OpenBSD 3.5 Reviewed 81
eeg3 writes "NewsForge has a review of OpenBSD 3.5. It encompasses a fair amount of information, more specifically it details security, cryptography, installation, and new features." While not afraid to point out OpenBSD's shortcomings as a desktop OS, it's still a good tour of possibly the most secure OS. NewsForge and Slashdot are both owned by OSDN.
Question (Score:5, Interesting)
Re:Question (Score:3, Interesting)
Re:Question (Score:1)
I was at least hoping for some intelligent flames from FreeBSD people instead.
--
Healthy Info [health-issue-books.com]
Re:Question (Score:2)
Re:Question (Score:4, Insightful)
Re:Question (Score:3, Insightful)
Well I don't know how to write this so it doesn't sound trollish. For that, I apologize in advance.
Is what you're saying that a little less security is okay if it's more usable? If so, why isn't Windows given a little more credit?
Re:Question (Score:3, Insightful)
See dh003i's post.
Re:Question (Score:5, Insightful)
"
A lot of Linux users out there are kidding themselves. Arugably, Linux is more secure than Windows. However, most of the Windows vulnerabilities we've seen lately were actually vulnerabilitys on apps running on top of Windows, i.e. I.E.. (Yes, I know it's part of the OS, but that's not to say that Mozilla or Opera couldn't have been developed to be dangerous. Hence the 'more' in my secure commment earlier.) Install and run an insecure app on Linux, then you're just about as vulnerable to outside attack. Not as vulnerable given Linux's excellent permissions system, but it's still more than enough to do damage.
My point is not to say that Windows should be held in a better light, but rather to say that more secure is not secure. You still have to install updates, you still have to watch what you run on it, and you still need to back up/protect your data. If you're already doing that, then usability is of greater interest, and for a lot of people, Linux still has catching up to do.
Ng's got a point. The security reason for people to switch to Microsoft is not the 1 vs. 10 reason it's made out to be here. (at least when talking about personal use, I wouldn't say the same if we were talking about deploying corporate workstations.)
Re:Question (Score:2, Insightful)
Re:Question (Score:2, Insightful)
However, in enterprise deployments, the "byzantine security model" blows away the Unix equivalents, in terms of pure, needed, functionality.
We're talking about a crowd that still uses NFS, which hasn't even the concept of passwords! It's like super-intelligent space aliens attempting to communicate with cavemen. No wonder they can't understand and think their "Good-um Head-Smash Bone"
Re:Question (Score:1)
Re:Question (Score:3, Informative)
I don't find the NT security model to be hard to understand; what don't you understand? It hasn't changed much since the first version.
Yes, they are called sessions. Each session has a set of symbolic links in the Object Manager [sysinternals.com] that connect devices to a session's namespace. The Object Manager is like Linux's
Re:Question (Score:1)
Re:Question (Score:5, Informative)
Hmmmm, interesting question. Let me present you problems that Ive not found Windows to handle.
1: Allowing graphical interface but NOT allowing 3D graphic card operations used (Simple with X, deny access to DRI)
2: Allowing programs from remote TRUSTED computers to have their graphical output displayed locally. (X was made for this exact purpose)
3: Making user accounts with almost no permission to the local computer (remote mounted directory trees)
4: The ability of an extremly fine grained system security model (NSA patches, now in the 2.6 kernel)
5: Being able to fix terminal (as in bad) errors within your servers woithout having to rely on external help (Domain Admin accts either locked out or scrambled in Win2k3- no known way to harvest other than full reinstall)
6: Does not need a desktop environment to run. Just instead open the Xserver and have onload the program needed for work.
7: Can be done on a Xterminal or bare-bones PC with network connection. I know of no Windows OS that this can be said for.
Im sure there's more... but Oh well
Re:Question (Score:1, Offtopic)
Re:Question (Score:2)
That allows your workers to use XWindows with 3D accelerated hardware without letting the worker have acces to it.
After all, to keep productivity good, I'd allow on Fridays (afternoon) a good lan tournament on a game.
Re:Question (Score:2)
I dont think there is a control panel to disable DX on windows, but then again, I never saw a control panel in Gnome to disable 3D operations in the X server.
I would be astonished if you could not cripple DX by changing the permissions of the DLLs and thus prevent the execution of games. For me this is the same kind of operations than disabling DRI in the X11 server.
All in all, I'm simply no convinced
Re:Question (Score:2)
My best attempt sent Windows (2000) into a repetitive blue-screen, desktop, bluescreen, desktop... Circulating error. Reboots didnt work. Changing accounts to admin didnt work either.
My early disgnosis is that removing/disabling DirectX from Windows is nigh impossible. It could be possible, but I see no real way of doing it. DX seems to be tightly interwound with the Kernel.
---All in all, I'm simply no convinced that the whole 'we can cripple the X server' is really a
Re:Question (Score:2)
If you want to control the software that your users run, Software Restriction Policies [microsoft.com] will work much better, as they are designed for that. Create a whitelist of allowed program hashes. All others will be denied.
Re:Question (Score:2)
Do they complete their tasks in good time?
Do you get acceptable results?
If your employees are driven to playing games, have you taken time to examine whether you have an engaging environment, and make your employees' input welcome?
Seems like the problem comes from higher up.
Re:Question (Score:3, Informative)
I service mainly Small Business Owners with IT advice, equipment, installation, and integration of said equipment.
When a business owner says they're having a problem with a User on a Linux desktop playing 3d games on work computers, I respond with the correct way to deal with it. I do not lecture how good/bad the owner is handling business, or other "moral" concerns.
And yes, it doesnt stop Flash games, or other nuisance games.. Just stopping 3d based hardware ac
Re:Question (Score:2)
Or, use dxdiag.exe to disable them more directly. Only local admins can change those settings.
2. Connecting to a single window remotely isn't natively supported but Citrix supports it. There is some kind of deal between MS and Citrix to prevent MS from including it standard.
Oh and what happens when the X server dies unexpectedly, takes your server (X cli
Re:Question (Score:5, Informative)
nicer for desktops."
Let me think of how to put this in a nice way...
BZZZZZZZZT! Try again. BSD usually the hardware before Linux has it, off the top of my head I can think of USB2 and FireWire.
Happy trolling!
Re:Question (Score:1)
Because of that I switched my server/MythTV box to Linux, though I was perfectly happy with FreeBSD on my server before it had to run MythTV on a PVR350.
Re: (Score:1)
Re:Question (Score:1)
It might have something to do with the fact that security isn't actually worth being secure unless you have to do it yourself, and as such, with most BSDs being rather secure out-of-the-box, doing it that way is a pussy way out. </SARCASM>
different solutions for different problems (Score:5, Insightful)
For websites that don't deal in such sensitive information, OS' that are less secure are acceptable, such as FreeBSD and various Linux' suitable for servers (Slackware, Debian, Gentoo).
For Desktop users, security isn't as paramount. However, it is still important, especially if you store any sensitive information on your computer. Some people store their private financial information on their computers. This is why Windows creates problems. Other Windows security problems are just obvious: the plethora of virus', exploits, worms, etc etc etc. These are areas where Linux is better (if not misconfigured so as to be insecure). The reason for Linux and not OpenBSD is because computer's are not an end in themselves. They exist to do certain functions; many of the daily things which people want to do on their computers just aren't possible to do on OpenBSD, or are a real pain, but are possible to do in Linux.
Stating people should use Windows, MacOS, Linux, or xBSD is over-general. Do you know precisely what every users' needs/desires are? No. Then how can you possibly say what OS they should use? The answer is you can't.
Of course, I haven't really responded to your question "if security's such a BFD, why isn't BSD more popular around here?" The answer is that security isn't considered paramount, above all else. If you wanted to be completely secure with your computer, you could unplug it from the internet and never plug it back in, and lock it up in a vault-room, with finger-print protection. People here probably consider other things important as well...
Re:different solutions for different problems (Score:1, Insightful)
Re:different solutions for different problems (Score:2, Informative)
And openbsd is more secure than another OS doing the same job, wether it be serving webpages or whatever. Apart from code audits, theres stuff like removal of most setuid root apps, priviledge seperation in everything from syslogd to tcpdump, W^X, propolice, non-executable stack and heap, malloc and mmap randomization, strict
Re:Question (Score:2)
There is one big difference, you don't get so mauch feature and application bloat with OpenBSD as you get with a typical Linux distro. True, you don't need to install it all, and FreeBSD seems to have even more......
Packaged up properly, OpenBSD could be the basis of a decent desktop OS, but Theo, who mostly runs the show, is fully occupied, and rightly so IMHO, with security issues, an
Re:Question (Score:2, Interesting)
> popular around here?
Because for many (most?) in the Linux community
it's not about correctness or quality of the OS,
it's about licensing (GPL), bringing down the evil
empire (Microsoft), and revolution (down with Cap-
italism).
Re:*BSD is dying (Score:1, Funny)
so, um, how do you like its chances?
p.s. -- nothing wrong with that parrot, it's just sleeping.
Re:Newbie trouble with OpenBSD (Score:1, Offtopic)
More info would be helpful, unless of course this is a joke I'm not getting.
Re:Newbie trouble with OpenBSD (Score:2, Funny)
Re:Most Secure OS? (Score:3, Insightful)
Re:Most Secure OS? (Score:1)
Trusted Solaris [sun.com] from Sun and SecureOS [securecomputing.com] from Secure Computing used in their Sidewinder firewall are just two off the top of my head.
It doesn't necessarily need to be commercial either since there's TrustedBSD [trustedbsd.org] for instance. I guess I shouldn't say "designed from scratch" since many of them build on original BSD or System V code as a starting point, but there are certainly MAC based systems
Re:Most Secure OS? (Score:1)
Re:Most Secure OS? (Score:1)
Even then, you need to know the name of the first user that is in wheel before you can get in and try to become root.
I am not seeing a security problem, because it is not a single point of failure as you describe.
Re:Most Secure OS? (Score:2)
Re:Most Secure OS? (Score:1)
That's one point of failure. Also of course "good" exploits on *nix tend to give the user root access, without a root to be given access to, there's not as much of a problem.
A third possible security situation with root would be if you work with the government, or for *SOME* banks that do not like the idea of a superuser.
Re:Most Secure OS? (Score:1)
Re:Most Secure OS? (Score:2)
Delegating administrative privileges can be controlled with extremely fine granularity using sudo, as this excellent series of articles [onlamp.com] point out.
Here is a relevant quote from the first article:
Once you have sudo configured correctly, you can change the root password and not give it to anyone. Nobody should need the root password if they have t
Re:Most Secure OS? (Score:2, Insightful)
How can you secure, and be sure something is secure if the system can deny you from making sure it is so? Isn't that sort of a catch 22?
Re:Most Secure OS? (Score:2)
Re:Most Secure OS? (Score:2)
What would you consider to fall into this category.
PS: Mac, and I believe Linux with the NSA patches(maybe, not?!) gets rid of the 'root' concept, and just uses sudo/su for doing former root-only tasks... Very good design, in my opinion.
Re:Most Secure OS? (Score:2)
PS: Mac, and I believe Linux with the NSA patches(maybe, not?!) gets rid of the 'root' concept, and just uses sudo/su for doing former root-only tasks... Very good design, in my opinion.
root never really goes away. su and sudo work by switching to user id 0, which is the user id of root. What you can do however, is remove root from existing as a user. The kernel/whatnot still grants specials priviledges to user id 0, but you can't actually login or use any user with that id because root doesn't exist
Re:Most Secure OS? (Score:2)
Well, my understanding is that the most common exploits are simply bugs in userland and kernel code.
Even if one of these exploits leads to a remote or local privilege escalation, arguably it is the original exploit that is the real problem, since it led to the privilege escalation in the first place.
Furthermore, there is a fair amount of work being done to place all daemons
Re:Most Secure OS? (Score:1)
From the chroot(2) man page (okay, this is on debian but the same applies to obsd):
automatic package dependencies (Score:1)
It's not true that OpenBSD does not support network installation of packages with automatic dependency handling.
Try this (assuming a Bourne-style shell):
All dependencies are discovered, downloaded, and installed as necessary. The only real downside is that you need to know the version of the package.
Check pkg_add(1) for the details.
Re:automatic package dependencies (Score:2)
Time for a well thought out sy