Joe Orton

935 posts

Joe Orton banner
Joe Orton

Joe Orton

@notroj

Product Owner at Red Hat. Apache HTTP Server hacker. Opinions all stolen.

Cambridge, UK Katılım Haziran 2009
254 Takip Edilen187 Takipçiler
Joe Orton retweetledi
Daniel Lemire
Daniel Lemire@lemire·
The problem is not the reporting. There is no indication whatsoever that @FFmpeg discourages bug reports. Or benchmarks for that matter. If you’re going to use massive AI resources to find bugs in volunteer-maintained code, don’t just drop the reports and run—provide the patches to fix them or fund people to do the work. @halvarflake keeps on making references to closed source software. My post was specifically about how the whole behaviour is inappropriate for a FFmpeg. @FFmpeg is not Apple, Microsoft, Google or Amazon. Making references to what suits the needs of Microsoft is irrelevant to FFmpeg. Google’s behaviour is rude and violates the open-source culture. Look at the likes of my post. Lots of people agree with me. @halvarflake would argue, as you do, that disclosure is speech. Fine. But understand that you can use your free speech and still be a vile individual. Nobody is calling for censorship. This is not Germany 1933. What is being demanded is respect for open-source norms. It is like the Internet. You can pull files from my blog. But I am not Google, don’t swarm me with 12 billion requests. If need to issue 12 billion requests to my blog, build a cache first. Intensity matters. If you snap a picture of me in passing, that’s fine. If you stalk me, follow me around and publish 100 pictures of me a day, it is harassment. And please don’t be tone deaf… « there is no pressure ». Again: social norms. Don’t be a jerk.
Daniel Lemire tweet media
English
3
1
14
603
Joe Orton
Joe Orton@notroj·
As downstream maintainers we also face regular pressure from CVE-data-consumers (our customers) to address - and patch - what are cleary bogus CVE assignments. So will be interesting to see how this develops.
English
0
0
0
37
Joe Orton
Joe Orton@notroj·
If you don't admire it, you likely fail to empathise with non-CNA maintainers facing bogus CVE assignments for bugs which they are *not* empowered to reject, like @bagder daniel.haxx.se/blog/2024/02/2…
English
1
0
1
41
Joe Orton
Joe Orton@notroj·
It is hard not to admire (from a distance) the Linux kernel CNA approach of assigning CVEs en masse for bugs then rejecting a subset later. It looks like a denial of service attack on the CVE system - and in particular, those who blindly consume CVE data.
English
1
1
2
107
Joe Orton
Joe Orton@notroj·
This xz thing is pure nightmare fuel for distro maintainers. Cold sweats.
English
0
0
4
90
Joe Orton retweetledi
reconditerose bksy social
reconditerose bksy social@reconditerose·
I've gotten together with various former Redis contributors and we've started working on a fork: github.com/madolson/place…. We are all unhappy with the license change, and are looking to build a new truly open community to fill the void left by Redis. Come join us!
English
6
111
451
106.9K
Joe Orton
Joe Orton@notroj·
@Stagecoach_East Can you confirm whether the no.4 will still stop at Childerley/Caldecote turn?
English
1
0
0
95
Igor Raits
Igor Raits@ignatenkobrain·
@notroj The Y axis are `ms`. We'll try out the sdbm locktype and let you know.
English
2
0
0
21
Joe Orton
Joe Orton@notroj·
@ignatenkobrain Without knowing more about your workload hard to say more. Disabling both DavLockDiscovery and DavDepthInfinity might help too
English
0
0
0
15
Joe Orton
Joe Orton@notroj·
@OctopusEnergy is the Power-up for tomorrow or Wednesday? Inquiring turkeys need to know.
Joe Orton tweet media
English
1
0
0
48
Joe Orton
Joe Orton@notroj·
Using the excess free electricity during @OctopusEnergy "Power-Up" days gives us a significant reduction in our gas consumption. Thanks!
Joe Orton tweet media
English
0
0
2
293
Joe Orton retweetledi
Ryan Hurst
Ryan Hurst@rmhrisk·
Did you know there are approximately 85 organizations authorized to issue TLS certificates for the web today? Or that seven of them issue 99% of all certificates currently in use? The presence of the others is largely intended to accommodate web openness and national sovereignty—an admirable goal, albeit one that introduces a significant attack surface for every web user. But were you aware that the recent eIDAS legislation, that was just signed, will obligate browsers to trust all QWAC-approved CAs listed on the EU Trust List (esignature.ec.europa.eu/efda/tl-browser)? To illustrate, Spain has 13 CAs approved to issue these certificates and there are 27 member states in the EU. Additionally, did you know the legislation will not permit browsers to remove of CA with a history of repeated incompetence without government approval? The most famous of all CA distrust events was an EU CA known as DigiNotar, and those in the PKI space might say that 12 years ago and today, the Conformity Assessment Bodies would have caught that and dealt with it proactively. But is that true? Check out the history of Camerfirma (wiki.mozilla.org/CA/Camerfirma_…) and wonder why an organization with such poor operational practices that the internet isn't dependent on is still trusted by anyone? Then ask why the associated CAB still lets it be approved as a CA for issuance. For those who say that the web doesn't need Browsers for such actions, consider this recent incident involving a Turkish CA (bugzilla.mozilla.org/show_bug.cgi?i…). And for those who doubt governments would use CAs to gain visibility into web traffic, take a look at this case where a French CA was doing just that: arstechnica.com/information-te…. Supposedly the final text has a recital that was added to the language to suggest that the scope of these requirements is to be limited to trusting these CAs for identity information and not the domain but the document is still private so we don't know for sure. Even if true recitals are not binding and the bill has other issues, for example, it requires browsers to reinstate user interface that has been proven to be harmful and misleading to users. arstechnica.com/information-te…. It also prevents the Browsers from establishing additional requirements for the CAs above and beyond what is included in the associated EU legislation, for example, they won't be subject to certificate.transparency.dev which has helped catch many many issues. All this means calcifying the web making it impossible to move forward without legislative change and leaving the web less secure at the same time. Change will now be governed by regulators, lobbyists, and standards boffins that either benefit from this weakening of the web or have no accountability for its consequences. There are 195 sovereign nations in this world. each would love to be in a position to observe everything their citizens and everyone who interacts with them does. When the world's most liberal and democratic governments put into place the tools to enable mass surveillance and weaken internet security in this fashion what makes us think the rest won't as well.
English
3
49
127
19.5K
Joe Orton
Joe Orton@notroj·
Three hours of free electricity? Sounds good to me. Let's see if we can trip a breaker. #octopusenergy
Joe Orton tweet media
English
0
1
1
106
Karanbir Singh
Karanbir Singh@kbsingh·
Everyone is super excited about the @Raspberry_Pi 5 ... While I am just looking for a price drop and power reduction for the most useful RPI ever... The Zero2w .
English
1
0
2
375