SUPPORT THE WORK

GetWiki

OpenBSD

ARTICLE SUBJECTS
aesthetics  →
being  →
complexity  →
database  →
enterprise  →
ethics  →
fiction  →
history  →
internet  →
knowledge  →
language  →
licensing  →
linux  →
logic  →
method  →
news  →
perception  →
philosophy  →
policy  →
purpose  →
religion  →
science  →
sociology  →
software  →
truth  →
unix  →
wiki  →
ARTICLE TYPES
essay  →
feed  →
help  →
system  →
wiki  →
ARTICLE ORIGINS
critical  →
discussion  →
forked  →
imported  →
original  →
OpenBSD
[ temporary import ]
please note:
- the content below is remote from Wikipedia
- it has been imported raw for GetWiki
{{Use dmy dates|date=August 2017}}{{Use American English|date=June 2016}}







factoids
OpenBSD is a free and open-source security-focused operating system based on the Berkeley Software Distribution (BSD), a Unix derivative developed at the University of California, Berkeley. OpenBSD was created in 1995, when project founder Theo de Raadt forked the codebase from NetBSD.According to De Raadt, OpenBSD is a research operating systemWEB, Pledge() - A New Mitigation Mechanism,weblink 8 October 2018, for developing new security mitigations. Because of the project’s emphasis on code quality, its components are widely reused in other software projects. For example, Android uses its C standard library,WEB, Android's C Library Has 173 Files of Unchanged OpenBSD Code,weblink 8 October 2018, LLVM uses its regular expression library,WEB, LLVM Release License,weblink 8 October 2018, and Windows 10 uses OpenSSH with LibreSSL, the project's fork of OpenSSL.WEB, OpenSSH for Windows,weblink 8 October 2018, The system is intended to be secure by default, and many of its security features are either missing or optional in other operating systems. According to author Michael W. Lucas, OpenBSD is "widely regarded as the most secure operating system available anywhere, under any licensing terms."{{r|Lucas-2013|p=xxix}}De Raadt coordinates the project from his home in Calgary, Alberta, Canada. In addition to the operating system itself, the project maintains portable versions of many subsystems (such as OpenSSH), which are available as packages for other operating systems. Its logo and mascot is a pufferfish named Puffy.The name OpenBSD refers to the fact that the source code is freely available on the Internet. It also refers to the wide range of hardware platforms the system supports.

History

{{See also|OpenBSD version history}}File:Bsd distributions usage.svg|thumb|Bar chart showing the proportion of users of each BSDBSDIn December 1994, Theo de Raadt was asked to resign from the NetBSD core team and his access to the source code repository was revoked. The reason for this is not entirely clear, although there are claims that it was due to personality clashes within the NetBSD project and on its mailing lists.In October 1995, De Raadt founded OpenBSD, a new project forked from NetBSD 1.0. The initial release, OpenBSD 1.2, was made in July 1996, followed by OpenBSD 2.0 in October of the same year. Since then, the project has followed a schedule of a release every six months, each of which is supported for one year.On 25 July 2007, developer Bob Beck announced the formation of the OpenBSD Foundation, a Canadian non-profit organization formed to "act as a single point of contact for persons and organizations requiring a legal entity to deal with when they wish to support OpenBSD."It is hard to determine how widely OpenBSD is used, because the developers do not publish or collect usage statistics. In September 2005, the BSD Certification Group surveyed BSD users, showing that 33% used OpenBSD, behind FreeBSD with 77% and ahead of NetBSD with 16%.{{refn|name=survey_nuance|group=n}}

Use cases

(File:OpenBSD 5.3 Startup.png|thumb|OpenBSD startup in console mode)(File:OpenBSD 5.3 Welcome.png|thumb|OpenBSD console login and welcome message)

Workstations

OpenBSD ships with Xenocara, an implementation of the X Window System, and is suitable for use as a workstation.{{rp|xl}} {{As of|2018|09}}, OpenBSD includes approximately 8000 packages in its software repository, including desktop environments such as GNOME, Plasma 4 and Xfce, and web browsers such as Firefox and Chromium. The project also includes three window managers in the main distribution: cwm, FVWM (part of the default configuration for Xenocara), and twm.

Security appliances

OpenBSD's security enhancements, built-in cryptography, and the PF (packet filter) suit it for use in the security industry, such as on firewalls, intrusion-detection systems, and VPN gateways.Proprietary systems from several manufacturers are based on OpenBSD, including devices from Armorlogic (Profense web application firewall), Calyptix Security, GeNUA, RTMX, and .vantronix. Later versions of Microsoft's Services for UNIX, an extension to the Windows operating system providing Unix-like functionality, use large amounts of OpenBSD code.

Servers

OpenBSD features a full server suite and can be easily configured as a mail server, web server, FTP server, DNS server, router, firewall, NFS file server, or any combination of these.

Security

{{See also|OpenBSD security features}}Shortly after OpenBSD was created, De Raadt was contacted by a local security software company named Secure Networks (SNI). They were developing a "network security auditing tool" called Ballista,{{refn|name=ballista|group=n|Later renamed to Cybercop Scanner after SNI was purchased by Network Associates.}} which was intended to find and attempt to exploit possible software security flaws. This coincided with De Raadt's own interest in security, so for a time the two cooperated, a relationship that was of particular usefulness leading up to the release of OpenBSD 2.3 and helped to define security as the focal point of the project.OpenBSD includes features designed to improve security, such as: To reduce the risk of a vulnerability or misconfiguration allowing privilege escalation, many programs have been written or adapted to make use of privilege separation, privilege revocation and chrooting. Privilege separation is a technique, pioneered on OpenBSD and inspired by the principle of least privilege, where a program is split into two or more parts, one of which performs privileged operations and the other—almost always the bulk of the code—runs without privilege. Privilege revocation is similar and involves a program performing any necessary operations with the privileges it starts with then dropping them. Chrooting involves restricting an application to one section of the file system, prohibiting it from accessing areas that contain private or system files. Developers have applied these enhancements to OpenBSD versions of many common applications, such as tcpdump, file, tmux, smtpd, and syslogd.OpenBSD developers were instrumental in the creation and development of OpenSSH, which is developed in the OpenBSD CVS repositories. OpenSSH is based on the original SSH. It first appeared in OpenBSD 2.6 and is now by far the most popular SSH client and server, available on many operating systems.The project has a policy of continually auditing source code for problems, work that developer Marc Espie has described as "never finished ... more a question of process than of a specific bug being hunted." He went on to list several typical steps once a bug is found, including examining the entire source tree for the same and similar issues, "try[ing] to find out whether the documentation ought to be amended", and investigating whether "it's possible to augment the compiler to warn against this specific problem."

Security record

The OpenBSD website features a prominent reference to the system's security record. Until June 2002, it read:{{cquote|Five years without a remote hole in the default install!}}In June 2002, Mark Dowd of Internet Security Systems disclosed a bug in the OpenSSH code implementing challenge-response authentication.Internet Security Systems. OpenSSH Remote Challenge Vulnerability, June 26, 2002. Visited December 17, 2005. This vulnerability in the OpenBSD default installation allowed an attacker remote access to the root account, which was extremely serious not only to OpenBSD, but also to the large number of other operating systems that were using OpenSSH by that time.A partial list of affected operating systems. This problem necessitated the adjustment of the slogan on the OpenBSD website to:{{cquote|One remote hole in the default install, in nearly 6 years!}}The quote remained unchanged as time passed, until on March 13, 2007 when Alfredo Ortega of Core Security TechnologiesCore Security Technologies' homepage. disclosed a network-related remote vulnerability.Core Security Technologies. OpenBSD's IPv6 mbufs remote kernel buffer overflow. March 13, 2007. Visited March 13, 2007. The quote was subsequently changed to:{{cquote|Only two remote holes in the default install, in a heck of a long time!}}This statement has been criticized because the default install contains few running services, and many use cases require additional services.{{citation|url =weblink|title = Secure doesn't mean anything|last = Brindle|first = Joshua|work = Security Blog|date = 2008-03-30|access-date = 2011-12-13}} Also, because the ports tree contains unaudited third-party software, it is easy for users to compromise security by installing or improperly configuring packages. However, the project maintains that the slogan is intended to refer to a default install and that it is correct by that measure.One of the fundamental ideas behind OpenBSD is a drive for systems to be simple, clean, and secure by default. The default install is quite minimal, which the project states is to ensure novice users "do not need to become security experts overnight", which fits with open-source and code auditing practices considered important elements of a security system.

Alleged backdoor

On 11 December 2010, Gregory Perry, a former technical consultant for the Federal Bureau of Investigation (FBI), emailed De Raadt alleging that the FBI had paid some OpenBSD ex-developers 10 years previously to insert backdoors into the OpenBSD Cryptographic Framework. De Raadt made the email public on 14 December by forwarding it to the openbsd-tech mailing list and suggested an audit of the IPsec codebase. De Raadt's response was skeptical of the report and he invited all developers to independently review the relevant code. In the weeks that followed, bugs were fixed but no evidence of backdoors were found. De Raadt stated "I believe that NetSec was probably contracted to write backdoors as alleged. If those were written, I don't believe they made it into our tree. They might have been deployed as their own product."

Subprojects

Many open source projects started as components of OpenBSD, including: Some subsystems have been integrated into other BSD operating systems,{{r|freebsd_openssh-base|netbsd_openssh-base|dragonflybsd_openssh-base}} while many are available as packages for use in other Unix-like systems.{{r|archlinux_openssh-portable|opensuse_openssh-portable|debian_openssh-portable}}Linux administrator Carlos Fenollosa commented on moving from Linux to OpenBSD that the system is faithful to the Unix philosophy of small, simple tools that work together well: "Some base components are not as feature-rich, on purpose. Since 99% of the servers don't need the flexibility of Apache, OpenBSD's httpd will work fine, be more secure, and probably faster"weblink He characterized the developer community's attitude to components as: "When the community decides that some module sucks, they develop a new one from scratch. OpenBSD has its own NTPd, SMTPd and, more recently, HTTPd. They work great". As a result, OpenBSD is relatively prolific in creating components that become widely reused by other systems.OpenBSD runs nearly all of its standard daemons within chroot and privsep security structures by default, as part of hardening the base system.The Calgary Internet Exchange was formed in 2012, in part to serve the needs of the OpenBSD project.WEB
, An Internet Exchange for Calgary
,weblink
, de Raadt
, Theo
, 18 June 2013
, 9 October 2018,

Third-party components

OpenBSD includes a number of third-party components, many with OpenBSD-specific patches, such as Xorg, Clang (the default compiler on several architectures), GCC,{{refn|group=n|name=compiler-version|{{As of|2018|April|alt=As of OpenBSD 6.3}}, either Clang 5.0.1, GCC 4.2.1 or GCC 3.3.6 is shipped, depending on the platform.}} Perl, NSD, Unbound, ncurses, GNU binutils, GDB, and AWK.OpenBSD formerly included a fork of Apache 1.3, later replaced by Nginx. In the 5.6 release, Nginx was replaced with {{mono|httpd}}, an HTTP server with FastCGI and TLS support. {{As of|2018|May}}, Apache and Nginx are still available as ports.

Development

File:OpenBSD hackers at c2k++ at MIT.jpg|thumb|right|OpenBSD developers at c2k1 hackathon at MIT, June 2001]]Development is continuous, and team management is open and tiered. Anyone with appropriate skills may contribute, with commit rights being awarded on merit and De Raadt acting as coordinator.{{r|absolute_openbsd|page=xxxv}} Two official releases are made per year, with the version number incremented by 0.1, and these are each supported for twelve months (two release cycles). Snapshot releases are also available at frequent intervals.Maintenance patches for supported releases may be applied manually or by updating the system against the patch branch of the CVS repository for that release. Alternatively, a system administrator may opt to upgrade using a snapshot release and then regularly update the system against the {{mono|-current}} branch of the CVS repository, in order to gain pre-release access to recently added features.The generic OpenBSD kernel provided by default is strongly recommended for end users, in contrast to operating systems that recommend user kernel customization.Packages outside the base system are maintained by CVS through a ports tree and are the responsibility of the individual maintainers, known as porters. As well as keeping the current branch up to date, porters are expected to apply appropriate bug-fixes and maintenance fixes to branches of their package for OpenBSD's supported releases. Ports are generally not subject to the same continuous auditing as the base system due to lack of manpower.Binary packages are built centrally from the ports tree for each architecture. This process is applied for the current version, for each supported release, and for each snapshot. Administrators are recommended to use the package mechanism rather than build the package from the ports tree, unless they need to perform their own source changes.OpenBSD's developers regularly meet at special events called hackathons, where they "sit down and code", emphasizing productivity.Most new releases include a song.The OpenBSD Foundation was accepted as a mentoring organization for the 2014 Google Summer of Code.

Open source and open documentation

OpenBSD is known for its high-quality documentation, considered the best among the BSD operating systems, all of which emphasize correct documentation.When OpenBSD was created, De Raadt decided that the source code should be available for anyone to read. At the time, a small team of developers generally had access to a project's source code. Chuck Cranor and De Raadt concluded this practice was "counter to the open source philosophy" and inconvenient to potential contributors. Together, Cranor and De Raadt set up the first public, anonymous CVS server. De Raadt's decision allowed users to "take a more active role", and established the project's commitment to open access.OpenBSD does not include closed source binary drivers in the source tree, nor do they include code requiring the signing of non-disclosure agreements.Since OpenBSD is based in Canada, no United States export restrictions on cryptography apply, allowing the distribution to make full use of modern algorithms for encryption. For example, the swap space is divided into small sections and each section is encrypted with its own key, ensuring that sensitive data does not leak into an insecure part of the system.OpenBSD randomizes various behaviors of applications, making them less predictable and thus more difficult to attack. For example, PIDs are created and associated randomly to processes; the bind system call uses random port numbers; files are created with random inode numbers; and IP datagrams have random identifiers. This approach also helps expose bugs in the kernel and in user space programs.The OpenBSD policy on openness extends to hardware documentation: in the slides for a December 2006 presentation, De Raadt explained that without it "developers often make mistakes writing drivers", and pointed out that "the [oh my god, I got it to work] rush is harder to achieve, and some developers just give up." He went on to say that vendor-supplied binary drivers are unacceptable for inclusion in OpenBSD, that they have "no trust of vendor binaries running in our kernel" and that there is "no way to fix [them] ... when they break."

Licensing

{{See also|Free software license}}OpenBSD maintains a strict license policy, preferring the ISC license and other variants of the BSD license. The project attempts to "maintain the spirit of the original Berkeley Unix copyrights," which permitted a "relatively un-encumbered Unix source distribution." The widely used Apache License and GNU General Public License are considered overly restrictive.In June 2001, triggered by concerns over Darren Reed's modification of IPFilter's license wording, a systematic license audit of the OpenBSD ports and source trees was undertaken. Code in more than a hundred files throughout the system was found to be unlicensed, ambiguously licensed or in use against the terms of the license. To ensure that all licenses were properly adhered to, an attempt was made to contact all the relevant copyright holders: some pieces of code were removed, many were replaced, and others, such as the multicast routing tools {{mono|mrinfo}} and {{mono|map-mbone}}, were relicensed so that OpenBSD could continue to use them. Also removed during this audit was all software produced by Daniel J. Bernstein. At the time, Bernstein requested that all modified versions of his code be approved by him prior to redistribution, a requirement to which OpenBSD developers were unwilling to devote time or effort.{{r|djb-ports-removed-1|djb-ports-removed-2|djb-ports-removed-3}}Because of licensing concerns, the OpenBSD team has reimplemented software from scratch or adopted suitable existing software. For example, OpenBSD developers created the PF packet filter after unacceptable restrictions were imposed on IPFilter. PF first appeared in OpenBSD 3.0 and is now available in many other operating systems. OpenBSD developers have also replaced GPL-licensed tools (such as CVS, diff, grep and pkg-config) with permissively licensed equivalents.WEB, New BSD licensed CVS replacement for OpenBSD,weblink 9 October 2018, WEB, pkg-config(1),weblink 9 October 2018,

Funding

Although the operating system and its portable components are used in commercial products, De Raadt says that little of the funding for the project comes from the industry: "traditionally all our funding has come from user donations and users buying our CDs (our other products don't really make us much money). Obviously, that has not been a lot of money."For a two-year period in the early 2000s, the project received funding from DARPA, which "paid the salaries of 5 people to work completely full-time, bought about $30k in hardware, and paid for 3 hackathons", from the POSSE project.In 2006, the OpenBSD project experienced financial difficulties. The Mozilla Foundation and GoDaddy are among the organizations that helped OpenBSD to survive. However, De Raadt expressed concern about the asymmetry of funding: "I think that contributions should have come first from the vendors, secondly from the corporate users, and thirdly from individual users. But the response has been almost entirely the opposite, with almost a 15-to-1 dollar ratio in favor of the little people. Thanks a lot, little people!"On 14 January 2014, Bob Beck issued a request for funding to cover electrical costs. If sustainable funding was not found, Beck suggested the OpenBSD project would shut down. The project soon received a US$20,000 donation from Mircea Popescu, the Romanian creator of the MPEx bitcoin stock exchange, paid in bitcoins. The project raised US$150,000 in response to the appeal, enabling it to pay its bills and securing its short-term future. Since 2014, several large contributions to the OpenBSD Foundation have come from corporations such as Microsoft, Facebook, and Google as well as the Core Infrastructure Initiative.During the 2016 and 2017 fundraising campaigns, Smartisan, a Chinese company, was the leading financial contributor to the project.WEB, OpenBSD Donors,weblink WEB, Smartisan Makes Another Iridium Donation to the OpenBSD Foundation,weblink Undeadly,

Distribution

OpenBSD is freely available in various ways: the source can be retrieved by anonymous CVS, and binary releases and development snapshots can be downloaded by FTP, HTTP, and rsync. Prepackaged CD-ROM sets through version 6.0 can be ordered online for a small fee, complete with an assortment of stickers and a copy of the release's theme song. These, with their artwork and other bonuses, have been one of the project's few sources of income, funding hardware, Internet service, and other expenses. Beginning with version 6.1, CD-ROM sets are no longer released.In common with other operating systems, OpenBSD provides a package management system for easy installation and management of programs which are not part of the base operating system. Packages are binary files which are extracted, managed and removed using the package tools. On OpenBSD, the source of packages is the ports system, a collection of Makefiles and other infrastructure required to create packages. In OpenBSD, the ports and base operating system are developed and released together for each version: this means that the ports or packages released with, for example, 4.6 are not suitable for use with 4.5 and vice versa.

Songs and artwork

File:Puffyanim.gif|thumb|right|Animated OpenBSD mascot Puffy, 3D-rendered with Blender.]]Initially, OpenBSD used a haloed version of the BSD daemon mascot drawn by Erick Green, who was asked by De Raadt to create the logo for the 2.3 and 2.4 versions of OpenBSD. Green planned to create a full daemon, including head and body, but only the head was completed in time for OpenBSD 2.3. The body as well as pitchfork and tail was completed for OpenBSD 2.4.Subsequent releases used variations such as a police daemon by Ty Semaka, but eventually settled on a pufferfish named Puffy.{{refn|name=pufferfish|group=n|Pufferfish do not, in fact, possess spikes; images of Puffy are closer to a similar species, the porcupinefish.}} Since then, Puffy has appeared on OpenBSD promotional material and featured in release songs and artwork.The promotional material of early OpenBSD releases did not have a cohesive theme or design, but later the CD-ROMs, release songs, posters and tee-shirts for each release have been produced with a single style and theme, sometimes contributed to by Ty Semaka of the Plaid Tongued Devils. These have become a part of OpenBSD advocacy, with each release expounding a moral or political point important to the project, often through parody.Themes have included Puff the Barbarian in OpenBSD 3.3, which included an 80s rock song and parody of Conan the Barbarian alluding to open documentation, The Wizard of OS in OpenBSD 3.7, related to the project's work on wireless drivers, and Hackers of the Lost RAID, a parody of Indiana Jones referencing the new RAID tools in OpenBSD 3.8.

See also

Notes

{{reflist|group=n}}

References

{{Reflist|refs=WEB,weblink The OpenBSD Foundation 2014 Fundraising Campaign, OpenBSD Foundation, 24 May 2014, MAILING LIST,weblink The OpenBSD 2.0 release, Theo, De Raadt, Theo de Raadt, 18 October 1996, openbsd-announce, MAILING LIST,weblink 2.3 release announcement, Theo, De Raadt, Theo de Raadt, 19 December 2005, openbsd-misc, Without [SNI's] support at the right time, this release probably would not have happened., WEB,weblink OpenBSD 2.7, OpenBSD, 22 May 2016, WEB, Matzan, Jem,weblink OpenBSD 4.0 review, Software in Review, 1 December 2006, 13 December 2011, Each OpenBSD release has a graphical theme and a song that goes with it. The theme reflects a major concern that the OpenBSD programmers are addressing or bringing to light., WEB,weblink OpenBSD 6.0, OpenBSD, 1 November 2016, BOOK, Lucas, Michael W., Absolute OpenBSD: Unix for the Practical Paranoid,weblink 2nd, April 2013, No Starch Press, San Francisco, California, 978-1-59327-476-4, MAILING LIST,weblink Allegations regarding OpenBSD IPSEC, Theo, De Raadt, Theo de Raadt, 14 December 2010, 28 May 2016, openbsd-tech, WEB,weblink Announcing – The OpenBSD Foundation, OpenBSD Journal, 26 July 2007, WEB,weblink Anonymous CVS, OpenBSD, 13 December 2011, WEB,weblink Arch Linux – openssh 7.2p2-1 (x86_64), Arch Linux, 17 May 2016, WEB, Bright, Peter,weblink OpenBSD rescued from unpowered oblivion by $20K bitcoin donation, Ars Technica, 20 January 2014, 20 January 2014, WEB,weblink AccessEnforcer Model AE800, Calyptix Security, 28 May 2016, WEB,weblink BSD cognoscenti on Linux, Jem, Matzan, NewsForge, Linux.com, 15 June 2005, 28 May 2016, WEB
,weblink
, BSD: The Other Free UNIX Family
, Chisnall
, David
, InformIT (publisher), InformIT
, 20 January 2006
,weblink
, 14 March 2014
, no
,
, WEB, Tim, McIntire,weblink Take a closer look at OpenBSD, Developerworks, IBM, 8 August 2006, 13 December 2011, WEB,weblink Chuck Cranor's Home Page, Chuck D., Cranor, 13 December 2011anoncvs.openbsd.org, [...]}}CONFERENCE,weblink Cryptography in OpenBSD: An Overview, Theo, De Raadt, Theo de Raadt, Niklas, Hallqvist, Artur, Grabowski, Angelos D., Keromytis, Niels, Provos, Niels Provos, 6 June 1999, USENIX Annual Technical Conference, Monterey, California, 27 May 2016, CONFERENCE, Cryptography in OpenBSD: An Overview,weblinkweblink Randomness Used Inside the Kernel, Theo, De Raadt, Theo de Raadt, Niklas, Hallqvist, Artur, Grabowski, Angelos D., Keromytis, Niels, Provos, Niels Provos, 6 June 1999, USENIX Annual Technical Conference, Monterey, California, 1 February 2014, CONFERENCE,weblink Opening the Source Repository with Anonymous CVS, Chuck D., Cranor, Theo, De Raadt, Theo de Raadt, 6 June 1999, 13 December 2011, USENIX Annual Technical Conference, Monterey, California, WEB,weblink src/usr.sbin/map-mbone/mapper.c – view – 1.5, cvsweb.openbsd.org, 31 July 2001, 24 May 2016, New license from Xerox! This code is now FREE! Took a while and a lot of mails, but it is worth it., WEB,weblink src/usr.sbin/mrinfo/mrinfo.c – view – 1.7, cvsweb.openbsd.org, 31 July 2001, 24 May 2016, New license from Xerox! This code is now FREE! Took a while and a lot of mails, but it is worth it., WEB,weblink Debian – Details of package openssh-client in jessie, Debian, 17 May 2016, WEB,weblink Interview: Theo de Raadt of OpenBSD, NewsForge, 28 March 2006, 31 March 2016, WEB,weblink Interview: Theo de Raadt, Jeremy, Andrews, KernelTrap, 2 May 2006,weblink" title="web.archive.org/web/20130424125958weblink">weblink 24 April 2013, WEB,weblink Presentation at OpenCON, De Raadt, Theo, Theo de Raadt, OpenBSD, 5 December 2006, 13 December 2011, MAILING LIST,weblink Re: Why were all DJB's ports removed? No more qmail?, Theo, De Raadt, Theo de Raadt, 24 August 2001, openbsd-misc,weblink" title="web.archive.org/web/20160419110701weblink">weblink 19 April 2016, MAILING LIST,weblink Re: Why were all DJB's ports removed? No more qmail?, Daniel J., Bernstein, Daniel J. Bernstein, 27 August 2001, openbsd-misc,weblink" title="web.archive.org/web/20120204203539weblink">weblink 4 February 2012, MAILING LIST,weblink Re: Why were all DJB's ports removed? No more qmail?, Marc, Espie, 28 August 2001, openbsd-misc,weblink" title="web.archive.org/web/20160419080907weblink">weblink 19 April 2016, WEB, dragonfly.git/blob – crypto/openssh/README,weblink gitweb.dragonflybsd.org, 19 May 2016, This is the port of OpenBSD's excellent OpenSSH to Linux and other Unices., WEB,weblink Migrating to OpenBSD, OpenBSD Frequently Asked Questions, 4 January 2017, WEB,weblink The X Windows System, OpenBSD Frequently Asked Questions, 22 May 2016, OpenBSD ships with the cwm(1), fvwm(1) and twm(1) window managers, [...], WEB,weblink Packages and Ports, OpenBSD Frequently Asked Questions, 22 May 2016, WEB,weblink Package Management, OpenBSD Frequently Asked Questions, 1 June 2016, WEB, Contributors,weblink OpenBSD Foundation, 27 May 2016, BOOK
,weblink
, Free For All: How Linux and the Free Software Movement Undercut the High Tech Titans
,weblink
, 18.3 Flames, Fights, and the Birth of OpenBSD
, Peter
, Wayner
, 1st
, HarperBusiness
, 978-0-06-662050-3
, 13 July 2000
, 13 December 2011
, yes
,weblink" title="web.archive.org/web/20120114221903weblink">weblink
, 14 January 2012
, dmy-all
, WEB,weblink Contents of /stable/10/crypto/openssh/README, svnweb.freebsd.org, 19 May 2016, This is the port of OpenBSD's excellent OpenSSH to Linux and other Unices., WEB,weblink Mirrors, OpenBSD, 22 May 2016, MAILING LIST,weblink Request for Funding our Electricity, openbsd-misc, Beck, Bob, 14 January 2014, 17 May 2016, WEB,weblink High Resistance Firewall genugate, GeNUA, 29 May 2016, MAILING LIST,weblink Theo De Raadt, Adam, Glass, 23 December 1994, netbsd-users, MAILING LIST,weblink Google Summer of Code 2014, openbsd-misc, Bob, Beck, 25 February 2014, 4 March 2014, WEB,weblink GSOC 2014 with the OpenBSD Foundation, Google Summer of Code 2014, 4 March 2014, WEB
, OpenBSD Founder Believes FBI Built IPsec Backdoor
,weblink
, InformationWeek: DARKreading
, 22 December 2010
, Mathew J. Schwartz
, yes
,
,weblink" title="web.archive.org/web/20170711004138weblink">weblink
, 11 July 2017
, WEB
, New year's resolution No. 1: Get OpenBSD
,weblink
, Grimes
, Roger A.
, InfoWorld
, 29 December 2006
,
, WEB,weblink An Interview with OpenBSD's Marc Espie, Federico, BiancuzziO'Reilly Media>ONLamp, 18 March 2004, 13 December 2011, WEB,weblink OpenBSD and ipfilter still fighting over license disagreement, Tina, Gasperson, 6 June 2001, Linux.com,weblink" title="web.archive.org/web/20080626101129weblink">weblink 26 June 2008, WEB,weblink Release Songs, OpenBSD, 22 May 2016, WEB,weblink clang-local – OpenBSD-specific behavior of LLVM/clang, OpenBSD manual pages, 2 February 2018, WEB,weblink gcc-local – local modifications to gcc, OpenBSD manual pages, 1 November 2016, WEB,weblink httpd – HTTP daemon, OpenBSD manual pages, 1 November 2016, WEB, OpenBSD,weblink mckusick.com, 12 December 2014, WEB, src/crypto/external/bsd/openssh/dist/README – view – 1.4,weblink NetBSD CVS Repositories, 19 May 2016, WEB,weblink OpenBSD code audit uncovers bugs, but no evidence of backdoor, Paul, Ryan, Ars Technica, 23 December 2010, 9 January 2011, WEB,weblink The Essence of OpenBSD, Cameron, Laird, George Peter, StaplinO'Reilly Media>ONLamp, 17 July 2003, 13 December 2011, MAILING LIST
, OpenBSD 2.5 Release Announcement
,weblink
, openbsd-announce
, De Raadt
, Theo
, Theo de Raadt
, 19 May 1999
,weblink
, 14 March 2014
, OpenBSD 2.5 introduces the new Cop daemon image done by cartoonist Ty Semeka.
, yes
,
, WEB,weblink Using OpenBSD on the desktop, Manolis, Tzanidakis, Linux.com, 21 April 2006, 9 March 2012, WEB,weblink OpenBSD's flavors, OpenBSD Frequently Asked Questions, 22 May 2016, WEB, Applying patches in OpenBSD,weblink OpenBSD Frequently Asked Questions, 15 May 2016, WEB,weblink Project Goals, OpenBSD, 18 May 2016, Integrate good code from any source with acceptable licenses. [...], NDAs are never acceptable., WEB,weblink Hackathons, OpenBSD, 18 May 2016, WEB, Innovations,weblink OpenBSD, 18 May 2016, Privilege separation: [...] The concept is now used in many OpenBSD programs, for example [...] etc., WEB, OpenBSD ports ∴ www/apache-httpd,-main,weblink ports.su, 13 May 2018, WEB, OpenBSD ports ∴ www/nginx,weblink ports.su, 13 May 2018, WEB,weblink OpenPorts.se Statistics, OpenPorts.se, 8 February 2018, WEB,weblink Project History and Credits, OpenSSH, 13 December 2011, WEB,weblink SSH usage profiling, OpenSSH, 13 December 2011, WEB,weblink openssh, OpenSUSE, 17 May 2016, WEB,weblink Orders, OpenBSD, 20 May 2016, WEB,weblink FBI Added Secret Backdoors to OpenBSD IPSEC, Thom, Holwerda, OSNews, 14 December 2010, 13 December 2011, BOOK,weblink Secure Programming for Linux and Unix HOWTO,weblink 2.4. Is Open Source Good for Security?, David A., Wheeler, David A. Wheeler, 3 March 2003, 13 December 2011, BOOK, The OpenBSD PF Packet Filter Book: PF for NetBSD, FreeBSD, DragonFly and OpenBSD, Reed Media Services, 0-9790342-0-5,weblink 19 May 2016, CONFERENCE,weblink Design and Performance of the OpenBSD Stateful Packet Filter (pf), Daniel, Hartmeier, USENIX Annual Technical Conference, Monterey, California, 10 June 2002, 13 December 2011, WEB,weblink Platforms, OpenBSD, 3 September 2016, WEB,weblink Copyright Policy, OpenBSD, 13 December 2011, WEB, Niels, Provos, Niels Provos,weblink Privilege Separated OpenSSH, 9 August 2003, 13 December 2011, WEB, McAllister, Neil, Microsoft rains cash on OpenBSD Foundation, becomes top 2015 donor,weblink The Register, 27 May 2016, 8 July 2015, WEB,weblink RTMX O/S IEEE Real Time POSIX Operating Systems, RTMX, 13 December 2011, RTMX O/S is a product extension to OpenBSD Unix-like operating system with emphasis on embedded, dedicated applications., WEB,weblink Security, OpenBSD, 13 December 2011, Secure by Default., WEB, OpenBSD Project in Financial Danger,weblink Slashdot, 21 March 2006, 12 December 2014, WEB, Mozilla Foundation Donates $10K to OpenSSH,weblink Slashdot, 4 April 2006, 12 December 2014, WEB
,weblink
, OpenBSD 5.4: Puffy on the Desktop
, Smith
, Jesse
, 18 November 2013
,weblink
, 30 April 2014
, no
,
, WEB,weblink Staying on the cutting edge, Sam, Varghese, The Age, 8 October 2004, 13 December 2011, CONFERENCE, Todd C., Miller, Theo, De Raadt, Theo de Raadt,weblink strlcpy and strlcat - Consistent, Safe, String Copy and Concatenation, USENIX Annual Technical Conference, Monterey, California, 6 June 1999, 13 December 2011, REPORT,weblink BSD Usage Survey, The BSD Certification Group, 31 October 2005, 16 September 2012, 9, WEB, GoDaddy.com Donates $10K to Open Source Development Project,weblink The Hosting News, 19 April 2006, yes,weblink" title="web.archive.org/web/20061111090358weblink">weblink 11 November 2006, WEB
,weblink
, .vantronix secure system
, Compumatica secure networks
, 13 December 2011
, The Next Generation Firewall is not a standalone device, it is a Router for operation in security critical environments with high requirements for availability, comprehensive support as well as reliable and trusted systems powered by OpenBSD.
, yes
,weblink" title="web.archive.org/web/20120101215138weblink">weblink
, 1 January 2012
, dmy-all
, WEB,weblink Dohnert, Roberto J., Review of Windows Services for UNIX 3.5, OSNews, David Adams, 21 January 2004, WEB,weblink About Xenocara, Xenocara, 13 December 2011, BOOK
,weblink
, Lucas
, Michael W.
, 2013
, Absolute OpenBSD: Unix for the practical paranoid
, 2nd
, No Starch Press
, San Francisco
, en
, 978-1-59327-476-4
, }}

External links

{{OpenBSD}}{{Berkeley Software Distribution}}{{Unix-like}}{{Authority control}}

- content above as imported from Wikipedia
- "OpenBSD" does not exist on GetWiki (yet)
- time: 3:34am EST - Fri, Dec 14 2018
[ this remote article is provided by Wikipedia ]
LATEST EDITS [ see all ]
GETWIKI 09 MAY 2016
GETWIKI 18 OCT 2015
M.R.M. Parrott
Biographies
GETWIKI 20 AUG 2014
GETWIKI 19 AUG 2014
GETWIKI 18 AUG 2014
Wikinfo
Culture
CONNECT