Tuesday, May 1, 2012

OpenBSD 5.1 released May 1, 2012

- OpenBSD 5.1 RELEASED -------------------------------------------------

May 1, 2012.

We are pleased to announce the official release of OpenBSD 5.1.
This is our 31st release on CD-ROM (and 31th via FTP). We remain
proud of OpenBSD's record of more than ten years with only two remote
holes in the default install.

As in our previous releases, 5.1 provides significant improvements,
including new features, in nearly all areas of the system:

- Improved hardware support, including:
o umsm(4) supports additional mobile broadband devices.
o Non-GigE ale(4) devices can now establish link to a GigE link partner.
o Support for Intel 82580 has been added to em(4).
o Support for MegaRAID 9240 has been added to mfi(4).
o Support for Nuvoton NCT6776F has been added to lm(4).
o Support for Centrino Advanced-N 6205 has been added to iwn(4).
o Support for SiS 1182/1183 SATA has been added to pciide(4).
o Support for Synaptics touch pads through the synaptics(4) X.Org
input driver is now enabled by default.
o Support for Intel Sandy Bridge integrated graphics cards has been
added to the intel(4) X.Org driver.
o Assembler implementation of the AES-GCM mode for new Intel and
future AMD CPUs has been added.
o usb(4) probes bus after resume, improves functionality for some laptops.

- Generic network stack improvements:
o RFC4638 MTU negotiation for pppoe(4).
o npppdctl(8) replaced with npppctl(8), written from scratch.
Includes support for IPv6 as tunnel source address.
o Improve performance (throughput and loss rate) for PPTP, pppd(8)
or L2TP(/IPsec) on unstable latency networks (eg mobile).
o Improved IPv6 fragment handling.
o Many robustness improvements for IEEE 802.11 (particularly hostap).
o Improved vlan priority support, including mapping to interface queues.
o Initial rdomains support for IPv6.
o Robustness improvements for carp(4).
o Various IPv6 and rdomain related improvements for carp(4).

- Routing daemons and other userland network improvements:
o fstat(8) now displays routing table ID and socket-splicing information
and ps can display routing table ID.
o traceroute(8) and traceroute6(8) can look up ASNs for each hop.
o snmpd(8) adds a MIB to show statistics for carp(4) interfaces.
o bgpctl(8) parses and display MRT routing table dumps.
o ntpd(8) supports multiple rdomains.
o When ospfd(8) detects route socket overflow, it now delays before
it reloads the fib.
o Improved and more consistent ToS support in various network
tools (tcpbench(8), nc(8), ping(8), traceroute(8)).
o Initial inport of login_yubikey(8) for logging in using yubikeys.

- pf(4) improvements:
o One-shot rule support for pf(4), for use with proxies via anchors.
o NAT64 support in PF using the af-to keyword.
o Much improved IPv6 fragment handling.
o Various enhancements with ICMP and especially ICMPv6 states
o Improved IPv6 Neighbor Discovery and Multicast Listener Discovery handling.
o pfctl(8) now prints port numbers instead of service names by default.
o Netflow v9 and ipfix support for pflow(4).
o Many pfsync(4) fixes and improvements including jumbo frames and
automatically requesting a bulk update after a physical interface
comes online.

- Assorted improvements:
o Improved locale support.
o Support for MSG_NOSIGNAL.
o KERN_PROC_CWD sysctl(3) for fetching the path to a process's
working directory.
o Improved fnmatch(3), glob(3), and regcomp(3) implementations
to resist DoS attacks.
o Lots of HISTORY and AUTHORS information added to manpages.
o Improved checking of file-offset wraparound.
o pwrite(2)/pwritev(2) now correctly by ignored O_APPEND.
o Improved conformance of header files with standards.
o Improved cancelation support in both user-threads (libpthread)
and rthreads.
o Improved correctness of execing, coredumping, signal delivery,
alternate signal stacks, blocking socket accepts(), mutexes
and condition variables, per-thread errno, symbol binding,
and ktracing when rthreads are in use.
o Architecture-independent kernel support for thread-control-block
handling for rthreads.
o Small improvements to Linux compat (only available on i386).
o Multiple bugs have been fixed in the Intel 10Gb driver ix(4).
o softraid(4) now supports a concatenating discipline.
o On amd64, i386, and sparc64, the root filesystem can reside in
a softraid(4) volume. The kernel needs to be booted from a
non-softraid partition.
o On amd64, the system can be booted from a softraid(4) RAID1 volume.
o aucat(1) adds a "device number" component in sndio(7) device
names, allowing a single aucat instance to handle all audio
and MIDI services.
o Built-in sndiod(1) sound daemon now uses default rate 48kHz and
the default block size 10ms. These settings ensure video players
and programs using MTC are smooth by default.
o Many updates to smtpd(8): a new scheduler_backend API introduced,
more MIME 1.0 support added, new filter callbacks for network events,
improved DNS error reporting and envelope handling, and the
purge/ directory is now cleared via a privilege-separated child.
o tmux(1) is extended to support a larger history, minimizes redundant
log messages and does some code reordering for more local and less
global variables. Support is added for the ESC[s and ESC[u
save/restore cursor-position key sequences. $HOME (or ~) may now
be used as default-path in tmux.conf.
o Enhanced cwm(1) event support, added {r,}cycleingroup to cycle
through clients belonging to the same group as the active client,
simplified color initialization.
o The mg(1) emacs-like editor: now uses absolute filenames while
pushing and popping off the stack. In dired mode: corrected
cursor movements and added missing keybindings.

- OpenSSH 6.0:
o New features:
- ssh-keygen(1): add optional checkpoints for moduli screening.
- ssh-add(1): new -k option to load plain keys (skipping
certificates).
- sshd(8): add wildcard support to PermitOpen, allowing things
like "PermitOpen localhost:*". (bz#1857)
- ssh(1): support for cancelling local and remote port forwards
via the multiplex socket. Use "ssh -O cancel -L xx:xx:xx -R
yy:yy:yy user@host" to request the cancellation of the
specified forwardings.
- support cancellation of local/dynamic forwardings from ~C commandline.
o The following significant bugs have been fixed in this release:
- ssh(1): ensure that $DISPLAY contains only valid characters
before using it to extract xauth data so that it can't be
used to play local shell metacharacter games.
- ssh(1): unbreak remote port forwarding with dynamic allocated
listen ports.
- scp(1): uppress adding '--' to remote commandlines when the
first argument does not start with '-'. Saves breakage on
some difficult-to-upgrade embedded/router platforms.
- ssh(1) and sshd(8): fix typo in IPQoS parsing: there is
no "AF14" class, but there is an "AF21" class.
- ssh(1) and sshd(8): do not permit SSH2_MSG_SERVICE_REQUEST/ACCEPT
during rekeying.
- ssh(1): skip attempting to create ~/.ssh when -F is passed.
- sshd(8): unbreak stdio forwarding when ControlPersist is
in use. (bz#1943)
- sshd(8): send tty break to pty master instead of (probably
already closed) slave side. (bz#1859)
- sftp(1): silence error spam for "ls */foo" in directory
with files. (bz#1683)
- Fixed a number of memory and file descriptor leaks.

- Over 7,000 ports, major performance and stability improvements in
the package build process
o Downloading of distfiles is simpler, can resume interrupted
download, discover file moves, and expire old files. Distfiles
mirror sites now use the new and improved method.
o Dependency handling during ports build and package creation is
at least twice as fast, twenty times as fast in pathological
cases. This also affects user scripts such as out-of-date
o More checks are done during package builds, for increased
user friendliness
o The long term process of documenting the infrastructure
is now 100% done.
o The distributed ports builder (dpb) can now clean up old
dependencies, thus helping package builds be more reproducible.
This found tens of hidden build dependencies in the ports tree already.
o The semantics of pkg_add -a have been nailed down and a few minor
bugs have been fixed.
o The arch-dependent issues are better classified, leading to
better builds on old architectures in some complicated cases.
In particular, dpb explicitly purges from memory info about
packages it cannot build and stuff that depends on it,
leading to better life on sparc and vax which have very small
data-size limits.
o dpb recognizes full builds and trims some duplicate package builds

- Many pre-built packages for each architecture:
o i386: 7229 o sparc64: 6599
o alpha: 5943 o sh: 2459
o amd64: 7181 o powerpc: 6852
o sparc: 4152 o arm: 5536
o hppa: 6159 o vax: 2199
o mips64: 5785 o mips64el: 5807

- Some highlights:
o Gnome 3.2.1 o KDE 3.5.10
o Xfce 4.8.3 o MySQL 5.1.60
o PostgreSQL 9.1.2 o Postfix 2.8.8
o OpenLDAP 2.3.43 and 2.4.26 o GHC 7.0.4
o Mozilla Firefox 3.5.19, 3.6.25 and 9.0.1
o Mozilla Thunderbird 9.0.1 o LibreOffice 3.4.5.2
o Emacs 21.4, 22.3 and 23.4 o Vim 7.3.154
o PHP 5.2.17 and 5.3.10 o Python 2.5.4, 2.7.1 and 3.2.2
o Ruby 1.8.7.357 and 1.9.3.0 o Tcl 8.5.11
o Jdk 1.7 o Mono 2.10.6
o Chromium 16.0.912.77 o Groff 1.21

- As usual, steady improvements in manual pages and other documentation.
o Base system and Xenocara manuals are now installed as source code,
making grep(1) more useful in /usr/share/man/ and /usr/X11R6/man/.
o If both formatted and source versions of manuals are installed,
man(1) automatically displays the newer version of each page.

- The system includes the following major components from outside suppliers:
o Xenocara (based on X.Org 7.6 with xserver 1.11.4 + patches,
freetype 2.4.8, fontconfig 2.8.0, Mesa 7.10.3, xterm 276,
xkeyboard-config 2.5 and more)
o Gcc 4.2.1 (+patches), 3.3.5 (+ patches) and 2.95.3 (+ patches)
o Perl 5.12.2 (+ patches)
o Our improved and secured version of Apache 1.3, with SSL/TLS
and DSO support
o OpenSSL 1.0.0f (+ patches)
o Sendmail 8.14.5, with libmilter
o Bind 9.4.2-P2 (+ patches)
o Lynx 2.8.7rel.2 with HTTPS and IPv6 support (+ patches)
o Sudo 1.7.2p8
o Ncurses 5.7
o Heimdal 0.7.2 (+ patches)
o Arla 0.35.7
o Binutils 2.15 (+ patches)
o Gdb 6.3 (+ patches)
o Less 444 (+ patches)
o Awk Aug 10, 2011 version

If you'd like to see a list of what has changed between OpenBSD 5.0
and 5.1, look at

http://www.OpenBSD.org/plus51.html

Even though the list is a summary of the most important changes
made to OpenBSD, it still is a very very long list.

------------------------------------------------------------------------
- SECURITY AND ERRATA --------------------------------------------------

We provide patches for known security threats and other important
issues discovered after each CD release. As usual, between the
creation of the OpenBSD 5.1 FTP/CD-ROM binaries and the actual 5.1
release date, our team found and fixed some new reliability problems
(note: most are minor and in subsystems that are not enabled by
default). Our continued research into security means we will find
new security problems -- and we always provide patches as soon as
possible. Therefore, we advise regular visits to

http://www.OpenBSD.org/security.html
and
http://www.OpenBSD.org/errata.html

Security patch announcements are sent to the security-announce@OpenBSD.org
mailing list. For information on OpenBSD mailing lists, please see:

http://www.OpenBSD.org/mail.html

------------------------------------------------------------------------
- CD-ROM SALES ---------------------------------------------------------

OpenBSD 5.1 is also available on CD-ROM. The 3-CD set costs $50 CDN and
is available via mail order and from a number of contacts around the
world. The set includes a colourful booklet which carefully explains the
installation of OpenBSD. A new set of cute little stickers is also
included (sorry, but our FTP mirror sites do not support STP, the Sticker
Transfer Protocol). As an added bonus, the second CD contains an audio
track, a song entitled "Bug Busters". MP3 and OGG versions of
the audio track can be found on the first CD.

Lyrics (and an explanation) for the songs may be found at:

http://www.OpenBSD.org/lyrics.html#51

Profits from CD sales are the primary income source for the OpenBSD
project -- in essence selling these CD-ROM units ensures that OpenBSD
will continue to make another release six months from now.

The OpenBSD 5.1 CD-ROMs are bootable on the following four platforms:

o i386
o amd64
o macppc
o sparc64

(Other platforms must boot from floppy, network, or other method).

For more information on ordering CD-ROMs, see:

http://www.OpenBSD.org/orders.html

The above web page lists a number of places where OpenBSD CD-ROMs
can be purchased from. For our default mail order, go directly to:

https://https.OpenBSD.org/cgi-bin/order

All of our developers strongly urge you to buy a CD-ROM and support
our future efforts. Additionally, donations to the project are
highly appreciated, as described in more detail at:

http://www.OpenBSD.org/goals.html#funding

------------------------------------------------------------------------
- OPENBSD FOUNDATION ---------------------------------------------------

For those unable to make their contributions as straightforward gifts,
the OpenBSD Foundation (http://www.openbsdfoundation.org) is a Canadian
not-for-profit corporation that can accept larger contributions and
issue receipts. In some situations, their receipt may qualify as a
business expense write-off, so this is certainly a consideration for
some organizations or businesses. There may also be exposure benefits
since the Foundation may be interested in participating in press releases.
In turn, the Foundation then uses these contributions to assist OpenBSD's
infrastructure needs. Contact the foundation directors at
directors@openbsdfoundation.org for more information.

------------------------------------------------------------------------
- T-SHIRT SALES --------------------------------------------------------

The OpenBSD distribution companies also sell tshirts and polo shirts.
And our users like them, too. We have a variety of shirts available,
with the new and old designs, from our web ordering system at, as
described above.

-----------------------------------------------------------------------
- FTP INSTALLS ---------------------------------------------------------

If you choose not to buy an OpenBSD CD-ROM, OpenBSD can be easily
installed via FTP or HTTP downloads. Typically you need a single
small piece of boot media (e.g., a boot floppy) and then the rest
of the files can be installed from a number of locations, including
directly off the Internet. Follow this simple set of instructions
to ensure that you find all of the documentation you will need
while performing an install via FTP or HTTP. With the CD-ROMs,
the necessary documentation is easier to find.

1) Read either of the following two files for a list of ftp/http
mirrors which provide OpenBSD, then choose one near you:

http://www.OpenBSD.org/ftp.html
ftp://ftp.OpenBSD.org/pub/OpenBSD/5.1/ftplist

As of Nov 1, 2011, the following ftp mirror sites have the 5.1 release:

ftp://ftp.eu.openbsd.org/pub/OpenBSD/5.1/ Stockholm, Sweden
ftp://ftp.bytemine.net/pub/OpenBSD/5.1/ Oldenburg, Germany
ftp://ftp.ch.openbsd.org/pub/OpenBSD/5.1/ Zurich, Switzerland
ftp://ftp.fr.openbsd.org/pub/OpenBSD/5.1/ Paris, France
ftp://ftp5.eu.openbsd.org/pub/OpenBSD/5.1/ Vienna, Austria
ftp://mirror.aarnet.edu.au/pub/OpenBSD/5.1/ Brisbane, Australia
ftp://ftp.usa.openbsd.org/pub/OpenBSD/5.1/ CO, USA
ftp://ftp5.usa.openbsd.org/pub/OpenBSD/5.1/ CA, USA
ftp://obsd.cec.mtu.edu/pub/OpenBSD/5.1/ Michigan, USA

The release is also available at the master site:

ftp://ftp.openbsd.org/pub/OpenBSD/5.1/ Alberta, Canada

However it is strongly suggested you use a mirror.

Other mirror sites may take a day or two to update.

2) Connect to that ftp mirror site and go into the directory
pub/OpenBSD/5.1/ which contains these files and directories.
This is a list of what you will see:

ANNOUNCEMENT armish/ mvme68k/ sparc64/
Changelogs/ ftplist mvme88k/ src.tar.gz
HARDWARE hp300/ packages/ sys.tar.gz
PACKAGES hppa/ ports.tar.gz tools/
PORTS i386/ root.mail vax/
README landisk/ sgi/ xenocara.tar.gz
alpha/ mac68k/ socppc/ zaurus/
amd64/ macppc/ sparc/

It is quite likely that you will want at LEAST the following
files which apply to all the architectures OpenBSD supports.

README - generic README
HARDWARE - list of hardware we support
PORTS - description of our "ports" tree
PACKAGES - description of pre-compiled packages
root.mail - a copy of root's mail at initial login.
(This is really worthwhile reading).

3) Read the README file. It is short, and a quick read will make
sure you understand what else you need to fetch.

4) Next, go into the directory that applies to your architecture,
for example, i386. This is a list of what you will see:

INSTALL.i386 cd51.iso floppyB51.fs pxeboot*
INSTALL.linux cdboot* floppyC51.fs xbase51.tgz
MD5 cdbr* game51.tgz xetc51.tgz
base51.tgz cdemu51.iso index.txt xfont51.tgz
bsd* comp51.tgz install51.iso xserv51.tgz
bsd.mp* etc51.tgz man51.tgz xshare51.tgz
bsd.rd* floppy51.fs misc51.tgz

If you are new to OpenBSD, fetch _at least_ the file INSTALL.i386
and the appropriate floppy*.fs or install51.iso files. Consult the
INSTALL.i386 file if you don't know which of the floppy images
you need (or simply fetch all of them).

If you use the install51.iso file (roughly 250MB in size), then you
do not need the various *.tgz files since they are contained on that
one-step ISO-format install CD.

5) If you are an expert, follow the instructions in the file called
README; otherwise, use the more complete instructions in the
file called INSTALL.i386. INSTALL.i386 may tell you that you
need to fetch other files.

6) Just in case, take a peek at:

http://www.OpenBSD.org/errata.html

This is the page where we talk about the mistakes we made while
creating the 5.1 release, or the significant bugs we fixed
post-release which we think our users should have fixes for.
Patches and workarounds are clearly described there.

Note: If you end up needing to write a raw floppy using Windows,
you can use "fdimage.exe" located in the pub/OpenBSD/5.1/tools
directory to do so.

------------------------------------------------------------------------
- X.ORG FOR MOST ARCHITECTURES -----------------------------------------

X.Org has been integrated more closely into the system. This release
contains X.Org 7.6. Most of our architectures ship with X.Org, including
amd64, sparc, sparc64 and macppc. During installation, you can install
X.Org quite easily. Be sure to try out xdm(1) and see how we have
customized it for OpenBSD.

------------------------------------------------------------------------
- PORTS TREE -----------------------------------------------------------

The OpenBSD ports tree contains automated instructions for building
third party software. The software has been verified to build and
run on the various OpenBSD architectures. The 5.1 ports collection,
including many of the distribution files, is included on the 3-CD
set. Please see the PORTS file for more information.

Note: some of the most popular ports, e.g., the Apache web server
and several X applications, come standard with OpenBSD. Also, many
popular ports have been pre-compiled for those who do not desire
to build their own binaries (see BINARY PACKAGES, below).

------------------------------------------------------------------------
- BINARY PACKAGES WE PROVIDE -------------------------------------------

A large number of binary packages are provided. Please see the PACKAGES
file (ftp://ftp.OpenBSD.org/pub/OpenBSD/5.1/PACKAGES) for more details.

------------------------------------------------------------------------
- SYSTEM SOURCE CODE ---------------------------------------------------

The CD-ROMs contain source code for all the subsystems explained
above, and the README (ftp://ftp.OpenBSD.org/pub/OpenBSD/5.1/README)
file explains how to deal with these source files. For those who
are doing an FTP install, the source code for all four subsystems
can be found in the pub/OpenBSD/5.1/ directory:

xenocara.tar.gz ports.tar.gz src.tar.gz sys.tar.gz

------------------------------------------------------------------------
- THANKS ---------------------------------------------------------------

Ports tree and package building by Jasper Lievisse Adriaanse,
Landry Breuil, Michael Erdely, Stuart Henderson, Peter Hessler,
Paul Irofti, Antoine Jacoutot, Robert Nagy, and Christian Weisgerber.
System builds by Theo de Raadt, Mark Kettenis, and Miod Vallat.
X11 builds by Todd Fries and Miod Vallat. ISO-9660 filesystem
layout by Theo de Raadt.

We would like to thank all of the people who sent in bug reports, bug
fixes, donation cheques, and hardware that we use. We would also like
to thank those who pre-ordered the 5.1 CD-ROM or bought our previous
CD-ROMs. Those who did not support us financially have still helped
us with our goal of improving the quality of the software.

Our developers are:

Alexander Bluhm, Alexander Hall, Alexander Schrijver,
Alexander Yurchenko, Alexandr Shadchin, Alexandre Ratchov,
Anil Madhavapeddy, Anthony J. Bentley, Antoine Jacoutot,
Ariane van der Steldt, Austin Hook, Benoit Lecocq, Bernd Ahlers,
Bob Beck, Bret Lambert, Bryan Steele, Camiel Dobbelaar,
Can Erkin Acar, Charles Longeau, Chris Kuethe, Christian Weisgerber,
Christiano F. Haesbaert, Claudio Jeker, Dale Rahn, Damien Bergamini,
Damien Miller, Darren Tucker, David Coppa, David Gwynne, David Hill,
David Krause, Edd Barrett, Eric Faurot, Federico G. Schwindt,
Felix Kronlage, Gilles Chehade, Giovanni Bechis, Gleydson Soares,
Henning Brauer, Ian Darwin, Igor Sobrado, Ingo Schwarze,
Jacek Masiulaniec, Jakob Schlyter, Janne Johansson, Jason George,
Jason McIntyre, Jason Meltzer, Jasper Lievisse Adriaanse,
Jeremy Evans, Jim Razmus II, Joel Knight, Joel Sing, Joerg Zinke,
Jolan Luff, Jonathan Armani, Jonathan Gray, Jonathan Matthew,
Jordan Hargrave, Joshua Elsasser, Joshua Stein, Kenji Aoyama,
Kenneth R Westerback, Kevin Lo, Kevin Steves, Kurt Miller,
Landry Breuil, Laurent Fanis, Luke Tymowski, Marc Espie,
Marco Pfatschbacher, Marcus Glocker, Mark Kettenis, Mark Lumsden,
Mark Uemura, Markus Friedl, Martin Pieuchot, Martynas Venckus,
Mats O Jansson, Matthew Dempsky, Matthias Kilian, Matthieu Herrb,
Michael Erdely, Mike Belopuhov, Mike Larkin, Miod Vallat,
Nayden Markatchev, Nicholas Marriott, Nick Holland, Nigel Taylor,
Nikolay Sturm, Okan Demirmen, Otto Moerbeek, Owain Ainsworth,
Pascal Stumpf, Paul de Weerd, Paul Irofti, Peter Hessler,
Peter Valchev, Philip Guenther, Pierre-Emmanuel Andre,
Pierre-Yves Ritschard, Remi Pointel, Reyk Floeter, Robert Nagy,
Ryan Freeman, Ryan Thomas McBride, Sasano, Sebastian Benoit,
Sebastian Reitenbach, Simon Bertrang, Simon Perreault,
Stefan Sperling, Stephan A. Rickauer, Steven Mestdagh,
Stuart Cassoff, Stuart Henderson, Takuya Asada, Ted Unangst,
Theo de Raadt, Thordur I Bjornsson, Tobias Stoeckmann,
Tobias Weingartner, Todd C. Miller, Todd Fries, Uwe Stuehler,
Will Maier, William Yodlowsky, Yasuoka Masahiko, Yojiro Uo

Saturday, April 21, 2012

Announce: OpenSSH 6.0 released

OpenSSH 6.0 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
http://www.openssh.com/donations.html

Changes since OpenSSH 5.9
=========================

This is primarily a bugfix release.

Features:

* ssh-keygen(1): Add optional checkpoints for moduli screening
* ssh-add(1): new -k option to load plain keys (skipping certificates)
* sshd(8): Add wildcard support to PermitOpen, allowing things like
"PermitOpen localhost:*". bz #1857
* ssh(1): support for cancelling local and remote port forwards via the
multiplex socket. Use ssh -O cancel -L xx:xx:xx -R yy:yy:yy user@host"
to request the cancellation of the specified forwardings
* support cancellation of local/dynamic forwardings from ~C commandline

Bugfixes:

* ssh(1): ensure that $DISPLAY contains only valid characters before
using it to extract xauth data so that it can't be used to play local
shell metacharacter games.
* ssh(1): unbreak remote portforwarding with dynamic allocated listen ports
* scp(1): uppress adding '--' to remote commandlines when the first
argument does not start with '-'. saves breakage on some
difficult-to-upgrade embedded/router platforms
* ssh(1)/sshd(8): fix typo in IPQoS parsing: there is no "AF14" class,
but there is an "AF21" class
* ssh(1)/sshd(8): do not permit SSH2_MSG_SERVICE_REQUEST/ACCEPT during
rekeying
* ssh(1): skip attempting to create ~/.ssh when -F is passed
* sshd(8): unbreak stdio forwarding when ControlPersist is in use; bz#1943
* sshd(1): send tty break to pty master instead of (probably already
closed) slave side; bz#1859
* sftp(1): silence error spam for "ls */foo" in directory with files;
bz#1683
* Fixed a number of memory and file descriptor leaks

Portable OpenSSH:

* Add a new privilege separation sandbox implementation for Linux's
new seccomp sandbox, automatically enabled on platforms that support
it. (Note: privilege separation sandboxing is still experimental)
* Fix compilation problems on FreeBSD, where libutil contained openpty()
but not login().
* ssh-keygen(1): don't fail in -A on platforms that don't support ECC
* Add optional support for LDNS, a BSD licensed DNS resolver library
which supports DNSSEC
* Relax OpenSSL version check to allow running OpenSSH binaries on
systems with OpenSSL libraries with a newer "fix" or "patch" level
than the binaries were originally compiled on (previous check only
allowed movement within "patch" releases). bz#1991
* Fix builds using contributed Redhat spec file. bz#1992

Checksums:
==========

- SHA1 (openssh-6.0.tar.gz) = 5d30aba0423c44e89924bb44c5d2153635506a9f
- SHA1 (openssh-6.0p1.tar.gz) = f691e53ef83417031a2854b8b1b661c9c08e4422

Reporting Bugs:
===============

- Please read http://www.openssh.com/report.html
Security bugs should be reported directly to openssh@openssh.com

OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and
Ben Lindstrom.

[FreeBSD-Announce] [announce@lists.nycbug.org: [announce] proposed announce for mirrors]

New York City *BSD User Group (NYC*BUG) is proud to announce the
launching of multiple mirrors serving the BSD and open source community.

The mirrors, hosted in a cabinet donated by New York Internet, include the
following official mirrors:

* DragonFlyBSD

* OpenBSD

* m0n0wall, a FreeBSD-based firewall distribution customized for embedded
devices

* The Tor Project, an open source public anonymity network

* BHyVe images, a FreeBSD-based type 2 Hypervisor virtualization created by
NetApp developers, with the images maintained by Michael Dexter of Call for
Testing (callfortesting.org)

The mirrors are located at http://mirrors.nycbug.org, and are accessible
over http, ftp and rsync protocols.

NYC*BUG looks forward to expanding the mirrors to include other projects
relevant to the BSD community in the future. For inquiries, please contact
mirror-admin@nycbug.org.

The NYC*BUG cabinet hosts a variety of other BSD projects, including a
server for the BSD Certification Group, BSD.lv, a build server for FreeBSD's
Sparc64 ports in addition to an array of mailing lists.

The cabinet is composed of hardware donated by an array of NYC*BUG members.

NYC*BUG (http://www.nycbug.org) was launched in 2003 to serve and expand the
BSD community in the New York metropolitan area. NYC*BUG hosts monthly
meetings, in addition to bi-annual conferences in Manhattan.
_______________________________________________
announce mailing list
announce@lists.nycbug.org
http://lists.nycbug.org/mailman/listinfo/announce

----- End forwarded message -----

--

- (2^(N-1))
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

Wednesday, April 18, 2012

[FreeBSD-Announce] FreeBSD 8.3-RELEASE Available

The FreeBSD Release Engineering Team is pleased to announce the availability
of FreeBSD 8.3-RELEASE. This is the fourth release from the 8-STABLE
branch which improves on the functionality of FreeBSD 8.2 and introduces some
new features. Some of the highlights:

- usb(4) now supports the USB packet filter
- TCP/IP stack now supports the mod_cc(9) pluggable congestion
control framework
- graid(8) GEOM class added to support various BIOS-based software
RAID controllers (replacement for ataraid(4))
- ZFS subsystem updated to SPA version 28
- Gnome version 2.32.1, KDE version 4.7.4

For a complete list of new features and known problems, please see the
online release notes and errata list, available at:

http://www.FreeBSD.org/releases/8.3R/relnotes.html
http://www.FreeBSD.org/releases/8.3R/errata.html

For more information about FreeBSD release engineering activities,
please see:

http://www.FreeBSD.org/releng/

Availability
-------------

FreeBSD 8.3-RELEASE is now available for the amd64, i386, pc98,
and sparc64 architectures.

FreeBSD 8.3 can be installed from bootable ISO images or over the
network. Some architectures (currently amd64 and i386) also support
installing from a USB memory stick. The required files can be downloaded
via FTP or BitTorrent as described in the sections below. While some
of the smaller FTP mirrors may not carry all architectures, they will
all generally contain the more common ones such as amd64 and i386.

MD5 and SHA256 hashes for the release ISO and memory stick images are
included at the bottom of this message.

The purpose of the images provided as part of the release are as follows:

dvd1: This contains everything necessary to install the base FreeBSD
operating system, a collection of pre-built packages, and the
documentation. It also supports booting into a "livefs" based
rescue mode. This should be all you need if you can burn
and use DVD-sized media.

disc1: This contains the base FreeBSD operating system and the
English documentation package for CDROM-sized media. There are
no other packages.

livefs: This contains support for booting into a "livefs" based
rescue mode but does not support doing an install from the
CD itself. It is meant to help rescue an existing system
but could be used to do a network based install if necessary.

bootonly: This supports booting a machine using the CDROM drive but
does not contain the support for installing FreeBSD from the
CD itself. You would need to perform a network based install
(e.g. from an FTP server) after booting from the CD.

memstick: This can be written to an USB memory stick (flash drive) and
used to do an install on machines capable of booting off USB
drives. It also supports booting into a "livefs" based rescue
mode. The documentation packages are provided but no other
packages.

As one example of how to use the memstick image, assuming the USB drive
appears as /dev/da0 on your machine something like this should work:

# dd if=FreeBSD-8.3-RELEASE-amd64-memstick.img of=/dev/da0 bs=10240 conv=sync

Be careful to make sure you get the target (of=) correct.

FreeBSD 8.3-RELEASE can also be purchased on CD-ROM or DVD from several
vendors. One of the vendors that will be offering FreeBSD 8.3-based
products is:

~ FreeBSD Mall, Inc. http://www.freebsdmall.com/

BitTorrent
----------

8.3-RELEASE ISOs are available via BitTorrent. A collection of torrent
files to download the images is available at:

http://torrents.freebsd.org:8080/

FTP
---

At the time of this announcement the following FTP sites have
FreeBSD 8.3-RELEASE available.

ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp5.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp7.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp10.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp.cn.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp.cz.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp.dk.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp.fr.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp.jp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp.ru.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp1.ru.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp.tw.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp4.tw.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp5.us.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/
ftp://ftp10.us.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.3/

However before trying these sites please check your regional mirror(s)
first by going to:

ftp://ftp.<yourdomain>.FreeBSD.org/pub/FreeBSD

Any additional mirror sites will be labeled ftp2, ftp3 and so on.

More information about FreeBSD mirror sites can be found at:

http://www.FreeBSD.org/doc/en_US.ISO8859-1/books/handbook/mirrors-ftp.html

For instructions on installing FreeBSD or updating an existing machine
to 8.3-RELEASE please see:

http://www.FreeBSD.org/release/8.3R/installation.html

Support
-------

The FreeBSD Security Team currently plans to support FreeBSD 8.3 until
April 30, 2014. For more information on the Security Team and their
support of the various FreeBSD branches see:

http://www.freebsd.org/security/

Acknowledgments
---------------

Many companies donated equipment, network access, or man-hours to
support the release engineering activities for FreeBSD 8.3 including
The FreeBSD Foundation, Yahoo!, NetApp, Internet Systems Consortium,
Sentex Communications, New York Internet, Juniper Networks, and
iXsystems.

The release engineering team for 8.3-RELEASE includes:

Ken Smith <kensmith@FreeBSD.org> Release Engineering,
amd64, i386, sparc64 Release Building,
Mirror Site Coordination
Robert Watson <rwatson@FreeBSD.org> Release Engineering, Security
Konstantin Belousov <kib@FreeBSD.org> Release Engineering
Marc Fonvieille <blackend@FreeBSD.org> Release Engineering, Documentation
Josh Paetzel <jpaetzel@FreeBSD.org> Release Engineering
Hiroki Sato <hrs@FreeBSD.org> Release Engineering, Documentation
Bjoern Zeeb <bz@FreeBSD.org> Release Engineering
Takahashi Yoshihiro <nyan@FreeBSD.org> PC98 Release Building
Joe Marcus Clarke <marcus@FreeBSD.org> Package Building
Erwin Lansing <erwin@FreeBSD.org> Package Building
Mark Linimon <linimon@FreeBSD.org> Package Building
Pav Lucistnik <pav@FreeBSD.org> Package Building
Ion-Mihai Tetcu <itetcu@FreeBSD.org> Package Building
Martin Wilke (miwi@FreeBSD.org> Package Building
Colin Percival <cperciva@FreeBSD.org> Security Officer

Trademark
---------

FreeBSD is a registered trademark of The FreeBSD Foundation.

ISO Image Checksums
-------------------

MD5 (FreeBSD-8.3-RELEASE-amd64-bootonly.iso) = b1e776a82deabaf66a91293b04107277
MD5 (FreeBSD-8.3-RELEASE-amd64-disc1.iso) = cf4edae9692f560e9cab89c8347886f5
MD5 (FreeBSD-8.3-RELEASE-amd64-dvd1.iso) = 70089656058e74962cbedad1a2181daa
MD5 (FreeBSD-8.3-RELEASE-amd64-livefs.iso) = 24e1a8d3c02c230fe415408179f90dbc
MD5 (FreeBSD-8.3-RELEASE-amd64-memstick.img) = 013612ac4e080028b5f4e2c344250850

MD5 (FreeBSD-8.3-RELEASE-i386-bootonly.iso) = 2fa59569f572abe450fce6b5efddeb04
MD5 (FreeBSD-8.3-RELEASE-i386-disc1.iso) = 00fac17d95d27950e30b22e521c45da9
MD5 (FreeBSD-8.3-RELEASE-i386-dvd1.iso) = 2478c6a7477492c347e80aaf61f48cc1
MD5 (FreeBSD-8.3-RELEASE-i386-livefs.iso) = 147db14848518808deddf3c0b03694c3
MD5 (FreeBSD-8.3-RELEASE-i386-memstick.img) = 5cbbe6f41e53eb98471c3392eb1bb768

MD5 (FreeBSD-8.3-RELEASE-pc98-bootonly.iso) = 91843c5c9dbdf1d1be23eae30b0184b8
MD5 (FreeBSD-8.3-RELEASE-pc98-disc1.iso) = e84f3d26d72a37ae332b617e8122bec4
MD5 (FreeBSD-8.3-RELEASE-pc98-livefs.iso) = 4a441695c30c446308d7ee55d1ead1bc

MD5 (FreeBSD-8.3-RELEASE-sparc64-bootonly.iso) = b94f5c9b07fdc1870cd284e168b557d8
MD5 (FreeBSD-8.3-RELEASE-sparc64-disc1.iso) = 8b748240afe7a3f80cdf531f7d8a1317
MD5 (FreeBSD-8.3-RELEASE-sparc64-dvd1.iso) = 3ea38fd60444193c3d74d2b0beba14a4
MD5 (FreeBSD-8.3-RELEASE-sparc64-livefs.iso) = 317325d88a8605ae5a48447f92c5f919

SHA256 (FreeBSD-8.3-RELEASE-amd64-bootonly.iso) = 2af20d98b02a26ebe9a3ddeb4785f317e2024f9494ca3a177edafdc8ef138b7d
SHA256 (FreeBSD-8.3-RELEASE-amd64-disc1.iso) = 26d4870f3a310a95e488ed14dd8e36eb52e857878f2b238b3b91e65c101eee93
SHA256 (FreeBSD-8.3-RELEASE-amd64-dvd1.iso) = acd9127364c759c4eb38fd02634f52bffe75b845a767a20f7dbf022a1626eed7
SHA256 (FreeBSD-8.3-RELEASE-amd64-livefs.iso) = cb3dcd38ce4e3782059ea6d550a947a69c47bf167c6ae24f1cd58c5b4132697b
SHA256 (FreeBSD-8.3-RELEASE-amd64-memstick.img) = eb598fa93b553744bd79e6b648b87b20f9054f7c131856c09ee2f88f29ccca6d

SHA256 (FreeBSD-8.3-RELEASE-i386-bootonly.iso) = e701dee1458888bee1a399937f1ec525022a225b8b097bd820ed4338e0bf300d
SHA256 (FreeBSD-8.3-RELEASE-i386-disc1.iso) = a83919b5104d8ec4e905693a6bd6b90b88b1c30923029146d1dab62b62a038e9
SHA256 (FreeBSD-8.3-RELEASE-i386-dvd1.iso) = 3f3334a1e4f3d3f62ef274861764d466b44e19cc14549e6cdfdbd555808d78e2
SHA256 (FreeBSD-8.3-RELEASE-i386-livefs.iso) = d45352262d7f9d871d25d01fab3c9a946ef4488f5fbbd104e153f04ca58d5b24
SHA256 (FreeBSD-8.3-RELEASE-i386-memstick.img) = 56f4fc14ebe66dad5691ca63fa846e5d003efb630e5cb0181921ffb8af5a4edd

SHA256 (FreeBSD-8.3-RELEASE-pc98-bootonly.iso) = 664b06c1a68352be8833b90ee455cbc31dfea531b7dd5f648d48659da60e386d
SHA256 (FreeBSD-8.3-RELEASE-pc98-disc1.iso) = 1a54d5cbd6e72d740f7bf6372c58fb8caa5bb49d6c56358e18fe7433103bbb4f
SHA256 (FreeBSD-8.3-RELEASE-pc98-livefs.iso) = 5b8887aee9c80914ece956452fd5e48eb759232d56cb4fff557e7cc60daab58b

SHA256 (FreeBSD-8.3-RELEASE-sparc64-bootonly.iso) = e7ba76bbecff1b92d00caed5e644443b596f6a0fee4d717046aae73c4c5248c2
SHA256 (FreeBSD-8.3-RELEASE-sparc64-disc1.iso) = f5d4087a0a070a05ad2cd9032fdc3a49fff2f716b7485debc25ae6757e29ca90
SHA256 (FreeBSD-8.3-RELEASE-sparc64-dvd1.iso) = a697afe3e47250fa707b54021b5114aa0e286f088a5c89dfb6e1b2f51dd7bb67
SHA256 (FreeBSD-8.3-RELEASE-sparc64-livefs.iso) = a5af66e2ad1042676a157c94f3d63e118761435abd26d8b5dd66e99bdc830526

Friday, March 16, 2012

[FreeBSD-Announce] The FreeBSD Foundation is Requesting Project Proposal Submissions

Dear FreeBSD Community,

The FreeBSD Foundation is pleased to announce we are soliciting the
submission of proposals for work relating to any of the major subsystems
or infrastructure within the FreeBSD operating system. Proposals
will be evaluated based on desirability, technical merit and
cost-effectiveness.

To find out more about the proposal process please read Project Proposal
Procedures at:

http://www.freebsdfoundation.org/documents/FreeBSD%20Foundation%20Proposals%20March%202012.pdf.

This is is your chance to get funding to help improve FreeBSD!


Sincerely,

The FreeBSD Foundation

_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

Tuesday, March 13, 2012

pre-orders activate for OpenBSD 5.1

OpenBSD says:
It is that time again. I have just activated pre-orders for CDs,
tshirts, and posters for the 5.1 release -- due May 1.

http://openbsd.org/orders.html

At the same time, I am making available the song that will come out
with the release (hmm, it is still moving out to the ftp mirrors at
the moment, but that is ok). The song and details of it are linked
from:

http://openbsd.org/lyrics.html

And there is something else. Five years ago we made available an
Audio CD that contained 5 years of songs. Well, we have made a new
audio CD since enough new songs have been made. It is not very
expensive, so please consider buying this as well when you place any
order. It has some rather nice liner notes. Had some great fun
coming up with the cover for that CD:

http://openbsd.org/images/cdaudio2.gif

I'd also like you remind you that Michael Lucas new "SSH Mastery" book
is also now available, in case anyone was waiting for the 5.1 release
to place one order.

http://openbsd.org/books.html#book9

Please consider purchasing these items and/or making a donation, since
this is a very important revenue source which keeps the project going.

Tuesday, March 6, 2012

[FreeBSD-Announce] Foundation Funds Project to Grow Filesystems Online

The FreeBSD Foundation is pleased to announce that Edward Tomasz
Napierala has been awarded a grant to implement the ability to grow
filesystems while they are mounted.

"Users of FreeBSD in a virtualized environment will be pleased with
the increased ease of deployment afforded by the ability to grow
mounted filesystems," said Ed Maste, Director, The FreeBSD Foundation.

This project will add GEOM and filesystem changes that are necessary to
increase the size of both UFS and ZFS filesystems while a filesystem
is mounted read-write. This project will provide the additional
benefit of online provisioning of virtual instances.

The Foundation is pleased to be working with Edward again. He
was previously awarded a grant to implement resource containers
and a simple per-jail resource limits mechanism. This work was
included in FreeBSD 9.0 RELEASE.

This project is expected to be completed by October 2012.
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] HEADS UP: FreeBSD 7.3 EoL coming soon

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello Everyone,

On March 31st, FreeBSD 7.3 will reach its End of Life and will no longer
be supported by the FreeBSD Security Team. Users of FreeBSD 7.3 are
strongly encouraged to upgrade to FreeBSD 7.4, FreeBSD 8.1, FreeBSD 8.2,
or FreeBSD 9.0 before the that date.

Please note that due to the unexpectedly long interval between FreeBSD 8.2
and the upcoming FreeBSD 8.3, the EoL date for FreeBSD 8.2 (originaly set
at February 29, 2012) has been postponed until July 31, 2012 in keeping
with the policy of having a three-month "upgrade window". In the unlikely
event that FreeBSD 8.3-RELEASE arrives later than the end of April, the
EoL dates for FreeBSD 8.1 and 8.2 will be further postponed.

The current supported branches and expected EoL dates are:

+---------------------------------------------------------------------+
| Branch | Release | Type | Release date | Estimated EoL |
|-----------+------------+--------+-----------------+-----------------|
|RELENG_7 |n/a |n/a |n/a |February 28, 2013|
|-----------+------------+--------+-----------------+-----------------|
|RELENG_7_3 |7.3-RELEASE |Extended|March 23, 2010 |March 31, 2012 |
|-----------+------------+--------+-----------------+-----------------|
|RELENG_7_4 |7.4-RELEASE |Extended|February 24, 2011|February 28, 2013|
|-----------+------------+--------+-----------------+-----------------|
|RELENG_8 |n/a |n/a |n/a |last release + 2y|
|-----------+------------+--------+-----------------+-----------------|
|RELENG_8_1 |8.1-RELEASE |Extended|July 23, 2010 |July 31, 2012 |
|-----------+------------+--------+-----------------+-----------------|
|RELENG_8_2 |8.2-RELEASE |Normal |February 24, 2011|July 31, 2012 |
|-----------+------------+--------+-----------------+-----------------|
|RELENG_9 |n/a |n/a |n/a |last release + 2y|
|-----------+------------+--------+-----------------+-----------------|
|RELENG_9_0 |9.0-RELEASE |Normal |January 10, 2012 |January 31, 2013 |
+---------------------------------------------------------------------+

- --
Colin Percival
Security Officer, FreeBSD | freebsd.org | The power to serve
Founder / author, Tarsnap | tarsnap.com | Online backups for the truly paranoid
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.18 (FreeBSD)

iEYEARECAAYFAk9WFXQACgkQFdaIBMps37J6KgCbBJDCOI8nekcEeOvfceRBZ6wB
RO0AnjodgSFb8//a0M1clLcQ764qS3co
=HTwe
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

Monday, March 5, 2012

[FreeBSD-Announce] Please Join Us in Welcoming George Neville-Neil!

The FreeBSD Foundation is pleased to announce the addition of George
Neville-Neil to its board of directors.

George has been dabbling in the BSD world since his undergraduate days
in the mid-1980s. He was granted his commit bit in 2004, and has served
two terms on the FreeBSD Core team between 2006 and 2010.

In 2011, he started organizing the semi-annual FreeBSD Vendor Summits
that gather commercial customers of FreeBSD along with project members
in order to facilitate the movement of technologies between the Project
and its customers.

George co-authored "The Design and Implementation of the FreeBSD
Operating System." His technical contributions are mostly within the
FreeBSD network stack with occasional forays into other parts of the
system.

"The Foundation is at a pivotal point in our growth as a company," said
Deb Goodkin, Secretary/Treasurer, The FreeBSD Foundation. "We believe
with George's previous and current involvement in FreeBSD, that he will
be a significant contributor in helping us achieve our ambitious goals
this year."
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

Friday, March 2, 2012

[FreeBSD-Announce] Announcing EuroBSDcon 2012

EuroBSDcon 2012
===============

EuroBSDcon is the European technical conference for users and
developers on BSD-based systems. The EuroBSDcon 2012 conference
will be held in Warsaw, Poland from Thursday 18 October 2012
to Sunday 21 October 2012, with tutorials on Thursday and Friday
and talks on Saturday and Sunday.

Call for Proposals
------------------

The EuroBSDcon conference is inviting developers and users of
BSD-based systems to submit innovative and original papers not
submitted to other European conferences on BSD-related topics.

Topics of interest to the conference include, but are not limited
to applications, architecture, implementation, performance and
security of BSD-based operating systems, as well as topics
concerning the economic or organizational aspects of BSD use.

Presentations are expected to be 45 minutes.

Call for Tutorial Proposals
---------------------------

The EuroBSDcon conference is inviting qualified practitioners in
their field to submit proposals for half or full day tutorials on
topics relevant to development, implementation and use of BSD-based
systems.

Submission address
------------------

Proposals should be submitted by email to <submission@eurobsdcon.org>.

Important dates
---------------

The EuroBSDcon conference is accepting abstracts and tutorial
proposals until 20 May 2012. Other important dates will be
announced soon at the conference website http://2012.eurobsdcon.org/.

--
Pawel Jakub Dawidek http://www.wheelsystems.com
FreeBSD committer http://www.FreeBSD.org
Am I Evil? Yes, I Am! http://tupytaj.pl

Thursday, March 1, 2012

[FreeBSD-Announce] Foundation Announces NAND File System for FreeBSD Project

The FreeBSD Foundation is pleased to announce that Semihalf, an
embedded solutions company, has been awarded a grant to bring their
comprehensive NAND Flash file system and storage stack to FreeBSD.
This technology enables FreeBSD to natively manage NAND Flash
devices, satisfying a crucial requirement for many applications
needing access to fast, reliable, non-volatile storage.

FreeBSD is widely used as the OS foundation of embedded appliances
both small and large. Semihalf's NAND Flash stack opens new
opportunities for FreeBSD in this space, where size, cost, or
performance, mandate the use of direct attached NAND Flash.

Made possible by matching funds from Juniper Networks, this FreeBSD
Foundation grant covers the costs of transferring technology
developed for Juniper Networks by Semihalf to the FreeBSD
project. This will ensure that the NAND framework meets
community standards and can be easily maintained and enhanced.

Highlighting the return on investment offered by this kind of
technology transfer, FreeBSD Foundation president Justin T. Gibbs,
noted:

"Open sourcing enhancements that do not expose 'business critical
intellectual property' reduces the cost of managing a FreeBSD
distribution that has been customized for a product. The NAND
subsystem is a perfect example of how technology transfer
benefits both the FreeBSD community and its commercial users.
We'd like to thank Semihalf and Juniper for partnering with us
to make the code available under a BSD license"

The NAND Flash subsystem consists of a driver framework for NAND
controllers and memory chips, a NAND device simulator and a fault
tolerant, log-structured file system, tailored to meet the unique
challenges of NAND flash storage. The package includes all the
tools, utilities and documentation needed to deploy this technology
in custom applications.

"A reliable file system that supports NAND Flash is critical for
Juniper's ongoing success," said Marcel Moolenaar, Distinguished
Engineer, Juniper Networks. "But since storage isn't Juniper's core
business, we were eager to find a solution that would put the
implementation and support of the file system in the most
capable hands. We reached out to Semihalf and ultimately the
Foundation to help us achieve our goals. Juniper cannot be more
pleased to have the NAND Flash file system and NAND Flash
framework present in the next major FreeBSD version as a
standard feature and under the care of the community."

"We are very glad to have the NAND framework made available
for the general FreeBSD audience, reaffirming the system as a
versatile platform for appliances and other embedded and
industrial designs," said Rafal Jaworowski of Semihalf.

The Foundation is pleased to be working with Semihalf again. They
were previously awarded a grant to bring "Flattened Device Tree"
support to FreeBSD. This new feature in FreeBSD 9.0 has been
well received by the FreeBSD community.
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

Wednesday, February 15, 2012

[FreeBSD-Announce] Reminder that we are accepting Travel Grant Applications

Calling all FreeBSD developers needing assistance with travel expenses
to AsiaBSDCon 2012.

The FreeBSD Foundation will be providing a limited number of travel
grants to individuals requesting assistance. Please fill out and submit
the Travel Grant Request Application at
http://www.freebsdfoundation.org/documents/TravelRequestForm.pdf by
February 20, 2012 to apply for this grant.

This program is open to FreeBSD developers of all sorts (kernel hackers,
documentation authors, bugbusters, system administrators, etc). In some
cases we are also able to fund non-developers, such as active community
members and FreeBSD advocates.

Your request should be based on a realistic and economical estimate of
travel costs (economy airfare, trainfare, ...), accommodations
(conference hotel and sharing a room), and registration or tutorial
fees. If there are other sponsors willing to cover costs, such as your
employer or the conference, we prefer that you talk to them first, as
our budget is limited. We are happy to split costs with you or another
sponsor, such as just covering airfare or board.

If you are a speaker at the conference, we expect the conference to
cover your travel costs, and will most likely not approve your request.

If your application is approved, we will authorize you to seek
reimbursement up to a limit. We consider several factors, including our
overall and per-event budgets, and the benefit to the community by
funding your travel. We reimburse costs based on receipts, and by check
or bank transfer. And, we do not cover your costs if you end up having
to cancel your trip. We require you to submit a report on your trip,
which we may show to current or potential sponsors, and may include in
our semi-annual newsletter or this blog.

There's some flexibility in the mechanism, so talk to us if something
about the model doesn't quite work for you or if you have any questions.
The travel grant program is one of the most effective ways we can spend
money to help support the FreeBSD Project, as it helps developers get
together in the same place at the same time, and helps advertise and
advocate FreeBSD in the larger community.

Thank You,

The FreeBSD Foundation
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"