OpenBSD

OpenBSD

"Free, Functional & Secure"
Company / developer The OpenBSD Project
OS family BSD
Working state Current
Source model Open source
Initial release 1 October 1996
Latest stable release 5.0  (November 1, 2011; 3 months ago (2011-11-01)) [+/−]
Latest unstable release 5.0-current  (ongoing) [+/−]
Package manager OpenBSD package tools and ports tree
Supported platforms 68000, Alpha, AMD64, i386, MIPS, PowerPC, SPARC 32/64, VAX, Zaurus and others[1]
Kernel type Monolithic
Userland BSD
Default user interface Modified pdksh, FVWM 2.2.5 for X11
License BSD, ISC
Official website http://www.openbsd.org

OpenBSD is a Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Unix derivative developed at the University of California, Berkeley. It was forked from NetBSD by project leader Theo de Raadt in late 1995. The project is widely known for the developers' insistence on open-source code and quality documentation, uncompromising position on software licensing, and focus on security and code correctness. The project is coordinated from de Raadt's home in Calgary, Alberta, Canada. Its logo and mascot is a pufferfish named Puffy.

OpenBSD includes a number of security features absent or optional in other operating systems, and has a tradition in which developers audit the source code for software bugs and security problems. The project maintains strict policies on licensing and prefers the open-source BSD licence and its variants—in the past this has led to a comprehensive license audit and moves to remove or replace code under licences found less acceptable.

As with most other BSD-based operating systems, the OpenBSD kernel and userland programs, such as the shell and common tools like cat and ps, are developed together in one source code repository. Third-party software is available as binary packages or may be built from source using the ports tree.

The OpenBSD project maintains ports for 17 different hardware platforms, including the DEC Alpha, Intel i386, Hewlett-Packard PA-RISC, AMD AMD64 and Motorola 68000 processors, Apple's PowerPC machines, Sun SPARC and SPARC64-based computers, the VAX and the Sharp Zaurus.[1]

Prerequisites
Computer and operating system
Unix and Unix-like
Software licensing
Computer insecurity

Contents

History and popularity

In December 1994, NetBSD co-founder Theo de Raadt was asked to resign from his position as a senior developer and member of the NetBSD core team.[3] The reason for this is not wholly clear, although there are claims that it was due to personality clashes within the NetBSD project and on its mailing lists.[3] De Raadt has been criticized for having a sometimes abrasive personality: in his book, Free For All, Peter Wayner claims that de Raadt "began to rub some people the wrong way" before the split from NetBSD;[4] Linus Torvalds has described him as "difficult";[5] and an interviewer admits to being "apprehensive" before meeting him.[6] Many have different feelings: the same interviewer describes de Raadt's "transformation" on founding OpenBSD and his "desire to take care of his team," some find his straightforwardness refreshing, and few deny he is a talented coder[3] and security "guru".[7]

In October 1995, de Raadt founded OpenBSD, a new project forked from NetBSD 1.0. The initial release, OpenBSD 1.2, was made in July 1996, followed in October of the same year by OpenBSD 2.0.[8] Since then, the project has followed a schedule of a release every six months, each of which is maintained and supported for one year. The latest release, OpenBSD 5.0, appeared on November 1, 2011.

On 25 July 2007, OpenBSD developer Bob Beck announced the formation of the OpenBSD Foundation,[9] a Canadian not-for-profit corporation formed to "act as a single point of contact for persons and organizations requiring a legal entity to deal with when they wish to support OpenBSD."[10]

Just how widely OpenBSD is used is hard to ascertain: its developers neither publish nor collect usage statistics, and there are few other sources of information. In September 2005, the nascent BSD Certification Group performed a usage survey which revealed that 32.8% of BSD users (1420 of 4330 respondents) were using OpenBSD,[2] placing it second of the four major BSD variants, behind FreeBSD with 77% and ahead of NetBSD with 16.3%.[11] The DistroWatch website, well-known in the Linux community and often used as a reference for popularity, publishes page hits for each of the Linux distributions and other operating systems it covers. As of 10 July 2011 (2011 -07-10), using a data span of the last six months it placed FreeBSD in 17th place with 473 hits per day; PC-BSD in 24th place with 373 hits per day, GhostBSD in 57th place with 189 hits, OpenBSD in 64th place with 161 hits per day, DragonFly in 71st place with 144 hits per day.[12]

Open source and open documentation

When OpenBSD was created, Theo de Raadt decided that the source should be easily available for anyone to read at any time, so, with the assistance of Chuck Cranor,[13] he set up a public, anonymous CVS server. This was the first of its kind in the software development world: at the time, the tradition was for only a small team of developers to have access to a project's source repository.[14] Cranor and de Raadt concluded that this practice "runs counter to the open source philosophy" and is inconvenient to contributors. de Raadt's decision allowed "users to take a more active role", and signaled the project's belief in open and public access to source code.[14]

A revealing incident regarding open documentation occurred in March 2005, when de Raadt posted a message[15] to the openbsd-misc mailing list. He announced that after four months of discussion, Adaptec had not disclosed the documentation required to improve the OpenBSD drivers for its AAC RAID controllers. As in similar circumstances in the past, he encouraged the OpenBSD community to become involved and express their opinion to Adaptec. Shortly after this, FreeBSD committer, former Adaptec employee and author of the FreeBSD AAC RAID support Scott Long,[16] castigated de Raadt[17] on the OSNews website for not contacting him directly regarding the issues with Adaptec. This caused the discussion to spill over onto the freebsd-questions mailing list, where the OpenBSD project leader countered[18] by claiming that he had received no previous offer of help from Scott Long nor been referred to him by Adaptec. The debate was amplified[19] by disagreements between members of the two camps regarding the use of binary blob drivers and non-disclosure agreements (NDAs): OpenBSD developers do not permit the inclusion of closed source binary drivers in the source tree and are reluctant to sign NDAs. However, the FreeBSD project has a different policy and much of the Adaptec RAID management code Scott Long proposed as assistance for OpenBSD was closed source or written under an NDA. As no documentation was forthcoming before the deadline for the release of OpenBSD 3.7, support for Adaptec AAC RAID controllers was removed from the standard OpenBSD kernel.[20]

The OpenBSD policy on openness extends to hardware documentation: in the slides for a December 2006 presentation, de Raadt explained that without it "developers often make mistakes writing drivers", and pointed out that "the [oh my god, I got it to work] rush is harder to achieve, and some developers just give up".[21] He went on to say that vendor binary drivers are unacceptable to OpenBSD, that they have "no trust of vendor binaries running in our kernel" and that there is "no way to fix [them] ... when they break".[21]

Licensing

A goal of the OpenBSD project is to "maintain the spirit of the original Berkeley Unix copyrights", which permitted a "relatively un-encumbered Unix source distribution".[22] To this end, the Internet Systems Consortium (ISC) licence, a simplified version of the BSD licence with wording removed that is unnecessary under the Berne convention, is preferred for new code, but the MIT or BSD licences are accepted. The widely used GNU General Public License is considered overly restrictive in comparison with these.[23]

In June 2001, triggered by concerns over Darren Reed's modification of IPFilter's licence wording, a systematic licence audit of the OpenBSD ports and source trees was undertaken.[24] Code in more than a hundred files throughout the system was found to be unlicensed, ambiguously licensed or in use against the terms of the licence. To ensure that all licences were properly adhered to, an attempt was made to contact all the relevant copyright holders: some pieces of code were removed, many were replaced, and others, including the multicast routing tools, mrinfo[25] and map-mbone,[26] which were licensed by Xerox for research only, were relicensed so that OpenBSD could continue to use them; also removed during this audit was all software produced by Daniel J. Bernstein. At the time, Bernstein requested that all modified versions of his code be approved by him prior to redistribution, a requirement to which OpenBSD developers were unwilling to devote time or effort.[27] The removal led to a clash with Bernstein who felt the removal of his software to be uncalled for. He cited the Netscape web browser as much less freely licensed and accused the OpenBSD developers of hypocrisy for permitting Netscape to remain while removing his software.[28] The OpenBSD project's stance was that Netscape, although not open source, had licence conditions that could be more easily met.[29] They asserted that Bernstein's demand for control of derivatives would lead to a great deal of additional work and that removal was the most appropriate way to comply with his requirements.[29]

The OpenBSD team has developed software from scratch, or adopted suitable existing software, because of licence concerns. Of particular note is the development, after licence restrictions were imposed on IPFilter, of the pf packet filter, which first appeared[30] in OpenBSD 3.0 and is now available in DragonFly BSD, NetBSD and FreeBSD. OpenBSD developers have also replaced GPL licensed tools (such as diff, grep and pkg-config) with BSD licensed equivalents and founded new projects including the OpenBGPD routing daemon and OpenNTPD time service daemon.[31] Also developed from scratch was the globally used software package OpenSSH.

Security and code auditing

Shortly after OpenBSD's creation, Theo de Raadt was contacted by a local security software company named Secure Networks, Inc. or SNI.[32][33] They were developing a "network security auditing tool" called Ballista (later renamed to Cybercop Scanner after SNI was purchased by Network Associates), which was intended to find and attempt to exploit possible software security flaws. This coincided well with de Raadt's own interest in security, so for a time the two cooperated, a relationship that was of particular use leading up to the release of OpenBSD 2.3[34] and helped to form security as the focal point of the project.[4]

Until June 2002, the OpenBSD website featured the slogan:

Five years without a remote hole in the default install!

In June 2002, Mark Dowd of Internet Security Systems disclosed a bug in the OpenSSH code implementing challenge-response authentication.[35] This vulnerability in the OpenBSD default installation allowed an attacker remote access to the root account, which was extremely serious not only to OpenBSD, but also to the large number of other operating systems that were using OpenSSH by that time.[36] This problem necessitated the adjustment of the slogan on the OpenBSD website to:

One remote hole in the default install, in nearly 6 years!

The quote remained unchanged as time passed, until on March 13, 2007 when Alfredo Ortega of Core Security Technologies disclosed a network-related remote vulnerability.[37] The quote was subsequently altered to:

Only two remote holes in the default install, in a heck of a long time!

This statement has been criticized because the default install contains few running services, and most users will install additional software.[38] The project states that the default install is intentionally minimal to ensure novice users "do not need to become security experts overnight",[39] which fits with open-source and code auditing practices argued to be important elements of a security system.[40]

OpenBSD includes features designed to improve security. These include API additions, such as the strlcat and strlcpy[41] functions; toolchain alterations, including a static bounds checker; memory protection techniques to guard against invalid accesses, such as ProPolice and the W^X (W xor X) page protection feature; and cryptography and randomization features.[42]

To reduce the risk of a vulnerability or misconfiguration allowing privilege escalation, some programs have been written or adapted to make use of privilege separation, privilege revocation and chrooting. Privilege separation is a technique, pioneered on OpenBSD and inspired by the principle of least privilege, where a program is split into two or more parts, one of which performs privileged operations and the other—almost always the bulk of the code—runs without privilege.[43] Privilege revocation is similar and involves a program performing any necessary operations with the privileges it starts with then dropping them. Chrooting involves restricting an application to one section of the file system, prohibiting it from accessing areas that contain private or system files. Developers have applied these features to OpenBSD versions of common applications, including tcpdump and the Apache web server.[44]

OpenBSD developers were instrumental in the birth of—and the project continues to develop—OpenSSH, a secure replacement for Telnet. OpenSSH is based on the original SSH suite and developed further by the OpenBSD team.[45] It first appeared in OpenBSD 2.6 and is now the most popular SSH implementation, available on many operating systems.[46]

The project has a policy of continually auditing code for problems, work that developer Marc Espie has described as "never finished ... more a question of process than of a specific bug being hunted".[47] He went on to list several typical steps once a bug is found, including examining the entire source tree for the same and similar issues, "try[ing] to find out whether the documentation ought to be amended", and investigating whether "it's possible to augment the compiler to warn against this specific problem".

Linux kernel creator Linus Torvalds has expressed the view that development efforts should be focused on fixing general problems rather than targeting security issues, as non-security bugs are more numerous ("all the boring normal bugs are _way_ more important, just because there's a lot more of them").[48] On July 15, 2008, he criticised the OpenBSD policy: "[T]hey make such a big deal about concentrating on security that they pretty much admit that nothing else matters to them".[48] OpenBSD developer Marc Espie replied to Torvalds' statement: "It's a totally misinformed opinion ... [Fixing normal bugs] is exactly what people in the OpenBSD project do, all the time".[49] Developer Artur Grabowski also expressed surprise: "That's the funniest part about this ... [Torvalds] was saying the same things we say".[50]

On 11 December 2010, Gregory Perry sent an email to Theo de Raadt alleging that the FBI had paid some OpenBSD ex-developers 10 years previously to insert backdoors into the OpenBSD Cryptographic Framework. Theo de Raadt made the email public on 14 December by forwarding it to the openbsd-tech mailing list and suggested an audit of the IPsec codebase.[51][52] De Raadt's response was skeptical of the report and he invited all developers to independently review the relevant code. In the weeks that followed, bugs were fixed but no evidence of backdoors were found.[53]

Uses

OpenBSD's security enhancements, built-in cryptography and the pf packet filter suit it for use in the security industry, for example on firewalls,[54] intrusion-detection systems and VPN gateways.

Proprietary systems from several manufacturers are based on OpenBSD, including devices from Armorlogic (Profense web application firewall), Calyptix Security, GeNUA mbH, RTMX Inc,[55] and .vantronix GmbH.[56] Code from many of the OpenBSD system tools has been used in recent versions of Microsoft's Services for UNIX, an extension to the Windows operating system which provides some Unix-like functionality, originally based on 4.4BSD-Lite. Core Force, a security product for Windows, is based on OpenBSD's pf firewall.[57]

OpenBSD ships with the X window system[58] and is suitable for use on the desktop.[59] Packages for popular desktop tools are available, including desktop environments GNOME, KDE, and Xfce; web browsers Konqueror, Mozilla Firefox and Chromium; and multimedia programs MPlayer, VLC media player and xine.[60]

OpenBSD's performance and usability is occasionally criticised. Felix von Leitner's performance and scalability tests[61] indicated that OpenBSD lagged behind other operating systems. In response, OpenBSD users and developers criticised von Leitner's objectivity and methodology, and asserted that although performance is given consideration, security and correct design are prioritised, with project member Nick Holland commenting: "It all boils down to what you consider important."[62] OpenBSD is also a relatively small project, particularly when compared with FreeBSD and Linux, and developer time is sometimes seen as better spent on security enhancements than performance optimization. Critics of usability say that OpenBSD has a lack of user-friendly configuration tools, a bare default installation,[63] and a "spartan" and "intimidating" installer.[64] These see much the same rebuttals as performance: a preference for simplicity, reliability and security. As one reviewer puts it, "running an ultra-secure operating system can be a bit of work."[65]

Distribution and marketing

OpenBSD is available freely in various ways: the source can be retrieved by anonymous CVS or CVSup,[66] and binary releases and development snapshots can be downloaded either by FTP or HTTP.[67] Prepackaged CD-ROM sets can be ordered online for a small fee, complete with an assortment of stickers and a copy of the release's theme song. These, with its artwork and other bonuses, are one of the project's few sources of income, funding hardware, bandwidth and other expenses.[68]

In common with other operating systems, OpenBSD provides a package management system for easy installation and management of programs which are not part of the base operating system.[69] Packages are binary files which are extracted, managed and removed using the package tools. On OpenBSD, the source of packages is the ports system, a collection of Makefiles and other infrastructure required to create packages. In OpenBSD, the ports and base operating system are developed and released together for each version: this means that the ports or packages released with, for example, 4.6 are not suitable for use with 4.5 and vice versa.[69]

OpenBSD at first used the BSD daemon mascot created by Phil Foglio, updated by John Lasseter and copyright Marshall Kirk McKusick. Subsequent releases saw variations, eventually settling on Puffy,[70] described as a pufferfish.[71] Since then Puffy has appeared on OpenBSD promotional material and featured in release songs and artwork. The promotional material of early OpenBSD releases did not have a cohesive theme or design but later the CD-ROMs, release songs, posters and tee-shirts for each release have been produced with a single style and theme, sometimes contributed to by Ty Semaka of the Plaid Tongued Devils.[72] These have become a part of OpenBSD advocacy, with each release expanding a moral or political point important to the project, often through parody.[73] Past themes have included: in OpenBSD 3.8, the Hackers of the Lost RAID, a parody of Indiana Jones linked to the new RAID tools featured as part of the release; The Wizard of OS, making its debut in OpenBSD 3.7, based on the work of Pink Floyd and a parody of The Wizard of Oz related to the project's recent wireless work; and OpenBSD 3.3's Puff the Barbarian, including an 80s rock-style song and parody of Conan the Barbarian, alluding to open documentation.[72]

Bibliography

See also

Free software portal
Cryptography portal
Computer science portal

References

  1. ^ a b "Platforms", OpenBSD, http://www.openbsd.org/plat.html, retrieved 2011-12-13 
  2. ^ a b (PDF) 2005 BSD Usage Survey Report, The BSD Certification Group, 2005-10-31, http://www.bsdcertification.org/downloads/pr_20051031_usage_survey_en_en.pdf, retrieved 2011-12-13 
  3. ^ a b c Glass, Adam (1994-12-23). "Theo De Raadt". netbsd-users mailing list. http://mail-index.netbsd.org/netbsd-users/1994/12/23/0000.html. 
  4. ^ a b Wayner, Peter (2000-07-13), "18.3 Flames, Fights, and the Birth of OpenBSD", Free For All: How Linux and the Free Software Movement Undercut the High Tech Titans (1st ed.), HarperBusiness, ISBN 978-0066620503, http://www.jus.uio.no/sisu/free_for_all.peter_wayner/18.html#987, retrieved 2011-12-13 
  5. ^ Lyons, Daniel (2005-06-16), "Is Linux For Losers?", Forbes, http://www.forbes.com/intelligentinfrastructure/2005/06/16/linux-bsd-unix-cz_dl_0616theo.html, retrieved 2006-12-08 
  6. ^ Bresnick, Julie (2001-01-30), "Theo de Raadt gives it all to OpenBSD", Linux.com, archived from the original on 2009-02-14, http://web.archive.org/web/20090214090258/http://www.linux.com/articles/7543 
  7. ^ "Intel Core 2 Duo Vulnerabilities Serious say Theo de Raadt", Darknet, 2007-07-18, http://www.darknet.org.uk/tag/theo-de-raadt/, retrieved 2011-12-13 
  8. ^ de Raadt, Theo (1996-10-18). "The OpenBSD 2.0 release". openbsd-announce mailing list. http://www.monkey.org/openbsd/archive2/announce/199610/msg00001.html. 
  9. ^ "The OpenBSD Foundation", OpenBSD Foundation, http://www.openbsdfoundation.org, retrieved 2011-12-13 
  10. ^ Beck, Bob (2007-07-25). "Announcing: The OpenBSD Foundation". openbsd-misc mailing list. http://www.nabble.com/Announcing%3A-The-OpenBSD-Foundation-p11801927.html. 
  11. ^ Multiple selections were permitted as a user may use multiple BSD variants side by side.
  12. ^ "DistroWatch.com", DistroWatch, 2001–2011, archived from the original on 2011-07-10, http://web.archive.org/web/20110710134544/http://distrowatch.com/ 
  13. ^ Cranor, Chuck D., Chuck Cranor's Home Page, http://chuck.cranor.org/, retrieved 2011-12-13, "I also hosted and helped create the first Anonymous CVS server on the Internet (the original anoncvs.openbsd.org, which was also know as eap.ccrc.wustl.edu)." 
  14. ^ a b de Raadt, Theo (1999-06-11), Opening the Source Repository with Anonymous CVS, USENIX, http://www.usenix.org/event/usenix99/full_papers/cranor_f/cranor_f.pdf, retrieved 2011-12-13 
  15. ^ de Raadt, Theo (2005-03-18). "Adaptec AAC raid support". openbsd-misc mailing list. http://marc.theaimsgroup.com/?l=openbsd-misc&m=111118558813932. 
  16. ^ Long, Scott, Scott's Home Page, http://people.freebsd.org/~scottl/, retrieved 2011-12-13 
  17. ^ Long, Scott (2005-03-19). "Re: aac support". openbsd-misc mailing list. http://marc.info/?l=openbsd-misc&m=111126252327048&w=2. 
  18. ^ de Raadt, Theo (2005-03-19). "aac support". freebsd-questions mailing list. http://lists.freebsd.org/pipermail/freebsd-questions/2005-March/081294.html. 
  19. ^ de Raadt, Theo (2005-03-19). "Adaptec AAC raid support". freebsd-questions mailing list. http://lists.freebsd.org/pipermail/freebsd-questions/2005-March/081313.html. 
  20. ^ de Raadt, Theo (2010-04-07), "Revision 1.406", OpenBSD CVS repository, http://www.openbsd.org/cgi-bin/cvsweb/src/sys/arch/i386/conf/GENERIC?rev=1.406 
  21. ^ a b de Raadt, Theo (2006-12-05), Presentation at OpenCON, http://www.openbsd.org/papers/opencon06-docs/index.html, retrieved 2011-12-13 
  22. ^ "Copyright Policy", OpenBSD, http://www.openbsd.org/policy.html, retrieved 2011-12-13 
  23. ^ Matzan, Jem (2005-06-15), "BSD cognoscenti on Linux", NewsForge (Linux.com), archived from the original on 2008-02-07, http://web.archive.org/web/20080207203248/http://www.linux.com/articles/45572 
  24. ^ Gasperson, Tina (2001-06-06), "OpenBSD and ipfilter still fighting over license disagreement", Linux.com, archived from the original on 2008-06-26, http://web.archive.org/web/20080626101129/http://www.linux.com/feature/12774 
  25. ^ "MRINFO(8)", OpenBSD Manual Pages, http://www.openbsd.org/cgi-bin/man.cgi?query=mrinfo, retrieved 2011-12-13 
  26. ^ "MAP-MBONE(8)", OpenBSD Manual Pages, http://www.openbsd.org/cgi-bin/man.cgi?query=map-mbone, retrieved 2011-12-13 
  27. ^ de Raadt, Theo (2001-08-24). "Re: Why were all DJB's ports removed? No more qmail?". openbsd-misc mailing list. http://archives.neohapsis.com/archives/openbsd/2001-08/2544.html. 
  28. ^ Bernstein, DJ (2001-08-27). "Re: Why were all DJB's ports removed? No more qmail?". openbsd-misc mailing list. http://archives.neohapsis.com/archives/openbsd/2001-08/2812.html. 
  29. ^ a b Espie, Marc (2001-08-28). "Re: Why were all DJB's ports removed? No more qmail?". openbsd-misc mailing list. http://archives.neohapsis.com/archives/openbsd/2001-08/2864.html. 
  30. ^ Hartmeier, Daniel, "Design and Performance of the OpenBSD Stateful Packet Filter (pf)", Systor AG, http://www.benzedrine.cx/pf-paper.html, retrieved 2011-12-13 
  31. ^ OpenBSD CVS logs showing import of diff, grep and pkg-config. OpenBGPD and OpenNTPD man pages from OpenBSD.
  32. ^ Varghese, Sam (2004-10-08), "Staying on the cutting edge", The Age, http://www.theage.com.au/articles/2004/10/07/1097089476287.html, retrieved 2011-12-13 
  33. ^ Laird, Cameron; Staplin, George Peter (2003-07-17), "The Essence of OpenBSD", ONLamp, http://www.onlamp.com/pub/a/bsd/2003/07/17/openbsd_core_team.html, retrieved 2011-12-13 
  34. ^ de Raadt, Theo (2005-12-19). "2.3 release announcement". openbsd-misc mailing list. http://www.monkey.org/openbsd/archive/misc/9805/msg00308.html. "Without [SNI's] support at the right time, this release probably would not have happened" 
  35. ^ "OpenSSH Remote Challenge Vulnerability", Internet Security Systems Security Advisory (Internet Security Systems), 2002-06-26, http://www.iss.net/threats/advise123.html, retrieved 2011-12-13 
  36. ^ OpenSSH "Challenge-Response" authentication buffer overflow, Internet Security Systems, http://xforce.iss.net/xforce/xfdb/9169, retrieved 2011-12-13 
  37. ^ "OpenBSD's IPv6 mbufs remote kernel buffer overflow", Core Security Technologies - CoreLabs Advisory (Core Security Technologies), 2007-03-13, http://www.coresecurity.com/content/open-bsd-advisorie, retrieved 2011-12-13 
  38. ^ Brindle, Joshua (2008-03-30), "Secure doesn't mean anything", Security Blog, http://securityblog.org/brindle/2008/03/30/secure-doesnt-mean-anything/, retrieved 2011-12-13 
  39. ^ "Security", OpenBSD, http://www.openbsd.org/security.html, retrieved 2011-12-13, "Secure by Default" 
  40. ^ Wheeler, David A. (2003-03-03), "2.4. Is Open Source Good for Security?", Secure Programming for Linux and Unix HOWTO, http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/open-source-security.html, retrieved 2011-12-13 
  41. ^ Todd C., Miller; de Raadt, Theo (1999-06–06), "strlcpy and strlcat – consistent, safe, string copy and concatenation", Proceedings of the 1999 USENIX Annual Technical Conference (USENIX): pp. 175–178, http://www.usenix.org/events/usenix99/millert.html, retrieved 2011-12-13 
  42. ^ de Raadt, Theo; Hallqvist, Niklas; Grabowski, Artur; Keromytis, Angelos D. & Provos, Niels (PDF), Cryptography in OpenBSD: An overview, http://www.openbsd.org/papers/crypt-paper.pdf, retrieved 2011-12-13 
  43. ^ Provos, Niels (2003-08-09), Privilege Separated OpenSSH, http://www.citi.umich.edu/u/provos/ssh/privsep.html, retrieved 2011-12-13 
  44. ^ OpenBSD CVS logs showing addition of privilege separation to tcpdump and httpd man page describing the chroot mechanism.
  45. ^ "Project History and Credits", OpenSSH, http://www.openssh.com/history.html, retrieved 2011-12-13 
  46. ^ "SSH usage profiling", OpenSSH, http://www.openssh.com/usage/, retrieved 2011-12-13 
  47. ^ Biancuzzi, Federico (2004-03-18), "An Interview with OpenBSD's Marc Espie", ONLamp, http://www.onlamp.com/pub/a/bsd/2004/03/18/marc_espie.html, retrieved 2011-12-13 
  48. ^ a b Torvalds, Linus (2008-07-15). "Re: [stable] Linux 2.6.25.10". linux-kernel mailing list. http://article.gmane.org/gmane.linux.kernel/706950. 
  49. ^ Espie, Marc (2008-07-16). "Re: This is what Linus Torvalds calls openBSD crowd". openbsd-misc mailing list. http://kerneltrap.org/mailarchive/openbsd-misc/2008/7/16/2536484. 
  50. ^ Grabowski, Artur (2008-07-16). "Re: This is what Linus Torvalds calls openBSD crowd". openbsd-misc mailing list. http://kerneltrap.org/mailarchive/openbsd-misc/2008/7/17/2545214. 
  51. ^ de Raadt, Theo (2010-12-14). "Allegations regarding OpenBSD IPSEC". openbsd-tech mailing list. http://marc.info/?l=openbsd-tech&m=129236621626462&w=2. 
  52. ^ Holwerda, Thom (2010-12-14), "FBI Added Secret Backdoors to OpenBSD IPSEC", OSNews, http://www.osnews.com/story/24136/_FBI_Added_Secret_Backdoors_to_OpenBSD_IPSEC_, retrieved 2011-12-13 
  53. ^ Ryan, Paul (2010-12-23), "OpenBSD code audit uncovers bugs, but no evidence of backdoor", Ars Technica (Condé Nast Digital), http://arstechnica.com/open-source/news/2010/12/openbsd-code-audit-uncovers-bugs-but-no-evidence-of-backdoor.ars, retrieved 2011-01-09 
  54. ^ McIntire, Tim (2006-08-08), "Take a closer look at OpenBSD", Developerworks (IBM), http://www.ibm.com/developerworks/aix/library/au-openbsd.html, retrieved 2011-12-13, "Because OpenBSD is both thin and secure, one of the most common OpenBSD implementation purposes is as a firewall." 
  55. ^ "RTMX O/S IEEE Real Time POSIX Operating Systems", RTMX Inc., http://www.rtmx.com/, retrieved 2011-12-13, "RTMX O/S is a product extension to OpenBSD Unix-like operating system with emphasis on embedded, dedicated applications." 
  56. ^ ".vantronix secure system", Compumatica secure networks GmbH, http://www.vantronix.com/, retrieved 2011-12-13, "The Next Generation Firewall is not a standalone device, it is a Router for operation in security critical enviroments with high requirements for availability, comprehensive support as well as reliable and trusted systems powered by OpenBSD." 
  57. ^ "Core Force", Core Labs, http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=project&name=Core_Force, retrieved 2011-12-13, "CORE FORCE provides inbound and outbound stateful packet filtering for TCP/IP protocols using a Windows port of OpenBSD's PF firewall, granular file system and registry access control and programs' integrity validation." 
  58. ^ "About Xenocara", Xenocara, http://xenocara.org/, retrieved 2011-12-13 
  59. ^ Tzanidakis, Manolis (2006-04-21), Using OpenBSD on the desktop, Linux.com, http://www.linux.com/archive/feed/52930, retrieved 2011-12-13 
  60. ^ "The OpenBSD 4.9 Release", OpenBSD, http://www.openbsd.org/49.html, retrieved 2011-12-13, "Over 6,800 ports...Gnome 2.32.1, KDE 3.5.10." 
  61. ^ "Benchmarking BSD and Linux", Linux Kongress 2003, http://bulk.fefe.de/scalability/, retrieved 2011-12-13 
  62. ^ Holland, Nick (2003-10-19). "Re: OpenBSD Benchmarked... results: poor!". openbsd-misc mailing list. http://groups.google.co.uk/group/lucky.openbsd.misc/msg/2b6f9d5bf42b712a. 
  63. ^ Willis, Nathan (2005-11-02), "Trying out the new OpenBSD 3.8", NewsForge (Linux.com), archived from the original on 2008-02-01, http://web.archive.org/web/20080201010942/http://www.linux.com/articles/49451 
  64. ^ Matzan, Jem (July 22, 2004-07-22), "Review: OpenBSD 3.5", NewsForge (Linux.com), archived from the original on 2008-02-07, http://web.archive.org/web/20080207204800/http://www.linux.com/articles/37599 
  65. ^ Storey, Robert (2004-07-07), "OpenBSD – For Your Eyes Only", DistroWatch, http://distrowatch.com/dwres.php?resource=review-openbsd, retrieved 2011-12-13 
  66. ^ "Anonymous CVS", OpenBSD, http://www.openbsd.org/anoncvs.html, retrieved 2011-12-13 
  67. ^ "Getting the OpenBSD distribution", OpenBSD, http://www.openbsd.org/ftp.html, retrieved 2011-12-13 
  68. ^ "Ordering OpenBSD products", OpenBSD, http://www.openbsd.org/orders.html, retrieved 2011-12-13, "The proceeds from sale of these products is the primary funding of the OpenBSD project." 
  69. ^ a b "15 – The OpenBSD packages and ports system", OpenBSD FAQ, http://www.openbsd.org/faq/faq15.html, retrieved 2011-12-13 
  70. ^ "The OpenBSD 2.7 Release", OpenBSD FAQ, http://www.openbsd.org/27.html, retrieved 2011-12-13 
  71. ^ Although in fact pufferfish do not possess spikes and images of Puffy are closer to a similar species, the porcupinefish.
  72. ^ a b "Release Songs", OpenBSD FAQ, http://www.openbsd.org/lyrics.html, retrieved 2011-12-13 
  73. ^ Matzan, Jem (2006-12-01), "OpenBSD 4.0 review", Software In Review, http://www.softwareinreview.com/bsd/openbsd_4.0_review.html, retrieved 2011-12-13, "Each OpenBSD release has a graphical theme and a song that goes with it. The theme reflects a major concern that the OpenBSD programmers are addressing or bringing to light." 

External links