Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:NSA Involvement (Score 1) 290

sshd is "used by over 50% of its users without passphrases" ?

You mean it is used with public keys INSTEAD of passphrases.

By your own statement, you're apparently smarter than the 50% of ssh users who rely on public key authentication. Obviously, they all missed the huge, gaping security hole exposing their hosts and source code repositories to attack. That's why ssh remains the #1 attack vector to this day across the internet. Right?

At least -e is in the man page, plainly documented.

Your diatribe is severely misleading at best. If you aren't trolling, then it's no wonder why nobody takes your advice seriously. And if you are, I just typed all this crap in response to, essentially, a Rush Limbaugh cartoon.

Comment Re:OpenBSD and Wi-Fi (Score 1) 290

The fact that station mode is more reliable for most wifi drivers reflects how the developers actually use them. It's a volunteer project. Someone has to have the time, skill and motivation to do the work. A roadmap is for the person doing the work to develop their own direction. Wireless networking hardware is a particularly poorly documented, secretive, painful place to work and that is reflected in what you experience. While the general situation has vastly improved for some chipsets in the past several years, someone needs to step in and figure out these and other issues in the wifi area. The situation isn't terribly different for other free OSes, often times only the vendor provided and updated drivers tend to be reliable for AP mode (or other less common features) and only relatively recently have vendors agreed to redistributable, BSD compatible licenses for some of their source code, long after people like Damien Bergamini spent huge amounts of effort reverse engineering binary-only drivers from vendors. Painful indeed. It really shouldn't come as a shock to people that most don't want to spend their time in this area due to the sordid history.

Comment Re:Quality vs OpenBSD? (Score 2) 136

Binary firmware blobs, OpenBSD allows. You would run them anyways on your hardware, no matter what software you choose.

Binary kernel blobs, OpenBSD eschews. Example - While FreeBSD is basically happy to suck the dick of Nvidia, running proven crap, OpenBSD will wait for a Nouveau port coming in perhaps the near future.

Comment Re:Quality vs OpenBSD? (Score 1) 136

OpenBSD turns on a number of security features by default that FreeBSD avoids for really early backward binary compatibility (or just plain laziness). The newest feature in OpenBSD 5.5 is PIE-by-default executables on major platforms. Even Microsoft Windows implements more than FreeBSD! See Theo deRaadt's talk slides http://tech.yandex.com/events/ruBSD/2013/talks/103 for some more examples.

Comment Re:Quality vs OpenBSD? (Score 1) 136

Capsicum, POSIX and NFS4 ACLs are all about adding complexity to allow for greater administrative policy enforcement. To put the OpenBSD point of view into perspective with a modern example, this is exactly the kind of policy that makes NSA admins rest easy at night and exactly the kind of security that allows Edward Snowden to secretly make out with 200,000 top secret documents. Real security means the software *does*what*it*promises* which a large and complex administrative policy enforcement system can almost never do.

In OpenBSD, security means that you eliminate bugs so that the most basic promise is held true. Adding complexity almost always does the opposite. We are talking about two completely different ideas of "security" here. This is not to say that ACL systems have no place, but rather, the systems that are smaller, easier to audit and easier to implement are going to find a place in OpenBSD long before the large and unwieldy systems could ever be incorporated.

That being said, FreeBSD 10 was the first FreeBSD system to distribute signed packages. OpenBSD 5.5 will be the first version of OpenBSD that distributes a signed base, signed firmware and signed packages. The code is small, the benefit is clear, and the implementation (at least in OpenBSD) is obvious.

Comment Re:Theo Theo Theo (Score 1) 232

Slow and secure are not necessarily related. There are cases where OpenBSD is 1-2% slower because of some specific security feature, such as 100% PIE executables, but the real slow downs are from old BSD code which is slowly being reworked to be fast and efficient. There are only so many people and so many minutes in a day to make these improvements.

The general idea on Slashdot that OpenBSD is slow because it's secure is just plain WRONG. It's slow (less and less so, I might add) because it takes time to speed it up and that is a priority for some, not all, developers.

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...