Feeds

No GPL 3.0 for Linux - Torvalds

Back to the source

Mobile application security vulnerability report

The Linux kernel is not moving to the next version of General Public License (GPL), following objections from Linus Torvalds to the license's stance on digital rights management (DRM).

Torvalds told a mailing list on Wednesday the Linux kernel would remain under GPL 2.0, despite work underway at the Free Software Foundation for GPL 3.0. The sticking point is DRM.

According to the first draft of GPL 3.0, published last week, the software it covers will "neither be subject to, nor subject other works to, digital restrictions from which escape is forbidden".

The license adds: "DRM is fundamentally incompatible with the purpose of the GPL, which is to protect users' freedom."

But Torvalds says it is "insane" to require people to make their private signing keys available. Such keys are typically used by individuals to generate a digital signature, or to decrypt messages and files. The creator of Linux won't make his own keys available.

"I don't think the GPL v3 conversation is going to happen for the kernel, since I personally don't want to convert any of my code," he says.

While some Linux kernel files can be licensed under GPL 3.0, Torvalds notes, the kernel in general is - and will - remain under GPL 2.0.

Joining a debate on the mailing list about the feasibility of conversion from GPL 2.0 to GPL 3.0, he says: "The default is to not allow conversion. Conversion isn't going to happen."

Torvald's stance will further dismay Linux diehards who are convinced the only good source is open source, and follows the controversy that followed last year’s revelation that Torvalds used the proprietary, closed-source Bitkeeper for Linux kernel development. ®

The Essential Guide to IT Transformation

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.