Language Selection

English French German Italian Portuguese Spanish

License issues roil Linux developer community

Filed under
Linux

Should the Linux kernel be licensed under the new version of the Gnu General Public License, or should it stick with the old version? The question has sparked a heated debate on the mailing list for Linux kernel developers. Hundreds of messages have zapped back and forth across the list debating the merits of the new open-source license, now in the final stages of preparation by the Free Software Foundation.

The copyright owner of the Linux kernel, Linus Torvalds, has stated that he would prefer to stick with the previous version of the kernel, Version 2. His chief lieutenants, Alan Cox and Andrew Morton, have sided with Torvalds. "I still think GPLv2 is simply the better license," Torvalds wrote.

Complicating the picture is that fact that Torvalds has said that if Sun Microsystems moves its open-source Solaris operating system — another version of Unix — he'd consider dual-licensing Linux so that the two projects could share code. "If we can avoid having two kernels with two different licenses and the friction that causes, I at least see the reason for GPLv3," he wrote.

Whether he could find agreement with the many coders who help write the Linux kernel is another matter.

More Here.




Law doesn't work like that

Contract law is fundamental to a functioning society and is one of the oldest parts of the law. However your analysis is overly simplistic because it doesn't acknowledge that as needs evolve, so must the law. If society decides, through the actions of the marketplace, that a new form of contract is needed, then the law will change to accommodate that and ensure that signatories uphold the contractual terms they have agreed to, so long as they are fair and reasonable.

In any event if you were right then all sorts of click-through licensing would be null and void. Yet the courts continue to uphold them.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's howtos

Leftovers: OSS

Security Leftovers

  • Secure Server Deployments in Hostile Territory, Part II
    There are a few other general security practices I put in place. First, as I mentioned before, because each host has a certificate signed by an internal trusted CA for Puppet, we take advantage of those certs to require TLS for all network communications between hosts. Given that you are sharing a network with other EC2 hosts, you want to make sure nobody can read your traffic as it goes over this network. In addition, the use of TLS helps us avoid man-in-the-middle attacks.
  • Hackers Can Disable a Sniper Rifle—Or Change Its Target
    At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.
  • Get root on an OS X 10.10 Mac: The exploit is so trivial it fits in a tweet
    Yosemite, aka version 10.10, is the latest stable release of the Mac operating system, so a lot of people are affected by this vulnerability. The security bug can be exploited by a logged-in attacker or malware on the computer to gain total unauthorized control of the Mac. It is documented here by iOS and OS X guru Stefan Esser. It's all possible thanks to an environment variable called DYLD_PRINT_TO_FILE that was added in Yosemite. It specifies where in the file system a component of the operating system called the dynamic linker can log error messages. If the environment variable is abused with a privileged program, an attacker can modify arbitrary files owned by the powerful user account root – files like the one that lists user accounts that are allowed administrator privileges.

Open-Source CMSs Appeal To Control-Oriented Media

Snubbed by local media in their infancy for being too rudimentary, news outlets are taking a growing interest in using open-source content management systems like WordPress and Drupal. Media companies’ tech execs say they like the open-source CMS platforms because the software now offers all the extras and options that managed CMS platforms do, while also allowing them more creativity and control. Read more Also: Execs from Kentico and HIPPO debate pros and cons of open source CMS Jahia Provides Open Source User Experience Platform to Samsung Subsidiaries as a Global Platform Partner