=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/59.html,v retrieving revision 1.93 retrieving revision 1.94 diff -u -r1.93 -r1.94 --- www/59.html 2019/04/24 15:54:54 1.93 +++ www/59.html 2019/05/27 22:55:18 1.94 @@ -1,28 +1,29 @@ - - - + + + + OpenBSD 5.9 - - - - -

+

-OpenBSD -5.9 +OpenBSD +5.9

+ + +
-Dr W^X +Dr W^X + Released March 29, 2016
Copyright 1997-2016, Theo de Raadt.
-ISBN 978-0-9881561-7-3 +ISBN 978-0-9881561-7-3
5.9 Songs: "Doctor W^X", "Systemagic (Anniversary Edition)" @@ -31,30 +32,30 @@
  • See the information on the FTP page for a list of mirror machines. -
  • Go to the pub/OpenBSD/5.9/ directory on +
  • Go to the pub/OpenBSD/5.9/ directory on one of the mirror sites.
  • Have a look at the 5.9 errata page for a list of bugs and workarounds.
  • See a detailed log of changes between the 5.8 and 5.9 releases.

    -

  • signify(1) - pubkeys for this release:

    +

  • signify(1) + pubkeys for this release: - -
    +

    + +
    openbsd-59-base.pub: - + RWQJVNompF3pwfIqbg+5sxfpxmZMa3tTBaW4qbUhWje/H/M7glrA6oVn -
    +
    openbsd-59-fw.pub: - + RWSdmaNkytzh6BApmPSNSDLNg26ZaXlY8g/879UvLdo3rjbsby76Eda1 -
    +
    openbsd-59-pkg.pub: - + RWSLRYDCTJeWLIScncqwGuXK6JVXDcIyRT0q+0m30MXXG4W2xWS4NZBP -

    @@ -62,12 +63,14 @@ sys.tar.gz, xenocara.tar.gz, ports.tar.gz files, or in the files fetched via ports.tar.gz. -
    +


    -

    What's New

    +
    +

    What's New

    +

    This is a partial list of new features and systems included in OpenBSD 5.9. For a comprehensive list, see the changelog leading to 5.9. @@ -77,72 +80,70 @@

    • W^X policy enforced in the i386 kernel address space.
    -

  • Improved hardware support, including:
      -
    • New asmc(4) +
    • New asmc(4) driver for the Apple System Management Controller. -
    • New pchtemp(4) +
    • New pchtemp(4) driver for the thermal sensor found on Intel X99, C610 series, 9 series and 100 series PCH. -
    • New uonerng(4) +
    • New uonerng(4) driver for the Moonbase Otago OneRNG. -
    • New dwiic(4) +
    • New dwiic(4) driver for the Synopsys DesignWare I2C controller. -
    • New ikbd(4), - ims(4), and - imt(4) +
    • New ikbd(4), + ims(4), and + imt(4) drivers for HID-over-i2c keyboards, mice and multitouch touchpads. -
    • New efifb(4) +
    • New efifb(4) driver for EFI frame buffer. -
    • New viocon(4) +
    • New viocon(4) driver for the - virtio(4) + virtio(4) console interface provided by KVM, QEMU, and others. -
    • New xen(4) +
    • New xen(4) driver implementing Xen domU initialization and PVHVM device attachment. -
    • New xspd(4) +
    • New xspd(4) driver for the XenSource Platform Device providing guests with additional capabilities. -
    • New xnf(4) +
    • New xnf(4) driver for Xen paravirtualized networking interface.
    • amd64 can now boot from 32 bit and 64 bit EFI.
    • Initial support for hardware reduced ACPI added to - acpi(4). + acpi(4).
    • Support for ACPI configured SD host controllers has been added to - sdhc(4). -
    • The puc(4) + sdhc(4). +
    • The puc(4) driver now supports Moxa CP-168U, Perle Speed8 LE and QEMU PCI serial devices.
    • Intel 100 Series PCH Ethernet MAC with i219 PHY support has been added to the - em(4) driver. + em(4) driver.
    • RTL8168H/RTL8111H support has been added to - re(4). -
    • inteldrm(4) + re(4). +
    • inteldrm(4) has been updated to Linux 3.14.52, adding initial support for Bay Trail and Broadwell graphics.
    • Support for audio in Thinkpad docks has been added to the - azalia(4) + azalia(4) driver.
    • Support for Synaptic touchpads without W mode has been added to the - pms(4) + pms(4) driver.
    • Support for tap-and-drag detection with ALPS touchpads in the - pms(4) + pms(4) driver has been improved. -
    • The sdmmc(4) +
    • The sdmmc(4) driver now supports sector mode for eMMC devices, such as those found on some BeagleBone Black boards. -
    • The cnmac(4) +
    • The cnmac(4) driver now supports checksum offloading. -
    • The ipmi(4) +
    • The ipmi(4) driver now supports OpenIPMI compatible character device.
    • Support for ST-506 disks has been removed.
    -

    -

  • pledge(2) +
  • pledge(2) support integrated:
  • pledge(2) is also used to constrain programs that handle untrusted data to a very limited subset of POSIX. For example, - + strings(1) or - + objdump(1) from binutils or the RSA-privsep process in - + smtpd(8).
-

  • SMP network stack improvements: -

  • Initial IEEE 802.11n wireless support:
      -
    • The ieee80211(9) +
    • The ieee80211(9) subsystem now supports HT data rates up to 65 Mbit/s (802.11n MCS 0-7).
    • The input path of - ieee80211(9) + ieee80211(9) now supports receiving A-MPDU and A-MSDU aggregated frames. -
    • The iwm(4) - and iwn(4) +
    • The iwm(4) + and iwn(4) drivers make use of the above features.
    • 802.11n mode is used by default if supported by the OpenBSD wireless driver and the access point. Operation in 802.11a, 802.11b, and 802.11g modes can be forced with - the new ifconfig(8) - mode subcommand. + the new ifconfig(8) + mode subcommand.
    -

  • Generic network stack improvements:
      -
    • New etherip(4) +
    • New etherip(4) pseudo-device for tunneling Ethernet frames across IP[46] networks using RFC 3378 EtherIP encapsulation. -
    • New pair(4) +
    • New pair(4) pseudo-device for creating paired virtual Ethernet interfaces. -
    • New tap(4) +
    • New tap(4) pseudo-device, split up from - tun(4), + tun(4), providing a layer 3 interface with userland tools.
    • Support for obsolete IPv6 socket options has been removed. -
    • The iwn(4) +
    • The iwn(4) driver now passes IEEE 802.11 control frames in monitor mode, allowing full capture of traffic on a particular wireless channel. -
    • pflow(4) +
    • pflow(4) now supports IPv6 for transport.
    -

  • Installer improvements:
      @@ -287,51 +284,49 @@
    • Installing to a disk partitioned with a GPT is now supported (amd64 only).
    • When initializing a GPT, the required EFI System partition is automatically created.
    • When installing to a GPT disk, - + installboot(8) now formats the EFI System partition, creates the appropriate directory structure and copies the required UEFI boot files into place.
    -

  • Routing daemons and other userland network improvements:
      -
    • New eigrpd(8) +
    • New eigrpd(8) routing daemon for the Enhanced Interior Gateway Routing Protocol. -
    • dhclient(8) +
    • dhclient(8) now supports multiple domain names provided via DHCP option 15 (Domain Name). -
    • dhclient(8) +
    • dhclient(8) now supports search domains provided via DHCP option 119 (Domain Search). -
    • dhclient(8) +
    • dhclient(8) no longer continually checks for a change to the routing domain of the interface it controls. It now relies on the appropriate routing socket messages. -
    • dhclient(8) +
    • dhclient(8) now issues DHCP DECLINE responses to lease offers found to be inadequate, and restarts the DISCOVER/RENEW process rather than waiting indefinitely for a better lease to appear. -
    • dhclient(8) +
    • dhclient(8) no longer exits if a desired route cannot be added. It now just reports the fact. -
    • dhclient(8) +
    • dhclient(8) now takes a much more careful approach to received packets to ensure only received data is used to process the packet. Packets with incorrect length information or lacking appropriate header information are now dropped. -
    • dhclient(8) +
    • dhclient(8) again disables pending timeouts if the interface link is lost, preventing endless retries at obtaining a lease. -
    • dhcpd(8) - again properly utilizes default-lease-time, - max-lease-time and bootp-lease-time options. -
    • tcpdump(8) +
    • dhcpd(8) + again properly utilizes default-lease-time, + max-lease-time and bootp-lease-time options. +
    • tcpdump(8) now displays more information about IEEE 802.11 frames when run with - the -y IEEE802_11_RADIO and -v options. + the -y IEEE802_11_RADIO and -v options.
    • Several interoperability issues in - iked(8) + iked(8) have been fixed, including EAP auth with OS X El Capitan.
    -

  • Security improvements:
      @@ -339,44 +334,43 @@ IPsec stack for the ESP protocol.
    • Support for looking up hosts via YP has been removed from libc. The 'yp' lookup method in - + resolv.conf is no longer available.
    • Support for the HOSTALIASES environment variable has been removed from libc.
    -

  • Assorted improvements:
      -
    • doas(1) +
    • doas(1) is a little friendlier to use.
    • Updated - flex(1). -
    • Forked less(1) + flex(1). +
    • Forked less(1) from upstream, then proceeded to clean it up substantially. -
    • pdisk(8) +
    • pdisk(8) was largely rewritten and pledged.
    • Renaming files in the root directory of a MSDOS filesystem was fixed.
    • Many obsolete - disktab(5) + disktab(5) attributes and entries were removed. -
    • softraid(4) +
    • softraid(4) volumes now correctly look for the disklabel in the first OpenBSD disk partition, not the last. -
    • softraid(4) +
    • softraid(4) volumes can now be partitioned with a GPT. -
    • fdisk(8) +
    • fdisk(8) now creates a default GPT as well as the protective MBR when the - -g flag is used. -
    • fdisk(8) - now has a -b flag that specifies the size of the EFI System + -g flag is used. +
    • fdisk(8) + now has a -b flag that specifies the size of the EFI System partition to create. -
    • fdisk(8) - now has a -v flag that causes a verbose display of both MBR +
    • fdisk(8) + now has a -v flag that causes a verbose display of both MBR and GPT information. -
    • fdisk(8) +
    • fdisk(8) now provides full interactive GPT editing. -
    • fdisk(8) +
    • fdisk(8) was pledged.
    • Disks with sector sizes other than 512 bytes can now be partitioned with a GPT. @@ -384,18 +378,18 @@ and GENERIC derived kernels.
    • Many improvements were made to the GPT kernel support to ensure safe and reliable operation of GPT and MBR processing. -
    • disklabel(8) - no longer supports boot code installation, with the -B and - -b flags being removed. +
    • disklabel(8) + no longer supports boot code installation, with the -B and + -b flags being removed. The associated fields in the disklabel were also removed. These functions are now all performed by - + installboot(8).
    • PowerPC converted to secure-PLT ABI variant.
    • Perform lazy binding updates in - ld.so(1) + ld.so(1) using - kbind(2) + kbind(2) to improve security and reduce overhead in threaded processes.
    • Over 100 internal or obsolete interfaces have been deleted or are no longer exported by libc, reducing symbol conflicts and process size. @@ -403,62 +397,61 @@ symbol overriding, improve standards compliance, increase speed, and reduce dynamic linking overhead.
    • Handle intra-thread kills via new - thrkill(2) + thrkill(2) system call to tighten - pledge(2) + pledge(2) restrictions and improve - pthread_kill(3) + pthread_kill(3) and - pthread_cancel(3) + pthread_cancel(3) compliance. -
    • Added +
    • Added getpwnam_shadow(3) - and + and getpwuid_shadow(3) to permit tighter - pledge(2) + pledge(2) restrictions.
    • Added support to - ktrace(1) + ktrace(1) the arguments to - execve(2) + execve(2) and - pledge(2). + pledge(2). Removed support for tracing context switch points. - kevent structures are now dumped. + kevent structures are now dumped.
    • Disabled support for loading locales other than UTF-8.
    • UTF-8 character locale data has been updated to Unicode 7.0.0.
    • Added UTF-8 support to several utilities, including - calendar(1), - colrm(1), - cut(1), - fmt(1), - ls(1), - ps(1), - rs(1), - ul(1), - uniq(1) - and wc(1). + calendar(1), + colrm(1), + cut(1), + fmt(1), + ls(1), + ps(1), + rs(1), + ul(1), + uniq(1) + and wc(1).
    • Partial support for inserting and deleting UTF-8 characters in - ksh(1) + ksh(1) emacs command line editing mode.
    • Native language support (NLS) has been removed from libc. -
    • ddb(4) +
    • ddb(4) now automatically shows a stack trace upon panic.
    -

  • OpenSMTPD 5.9.1
    • Security: @@ -472,52 +465,51 @@
    • Assume messages are 8-bit bytes by default.
    -

  • OpenSSH 7.2
    • Security:
      • Qualys Security identified vulnerabilities in the - ssh(1) + ssh(1) client experimental support for resuming SSH-connections (roaming). In the default configuration, this could potentially leak client keys to a hostile server. The authentication of the server host key prevents exploitation by a man-in-the-middle, so this information leak is restricted to connections to malicious or compromised servers. This feature has been disabled in the - ssh(1) + ssh(1) client, and it has been removed from the source tree. The matching server code has never been shipped. -
      • sshd(8): +
      • sshd(8): OpenSSH 7.0 contained a logic error in - PermitRootLogin=prohibit-password/without-password that could, + PermitRootLogin=prohibit-password/without-password that could, depending on compile-time configuration, permit password authentication to root while preventing other forms of authentication.
      • Fix an out of-bound read access in the packet handling code.
      • Further use of - explicit_bzero(3) + explicit_bzero(3) has been added in various buffer handling code paths to guard against compilers aggressively doing dead-store removal. -
      • ssh(1), - sshd(8): +
      • ssh(1), + sshd(8): remove unfinished and unused roaming code. -
      • ssh(1): +
      • ssh(1): eliminate fallback from untrusted X11 forwarding to trusted forwarding - when the X server disables the SECURITY extension. -
      • ssh(1), - sshd(8): + when the X server disables the SECURITY extension. +
      • ssh(1), + sshd(8): increase the minimum modulus size supported for - diffie-hellman-group-exchange to 2048 bits. + diffie-hellman-group-exchange to 2048 bits.
    • Potentially-incompatible changes:
      • This release disables a number of legacy cryptographic algorithms by default in - ssh(1): + ssh(1):
          -
        • Several ciphers: blowfish-cbc, cast128-cbc, - all arcfour variants and the rijndael-cbc aliases +
        • Several ciphers: blowfish-cbc, cast128-cbc, + all arcfour variants and the rijndael-cbc aliases for AES.
        • MD5-based and truncated HMAC algorithms.
        @@ -525,355 +517,341 @@
      • New/changed features:
        • all: add support for RSA signatures using SHA-256/512 hash algorithms - based on draft-rsa-dsa-sha2-256-03.txt and - draft-ssh-ext-info-04.txt. -
        • ssh(1): - add an AddKeysToAgent client option which can be set to - yes, no, ask, or confirm, and - defaults to no. When enabled, a private key that is used + based on draft-rsa-dsa-sha2-256-03.txt and + draft-ssh-ext-info-04.txt. +
        • ssh(1): + add an AddKeysToAgent client option which can be set to + yes, no, ask, or confirm, and + defaults to no. When enabled, a private key that is used during authentication will be added to - ssh-agent(1) - if it is running (with confirmation enabled if set to confirm). -
        • sshd(8): - add a new authorized_keys option restrict that + ssh-agent(1) + if it is running (with confirmation enabled if set to confirm). +
        • sshd(8): + add a new authorized_keys option restrict that includes all current and future key restrictions - (no-*-forwarding, etc.). + (no-*-forwarding, etc.). Also add permissive versions of the existing restrictions, e.g. - no-pty -> pty. This simplifies the task of setting up + no-pty -> pty. This simplifies the task of setting up restricted keys and ensures they are maximally-restricted, regardless of any permissions we might implement in the future. -
        • ssh(1): +
        • ssh(1): add - ssh_config(5) + ssh_config(5) CertificateFile option to explicitly list certificates. (bz#2436) -
        • ssh-keygen(1): +
        • ssh-keygen(1): allow - ssh-keygen(1) + ssh-keygen(1) to change the key comment for all supported formats. -
        • ssh-keygen(1): +
        • ssh-keygen(1): allow fingerprinting from standard input, e.g. "ssh-keygen -lf -". -
        • ssh-keygen(1): +
        • ssh-keygen(1): allow fingerprinting multiple public keys in a file, e.g. - ssh-keygen -lf ~/.ssh/authorized_keys. (bz#1319) -
        • sshd(8): - support none as an argument for - sshd_config(5) - Foreground and ChrootDirectory. Useful inside - Match blocks to override a global default. (bz#2486) -
        • ssh-keygen(1): + ssh-keygen -lf ~/.ssh/authorized_keys. (bz#1319) +
        • sshd(8): + support none as an argument for + sshd_config(5) + Foreground and ChrootDirectory. Useful inside + Match blocks to override a global default. (bz#2486) +
        • ssh-keygen(1): support multiple certificates (one per line) and reading from standard - input (using "-f -") for ssh-keygen -L. -
        • ssh-keyscan(1): - add ssh-keyscan -c ... flag to allow fetching certificates + input (using "-f -") for ssh-keygen -L. +
        • ssh-keyscan(1): + add ssh-keyscan -c ... flag to allow fetching certificates instead of plain keys. -
        • ssh(1): - better handle anchored FQDNs (e.g. cvs.openbsd.org.) in +
        • ssh(1): + better handle anchored FQDNs (e.g. cvs.openbsd.org.) in hostname canonicalisation - treat them as already canonical and - trailing '.' before matching - ssh_config(5). + trailing '.' before matching + ssh_config(5).
      • The following significant bugs have been fixed in this release:
          -
        • ssh(1), - sshd(8): +
        • ssh(1), + sshd(8): add compatibility workarounds for FuTTY. -
        • ssh(1), - sshd(8): +
        • ssh(1), + sshd(8): refine compatibility workarounds for WinSCP.
        • Fix a number of memory faults (double-free, free of uninitialised memory, etc.) in - ssh(1) + ssh(1) and - ssh-keygen(1). -
        • Correctly interpret the first_kex_follows option during the + ssh-keygen(1). +
        • Correctly interpret the first_kex_follows option during the initial key exchange. -
        • sftp(1): +
        • sftp(1): existing destination directories should not terminate recursive uploads (regression in openssh 6.8). (bz#2528) -
        • ssh(1), - sshd(8): - correctly send back SSH2_MSG_UNIMPLEMENTED replies to +
        • ssh(1), + sshd(8): + correctly send back SSH2_MSG_UNIMPLEMENTED replies to unexpected messages during key exchange. (bz#2949) -
        • ssh(1): - refuse attempts to set ConnectionAttempts=0, which does not +
        • ssh(1): + refuse attempts to set ConnectionAttempts=0, which does not make sense and would cause ssh to print an uninitialised stack variable. (bz#2500) -
        • ssh(1): +
        • ssh(1): fix errors when attempting to connect to scoped IPv6 addresses with hostname canonicalisation enabled. -
        • sshd_config(5): - list a couple more options usable in Match blocks. (bz#2489) -
        • sshd(8): - fix PubkeyAcceptedKeyTypes +... inside a Match block. -
        • ssh(1): - expand tilde characters in filenames passed to -i options +
        • sshd_config(5): + list a couple more options usable in Match blocks. (bz#2489) +
        • sshd(8): + fix PubkeyAcceptedKeyTypes +... inside a Match block. +
        • ssh(1): + expand tilde characters in filenames passed to -i options before checking whether or not the identity file exists. Avoids confusion for cases where shell doesn't expand (e.g. - -i ~/file vs. -i~/file). (bz#2481) -
        • ssh(1): - do not prepend "exec" to the shell command run by Match exec + -i ~/file vs. -i~/file). (bz#2481) +
        • ssh(1): + do not prepend "exec" to the shell command run by Match exec in a config file, which could cause some commands to fail in certain environments. (bz#2471) -
        • ssh-keyscan(1): +
        • ssh-keyscan(1): fix output for multiple hosts/addrs on one line when host hashing or a non standard port is in use. (bz#2479) -
        • sshd(8): +
        • sshd(8): skip "Could not chdir to home directory" message when - ChrootDirectory is active. (bz#2485) -
        • ssh(1): - include PubkeyAcceptedKeyTypes in ssh -G config dump. -
        • sshd(8): - avoid changing TunnelForwarding device flags if they are + ChrootDirectory is active. (bz#2485) +
        • ssh(1): + include PubkeyAcceptedKeyTypes in ssh -G config dump. +
        • sshd(8): + avoid changing TunnelForwarding device flags if they are already what is needed; makes it possible to use - tun(4)/ - tap(4) + tun(4)/ + tap(4) networking as non-root user if device permissions and interface flags are pre-established. -
        • ssh(1), - sshd(8): - RekeyLimits could be exceeded by one packet. (bz#2521) -
        • ssh(1): +
        • ssh(1), + sshd(8): + RekeyLimits could be exceeded by one packet. (bz#2521) +
        • ssh(1): fix multiplexing master failure to notice client exit. -
        • ssh(1), - ssh-agent(1): - avoid fatal() for PKCS11 tokens that present empty key IDs. +
        • ssh(1), + ssh-agent(1): + avoid fatal() for PKCS11 tokens that present empty key IDs. (bz#1773) -
        • sshd(8): +
        • sshd(8): avoid - printf(3) + printf(3) of NULL argument. (bz#2535) -
        • ssh(1), - sshd(8): - allow RekeyLimits larger than 4GB. (bz#2521) -
        • ssh-agent(1), - sshd(8): +
        • ssh(1), + sshd(8): + allow RekeyLimits larger than 4GB. (bz#2521) +
        • ssh-agent(1), + sshd(8): fix several bugs in (unused) KRL signature support. -
        • ssh(1), - sshd(8): +
        • ssh(1), + sshd(8): fix connections with peers that use the key exchange guess feature of the protocol. (bz#2515) -
        • sshd(8): +
        • sshd(8): include remote port number in log messages. (bz#2503) -
        • ssh(1): +
        • ssh(1): don't try to load SSHv1 private key when compiled without SSHv1 support. (bz#2505) -
        • ssh-agent(1), - ssh(1): +
        • ssh-agent(1), + ssh(1): fix incorrect error messages during key loading and signing errors. (bz#2507) -
        • ssh-keygen(1): - don't leave empty temporary files when performing known_hosts - file edits when known_hosts doesn't exist. -
        • sshd(8): +
        • ssh-keygen(1): + don't leave empty temporary files when performing known_hosts + file edits when known_hosts doesn't exist. +
        • sshd(8): correct packet format for tcpip-forward replies for requests that don't allocate a port. (bz#2509) -
        • ssh(1), - sshd(8): +
        • ssh(1), + sshd(8): fix possible hang on closed output. (bz#2469) -
        • ssh(1): - expand %i in ControlPath to UID. (bz#2449) -
        • ssh(1), - sshd(8): - fix return type of openssh_RSA_verify. (bz#2460) -
        • ssh(1), - sshd(8): +
        • ssh(1): + expand %i in ControlPath to UID. (bz#2449) +
        • ssh(1), + sshd(8): + fix return type of openssh_RSA_verify. (bz#2460) +
        • ssh(1), + sshd(8): fix some option parsing memory leaks. (bz#2182) -
        • ssh(1): +
        • ssh(1): add some debug output before DNS resolution; it's a place where ssh could previously silently stall in cases of unresponsive DNS servers. (bz#2433) -
        • ssh(1): +
        • ssh(1): remove spurious newline in visual hostkey. (bz#2686) -
        • ssh(1): - fix printing (ssh -G ...) of HostKeyAlgorithms=+... -
        • ssh(1): - fix expansion of HostkeyAlgorithms=+... +
        • ssh(1): + fix printing (ssh -G ...) of HostKeyAlgorithms=+... +
        • ssh(1): + fix expansion of HostkeyAlgorithms=+...
      -

      +

    • LibreSSL 2.3.2
      • User-visible features:
          -
        • This release corrects the handling of ClientHello messages +
        • This release corrects the handling of ClientHello messages that do not include TLS extensions, resulting in such handshakes being aborted.
        • When loading a DSA key from a raw (without DH parameters) ASN.1 - serialization, perform some consistency checks on its `p' and `q' + serialization, perform some consistency checks on its 'p' and 'q' values, and return an error if the checks failed. -
        • Fixed a bug in ECDH_compute_key that can lead to silent +
        • Fixed a bug in ECDH_compute_key that can lead to silent truncation of the result key without error. A coding error could cause software to use much shorter keys than intended. -
        • Removed support for DTLS_BAD_VER. Pre-DTLSv1 implementations +
        • Removed support for DTLS_BAD_VER. Pre-DTLSv1 implementations are no longer supported. -
        • The engine command and parameters are removed from - +
        • The engine command and parameters are removed from + openssl(1). Previous releases removed dynamic and built-in engine support already.
        • SHA-0 is removed, which was withdrawn shortly after publication twenty years ago. -
        • Added Certplus CA root certificate to the default - cert.pem file. +
        • Added Certplus CA root certificate to the default + cert.pem file.
        • Fixed a leak in - + SSL_new(3) in the error path.
        • Fixed a memory leak and out-of-bounds access in - + OBJ_obj2txt(3).
        • Fixed an up-to 7 byte overflow in RC4 when len is not a multiple of - sizeof(RC4_CHUNK). + sizeof(RC4_CHUNK).
        • Added - + EVP_aead_chacha20_poly1305_ietf(3) which matches the - AEAD construction introduced in RFC 7539, which is different + AEAD construction introduced in RFC 7539, which is different than that already used in TLS with - + EVP_aead_chacha20_poly1305(3).
        • More man pages converted from pod to - mdoc(7) + mdoc(7) format. -
        • Added COMODO RSA Certification Authority and - QuoVadis root certificates to cert.pem. -
        • Removed "C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority" +
        • Added COMODO RSA Certification Authority and + QuoVadis root certificates to cert.pem. +
        • Removed "C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority" (serial 3c:91:31:cb:1f:f6:d0:1b:0e:9a:b8:d0:44:bf:12:be) - root certificate from cert.pem. + root certificate from cert.pem.
        • Fixed incorrect TLS certificate loading by - nc(1). + nc(1).
        • The - + openssl(1) - s_time command now performs a proper shutdown which allows a + s_time command now performs a proper shutdown which allows a full TLS connection to be benchmarked more accurately. A new - -no_shutdown flag - makes s_time adopt the previous behavior so that comparisons + -no_shutdown flag + makes s_time adopt the previous behavior so that comparisons can still be made with OpenSSL's version. -
        • Removed support for the SSLEAY_CONF backwards compatibility +
        • Removed support for the SSLEAY_CONF backwards compatibility environment variable in - + openssl(1).
        • The following CVEs had been fixed:
            -
          • CVE-2015-3194—NULL pointer dereference in client +
          • CVE-2015-3194—NULL pointer dereference in client side certificate validation. -
          • CVE-2015-3195—memory leak in PKCS7, not reachable +
          • CVE-2015-3195—memory leak in PKCS7, not reachable from TLS/SSL.
        • Note: The following OpenSSL CVEs did not apply to LibreSSL:
            -
          • CVE-2015-3193—carry propagating bug in the x86_64 +
          • CVE-2015-3193—carry propagating bug in the x86_64 Montgomery squaring procedure. -
          • CVE-2015-3196—double free race condition of the +
          • CVE-2015-3196—double free race condition of the identify hint data.
      • Code improvements:
          -
        • Added install target for cmake builds. -
        • Updated pkgconfig files to correctly report the release +
        • Added install target for cmake builds. +
        • Updated pkgconfig files to correctly report the release version number, not the individual library ABI version numbers.
        • SSLv3 is now permanently removed from the tree. -
        • The libtls API is changed from the 2.2.x series: +
        • The libtls API is changed from the 2.2.x series: -
        • New interface OPENSSL_cpu_caps is provided that does not +
        • New interface OPENSSL_cpu_caps is provided that does not allow software to inadvertently modify cpu capability flags. - OPENSSL_ia32cap and OPENSSL_ia32cap_loc are removed. -
        • The out_len argument of AEAD changed from - ssize_t to size_t. + OPENSSL_ia32cap and OPENSSL_ia32cap_loc are removed. +
        • The out_len argument of AEAD changed from + ssize_t to size_t.
        • Deduplicated DTLS code, sharing bugfixes and improvements with TLS.
        • Converted - nc(1) - to use libtls for client and server operations; it is + nc(1) + to use libtls for client and server operations; it is included in the libressl-portable distribution as an example of how - to use the libtls library. This is intended to be a simpler - and more robust replacement for openssl s_client and - openssl s_server for day-to-day operations. + to use the libtls library. This is intended to be a simpler + and more robust replacement for openssl s_client and + openssl s_server for day-to-day operations.
        • ASN.1 cleanups and RFC5280 compliance fixes. -
        • Time representations switched from unsigned long to - time_t. LibreSSL now checks if the host OS supports 64-bit - time_t. +
        • Time representations switched from unsigned long to + time_t. LibreSSL now checks if the host OS supports 64-bit + time_t.
        • Support always extracting the peer cipher and version with - libtls. + libtls.
        • Added ability to check certificate validity times with - libtls, - + libtls, + tls_peer_cert_notbefore(3) and - + tls_peer_cert_notafter(3).
        • Changed - + tls_connect_servername(3) to use the first address that resolves with - + getaddrinfo(3). -
        • Remove broken conditional EVP_CHECK_DES_KEY code +
        • Remove broken conditional EVP_CHECK_DES_KEY code (non-functional since initial commit in 2004).
        • Reject too small bits value in - + BN_generate_prime(3), so that it does not risk becoming negative in - probable_prime_dh_safe(). -
        • Changed format of LIBRESSL_VERSION_NUMBER to match that of - OPENSSL_VERSION_NUMBER. + probable_prime_dh_safe(). +
        • Changed format of LIBRESSL_VERSION_NUMBER to match that of + OPENSSL_VERSION_NUMBER.
        • Avoid a potential undefined C99+ behavior due to shift overflow in - AES_decrypt. -
        • Deprecated the SSL_OP_SINGLE_DH_USE flag. + AES_decrypt. +
        • Deprecated the SSL_OP_SINGLE_DH_USE flag.
      -

    • Ports and packages: -
      -
      Many pre-built packages for each architecture: -
      +

      Many pre-built packages for each architecture: - - -
      -
        +
        • alpha: 7450
        • amd64: 9295
        • hppa: 6304 -
      • i386: 9290
      • mips64: 7094
      • mips64el: 7846 -
      • powerpc: 8383
      • sh: 111
      • sparc: 1105 -
      • sparc64: 8528 -
      -

      +

    -
    -
    Some highlights: -
    - - -
      +

      Some highlights: +

      • Chromium 48.0.2564.116
      • Emacs 21.4 and 24.5
      • GCC 4.9.3 @@ -889,7 +867,6 @@
      • Mono 4.2.1.102
      • Mozilla Firefox 38.6.1esr and 44.0.2
      • Mozilla Thunderbird 38.6.0 -
    • Node.js 4.3.0
    • OpenLDAP 2.3.43 and 2.4.43
    • PHP 5.4.45, 5.5.32 and 5.6.18 @@ -905,12 +882,9 @@
    • TeX Live 2014
    • Vim 7.4.900
    • Xfce 4.12 -
    -
    -

    +

  • As usual, steady improvements in manual pages and other documentation. -

  • The system includes the following major components from outside suppliers:
      @@ -927,20 +901,21 @@
    • Gdb 6.3 (+ patches)
    • Awk Aug 10, 2011 version
    - +
    -

    How to install

    +
    +

    How to install

    +

    Following this are the instructions which you would have on a piece of paper if you had purchased a CDROM set instead of doing an alternate form of install. The instructions for doing an HTTP (or other style of) install are very similar; the CDROM instructions are left intact so that you can see how much easier it would have been if you had purchased a CDROM instead. -


    @@ -985,15 +960,15 @@ .../OpenBSD/5.9/zaurus/INSTALL.zaurus -


    +

    Quick installer information for people familiar with OpenBSD, and the use of the "disklabel -E" command. If you are at all confused when installing OpenBSD, read the relevant INSTALL.* file as listed above! -

    OpenBSD/i386:

    +

    OpenBSD/i386:

    • @@ -1015,7 +990,7 @@ read INSTALL.i386.
    -

    OpenBSD/amd64:

    +

    OpenBSD/amd64:

    • @@ -1037,7 +1012,7 @@ read INSTALL.amd64.
    -

    OpenBSD/macppc:

    +

    OpenBSD/macppc:

    • @@ -1050,7 +1025,7 @@ /5.9/macppc/bsd.rd
    -

    OpenBSD/sparc64:

    +

    OpenBSD/sparc64:

    • @@ -1074,7 +1049,7 @@ If nothing works, you can boot over the network as described in INSTALL.sparc64.
    -

    OpenBSD/alpha:

    +

    OpenBSD/alpha:

    • @@ -1087,7 +1062,7 @@ will most likely fail.
    -

    OpenBSD/hppa:

    +

    OpenBSD/hppa:

    -

    OpenBSD/landisk:

    +

    OpenBSD/landisk:

    • @@ -1103,7 +1078,7 @@ or disk, and boot normally.
    -

    OpenBSD/loongson:

    +

    OpenBSD/loongson:

    • @@ -1112,16 +1087,16 @@ Refer to the instructions in INSTALL.loongson for more details.
    -

    OpenBSD/luna88k:

    +

    OpenBSD/luna88k:

    • -Copy `boot' and `bsd.rd' to a Mach or UniOS partition, and boot the bootloader +Copy 'boot' and 'bsd.rd' to a Mach or UniOS partition, and boot the bootloader from the PROM, and then bsd.rd from the bootloader. Refer to the instructions in INSTALL.luna88k for more details.
    -

    OpenBSD/octeon:

    +

    OpenBSD/octeon:

    • @@ -1129,7 +1104,7 @@ Refer to the instructions in INSTALL.octeon for more details.
    -

    OpenBSD/sgi:

    +

    OpenBSD/sgi:

    • @@ -1146,7 +1121,7 @@ system type. Refer to the instructions in INSTALL.sgi for more details.
    -

    OpenBSD/socppc:

    +

    OpenBSD/socppc:

    • @@ -1154,7 +1129,7 @@ Refer to the instructions in INSTALL.socppc for more details.
    -

    OpenBSD/zaurus:

    +

    OpenBSD/zaurus:

    • @@ -1162,19 +1137,22 @@ openbsd59_arm.ipk package. Reboot, then run it. Read INSTALL.zaurus for a few important details.
    +

    -

    How to upgrade

    +
    +

    How to upgrade

    If you already have an OpenBSD 5.8 system, and do not want to reinstall, upgrade instructions and advice can be found in the Upgrade Guide. -

    +


    -

    Notes about the source code

    +
    +

    Notes about the source code

    src.tar.gz contains a source archive starting at /usr/src. This file contains everything you need except for the kernel sources, which are @@ -1202,11 +1180,13 @@ Using these files results in a much faster initial CVS update than you could expect from a fresh checkout of the full OpenBSD source tree. -

    +

    +

    -

    Ports Tree

    +
    +

    Ports Tree

    A ports tree archive is also provided. To extract: @@ -1222,7 +1202,7 @@ OpenBSD ports system.

    The ports/ directory represents a CVS (see the manpage for - + cvs(1) if you aren't familiar with CVS) checkout of our ports. As with our complete source tree, our ports tree is available via @@ -1245,6 +1225,4 @@ If you're interested in seeing a port added, would like to help out, or just would like to know more, the mailing list ports@openbsd.org is a good place to know. -

    - - +