Language Selection

English French German Italian Portuguese Spanish

Linus Torvalds on the GPL Fight

Filed under
Interviews

A new version of a license for open source Linux has caused a storm among the community of open source developers. Known as GNU General Public License, or simply GPL, it is the most widely used license for distributing free software.

The current version of the license, GNU GPLv2, was released in 1991. The first version of the license was written by open source proponent Richard Stallman, who founded the Free Software Foundation that administers the license. The GPL license also covers the Linux kernel whose creation was led by Linus Torvalds.

Now 10 kernel developers have rallied against the Free Software Foundation’s efforts to update the license. They have signed a “position paper” against the new version known as GPLv3.

The kernel developers contend that the Free Software Foundation’s plan to promote GPLv3 has “the potential to inflict massive collateral damage upon our entire ecosystem and jeopardize the very utility and survival of open source.”

Though Mr. Torvalds supports them, his name has been absent from that position paper.

Now, in an email interview with Red Herring, he puts his thoughts on the record. Mr. Torvalds says this is not as much a “debate” between the kernel developers and the Free Software Foundation “as it is a declaration of different positions.”

Full Story.

crux of the issue?

I read the gpl v.2 a long time ago, but have not read v.3

My understanding is that v.3 deals with DRM and keys being used in hardware to restrict the software that can be run on a computer. Reading the above linked article really didn't clarify the objections to v.3 or the differences between the two versions.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD

BlueBorne Vulnerability Is Patched in All Supported Ubuntu Releases, Update Now

Canonical released today new kernel updates for all of its supported Ubuntu Linux releases, patching recently discovered security vulnerabilities, including the infamous BlueBorne that exposes billions of Bluetooth devices. The BlueBorne vulnerability (CVE-2017-1000251) appears to affect all supported Ubuntu versions, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus) up to 16.04.3, Ubuntu 14.04 LTS (Trusty Tahr) up to 14.04.5, and Ubuntu 12.04 LTS (Precise Pangolin) up to 12.04.5. Read more

Security: Updates, 2017 Linux Security Summit, Software Updates for Embedded Linux and More

  • Security updates for Tuesday
  • The 2017 Linux Security Summit
    The past Thursday and Friday was the 2017 Linux Security Summit, and once again I think it was a great success. A round of thanks to James Morris for leading the effort, the program committee for selecting a solid set of talks (we saw a big increase in submissions this year), the presenters, the attendees, the Linux Foundation, and our sponsor - thank you all! Unfortunately we don't have recordings of the talks, but I've included my notes on each of the presentations below. I've also included links to the slides, but not all of the slides were available at the time of writing; check the LSS 2017 slide archive for updates.
  • Key Considerations for Software Updates for Embedded Linux and IoT
    The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers. Many of these embedded devices run a variant of embedded Linux; typically, the distribution size is around 16MB today. Unfortunately, the Linux kernel, although very widely used, is far from immune to critical security vulnerabilities as well. In fact, in a presentation at Linux Security Summit 2016, Kees Cook highlighted two examples of critical security vulnerabilities in the Linux kernel: one being present in kernel versions from 2.6.1 all the way to 3.15, the other from 3.4 to 3.14. He also showed that a myriad of high severity vulnerabilities are continuously being found and addressed—more than 30 in his data set.
  • APNIC-sponsored proposal could vastly improve DNS resilience against DDoS