Emulation (Games)

CrossOver Games for FreeBSD 35

An anonymous reader writes "Jeremy White from CodeWeavers has made the announcement that an experimental build of CrossOver Games is now available for PC-BSD users. However, this unsupported edition should also work on FreeBSD or DesktopBSD, allowing users to play Windows games on their desktop. The FreeBSD version of CrossOver Games can be downloaded here (registration required)." From the attached notes: "Remember this is an experimental build! If you are on FreeBSD 6.x, you will need to apply a system patch from http://wiki.freebsd.org/Wine to enable wine to function properly. Users of FreeBSD 7.0 and higher do not need this patch."
Sun Microsystems

OpenSolaris Boot Support For ZFS Root FS on x86 and SPARC 50

Derkjan de Haan writes "I am glad to see progress is being made on the the ability of OpenSolaris to boot from a ZFS filesystem: 'This putback provides the ability to boot the Solaris Operating System from a ZFS root file system on both x86 and SPARC platforms. Full ZFS boot and install support will be available in a subsequent build. Because of the phased putback, we recommend waiting for the full boot and install support rather than attempting to use the ZFS boot features separately.'"
Sun Microsystems

Submission + - boot support from ZFS root fs on x86 and SPARC (opensolaris.org)

Derkjan de Haan writes: "I am glad to see progress is being made on the the ability to boot from a ZFS filesystem:
This putback provides the ability to boot the Solaris Operating System from a ZFS root file system on both x86 and SPARC platforms. Full ZFS boot and install support will be available in a subsequent build. Because of the phased putback, we recommend waiting for the full boot and install support rather than attempting to use the ZFS boot features separately."

Operating Systems

FreeBSD 7.0 Bests Linux In SMP Performance 288

cecom writes "After major improvements in SMP support in FreeBSD 7.0, benchmarks show it performing 15% better than the latest Linux kernels (PDF, see slides 17 to 19) on 8 CPUs under PostgreSQL and MySQL. While a couple of benchmarks are not conclusive evidence, it can be assumed that FreeBSD will once again be a serious performance contender. Some posters on LWN have noted that the level of Linux performance could be related to the Completely Fair Scheduler, which was merged into the 2.6.23 Linux kernel." Update: 03/06 21:32 GMT by KD : An anonymous reader sent in word that Linux kernel developer Nick Piggin reran the benchmark today and came to a different conclusion: In his benchmark Linux was faster than FreeBSD.
Software

FreeBSD 7.0 Release Now Available 229

cperciva writes "The first release from the new 7-STABLE branch of FreeBSD development, has been released. FreeBSD 7.0 brings with it many new features including support for ZFS, journaled filesystems, and SCTP, as well as dramatic improvements in performance and SMP scalability. In addition to being available from many FTP sites, ISO images can be downloaded via the BitTorrent tracker, or for users of earlier FreeBSD releases, FreeBSD Update can be used to perform a binary upgrade."
Software

What's New In FreeBSD 7.0 103

blackbearnh writes "FreeBSD is about to release the much-anticipated version 7, and as usual there's a comprehensive interview with over two dozen of the major contributors over at O'Reilly's ONLamp site. Federico Biancuzzi interviewed the developers to discuss all the details of FreeBSD 7.0: networking and SMP performance, SCTP support, the new IPSEC stack, virtualization, monitoring frameworks, ports, storage limits and a new journaling facility, what changed in the accounting file format, jemalloc(), ULE, and more."
Security

OpenBSD Will Not Fix PRNG Weakness 196

snake-oil-security writes "Last fall Amit Klein found a serious weakness in the OpenBSD PRNG (pseudo-random number generator), which allows an attacker to predict the next DNS transaction ID. The same flavor of this PRNG is used in other places like the OpenBSD kernel network stack. Several other BSD operating systems copied the OpenBSD code for their own PRNG, so they're vulnerable too; Apple's Darwin-based Mac OS X and Mac OS X Server, and also NetBSD, FreeBSD, and DragonFlyBSD. All the above-mentioned vendors were contacted in November 2007. FreeBSD, NetBSD, and DragonFlyBSD committed a fix to their respective source code trees, Apple refused to provide any schedule for a fix, but OpenBSD decided not to fix it. OpenBSD's coordinator stated, in an email, that OpenBSD is completely uninterested in the problem and that the problem is completely irrelevant in the real world. This was highlighted recently when Amit Klein posted to the BugTraq list."
Security

Submission + - serious weakness in OpenBSD PRNG will not be fixed 1

snake-oil-security writes: Amit Klein from Trusteer has found serious weakness in OpenBSD PRNG (pseudorandom number generator), which allows an attacker to predict the next DNS transaction ID. The same flavor of this PRNG is used in other places like OpenBSD kernel network stack. Interestingly enough several other BSD operating systems copied the OpenBSD code for their own PRNG, so they're vulnerable too. This is particularly so with Apple's Mac OS X, Mac OS X Server and Darwin, but also with NetBSD, FreeBSD and DragonFlyBSD. The interesting part here is that all the above mentioned vendors were contacted November 2007. FreeBSD, NetBSD and DragonFlyBSD committed a fix to their respective source code trees, Apple refused to provide any schedule for such fix, but OpenBSD decided not to fix it. OpenBSDs coordinator stated, in an email, that OpenBSD is completely uninterested in the problem and that the problem is completely irrelevant in the real world. This is in direct contrast to statements and opinions made by the OpenBSD team recently.
Operating Systems

FreeBSD 6.3-RELEASE Now Available 100

cperciva writes "FreeBSD 6.3-RELEASE, the fourth release from the highly successful 6-STABLE branch of FreeBSD development, has been released. In addition to being available from many FTP sites, ISO images can be downloaded via the BitTorrent tracker, or for users of earlier FreeBSD releases, FreeBSD Update can be used to perform a binary upgrade."
Operating Systems

NetBSD 4.0 Has Been Released 121

ci4 writes to tell us that NetBSD 4.0 has been released and has been dedicated to the memory of Jun-Ichiro "itojun" Hagino. "Itojun was a member of the KAME project, which provided IPv6 and IPsec support; he was also a member of the NetBSD core team (the technical management for the project), and one of the Security Officers. Due to Itojun's efforts, NetBSD was the first open source operating system with a production ready IPv6 networking stack, which was included in the base system before many people knew what IPv6 was. We are grateful to have known and worked with Itojun, and we know that he will be missed. This release is therefore dedicated, with thanks, to his memory."
Unix

What's New in OpenBSD 4.2? 203

blackbearnh writes "OpenBSD 4.2 was released today, and has a host of new features. O'Reilly's ONLamp site has a pretty thorough overview of the release. 'Even though security is still there, this release comes with some amazing performance improvements: basic benchmarks showed PF being twice as fast, a rewrite of the TLB shootdown code for i386 and amd64 cut the time to do a full package build by 20 percent (mostly because all the forks in configure scripts have become much cheaper), and the improved frequency scaling on MP systems can help save nearly 20 percent of battery power. And then the new features: FFS2, support for the Advanced Host Controller Interface, IP balancing in CARP, layer 7 manipulation with hoststated, Xenocara, and more!'"
Security

Virtualization Decreases Security 340

ParaFan writes "In a fascinating story on KernelTrap, Theo de Raadt asserts that while virtualization can increase hardware utilization, it does not in any way improve security. In fact, he contends the exact opposite is true: 'You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can't write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes.' de Raadt argues that the lack of support for process isolation on x86 hardware combined with numerous bugs in the architecture are a formula for virtualization decreasing overall security, not increasing it."
Security

Submission + - Virtualization Decreases Security (kerneltrap.org)

ParaFan writes: In a fascinating story on KernelTrap, Theo de Raadt asserts that while virtualization can increase hardware utilization, it does not in any way improve security. In fact, he strongly suggests the exact opposite, 'you are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can't write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes.' The article argues that the lack of support for process isolation on x86 hardware combined with numerous bugs in the architecture are a formula for virtualization decreasing overall security, not increasing it.

Slashdot Top Deals