Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment another way around internet blockage (Score 1) 123

Known VPN services have identifiable server addresses that can be blocked. Instead, you can set up a cheap raspberry pi (or other) at your home and use an encrypted SSH connection to that [raspberry pi] from far away. Then turn on your SOCKS proxy (part of WiFi Details on Macintosh) and check to see that your IP address shows to the world you access as that of your raspberry pi. I do this all the time, including right now. It also helps to watch sports events.

Comment A Jewel of an Engineer (Score 4, Insightful) 41

It seems right that since I announced the BBS Documentary production on Slashdot, I should also take the time to give testimony to one of its primary interviewees that took it from side fun project to meaningful historical work.

My goal had been to do a documentary on the BBS Experience, working from interviews with flexible friends and nearby folks, and then work up to the "Big Ones", the names who had been in my teenage mind when I ran a BBS, like Ward Christensen, Chuck Forsberg, Randy Suess, and others. But then I had someone from Chicago checking in to make sure I wasn't going to skip over the important parts the midwest had told in the story. So it was that a month into production, barely nailing down how I would fly post 9/11 with a studio worth of equipment, that I found myself at CACHE (Chicago Area Computer Hobbyist Exchange) and meeting Ward himself.

They say "Never meet your heroes." I think it's more accurate to say "Have the best heroes" or "Be the kind of person a hero would want to meet." Ward was warm, friendly, humble, and very, VERY accomodating to a first-time filmmaker. I appreciated, fundamentally, the boost that he gave me and my work, knowing I was sitting on hours of footage from The Guy.

There were many other The Guy and The Lady and The Groups for BBS: The Documentary, but Ward's humble-ness about his creation and what it did to the world was what made sure I never overhyped or added layers of drama on the work. Ward was amazing and I'll miss him.

Submission + - Samba gets funding from the German Sovereign Tech Fund.

Jeremy Allison - Sam writes: The Samba project has secured significant funding (€688,800.00) from the German
Sovereign Tech Fund (STF) to advance the project. The investment was
successfully applied for by SerNet. Over the next 18 months, Samba developers
from SerNet will tackle 17 key development subprojects aimed at enhancing
Samba’s security, scalability, and functionality.

The Sovereign Tech Fund is a German federal government funding program that
supports the development, improvement, and maintenance of open digital
infrastructure. Their goal is to sustainably strengthen the open source
ecosystem.

The project's focus is on areas like SMB3 Transparent Failover, SMB3 UNIX
extensions, SMB-Direct, Performance and modern security protocols such as SMB
over QUIC. These improvements are designed to ensure that Samba remains a
robust and secure solution for organizations that rely on a sovereign IT
infrastructure. Development work began as early as September the 1st and is
expected to be completed by the end of February 2026 for all sub-projects.

All development will be done in the open following the existing Samba
development process. First gitlab CI pipelines have already been running [4]
and gitlab MRs will appear soon!

https://samba.plus/blog/detail...

https://www.sovereigntechfund....

Comment Re:Maybe (Score 1) 104

The upstream Linux kernel doesn't differentiate between security bugs and "normal" bug fixes. So the new kernel.org CNA just assigns CVE's to all fixes. They don't score them.

Look at the numbers from the whitepaper:

"In March 2024 there were 270 new CVEs created for the stable Linux kernel. So far in April 2024 there are 342 new CVEs:"

Comment Re:Yeah (Score 1) 104

Yes ! That's exactly the point. Trying to curate and select patches for a "frozen" kernel fails due to the firehose of fixes going in upstream.

And in the kernel many of these could be security bugs. No one is doing evaluation on that, there are simply too many fixes in such a complex code base to check.

Comment Re:Maybe (Score 1) 104

You're missing something.

New bugs are discovered upstream, but the vendor kernel maintainers either aren't tracking, or are being discouraged from putting these back into the "frozen" kernel.

We even discovered one case where a RHEL maintainer fixed a bug upstream, but then neglected to apply it to the vulnerable vendor kernel. So it isn't like they didn't know about the bug. Maybe they just didn't check the vendor kernel was vulnerable.

I'm guessing management policy discouraged such things. It's easier to just ignore such bugs if customer haven't noticed.

Submission + - Why a 'frozen' distribution Linux kernel isn't the safest choice for security (zdnet.com) 1

Jeremy Allison - Sam writes: Cracks in the Ice: Why a 'frozen' distribution Linux kernel isn't the safest choice for security

https://ciq.com/blog/why-a-fro...

This is an executive summary of research that my colleagues Ronnie Sahlberg and Jonathan Maple did, published as a whitepaper with all the numeric details here:

https://ciq.com/whitepaper/ven...

Steven Vaughan-Nichols is covering the release of this
data here:

https://www.zdnet.com/article/...

Slashdot Top Deals

Why don't you fix your little problem... and light this candle? -- Alan Shepherd, the first man into space, Gemini program

Working...