Bonum Certa Men Certa

Sometimes Proprietary Software is Proprietary (Secret) Simply Because It is Not Good and Obfuscation Helps Hide Just How Ugly It Is

The story of FortiClient resembles what I've often encountered over the years with other proprietary VPNs (not of my choice)

Proprietary Software. You pay to be abused.



Summary: Why nonfree (or proprietary) software generally fails to catch up with Free/libre software -- at least on technical grounds -- and then makes up for it with marketing and FUD offensives (discrediting perfectly-functioning things, based on their perceived cost)

OVER the years I've encountered and used a lot of VPNs. It's one thing I'm quite familiar with, having configured and debugged VPNs quite a lot. At work, we use Free/libre VPNs that we host and manage ourselves (typically OpenVPN and IPSec/StrongSwan). But clients' choices of VPN are another matter. Occasionally I must access a client's GNU/Linux server to carry out maintenance, patching and software upgrades. It's quite a routine thing.



"Why is it that Free software generally works a lot more consistently than proprietary counterparts and why do some people pay a lot of money for VPN tools that not only cost a lot of money but need to be 'repurchased' (re-licensed) annually or any time one 'upgrades'?"VPN software varies from client to client and some VPN tools are so awful that it's not even funny. It can be painful. At times impossible!

Why is it that Free software generally works a lot more consistently than proprietary counterparts and why do some people pay a lot of money for VPN tools that not only cost a lot of money but need to be 'repurchased' (re-licensed) annually or any time one 'upgrades'? Suffice to say, many of these proprietary things have holes in them (kept under the rug), so one might actually be paying for additional security holes rather than security. Snowden's stash of leaks revealed some evidence to that effect.

"Much time down the drain."One might say I'm opinionated, but I'm not alone. It's not only me who complains by the way; a colleague explained that "[a]t the moment the only access we have for [client] is via a horrible proprietary VPN. You are only able to get clients for Windows and Mac officially, however an Ubuntu client has been found that works too. To make things more complicated it does not appear to work at all in Windows Server, meaning we can't provide access though the Windows [shared/remote virtual] box. If you have a Windows or Mac box, you can download the client from http://forticlient.com/ and the Ubuntu one can be found here https://forticlient.com/repoinfo..."

Well, nothing that I've tried allows me to access the client's network. Much time down the drain. You can try again and again (dealing with binary blobs). The FortiClient software is defective, however, as it shows an unimpressive blank window each time it starts (I tried other, more complicated things) and there's no way to debug this.

FortiClient
So-called 'Client'; Whose exactly? Spy agencies?



If I run this from the command line it says:

"Platform detected: fedora" (which is false by the way, it's not even an RPM-based distro, so I think they need to do more work on their client-side tools if it's advertised as cross-platform)

"The bottom line is, proprietary VPN software is utterly bad, it rarely prevents security incidents, and it is more like duct tape on top of something inherently broken."Our internal wiki indicates that we cannot access this over a virtual Windows Server, either. Because that too is not supported. What other access options may there be? And why need they complicate access to the point where they shut out people who merely try to keep their machines secure and up to date? As a Techrights associate recently noted, the whole concept behind VPN is flawed. It seems to assume that operating systems in use aren't safe if connected to the Web (there are NSA back doors, for starters), so complete separation and insulation from the network is seen as desirable. Later this year our combined lifetime for Tux Machines and Techrights will be 30 years. We're a high-profile target for attacks, Techrights in particular (many DDOS attacks over the years), but we never had any security incidents and we never used VPNs. We even gave up on so-called 2FA, knowing that it sounds better in theory than (how it works) in practice.

The bottom line is, proprietary VPN software is utterly bad, it rarely prevents security incidents, and it is more like duct tape on top of something inherently broken. Moreover, the quality of proprietary VPN software is utterly appalling. The same can be said about proprietary software other than VPNs, but these companies compensate for that with heavy marketing campaigns and waves of FUD directed at Free software counterparts.

Recent Techrights' Posts

[Video] Microsoft Got Its Systems Cracked (Breached) Again, This Time by Russia, and It Uses Its Moles in the Press and So-called 'Linux' Foundation to Change the Subject
If they control the narrative (or buy the narrative), they can do anything
 
Sven Luther, Lucy Wayland & Debian's toxic culture
Reprinted with permission from disguised.work
Chris Rutter, ARM Ltd IPO, Winchester College & Debian
Reprinted with permission from disguised.work
Links 19/04/2024: Israel Fires Back at Iran and Many Layoffs in the US
Links for the day
Russell Coker & Debian: September 11 Islamist sympathy
Reprinted with permission from disguised.work
Sven Luther, Thomas Bushnell & Debian's September 11 discussion
Reprinted with permission from disguised.work
G.A.I./Hey Hi (AI) Bubble Bursting With More Mass Layoffs
it's happening already
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 18, 2024
IRC logs for Thursday, April 18, 2024
Coroner's Report: Lucy Wayland & Debian Abuse Culture
Reprinted with permission from disguised.work
Links 18/04/2024: Misuse of COVID Stimulus Money, Governments Buying Your Data
Links for the day
Gemini Links 18/04/2024: GemText Pain and Web 1.0
Links for the day
Gemini Links 18/04/2024: Google Layoffs Again, ByteDance Scandals Return
Links for the day
Gemini Links 18/04/2024: Trying OpenBSD and War on Links Continues
Links for the day
IRC Proceedings: Wednesday, April 17, 2024
IRC logs for Wednesday, April 17, 2024
Over at Tux Machines...
GNU/Linux news for the past day
North America, Home of Microsoft and of Windows, is Moving to GNU/Linux
Can it top 5% by year's end?
[Meme] The Heart of Staff Rep
Rowan heartily grateful
Management-Friendly Staff Representatives at the EPO Voted Out (or Simply Did Not Run Anymore)
The good news is that they're no longer in a position of authority
Microsofters in 'Linux Foundation' Clothing Continue to Shift Security Scrutiny to 'Linux'
Pay closer attention to the latest Microsoft breach and security catastrophes
Links 17/04/2024: Free-Market Policies Wane, China Marks Economic Recovery
Links for the day
Gemini Links 17/04/2024: "Failure Is An Option", Profectus Alpha 0.5 From a Microsofter Trying to Dethrone Gemini
Links for the day
How does unpaid Debian work impact our families?
Reprinted with permission from Daniel Pocock
Microsoft's Windows Falls to All-Time Low and Layoffs Reported by Managers in the Windows Division
One manager probably broke an NDA or two when he spoke about it in social control media
When you give money to Debian, where does it go?
Reprinted with permission from Daniel Pocock
How do teams work in Debian?
Reprinted with permission from Daniel Pocock
Joint Authors & Debian Family Legitimate Interests
Reprinted with permission from Daniel Pocock
Bad faith: Debian logo and theme use authorized
Reprinted with permission from Daniel Pocock
Links 17/04/2024: TikTok Killing Youth, More Layoff Rounds
Links for the day
Jack Wallen Has Been Assigned by ZDNet to Write Fake (Sponsored) 'Reviews'
Wallen is selling out. Shilling for the corporations, not the community.
Links 17/04/2024: SAP, Kwalee, and Take-Two Layoffs
Links for the day
IRC Proceedings: Tuesday, April 16, 2024
IRC logs for Tuesday, April 16, 2024
Over at Tux Machines...
GNU/Linux news for the past day