|
|
Subscribe / Log in / New account

A crypto module loading vulnerability

A crypto module loading vulnerability

Posted Jan 29, 2015 17:35 UTC (Thu) by flussence (guest, #85566)
In reply to: A crypto module loading vulnerability by spender
Parent article: A crypto module loading vulnerability

Perhaps the fact so few people wish to use your code is a hint that its presentation needs improving.


to post comments

A crypto module loading vulnerability

Posted Jan 29, 2015 17:52 UTC (Thu) by Limdi (guest, #100500) [Link] (3 responses)

Or it hints that custom kernel installation is not one click away. Nor two, nore three.

A crypto module loading vulnerability

Posted Feb 5, 2015 15:09 UTC (Thu) by Wol (subscriber, #4433) [Link] (2 responses)

Actually, custom kernel installation is pretty easy.

It's just because most people expect to switch their computer on and get a login prompt. They don't know anything about how it gets there, and are afraid to try, because they think any cock-up will need a complete re-install.

(And yes, when things go wrong, recovering can be a right pain - been there, done that!)

That's basically it - fear of the unknown. I don't like messing about REPLACING known-good stuff (which is why I don't like grub2-mkconfig that much!) but I build new kernels, I *add* them to my boot scenario, and it's pretty easy.

It's like driving a car - many of us oldies are much better at looking after our cars not because we can do any of the maintenance, but because we understand how cars work we look after them better such that maintenance is less necessary.

Too many people remember the old days of tvs when "if it doesn't work, hit it" was good advice. So, in good old cargo-cult science mode, when an lcd tv doesn't work they hit it and wonder why it breaks :-)

If you actually learn what goes on under the covers, custom kernels shouldn't be scary at all ... :-)

Cheers,
Wol

A crypto module loading vulnerability

Posted Feb 5, 2015 16:17 UTC (Thu) by cesarb (subscriber, #6266) [Link] (1 responses)

There's another aspect to the use of a custom kernel.

When you use a distribution-provided kernel, it's updated through the package manager. You don't have to do anything other than keeping the distribution updated; it'll be kept up-to-date together with the rest of the system.

When you use a custom kernel, you're responsible for updating it. You have to follow the announcements for new kernel releases, download the patches and recompile every time a new version is released.

A crypto module loading vulnerability

Posted Feb 5, 2015 16:23 UTC (Thu) by dlang (guest, #313) [Link]

more to the point, people are afraid of custom kernels because they think it completely invalidates their support (and to be fair, some support organizations encourage this belief)


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds