FreeBSD quick news and links (08/07/2010)

I Running old binaries on -current

Did you know you can old FreeBSD binaries on recent versions? As strange as it may sound, all FreeBSD versions have an ABI compatibility with previous versions, and you can run files compiled years ago. However, there seems to be a little problem now with running 1.0 packages on Current (9.0). Should be fixed soon. (via)

II Benchmarks of FreeBSD 8.1 RC2 against FreeBSD 8.0, Ubuntu Linux 10.10

Phoronix has tested the above three operating systems and compared them. It’s maybe like comparing apples with pears, but nonetheless interesting benchmarks: Benchmarks Of FreeBSD 8.1 RC2 Against FreeBSD 8.0, Ubuntu Linux

FreeBSD 8.1 is slated to be released this month as the first significant update to FreeBSD since the rollout of the 8.0 release last November. With the second release candidate of FreeBSD 8.1 having just been made available a few days back, we have conducted a set of tests comparing the performance of FreeBSD 8.1 RC2 versus FreeBSD 8.0 and an Ubuntu 10.10 development snapshot.FreeBSD 8.1 is slated to be released this month as the first significant update to FreeBSD since the rollout of the 8.0 release last November. With the second release candidate of FreeBSD 8.1 having just been made available a few days back, we have conducted a set of tests comparing the performance of FreeBSD 8.1 RC2 versus FreeBSD 8.0 and an Ubuntu 10.10 development snapshot.

III MeetBSD 2010 Poland Pictures

The MeetBSD 2010 conference (Kracow, 2-3 July) has finished. You can read the presentation summaries and view the photos (day 1 and day 2)

IV Something More Revelant then bsdstats.org

Generally bsdstats.org is only known by BSD users (and definitely not by all of them), so even having BIG stats out there is more or less pointless.

But there is other way to ‘impress’ other people with BSD stats … http://distrowatch.com portal. It mainly focuses on Linux distributions but it also gathers stats for BSDs and OpenSolaris/Solaris ‘distributions’.

How to do this: Something More Revelant then BSDSTATS.org

V WarBSD

I came across warBSD the other day. Has anybody ever used it and if so, what is your experience. Please share in the comments below.

WarBSD was an attempt at using FreeBSD with the PicoBSD build scripts to make a *BSD based war driving kit.

Serve an anonymous shell via Tor

“While most people use Tor simply for anonymous web browsing, Tor also provides a slick way to host a service (web site, IRC chat server, etc) called a Hidden Service. These services are “hidden” because they are only accessible via the Tor network, and are under the same anonymity umbrella as Tor clients — unless they accidentally expose information about themselves, it is essentially impossible to determine the source location of the service.” continues

KDE 4.4.5 in ports

As of 29/06 KDE 4.4.5 is available in the FreeBSD ports directory. KDE 4.4.5 announcement

iXsystems hosts MeetBSD California 2010

Open source server and storage solution provider iXsystems will once again host MeetBSD California. This year, MeetBSD will be an informal 2-Day BSD Camp taking place at Hacker Dojo in Mountain View, California on November 5th and 6th.

MeetBSD California promises to be a fun and engaging plunge into the BSD operating system world, just as it was back in 2008 when the event first took place. Allen Gunn, Executive Director of Aspiration, will facilitate this year’s “unconference”, which will consist of Break Out Sessions, Informal Discussions, and 5-10 minute “Lightning Talks” on a variety of open source development topics, including ZFS, HAST, jails, OS virtualization, and sysinstall.

MeetBSD California 2010 will culminate with an after-party taking place at Hacker Dojo on the evening of Saturday, November 6th.

Whether you’re interested in learning more about the BSD family of operating systems, or ready to share some of your FreeBSD wisdom, MeetBSD California 2010 will offer an enjoyable forum for lively discussion on a wide range of BSD-related topics.

source

Minimizing downtime using NanoBSD, ZFS and jails

With more and more services and applications running on your average server, upgrading the operating system and application software becomes trickier and larger service windows are needed performing these upgrades.

Over the last four years Paul Schenkeveld (PSconsult) has searched for means and methods to keep software up to date with minimum downtime and inconvenience for users and maximum consistency. The result is a model which combines the strength of NanoBSD, ZFS and jails to build servers where application upgrades result in downtime of only a few seconds and kernel upgrades only need the time to reboot without installing in (tampering with) the running system. This system is in production now for several months on 6 to 8 servers at four different sites.

LWN.net has an article explaining Paul’s approach:

On May 6, NLUUG held its Spring Conference with the theme System Administration. There were a lot of talks about very specific tools or case studies, but one struck your author because it married conceptual simplicity with a useful goal: Minimizing service windows on servers using NanoBSD + ZFS + jails by Paul Schenkeveld. Over the last four years, Paul has searched for methods to upgrade applications on a server with minimal downtime. The system he implemented is in production now on various servers, which require only a few seconds downtime for an application upgrade and the same amount of time for a rollback if the upgrade fails.

[...]

Combining these three technologies (NanoBSD, ZFS, and jails), Paul reached his goal of setting up a FreeBSD server that can be upgraded with minimal downtime. All user-visible applications run in jails. Underneath the jails, a minimal FreeBSD operating system runs, built using the NanoBSD script. This holds the kernel, some low-level services, and the tools for building a new system image for upgrading the operating system. The NanoBSD system image can be put on a partition of a regular disk drive, but Paul prefers to put it on a separate flash drive, because NanoBSD is specifically designed for it and using a separate drive for the operating system makes it easier for the system administrator when the hard drives with the jails fail.

Read the whole article:
NLUUG: Minimizing downtime on servers using NanoBSD, ZFS, and jails

Paul presented the above also in Tokio at AsiaBSDCon 2010:


Minimizing service windows on servers using NanoBSD + ZFS + jails


Paul Schenkeveld: Minimizing service windows on servers using NanoBSD + ZFS + jails

AsiaBSDCon 2010 paper session.

Abstract:

With more and more services and applications running on your average server, upgrading the operating system and application software becomes trickier and larger service windows are needed performing these upgrades.

Over the last four years the author has searched for means and methods to keep software up to date with minimum downtime and inconvenience for users and maximum consistency. The result is a model which combines the strength of NanoBSD, ZFS and jails to build servers where application upgrades result in downtime of only a few seconds and kernel upgrades only need the time to reboot without installing in (tampering with) the running system. This system is in production now for several months on about 10 servers at five different sites.

Hardware Performance Monitoring Counters (video)


George Neville-Neil: Hardware Performance Monitoring Counters on non-X86 Architectures

AsiaBSDCon 2010 paper session.

Abstract:

Hardware Performance Monitoring Counters provide programmers and systems integrators with the ability to gather accurate, low level, information about the performance of their code, both at the user and kernel levels. Until recently these counters were only available on Intel and AMD chips but they have now been made available on alternate, embedded, architectures such as MIPS and ARM.

This paper discusses the motivation, design and implementation of counters using the hwpmc(4) driver in the FreeBSD operating system with an eye towards easing future porting efforts.

BSD in the routing industry (video)


Massimiliano Stucchi: BSD in the routing industry

AsiaBSDCon 2010 paper session.

Abstract:

The BSD family has always been very well known for its robust network stack, hence it has been widely used in many different fields and applications. In the ISP market, though, the situation is totally different, and solutions employing *BSD operating systems are often discarded in favour of proprietary solutions.

In this talk we will discuss the different possibilities offered by the BSD operating systems family in terms of networking tools and practices, compared to proprietary solutions offered by companies such as Cisco and Juniper, detailing the differences between them and highlighting the major points and drawbacks of each of them, up to a cost comparison in real field applications.

Real field applications will be introduced via explanation of the solutions created using BSD-based routing software in the real industry running in two different environments, an ISP spanning Europe and another one offering WISP services.

We will also delve into the experience in running a FreeBSD-/OpenBSD- and OpenBGPd-based route server at MINAP, the MIlanNeutralAccessPoint, describing success stories and guiding the audience into a comparison with the other route servers running at the same IX, powered by Linux and Bird/Quagga.

Quiet Computing with BSD (video)


Constantine A. Murenin: Quiet Computing with BSD

AsiaBSDCon 2010 paper session.

Abstract:

Quiet Computing with BSD (Programming system hardware monitors for quiet computing)

In this talk, we will present an overview of the features and common problems of microprocessor system hardware monitors as they relate to the topic of silent computing. In a nutshell, the topic of programmable fan control will be explored. A live demonstration of the fan-controlling prototype might be possible.

Silent computing is an important subject as its practice reduces the amount of unnecessary stress and improves the motivation of the workforce, at home and in the office.

Attendees will gain knowledge on how to effectively programme the chips to minimise fan noise without impeding reliability or causing any system failures, as well as some basic principles regarding the practice of quiet computing.

A patch for programming the most popular chips (like those from Winbond) is already publicly available for the OpenBSD operating system, although the talk itself will be more specific to the microprocessor system hardware monitors themselves, as opposed to any specific interfacing with thereof in modern operating systems like OpenBSD, NetBSD, DragonFly BSD and FreeBSD.

Wireless Mesh Networks under FreeBSD (video)


Rui Paulo: Wireless Mesh Networks under FreeBSD

AsiaBSDCon 2010 paper session.

Abstract:

With the advent of low cost wireless chipsets, wireless mesh networks became much more attractive for both companies, governments, and the general consumer. Wireless mesh networks are being used extensively since the popularization of the 802.11 wireless technologies, but usually they worked with the help of layer 3 routing technologies.

Since 802.11 didn’t provide any kind of support for wireless mesh networks, in 2004, IEEE created the Task Group s (TGs) to develop a new amendment to 802.11 which would define the operation of a wireless mesh network using existing 802.11 hardware and having a routing protocol work at layer 2. Later, the amendment also included provisions for mesh authentication, encryption, link management, bridging mesh networks with other types of networks, and channel reservation.

This paper will talk about the FreeBSD implementation of 802.11s that’s available in version 8.0 and beyond. This work was sponsored by The FreeBSD Foundation.