Page MenuHomeFreeBSD

where: Add to derived distributions
Changes PlannedPublic

Authored by ziaee on Thu, May 7, 12:45 PM.
Tags
None
Referenced Files
F157548236: D56867.id177363.diff
Fri, May 22, 5:05 PM
Unknown Object (File)
Fri, May 22, 12:34 PM
Unknown Object (File)
Fri, May 22, 10:34 AM
Unknown Object (File)
Thu, May 21, 8:29 AM
Unknown Object (File)
Tue, May 19, 6:58 PM
Unknown Object (File)
Sat, May 16, 7:35 PM
Unknown Object (File)
Sat, May 16, 5:51 PM
Unknown Object (File)
Thu, May 14, 10:00 PM
Subscribers

Details

Reviewers
lattera-gmail.com
fernape
olivier
Group Reviewers
docs
Summary

This list deserves to be complete with any projects that are shipping
FreeBSD derived open-source operating systems that are shipping up to
date security patches. Add BSDRP, HardenedBSD, and OPNsense.

Discussed with: rezny

Note: Since we don't have a contact with OPNsense on Phabricator anymore, I will reach out to them privately via email and ask them what they want to do with this text, then update the diff accordingly. If anyone knows any other currently maintained distributions, please mention them.

Diff Detail

Repository
R9 FreeBSD doc repository
Lint
Lint Skipped
Unit
Tests Skipped
Build Status
Buildable 72877
Build 69760: arc lint + arc unit

Event Timeline

ziaee requested review of this revision.Thu, May 7, 12:45 PM
ziaee created this revision.
ziaee added a subscriber: rezny.
ziaee retitled this revision from where: Add HardenedBSD and OPNsense to distros to where: Add to derived distributions.Thu, May 7, 1:25 PM
ziaee edited the summary of this revision. (Show Details)
This revision is now accepted and ready to land.Thu, May 7, 1:28 PM

Franco has also approved this commit over email, I will give it a moment for @olivier to weigh in since @lwhsu requested him.

website/content/en/where.adoc
292

This is mostly correct. I like the term "soft fork" since it conveys that we keep up-to-date with FreeBSD. I'm not opposed to what you've written, except for the need to clarify "soft fork". With that said, though, I would like to clarify the current "mindset" of the HardenedBSD project and its community. It could be argued that the (pretty lengthy, sorry) description below is captured in a boiled down "security-research fork" phrasing, but I'm not sure it conveys what that research actually entails.

The way I've been talking about HardenedBSD since around 2018 is: a human rights-focused operating system implementing many security and hardening features, implemented with the goal of frustrating the efforts of those who violate human rights. Initially focused on providing the wider BSD community with a clean room reimplementation of the publicly-documented bits of the grsecurity/PaX patchset for Linux. We've since expanded that focus with implementing certain features or deploying certain networks/systems in direct response to the decline of the human condition.

HardenedBSD tends to share ideas and data points back to FreeBSD, not necessarily patches. That said, the communities (both FreeBSD's and HardenedBSD's) are encouraged to collaborate should the need and/or desire arise. Some of our idea sharing has resulted in patches being adopted by upstream FreeBSD (and, strangely enough, the Syd sandbox project for Linux).

That's certainly a lot of works--perhaps too many. But I hope I'm communicating the current state of HardenedBSD in such a way that could be fitted better for inclusion here. Feel free to draft something in your own words, trimming it down to a sentence or two. I'll pay attention for future updates.

After we discussed this further, we decided that this list is really not appropriate for this page. It is also duplicated in the handbook. I intend to refactor this patch against the handbook and continue with it later, but I'm in a spark of inspiration to clean up this page. That patch series begins here -- https://reviews.freebsd.org/D56956