OpenBSD 7.5 released
https://marc.info/?l=openbsd-announce&m=171228270018970&w=2 [marc.info]
2024-04-12 22:42
tag: openbsd
OpenBSD 7.5 released
https://marc.info/?l=openbsd-announce&m=171228270018970&w=2 [marc.info]
2024-04-12 22:42
Synthetic Memory Protections - An update on ROP mitigations
https://www.openbsd.org/papers/csw2023.pdf [www.openbsd.org]
2023-03-25 19:35
ROP methods have become increasingly sophisticated
But we can identify system behaviours which only ROP code requires
We can contrast this to what Regular Control Flow code needs
And then, find behaviours to block
source: HN
Discovering one bug after another in the UTF-8 decoding logic in OpenBSD, then going on to fix other aspects of related code.
https://research.exoticsilicon.com/articles/unbreaking_utf8_on_the_console [research.exoticsilicon.com]
2023-03-10 20:32
Still, the debugging process we went through here to discover the cause of the problems in the first place is worth sharing from the beginning, as the code in question was particularly bad with plenty of textbook mistakes. Who knows what you might find in your own investigations elsewhere.
Email: https://marc.info/?l=openbsd-tech&m=167734639712745&w=2
source: L
double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
https://marc.info/?l=oss-security&m=167628974320957&w=2 [marc.info]
2023-02-16 20:18
Exploiting this vulnerability will not be easy: modern memory allocators provide protections against double frees, and the impacted sshd process is unprivileged and heavily sandboxed.
Quick update: we were able to gain arbitrary control of the “rip” register through this bug (i.e., we can jump wherever we want in sshd’s address space) on an unpatched installation of OpenBSD 7.2 (which runs OpenSSH 9.1 by default). This is by no means the end of the story: this was only step 1, bypass the malloc and double-free protections.
source: L
Modernizing the OpenBSD console
https://www.cambus.net/modernizing-the-openbsd-console/ [www.cambus.net]
2020-08-31 23:59
At the beginning were text mode consoles. Traditionally, *BSD and Linux on i386 and amd64 used text mode consoles which by default provided 25 rows of 80 columns, the “80x25 mode”. This mode uses a 8x16 font stored in the VGA BIOS (which can be slightly different across vendors).
source: L
Installation images renamed from .fs to .img
http://undeadly.org/cgi?action=article;sid=20200520093232 [undeadly.org]
2020-05-21 04:04
There are some UEFI direct-from-internet bootloaders that require the name *.img. So this makes things more convenient for those, while keeping it consistant in all architectures.
OpenBSD 6.7
https://www.openbsd.org/67.html [www.openbsd.org]
2020-05-19 18:10
Removed the dpt(4) driver for DPT EATA SCSI RAID.
OpenBSD on the Microsoft Surface Go 2
https://jcs.org/2020/05/15/surface_go2 [jcs.org]
2020-05-15 14:51
I used OpenBSD on the original Surface Go back in 2018 and many things worked with the big exception of the internal Atheros WiFi. This meant I had to keep it tethered to a USB-C dock for Ethernet or use a small USB-A WiFi dongle plugged into a less-than-small USB-A-to-USB-C adapter. Microsoft has switched to Intel WiFi chips on their recent Surface devices, making the Surface Go 2 slightly more compatible with OpenBSD.
source: L
OpenBSD's 'spinning' CPU time category
https://utcc.utoronto.ca/~cks/space/blog/unix/OpenBSDCpuSpinTime [utcc.utoronto.ca]
2020-03-27 22:03
Since this dates from early 2018, I believe it’s in everything from OpenBSD 6.4 onward. It’s definitely in OpenBSD 6.6. This new CPU time category is supported in OpenBSD’s versions of top and systat, but it is not explicitly broken out by vmstat; in fact vmstat’s ‘sy’ time is actually the sum of OpenBSD ‘system’, ‘interrupt’, and ‘spinning’. Third party tools may or may not have been updated to add this new category.
oxbar - configurable X11 status bar for OpenBSD
https://github.com/ryanflannery/oxbar [github.com]
2020-03-24 02:59
oxbar is a X11 status bar for OpenBSD showing various system stats. It has a configurable display and works out-of-the-box on most modern window managers in an intuitive fashion. oxbar supports FreeType font rendering and styling, true transparency & alpha blending on all UI components (including the root window), and a simple configuration format that can concisely support multiple themes.
source: vermaden
My infrastructure as of 2019
https://chown.me/blog/infrastructure-2019.html [chown.me]
2020-03-24 02:58
The goal for my infrastructure is to run the services I need. While a lot of people in the homelab community experiment and play with software for its own sake, I actively use the stuff I host. When I stop, I kill the service (though I’m not as proficient at this as Google). These are my production systems, and when one of them is down, I do miss it.
source: vermaden
OpenSMTPD advisory dissected
https://poolp.org/posts/2020-01-30/opensmtpd-advisory-dissected/ [poolp.org]
2020-01-31 21:13
Qualys contacted by e-mail to tell me they found a vulnerability in OpenSMTPD and would send me the encrypted draft for advisory. Receiving this kind of e-mail when working on a daemon that can’t revoke completely privileges is not a thing you want to read, particularly when you know how efficient they are at spotting a small bug and leveraging into a full-fledged clusterfuck.
Legacy code bad, even when it’s freshly written legacy code.
OpenBSD on DigitalOcean
https://www.going-flying.com/blog/openbsd-on-digitalocean.html [www.going-flying.com]
2020-01-05 07:35
They are both sort of old at this point and with OpenBSD 6.6 out I ran into a bit of a snag. The default these days is to use a GPT partition table to enable EFI booting. This is generally pretty sane but it looks to me like the FreeBSD droplet doesn’t support this. After the installer rebooted the VM failed to boot, being unable to find the bootloader.
Thankfully DigitalOcean has a recovery ISO that you can boot by simply switching to it and powering off and then on your Droplet.
dd miniroot over FreeBSD, reboot, lemonade!
e2k19 Hackathon Report: Stefan Sperling on GoT and wireless
https://undeadly.org/cgi?action=article;sid=20191219205600 [undeadly.org]
2019-12-20 03:51
absolutely lovely!
OpenSSH Key Shielding
https://xorhash.gitlab.io/xhblog/0010.html [xorhash.gitlab.io]
2019-12-18 13:48
On June 21, 2019, support for SSH key shielding was introduced into the OpenBSD tree, from which the OpenSSH releases are derived. SSH key shielding is a measure intended to protect private keys in RAM against attacks that abuse bugs in speculative execution that current CPUs exhibit. This functionality has been part of OpenSSH since the 8.1 release. SSH private keys are now being held in memory in a shielded form; keys are only unshielded when they are used and re‐shielded as soon as they are no longer in active use. When a key is shielded, it is encrypted in memory with AES‐256‐CTR; this is how it works:
source: L
Local Privilege Escalation in OpenBSD's dynamic loader (CVE-2019-19726)
https://marc.info/?l=oss-security&m=157609898721656&w=2 [marc.info]
2019-12-11 23:22
1a/ we set the LD_LIBRARY_PATH environment variable to one single dot (the current working directory) and approximately ARG_MAX colons (the maximum number of bytes for the argument and environment list); as described in man ld.so:
1b/ we set the RLIMIT_DATA resource limit to ARG_MAX * sizeof(char *) (2MB on amd64, 1MB on i386); as described in man setrlimit:
Authentication vulnerabilities in OpenBSD
https://www.qualys.com/2019/12/04/cve-2019-19521/authentication-vulnerabilities-openbsd.txt [www.qualys.com]
2019-12-04 20:08
We discovered an authentication-bypass vulnerability in OpenBSD’s authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis. For example, sshd is not exploitable thanks to its defense-in-depth mechanisms.
OpenBSD in 2019
https://blog.habets.se/2019/10/OpenBSD-in-2019.html [blog.habets.se]
2019-11-19 03:40
I’ve used OpenBSD on and off since 2.1. More back then than in the last 10 years or so though, so I thought I’d try it again.
Some good, some bad.
source: vermaden
OpenBSD on Google Compute Engine
https://www.findelabs.com/post/openbsd-on-gce/ [www.findelabs.com]
2019-11-05 04:39
This tutorial outlines a simple way to get OpenBSD working on GCE, utilizing only OpenBSD to create the image and send up into gcloud.
source: vermaden
U2F support in OpenSSH
https://marc.info/?l=openssh-unix-dev&m=157259802529972&w=2 [marc.info]
2019-11-03 20:26
As of this morning, OpenSSH now has experimental U2F/FIDO support, with U2F being added as a new key type “sk-ecdsa-sha2-nistp256@openssh.com” or “ecdsa-sk” for short (the “sk” stands for “security key“).
Also: https://marc.info/?l=openbsd-tech&m=157376801917387&w=2