DragonFly 5.0 released!

Matthew Dillon dillon at backplane.com
Mon Oct 16 11:25:13 PDT 2017


Hi folks!  So 5.0 is out the door, and this is probably going to be our
stable release for the next few months.  Master is about to get a pile of
commits and should be considered a bit more experimental over the next few
months than it would normally be.  So if you normally run master, but you
want stability, we recommend sticking with the 5.0 release for a few months.

Now that 5.0 is out the door, master is going to start getting some really
fun performance commits for beefier systems with lots of cores.  However,
the most important of these commits is also relatively dangerous as it
involves avoid global IPIs by not fully synchronizing the page tables
backing the buffer cache. Any corruption in that area of the kernel can
directly effect filesystem integrity, which is why I am posting this
warning now.

Another late alert, it looks like WPA2's encryption was broken in the wild
in a key reinstallation attack called KRACK, which probably means that we
will be seeing a wpa_supplicant update soon.  Watch for it.  Not that
anyone should be doing anything unencrypted over their wifi anyhow.. but
just a head's up.  It aint secure (if it ever was).  This will be a
double-nasty for Android phones which generally don't get updates.  For
DragonFlyBSD, we have two wpa_supplicant programs.  One is in base to help
people bootstrap wifi-only laptops.  The other is in packages.  We will
post a followup once we have fixes in place.

-Matt
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.dragonflybsd.org/pipermail/users/attachments/20171016/6b58b0ea/attachment-0002.html>


More information about the Users mailing list