Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday May 06 2022, @12:29AM   Printer-friendly

"We are especially proud to present you Tails 5.0, the first version of Tails based on Debian 11 (Bullseye). It brings new versions of a lot of the software included in Tails and new OpenPGP tools."


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 4, Interesting) by Rosco P. Coltrane on Friday May 06 2022, @02:13AM (4 children)

    by Rosco P. Coltrane (4757) on Friday May 06 2022, @02:13AM (#1242685)

    I know the developers backpedalled [fosspost.org] and we're all supposed to forget about this, but Audacity being included in Tails is rich in irony.

    • (Score: 0) by Anonymous Coward on Friday May 06 2022, @06:19AM

      by Anonymous Coward on Friday May 06 2022, @06:19AM (#1242714)

      wait until you discover the "do_not_ever_run_me" script.

    • (Score: 0) by Anonymous Coward on Friday May 06 2022, @12:17PM

      by Anonymous Coward on Friday May 06 2022, @12:17PM (#1242753)

      Tails - an ancient African word meaning too entitled to install Debian.

    • (Score: 4, Insightful) by stretch611 on Friday May 06 2022, @03:56PM (1 child)

      by stretch611 (6199) on Friday May 06 2022, @03:56PM (#1242789)

      And the fact that it uses SystemD isn't ironic?

      --
      Now with 5 covid vaccine shots/boosters altering my DNA :P
  • (Score: 0) by Anonymous Coward on Friday May 06 2022, @09:25AM (1 child)

    by Anonymous Coward on Friday May 06 2022, @09:25AM (#1242736)

    The following is somewhat dated, but still applies:

    Set Sail For TAILS (Linux) Fail!

    ###

    Hell, IMO if TAILS were serious they would roll a hardened Gentoo distro (or OpenBSD) without so many packages and without so many odd additions, including:

    1) The ‘Whisperback‘ package
    2) Not shipping with ‘autotest_remote_shell.py‘ and ‘do_not_ever_run_me‘ in /usr/local/sbin and removing all traces of debugging scripts – go ahead and read both files on TAILS and question why a distro such as TAILS needs these.

    Don’t suggest liberte linux, development has stalled since it’s first version a long time ago. Don’t suggest the OpenBSD Anonymous Tor CD, it’s outdated and won’t connect to the Tor network.

    ##############################

    The following is somewhat dated, but still applies:

    Tails Linux version 0.16 – Fir3wall Disabling Script Waits For Expl0itation

    If you’re running Tails version 0.15 or 0.16, please locate and del3te the following file each session:

    /usr/local/sbin/do_not_ever_run_me

    The file, if ran with correct permissions, will completely disable your firewall! So much for the idea that Tails always routes everything through Tor! Where this news has been posted and comments allowed, mysterious “anonymous” users have expressed their low brow intelligence leaving comments such as, “Well you need to be root to run it so it doesn’t matter, if you have root you can do anything!”

    First of all, a file called “do_not_ever_run_me” shouldn’t be on a Linux system. If it should NEVER BE RUN, and that means by anyone, root or user, local or remote, it SHOULD NOT BE INCLUDED IN THE DISTRIBUTION!

    Any current or future exploit which targets this file will “drop the shields” for the Tails user.

    Perhaps Tails itself in its next version, 0.17, should be nicknamed, “do_not_ever_run_me”.

    Another questionable decision by the Tails developers is to place the following line within the torrc file (located at /etc/tor/torrc):
    We don’t care if applications do their own DNS lookups since our Tor
    enforcement will handle it safely.

    WarnUnsafeSocks 0

    Oh, really? We don’t care? Who is we? It’s not me! As the man page for Tor states, this is set to 1 by default, yet Tails sets it for 0! So if something “leaks”, you will never know it? Each session, delete this line or comment it out so the default is 1 like it should be for a Tor session.

    What else can we find in this anonymously developed distribution? I’m glad I’m not driving a car with software made by this group of developers.

    • (Score: 5, Informative) by janrinok on Friday May 06 2022, @09:47AM

      by janrinok (52) Subscriber Badge on Friday May 06 2022, @09:47AM (#1242740) Journal

      We are talking about the release of version 5 - and you are quoting the files that existed when the system was being developed i.e. versions 0.15 and 0.16. They were released in 2009! Yes, they are somewhat dated but you haven't proven that they a relevant. They bear no resemblance to the more recent releases.

      Furthermore, anyone running those systems will be unable to connect to the TOR network as the encryption used has changed along with a huge number of packages.

      By all means point out problems with the current TAILS release - but this is pure FUD.

(1)