OpenBSD 3.4 Released 275
tedu writes "We just couldn't wait another 2 days, so now you can enjoy OpenBSD 3.4 a little early and protect yourself from ghosts and goblins. More details at the OpenBSD website and official announcement. Remember to please use a mirror."
What he/she really meant is... (Score:5, Informative)
"Remember to please use a mirror [openbsd.org]."
Re:What he/she really meant is... (Score:2)
That list doesn't list the mirrors of the ISO image, since OpenBSD only sells CDs, and does not provide an ISO.
I found a home grown one using Google:
http://news.jump.net.uk/openbsd-i386-3.4.iso
Re:What he/she really meant is... (Score:5, Insightful)
If you want the CDs so bad, buy them. They're only $40.
Re:What he/she really meant is... (Score:3, Informative)
Re:What he/she really meant is... (Score:2)
They are $40, while I spend my time to get apps tow work with OpenBSD. And tomorrow every other open source team starts to do the same trick. I think _not_.
Exit OpenBSD
The trojan problem can be solved very easily. Let OpenBSD provide ISO's and md5sum them.
Re:What he/she really meant is... (Score:2, Funny)
Re:What he/she really meant is... (Score:2)
The same is true for XP. If you don't feel like plunking down the $150 for a proper copy of XP then dont run it, or at least don't bitch when you get trojaned.
Re:What he/she really meant is... (Score:2)
* their website does not support SSL (https)
* their FTP servers, where you can get the
CTM base {,split} files and deltas, does not
support SSL (sftp)
* their SSH servers' fingerprints aren't published,
or even (better) a skeleton known_hosts file
included on the CD
* they don't provide signed RMD160 sums of the
files on the CD (signed with pgp 2.6.3i{a,n},
so even people like me that don't trust newer
pgp/gpg versions can verify these)
The MirOS project does most of these. Plu
Re:What he/she really meant is... (Score:2)
happens to be truth that MirOS cannot die:
MirOS BSD and MirPorts is nothing else than MirBSD,
which is defined as ``the contents of _my_
and
MirOS Linux isn't even a pure BSD, so it's not
dead either.
Actually I think I proved you wrong. Jane.
Re:What he/she really meant is... (Score:1)
Re:What he/she really meant is... (Score:1, Informative)
OpenBSD is selling a product, it's that simple, and it's acceptable for them to do so. However, the way that they do so detracts and even diminishes the security a little (widely distributing a way to 'validate' a downloaded version would enhance security)
Re:What he/she really meant is... (Score:2)
Re:What he/she really meant is... (Score:2)
Information wants to be $40.
shocking concern (Score:5, Funny)
Since when does Slashdot care about overloading webservers?
Re:shocking concern (Score:4, Funny)
Re:shocking concern (Score:3, Funny)
That said, I thought freebsd was dying
Re:shocking concern (Score:1, Insightful)
It's not funny when it's done right. It's extremely not funny when you do it wrong.
Re:OpenBSD performance facts (Score:1)
Re:OpenBSD performance facts (Score:5, Funny)
"Because as Lars pointed out before, benchmarks are seldom little more than a great way to use numbers to prove your point. Especially coming from this overtly pro-linux, anti-openbsd in the flesh little devil Felix. The benchmarks he provides serve little more than to feed his
pro-linux ego and no real interest in improving OpenBSD, and neither do your (collectively) rantings as to this being proof that OpenBSD is broken. [...] The intuitive way to meet this attitude is to benchmark now the security advantages of OpenBSD where it outperforms Linux."
"Leitner is a linux bigot, he's very anti-openbsd (obvious to anyone who's ever read his rantings), the tests shows OpenBSD in a bad light, draw your own conclusions."
"I have better things to do than testing networking performance of operating systems. I'm very busy already. I've chosen OpenBSD as my server OS, because security is my main concern. I like it a lot. So far, nothing I've read has convinced me to install something else. I took time however to discredit (rightfully I think) this guy's test, because it struck me as being very unjust."
"Theo could easily rewrite OpenBSD to thrash these other OSes, real things like multiprocessor support are a real drag for them, so OpenBSD could be heaps faster. But who cares how many binds/second can be done, this isn't real "work", so what does it prove?"
I especially like the last one.
Re:OpenBSD performance facts (Score:1, Insightful)
Re:OpenBSD performance facts (Score:1)
I don't
Re:OpenBSD performance facts (Score:1)
You can use pf with FreeBSD pf_freebsd-1.0_7 [freebsd.org] as well as ipf and ipfw. For me the reason for using OpenBSD for firewalls in the past was that it had altq [sony.co.jp] integrated in kernel and that time if you wanted to use altq with FreeBSD you had to apply patches for "release" kernel version. Now altq is in FreeBSD kernel too.
Re:OpenBSD performance facts (Score:5, Informative)
If you did, you would how the ACTUAL OpenBSD developers responded to fefe's benchmarks.
For example, here is what Ted Unangst (a very major committer to OpenBSD) replied to requests for help improving performance:
"apply the patch below to your mmap benchmark. a real application is unlikely to use pread and mmap. openbsd uses a separate cache for read and mmap calls. while it seems you are attempting to time only a page fault with cached data, that is not happening on openbsd.
the results for all other OS should remain the same, but OpenBSD improves dramatically. the adjusted benchmark is a much closer match to application behavior in reality."
Which was followed by above-mentioned patch.
I don't think it's fair for you to judge an entire operating system community based on the contents of a few selected emails. By doing so, you are being just as biased as you say the others are.
Re:OpenBSD performance facts (Score:1)
You're actually reading comments on
You must be bored then
Re:OpenBSD performance facts (Score:2, Insightful)
Most of the comments about Felix being an idiot have good reason for doing so. He went out of his way to trash talk OpenBSD, and most of the problems he encountered were as a direct result of his inability to RTFM. Why should the OpenBSD community have any patience for someone who bechmarks first and ask's questions later ?
no, no, you don't understand... (Score:5, Funny)
-Bill
Re:no, no, you don't understand... (Score:1, Interesting)
I've been working with IT-security for 6 years, and the thing is, it doesn't matter how good of a programmer you are, eventually, you will fuck up; that's why security should be in the design, not the code, mostly in the design of the OS.
VMS is a good example of this, there where a lot of shoddy code in VMS, but it's really secure -- by design!
First design, then langue, least important is, or if done properly at least, the code itself.
Re:no, no, you don't understand... (Score:2)
Man oh man would I hate to have you in my shop. Hopefully you have no intentions of pursuing your CISSP or something similar. Code should be the upmost since it is the foundation. Let's go into a different subject for analogy shall we... You build a 4 story house made of the toughest concrete money can buy. You use the strongest nails, wood through the walls, and to bind it all together. Foundation oh no don't worry let's use rubber bands, hell all that 'security' we used on the walls and ultra 31337 concre
Re:no, no, you don't understand... (Score:1)
design of project : design of house
programming language : materials of house
coding : putting together the house
the coding wouldn't be the foundation, it would be the putting together of the materials of the entire house. If you have a good design and materials, a slight mistake somewhere shouldn't bring down the whole house.
Re:no, no, you don't understand... (Score:1)
Re:no, no, you don't understand... (Score:2)
Ordinarily I would just let this go. But this guy is such a total cocksucker, I think I'll feel just a bit less disgusted if I dismantle his post.
"They don't have the same brain power that you or I have."
--Right. Like the brain power to detect dripping sarcasm in the parent post, as neither of you did? Or to notice its obvious relation to the story 4 down from this one? Or like the brain power required to see the fact that Blacks/Whites/Asians/etc. are actually *different species*? Man, that one even has
Re:no, no, you don't understand... (Score:2)
Code is the implementation of design, fucktard. No matter what your UML diagram says, one or more bugs in critical parts of a design can lead to a security breach...
Re:no, no, you don't understand... (Score:1)
In fact, it's more free than GPL software....the GPL places lots of restrictions on distribution, impairing th
Yes, (Score:1, Funny)
OpenBSD is INSECURE, try Cryptech RAP BSD (Score:3, Funny)
OpenBSD song (Score:5, Informative)
Thoughts on security (Score:5, Interesting)
Note: this is purely an academic question, it is not my intention to critisize anyone, but just to learn why these things happen, not being a very experienced programmer myself.
Re:Thoughts on security (Score:5, Insightful)
I think his question (Score:2, Insightful)
"Given the ferocity with which the OpenBSD nazis fix things like this in their code wouldn't this sort of thing, in the kernel, be one of the first things they did?"
Indeed, I thought this was done quite a while ago...
Re:I think his question (Score:3, Funny)
Ports, Not Kernel (Score:2)
Re:Thoughts on security (Score:1)
Considering that Todd Miller and Theo de Raadt implemented strl* in 1996 ( http://www.courtesan.com/todd/papers/strlcpy.html ) and OpenBSD was forked from NetBSD in '95 (which is quite old itself ( http://netbsd.org/Misc/history.html )) I'd say that that's an understatement...
Re:Thoughts on security (Score:2, Informative)
Re:Thoughts on security (Score:5, Informative)
Note thst strcpy() and friends _can_ be used safely, and the usage of the ones in the tree before the removal had been audited at least once. For example, the following construct is safe (assuming you check the malloc return):
len = strlen(foo) + 1;bar = malloc(len);
strcpy(bar, foo);
But is was easier to just banish them from the tree entirely, so that it is easier to grep for potentially unsafe ones when new code is imported.
Re:Thoughts on security (Score:3, Informative)
s = malloc(INFINITY);
gets(s);
Re:Thoughts on security (Score:1)
You just have to ensure externally that stdin fulfils specific constraints (EOF or '\0' among the next N characters, for some known N). This may well be possible, for example if you've redirected stdin to a trusted file with known contents, or your program is at the receiving end of an internal pipe in a larger system of trusted interoperating programs you've all written yourself, so you know exactly how stdin looks.
Re:Thoughts on security (Score:2)
Re:Thoughts on security (Score:3, Funny)
Re:Thoughts on security (Score:2)
Two factors. First, there is a difference between "dangerous" and "unsafe". Explosives are dangerous but they are used safely on construction sites every day.
Second, there is also danger in changing code that is known to work. I read a quote once from the IBM guy responsible for the core of IBM's MVS mainframe
Re:Thoughts on security (Score:2)
At least until they make hacking punishable by instant death.
Re:Thoughts on security (Score:1)
Re:Thoughts on security (Score:1, Flamebait)
Too lazy (or too dumb) to use grep(1)?
Yes there are (a lot of them). It does not means that there are security holes because of it it's just that's it's way easier to make a safety error using strcpy() than using strlcpy(). And in fact a systematic effort to eliminate those is the occasion to revisit some code long forgotten and to fix other things on the way...
% grep -r -l strcpy linux-2.6.0-test9
linux-2.6.0-test9/drivers/i2c/busses/i2c-ibm_iic. c
linux-2.6.0-test9/drivers/net/8139too.c
linux-2.6
Re:Thoughts on security (Score:2, Insightful)
Figures that someone would be an asshole about this. Perhaps the guy doesn't use Linux and it's a pain in the ass to go download all the source, uncompress it, and then grep it out when there's someone that already knows the answer to this simple question?
Sheesh, grow up.
Guess what... (Score:1, Flamebait)
I don't use Linux, I use OpenBSD. And I took the pain of downloading the Linux kernel just to give an accurate answer to this guy...
Like he could have done, unless he doesn't have broadband...
Re:Guess what... (Score:2)
Re:Thoughts on security (Score:5, Informative)
Why the delay? (Score:2)
Looks like the announcement has been delayed a little as I've had the OpenBSD3.4 CDs for over a week now, ordered from the OpenBSD online store!
Re:Why the delay? (Score:2, Informative)
Re:Why the delay? (Score:3)
Buy the CDs people, and support the project. Plus, you get the OpenBSD songs in full Redbook glory, and stickers!
Re:Why the delay? (Score:1, Informative)
Sadly, my OBSD3.4 CD set included no stickers. Did anyone else get deprived of their stickers?
From the changelog (Score:5, Funny)
Gotta love that.
Re:From the changelog (Score:1, Informative)
It is 100% incompatible with the GPL.
Code can not be released under both.
It doesn't matter how good or bad the Torald's code is. That has nothing to do with it.
Shortcut description: bsd code is truly free as in free-for-any-use-just-put-our-notice-on-it but gpl code is only free as in free-but-only-if-you-give-us-any-changes-and-any-
WRONG (Score:2, Informative)
Re:WRONG (Score:1, Insightful)
Re:WRONG (Score:1, Informative)
Unfortunately (Score:5, Informative)
That said, it's such a huge release in terms of changes made (x86 Write or eXecute memory pages, for one) that it's more than worth the upgrade.
As with most such fundamental updates to OBSD, though, I expect this release to be significantly patchier than the last couple.
--Ryv
Re:Unfortunately (Score:2, Informative)
Re:Unfortunately (Score:2)
Binary format changed to ELF (Score:5, Insightful)
As I was lucky enough to run into this on a relatively new install I could just do a complete reinstall, but not reading the upgrade instructions can get you in a lot of trouble this time... :)
Re:Binary format changed to ELF (Score:2)
Re:Binary format changed to ELF (Score:1)
Mirror Operators, Report! (Score:2, Interesting)
While I order CDs to support the project, I run snapshots for many things, and being close to a mirror (OC-3 linking our sites), it takes minutes to install via ftp.
Re:Mirror Operators, Report! (Score:2)
There is no spike. OpenBSD as only OSS OS doesn't provide ISO's, you need to do your own final release building step, this to keep CD sales up
Everybody downloads it homegrown ISO's from non official mirrors.
Re:Mirror Operators, Report! (Score:1)
SuSE does the same, actually.
Re:Mirror Operators, Report! (Score:2)
Which is why I don't use SUSE either.
Don't worry about the ghosts and goblins... (Score:4, Funny)
Just a thought ... (Score:1)
Re:Just a thought ... Go buy the official CD's (Score:4, Insightful)
Via C3 support (Score:4, Interesting)
Re:Via C3 support (Score:5, Informative)
1.6 Gbit/sec of AES-128? Damn, I gotta get me one of these!
This is before optimization is done, and according to Theo, this is what they are doing right now. The chip is capable of 12.5 Gbit.
C'mon OBSD!! (Score:4, Interesting)
Freebsd released 4.9 before your 3.4!!!
(j/k)
On a side note, reading the 2nd or 3rd post about trojaned obsd ISOs floating around the web is really sad and upsetting. I love the open sharing of software and source code around the internet, but i always fear that someday it will be to a point that *everything* has been tampered with, essentially creating a need to look through more source code than anyone has time for. Sure we can solve this with technology (such as with MD5 Checksums) but as we create smarter verification, the internet will create smarter shitheads. I'd hate to think that it will eventually degrade into a win-some/lose-some cat-and-mouse game.
I actually lost some sleep few months back when the GNU folks announced that their main ftp site got compromised. I realise that servers get cracked every day, but when it's gnu/linux/bsd/oss folks it feels personal.
I'm not well acquainted with any $krYp+ KyddI3z, cr4x0rz or know what they use, but i'll be willing to bet that their OS and many of their tools are based on software from those they are attacking.
Assholes.
Rubbish (Score:1)
Re:Uhoh (Score:1)
OS: Solaris Server: Apache/1.3.27 (Unix) PHP/4.3.1 mod_perl/1.27
Re:Uhoh (Score:1)
http://www.openbsd.org/faq/faq8.html#wwwsolaris
Re:A message from Theo (Score:2, Interesting)
Re:A message from Theo (Score:2)
Re:A message from Theo (Score:5, Informative)
in OpenBSD.
* one was a bug in PAM and most GNU vendors
* one is a bug, but can't be exploited due to
W^X, propolice, NXSTACK, NXHEAP and friends.
Heck, I've tried the gobbles exploit again
against OpenBSD-2.9-OpenSSH where it worked
back then. It failed to run due to these four.
Re:How RedHat's Linux Can Defeat Micr$oft's Windoz (Score:2)
TCP/IP was developped for 4.3 BSD NET/2 release funded by a governmental DARPA grant.
All other OSes borrowed from it, and Microsoft didn't steal it, since Microsoft pays taxes too.
TCP/IP (Score:4, Interesting)
From a University of Texas CS instructor's web site:
The Transmission Control Protocol was first formally specified in December of 1974 by Vint Cerf, Yogen Dalal and Carl Sunshine.
The link can be found here:
http://www.cs.utexas.edu/users/chris/think/Early_D ays_Of_TCP/index.shtml [utexas.edu]
And supporting documentation will be found here:
http://www.cs.utexas.edu/users/chris/think/Early_D ays_Of_TCP/Annotated_Bibliography/index.shtml [utexas.edu]
Re:TCP/IP (Score:1)
Re:TCP/IP (Score:1)
It's nice to have an unbiased opinion agree.
Re:How RedHat's Linux Can Defeat Micr$oft's Windoz (Score:1, Informative)
Re:Europe is living through fascism it now (Score:2)
Because in English abstract nouns usually do not receive the definite article [see Mosse -- accent aigu on the "e" but I'm too lazy to look up the escape code -- for a good history of that]. Hence "Man" referring to humanity in general (compare "l'homme" or "ho anthropos"), or in this case "World Peace" referring to the idea of peace in the world.
Re:To: OpenBSD team From: Security Exploits (Score:2)
1 point for sarcasm, -2 points for not knowing that the p designation refers to the portable version of OpenSSH, not patch release.
Re:To: OpenBSD team From: Security Exploits (Score:1)
Zero points for not being able to pull your head out of your ass and laugh, and for chrissakes, it was NOT a troll, it was a JOKE. Jesus you OpenBSD people are touchy.
Re:To: OpenBSD team From: Security Exploits (Score:2)