Linux-Ck whose side are you on?

Back a while ago while fighting the Devuan troll-monsters we dedicated this song/video to those that dare to raise their head and their voice to hierarchy enforcement.

In this case we dared ask the leading developer/maintainer for linux-ck, code named graysky, while struggling to leap from linux-4.16-16 to 4.17 whether he would leave the NSA’s proposed encryption module enabled, disabled, or write it off all together.  At first he pretended he did not see the question, then he admitted that he did see it, chose not to answer, and then answered that he wasn’t going to alter the kernel.  This is  linux-ck, a hacked, modified, “optimized”, kernel for desktop users.  An answer is a thousand times better than a non-answer but it is also a commitment to values and principles of some spineless apolitical “developers” who would rather stick being in the mainstream flow rather than be considered “extremists”.  Give them some time the same individuals will sell you the line that “they are doing their best to improve security of your system”.  In this case it is national security, not user security.  Then another dork hijacks the issue to talk about legalities of the backdoor to your encrypted data.  Please spare us your state legitimization drama.

https://bbs.archlinux.org/viewtopic.php?pid=1795547#p1795547

Then an administrator cuts in and referred this here “troll” to forum policy on trolling and hijacking.  Same administrator with a long term hit list of anyone that dared to criticize Arch’s choice of an init system.  If it wasn’t for efforts such as Artix and Obarun this would have been another redhat, fedora, or debian, “one system fits all needs”, type of distribution.

[note 2018-07-09:  Look at comments added below — antiX linux4.17 has Speck module OFF, which is how kernel.org “intended” before “Arch” decided to turn it ON!!!  We are researching this detail, and yes Arch caters  to Arm7 devices and such, but still, it is a conscious choice that weighs on Arch, more so than on linux.org himself   –   according to a clarification made below in the comment section]

[note 2018-07-12:  Void linux4.17 has the module disabled in both the glibc and musl repositories .. 

# grep SPECK /boot/config-4.17.5_1
# CONFIG_CRYPTO_SPECK is not set
]

So, the song and its history still stand in relevance and this here troll will dare draw the line between people and trash!  I don’t give a shit how much work you do and how much you have contributed to the “community”, Leonard Poettering has contributed plenty of disease himself, when you take a stand on which side of the line you are you better be prepared to receive criticism.

So whose side do you think Linux-CK is standing on now?  You see, “not responding” to a question is the easy way out of the dilemma.  Both Arch and Linux-CK are clearly on the other side of the line we are on.

An insignificant detail maybe, but Artix on linux 4.17-2 and beyond rebuilt the same kernel with Speck turned OFF.  How hard was that?  The module is still in there, just turned off, which means it will not compile.  (note2: it seems as this is the way vanilla kernel came from kernel.org, it was Arch turning it on that made the difference … artix modifies and rebuilds what appears on Arch repositories, not directly upstream, in effect reversing Arch’s intervention in this case)

It is nice as we progress to the total consumption of everything by “Pacman” and the universal state sponsored linux system that we know on “whose side each one of the players is on“.

What do you think?

PS  Someone recently asked why haven’t we talked about ArchBang at all, since for a while they were running Arch without systemd.  Recently though they had released archbang with systemd, which even if they had 4 different editions with 4 different init systems, if they include systemd then we are under different understandings on what is what.  It is a statement, on whose side they are on.  Simple!  Easy!  Harsh, but it is what it is, don’t throw camouflage on top of it trying to slip by and be stepping on two boats at the same time.

5 thoughts on “Linux-Ck whose side are you on?

  1. antiX 4.17 kernels also have Speck turned off. In fact, the default option from kernel.org is to have it turned off. So arch linux must have made a conscious decision to turn it on. (I understand they build their kernels from vanilla kernel.org)

    Like

  2. Thank you for the clarification, it adds more to the story and the weight of the notice to “sailors”.
    On my hunt for specific reference to the above I find all sorts of interesting things. For one, I was told I had no idea what I am talking about and Speck does not relate to “android” related needs, but “other devices”.

    git.kernel.org……cd93968d63

    Pull fscrypt updates from Ted Ts’o: “Add bunch of cleanups, and add support for the Speck128/256 algorithms.
    Yes, Speck is contrversial, but the intention is to use them only for the lowest end Android devices, where the alternative *really* is no encryption at all for data stored at rest”

    arguments supporting Speck .. https://git.kernel.org/….87c5f3817f89e1ccc0f11a7b5

    the original proposal and its reasoning … https://git.kernel.org/….2be06a00a28f0

    2018-06-05 Merge tag ‘fscrypt_for_linus’ of git://git.kernel.org/pub/scm/linux/kernel/gi… Linus Torvalds 13 -213/+248
    2018-05-21 Merge branch ‘speck-v20’ of git://git.kernel.org/pub/scm/linux/kernel/git/tip… Linus Torvalds 34 -119/+1166
    2018-05-20 fscrypt: add Speck128/256 support Eric Biggers 4 -0/+18
    2018-05-20 fscrypt: use unbound workqueue for decryption Eric Biggers 1 -1/+10
    2018-04-04 Merge branch ‘linus’ of git://git.kernel.org/pub/scm/linux/kernel/git/herbert… Linus Torvalds 183 -7763/+22264
    2018-03-16 crypto: arm64/speck – add NEON-accelerated implementation of Speck-XTS Eric Biggers 4 -0/+643
    2018-02-22 crypto: speck – add test vectors for Speck64-XTS Eric Biggers 2 -0/+680
    2018-02-22 crypto: speck – add test vectors for Speck128-XTS Eric Biggers 2 -0/+696
    2018-02-22 crypto: arm/speck – add NEON-accelerated implementation of Speck-XTS Eric Biggers 4 -0/+728
    2018-02-22 crypto: speck – export common helpers Eric Biggers 2 -41/+111
    2018-02-22 crypto: speck – add support for the Speck block cipher Eric Biggers 5 -0/+460

    Like

  3. Some of the arguments in there seem like troll that try to dilute the issue and downgrade its importance. I am very suspicious of those that appear and say “it doesn’t matter, it is in there, you don’t have to use it”. If it is in there and eventually enabled whether you consciously use it or an application or script is using it will be beyond any reasonable control. The potential to deceive you that your information will be encrypted/decrypted in a secure way will be there. It is as ridiculous as saying there is a time-bomb in your car but it is not really enabled, it is just sitting there for when the driver decides to activate it.

    When I started this blog and talked about a community this is what I had in mind, people who are critical of those “linux choices made for them” not marketing and trends whores.

    I am investigating this new firefox clone that has alsa support (the Mozilla dropped in favor for pulseaudio). It is called firefox-fuckpa 🙂

    Why would mozilla drop support for alsa when even pulseaudio needs alsa to work? Many strange things are happening recently, but linux is about choice. Developers’ single choice.

    Like

  4. A short while after this story was written Arch decided to revert their decision and turn off Speck. Linux-ck followed Arch’s choice as well. As far as we know linux publishes the possible modules that can be selected to be on or off, to be included or not, while building the kernel. Again thumbs up to void, antix, and artix, for choosing to turn it off. Starting with linux 4.20 this “speck” thing will be totally left out again.

    Like

If your comment is considered off-topic a new topic will be created with your comment to continue a different discussion. This community is based on open and free communication, meaning we must all respect all in minimizing the exercise of freedom to disrupt such communication. Feel free to post what you think but keep in mind the subject matter discussed. It is just as easy to start a new topic as it is to dilute the content of an existing discussion.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.