SCO Up To It’s Old Tricks

Looks like SCO is trying to move the goalposts again – this time they have introduced new allegations way after the final deadline for such and IBM is mightily annoyed.

First they provide a brief rundown of what was supposed to happen:

As the Court is aware, IBM has asked for years that SCO specify its allegations of misconduct by IBM. Ultimately, after repeated motions to compel and for summary judgment necessitated by SCO’s refusal to disclose the materials at issue in the case, the Court entered an order setting October 28, 2005 as the “Interim Deadline for Parties to Disclose with Specificity All Allegedly Misused Material” and December 22, 2005 as the “Final Deadline for Parties to Identify with Specificity All Allegedly Misused Material.” The parties also reached an agreement that both parties were required to identify with specificity any and all material that each party contends the other has misused no later than December 22,2005. Both parties submitted such materials on the required dates, and advised the Court that they had nothing more to provide.

then they explain how they believe that SCO is abusing the rules of court:

Despite this, three of SCO’s May 19, 2006 expert reports, those of Drs. Cargill and Ivie and Mr. Rochkind, significantly exceed the scope of the Final Disclosures – indeed, Dr. Cargill’s report effectively seeks to reinvent the case, introducing both new categories of allegedly misused material and a new theory of recovery which relates to them. The Rochkind and Ivie Reports also exceed the Final Disclosures, adding material never before disclosed by SCO. SCO’s refusal to identify exactly what is at issue in this case more than three years into the litigation — and nearly six months after the expiration of its Court-ordered deadline to do so — should be rejected. If allowed to ignore the Court’s Order in this way, SCO will have drastically expanded the scope of this case, just weeks before IBM’s opposing expert reports are due and just months before the dispositive motion cut-off, all to IBM’s substantial prejudice.

In their supporting documentation IBM notes that SCO now claim to own virtually everything:

SCO’s new copyright claims regarding the overall structure of SVr4, the structure of the entire SVr4 file system and system calls are not minor additions to the Final Disclosures. On the contrary, they represent a significant departure from the Final Disclosures. The Final Disclosures’ copyright allegations implicated only 12 Linux kernel files and 326 lines of code from the kernel.3 Since SCO’s new theories challenge the overall structure of Linux and its file system, they appear to implicate virtually every file in Linux, which is comprised of millions lines of code. As a practical matter, the Cargill report effectively pleads a brand new and complex (although still meritless) case.

To add to the general sense of SCO’s desperation IBM note that they now claim to own the entirety of STREAMS and the entirety of the ELF ABI, including the magic number for ELF executables!

The Cargill report also introduces into this case, for the first time, claims to the ELF “magic number” (Cargill Rpt. at 76-78) (a unique pattern identifying the type and intended use of a file).

How annoyed are IBM – well about this annoyed..

Although we do not burden the Court with a request for sanctions, we believe an order entering sanctions, including the costs of this motion, would be justified.

Via Groklaw

Linux Users Victoria (Melbourne) May Meeting – ComputerBank and SELinux in FC5

May 2006 General Meeting – LUV News, Linux News, Computer Bank, SE Linux in Fedora Core 5.

Tuesday 2nd May 2006, 7pm at The Buzzard Lecture Theatre. Evan Burge Building. Trinity College Main Campus. Parkville. Melways Map: 2B C5.

There’s an unofficial pre-meeting curry at the Classic Curry Company on Elizabeth Street around 6:15pm.. yum!

US Wants to Remove More Rights, Expand DMCA

It would appear a coalition of the repressive wish to expand the remit of US Copyright law, including the DMCA, to make it even harder to do research, play media on any OS but those you have to payed Microsoft/Apple for, or defend yourself against damaging software they put on silver circles they claim to be (but are not) Compact Discs.

Jessica Litman, who teaches copyright law at Wayne State University, views the DMCA expansion as more than just a minor change. “If Sony had decided to stand on its rights and either McAfee or Norton Antivirus had tried to remove the rootkit from my hard drive, we’d all be violating this expanded definition,” Litman said.

Even the current wording of the DMCA has alarmed security researchers. Ed Felten, the Princeton professor, told the Copyright Office last month that he and a colleague were the first to uncover the so-called “rootkit” on some Sony BMG Music Entertainment CDs–but delayed publishing their findings for fear of being sued under the DMCA.

..and how do they propose to get this through ? Fear of course! That resurgent American political tool.

During a speech in November, Attorney General Alberto Gonzales endorsed the idea and said at the time that he would send Congress draft legislation. Such changes are necessary because new technology is “encouraging large-scale criminal enterprises to get involved in intellectual-property theft,” Gonzales said, adding that proceeds from the illicit businesses are used, “quite frankly, to fund terrorism activities.”

Ed: my emphasis added

Stupid CNN

Clicking on the video link on this article I get a pop up that says (in an image, just to make it even dumber):

Dumb CNN Plugin Image

In text, it says:

PLUGIN WARNING

The CNN.com video experience is optimized for Windows Media Player 9 or above.

No Windows Media Player detected

They also give you a “GET THE PLAYER” link to click on and when I do, the Microsoft site helpfully tells me that:

Your operating system is not currently supported by Windows Media Player.

What a suprise.. I’ve sent a whinge to CNN to ask them to fix this bug and support more video codecs – be interesting to see what (if anything) happens..

Using Shorewall to Limit SSH Attacks

Firewalling with Shorewall SSH brute-force attacks

Category: Personal article (non-blog)

Year created: 2005

Overall rating: 5 out of 5

Content rating: 5 out of 5

There’s an excellent post over at Debian Grimoire which gives a simple recipe to defend against SSH brute force attacks using Shorewall, including a whitelist port-knock in case you manage to lock yourself out. Very useful!

Tags: shorewall ssh

Leon Brooks is back!

Well well, less than 2 months ago I wrote:

Leon, I hope you make a speedy and thorough recovery. Get well soon.

Well, check this out, here’s Leon’s first blog post since the accident! Leon – you are amazing!

My brain is now essentially OK — modulo some bits of Short Term Memory killled by the total loser’s antics — and the body is steadily rebuilding, so I do have a viable future as this develops.

The most disturbing part of it is that the subtext of his post implies that the “accident” was anything but – he writes:

I truly have ZERO appreciation for a selfish waste of space and oxygen who hurts people for the hell of it, including that it had already hurt several others before applying it’s stupid malice to me.

Sometimes I despair for humanity, but then people like Leon come along and give me some hope. Leon – it is so good to see you back in the virtual world again – keep fighting!

Elliptic Curve Cryptography

An interesting article from LWN about Elliptic Curve Cryptography and Open Source.

ECC is based on some very deep math involving elliptic curves in a finite field. It relies on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) in much the same way that RSA depends on the difficulty of factoring the product of two large primes. The best known method for solving ECDLP is fully exponential, whereas the number field sieve (for factoring) is sub-exponential. This allows ECC to use drastically smaller keys to provide the equivalent security; a 160-bit ECC key is equivalent to a 1024-bit RSA key.

As always though, there are the problems of patents..

The wild card in the ECC patent arena seems to be Certicom which claims a large number of ECC patents and has not made a clear statement of its intentions with regard to open source implementations. The NSA licensed Certicom’s patents for $25 million to allow them and their suppliers to use ECC, lending some credence to at least some of the Certicom patents. Other companies also have patents on various pieces of ECC technology.

Be interesting to see what happens..

Google Alternative To ‘DSH’ ?

Looks like Mikal and Andrew have come up with an interesting take on the age-old cluster/distributed SSH tool, like LLNL’s good old pdsh. But the twist is this (from their FAQ):

You run a utility (cssh) giving a couple of server names as parameters, and then xterms opens up to each server with an extra “console” window. Anything typed into the console is replicated into each server window (so you can edit the same file on N machines at the same time).

It should work on any POSIX system (including, they claim, CygWin).