<?xml version="1.0" encoding="utf-8" ?>

<rss version="2.0" 
   xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
   xmlns:admin="http://webns.net/mvcb/"
   xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
   xmlns:wfw="http://wellformedweb.org/CommentAPI/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/"
   >
<channel>
    
    <title>Hanno's blog (Entries tagged as freesoftware)</title>
    <link>https://blog.hboeck.de/</link>
    <description></description>
    <dc:language>en</dc:language>
    <generator>Serendipity 2.5.0 - http://www.s9y.org/</generator>
    <pubDate>Tue, 03 Feb 2015 23:55:23 GMT</pubDate>

    <image>
    <url>https://blog.hboeck.de/templates/hanno/img/s9y_banner_small.png</url>
    <title>RSS: Hanno's blog - </title>
    <link>https://blog.hboeck.de/</link>
    <width>100</width>
    <height>21</height>
</image>

<item>
    <title>What the GHOST tells us about free software vulnerability management</title>
    <link>https://blog.hboeck.de/archives/864-What-the-GHOST-tells-us-about-free-software-vulnerability-management.html</link>
            <category>Code</category>
            <category>English</category>
            <category>Gentoo</category>
            <category>Linux</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/864-What-the-GHOST-tells-us-about-free-software-vulnerability-management.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=864</wfw:comment>

    <slash:comments>5</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=864</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    &lt;img src=&quot;https://blog.hboeck.de/uploads/ghost.svg&quot; class=&quot;serendipity_image_right&quot; alt=&quot;GHOST&quot; width=&quot;300&quot; height=&quot;320&quot;/&gt;On Tuesday details about the security vulnerability &lt;a href=&quot;https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability&quot;&gt;GHOST in Glibc were published by the company Qualys&lt;/a&gt;. When severe security vulnerabilities hit the news I always like to take this as a chance to learn what can be improved and how to avoid similar incidents in the future (see e. g. my posts on &lt;a href=&quot;https://blog.hboeck.de/archives/857-How-to-stop-Bleeding-Hearts-and-Shocking-Shells.html&quot;&gt;Heartbleed/Shellshock&lt;/a&gt;, &lt;a href=&quot;https://blog.hboeck.de/archives/858-Dancing-protocols,-POODLEs-and-other-tales-from-TLS.html&quot;&gt;POODLE/BERserk&lt;/a&gt; and &lt;a href=&quot;https://blog.hboeck.de/archives/863-Dont-update-NTP-stop-using-it.html&quot;&gt;NTP&lt;/a&gt; lately).&lt;img src=&quot;https://ssl-vg03.met.vgwort.de/na/63f5b69af8ac4f21a4a35be8345968da&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot;/&gt;&lt;br /&gt;
&lt;br /&gt;
GHOST itself is a Heap Overflow in the name resolution function of the Glibc. The Glibc is the standard C library on Linux systems, almost every software that runs on a Linux system uses it. It is somewhat unclear right now how serious GHOST really is. A lot of software uses the affected function gethostbyname(), but a lot of conditions have to be met to make this vulnerability exploitable. Right now the most relevant attack is against the mail server exim where Qualys has developed a working exploit which they plan to release soon. There have been  &lt;a href=&quot;http://blog.sucuri.net/2015/01/critical-ghost-vulnerability-released.html&quot;&gt;speculations whether GHOST might be exploitable through Wordpress&lt;/a&gt;, which would make it much more serious.&lt;br /&gt;
&lt;br /&gt;
Technically GHOST is a heap overflow, which is a very common bug in C programming. C is inherently prone to these kinds of memory corruption errors and there are essentially two things here to move forwards: Improve the use of &lt;a href=&quot;http://oss-security.openwall.org/wiki/exploit-mitigation&quot;&gt;exploit mitigation techniques&lt;/a&gt; like ASLR and create new ones (&lt;a href=&quot;http://levee.epfl.ch&quot;&gt;levee&lt;/a&gt; is an interesting project, watch &lt;a href=&quot;http://media.ccc.de/browse/congress/2014/31c3_-_6050_-_en_-_saal_g_-_201412272030_-_code_pointer_integrity_-_gannimo.html#video&quot;&gt;this 31C3 talk&lt;/a&gt;). And if possible move away from C altogether and develop core components in memory safe languages (I have high hopes for the &lt;a href=&quot;https://github.com/servo/servo&quot;&gt;Mozilla Servo&lt;/a&gt; project, watch &lt;a href=&quot;https://www.youtube.com/watch?v=7q9vIMXSTzc&quot;&gt;this linux.conf.au talk&lt;/a&gt;).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;GHOST was discovered three times&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
But the thing I want to elaborate here is something different about GHOST: It turns out that it has been discovered &lt;a href=&quot;https://twitter.com/hanno/status/560401620971032577&quot;&gt;independently three times&lt;/a&gt;. It was &lt;a href=&quot;https://sourceware.org/git/?p=glibc.git;a=commit;h=d5dd6189d506068ed11c8bfa1e1e9bffde04decd&quot;&gt;already fixed in 2013 in the Glibc Code itself&lt;/a&gt;. The commit message didn&#039;t indicate that it was a security vulnerability. Then in &lt;a href=&quot;https://code.google.com/p/chromium/issues/detail?id=364511&quot;&gt;early 2014 developers at Google found it again using Address Sanitizer&lt;/a&gt; (which – by the way – tells you that all software developers should use Address Sanitizer more often to test their software). Google fixed it in Chrome OS and explicitly called it an overflow and a vulnerability. And then recently Qualys found it again and made it public.&lt;br /&gt;
&lt;br /&gt;
Now you may wonder why a vulnerability fixed in 2013 made headlines in 2015. The reason is that it widely wasn&#039;t fixed because it wasn&#039;t publicly known that it was serious. I don&#039;t think there was any malicious intent. The original Glibc fix was probably done without anyone noticing that it is serious and the Google devs may have thought that the fix is already public, so they don&#039;t need to make any noise about it. But we can clearly see that something doesn&#039;t work here. Which brings us to a discussion how the Linux and free software world in general and vulnerability management in particular work.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The “Never touch a running system” principle&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Quite early when I came in contact with computers I heard the phrase “Never touch a running system”. This may have been a reasonable approach to IT systems back then when computers usually weren&#039;t connected to any networks and when remote exploits weren&#039;t a thing, but it certainly isn&#039;t a good idea today in a world where almost every computer is part of the Internet. Because once new security vulnerabilities become public you should change your system and fix them. However that doesn&#039;t change the fact that many people still operate like that.&lt;br /&gt;
&lt;br /&gt;
A number of Linux distributions provide “stable” or “Long Time Support” versions. Basically the idea is this: At some point they take the current state of their systems and further updates will only contain important fixes and security updates. They guarantee to fix security vulnerabilities for a certain time frame. This is kind of a compromise between the “Never touch a running system” approach and reasonable security. It tries to give you a system that will basically stay the same, but you get fixes for security issues. Popular examples for this approach are the stable branch of Debian, Ubuntu LTS versions and the Enterprise versions of Red Hat and SUSE.&lt;br /&gt;
&lt;br /&gt;
To give you an idea about time frames, Debian currently supports the stable trees Squeeze (6.0) which was released 2011 and Wheezy (7.0) which was released 2013. Red Hat Enterprise Linux has currently 4 supported version (4, 5, 6, 7), the oldest one was originally released in 2005. So we&#039;re talking about pretty long time frames that these systems get supported. Ubuntu and Suse have similar long time supported Systems.&lt;br /&gt;
&lt;br /&gt;
These systems are delivered with an implicit promise: We will take care of security and if you update regularly you&#039;ll have a system that doesn&#039;t change much, but that will be secure against know threats. Now the interesting question is: How well do these systems deliver on that promise and how hard is that?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Vulnerability management is chaotic and fragile&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
I&#039;m not sure how many people are aware how vulnerability management works in the free software world. It is a pretty fragile and chaotic process. There is no standard way things work. The information is scattered around many different places. Different people look for vulnerabilities for different reasons. Some are developers of the respective projects themselves, some are companies like Google that make use of free software projects, some are just curious people interested in IT security or researchers. They report a bug through the channels of the respective project. That may be a mailing list, a bug tracker or just a direct mail to the developer. Hopefully the developers fix the issue. It does happen that the person finding the vulnerability first has to explain to the developer why it actually is a vulnerability. Sometimes the fix will happen in a public code repository, sometimes not. Sometimes the developer will mention that it is a vulnerability in the commit message or the release notes of the new version, sometimes not. There are notorious projects that refuse to handle security vulnerabilities in a transparent way. Sometimes whoever found the vulnerability will post more information on his/her blog or on a mailing list like full disclosure or oss-security. Sometimes not. Sometimes vulnerabilities get a CVE id assigned, sometimes not.&lt;br /&gt;
&lt;br /&gt;
Add to that the fact that in many cases it&#039;s far from clear what is a security vulnerability. It is absolutely common that if you ask the people involved whether this is serious the best and most honest answer they can give is “we don&#039;t know”. And very often bugs get fixed without anyone noticing that it even could be a security vulnerability.&lt;br /&gt;
&lt;br /&gt;
Then there are projects where the number of security vulnerabilities found and fixed is really huge. The latest &lt;a href=&quot;http://googlechromereleases.blogspot.ro/2015/01/stable-update.html&quot;&gt;Chrome 40 release had 62 security fixes&lt;/a&gt;, &lt;a href=&quot;http://googlechromereleases.blogspot.de/2014/11/stable-channel-update_18.html&quot;&gt;version 39 had 42&lt;/a&gt;. Chrome releases a new version every two months. Browser vulnerabilities are found and fixed on a daily basis. Not that extreme but still high is the vulnerability count in PHP, which is especially worrying if you know that many webhosting providers run PHP versions not supported any more.&lt;br /&gt;
&lt;br /&gt;
So you probably see my point: There is a very chaotic stream of information in various different places about bugs and vulnerabilities in free software projects. The number of vulnerabilities is huge. Making a promise that you will scan all this information for security vulnerabilities and backport the patches to your operating system is a big promise. And I doubt anyone can fulfill that.&lt;br /&gt;
&lt;br /&gt;
GHOST is a single example, so you might ask how often these things happen. At some point right after GHOST became public this &lt;a href=&quot;https://twitter.com/ageis/status/560185941378076673/photo/1&quot;&gt;excerpt from the Debian Glibc changelog&lt;/a&gt; caught my attention (excuse the bad quality, had to take the image from Twitter because I was unable to find that changelog on Debian&#039;s webpages):&lt;br /&gt;
&lt;br /&gt;
&lt;!-- s9ymdb:425 --&gt;&lt;img class=&quot;serendipity_image_center&quot; width=&quot;597&quot; height=&quot;215&quot;  src=&quot;https://blog.hboeck.de/uploads/debian-changelog-glibc.png&quot;  alt=&quot;eglibc Changelog&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
What you can see here: While Debian fixed GHOST (which is CVE-2015-0235) they also fixed &lt;a href=&quot;https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6656&quot;&gt;CVE-2012-6656&lt;/a&gt; – a security issue from 2012. Admittedly this is a minor issue, but it&#039;s a vulnerability nevertheless. A quick look at the Debian changelog of Chromium both &lt;a href=&quot;http://metadata.ftp-master.debian.org/changelogs//main/c/chromium-browser/chromium-browser_6.0.472.63~r59945-5+squeeze6_changelog&quot;&gt;in squeeze&lt;/a&gt; and &lt;a href=&quot;http://metadata.ftp-master.debian.org/changelogs//main/c/chromium-browser/chromium-browser_37.0.2062.120-1~deb7u1_changelog&quot;&gt;wheezy&lt;/a&gt; will tell you that they aren&#039;t fixing all the recent security issues in it. (Debian already had discussions about &lt;a href=&quot;http://lwn.net/Articles/404050/&quot;&gt;removing Chromium&lt;/a&gt; and in &lt;a href=&quot;https://www.debian.org/releases/stable/i386/release-notes/ch-information.en.html#browser-security&quot;&gt;Wheezy they don&#039;t stick to a single version&lt;/a&gt;.)&lt;br /&gt;
&lt;br /&gt;
It would be an interesting (and time consuming) project to take a package like PHP and check for all the security vulnerabilities whether they are fixed in the  latest packages in Debian Squeeze/Wheezy, all Red Hat Enterprise versions and other long term support systems. PHP is probably more interesting than browsers, because the high profile targets for these vulnerabilities are servers. What worries me: I&#039;m pretty sure some people already do that. They just won&#039;t tell you and me, instead they&#039;ll write their exploits and sell them to repressive governments or botnet operators.&lt;br /&gt;
&lt;br /&gt;
Then there are also stories like this: Tavis Ormandy reported a security issue in Glibc in 2012 and the people from Google&#039;s Project Zero went to great lengths to &lt;a href=&quot;http://googleprojectzero.blogspot.de/2014/08/the-poisoned-nul-byte-2014-edition.html&quot;&gt;show that it is actually exploitable&lt;/a&gt;. Reading the &lt;a href=&quot;https://sourceware.org/bugzilla/show_bug.cgi?id=17187&quot;&gt;Glibc bug report&lt;/a&gt; you can learn that this was already reported in 2005(!), just nobody noticed back then that it was a security issue and it was minor enough that nobody cared to fix it.&lt;br /&gt;
&lt;br /&gt;
There are also bugs that require changes so big that backporting them is essentially impossible. In the TLS world a lot of protocol bugs have been highlighted in recent years. Take Lucky Thirteen for example. It is a timing sidechannel in the way the TLS protocol combines the CBC encryption, padding and authentication. I like to mention this bug because I like to quote it as the TLS bug that was already mentioned in the specification (&lt;a href=&quot;https://datatracker.ietf.org/doc/html/rfc5246&quot;&gt;RFC 5246&lt;/a&gt;, page 23: &quot;This leaves a small timing channel&quot;). The real fix for Lucky Thirteen is not to use the erratic CBC mode any more and switch to authenticated encryption modes which are part of TLS 1.2. (There&#039;s another possible fix which is using &lt;a href=&quot;https://datatracker.ietf.org/doc/html/rfc7366&quot;&gt;Encrypt-then-MAC&lt;/a&gt;, but it is hardly deployed.) Up until recently most encryption libraries didn&#039;t support TLS 1.2. Debian Squeeze and Red Hat Enterprise 5 ship OpenSSL versions that only support TLS 1.0. There is no trivial patch that could be backported, because this is a huge change. What they likely backported are workarounds that avoid the timing channel. This will stop the attack, but it is not a very good fix, because it keeps the problematic old protocol and will force others to stay compatible with it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;LTS and stable distributions are there for a reason&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The big question is of course what to do about it. OpenBSD developer Ted Unangst wrote a blog post yesterday titled &lt;a href=&quot;https://flak.tedunangst.com/post/long-term-support-considered-harmful&quot;&gt;Long term support considered harmful&lt;/a&gt;, I suggest you read it. He argues that we should get rid of long term support completely and urge users to upgrade more often. OpenBSD has a 6 month release cycle and supports two releases, so one version gets supported for one year.&lt;br /&gt;
&lt;br /&gt;
Given what I wrote before you may think that I agree with him, but I don&#039;t. While I personally always avoided to use too old systems – I &#039;m usually using Gentoo which doesn&#039;t have any snapshot releases at all and does rolling releases – I can see the value in long term support releases. There are a lot of systems out there – connected to the Internet – that are never updated. Taking away the option to install systems and let them run with relatively little maintenance overhead over several years will probably result in more systems never receiving any security updates. With all its imperfectness running a Debian Squeeze with the latest updates is certainly better than running an operating system from 2011 that stopped getting security fixes in 2012.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Improving the information flow&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
I don&#039;t think there is a silver bullet solution, but I think there are things we can do to improve the situation. What could be done is to coordinate and share the work. Debian, Red Hat and other distributions with stable/LTS versions could agree that their next versions are based on a specific Glibc version and they collaboratively work on providing patch sets to fix all the vulnerabilities in it. This already somehow happens with upstream projects providing long term support versions, the Linux kernel does that for example. Doing that at scale would require vast organizational changes in the Linux distributions. They would have to agree on a roughly common timescale to start their stable versions.&lt;br /&gt;
&lt;br /&gt;
What I&#039;d consider the most crucial thing is to improve and streamline the information flow about vulnerabilities. When Google fixes a vulnerability in Chrome OS they should make sure this information is shared with other Linux distributions and the public. And they should know where and how they should share this information.&lt;br /&gt;
&lt;br /&gt;
One mechanism that tries to organize the vulnerability process is the system of CVE ids. The idea is actually simple: Publicly known vulnerabilities get a fixed id and they are in a &lt;a href=&quot;https://cve.mitre.org/&quot;&gt;public database&lt;/a&gt;. GHOST is CVE-2015-0235 (the scheme will soon change because four digits aren&#039;t enough for all the vulnerabilities we find every year). I got my first CVEs assigned in 2007, so I have some experiences with the CVE system and they are rather mixed. Sometimes I &lt;a href=&quot;https://seclists.org/oss-sec/2015/q1/200&quot;&gt;briefly mention rather minor issues&lt;/a&gt; in a mailing list thread and &lt;a href=&quot;https://seclists.org/oss-sec/2015/q1/220&quot;&gt;a CVE gets assigned right away&lt;/a&gt;. Sometimes I &lt;a href=&quot;https://seclists.org/oss-sec/2014/q4/629&quot;&gt;explicitly ask for CVE assignments&lt;/a&gt; and never get an answer.&lt;br /&gt;
&lt;br /&gt;
I would like to see that we just assign CVEs for everything that even remotely looks like a security vulnerability. However right now I think the process is to unreliable to deliver that. There are other public vulnerability databases like OSVDB, I have limited experience with them, so I can&#039;t judge if they&#039;d be better suited. Unfortunately sometimes people hesitate to request CVE ids because others &lt;a href=&quot;https://www.blackhat.com/us-13/briefings.html#Martin&quot;&gt;abuse the CVE system to count assigned CVEs&lt;/a&gt; and use this as a metric how secure a product is. Such bad statistics are outright dangerous, because it gives people an incentive to downplay vulnerabilities or withhold information about them.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;This post was partly inspired by &lt;a href=&quot;https://seclists.org/oss-sec/2015/q1/337&quot;&gt;some&lt;/a&gt; &lt;a href=&quot;https://seclists.org/oss-sec/2015/q1/339&quot;&gt;discussions&lt;/a&gt; on oss-security&lt;/i&gt; 
    </content:encoded>

    <pubDate>Fri, 30 Jan 2015 00:52:00 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/864-guid.html</guid>
    <category>chromium</category>
<category>cve</category>
<category>debian</category>
<category>firefox</category>
<category>freesoftware</category>
<category>ghost</category>
<category>glibc</category>
<category>linux</category>
<category>php</category>
<category>redhat</category>
<category>security</category>
<category>vulnerability</category>

</item>
<item>
    <title>How to stop Bleeding Hearts and Shocking Shells</title>
    <link>https://blog.hboeck.de/archives/857-How-to-stop-Bleeding-Hearts-and-Shocking-Shells.html</link>
            <category>English</category>
            <category>Gentoo</category>
            <category>Linux</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/857-How-to-stop-Bleeding-Hearts-and-Shocking-Shells.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=857</wfw:comment>

    <slash:comments>10</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=857</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    &lt;!-- s9ymdb:415 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;341&quot; height=&quot;413&quot;  src=&quot;https://blog.hboeck.de/uploads/heartbleed.png&quot;  alt=&quot;Heartbleed logo&quot; /&gt;The free software community was recently shattered by two security bugs called Heartbleed and Shellshock. While technically these bugs where quite different I think they still share a lot.&lt;img src=&quot;https://ssl-vg03.met.vgwort.de/na/94a23b9471f64b66a68e7fdf562983d5&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot;/&gt;&lt;br /&gt;
&lt;br /&gt;
Heartbleed hit the news in April this year. A bug in OpenSSL that allowed to extract privat keys of encrypted connections. When a bug in Bash called Shellshock hit the news I was first hesistant to call it bigger than Heartbleed. But now I am pretty sure it is. While Heartbleed was big there were some things that alleviated the impact. It took some days till people found out how to practically extract private keys - and it still wasn&#039;t fast. And the most likely attack scenario - stealing a private key and pulling off a Man-in-the-Middle-attack - seemed something that&#039;d still pose some difficulties to an attacker. It seemed that people who update their systems quickly (like me) weren&#039;t in any real danger.&lt;br /&gt;
&lt;br /&gt;
Shellshock was different. It&#039;s astonishingly simple to use and real attacks started hours after it became public. If circumstances had been unfortunate there would&#039;ve been a very real chance that my own servers could&#039;ve been hit by it. I usually feel the IT stuff under my responsibility is pretty safe, so things like this scare me.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;What OpenSSL and Bash have in common&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Shortly after Heartbleed something became very obvious: The OpenSSL project wasn&#039;t in good shape. The software that pretty much everyone in the Internet uses to do encryption was run by a small number of underpaid people. People trying to contribute and submit patches were often ignored (I know that, I &lt;a href=&quot;https://rt.openssl.org/Ticket/Display.html?id=2640&amp;amp;user=guest&amp;amp;pass=guest&quot;&gt;tried it&lt;/a&gt;). The truth about Bash looks even grimmer: It&#039;s a project mostly run by a single volunteer. And yet almost every large Internet company out there uses it. Apple installs it on every laptop. OpenSSL and Bash are crucial pieces of software and run on the majority of the servers that run the Internet. Yet they are very small projects backed by few people. Besides they are both quite old, you&#039;ll find tons of legacy code in them written more than a decade ago.&lt;br /&gt;
&lt;br /&gt;
People like to rant about the code quality of software like OpenSSL and Bash. However I am not that concerned about these two projects. This is the upside of events like these: OpenSSL is probably much securer than it ever was and after the dust settles Bash will be a better piece of software. If you want to ask yourself where the next Heartbleed/Shellshock-alike bug will happen, ask this: What projects are there that are installed on almost every Linux system out there? And how many of them have a healthy community and received a good security audit lately?&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Software installed on almost any Linux system&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Let me propose a little experiment: Take your favorite Linux distribution, make a minimal installation without anything and look what&#039;s installed. These are the software projects you should worry about. To make things easier I did this for you. I took my own system of choice, Gentoo Linux, but the results wouldn&#039;t be very different on other distributions. The results are at at the bottom of this text. (I removed everything Gentoo-specific.) I admit this is oversimplifying things. Some of these provide more attack surface than others, we should probably worry more about the ones that are directly involved in providing network services.&lt;br /&gt;
&lt;br /&gt;
After Heartbleed some people already asked questions like these. How could it happen that a project so essential to IT security is so underfunded? Some large companies acted and the result is the &lt;a href=&quot;http://www.linuxfoundation.org/programs/core-infrastructure-initiative&quot;&gt;Core Infrastructure Initiative&lt;/a&gt; by the Linux Foundation, which already helped improving OpenSSL development. This is a great start and an example for an initiative of which we should have more. We should ask the large IT companies who are not part of that initiative what they are doing to improve overall Internet security.&lt;br /&gt;
&lt;br /&gt;
Just to put this into perspective: A thorough security audit of a project like Bash would probably require a five figure number of dollars. For a small, volunteer driven project this is huge. For a company like Apple - the one that installed Bash on all their laptops - it&#039;s nearly nothing.&lt;br /&gt;
&lt;br /&gt;
There&#039;s another recent development I find noteworthy. Google started &lt;a href=&quot;http://googleprojectzero.blogspot.de/&quot;&gt;Project Zero&lt;/a&gt; where they hired some of the brightest minds in IT security and gave them a single job: Search for security bugs. Not in Google&#039;s own software. In every piece of software out there. This is not merely an altruistic project. It makes sense for Google. They want the web to be a safer place - because the web is where they earn their money. I like that approach a lot and I have only one question to ask about it: Why doesn&#039;t every large IT company have a Project Zero?&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Sparking interest&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
There&#039;s another aspect I want to talk about. After Heartbleed people started having a closer look at OpenSSL and found a number of small and one other &lt;a href=&quot;http://ccsinjection.lepidum.co.jp/&quot;&gt;quite severe issue&lt;/a&gt;. After Bash people instantly found more issues in the function parser and we now have six CVEs for Shellshock and friends. When a piece of software is affected by a severe security bug people start to look for more. I wonder what it&#039;d take to have people looking at the projects that aren&#039;t in the spotlight.&lt;br /&gt;
&lt;br /&gt;
I was brainstorming if we could have something like a &quot;free software audit action day&quot;. A regular call where an important but neglected project is chosen and the security community is asked to have a look at it. This is just a vague idea for now, if you like it please leave a comment.&lt;br /&gt;
&lt;br /&gt;
That&#039;s it. I refrain from having discussions whether bugs like Heartbleed or Shellshock disprove the &quot;many eyes&quot;-principle that free software advocates like to cite, because I think these discussions are a pointless waste of time. I&#039;d like to discuss how to improve things. Let&#039;s start.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Here&#039;s the promised list of Gentoo packages in the standard installation:&lt;br /&gt;
&lt;br /&gt;
bzip2&lt;br /&gt;
gzip&lt;br /&gt;
tar&lt;br /&gt;
unzip&lt;br /&gt;
xz-utils&lt;br /&gt;
nano&lt;br /&gt;
ca-certificates&lt;br /&gt;
mime-types&lt;br /&gt;
pax-utils&lt;br /&gt;
bash&lt;br /&gt;
build-docbook-catalog&lt;br /&gt;
docbook-xml-dtd&lt;br /&gt;
docbook-xsl-stylesheets&lt;br /&gt;
openjade&lt;br /&gt;
opensp&lt;br /&gt;
po4a&lt;br /&gt;
sgml-common&lt;br /&gt;
perl&lt;br /&gt;
python&lt;br /&gt;
elfutils&lt;br /&gt;
expat&lt;br /&gt;
glib&lt;br /&gt;
gmp&lt;br /&gt;
libffi&lt;br /&gt;
libgcrypt&lt;br /&gt;
libgpg-error&lt;br /&gt;
libpcre&lt;br /&gt;
libpipeline&lt;br /&gt;
libxml2&lt;br /&gt;
libxslt&lt;br /&gt;
mpc&lt;br /&gt;
mpfr&lt;br /&gt;
openssl&lt;br /&gt;
popt&lt;br /&gt;
Locale-gettext&lt;br /&gt;
SGMLSpm&lt;br /&gt;
TermReadKey&lt;br /&gt;
Text-CharWidth&lt;br /&gt;
Text-WrapI18N&lt;br /&gt;
XML-Parser&lt;br /&gt;
gperf&lt;br /&gt;
gtk-doc-am&lt;br /&gt;
intltool&lt;br /&gt;
pkgconfig&lt;br /&gt;
iputils&lt;br /&gt;
netifrc&lt;br /&gt;
openssh&lt;br /&gt;
rsync&lt;br /&gt;
wget&lt;br /&gt;
acl&lt;br /&gt;
attr&lt;br /&gt;
baselayout&lt;br /&gt;
busybox&lt;br /&gt;
coreutils&lt;br /&gt;
debianutils&lt;br /&gt;
diffutils&lt;br /&gt;
file&lt;br /&gt;
findutils&lt;br /&gt;
gawk&lt;br /&gt;
grep&lt;br /&gt;
groff&lt;br /&gt;
help2man&lt;br /&gt;
hwids&lt;br /&gt;
kbd&lt;br /&gt;
kmod&lt;br /&gt;
less&lt;br /&gt;
man-db&lt;br /&gt;
man-pages&lt;br /&gt;
man-pages-posix&lt;br /&gt;
net-tools&lt;br /&gt;
sed&lt;br /&gt;
shadow&lt;br /&gt;
sysvinit&lt;br /&gt;
tcp-wrappers&lt;br /&gt;
texinfo&lt;br /&gt;
util-linux&lt;br /&gt;
which&lt;br /&gt;
pambase&lt;br /&gt;
autoconf&lt;br /&gt;
automake&lt;br /&gt;
binutils&lt;br /&gt;
bison&lt;br /&gt;
flex&lt;br /&gt;
gcc&lt;br /&gt;
gettext&lt;br /&gt;
gnuconfig&lt;br /&gt;
libtool&lt;br /&gt;
m4&lt;br /&gt;
make&lt;br /&gt;
patch&lt;br /&gt;
e2fsprogs&lt;br /&gt;
udev&lt;br /&gt;
linux-headers&lt;br /&gt;
cracklib&lt;br /&gt;
db&lt;br /&gt;
e2fsprogs-libs&lt;br /&gt;
gdbm&lt;br /&gt;
glibc&lt;br /&gt;
libcap&lt;br /&gt;
ncurses&lt;br /&gt;
pam&lt;br /&gt;
readline&lt;br /&gt;
timezone-data&lt;br /&gt;
zlib&lt;br /&gt;
procps&lt;br /&gt;
psmisc&lt;br /&gt;
shared-mime-info&lt;/i&gt; 
    </content:encoded>

    <pubDate>Mon, 06 Oct 2014 23:35:00 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/857-guid.html</guid>
    <category>bash</category>
<category>freesoftware</category>
<category>heartbleed</category>
<category>linux</category>
<category>openssl</category>
<category>security</category>
<category>shellshock</category>
<category>vulnerability</category>

</item>
<item>
    <title>Extract base64-encoded images from CSS</title>
    <link>https://blog.hboeck.de/archives/842-Extract-base64-encoded-images-from-CSS.html</link>
            <category>Code</category>
            <category>English</category>
            <category>Linux</category>
            <category>Webdesign</category>
    
    <comments>https://blog.hboeck.de/archives/842-Extract-base64-encoded-images-from-CSS.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=842</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=842</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    I recently stepped upon a webpage where I wanted to extract an image. However, after saving the page with my browser I couldn&#039;t find any JPG or PNG file. After looking into this, I saw some CSS code that looked like this:&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;word-break: break-all;font-family:monospace;&quot;&gt;background-image:url(&quot;data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgAQAAAABbAUdZAAAAE0lEQVR4AWNgYPj/n4oElU1jAADtvT/BfzVwSgAAAABJRU5ErkJggg==&quot;;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
What this does is that it embeds a base64 encoded image file into the CSS layout. I found some tools to create such images, but I found none to extract them. It isn&#039;t very hard to extract such an image, I wrote a small bash script that will do and that I&#039;d like to share:&lt;br /&gt;
&lt;pre&gt;#!/bin/sh&lt;br/&gt;n=1&lt;br/&gt;for i in `grep -ho &quot;base64,[A-Za-z0-9+/=]*&quot; $@|sed -e &quot;s:base64,::g&quot;`; do&lt;br/&gt;echo $i | base64 -d &amp;gt; file_$n&lt;br/&gt;n=`expr $n + 1`&lt;br/&gt;done&lt;/pre&gt;Save this as css2base64 and pass HTML or CSS files on the command line (e. g. css2base64 test.html test.css).&lt;br /&gt;
&lt;br /&gt;
Hope this helps others. If this script is copyrightable at all (which I doubt), I hereby release it (like the other content of my blog) as CC0 / Public Domain. 
    </content:encoded>

    <pubDate>Wed, 26 Mar 2014 14:32:06 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/842-guid.html</guid>
    <category>base64</category>
<category>bash</category>
<category>css</category>
<category>freesoftware</category>
<category>script</category>
<category>web</category>

</item>
<item>
    <title>Free rar unpacking code</title>
    <link>https://blog.hboeck.de/archives/794-Free-rar-unpacking-code.html</link>
            <category>Copyright</category>
            <category>English</category>
            <category>Gentoo</category>
            <category>Linux</category>
    
    <comments>https://blog.hboeck.de/archives/794-Free-rar-unpacking-code.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=794</wfw:comment>

    <slash:comments>10</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=794</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    One of the few pieces of non-free software I always needed on my system is a rar unpacker. Despite that there are very good free alternatives for high-compression archivers like &lt;a href=&quot;http://www.7-zip.org/&quot;&gt;7-zip&lt;/a&gt; or &lt;a href=&quot;http://tukaani.org/xz/&quot;&gt;tar.xz&lt;/a&gt;, many people seem to like relying on a proprietary format like rar and it&#039;s in widespread use.&lt;br /&gt;
&lt;br /&gt;
Years ago, someone came up with a &lt;a href=&quot;http://hboeck.de/archives/22-Free-Software.html &quot;&gt;GPLed rar unpacker&lt;/a&gt;, but sadly, that was never updated to support the rar version 3 format. Its development is stalled.&lt;br /&gt;
&lt;br /&gt;
For that reason, some time back I suggested to the Free Software Foundation to add a free rar unpacking tool to their list of high priority projects - they did so. Happily I recently read that &lt;a href=&quot;http://www.fsf.org/blogs/licensing/free-rarv3-extraction&quot;&gt;they&#039;ve removed it&lt;/a&gt;. There&#039;s &lt;a href=&quot;http://wakaba.c3.cx/s/apps/unarchiver.html&quot;&gt;The Unarchiver&lt;/a&gt; now, based on an old amiga library. It supports a whole bunch of formats - including rar v3. It&#039;s mainly a MacOS application, but it also provides a command line tool that can be compiled in Linux.&lt;br /&gt;
&lt;br /&gt;
It needs objective C, the gnustep-base libraries and it took me some time to get it to compile properly. For the Gentoo-users: I already committed an ebuild, just run &quot;emerge unar&quot;.&lt;span style=&quot;text-decoration:line-through&quot;&gt;emerge TheUnarchiver&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Update:&lt;/b&gt; Changed ebuild name to unar, as that&#039;s the name upstream uses for the command line version now. 
    </content:encoded>

    <pubDate>Sat, 08 Oct 2011 20:03:10 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/794-guid.html</guid>
    <category>compression</category>
<category>freesoftware</category>
<category>linux</category>
<category>rar</category>
<category>theunarchiver</category>
<category>unar</category>

</item>
<item>
    <title>The sad state of the Linux Desktop</title>
    <link>https://blog.hboeck.de/archives/787-The-sad-state-of-the-Linux-Desktop.html</link>
            <category>English</category>
            <category>Gentoo</category>
            <category>Linux</category>
    
    <comments>https://blog.hboeck.de/archives/787-The-sad-state-of-the-Linux-Desktop.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=787</wfw:comment>

    <slash:comments>57</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=787</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    &lt;!-- s9ymdb:333 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;300&quot; height=&quot;353&quot;  src=&quot;https://blog.hboeck.de/uploads/tux.png&quot;  alt=&quot;Tux&quot; /&gt;Some days ago it was reported that Microsoft declared it considers &lt;a href=&quot;http://www.zdnet.com/blog/bott/microsoft-declares-victory-over-linux-names-apple-and-google-main-rivals/3756&quot;&gt;Linux on the desktop no longer a threat&lt;/a&gt; for its business. Now I usually wouldn&#039;t care that much what Microsoft is saying, but in this case, I think, they&#039;re very right – and thererfore I wonder why this hasn&#039;t raised any discussions in the free software community (at least I haven&#039;t seen one – if it has and I missed it, please provide links in the comments). So I&#039;d like to make a start.&lt;br /&gt;
&lt;br /&gt;
A few years ago, I can remember that I was pretty optimistic about a Linux-based Desktop (and I think many shared my views). It seemed with advantages like being able to provide a large number of high quality applications for free and having proven to be much more resilient against security threats it was just a matter of time. I had the impression that development was often going into the right direction, just to name one example freedesktop.org was just starting to try to unify the different Linux desktop environments and make standards so KDE applications work better under GNOME and vice versa.&lt;br /&gt;
&lt;br /&gt;
Today, my impression is that everything is in a pretty sad state. Don&#039;t get me wrong: Free software plays an important role on Desktops – and that&#039;s really good. Major web browsers are based on free software, applications like VLC are very successful. But the basis – the operating system – is usually a non-free one.&lt;br /&gt;
&lt;br /&gt;
I recently was looking for netbooks. Some years ago, Asus came out with the Eee PC, a small and cheap laptop which ran Linux by default – one year later they provided a version with Windows as an alternative. Today, you won&#039;t find a single Netbook with Linux as the default OS. I read more often than not in recent years that public authorities &lt;a href=&quot;http://www.golem.de/1105/83460.html&quot;&gt;trying to get along with Linux have failed&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
I think I made my point; the Linux Desktop is in a sad state – I&#039;d like to discuss why this is the case and how we (the free software community) can change it. I won&#039;t claim that I have the definite answer for the cause. I think it&#039;s a mix of things, I&#039;d like to start with some points:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Some people seem to see Desktop environments more as a playground for creative ideas than something other people want to use on a daily basis in a stable way. This is pretty much true for KDE 4 – the KDE team abandoned a well-working Desktop environment KDE 3.5 for something that isn&#039;t stable even today and suffers from a lot of regressions. They permanently invent new things like Akonadi and make them mandatory even for people who don&#039;t care about them – I seriously don&#039;t have an idea what it does, except throwing strange error messages at me. I switched to GNOME, but what I heard about GNOME 3 doesn&#039;t make me feel that it&#039;s much better there (I haven&#039;t tested it yet and I hope that, unlike the KDE-team, GNOME learns from that and supports 2.x until version 3 is in a state working equally well). I think Ubuntu&#039;s playing with the Unity Desktop go in the same direction: We found something cool, we&#039;ll use it, we don&#039;t care that we&#039;ll piss of a bunch of our users. In contrast to that, I have the impression that what I named above – the idea that we can integrate different desktop environments better by standards – isn&#039;t seen as important as it used to be. (I know this part may provoke flames, I hope this won&#039;t hide the other points I made)&lt;/li&gt;&lt;li&gt;The driver problem. I still encounter it to be one of the biggest obstacles and it hasn&#039;t changed a bit for years. You just can&#039;t buy a piece of hardware and use it. It usually is “somehow possible”, but the default is that it requires a lot of extra geeky work that the average user will never manage. I think there&#039;s no easy solution to that, as it would require cooperation from hardware vendors (and with diminishing importance of the Linux Desktop this is likely getting harder). But a lot of things are also self-made. In 2006, Eric Raymond wrote an essay &lt;a href=&quot;http://catb.org/~esr/writings/cups-horror.html&quot;&gt;how crappy CUPS is&lt;/a&gt; – I think it hasn&#039;t improved since then. How often have I read Ubuntu bug reports that go like this: “My printer worked in version [last version], but it doesn&#039;t work in [current version]” - “Me too.” - “Me too.” - “Me too” - no reply from any developer. One point that this shares with the one above is the caring about regressions, which I think should be a top priority, but obviously, many in the free software community don&#039;t seem to think so. (if you don&#039;t know the word: something is called a regression if something worked in an older version of a software, but no longer works in the current version)&lt;/li&gt;&lt;li&gt;The market around us has changed. Back then, we were faced with a “Windows or nothing” situation we wanted to change to a “Windows or Linux” situation. Today, we&#039;re faced with “Windows or MacOS X”. Sure, MacOS existed back then, but it only got a relevant market share in recent years (and many current or former free software developers use MacOS X now). Competition makes products better, so Windows today is not Windows back then. Our competitors just got better.&lt;/li&gt;&lt;li&gt;The desktop is loosing share. This is a point often made, with mobile phones, tablets, gaming consoles and other devices taking over tasks that were done with desktop computers in the past. This is certainly true for some degree, but I think it&#039;s also often overestimated. Desktop computers still play an important role and I&#039;m sure they will continue to do so for a long time. The discussion how free software performs on other devices (and how free Android is) is an interesting one, too, but I won&#039;t go into it for now, as I want to talk about the Desktop here.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;
Okay, I&#039;ve started the discussion, I&#039;d like others to join. Please remember: It&#039;s not my goal to flame or to blame anyone – my goal is to discuss how we can make the Linux desktop successful again. 
    </content:encoded>

    <pubDate>Sun, 21 Aug 2011 21:30:02 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/787-guid.html</guid>
    <category>desktop</category>
<category>freesoftware</category>
<category>gnome</category>
<category>kde</category>
<category>linux</category>
<category>microsoft</category>

</item>
<item>
    <title>Welcome to Fake Disneyland</title>
    <link>https://blog.hboeck.de/archives/778-Welcome-to-Fake-Disneyland.html</link>
            <category>Copyright</category>
            <category>English</category>
            <category>Life</category>
    
    <comments>https://blog.hboeck.de/archives/778-Welcome-to-Fake-Disneyland.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=778</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=778</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    &lt;!-- s9ymdb:321 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;225&quot; height=&quot;300&quot;  src=&quot;https://blog.hboeck.de/uploads/beijing-amusement-cinderella.serendipityThumb.jpg&quot;  alt=&quot;Cinderella castle&quot; /&gt;Maybe you&#039;ve heared that some years ago, a story about a fake Disneyland amusement park in China made some rumors in the media. As I love good fakes, I obviously had to take a look. The amusement park in question is &lt;a href=&quot;http://www.bjsjsyly.com/en/lyzl.php&quot;&gt;Shijingshan Amusement Park ( 北京石景山游乐园)&lt;/a&gt; and is located in Beijing. It can easily be reached, as it has its own metro station.&lt;br /&gt;
&lt;br /&gt;
&lt;!-- s9ymdb:324 --&gt;&lt;img class=&quot;serendipity_image_left&quot; width=&quot;225&quot; height=&quot;300&quot;  src=&quot;https://blog.hboeck.de/uploads/beijing-mickeymouse.serendipityThumb.jpg&quot;  alt=&quot;Fake Mickey&quot; /&gt;The park had the advertisement slogan &quot;Disneyland is too far to go&quot; some years ago and some images of Mickey Mouse and other Disney figures in the park boosted the story (see &lt;a href=&quot;https://en.wikipedia.org/wiki/Beijing_Shijingshan_Amusement_Park&quot;&gt;Wikipedia for details&lt;/a&gt;). Also, like all Disneylands, the Park has a Cinderella castle. It seems in the meantime things have changed - we didn&#039;t see any Disney charakters there. The only thing that still reminds of the story is the Cinderella castle - but as much as Disneys lawyers might want this, Cinderella is not a Disney invention after all.&lt;br /&gt;
I even found a fake Mickey Mouse (at least I think it was fake, it looked somehow wrong) in Beijing, but it was not in the amusement park, it was in the olympic village.&lt;br /&gt;
&lt;br /&gt;
&lt;!-- s9ymdb:322 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;300&quot; height=&quot;225&quot;  src=&quot;https://blog.hboeck.de/uploads/beijing-amusement-colorful.jpg&quot;  alt=&quot;Good part&quot; /&gt;The story of a fake Disneyland seems highly exaggerated. The Cinderella is probably no issue at all, as I doubt there&#039;s anything that makes it a special &quot;Disney-Cinderella&quot;. I&#039;m not sure if there was a copyright violation at all: The fake Mickey Mouse and other figures in combination with the solgan could probably be considered parody - which is legally allowed in most of the world&#039;s copyright laws.&lt;br /&gt;
&lt;br /&gt;
&lt;!-- s9ymdb:320 --&gt;&lt;img class=&quot;serendipity_image_left&quot; width=&quot;300&quot; height=&quot;225&quot;  src=&quot;https://blog.hboeck.de/uploads/beijing-amusement-broken-way.jpg&quot;  alt=&quot;Bad part&quot; /&gt;The park itself was kind of weird. Large parts of it were in really bad shape. Some looked like a construction site, many parts were not operational. On the other hand, other parts of it were really well-designed. One could hardly imagine that this was the same park.&lt;br /&gt;
&lt;br /&gt;
&lt;!-- s9ymdb:323 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;225&quot; height=&quot;300&quot;  src=&quot;https://blog.hboeck.de/uploads/beijing-amusement-stepmania.serendipityThumb.jpg&quot;  alt=&quot;&quot; /&gt;A nice thing to mention: They had a dance dance revolution like arcade machine - but the game on it was &lt;a href=&quot;https://www.stepmania.com/&quot;&gt;StepMania&lt;/a&gt; - a free software game. I think this is the first time I saw a free software game in an arcade machine.&lt;br /&gt;
&lt;br /&gt;
Unlike most european amusement parks, the pricing concept here is different - the entrance fee costs almost nothing (10 Yuan, approximately 1 €), but you pay for every ride.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://pictures.hboeck.de/asiatrip2011/beijing-amusement/&quot;&gt;Pictures from the park&lt;/a&gt; 
    </content:encoded>

    <pubDate>Sun, 10 Jul 2011 21:52:11 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/778-guid.html</guid>
    <category>amusementpark</category>
<category>asia</category>
<category>beijing</category>
<category>china</category>
<category>cinderella</category>
<category>copyright</category>
<category>disney</category>
<category>disneyland</category>
<category>fake</category>
<category>freesoftware</category>
<category>shijingshan</category>
<category>stepmania</category>
<category>travel</category>
<category>trip2011</category>

</item>
<item>
    <title>Notes from talk about GSM and free software</title>
    <link>https://blog.hboeck.de/archives/748-Notes-from-talk-about-GSM-and-free-software.html</link>
            <category>Computer culture</category>
            <category>Cryptography</category>
            <category>English</category>
            <category>Linux</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/748-Notes-from-talk-about-GSM-and-free-software.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=748</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=748</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    Yesterday I was at a talk at the &lt;a href=&quot;http://www.fsfe.org/&quot;&gt;FSFE&lt;/a&gt; Berlin about free software and GSM. It was an interesting talk and discussion.&lt;br /&gt;
Probably most of you know that GSM is the protocol that keeps the large majority of mobile phones running. In the past, only a handful of companies worked with the protocol and according to the talk, even most mobile phone companies don&#039;t know much of the internal details, as they usually buy ready-made chips.&lt;br /&gt;
Three free software projects work on GSM, &lt;a href=&quot;http://openbts.sourceforge.net/&quot;&gt;OpenBTS&lt;/a&gt; and &lt;a href=&quot;http://openbsc.osmocom.org/&quot;&gt;OpenBSC&lt;/a&gt; on the server side and &lt;a href=&quot;http://osmocom.org/&quot;&gt;OsmocomBB&lt;/a&gt; on the client side. What I didn&#039;t know yet and think is really remarkable: The &lt;a href=&quot;http://openbts.sourceforge.net/NiuePilot/&quot;&gt;Island State of Niue installed a GSM-network based on OpenBTS&lt;/a&gt;. The island found no commercial operator, so they installed a free software based and community supported GSM network.&lt;br /&gt;
&lt;br /&gt;
Afterwards, we had a longer discussion about security and privacy implications of GSM. To sum it up, GSM is horribly broken on the security side. It offers no authentication between phones and cells. Also, it&#039;s encryption has been broken in the early 90s. There is not much progress in protocol improvements although this is known for a very long time. It&#039;s also well known that so-called IMSI-cachers are sold illegally for a few thousand dollars. The only reason GSM is still working at all is basically that those possibilities still cost a few thousands. But cheaper hardware and improvement in free GSM software makes it more likely that those possibilities will have a greater impact in the future (this is only a brief summary and I&#039;m not really in that topic, &lt;a href=&quot;http://en.wikipedia.org/wiki/COMP128#GSM_service_security&quot;&gt;see Wikipedia for some starting points for more info&lt;/a&gt;).&lt;br /&gt;
&lt;br /&gt;
There was a bit of discussion about the question how realistic it is that some &quot;normal user&quot; is threatened by this due to the price of a few thousand dollars for the equipment. I didn&#039;t bring this up in the discussion any more, but I remember having seen a talk by a guy from Intel that the tendency is to design generic chips for various protocols that can be GSM, Bluetooth or WLAN purely by software control. Thinking about that, this raises the question of protocol security even more, as it might already be possible to use mainstream computer hardware to do mobile phone wiretapping by just replacing the firmware of a wireless lan card. It almost certainly will be possible within some years.&lt;br /&gt;
&lt;br /&gt;
Another topic that was raised was frequency regulation. Even with free software you wouldn&#039;t be able to operate your own GSM network, because you couldn&#039;t afford buying a frequency (although it seems to be possible to get a testing license for a limited space, e. g. for technical workshops - the &lt;a href=&quot;http://www.mail-archive.com/openbsc@lists.gnumonks.org/msg00376.html&quot;&gt;27C3 will have a GSM test network&lt;/a&gt;). I mentioned that there&#039;s a chapter in the book &quot;Code&quot; from Lawrence Lessig (available in an updated version &lt;a href=&quot;http://codev2.cc/&quot;&gt;here&lt;/a&gt;, chapter is &quot;The Regulators of Speech: Distribution&quot; and starts on page 270 in the PDF). The thoughts from Lessing are that frequency regulation was neccessary in the beginning of radio technology, but today, it would be easily possible to design protocols that don&#039;t need regulation - they could be auto-regulating, e. g. with a prefix in front of every data package (the way wireless lan works). But the problem with that is that today, frequency usage generates large income for the state - that&#039;s completely against the original idea of it, as it&#039;s primarily purpose was to keep technology usable. 
    </content:encoded>

    <pubDate>Fri, 10 Dec 2010 22:35:59 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/748-guid.html</guid>
    <category>27c3</category>
<category>berlin</category>
<category>cellular</category>
<category>freesoftware</category>
<category>frequency</category>
<category>fsfe</category>
<category>gsm</category>
<category>lessig</category>
<category>mobilephones</category>
<category>openbsc</category>
<category>openbts</category>
<category>osmocombb</category>
<category>privacy</category>
<category>security</category>
<category>wiretapping</category>

</item>
<item>
    <title>BIOS update by extracting HD image from ISO</title>
    <link>https://blog.hboeck.de/archives/726-BIOS-update-by-extracting-HD-image-from-ISO.html</link>
            <category>English</category>
            <category>Gentoo</category>
            <category>Linux</category>
    
    <comments>https://blog.hboeck.de/archives/726-BIOS-update-by-extracting-HD-image-from-ISO.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=726</wfw:comment>

    <slash:comments>8</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=726</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    Today I faced an interesting Linux problem that made me learn a couple of things I&#039;d like to share. At first, we found an issue on a Thinkpad X301 notebook that was fixed in a newer BIOS version. So we wanted to do a BIOS update. Lenovo provides BIOS updates either for Windows or as bootable ISO CD-images. But the device had no CD-drive and only Linux installed. First we tried &lt;a href=&quot;http://unetbootin.sourceforge.net/&quot;&gt;unetbootin&lt;/a&gt;, a tool to create bootable USB sticks out of ISO-Images. That didn&#039;t work.&lt;br /&gt;
So I had a deeper look at the ISO. What puzzled me was that when mounting it as a loopback device, there were no files on it. After some research I learned that there are different ways to create bootable CDs and one of them is the El Torito extension. It places an image of a harddisk on the CD, when booting, the image is loaded into memory and an OS can be executed (this probably only works for quite simple OSes like DOS, the Lenovo BIOS Upgrade disk is based on PC-DOS). There&#039;s a small PERL-script called &lt;a href=&quot;http://userpages.uni-koblenz.de/~krienke/ftp/noarch/geteltorito&quot;&gt;geteltorito&lt;/a&gt; that is able to extract such images from ISO files.&lt;br /&gt;
It&#039;s possible to boot such harddisk images with grub and &lt;a href=&quot;http://syslinux.zytor.com/wiki/index.php/MEMDISK&quot;&gt;memdisk&lt;/a&gt; (part of syslinux). Install syslinux, place the file memdisk into /boot (found in /usr/lib/syslinux/ or /usr/share/syslinux/) and add something like this to your grub config:&lt;br /&gt;
&lt;div class=&quot;box&quot;&gt;title HD Image&lt;br /&gt;
root (hd0,0)&lt;br /&gt;
kernel /boot/memdisk&lt;br /&gt;
initrd /boot/image.img&lt;/div&gt;&lt;br /&gt;
Or for grub2:&lt;br /&gt;
&lt;div class=&quot;box&quot;&gt;menuentry &quot;HD Image&quot; {&lt;br /&gt;
set root=(hd0,2)&lt;br /&gt;
linux16 /boot/memdisk&lt;br /&gt;
initrd16 /boot/hdimage.img&lt;br /&gt;
}&lt;/div&gt;&lt;br /&gt;
Now you can select bios update in your boot menu and it should boot the BIOS upgrade utility.&lt;br /&gt;
&lt;br /&gt;
(Note that this does not work for all Lenovo BIOS updates, only for those using an El Torito harddisk image - you can mount your iso with &lt;b&gt;mount -o loop [path_to_iso] [mount_path]&lt;/b&gt; to check, if there are any files, this method is not for you) 
    </content:encoded>

    <pubDate>Thu, 14 Jan 2010 21:16:17 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/726-guid.html</guid>
    <category>bios</category>
<category>eltorito</category>
<category>freesoftware</category>
<category>grub</category>
<category>iso</category>
<category>linux</category>
<category>memdisk</category>
<category>syslinux</category>
<category>thinkpad</category>

</item>
<item>
    <title>Looking for router firmware alternatives</title>
    <link>https://blog.hboeck.de/archives/710-Looking-for-router-firmware-alternatives.html</link>
            <category>English</category>
            <category>Linux</category>
    
    <comments>https://blog.hboeck.de/archives/710-Looking-for-router-firmware-alternatives.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=710</wfw:comment>

    <slash:comments>10</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=710</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    A couple of projects exist for alternative router firmwares. I used to work with Buffalo Routers combined with DD-WRT.&lt;br /&gt;
&lt;br /&gt;
Now DD-WRT became quite unusable for two reasons. First there was a Cross Site Request Forgery reported on bugtraq a while back, where one of the &lt;a href=&quot;http://seclists.org/bugtraq/2008/Dec/0139.html&quot;&gt;DD-WRT developers answered&lt;/a&gt; in a way that clearly showed he doesn&#039;t really understand what CSRF is - so already from a security point of view, DD-WRT seems to be a no-go.&lt;br /&gt;
&lt;br /&gt;
Beside, DD-WRT development more or less is stale at the moment - there are commercial spin-offs and there&#039;s been some controversy if everything they did was compliant to the GPL. Fact is there were no new releases since several months - with open security bugs.&lt;br /&gt;
&lt;br /&gt;
Now I&#039;ve been looking for alternatives. What I&#039;m looking for should be&lt;ul&gt;&lt;li&gt;a ready-to-use router firmware with easy web-interface configuration from the start, not something like OpenWRT&lt;/li&gt;&lt;li&gt;free software&lt;/li&gt;&lt;li&gt;obviously, a project that handles security-reports in a sane way&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;
For now, &lt;a href=&quot;http://www.gargoyle-router.com/&quot;&gt;Gargoyle&lt;/a&gt; the only one suitable. It doesn&#039;t officially support my Hardware, but it works anyway. I haven&#039;t looked deeper into it (e. g. didn&#039;t do any security analysis myself), but it seems to do the basic tasks. If you have suggestions of other projects, please leave a comment. 
    </content:encoded>

    <pubDate>Thu, 11 Jun 2009 14:16:44 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/710-guid.html</guid>
    <category>ddwrt</category>
<category>firmware</category>
<category>freesoftware</category>
<category>gargoyle</category>
<category>router</category>

</item>
<item>
    <title>LPI / LPIC - ein kleines Resumee</title>
    <link>https://blog.hboeck.de/archives/693-LPI-LPIC-ein-kleines-Resumee.html</link>
            <category>Linux</category>
    
    <comments>https://blog.hboeck.de/archives/693-LPI-LPIC-ein-kleines-Resumee.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=693</wfw:comment>

    <slash:comments>2</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=693</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    Ich habe, wie ich kürzlich bereits erwähnt habe, auf den Chemnitzer Linux-Tagen die erste LPI-Prüfung abgelegt. Die LPI ist eine Institution, die Zertifizierungen für Linux-Kenntnisse anbietet. Es existieren verschiedene Levels, nach Bestehen der zweiten Prüfung darf ich mich dann LPIC-1 nennen.&lt;br /&gt;
&lt;br /&gt;
Zwar darf ich natürlich zu konkreten Inhalten der Prüfungsfragen nichts sagen (das muss man während der Prüfung unterschreiben), möchte aber dennoch einige allgemeine Anmerkungen dazu loswerden.&lt;br /&gt;
&lt;br /&gt;
Zunächst mein Haupt-Kritikpunkt: Die Prüfung bezieht sich auf alte Inhalte, und zwar auf sehr alte. Eine Frage bezog sich auf Spezifika eines 2.0-Kernels. Ich erinnere mich noch dunkel, dass zu der Zeit, als ich gerade mal anfing, mich mit Linux zu beschäftigen, gerade das Neuerscheinen von Kernel 2.4.0 ein heißes Thema war. Das ist nun schon knapp 10 Jahre her. Das war sicher das extremste Beispiel, aber es zieht sich durch mehrere Fragen durch. Nehmen wir jemanden, der sich sehr kompetent mit Linux auskennt, aber sich vielleicht erst seit 3 Jahren mit Linux beschäftigt. Er hätte schlicht das Problem, dass ihm xfree86 einfach nie begegnet ist. Bei den nicht gerade günstigen Preisen der Prüfung hätte ich schon erwartet, dass sie halbwegs dem aktuellen Stand der Entwicklung entsprechen.&lt;br /&gt;
&lt;br /&gt;
Ein weiterer, sicher schon oft genannter Kritikpunkt, ist die Frage der (nicht vorhandenen) Distributions-Neutralität. Im Flyer des LPI wird explizit damit geworben wird, dass die Zertifizierungen Distributions-übergreifend seien. Das ist, um es deutlich zu sagen, schlicht gelogen. Es handelt sich nur um einen kleinen Teil der Fragen (bzgl. rpm), die man auch einfach weglassen könnte, es würde der Prüfung nichts nehmen.&lt;br /&gt;
&lt;br /&gt;
Jenseits dessen noch eine eher grundsätzliche Anmerkung: Große Teile der Prüfung beziehen sich auf das mehr oder weniger Ausweniglernen von Befehlen und Parametern. Das ist natürlich komplett realitätsfern. In jeder realen Situation, in der meine Linux-Kompetenz gefordert ist, habe ich natürlich die Möglichkeit, mir die man-Pages und Dokumentationen von Programmen anzusehen. Insofern sollte man sich klar sein, dass ein LPI-Zertifikat auch nur sehr beschränkt Auskunft darüber gibt, wie fähig man tatsächlich mit einem Linux-System umgehen kann. 
    </content:encoded>

    <pubDate>Sat, 21 Mar 2009 09:35:38 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/693-guid.html</guid>
    <category>freesoftware</category>
<category>linux</category>
<category>lpi</category>
<category>lpic</category>

</item>
<item>
    <title>Chemnitzer Linux-Tage 2009</title>
    <link>https://blog.hboeck.de/archives/691-Chemnitzer-Linux-Tage-2009.html</link>
            <category>Computer culture</category>
            <category>Life</category>
            <category>Linux</category>
    
    <comments>https://blog.hboeck.de/archives/691-Chemnitzer-Linux-Tage-2009.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=691</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=691</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    &lt;!-- s9ymdb:248 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;300&quot; height=&quot;230&quot; style=&quot;float: right; border: 0px; padding-left: 5px; padding-right: 5px;&quot; src=&quot;https://blog.hboeck.de/uploads/clt09.jpg&quot; alt=&quot;Chemnitzer Linux_Tage&quot; /&gt;Ich bin mal wieder, wie in den Vorjahren auch schon, auf den Chemnitzer Linux-Tagen. Die Linux-Tage in Chemnitz gehören inzwischen zu einer der zentralen Veranstaltungen der freien Software-Community.&lt;br /&gt;
&lt;br /&gt;
Morgen werde ich mich zum ersten Mal an einer LPI-Prüfung versuchen. Habe mich kaum vorbereitet und bin mal gespannt ob man das auch so schafft. Wenn es nicht klappt werde ich mir evtl. entsprechende Literatur zulegen und es erneut versuchen.&lt;br /&gt;
&lt;br /&gt;
Bilder gibt&#039;s hier: &lt;a href=&quot;https://pictures.hboeck.de/clt2009/&quot;&gt;https://pictures.hboeck.de/clt2009/&lt;/a&gt; 
    </content:encoded>

    <pubDate>Sat, 14 Mar 2009 18:40:32 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/691-guid.html</guid>
    <category>chemnitz</category>
<category>clt</category>
<category>freesoftware</category>
<category>linux</category>
<category>lpi</category>
<category>messe</category>

</item>
<item>
    <title>Filling the proprietary gaps: Real Video (RV30/RV40) support in ffmpeg</title>
    <link>https://blog.hboeck.de/archives/676-Filling-the-proprietary-gaps-Real-Video-RV30RV40-support-in-ffmpeg.html</link>
            <category>Copyright</category>
            <category>English</category>
            <category>Gentoo</category>
            <category>Linux</category>
            <category>Movies</category>
    
    <comments>https://blog.hboeck.de/archives/676-Filling-the-proprietary-gaps-Real-Video-RV30RV40-support-in-ffmpeg.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=676</wfw:comment>

    <slash:comments>4</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=676</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    The free software projects for media playing did a good job in the past on supporting a wide variety of formats. From the common to many very obscure formats, current versions of the free software mediaplayers were usually able to play them. Today it&#039;s even common to suggest vlc for Windows users if they can&#039;t play unusual media formats.&lt;br /&gt;
&lt;br /&gt;
Though there were a few exceptions, the most notable probably the long-time missing support for many of the Real formats. While these are rarely used today, many archived videos in the Internet still rely on it. For example, many german television stations provide real video files on their webpages.&lt;br /&gt;
&lt;br /&gt;
Recently and without much public notion, ffmpeg first got &lt;a href=&quot;http://multimedia.cx/eggs/baby-got-rv40/&quot;&gt;support for RV40&lt;/a&gt;, some weeks later also for RV30. This fills a long time gap in free software support for video formats. ffmpeg is used by all major free software video players (vlc, xine, mplayer), so you should get the support within some time in all of them. For now, it&#039;s quite easy to &lt;a href=&quot;http://www.mplayerhq.hu/design7/dload.html&quot;&gt;checkout mplayer from subversion and build it on your own&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Want something to try out? Here&#039;s a &lt;a href=&quot;http://desertplanetcom.virtual27.nebula.fi/videos/Desert_Planet_in_Germany_2006.rmvb&quot;&gt;video from Desert Planet&lt;/a&gt; in real format.&lt;br /&gt;
&lt;br /&gt;
The only gap I know of a format that really got usage in the wild and that is not yet supported by free software is WMA3. 
    </content:encoded>

    <pubDate>Thu, 25 Dec 2008 15:38:07 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/676-guid.html</guid>
    <category>codecs</category>
<category>ffmpeg</category>
<category>freesoftware</category>
<category>realmedia</category>
<category>realvideo</category>
<category>rv30</category>
<category>rv40</category>
<category>video</category>

</item>
<item>
    <title>Interview on FSFE webpage</title>
    <link>https://blog.hboeck.de/archives/673-Interview-on-FSFE-webpage.html</link>
            <category>Computer culture</category>
            <category>Copyright</category>
            <category>English</category>
            <category>Gentoo</category>
            <category>Linux</category>
            <category>Politics</category>
    
    <comments>https://blog.hboeck.de/archives/673-Interview-on-FSFE-webpage.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=673</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=673</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    As an FSFE fellow, I got interviewed for their webpage.&lt;br /&gt;
&lt;br /&gt;
You can &lt;a href=&quot;http://fsfe.org/en/fellows/ciaran/fellowship_interviews/fellowship_interview_with_johannes_hanno_boeck&quot;&gt;read it here&lt;/a&gt;. 
    </content:encoded>

    <pubDate>Wed, 17 Dec 2008 17:28:21 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/673-guid.html</guid>
    <category>freesoftware</category>
<category>fsf</category>
<category>fsfe</category>

</item>
<item>
    <title>A critique on the FSFE campaign on PDF readers</title>
    <link>https://blog.hboeck.de/archives/672-A-critique-on-the-FSFE-campaign-on-PDF-readers.html</link>
            <category>Code</category>
            <category>Copyright</category>
            <category>Linux</category>
    
    <comments>https://blog.hboeck.de/archives/672-A-critique-on-the-FSFE-campaign-on-PDF-readers.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=672</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=672</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    &lt;a class=&#039;serendipity_image_link&#039; href=&#039;https://blog.hboeck.de/uploads/pdf-evince.png&#039;&gt;&lt;!-- s9ymdb:233 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;291&quot; height=&quot;300&quot; style=&quot;float: right; border: 0px; padding-left: 5px; padding-right: 5px;&quot; src=&quot;https://blog.hboeck.de/uploads/pdf-evince.serendipityThumb.png&quot; alt=&quot;Broken rendering in evince&quot; /&gt;&lt;/a&gt;The Free Software Foundation Europe has recently started a &lt;a href=&quot;http://pdfreaders.org/&quot;&gt;campaign promoting free PDF readers&lt;/a&gt;. The idea is to replace the tons of »Get Adobe Reader to view the PDF«-Buttons with ones that don&#039;t promote a proprietary product for viewing PDFs. On the page, they list a couple of free PDF readers for various operating systems.&lt;br /&gt;
&lt;br /&gt;
While I fully support the intention of this campaign, I think there&#039;s a big strategic misconception. As a small sample, let&#039;s take &lt;a class=&#039;serendipity_image_link&#039; href=&#039;https://blog.hboeck.de/uploads/plakat_lug.pdf&#039;&gt;this PDF (an old advertisement for a Linux installation party)&lt;/a&gt;. It&#039;s created with Scribus, based on a transparent SVG tux image I got from Wikipedia. On the right, you can see the PDF rendered with Evince (one of the three Linux-based solutions listed there). The others (kpdf and okular), although based on the same poppler-libarary, show a different rendering, though it&#039;s not better.&lt;br /&gt;
&lt;br /&gt;
&lt;a class=&#039;serendipity_image_link&#039; href=&#039;https://blog.hboeck.de/uploads/sumatra-pdf-1.png&#039;&gt;&lt;!-- s9ymdb:234 --&gt;&lt;img class=&quot;serendipity_image_center&quot; width=&quot;217&quot; height=&quot;300&quot; style=&quot;float:left;border: 0px; padding-left: 5px; padding-right: 5px;&quot; src=&quot;https://blog.hboeck.de/uploads/sumatra-pdf-1.serendipityThumb.png&quot; alt=&quot;First try on SumatraPDF&quot; /&gt;&lt;/a&gt;Loading the same PDF in the only listed Windows program SumatraPDF (which will, sad but true, probably the one most people will look for) gives an even more interesting result (see on the left). Though, after resizing the window, it changes it&#039;s opinion and renders the PDF, although still broken as you can see on the right (results may be false as I only tried it in WINE).&lt;br /&gt;
&lt;br /&gt;
Continuing with the problems, SumatraPDF is unable to fill in PDF forms. Luckily today Linux-based PDF readers are able to do that, though one of the listed programs (kpdf) is not.&lt;br /&gt;
&lt;br /&gt;
&lt;a class=&#039;serendipity_image_link&#039; href=&#039;https://blog.hboeck.de/uploads/sumatra-pdf-2.png&#039;&gt;&lt;!-- s9ymdb:235 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;223&quot; height=&quot;300&quot; style=&quot;float: right; border: 0px; padding-left: 5px; padding-right: 5px;&quot; src=&quot;https://blog.hboeck.de/uploads/sumatra-pdf-2.serendipityThumb.png&quot; alt=&quot;Second try on SumatraPDF&quot; /&gt;&lt;/a&gt;In fact, those are no reasons not to start a campaign for free PDF readers. But it should start with a completely different focus, like »we have some coders wanting to improve free PDF readers, send us your wrong rendered PDFs« or something like that. And then start improving the free PDF readers. And then promote them. Doing it the other way round with a »there is no problem, just take a free PDF reader« message and then giving them ones with grave problems is just lying to people. There&#039;s a good reason why for example the &lt;a href=&quot;http://docs.scribus.net/index.php?lang=en&amp;amp;page=pdfexport1&quot;&gt;Scribus project promotes the Adobe Reader&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Oh, and before you ask, yes, I have reported the bug about the misrendered transparency &lt;a href=&quot;http://bugs.freedesktop.org/show_bug.cgi?id=8474&quot;&gt;a long time ago&lt;/a&gt;. 
    </content:encoded>

    <pubDate>Sat, 13 Dec 2008 13:35:40 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/672-guid.html</guid>
    <category>adobe</category>
<category>evince</category>
<category>freesoftware</category>
<category>fsfe</category>
<category>kpdf</category>
<category>okular</category>
<category>pdf</category>
<category>poppler</category>
<category>sumatrapdf</category>

</item>
<item>
    <title>Lenovo, Linux and Windows refunding</title>
    <link>https://blog.hboeck.de/archives/658-Lenovo,-Linux-and-Windows-refunding.html</link>
            <category>Copyright</category>
            <category>English</category>
            <category>Gentoo</category>
            <category>Linux</category>
    
    <comments>https://blog.hboeck.de/archives/658-Lenovo,-Linux-and-Windows-refunding.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=658</wfw:comment>

    <slash:comments>12</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=658</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    Recently &lt;a href=&quot;http://www.pro-linux.de/news/2008/13167.html&quot;&gt;there were some News&lt;/a&gt; that Lenovo does not like Linux any more. This was supported by comments &lt;a href=&quot;http://lenovoblogs.com/insidethebox/?p=154#comment-51923&quot;&gt;like this at Lenovoblogs&lt;/a&gt; (by a Lenovo engineer):&lt;br /&gt;
&lt;br /&gt;
»Again, what’s the incentive for us to start providing all of this intellectual property for free to the Linux community? You may say it drives support for Linux on ThinkPads and people would buy more ThinkPads as a result. I think that’s a dubious assertion at best.«&lt;br /&gt;
(the subject was driver support for switchable graphics on modern thinkpads and brings up some common urban legends about linux and driver support)&lt;br /&gt;
&lt;br /&gt;
Sadly, I experienced one more place where Lenovo seems to shift away from a Linux friendly viewpoint: I tried to return the windows license of my new Thinkpad with a pre-made form by Lenovo itself (I got this from someone else by eMail, not from Lenovo directly). In the net, you can find tons of reports that it was easy for people to get money back for their windows licenses by Lenovo.&lt;br /&gt;
&lt;br /&gt;
Though what I got was this:&lt;br /&gt;
»Leider können wir Ihrem Wunsch nach Rückerstattung der Kosten für das auf Ihrem Lenovo Produkt vorinstallierte Microsoft-Betriebssystem nicht entsprechen, da das Betriebssystem aus unserer Sicht einen integralen Bestandteil des jeweiligen Lenovo Produkts darstellt.«&lt;br /&gt;
(rough translation: We won&#039;t refund your windows-license, because we think it&#039;s an integral part of the product)&lt;br /&gt;
&lt;br /&gt;
I find it hard to understand why Lenovo makes this shift. When running around on linux conferences in recent months, the number of thinkpads is hughe. While many other vendors shift to a much more free software friendly behaviour (think of AMD/ATI), Lenovo seems to go the different direction. It&#039;s especially strange because Lenovo is probably one of the few vendors that has a notable market share in the linux community.&lt;br /&gt;
&lt;br /&gt;
By the way, I welcome any hints how I should continue with the windows refunding. I&#039;d prefer not to capitulate yet (like I did with my last laptop by Samsung), and I assume the law is clearly on my side.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Update:&lt;/b&gt; As some of you asked, &lt;a href=&quot;http://www.nabble.com/attachment/15199878/0/Lizenzrckgabe%20Windows%20V5.pdf&quot;&gt;here is the form by Lenovo&lt;/a&gt;, though you&#039;ll probably just get the same reply I got.&lt;br /&gt;
&lt;br /&gt;
Probably interesting, &lt;a href=&quot;http://www.microsoft.com/about/legal/useterms/&quot;&gt;here you can find all EULAs&lt;/a&gt; from Microsoft. They are quite clear on the subject and say that you MUST return the windows license to the vendor if you don&#039;t agree to the EULA.&lt;br /&gt;
&lt;br /&gt;
In the meantime, I wrote several messages about the issue to various people and instutitions. The &lt;a href=&quot;http://wiki.fsfe.org/Windows-Tax_Refund&quot;&gt;FSFE is also working on the subject&lt;/a&gt;. 
    </content:encoded>

    <pubDate>Mon, 06 Oct 2008 13:17:04 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/658-guid.html</guid>
    <category>freesoftware</category>
<category>ibm</category>
<category>lenovo</category>
<category>license</category>
<category>linux</category>
<category>windows</category>
<category>windowsrefund</category>

</item>

</channel>
</rss>
