The OpenBSD 5.5 Release -

The OpenBSD 5.5 Release

Das sichere Multi-Plattform-BSD als offizielle CD-Ausgabe

***** 1 Bewertung

Theo de Raadt, OpenBSD.org (Herausgeber)

CD-ROM (Software)
2014 | 7. Auflage
OpenBSD.org (Hersteller)
978-0-9881561-3-5 (ISBN)
39,95 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
OpenBSD 5.5 ist ein vollständiges BSD-basiertes Betriebssystem (BSD=Berkley Software Distribution, historisches Unix) und wird allgemein als sehr sicher eingeschätzt dank proaktiven Security-Features und integrierter Kryptographie. Dieses Paket enthält die offizielle, gepresste Version von Open-BSD 5.5 auf 3 CDs incl. Aufkleber für die Architekturen i386, AMD64 (64-Bit-PC), PowerPC (Mac) und Sparc64. Durch den Kauf dieses Paketes unterstützen Sie die Weiterentwicklung von Open BSD direkt, da der überwiegende Teil des Verkaufserlöses dem Projekt zugute kommt.

Some highlights:
  • GNOME 3.10.2
  • KDE 3.5.10
  • KDE 4.11.5
  • Xfce 4.10
  • MySQL 5.1.73
  • PostgreSQL 9.3.2
  • Postfix 2.11.0
  • OpenLDAP 2.3.43 and 2.4.38
  • Mozilla Firefox 24.3 and 26.0
  • Mozilla Thunderbird 24.3.0
  • GHC 7.6.3
  • LibreOffice 4.1.4.2
  • Emacs 21.4 and 24.3
  • Vim 7.4.135
  • PHP 5.3.28 and 5.4.24
  • Python 2.7.6 and 3.3.2
  • Ruby 1.8.7.374, 1.9.3.484, 2.0.0.353 and 2.1.0
  • Tcl/Tk 8.5.15 and 8.6.1
  • JDK 1.6.0.32 and 1.7.0.21
  • Mono 2.10.9
  • Chromium 32.0.1700.102
  • Groff 1.22.2
  • Go 1.2
  • GCC 4.6.4 and 4.8.2
  • LLVM/Clang 3.3
  • Node.js 0.10.24

This is a partial list of new features and systems included in OpenBSD 5.5. For a comprehensive list, see the changelog leading to 5.5.

  • time_t is now 64 bits on all platforms. While many filesystems are limited to 32 bits and thus cannot be used to store times after Tue Jan 19 03:14:07 2038 UTC, most system operations can now support times after that.


Releases and packages are now cryptographically signed with the signify(1) utility.
  • The installer will verify all sets before installing.
  • Installing without verification works, but is discouraged.
  • Users are advised to verify the installer (bsd.rd, install55.iso, etc.) ahead of time using the signify(1) tool if available.
  • pkg_add(1) now trusts signed packages only by default.

Installer improvements:
  • The installer now supports a scriptable auto-installation method that enables unattended installation and upgrades using a response file.
  • Disk images which can be written to a USB flash drive (miniroot55.fs [bsd.rd only] and install55.fs [bsd.rd + unsigned sets]) are now provided for amd64 and i386.
  • Rewritten installboot(8) utility aiming for a unified implementation across platforms (currently used by amd64 and i386 only).
  • The installer now parses nwid's with embedded blanks correctly.


New/extended platforms:
  • OpenBSD/alpha: Multiprocessor support.
  • OpenBSD/aviion: First self-hosting release for 88100-based AViiON systems.
  • OpenBSD/armv7 replaces OpenBSD/beagle.

Improved hardware support, including:
  • New vmx(4) driver for VMware VMXNET3 Virtual Interface Controller devices.
  • New vmwpvs(4) driver for VMware Paravirtual SCSI.
  • New vioscsi(4) driver for VirtIO SCSI adapters.
  • New viornd(4) driver for VirtIO random number devices.
  • New ubcmtp(4) driver for Broadcom multi-touch trackpads found on newer Apple MacBook, MacBook Pro, and MacBook Air laptops.
  • New ugold(4) driver for TEMPer gold HID thermometers.
  • New ugl(4) driver for Genesys Logic based USB host-to-host adapters.
  • New qla(4) driver for Qlogic fibre channel HBAs.
  • radeondrm(4) has been overhauled, including:
  • New port of the Radeon code in Linux 3.8.13.19.
  • Support for Kernel Mode Setting (KMS) including support for additional output types such as DisplayPort.
  • wsdisplay(4) now attaches to radeondrm(4) and provides a framebuffer console.
  • inteldrm(4) has been updated to Linux 3.8.13.19 notably bringing Haswell stability fixes.
  • Support for Intel 8 Series Ethernet with i217/i218 PHYs, and i210/i211/i354 has been added to em(4).
  • Support for Intel Centrino Wireless-N 2200, 2230 and 105/135 has been added to iwn(4).
  • Support for Areca ARC-1880, ARC-1882, ARC-1883, ARC-1223, ARC-1214, ARC-1264, ARC-1284 has been added to arc(4).
  • Support for Elantech v2 touchpads in pms(4) has been fixed.
  • Support for 802.11a (5Ghz) has been added to wpi(4).
  • Workarounds for firmware stability issues have been added to wpi(4), iwi(4), and iwn(4).
  • Support for RT3572 chips has been added to the ral(4) driver.
  • Support for RTL8106E chips has been added to the re(4) driver.
  • Support for RTS5229 card readers has been added to rtsx(4).
  • Support for Microsoft XBox 360 controllers has been added to the uhid(4) driver.
  • Support for CoreChip RD9700 USB Ethernet devices has been added to the udav(4) driver.
  • Further reliability improvements regarding suspend/resume and hibernation.
  • Enabled IPv6 transmit TCP/UDP checksum offload in jme(4).

Generic network stack improvements:
  • Added vxlan(4) a virtual extensible local area network tunnel interface.
  • pflow(4) sends 64 bit time values for pflowproto 10. The changed templates / flows for pflowproto 10 are now parseable by existing receivers.
  • Continued improvement of the checksum offload framework to streamline the calculation of TCP, UDP, ICMP, and ICMPv6 checksums.
  • Enabled IPv6 routing domain support.

Routing daemons and other userland network improvements:
  • The popa3d POP3 server has been removed.
  • Added ntpctl(8) a program to control the Network Time Protocol daemon.
  • slowcgi(8) now works with a high number of concurrent connections.
  • The inetd-based identd has been replaced by a new libevent-based identd(8).
  • tcpdump(8) can now detect bad ICMP and ICMPv6 checksums when used with the -v flag.
  • Added rdomain support to IPv6 configuration tools ndp(8), rtsold(8), ping6(8), and traceroute6(8).

pf(4) improvements:
  • New queueing system with new syntax.
  • The "received-on" parameter can now be used with the "any" keyword to match any existing interface except loopback ones.
  • The block policy in the default pf.conf(5) is now "block return".

dhcpd(8) and dhclient(8) improvements:
  • no longer create a route to the bound address via 127.0.0.1.
  • the options 'dhcp-lease-time', 'dhcp-rebinding-time', and 'dhcp-renewal-time' can now be configured in dhclient.conf(5).
  • 'next-server' (a.k.a. siaddr) info now saved in lease files.
  • fall back to broadcasting when unicast renewal fails, as specified in RFC 2131 and friends.
  • fix various problems in communications between privileged and non-privileged processes.
  • fix many abuses of memcpy.
  • stop pretending we still support FDDI or token ring hardware types.
  • fix classless static routes option handling and add syntax to parse human readable forms.
  • fix 'effective' lease created by '-L' to have correct address, 'next_server', 'timestamp', and 'resolv_conf' fields.
  • fix handling of non-printable characters in lease file strings.
  • fix many edge cases in config file and lease parsing and ensure error messages refer to correct position in erroneous line.
  • dhclient.conf(5) can now override anything in an offer or saved lease when creating the effective lease, in particular 'fixed-address', 'next-server', 'filename' and 'server-name'.
  • fix parsing of dhclient.conf(5) statements 'fixed-address' and 'next-server'.
  • log failures to fchmod() or fchown() files being written.
  • create lease files with permissions 0640.
  • fix possible failure to write resolv.conf(5) when -L is used.
  • 'send dhcp-client-identifier "";' in dhclient.conf(5) will result in no 'dhcp-client-identifier' (option 61) being sent.


Security improvements:
  • Position-independent executables (PIE) are now used by default on i386.
  • The arc4random(3) functions now use the ChaCha20 cipher.
  • The kernel random number system is initially seeded by the bootloader, providing better random very early.
  • Kernel stack protector is also seeded via the same mechanism, providing protection earlier.
  • -Wbounded is now enabled in GCC by default.
  • Added explicit_bzero(3).

Performance improvements:
  • Relations between the buffer cache and swap daemon have been improved.

Threading improvements:
  • Interprocess semaphores via sem_open(3).
  • Running threaded processes under a debugger no longer causes panics.
  • SIGPROF and SIGVTALRM are now reliably delivered to the thread that was running when they were triggered.
  • Thread stacks now have a random bias.
  • fork(2) no longer changes the pthread_t of the forking thread in the child.
  • Signaling races eliminated from pthread_kill(3) and pthread_cancel(3).

Assorted improvements:
  • New in-memory file system, tmpfs.
  • Many fuse(4) improvements and stability fixes.
  • Added POSIX required nl(1) utility.
  • OpenBSD/vax has switched to GCC 3.
  • Replaced getdirentries(2) with getdents(2), vastly improving the performance and memory usage of telldir(3).
  • amd64 and i386 now use the MWAIT instruction for their idle loop where available to reduce latency.
  • Added support for CLOCK_UPTIME.
  • Added tcgetsid(3).
  • clock_t is now a 64 bit type, so it no longer wraps around in only 248 days.
  • ino_t is now a 64 bit type, mostly to support large NFS filesystems.
  • Corrected handling of UTIME_OMIT.
  • pax(1) now sets the mode and timestamps correctly on symlinks, and makes hardlinks to symlinks when requested.
  • Corrected handling of shared-library destructors when libc is statically linked.
  • Corrected various disk drivers to handle non-512-byte sectors and disk sizes greater than 32-bits.
  • Corrected growfs(8) to handle non-512-byte sectors and disk sizes greater than 32-bits.
  • All CIRCLEQ uses replaced with TAILQ.
  • Preserve and honour changes to the OpenBSD bounds in a disklabel.
  • fdisk(8) now always writes a good signature when MBR is written to disk.
  • disklabel(8) now writes the disklabel to the correct location on non-512-byte sector devices.
  • Fix athn(4) tick calculations to eliminate excessive timeouts.
  • Allow disklabel(8) to set any partition, including 'C', to type UNUSED.
  • New sha512(1) tool to calculate and verify the SHA-512 checksums of files.
  • sha256(1) and related tools (cksum(1), md5(1), sha1(1), and sha512(1)) now support a new -h flag to place the checksum into a specified hash file instead of stdout.
  • sha256(1) and related tools now support a new -C flag that allows the verification of selected files in a checklist.
  • sha256(1) and related tools will now print MISSING if they encounter non-existent files in a checklist.
  • i386 and amd64 platforms can now boot from keydisk-based softraid(4) crypto volumes.
  • Allow softraid(4) to work with partitions larger than 2TB.
  • Removed experimental RAID 4 support from softraid(4).
  • Added experimental support for rebuilding RAID 5 softraid(4) volumes. Lots of testing is still required and there is missing functionality, such as the ability to resume a partially completed rebuild. bioctl(8) refuses to create RAID 5 volumes unless recompiled with -DRAID5.
  • The uhts(4) driver has been merged into ums(4).

OpenSSH 6.6 (including changes to 6.5, a feature-focused release):
Security:
  • sshd(8): when using environment passing with a sshd_config(5) AcceptEnv pattern with a wildcard. OpenSSH prior to 6.6 could be tricked into accepting any enviornment variable that contains the characters before the wildcard character.

New/changed features:
  • ssh(1), sshd(8): Add support for key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange method is the default when both the client and server support it.
  • ssh(1), sshd(8): Add support for ED25519 as a public key type. ED25519 is a elliptic curve signature scheme that offers better security than ECDSA and DSA and good performance. It may be used for both user and host keys.
  • Add a new private key format that uses a bcrypt KDF to better protect keys at rest. This format is used unconditionally for ED25519 keys, but may be requested when generating or saving existing keys of other types via the -o ssh-keygen(1) option. We intend to make the new format the default in the near future. Details of the new format are in the PROTOCOL.key file.
  • ssh(1), sshd(8): Add a new transport cipher "chacha20-poly1305@openssh.com" that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an authenticated encryption mode. Details are in the PROTOCOL.chacha20poly1305 file.
  • ssh(1), sshd(8): Refuse RSA keys from old proprietary clients and servers that use the obsolete RSA+MD5 signature scheme. It will still be possible to connect with these clients/servers but only DSA keys will be accepted, and OpenSSH will refuse connection entirely in a future release.
  • ssh(1), sshd(8): Refuse old proprietary clients and servers that use a weaker key exchange hash calculation.
  • ssh(1): Increase the size of the Diffie-Hellman groups requested for each symmetric key size. New values from NIST Special Publication 800-57 with the upper limit specified by RFC 4419.
  • ssh(1), ssh-agent(1): Support PKCS#11 tokens that only provide X.509 certs instead of raw public keys. (requested as bz#1908)
  • ssh(1): Add a ssh_config(5) Match keyword that allows conditional configuration to be applied by matching on hostname, user and result of arbitrary commands.
  • ssh(1): Add support for client-side hostname canonicalisation using a set of DNS suffixes and rules in ssh_config(5). This allows unqualified names to be canonicalised to fully-qualified domain names to eliminate ambiguity when looking up keys in known_hosts or checking host certificate names.
  • sftp-server(8): Add the ability to whitelist and/or blacklist sftp protocol requests by name.
  • sftp-server(8): Add a sftp "fsync@openssh.com" to support calling fsync(2) on an open file handle.
  • sshd(8): Add a ssh_config(5) PermitTTY to disallow TTY allocation, mirroring the longstanding no-pty authorized_keys option.
  • ssh(1): Add a ssh_config(5) ProxyUseFDPass option that supports the use of ProxyCommands that establish a connection and then pass a connected file descriptor back to ssh(1). This allows the ProxyCommand to exit rather than staying around to transfer data.
  • ssh(1), sshd(8): this release removes the J-PAKE authentication code. This code was experimental, never enabled and had been unmaintained for some time.
  • ssh(1): when processing Match blocks, skip 'exec' clauses other clauses predicates failed to match.
  • ssh(1): if hostname canonicalisation is enabled and results in the destination hostname being changed, then re-parse ssh_config(5) files using the new destination hostname. This gives 'Host' and 'Match' directives that use the expanded hostname a chance to be applied.

The following significant bugs have been fixed in this release:
  • ssh(1), sshd(8): Fix potential stack exhaustion caused by nested certificates.
  • ssh(1): make BindAddress work with UsePrivilegedPort. (bz#1211)
  • sftp(1): fix the progress meter for resumed transfer. (bz#2137)
  • ssh-add(1): do not request smartcard PIN when removing keys from ssh-agent(1). (bz#2187)
  • sshd(8): fix re-exec fallback when original sshd(8) binary cannot be executed. (bz#2139)
  • ssh-keygen(1): Make relative-specified certificate expiry times relative to current time and not the validity start time.
  • sshd(8): fix AuthorizedKeysCommand inside a Match block. (bz#2161)
  • sftp(1): symlinking a file would incorrectly canonicalise the target path. (bz#2129)
  • ssh-agent(1): fix a use-after-free in the PKCS#11 agent helper executable. (bz#2175)
  • sshd(8): Improve logging of sessions to include the user name, remote host and port, the session type (shell, command, etc.) and allocated TTY (if any).
  • sshd(8): tell the client (via a debug message) when their preferred listen address has been overridden by the server's GatewayPorts setting. (bz#1297)
  • sshd(8): include report port in bad protocol banner message. (bz#2162)
  • sftp(1): fix memory leak in error path in do_readdir(). (bz#2163)
  • sftp(1): don't leak file descriptor on error. (bz#2171)
  • sshd(8): include the local address and port in "Connection from ..." message. (only shown at loglevel>=verbose)
  • ssh(1): avoid spurious "getsockname failed: Bad file descriptor" in ssh -W. (bz#2200, debian#738692)
  • sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace sandbox modes, as it is reachable if the connection is terminated during the pre-auth phase.
  • ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum parsing. Minimum key length checks render this bug unexploitable to compromise SSH 1 sessions.
  • sshd_config(5) clarify behaviour of a keyword that appears in multiple matching Match blocks. (bz#2184)
  • ssh(1): avoid unnecessary hostname lookups when canonicalisation is disabled. (bz#2205)
  • sshd(8): avoid sandbox violation crashes in GSSAPI code by caching the supported list of GSSAPI mechanism OIDs before entering the sandbox. (bz#2107)
  • ssh(1): fix possible crashes in SOCKS4 parsing caused by assumption that the SOCKS username is nul-terminated.
  • ssh(1): fix regression for UsePrivilegedPort=yes when BindAddress is not specified.
  • ssh(1), sshd(8): fix memory leak in ECDSA signature verification.
  • ssh(1): fix matching of 'Host' directives in ssh_config(5) files to be case-insensitive again. (regression in 6.5)

Ports and packages:
  • Over 8,700 ports.
  • Major overhaul of the package tools resulting in much better memory usage.
  • pkg_add(1) now trusts signed packages only by default.
  • The build process now allows some limited capability for building conflicting packages, yielding kde4 packages as a result, along with kde3.

Many pre-built packages for each architecture:
  • i386: 8468
  • sparc64: 7969
  • alpha: 6199
  • m68k: XXXX
  • sh: XXXX
  • amd64: 8534
  • powerpc: 8057
  • m88k: XXXX
  • sparc: 4681
  • arm: XXXX
  • hppa: 6549
  • vax: XXXX
  • mips64: 4726
  • mips64el: 6730

Some highlights:
  • GNOME 3.10.2
  • KDE 3.5.10
  • KDE 4.11.5
  • Xfce 4.10
  • MySQL 5.1.73
  • PostgreSQL 9.3.2
  • Postfix 2.11.0
  • OpenLDAP 2.3.43 and 2.4.38
  • Mozilla Firefox 24.3 and 26.0
  • Mozilla Thunderbird 24.3.0
  • GHC 7.6.3
  • LibreOffice 4.1.4.2
  • Emacs 21.4 and 24.3
  • Vim 7.4.135
  • PHP 5.3.28 and 5.4.24
  • Python 2.7.6 and 3.3.2
  • Ruby 1.8.7.374, 1.9.3.484, 2.0.0.353 and 2.1.0
  • Tcl/Tk 8.5.15 and 8.6.1
  • JDK 1.6.0.32 and 1.7.0.21
  • Mono 2.10.9
  • Chromium 32.0.1700.102
  • Groff 1.22.2
  • Go 1.2
  • GCC 4.6.4 and 4.8.2
  • LLVM/Clang 3.3
  • Node.js 0.10.24

As usual, steady improvements in manual pages and other documentation.

The system includes the following major components from outside suppliers:
  • Xenocara (based on X.Org 7.7 with xserver 1.14.5 + patches, freetype 2.5.2, fontconfig 2.10.91, Mesa 9.2.5, xterm 301, xkeyboard-config 2.10.1 and more)
  • Gcc 4.2.1 (+ patches) and 3.3.6 (+ patches)Some highlights:
    • GNOME 3.10.2
    • KDE 3.5.10
    • KDE 4.11.5
    • Xfce 4.10
    • MySQL 5.1.73
    • PostgreSQL 9.3.2
    • Postfix 2.11.0
    • OpenLDAP 2.3.43 and 2.4.38
    • Mozilla Firefox 24.3 and 26.0
    • Mozilla Thunderbird 24.3.0
    • GHC 7.6.3
    • LibreOffice 4.1.4.2
    • Emacs 21.4 and 24.3
    • Vim 7.4.135
    • PHP 5.3.28 and 5.4.24
    • Python 2.7.6 and 3.3.2
    • Ruby 1.8.7.374, 1.9.3.484, 2.0.0.353 and 2.1.0
    • Tcl/Tk 8.5.15 and 8.6.1
    • JDK 1.6.0.32 and 1.7.0.21
    • Mono 2.10.9
    • Chromium 32.0.1700.102
    • Groff 1.22.2
    • Go 1.2
    • GCC 4.6.4 and 4.8.2
    • LLVM/Clang 3.3
    • Node.js 0.10.24
    Perl 5.16.3 (+ patches)Some highlights:
    • GNOME 3.10.2
    • KDE 3.5.10
    • KDE 4.11.5
    • Xfce 4.10
    • MySQL 5.1.73
    • PostgreSQL 9.3.2
    • Postfix 2.11.0
    • OpenLDAP 2.3.43 and 2.4.38
    • Mozilla Firefox 24.3 and 26.0
    • Mozilla Thunderbird 24.3.0
    • GHC 7.6.3
    • LibreOffice 4.1.4.2
    • Emacs 21.4 and 24.3
    • Vim 7.4.135
    • PHP 5.3.28 and 5.4.24
    • Python 2.7.6 and 3.3.2
    • Ruby 1.8.7.374, 1.9.3.484, 2.0.0.353 and 2.1.0
    • Tcl/Tk 8.5.15 and 8.6.1
    • JDK 1.6.0.32 and 1.7.0.21
    • Mono 2.10.9
    • Chromium 32.0.1700.102
    • Groff 1.22.2
    • Go 1.2
    • GCC 4.6.4 and 4.8.2
    • LLVM/Clang 3.3
    • Node.js 0.10.24
    Our improved and secured version of Apache 1.3, with SSL/TLS and DSO supportSome highlights:
    • GNOME 3.10.2
    • KDE 3.5.10
    • KDE 4.11.5
    • Xfce 4.10
    • MySQL 5.1.73
    • PostgreSQL 9.3.2
    • Postfix 2.11.0
    • OpenLDAP 2.3.43 and 2.4.38
    • Mozilla Firefox 24.3 and 26.0
    • Mozilla Thunderbird 24.3.0
    • GHC 7.6.3
    • LibreOffice 4.1.4.2
    • Emacs 21.4 and 24.3
    • Vim 7.4.135
    • PHP 5.3.28 and 5.4.24
    • Python 2.7.6 and 3.3.2
    • Ruby 1.8.7.374, 1.9.3.484, 2.0.0.353 and 2.1.0
    • Tcl/Tk 8.5.15 and 8.6.1
    • JDK 1.6.0.32 and 1.7.0.21
    • Mono 2.10.9
    • Chromium 32.0.1700.102
    • Groff 1.22.2
    • Go 1.2
    • GCC 4.6.4 and 4.8.2
    • LLVM/Clang 3.3
    • Node.js 0.10.24
    Nginx 1.4.4 (+ patches)Some highlights:
    • GNOME 3.10.2
    • KDE 3.5.10
    • KDE 4.11.5
    • Xfce 4.10
    • MySQL 5.1.73
    • PostgreSQL 9.3.2
    • Postfix 2.11.0
    • OpenLDAP 2.3.43 and 2.4.38
    • Mozilla Firefox 24.3 and 26.0
    • Mozilla Thunderbird 24.3.0
    • GHC 7.6.3
    • LibreOffice 4.1.4.2
    • Emacs 21.4 and 24.3
    • Vim 7.4.135
    • PHP 5.3.28 and 5.4.24
    • Python 2.7.6 and 3.3.2
    • Ruby 1.8.7.374, 1.9.3.484, 2.0.0.353 and 2.1.0
    • Tcl/Tk 8.5.15 and 8.6.1
    • JDK 1.6.0.32 and 1.7.0.21
    • Mono 2.10.9
    • Chromium 32.0.1700.102
    • Groff 1.22.2
    • Go 1.2
    • GCC 4.6.4 and 4.8.2
    • LLVM/Clang 3.3
    • Node.js 0.10.24
    OpenSSL 1.0.1c (+ patches)Some highlights:
    • GNOME 3.10.2
    • KDE 3.5.10
    • KDE 4.11.5
    • Xfce 4.10
    • MySQL 5.1.73
    • PostgreSQL 9.3.2
    • Postfix 2.11.0
    • OpenLDAP 2.3.43 and 2.4.38
    • Mozilla Firefox 24.3 and 26.0
    • Mozilla Thunderbird 24.3.0
    • GHC 7.6.3
    • LibreOffice 4.1.4.2
    • Emacs 21.4 and 24.3
    • Vim 7.4.135
    • PHP 5.3.28 and 5.4.24
    • Python 2.7.6 and 3.3.2
    • Ruby 1.8.7.374, 1.9.3.484, 2.0.0.353 and 2.1.0
    • Tcl/Tk 8.5.15 and 8.6.1
    • JDK 1.6.0.32 and 1.7.0.21
    • Mono 2.10.9
    • Chromium 32.0.1700.102
    • Groff 1.22.2
    • Go 1.2
    • GCC 4.6.4 and 4.8.2
    • LLVM/Clang 3.3
    • Node.js 0.10.24
    SQLite 3.8.0.2 (+ patches)Some highlights:
    • GNOME 3.10.2
    • KDE 3.5.10
    • KDE 4.11.5
    • Xfce 4.10
    • MySQL 5.1.73
    • PostgreSQL 9.3.2
    • Postfix 2.11.0
    • OpenLDAP 2.3.43 and 2.4.38
    • Mozilla Firefox 24.3 and 26.0
    • Mozilla Thunderbird 24.3.0
    • GHC 7.6.3
    • LibreOffice 4.1.4.2
    • Emacs 21.4 and 24.3
    • Vim 7.4.135
    • PHP 5.3.28 and 5.4.24
    • Python 2.7.6 and 3.3.2
    • Ruby 1.8.7.374, 1.9.3.484, 2.0.0.353 and 2.1.0
    • Tcl/Tk 8.5.15 and 8.6.1
    • JDK 1.6.0.32 and 1.7.0.21
    • Mono 2.10.9
    • Chromium 32.0.1700.102
    • Groff 1.22.2
    • Go 1.2
    • GCC 4.6.4 and 4.8.2
    • LLVM/Clang 3.3
    • Node.js 0.10.24
    • Sendmail 8.14.8, with libmilterSome highlights:
      • GNOME 3.10.2
      • KDE 3.5.10
      • KDE 4.11.5
      • Xfce 4.10
      • MySQL 5.1.73
      • PostgreSQL 9.3.2
      • Postfix 2.11.0
      • OpenLDAP 2.3.43 and 2.4.38
      • Mozilla Firefox 24.3 and 26.0
      • Mozilla Thunderbird 24.3.0
      • GHC 7.6.3
      • LibreOffice 4.1.4.2
      • Emacs 21.4 and 24.3
      • Vim 7.4.135
      • PHP 5.3.28 and 5.4.24
      • Python 2.7.6 and 3.3.2
      • Ruby 1.8.7.374, 1.9.3.484, 2.0.0.353 and 2.1.0
      • Tcl/Tk 8.5.15 and 8.6.1
      • JDK 1.6.0.32 and 1.7.0.21
      • Mono 2.10.9
      • Chromium 32.0.1700.102
      • Groff 1.22.2
      • Go 1.2
      • GCC 4.6.4 and 4.8.2
      • LLVM/Clang 3.3
      • Node.js 0.10.24
      • Bind 9.4.2-P2 (+ patches)
      • NSD 4.0.1
      • Lynx 2.8.7rel.2 with HTTPS and IPv6 support (+ patches)
      • Sudo 1.7.2p8
      • Ncurses 5.7
      • Heimdal 1.5.2 (+ patches)
      • Binutils 2.15 (+ patches)
      • Gdb 6.3 (+ patches)
      • Less 444 (+ patches)
      • Awk Aug 10, 2011 version

OpenBSD wird ausschließlich von Freiwilligen entwickelt. Das Projekt finanziert die nötige Entwicklungsumgebung und Veranstaltungen für Entwickler mit dem Verkauf von CDs und durch die Annahme von Spenden von Organisationen und Privatpersonen. Diese Geldmittel stellen sicher, dass OpenBSD auch weiterhin existiert, und frei für jeden und jegliche Benutzung bleibt.

Verlagsort Kanada
Sprache englisch
Einbandart DVD-Box
Themenwelt Informatik Betriebssysteme / Server Unix / Linux
ISBN-10 0-9881561-3-X / 098815613X
ISBN-13 978-0-9881561-3-5 / 9780988156135
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:

5 Beste Systemsoftware der Welt

von (Bayreuth), am 11.11.2014

Kein anderes Betriebssystem ist so stabil und sicher. Es ist in 5-10 min installiert und erfüllt seine Aufgaben perfekt. Besser kann man es nicht machen. Ich arbeite seit 15 Jahren damit.