OpenBSD Archive

MirBSD No7 Released

MirBSD is a derivative of OpenBSD. It is i386-only, and has some packages removed (Kerberos etc.). Additional features include IPv6 support in Apache, ports for djb-ware, a new bootloader and more.

OpenBSD: improper kernel bounds check; OS Fingerprinting in Firewall

OpenBSD's Todd Miller reports that an improper bounds check in the semget(2) system call can allow a local user to cause a kernel panic. No privilege escalation is possible, the attack simply runs the kernel out of memory. The bug was introduced in OpenBSD 3.3, previous versions of OpenBSD are unaffected. Earlier, Mike Frantzen has committed "Passive operating system fingerprinting" to PF which exposes the source host's OS to the filter language.

DARPA Pulls OpenBSD Funding

The open-source project's leader says the unused portion of a $2.3 million grant has been withdrawn due to concerns that it was mainly funding foreign researchers. OpenBSD would have 60 developers flying in from around the world (they bought their own tickets, non-refundable) for a Hackathon May 8 - 20, which is a major part of OpenBSD's development cycle. Follow the discussion here.

OpenBSD’s SMP Status

"An update on the current status of OpenBSD Symmetric Multiprocessor support was recently posted to the OpenBSD smp mailing list. At this time, it still looks to be quite a ways off in the future, with currently only i386-specific code that will detect and spinup a 2'nd processor, but not yet actually use it." Read the report at KernelTrap.

Theo on Security Improvements in OpenBSD

From the OpenBSD Journal: In his post, Theo deRaadt gives a brief technical overview of the four major security changes in OpenBSD: POSIX page protection schemes, WorX, read only segments, and Propolice. Not all of these are on all platforms, but every platform has some protection. To quote Theo in his message, "We feel that these 4 technologies together will be a a royal pain in the a$$ for the typical buffer overflow attacker."