OpenBSD Archive

OpenBSD: improper kernel bounds check; OS Fingerprinting in Firewall

OpenBSD's Todd Miller reports that an improper bounds check in the semget(2) system call can allow a local user to cause a kernel panic. No privilege escalation is possible, the attack simply runs the kernel out of memory. The bug was introduced in OpenBSD 3.3, previous versions of OpenBSD are unaffected. Earlier, Mike Frantzen has committed "Passive operating system fingerprinting" to PF which exposes the source host's OS to the filter language.

DARPA Pulls OpenBSD Funding

The open-source project's leader says the unused portion of a $2.3 million grant has been withdrawn due to concerns that it was mainly funding foreign researchers. OpenBSD would have 60 developers flying in from around the world (they bought their own tickets, non-refundable) for a Hackathon May 8 - 20, which is a major part of OpenBSD's development cycle. Follow the discussion here.

OpenBSD’s SMP Status

"An update on the current status of OpenBSD Symmetric Multiprocessor support was recently posted to the OpenBSD smp mailing list. At this time, it still looks to be quite a ways off in the future, with currently only i386-specific code that will detect and spinup a 2'nd processor, but not yet actually use it." Read the report at KernelTrap.

Theo on Security Improvements in OpenBSD

From the OpenBSD Journal: In his post, Theo deRaadt gives a brief technical overview of the four major security changes in OpenBSD: POSIX page protection schemes, WorX, read only segments, and Propolice. Not all of these are on all platforms, but every platform has some protection. To quote Theo in his message, "We feel that these 4 technologies together will be a a royal pain in the a$$ for the typical buffer overflow attacker."

OpenBSD’s Battle For UltraSparc III Documentation

In late November of 2002, OpenBSD creator Theo de Raadt announced on the project's mailing lists that after over a year of attempting to obtain useful UltraSparc III documentation, they had still not made much headway. In the email he rallied the OpenBSD community to help out, asking them to contact the people within Sun responsible for providing such information. C/Net reported on this in their story titled, Open-source clan in spat with Sun. The UltraSparc III is Sun's third generation 64-bit RISC architecture based processor.

Patching OpenBSD

"OpenBSD 3.2 is with us, and it's time to upgrade our systems to the latest release. As usual, it is strongly suggested that you install the latest release on a spare machine, apply patches, and test it until you are happy with what the OpenBSD gang gave us. Only then you should upgrade and patch the production machine. But how do you patch OpenBSD?" Read the article at OnLamp.