Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:They are not consuming 30% of power (Score 2) 107

Maybe. But on the other hand, even active servers spend a lot of their time idle (the paper says server utilization "rarely exceeds 6%"), and I bet a lot of these "comatose" servers are actually long-forgotten old hardware, or machines that nobody can be bothered to decommission -- it's possible that on average they're older than active servers and thus eating a lot more power.

Comment Re:Why IPv6 is broken (Score 1) 595

Yes, you said that already and it was already a given, but what new thing can the host do now that it couldn't do before that allows it to send packets to a v6 address?

Remember, the host is still connected to the v4 internet, and it still has no v6 internet connection. It has to send v4 packets. What v4 packets can it send to reach v6 hosts?

Comment Re:Why IPv6 is broken (Score 1) 595

But you could upgrade B and it would work without changing the configuration of A!!!!!

Did you finally get it now? You could upgrade B without touching A and NOT CHANGE the address of either A nor B and it would all work just fine.

No, because all you're still doing is telling me it'd work without explaining how.

Even with upgraded software on B, the v4 dest field is still too short for v6 addresses. This is the whole problem in the first place. How does the software upgrade help? What does the software upgrade actually do to work around this?

Comment Re:Why IPv6 is broken (Score 2) 595

It's really that simple. It's not about IPv4 connecting to IPv6 (that would be forward-compatibility, which is impossible in that case) but the other way around.

Okay, here's the critically important thing: these are no different to each other!

Remember, at the IP level, there's no such thing as "connections". There's no state. It's all just packets being sent from a source address to a dest address. So we could put v4 into a v6 prefix, and v6 hosts would be able to send packets to existing v4 hosts -- this would work just fine. But those v4 hosts could never respond. They can't fit the response address into their dest field.

And because that's not possible, you can't make a TCP connection or hold a UDP conversation. The ability to "yell at the existing v4 internet but never get a reply" just isn't going to be enticing enough to get anybody to drop their v4 connections. Basically, the v6 designers didn't do it because it was pointless to do.

Comment Re:Why IPv6 is broken (Score 1) 595

And then what? How would that lead to an inter-compatible v4 and v6? You're right that I don't get it; please explain it to me.

How would an existing v4 host at w.x.y.z be able to send to a v6 host at a.b.c.d.e.f.g.h.i.j.k.l.m.n.o.p? This seems like an entirely technical problem to me, and you can't normally just define your way out of those.

Comment Re:Why IPv6 is broken (Score 1) 595

How would you actually go about doing this though? I've seen lots of people go "IPv6 is retarded, they should've just added some extra numbers to the end of v4", and it's very easy to just sit there and say it, but none of them have explained how they could've done that and actually had it work.

Please, be the person that explains it to the world, if it's so obvious to you: how the heck do you beat the pigeonhole principle?

Comment Re:Respecting Privacy??? (Score 2) 531

For what it's worth: they don't take it. Your browser tracks your history (as it has always done, unless you've turned that off), and makes the decisions of which adverts to display locally.

Mozilla can attempt to infer your browsing history from which adverts you load (and I've seen discussions about trying to reduce the amount of information they receive, although I don't know how much of that actually made it to the implementation), but they don't get a copy of it. Only your local browser gets that.

Comment Re:Root cause = speed over security (Score 1) 71

It is, but you'd achieve a much higher resistance to precalculation attacks just by generating and sharing a longer key in the first place -- which also has the advantage of not burning hours of CPU time on every single machine.

Perhaps the best thing to do here would be for each system to download DH parameters (or get them from a package or whatever) at installation time, and then regularly change the parameters that are available for download. That avoids the massive generation time on each machine, but also limits the amount of machines that you share parameters with. So long as those parameters aren't tiny, that should be fine.

Bonus points if you include a simple "make_me_my_own_dhparams" script that makes generating your own parameters trivial, but I do think we can get most of the benefit here without requiring every single install to use it.

Comment Re:Root cause = speed over security (Score 1) 71

So... generating new DH parameters on each connection leads to connection latencies of up to a few hours, which isn't really viable?

Also, what are you trying to protect against by regenerating the key frequently? We normally cycle RSA keys every year or two because of the risk that someone might break into the server in that time and steal the key (and we don't want the stolen key to be valid forever), but that's not an issue with DH parameters because they're public anyway.

The other reason to regenerate frequently is to limit the window of opportunity for brute force attacks, but that doesn't make much sense either: instead of generating lots of small keys, just generate one bigger key in the first place. It'll take far less CPU time and yet still be far harder to brute force.

Comment Re:NOT a kernel bug (Score 4, Insightful) 70

It may not be part of the mainline Linux kernel, but the "firmware library" here is a kernel module, so this bug is a kernel-mode remote execution vulnerability. Which... probably isn't that much worse than a userland vulnerability for this type of device, where everything typically runs as root anyway, but still.

Comment Re:Get cracking (Score 1) 371

That's because it's not actually an extension. They landed the code directly in Firefox itself, so you can't remove it without patching and recompiling.

Also it landed quite recently, so it won't be in a release Firefox until... oh, what's that? We're going to do a special out-of-schedule 38.0.5 release because it needs to be shipped super-fast and we can't be bothered to follow our own testing/release cycle? Okay then.

Slashdot Top Deals

The only possible interpretation of any research whatever in the `social sciences' is: some do, some don't. -- Ernest Rutherford

Working...