OpenBSD 3.6 Released! 194
dspisak writes "The people over at OpenBSD have released version 3.6 containing significant new features such as: SMP support for i386 and amd64 archs, the ability to optimize pf rulesets, better hotplug support, in addition to more robust encryption and vpn functionality. This is in addition to more recent hardware support, for a full list of changes take a look at the 3.6 changelog. Don't forget to use the mirrors!"
Hooray! (Score:3, Funny)
Right around Halloween, the "dead" comes back to life!
Congrats and good work to the OpenBSD team!
Keep it up.
Re:Hooray! (Score:1)
custom iso I made : (Score:2, Informative)
Actually (Score:5, Informative)
But for once... (Score:2)
...slashdot actually acted like a responsible net citizen and delayed the announcement until the mirrors were populated.
And it hurts nobody, I think you'll agree. Those who desperately want the 3.6 code will already have it; more casual users will benefit from using a mirror.
I wish (Score:5, Funny)
Re:I wish (Score:5, Funny)
I know a girl who's extremely interested in OpenBSD, I could give you her number if you want.
Nah, just messing with you, made that up.
Re: (Score:2)
Re:I wish (Score:2)
Re:I wish (Score:2)
I know a girl who's extremely interested in OpenBSD, I could give you her number if you want. Nah, just messing with you, made that up.
What, it's that unlikely? I know about the BSDs and use FreeBSD myself, and I used to work at an ISP where most of the people there (excluding management) used some form of free Unix clone.
Re:I wish (Score:2)
Are there unicorns and pixies there, too?
On Address Space Randomization... (Score:5, Interesting)
Comment removed (Score:5, Informative)
Re:On Address Space Randomization... (Score:4, Informative)
Little Late (Score:3, Informative)
Well, come to think of it, this article was on time...
Firewall ? (Score:1, Interesting)
Re:Firewall ? (Score:3, Informative)
The way you build your rules is a little different.
I don't think there's much difference for Joe User (who wants to protect his home network beind cable/dsl).
The features in pf that I like are:
- packet normalization (scrub in all)
- ISN modification (modulate state)
I think you should rather use OpenBSD/pf if you intend to have a firewall with enhanced VPN capabilities, since OpenBSD has pretty good security feature
Re:Firewall ? (Score:3, Insightful)
Re:Firewall ? (Score:2)
From the site I linked:
tc filter add dev ppp14 parent 1:0 protocol ip prio 10 u32 \
match ip protocol 6 0xff \
match u8 0x05 0x0f at 0 \
match u16 0x0000 0xffc0 at 2 \
match u8 0x10 0xff at 33 \
flowid 1:3
That will (apparently) prioritize ACK packets with no payload. Then there's the PF wa
Top 10 reasons IPTABLES is better than PF (Score:5, Funny)
10. Parsing IPTABLES config files excellent preparation for subsequent
learning of Asian pictograph-based languages.
9. Standard logging via syslogd helps eliminate clutter in
8. GPL prevents Steve Jobs from stealing your code.
7. Simplistic man pages encourage development of social skills via mailing
lists.
6. Multiple distributions, versions, kernels, modules, plugins, etc. keep
hackers confused as to exactly what they're attacking.
5. "Mangle" just sounds so much more 133+ than "Scrub".
4. Complexity of structure leads to more opportunities for obfuscation and
subsequent job security.
3. New and experimental kernel modules make life exciting again.
2. GUI and Web based utilities mean that anyone can set one up without knowing
what they're doing.
And the number one reason IPTABLES is better than PF:
1. No distracting arguments about whether to port it to OpenBSD.
Shamelessly stolen from the pf mailinglist [theaimsgroup.com].
Re:Top 10 reasons IPTABLES is better than PF (Score:2)
Re:Firewall ? (Score:2, Insightful)
It's like a BSD golden age lately (Score:4, Interesting)
Hooray for all three. It's a amazing luxury to have so many open source Unix-like operating systems and kernels out there, free for the download.
Re:It's like a BSD golden age lately (Score:5, Informative)
Seems like lots of choices for BSD users.
Re:It's like a BSD golden age lately (Score:1)
Re:It's like a BSD golden age lately (Score:2)
Not really. Nobody uses the rest of that stuff, generally for good reason.
PicoBSD: out of date abandonware
FireflyBSD: an intriguing research project but not close to being finished
Debian GNU/BSD: BAHHAHAHAHAHAHAHAAHA
Gentoo BSD: ditto
BSDi and BSD-OS (same thing, right?): merged and superceded in just about every way by FreeBSD
Darwin: Everyone who gives a shit just u
Re:It's like a BSD golden age lately (Score:2)
Yes, yes I do. You didn't get the memo?!? I'm sure "Anonymous Coward" was on the cc:
Oh, well, that's useful.
I'm sure all the Apple engineers interested in OS X portability are grateful. Nobody else cares.
Re:It's like a BSD golden age lately (Score:2)
10 years ago I really wanted to learn a unix but had no real stable versions available for the pc. You needed a risc box. I was thinking of buying a Powerpc 601 next cube. They were cheap and only $1400. My friends thought I was nuts. A few years later I learned about Linux and it became stable and ready enough to use.
Today its the opposite with cheap free unixies available on x86.
Re:It's like a BSD golden age lately (Score:2)
The cubes were 68k based, as were the slabs. After a point you could run OpenStep on several platforms (among them PPC), but there was no NeXT branded hardware that I know of.
Re:It's like a BSD golden age lately (Score:2)
I remember reading about it in pc magazine in 1994. I may be confusing a riscOS box which looked cool(it was a long time ago), but I remember seeing the gui with the doc and lusting after it. That or perhaps it was a powerpc prototype?
It mentioned it lacked real software and Next was trying to make a last pitch in order to save it.
Re:It's like a BSD golden age lately (Score:2, Informative)
Re:It's like a BSD golden age lately (Score:2, Informative)
Re:It's like a BSD golden age lately (Score:2)
Don't forget the most important part.... (Score:2, Informative)
A new BSD song!
Yeah!!!!!!
i notice... (Score:5, Interesting)
tcpdrop(8), a command to drop TCP connections.
this looked like an awesome idea, and I'm wondering what the windows / linux equivalent is... anyone know?
Re: (Score:2)
Re:i notice... (Score:3, Informative)
Re:i notice... (Score:1)
Re:i notice... (Score:1)
Re:i notice... (Score:2, Informative)
Re:i notice... (Score:2)
Re:i notice... (Score:4, Informative)
not sure of any command line utils
sysinternals has many other cool free apps and many of those have source code
Not just for routing. (Score:5, Informative)
If you like Unix (as opposed to hating Microsoft), give it a shot.
--saint
Re:Not just for routing. (Score:2)
First off, don't listen to anybody that says the OpenBSD is not fit for heavy-duty serving or that FreeBSD is easier. I used FreeBSD for over seven years before switching to OpenBSD this year. OpenBSD is defintely server-capable (we run it here) and not just for firewalls. There is excellent documentatio av
Re:OpenBSD (Score:2, Interesting)
Ths installation is the fastest and simplest of any unix ....
Depends what you're smoking. Are you telling me that manaul partitioning with OpenBSD's hellish tools is anything like RedHat/Mandrake's polished graphical config? Sorry, but there's no comparison. If you thought Debian's installer was bad, OpenBSD's curses-based nightmare is strictly for masochists.
Re:Recent FreeBSD switcher (Score:3, Insightful)
So use FreeBSD as a learning platform then move to the deeper end of Net and/or OpenBSD. When DragonFly has cleaned out more of the 4.x cruft and become production-class stable,
macppc G5 support? (Score:1, Insightful)
Reasons I like OpenBSD (Score:3, Insightful)
If you had ordered the CD's... (Score:5, Informative)
If you have not tried OpenBSD please do. While I will not speak on the idea of OpenBSD on the desktop I will speak to how great it is as a firewall. If you have struggled with IPTABLES it is time to give a try to PF. Have a look. It should be easy to understand:
ext_if="xl0"
int_if="fxp0"
# clean up the packets
scrub in all
# nat the internal network to the external interface
nat on $ext_if from !($ext_if) -> ($ext_if:0)
# setup a table of RTBL IP's for spammers
table persist
#redirect any IP's in the the RTBL to spamd
rdr pass inet proto tcp from to any port smtp -> 127.0.0.1 port 8025
# ftp proxy
rdr pass on $int_if proto tcp to port ftp -> 127.0.0.1 port 8021
# redirect any internal user to squid
rdr on $int_if inet proto tcp from any to ! $int_if port 80 -> 127.0.0.1 port 3128
# pass extenal web request to the internal www server
rdr on $ext_if proto tcp from any to any port http -> 192.168.0.2
# pass extenal web request to the internal www server
rdr on $ext_if proto tcp from any to any port https -> 192.168.0.2
# drop everything
block in log
# allow out and keep track
pass out keep state
# allow anything to the loopback and internal interface
pass quick on { lo $int_if }
# no RFC 1918 spoofing (quick - do it now!)
antispoof quick for { lo $int_if }
# allow external ssh in
pass in log on $ext_if proto tcp to ($ext_if) port ssh keep state
# allow smtp in
pass in log on $ext_if proto tcp to ($ext_if) port smtp keep state
# allow the www forwarding
pass in log on $ext_if proto tcp to 192.168.0.2 port http keep state
# allow the www forwarding
pass in log on $ext_if proto tcp to 192.168.0.2 port https keep state
# allow outbound smtp
pass out log on $ext_if proto tcp from ($ext_if) to port smtp keep state
Very simple and clean. If you need a firewall give it a try!
Re:If you had ordered the CD's... (Score:2)
Re:If you had ordered the CD's... (Score:5, Informative)
It might just be that I'm a little thick up top, but I've found it easier and quicker to use PF instead of iptables for routers. The main thing I like about it is that you can do your packet shaping and filtering with the same config file. You can also track state connections by IP address (source tracking).
Re:If you had ordered the CD's... (Score:2)
Re:If you had ordered the CD's... (Score:3, Informative)
Re:If you had ordered the CD's... (Score:4, Informative)
## Webserver (http/https)
rdr pass on $ext_if proto tcp from any to ($ext_if) port http -> 10.0.0.8 port http
rdr pass on $ext_if proto tcp from any to ($ext_if) port https -> 10.0.0.8 port https
I like this better than having two seperate rules, as you know youve included both!
Re:If you had ordered the CD's... (Score:2)
And connection pooling with pf rocks.
Re:If you had ordered the CD's... (Score:2, Informative)
http://www.openbsd.org/faq/upgrade36.html [openbsd.org]
As the author of the above, my opinion of its value may be biased, however. :)
hotplugd is neat (Score:5, Informative)
It's also mentioned in a recently slashdotted interview with some OpenBSD devs here:
http://www.onlamp.com/pub/a/bsd/2004/10/28
Re:hotplugd is neat (Score:2)
OpenBSD impossible to update? (Score:4, Interesting)
The inability to easily update OpenBSD, to me, nullifies any benefit one gets from it being "secure". If I'm running a two year old version of Apache because it's such a pain in the butt to update, how iss that secure? I think automatic security updates are imperative for a secure system.
And, furthermore, the automatic updating system should be secure as well.
Re:OpenBSD impossible to update? (Score:5, Informative)
Re:OpenBSD impossible to update? (Score:1)
Re:OpenBSD impossible to update? (Score:2)
I update my production servers within a month of every release and it never takes more than 30 minutes.
Re:OpenBSD impossible to update? (Score:2)
Re:OpenBSD impossible to update? (Score:2)
Re:OpenBSD impossible to update? (Score:5, Informative)
As for updating files in
Re:OpenBSD impossible to update? (Score:2)
Re:OpenBSD impossible to update? (Score:2)
Re:OpenBSD impossible to update? (Score:2)
Re:OpenBSD impossible to update? (Score:2)
Re:OpenBSD impossible to update? (Score:2)
FInally (Score:2, Funny)
Re:FInally (Score:2)
Re:FInally (Score:2)
CDs (Score:2)
Up time (Score:3, Funny)
OpenBSD is great for learning, too (Score:5, Informative)
I have never seen such a clear, concise, and easy to understand configuration file as that of pf.conf (IP filter).
The files for the boot-up configuration rc.conf and rc.local are also very clear and easy to understand.
Everything has very _good_ man pages and sample configuration files with lots of comments.
The faq on openbsd.org is quite good, too.
One aspect of security is simplicity, which implies easily understood configuration files.
Another aspect of security is that you learn about the fundamentals of your system
You simply _have_ to learn about your system to be able to operate it, but at the same time learning is made easy, by great documentation.
And if anybody is put off by OpenBSD's (in)famous penchant for straight/rude talking developers: Don't worry, I found people friendly and helpful. They are only put off, by questions that are very obvious and have been covered in the documentation extensively. But I am also the kind of person who loathes to ask for help in a D.I.Y. shop such as Home Depot, preferring to find things unaided so that I learn more and more about the products they offer, so that I will be more knowledgeable when doing my next project.
Marcus
The hills are alive... (Score:2)
"The Legend of Puffy Hood" and "Puff the Barbarian" were particularly good, and I found that many non-geeks liked them for their music if nothing more (and they tend to appreciate the lyrics once they read the page I linked above).
Speaking of lyrics, if you read them, you will find that they are actually very clever political s
SMP support (Score:2)
Just how good is the SMP code in it?
steve
Re:SMP support (Score:2)
Re:SMP support (Score:2)
It's a good start, you'll know that the other cpu under the hood will be at least doing somethign, not just heating the air
Re:SMP support (Score:5, Informative)
Don't forget SMP opens up new opportunities for security problems, and the OpenBSD devs will be treading very cautiously and conservatively with their implementation. For them security outweighs performance.
Don't expect it to compete with Linux 2.6 or FreeBSD 5 in terms of performance and scalability anytime soon (if ever).
Re:SMP support (Score:2)
BSD developpers like to hide behind that, but I don't recall any security problems arising in any OS from SMP support. Buffer overflows, unchecked user data, etc. aren't things that come about because of SMP.
steve
Re:SMP support (Score:3, Insightful)
SMP itself is not a killer, but when a design for SMP is overcomplicated, the rest of the system suffers.
Re:SMP support (Score:2)
Also... some security problems come from race conditions. Those are a lot easier to avoid in a biglock kernel than they are in something like FreeBSD 5.
1 down, 2 to go (Score:2, Redundant)
Don't forget to buy a CD (Score:4, Insightful)
I've heard there are big companies using many copies of OpenBSD but haven't even bought a CD.
They should get their names on this list:
http://www.openbsd.com/donations.html
Re:Is there a such thing as... (Score:3, Informative)
So yes, there is.
Re:About Slashdot BSD Logo (Score:4, Informative)
Ok, the current icon for a generic BSD story on /. right now is the Daemon, right? Everyone I know associates the Daemon with BSD regardless of flavor. NetBSD has attempted to single themselves out as a seperate distro from the rest of the BSD group/stables. Why would it make any sense to use their new logo as the *generic* BSD logo? If the /. story is 100% devoted to NetBSD, then sure, use the flag like Apple has their own logo. But I don't think it would be worthwhile to replace the Daemon with the NetBSD flag on a story dealing with OpenBSD.
Re: (Score:2)
Re:About Slashdot BSD Logo (Score:3, Informative)
Re:BSD is dying :-( (Score:3, Funny)
Re:BSD is dying :-( (Score:2)
Linux zig.jayfar.com 2.4.18-6mdk #1 Fri Mar 15 02:59:08 CET 2002 i686 unknown
~$ uptime
2:17pm up 275 days, 6:28, 2 users, load average: 0.00, 0.00, 0.00
Re:BSD is dying :-( (Score:1)
Re:SMP (Score:2, Informative)
I asked about SMP for Sparc32 (I have a quad SS20!) but there was no take on that. SMP for Sparc64 maybe coming..
Re:SMP (Score:5, Interesting)
Re:SMP (Score:2)
I am not to sure how well smp works on the sparc.
Yes (since 3.5) (Score:2)
Re:good stuff :) (Score:2)
You can always assist [openbsd.org] in bringing relaxing-beverage goodness to the OpenBSD development team.
Re:Way behind the times (Score:2)
Re:OT: Where is NetBSD 2.0?? (Score:2)
It's like FreeBSD 5 (but much better, thankfully), where issues crop up even after scheduled release, but they have the dignity to prioritize release quality over expectation. Remember, releasing a few months late may put a coupl