• priapus@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    30
    ·
    edit-2
    3 days ago

    Do people in this thread not understand that Microsoft frequently contributes to Linux? They’ve already lost the battle there. They rely on Linux for servers as much as everybody else.

    Not necessarily saying this is a good thing or not, but writing off any Linux contributions Microsoft makes would be pretty silly.

    • ganymede@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      10 hours ago

      yes they lost the battle, now they’re most likely aiming to win the war.

      • priapus@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 hours ago

        Or they’re just adding improvements to the software they heavily rely on.

        I don’t trust or like Microsoft, but the likelihood of there being malicious intentions in this is incredibly low. Just imagine the fallout if Microsoft tried to sabotage the kernel.

        • ganymede@lemmy.ml
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          3 hours ago

          Or they’re just adding improvements to the software they heavily rely on.

          which they can do in private any time they wish, without any of the fanfare.

          if they actually believe in opensource let them opensource windows 7 1, or idk the 1/4 of a century old windows 2k

          instead we get the fanare as they pat themselves on the back for opensourcing MS-DOS 4.0 early last year (not even 8.0, which is 24 years old btw, 4.0 which came out in 1986).

          38 years ago…

          MS-fucking-DOS, from 38 years ago, THAT’S how much they give a shit about opensource mate.

          all we get is a poor pantomime which actually only illustrates just how stupid they truly think we are to believe the charade.

          does any of that mean they’re 100% have to be actively shipping “bad code” in this project, not by any means. does it mean microsoft will never make a useful contribution to linux, not by any means. what it does mean is they’re increasing their sphere of influence over the project. and they have absolutely no incentive to help anyone but themselves, in fact the opposite.

          as everyone knows (it’s not some deep secret the tech heads on lemmy somehow didn’t hear about) microsoft is highly dependent on linux for major revenue streams. anything a monolith depends on which they don’t control represents a risk. they’d be negligent if they didn’t try to exert control over it. and that’s for any organisation in their position. then factor in their widespread outspoken agenda against opensource, embrace, extend, extinguish and the vastly lacking longterm evidence to match their claims of <3 opensource.

          they’re welcome to prove us all wrong, but that isn’t even on the horizon currently.

          1 yes yes they claim they can’t because “licensing”, which is mostly but not entirely fucking flimsy, but ok devils advocate: release the rest, but nah.

    • FauxLiving@lemmy.world
      link
      fedilink
      arrow-up
      9
      ·
      2 days ago

      Their contributions are welcome and appreciated.

      But, given Microsoft’s history, any suggestions from them should be treated with skepticism.

      • alphadont@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        It’s not like it’s a proprietary blob. No one is stupid enough to accept a proprietary security blob from Microsoft.

        Moreover, if you click through to the article, you see that this module entirely concerns eBPF, which is essentially unused outside of corporate servers (and Android phones) in the first place and is therefore barely our business to begin with.

  • Magiilaro@feddit.org
    link
    fedilink
    arrow-up
    39
    arrow-down
    3
    ·
    edit-2
    3 days ago

    I hope we will learn from the SecureBoot debacle and not give Microsoft the primary signing keys and infrastructure for this again.

      • Magiilaro@feddit.org
        link
        fedilink
        arrow-up
        29
        arrow-down
        1
        ·
        3 days ago

        Yes I can. But I am a Linux system administrator with 20 years of experience. This should not be the level of measurement for stuff like this. 😉

        What I meant was: Don’t put a Microsoft master trusted authority in the Kernel, unless one chooses to install a Microsoft distribution. And don’t go the SSL/TLS way with the huge number of default authorities that get installed on every system. It would be a pain to be forced to always build my own Kernel again just to keep Microsoft or any other institution/company that I find untrustworthy out of it.

    • ikidd@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      3 days ago

      Certainly don’t take my posting of this as an endorsement of anything Microsoft does. I loathe Microsoft.

      • BaconIsAVeg@lemmy.ml
        link
        fedilink
        English
        arrow-up
        4
        ·
        3 days ago

        VSCode is one of the best free editors second only to Neovim (and maybe DoomEmacs), and the world runs off GitHub whether we like it or not. Azure runs Linux, and a lot of work has been put into WSL to where it’s pretty darn handy if you’re forced to use company Windows hardware but need to do Dev/SRE tasks.

        Windows 11 and Teams though can die in a tire fire.

        • ikidd@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          14
          ·
          3 days ago

          If you don’t want telemetry, you have to use VScodium, and then you don’t get to use marketplace. Github didn’t start as a Microsoft project or it would be far more enshittified than it is now, but even so Microsoft is sure trying to fuck that up with their Copilot bullshit.

          WSL is the definitition of EEE, and has prevented a great deal of Linux-ward movement that might have happened without it, even with IT department resistance. It’s a crutch to keep devs from having to go to Linux to get the useful tools, like docker which is a mess on Windows, but just usable enough to get by.

          And oh, yes, Teams can get shot with a ball of its own shit and fall into the dumpster fire.

        • utopiah@lemmy.ml
          link
          fedilink
          arrow-up
          5
          ·
          3 days ago

          the world runs off GitHub whether we like it or not

          It doesn’t and we don’t like it anyway.

          PS: to clarify, yes GitHub is wildly popular but, and the kernel is a particularly interesting example, it does not host ALL projects, only a lot of popular ones. A lot of very popular ones are also NOT there but rather on their own git, mailing list, GitLab instance, Gitea, etc. It’s a shortcut, I understand that, but by ascertaining it as “truth” it’s hiding a reality that is quite different and showing that reliable alternatives do exist.

  • caseyweederman@lemmy.ca
    link
    fedilink
    arrow-up
    49
    arrow-down
    1
    ·
    edit-2
    3 days ago

    Ah yes, the “extended Berkeley Packet Filter”.
    Wikipedia:

    eBPF is a technology that can run programs in a privileged context such as the operating system kernel.

    Phoronix:

    Hornet uses a similar signature verification scheme similar to that of kernel modules. A pkcs#7 signature is appended to the end of an executable file. During an invocation of bpf_prog_load, the signature is fetched from the current task’s executable file. That signature is used to verify the integrity of the bpf instructions and maps which where passed into the kernel. Additionally, Hornet implicitly trusts any programs which where loaded from inside kernel rather than userspace, which allows BPF_PRELOAD programs along with outputs for BPF_SYSCALL programs to run.

    So this is to make kernel-level instructions from userspace (something that’s already happening) more secure.

    The thread linked by the OP is Jarkko Sakkinen (kernel maintainer) seemingly saying “show your work, your patch is full of nonsense” in a patch submitted for review to the Linux kernel.
    Edit: the OP has edited the link, it used to point to this comment in the mailing list chain.

    • mina86@lemmy.wtf
      link
      fedilink
      English
      arrow-up
      5
      ·
      3 days ago

      The thread linked by the OP is Jarkko Sakkinen (kernel maintainer) seemingly saying “show your work, your patch is full of nonsense” in a patch submitted for review to the Linux kernel.

      That’s not what he’s saying. He’s saying: ‘You’re using terms which aren’t that familiar to everyone. Could you explain them?’

    • Magiilaro@feddit.org
      link
      fedilink
      arrow-up
      7
      ·
      3 days ago

      Loading BPF code from user space is, I hope, only possible with root access to the system. That would mean that an attacker needs root access to exploit BPF, but if an attacker has root access what stops him/her to do anything they want? At this time the system is lost anyway.

      Or am I missing anything?

      • ozymandias117@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        ·
        3 days ago

        If the executable binary has to be signed with a key, similar to the module signing key, Microsoft could sign their binaries

        This, along with secureboot, would prevent the owner of the machine from running eBPF programs Microsoft doesn’t want you to run, even with root

    • InnerScientist@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      3 days ago

      Preventing kernel modifications to expand upon the work done for kernel lockdown. Add additional layers to system security.

      Kernel_lockdown:

      prevent both direct and indirect access to a running kernel image, attempting to protect against unauthorized modification of the kernel image and to prevent access to security and cryptographic data located in kernel memory, […]

        • InnerScientist@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          edit-2
          3 days ago

          From the mailing list I’m reading that kernel maintainers have heard a few companies looking for something like this, so yes?

          Edit:

          However, to be clear, the Hornet LSM proposed here seems very reasonable to me and I would have no conceptual objections to merging it upstream. Based on off-list discussions I believe there is a lot of demand for something like this, and I believe many people will be happy to have BPF signature verification in-tree.

  • WasPentalive@lemmy.one
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    2
    ·
    edit-2
    3 days ago

    They probably named it HORNET for a reason - think Japanese Murder Hornets… What Could Possibly Go Wrong??

    It will probably start out as little glitches and slowdowns to destroy faith in your system (“Windows works right all the time”) a random 2 second pauses. Finally one day every Linux box in the world crashes, all at the same time, because some ‘dummy’ in Microsoft deleted the private signing key.