Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Latest News
    • Servers

    OpenBSD 3.2 Is Back on Track

    Written by

    Timothy Dyck
    Published November 4, 2002
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      IT staff can make almost any software system secure with enough pain and wizardry, but getting great security with hardly any effort at all is true magic.

      Thats the attraction of the Internets most secure operating system, OpenBSD. The latest release of OpenBSD, Version 3.2, started shipping Nov. 1.

      Relative to its security history, OpenBSD had a bad summer: The default installation of OpenSSH (Open Secure Shell) in OpenBSD 3.1 was found to have a remotely exploitable hole. However, this new release (which, of course, includes the fixed OpenSSH 3.5) again shows how the OpenBSD development team leads the market in terms of security.

      We get a lot of public relations from software vendors (and were not just talking about Microsoft Corp.) on how various new security efforts will turn things around for them. Fine and good, but time, and nothing else, is the true judge of success. The only evidence of a security turnaround that counts is a drop in the number of remote holes discovered in the code.

      OpenBSDs track record—one remote hole in the default install in nearly six years of market exposure—is so far ahead of everyone elses that it stands alone.

      OpenBSD does have some significant problems, including a general lack of ISV and hardware vendor backing and the short period of time (one year) that the OpenBSD development team officially supports each release of OpenBSD. In addition, the operating systems update mechanisms can be quite disruptive. Nevertheless, the development teams approach to security is so effective (and, sadly, so rare) that eWeek Labs is honoring OpenBSD 3.2 with an Analysts Choice award.

      It literally is our choice when the stakes are high: We are using seven different OpenBSD 3.2-based servers as part of the site infrastructure for eWeeks latest OpenHack security test. There is nothing better out there to get a security-sensitive system up and running. This is particularly true for those deploying firewalls and routers—OpenBSDs built-in packet filter, called pf, provides powerful traffic blocking, port forwarding and network address translation features.

      OpenBSD 3.2 can be downloaded for free, or bootable CDs can be ordered at www.openbsd.org for $40. It runs on several different families of CPUs, but it doesnt support SMP (symmetric multiprocessing). This is a major factor that keeps it out of the higher-end server space—while it can run on SMP machines, it will use only the first CPU.

      Although OpenBSD isnt an operating system that many ISVs make a point of supporting, the CD contains a fairly large set of prepackaged open-source server applications that are pre-compiled and ready to install.

      OpenBSD installs incredibly quickly—we could go from a blank drive to a functional yet secure Web server or domain name server in 10 minutes flat. The system also has a highly centralized configuration, providing a single place to turn included server packages on or off.

      In addition to making it simple to understand whats running and what isnt, OpenBSD has a security policy ingenious in its simplicity: Leave as many features as possible either disabled or uninstalled by default. Why this obvious and simple security best practice isnt more widely adopted is a mystery to us. (The Linux vendors hands are black with guilt in comparison.)

      OpenBSD 3.2 also takes greater advantage of the memory protection features built into modern CPUs to block buffer overflow attacks. It now sets program stack memory to be nonexecutable, and on SPARC and Alpha CPUs it also sets program data to be nonexecutable.

      The development team has continued to do its intensive code auditing and has been able to significantly reduce the number of executables that have the setuid bit set, effectively reducing the number of programs that need to be run with root privileges to work.

      “The impact of many security holes has been significantly reduced. We had 40 exposed setuid programs in 3.1; we now have about nine,” said OpenBSD Project Manager Theo de Raadt, in Calgary, Alberta. “Thirty-one of those 40 are not setuid any more, or the setuid is at a trivial level.”

      Its this kind of attention to detail, this systematic addressing of even minor security risks, that sets OpenBSD apart.

      However, despite all this attention to detail, one thing that OpenBSD really lacks is an easy way to maintain the great security that you get from a fresh install. The operating system has no software update tools, other than downloading another cut of the code and re-compiling the kernel and user programs. This can take 12 hours or more and is extremely disruptive to the system.

      Unfortunately, this wont change any time soon. “We dont have the manpower to take care of that. Were going to keep doing things the way we are now,” said de Raadt, who emphasized the importance of refreshing the whole system every six months or so, something thats tricky to do even with patching tools.

      “We may start making stable snapshots. We would put it out two months after the release and continue for six months. … I think anyone that considers the stable branch to have all the fixes after six months is crazy,” de Raadt said.

      OpenBSD isnt a do-it-all Unix such as Linux or Solaris, but it is a great tool for those edge-of-the-network spots where things have to be done right the first time.

      West Coast Technical Director Timothy Dyck is at [email protected].

      Executive Summary

      : OpenBSD 3.2″>

      Executive Summary: OpenBSD 3.2

      Usability

      Good

      Capability

      Good

      Performance

      Fair

      Interoperability

      Good

      Manageability

      Fair

      Scalability

      Fair

      Security

      Excellent

      Organizations that lack the hardening skills to lock down a mass-market operating system and those that use hardware firewalls will find OpenBSDs small footprint and secure-out-of-the-box approach attractive.

      COST ANALYSIS

      Purchase price is obviously not a barrier, since OpenBSD is free. The costs of the system are in maintaining it, especially when updates are released, because applying them is not a point-and-click operation. However, with hardware firewalls costing tens of thousands of dollars, OpenBSD can really save on capital expenditures.

      (+) Secure by default; built-in packet filter provides powerful firewall abilities, traffic forwarding and network address translation features; centralized configuration settings; updates issued quickly when vulnerabilities are found; large collection of prepackaged applications.

      (-) No software update agent; older versions usually are not maintained for more than one year; gets little attention from software developers or big system vendors, so software is often not tested with or supported on OpenBSD; doesnt support SMP.

      EVALUATION SHORT LIST

      • Linux
      • Firewall hardware
      • Other BSD-based operating systems
      • www.openbsd.org
      Timothy Dyck
      Timothy Dyck
      Timothy Dyck is a Senior Analyst with eWEEK Labs. He has been testing and reviewing application server, database and middleware products and technologies for eWEEK since 1996. Prior to joining eWEEK, he worked at the LAN and WAN network operations center for a large telecommunications firm, in operating systems and development tools technical marketing for a large software company and in the IT department at a government agency. He has an honors bachelors degree of mathematics in computer science from the University of Waterloo in Waterloo, Ontario, Canada, and a masters of arts degree in journalism from the University of Western Ontario in London, Ontario, Canada.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.