As announced by Damien Miller OpenSSH 9.6/9.6p1 has been released.The complete release notes may be found here: https://www.openssh.com/releasenotes.html#9.6.Among notable changes, this release includes a fix for the Terrapin Attack.Read more...
Theo de Raadt (deraadt@)postedto tech@ regarding restrictions on theaddresses from which system calls can be made.In addition to providing background,the post contains information (and a patch)for an imminent change - the introduction of a newsyscall,pinsyscalls(2)[link not working at the time of writing because change not yet committed],which specifies the addresses from which individualsystem calls are permitted.pinsyscalls(2) will be called only fromthe shared library linker,ld.so(1).
Asannouncedon themisc@mailing list,Otto Moerbeek (otto@),the author of OpenBSD'smalloc(3)implementation[a.k.a. "otto malloc"],has written atutorial on the newmalloc(3) leak detection available in OpenBSD 7.4Read it at:OpenBSD's built-in memory leak detectionSince the publication of that write-up,Otto hascommittedfurther enchancements:
Asannouncedon themisc@mailing list,Otto Moerbeek (otto@),the author of OpenBSD'smalloc(3)implementation[a.k.a. "otto malloc"],has written atutorial on the newmalloc(3) leak detection available in OpenBSD 7.4Read it at:OpenBSD's built-in memory leak detectionSince the publication of that write-up,Otto hascommittedfurther enhancements:
The OpenBSD project has announced the release ofOpenBSD 7.4,the 55 release of the OpenBSD operating system.The new release contains a number of innovations and improvements across a number of areas, including
Rafael Sadowski (rsadowski@)bloggedabout his participation inp2k23.Perhaps most notable is his work in portingKDEPlasma.Read all about it athttps://rsadowski.de/posts/2023-10-09-p2k23-dublin-openbsd-hackathon/.There is some further discussion of the work in a thread titled NEW: KDE Plasma (x11/kde-plasma) on the ports@ mailing list.
Version 8.6ofrpki-client, the FREE, easy-to-use implementation of the ResourcePublic Key Infrastructure (RPKI)for Relying Parties (RP),has beenreleased.This version includes new compliance checks,random shuffling of processing of Manifest entries,and [non-random!] code shuffling.See the announcement for more details.This is another hint that a new OpenBSDreleaseis about to happen, and soon.
Jay Eptinxa has published a detailed write-up,entitledE-mail Filters In C,of his work creating aspamd(8)-likegreylistingsmtpd(8)filter.Thanks to Crystal Kolipe for letting us know!
With a message from Claudio Jeker (claudio@), the OpenBSD project today announced the release of the OpenBSDBGP(Border Gateway Protocol) daemon OpenBGPD, version 8.2.The announcement reads,
ManyOpenBSDsysadminsfind thesysclean(8)portuseful for removing obsolete files following upgrades.Sebastien Marie (semarie@),theauthorof sysclean(8),has written apiecegiving an under-the-hoodlook at the operation of this handy utility.It's well worth reading for those interested in understandinghow it works!
Theo de Raadt (deraadt@) posted totech@a detailedmessageexplaining the past and (potential) future ofanti-ROPmeasures in OpenBSD.It's well worth reading its entirety.Highlights include:
Frederic Cambus (fcambus@) wrote a blogpost about running OpenBSD on the arm64-based cloudservers provided by Hetzner. For now, only -current will work,because the new viogpu(4)driver[on which wereported earlier]is needed.Head on over to Frederic's blog for the full story!
EuroBSDCon 2023has now ended,and slides for many of the OpenBSD developer presentationsare now available in theusual place.Video of the presentations can be expected somewhat later.Slides from the tutorial"Network Management with the OpenBSD Packet Filter Toolset"arealso available.
Can you really do 3D printing from OpenBSD? Cue suspenseful musicwhilst I formulate my answer, which is: Yes.If you aren't familiar with the 3D printing process, it's dividedinto several steps, vaguely analogous to writing, compiling and runninga program in a compiled language.Read more...
As alluded to with the recent"Call for testing"message on the openssh-unix-devmailing list, OpenSSH 9.4 has been released!The complete release notes may be read here:https://www.openssh.com/releasenotes.html#9.4p1
The routed IPSec mode we reported on earlier has now been committed to -current by David Gwynne (dlg@), likely to be a prominent item for the upcoming OpenBSD 7.4 release.The main log message:
Version 8.5of rpki-client,OpenBSD'simplementation of the Resource Public Key Infrastructure (RPKI)for Relying Parties (RP),has been released.Features include:
The buzzword bug of the week is Zenbleed, which affects various AMD processors and is explained in more detail here. On OpenBSD, the latest -current snapshots already have the fixes, and errata patches will go out for the supported releases (7.2 and 7.3) shortly.In a post to the tech@ list, Theo de Raadt described the situation:
As announced by Damien Miller: "We've just made an OpenSSH release to fix a remotely exploitable RCE vulnerability in ssh-agent's PKCS#11 support (CVE-2023-38408). Details at https://openssh.com/releasenotes.html#9.3p2Thanks to the Qualys Security Advisory Team for finding and reporting this bug."This appears to impact every version of OpenSSH's ssh-agent from 5.5 onwards.
Theo de Raadt (deraadt@)has updatedinnovations.htmlto include an item regarding the work which has been doneto enforce indirect branch target restriction(on theamd64[Intel]andarm64platforms).Thecommit messageprovides some detail:
An anonymous submitter reminded us that Marc Espie (espie@) posted a summary of the state of OpenBSD packages in a message to the tech mailing list with the subject pkg_*: the road forward.Marc writes,
Matthieu Herrb (matthieu@) has written some noteson his work at the (recently-concluded)g2k23 hackathonin Tallinn, Estonia.His article,Wayland on OpenBSD,starts:
A low key leak from the ongoing g2k23 hackathon comes the news thatsoft updates(akasoftdep) will, for now, be a no-opon OpenBSD-current.The commit message by Bob Beck (beck@) reads,