - Invidious
  • Self-host a Ghost Blog With Traefik

    Ghost is a very popular open-source content management system. Started as an alternative to WordPress and it went on to become an alternative to Substack by focusing on membership and newsletter. The creators of Ghost offer managed Pro hosting but it may not fit everyone's budget. Alternatively, you can self-host it on your own cloud servers. On Linux handbook, we already have a guide on deploying Ghost with Docker in a reverse proxy setup. Instead of Ngnix reverse proxy, you can also use another software called Traefik with Docker. It is a popular open-source cloud-native application proxy, API Gateway, Edge-router, and more. I use Traefik to secure my websites using an SSL certificate obtained from Let's Encrypt. Once deployed, Traefik can automatically manage your certificates and their renewals. In this tutorial, I'll share the necessary steps for deploying a Ghost blog with Docker and Traefik.