I didn’t see any public notes on this, so I decided to post it:
Google’s Compute Engine SDK installs and runs just fine on OpenBSD. Exactly as per the documentation. Which is what I’d expect, but it’s nice to confirm it.
Have a good weekend!
Marginally nefarious crime writer. Many of those crimes involve computers.
I didn’t see any public notes on this, so I decided to post it:
Google’s Compute Engine SDK installs and runs just fine on OpenBSD. Exactly as per the documentation. Which is what I’d expect, but it’s nice to confirm it.
Have a good weekend!
My Ansible host is OpenBSD. Because if I’m going to have a host that can manage my network, it needs to be ridiculously secure. The OpenBSD host runs on KVM (through the SolusVM virtualization management system).
During heavy data transfers, the network card would occasionally stop passing traffic. I could run any Ansible command without issue, but downloading an ISO caused hangs. This was most obvious during upgrades. Downloads would stall. I could restart them with ^Z, then a “ifconfig vio0 down && ifconfig vio0 up && fg” but this still isn’t desirable.
The vio(4) man page includes the following text:
Setting flags to 0x02 disables the RingEventIndex feature. This can be tried as a workaround for possible bugs in host implementations or vio at the cost of slightly reduced performance.
(Thanks to Philip Guenther for pointing that out. I would kind of expect this to have been in the BUGS section, or maybe say “Try this if you have weird problems,” but at least the info is there.)
So: download the new bsd.rd kernel, set the flag, and try to upgrade.
#config -ef /bsd.rd
OpenBSD 5.5-current (RAMDISK_CD) #147: Wed May 28 13:56:39 MDT 2014
deraadt@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/RAMDISK_CD
Enter 'help' for information
ukc> find vio
146 vio* at virtio* flags 0x0
ukc> change 146
146 vio* at virtio* flags 0x0
change [n] y
flags [0] ? 2
146 vio* changed
146 vio* at virtio* flags 0x2
ukc> quit
Saving modified kernel.
The upgrade now runs flawlessly, and I can no longer reproduce the hangs.
Be sure to repeat this on the new kernel.
On Tuesday 27 May 2014, at 1pm EDT, I’ll be doing a live webcast on the O’Reilly community site.
The topic is “Beyond Security: Getting to Know OpenBSD’s Real Purpose.”
Anyone who has seen my mug.org talk already has an idea what angle I’ll take. Some of the slides will differ, and I’ll have some LibreSSL stuff in there as well.
I’ll take questions from the audience afterwards. You can be in that audience.
Thanks to various airline problems, we had an open spot on the BSDCan schedule. Bob Beck filled in at the last moment with a talk on the first thirty days of LibreSSL. Here are some rough notes on Bob’s talk (slides now available).
LibreSSL forked from OpenSSL 1.0.1g.
Why did “we” let OpenSSL happen? Nobody looked. Or nobody admitted that they looked. We all did it. The code was too horrible to look at. This isn’t just an OpenSSL thing, or just an open source thing. It’s not unique in software development, it’s just the high profile one of the moment.
Heartbleed was not the final straw that caused the LibreSSL fork. The OpenSSL malloc replacement layer was the final straw. Default OpenSSL never frees memory, so tools can’t spot bugs. It uses LIFO recycling, so you can use after free. The debugging malloc sends all memory information to a log. Lots more in Bob’s slides, but this all combined into an exploit mitigation technique countermeasure. Valgrind, Coverity, and OpenBSD’s randomized memory tools don’t catch this.
Someone discovered all this this four years ago and opened an OpenSSL bug. It’s still sitting there.
LibreSSL started by ripping out features. VMS support, 16-bit Windows support, all gone.
LibreSSL goals:
As an example, how does OpenSSH (not LibreSSL, but another OpenBSD product) do portable?
How does OpenSSL do portable?
The result? “Chthulhu sits in his house in #define OPENSSL_VMS and dreams”
Removed scads of debugging malloc and other nasties.
What upstream packages call and use them? No way to tell. LibreSSL makes some of the very dangerous options no-ops. Turn on memory debugging? Replace malloc wrappers at runtime? These do nothing. The library internally does not use them.
Some necessary changes that were implemented in massive sweeps:
OpenSSL used EGD for entropy, and faked random data. OpenSSL gathered entropy from the following sources:
In LibreSSL, entropy is the responsibility of the OS. If your OS cannot provide you with entropy, LibreSSL will not fake it.
LibreSSL is being reformatted into KNF – the OpenBSD code style. OpenSSL uses whatever style seemed right at the moment. The reformatting makes other problems visible, which is the point. More readable code hopefully means more developer involvement.
The OpenSSL bug tracking RT has been and continues to be a valuable resource.
OpenSSL exposes just about everything via public header files. Lots of the API should probably not be used outside of the library, but who knows who calls what? OpenBSD is finding out through constant integration testing with their ports tree.
The LibreSSL team wants to put the API on a diet so that they can remove potentially dangerous stuff. Their guys are being careful in this by testing against the OpenBSD ports tree. Yes, this conflicts with the “drop-in replacement” goal.
Internally, LibreSSL uses only regular intrinsic functions provided by libc. OpenSSL’s custom APIs remain for now only to maintain compatibility with external apps.
Surprises LibreSSL guys in OpenSSL:
So far:
LibreSSL has added the following cipher suites under acceptable licenses – Brainpool, ChaCha, poly1305, ANSSI FRP256v1, and several new ciphers based on the above.
FIPS mode is gone. It is very intrusive. In other places governments mandate use of certain ciphers (Cameilla, GOST, etc). As long as they’re not on by default, and are provided as clean implementations under an acceptable license they will include them. They believe it’s better people who must use these use them in a sane library with a sane API than rolling their own.
If you want to use the forthcoming portable LibreSSL, you need:
You can’t replace explicit_bzero with bzero, or arc4random with random. LibreSSL wants a portability team that understands how to make it work correctly.
LibreSSL’s eventual goals:
There’s lots of challenges to this. The biggest is stable funding.
The OpenBSD Foundation wants to fund several developers to rewrite key pieces of code. They want to sponsor efforts of the portability team, and the ports people track the impact of proposed API changes.
They will not do this at the expense of OpenSSH or OpenBSD.
The OpenBSD Foundation has asked the Linux Foundation for support, but the Linux Foundation has not yet committed to supporting the effort. (I previously said that they hadn’t responded to the request, which is different. The LF has received Bob’s email and discussions are ongoing.)
In Summary:
If you’re interested in supporting the effort, contact the OpenBSD Foundation. The Foundation is run by Bob Beck and Ken Westerback, and they manage all funding. (While Theo de Raadt leads the OpenBSD Project, he actually has nothing to do with allocating funding.)
Karl Lehenbauer, CTO of FlightAware, is giving an excellent BSDCan keynote: a retrospective of his BSD experience. As part of the mass of flight troubles plaguing North America this week, his flight to Ottawa was cancelled. He landed in Toronto at midnight last night.
I wouldn’t have blamed him for canceling the keynote.
Instead, he rented a car and drove to Ottawa. Overnight. After a bad day of travel. That’s about a four-hour drive.
Lehenbauer is clearly a man who keeps his promises.
Plus, he speaks very well despite not sleeping. Or maybe because he didn’t sleep. Whatever, he’s good.
The ports and packages summit was a lot more discussion of options as opposed to the state of items and future plans. A very dynamic session, where each of the dozen or so scheduled speakers was more “moderator of the moment.” Plus, I staggered in half an hour late, because breakfast was really really good.
But, in general, what happened:
I walked in on an overview of Debian packages. It’s always good to assess others’ work.
Discussions on dependencies.
Ed Maste on possibly using certificate transparency via X.509v3 extension, rather than creating our own signing infrastructure.
Using qemu BSD user mode for cross-building packages. Qemu still needs some work, and you can pitch in.
bapt: want to control what scripts can do, so arbitrary scripts can’t harm system. Have the system provide a utility that will let programs check config files or update a database, rather than run arbitrary scripts. Would also help with cross-building packages.
Cross-building is improving. Now nightly ARM crossbuild packages in test. Hopefully ready by EuroBSDCon.
PortCI: project for build cluster automation. Various port building processes are manual, such as testing and QAT. PortCI lets you manage these queues easily via a simple front end. The idea is to eventually let commiters request and configure their own experimental runs.
Jenkins – https://jenkins.freebsd.org. Uses bhyve VMs. Testing ports on all platforms.
Do not use freebsd-version(1) in the ports tree. Designed only for use in the base system. Security fixes that don’t touch the kernel won’t affect uname -r, and freebsd-version doesn’t apply to releases built from source. Ports tree needs something to say exactly what version you have no matter which how that version was produced.
Discussion on handling port licenses.
Packaging base! pkg doesn’t handle chflags yet, but they’re working on it. Split packages per build system option. But this changes how some programs are linked–what about NIS? Bapt is pondering that. We could offer multiple versions of packages, such as NIS-free. But FreeBSD’s “build system is not a paragon of configurability, but a bunch of hacks on what annoyed people the most” (Warner Losh).
I’m teaching in less than an hour, so I left the discussion here.
Some notes from the FreeBSD virtualization devsummit. Very rough, but my understanding is very rough, so all is as it should be.
Bhyve moving to UEFI loader away from FreeBSD and grub2
• Fork of intel EDKII (BSD License), OVMF build target
• For bhyve instead of Qemu
• Includes CSM BIOS emulation for non-EFI aware OS’s
• Currently in-house, being moved to public git repo
• Buildable on FreeBSD (GCC 4.6 or later), needs to be a port – bhyve folks need port creation help
• Serial console only: working on VGA emulation with VNC client
Networking:
• Virtio doesn’t support modern networking features
• One NIC, e1000 ((multiq, jumbo frames, TSO) under way
• e1000e (82580) dev emulation in progress
• each has thousands of registers, still working on them
Considering:
• user mode using WANProxy/libuinet
• simple kernel eth switch
Storage
• zvol GEOM-avoidance in place (mav@) – prevent geom from sniffing ZFS partition tables, so host will never see VM filesystem
• virtio todo: asynch block writes, add virtio SCSI
• Wanted: BSD-licensed sparse image tools for working with vmdk, qcow2, vhd, etc. Would be nice to point bhyve at a VMDK file and so “go!”
Future
• AMD-SVM
• Windows guest support (requires UEFI)
• Illumos doesn’t need UEFI, needs a real BIOS – use BIOS compat in UEFI
• ARM(64) chips have virtualization support, get bhyve to work on it.
• Save state/restore/migrate
• configuration file, as the command line is unwieldy for hierarchical info – use UCL because the ports people also use UCL
• Regression suite – bhyve supports lots of different hardware and operating systems, so we need to have automated testing
Other virtualization
• Virtualbox – FreeBSD is tracking very closely, 4.3.10 came out 25 March, port updated on 28 March.
• HyperV – 10.0, amd64 and i386 guest support
o Recent Azure image announcement
o Nobody in the FreeBSD community tracks Hyper-V, it could use a nanny
Luigi Rizzo on performance with device drivers
• One option – e1000 emulation, performance will be poor, will be slow
• Some emulation drivers fake TSO, etc
• No good solutions outside paravirtualization
• High performance = modify guest device driver to be virtualization-aware
• Luigi got 17GB/s using netmap with bhyve
Roger Pau Monne’ on Xen
• Changes in FreeBSD 10
o Vector callback for injecting event channel interrupts
o PV timer
o PV IPIs
o Add Xen support into GENERIC – can now use freebsd-update
o Sponsored by SpectraLogic and Citrix
• PVH domU
o Supported guest mode since 4.4
o Builds atop of the PVHVM work introduced in FreeBSD 10
o Half-merged into –current, some work remains
o Same speed as PVHVM, main difference is way it boots
o Not as intrusive as a traditional PV port
• PVM Dom0
o Xen side patches almost fully merged
o Main difference between PVH DomU and Dom0 is that on Dom0 FreeBSD needs to manage the hardware
o Add support for PIRQ (physical interrupts routed atop event channels)
o ACPI tables parsed by Dom0, and Xen must be made aware of the underlying devices
o Xen user-space control devices needed by the toolstack:
Privcmd – allows issuing hypercalls into Xen and mapping foreign domain memory from userspace
Evtchn – allows registering and receiving interrupts by user-space applications
• Big items remaining
o Add multiboot support to the FreeBSD bootloader – right now, you must use pxelinux or grub
o Improve if.xn – doesn’t work correctly with a NetBSD dom0, doesn’t work properly between guests on the same host, paravirtualized interface does not perform well yet.
• Hoping to have Xen work for FreeBSD 11
VirtIO/VMWare guest drivers by Brian Venteicher
• Work done over last year
• VirtIO: new
o Unmapped IO – block and SCSI
o Network multiqueue
o Random (entropy) device
o Initial console driver –can do multi-consoles, hotplug is so-so
• VirtIO: remaining
o Support missing devices – MMIO
o Non-x86 architectures
o SCSI multiqueue
o VirtIO version 1 specification – very similar to existing virtio
• VMWare
o Vmxnet3
Vmware provided driver, messy
OpenBSD imported their own vmx driver May 2013
Ported to FreeBSD 10.0
• TSO/LRO offload
• Multiqueue
To do: PVSCSI & VMWare tools
Device emulation in bhyve
• Most emulated in userspace usr.sbin/bhyve
• Kernel ones in vmm/io/ (PICs and timers)
• ISA-LPC – uart, rtc
• PCI
o Virtio
Block – storage
Net – tap
Rng – random entropy from /dev/random
o Ahci
o Pass-through
• Go through how virtio device drivers work. Interesting, lots of diagrams he should post, but way above my head, so I didn’t take too many notes
• Virtio random number generator
o Usr.sbin/bhyve/pci_virtio_rnd.c
o Guest rng driver requests 32-bit number to replenish its random pool
o FreeBSD /dev/random is non-blocking, using Yarrow and (soonish) Fortuna
I’m at the BSDCan FreeBSD devsummit, and the current topic is FreeBSD 11 Goals.
As the Great Committer John Baldwin has requested that people take notes and blog about the discussions, and this might be of wider interest, here’s the goals.
These are my notes. I probably missed things. I would be shocked if I didn’t, actually. And I probably misunderstood some stuff.
Test suite/QA (jmmv) – some stuff merged to 10
Mips64 & more MIPS stuff
Scatter/Gather mbufs (scottl) – collapse down mbufs from a long chain into one unit
Lldb (emaste) – make it first-class citizen, fully functioning & working in 11 on all platforms, native cross-platform debugging
Uefi boot and install support (emaste)
Package the base system (gjb/bapt)
Open to floor:
AES GCM added to ipsec – jmg
ASLR – Shawn “The Goats Are His Fault” Webb
DNS improvements – Erwin
Suspend/resume
Libc++
OpenMP
FreeBSD devs – Want icc? Talk to gnn@
Kload – hot swap kernel upgrade
Dragonfly mailer as default
Ncurses cleanup
Capsicum and casper improvements – use casper to help apps use dnssec correctly
TCP performance and enhancements (gnn) – project as a whole needs broader TCP patch reviewers
L2 rework
Libuinet
Arm64 (andyt)
Package building Mips32 packages via qemu
External toolchain improvements (imp) – some people need GCC
Remove gcc by 11 – gnn willing to remove it right after this devsummit session
Remove ia64 (marcel)
Useland dtrace (marki)
Xen dom0 for x86 (rogier)
Kqueue64 from osX – available from Apple, we could pull this in (jmg)
Async sendfile (glebius)
Lightweight reference counts (maybe) (glebius)
Kdbus (need for desktop)
Vt + newcons default (emaste)
KMS, DRM, AGI impromements (dumbbell & kip)
SMT (need)
Encrypted kernel dump (gnn)
Nand flash (warner)
Superpages for certain arm & mips
Multi-endian ufs
Libdispatch (sson)
Move libraries to private (need, bapt, bdrewery help)
/etc/src.conf improvements
64-bit linuxulator
newer linuxulator (xmj)
new autofs (emaste)
unionfs improvements (need)
64-bit struct stat & dirent, mount_pathlen, max_pathlen, (benno)
X32 – alternate abi for amd64 – jhb wants, but no commitment
PF – improve its internal API so we can manage stable branches, merge newer version, IPv6 improvements (glebius)
Bhyve – UEFI
Vxlan
Reproducible release builds – remove usernames, host names, timestamps from builds
IPv6 security improvements
Network stack backpressure
Network multipath (stretch goal)
Capsicum shell – will sandbox package building
Non-root image building
Will all this happen? Who knows. But plans are nice.
BSDCan is next week. I will be there. You should too.
This year’s conference includes goats. For reasons too complicated and sordid for me to explain. If you really want to know, see here.
Goat BOF. Tuesday night. Royal Oak pub. Be there or be not one of the cool kids.
And as an afternote: I feel really sorry for Bryan Lunduke.
Today is International Day Against DRM.
All No Starch Press ebooks are available at 50% off. The titles include:
Plus books by other authors, of course. Once you’ve bought all of mine, check them out too.
Use coupon code RIGHT2READ to get the discount.
For the record: all of my books[1] are published without DRM. In my opinion, once you buy my book it’s yours to do with as you please. I trust my readers.
Yes, unlicensed downloaders discourage me from writing tech books. On the other hand, the shocking number of people who seek out and use my poorly advertised tip jar encourage me more than the illicit downloaders discourage me.
1: I lie about being 100% DRM-free. I have one short story with DRM, because I didn’t notice the DRM checkbox when I put it on Amazon. The only way I can remove DRM is to un-publish and re-publish the piece. If I do that, I lose all the nice reviews it’s gotten. Fiction reviews are hard to come by, so I chalk this up to the learning curve and move on. But if you buy that story, and you strip the DRM, I really won’t mind in the slightest.)