OpenBSD 3.6 Live 86
An anonymous reader writes "There is a mounting excitement for the upcoming OpenBSD 3.6 release, as it is the first release that supports multiprocessor systems. To celebrate the event, ONLamp.com published an interview with several developers to discuss new features, tools, and future plans."
Re:Fact: *BSDs are growing. :-) (Score:1, Funny)
Holy crap, wow, just amazing! Man, wow!
Lets see, that's an amazing 6.7% of the web sites out there. Oh... hmmmm, OK.
Meh.
Re:tsarkon reports America! Fuck Yeah! (Score:1)
*BSD obviously not dead. (Score:4, Insightful)
Re:*BSD obviously not dead. (Score:1)
If a "dead" community can convince hardware vendors to [release firmware for various hardware in a more open source way], then why isn't the Linux community doing more to make vendors release more firmware/docs in an open way.
You're assuming vendors are releasing firmware because they care about the *BSD community, but most BSDs were stable (and by far more complete) systems back when Linus was asking for help in the mailing lists, yet in all these years most vendors couldn't cared less about them. Only
Damn (Score:2, Insightful)
Damn
Re:Damn (Score:5, Informative)
Re:Damn (Score:1)
Any BSD (include Gentoo): Source-based package management, with binary packages on the BSDs (no central packages in Gentoo though). Updating and rebuilding is always a one-line command. Entire operating system c
Re:Damn (Score:1)
errr, and where/how is that association being made??
Apache on OpenBSD (Score:5, Informative)
Apache on OpenBSD always had a lot of security-related patches compared to the regular Apache (chroot for example), but it seems that Apache on OpenBSD can now be considered a real fork:
JP
Re:Apache on OpenBSD (Score:3, Informative)
At least he's honest (Score:2, Interesting)
Well at least he's being honest, unlike *coug
What an Interview! Wireless firmware storm brewin (Score:4, Interesting)
There is a storm brewing over at the OpenBSD Journal web site at http://undeadly.org over including binary blob files in the kernel for the fariuos wireless cards. I have to agree with the premise: You vendors put your binary firmware files on all the CDs you sell with your wireless cardss, so if anyone wanted to reverse engineer yoru stuff, they just have to buy the card and they get the binary file. OpenBSD just wants to put same file in their distribution so if you plug your wireless card into an OpenBSD system it will get recognized and used. Sounds simple enough to me. The other approach is to somehow download the file (freely available on sourceforge or from the vendor, or the CD that came with your little card..) That makes it so much more involved for installing.
The short version: Some companies see the light and are cooperating, others, notably Texas Instruments http://www.ti.com have been strangely silent. Fasten your seat belts, fellow puffys.
Re:What an Interview! Wireless firmware storm brew (Score:1)
On this note (Score:3, Insightful)
An example would be Oracle. I was comparing Linux to OpenBSD and I can't really figure out why so many people choose Linux over OpenBSD. Both have package management, good software support, and standard *nix features. OpenBSD on the other hand has features no other unix has such as secure levels and it is secure out of the box.
Why would anyone select an OS (expecially for network infrastructure) that is not secure by default?
Re:On this note (Score:1)
Re:On this note (Score:4, Informative)
In practice, FreeBSD and NetBSD are about as hard to exploit remotely, but they don't take care of every possible exploit, so in theory there are still some holes. NetBSD is still a lot faster than OpenBSD (unless some miracle happened and I missed it) so a 'real world' server might benefit more, but for a stronghold of impenetrable security that doesn't need every last drop of performance, OpenBSD is the choice.
Linux is nowhere near any of this. The code is sloppy and dirty (no, nobody can argue this, don't even try, just go read some yourself) and few distributions actually take security seriously. It does happen to perform better in many synthetic tests, and definitely on SMP, but the difference for most cases is so minimal that it's hard to understand why anyone would run Linux on a server and not a BSD.
I put it down to hype. Business love to advertise their adoption of Linux and their entrance into open-source, because that's what customers want to hear, especially Linux zealots. The businesses (hell, even governments now) certainly aren't scientific about it, using an "operating system" (I still call Linux a kernel, up to you) mashed together from seemingly infinite and inconsistent projects and parents'-basement-developed hacks. The source shows this, hell even configuration shows this, but they seem to be okay with this so long as it sounds good. Or, and I wouldn't be surprised, they've never heard of BSD.
Re:On this note (Score:2, Funny)
Why are so many commercial vendors developing software for Windows and not RSX-11???!?!???!?!??!!!?!? Someone answer meeeeeee!
Re:"Linux" IS secure by default (Score:3, Informative)
that statement demonstrates a complete lack of understanding about how openbsd, or any bsd, are developed, or even who is developing them.
Re:"Linux" IS secure by default (Score:4, Informative)
Are you serious? Here's a hint
Re:"Linux" IS secure by default (Score:4, Funny)
I'm going to be brutally honest with you, and I hope that this advice helps you in the future: people who have sex with animals shouldn't point out other's foibles. That's not to say that you put peanutbutter on your dick and have the dog lick it off; it's just something that I think you should consider before posting. Because while people who have sex with animals (and I'm not saying that you do) aren't necessarily "bad" people, they tend to have warped perceptions, perhaps without even being aware of it. So, while I'm not saying that you like taking it up the ass from your cockerspaniel "Checkers," while jerking your meat to "she-male" anthropomorphic penguin pictures, I AM saying that you should consider these things, and your current state of affairs before posting, as you may (or may not) be unaware of your warped views.
In closing, I know that this may seem harsh, or rude, or even arousing to you right now, but I'm just trying to illustrate my point.
Re:"Linux" IS secure by default (Score:1)
OpenBSD 3.6 released (Score:5, Informative)
Re:OpenBSD 3.6 released (Score:2)
Thanks to you and the rest of the crew for making sure I have something geekish to do this weekend.
Re:OpenBSD 3.6 released (Score:2)
Re:OpenBSD 3.6 released (Score:2)
Is there some auto-ignore bit set on this section or something?
Re:OpenBSD 3.6 released (Score:2)
Thanks Daniel.
Just wondering, is it still safe to trust MD5? It is not now easier to create a bogus file with the same hash? I thought SHA1 would now be in use for this.
Thank you very much for pf and all your OpenBSD work btw! I've been using since 2.5 and pf is probably the most impressive part of OpenBSD as it currently stands (for me).
Re:OpenBSD 3.6 released (Score:3, Informative)
anyway, where are you getting the md5 from? the same ftp server where you're getting the release?
Re:OpenBSD 3.6 released (Score:2)
Good point. Funnily enough, I've brought that up a few times myself in the past. ; )
Re:OpenBSD 3.6 released (Score:3, Interesting)
Well, an MD5 is very small, and could easily be checked. If I was running the OpenBSD project, I'd have a machine with all the correct hashes, downloading the hash files from each server ever hour, and rasing hell if they're different. That would take care of the problem, if only the people running the project even cared.
Re:OpenBSD 3.6 released (Score:4, Informative)
Re:OpenBSD 3.6 released (Score:1)
Upgrade Pain (Score:2, Insightful)
I have a fairly amount of packages, but I would also want minimum downtime for the upgrade. Maybe a make world make install mergemaster (reboot) would work better. Any ideas?
How stable is the SMP stuff?
Re:Upgrade Pain (Score:2)
Quite a generic question, so let's that split up:
Re:They have just got multiprocessor support??!!! (Score:2)
They had specifically avoided SMP for many security related reasons.
Maybe with HT and multicore CPU's on the horizon, SMP suddenly has become a lot more important?
Props (Score:5, Insightful)
Re:Props (Score:3, Interesting)
In fact I think iptables was somewhat modeled after ipflter. There has been an ipfilter port for RedHat around RH5 IIRC but it got abandoned.
Re:Props (Score:5, Insightful)
No user->kernel facility interface should ever be that dirty, much less a packet filter. Sure, the way it handles NAT and everything in one relatively uniform way is kinda handy, but the syntax and rigidness is disgusting. You can have a range of ports, or a list of ports, but not a list of ranges of ports. Don't even think about logging and acting on a packet in the same rule. Just pathetic.
ipfw, pf, ipfilter, they're all so much cleaner and so much more useful. With OpenBSD's new rule optimizer this is even more awesome. I still think natd/ipnat/ would be better off merging their functionality into the filter itself, even if only to make dynamic NAT rules by shell script easier.
Re:openbsd is so slow (Score:2, Interesting)
About the artiche "The State of the Demon Address" (Score:1, Informative)
"This article has been removed because many points made within it have been deemed unfactual."
That was a lousy article indeed. The *BSDs deserve much better reviews.
Re:About the artiche "The State of the Demon Addre (Score:1)
binary updates (Score:2)
"Eilko Bos reported that radius authentication, as implemented by login_radius(8), was not checking the shared secret used for replies sent by the radius server. This could allow an attacker to spoof a reply granting access to the attacker."
Uh oh, OK I better grab and install the update.
# pkg_add ftp://ftp.openbsd.org/pub/OpenBSD/
Re:binary updates (Score:1)
Binary updates would be handy, or better still, a mechanism that fetches security patches automatically, merges them into the source tree, recompiles only the bits that are needed, and installs them, then prompts you (/var/log/security would be fine even) to restart the server (or optionally does it on its own, if it's no showstopper to lose the server for a
Re:binary updates (Score:4, Informative)
Not the case. You only need to do the compile on one, and distribute the binaries to the rest of your machines.
Why not? It's trivially easy. Merging old config files with new ones is the only thing you need to do maually. Config files don't change often, so it can be skipped, with little chance anything you run will have a problem.
Not like any other OS has the upgrade path perfected. You sure as hell don't dare upgrade your Windows machines. I don't know anybody that upgrades their Linux machines, at least no more than installing a few RPMs of newer programs. It's generally best to start clean with Linux.
Re:binary updates (Score:3, Informative)
I'm assuming you're referring to the release(8) [openbsd.org] procedure which will generate base35.tgz, etc35.tgz, comp35.tgz, misc35.tgz, man35.tgz etc.
Now how large is base35.tgz? Approximately 30 megs? It doesn't make sense to transfer 30 meg updates to numerous machines to apply an update for just a couple of files that could have been 1 or 2 megs if smaller binary updates were available. Well atleast it
Re:binary updates (Score:2)
foreach host (`cat ~/myhosts`) scp login_radius $host:/usr/libexec/auth end
Re:binary updates (Score:2)
No, not at all. You can quite easily transfer only the changed binaries.
Make release is not necessary, although it's certainly a good way to make new patched install CDs in-between releases if you like.
Re:binary updates (Score:2)
How? Is there a sure fire way of tracking each and every binary that changes after applying a patch? Lets take this patch for example [openbsd.org]. How can I archive the resulting updated binaries?
script? (Score:2)
Re:script? (Score:2)
I think his point is that re-compiling from source, takes longer than just patching or even replacing a binary.
"Funny" things (Score:1)
> Holy crap, wow, just amazing! Man, wow!
> Lets see, that's an amazing 6.7% of the web sites out there. Oh... hmmmm, OK.
More properly, that should be modded "Silly" - or "Clueless GNU/Linux zealot". Time for new categories.. :) - because
- Considering the lack of media hype, it *is* indeed an amazing result.
- That link was posted in response to people cluelessly asserting that BSD's dying, and that's indeed a pretty convincing answer, I thin
Still missing something... (Score:2)
I know about the sea.c patch for it, but I don't want to compile it for every upgrade. This is the only reason why I'm using FreeBSD for my firewall.