LWN: Comments on "The details on loading rootkits via /dev/mem" https://lwn.net/Articles/328695/ This is a special feed containing comments posted to the individual LWN article titled "The details on loading rootkits via /dev/mem". en-us Sun, 05 Oct 2025 09:30:58 +0000 Sun, 05 Oct 2025 09:30:58 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net ENOUGH https://lwn.net/Articles/331150/ https://lwn.net/Articles/331150/ dersteppenwolf <div class="FormattedComment"> OK, I'm done with it as well. Like I said, I tried my best to get along.<br> <p> BTW, is there any possibility in the future of allowing images to be included in comments? It would be quite beneficial in threads like this and some time ago It was impossible to put some diagrams on a SELinux related thread. Without those it's quite difficult to give proper explanations about some of the security models implemented (including MLS).<br> <p> Keep up the great work with the site.<br> </div> Fri, 01 May 2009 14:06:32 +0000 ENOUGH https://lwn.net/Articles/331146/ https://lwn.net/Articles/331146/ corbet You're still doing it. I'm honestly uninterested in assigning blame for the direction of this discussion. Please let's just stop. Fri, 01 May 2009 13:28:21 +0000 ENOUGH https://lwn.net/Articles/331142/ https://lwn.net/Articles/331142/ Los__D <div class="FormattedComment"> o_O<br> <p> Hats off. That must be the best "fake hurt"-playing I ever saw.<br> </div> Fri, 01 May 2009 13:26:43 +0000 ENOUGH https://lwn.net/Articles/331140/ https://lwn.net/Articles/331140/ dersteppenwolf <div class="FormattedComment"> Corbet, please accept my most sincere apologies. I couldn't help it but defend myself against the obvious libelous and disrespectful attitude of this person and others, and felt morally obliged to comply with my ethical duties and present my personal perspective on these matters.<br> <p> I did my best to try to get along and have a well mannered discussion here, but these people aren't the least interested on a civilized interaction. They come here with lies and banter, meaningless follow-ups which don't add anything of interest, but project their flaws and personal views in such a fascist way that any attempt to communicate with them ends in failure.<br> <p> In addition, when they've been left out of arguments to support their claims, they resort to insulting people and calling them out as 'trolls'. I don't even know what they mean by 'troll' in this sense. Are they trying to make jokes about my physical appearance or disabilities?<br> <p> Sigh, I had a better opinion of the Linux fan base until today.<br> </div> Fri, 01 May 2009 12:45:27 +0000 ENOUGH https://lwn.net/Articles/330849/ https://lwn.net/Articles/330849/ nix <div class="FormattedComment"> *Thank* you.<br> <p> (I'll admit I suck at knowing when to stop, too. I'll shut up in this <br> thread as well.)<br> <p> </div> Wed, 29 Apr 2009 17:44:26 +0000 ENOUGH https://lwn.net/Articles/330769/ https://lwn.net/Articles/330769/ corbet OK, this thread has gone well beyond anything useful. Please stop here. Now. <p> "dersteppenwolf": this is not the sort of commentary that is welcome on LWN. You are not the only offender here, but you've been pushing the boundaries. Please stop. Wed, 29 Apr 2009 12:49:03 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330753/ https://lwn.net/Articles/330753/ nix <div class="FormattedComment"> OK, so as well as being pointlessly insulting you can't read. I never said <br> that either PaX nor grsecurity were bad. I've used both and think they're <br> excellent pieces of work and that both the anonymous PaXteam and spender <br> are superb at spotting holes. They're just hopeless at the social-oil part <br> which makes it even slightly plausible that anyone else will pick up what <br> they do in any larger project.<br> <p> (And, well, I had a dig. One comment during the 2.6 freeze, obviously <br> hopeless. An attempt by Valdis to split up the non-duplicative-of-LSM, <br> non-ASLR stuff in 2004: James Morris thought most the remaining bits were <br> of minimal security benefit (I agree with Valdis here: it's an extra bar, <br> so what if it's low, the cost is low too), but the thing had a BSD <br> advertising clause at the time so couldn't possibly go in. A thread in <br> 2005 which foundered in flames, disagreements over worthwhile tradeoffs, <br> and claims (from a third party) that grsecurity was intrinsically <br> impossible to split up, which at a then size of 700K would make it <br> intrinsically impossible to ever merge. I've looked at every archived l-k <br> message ever to mention grsecurity, and there's no sign that anyone other <br> than Valdis ever tried to split it up at all.)<br> <p> ... sheesh, why am I even responding to someone whose idea of cogent <br> argument is poo jokes and threats of identity disclosure? I must be bored.<br> <p> </div> Wed, 29 Apr 2009 09:17:33 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330752/ https://lwn.net/Articles/330752/ hppnq <em><blockquote>How about talking about why kernel developers obscure vulnerabilities as denial of service issues when they are perfectly exploitable?</blockquote></em> <p> If you mean the SCTP one referenced on this page, it looks serious, but it is not "perfectly exploitable" in the real world. You may not (want) to understand this, but in general, people will try to make a realistic assessment of the actual threat -- developers, distributors and also a few serious security researchers. <p> In any case, security should be discussed and handled by people with at least some grasp of reality. Thinking that anyone can be on the right side of the thin line between right and wrong is part of the problem. It is typical that you don't understand this. <p> (The patch for the SCTP vulnerability was available last year, by the way. My distribution was updated some weeks ago.) Wed, 29 Apr 2009 09:01:24 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330749/ https://lwn.net/Articles/330749/ dersteppenwolf <div class="FormattedComment"> I'm krunk, not drunk. It's just too good that I've got diarrhea, so I can reply to all your substantially meaningless responses from the comfort of my toilet. Otherwise I wouldn't even bother replying.<br> <p> Thanks sir, for proving yourself to be such an useless entertainment in my days of stomach infection solitude.<br> <p> Meanwhile, could we get back to the topic at issue? Or choose some other one equally entertaining. How about talking about why kernel developers obscure vulnerabilities as denial of service issues when they are perfectly exploitable?<br> <p> Regarding splitting up grsecurity and submitting patches to the maintainers, I think it was done in the past with hopeless results, but great attitude.<br> <p> You know what, I just hope your personal information ends up splattered on some public site someday so we can all look back to this moment and laugh at your utter disregard and arrogance. You read that right. You most likely can't even grasp the nature of PaX or any of its concepts, yet you are here making claims about it. Guess that's why you resort to second guess and criticize the alleged attitude of its maintainer, who has more acumen in this area than any of us, and could possibly papa you about any system internals question.<br> <p> With all due respect, please go fuck yourself. Now I'm gonna wipe my ass with pages printed from this thread and pray this diarrhea gets sorted out soon or I'll feel too tempted to delve deep into your innuendo. You goddamn pseudo grown up with the maturity and self stem of a 12 year old baboon.<br> <p> </div> Wed, 29 Apr 2009 08:17:06 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330743/ https://lwn.net/Articles/330743/ nix <div class="FormattedComment"> Actually dersteppenwolf is substantially worse. I've never seen any kernel <br> contributor act like dersteppenwolf is (maybe he's drunk?)<br> <p> Hans's problem (er, contribution-related problem, not murder-related <br> problem) was the same as spender's, as far as I can tell: great <br> intelligence coupled with an inability to communicate with others without <br> being/appearing condescending and arrogant, or to adjust one's own <br> behaviour in response to feedback. It's a real shame... well, again it's <br> sort of moot in Hans's case, but in spender's, grsecurity is stuck in its <br> little bubble which rarely improves anyone else's code quality and isn't <br> very heavily used, when it *could* have improved the security of the <br> mainstream kernel for everyone. Unfortunately paxteam and spender blur <br> together in my mind, so I can't recall which of them it was who was <br> actually *complaining* on l-k, after the last marathon LWN thread, about <br> people taking ideas from his project and incorporating them into the <br> kernel while daring not to take the rest in one gigantic unreviewable <br> lump: no surprise that whichever project *that* was remains largely <br> ghettoized, then. (Doubtless I'll now get followups from both of them <br> saying "it wasn't me": guys, I don't care which of you it was.)<br> <p> </div> Wed, 29 Apr 2009 07:27:22 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330742/ https://lwn.net/Articles/330742/ nix <div class="FormattedComment"> It looks kind of libellous to me. If RH were a UK company, or LWN were <br> hosted in the UK, with its libel laws (so harsh that even UK MPs think <br> they're crazy), I suspect Jon would have ripped the comment down for his <br> own safety. (At least I hope he would have.)<br> <p> 'dersteppenwolf' seems like a very alt.syntax.tactical-style troll name to <br> me, too.<br> <p> </div> Wed, 29 Apr 2009 07:12:36 +0000 Checking the attributions ... https://lwn.net/Articles/330739/ https://lwn.net/Articles/330739/ nix <div class="FormattedComment"> They're different people in the real world of the internet, outside of <br> LWN: and of course as you know you can believe everything you see there.<br> <p> </div> Wed, 29 Apr 2009 06:48:03 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330729/ https://lwn.net/Articles/330729/ dlang <div class="FormattedComment"> Hans Reiser's contributions to the kernel were before his criminal actions (or do you claim that everyone should have known what he would do years later?)<br> <p> but his attitude and actions had a _lot_ to do with the fact that his later work didn't make it into the kernel (sound familiar here?)<br> <p> Maddog has been very nice and polite in my interactions with him, so whatever anger management issues that he has don't affect his interactions with the community.<br> <p> as far as political activists, they keep their politics out of their techinical discussions (and when they don't they get slapped down)<br> <p> of these examples, Hans is the only one who was really bad in his discussions, and that caused significant delays in any of his work getting added. <br> <p> the examples that you guys are giving are as bad as Hans at his worst, and you think that people don't want to deal with you or your code (which would mean dealing with you as a maintainer) because they want linux to be insecure????? get real, they just don't want to deal with the abuse.<br> </div> Wed, 29 Apr 2009 03:09:43 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330724/ https://lwn.net/Articles/330724/ dersteppenwolf <div class="FormattedComment"> I fear part of my comment might be understandable only to a small subset of the readers here, or, the person itself who has been referred. It wasn't just IRIX by the way, although that's likely the least useful of his "achievements". Whether you believe this or not, sir, is moot.<br> <p> Regarding your "I don't want to use your code" claim, I'll start a short run down on other offensive, troubled and criminal twerps that have successfully contributed to the Linux source code in the past decade:<br> <p> - Hans Reiser (developer of the reiserfs filesystem, among other things), convicted of second degree murder of his wife, Nina Reiser, mother of two. He further argued she was involved in BSDM sexual activities and made the kids aware of them. Also, argued she was an alcoholic, besides having an affair with another man.Not only he murdered the mother of his children, he also tried to tarnish her reputation even after she was dead. One cool dude.<br> <p> - Jon "maddog" Hall (instrumental on providing hardware and resources for Linus to finish the very first stable milestones of the kernel), with severe anger management issues which got him his nickname.<br> <p> - The dozens of other political activists in there who could have an agenda of their own.<br> <p> The list goes on.<br> </div> Wed, 29 Apr 2009 02:40:22 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330727/ https://lwn.net/Articles/330727/ k8to <div class="FormattedComment"> Wow.<br> <p> This is a new record in lows.<br> </div> Wed, 29 Apr 2009 02:31:21 +0000 Checking the attributions ... https://lwn.net/Articles/330717/ https://lwn.net/Articles/330717/ AnswerGuy <div class="FormattedComment"> <p> Regarding "to the point where I have to check the author lines to see if it's not secretly one and the same person."<br> <p> ... it's possible that they are secretly one person and that this is a case of deliberate astroturfing.<br> <p> Personally I would think it would be rather crude and ineffective astroturfing --- I think the better techniques involve inserting criticism which superficially seems "helpful" and constructive while providing snippets that can be taken out of context by the front line "analyst" flaks.<br> <p> But then ... what would I know?<br> <p> <p> JimD<br> </div> Wed, 29 Apr 2009 00:01:22 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330548/ https://lwn.net/Articles/330548/ spender <div class="FormattedComment"> Also, in case it wasn't clear from the previous post, the "much easier way" to solve the problems referred only to this particular scenario we're discussing with /dev/mem. It should be clear that the protection discussed in the paper is useful against kernel exploitation as well and in fact is quite close to the concept of KERNSEAL which the PaX team came up with in 2003. Google reveals a couple results on KERNSEAL, but the PaX team hasn't released a definitive explanation of the implementation, which is likely why it wasn't referenced by the paper you linked to.<br> <p> -Brad<br> </div> Tue, 28 Apr 2009 14:39:32 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330542/ https://lwn.net/Articles/330542/ spender <div class="FormattedComment"> If you're referring to this attack in Section 4.2 of the paper:<br> <p> void remap_kernel_code() {<br> // Open /dev/mem device<br> fd = open("/dev/mem", O_RDWR);<br> // Map kernel code with RW access<br> // into user address space<br> user_mem = mmap(0, KERNEL_CODE_SIZE, PROT_READ|PROT_WRITE, MAP_SHARED,fd, KERNEL_CODE_ADDR);<br> // Overwrite kernel code<br> memset(user_mem, ATTACK_CODE_ADDR, ATTACK_CODE_SIZE);<br> }<br> <p> This is the same method used by the Phalanx2 rootkit which was already discussed above. It's not the method the PaX team and I referred to, which as I've already mentioned needs only use read/write within the first 1MB of /dev/mem, as is allowed by the mainline protection.<br> <p> But if you're talking about the one in Section 4.1, you're getting warmer.<br> <p> Though it sounds like the solution provided in Section 5.1 would do the trick against the attacks in Sections 4.1/4.2 as well as our attack, there's also a much easier way to solve all three problems (since in a way, they're all facets of a single problem).<br> <p> If you do the work to research it, given the details we've already mentioned, I'm pretty confident you can figure out the problem and how to fix it as well.<br> <p> Completely unrelated, but somewhat "breaking" news: <a href="http://kernelbof.blogspot.com/">http://kernelbof.blogspot.com/</a><br> Hello reliable remote root compromise and disabling of SELinux!<br> As you can read in the link, this was a vulnerability downplayed as a DoS by Linux vendors (as seems to be the norm these days). Oops.<br> <p> -Brad<br> </div> Tue, 28 Apr 2009 14:27:01 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330536/ https://lwn.net/Articles/330536/ hppnq Instead you choose to foam at the mouth on a public news website, like, err, other responsible companies. <p> I am actually interested in your /dev/mem pagetable exploit, by the way. Just curious. Is it a bit like <a href="http://www.cs.cmu.edu/~jfrankli/under_submission/franklin_secvisor_verification.pdf">this</a>, or are these people also hopelessly incompetent idiots who need to be taught a lesson? Tue, 28 Apr 2009 13:49:25 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330527/ https://lwn.net/Articles/330527/ spender <div class="FormattedComment"> You may disagree, but I choose not to contribute in such a way as if the people involved in Linux kernel development acted like other responsible companies who properly handle security. When you have exploits of your own, feel free to share them, but speaking for myself I refuse to support their policy of silently fixing vulnerabilities.<br> <p> I will continue to do as I have done for the past 8 years and fix these issues within grsecurity. If the kernel developers are as capable as Linus claims to be able to backport silent vulnerability fixes, surely they can spot the fixes in grsecurity as well. The source is available to everyone, after all.<br> <p> Regarding your summary of my view on how vulnerabilities *known to the developers* in the Linux kernel could better be handled, it's as wrong as it was last year when we corrected you on it. To say that I advocated "not releasing bugfixes until they could be sure if they were security holes and they had working exploits, no matter how long it took" is just pure trolling, and anyone who has read our past posts knows that. If you want to see how it can be handled (a little) better, see Chris Wright's announcement for the latest kernel.<br> <p> -Brad<br> </div> Tue, 28 Apr 2009 12:47:57 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330503/ https://lwn.net/Articles/330503/ nix <div class="FormattedComment"> Um, just checking. This is the person who was castigating the -stable team <br> for not releasing bugfixes until they could be sure if they were security <br> holes and they had working exploits, no matter how long it took, *and* <br> simultaneously that the holes existed in the first place...<br> <p> ... *posting hashes of descriptions of exploits rather than the fix*?!<br> <p> Any claim you make henceforward that you're interested in *anything* other <br> than credit (that you're interested in, say, the security of the system or <br> any reduction in its count of security holes) should be considered in this <br> light. I'm convinced now.<br> <p> </div> Tue, 28 Apr 2009 06:24:43 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330502/ https://lwn.net/Articles/330502/ nix <div class="FormattedComment"> Well done for proving my point, you offensive twerp. That's one of the <br> most gratuitously nasty comments I've read anywhere, ever. I don't know <br> who you are, but whatever code you've worked on I don't want to use: I <br> don't think it's trustworthy if its upstream guardians accept <br> contributions from someone as unpleasant as you.<br> <p> I really really want an LWN killfile that I can use without switching to <br> firefox...<br> <p> </div> Tue, 28 Apr 2009 06:20:10 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330493/ https://lwn.net/Articles/330493/ patrick_g >>> <i>Whoever you think is in charge of the kernel's security is obviously asleep at the wheel.</i><br><br> Linux development is open. If nobody is in charge of the kernel's security why don't you take in charge this role? Of course you must learn to interact well with other in the community but patchs are very welcome. Tue, 28 Apr 2009 05:40:12 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330490/ https://lwn.net/Articles/330490/ foom <div class="FormattedComment"> Good job, you managed to fit insult, condescension, bitter contempt, mock helpfulness, and <br> rumor-mongering into your comment.<br> <p> Quite an accomplishment. But if you want to continue in that vein, slashdot is over there...<br> </div> Tue, 28 Apr 2009 05:04:46 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330488/ https://lwn.net/Articles/330488/ spender <div class="FormattedComment"> Have some hashes:<br> <p> spender@www:~$ md5sum ./devmem<br> 6c8eb1e89e3e1a8c3bb207eecc517a20 ./devmem<br> spender@www:~$ sha1sum ./devmem<br> 570b82139714e6640b9b1af02060e51de0558a9c ./devmem<br> spender@www:~$ date<br> Mon Apr 27 23:23:29 EDT 2009<br> <p> See you in a couple years when someone figures it out. Unfortunately there's no one else involved in Linux kernel development who actually cares about improving security. They enjoy the mere appearance of security (the ability to claim they have ASLR and other protections), but don't bother to follow through. And that's why you end up with:<br> <p> <a href="http://www.cr0.org/paper/to-jt-linux-alsr-leak.pdf">http://www.cr0.org/paper/to-jt-linux-alsr-leak.pdf</a><br> <a href="http://www.blackhat.com/presentations/bh-europe-09/Fritsch/Blackhat-Europe-2009-Fritsch-Bypassing-aslr-whitepaper.pdf">http://www.blackhat.com/presentations/bh-europe-09/Fritsc...</a><br> <p> These have been public for weeks and are still unfixed. Whoever you think is in charge of the kernel's security is obviously asleep at the wheel.<br> <p> I hope it's clear to everyone reading that objectivity doesn't matter to you: "I don't know who's correct or who isn't. I don't care." But instead, what's of utmost importance to you is that people "play nice."<br> <p> Here's a better idea: if you don't have anything technical to offer, don't bother replying. If you know you're out of your element, don't bother replying, or just admit that you don't know what you're talking about. A person who's sitting on an exploit for the subject being discussed is unlikely to change his viewpoint.<br> <p> -Brad<br> </div> Tue, 28 Apr 2009 04:19:14 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330486/ https://lwn.net/Articles/330486/ dersteppenwolf From a fellow aspie survivor here: please stop being such an attention seeking drama queen over here. What the hell are you doing here, Mercedes? <br /><br /> BTW, you can use HTML for applying <b>more dramatic</b> effect to your seemingly invaluable contributions to this thread. It's a tad bit too complex to learn, at least for a technically illiterate person like me, but someone as intelectually gifted as you could surely get it working quickly. I really wish we could all just get along, have a nice discussion and finally make you realize that we are trying our best to help. But you guys keep getting angry over a technical issue, bringing all your anger and projecting your flaws and sense of self-worth unto us like if we just delivered a blowing strike of truth against your egos. Who knows, perhaps these fellows got something to say, and maybe they really aren't here to prove how experienced and skilled they are. Maybe they don't need your approval in that sense. <br /><br /> Perhaps they are just rather fed up with the fact that the entire community around the kernel has gone stupid about a simple fact: the current approach for security is mistaken and already had horribly laughable consequences. <br /><br /> Let me ask you something: if Linux was an actual closed-source product, commercial and backed up by a vendor who profits from its software sales, and not for selling support, bump stickers, hats, t-shirts and thongs with printed penguin logos, would the customers be willing to take the crap which is being done right now? Silent patching of remotely exploitable issues, local privilege escalation bugs, obscure architecture-dependent bugs, etc. <br /><br /> Why does Red Hat employ the person who stole the IRIX source code in the early 2000s? Stole as in DCC over EFNet, or so the rumor says. I would bet my earrings that SGI would be glad to talk about 'disclosure policies' with him on these matters... Tue, 28 Apr 2009 03:22:30 +0000 "Protected" -- for how long? https://lwn.net/Articles/330482/ https://lwn.net/Articles/330482/ dersteppenwolf <div class="FormattedComment"> Thanks for giving me cancer. Can we get back to discussing why Linux is flawed because their developers choose it to be that way? Even goddamn Vista is safer at the moment. That's kind of a shame.<br> </div> Tue, 28 Apr 2009 03:07:44 +0000 "Protected" -- for how long? https://lwn.net/Articles/330464/ https://lwn.net/Articles/330464/ nix <div class="FormattedComment"> Thus speaks someone who's never seen high-end financial software used to <br> throw umpty-trillions around the world.<br> <p> Believe me, Linux is a glittering icon of perfection next to most of <br> *that* appalling grot. (I don't even need to mention the major settlement <br> system whose core was for many years an umpty-thousand-line shell <br> script... but I'm going to anyway because I want to make you feel as ill <br> as I do.)<br> <p> </div> Mon, 27 Apr 2009 23:58:33 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330460/ https://lwn.net/Articles/330460/ nix <div class="FormattedComment"> It's 'spender', but seconded. If there's one thing a lifetime of <br> Asperger's has taught me, it's that social oil is completely *not* <br> pointless. Without it, it doesn't matter *how* bright you are: nobody will <br> pay any attention to you. More: if you've got it, many people (though not <br> Linus, thankfully) will pay attention to you *even if you're an idiot*.<br> <p> So it behooves bright people (like spender) to *learn to be nice*. Then <br> people will listen to someone who's often right, and we're all better off.<br> <p> </div> Mon, 27 Apr 2009 23:47:28 +0000 "Protected" -- for how long? https://lwn.net/Articles/330371/ https://lwn.net/Articles/330371/ dersteppenwolf <div class="FormattedComment"> You are right, I don't really understand the business model behind Red Hat. It's quite a challenging thing to understand how a corporation gets away with making a profit from the work of helpful and altruist volunteers world-wide.<br> <p> And in a similar path of reasoning, I don't understand how Linux (especially 2.6) could end up being used in a corporate environment. With all due respect, it's a theme park version of an operating system core. The rollercoaster gives you a huge thrill, but you throw up anyway.<br> <p> Regarding your comment, It was indeed pretty awesome, man.<br> </div> Mon, 27 Apr 2009 17:36:45 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330369/ https://lwn.net/Articles/330369/ dersteppenwolf <div class="FormattedComment"> I absolutely agree too. Can we all just get along and let the good times roll?<br> </div> Mon, 27 Apr 2009 17:22:20 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330320/ https://lwn.net/Articles/330320/ const-g <div class="FormattedComment"> Amen.<br> <p> My thoughts exactly.<br> <p> </div> Mon, 27 Apr 2009 14:21:53 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/330311/ https://lwn.net/Articles/330311/ Randakar <div class="FormattedComment"> <p> I find it interesting how PAX, spengler, and dersteppenwolf prove Linus's point for him. Every single sentence of theirs seems to be dripping with a mixture of arrogance and self-righteousness to the point where I have to check the author lines to see if it's not secretly one and the same person.<br> <p> Want to know why the PAX patches don't go in and the useful bits are getting 'plagiarized'? Look no further. Linus has no interest in maintainers with an attitude like that and I don't blame him.<br> <p> People have tried to tell them their narrow minded view of the world and their little security corner is not even nearly as important in comparison to the larger picture as they seem to think it is. Unfortunately the replies seem to demonstrate again and again that these people have made up their minds and are simply incapable of changing their views. The above discussion is a perfect example where the whole point of every reply made by spengler seems to be "I am smarter than you neener neener". <br> <p> I don't know who's correct or who isn't. I don't care. What I do care about is "are people capable of working with others?". Being unable or unwilling to understand someone elses's point of view, being unable to refrain from calling discussion a "waste of time", purposely misquoting someone because "that's what I think he really said" - all of that evidence points to one answer: "No".<br> <p> So you guys want to improve Linux kernel security? Good luck. You won't achieve anything with that attitude.<br> <p> </div> Mon, 27 Apr 2009 14:00:43 +0000 misquoting https://lwn.net/Articles/330152/ https://lwn.net/Articles/330152/ PaXTeam <div class="FormattedComment"> the easy case: think 'paraphrase' (as far as i know, that is. what went on in private discussions is unknown of course, but the public posts speak for themselves, see more on this below).<br> <p> for what to read: it's not only about the few posts we linked to, it's the entire flamewar on lkml and some 5 threads here on LWN, hundreds of posts altogether. i understand if you're less than inclined to read them though, but then don't expect me to repeat all what was said back then either (much to the delight of many readers i guess ;).<br> <p> as for your other questions: i assume you're not involved in computer security which would expain why you missed the real meaning behind spender's quote. in short, it was slyly disparaging as Linus' publicly stated position and actual actions are so much disconnected from reality (it's not a matter of my or anyone's belief, it's of public record, so much so that it earned him this nomination last summer: <a href="http://pwnie-awards.org/2008/nominees.html#lamestvendor">http://pwnie-awards.org/2008/nominees.html#lamestvendor</a>).<br> <p> let me leave you with some food for thought: imagine someone with the ability to write exploits against kernel bugs. imagine further he can also determine just by looking at a given patch whether it fixed a (potentially) exploitable bug (potentially, since one cannot be sure until one actually tries it, kernel bugs usually aren't the easiest kind to exploit). now imagine that you give this person a list of patches without telling him what they do. do you actually believe that this will prevent him from picking out the ones fixing exploitable bugs? because that's exactly what Linus et al. have tried to argue in their desperate attempt at explaining why coverup is good. last but not least: imagine that a file system driver has a bug that can corrupt on-disk data. do you think the proper approach is to not tell the world about it? history says otherwise. now imagine you have a kernel memory corruption bug that can do the same by virtue of corrupting filesystem (meta)data (let's forget about the potential for privilege elevation). do you think it's prudent to not tell the world about it and vehemently argue why it is even a good thing? history says yes. now consider that a memory corruption bug is typically much easier to abuse for trashing random memory (including the filesystem stuff i mentioned) than it is to properly and reliably exploit for privilege elevation. as i said, just some food for thought...<br> </div> Sat, 25 Apr 2009 19:14:23 +0000 misquoting https://lwn.net/Articles/330132/ https://lwn.net/Articles/330132/ pjm <div class="FormattedComment"> Oh good, now I know a bit more about where our differences are. The next thing to know is whether it's because we disagree about what Linus' position is, or whether we agree on the position but disagree about whether or not the words in quotation marks are a sufficiently close approximation to that position.<br> <p> (I'll continue to spend some more time and space on this partly just for my own curiosity, and partly because there's a slim chance that exploring this might actually lead to a slightly better understanding of Linus' position; and maybe you'd like to understand why I or tialaramex have posted as we have.)<br> <p> First of all, the easy case: has Linus literally said the words “if we don't tell the bad guys about the bugs, they'll never find them” ? I'd guess the answer is no, as this doesn't occur in the messages that you or Brad refer to, and a google search doesn't find it [other than here on this thread in LWN], and google does seem to find most other linux-kernel discussion; but maybe he said it in a different forum I'm not aware of that isn't indexed by google. If so, then that would clear things up straight away.<br> <p> (Btw, I understand and even appreciate you asking to check with your correspondant that they have read the posts linked to: I know it's frustrating to discuss with someone who isn't actually giving thought to what you're saying. So yes, I had read the two posts you linked to, and also the posts that Brad referenced above and some of the surrounding posts, and I remember some of the discussion from when it last came up; though obviously I wouldn't be as closely familiar with the discussion as you and Brad, so thanks for having taken the time to post links to the relevant posts.)<br> <p> Otherwise, do you believe that Linus either believes or has said that withholding information from commit messages will mean that no bad guy will know about any bug, or that no bug in Linux will be exploited in the wild ? (As distinct from believing merely that withholding information from commit messages will reduce how many bugs bad guys find out about, or reduce how many bugs will be exploited in the wild.)<br> <p> Otherwise, do you think that there's no significant difference between saying "... then they'll never find them" and saying "... then fewer bad guys will ever find them" ?<br> <p> There are some other possible reasons for our differing, but the above questions will do for now, if you too would like to continue to look into this. (I'll understand if you choose not to spend any more time on it.)<br> </div> Sat, 25 Apr 2009 12:36:19 +0000 misquoting https://lwn.net/Articles/330096/ https://lwn.net/Articles/330096/ PaXTeam <div class="FormattedComment"> <font class="QuotedText">&gt; For example, do you think that it wasn't a misrepresentation of Linus' position</font><br> <p> exactly. i even gave you the links to the thread where you can read about it yourself. have you?<br> </div> Sat, 25 Apr 2009 01:29:37 +0000 "Protected" -- for how long? https://lwn.net/Articles/330007/ https://lwn.net/Articles/330007/ hppnq <em><blockquote> This would be great marketing tagline for Red Hat. </blockquote></em> <p> Even though in this very first sentence you reveal that 1) you do not understand the Linux kernel development process, 2) you do not understand the Red Hat business model and 3) you did not understand my comment, you <em>still</em> managed to surprise me with the rest of your comment. Fri, 24 Apr 2009 14:50:29 +0000 misquoting https://lwn.net/Articles/329999/ https://lwn.net/Articles/329999/ pjm <div class="FormattedComment"> For example, do you think that it wasn't a misrepresentation of Linus' position, or do you think it merely not important enough to take issue with? If the latter, then there's nothing more I can say on the issue.<br> </div> Fri, 24 Apr 2009 14:27:00 +0000 misquoting https://lwn.net/Articles/329993/ https://lwn.net/Articles/329993/ pjm <div class="FormattedComment"> I'm puzzled by your reply. Are you sure you're responding to something I've said? Do you feel it negates something I've said?<br> </div> Fri, 24 Apr 2009 13:09:08 +0000 The details on loading rootkits via /dev/mem https://lwn.net/Articles/329981/ https://lwn.net/Articles/329981/ nix <div class="FormattedComment"> You've not hurt my feelings: you're just being pointlessly unpleasant. I <br> hope you don't think that being pleasant to people where possible is <br> equivalent to hypocrisy or ineptitude!<br> <p> (shades of the Great Misogynism Comment Thread, yet again)<br> <p> </div> Fri, 24 Apr 2009 10:52:31 +0000