OpenBSD Journal

OpenBSD Journal

OpenBGPD 8.2 released

Contributed by Peter N. M. Hansteen on from the all the good routes dept.

With a message from Claudio Jeker (claudio@), the OpenBSD project today announced the release of the OpenBSD BGP (Border Gateway Protocol) daemon OpenBGPD, version 8.2.

The announcement reads,

From: Claudio Jeker <claudio () openbsd ! org>
Date: Mon, 02 Oct 2023 10:22:39 +0000
To: openbsd-announce
Subject: OpenBGPD 8.2 released

We have released OpenBGPD 8.2, which will be arriving in the
OpenBGPD directory of your local OpenBSD mirror soon.

Read more…

Introduction to sysclean(8)

Contributed by rueda on from the keep-it-clean! dept.

Many OpenBSD sysadmins find the sysclean(8) port useful for removing obsolete files following upgrades.

Sebastien Marie (semarie@), the author of sysclean(8), has written a piece giving an under-the-hood look at the operation of this handy utility. It's well worth reading for those interested in understanding how it works!

-current has moved to 7.4

Contributed by rueda on from the here-we-go-again dept.

With the following commit, Theo de Raadt (deraadt@) moved -current to version 7.4:

CVSROOT:	/cvs
Module name:	src
Changes by:	deraadt@cvs.openbsd.org	2023/09/26 07:27:32

Modified files:
	sys/conf       : newvers.sh 

Log message:
we are heading out of -beta

For those unfamiliar with the process: this is not the 7.4 release, but is part of the standard build-up to the release.

Remember: It's time to start using "-D snap" with pkg_add (and pkg_info).

(Regular readers will know what comes next…)
This serves as an excellent reminder to upgrade snapshots frequently, test both base and ports, and report problems [plus, of course, donate!].

Viable ROP-free roadmap for i386/armv8/riscv64/alpha/sparc64

Contributed by rueda on from the If you break it you buy it, no returns please dept.

Theo de Raadt (deraadt@) posted to tech@ a detailed message explaining the past and (potential) future of anti-ROP measures in OpenBSD.

It's well worth reading its entirety. Highlights include:

Years later, Todd Mortimer and I developed RETGUARD.  At the start of
that initiative he proposed we protect all functions, to try to guard
all the RET instructions, and therefore achieve a state we call
"ROP-free".  I felt this was impossible, but after a couple hurdles the
RETGUARD performance was vastly better than the stack protector and we
were able to protect all functions and get to ROP-free (on fixed-sized
instruction architecures).  Performance was acceptable to trade against
improved security.
[…]
We were able to enable RETGUARD on all functions because it was fast.
[…]
On the other hand the RETGUARD approach uses an illegal instruction (of
some sort), which is a speculation barrier. That prevents the cpu from
heading off into an alternative set of weeds.  It will go decode more
instructions along the post-RET execution path.

I filed that idea as interesting but did nothing with it.  Until now.

Like we said earlier, it is worth reading the whole thing! This points forward to some remarkable improvements on several architectures, and those changes could be a clear benefit for other systems too.

-current has moved to 7.4-beta

Contributed by rueda on from the here-we-go-again dept.

With the following commit(s), Theo de Raadt (deraadt@) moved -current to version 7.4-beta:

CVSROOT:	/cvs
Module name:	src
Changes by:	deraadt@cvs.openbsd.org	2023/09/18 07:16:13

Modified files:
	share/mk       : sys.mk 
	etc/root       : root.mail 
	sys/conf       : newvers.sh 
	sys/arch/macppc/stand/tbxidata: bsd.tbxi 
	usr.bin/signify: signify.1 

Log message:
crank to 7.4-beta

Snapshots are (already) available for several platforms. At the time of writing, there are a mixture of 7.3 and 7.4 files on at least some mirrors, so readers are advised that problems may occur.

(Regular readers will know what comes next…)

This serves as an excellent reminder to upgrade snapshots frequently, test both base and ports, and report problems [plus, of course, donate!].

p2k23 Hackathon Report: Volker Schlecht (volker@) on rust and erlang progress

Contributed by rueda on from the brushing up the rust dept.

We are pleased to have another p2k23 report, this time from Volker Schlecht (volker@) who writes:

"Ladies and Gentlemen, our plane is equipped with two engines, and I'm afraid I need to tell you that the one that you see to your right won't start right now…"
As with several other developers my trip to p2k23 didn't exactly start off as planned. Eventually the engine did start, though (and I'm glad to report it stayed on, too) and I made it to Dublin.

Read more…

Donate!

Donate to OpenBSD

Features

We are constantly on the lookout for stories of how you put OpenBSD to work. Please submit any informative articles on how OpenBSD is helping your company.

OpenBSD Errata

OpenBSD 7.3

0172023-10-03 SECURITY Fix several input validation errors in libX11 and libXpm. CVE-2023-43785 CVE-2023-43786 CVE-2023-43787 CVE-2023-43788 CVE-2023-43789
0162023-09-21 SECURITY npppd(8) could crash by a l2tp message which has an AVP with wrong length.
0152023-07-25 RELIABILITY Some hypervisors remain unpatched for writes to Zenbleed DE_CFG bit, so skip it.
0142023-07-24 RELIABILITY Missing bounds check in console terminal emulation could cause a kernel crash after receiving specially crafted escape sequences.
0132023-07-24 SECURITY Install firmware updates for AMD cpus, to repair past or potential future bugs. For i386 and amd64 platforms.
0122023-07-24 SECURITY Add firmware for AMD cpus, to repair past or potential future bugs. For i386 and amd64 platforms.

After this step, "fw_update" and "installboot" must be run.

Unofficial RSS feed of OpenBSD errata

XML/RSS/RDF

Users wishing RSS/RDF summary files of OpenBSD Journal can retrieve: RSS feed

Options are available.

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]