OpenSSH 10.3/10.3p1 released!
Contributed by grey on from the Now with more draft IETF standard implementations dept.
From the Release notes:
OpenBSD Journal
Contributed by grey on from the Now with more draft IETF standard implementations dept.
Contributed by Peter N. M. Hansteen on from the 20k more than m68k dept.
miod@) is documenting the adventures of porting OpenBSD to various architectures in his OpenBSD Stories collection.
The latest addition is OpenBSD on Motorola 88000 processors, where the first two of a planned total of nine chapters have been published.
The first chapter, The Forsaken RISC Architecture, takes us through some background and pre-history of the architecture.
The second chapter, A New Hope, gives insight into the early porting efforts.
We very much look forward to seeing the further chapters of the OpenBSD on Motorola 88000 processors saga.
Contributed by rueda on from the not-to-be-confused-with-dlg@ dept.
David Leadbeater (dgl@)
posted to ports@ a message,
entitled
Pledge changes in 7.9-beta,
which explains the consequences for porters
of the recent pledge(2)/unveil(2) changes in -current (and, to some extent, 7.8).
Whilst targeted at porters, it provides a good overview for
anyone interested in the changes.
The message reads:
Contributed by Peter N. M. Hansteen on from the queueing for Terabitia dept.
queue
rules in
pf.conf(5).
However, an internal 32-bit limitation in the HFSC
service curve structure (struct hfsc_sc) meant that bandwidth values
were silently capped at approximately 4.29 Gbps,
” the maximum value of a u_int ".
With 10G, 25G, and 100G
network interfaces now commonplace,
OpenBSD devs making huge progress unlocking the kernel for SMP,
and adding drivers for cards supporting some of these speeds,
this limitation started to get in the way.
Configuring bandwidth 10G on a queue would silently wrap around,
producing incorrect and unpredictable scheduling behaviour.
A new patch
widens the bandwidth fields in the kernel's HFSC scheduler
from 32-bit to 64-bit integers, removing this bottleneck entirely.
The diff also fixes a pre-existing display bug in
pftop(1)
where bandwidth values above 4 Gbps would be shown incorrectly.
Contributed by Peter N. M. Hansteen on from the sweet dreams are made of cheese dept.
kettenis@) committed support for delayed hibernation with the new machdep.hibernatedelay sysctl
The commit message reads,
List: openbsd-cvs Subject: CVS: cvs.openbsd.org: src From: Mark Kettenis <<ettenis () cvs ! openbsd ! org> Date: 2026-03-11 16:18:42 CVSROOT: /cvs Module name: src Changes by: kettenis@cvs.openbsd.org 2026/03/11 10:18:42
7.9-betaContributed by rueda on from the cranking-the-handle dept.
It's that time of the year again.
With the following
commit,
Theo de Raadt (deraadt@)
changed the version of the OpenBSD development branch
to 7.9-beta:
CVSROOT: /cvs Module name: src Changes by: deraadt@cvs.openbsd.org 2026/03/10 20:27:20 Modified files: sys/conf : newvers.sh sys/sys : param.h etc/root : root.mail share/mk : sys.mk sys/arch/macppc/stand/tbxidata: bsd.tbxi usr.bin/signify: signify.1 Log message: move to 7.9-beta
7.9-beta snapshots can be expected on the OpenBSD
mirrors soon.
As always, this change should encourage testing and donation!
drm(4) code in OpenBSD-current (to linux 6.18.16)Contributed by Peter N. M. Hansteen on from the render me rendered dept.
jsg@) has upgraded the drm(4) (Direct Rendering Manager) subsystem in OpenBSD-current.
Coming at this point in the development cycle, this foreshadows what will be in the upcoming OpenBSD 7.9 release (yes, we're aware that link does not work yet).
Also worth noting is Jonathan's note in the commit message,
Thanks to the OpenBSD Foundation for sponsoring this work.
Please take this as a reminder that the OpenBSD Foundation supports important work on our favorite operating system and that supporting them will help future development of all kinds.
Contributed by Peter N. M. Hansteen on from the network fun and games dept.
It is now shipping, and when author and undeadly.org co-editor Peter Hansteen finally got his author copies, he wrote a blog post titled The Book of PF, 4th Edition: It's Here, It's Real.
Like Peter says in the article, we would like to encourage readers who can afford it, to support the OpenBSD project.
And there are pictures, of the book and the resident philosopher.
miod@Contributed by Peter N. M. Hansteen on from the RISC-y stories dept.
miod@) has been chronicling some of the more challenging parts of OpenBSD development in his OpenBSD stories collection for a while now.
The latest entry is the full OpenBSD on SGI: a rollercoaster story, which is also available in six parts,
A missed opportunity, 1988-1998
Individual efforts, 200-2004
The blowfish awakens, 2004-2006
Tinkering on big iron, 2007-2008
Hardware galore, 2009
The last challenges, 2010-2021
for those of us who like to take it in as smaller chunks, or all articles as one file.
It's a story some thirty years in the making and telling. Enjoy!
Donate to OpenBSD
We are constantly on the lookout for stories of how you put OpenBSD to work. Please submit any informative articles on how OpenBSD is helping your company.
OpenBSD 7.8
| 027 | 2026-04-04 SECURITY In iked(8) add stricter checks to avoid out-of-bounds read, NULL pointer dereference, and keep the state machine consistent. |
| 026 | 2026-03-27 RELIABILITY In smtpd(8), an LF character in the username or password could stop proc tables, causing a denial of service. |
| 025 | 2026-03-25 RELIABILITY TCP packets with invalid SACK options could crash the kernel. |
| 024 | 2026-03-21 RELIABILITY In libexpat fix denial of service due to NULL dereference and infinite loop. CVE-2026-32776 CVE-2026-32777 CVE-2026-32778 |
| 023 | 2026-03-19 RELIABILITY calendar(1) could not send mail due to missing unveil. |
| 022 | 2026-03-15 SECURITY pledge(2) "recvfd" should not kill a process who receives bad descriptors. |
OpenBSD 7.7
| 033 | 2026-04-04 SECURITY In iked(8) add stricter checks to avoid out-of-bounds read, NULL pointer dereference, and keep the state machine consistent. |
| 032 | 2026-03-27 RELIABILITY In smtpd(8), an LF character in the username or password could stop proc tables, causing a denial of service. |
| 031 | 2026-03-25 RELIABILITY TCP packets with invalid SACK options could crash the kernel. |
| 030 | 2026-03-21 RELIABILITY In libexpat fix denial of service due to NULL dereference and infinite loop. CVE-2026-32776 CVE-2026-32777 CVE-2026-32778 |
| 029 | 2026-03-19 RELIABILITY calendar(1) could not send mail due to missing unveil. |
| 028 | 2026-03-15 SECURITY pledge(2) "recvfd" should not kill a process who receives bad descriptors. |
Users wishing RSS/RDF summary files of OpenBSD Journal
can retrieve: 
Options are available.
Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]