OpenBSD Journal
Link | http://undeadly.org/ |
Feed | http://undeadly.org/cgi?action=rss |
Updated | 2024-04-25 09:18 |
on (#400ES)
Ingo Schwarze (schwarze@) writes in about fresh developments in mandoc(1):
on (#3ZFXQ)
EuroBSDcon 2018is now over, and slides for OpenBSD-related presentations are now availablefrom theusual place.As always, there's some great reading there (especially for those of uswho were unable to attend the conference).Unfortunately, there will not be any video this year.
on (#3YVBP)
Fresh from the just concluded n2k18 hackathon comes this report from Ken Westerback(krw@),who writes:
on (#3YF4S)
In ashortseriesofcommits,Carlos Cardenas (ccardenas@) added support forqcow2image support to vmd(8).[This builds on anearlier commitadding support for pluggable disk backends.]The code was written by Ori Bernstein, who posted his diffs (thread 1, thread 2) to the tech@openbsd.org mailing list in August.Read more…
on (#3Y767)
Anton Lindqvist (anton@) gave a talk atBSD Users Stockholm Meetup #3 on the kernel coverage tracing kit he committed recently.Slidesare now available via theOpenBSD Events and Papers page.The slides contain a list of bugs found and fixed as a result of this work.See also:kcov(4)
on (#3XE60)
Ken Westerback (krw@ when wearing his dev hat) wrote in withsome great news:
on (#3XD76)
In amessage to tech@,Theo de Raadt (deraadt@)gives an update on the state-of-play regarding processor vulnerabilities:
on (#3X7ZT)
Theo de Raadt (deraadt@) hascommitteda diff to mitigate the"Intel L1TF screwup" for the amd64 platform we reported on earlier:
on (#3WV26)
Theo de Raadt (deraadt@)posted to the tech@ mailing list with some background on how the latest discovered Intel CPUissues relate to OpenBSD.
on (#3WRWX)
[Dr.] Brian Callahan (bcallah@) recently live-streamed(at twitch.tv/NewAstroCity)an interactive OpenBSD Porting Workshop.A recording of the workshop isnow available.
on (#3WQ8Y)
In aseriesofcommits,Todd Mortimer (mortimer@) has added RETGUARDfor the arm64 platform.We previously reported theaddition of RETGUARD for amd64.Read more…
on (#3WNDV)
Bob Beck (beck@ when wearing OpenBSD-only hat)has writtena tutorialon using libtls:
on (#3WMPW)
Ingo Schwarze (schwarze@ when wearing OpenBSD-only hat)wrote in to let us know about the new release:
on (#3WMPX)
Patrick Wildt (patrick@) has been experimenting with small I2C and SPI-connected displays, and withthis commit, it was enabled for armv7 and arm64 platforms as ssdfb(4) in -current.Read more…
on (#3VR81)
For the g2k18 Ljubljana hackathon, i decided to try and get ridof as many small userland tasks as possible.Lots of them have been piling up over time.Read more…
on (#3VR1T)
In amessageto tech@, Theo de Raadt (deraadt@) discusses the state of development ofunveil(2)support in userland (and for a certain port):Read more…
on (#3VN1T)
A new g2k18 hackathon report has arrived, this time from Kenneth Westerback (krw@), who writes:
on (#3VF22)
Philip Guenther (guenther@)and Bryan Steele (brynet@)have added more mitigations against speculative executionCPU vulnerabilitieson the amd64 platform.Read more…
on (#3VF23)
rad(8) [as described in the g2k18 hackathonreport byFlorian Obser (florian@)]is now the only IPv6router advertisement daemon in -current, following the removal ofrtadvd(8).Advice on making the transition has beenadded to current.html
on (#3V9Y5)
Claudio Jeker (claudio@) is next up with his report from Ljubljana:
on (#3V9Y6)
Another g2k18 hackathon report has arrived, this one fromCarlos Cardenas (ccardenas@), who writes:
on (#3V5SM)
The next g2k18 report comes from Klemens Nanni (kn@), who writes:
on (#3V37A)
Fresh from the just concluded hackathon in Ljubjlana comes our next report from Florian Obser(florian@) who writes:
on (#3V10A)
Next in from Ljubljana is Matthieu Herrb (matthieu@):
on (#3V07D)
Before winning the football world cup, the french were writing their hackathon reports. Here's the one from Antoine Jacoutot (ajacoutot@):
on (#3V03B)
Theg2k18hackathon has just concluded, and already we have our first report.Marc Espie (espie@) wrote in:
on (#3TREX)
In a change which is bound to be welcomed widely, -current has gained"auto-join" for Wi-Fi networks.Peter Hessler (phessler@) has been working on this for quite some time and he wrote about it in his p2k18 hackathon report. He has committedthe work from the g2k18 hackathon in Ljubljana:
on (#3TAC7)
In this post, Paul Smith shows how to reduce buffer bloat and improve interactive traffic latencies.
on (#3SQ5Q)
Reyk Floeter (reyk@) hascommittedsupport for simple request rewrites tohttpd(8)/httpd.conf(5) [in -current]:
on (#3SN18)
As part of ongoing mitigations against CPU vulnerabilities,-current has gained a new sysctl, "hw.smt",to control Simultaneous Multi Threading (SMT).This is disabled by default (only on Intel® CPUs, for now).Read more…
on (#3SDGD)
There have been more developments in the continuing work mitigatingagainst (Intel®, and potentially other) CPU vulnerabilities…Philip Guenther (guenther@)committed the following:Read more…
on (#3SDGE)
Reyk Floeter (reyk@) hascommitteda simple LDAP client to -current:
on (#3S8PT)
Earlier this month, Philip Guenther (guenther@)committed(to amd64 -current) a change from lazy to semi-eager FPU switchingto mitigate against rumored FPU state leakagein Intel® CPUs.Theo de Raadt (deraadt@) discussed this in hisBSDCan 2018session.Using information disclosed in Theo's talk,Colin Percivaldeveloped a proof-of-concept exploit in around 5 hours.This seems to have prompted an early end to an embargo(in which OpenBSD was not involved), and theofficial announcementof the vulnerability.
on (#3S1YN)
BSDCan 2018has concluded, and materials for (some of) the OpenBSD-related tutorials andtalks can be found inthe usual place.Highlights includethe unveiling of unveil(),hinted at by Bob Beck (beck@) in hisp2k18 report,and"Speculating about Intel", by Theo de Raadt (deraadt@). [An unofficial video of the latter presentation isavailable.]At the time of writing,officialvideo recordings are not yet available.
on (#3RQRX)
Todd Mortimer (mortimer@) hascommitted"RETGUARD" for clang (for amd64).This is a new anti-ROPsecurity mechanism, which uses random per-function cookiesto protect return addresses on the stack.Read more…
on (#3RHFE)
Joel Sing (jsing@) hascommittedCrypto Simplified Interface (CSI) to -current:
on (#3QZHJ)
Gilles Chehade (gilles@) hascommitted(to -current) the newsmtpd.confgrammar discussed inhis p2k18 hackathon report.Read more…
on (#3QDW4)
Next up in the stream of p2k18 reports is one from Antoine Jacoutot (ajacoutot@):
on (#3Q4M8)
Next up in our series of p2k18 hackathon reports is from Paul Irofti (pirofti@), who writes:
on (#3Q39Y)
Peter Hessler (phessler@) writes about his time in Nantes:
on (#3Q39Z)
Eric Faurot (eric@) is next with his report on what he did in Nantes:
on (#3Q3A0)
Stefan Sperling (stsp@) kindly sent in a report on his activities around p2k18:
on (#3Q3A1)
Our next p2k18 report comes from Christian "naddy" Weisgerber, who writes:
on (#3Q3A2)
Landry Breuil (landry@) has an extensive report for our readers:
on (#3Q3A3)
Next up with a p2k18 report is Jasper Lievisse Adriaanse (jasper@):
on (#3P3YZ)
Next up with a p2k18 report is Bob Beck (beck@):
on (#3P2DG)
Next up is the report from Ken Westerback (krw@):
on (#3P1C6)
The latest p2k18 hackathon report comes from Gilles Chehade (gilles@),who writes:
on (#3P1AQ)
As more and more developers arrive back home from France, more reports arrive to you to keep you informed of what happened in Nantes. This time, it's Philip Guenther (guenther@) who writes in with his report: