Brief items
Security
Security quotes of the week
- Partition attack: Any ISP can partition the Bitcoin network by hijacking few IP prefixes.
- Delay attack: Any ISP carrying traffic from and/or to a Bitcoin node can delay its block propagation by 20 minutes while staying completely under the radar.
The Internet has turned that thinking upside-down. Our cell phones know who we talk to and, if we're talking via text or e-mail, what we say. They track our location constantly, so they know where we live and work. Because they're the first and last thing we check every day, they know when we go to sleep and when we wake up. Because everyone has one, they know whom we sleep with. And because of how those phones work, all that information is naturally shared with third parties.
More generally, all our data is literally stored on computers belonging to other people. It's our e-mail, text messages, photos, Google docs, and more all in the cloud. We store it there not because it's unimportant, but precisely because it is important.
The stated purpose of this data collection includes gathering insights into how users interact with websites and discovering broken or confusing pages. However the extent of data collected by these services far exceeds user expectations; text typed into forms is collected before the user submits the form, and precise mouse movements are saved, all without any visual indication to the user. This data can't reasonably be expected to be kept anonymous. In fact, some companies allow publishers to explicitly link recordings to a user's real identity.
Kernel development
Kernel release status
The current development kernel is 4.15-rc1, released on November 26. Linus said: "So it's been the usual two weeks of merge window, and rc1 is out. And that normal time length is about the only thing usual about this merge window. Because of the indiscriminate mass slaughter of turkeys in the US last week, lots of people - including me - were on vacation. That meant that I had asked for people to try to make the merge window front-heavy, but it also meant that then during the second week I was rather more strict than usual in what I pulled."
Stable updates have not been in short supply over the last two weeks. 4.13.14, 4.9.63, 4.4.99, and 3.18.82 were released on November 18; 4.14.1, 4.13.15, 4.9.64, 4.4.100, and 3.18.83 on November 21, and 4.14.2, 4.13.16, 4.9.65, 4.4.101, 4.4.102, and 3.18.84 on November 24.
The 4.14.3, 4.9.66, 4.4.103, and 3.18.85 updates are in the review process; they are due on November 30.
Several companies clarify GPL enforcement policies
Here is a press release from Red Hat on GPL enforcement: "To provide greater predictability to users of open source software, Red Hat, Facebook, Google and IBM today each committed to extending the GPLv3 approach for license compliance errors to the software code that each licenses under GPLv2 and LGPLv2.1 and v2." This is, in effect, a reiteration of the approach to enforcement recently adopted by many kernel developers, but it extends to all GPLv2-licensed software contributed by those companies.
Quotes of the week
So to you, the big win is when the access is _stopped_. That's the end of the story from a security standpoint - at least if you are one of those bad security people who don't care about anything else.
But from a developer standpoint, things _really_ are not done. Not even close. From a developer standpoint, the bad access was just a symptom, and it needs to be reported, and debugged, and fixed, so that the bug actually gets corrected.
So from a developer standpoint, the end point of hardening is just the starting point, and when _you_ think you're done, we're really only getting started.
And from a _user_ standpoint, it's something else altogether. For a user, pretty much EVERY SINGLE TIME, it wasn't actually a security attack at all, it was just a latent bug that got exposed. And the keyword here is that it was _latent_, and things used to work, and the hardening patch did something - probably fairly drastic - to turn it from "dangerous" to "benign" from a security perspective.
pieces hidden behind walls.
Will anyone notice?
Distributions
Linux Mint 18.3 released
Linux Mint has released 18.3 "Sylvia" in Cinnamon and MATE editions. Linux Mint 18.3 is a long term support release which will be supported until 2021. Both editions feature a revamped Software Manager with support for flatpaks. See more about what's new in the Cinnamon and MATE editions or check out the release notes for Cinnamon and MATE.Announcing Tumbleweed Snapshots
The newly announced openSUSE "Tumbleweed snapshots" feature is an attempt to make rolling distributions a little easier for those who don't want to stay on the leading edge all the time. In essence, it keeps a snapshot of the state of the distribution at regular intervals and enables users to install applications from their particular snapshot. That allows the installation of new applications without the need to drag in everything else that may have changed since the system as a whole was updated. "Tumbleweed Snapshots provides the best of both worlds, the latest packages when you want them and the one package you need in the middle of working on a project."
Ubuntu 17.10: Return of the GNOME (ars technica)
Ars technica reviews the Ubuntu 17.10 release. "In light of the GNOME switch, this release seems like more of a homecoming than an entirely new voyage. But that said, Ubuntu 17.10 simultaneously feels very much like the start of a new voyage for Ubuntu. The last few Ubuntu desktop releases have been about as exciting as OpenSSH releases—you know you need to update, but beyond that, no one really cares."
Distribution quote of the weeks
Development
7 tools for analyzing performance in Linux with bcc/BPF (opensource.com)
Brendan Gregg introduces a set of BPF-based tracing tools on opensource.com. "Traditional analysis of filesystem performance focuses on block I/O statistics—what you commonly see printed by the iostat(1) tool and plotted by many performance-monitoring GUIs. Those statistics show how the disks are performing, but not really the filesystem. Often you care more about the filesystem's performance than the disks, since it's the filesystem that applications make requests to and wait for. And the performance of filesystems can be quite different from that of disks! Filesystems may serve reads entirely from memory cache and also populate that cache via a read-ahead algorithm and for write-back caching. xfsslower shows filesystem performance—what the applications directly experience."
Introducing container-diff, a tool for quickly comparing container images (Google Open Source Blog)
Google has announced that it has released its container-diff tool under the Apache v2 license. "container-diff helps users investigate image changes by computing semantic diffs between images. What this means is that container-diff figures out on a low-level what data changed, and then combines this with an understanding of package manager information to output this information in a format that’s actually readable to users. The tool can find differences in system packages, language-level packages, and files in a container image. Users can specify images in several formats - from local Docker daemon (using the prefix `daemon://` on the image path), a remote registry (using the prefix `remote://`), or a file in the .tar in the format exported by "docker save" command. You can also combine these formats to compute the diff between a local version of an image and a remote version."
Development quotes of the weeks
Ever since I read that, I've been collecting my own ridiculously long routes. ssh bouncing from country to country, making letters I type travel all the way around the world until they echo back on my screen. Tasting the latency that's one of the only ways we can viscerally understand just how big a tangle of wires humanity has built.
Yesterday, I surpassed all that, and I did it in a way that hearkens right back to the original story. I had two computers, 20 feet apart, I wanted one to talk to the other, and the route between the two ended up traveling not around the Earth, but almost the distance to the Moon.
[...]
- And finally, after 178000 and change miles of data transfer, the letter I'd typed a full second ago appeared on my screen.
tl;dr: You can pry 7c00h and INT xx from my cold, dead hands.
Okay, to be specific (and perhaps a touch less alarmist), the power supplies on cheap, untested devices are often a bit on the dreadful side, and that's where a risk of things bursting into flames resides. Beyond that, we assure you that the Kodi software remains friendly, docile, free-range, and free of any killer instinct.
Page editor: Jake Edge
Next page:
Announcements>>