Warner Losh from iXsystems announced the availability of a FreeNAS 8 alpha build today.
The iXsystems engineering team has moderized FreeNAS in a number of ways. We wanted a platform that was more extensible than the current m0m0wall-based framework allowed. We wanted to create a platform that could be expandable by modules (possibly not even written by us). We wanted to make it easier to upgrade the base FreeBSD release, as well as leverage more base FreeBSD technology that has been integrated into the system since FreeNAS was originally developed.
We’ve migrated the build to be NanoBSD based. This allows us to leverage the embedded work that has gone into NanoBSD. It also allows us to push some of the features that are important to FreeNAS back into the base FreeBSD distribution. NanoBSD gives us the flexibility that we need. Since we’re using the FreeBSD package system to add ports and packages, users will be able to add their own packages (we’ll likely expand the basics to use the PBI’s that PC-BSD produces for ease of installation). We’re using the normal rc.d system, so upgrading is easier as well. etc
It has taken some time to come to these builds but iXsystems has been working hard to move FreeNAS from a m0n0wall base to a nanoBSD base. This will upgrading the underlying FreeBSD base system go smoother, and the new design makes development of plugins easier. Imagine FreeNAS with the ability to import PBI plugins and updates. That would be cool.
Olivier as put some screenshots on the FreeNAS blog, including some hints on how to set the the disk(s) and services.
FreeNAS is an embedded open source NAS (Network-Attached Storage) distribution based on FreeBSD, supporting the following protocols: CIFS (samba), FTP, NFS, TFTP, AFP, RSYNC, Unison, iSCSI (initiator and target) and UPnP. It supports Software RAID (0,1,5), ZFS, disk encryption, S.M.A.R.T/email monitoring with a WEB configuration interface
Up to date, Step by Step, How-To, Instructional Guide to Installing FreeBSD from scratch, Specifically written with background information covering the why and how the different components are used together to create a home or small enterprise network for the new-be and inexperienced FreeBSD computer hobbyist. Not a General reference type of document, but a true learning aid containing details unique to the stable version of FreeBSD your installing: a1poweruser.com
The history of Unix on the PC: Exploring lesser-known variants
“When someone discusses the Unix operating system on a PC, many modern computer users think of Linux, a Unix work-alike first released by Linus Torvalds in 1991. Linux is a relative newcomer to the field; Unix and Unix-like operating systems have been released for Intel x86-based systems as far back as 1979. This article covers some lesser-known Unix variants for IBM PC-compatible systems, both those that survive today and the ones that were not long-lived or commercially successful:
The Bordeaux Technology Group released Bordeaux 2.0.8 for FreeBSD and PC-BSD today. Bordeaux 2.0.8 is a maintenance release that fixes a number of small bugs. With this release firefox and winetricks have been updated
Bordeaux 2.0.8 was built on FreeBSD 8, PC-BSD 8 and PC-BSD 7.1 A .sh installer is provided for FreeBSD and a .pbi installer for PC-BSD
Depending on sales, Bordeaux Software plans to add Pulse Audio to the next major BSD release. So if you would like to have Pulse Audio in Wine on FreeBSD and PC-BSD make a purchase. Help spread the word!
linuxbsdos has a fairly positive review of PC-BSD 8.1, though there is still room for improvement:
“PC-BSD 8.1 was released on July 20, 2010, roughly five months after version 8.0 was released. Some of the suggestions made in the review of PC-BSD 8.0 have been carried out in this latest release. In fact, the changes were made within one month of that review being published. It is an encouraging example of how some distro developers respond to suggestions (or critical reviews).
While I still think that PC-BSD is not yet ready for the masses, it is coming along very well. This review will offer another detailed look at some of the good and bad sides of this FreeBSD-based distribution, with the attendant recommendations and suggestions for improvement.
Let me begin by looking at the bright side of this distribution…. ”
Yesterday, iXsystems upload a snapshot of their new FreeNAS release on the SVN.
The new FreeNAS is based on nanoBSD, then here are all the steps for generate the disk image of this release (from a FreeBSD 8.1 amd64).
Remember, this build is for developers and testing purposes only, as this snapshot is not functionally complete yet, and there are likely many rough edges, bugs and problems.
To run and test this build, the instructions can be found in the readme file.
BSD-Day@2010 will be held at Eötvös Loránd University, Budapest, Hungary on 20 November 2010.
The purpose of this one-day event is to gather Central European developers of today’s open-source BSD systems, popularize their work, and provide a real-life communication interface between developers and users. There are no formalities, no papers, and no registration or participation fee, however the invited developers are encouraged to give a talk on their favorite BSD-related topic. The goal is to motivate potential future developers and users, especially undergraduate university students to work with BSD systems.
For those interested in open source firewalls, there will be a pfSense tuturial at EuroBSDCon 2010.
pfSense is a free, open source customized distribution of FreeBSD tailored for use as a firewall and router. In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution.
MeetBSD 2010 (California)
Registration is now open for MeetBSD 2010 (Mountain View, California, 5-6 November): www.meetbsd.com
Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs, providing new kernel primitives (sandboxed capability mode and capabilities) and a userspace sandbox API. These tools support compartmentalisation of monolithic UNIX applications into logical applications, an increasingly common goal supported poorly by discretionary and mandatory access control. We demonstrate our approach by adapting core FreeBSD utilities and Google’s Chromium web browser to use Capsicum primitives, and compare the complexity and robustness of Capsicum with other sandboxing techniques.
Dru Lavigne has joined the PC-BSD team this month. The first thing she did, was setting up another blog: the PC-BSD Blog. She already posts BSD related posts on it.toolbox.com: A year in the life of a BSD guru.
As for the goal for AboutBSD, I want to turn it into a planet website that aggregates how BSD system admins use BSD. So that new users or system admins can learn that BSD is flexible, powerful, and provides all the freedom one needs to deploy services on BSD.
I would have no hesitation in recommending PC-BSD for desktop use. It has definitely been the best install experience for a desktop system I have had. It seems exactly tailored for someone like me, a developer in an office where we have tried to be operating-system-neutral as much as possible: most of our programmers do run PCs but we have weaned ourselves off any PC-only applications long ago (apart from specialist applications). As I mentioned in the previous blog, it is a smooth and pretty OS, and feels solid.
As announced before, ZFS v15 was successfuly imported into FreeBSD! For a time there was an option of importing just v15 or proceeding directly to v16 but the community has decided to first import the older version for reasons of stability and compatibility with Solaris 10 Update 8. (via)
Millions of home routers at risk.
According to new research delivered today here at the Black Hat security conference, millions of home routers may have a serious security flaw.
In his presentation at Black Hat, security researcher Craig Heffner detailed how an external attacker could gain full control of a user’s router and use that to gain access to the internal local area network (LAN). Though the implications are ominous, Heffner, also detailed a variety of steps users can take to protect themselves.
Foremay has introduced a 1TB 2.5? SATA solid-state drive alongside the industry-leading 2TB 3.5? SATA SSD, as the company expects to see an increased demand in SSD products for the enterprise.
The EC188 M-series model-V includes 200 MB/s read/write speeds, and can be used in the enterprise and workstation PCs.
Ideally, enterprise users will be able to utilize the EC188 M-series model-V, as it includes support for Microsoft Windows, Mac, several versions of Linux, OpenSolaris, Solaris, FreeBSD, HP-UX, Unix, and other operating systems…. Continues
Stopping SSH Brute Force attacks with PF on FreeBSD
Most people know that port 22 is used for SSH communication and due to this common knowledge, you get people using scripts to test for weak passwords. If you look into your /var/log/auth.log and you see tons of fails/errors from users not on your system or from invalid passwords for root, it means you have people trying to break into your system. Truthfully, anyone that puts a system online with port 22 open will see this happen to them. It’s quite common and not direct attack against you, just scripts looking for IPs with port 22 open.
Now it goes without saying that you should make sure you have a strong password that take use of numbers, upper and low case letters and symbols. Doing this will go along way in preventing someone from breaking into your system. You should also ensure that people can’t remotely log in as root by making sure that you have ‘PermitRootLogin’ set to ‘no’ in your /etc/ssh/sshd_config file. This will ensure that no mater how many passwords they try for root they will never be able to log in.
Now you could just set your SSH server to run on a different port or have your firewall redirect a different port from the outside to the system, but what’s the fun in that when you can use a great tool like PF.
I have just bought a copy of Bordeaux for PC-BSD/FreeBSD to support Tom and his team. They’re doing a great job building a bridge between *nix and the Windows world. Most of use still need/want to use some Windows programs Linux/PC-BSD/FreeBSD. If you’re interested, be quick as there’s a 50% off sale on. A copy costs only $10.
The Bordeaux Technology Group is a software services and development company specializing in Windows compatibility software. Users of Linux systems from time to time find themselves in the need to run specialized Windows software. The Bordeaux suite enables access to these programs and data in a seamless and low cost manner without requiring licensing of Microsoft Technology.