Language Selection

English French German Italian Portuguese Spanish

BSD

GhostBSD 11.1 Alpha

Filed under
BSD
  • GhostBSD 11.1 Enters Alpha: FreeBSD 11.1 Paired With MATE, Xfce Desktops

    While TrueOS (formerly PC-BSD) is arguably the most well known desktop variant of FreeBSD, GhostBSD has been gaining ground as well as a FreeBSD-based desktop-friendly operating system. Today marks the availability of GhostBSD 11.1 Alpha.

  • GhostBSD 11.1 ALPHA1 is ready!

    This first alpha development release of GhostBSD 11.1 is ready for testing. All MATE and XFCE image is available with i386 and amd64 architectures. We hope to see a lot of people helping to test this next release.

BSD: openbsd and kcollect in DragonFly

Filed under
BSD
  • openbsd changes of note 626
  • kcollect description
  • New mechanism: kcollect

    There’s a new facility in DragonFly: kcollect(8). It holds automatically-collected kernel data for about the last day, and can output to gnuplot. Note the automatic collection part; your system will always be able to tell you about weirdness – assuming that weirdness extends to one of the features kcollect tracks.

BSD: Contributing to FreeBSD and Release of DragonFlyBSD 4.8.1

Filed under
BSD
  • Contributing to FreeBSD

     

    The FreeBSD Testing Project is building an automated test suite for the entire operating system. They have a whole mess of work to do. There’s only four people on the team, so each additional person that contributes can have a serious impact. They have tutorials on how to write tests, and sample tests.

  • DragonFlyBSD 4.8.1 Released, Updates Intel DRM Against Linux 4.7.10

    DragonFlyBSD 4.8.1 has been released by Justin Sherrill with various minor updates -- particularly for Intel DRM graphics and other kernel improvements -- over the recent v4.8 milestone.

BSD: OPNsense 17.7, OpenBSD and LLVM

Filed under
BSD

OPNsense 17.7 released

Filed under
BSD

For more than two and a half years now, OPNsense is driving innovation through modularising and hardening the open source firewall, with simple and reliable firmware upgrades, multi-language support, HardenedBSD security, fast adoption of upstream software updates as well as clear and stable 2-Clause BSD licensing.

We are writing to you today to announce the final release of version 17.7 “Free Fox”, which, over the course of the last 6 months, includes highlights such as SafeStack application hardening, the Realtek re(4) driver for better network stability, a Quagga plugin with broad routing protocol support and the Unbound resolver as the new default. Additionally, translations for Czech, Chinese, Japanese, Portuguese and German have been completed for the first time during this development cycle.

Read more

BSD/UNIX: Trying OpenIndiana Hipster On The Core i9 7900X and 'End' of Bitrig

Filed under
BSD
  • Trying OpenIndiana Hipster On The Core i9 7900X

    Following the Linux and BSD multi-threaded tests on the Intel Core i9 7900X, I next decided to try this system with the Solaris-based OpenIndiana. Sadly, it didn't end well.

    With various BSDs working fine on the Core i9 7900X box paired with the NVMe storage, MSI X299 SLI PLUS motherboard, etc, I figured OpenIndiana would play fine. Sadly, I was wrong.

  • Bitrig: The Short-Lived OpenBSD Fork

    Bitrig, the operating system that forked OpenBSD back in 2012, is no longer being developed.

    Bitrig saw its initial release in 2014 but it's been relatively quiet since. In fact, pretty much forgotten on my end until seeing an LLVM commit this week mentioning Bitrig is dead and has been merged back into OpenBSD.

    Further showing the project is no more is the GitHub project area showing no more work since 2016.

BSD: TrueOS and OpenBSD mandoc

Filed under
BSD
  • Milestone Complete! OpenRC conversion

    The OpenRC conversion project is done! Over one thousand script/port conversions are complete, and all will be available in the TrueOS UNSTABLE and STABLE tracks soon. The project wants to extend a huge thank you to all those who contributed to completing this milestone, and a special thank you to contributors ZackaryWelch and elarge011 for doing the lion’s share of the work.

  • TrueOS Finishes Porting Scripts To OpenRC

    The TrueOS BSD distribution has finished porting over more than one thousand FreeBSD RC scripts into OpenRC format for this dependency-based init system.

    This year the TrueOS crew has been working on migrating to the OpenRC init system for better boot performance, easier configuration, better organization of configuration files, more reliable service status, etc. Popular services had been in OpenRC form already but now they have finished porting over more than 1,000 other scripts for OpenRC on TrueOS.

  • mandoc-1.14.2 released

     

    With the improved mandoc features, only twenty-five out of the ten thousand software packages in the OpenBSD ports tree still need groff to format their manual pages.

FreeBSD 11.1 Released

Filed under
BSD
  • FreeBSD 11.1 Operating System Debuts to Support 2nd Generation Microsoft Hyper-V

    The FreeBSD Project announced today the release and immediate availability of the first incremental update to the FreeBSD 11 operating system series, FreeBSD 11.1.

    It's been more than nine months since FreeBSD 11 was released as the latest and most advanced version of the widely-used and most popular BSD operating system on the market, and now, FreeBSD 11.1 is here with a bunch of new features across multiple components, as well as all the latest security and bug fixes.

  • FreeBSD 11.1 Debuts With LLVM/Clang 4, ZFS Improvements

    FreeBSD 11.1 is now available as the first point release to FreeBSD 11.

  • FreeBSD 11.1-RELEASE Announcement

    The FreeBSD Release Engineering Team is pleased to announce the availability of FreeBSD 11.1-RELEASE. This is the second release of the stable/11 branch.

BSD and Programming: OpenBSD, Development Style, and GCC/C++

Filed under
Development
GNU
BSD
  • OpenBSD kernel address randomized link

    A less than two-month-old project for OpenBSD, kernel address space randomized link (KARL), has turned the kernel into an object that is randomized on every boot. Instead of the code being stored in the same location for every boot of a given kernel, each boot will be unique. Unlike Linux's kernel address space layout randomization (KASLR), which randomizes the base address for all of the kernel code on each boot, KARL individually randomizes the object files that get linked into the binary. That means that a single information leak of a function address from the kernel does not leak information about the location of all other functions.

    Theo de Raadt first posted about the idea on the OpenBSD tech mailing list on May 30. He described the current layout of the OpenBSD kernel code, which is effectively the boot code and assembly runtime (in locore.o), followed by the kernel .o files in a fixed order. His post had some changes that would split out the assembly runtime from locore.o and link it and all of the kernel .o files in a random order. The only piece that would be placed at a known address would be locore.o; it would be followed by a randomly sized gap, then by the kernel text that has its .o files arranged in a random order. There would also be random gaps before other sections (i.e. .rodata, .data, and .bss) that are placed after the kernel text.

  • openbsd changes of note 625
  • moving to https

     

    There is some security benefit, of course, but really it’s all about the speed. I want flak to be as fast as possible, thus we need to be using the fastest protocol.  

  • Stop writing code like we're in the '90s: a practical approach (PART Sleepy

    A lot of criticisms come from users that probably wrote Java code when it was born.

  • GCC Begins Preparing For C++20 With -std=c++2a

pfSense 2.3.4-p1 Open-Source Firewall Update Brings Security Fixes for OpenVPN

Filed under
BSD

A new security and bug fix maintenance update just landed today for the pfSense 2.3.4 stable release of the open-source and free firewall distribution based on the FreeBSD technologies.

The pfSense 2.3.4-p1 patch is being released two and a half months after the launch of pfSense 2.3.4, and it looks like it attempts to inject new security fixes in pfSense and several of its components, including OpenVPN, as well as to fix various bugs that have been reported during this time. For example, it fixes Hover Dynamic DNS updates to be able to verify the SSL peer.

Read more

Syndicate content

More in Tux Machines

Graphics: RADV Vulkan vs. RadeonSI OpenGL, Open-Source OpenCL, VIA Graphics & Other Vintage GPUs

  • RADV Vulkan vs. RadeonSI OpenGL Performance With Linux 4.13 + Mesa 17.3-dev
    It's been a few weeks since last delivering any large RADV/RadeonSI open-source AMD Linux graphics benchmark results due to being busy with testing other hardware as well as battling some regressions / stability problems within the AMDGPU DRM code and Mesa Git. But with Linux 4.13 stable and the newest Mesa 17.3-dev code, things are playing well so here are some fresh OpenGL vs. Vulkan benchmarks on three Radeon graphics cards.
  • Open-Source OpenCL Adoption Is Sadly An Issue In 2017
    While most of the talks that take place at the annual X.Org Developers' Conference are around the exciting progress being made across the Linux graphics landscape, at XDC2017 taking place this week at Google, the open-source GPGPU / compute talk is rather the let down due to the less than desirable state of the open-source OpenCL ecosystem. Tom Stellard who formerly worked for AMD on their LLVM compiler stack and compute initiatives who recently joined Red Hat provided a "Current state of Open Source GPGPU" talk. It's not too much of a surprise if you are up-to-date in your daily Phoronix reading and our close coverage of all things Linux GPU. But if you're not a devoted reader or looking for an hour synopsis, check out his presentation embedded in this article.
  • VIA Graphics & Other Vintage GPUs Still Interest At Least One Developer In 2017
    Kevin Brace, the sole active developer left working on the OpenChrome driver stack for VIA x86 graphics, presented yesterday at XDC2017 about his work on this driver and how in the years to come he still hopes to work on other vintage GPU support. Brace's work mostly covered his personal motivations, a brief history of Via Unichrome and the Linux driver options, and then his recent work on trying to get the OpenChrome DDX and DRM drivers into shape.

Security: Antipatterns in IoT Security, Signing Programs for Linux, and Guide to Two-Factor Authentication

  • Antipatterns in IoT security
    Security for Internet of Things (IoT) devices is something of a hot topic over the last year or more. Marti Bolivar presented an overview of some of the antipatterns that are leading to the lack of security for these devices at a session at the 2017 Open Source Summit North America in Los Angeles. He also had some specific recommendations for IoT developers on how to think about these problems and where to turn for help in making security a part of the normal development process. A big portion of the talk was about antipatterns that he has seen—and even fallen prey to—in security engineering, he said. It was intended to help engineers develop more secure products on a schedule. It was not meant to be a detailed look at security technologies like cryptography, nor even a guide to what technical solutions to use. Instead, it targeted how to think about security with regard to developing IoT products.
  • Signing programs for Linux
    At his 2017 Open Source Summit North America talk, Matthew Garrett looked at the state of cryptographic signing and verification of programs for Linux. Allowing policies that would restrict Linux from executing programs that are not signed would provide a measure of security for those systems, but there is work to be done to get there. Garrett started by talking about "binaries", but programs come in other forms (e.g. scripts) so any solution must look beyond simply binary executables. There are a few different reasons to sign programs. The first is to provide an indication of the provenance of a program; whoever controls the key actually did sign it at some point. So if something is signed by a Debian or Red Hat key, it is strong evidence that it came from those organizations (assuming the keys have been securely handled). A signed program might be given different privileges based on the trust you place in a particular organization, as well.
  • A Guide to Common Types of Two-Factor Authentication on the Web
    Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it's becoming much more common across the web. With often just a few clicks in a given account's settings, 2FA adds an extra layer of security to your online accounts on top of your password. In addition to requesting something you know to log in (in this case, your password), an account protected with 2FA will also request information from something you have (usually your phone or a special USB security key). Once you put in your password, you'll grab a code from a text or app on your phone or plug in your security key before you are allowed to log in. Some platforms call 2FA different things—Multi-Factor Authentication (MFA), Two Step Verification (2SV), or Login Approvals—but no matter the name, the idea is the same: Even if someone gets your password, they won't be able to access your accounts unless they also have your phone or security key. There are four main types of 2FA in common use by consumer websites, and it's useful to know the differences. Some sites offer only one option; other sites offer a few different options. We recommend checking twofactorauth.org to find out which sites support 2FA and how, and turning on 2FA for as many of your online accounts as possible. For more visual learners, this infographic from Access Now offers additional information. Finally, the extra layer of protection from 2FA doesn't mean you should use a weak password. Always make unique, strong passwords for each of your accounts, and then put 2FA on top of those for even better log-in security.

Linux panel PC offers IP69K protection against jet spray

TechNexion has launched a 10.1 inch, 1280 x 800 capacitive touch panel PC that runs Linux or Android on an i.MX6, and offers IP69K protection. TechNexion, which has long been a provider of COMs and SBCs based on Freescale/NXP i.MX SoCs, also sells a line of Linux- and Android-friendly i.MX6, i.MX6UL, and i.MX7 based panel PCs. The latest is a 10.1 inch TWP-1010-IMX6 model that shares many of the same features of its 15.6-inch TWP-1560-IMX6 sibling, including NXP’s i.MX6 SoC, M12 connectors, and a SUS 304 stainless steel case with an IP69K water- and dust-proofing certification. Read more Also: Mongoose OS for IoT prototyping

10 Open Source Skills, Data Analysis Skills and Programming Languages

  • 10 Open Source Skills That Can Lead to Higher Pay
    Last month, The Linux Foundation and the online job board Dice released the results of a survey about open source hiring. It found that 67 percent of managers expected their hiring of open source professionals to increase more than their hiring of other types of IT workers. In addition, 42 percent of managers surveyed said they need to hire more open source talent because they were increasing their use of open source technologies, and 30 said open source was becoming core to their business. A vast majority — 89 percent — of hiring managers said that they were finding it difficult to find the open source talent they need to fill positions.
  • If you want to upgrade your data analysis skills, which programming language should you learn?
    For a growing number of people, data analysis is a central part of their job. Increased data availability, more powerful computing, and an emphasis on analytics-driven decision in business has made it a heyday for data science. According to a report from IBM, in 2015 there were 2.35 million openings for data analytics jobs in the US. It estimates that number will rise to 2.72 million by 2020. A significant share of people who crunch numbers for a living use Microsoft Excel or other spreadsheet programs like Google Sheets. Others use proprietary statistical software like SAS, Stata, or SPSS that they often first learned in school.
  • std::bind
    In digging through the ASIO C++ library examples, I came across an actual use of std::bind. Its entry in cppreference seemed like buzzword salad, so I never previously had paid it any attention.