0

SMLR Episode 300 “Linux is Obsolete” ?

Posted by Tom Lawrence on February 10, 2019 in Show-mp3, Show-ogg |
Play

http://smlr.us

Downloads:

Show 300

Contact Us:

show (at) smlr.us or the Contact us page

On the Lawrence Systems Forums

https://forums.lawrencesystems.com/c/smlr-podcast

 


Intro:

Tony Bemus, Tom Lawrence, Phil Porada and Jay LaCroix

Sound bites by Mike Tanner

Phils GitHub

https://github.com/pgporada

The LawrenceSystems YouTube Channel Where videos
https://www.youtube.com/user/TheTecknowledge

Jay’s Site

https://www.learnlinux.tv/

Jay’s Bash Prompt https://pastebin.com/kzPjE8y4

Tech News:

 

https://dayintechhistory.com/dith/february-10-1992-linux-obsolete-thread-ends-2/

 

UniFi security issue?

https://community.ubnt.com/t5/EdgeRouter/UDP-broadcasts-on-port-10001/td-p/461223

 

A real Linux distribution for phones and other mobile devices.

https://postmarketos.org/

 

Pine64 had announced the phone a few months ago and now the company is ready with the prototypes and plans to ship development kits in Q1 2019.

https://fossbytes.com/pinephone-linux-smartphone-149/

 

The Document Foundation announces LibreOffice 6.2

https://blog.documentfoundation.org/blog/2019/02/07/libreoffice-6-2/

 

Microsoft is no longer off the chain

https://www.theregister.co.uk/2019/02/07/microsoft_openchain/

 

Wells Fargo Down

https://www.reddit.com/r/sysadmin/comments/ao4g2y/wells_fargo_is_down_declining_transactions_and_no/

 

Google asks Supreme Court to overrule disastrous ruling on API copyrights

https://arstechnica.com/tech-policy/2019/01/google-asks-supreme-court-to-overrule-disastrous-ruling-on-api-copyrights/

 

Rubrik Data Leak is Another Cloud Misconfiguration Horror Story

https://www.darkreading.com/cloud/rubrik-data-leak-is-another-cloud-misconfiguration-horror-story/d/d-id/1333767

 

Cisco Router Vulnerability Gives Window into Researchers’ World

https://www.darkreading.com/attacks-breaches/cisco-router-vulnerability-gives-window-into-researchers-world/d/d-id/1333774

 

Open Standards for testing security

https://www.netsecopen.org/

 

Jay

RIP “Do Not Track,” the Privacy Standard Everyone Ignored

https://www.howtogeek.com/fyi/rip-do-not-track-the-privacy-standard-everyone-ignored/

 

More GNOME Performance Optimizations Being Tackled Thanks To Canonical

https://www.phoronix.com/scan.php?page=news_item&px=More-GNOME-Performance-January

 

Ubuntu’s Work On New Desktop Installer Continues, Evaluating ZFS Desktop Support

https://www.phoronix.com/scan.php?page=news_item&px=Ubuntu-Looking-ZFS-Desktop

 

Firefox taking a hard line against noisy video, banning it from autoplaying

https://arstechnica.com/gadgets/2019/02/firefox-to-block-noisy-autoplaying-video-in-next-release/

 

How to Disable Recommended Extensions in Firefox

https://www.howtogeek.com/fyi/how-to-disable-recommended-extensions-in-firefox/

 

ZaReason Gamerbox 9400: The ultimate Linux gaming PC

https://www.zdnet.com/article/zareason-gamerbox-9400-the-ultimate-linux-gaming-pc/

 

MX Linux Review

https://youtu.be/tVD6_zNeKzU

 

https://blog.jessfraz.com/post/docker-containers-on-the-desktop/

@Jay, pulse audio in a container

 

https://dnsflagday.net/

As of February 1st, 2019 the internet has passed DNS Flag Day.

 

The current DNS is unnecessarily slow and inefficient because of efforts to accommodate a few DNS systems that are not in compliance with DNS standards established 20 years ago (1999).

 

To ensure further sustainability of the system it is time to end these accommodations and remediate the non-compliant systems. This change will make most DNS operations slightly more efficient, and also allow operators to deploy new functionality, including new mechanisms to protect against DDoS attacks.

 

Extension mechanisms for DNS (EDNS) is a specification for expanding the size of several parameters of the Domain Name System (DNS) protocol which had size restrictions that the Internet engineering community deemed too limited for increasing functionality of the protocol.

 

What did you as an internet user have to do? Nothing! DNS administrators and DNS programmers did the heavy lifting.

 

https://www.zdnet.com/article/new-tls-encryption-busting-attack-also-impacts-the-newer-tls-1-3/

 

https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/february/downgrade-attack-on-tls-1.3-and-vulnerabilities-in-major-tls-libraries/

 

The new cryptographic attack isn’t new, per-se. It’s yet another variation of the original 1998 Bleichenbacher oracle attack.

 

These failure in regards to implementing proper mitigations has resulted in many TLS-capable servers, routers, firewalls, VPNs, and coding libraries still being vulnerable to Bleichenbacher attack variations, which found and exploited problems in the incorrect mitigation procedures.

 

The attack leverages a side-channel leak via cache access timings of these implementations in order to break the RSA key exchanges of TLS implementations. The attack is interesting from multiple points of view (besides the fact that it affects many major TLS implementations):

 

It affects all versions of TLS (including TLS 1.3) and QUIC. This is the only known downgrade attack on TLS 1.3.

 

It uses state-of-the-art cache attack techniques such as Flush+Reload, Prime+Probe, and Branch-Prediction.

 

The attack is very efficient. They’ve found ways to actively target any browser, slow some of them down, or use the long tail distribution to repeatedly try to break a session.

 

This content is published under the Attribution-Noncommercial-Share Alike 3.0 Unported license.

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2011-2019 Sunday Morning Linux Review All rights reserved.
This site is using the Desk Mess Mirrored theme, v2.5, from BuyNowShop.com.