spectre – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 30 Aug 2021 07:14:08 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png spectre – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Linux Action News 204 https://original.jupiterbroadcasting.net/146012/linux-action-news-204/ Sun, 29 Aug 2021 18:00:00 +0000 https://original.jupiterbroadcasting.net/?p=146012 Show Notes: linuxactionnews.com/204

The post Linux Action News 204 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/204

The post Linux Action News 204 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 172 https://original.jupiterbroadcasting.net/143967/linux-action-news-172/ Sun, 17 Jan 2021 14:00:00 +0000 https://original.jupiterbroadcasting.net/?p=143967 Show Notes: linuxactionnews.com/172

The post Linux Action News 172 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/172

The post Linux Action News 172 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 85 https://original.jupiterbroadcasting.net/128551/linux-action-news-85/ Mon, 24 Dec 2018 15:29:09 +0000 https://original.jupiterbroadcasting.net/?p=128551 Episode Links: linuxactionnews.com/85

The post Linux Action News 85 first appeared on Jupiter Broadcasting.

]]>

Episode Links:

linuxactionnews.com/85

The post Linux Action News 85 first appeared on Jupiter Broadcasting.

]]>
Encrypt That Pool | BSD Now 263 https://original.jupiterbroadcasting.net/127081/encrypt-that-pool-bsd-now-263/ Wed, 12 Sep 2018 19:00:24 +0000 https://original.jupiterbroadcasting.net/?p=127081 ##Headlines ###How to mitigate Spectre and Meltdown on an HP Proliant server with FreeBSD As recently announced in a previous article I wanted to write a couple of guides on how to mitigate Spectre and Meltdown vulnerabilities in GNU/Linux and UNIX environments. It is always a good and I hope a standard practice to have […]

The post Encrypt That Pool | BSD Now 263 first appeared on Jupiter Broadcasting.

]]>

##Headlines
###How to mitigate Spectre and Meltdown on an HP Proliant server with FreeBSD

As recently announced in a previous article I wanted to write a couple of guides on how to mitigate Spectre and Meltdown vulnerabilities in GNU/Linux and UNIX environments. It is always a good and I hope a standard practice to have your systems patched and if they aren’t for whatever the reason (that legacy thing you’re carrying on for ages) you may take the necessary extra steps to protect your environment. I never planned to do any article on patching anything. Nowadays it’s a no brainer and operating systems have provided the necessary tools for this to be easy and as smooth as possible. So why this article?
Spectre and Meltdown are both hardware vulnerabilities. Major ones. They are meaningful for several reasons among them the world wide impact since they affect Intel and AMD systems which are ubiquitous. And second because patching hardware is not as easy, for the manufacturer and for the users or administrators in charge of the systems. There is still no known exploit around left out in the open hitting servers or desktops anywhere. The question is not if it will ever happen. The question is when will it happen. And it may be sooner than later. This is why big companies, governments and people in charge of big deployments are patching or have already patched their systems. But have you done it to your system? I know you have a firewall. Have you thought about CVE-2018-3639? This particular one could make your browser being a vector to get into your system. So, no, there is no reason to skip this.
Patching these set of vulnerabilities implies some more steps and concerns than updating the operating system. If you are a regular Windows user I find rare you to be here and many of the things you will read may be foreign to you. I am not planning to do a guide on Windows systems since I believe someone else has or will do it and will do it better than me since I am not a pro Windows user. However there is one basic and common thing for all OS’s when dealing with Spectre and Meltdown and that is a microcode update is necessary for the OS patches to effectively work.
What is microcode? You can read the Wikipedia article but in short it is basically a layer of code that allows chip manufacturers to deal with modifications on the hardware they’ve produced and the operating systems that will manage that hardware. Since there’s been some issues (namely Spectre and Meltdown) Intel and AMD respectively have released a series of microcode updates to address those problems. First series did come with serious problems and some regressions, to the point GNU/Linux producers stopped releasing the microcode updates through their release channels for updates and placed the ball on Intel’s roof. Patching fast does always include risks, specially when dealing with hardware. OS vendors have resumed their microcode update releases so all seems to be fine now.
In order to update the microcode we’re faced with two options. Download the most recent BIOS release from our vendor, provided it patches the Spectre and Meltdown vulnerabilities, or patch it from the OS. If your hardware vendor has decided not to provide support on your hardware you are forced to use the latter solution. Yes, you can still keep your hardware. They usually come accompanied with a “release notes” file where there are some explanatory notes on what is fixed, what is new, etc. To make the search easy for you a news site collected the vendors list and linked the right support pages for anyone to look. In some scenarios it would be desirable not to replace the whole BIOS but just update the microcode from the OS side. In my case I should update an HP Proliant ML110 G7 box and the download link for that would be this.
Instead of using the full blown BIOS update path we’ll use the inner utilities to patch Spectre and Meltdown on FreeBSD. So let’s put our hands on it

  • See the article for the technical breakdown

###A look beyond the BSD teacup: OmniOS installation

Five years ago I wrote a post about taking a look beyond the Linux teacup. I was an Arch Linux user back then and since there were projects like ArchBSD (called PacBSD today) and Arch Hurd, I decided to take a look at and write about them. Things have changed. Today I’m a happy FreeBSD user, but it’s time again to take a look beyond the teacup of operating systems that I’m familiar with.

  • Why Illumos / OmniOS?

There are a couple of reasons. The Solaris derivatives are the other big community in the *nix family besides Linux and the BSDs and we hadn’t met so far. Working with ZFS on FreeBSD, I now and then I read messages that contain a reference to Illumos which certainly helps to keep up the awareness. Of course there has also been a bit of curiosity – what might the OS be like that grew ZFS?
Also the Ravenports project that I participate in planned to support Solaris/Illumos right from the beginning. I wanted to at least be somewhat “prepared” when support for that platform would finally land. So I did a little research on the various derivatives available and settled on the one that I had heard a talk about at last year’s conference of the German Unix Users Group: “OmniOS – Solaris for the Rest of Us”. I would have chosen SmartOS as I admire what Bryan Cantrill does but for getting to know Illumos I prefer a traditional installation over a run-from-RAM system.
Of course FreeBSD is not run by corporations, especially when compared to the state of Linux. And when it comes to sponsoring, OpenBSD also takes the money… When it comes to FreeBSD developers, there’s probably some truth to the claim that some of them are using macOS as their desktop systems while OpenBSD devs are more likely to develop on their OS of choice. But then there’s the statement that “every innovation in the past decade comes from Solaris”. Bhyve alone proves this wrong. But let’s be honest: Two of the major technologies that make FreeBSD a great platform today – ZFS and DTrace – actually do come from Solaris. PAM originates there and a more modern way of managing services as well. Also you hear good things about their zones and a lot of small utilities in general.
In the end it was a lack of time that made me cheat and go down the easiest road: Create a Vagrantfile and just pull a VM image of the net that someone else had prepared… This worked to just make sure that the Raven packages work on OmniOS. I was determined to return, though – someday. You know how things go: “someday” is a pretty common alias for “probably never, actually.”
But then I heard about a forum post on the BSDNow! podcast. The title “Initial OmniOS impressions by a BSD user” caught my attention. I read that it was written by somebody who had used FreeBSD for years but loathed the new Code of Conduct enough to leave. I also oppose the Conduct and have made that pretty clear in my February post [ ! -z ${COC} ] && exit 1. As stated there, I have stayed with my favorite OS and continue to advocate it. I decided to stop reading the post and try things out on my own instead. Now I’ve finally found the time to do so.

  • What’s next?

That’s it for part one. In part two I’ll try to make the system useful. So far I have run into a problem that I haven’t been able to solve. But I have some time now to figure things out for the next post. Let’s see if I manage to get it working or if I have to report failure!


###What are all these types of memory in top(1)?

  • Earlier this week I convinced Mark Johnston, one of the FreeBSD VM experts to update a page on the FreeBSD wiki that I saw was being referenced on stackoverflow and similar sites
  • Mark updated the explanations to be more correct, and to include more technical detail for inquiring minds
  • He also added the new type that appeared in FreeBSD somewhat recently

Active – Contains memory “actively” (recently) being used by applications
Inactive – Contains memory that has not been touched recently, or was released from the Buffer Cache
Laundry – Contains memory that Inactive but still potentially contains useful data that needs to be stored before this memory can be used again
Wired – Memory that cannot be swapped out, including the kernel, network stack, and the ZFS ARC
Buf – Buffer Cache, used my UFS and most filesystems except ZFS (which uses the ARC)
Free – Memory that is immediately available for use by the rest of the system


##News Roundup
###OpenBSD saves me again! — Debug a memory corruption issue

Yesterday, I came across a third-part library issue, which crashes at allocating memory:

Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x00007f594a5a9b6b in _int_malloc () from /usr/lib/libc.so.6
(gdb) bt
#0 0x00007f594a5a9b6b in _int_malloc () from /usr/lib/libc.so.6
#1 0x00007f594a5ab503 in malloc () from /usr/lib/libc.so.6
#2 0x00007f594b13f159 in operator new (sz=5767168) at /build/gcc/src/gcc/libstdc++-v3/libsupc++/new_op.cc:50

It is obvious that the memory tags are corrupted, but who is the murder? Since the library involves a lot of maths computation, it is not an easy task to grasp the code quickly. So I need to find another way:
(1) Open all warnings during compilation: -Wall. Nothing found.
(2) Use valgrind, but unfortunately, valgrind crashes itself:

valgrind: the 'impossible' happened:
Killed by fatal signal

host stacktrace:
==43326== at 0x58053139: get_bszB_as_is (m_mallocfree.c:303)
==43326== by 0x58053139: get_bszB (m_mallocfree.c:315)
==43326== by 0x58053139: vgPlain_arena_malloc (m_mallocfree.c:1799)
==43326== by 0x5800BA84: vgMemCheck_new_block (mc_malloc_wrappers.c:372)
==43326== by 0x5800BD39: vgMemCheck___builtin_vec_new (mc_malloc_wrappers.c:427)
==43326== by 0x5809F785: do_client_request (scheduler.c:1866)
==43326== by 0x5809F785: vgPlain_scheduler (scheduler.c:1433)
==43326== by 0x580AED50: thread_wrapper (syswrap-linux.c:103)
==43326== by 0x580AED50: run_a_thread_NORETURN (syswrap-linux.c:156)

sched status:
running_tid=1

(3) Change compiler, use clang instead of gcc, and hope it can give me some clues. Still no effect.
(4) Switch Operating System from Linux to OpenBSD, the program crashes again. But this time, it tells me where the memory corruption occurs:

Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x000014b07f01e52d in addMod (r=<error reading variable>, a=4693443247995522, b=28622907746665631,

I figure out the issue quickly, and not bother to understand the whole code. OpenBSD saves me again, thanks!


###Native Encryption for ZFS on FreeBSD (Call for Testing)

To anyone with an interest in native encryption in ZFS please test the projects/zfs-crypto-merge-0820 branch in my freebsd repo: https://github.com/mattmacy/networking.git

git clone https://github.com/mattmacy/networking.git -b projects/zfs-crypto-merge-0820

The UI is quite close to the Oracle Solaris ZFS crypto with minor differences for specifying key location.
Please note that once a feature is enabled on a pool it can’t be disabled. This means that if you enable encryption support on a pool you will never be able to import it in to a ZFS without encryption support. For this reason I would strongly advise against using this on any pool that can’t be easily replaced until this change has made its way in to HEAD after the freeze has been lifted.
By way of background the original ZoL commit can be found at:


###VMworld 2018: Showcasing Hybrid Cloud, Persistent Memory and the Asigra TrueNAS Backup Appliance

During its last year in Las Vegas before moving back to San Francisco, VMworld was abuzz with all the popular buzzwords, but the key focus was on supporting a more agile approach to hybrid cloud.
Surveys of IT stakeholders and analysts agree that most businesses have multiple clouds spanning both public cloud providers and private data centers. While the exact numbers vary, well over half of businesses have a hybrid cloud strategy consisting of at least three different clouds.
This focus on hybrid cloud provided the perfect timing for our announcement that iXsystems and Asigra are partnering to deliver the Asigra TrueNAS Backup Appliance, which combines Asigra Cloud Backup software backed by TrueNAS storage. Asigra TrueNAS Backup Appliances provide a self-healing and ransomware-resistent OpenZFS backup repository in your private cloud. The appliance can simultaneously be used as general-purpose file, block, and object storage. How does this tie in with the hybrid cloud? The Asigra Cloud Backup software can backup data from public cloud repositories – G Suite, Office 365, Salesforce, etc. – as well as intelligently move backed-up data to the public cloud for long-term retention.
Another major theme at the technical sessions was persistent memory, as vSphere 6.7 added support for persistent memory – either as a storage tier or virtualized and presented to a guest OS. As detailed in our blog post from SNIA’s Persistent Memory Summit 2018, persistent memory is rapidly becoming mainstream. Persistent memory bridges the gap between memory and flash storage – providing near-memory latency storage that persists across reboots or power loss. vSphere allows both legacy and persistent memory-aware applications to leverage this ultra-fast storage tier. We were excited to show off our newly-introduced TrueNAS M-Series at VMworld, as all TrueNAS M40 and M50 models leverage NVDIMM persistent memory technology to provide a super-fast write cache, or SLOG, without any of the limitations of Flash technology.
The iXsystems booth’s theme was “Enterprise Storage, Open Source Economics”. iXsystems leverages the power of Open Source software, combined with our enterprise-class hardware and support, to provide incredibly low TCO storage for virtualization environments. Our TrueNAS unified storage and server offerings are an ideal solution for your organization’s private cloud infrastructure. Combined with VMware NSX Hybrid Connect – formerly known as VMware Hybrid Cloud Extension – you can seamlessly shift running systems into a public cloud environment for a true hybrid cloud solution.
Another special treat at this year’s booth was iXsystems Vice President of Engineering Kris Moore giving demos of an early version of “Project TrueView”, a single-pane of glass management solution for administration of multiple FreeNAS and TrueNAS systems. In addition to simplified administration and enhanced monitoring, Project TrueView will also provide Role-Based Access Control for finer-grained permissions management. A beta version of Project TrueView is expected to be available at the end of this year.
Overall, we had a great week at VMworld 2018 with lots of good conversations with customers, press, analysts, and future customers about TrueNAS, the Asigra TrueNAS Backup Appliance, iXsystems servers, Project TrueView, and more – our booth was more popular than ever!


###End of life for NetBSD 6.x

In keeping with NetBSD’s policy of supporting only the latest (8.x) and next most recent (7.x) major branches, the recent release of NetBSD 8.0 marks the end of life for NetBSD 6.x. As in the past, a month of overlapping support has been provided in order to ease the migration to newer releases.

  • As of now, the following branches are no longer maintained:

  • netbsd-6-1

  • netbsd-6-0

  • netbsd-6

  • This means:

  • There will be no more pullups to those branches (even for security issues)

  • There will be no security advisories made for any those branches

  • The existing 6.x releases on ftp.NetBSD.org will be moved into /pub/NetBSD-archive/

  • May NetBSD 8.0 serve you well! (And if it doesn’t, please submit a PR!)


##Beastie Bits


##Feedback/Questions


  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv

The post Encrypt That Pool | BSD Now 263 first appeared on Jupiter Broadcasting.

]]>
Privacy Priorities| LINUX Unplugged 265 https://original.jupiterbroadcasting.net/126966/privacy-priorities-linux-unplugged-265/ Tue, 04 Sep 2018 20:28:09 +0000 https://original.jupiterbroadcasting.net/?p=126966 Show Notes/Links: linuxunplugged.com/265

The post Privacy Priorities| LINUX Unplugged 265 first appeared on Jupiter Broadcasting.

]]>

Show Notes/Links: linuxunplugged.com/265

The post Privacy Priorities| LINUX Unplugged 265 first appeared on Jupiter Broadcasting.

]]>
Terminal Fault | TechSNAP 380 https://original.jupiterbroadcasting.net/126761/terminal-fault-techsnap-380/ Thu, 16 Aug 2018 17:14:37 +0000 https://original.jupiterbroadcasting.net/?p=126761 Show Notes: techsnap.systems/380

The post Terminal Fault | TechSNAP 380 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/380

The post Terminal Fault | TechSNAP 380 first appeared on Jupiter Broadcasting.

]]>
OS Foundations | BSD Now 258 https://original.jupiterbroadcasting.net/126581/os-foundations-bsd-now-258/ Wed, 08 Aug 2018 06:53:34 +0000 https://original.jupiterbroadcasting.net/?p=126581 ##Headlines ###FreeBSD Foundation Update, July 2018 MESSAGE FROM THE EXECUTIVE DIRECTOR We’re in the middle of summer here, in Boulder, CO. While the days are typically hot, they can also be quite unpredictable. Thanks to the Rocky Mountains, waking up to 50-degree (~10 C) foggy weather is not surprising. In spite of the unpredictable weather, […]

The post OS Foundations | BSD Now 258 first appeared on Jupiter Broadcasting.

]]>

##Headlines
###FreeBSD Foundation Update, July 2018

  • MESSAGE FROM THE EXECUTIVE DIRECTOR

We’re in the middle of summer here, in Boulder, CO. While the days are typically hot, they can also be quite unpredictable. Thanks to the Rocky Mountains, waking up to 50-degree (~10 C) foggy weather is not surprising. In spite of the unpredictable weather, many of us took some vacation this month. Whether it was extending the Fourth of July celebration, spending time with family, or relaxing and enjoying the summer weather, we appreciated our time off, while still managing to accomplish a lot!
In this newsletter, Glen Barber enlightens us about the upcoming 12.0 release. I gave a recap of OSCON, that Ed Maste and I attended, and Mark Johnston explains the work on his improved microcode loading project, that we are funding. Finally, Anne Dickison gives us a rundown on upcoming events and information on submitting a talk for MeetBSD.
Your support helps us continue this work. Please consider making a donation today. We can’t do it without you. Happy reading!!

  • June 2018 Development Projects Update
  • Fundraising Update: Supporting the Project
  • July 2018 Release Engineering Update
  • OSCON 2018 Recap
  • Submit Your Work: MeetBSD 2018
  • FreeBSD Discount for 2018 SNIA Developer Conference
  • EuroBSDcon 2018 Travel Grant Application Deadline: August 2

iXsystems

###BSDCan Trip Reports


##News Roundup
###FreeBSD and OSPFd

With FreeBSD jails deployed around the world, static routing was getting a bit out of hand. Plus, when I needed to move a jail from one data center to another, I would have to update routing tables across multiple sites. Not ideal. Enter dynamic routing…

OSPF (open shortest path first) is an internal dynamic routing protocol that provides the autonomy that I needed and it’s fairly easy to setup. This article does not cover configuration of VPN links, ZFS, or Freebsd jails, however it’s recommended that you use seperate ZFS datasets per jail so that migration between hosts can be done with zfs send & receive.

In this scenario, we have five FreeBSD servers in two different data centers. Each physical server runs anywhere between three to ten jails. When jails are deployed, they are assigned a /32 IP on lo2. From here, pf handles inbound port forwarding and outbound NAT. Links between each server are provided by OpenVPN TAP interfaces. (I used TAP to pass layer 2 traffic. I seem to remember that I needed TAP interfaces due to needing GRE tunnels on top of TUN interfaces to get OSPF to communicate. I’ve heard TAP is slower than TUN so I may revisit this.)

In this example, we will use 172.16.2.0/24 as the range for OpenVPN P2P links and 172.16.3.0/24 as the range of IPs available for assignment to each jail. Previously, when deploying a jail, I assigned IPs based on the following groups:

Server 1: 172.16.3.0/28
Server 2: 172.16.3.16/28
Server 3: 172.16.3.32/28
Server 4: 172.16.3.48/28
Server 5: 172.16.3.64/28

When statically routing, this made routing tables a bit smaller and easier to manage. However, when I needed to migrate a jail to a new host, I had to add a new /32 to all routing tables. Now, with OSPF, this is no longer an issue, nor is it required.

  • To get started, first we install the Quagga package.

  • The two configuration files needed to get OSPFv2 running are /usr/local/etc/quagga/zebra.conf and /usr/local/etc/quagga/ospfd.conf.

  • Starting with zebra.conf, we’ll define the hostname and a management password.

  • Second, we will populate the ospfd.conf file.

  • To break this down:

  • service advanced-vty allows you to skip the en or enable command. Since I’m the only one who uses this service, it’s one less command to type.

  • ip ospf authentication message-digest and ip ospf message-diget-key… ignores non-authenticated OSPF communication. This is useful when communicating over the WAN and to prevent a replay attack. Since I’m using a VPN to communicate, I could exclude these.

  • passive-interface default turns off the active communication of OSPF messages on all interfaces except for the interfaces listed as no passive-interface [interface name]. Since my ospf communication needs to leverage the VPNs, this prevents the servers from trying to send ospf data out the WAN interface (a firewall would work too).

  • network 172.16.2.0/23 area 0.0.0.0 lists a supernet of both 172.16.2.0/24 and 172.16.3.0/24. This ensures routes for the jails are advertised along with the P2P links used by OpenVPN. The OpenVPN links are not required but can provide another IP to access your server if one of the links goes down. (See the suggested tasks below).

  • At this point, we can enable the services in rc.conf.local and start them.

  • We bind the management interface to 127.0.0.1 so that it’s only accessable to local telnet sessions. If you want to access this service remotely, you can bind to a remotely accessable IP. Remember telnet is not secure. If you need remote access, use a VPN.

  • To manage the services, you can telnet to your host’s localhost address.

  • Use 2604 for the ospf service.

  • Remember, this is accessible by non-root users so set a good password.


###A broad overview of how ZFS is structured on disk

When I wrote yesterday’s entry, it became clear that I didn’t understand as much about how ZFS is structured on disk (and that this matters, since I thought that ZFS copy on write updates updated a lot more than they do). So today I want to write down my new broad understanding of how this works. (All of this can be dug out of the old, draft ZFS on-disk format specification, but that spec is written in a very detailed way and things aren’t always immediately clear from it.)

Almost everything in ZFS is in DMU object. All objects are defined by a dnode, and object dnodes are almost always grouped together in an object set. Object sets are themselves DMU objects; they store dnodes as basically a giant array in a ‘file’, which uses data blocks and indirect blocks and so on, just like anything else. Within a single object set, dnodes have an object number, which is the index of their position in the object set’s array of dnodes. (Because an object number is just the index of the object’s dnode in its object set’s array of dnodes, object numbers are basically always going to be duplicated between object sets (and they’re always relative to an object set). For instance, pretty much every object set is going to have an object number ten, although not all object sets may have enough objects that they have an object number ten thousand. One corollary of this is that if you ask zdb to tell you about a given object number, you have to tell zdb what object set you’re talking about. Usually you do this by telling zdb which ZFS filesystem or dataset you mean.)

Each ZFS filesystem has its own object set for objects (and thus dnodes) used in the filesystem. As I discovered yesterday, every ZFS filesystem has a directory hierarchy and it may go many levels deep, but all of this directory hierarchy refers to directories and files using their object number.

ZFS organizes and keeps track of filesystems, clones, and snapshots through the DSL (Dataset and Snapshot Layer). The DSL has all sorts of things; DSL directories, DSL datasets, and so on, all of which are objects and many of which refer to object sets (for example, every ZFS filesystem must refer to its current object set somehow). All of these DSL objects are themselves stored as dnodes in another object set, the Meta Object Set, which the uberblock points to. To my surprise, object sets are not stored in the MOS (and as a result do not have ‘object numbers’). Object sets are always referred to directly, without indirection, using a block pointer to the object set’s dnode. (I think object sets are referred to directly so that snapshots can freeze their object set very simply.)

The DSL directories and datasets for your pool’s set of filesystems form a tree themselves (each filesystem has a DSL directory and at least one DSL dataset). However, just like in ZFS filesystems, all of the objects in this second tree refer to each other indirectly, by their MOS object number. Just as with files in ZFS filesystems, this level of indirection limits the amount of copy on write updates that ZFS had to do when something changes.

PS: If you want to examine MOS objects with zdb, I think you do it with something like ‘zdb -vvv -d ssddata 1’, which will get you object number 1 of the MOS, which is the MOS object directory. If you want to ask zdb about an object in the pool’s root filesystem, use ‘zdb -vvv -d ssddata/ 1’. You can tell which one you’re getting depending on what zdb prints out. If it says ‘Dataset mos [META]’ you’re looking at objects from the MOS; if it says ‘Dataset ssddata [ZPL]’, you’re looking at the pool’s root filesystem (where object number 1 is the ZFS master node).

PPS: I was going to write up what changed on a filesystem write, but then I realized that I didn’t know how blocks being allocated and freed are reflected in pool structures. So I’ll just say that I think that ignoring free space management, only four DMU objects get updated; the file itself, the filesystem’s object set, the filesystem’s DSL dataset object, and the MOS.

  • (As usual, doing the research to write this up taught me things that I didn’t know about ZFS.)

Digital Ocean

###HardenedBSD Foundation Status

On 09 July 2018, the HardenedBSD Foundation Board of Directors held the kick-off meeting to start organizing the Foundation. The following people attended the kick-off meeting:

    1. Shawn Webb (in person)
    1. George Saylor (in person)
    1. Ben Welch (in person)
    1. Virginia Suydan (in person)
    1. Ben La Monica (phone)
    1. Dean Freeman (phone)
    1. Christian Severt (phone)

We discussed the very first steps that need to be taken to organize the HardenedBSD Foundation as a 501©(3) not-for-profit organization in the US. We determined we could file a 1023EZ instead of the full-blown 1023. This will help speed the process up drastically.

  • The steps are laid out as follows:
  • Register a Post Office Box (PO Box) (completed on 10 Jul 2018).
  • Register The HardenedBSD Foundation as a tax-exempt nonstock corporation in the state of Maryland (started on 10 Jul 2018, submitted on 18 Jul 2018, granted 20 Jul 2018).
  • Obtain a federal tax ID (obtained 20 Jul 2018).
  • Close the current bank account and create a new one using the federal tax ID (completed on 20 Jul 2018).
  • File the 1023EZ paperwork with the federal government (started on 20 Jul 2018).
  • Hire an attorney to help draft the organization bylaws.
  • Each of the steps must be done serially and in order.

We added Christian Severt, who is on Emerald Onion’s Board of Directors, to the HardenedBSD Foundation Board of Directors as an advisor. He was foundational in getting Emerald Onion their 501©(3) tax-exempt, not-for-profit status and has really good insight. Additionally, he’s going to help HardenedBSD coordinate hosting services, figuring out the best deals for us.

We promoted George Saylor to Vice President and changed Shawn Webb’s title to President and Director. This is to help resolve potential concerns both the state and federal agencies might have with an organization having only a single President role.

We hope to be granted our 501©(3) status before the end of the year, though that may be subject to change. We are excited for the formation of the HardenedBSD Foundation, which will open up new opportunities not otherwise available to HardenedBSD.


###More mitigations against speculative execution vulnerabilities

Philip Guenther (guenther@) and Bryan Steele (brynet@) have added more mitigations against speculative execution CPU vulnerabilities on the amd64 platform.


CVSROOT:    /cvs
Module name:    src
Changes by: guenther@cvs.openbsd.org    2018/07/23 11:54:04

Modified files:
    sys/arch/amd64/amd64: locore.S 
    sys/arch/amd64/include: asm.h cpufunc.h frameasm.h 

Log message:
Do "Return stack refilling", based on the "Return stack underflow" discussion
and its associated appendix at https://support.google.com/faqs/answer/7625886
This should address at least some cases of "SpectreRSB" and earlier
Spectre variants; more commits to follow.

The refilling is done in the enter-kernel-from-userspace and
return-to-userspace-from-kernel paths, making sure to do it before
unblocking interrupts so that a successive interrupt can't get the
CPU to C code without doing this refill.  Per the link above, it
also does it immediately after mwait, apparently in case the low-power
CPU states of idle-via-mwait flush the RSB.

ok mlarkin@ deraadt@```

+ and:

```CVSROOT: /cvs
Module name:    src
Changes by: guenther@cvs.openbsd.org    2018/07/23 20:42:25

Modified files:
    sys/arch/amd64/amd64: locore.S vector.S vmm_support.S 
    sys/arch/amd64/include: asm.h cpufunc.h 

Log message:
Also do RSB refilling when context switching, after vmexits, and
when vmlaunch or vmresume fails.

Follow the lead of clang and the intel recommendation and do an lfence
after the pause in the speculation-stop path for retpoline, RSB refill,
and meltover ASM bits.

ok kettenis@ deraadt@```

+ "Mitigation G-2" for AMD processors:

```CVSROOT: /cvs
Module name:    src
Changes by: brynet@cvs.openbsd.org  2018/07/23 17:25:03

Modified files:
    sys/arch/amd64/amd64: identcpu.c 
    sys/arch/amd64/include: specialreg.h 

Log message:
Add "Mitigation G-2" per AMD's Whitepaper "Software Techniques for
Managing Speculation on AMD Processors"

By setting MSR C001_1029[1]=1, LFENCE becomes a dispatch serializing
instruction.

Tested on AMD FX-4100 "Bulldozer", and Linux guest in SVM vmd(8)

ok deraadt@ mlarkin@```
***


##Beastie Bits
+ [HardenedBSD will stop supporting 10-STABLE on 10 August 2018](https://groups.google.com/a/hardenedbsd.org/forum/#!topic/users/xvU0g-g1l5U)
+ [GSoC 2018 Reports: Integrate libFuzzer with the Basesystem, Part 2](https://blog.netbsd.org/tnf/entry/gsoc_2018_reports_integrate_libfuzzer1)
+ [ZFS Boot Environments at PBUG](https://vermaden.wordpress.com/2018/07/30/zfs-boot-environments-at-pbug/)
+ [Second Editions versus the Publishing Business](https://blather.michaelwlucas.com/archives/3229)
+ [Theo de Raadt on "unveil(2) usage in base"](https://undeadly.org/cgi?action=article;sid=20180728063716)
+ [rtadvd(8) has been replaced by rad(8)](https://undeadly.org/cgi?action=article;sid=20180724072205)
+ [BSD Users Stockholm Meetup #3](https://www.meetup.com/BSD-Users-Stockholm/events/253447019/)
+ [Changes to NetBSD release support policy](https://blog.netbsd.org/tnf/entry/changes_to_netbsd_release_support)
+ [The future of HAMMER1](https://lists.dragonflybsd.org/pipermail/users/2018-July/357832.html)
***

**Tarsnap**

##Feedback/Questions
+ Rodriguez - [A Question](https://dpaste.com/0Y1B75Q#wrap)
+ Shane - [About ZFS Mostly](https://dpaste.com/32YGNBY#wrap)
+ Leif - [ZFS less than 8gb](https://dpaste.com/2GY6HHC#wrap)
+ Wayne - [ZFS vs EMC](https://dpaste.com/17PSCXC#wrap)
***

- Send questions, comments, show ideas/topics, or stories you want mentioned on the show to [feedback@bsdnow.tv](mailto:feedback@bsdnow.tv)

The post OS Foundations | BSD Now 258 first appeared on Jupiter Broadcasting.

]]>
Two-Factor Fraud | TechSNAP 378 https://original.jupiterbroadcasting.net/126511/two-factor-fraud-techsnap-378/ Thu, 02 Aug 2018 17:40:07 +0000 https://original.jupiterbroadcasting.net/?p=126511 Show Notes: techsnap.systems/378

The post Two-Factor Fraud | TechSNAP 378 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/378

The post Two-Factor Fraud | TechSNAP 378 first appeared on Jupiter Broadcasting.

]]>
We Found Another Spectre, Meltdown Flaw | Ask Noah Show 66 https://original.jupiterbroadcasting.net/125096/we-found-another-spectre-meltdown-flaw-ask-noah-show-66/ Thu, 24 May 2018 12:00:18 +0000 https://original.jupiterbroadcasting.net/?p=125096 Show Notes: podcast.asknoahshow.com/66

The post We Found Another Spectre, Meltdown Flaw | Ask Noah Show 66 first appeared on Jupiter Broadcasting.

]]>

Show Notes: podcast.asknoahshow.com/66

The post We Found Another Spectre, Meltdown Flaw | Ask Noah Show 66 first appeared on Jupiter Broadcasting.

]]>
Another Pass at Bypass | TechSNAP 369 https://original.jupiterbroadcasting.net/125041/another-pass-at-bypass-techsnap-369/ Wed, 23 May 2018 13:31:01 +0000 https://original.jupiterbroadcasting.net/?p=125041 Show Notes: techsnap.systems/369

The post Another Pass at Bypass | TechSNAP 369 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/369

The post Another Pass at Bypass | TechSNAP 369 first appeared on Jupiter Broadcasting.

]]>
The Return of Spectre | TechSNAP 357 https://original.jupiterbroadcasting.net/122722/the-return-of-spectre-techsnap-357/ Thu, 22 Feb 2018 14:15:32 +0000 https://original.jupiterbroadcasting.net/?p=122722 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: People Are Actually Using a Joke Dating Site That Matches People Based on Their Passwords This website answers the question no one ever asked: what if you dated someone who used the same […]

The post The Return of Spectre | TechSNAP 357 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

People Are Actually Using a Joke Dating Site That Matches People Based on Their Passwords

This website answers the question no one ever asked: what if you dated someone who used the same password?

Flight sim company FlightSimLabs has found itself in trouble after installing malware onto users’ machines as an anti-piracy measure. Code embedded in its A320-X module contained a mechanism for detecting ‘pirate’ serial numbers distributed on The Pirate Bay, which then triggered a process through which the company stole usernames and passwords from users’ web browsers.

Lessons from the Cryptojacking Attack at Tesla

New research from the RedLock CSI team revealed that the latest victim of cryptojacking is Tesla. While the attack was similar to the ones at Aviva and Gemalto, there were some notable differences. The hackers had infiltrated Tesla’s Kubernetes console which was not password protected. Within one Kubernetes pod, access credentials were exposed to Tesla’s AWS environment which contained an Amazon S3 (Amazon Simple Storage Service) bucket that had sensitive data such as telemetry.

Chef InSpec 2.0 helps automate security compliance in cloud apps

InSpec is a free open source tool that enables development teams to express security and compliance rules as code. Version 1.0 was about ensuring that applications were set up properly. The new version extends this capability to the cloud where companies are running the applications, allowing teams to test and write rules for compliance with cloud security policy. It supports AWS and Azure and comes with 30 common configurations out of the box including Docker, IIS, NGINX and PostgreSQL.

Meltdown and Spectre Check Up

Linux upstream kernel

Noteworthy:

FreeBSD Finally Gets Mitigated For Spectre & Meltdown

There is Meltdown mitigation for Intel CPUs via a KPTI implementation similar to Linux, the Kernel Page Table Isolation. There is also a PCID (Process Context Identifier) optimization for Intel Westmere CPUs and newer, just as was also done on Linux.

For their Spectre mitigation they are currently making use of IBRS: Indirect Branch Restricted Speculation. The IBRS feature just as with Linux requires support from the CPU microcode and is for mitigating the Variant Two vulnerability as an alternative to Retpolines.

Spectre & Meltdown Checkers
  • Linux: Stéphane Lesimple put together a simple shell script to tell if your Linux installation is vulnerable against the 3 “speculative execution” CVEs.
    • Linux: Red Hat Check Script – get the latest version from the diagnose tab of the main Red Hat vulnerability article.
    • Linux: Debian Spectre-Meltdown Checker – Spectre & Meltdown vulnerability/mitigation checker available in stretch-backports.
    • Microsoft Windows: See the Windows section in this document containing the link to the official Powershell script.
Microsoft gives sysadmins Meltdown and Spectre detection in Windows Analytics

Windows Analytics can now scan enterprise PCs running Windows 10, Windows 8.1 and Windows 7 and report on whether they’re prepped to fend off attacks based on the Meltdown and Spectre vulnerabilities.

Meltdown fix’s ‘massive overhead’ will slow Linux systems, warns Netflix engineer

Brendan Gregg describes the impact of updates to the Linux kernel that work around Meltdown as demonstrating the “largest kernel performance regressions I’ve ever seen”.

New Spectre, Meltdown variants leave victims open to side-channel attacks

MeltdownPrime and SpectrePrime, found by Princeton and NVIDIA researchers, may require significant hardware changes to be mitigated.

In Conclusion… For Now.

  • Keep in mind Meltdown was one attack…
  • But Spectre is a class of attacks, which we will be hearing about for years very likely.
  • Plan to keep patching against Spectre attacks.

Feedback

The post The Return of Spectre | TechSNAP 357 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 38 https://original.jupiterbroadcasting.net/121927/linux-action-news-38/ Sun, 28 Jan 2018 19:59:55 +0000 https://original.jupiterbroadcasting.net/?p=121927 RSS Feeds: HD Video Feed | MP3 Feed | iTunes Feed Become a supporter on Patreon: Episode Links Plasma Mobile test ISOs — 44% poll participants wanting to test Plasma Mobile on their device, and/or as a virtual machine, or on real machine. Purism aims for convergence — Upon successful completion of our funding campaign, […]

The post Linux Action News 38 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

HD Video Feed | MP3 Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

Episode Links
  • Plasma Mobile test ISOs — 44% poll participants wanting to test Plasma Mobile on their device, and/or as a virtual machine, or on real machine.
  • Purism aims for convergence — Upon successful completion of our funding campaign, we started to look for a Designer to take care of the user experience for the Librem 5, and a web developer to help us improve the look & feel (and more technical parts) of our website in general. Today, I’m glad to finally welcome them publicly!
  • Mycroft Mark 2 — What sets Mark II apart? It’s open source. This means your personal data stays private, you can customize your experience, and Mycroft is a neutral player in the voice game, allowing you to be confident in your personal preference of apps and skills.
  • Ubuntu 18.04 to revert to Xorg by default — We have decided that we will ship Xorg by default, and that Wayland will be an optional session available from the login screen.
  • Torvalds unhappy with Intel’s response to Spectre — Instead of treating Spectre as a bug, the chip maker is offering Spectre protection as a feature.
  • Are the BSDs dying? — Too few eyeballs on code is a security issue as vulnerabilities go unreported and unpatched. Can FreeBSD, OpenBSD, and NetBSD survive?

The post Linux Action News 38 first appeared on Jupiter Broadcasting.

]]>
Linus Torvalds Hates This Fix | Ask Noah 46 https://original.jupiterbroadcasting.net/121807/linus-torvalds-hates-this-fix-ask-noah-46/ Tue, 23 Jan 2018 23:14:03 +0000 https://original.jupiterbroadcasting.net/?p=121807 RSS Feeds: MP3 Feed | HD Video Feed | iTunes Feed Become a supporter on Patreon: — Show Notes: — — The Cliff Notes — Red Hat: We Didn’t Pull CPU Microcode Update To Pass the Buck Intel: Stop Patching Until Further Notice [https://www.datacenterknowledge.com/security/google-technique-offers-spectre-vulnerability-fix-no-performance-loss](Google Technique, Patch Spectre No Performance Loss) Linus Response Noah is a […]

The post Linus Torvalds Hates This Fix | Ask Noah 46 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

MP3 Feed | HD Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

— Show Notes: —

— The Cliff Notes —

— Stay In Touch —

Find all the resources for this show on the Ask Noah Dashboard

Ask Noah Dashboard

Need more help than a radio show can offer? Altispeed provides commercial IT services and they’re excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show!

Altispeed Technologies

Contact Noah

asknoah [at] jupiterbroadcasting.com

— Twitter —

The post Linus Torvalds Hates This Fix | Ask Noah 46 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 37 https://original.jupiterbroadcasting.net/121737/linux-action-news-37/ Sun, 21 Jan 2018 16:32:36 +0000 https://original.jupiterbroadcasting.net/?p=121737 RSS Feeds: HD Video Feed | MP3 Feed | iTunes Feed Become a supporter on Patreon: Episode Links Wine 3.0 Released — This includes in particular Direct3D 12 and Vulkan support, as well as OpenGL ES support to enable Direct3D on Android. Oneplus pwned — One of our systems was attacked, and a malicious script […]

The post Linux Action News 37 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

HD Video Feed | MP3 Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

Episode Links
  • Wine 3.0 Released — This includes in particular Direct3D 12 and Vulkan support, as well as OpenGL ES support to enable Direct3D on Android.
  • Oneplus pwned — One of our systems was attacked, and a malicious script was injected into the payment page code to sniff out credit card info while it was being entered.
  • ​Google moves to Debian for in-house Linux desktop — Google has officially confirmed the company is shifting its in-house Linux desktop from the Ubuntu-based Goobuntu to a new Linux distro, the DebianTesting-based gLinux.
  • Meltdown and Spectre Linux kernel status — Some “enterprise” distributions did not backport the changes for this reporting, so if you are running one of those types of kernels, go bug the vendor to fix that, you really want a unified way of knowing the state of your system.
  • Red Hat pulls microcode update — Which, er, sounds like Red Hat has given up and, to avoid any blame, has told its customers to just get whatever firmware your CPU maker is offering. And if it works, it works, and if it makes your box fall over, uh, don’t look at Red Hat.
  • Red Hat: We Didn’t Pull CPU Microcode Update — “It’s actually an encrypted, signed binary image, so we don’t have the capability, even if we wanted to produce microcode. It’s a binary blob that we cannot generate. The only people who can actually generate that are the CPU vendors.”
  • Ubuntu almost ready to patch against Spectre — This week we published candidate Ubuntu kernels providing mitigation for CVE-2017-5715 and CVE-2017-5753 (ie, Spectre / Variants 1 & 2) to their respective -proposed pockets for Ubuntu 17.10 (Artful), 16.04 LTS (Xenial), and 14.04 LTS (Trusty).  
  • Skyfall and Solace: Meltdown and Spectre are just the beginning — Skyfall and Solace are two speculative attacks based on the work highlighted by Meltdown and Spectre.
    Full details are still under embargo and will be published soon when chip manufacturers and Operating System vendors have prepared patches.
  • NHoS shut down — The small team behind an ambitious NHoS Linux project are calling it a day, citing receipt of a trademark infringement warning from the UK Department of Health’s (DoH) “brand police” as the “final straw.”

The post Linux Action News 37 first appeared on Jupiter Broadcasting.

]]>
Performance Meltdown | TechSNAP 351 https://original.jupiterbroadcasting.net/121472/performance-meltdown-techsnap-351/ Thu, 11 Jan 2018 19:58:00 +0000 https://original.jupiterbroadcasting.net/?p=121472 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: What is Meltdown and Spectre Meltdown and Spectre These vulnerabilities have been present in most computers for nearly 20 years. Both vulnerabilities exploit performance features (caching and speculative execution) common to many modern […]

The post Performance Meltdown | TechSNAP 351 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

What is Meltdown and Spectre

  • Meltdown and Spectre

  • These vulnerabilities have been present in most computers for nearly 20 years.

  • Both vulnerabilities exploit performance features (caching and speculative execution) common to many modern processors to leak data via a so-called side-channel attack.

  • What is a side channel?

From Wikipedia:

“… a side-channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information, which can be exploited to break the system.”

  • Spectre and Meltdown are side-channel attacks which deduce the contents of a memory location which should not normally be accessible by using timing to observe whether another, accessible, location is present in the cache.

  • Meltdown is a CPU vulnerability. It works by using modern processors’ out-of-order execution to read arbitrary kernel-memory location. This can include personal data and passwords. This functionality has been an important performance feature. It’s present in many modern processors, most noticeably in 2010 and later Intel processors. By breaking down the wall between user applications and operating system’s memory allocations, it can potentially be used to spy on the memory of other programs and the operating systems.

  • Spectre breaks down the barriers between different applications. You could theoretically use it to trick applications into accessing arbitrary program, but not kernel, memory locations. Spectre is harder to exploit than Meltdown, but it is also harder to mitigate, and it attacks even more chip architectures than Meltdown does. For now, there are no universal Spectre patches.

  • Meltdown And Spectre Explained

  • The timeline: How we got to Spectre and Meltdown A Timeline  

  • ‘It Can’t Be True.’ Inside the Semiconductor Industry’s Meltdown

Behind the Scenes all is not well

Meltdown and Spectre Patch Performance Hit

Protecting our Google Cloud customers from new vulnerabilities without impacting performance

With the performance characteristics uncertain, we started looking for a “moonshot”—a way to mitigate Variant 2 without hardware support. Finally, inspiration struck in the form of “Retpoline”—a novel software binary modification technique that prevents branch-target-injection, created by Paul Turner, a software engineer who is part of our Technical Infrastructure group. With Retpoline, we didn’t need to disable speculative execution or other hardware features. Instead, this solution modifies programs to ensure that execution cannot be influenced by an attacker.

What’s the fix for Meltdown and Spectre?

Checking yourself and the outlook for 2018

macOS High Sierra’s App Store System Preferences Can Be Unlocked With Any Password

A bug report submitted on Open Radar this week has revealed a security flaw in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password.

The bug, discovered by developer Lemi Ergin, lets anyone log into an admin account using the username “root” with no password. This works when attempting to access an administrator’s account on an unlocked Mac, and it also provides access at the login screen of a locked Mac.

WD My Cloud NAS devices have hard-wired backdoor

The backdoor, detailed here, lets anyone log in as user mydlinkBRionyg with the password abc12345cba.

Feedback

+ New video feed https://techsnap.systems/video

The post Performance Meltdown | TechSNAP 351 first appeared on Jupiter Broadcasting.

]]>
Most Expensive Linux Distro Ever | LINUX Unplugged 231 https://original.jupiterbroadcasting.net/121257/most-expensive-linux-distro-ever-lup-231/ Tue, 09 Jan 2018 20:32:27 +0000 https://original.jupiterbroadcasting.net/?p=121257 RSS Feeds: MP3 Feed | iTunes Feed | Video Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Pre-Show SSHTron – Tron in Your Terminal Follow Up / Catch Up ​The Linux vs Meltdown and Spectre battle continues So, where are we with fixing the problems? Work is continuing, but the latest update […]

The post Most Expensive Linux Distro Ever | LINUX Unplugged 231 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Pre-Show

Follow Up / Catch Up

​The Linux vs Meltdown and Spectre battle continues

So, where are we with fixing the problems? Work is continuing, but the latest update of the stable Linux kernel, 4.14.2, has the current patches. Some people may experience boot problems with this release, but 4.14.13 will be out in a few days.
Patches have also been added to the 4.4 and 4.9 stable kernel trees. But, as Kroah-Hartman added, “This backport is very different from the mainline version that is in 4.14 and 4.15, there are different bugs happening.” Still, he said, “Those are the minority at the moment, and should not stop you from upgrading.”

Shotcut – New Release 18.01

Here are the main fixes and enhancements in this new version:

  • Added Audio Spectrum Visualization filter.
  • Added support for font size and italics to the Text filter.
  • Added a Mask filter.
  • Another important fix for accuracy of XML time values, particularly for non-integer frame rates.

QOwnNotes changelog

Intel’s Hades Canyon NUCs with Radeon Graphics are Official: $799-$999, Shipping in Spring 2018

Unlike Skull Canyon, which has only one SKU (NUC6i7KYK) with the Core i7-6700HQ, Intel is launching Hades Canyon in two versions. The more powerful of the two is the $999 VR-ready NUC8i7HVK sporting the 100W TDP unlocked Core i7-8809G. The other SKU is the $799 NUC8i7HNK with the 65W TDP Core i7-8705G. The rest of the features are identical across the two SKUs.

TING

Scratch is now elementary Code

By rebranding to Code, it lets us focus on what we intended from the start: building a great native code editor for developers on elementary OS

You GNOME it: Windows and Apple devs get a compelling reason to turn to Linux

Ubuntu without Unity will continue to be a big story in the foreseeable future is that with Ubuntu using GNOME Shell, almost all the major distributions out there now ship primarily with GNOME, making GNOME Shell the de facto standard Linux desktop.

DigitalOcean

Next Ripple or Ethereum? Telegram to Launch Crypto Bitcoin Alternative

The “Telegram Open Network” that powers the system will be a “third generation” blockchain network, building on the work of previous cryptocurrencies to provide something groundbreaking.

The Return of Linspire?

Pay for Linspire

The Linspire distribution has had a long and mixed history. Linspire (originally named Lindows) is a commercial distribution which has changed hands a few times. Linspire started as a Debian-based project designed to offer a familiar desktop environment for Windows users. Linspire was later re-based on Ubuntu and continued its beginner-friendly mission. However, the Linspire distribution was eventually purchased by Xandros and discontinued back around 2008. At the end of 2017, PC/OpenSystems LLC announced they had purchased Linspire and its community edition, Freespire, and would resume development of these two Ubuntu-based distributions. Linspire is being sold as a commercial product which can be bundled with PC/OpenSystems computers while Freespire can be downloaded free of charge. More information can be found on the PC/OpenSystems Linspire information page.

Freespire 3.0 and Linspire 7.0 released

Linspire is a commercial release which builds on the elegant Freespire foundation. It does include a proprietary software set optimized for business users, students, researchers and developers. It is a capable solution for utilizing cloud-based web apps as well as legacy software from our Debian or Ubuntu’s repositories.

  • This Freespire 3.0 is supported until 2021. Linspire 7.0 is supported until 2025.

Linux Academy

The issue with modern Linux distributions like Debian/Ubuntu/Arch is that they distribute compiled binary packages. Typically this is good enough as compiling every single package you want from scratch is time consuming and most people ain’t got the time for that.
Although the 486 is theoretically supported by the modern Linux kernel, this is not true on the distribution and package level. For example, Debian has dropped support for older 586 32-bit CPUs as of 2016. Thus, the oldest supported x86 CPU by Debian is the 686. The 6th-generation x86 started with the Pentium Pro released in 1995 or its more commonly known variant Pentium 2 was released in 1997.
Therefore, it is no longer possible to directly use a typical modern distribution on a 486 PC. But on an atypical distribution like Gentoo which requires you to compile every package, this might still be possible.

The post Most Expensive Linux Distro Ever | LINUX Unplugged 231 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 35 https://original.jupiterbroadcasting.net/121212/linux-action-news-35/ Sun, 07 Jan 2018 23:44:11 +0000 https://original.jupiterbroadcasting.net/?p=121212 RSS Feeds: HD Video Feed | MP3 Feed | iTunes Feed Become a supporter on Patreon: Episode Links UBports release OTA 3 — This update brings some new features and bug fixes atop the Ubuntu Touch 15.04 base. New features include some new packages requested by the community, the default start page and search provider […]

The post Linux Action News 35 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

HD Video Feed | MP3 Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

Episode Links
  • UBports release OTA 3 — This update brings some new features and bug fixes atop the Ubuntu Touch 15.04 base. New features include some new packages requested by the community, the default start page and search provider was changed over to DuckDuckGo, and not displaying the keyboard when working with multiple windows. This over-the-air update has also removed the Ubuntu Store from the App Scope.
  • Ubuntu Touch working on Android app support — “Project Anbox”. Anbox – a shorted form of ‘Android-in-a-Box” – is a community effort which allows Android apps to execute in a container in a more native way rather than the more common approach of using an Android emulator,
  • LEDE and OpenWrt merge — The merged project will use the code base of the former LEDE project.
  • Fuchsia available for the Pixelbook — Fuchsia—which only started development in 2016—is Google’s third operating system after Chrome OS and Android.
  • Meltdown and Spectre — Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.
  • Law Center and Conservancy updates — Because the SFLC has amended its trademark cancellation petition with a fraud claim, the SFC’s motion to toss the complaint must be refiled after the fraud issue been considered.

The post Linux Action News 35 first appeared on Jupiter Broadcasting.

]]>