EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.25.20

Sometimes Proprietary Software is Proprietary (Secret) Simply Because It is Not Good and Obfuscation Helps Hide Just How Ugly It Is

Posted in Free/Libre Software, GNU/Linux, Security, Windows at 8:16 am by Dr. Roy Schestowitz

The story of FortiClient resembles what I’ve often encountered over the years with other proprietary VPNs (not of my choice)

Proprietary Software. You pay to be abused.

Summary: Why nonfree (or proprietary) software generally fails to catch up with Free/libre software — at least on technical grounds — and then makes up for it with marketing and FUD offensives (discrediting perfectly-functioning things, based on their perceived cost)

OVER the years I’ve encountered and used a lot of VPNs. It’s one thing I’m quite familiar with, having configured and debugged VPNs quite a lot. At work, we use Free/libre VPNs that we host and manage ourselves (typically OpenVPN and IPSec/StrongSwan). But clients’ choices of VPN are another matter. Occasionally I must access a client’s GNU/Linux server to carry out maintenance, patching and software upgrades. It’s quite a routine thing.

“Why is it that Free software generally works a lot more consistently than proprietary counterparts and why do some people pay a lot of money for VPN tools that not only cost a lot of money but need to be ‘repurchased’ (re-licensed) annually or any time one ‘upgrades’?”VPN software varies from client to client and some VPN tools are so awful that it’s not even funny. It can be painful. At times impossible!

Why is it that Free software generally works a lot more consistently than proprietary counterparts and why do some people pay a lot of money for VPN tools that not only cost a lot of money but need to be ‘repurchased’ (re-licensed) annually or any time one ‘upgrades’? Suffice to say, many of these proprietary things have holes in them (kept under the rug), so one might actually be paying for additional security holes rather than security. Snowden’s stash of leaks revealed some evidence to that effect.

“Much time down the drain.”One might say I’m opinionated, but I’m not alone. It’s not only me who complains by the way; a colleague explained that “[a]t the moment the only access we have for [client] is via a horrible proprietary VPN. You are only able to get clients for Windows and Mac officially, however an Ubuntu client has been found that works too. To make things more complicated it does not appear to work at all in Windows Server, meaning we can’t provide access though the Windows [shared/remote virtual] box. If you have a Windows or Mac box, you can download the client from http://forticlient.com/ and the Ubuntu one can be found here https://forticlient.com/repoinfo…”

Well, nothing that I’ve tried allows me to access the client’s network. Much time down the drain. You can try again and again (dealing with binary blobs). The FortiClient software is defective, however, as it shows an unimpressive blank window each time it starts (I tried other, more complicated things) and there’s no way to debug this.

FortiClient
So-called ‘Client’; Whose exactly? Spy agencies?

If I run this from the command line it says:

"Platform detected: fedora" (which is false by the way, it’s not even an RPM-based distro, so I think they need to do more work on their client-side tools if it’s advertised as cross-platform)

“The bottom line is, proprietary VPN software is utterly bad, it rarely prevents security incidents, and it is more like duct tape on top of something inherently broken.”Our internal wiki indicates that we cannot access this over a virtual Windows Server, either. Because that too is not supported. What other access options may there be? And why need they complicate access to the point where they shut out people who merely try to keep their machines secure and up to date? As a Techrights associate recently noted, the whole concept behind VPN is flawed. It seems to assume that operating systems in use aren’t safe if connected to the Web (there are NSA back doors, for starters), so complete separation and insulation from the network is seen as desirable. Later this year our combined lifetime for Tux Machines and Techrights will be 30 years. We’re a high-profile target for attacks, Techrights in particular (many DDOS attacks over the years), but we never had any security incidents and we never used VPNs. We even gave up on so-called 2FA, knowing that it sounds better in theory than (how it works) in practice.

The bottom line is, proprietary VPN software is utterly bad, it rarely prevents security incidents, and it is more like duct tape on top of something inherently broken. Moreover, the quality of proprietary VPN software is utterly appalling. The same can be said about proprietary software other than VPNs, but these companies compensate for that with heavy marketing campaigns and waves of FUD directed at Free software counterparts.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. IRC Proceedings: Saturday, February 15, 2020

    IRC logs for Saturday, February 15, 2020



  2. Guest Article: Au Revoir, GNU/Linux

    "Funny how OSI just ended up being another vehicle for their takeover of the computing world..."



  3. Former Microsoft Employee: ZDNet is Owned by Microsoft (and Others) in Some Senses

    A noteworthy message we've received from someone who knows Microsoft from the inside



  4. Links 15/2/2020: Blender 2.82, Qt 5.15 Alpha and NetBSD 9.0 Released

    Links for the day



  5. Microsoft Views 'Open Source' as a Zero-Cost Heist Opportunity (Making Proprietary Software/Spyware Using Other People's Free Labour)

    Making GPL-licensed (copyleft) software and hosting it outside Microsoft’s jaws is the best way to counter the abusive monopolist, which still says it “loves” what it is actually attacking



  6. Did Microsoft 'Buy' ZDNet?

    A look at what ZDNet tells its readers (screenshot from this morning) and a rare look at how its writers are censored/suppressed



  7. Anatomy of a Crime and Protection From Prosecution

    It’s hard to forget what António Campinos hides for his friend



  8. Today's EPO is a Fraud Managed by Frauds

    Beneath the scandals associated with systematic abuse against staff, union-busting (silencing whistleblowers) and en masse granting of invalid patents — the hallmark of grotesque maladministration — lie a bunch of even greater crimes



  9. IRC Proceedings: Friday, February 14, 2020

    IRC logs for Friday, February 14, 2020



  10. One Need Only Look at ZDNet's 'Linux' Section to Understand It's a Microsoft Propaganda Operation

    A timely new snapshot (or screenshot) that demonstrates what ZDNet became after hiring Microsoft employees as ‘journalists’ and censoring on behalf of Microsoft, defaming Free software figures and so on



  11. Links 14/2/2020: New Release of KStars, OpenSSH 8.2, Rhythmbox 3.4.4, Flatpak 1.6.2

    Links for the day



  12. The Uselessness of Social Control Media and Why We Need RSS Feeds' Resurgence More Than Ever

    Social control media became pure noise or misinformation, usually in pursuit of financial expansion alone, and it is also a censorship machine which discourages not falsehoods but unconventional thinking



  13. Another New 'Clown' for the UPC 'Circus'

    A former writer of IPPro Magazine (which seems to be defunct now) reports another shuffle -- perhaps the fifth in a few years -- of "IP" [sic] Minister for the UK; it doesn't bode well for the Unified Patent Court (UPC)



  14. IRC Proceedings: Thursday, February 13, 2020

    IRC logs for Thursday, February 13, 2020



  15. Links 13/2/2020: Ubuntu 18.04.4 LTS, Septor 2020, Endless OS 3.7.7, Wayland 1.18.0, KDE Plasma 5.18 and GTK 3.98 Released

    Links for the day



  16. The Microsoft Propaganda Model

    Classic new examples (real screenshots) of how Microsoft-funded media entraps people looking for information about "Linux" to actually push Microsoft talking points and marketing, cover-up, face-saving lies etc.



  17. What's Evil is Forcing People to Use Something They Don't Want and Typically Dislike

    The difference between Google Search and Microsoft is that many people actually want to use Google (and don't have to)



  18. 2020: The Year Microsoft Became Honest... About Being Corrupt and Criminal

    Microsoft is destroying any past attempts to portray itself as a reformed company or 'recovering criminal'; nothing is really changing and everyone has noticed



  19. Free Software is Being Abandoned by Opponents of Software Patents and It's Being Attacked by Patent Trolls

    The Electronic Frontier Foundation (EFF) is rotting away as an advocate against software patents; Patents on algorithms are still being granted (even when courts repeatedly reject these) and Red Hat's Chief Patent Counsel remains Manny Schecter, one of the loudest proponents of such patents (citing the likes of Adam Mossoff this week, in effect Koch operatives); this is a very big problem because Free software projects come under a barrage of lawsuits, using patents like those IBM lobbies ferociously to legitimise



  20. IRC Proceedings: Wednesday, February 12, 2020

    IRC logs for Wednesday, February 12, 2020



  21. Links 12/2/2020: KDE Neon 5.18, Tails 4.3 and WordPress 5.4 Beta

    Links for the day



  22. IRC Proceedings: Tuesday, February 11, 2020

    IRC logs for Tuesday, February 11, 2020



  23. Links 11/2/2020: New Firefox and KDE Plasma

    Links for the day



  24. Sometimes ILO-AT is Good for Nothing But Law Firms in or Around Switzerland

    ILO-AT’s latest judgements are out. But ILO — and by extension the UN — are still morally deficient and they give the impression that don’t care about people (or that ILO is in bed with the same businesses WIPO (UN) serves, i.e. no better than WB/IMF).



  25. The European Patent Office Continues to Violate the European Patent Convention (EPC) With Impunity While the European Commission Lets That Happen

    The European Commission (and Union) can be seen as increasingly complicit in the EPO's abuses; this means that the EPO has become a liability or source of accountability for the integrity of Europe as a bloc



  26. IRC Proceedings: Monday, February 10, 2020

    IRC logs for Monday, February 10, 2020



  27. EPO Staff Representatives to Challenge Ridiculous and Unnecessary Austerity Measures

    The EPO's President of Nepotism "is currently finalizing his “package” of financial measures in order to reduce an alleged coverage gap of 5.8 B€ following a heavily biased and flawed Financial Study," according to EPO staff representatives who have already demonstrated it's a fake crisis that distracts from the real crisis and profound corruption



  28. You're Almost Guaranteed to Lose the Argument When You Call People Who Plant Seeds 'Pirates'

    The EPO's patent maximalists are damaging the reputation of the institution and harm its perceived legitimacy (people are getting fed up instead of fed)



  29. Unified Patent Corruption

    The Unified Patent Court (UPC) is more dead than ever before; but UPC hopefuls — people who lied their way into this fraudulent pact (designed to enrich only themselves by violating many constitutions) — try telling us otherwise and they’re weaponising corrupt media



  30. IRC Proceedings: Sunday, February 09, 2020

    IRC logs for Sunday, February 09, 2020


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts