Language Selection

English French German Italian Portuguese Spanish

BSD

FreeBSD 10.4-RC1 Now Available

Filed under
BSD

The first RC build of the 10.4-RELEASE release cycle is now available.

Installation images are available for:

o amd64 GENERIC
o i386 GENERIC
o ia64 GENERIC
o powerpc GENERIC
o powerpc64 GENERIC64
o sparc64 GENERIC
o armv6 BEAGLEBONE
o armv6 CUBOX-HUMMINGBOARD
o armv6 GUMSTIX
o armv6 PANDABOARD
o armv6 RPI-B
o armv6 WANDBOARD

Read more

OpenBSD Development News

Filed under
Development
BSD
  • t2k17 Hackathon report: Ken Westerback on dhclient progress, developer herding
  • A return-oriented programming defense from OpenBSD

    Stack-smashing attacks have a long history; they featured, for example, as a core part of the Morris worm back in 1988. Restrictions on executing code on the stack have, to a great extent, put an end to such simple attacks, but that does not mean that stack-smashing attacks are no longer a threat. Return-oriented programming (ROP) has become a common technique for compromising systems via a stack-smashing vulnerability. There are various schemes out there for defeating ROP attacks, but a mechanism called "RETGUARD" that is being implemented in OpenBSD is notable for its relative simplicity.

    In a classic stack-smashing attack, the attack code would be written directly to the stack and executed there. Most modern systems do not allow execution of on-stack code, though, so this kind of attack will be ineffective. The stack does affect code execution, though, in that the call chain is stored there; when a function executes a "return" instruction, the address to return to is taken from the stack. An attacker who can overwrite the stack can, thus, force a function to "return" to an arbitrary location.

FreeBSD 10.4-BETA4 Now Available

Filed under
BSD

The fourth BETA build of the 10.4-RELEASE release cycle is now available.

Read more

BSD: FreeBSD, OpenBSD, and LLVM Clang

Filed under
BSD

BSD: LLVM 5.0.0, Android NDK, FreeBSD/TrueOS

Filed under
Development
BSD

     
     

  • LLVM 5.0.0 Release

    This release is the result of the community's work over the past six months, including: C++17 support, co-routines, improved optimizations, new compiler warnings, many bug fixes, and more.

  • LLVM 5.0 Released With C++17 Support, Ryzen Scheduler, AMDGPU Vega & Much More

    After delays pushed its release back by about one month, LLVM 5.0 was just released a few minutes ago along with its associated sub-projects like the Clang 5.0 C/C++ compiler.

    LLVM 5.0 features a number of improvements to the ARM and MIPS targets, greater support for the POWER ISA 3.0 in the PowerPC target, the initial AMD Ryzen (znver1) scheduler support (already improved in LLVM 6.0 SVN), support for Intel Goldmont CPUs, greater AVX-512 support, improved Silvermont/Sandybridge/Jaguar schedulers, and initial Radeon Vega (GFX9) support within the AMDGPU target.

  • Android NDK r16: Developers Should Start Using LLVM's libc++ With GCC On The Way Out

    Google has announced the availability today of the Android Native Development Kit (NDK) Release 16. This release is worth mentioning in that Google is now encouraging developers to start using libc++ as their C++ standard library.

    Moving forward, Google will only be supporting LLVM's libc++ as the C++ standard library and not supporting other STLs. The Android platform has already been using libc++ since Lollipop and now they are looking to get more application developers using this STL.

  • Google publishes its documentation style guide for developers

    Documentation is often an afterthought — especially for open-source projects. That can make it harder for newcomers to join a project, for example, and sometimes badly written documentation is worse than having no documentation at all. To help developers write better documentation, Google this week opened up its own developer-documentation style guide.

  • Trying Out FreeBSD/TrueOS On The Xeon Scalable + Tyan GT24E-B7106 Platform

    While we have tested a number of Linux distributions on Intel's new Xeon Scalable platform, here are some initial BSD tests using two Xeon Gold 6138 processors with the Tyan GT24E-B7106 1U barebones server.

  • FreeBSD Developers Tackle AMD Zen/Ryzen Temperature Monitoring Before Linux

    While Linux users of AMD's new Zen-based Ryzen/Threadripper/Epyc processors are still waiting for thermal driver support to hit the mainline Linux kernel, FreeBSD developers have already managed to produce the Zen "Family 17h" CPU thermal monitoring support on their own.

    From this FreeBSD bug report, developers have managed to get the AMD CPU temperature monitoring working for Zen processors under Linux with their existing temperature driver.

FreeBSD 10.4-BETA3 Now Available

Filed under
BSD

The third BETA build of the 10.4-RELEASE release cycle is now available.

Read more

BSD: FreeBSD in China, Update From OpenBSD

Filed under
BSD
  • Trip Report: FreeBSD in China at COPU and LinuxCon

    In May of 2017, we were invited to give a talk about FreeBSD at COPU’s (China Open Source Promotional Unit) Open Source China, Open Source World Summit, which took place June 21-22, in Beijing. This was a tremendous opportunity to talk about the advantages of FreeBSD to the open source leaders and organizations interested in open source. I was honored to represent the Project and Foundation and give the presentation “FreeBSD Advantages and Applications”.

  • A return-oriented programming defense from OpenBSD

    Stack-smashing attacks have a long history; they featured, for example, as a core part of the Morris worm back in 1988. Restrictions on executing code on the stack have, to a great extent, put an end to such simple attacks, but that does not mean that stack-smashing attacks are no longer a threat. Return-oriented programming (ROP) has become a common technique for compromising systems via a stack-smashing vulnerability. There are various schemes out there for defeating ROP attacks, but a mechanism called "RETGUARD" that is being implemented in OpenBSD is notable for its relative simplicity.

BSD: TrueOS, DragonFlyBSD, FreeBSD, OpenBSD

Filed under
BSD
  • Trying Out AMD's Ryzen Threadripper On TrueOS, DragonFlyBSD

    Following the AMD Threadripper Linux tests of this week today I finally had a chance to try out some of the BSDs with this 16 core / 32 thread system.

    With the AMD Threadripper 1950X with Gigabyte X399 AORUS Gaming 7 is how I was running these tests. Initial targets were with TrueOS (formerly known as PC-BSD, the desktop-oriented branch of FreeBSD) and DragonFlyBSD.

  • August 2017 Development Projects Update
  • My first patch to OpenBSD

    I followed Preparing a diff and Making your first patch (OpenBSD) to submit my first OpenBSD patch. Guess what? just few hours later, dmesg source file was changed base on my code. Although the final modification is not my code, it is still a great pleasure that I contribute my own effort to help make OpenBSD better!

GhostBSD 11.1 BETA1 is ready!

Filed under
BSD

This first beta of the development of GhostBSD 11.1 release is ready for testing. All MATE and XFCE image is available with i386 and amd64 architectures. We hope to see a lot of people helping to test this next release.

Read more

BSD: HAMMER2 in DragonFlyBSD, OpenBSD Funds

Filed under
BSD
  • HAMMER2 File-System Continues To Stabilize For DragonFlyBSD

    For those interested in the work being done to the HAMMER2 file-system that's being developed by Matthew Dillon for DragonFlyBSD, it is indeed getting closer to being a working reality.

    We recently heard how the next DragonFlyBSD release will offer it as an experimental option following recent advancements to it. That next DragonFly release should be coming in September.

  • OpenBSD Community Goes Platinum [iophk: "paypal is not an option, I'll have to send some bitcoin their way"]

    Paypal and bitcoin donations from the OpenBSD community have made the community the OpenBSD Foundation's first Platinum level contributor for 2017!

  • openbsd changes of note 627
Syndicate content

More in Tux Machines

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD

BlueBorne Vulnerability Is Patched in All Supported Ubuntu Releases, Update Now

Canonical released today new kernel updates for all of its supported Ubuntu Linux releases, patching recently discovered security vulnerabilities, including the infamous BlueBorne that exposes billions of Bluetooth devices. The BlueBorne vulnerability (CVE-2017-1000251) appears to affect all supported Ubuntu versions, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus) up to 16.04.3, Ubuntu 14.04 LTS (Trusty Tahr) up to 14.04.5, and Ubuntu 12.04 LTS (Precise Pangolin) up to 12.04.5. Read more

Security: Updates, 2017 Linux Security Summit, Software Updates for Embedded Linux and More

  • Security updates for Tuesday
  • The 2017 Linux Security Summit
    The past Thursday and Friday was the 2017 Linux Security Summit, and once again I think it was a great success. A round of thanks to James Morris for leading the effort, the program committee for selecting a solid set of talks (we saw a big increase in submissions this year), the presenters, the attendees, the Linux Foundation, and our sponsor - thank you all! Unfortunately we don't have recordings of the talks, but I've included my notes on each of the presentations below. I've also included links to the slides, but not all of the slides were available at the time of writing; check the LSS 2017 slide archive for updates.
  • Key Considerations for Software Updates for Embedded Linux and IoT
    The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers. Many of these embedded devices run a variant of embedded Linux; typically, the distribution size is around 16MB today. Unfortunately, the Linux kernel, although very widely used, is far from immune to critical security vulnerabilities as well. In fact, in a presentation at Linux Security Summit 2016, Kees Cook highlighted two examples of critical security vulnerabilities in the Linux kernel: one being present in kernel versions from 2.6.1 all the way to 3.15, the other from 3.4 to 3.14. He also showed that a myriad of high severity vulnerabilities are continuously being found and addressed—more than 30 in his data set.
  • APNIC-sponsored proposal could vastly improve DNS resilience against DDoS