"After much digging online for an effective way to stop this pesky application that is highly de-centralised and a big pain to blocked, I finally found a way to do it. It has been working perfectly fine on our corporate network, and we have had no complaints of users being denied access to legitimate web destinations (that are in compliance with our security policy of course)."
"Yesterday OpenBSD, the proactively secure Unix-like operating system, released version 3.8, featuring several improvements to networking, RAID management tools, and increased security. At openbsd.org you can download installation files or order the official three-disc CD set, which supports 16 processor architectures out of the box. I took this new release as an opportunity to perform my first ever OpenBSD install." Read more here.
"We are pleased to announce the official release of OpenBSD 3.8. This is our 18th release on CD-ROM (and 19th via FTP). We remain proud of OpenBSD's record of eight years with only a single remote hole in the default install. As in our previous releases, 3.8 provides significant improvements, including new features, in nearly all areas of the system."
"I've updated the Firewalling with PF manuscript, mainly for the tutorial I gave at the AUUG2005 conference. New sections: Info on bruteforce protection; Wireless net setup; authpf with wireless net. Updates to the spamd section and traceroute section."
OpenBSD has a brand new IPMI implementation. The ipmi term Intelligent Platform Management refers to autonomous monitoring and recovery features implemented directly in platform management hardware and firmware. The key characteristics of Intelligent Platform Management is that inventory, monitoring, logging, and recovery control functions are available independent of the main processor, BIOS, and operating system.
It's release time again for OpenBSD! The upcoming 3.8 will include some wonderful features for network gurus (trunking, tracking wireless roaming users, interface groups, a new ipsec configuration tool, and failover of ipsec links), a great rework of malloc() that will provide further security protections by default, and the first version of bioctl--a universal RAID management interface.
SecurityFocus interviews three OpenBSD developers about their network stack protection against DoS ICMP attacks, a short comparison with Linux' stack, and some thoughts on OpenBGPD.
OpenBSD developer Reyk Floeter writes in article Proactive wireless networks with hostapd(8) about his latest tool and how it can be used in wireless warfare. Defend your wireless networks from rogue nodes or "discourage" neighbours from occupying "your" frequencies.
"Theo announced on -misc today that work is in progress to add G5 support to the macppc port. G5 machines will be running in 32-bit mode but there is the possibility of a macppc64 port to follow to take advantage of these 64-bit processors. All Apple models are being targetted (iMac, Power Mac, and Xserve) so if you have such a machine and wish to run
OpenBSD NetBSD OpenBSD on it, your dreams are about to come true. As Theo stresses, this is very much a work in progress and not everything is supported or stable at this point in time."
"OpenBSD is an ultra-secure, freely available, multi-platform BSD-based UNIX-like operating system. And is arguably the most secure operating system in the world. After using OpenBSD for over 9 years I decided to place online some useful information for first time users of OpenBSD. The information here covers the current release of OpenBSD."
The framework is intentionally designed to support only the basic functionality, as it will ultimately be used to support many RAID controllers. Theo explains, "the functionality supplied is also very basic, almost minimal. But this is done like this on purpose, since we believe that we could support this functionality on all RAID controllers in the same way, without special 'but that controller is so different' mindsets entering the picture. RAID management should (and can be) be no more complicated than ifconfig managing network interfaces."
Modifying memory functions is never easy on an operating system, as a problem with memory affects everything in the system. OpenBSD developers have put out a call to help testing a new memory management system for the upcoming 3.8 release, which is tentitively set to be released this October.
"OpenBSD's Theo de Raadt has bumped the version identifier from 3.7-current to 3.8-beta in CVS HEAD. Now is an especially good time to test snapshots."
For those of you who are intrested in OpenBSD's OpenCVS, NedBSD has put an interview with Joris Vink online. Joris Vink is an OpenBSD developer who is working on OpenCVS.
At the 2005 OpenBSD hackathon, Fernando Gont proposed ways to fix a 20 year old flaw in the design of the ICMP protocol that could be used to make TCP attacks. Kerneltrap has the details.
De Raadt's team makes OpenBSD, an operating system, and OpenSSH, for secure communications. Here, he talks about why he does it, about industry use of open-source software, and about dedication to quality paying off.
Theo de Raadt is a pioneer of the open source software movement and a huge proponent of free software. But he is no fan of the open source Linux operating system. "It's terrible," De Raadt says. "Everyone is using it, and they don't realize how bad it is. And the Linux people will just stick with it and add to it rather than stepping back and saying, 'This is garbage and we should fix it.'"
Brief but wide-ranging interview with Theo in which our leader opines about the good things in 3.7: "The list of new developments is impressive, but in my view not nearly as impressive as the small little details that continue to be fixed during each development cycle."
NewsForge has a review of OpenBSD 3.7, covering some of the new features and what they do, a general overview of OpenBSD, and some suggestions for OpenBSD developers for some new features in the next release.
OpenBSD 3.7 is the first release to support newer wireless chipsets, especially for 802.11g, thanks to a big activism campaign lead by project leader Theo de Raadt. It's now possible to create a portable access point with a tiny PDA using the Zaurus port, too. As usual, there are a lot of other big and small changes, such as the import of Xorg, the jump towards gcc3, and a feature to update your installed packages automagically. Discover the details behind the scenes in this interview that Federico Biancuzzi had with several OpenBSD developers.