OpenBSD 3.1 has been released

Monday, 20 May 2002, 3:23 AM EST

This is a partial list of new features and systems included in OpenBSD 3.1. For a comprehensive list, see the changelog leading to 3.1.

  • OpenSSH (supporting both the SSH1 and SSH2 protocols) is now at version 3.2. Secure file transfers are encouraged using the greatly enhanced SFTP subsystem which comes both with an SFTP server and client.
  • As usual, improvements to the documentation, notably the man pages and the Web FAQ. A larger part of the website is now available in several languages.
  • More complete collection and better tested set of "ports".
  • Over 1000 pre-built and tested packages.
  • Greatly improved hardware support in the OpenBSD/sparc64 port, and the addition of X11 support.
  • Numerous performance improvements to the OpenBSD/macppc port, as well as accelerated X11 servers for some models.
  • A lot of enhancements to our new packet filter, pf, including performance improvements, as well as the ability to filter other protocols than the usual tcp, udp and icmp, such as esp.
  • An utility to achieve per-user pf rules changes, typically intended for gateways, authpf.
  • The in-kernel software raid (RAIDframe) can now automatically detect and configure its raid devices at boot. Taking advantage of this, the system can have its root partition directly mounted from an auto-detected raid partition.
  • Wavelan bridging is now possible on Prism-II based cards.
  • The system includes the following major components from outside suppliers:
    • XFree86 4.2.0 (and i386 contains 3.3.X servers also, thus providing support for all chipsets)
    • gcc 2.95.3 (+ patches)
    • perl 5.6.1 (+ patches)
    • Apache 1.3.24, mod_ssl 2.8.8, OpenSSL 0.9.6b (+ patches), DSO support
    • groff 1.15
    • sendmail 8.12.2
    • lynx 2.8.2rel.1 with HTTPS support added
    • sudo 1.6.5p2
    • ncurses 5.2
    • Latest KAME IPv6
    • KTH Kerberos 1.0.8
    • Heimdal 0.4e (+ patches)
    • OpenSSH 3.2

[ Read more ]

Related items


Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco ASA products - appliances, firewalls, switches, routers, and security modules - have been found sporting a flaw that can ultimately lead to remote code execution by attackers.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Feb 12th