=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/59.html,v retrieving revision 1.42 retrieving revision 1.43 diff -u -r1.42 -r1.43 --- www/59.html 2016/02/25 07:28:57 1.42 +++ www/59.html 2016/02/25 10:27:04 1.43 @@ -105,10 +105,10 @@
  • 453 out of 707 base system binaries adapted to use pledge.
  • 14 ports adapted to use pledge (some decompression tools, mutt, some pdf tools, chromium/iridium, and the i3 window manager). -
  • pledge exposed several bugs that has been corrected, for example in bgpd(8), iked(8), ldapd(8), ntpd(8) or syslogd(8), -
  • and several misguided "features" that has been removed, like support for HOSTALIASES from the resolver, support for "lookup yp" in /etc/resolv.conf, setuid-preserving code in binutils tools or ed-style diffs via proc/exec in patch(1). -
  • pledge has require a somehow intensive audit of userland to properly annotate programs, resulting some design changes like in rdate(1), sndiod(8) or the introduction of SOCK_DNS socket(2) flag that makes SS_DNS tagged socket conceptually different from plain socket. -
  • it also has been used to constraint programs in a more strict POSIX subset, like some binutils tools that handle untrusted data (strings(1), objdump(1), ...), or the RSA-privsep process in smtpd(1). +
  • Several bugs exposed by pledge(2) have been corrected, for example in bgpd(8), iked(8), ldapd(8), ntpd(8), and syslogd(8), +
  • Several misguided "features" have been removed, such as support for HOSTALIASES from the resolver, support for "lookup yp" in /etc/resolv.conf, setuid-preserving code in binutils tools or ed-style diffs via proc/exec in patch(1). +
  • A somewhat intensive audit of userland program so that they could be properly annotated with pledge(2) was done, resulting in some design changes such as in rdate(1), sndiod(8) or the introduction of SOCK_DNS socket(2) flag that makes an SS_DNS tagged socket conceptually different from a plain socket. +
  • It also has been used to constrain programs to a more limited POSIX subset, such as some binutils tools that handle untrusted data (strings(1), objdump(1), ...), or the RSA-privsep process in smtpd(1).

    @@ -117,6 +117,7 @@

  • Remove support for obsolete IPv6 socket options.
  • New etherip(4) pseudo-device for tunnelling Ethernet frames across IP[46] networks using RFC 3378 EtherIP encapsulation. +
  • New pair(4) pseudo-device for ...
  • ...

    @@ -181,7 +182,13 @@

  • Many improvements were made to the GPT kernel support to ensure safe and reliable operation of GPT and MBR processing.
  • disklabel(8) no longer supports boot code installation, with the -B and -b flags being removed. The associated fields in the disklabel were also removed. These functions are now all performed by installboot(8). - +
  • PowerPC converted to secure-PLT ABI variant. +
  • Perform lazy binding updates in ld.so(1) using kbind(2) to improve security and reduce overhead in threaded processes. +
  • Over 100 internal or obsolete interfaces have been deleted or are no longer exported by libc, reducing symbol conflicts and process size. +
  • libc now uses local references for most of its own functions to avoid symbol overriding, improve standards compliance, increase speed, and reduce dynamic linking overhead. +
  • Handle intra-thread kills via new thrkill(2) system call to tighten pledge(2) restrictions and improve pthread_kill(3) and pthread_cancel(3) compliance. +
  • Added getpwnam_shadow(3) and getpwuid_shadow(3) to permit tighter pledge(2) restrictions. +
  • Added support to ktrace(1) the arguments to execve(2) and pledge(2). Removed support for tracing context switch points. kevent structures are now dumped.
  • ...