|
|
Subscribe / Log in / New account

Brief items

Security

Is blockchain a security topic? (Opensource.com)

At Opensource.com, Mike Bursell looks at blockchain security from the angle of trust. Unlike cryptocurrencies, which are pseudonymous typically, other kinds of blockchains will require mapping users to real-life identities; that raises the trust issue. "What's really interesting is that, if you're thinking about moving to a permissioned blockchain or distributed ledger with permissioned actors, then you're going to have to spend some time thinking about trust. You're unlikely to be using a proof-of-work system for making blocks—there's little point in a permissioned system—so who decides what comprises a "valid" block that the rest of the system should agree on? Well, you can rotate around some (or all) of the entities, or you can have a random choice, or you can elect a small number of über-trusted entities. Combinations of these schemes may also work. If these entities all exist within one trust domain, which you control, then fine, but what if they're distributors, or customers, or partners, or other banks, or manufacturers, or semi-autonomous drones, or vehicles in a commercial fleet? You really need to ensure that the trust relationships that you're encoding into your implementation/deployment truly reflect the legal and IRL [in real life] trust relationships that you have with the entities that are being represented in your system. And the problem is that, once you've deployed that system, it's likely to be very difficult to backtrack, adjust, or reset the trust relationships that you've designed."

Comments (none posted)

Security quotes of the week

This is all to say that there are risks involved with owning a smart speaker. It's not as risky as, say, running a meth lab out of your basement. But keeping an internet-connected microphone in your kitchen is certainly more trouble than owning a simple Bluetooth speaker that just plays music. You might be comfortable taking that risk for yourself. Think long and hard about buying an Amazon Echo or a Google Home for your friends and family. They might not like it. In my opinion, they shouldn’t.
Adam Clark Estes

And in the meantime, it's important to remember that the dominant ISPs — for all of their power — are still quite sensitive to bad publicity. Let's see a show of hands of everyone who thinks that their dominant ISP isn't charging enough or doesn't already have too much control over their Internet usage! They know that U.S. consumer surveys routinely rate them among the most hated and mistrusted firms in the country.

Every time that one of these ISPs even begins to make anti-neutrality, anti-consumer moves, they must be immediately lambasted — broadly and publicly. They must be tied in the public mind directly to [US Federal Communications Commission chair] Ajit Pai and Donald Trump, and excoriated in a manner to make their shareholders sit up and take notice in fear.

Lauren Weinstein

An attacker can remotely unlock any safe in this product line through specially formatted Bluetooth messages, even with no knowledge of the pin code. The phone application requires the valid pin to operate the safe, and there is a field to supply the pin code in an authorization request. However the safe does not verify the pin code, so an attacker can obtain authorization and unlock the safe using any arbitrary value as the pin code.
Daniel Su and Austin Fletcher find gun safe vulnerabilities (Thanks to Paul Wise.)

"We got the airplane on Sept. 19, 2016. Two days later, I was successful in accomplishing a remote, non-cooperative, penetration," said Robert Hickey, aviation program manager within the Cyber Security Division of the DHS [US Department of Homeland Security] Science and Technology (S&T) Directorate.

"[Which] means I didn't have anybody touching the airplane, I didn't have an insider threat. I stood off using typical stuff that could get through security and we were able to establish a presence on the systems of the aircraft." Hickey said the details of the hack and the work his team are doing are classified, but said they accessed the aircraft's systems through radio frequency communications, adding that, based on the RF configuration of most aircraft, "you can come to grips pretty quickly where we went" on the aircraft.

Calvin Biesecker in Aviation Today on an attack against Boeing 757 airliners

Comments (1 posted)

Kernel development

Kernel release status

The current development kernel is 4.15-rc3, released on December 10. Linus said: "I'm not thrilled about how big the early 4.15 rc's are, but rc3 is often the biggest rc because it's still fairly early in the calming-down period, and yet people have had some time to start finding problems. That said, this rc3 is big even by rc3 standards. Not good." 489 changesets were merged since 4.15-rc2.

Stable updates: 4.14.5, 4.9.68, 4.4.105, and 3.18.87 were released on December 10. The 4.14.6 and 4.9.69 updates are in the review process; they are due on December 14.

Comments (none posted)

Nottingham: Internet protocols are changing

Worth a read: this APNIC blog entry from Mark Nottingham on the near-term evolution of various Internet protocols. "The newest change on the horizon is DOH — DNS over HTTP. A significant amount of research has shown that networks commonly use DNS as a means of imposing policy (whether on behalf of the network operator or a greater authority). Circumventing this kind of control with encryption has been discussed for a while, but it has a disadvantage (at least from some standpoints) — it is possible to discriminate it from other traffic; for example, by using its port number to block access. DOH addresses that by piggybacking DNS traffic onto an existing HTTP connection, thereby removing any discriminators."

Comments (58 posted)

Distributions

Debian stable releases

The Debian project has released updates to oldstable "jessie" and stable "stretch". Debian 9.3 "stretch" and Debian 8.10 "jessie" are available with the usual set of corrections for security issues and adjustments for serious problems.

Comments (none posted)

Fedora council elections canceled

The Fedora Project's currently underway elections for the Fedora Council, FESCo, and the Mindshare committee have been canceled due to some glitches in making the interview material available. The project plans to get its act together and retry the elections in early January.

Full Story (comments: none)

Fedora 25 End Of Life

Fedora 25 has reached its end of life. There will be no more updates. Users are advised to upgrade.

Full Story (comments: none)

Linaro ERP 17.12 released

Linaro has announced the 17.12 release of its "Enterprise Reference Platform" distribution. "The goal of the Linaro Enterprise Reference Platform is to provide a fully tested, end to end, documented, open source implementation for ARM based Enterprise servers. The Reference Platform includes kernel, a community supported userspace and additional relevant open source projects, and is validated against existing firmware releases."

Full Story (comments: 3)

Distribution quotes of the week

I'm immensely grateful to the Devuan developers, because when they announced their fork, all the complaints about systemd on the debian-devel mailinglist ceased to exist. Rather than a cost, that was an immensely gratifying experience, and it made sure that I started reading the debian-devel mailinglist again, which I had stopped for a while before that. Meanwhile, life in Debian went on as it always has.
Wouter Verhelst

“First” is one of the core foundations of the Fedora Project. At the leading edge of innovation, every step Fedora takes advances the state of the art, even when it’s not directly successful. And, if every try succeeds, Fedora’s not trying hard enough.
Matthew Miller

Linux distributions exist, they don't attempt to list every copyright holder on the Linux kernel, and in practice this is fine, which suggests that this is an ocean we're trying to boil as a weird Debian thing rather than because we actually need to. It's fine to have weird Debian things that we do because we're Debian rather than because we absolutely need to do them - but when we do, we should be clear about why, so that we can stop enforcing them if the cost (mostly in maintainer time and motivation, our most valuable commodities) exceeds the benefit.
Simon McVittie

Comments (1 posted)

Development

Elisa 0.0.80 Released

A very early alpha version of the Elisa music player has been released. "Elisa allows to browse music by album, artist or all tracks. The music is indexed using either a private indexer or an indexer using Baloo. The private one can be configured to scan music on chosen paths. The Baloo one is much faster because Baloo is providing all needed data from its own database. You can build and play your own playlist."

Comments (42 posted)

Let's Encrypt looks forward to 2018

The Let's Encrypt project, working to encrypt as much web traffic as possible, looks forward to the coming year. "First, we’re planning to introduce an ACME v2 protocol API endpoint and support for wildcard certificates along with it. Wildcard certificates will be free and available globally just like our other certificates. We are planning to have a public test API endpoint up by January 4, and we’ve set a date for the full launch: Tuesday, February 27."

Comments (none posted)

Development quotes of the week

The solution we ended up choosing was to add the string "compatible with GNU linkers" to our linker's help message. This string is not too odd for humans to understand, and since it contains the string "GNU", it is also friendly to configure. It is not a beautiful solution. It supports the erroneous assumption rather than correcting it. But it was practical.
Rui Ueyama (Thanks to Paul Wise)

C and its implementations enshrine communicativity in three ways: by the compiler’s place in a wider toolchain; by the surrounding meta-level (debugging) programmability of the target environment; and by the core abstraction of memory that is both at the heart of the language’s design and shared with these surrounding elements. This is how C gives us access to the operating system and to hardware. The same property also gives us access to other systems in the same address space, which is why C finds so much use as a low-level glue language, despite its questionable suitability as such by any other criteria. Memory is a communication channel, shared with the world outside the language. Representations are the symbols of that channel. C lets us communicate freely using these, even with alien entities.

This is, I claim, the deepest reason why C remains unvanquished. Replacements or reimplementations invariably forgo or compromise communicativity. They break the links with the surrounding toolchain (particularly the assembler and linker), or provide a superficially similar but essentially different abstraction of memory. In so doing, they sacrifice its essential value as a systems programming language.

Stephen Kell [PDF]

Comments (1 posted)

Miscellaneous

Artifex and Hancom Reach Settlement Over Ghostscript Open Source Dispute

Artifex Software, Inc. and Hancom, Inc. have announced a confidential agreement to settle their legal dispute. The case filed by Artifex concerned the use of Artifex’s GPL licensed Ghostscript in Hancom's office product. "While the parties had their differences in the interpretation of the open source license, the companies were able to reach an amicable resolution based on their mutual respect for and recognition of the copyright protection and the open source philosophy."

Comments (none posted)

Page editor: Jake Edge
Next page: Announcements>>


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds