CADETS: Blending Tracing and Security

Total Page:16

File Type:pdf, Size:1020Kb

CADETS: Blending Tracing and Security SEE TEXT CADETSONLY Blending Tracing & Security on FreeBSD The FreeBSD operating system has been used in many products that require strong security proper- ties—from storage appli- ances, to network switches and routers as well as gaming consoles. Over the 20-plus years of FreeBSD’s By Jonathan Anderson, development, there have George V. Neville-Neil, been significant additions Arun Thomas, and to the system in the area Robert N. M. Watson of security. 12 FreeBSD Journal he Jails [1] system introduced what about ‘hello, world.’” [6] Using print statements today would be considered a lightweight for a logging system in code that is supposed to Tversion of virtualization. The Mandatory have, otherwise, low overhead, is not an option, Access Control (MAC) framework was and so most logging systems are enabled or dis- added in 2002 to provide fine-grained, system- abled at either compile time, using an wide control over what users and programs could #ifdef/#endif statement, or at runtime, by do within the system [2]. The Audit subsystem wrapping the logging in an if statement. added the ability to track—on a system-call-by-sys- An example of this idiom in the C language is tem-call basis—what actions were occurring on shown below. the system and who or what was initiating those actions [3]. More recently Capsicum has intro- #ifdef LOGGING duced capabilities into the operating system that if (log) are the basis for application sandboxes [4]. printf("You have written %d bytes", len); As part of a new research project, the Causal #endif /* LOGGING */ Adaptive Distributed, and Efficient Tracing System (CADETS), we are adding new security primitives The next problem with print-based logging sys- to FreeBSD as well as leveraging existing primitives tems is that they are both static and prone to to produce an operating system with the maxi- errors. If the programmer did not expose a piece mum amount of transparency. Apart from the of information via the logging system before the security implications, having better visibility into code was built, then it will not be possible, with- systems will help us to improve overall perform- out modifying the code, to learn about any other ance and provide new runtime debugging tools. data upon which the same function might be In this article, we’ll cover our work with DTrace operating. and the Audit system, which form the core com- Together, these two problems mean that most ponents of the work, and talk about the chal- high-performance systems, such as operating sys- lenges of using DTrace as an always on tracing tems, are shipped without logging enabled, and system to track security and other events. when logging is enabled, the data that is available is limited to whatever the original programmer Starting at the Beginning wished to expose. As open-source developers, we are used to the One of the main components of FreeBSD we are idea that we can “just recompile the code,” but in exploiting in CADETS is DTrace. Originally devel- production systems, that’s not always possible. oped for Sun’s Solaris operating system in the early Imagine you have sold a system to a large bank. years of the 21st century [5], DTrace was meant to At 3 a.m., the system has a fault of some sort and solve the following problem: most software sys- logs an error. Someone in the IT department gets a tems have some sort of logging framework, which message reporting the fault, they call support, sup- usually depends on the ubiquitous printf func- port calls a programmer, the programmer then tion and formats text and sends it to some form says, “Stop the system, rebuild the code, and of console. rerun it with logging turned on.” Handling errors in that way is terrible both for the customer and printf("Hello world!"); for the developer. The customer will be annoyed at having to rebuild and restart their system, and the All C programmers know the code shown developer is unlikely to get helpful information above and every programmer knows the equiva- because the error is now far in the past. Enter lent idiom in their own language, whether it’s Dynamic Tracing. Python, Rust, Go, or PHP. There are a few prob- DTrace was designed to always be available for lems with using print statements for logging sys- use, without reducing system performance and tems. The first problem is that print statements without running the risk of outright crashing the have a high performance overhead. If you’ve ever system. The clearest way to think about DTrace is wondered about how much work is done on the as a runtime debugger with significant logging programmer’s behalf by printf then see Brooks and statistical capabilities. DTrace avoids the over- Davis’s “Everything you ever wanted to know head of printf based logging systems by using a May/June 2017 13 few tricks to subvert the execution of compiled introduced by tracing gets too high, then the ker- code. The complete details are covered in The nel will terminate the tracing as a form of self- Design and Implementation of the FreeBSD preservation. The second tenet of the DTrace sys- Operating System [7], but, briefly, DTrace can tem, that the tracing system must not unduly tax override the entry or exit point of any function the system, is one of the key challenges of using that is compiled into the kernel or into a user- DTrace as a security technology. An attacker that space program. The way in which functions are knows there might be tracing will first cause collected into libraries and programs is a well- there to be a great deal of irrelevant load on the defined process, and each function has a set of system, causing the tracing system to exit, and instructions that indicate where the function then they will go about attacking the system. begins. When DTrace traces a function, it Another component of the CADETS project looks replaces a few instructions with some of its own at the provenance of traces in order to thwart so that when the code reaches that point, such attacks on the tracing system itself. DTrace’s code gets called first, and it can collect The majority of the current use cases for and process the function’s argument. The practi- DTrace involve using it as a runtime debugger, cal upshot of this is that when DTrace is not in turning on tracing when someone suspects there use, it has zero overhead. is a problem on a system, rather than leaving the tracing running all the time. A small subset of Tracing for Security users have built complex telemetry systems How can we apply DTrace to the problems of around DTrace, including Fishworks [8], but in security? One aspect of security is finding where these first attempts at always-on tracing the the bad actor lies in a system. A key question to number of things being traced was a small subset ask when looking at a system is “Who did what of the possible tracepoints. To build a system that to whom and when?” We’ll refer to this as has complete visibility, we need to not only have “Question 1.” Establishing the tree of operations always-on tracing, but to increase the perform- such that we can trace it back to its root is one ance of the tracing system such that the over- part of forensic analysis that can help us find our head collecting the data does not overwhelm the bad actor and also show us what we need to system’s ability to do productive work. Another change to prevent future security breaches. requirement of a tracing system targeted at secu- Imagine that, regardless of the performance rity is that trace records cannot be dropped or cost, we had complete transparency into every lost due to high load. DTrace was designed in operation performed on a computer system. such a way that under high load it was accept- With sufficient time, analysis, and tooling, we able to drop trace records, long before the kernel dtrace would be able to take the output generated by might terminate the collection process the tracing system and find out the answer to due to the system being unresponsive. A system Question 1. that is trying to collect trace data for later foren- DTrace gives us the basis on which to build sic analysis turns that concept on its head. such a system, but there remain some challenges. Any system where tracing is always on will gen- In the previous section, we stated that using erate a lot of data, and that data will need to be some clever tricks to replace certain instructions analyzed to track down attackers and how they at runtime, DTrace would have zero overhead are able to compromise the system. There are sev- when not in use. That feature of DTrace was eral systems for taking arbitrary textual output what made it viable to ship it, by default, with from various tools and trying to make some sense Solaris, and the FreeBSD and Mac OS in the first of it, including Splunk [9]. The goal of the CADETS place. It was not until there was a way to ship a project is to produce data for use by such tools. It tracing system that didn’t have a performance will be much easier for consumers if the data is in impact on a running system that such a system a machine-readable format. could be fielded.
Recommended publications
  • Oracle Berkeley DB Installation and Build Guide Release 18.1
    Oracle Berkeley DB Installation and Build Guide Release 18.1 Library Version 18.1.32 Legal Notice Copyright © 2002 - 2019 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. Berkeley DB, and Sleepycat are trademarks or registered trademarks of Oracle. All rights to these marks are reserved. No third- party use is permitted without the express prior written consent of Oracle. Other names may be trademarks of their respective owners. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Oracle Solaris 11 Cheat Sheet Dtrace
    Oracle Solaris 11 Administrator's Cheat Sheet for DTrace Oracle Solaris 11 Cheat Sheet DTrace What is DTrace? DTrace Command Components Oracle Solaris DTrace is a comprehensive, advanced tracing tool for troubleshooting A typical DTrace command has several components: systematic problems in real time. Administrators, integrators and developers can use DTrace to dynamically and safely observe live production systems for performance issues, A 4-tuple identifier provider:module:function:name, where module is a kernel including both applications and the operating system itself. DTrace allows you to explore • module or application library, and function and name are the routines that are to be your system to understand how it works, track down problems across many layers of software, and locate the cause of any aberrant behavior. Whether it’s at a high level global instrumented. If any of these are left black, it is equivalent to a wildcard match. For overview like memory consumption or CPU time, to much finer grained information like what example, to fire all entry routines in the syscall provider we would use the following: specific function calls are being made, DTrace gives the operational insights that have long syscall:::entry been missing in the data center. • A predicate, or relational expression, that determines whether any action should be Understanding DTrace providers and probes taken. For example, to check whether the process name matches bash we would use the following: /execname == “bash”/ Oracle Solaris 11 is littered with many different points of instrumentation – places of interest • An action for what should happen if the probe fires and the predicate is satisfied.
    [Show full text]
  • Oracle® Solaris 11.4 Dtrace
    ® Oracle Solaris 11.4 DTrace (Dynamic Tracing) Guide Part No: E61035 November 2020 Oracle Solaris 11.4 DTrace (Dynamic Tracing) Guide Part No: E61035 Copyright © 2011, 2020, Oracle and/or its affiliates. License Restrictions Warranty/Consequential Damages Disclaimer This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. Warranty Disclaimer The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. Restricted Rights Notice If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software"
    [Show full text]
  • Solaris Dynamic Tracing Sun.Com/Software
    Solaris™ Dynamic Tracing Increasing Performance Through Complete Software Observability < Introducing Solaris™ Dynamic Tracing (DTrace) With the Solaris™ 10 Operating System (OS), Sun introduces Dynamic Tracing (DTrace): a dynamic tracing framework for troubleshooting systemic problems in real time on production systems. DTrace is designed to quickly identify the root cause of system performance problems. DTrace safely and dynamically instruments the running operating system kernel and running applications without rebooting the kernel and recompiling — or even restarting — appli- cations. And, when not explicitly enabled, DTrace has zero effect on the system. It is available on all supported Solaris OS platforms. Designed for use on production systems Provides single view of software stack DTrace is absolutely safe for use on production With DTrace, system administrators, integrators, systems. It has little impact when running, and developers can really see what the system and no impact on the system when not in use. is doing, as well as how the kernel and appli- Highlights Unlike other tools, it can be initiated dynami- cations interact with each other. It enables cally without rebooting the system, using users to formulate arbitrary questions and get • Designed for use on production special modes, restarting applications, or any concise answers, allowing them to find per- systems to find performance other changes to the kernel or applications. formance bottlenecks on development, pilot, bottlenecks and production systems. More generally, DTrace • Provides a single view of the DTrace provides accurate and concise informa- can be used to troubleshoot virtually any software stack — from kernel tion in real time. Questions are answered systemic problem — often finding problems to application, leading to rapid identification of performance immediately, eliminating the need to collect that have been plaguing a system for years.
    [Show full text]
  • The Rise & Development of Illumos
    Fork Yeah! The Rise & Development of illumos Bryan Cantrill VP, Engineering [email protected] @bcantrill WTF is illumos? • An open source descendant of OpenSolaris • ...which itself was a branch of Solaris Nevada • ...which was the name of the release after Solaris 10 • ...and was open but is now closed • ...and is itself a descendant of Solaris 2.x • ...but it can all be called “SunOS 5.x” • ...but not “SunOS 4.x” — thatʼs different • Letʼs start at (or rather, near) the beginning... SunOS: A peopleʼs history • In the early 1990s, after a painful transition to Solaris, much of the SunOS 4.x engineering talent had left • Problems compounded by the adoption of an immature SCM, the Network Software Environment (NSE) • The engineers revolted: Larry McVoy developed a much simpler variant of NSE called NSElite (ancestor to git) • Using NSElite (and later, TeamWare), Roger Faulkner, Tim Marsland, Joe Kowalski and Jeff Bonwick led a sufficiently parallelized development effort to produce Solaris 2.3, “the first version that worked” • ...but with Solaris 2.4, management took over day-to- day operations of the release, and quality slipped again Solaris 2.5: Do or die • Solaris 2.5 absolutely had to get it right — Sun had new hardware, the UltraSPARC-I, that depended on it • To assure quality, the engineers “took over,” with Bonwick installed as the gatekeeper • Bonwick granted authority to “rip it out if itʼs broken" — an early BDFL model, and a template for later generations of engineering leadership • Solaris 2.5 shipped on schedule and at quality
    [Show full text]
  • New Security Features in Solaris 10 and Dtrace Chandan B.N, Sun Microsystems Inc
    New Security Features in Solaris 10 and DTrace Chandan B.N, Sun Microsystems Inc. 17th Annual FIRST Conference; June 2005 A secure and robust operating system plays a key role in keeping a computing environment safe and secure. This paper illustrates how the new security features and improvements in the latest release of Solaris Operating Environment can help defend system integrity, enable secure computation with ease of deployment and manageability. There also an introduction to DTrace which is a powerful infrastructure to observer the behaviour of the system. The most significant developments in Solaris 10 are improved hardening and minimization, application of principle of least privileges, introduction of zones and a new cryptographic framework. Apart from these there are a number of minor additions and enhancements that help in improving the OS security. Solaris Privileges (Process Rights Management) The traditional UNIX privilege model associates all privileges with the effective uid 0 or root. A privileged process if compromised can be used to gain full access to the system. It is also not possible to extend an ordinary user's capabilities with a restricted set of privileges. Solaris 10 addresses these with the introduction of the principle of least privileges [Saltzer & Schroeder 1975] which says that a process should be given no more privilege than necessary to perform its job. Process Rights Management extends the Solaris process model with privilege sets. Each privilege set contains zero or more privileges. Each process has four privilege sets: The Effective set (E) is active privileges required to perform a privileged action; this is the set of privileges the kernel verifies its privilege checks against.
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • Dtrace-Ebook.Pdf
    The illumos Dynamic Tracing Guide The contents of this Documentation are subject to the Public Documentation License Version 1.01 (the “License”); you may only use this Documentation if you comply with the terms of this License. Further information about the License is available in AppendixA. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this document, and the publisher was aware of the trademark claim, the designations have been followed by the “™” or the “®” symbol, or printed with initial capital letters or in all capitals. This distribution may include materials developed by third parties. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark of The Open Group. illumos and the illumos logo are trademarks or registered trademarks of Garrett D’Amore. Sun, Sun Microsystems, StarOffice, Java, and Solaris are trademarks or registered trademarks of Oracle, Inc. or its subsidiaries in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTA- TIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Copyright © 2008 Sun Microsystems, Inc.
    [Show full text]
  • Dtrace and Java: Understanding the Application and the Entire Stack Adam H
    DTrace and Java: Understanding the Application and the Entire Stack Adam H. Leventhal Solaris Kernel Development Sun Microsystems Jarod Jenson Aeysis, Inc. Session 5211 2005 JavaOneSM Conference | Session 5211 The State of Systemic Analysis ● Observability tools abound ● Utilities for observing I/O, networking, applications written in C, C++, Java, perl, etc. ● Application-centric tools extremely narrow in scope and not designed for use on production systems ● Tools with system-wide scope present a static view of system behavior – no way to dive deeper 2005 JavaOneSM Conference | Session 5211 | 2 Introducing DTrace ● DTrace is the dynamic tracing facility new in Solaris 10 ● Allows for dynamic instrumentation of the OS and applications (including Java applications) ● Available on stock systems – typical system has more than 30,000 probes ● Dynamically interpreted language allows for arbitrary actions and predicates 2005 JavaOneSM Conference | Session 5211 | 3 Introducing DTrace, cont. ● Designed explicitly for use on production systems ● Zero performance impact when not in use ● Completely safe – no way to cause panics, crashes, data corruption or pathological performance degradation ● Powerful data management primitives eliminate need for most postprocessing ● Unwanted data is pruned as close to the source as possible 2005 JavaOneSM Conference | Session 5211 | 4 Providers ● A provider allows for instrumentation of a particular area of the system ● Providers make probes available to the framework ● Providers transfer control to the DTrace
    [Show full text]
  • Modern Linux Tools for Oracle Troubleshooting
    Modern Linux Tools for Oracle Troubleshooting Luca Canali, CERN Zbigniew Baranowski, CERN UKOUG TECH14, Liverpool, December 2014 About Luca • Senior DBA and team lead at CERN IT • Joined CERN in 2005 • Working with Oracle RDBMS since 2000 • Passionate to learn and share knowledge, how to get most value from database technology • @LucaCanaliDB and http://cern.ch/canali 3 About CERN • CERN - European Laboratory for Particle Physics • Founded in 1954 by 12 countries for fundamental physics research in a post-war Europe • Today 21 member states + world-wide collaborations • About ~1000 MCHF yearly budget • 2’300 CERN personnel + 10’000 users from 110 countries LHC is the world’s largest particle accelerator • LHC = Large Hadron Collider • 27km ring of superconducting magnets • Currently undergoing upgrades, restart in 2015 From particle to article.. Click to edit Master title style How do you get from this to this This talk covers Linux tools for advanced tracing and Oracle investigations • Modern tools opening new roads: Perf, DTrace, Systemtap, … • Probes on the OS to understand system calls • Probes for the userspace to understand Oracle internals • This is a short exploration rather than a lesson • Focus on techniques that you can use today 8 Prerequisites • Not covered here are many of the common and most used tools and utilities • top • strace • vmstat • iostat, sar, collectl, dstat • use of the /proc filesystem (ex cat /proc/meminfo) • … 9 You can probably run userspace and dynamic tracing tools in Linux already • Available with RHEL/OEL
    [Show full text]
  • An Overview of Security in the Freebsd Kernel 131 Dr
    AsiaBSDCon 2014 Proceedings March 13-16, 2014 Tokyo, Japan Copyright c 2014 BSD Research. All rights reserved. Unauthorized republication is prohibited. Published in Japan, March 2014 INDEX P1A: Bold, fast optimizing linker for BSD — Luba Tang P1B: Visualizing Unix: Graphing bhyve, ZFS and PF with Graphite 007 Michael Dexter P2A: LLVM in the FreeBSD Toolchain 013 David Chisnall P2B: NPF - progress and perspective 021 Mindaugas Rasiukevicius K1: OpenZFS: a Community of Open Source ZFS Developers 027 Matthew Ahrens K2: Bambi Meets Godzilla: They Elope 033 Eric Allman P3A: Snapshots, Replication, and Boot-Environments—How new ZFS utilities are changing FreeBSD & PC-BSD 045 Kris Moore P3B: Netmap as a core networking technology 055 Luigi Rizzo, Giuseppe Lettieri, and Michio Honda P4A: ZFS for the Masses: Management Tools Provided by the PC-BSD and FreeNAS Projects 065 Dru Lavigne P4B: OpenBGPD turns 10 years - Design, Implementation, Lessons learned 077 Henning Brauer P5A: Introduction to FreeNAS development 083 John Hixson P5B: VXLAN and Cloud-based networking with OpenBSD 091 Reyk Floeter INDEX P6A: Nested Paging in bhyve 097 Neel Natu and Peter Grehan P6B: Developing CPE Routers based on NetBSD: Fifteen Years of SEIL 107 Masanobu SAITOH and Hiroki SUENAGA P7A: Deploying FreeBSD systems with Foreman and mfsBSD 115 Martin Matuška P7B: Implementation and Modification for CPE Routers: Filter Rule Optimization, IPsec Interface and Ethernet Switch 119 Masanobu SAITOH and Hiroki SUENAGA K3: Modifying the FreeBSD kernel Netflix streaming servers — Scott Long K4: An Overview of Security in the FreeBSD Kernel 131 Dr. Marshall Kirk McKusick P8A: Transparent Superpages for FreeBSD on ARM 151 Zbigniew Bodek P8B: Carve your NetBSD 165 Pierre Pronchery and Guillaume Lasmayous P9A: How FreeBSD Boots: a soft-core MIPS perspective 179 Brooks Davis, Robert Norton, Jonathan Woodruff, and Robert N.
    [Show full text]
  • Warum Freebsd? - Deutsch
    Warum FreeBSD? - Deutsch Ist FreeBSD das richtige für uns? Das können nur Sie allein beantworten. Wir hoffen Ih- nen mit dem kurzen Überblick die Entscheidung zu- Warum gunsten von FreeBSD etwas einfacher gemacht zu ha- ben. Denken Sie einfach auch an FreeBSD, wenn das nächste mal eine Entscheidung bezüglich eines Systems zu treffen ist. FreeBSD? Stabilität FreeBSD: Ihre Vorteile FreeBSD wird von Fachleuten als "rock solid" geschätzt: ein System, welches auch noch unter höchster Last sehr Was ist FreeBSD? gut bedienbar ist. FreeBSD hat innerhalb seiner Major- Resourcenverbrauch Dieser Flyer soll Ihnen in kurzer Form einige Vorteile Releases stabile Kernel-Interfaces und ist, auf Wunsch, Bei FreeBSD wird seit jeher auf möglichst geringen Ver- von FreeBSD näherbringen und grundsätzliche Ziele und kompatibel zu den jeweils vorhergehenden Versionen. Vorteile des Projektes erläutern. Opera z.B., erstellt für FreeBSD 4.6, läuft auch noch un- brauch an Resourcen (z.B. Ram und Festplattenplatz) ge- ter FreeBSD 8.0. Gerade für Hersteller proprietärer Soft- achtet. Eine komplette Installation von FreeBSD mit den Die Berkeley Software Distribution (BSD) ist eine freie ware und Treiber ein echter Mehrwert. knapp 500 Applikationen (darunter Editoren wie ee und Open Source-Version des Betriebssystems Unix, die an vi, sendmail usw.) in der sog. „Base“ benötigt keine 500 der Universität von Berkeley ab 1975 entstanden ist. BSD Nimmt man eine hohe Uptime als Messlatte für ein sta- Megabyte auf Festplatte. Ein FreeBSD lässt sich mit den basiert auf AT&Ts Unix Sixth Edition (V6), die ab 1975 biles System, so liegt auch hier FreeBSD unangefochten Skripten „NanoBSD“ und „PicoBSD“ problemlos auf Sys- den Universitäten zur Verfügung gestellt wurden mit an der Spitze wie Sie hier ersehen können: http://upti- temen mit 32 Megabyte Ram betreiben.
    [Show full text]