Check out this nice 3D model representing all of the FreeBSD commits (via Github) throughout the year 2015. The stats are as follows:
Last week, The FreeBSD Foundation revamped their website, and introduced a new logo to reflect the current and future progress for the foundation. Head on over to their website to see the full statement.
Introducing a New Website and Logo for the Foundation
The FreeBSD Foundation is pleased to announce the debut of our new logo and website, signaling the ongoing evolution of the Foundation identity and ability to better serve the FreeBSD Project. Our new logo was designed to not only reflect the established and professional nature of our organization, but also to represent the link between the Project and the Foundation, and our commitment to community, collaboration, and the advancement of FreeBSD.
Blog by Larry the BSD guy: http://fossforce.com/2016/03/freebsd-foundation-logo-website-get-new-look/
The third release candidate of FreeBSD 10.3 has been made available. Notable changes are changes to root-on-ZFS, csh(1) and tcsh(1), sysarch bug fix, OpenSSH update, and more. See the release notes for full details.
The third Release Candidate build of the 10.3-RELEASE release cycle is now available. Installation images are available for: o amd64 GENERIC o i386 GENERIC o ia64 GENERIC o powerpc GENERIC o powerpc64 GENERIC64 o sparc64 GENERIC o armv6 BEAGLEBONE o armv6 CUBOX-HUMMINGBOARD o armv6 GUMSTIX o armv6 PANDABOARD o armv6 RPI-B o armv6 WANDBOARD Installer images and memory stick images are available here: ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.3/ The image checksums follow at the end of this e-mail. PGP-signed checksums for the images are also available at: https://www.FreeBSD.org/releases/10.3R/signatures.html If you notice problems you can report them through the Bugzilla PR system or on the -stable mailing list. If you would like to use SVN to do a source based update of an existing system, use the "releng/10.3" branch. A list of changes since 10.2-RELEASE are available on the stable/10 release notes: https://www.freebsd.org/releases/10.3R/relnotes.html Please note, the release notes page is not yet complete, and will be updated on an ongoing basis as the 10.3-RELEASE cycle progresses.
For those who have not seen it, this a recent security advisory letting users know to update to the latest stable FreeBSD.
A programming blunder involving integer signedness can be exploited by a logged-in user to crash a system. With the right parameters, you can trick the kernel into clearing too much of its heap memory with zeros via the sysarch system call, which will eventually lead to a kernel panic.II. Problem Description A special combination of sysarch(2) arguments, specify a request to uninstall a set of descriptors from the LDT. The start descriptor is cleared and the number of descriptors are provided. Due to invalid use of a signed intermediate value in the bounds checking during argument validity verification, unbound zero'ing of the process LDT and adjacent memory can be initiated from usermode. III. Impact This vulnerability could cause the kernel to panic. In addition it is possible to perform a local Denial of Service against the system by unprivileged processes.
Original article: http://www.theregister.co.uk/2016/03/18/freebsd_bug_patched/
Security Advisory: https://www.freebsd.org/security/advisories/FreeBSD-SA-16:15.sysarch.asc
The developers of FreeBSD have made available the second release candidate for version 10.3 Notable changes are ZFS bug fix, boot loader and kernel ELF, and hash(3) sync issues. See the mailing list for full release details.
The second Release Candidate build of the 10.3-RELEASE release cycle is now available. Installation images are available for: o amd64 GENERIC o i386 GENERIC o ia64 GENERIC o powerpc GENERIC o powerpc64 GENERIC64 o sparc64 GENERIC o armv6 BEAGLEBONE o armv6 CUBOX-HUMMINGBOARD o armv6 GUMSTIX o armv6 PANDABOARD o armv6 RPI-B o armv6 WANDBOARD Installer images and memory stick images are available here: ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.3/ The image checksums follow at the end of this e-mail. If you notice problems you can report them through the Bugzilla PR system or on the -stable mailing list. If you would like to use SVN to do a source based update of an existing system, use the "releng/10.3" branch. A list of changes since 10.2-RELEASE are available on the stable/10 release notes: https://www.freebsd.org/releases/10.3R/relnotes.html Please note, the release notes page is not yet complete, and will be updated on an ongoing basis as the 10.3-RELEASE cycle progresses.
Official announcement: https://lists.freebsd.org/pipermail/freebsd-stable/2016-March/084384.html
In this BSD Now episode, hosts Allan Jude and Kris Moore interview Brad Davis regarding a call-for-testing for the new “Packaging Base”. In addition, they share their experience at AsiaBSDCon. Click play below to tune in:
For this week’s roundup of BSD related content: http://www.bsdnow.tv/episodes/2016_03_16-the_toyko_debrief
If you have not seen the mailing list, the developers of FreeBSD are planning to package the FreeBSD 11 base system with pkg(8).
For those who have missed the initial email surrounding this topic, we are planning on packaging the base system with pkg(8) for 11.0-RELEASE. https://lists.freebsd.org/pipermail/freebsd-pkgbase/2016-January/000000.html At this time, I believe the major blockers and critical issues have been resolved where it is time for an official call-for-testing. Please note, as with any development branch, this is not yet intended for production environments. Testing on virtual machines or dedicated testing machines is strongly encouraged. Also note (as repeated below), running 'pkg delete -a' will implicitly remove base system packages after they are installed. To obtain the sources for testing, please use the projects/release-pkg branch: ...
See the original announcement: https://lists.freebsd.org/pipermail/freebsd-pkgbase/2016-March/000032.html
From the Italian FreeBSD Users Group, this tutorial series shows you how to get ELK stack up on FreeBSD. Elk is a combination of the open source software Elastic, Logstash, and Kibana, designed to help analyze data in real time. View the links below for the full instructions.
ELK is the new black, it seems, so let’s give it a try.
Suppose that we have a bunch of servers where a simple application ir running smoothly:operator@srv1 $ /usr/local/bin/myapp -c /usr/local/etc/myapp.cfg --log /var/log/myapp.log
I know, myapp is completely uncool (and boring), so let’s make some noise.
Suppose that we want a dashboard to inspect /var/log/myapp.log coming from all servers so basically we need:
- to search within logfiles;
- to filter per host/datetime/colour_of_my_tshirt;
- to create some nice dashboard to see how our new iMac 5k will render it.
You have basically two choices:
- convince your colleagues to help you logging on each server, learn to regexp and to dashboard ( then you’ll spend a lot of money in beer for your colleagues), or
- use an ELK stack (and buy beers only for yourself).
We will follow the second approach, because a real sysadmin doesn’t have colleagues, only enemies.
ELK stands for ElasticSearch/Logstash/Kibana because well, we will need all of them.
This tutorial by user sk shows us how to get FEMP stack [Nginx, MariaDB, PHP] set up on FreeBSD 10.2. Follow the link below for the full instructions.
In our previous tutorial, we have described how to setup FAMP stack in FreeBSD.
Now, We will show you how to install Nginx, MariaDB, and PHP (FEMP) stack in FreeBSD 10.2 server.
As you probably know, FEMP is the acronym of FreeBSD, Nginx (engine x), MariaDB/MySQL, and PHP.
For the purpose of this tutorial, I will be using the following test machine.
- Operating system: FreeBSD 10.2 64 bit system
- Hostname: freebsd.ostechnix.local
- IP Address: 192.168.1.103/24
Well, now let us start to deploy FAMP stack on FreeBSD 10.2.