Lots of announcements, lots of reading. Note the first item listed is happening today.
- Book Fair, 23 June 2018. Michael W. Lucas is at the Scriptorium Book Fest today, in Michigan. Go if you are near and get a signed BSD book.
- Escape from System D, Episode V. Interesting cause it mentions BSD and interesting for spot-on characterization of Twitter/Hacker News feedback. (via)
- 25 years of FreeBSD. (via)
- NetBSD Summer of Code reports: libfuzzer, kernel address sanitizer, and kernel undefined behavior sanitizer.
- Valuable News 2018/06/17.
- FreeBSD Desktop, parts 1, 2, 3, 4, 5, 6, 7, 8, 9, 10. I linked to a few of the early ones before, but I want to present a complete (so far) list.
- FreeBSD 11.2-RC3 Available.
- OPNsense 18.1.10 released.
- httpd(8) Gains Simple Request Rewrites.
- SMT Disabled by Default in -current.
- More Mitigations for (potential) CPU Vulnerabilities.
- LDAP client added to -current. This, or a similar LDAP client, should be present in all BSDs.
- KDE on FreeBSD – June 2018. 5 is almost working in DragonFly, too, by the way. (via)
- itch.io Summer Sale + General itch.io Feature.
- “what’s good in openbsd superior than freebsd?“
- HardenedBSD 11-STABLE v1100055.4 Released. (via)
- “Today I stumbled upon a BSD Wikipedia page. Why should I choose BSD over a Linux based distro?“
Re: HardenedBSD since it’s mentioned above.
https://hardenedbsd.org/content/easy-feature-comparison
Linked above is an interesting comparison of all BSD security features.
Looks like HardenedBSD might be more secure than OpenBSD.
I would like to point out that any such comparison, by its very nature, will be skewed in favour of whomever has produced it – otherwise, there is simply no point in doing such a thing and one might simply point the reader towards an unbiased comparison done by an independent 3rd-party.
There are quite a few cherry-picked features from HardenedBSD, for which an exact equivalent might either not exist or a different solution is being used elsewhere. At the same time, other security enhancements and exploit mitigations have been omitted from said comparison – https://www.openbsd.org/innovations.html
Just to be clear, I have nothing against HardenedBSD – I wish FreeBSD just adopted more (all?) of the enhancements, the former project has done.