This doesn't work on any other operating system because every other operating system didn't implement this part of the RFC.
Elijah Fisher
Anyone know where to download the updated RHEL 7 rpm? I want to steal their backport of the fix. The version in Linus's tree needs a lot of changes and it's not in stable or stable-queue yet.
Julian Hughes
Fixed in 4.7. Basically this is non-news to everyone except nvidiafags, who are again denied a security update for muhfps
Lucas Hill
Nevermind, RHEL 7 doesn't appear to have it yet, backported it myself.
Joseph Torres
Slackware/BSD when?
Juan Johnson
uh, and for these things called 'servers'. Also a popular use of Linux. Year of the server when?
Brandon Edwards
4.7 just got pushed on arch with the new nvidia drivers a little while ago.
Dylan Perez
One thing OP forgot was to execute the change with the command- sudo sysctl -p
Ryan King
kek, 4.7 manjaro here.
well obviously those faggots have to put security first and deal with the task of upgrading the kernel.
Owen Davis
You got a link for that fix? I can't find anything mentioning this being fixed in 4.7.
I always knew that Linux is insecure amateur crap OS, that's why I switched from Whonix-Workstation (original uses debian) to Whonix-Windows. Now I am safe and you are hacked by NSA. I can watch hurtcore while you can watch prison wall.
Blake Myers
Oh man lts packages are no longer safe nowadays. Everything have to be bleeding edge start from now on.
At least it's not as bad as wangblows where their exploits didn't get fix for decades.
btw, year of Hurd when?
Ryan Bell
...
Julian Phillips
As much as Windows is bug-ridden garbage, they patched badtunnel.
So I suppose I don't see the comparison here; if one isn't bad because it was patched why is the other?
Nolan Sanchez
SIX FUCKING YEARS LMAO
Brandon Ortiz
*four woops
Ryan Rivera
...
Justin Hall
One has a setting that makes it pretty much impossible to exploit without rebooting or interruption, the other allowed complete network infiltration for two decades, there's no setting to change the vulnerability without completely disabling it (and removing the functionality companies needed) and was a result of stupid decisions, and not a result of a flaw in RFC specifications. This is a result of a Linux implementing a flawed RFC supposed to provide security benefits to spec, not a mistake in development itself.
William Green
Implementing a broken spec is as bad if not worse.
Best bit about this story is OpenSSL broke the implementation of the broken RNG, and it was not possible to fix because FIPS.
Ryder Bennett
The difference is one was broken, slow shit PRNG that nobody used, nobody recommended and everybody knew was flawed. The other solved a very real problem, improving robustness of TCP, and the flaw was found via peer review. The only reason no one else was exploitable is because they didn't bother to implement the RFC or harden against spoofed package injection attacks.
Josiah Richardson
Wow I'm glad all my data is secure in Microsoft's servers and NSA can datamine me safely while linux cucks are getting hacked!
Ryder Price
How do I fix this, I am super new to Linux. Don't even know what append means :( Do I add "net.ipv4.tcp_challenge_ack_limit = 999999999" at the end of the .conf without the #? Have to log in as su as well right? terminal takes me to vim instead of nano for some fucking reason and I don't use vim
Zachary Rivera
So just run "nano /etc/sysctl.conf" after su-ing.
Brayden Young
wait. do I and should I even add this? what is it even doing? can it cause harm instead
echo "net.ipv4.tcp_challenge_ack_limit = 999999999" | sudo tee /etc/sysctl.conf 1>/dev/null
Brandon Russell
Either way just update your kernel to the latest 4.7 already. Download new latest kernel, do mkinitcpio -p linux and update your bootloader and you're done. There's no reason to use lts kernel this time around. Is not like the latest kernel frequently breaks like it used to be few years back.
Luke Jones
haha should of use windows. In windows if you want to change something you just click or click copy paste. Not spend time in console or ask forums
Yeah go install newest kernel that will have even more backdoors and boogs that will be exploited for years.
The newer kernel the more bugs, as it's fatter and bigger. And fact that it's developed by amateurs doesn't help. That's why win 2000/xp is so safe, because it is small and small kernel. And also developed by professionals.
Christian Gray
Boot up your wangblows xp vm and count the files in the C:\Windows directory. I'm waiting.
Jayden Ortiz
Exactly why they needed to make Windows Vista from scratch.
Oy, easily triggered homo's, don't fucking respond to bait. It's fucking easy, you don't even have to do anything.
append=synonym of add
Polite off topic sage
Xavier Lewis
Fucking hell, wrong "homos"
Connor Hill
What are the odds this will be patched downstream at all? Why the shit should I have to manually patch my system? This is a major bug but the devs don't seem to give a fuck. This is some Windows tier shit.
Not everyone is running 4.7 and don't want to... Ubuntu is currently on 4.4 with no patch in site. Manually patching all of my machines is a fucking joke.
Eat a dick kernel devs.
Brody Roberts
It was fixed in launchpad.net/ubuntu/ source/linux/4.4.0-36.55 you fucking retard, last week. You didn't have to patch manually either, you could've used the kernel parameter configuration to make it infeasible to exploit.