LWN: Comments on "A statement on the UMN mess" https://lwn.net/Articles/854064/ This is a special feed containing comments posted to the individual LWN article titled "A statement on the UMN mess". en-us Fri, 31 Oct 2025 08:14:49 +0000 Fri, 31 Oct 2025 08:14:49 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net What if there actually was a malicious contributor? https://lwn.net/Articles/854699/ https://lwn.net/Articles/854699/ marcH <div class="FormattedComment"> Thanks: there seems to be a lot of discussion about two students and one university and not much about how anyone else from anywhere else can do the same again.<br> <p> <font class="QuotedText">&gt; What if there was a malicious entity trying to get their vulnerabilities in? They would use fake identities and definitely would not tell about it after patches are okayed. All of the discussions around the blame would be irrelevant (it&#x27;s just a burned fake identity once discovered).</font><br> <p> Drop the &quot;if&quot;: any half-competent three letters agency should be doing this already. If they are not then they are simply not doing their job.<br> <p> <a href="https://www.theguardian.com/commentisfree/2020/dec/23/cyber-attack-us-security-protocols">https://www.theguardian.com/commentisfree/2020/dec/23/cyb...</a><br> <p> <font class="QuotedText">&gt; If anything, the US’s prioritization of offense over defense makes us less safe. In the interests of surveillance, the NSA has pushed for an insecure cellphone encryption standard and a backdoor in random number generators (important for secure encryption). The DoJ has never relented in its insistence that the world’s popular encryption systems be made insecure through back doors – another hot point where attack and defense are in conflict. In other words, we allow for insecure standards and systems, because we can use them to spy on others.</font><br> </div> Wed, 28 Apr 2021 07:32:18 +0000 Re: getting at the data https://lwn.net/Articles/854542/ https://lwn.net/Articles/854542/ tbird20d <div class="FormattedComment"> Well, the UMN researchers have stated that they don&#x27;t want to provide details about the messages so as to avoid implicating any individual maintainers. That&#x27;s actually a point in their favor from an ethics standpoint, in my opinion. Of course that&#x27;s against a background of poor ethical considerations for the study methodology in general. Personally, I don&#x27;t think getting access to the e-mail exchanges on 3 suggested patches is going to tell us much about problems with maintainers accepting malicious patches. But if desired, maybe there is a way of disclosing the information to a trusted community entity (for example the TAB), and having that group evaluate the data in private.<br> <p> But that&#x27;s only if the community sees value in spending more time on this line of security research, which may not be the case.<br> </div> Mon, 26 Apr 2021 18:58:14 +0000 A statement on the UMN mess https://lwn.net/Articles/854393/ https://lwn.net/Articles/854393/ viro <div class="FormattedComment"> &quot;Real steps&quot; as in &quot;we need to do something, this is something, let&#x27;s do it&quot;? You (and this apology of theirs) seem to be treating that as a PR problem; what I want is to reduce the odds of crap getting in.<br> <p> And their apology completely misses the point on lack of data. Frankly, it&#x27;s starting to look like their experiment design had been inexistent and the lack of IRB approval is just a symptom of that.<br> <p> I want to see their dataset and protocol published. The problem of inconsistent review quality *is* real and their dataset would be interesting to go over and try to tease the contributing factors out of it. With what they&#x27;d published it&#x27;s impossible to do. They provide some stats out of their experiment and proceed to proposed mitigation. With reasoning being pretty close to &quot;well, crap can get in, these tools might catch the specific genre of broken patches we&#x27;d used, so go use those tools&quot;. With not so much as a discussion of the relevance of the nature of breakage in patches to the odds of successful evasion of review, which is curious, since the examined mechanism of evasion would seem to rely a lot upon the commit message.<br> <p> The thing is, it&#x27;s impossible to get any useful analysis out of what they&#x27;d published so far. Ideally we&#x27;d need the message-ids of all postings that had been part of their experiment; timestamps and contents can be recovered from that. Run termination conditions, etc. are also interesting, but I&#x27;m not holding my breath on those.<br> </div> Sun, 25 Apr 2021 14:09:38 +0000 A statement on the UMN mess https://lwn.net/Articles/854391/ https://lwn.net/Articles/854391/ clump I'm suggesting UMN takes real steps to address the matter. They could do something, anything, toward rebuilding trust and it doesn't have to be onerous on contributors. It could just mean "Hey, we're not experimenting on you" or "We did something to validate that these patches are legitimate".<p> Since this discussion, Kangjie Lu has <a href="https://lore.kernel.org/lkml/CAK8KejpUVLxmqp026JY7x5GzHU2YJLPU8SzTZUNXU2OXC70ZQQ@mail.gmail.com/T/#u">apologized</a>. It's worth a read: <pre> * All the other 190 patches being reverted and re-evaluated were submitted as part of other projects and as a service to the community; they are not related to the “hypocrite commits” paper. * These 190 patches were in response to real bugs in the code and all correct--as far as we can discern--when we submitted them. * We understand the desire of the community to gain access to and examine the three incorrect patches. Doing so would reveal the identity of members of the community who responded to these patches on the message board. Therefore, we are working to obtain their consent before revealing these patches. </pre> Lu mentions the very real concern that you and others posted, which is the need to separate the experiment from unrelated past and future work. Kudos. What is UMN going to do to rebuild trust? Sun, 25 Apr 2021 12:52:10 +0000 What if there actually was a malicious contributor? https://lwn.net/Articles/854380/ https://lwn.net/Articles/854380/ flussence <div class="FormattedComment"> Most of us here are familiar with that story, but I should point out the git command only shows a tiny fraction of it: what eventually got through. The numerous &quot;edited&quot; remarks in the S-O-B lines hint at something deeper, but I don&#x27;t think anyone wants to go trawling the lists to count how many of those rejected patches simply wasted (person-months of) everyone&#x27;s time.<br> <p> The takeaway from this is the kernel devs already *can* recognise garbage code. We don&#x27;t need a scientific paper to know that, we need to get better at handling - for lack of a better adjective - sociopathic *people* before they reach a critical mass of disruption like this.<br> </div> Sun, 25 Apr 2021 01:30:32 +0000 A statement on the UMN mess https://lwn.net/Articles/854381/ https://lwn.net/Articles/854381/ pabs <div class="FormattedComment"> Employees should push back against abusive employment contacts, including ones that say the employer owns copyright on your work:<br> <p> <a href="https://sfconservancy.org/contractpatch/">https://sfconservancy.org/contractpatch/</a><br> </div> Sun, 25 Apr 2021 01:17:14 +0000 A statement on the UMN mess https://lwn.net/Articles/854375/ https://lwn.net/Articles/854375/ viro <div class="FormattedComment"> Regarding the static analyzers in general... IME they are best used to find potentially fishy places, so those who use those could see the low-hanging fruit for code audit. Having them generate patches is a bad idea - the task is not quite AI-complete, but in practice you can&#x27;t let them run unfiltered (as these examples show) and submitter&#x27;s filtering throughput ends up being the bottleneck; automating the generation of patches doesn&#x27;t help - it&#x27;s not the rate-limiting stage.<br> </div> Sun, 25 Apr 2021 00:08:09 +0000 A statement on the UMN mess https://lwn.net/Articles/854354/ https://lwn.net/Articles/854354/ bfields <div class="FormattedComment"> &quot;Seriously, check that commit.&quot;<br> <p> This, yes:<br> <p> <a href="https://lore.kernel.org/lkml/20210407000913.2207831-1-pakki001@umn.edu/">https://lore.kernel.org/lkml/20210407000913.2207831-1-pak...</a><br> <p> and this one:<br> <p> <a href="https://lore.kernel.org/linux-nfs/20210421225240.GA117423@roeck-us.net/T/#m7163c495a315634a60ed212c64a7b7799e9d55e1">https://lore.kernel.org/linux-nfs/20210421225240.GA117423...</a><br> <p> was just as odd. I&#x27;d be curious to hear what happened. Agreed that they should have followed up.<br> <p> Half the world seems too angry to think straight at this point.<br> <p> &quot;As for the missing data, I&#x27;d been referring to the recent paper on UAF injection and experiment described (FSVO) in there.&quot;<br> <p> Understood. It doesn&#x27;t give me much confidence that they&#x27;re not willing to list those patches.<br> </div> Sat, 24 Apr 2021 21:54:20 +0000 A statement on the UMN mess https://lwn.net/Articles/854367/ https://lwn.net/Articles/854367/ mfuzzey <div class="FormattedComment"> <font class="QuotedText">&gt;That&#x27;s pretty much what any commercial organisation would require of its employees to contribute to FLOSS</font><br> <p> I disagree, sure you need to get permission from someone in authority within your company to contribute to FLOSS as part of your job but that doesn&#x27;t mean someone else in the organisation signing each and every of your patches.<br> <p> In fact I think patches,with SOBs by people in the same organisation tend to be frowned on as they tend to be considered to add little value.<br> <p> </div> Sat, 24 Apr 2021 21:21:19 +0000 A statement on the UMN mess https://lwn.net/Articles/854358/ https://lwn.net/Articles/854358/ viro <div class="FormattedComment"> Care to show me a (current) example among the (current) high-volume contributors?<br> </div> Sat, 24 Apr 2021 16:48:02 +0000 A statement on the UMN mess https://lwn.net/Articles/854357/ https://lwn.net/Articles/854357/ pizza <div class="FormattedComment"> <font class="QuotedText">&gt; Oh, _lovely_. Let me get it straight - you seem to be suggesting that</font><br> <font class="QuotedText">&gt; 1) school should own whatever students might write</font><br> <p> Here&#x27;s UMN&#x27;s policies about this. They seem to be fairly representative:<br> <p> <a href="https://policy.umn.edu/research/copyright">https://policy.umn.edu/research/copyright</a><br> <p> TL;DR: It&#x27;s complicated.<br> </div> Sat, 24 Apr 2021 16:37:12 +0000 A statement on the UMN mess https://lwn.net/Articles/854356/ https://lwn.net/Articles/854356/ amacater <div class="FormattedComment"> That&#x27;s pretty much what any commercial organisation would require of its employees to contribute to FLOSS. It doesn&#x27;t seem too much of a stretch for a university and IRB to do the same: bad reputation redounds on the University.<br> <p> [This is the same sort of argument that leads organisations to assign mentors: if you&#x27;re going to submit any old code under<br> your organisation&#x27;s name, then you don&#x27;t want it to be bad code (unless you make the case explicitly that these are students just starting out on coding e.g. as a part of something like a one day introduction to coding for Teach the Nation to Code or whatever.) ]<br> </div> Sat, 24 Apr 2021 16:21:01 +0000 A statement on the UMN mess https://lwn.net/Articles/854352/ https://lwn.net/Articles/854352/ viro <div class="FormattedComment"> Oh, _lovely_. Let me get it straight - you seem to be suggesting that<br> <p> 1) school should own whatever students might write<br> 2) school should maintain the list of projects students can contribute to and have, for each of those projects, at least one employee familiar with the guts of that project enough to review patches<br> 3) that all patch submissions by the students should be in effect moderated by those employees<br> 4) that any student wishing to contribute must start with checking if the project is on the school&#x27;s list and petition for its inclusion if it currently isn&#x27;t, waiting for that request to come through<br> <p> Are you a genuine article, or is that an illustration of Poe Law?<br> </div> Sat, 24 Apr 2021 14:21:26 +0000 A statement on the UMN mess https://lwn.net/Articles/854351/ https://lwn.net/Articles/854351/ clump <div class="FormattedComment"> Would it be feasible for an organization, oh let&#x27;s say UMN, to review their future patches after they&#x27;ve behaved unethically? Certainly. <br> </div> Sat, 24 Apr 2021 13:54:15 +0000 A statement on the UMN mess https://lwn.net/Articles/854348/ https://lwn.net/Articles/854348/ Wol <div class="FormattedComment"> Much as I hate to agree with you, yes. Punishment for bad faith and deliberate malfeasance NEEDS to be heavy-handed.<br> <p> The trouble is where do you draw the line between naivety, incompetence, and malfeasance. But as the medical case showed, UMN has a history of cover-ups and lying. I hope UMN *has* been blocked from LKML, and I hope new people with UMN emails *do* find themselves locked out of kernel development.<br> <p> Tough luck on those people caught up in the scandal, but if the message goes out loud and clear &quot;don&#x27;t study computing at UMN if you want anything to do with linux&quot; then that&#x27;s a good message to send.<br> <p> It&#x27;s like sports. People get caught out, and don&#x27;t realise OTC medications carry different substances in different countries. There&#x27;s been plenty (sadly) of cases where athletes have checked &quot;Medicine X is okay&quot;, then they&#x27;ve gone abroad, bought the local one, and it contained banned substances. But any athlete caught deliberately taking banned substances, well, it should be a *lifetime* competition ban, and *all* records stripped. If they want to carry on coaching, competing at a local level, and stuff like that I don&#x27;t see a problem, but basically they&#x27;ll have trashed any meaningful career.<br> <p> It&#x27;s sad, but the pain of misbehaviour *needs* to be serious. And you need to clamp down *everywhere*. I think the police over here, for example, have shown that &quot;no tolerance&quot; works - by targetting petty crime, major crime goes down too ...<br> <p> Cheers,<br> Wol<br> </div> Sat, 24 Apr 2021 12:28:59 +0000 Experimentation on humans without their consent https://lwn.net/Articles/854346/ https://lwn.net/Articles/854346/ ermo <p>Out of curiousity only, how (if at all) does this standard apply to e.g. government organisations and spy agencies with adversarial (counter-)intent as their <i>raison d'être?</i></p> <p>Something like the NSA, GRU, Mossad, BND, MI6 etc.?</p> <p>The kernel being an international effort, can (and should) the kernel maintainers also be able to ban suspected bad agents from committing on the basis that a subset of their current or past efforts appear to have been made in bad faith and represent a mix of social engineering and technically subversive efforts designed to insert exploitable code?</p> <p>At this point, Linux is such a critical piece of infrastructure in an international context that it IMHO makes sense to protect it from <i>all</i> subversive tactics, not just the incident in question?</p> Sat, 24 Apr 2021 11:04:03 +0000 A statement on the UMN mess https://lwn.net/Articles/854343/ https://lwn.net/Articles/854343/ MatejLach <div class="FormattedComment"> Fair, personally I think we&#x27;re giving this group a little too much benefit of the doubt when at the very least they proved that ethical research is not high on their priority list. To me that basically means that any contributions from them will have to undergo extra scrutiny to *hopefully* determine whether it&#x27;s a legit patch or some wild joke and I remain unconvinced that this group&#x27;s good contributions are worth the guessing game and extra stress that their &#x27;research&#x27; puts on maintainers. <br> </div> Sat, 24 Apr 2021 08:51:13 +0000 A statement on the UMN mess https://lwn.net/Articles/854342/ https://lwn.net/Articles/854342/ pbonzini <div class="FormattedComment"> <font class="QuotedText">&gt; bulk revert request had, IMO, been wrong. Much too wide (UMN is a big school), wouldn&#x27;t have caught any sock puppets, dramatically misstated what had been requested</font><br> <p> Agreed. But my point is: knowing that this static analyzer from UMN is crap, even if they improve it it will be a while before maintainers start reviewing UMN static analyzer fixes with any interest.<br> <p> Sending crap patches has happened to everyone, accepting them too. But it&#x27;s one thing to break some eggs while making an omelette, it&#x27;s another thing to carelessly drop the entire box of eggs on the floor.<br> <p> Banning is theatre, loss of trust is not.<br> </div> Sat, 24 Apr 2021 08:47:42 +0000 A statement on the UMN mess https://lwn.net/Articles/854328/ https://lwn.net/Articles/854328/ viro <div class="FormattedComment"> First of all, I *really* hope umn.edu mail does not get dropped by kernel.org lists; if it is, that should be fixed ASAFuckingP. As for the rest of it... Revert for 0c85a7e87465 ought to have been sent to Linus. By Aditya. As soon as he&#x27;d taken a good look at the patch he&#x27;d sent - say, on Apr 9, when the first replies started to arrive.<br> <p> Look, you know and I know that shit happens; so does Linus - we&#x27;d all been in situations when embarrassingly bad patch got sent, applied and pushed out. I do not believe that Linus would sit on the author-sent revert request for days - and no such revert had been applied so far.<br> <p> It doesn&#x27;t need to be sent (or Cc&#x27;d) to any public lists - mail to Linus and davem with anything along the lines of &quot;$commit had been garbage; fortunately it&#x27;s harmless, but it&#x27;s completely bogus and should&#x27;ve been caught before sending it out; please revert it&quot; would&#x27;ve taken care of the retraction just fine. _Not_ doing that is really bad form.<br> <p> Seriously, check that commit. The first chunk: &quot;let&#x27;s zero a local variable immediately upstream of return, lest we get double-free&quot;; the second one: &quot;we are slightly downstream of spin_unlock_irqrestore(&amp;rm-&gt;m_rs_lock, flags); better check that we hadn&#x27;t somehow gotten through it with rm == NULL&quot; (in the second one rm comes from list_entry(), BTW). It&#x27;s that bogus...<br> <p> As for the missing data, I&#x27;d been referring to the recent paper on UAF injection and experiment described (FSVO) in there.<br> </div> Sat, 24 Apr 2021 03:00:11 +0000 A statement on the UMN mess https://lwn.net/Articles/854327/ https://lwn.net/Articles/854327/ deater <div class="FormattedComment"> <font class="QuotedText">&gt; If the U of M should have funding pulled from its thousands of researchers over that, then so should many, many major institutions.</font><br> <p> yes, I agree with you 100%. We should pull U of Minnesota&#x27;s funding and then we can get to work on all of the others.<br> </div> Sat, 24 Apr 2021 02:07:20 +0000 A statement on the UMN mess https://lwn.net/Articles/854325/ https://lwn.net/Articles/854325/ bfields <div class="FormattedComment"> &quot;one of the co-authors of that paper had been recently playing with a static analyzer of theirs and sent a bunch of patches coming out of that. Some of the patches were utter crap. Unfortunately, they got merged. Even more unfortunately, the author *still* have not bothered to send revert request for said garbage patches.&quot;<br> <p> I think umn.edu mail is getting dropped by the kernel lists.<br> <p> Which doesn&#x27;t prevent them from responding to you personally. Still, it&#x27;s not a good way to communicate that we&#x27;d like more followup from them.<br> <p> By the way, https://www-users.cs.umn.edu/~kjlu/papers/crix.pdf does include more data in the appendices. Unfortunately the list is just by filename and line number. Still, knowing that and the authors it&#x27;d probably be doable to identify the patches. But that&#x27;s from a couple years ago, it doesn&#x27;t cover the latest set of patches.<br> </div> Sat, 24 Apr 2021 02:02:34 +0000 A statement on the UMN mess https://lwn.net/Articles/854319/ https://lwn.net/Articles/854319/ viro <div class="FormattedComment"> OK, that went far enough. We have several things conflated here.<br> <p> 1) a low-quality paper a while ago, with no data, no experiment protocol, etc. The lack of data is a part of what&#x27;s blowing the whole thing out of proportion - if they bothered to attach the list (or link to such) of SHA1 of commits that had come out of their experiment, or, better yet, maintained and provided the list of message-ids of all submissions, successful and not, this mess with blanket revert requests, etc. would&#x27;ve been far smaller (if happened at all)<br> <p> 2) one of the co-authors of that paper had been recently playing with a static analyzer of theirs and sent a bunch of patches coming out of that. Some of the patches were utter crap. Unfortunately, they got merged. Even more unfortunately, the author *still* have not bothered to send revert request for said garbage patches. _That_ is the worst (academical) sin he can be charged with in the entire story, AFAICS - if you publish something that turns out to be bogus, you really ought to publish correction or retraction as soon as possible. I am quite certain by now that patches had been crap in good faith; the odds of that being the penetration testing, take 2, are IMO very low.<br> <p> 3) patches claiming to be fixes are sometimes (and I would like to see the dataset behind that paper, exactly because it might provide interesting correlates) taken with only a cursory review. That was another commonality between their paper and the current set of patches, which is what got the mess going.<br> <p> 4) bulk revert request had, IMO, been wrong. Much too wide (UMN is a big school), wouldn&#x27;t have caught any sock puppets, dramatically misstated what had been requested (it was actually a bulk *review* request put in that form) and got a lot of free publicity for the original paper, while we are at it.<br> <p> 5) results of review so far - nothing dramatic whatsoever. Nothing plausibly malicious, no wrongbots, overall more or less usual quality.<br> <p> IOW, I don&#x27;t see any reasons to block UMN folks, including the group involved with that paper.<br> </div> Sat, 24 Apr 2021 01:02:12 +0000 A statement on the UMN mess https://lwn.net/Articles/854321/ https://lwn.net/Articles/854321/ Paf <div class="FormattedComment"> I want to be clear: I am not trivializing the seriousness of that event. Or other abuses of human beings committed during research. It’s terrible.<br> <p> But it is not does it represent a pattern associated with the U of M. It’s one horrible incident. If the U of M should have funding pulled from its thousands of researchers over that, then so should many, many major institutions.<br> </div> Sat, 24 Apr 2021 00:33:06 +0000 A statement on the UMN mess https://lwn.net/Articles/854320/ https://lwn.net/Articles/854320/ Paf <div class="FormattedComment"> *eyes roll so hard in to head it hurts*<br> No. My alma mater has a few specific incidents over a history stretching back over 150 years, much of that as a *huge* institution (in the 2000s, it was briefly the largest in the US, by student population). There are *so many* incidents of research misconduct spread across academia throughout history, many of them justifiably infamous. The U of M is not known for this, nor should it be.<br> </div> Sat, 24 Apr 2021 00:29:53 +0000 A statement on the UMN mess https://lwn.net/Articles/854317/ https://lwn.net/Articles/854317/ deater <div class="FormattedComment"> <font class="QuotedText">&gt; the university has no particular history of bad conduct outside of this (very serious) incident.</font><br> <p> you might look up the &quot;Dan Makingson Case&quot;, your alma mater has a long history of unethical research<br> <p> what should happen here is the NSF should pull all funding from the University. US Government funding is hard to get, over 50% of computer related research grants are denied. If UMN repeatedly shows they can&#x27;t be trusted to conduct ethical research, then the money should go to Universities than can be trusted. I&#x27;m not sure how many chances they should be given.<br> </div> Fri, 23 Apr 2021 23:48:55 +0000 A statement on the UMN mess https://lwn.net/Articles/854314/ https://lwn.net/Articles/854314/ sjj <div class="FormattedComment"> Yes, the hand wringing about other people with umn.edu addresses now being rejected is misguided. This is obviously a way to get the university&#x27;s attention and doing it publically forces them to at least investigate. If it proves right, and I have quite a lot confidence in Greg K-H, some people just destroyed their careers. Watch for them try to blame this on some rogue students.<br> </div> Fri, 23 Apr 2021 23:34:32 +0000 A statement on the UMN mess https://lwn.net/Articles/854309/ https://lwn.net/Articles/854309/ Paf <div class="FormattedComment"> This is my alma mater, and I’ve spent a lot of time lately telling people how incredibly serious their actions were and how incredibly furious I would be if I were Greg.<br> <p> That said, lot of the conversation here seems a little silly - the university has no particular history of bad conduct outside of this (very serious) incident. The defense of a member of staff or administration (referenced above) who committed significant bad actions is A) unrelated, and B) sadly common and hardly indicative of something especially wrong with *this* university that is not found elsewhere.<br> <p> This will play out exactly as it is now - the ban is Greg’s best weapon to change things *now*. The two sides will talk about it, the U of M will apologize *profusely*, as they should, they will try to make some changes, they’ll never do anything like this again for many years, and they will be allowed to participate again. (The particular individuals will perhaps not be allowed. Which I’d certainly understand, to say the least.)<br> <p> This particular IRB may get blown up, but periodic or even systematic bad decisions by IRBs and university officials will continue largely unadjusted.<br> </div> Fri, 23 Apr 2021 22:13:21 +0000 IRB wasn't consulted until experiment was done https://lwn.net/Articles/854307/ https://lwn.net/Articles/854307/ david.a.wheeler <div class="FormattedComment"> In this case, the IRB was not even *consulted* until the experiment was done. THEN the IRB made a bad after-the-fact decision, though it&#x27;s hard to tell if its decision was influenced by the fact it was already done.<br> <p> IRBs are required for any experiment done on humans, at least in the US if they use government funding.<br> </div> Fri, 23 Apr 2021 21:51:53 +0000 A statement on the UMN mess https://lwn.net/Articles/854306/ https://lwn.net/Articles/854306/ david.a.wheeler <div class="FormattedComment"> <font class="QuotedText">&gt; Personally, I think someone from the university ought to sign off on the patches as a representative of the school. if they are being submitted from university email. And if there is misconduct, this person gets the blame.</font><br> <p> I think that&#x27;s excessive &amp; unnecessary.<br> <p> The issue here is experimentation on humans without their consent. There are already processes to prevent this (namely the university IRB process). Something went wrong, hopefully it can get fixed.<br> </div> Fri, 23 Apr 2021 21:48:31 +0000 Experimentation on humans without their consent https://lwn.net/Articles/854304/ https://lwn.net/Articles/854304/ david.a.wheeler <div class="FormattedComment"> This was a funded experiment by U of MN researchers on humans (the Linux kernel developers) who had NOT consented to being part of an experiment. The experiment didn&#x27;t even go through the university&#x27;s IRB until *after* the experiment was done (NO!), and then the IRB approved an experiment on humans without their consent (NO!). This is a HUGE deal. As GregKH noted, the developers didn&#x27;t appreciate “being experimented on”.<br> <p> These were not just &quot;poor patches&quot; either, they *deliberately* created proposals to add vulnerabilities as described in the draft paper, &quot;On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits&quot;.<br> <p> I love research! But researchers are not allowed to attack deployed systems without permission from their owners, and researchers are not allowed to experiment on people without consent from those people. These are basic table-stakes for experiments.<br> <p> </div> Fri, 23 Apr 2021 21:44:41 +0000 A statement on the UMN mess https://lwn.net/Articles/854303/ https://lwn.net/Articles/854303/ david.a.wheeler <div class="FormattedComment"> <font class="QuotedText">&gt; Doing this using your personal email or hiding behind a generated email borders on being malevolent and could be characterized as a deliberate fraud, which has many possible legal consequences.</font><br> <p> Indeed. Here&#x27;s a quote straight from the draft paper &quot;On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits&quot;, Qiushi Wu and Kangjie Lu:<br> <p> <font class="QuotedText">&gt; We submit the three patches using a random Gmail account to the Linux community and seek their feedback—whether the patches look good to them.</font><br> </div> Fri, 23 Apr 2021 21:32:26 +0000 A statement on the UMN mess https://lwn.net/Articles/854300/ https://lwn.net/Articles/854300/ nedu <div class="FormattedComment"> In the US, I don&#x27;t think it&#x27;s a question of stopping bad code before it reaches &quot;a release or a release candidate.&quot;<br> <p> If the intent of the bad code is an &quot;impairment to the integrity or availability of data, a program, a system, or information&quot;, then I think the bad code needs to get stopped before it gets run without authorization on any computer &quot;used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States&quot;.<br> <p> If that&#x27;s too many words, then what I&#x27;m saying is that if the bad code gets run on someone&#x27;s test machine, then it&#x27;s some kind of problem.<br> <p> Now we can ask ourselves how much &quot;real&quot; damage there is to just some test machine, and what the right policy ought to be. And then we can all go write Congress and tell them that some of the bad code they write is quite frankly terrifying for legitimate research...<br> <p> But do patches get ACK&#x27;d without ever being run at all?<br> </div> Fri, 23 Apr 2021 21:24:27 +0000 A statement on the UMN mess https://lwn.net/Articles/854293/ https://lwn.net/Articles/854293/ bfields <blockquote>it's just they claim those were different research and a result of a 'new static analyzer' whose 'sensitivity is obviously not great'.</blockquote> I don't think we've seen any strong reason to doubt that at this point. <p>I mean, it's a research group that's done a lot of different things, so has sent patches as part of various projects at various times, and unsurprisingly a few of them have turned out to have bugs. <p>This series of reverts from Greg has found a few minor bugs, but it's hard to tell whether the bug rate is really anything unusual: <a href="https://lore.kernel.org/lkml/18edc472a95f1d4efe3ef40cc9b8d2611d4ab990.camel@redhat.com/">https://lore.kernel.org/lkml/18edc472a95f1d4efe3ef40cc9b8d2611d4ab990.camel@redhat.com/</a> Fri, 23 Apr 2021 19:54:49 +0000 Ethical board approval for security research https://lwn.net/Articles/854281/ https://lwn.net/Articles/854281/ Wol <div class="FormattedComment"> <font class="QuotedText">&gt; I think you&#x27;re (somewhat violently…strongly?) agreeing with me? I was replying to the implication that 2004 is not recent.</font><br> <p> Yup.<br> <p> Cheers,<br> Wol<br> </div> Fri, 23 Apr 2021 18:59:29 +0000 Ethical board approval for security research https://lwn.net/Articles/854253/ https://lwn.net/Articles/854253/ mathstuf <div class="FormattedComment"> I think you&#x27;re (somewhat violently…strongly?) agreeing with me? I was replying to the implication that 2004 is not recent.<br> <p> <font class="QuotedText">&gt; &gt; 2004 is also short enough time that there&#x27;s a significant chance that there&#x27;s overlap in personnel between the two periods</font><br> <p> Sounds likely if your assertion is true:<br> <p> <font class="QuotedText">&gt; And the people responsible for the cover-up are still mostly in place.</font><br> </div> Fri, 23 Apr 2021 17:20:00 +0000 Ethical board approval for security research https://lwn.net/Articles/854250/ https://lwn.net/Articles/854250/ Wol <div class="FormattedComment"> Read the article. The then-head of the department responsible for SIX suicides? has been given - as the article says - &quot;a soft landing&quot;. Sounds like he&#x27;s no longer *officially* in charge, but still has considerable influence.<br> <p> And the people responsible for the cover-up are still mostly in place.<br> <p> Cheers,<br> Wol<br> </div> Fri, 23 Apr 2021 17:15:23 +0000 Ethical board approval for security research https://lwn.net/Articles/854249/ https://lwn.net/Articles/854249/ lbt <div class="FormattedComment"> Thanks - I missed that conversation.<br> </div> Fri, 23 Apr 2021 17:09:57 +0000 A statement on the UMN mess https://lwn.net/Articles/854244/ https://lwn.net/Articles/854244/ JoeBuck There will be those who will attempt to inject malware into the kernel for more malicious purposes than just to get a conference paper out of it, so there might be an argument for doing this kind of testing in a more controlled manner. For example, some companies are testing their employees' ability to recognize phishing, and training them to do a better job at it, by occasionally sending out something that should be recognizable as a phishing attempt. <p> But deciding on whether to do this or not should be up to Linus and the senior maintainers. They could arrange occasional tests, but have at least two people who are "in the know" who can stop the bad code from reaching a release or a release candidate. Fri, 23 Apr 2021 16:36:05 +0000 A statement on the UMN mess https://lwn.net/Articles/854242/ https://lwn.net/Articles/854242/ MatejLach <div class="FormattedComment"> Apparently this was not done in all cases. Some of their buggy patches made it into stable, it&#x27;s just they claim those were different research and a result of a &#x27;new static analyzer&#x27; whose &#x27;sensitivity is obviously not great&#x27;.<br> <p> I find this excuse a bit suspect considering it&#x27;s the same group of people, but even if a few patches were made in good faith, they were in their outcome indistinguishable from the on purpose bad ones. <br> <p> Not sure I&#x27;ll miss this group not being able to contribute in particular if am honest. <br> </div> Fri, 23 Apr 2021 16:14:21 +0000 A statement on the UMN mess https://lwn.net/Articles/854238/ https://lwn.net/Articles/854238/ ssmith32 <div class="FormattedComment"> Also: A fix and bug report was sent immediately after the patches were accepted, and the issues were prevented from making out into the wild.<br> <p> I don&#x27;t agree with the research (imagine what would happen if they sent an intern to Google to write vulns as research), but the fact that the kernel side of thing is leaving that out of their reporting seems biased.<br> </div> Fri, 23 Apr 2021 15:54:36 +0000