Language Selection

English French German Italian Portuguese Spanish

Debian

Tails 3.15 is out

Filed under
GNU
Linux
Security
Debian

This release fixes many security vulnerabilities. You should upgrade as soon as possible.

Read more

Tiny compute modules crank up Snapdragon 845 and Snapdragon 660

Filed under
Android
Linux
Debian

Inforce announced two Micro SoMs with Android (and soon, Debian) BSPs running on octa-core Qualcomm SoCs. The Inforce 6701 showcases the high-end Snapdragon 845 while the Inforce 6502 taps the Snapdragon 660.

Inforce Computing unveiled a pair of Qualcomm Snapdragon based compute modules using the same 50 x 28mm Micro SoM form factor used in earlier products such as its Snapdragon 600-based Inforce 6401 and Snapdragon 820-based Inforce 6601. The new, Snapdragon 845-driven Inforce 6701 and Snapdragon 660-powered Inforce 6502 ship with BSPs for Android 9.0 Pie and Android 8.0 Oreo, respectively. Debian Linux BSPs are said to be “coming soon.”

Read more

Debian vs. Ubuntu: The Similarities, Differences and Which One You Should Use

Filed under
Debian
Ubuntu

Ubuntu received a lot of love in its earlier releases. It made many seemingly complicated operations, easier for beginners just coming into the world of Linux-based distributions. But around the time the Unity interface was launched, it started to get some hate, too.

Objectively speaking, the interface was not good or bad, it did its job well. But it did it differently than what most people were used to. Then, some other changes, like inserting ads in the launch menu and changing the interface once again to Gnome, made some users dislike the distro even more and people began to look for alternatives, with one of them being Debian. Since Ubuntu is created from Debian, the two are very similar at the core. However, with the changes Canonical made to Debian to create Ubuntu, there are also a lot of differences, some of them subtle.

Read more

Debian Edu / Skolelinux Buster — a complete Linux solution for your school

Filed under
GNU
Linux
Debian

Do you have to administrate a computer lab or a whole school network? Would you like to install servers, workstations and laptops which will then work together? Do you want the stability of Debian with network services already preconfigured? Do you wish to have a web-based tool to manage systems and several hundred or even more user accounts? Have you asked yourself if and how older computers could be used?

Then Debian Edu is for you. The teachers themselves or their technical support can roll out a complete multi-user multi-machine study environment within a few days. Debian Edu comes with hundreds of applications pre-installed, but you can always add more packages from Debian.

The Debian Edu developer team is happy to announce Debian Edu 10 Buster, the Debian Edu / Skolelinux release based on the Debian 10 Buster release. Please consider testing it and reporting back to help us to improve it further.

Read more

Also: Debian GSoC Kotlin project blog: Week 4 & 5 Update

Debian 10 buster released

Filed under
Debian

After 25 months of development the Debian project is proud to present its new stable version 10 (code name buster), which will be supported for the next 5 years thanks to the combined work of the Debian Security team and of the Debian Long Term Support team.

Read more

Also: Debian 10.0 "Buster" Now Available - Powered By Linux 4.19, GNOME + Wayland

Jonathan Wiltshire: What to expect on buster release day

Filed under
Debian

The ‘buster’ release day is today! This is mostly a re-hash of previous checklists, since we’ve done this a few times now and we have a pretty good rhythm.

Read more

Debian Development, Mark Shuttleworth and Lubuntu

Filed under
Debian
Ubuntu
  • Thorsten Alteholz: My Debian Activities in June 2019

    As you might have noticed as well, this month has been a month with the highest average temperature of all June so far. So I spent more time in the lake than in NEW. I only accepted 12 packages and rejected 1 upload. The rest of the team probably did the same because the overall number of packages that got accepted was only 22. Let’s see whether July will be the same …

  • Mike Gabriel: My Work on Debian LTS/ELTS (June 2019)

    In June 2019, I did not at all reach my goal of LTS/ELTS hours, unfortunately. (At this point, I could come up with a long story about our dog'ish family member and the infection diseases he got, the vet visits we did and the daily care and attention he needed, but I won't...).

    I have worked on the Debian LTS project for 9,75 hours (of 17 hours planned) and on the Debian ELTS project just for 1 hour (of 12 hours planned) as a paid contributor.

  • Mark Shuttleworth sold a tech startup he built in his garage for $575 million and used the money to visit space
  • Lubuntu Eoan Ermine Wallpaper Contest

    The Lubuntu Team is pleased to announce we are running an Eoan Ermine wallpaper competition, giving you, our community, the chance to submit, and get your favorite wallpapers included in the Lubuntu 19.10 release.

Upcoming Debian 10 "Buster"!

Filed under
Debian

The Debian Release Team in coordination with several other teams are preparing the last bits needed for releasing Debian 10 "Buster" on Saturday 6 July 2019. Please, be patient! Lots of steps are involved and some of them take some time, such as building the images, propagating the release through the mirror network, and rebuilding the Debian website so that "stable" points to Debian 10.

If you are considering create some artwork on the occasion of Buster Release, feel free to send us links to your creations to the (publicly archived) debian-publicity mailing list, so that we can disseminate them throughout our community.

Read more

Michał Górny (Gentoo) and Daniel Kahn Gillmor (Debian) on OpenPGP Security

Filed under
GNU
Linux
Gentoo
Security
Debian
  • Michał Górny: SKS poisoning, keys.openpgp.org / Hagrid and other non-solutions

    The recent key poisoning attack on SKS keyservers shook the world of OpenPGP. While this isn’t a new problem, it has not been exploited on this scale before. The attackers have proved how easy it is to poison commonly used keys on the keyservers and effectively render GnuPG unusably slow. A renewed discussion on improving keyservers has started as a result. It also forced Gentoo to employ countermeasures. You can read more on them in the ‘Impact of SKS keyserver poisoning on Gentoo’ news item.

    Coicidentally, the attack happened shortly after the launch of keys.openpgp.org, that advertises itself as both poisoning-resistant and GDPR-friendly keyserver. Naturally, many users see it as the ultimate solution to the issues with SKS. I’m afraid I have to disagree — in my opinion, this keyserver does not solve any problems, it merely cripples OpenPGP in order to avoid being affected by them, and harms its security in the process.

    In this article, I’d like to shortly explain what the problem is, and which of the different solutions proposed so far to it (e.g. on gnupg-users mailing list) make sense, and which make things even worse. Naturally, I will also cover the new Hagrid keyserver as one of the glorified non-solutions.

  • Daniel Kahn Gillmor: WKD for debian.org

    By default, this will show you any matching certificate that you already have in your GnuPG local keyring. But if you don't have a matching certificate already, it will fall back to using WKD.

    These certificates are extracted from the debian keyring and published at https://openpgpkey.debian.org/.well-known/debian.org/, as defined in the WKD spec. We intend to keep them up-to-date when ever the keyring-maint team publishes a new batch of certificates. Our tooling uses some repeated invocations of gpg to extract and build the published tree of files.

    Debian is current not implementing the Web Key Directory Update Protocol (and we have no plans to do so). If you are a Debian developer and you want your OpenPGP certificate updated in WKD, please follow the normal procedures for Debian keyring maintenance like you always have.

Debian: Debian Installer Buster RC 3, a live-wrapper fork, Buster Days Away and DebConf19 Has Cheesy Plans

Filed under
Debian
  • Debian Installer Buster RC 3 release
    The Debian Installer team[1] is pleased to announce the third release
    candidate of the installer for Debian 10 "Buster".
    
    
    Foreword
    ========
    
    This release candidate of the installer is meant to validate some very
    last changes, making sure Recommends of the Linux kernel packages are
    properly installed. That's also a way to double check the setup for
    generating installation images is ready to prepare official Buster
    images in a few days.
    
    Installation reports for this specific D-I Buster RC 3 release are
    welcome as always, but users may want to join the fun of testing the
    official installation images on Saturday!
    
      https://lists.debian.org/debian-cd/2019/06/msg00024.html
    
    
    Improvements in this release
    ============================
    
     * base-installer:
        - Enable installation of Recommends while installing the kernel
          (#929667).
     * debian-installer-utils:
        - Always set APT option if --{with,no}-recommends options are used
          (#931287).
     * debian-cd:
        - Include Buster release notes on DVD, 16G USB and BD images.
     * grub2:
        - Add shim-signed to Recommends for grub-efi-{arm64,i386}-signed
          packages (#931038).
    
    
    Localization status
    ===================
    
     * 76 languages are supported in this release.
     * Full translation for 39 of them.
    
    
    Known bugs in this release
    ==========================
    
     * There seems to be no known major bug as of yet.
    
    See the errata[2] for details and a full list of known issues.
    
    
    Feedback for this release
    =========================
    
    We need your help to find bugs and further improve the installer,
    so please try it. Installer CDs, other media and everything else you
    will need are available at our web site[3].
    
    
    Thanks
    ======
    
    The Debian Installer team thanks everybody who has contributed to this
    release.
    
    
     1. https://wiki.debian.org/DebianInstaller/Team
     2. https://www.debian.org/devel/debian-installer/errata
     3. https://www.debian.org/devel/debian-installer
    
    
    Cheers,
    
  • Debian Installer Buster RC3 Brings Last Minute Improvements

    While Debian 10.0 "Buster" is due to be released this weekend, a seemingly last release candidate of the Debian Installer is now available.

    Debian Installer Buster RC3 was issued this morning with just a couple of changes. With this update, the Debian Installer ensures that the package "Recommends" of Linux kernel Debian packages are properly installed, the Buster release notes have been added to the larger images, and the SecureBoot shim-signed is now added to the grub-efi-signed packages.

  • Enrico Zini: live-wrapper fork

    I sometimes need to build Debian live iso images for work, and some time ago got into an inconvenient situation in which live-wrapper required software not available in Debian anymore, and there was no obvious replacement for it, so I forked it and tried to forward-port things and fill the gaps.

  • Debian 10 Buster expected this week, but not for Linux on Chromebooks (unless you manually upgrade)

    It’s a big week in the Linux world as Debian 10 Buster is expected to arrive on July 6. What does that have to do with Chromebooks? Thanks to Project Crostini, Chrome OS devices can run Linux, using the current default version of Debian 9 Stretch.

  • DebConf19 Cheese and Wine Party

    This C&W is the 15th official DebConf Cheese and Wine party. The first C&W was improvised in Helsinki during DebConf 5, in the so-called "French" room. Cheese and Wine parties are now a tradition for DebConf.

    The event is very simple: bring good edible stuff from your country. We like cheese and wine, but we love the surprising stuff that people bring from all around the world or regions of Brazil. So, you can bring non-alcoholic drinks or a typical food that you would like to share as well. Even if you don't bring anything, feel free to participate: our priorities are our attendants and free cheese.

    We have to organize for a great party. An important part is planning - We want to know what you are bringing, in order to prepare the labels and organizing other things.

Syndicate content

More in Tux Machines

CAN-Bus HAT for Raspberry Pi 4 offers RTC and wide-range power

Copperhill’s third-gen, $65 “PiCAN3” HAT features Raspberry Pi 4 support and a SocketCAN-ready CAN-Bus 2.0B port. The HAT has an RTC and is powered by a 3A, 6-20V Switch Mode Power Supply that can also power the Pi. Copperhill Technologies has launched a CAN-Bus HAT for the Raspberry Pi 4 Model B designed for industrial and automotive applications. Like the PiCAN2. which we briefly covered last year as part of our report on Network Sorcery’s UCAN software for CAN-equipped Raspberry Pi boards, the HAT is equipped with a Microchip MCP2515 CAN controller and MCP2551 CAN transceiver. Read more

Android Leftovers

FreeBSD 12 & DragonFlyBSD 5.6 Running Well On The AMD Ryzen 7 3700X + MSI X570 GODLIKE

For those wondering how well FreeBSD and DragonFlyBSD are handling AMD's new Ryzen 3000 series desktop processors, here are some benchmarks on a Ryzen 7 3700X with MSI MEG X570 GODLIKE where both of these popular BSD operating systems were working out-of-the-box. For some fun mid-week benchmarking, here are those results of FreeBSD 12.0 and DragonFlyBSD 5.6.2 up against openSUSE Tumbleweed and Ubuntu 19.04. Back in July I looked at FreeBSD 12 on the Ryzen 9 3900X but at that time at least DragonFlyBSD had troubles booting on that system. When trying out the Ryzen 7 3700X + MSI GODLIKE X570 motherboard on the latest BIOS, everything "just worked" without any compatibility issues for either of these BSDs. Read more

How to break out of a hypervisor: Abuse Qemu-KVM on-Linux pre-5.3 – or VMware with an AMD driver

A pair of newly disclosed security flaws could allow malicious virtual machine guests to break out of their hypervisor's walled gardens and execute malicious code on the host box. Both CVE-2019-14835 and CVE-2019-5049 are not particularly easy to exploit as they require specific types of hardware or events to occur. However, if successful, either could allow a miscreant to run malware on the host from a VM instance. CVE-2019-14835 was discovered and reported by Peter Pi, a member of the Tencent Blade Team. It is found in the Linux kernel versions 2.6.34 up to version 5.3, where it is patched. Read more