Re: Why does no one care that Brad Spengler of GRSecurity is blatantly violating the intention of the rightsholders to the Linux Kernel?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Since any changes to the source code Redhat makes eventually flows back to the rights-holders, even if there was a technical violation, it would be unlikely that said rights-holders to the Linux Kernel (of which RedHat itself is one) would bring suit, and even if a suit was brought what would the damage to the rights-holders be? They received the derivative work (source code).

The point, more or less, in the RedHat situation is moot since the derivative source code is distributed and makes it's way into the hands of the original rights-holders, the dispute is just simply over it's form, and how it's accessed, if it's convenient etc. It's unlikely the rights-holders would bother with a case since the appear uninjured and still benifit as they intended to when they adopted the GPL (they put out source code, and derivative works are in fact freely distributed). Basically the line was walked up to, but if crossed, not in a way that would cause a claim of damages to arise (as far as I see).

As you said: this was mostly all-ready available backports etc. RH doesn't seem to be making kernel enhancements and then preventing those enhancements from being distributed.

The GRSecurity situation is wildly different though the scheme seems familiar at first glance. Here the aim is to prevent any further distribution of the derivative work which comprises of kernel enhancements, and said scheme has been successful: not one line of the now closed source has been "leaked". Customers of GRSecurity have stated publicly that they dare not do such under threat of retaliation by canceling of any future business dealings. GRSecurity has taken the derivative work hostage and has successfully prevented further distribution.



On 2017-06-15 17:56, Florian Weimer wrote:
(Note: last month the GRSecurity Team removed the public testing patch,
they prevent the distribution of the patch by paying customers by a
threat of no further business: they have concocted a transparent scheme
to make sure the intention of the Linux rights-holders (thousands of
entities) are defeated) (This is unlike RedHat who do distribute their
patches in the form the rights-holders prefer: source code, RedHat does
not attempt to stymie the redistribution of their derivative works,
GRSecurity does.).

I don't think Red Hat distributes the Red Hat Enterprise Linux 7
kernels to the general public, only to customers who have entered a
subscription agreement.  Debranded kernel sources are available from
centos.org, though.

Based on what I have read, the legal construction for the Red Hat
agreement and the grsecurity agreement are somewhat similar.  Source
code access is a subscription service (among many others in the case
of Red Hat), and you cannot use a subscription to provide the very
same service you obtain from the provider to third parties.

The situation with Red Hat Enterprise Linux is further complicated
because as part of the subscription services, subscribers can access
the Red Hat Code Browser, which provides broken-out and fully
cross-referenced kernel patches, something that is not available as
part of the CentOS offering.  The GPL certainly allows subscribers to
share these patches freely (and almost all of them are just backports
from upstream anyway), but I think Red Hat's intent is that this is
not permitted while the subscription agreement is in force.  (And
subscribers are expected not to use these patches to support their own
kernel backporting efforts, either.)
_______________________________________________
legal mailing list -- legal@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to legal-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Gnome Users]     [KDE Users]

  Powered by Linux