Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   15 Feb 2001  18:24:51
 To : All
 Subject : URL: http://lwn.net/2001/0215/letters.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [LWN.net]
    
    Sections:
     [3]Main page
     [4]Security
     [5]Kernel
     [6]Distributions
     [7]Development
     [8]Commerce
     [9]Linux in the news
     [10]Announcements
     [11]Linux History
     Letters
    [12]All in one big page
    
    See also: [13]last week's Letters page.
    
 Letters to the editor
 
    Letters to the editor should be sent to [14]letters@lwn.net.
    Preference will be given to letters which are short, to the point, and
    well written. If you want your email address "anti-spammed" in some
    way please be sure to let us know. We do not have a policy against
    anonymous letters, but we will be reluctant to include them.
    February 15, 2001
    
    
 To: ylo@ssh.com, letters@lwn.net
 Subject: Your legal threats concerning the SSH trademark
 Date: Wed, 14 Feb 2001 13:06:01 -0500 (EST)
 From: Don Barry <don@astro.cornell.edu>
 
 Dear Mr. Ylonen,
 
 First, I wish to thank you for designing the first SSH protocol and
 working with international standardization bodies to create what is now
 an official as well as unofficial standard for secure communications between
 computers.  I also thank you for beginning this effort under an open
 source license, which I hope you realize was an essential part of your
 contribution being accepted as a standard.
 
 Now to the criticism.  I was very disappointed when you took your product
 in a commercial direction: I frankly found it a predatory maneuver to
 establish a project in an open source manner and then proprietize it after
 having it accepted as a standard.  I gave you the benefit of the doubt and
 presumed this behavior was accomplished by business denizens who by then
 controlled the destiny of your company.
 
 I see now that I was wrong.  Even if my original presumption was
 correct, by lending your own name now to a legal effort to throw confusion
 into the arena of SSH protocol products, you have confirmed the worst
 suspicions of many of us.
 
 Actually, I find essentially all users of SSH and OpenSSH are quite clear
 about the origins and distinctions between these programs.  The downturn
 in your commercial fortune is not due to a "confusion" between these two
 products -- it is in fact due to a *recognition* that the open source
 version is superior, and the desire of users to not choose a product
 offered by a developer and company which has shown erratic and greedy
 behavior in the past.  Frankly, I wish they had developed this product
 in the GPL fashion, because this *free source* technique is even superior
 and would prevent would-be pirates (like you are free to do)
 from generating proprietary code forks.
 
 The confusion and doubt which you mention is not in the use of the OpenSSH
 designation to describe a well-known code base, it is actually your attempt to
 generate confusion among those who would use the open alternative to your
 product, by obfuscating its identity.
 
 Finally, your statement claiming fundamental insecurities in the
 SSH1 compatibility mode of the OpenSSH product (something, I might add, now
 offered by your *own* product after a failed attempt to do a full proprietary
 transition) is a classic example of Fear, Uncertainty, and Doubt in action.
 The theoretical vulnerabilities of the SSH1 protocol to insertion attacks
 would prove extremely difficult to mount in practice, and the actual
 CERT vulnerabilities you mention deal with more mundane affairs such as
 buffer overflows -- something your *own* product has also suffered from.
 These real-world vulnerabilities are of course the primarily exploitable ones,
 and are a factor of the quality of the code base, not the algorithms.
 And, of course, the OpenSSH software does implement both SSH1 and SSH2
 protocols.
 
 In my own academic capacity, I have succeeded in impressing on my colleagues
 the importance of using secure communications in our activities.  We use
 both the SSH and OpenSSH codes in my department.  If you wish to compete in thi
 s
 arena, do it through the creation of superior software, preferably in the
 open (or better yet, *free*) domain, and not through legal maneuvers.
 Henceforth, should you not choose a more moderate and cooperative path in
 working with the community of coders producing for the public good, I will do m
 y
 best to make sure that your product is found on not one of our machines, and
 that people know exactly the reason why.
 
 Cheers,
 
 Don Barry, Ph.D.
 Space Infrared Telescope Facility Team
 Cornell University
 
    
 To: letters@lwn.net
 From: Jim Dennis <jimd@starshine.org>
 Subject: Tatu Ylonen's message to the OpenSSH developers
 Date: Wed, 14 Feb 2001 17:16:23 -0800
 -----BEGIN PGP SIGNED MESSAGE-----
 Hash: SHA1
  I personally applaud Tatu Ylonen's restraint and tact in his message
  to the OpenSSH developers list.  I think it's long overdue.
 
  It's a pity that SSH(TM) isn't completely free.  It's a pity that
  Tatu hasn't found a revenue model that would allow him to release
  under the GPL or BSD licenses, or to create a DFSG compliant license.
  Obviously, revenue models are a hard problem for free software -- and
  some people do need to live off their programming labors.  I can't
  begrudge Tatu (or others) that.
 
  However, it's equally a pity that no one has come out with a fully
  independent protocol compatible re-implementation.  Tatu published
  his sources, and a full description of the protocols (both versions?)
  and has actively encouraged (through his participation in the IETF)
  an independent implementation.  (IETF guidelines strongly suggest,
  nigh onto *require* multiple independent and interoperable
  implementations of all new Internet standards).  lsh/psst
  ([15]http://www.net.lut.ac.uk/psst/) seems to be a moribund project; the
  fact that it hasn't even become available as a Debian package in
  unstable is testimony to that.
 
  (I also think that it's a pity that SSH(TM) and its ilk are still
  necessary.  Unfortunately the deployment of IPSec and especially
  secure DNS still lags to the point where opportunistic encryption and
  transparent authentication are still distant dreams).
 
  Unfortunately I think that Tatu will be castigated for his message
  and I'd like to go on record as saying that all the complainers
  should stuff it!  Go help Martin Hamilton and the rest of the psst
  team if you insist a fullly GPL version of an ssh(TM) compatible
  package.  (Or help get InterNIC to adopt a secure DNS version of BIND
  *and* to publish keys and sign their top level zone data --- and
  otherwise help us realize IPSec).
 
  Meanwhile the OpenSSH [sic] team should probably consider renaming
  their package OpenSecsh (possibly to be pronounced like a drunk
  commenting on "promiscuous sex").  I suspect that Tatu would have no
  complaint about their use of the IETF name for the protocol --- and
  he hasn't even asked them/us to change the name of the binary.
 
  I'd, nonetheless recommend that they/we rename the binary, and
  include a wrapper script called ssh that does something like
  reasonable.  ( Something like:
 
             #!/bin/sh
             echo "SSH is a trademark of SSH Inc and Tatu Ylonen" 2&>1
             /usr/bin/secsh "$@"
         ... or a C binary wrapper to that effect; would suffice.
 
  Acknowleging the author and trademark holder when calling the program
  under it's traditional name seems appropriate and anyone who thinks
  this onerous (or finds that it's causing their scripts to break) can
  simply make their own alias or wrapper, or change to the new name.
 
  Tatu (copied on this), thank you for your patience and tolerance in
  this matter. Also, I'd like to thank you for writing an indispensable
  piece of software that has truly made the Internet safer.  The thing
  that will help further is its continued development, the accelerated
  demise/upgrade of the obsolete versions, and more ubiquitous use.
 
 - --
 Jim Dennis
 Software Analyst
 Axis Personal Trainers                  [16]http://www.axispt.com
 
 -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1.0.4 (GNU/Linux)
 Comment: Processed by Mailcrypt 3.5.5 and Gnu Privacy Guard <[17]http://www.gnu
 pg.org/>
 
 iEYEARECAAYFAjqLLd0ACgkQIGV97BI+xjGUjgCfZV+K5nyOQhLFvQIoXiqdAJYA
 IuMAn2UkVoFWDTZZNYcj2Q1lFZ6V2fcc
 =dZ7F
 -----END PGP SIGNATURE-----
 
    
 Subject: HTML email privacy
 To: editor@lwn.net
 Date: Thu, 8 Feb 2001 13:51:04 +0000 (GMT)
 From: Alan Cox <alan@lxorguk.ukuu.org.uk>
 
 The article you point to on html email privacy is actually quite misleading.
 Disabling javascript will not protect against most email privacy attacks.
 
 A simple
 
         <IMG src="[18]http://evil.mailtracking.scum.org/cgi-bin/track?id=123456
 ">
 
 type tag will allow the tracking of the host used to read each email. The
 information that most browsers will hand back generally provides the ip
 address and other basic system factors (including monitor size with some
 browsers).
 
 It is also possible to use the rlogin: URL to extract usernames from browsers
 because the rlogin client will pass username information as part of the
 connection setup. From this and the IP address you can normally deduce an
 awful lot about the user.
 
 No javascript required.
 
 Alan
 
    
 From: Hubert Tonneau <hubert.tonneau@heliosam.fr>
 To: letters@lwn.net
 Subject: DNS servers list: Pliant is missing
 Date: Thu, 08 Feb 2001 11:05:49 GMT
 
 In february the 8th issue of LWN, you listed several alternatives to Bind,
 but forgot Pliant ([19]http://pliant.cx/)
 
 Pliant DNS server is:
 . released under GPL,
 . very compact (less than 1000 lines)
 . using Pliant database engine for reliably storing configuration files
 . remotely administrated using a web browser over Pliant strong crypto
   secured channel.
 
 It's not suited for first level domains such as (.com or .fr), but for
 hosting second level domains of your compagny or your organization
 (pliant.cx or heliogroup.fr), it should work just fine.
 Of course, it can also act as a caching DNS for your site or your computer.
 
 Regards,
 Hubert Tonneau
 
    
 From: Russell Nelson <nelson@crynwr.com>
 Date: Thu,  8 Feb 2001 10:46:03 -0500 (EST)
 To: lwn@lwn.net
 Subject: not true
    From the above list, one can conclude that BIND's competitors have
    some ground to cover yet. Energetic hackers looking for a project may
    want to consider the creation of a viable competitor to BIND; the net
    will be a safer place when we have one.
 
 Why?  djbdns is a viable competitor to BIND.  The author's personality
 is irrelevant to the quality of the software, the author considers
 your inability to redistribute modified versions to be a feature (and
 given the track record of some vendor-modified versions of sendmail
 and bind, he's got a point), and the code is only difficult to read
 because it uses many functions from Dan's library.  Said library by
 design discourages buffer overruns.  Did I mention that it discourages
 buffer overruns, which are irresponsible for 50% of all Unix security
 lapses?  It's not C, it's the C library.
 
 And djbdns could serve the .com zone using 3GB of memory, as opposed
 to the 8GB used by ISC's root zone server.  Is that a large enough
 zone for you?
 
 --
 -russ nelson <sig@russnelson.com>  [20]http://russnelson.com
 Crynwr sells support for free software  | PGPok | "This is Unix...
 521 Pleasant Valley Rd. | +1 315 268 1925 voice | Stop acting so helpless."
 Potsdam, NY 13676-3213  | +1 315 268 9201 FAX   | --Daniel J. Bernstein
 
    
 Date: 8 Feb 2001 10:09:49 -0000
 From: cpb@log2.net
 To: letters@lwn.net
 Subject: Asbestos for you
 
 On the LWN front page of Feb. 8, 2001, you state that the djbdns DNS server
 "lacks some capabilities (TCP service, zone transfers, ...), making it not
 necessarily suitable for larger domains."
 
 Please print this email on asbestos and add it to the truckload of asbestos
 you will need should someone with more knowledge of djbdns and the desire
 to demonstrate that knowledge choose to come after you with email flames!
 
 I have the knowledge, but not the desire.                   - Chris Bopp
 
 P.S. If djb himself writes, you will need more than a truckload!
 
    
 Date: Thu, 8 Feb 2001 08:54:12 +0100
 From: Frank Tegtmeyer <fte@fte.to>
 To: lwn@lwn.net
 Subject: errors about djbdns on your front page
 
 Hi,
 
 while I am glad you mentioned djbdns as a secure alternative to
 BIND, I have to point out at least two errors:
 
 "djbdns also lacks some capabilities (TCP service, zone transfers, ...),
 making it not necessarily suitable for larger domains."
 
 djbdns (formerly dnscache) contains axfrdns since January 2000. Therefor
 your statement about TCP and zone transfers is not true and has to be seen
 as misinformation. Making these false statements you come to the conclusion
 that djbdns is "not necessarily suitable for larger domains". This is
 ridiculous and not backed by any facts.
 
 I invite you to join the djbdns mailinglist and ask for large companies
 using djbdns or for ISP with a big number of zones using djbdns.
 
 The point is that djbdns doesn't lack features of BIND - it is simply
 different. You have to stop "BIND thinking" when handling djbdns.
 I agree that you can get into some trouble because of the mentioned
 "monoculture" at the Internet today when using djbdns. But there
 are enough people using djbdns that prove your statements wrong.
 I expect the necessary corrections at your page.
 
 With kind regards,
 Frank Tegtmeyer
 
    
 Date: Thu, 8 Feb 2001 19:05:45 -0500
 From: "Jay R. Ashworth" <jra@baylink.com>
 To: letters@lwn.net
 Subject: DJB and his DNS
 
 In the special on djbdns, the editor wrote:
 
 > In the end, though, you need not like Mr. Bernstein to make good use
 > of his software.
 
 That's a comforting assertion, but I'm not sure whether it's correct or
 not.  I can see many reasons why the attitude of a software package's
 maintainer is a pertinent issue in selecting what you're going to
 deploy in your network, be that network 2 machines or 200,000.
 
 Even in the free software world, it would seem to be an issue.  While
 the old "you have the source, you can fix your own problems" argument
 will surely be made here, of course, it's not true for everyone:
 especially something as hirsute as a DNS server is not code that
 everyone will be able to do anything with.
 
 One of the projects that I'm involved with (when I can find time and
 manage not to be ill) is the open fax server software system HylaFAX,
 originally written by Sam Leffler when he was at Silicon Graphics, and
 now available under a reasonably open license (I believe it's either
 strict or slightly modified BSD).  <[21]http://www.hylafax.org>
 
 While the package has a fairly decent sized user community -- frankly,
 we don't know how big it is because most of the installations Just Work
 :-) -- finding good developers who can work on it is hard.
 
 That's because it's a) soft-real-time code and b) written in C++.
 
 We're lucky to have the 4 or 5 people we do, when they can spare the
 time, but it sure wouldn't hurt if there were a few more.
 
 What *is* safe to say, though, based on the support queries I see on
 our user mailing list, is that the vast majority of the people who
 {are,would like to be} deploying it are *not* equipped to do more than the
 slightest little bit of hacking on it around the edges.  And there's
 nothing wrong with that; in fact, it's essential.
 
 Luckily, the development community on this project, headed by Mr.
 Arlington Hewes, is much more personable and easy to get along with
 than DJB is reputed to be (I've never worked with the man, but I heard
 the sparks around the edges of maildir format support when I was on the
 mutt-devel list.)
 
 So perhaps, just having good code *isn't* enough; we geeks are going to
 have to come out into the real world, too.
 
 Damn.
 
 What a shame.  :-)
 
 Cheers,
 -- jra
 --
 Jay R. Ashworth                                                jra@baylink.com
 Member of the Technical Staff     Baylink
 The Suncoast Freenet         The Things I Think
 Tampa Bay, Florida        [22]http://baylink.pitas.com             +1 727 804 5
 015
 
    
 Date: Thu, 8 Feb 2001 21:08:55 +0000
 From: Alain Williams <addw@phcomp.co.uk>
 To: lwn@lwn.net
 Subject: The case for competition
 
 I will not labour the well sung refrains that competition is good because:
 it leads to the evolution of good solution(s); heterogeneity engenders
 robustness in the face of cracking attacks; choice for the solution that is
 right for you; ...
 
 There seems to be a curious belief that everyone involved in Open Source
 is, somehow, supposed to be working together, that we are all part of some
 big global organisation or company. That belief naturally leads to the
 assertion that different (but similar) Open Source projects are really
 branches of this one organisation are competing/working against each
 other. The mental analogy is as if different departments in
 IBM/Microsoft/...  worked to produce competing: word processors, compilers,
 ...
 
 There is also the reinforcing notion that if it comes from one
 organisation, then it was all written by that place. People see Linux as
 being an organisation, and so think that the different Linux distributions
 are probably something to do with the supply chain; putting a slightly
 different badges on *one* product made by some higher up company.
 
 The idea of software being produced by a ``for profit'' company is deeply
 ingrained. One frequent question that I get asked is something like: ``If
 it is given away how does Linux pay for the development ?''. The idea of a
 community sharing resources seems hard to grasp.
 
 With this one company gestalt it is hardly surprising that competing
 projects (be that desktops or MTAs) are seen as a flaw in the Open Source
 ``business'' model. These same people would have no problem in accepting
 different companies competing to produce the better product and so gain
 market share and so, presumably, profit. Most people don't understand the
 Open Source ``business'' model. Whereas a conventional business survives by
 competition, Open Source survives by cooperation.
 
 Another problem is that many people do not like choice. They just want to
 know ``the way to do XXXX'', if there is choice then they need to think,
 and most people don't want to think about the choices in how to use
 computers -- this is not a derogatory remark, it is recognition that for
 most people a computer is a tool with which to do a job; for most people
 that is the right attitude.
 
 But people love choice when it comes to cars, refrigerators, video
 recorders; so why not computer software ? I think that one big reason is
 the learning effort that goes into changing the computer software that you
 use. The learning effort for changing the other things is trivial; well,
 maybe I was wrong to talk about video recorders - but you get the idea.
 
 In summary: we, the technical community, have to beware trying to judge
 other people's view of us (and our actions) from our own points of
 view. Let us try to see ourselves as others see us; if we don't like what
 we see then maybe we need to change the way that we present ourselves (and
 our passions) to the rest of the world. Ie we need to learn to communicate.
 
 --
 Alain Williams
 
    
 Date: Thu, 8 Feb 2001 14:05:12 -0600
 From: David Fries <dfries@umr.edu>
 To: letters@lwn.net
 Subject: proving compliance
 
 Lets say you or your company does go with GPL or free software.  How
 do you prove that?  I think it is harder than it sounds.  It is easy
 for them to say you have software you can't show a license, but it is
 a harder job to show you don't have the software.  What are they going
 to go though every megabyte on your drive and make you decrypt all
 data?
 
 I'm for free software, but I don't think it will prevent a raid and is
 there any way for someone to get back at them for disrupting a
 business that is in compliance?
 
 --
                 +---------------------------------+
                 |      David Fries                |
                 |      dfries@umr.edu             |
                 +---------------------------------+
 
    
    
                                                                          
    
    [23]Eklektix, Inc. Linux powered! Copyright Л 2001 [24]Eklektix, Inc.,
    all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=pageid=132-000-001-001
    3. http://lwn.net/2001/0215/
    4. http://lwn.net/2001/0215/security.php3
    5. http://lwn.net/2001/0215/kernel.php3
    6. http://lwn.net/2001/0215/dists.php3
    7. http://lwn.net/2001/0215/devel.php3
    8. http://lwn.net/2001/0215/commerce.php3
    9. http://lwn.net/2001/0215/press.php3
   10. http://lwn.net/2001/0215/announce.php3
   11. http://lwn.net/2001/0215/history.php3
   12. http://lwn.net/2001/0215/bigpage.php3
   13. http://lwn.net/2001/0208/letters.php3
   14. mailto:letters@lwn.net
   15. http://www.net.lut.ac.uk/psst/
   16. http://www.axispt.com/
   17. http://www.gnupg.org/
   18. http://evil.mailtracking.scum.org/cgi-bin/track?id=123456
   19. http://pliant.cx/
   20. http://russnelson.com/
   21. http://www.hylafax.org/
   22. http://baylink.pitas.com/
   23. http://www.eklektix.com/
   24. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://lwn.net/2001/0215/letters.php3   Sergey Lentsov   15 Feb 2001 18:24:51 
Архивное /ru.linux/20308f331cef5.html, оценка 2 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional