Still, as some may have noticed, I have been able to work on some smaller improvements within the last few months. I now have the impression that everything is in order for a release 1.7, also considering that FreeBSD 7.2 has been released this week and should make a stable base system.
Therefore, I would like to release 1.7 as soon as I have some time on my hands. I would appreciate any comments on the recent snapshots (both i386 and amd64) from May 2nd. You can get them from here, as always:
Please understand that there is no room for larger changes such as KDE 4, new features or major bugfixes (unless critical).
This is a presentation by George Dafernos at the Oekonux Conference (Manchester 2009). Some interesting statistics with regards to FreeBSD developers, releases, productivity etc etc.
Download here (PDF)
FreeBSD’s jails technology has been updated with an interesting new feature:
Add hierarchical jails. A jail may further virtualize its environment by creating a child jail, which is visible to that jail and to any parent jails. Child jails may be restricted more than their parents, but never less. Jail names reflect this hierarchy, being MIB-style dot-separated strings.
PC-BSD ships with the KDE 4 desktop. The following desktop environments can easily be installed as PBI:
Download from here
The Warden/FreeBSD Jails is one of the reasons that I use PC-BSD/FreeBSD. One possible use on the desktop would be a web application developer that wants to keep all the server programs out of the base system and possibly share access with a friend you don’t fully trust. I use The Warden for a similar role personally and I like the fact that at any point I can just stop, move or delete the jail to make the services go away.
With The Warden GUI it makes the FreeBSD jails technology more accessible to the users on the desktop and there is little reason not to use it if your setting up a server for your network. If you are a bit paranoid about security this may help you sleep at night. Overall I was impressed with the simplicity of using the software with the initial importing of the Inmate file the only issue that came up. However I would like to see a little more visual feedback in the output particularly in the creation of jails. I would be happy to recommend The Warden to other security minded friends that are starting with BSD.
Check out the howto here (theitmassive.com – 26/05/20209)
Three out of the 5 most reliable hosting companies in May used FreeBSD:
- New York Internet
- pair Networks
YippieMove has move from vmware for FreeBSD Jails as they’re more efficient:
We doubled the amount of memory per server, we quadrupled sqlite’s internal buffers, we turned off sqlite auto-vacuuming, we turned off synchronization, we added more database indexes. These things helped but not enough. We twiddled endlessly with NFS block sizes but that gave nothing. We were confused. Certainly we had expected a performance difference between running our software in a VM compared to running on the metal, but that it could be as much as 10X was a wake-up call.
At this point we realized that no amount of tweaking was likely to get our new sqlite3 version out of its performance hole. The raw performance just wasn’t there. We suspected at least part of the problem was that we were running FreeBSD guests in VMware. We checked that we were using the right network card driver (yes we were). We checked the OS version – 7.1, yep that one was supposedly the best you could get for VMware. We tuned various sysctl values according to guides we found online. Nothing helped.
Read the whole article (playingwithwire.com – 01/06/2009)
Versiera is a monitoring and management system supporting a wide range of open source and commercial platforms including Linux, FreeBSD, OpenBSD, NetBSD, OS X, Solaris and Windows.
Included in Versiera 3.0 is support for amd64 platform for FreeBSD, OpenBSD and NetBSD. Additional feature highlights are in the press release.
Thanks Frank for contacting me. If you have a (new) FreeBSD related product or service, you’re welcome to contact me and I’ll mention it on this blog.
A report by the Washington Post claims China is equipping all of its government and military PCs with a version of the Kylin operating system to make hacking attempts by foreign intelligence services more difficult. The information about the highly secure operating system was made public during a US China Economic and Security Review Commission hearing in late April. In addition to the secure operating system, the computers will also contain a special microprocessor to prevent attacks.
This security-focused and hardened Kylin is based on FreeBSD:
The Kylin (Chinese page link) operating system was developed by China’s University of Science and Technology for National Defence, and although it appears the system is claimed to be proprietary, an analysis of the code(Chinese page link) in the kernel indicates that it is in fact a hardened version of FreeBSD 5.3.
Source: H Online