===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/57.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -r1.65 -r1.66
--- www/57.html 2015/03/13 00:44:44 1.65
+++ www/57.html 2015/03/13 03:19:46 1.66
@@ -82,13 +82,13 @@
The sdhc(4) driver can properly resume on Ricoh controllers.
The sdhc(4) driver now supports Ricoh R5U822 and R5U823 card readers.
The mfii(4) driver now supports the Megaraid 3008 (Fury) and 3108 (Invader) cards.
- The myx(4) driver runs less code under big lock.
- The msk(4) driver now supports Yukon Prime, Yukon Optima 2, Yukon 88E8079, and various EC U and Supreme chipsets.
+ The myx(4) driver runs less code under the big lock.
+ The msk(4) driver now supports Yukon Prime, Yukon Optima 2, Yukon 88E8079, and various EC U and Supreme chipsets.
The umass(4) driver now supports Archos 24y Vision devices.
The athn(4) driver now supports Atheros UB94 devices.
The azalia(4) driver now supports Realtek ALC885 codecs and Bay Trail HD Audio devices.
The ix(4) driver now supports onboard Ethernet devices in SPARC T5 machines.
- The upd(4) driver how handles UPSes with broken report descriptors.
+ The upd(4) driver now handles UPSes with broken report descriptors.
The ums(4) driver now supports the USB Tablet device emulated by Qemu.
The umsm(4) driver now supports MEDION S4222 devices.
The pciide(4) driver now supports Intel C610 chipsets.
@@ -97,7 +97,7 @@
The umodem(4) driver now supports Arduino Leonardo devices.
Wireless network scanning problems with the iwn(4) driver have been fixed.
Support for RS* IGP Radeon devices in the radeondrm(4) driver has been fixed.
- PowerMac7,2 and PowerMac7,3 can now boot multiprocessor kernel
+ PowerMac7,2 and PowerMac7,3 can now boot with a multiprocessor kernel.
@@ -111,7 +111,7 @@
Generic network stack improvements:
- - The routing table is now used for most of the address lookups operations superseding the RB-tree and IPv4 address list.
+
- The routing table is now used for most of the address lookup operations superseding the RB-tree and IPv4 address list.
- The SipHash algorithm is now used for PCB hashing,
trunk(4) loadbalancing,
pf(4) and
@@ -126,19 +126,19 @@
- Installer improvements:
- The etc and xetc sets are now part of base and
- xbase and are not distributed separately any more. They are extracted
- from base and xbase during installation and upgrade.
+ xbase and are not distributed separately anymore. They are extracted
+ from base and xbase during installation and upgrades.
Note that this includes the rc and rc.conf files!
- The installer now supports
trunk(4)
interfaces during upgrades.
- The discovery of the responsefile location for unattended installation and
- upgrade has been extended to be more flexible.
+ upgrades has been extended to be more flexible.
- - Ask for the location if dhcp discovery fails for location or mode.
-
- Provide a default url if the 'next-server' dhcp option is found.
+
- Ask for the location if DHCP discovery fails for location or mode.
+
- Provide a default URL if the 'next-server' DHCP option is found.
- Use /auto_install.conf or /auto_upgrade.conf if present.
-
- Automatically start installer in unattended mode if either one of these
+
- Automatically start the installer in unattended mode if either one of these
files is present when the system boots.
- Ignore hostname.if.* files when upgrading.
@@ -146,7 +146,7 @@
-
fdisk(8) now zeros out GPT signatures found when writing out an MBR that has been re-initialized and has no EFI or EFISYS partition.
- Fixed manipulation of 'ro' and 'rw' fstab options to avoid damage to other options that happen to contain 'ro' or 'rw'.
-
- The ramdisk binary (one binary contains all the commands) is now compiled without optimization and security features. The benefit is a substantial savings in space, allowing more features in the future.
+
- The ramdisk binary (one binary contains all the commands) is now compiled without optimization and security features. The benefit is a substantial saving in space, allowing more features in the future.
@@ -163,7 +163,7 @@
- Security improvements:
- - Stricter enforcement of W^X in the kernel address space, especially on architectures with the right featureset (amd64, in particular has seen substantial improvements).
+
- Stricter enforcement of W^X in the kernel address space, especially on architectures with the right featureset (amd64, in particular, has seen substantial improvements).
- Support for loadable kernel modules has been removed.
- procfs has been removed.
- Comprehensive audit of the tree to use the reallocarray(3) idiom throughout.
@@ -182,14 +182,14 @@
New functions
srand_deterministic(3),
srandom_deterministic(3),
- seed48_deterministic(3),
- lcong48_deterministic(3),
+ seed48_deterministic(3) and
+ lcong48_deterministic(3)
are added for cases where determinism must be requested.
-
- At resume (or unhibernate) time, use a variety of methods to reseed the random number generator. This also works on VM's which wake up (if a wakeup event is seen).
+
- At resume (or unhibernate) time, use a variety of methods to reseed the random number generator. This also works on VMs which wake up (if a wakeup event is seen).
- All architectures have been transitioned to static PIE, meaning the statically linked binaries in /bin and /sbin now have randomly located text segments.
- Allow larger .openbsd.randomdata ELF segments.
- Sync kernel AES code and ssh(1) AES code to the one shipped with OpenSSL/LibreSSL.
-
- removed passwd(1) support for all password ciphers except blowfish(3)
+
- Removed passwd(1) support for all password ciphers except blowfish(3).
- Use sha512 instead of md5 for tcp(4) initial sequence number.
- Use sha512 instead of md5 in the random number generator.
- Delete secret or secret-derived data in many base utilities with explicit_bzero(3).
@@ -205,10 +205,10 @@
the compatibility layer for other operating systems has been removed.
The API is still compatible with upstream libevent 1.4.15-stable.
- openssl(1)
- s_client now supports a -proxy parameter for connecting over a HTTP proxy.
+ s_client now supports a -proxy parameter for connecting over an HTTP proxy.
- Ground work laid for improved SMP scalability.
- gzsig has been removed.
-
- switch last workq API uses to
+
- Switch last workq API uses to
taskq API and remove all traces of workq.
- Use
services(5) names in the default pf rules in force during startup.
@@ -228,9 +228,9 @@
- Various memory leaks in
dhclient(8) plugged, providing more stability for long running (in terms of time or renewals) instances.
- The
- dhclient(8)
+ dhclient(8)
command line options -q (quiet) and -d (don't daemonize) are now mutually exclusive.
-
- The communications between the privileged and unprivileged
+
- The communication between the privileged and unprivileged
dhclient(8) processes was reworked to further minimize information sharing.
-
dhclient(8) ensures lease timeouts (renew, rebind, expire) are sane and uses default values closer to RFC suggestions.
@@ -242,14 +242,14 @@
dhclient(8).
- Private number conversion functions in
dhclient(8) eliminated in favour of standard library functions.
-
- Further signal race cleanups in
+
- Further signal race cleanups in
ftp(1).
- BIND has been retired, encouraging use of
nsd(8) and
unbound(8).
- Significant namespace cleanup in the /usr/include files, especially related to <sys/param.h> and <limits.h>.
- softraid(4) RAID1 and CRYPTO volumes are now bootable on the sparc64 platform.
-
- relayd(8) now uses "TLS" rather than "SSL" terminology to reflect the deprecation of the latter.
+
- relayd(8) now uses "TLS" rather than "SSL" terminology to reflect the deprecation of the latter.
- relayd(8) now supports the random and source-hash modes with redirections.
- relayd(8) now supports the OPENBSD-RELAYD-MIB via agentx with snmpd(8).
- Added interfaces for setting the close-on-exec flag and/or non-blocking mode on new file descriptors: pipe2(2), dup3(2), accept4(2), mkostemp(3), mkostemps(3), the SOCK_CLOEXEC and SOCK_NONBLOCK flags for socket(2) and socketpair(2), and the MSG_CMSG_CLOEXEC flag for recvmsg(2). In addition, posix_spawn_file_actions_adddup2(3) now always clears the close-on-exec flag.
@@ -258,7 +258,7 @@
- Added chflagsat(2), sockatmark(3), and stravis(3).
- Merged performance and safety fixes for fts(3) from FreeBSD.
- Merged fixes for file descriptor leaks in various rpc(3) functions from NetBSD.
-
- Added kern.global_ptrace sysctl(1) to disable by default the ability to ptrace(2) processes that aren't your descendent.
+
- Added a kern.global_ptrace sysctl(1) to disable, by default, the ability to ptrace(2) processes that aren't your descendent.
- kdump(1) now always displays both the numeric and the textual forms for users, groups, timestamps, and sysctl ids, eliminating the -r option. It also auto-selects between decimal and hex format for arguments, renders more types of flags, and is more robust when parsing corrupt ktrace files.
- chmod(1)/chgrp(1)/chown(8) now comply with POSIX's requirements when they encounter symlinks when the -R option is used, and are safe from race conditions when doing so.
- The dmesg(8) utility can now display the console message buffer in addition to the system message buffer.
@@ -268,7 +268,7 @@
- OpenBSD httpd(8):
- - SSLv2/3 is not supported any more; renamed all occurrences of "SSL" to "TLS".
+
- SSLv2/3 is not supported anymore; renamed all occurrences of "SSL" to "TLS".
- Various TLS improvements with better support for ECDHE/DHE forward secrecy.
- Improved support for virtual hosts by supporting name- and IP- based aliases.
- Added support for basic authentication by checking against files created with htpasswd(1).
@@ -283,7 +283,7 @@
- OpenSMTPD 5.4.4:
- - SSLv3 is not supported any more.
+
- SSLv3 is not supported anymore.
- Added support for a new message and headers parser.
- Added support for append-domain.
- Restricted address lookups to configured address families.
@@ -484,7 +484,7 @@
If a connection terminates, syslogd tries to reconnect.
When the message buffer in memory gets full, the number of dropped
messages is counted and logged.
-
- With TLS the x509 certificate of the syslog server is verified.
+
- With TLS, the x509 certificate of the syslog server is verified.
- The maximum message size has been increased according to newer RFC.