OpenBSD Archive

OpenBSD Widens Its Scope

Already well-regarded as a security-focused network OS, OpenBSD stands to further upgrade its reputation with ver. 3.6, which combines enhanced services with wider hardware support. OpenBSD 3.6, which was released last month, will be a good fit for companies that wish to put services at the network edge, such as firewalls & VPNs, with more flexibility than appliance-based options could provide.

OpenBSD 3.6 review

The OpenBSD team earlier this month released version 3.6 of the free operating system, with support for more hardware, updated application software, and bug fixes included. This time around OpenBSD has added support for multi-CPU systems, a number of drivers for new peripheral hardware, and about 200 more apps to the Ports tree. NewsForge took the new version for a spin, and liked what they found.

OpenBSD Works To Open Wireless Chipsets

In order to better understand why OpenBSD has decided this is important, KernelTrap approached Theo de Raadt with a few questions. In reply he fully explains the issue, talking about how successful this form of activism has been for OpenBSD in the past, and offering specifics on exactly what they are trying to accomplish. He summarizes, "the open source community has support for all the ethernet chipsets, all the scsi chipsets, all the raid chipsets, so why should we not have support for all the wireless chipsets?"

OpenBSD looking for better licenses on binary firmware for WiFi

Ryan McBride requests the help of the OpenBSD community in convincing Texas Instruments to change the license of their firmware for the ZCX100 802.11b chipset. Theo de Raadt makes a similar request directed at Intel. A success story from Theo de Raadt in using this tactic on Adaptec. This is also important for Linux and the rest of the BSDs. I had to "pirate" my Prism's firmware files in order to make the pcmcia card work with my Linuces. I don't see the point of keeping these firmware files bound.

OpenBSD’s Theo de Raadt talks software security

With security the focus of this year’s Australian Unix Users Group (AUUG) conference, OpenBSD founder and project lead Theo de Raadt was invited to speak on exploit mitigation techniques. In an exclusive interview with Computerworld's Rodney Gedda, the man behind an operating system that lays claim to only one remote exploit in the default install in seven years, reveals where we are headed – and how far we have to go – in the search for more secure software

OpenBSD 3.5 Review

The OpenBSD Project released OpenBSD 3.5 exactly on schedule on May 1, adding support for new functions and devices in the kernel and updating the base system. While it may not be the most versatile operating system in the world, OpenBSD shines when it comes to security, providing a default installation that doesn't have to be locked down and partially disabled before using it. Here's also another article on how to setup OpenBSD.

OpenBSD – For Your Eyes Only

In the following article, DistroWatch explores OpenBSD, an operating system built from the ground up with security in mind. Though not suitable for every taste, OpenBSD will no doubt save many system administrators gray hairs. Even for those not running a server, this is a very stable and powerful OS and you don't necessarily need to be paranoid (though it helps) to enjoy using it.

OpenBSD: Monolithic Simplicity

A recent thread on the OpenBSD project's misc@ mailing list discussed why OpenBSD has chosen to stick to a purely monolithic kernel, instead of trying to optimize performance by using kernel modules. As described in the OpenBSD FAQ, the OpenBSD team only supports the GENERIC kernel that is provided with the distribution. Numerous reasons were provided, including security, the ability to fully test, and simplicity.