decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books
Your contributions keep Groklaw going.
To donate to Groklaw 2.0:

Groklaw Gear

Click here to send an email to the editor of this weblog.


To read comments to this article, go here
Tridge Speaks
Thursday, April 21 2005 @ 02:38 AM EDT

Groklaw's stevem heard Tridge's speech today at the LCA 2005 conference, Australia's national Linux conference, and he has a report for us:

This was taken from my memory of Dr. Andrew Tridgell's keynote at this years LCA2005 Conference.

Essentially Tridge did *NOT* do anything that anyone could ever possibly ever take as breaking a BitKeeper licence, as far as I can see. How was it done? He, like any good sysadmin would, first off telnetted to the BitKeeper port on a BitKeeper server.

$ telnet thunk.org 5000

WhooHoo! Connection! So, next obvious step that we *all* do is type in the obvious:

help

Back came a list of commands to manipulate the BitKeeper server and ask things of it. Well, according to Tridge, a bit of reading of the LKML (Linux Kernel Email List) shows that the "clone" command is the way to checkout someones source code repository.

So Tridge's massive "reverse engineering" project came down to a single line of shell script:

$ echo clone | nc thunk.org 5000 > e2fsprogs.dat

Hey presto, Tridge has just checked out from a BitKeeper repository into the file e2fsprogs.dat.

The audience was laughing and cheering Tridge on as he explained just what a Mountain had been made of this Molehill. And I mean made by both sides of the issue -- those who he said he was some Uber Reverse Engineering Wizard and those who claimed that he MUST have used a BK client.

Funny report, isn't it? Anyway, now you know Tridge's side of the story.


  View Printable Version


Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )