Bonum Certa Men Certa

Sometimes Proprietary Software is Proprietary (Secret) Simply Because It is Not Good and Obfuscation Helps Hide Just How Ugly It Is

The story of FortiClient resembles what I've often encountered over the years with other proprietary VPNs (not of my choice)

Proprietary Software. You pay to be abused.



Summary: Why nonfree (or proprietary) software generally fails to catch up with Free/libre software -- at least on technical grounds -- and then makes up for it with marketing and FUD offensives (discrediting perfectly-functioning things, based on their perceived cost)

OVER the years I've encountered and used a lot of VPNs. It's one thing I'm quite familiar with, having configured and debugged VPNs quite a lot. At work, we use Free/libre VPNs that we host and manage ourselves (typically OpenVPN and IPSec/StrongSwan). But clients' choices of VPN are another matter. Occasionally I must access a client's GNU/Linux server to carry out maintenance, patching and software upgrades. It's quite a routine thing.



"Why is it that Free software generally works a lot more consistently than proprietary counterparts and why do some people pay a lot of money for VPN tools that not only cost a lot of money but need to be 'repurchased' (re-licensed) annually or any time one 'upgrades'?"VPN software varies from client to client and some VPN tools are so awful that it's not even funny. It can be painful. At times impossible!

Why is it that Free software generally works a lot more consistently than proprietary counterparts and why do some people pay a lot of money for VPN tools that not only cost a lot of money but need to be 'repurchased' (re-licensed) annually or any time one 'upgrades'? Suffice to say, many of these proprietary things have holes in them (kept under the rug), so one might actually be paying for additional security holes rather than security. Snowden's stash of leaks revealed some evidence to that effect.

"Much time down the drain."One might say I'm opinionated, but I'm not alone. It's not only me who complains by the way; a colleague explained that "[a]t the moment the only access we have for [client] is via a horrible proprietary VPN. You are only able to get clients for Windows and Mac officially, however an Ubuntu client has been found that works too. To make things more complicated it does not appear to work at all in Windows Server, meaning we can't provide access though the Windows [shared/remote virtual] box. If you have a Windows or Mac box, you can download the client from http://forticlient.com/ and the Ubuntu one can be found here https://forticlient.com/repoinfo..."

Well, nothing that I've tried allows me to access the client's network. Much time down the drain. You can try again and again (dealing with binary blobs). The FortiClient software is defective, however, as it shows an unimpressive blank window each time it starts (I tried other, more complicated things) and there's no way to debug this.

FortiClient
So-called 'Client'; Whose exactly? Spy agencies?



If I run this from the command line it says:

"Platform detected: fedora" (which is false by the way, it's not even an RPM-based distro, so I think they need to do more work on their client-side tools if it's advertised as cross-platform)

"The bottom line is, proprietary VPN software is utterly bad, it rarely prevents security incidents, and it is more like duct tape on top of something inherently broken."Our internal wiki indicates that we cannot access this over a virtual Windows Server, either. Because that too is not supported. What other access options may there be? And why need they complicate access to the point where they shut out people who merely try to keep their machines secure and up to date? As a Techrights associate recently noted, the whole concept behind VPN is flawed. It seems to assume that operating systems in use aren't safe if connected to the Web (there are NSA back doors, for starters), so complete separation and insulation from the network is seen as desirable. Later this year our combined lifetime for Tux Machines and Techrights will be 30 years. We're a high-profile target for attacks, Techrights in particular (many DDOS attacks over the years), but we never had any security incidents and we never used VPNs. We even gave up on so-called 2FA, knowing that it sounds better in theory than (how it works) in practice.

The bottom line is, proprietary VPN software is utterly bad, it rarely prevents security incidents, and it is more like duct tape on top of something inherently broken. Moreover, the quality of proprietary VPN software is utterly appalling. The same can be said about proprietary software other than VPNs, but these companies compensate for that with heavy marketing campaigns and waves of FUD directed at Free software counterparts.

Recent Techrights' Posts

Small Codebase is Typically Safer (More Aftermarket Snakeoil Means More Holes)
Rust is just more code
Spending Christmas Pasting Microsoft's Chatbot Garbage - Anti-Linux and Anti-BSD FUD - Into LinuxSecurity.com (Under the Guise of 'Article')
In 2025 we need to tackle this problem
Microsoft Openwashing Stunts Initiative (OSI) is A Vulture in "Open" Clothing
it's quite telling that the OSI isn't protecting the Open Source Definition
Gemini Links 25/12/2024: Reality Bites and Gopher Thanks
Links for the day
 
With 5 Days Left (Sans Time Extension, Which is Expected) FSF Has Already Raised 60% of the Money It Sought
Technically 59.6485%
Links 27/12/2024: Ongoing Demise of Real Healthcare, Gemlog Cleanup, Fingers Point to Russia After Passenger Plane Crash
Links for the day
Links 27/12/2024: Perfect Desk, Banning Cellphones, Many Cables Cut Near Finland
Links for the day
Gemini Links 27/12/2024: Slop and Self-hosting
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, December 26, 2024
IRC logs for Thursday, December 26, 2024
Links 26/12/2024: Japan-China Mitigations and Mozambique Prison Escape (1,500 Prisoners)
Links for the day
2025 Will be Fought and Fraught With LLM Slop or Fake 'Articles' (Former Media/News Sites Turning to Marketing Spam)
The elephant in the room?
Links 26/12/2024: Ukraine's Energy Supplies Bombed on Christmas Day, Energy Lines Cut/Disrupted in the Baltic Sea Again
Links for the day
Gemini Links 26/12/2024: Rot Economy, Self-hosted Tinylogs
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, December 25, 2024
IRC logs for Wednesday, December 25, 2024
[Meme] Time to Also Investigate Bill Gaetz
Investigation overdue
IBM Has Almost Obliterated or Killed the Entire Fedora Community (Not IBM Staff)
Remaining Fedora insiders are well aware of this, but bringing this up (an "accusation" against IBM) might be a CoC violation
Links 25/12/2024: Fentanylware (TikTok) Scams and "Zelle Scams Lead to $870M Loss"
Links for the day
Brittany Day Can Rest and Let Microsoft/Chatbots Write Fake 'Articles' About "Linux" This Christmas
Who said people don't work on Christmas? Chatbots or plagiarism-as-a-service work 24/7, every day of the year except during Microsoft downtimes
Links 25/12/2024: Windows TCO Brought to SSH, Terence Eden 'Retires'
Links for the day
Links 25/12/2024: Latest Report Front Microsoft Splinter Group, War Updates
Links for the day
Links 25/12/2024: Hong Kong Attacks Activists During Holidays, Xerox to Buy Lexmark
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, December 24, 2024
IRC logs for Tuesday, December 24, 2024
Gemini Links 25/12/2024: Open Source Social and No Search
Links for the day