On 2020-07-10 11:12, Alexander A. Klimov wrote:I've installed that addon myself.
Am 10.07.20 um 16:22 schrieb Bart Van Assche:
On 2020-07-09 12:48, Alexander A. Klimov wrote:
diff --git a/drivers/infiniband/ulp/srpt/Kconfig b/drivers/infiniband/ulp/srpt/Kconfig
index 4b5d9b792cfa..f63b34d9ae32 100644
--- a/drivers/infiniband/ulp/srpt/Kconfig
+++ b/drivers/infiniband/ulp/srpt/Kconfig
@@ -10,4 +10,4 @@ config INFINIBAND_SRPT
ÂÂÂÂÂÂÂ that supports the RDMA protocol. Currently the RDMA protocol is
ÂÂÂÂÂÂÂ supported by InfiniBand and by iWarp network hardware. More
ÂÂÂÂÂÂÂ information about the SRP protocol can be found on the website
-ÂÂÂÂÂ of the INCITS T10 technical committee (http://www.t10.org/).
+ÂÂÂÂÂ of the INCITS T10 technical committee (https://www.t10.org/).
It is not clear to me how modifying an URL in a Kconfig file helps to
reduce the attack surface on kernel devs?
Not on all, just on the ones who open it.
Is changing every single HTTP URL in the kernel into a HTTPS URL the best
solution? Is this the only solution? Has it been considered to recommend
kernel developers who are concerned about MITM attacks to install a browser
extension like HTTPS Everywhere instead?
Thanks,
Bart.