SAP HANA is now supported on SUSE Linux Enterprise Server for SAP Applications 15

 

Share with friends and colleagues on social media

Following SUSE Linux Enterprise releases are now supported for SAP HANA:

  • HANA 2.0 on Intel-based Hardware Platforms
    • SUSE Linux Enterprise Server for SAP Applications 15 GA
    • SUSE Linux Enterprise Server 15 GA
    • SUSE Linux Enterprise Server for SAP Applications 12 SP3 / SP2 / SP1
    • SUSE Linux Enterprise Server 12 SP3 / SP2 / SP1
  • HANA 2.0 on IBM Power Servers
    • SUSE Linux Enterprise Server for SAP Applications 15 GA
    • SUSE Linux Enterprise Server 15 GA
    • SUSE Linux Enterprise Server for SAP Applications 12 SP3 / SP2 / SP1
    • SUSE Linux Enterprise Server 12 SP3 / SP2 / SP1
  • HANA 1.0 on Intel-based Hardware Platforms:
    • SUSE Linux Enterprise Server for SAP Applications 15 GA
    • SUSE Linux Enterprise Server 15 GA
    • SUSE Linux Enterprise Server for SAP Applications 12 SP3 / SP2 / SP1 / GA
    • SUSE Linux Enterprise Server 12 SP3 / SP2 / SP1 / GA
    • SUSE Linux Enterprise Server for SAP Applications 11 SP4 / SP3 / SP2
    • SUSE Linux Enterprise Server 11 SP4/ SP3 / SP2
  • HANA 1.0 on IBM Power Servers
    • SUSE Linux Enterprise Server for SAP Applications 11 SP4
    • SUSE Linux Enterprise Server 11 SP4

Full details are available in the SAP Note 2235581: SAP HANA Supported Operating Systems SAP Note: (SAP access required) https://launchpad.support.sap.com/#/notes/2235581

Share with friends and colleagues on social media
Source

What to Expect from the Move to Linux

Share with friends and colleagues on social media

    Ease Your Migration with Tools and Training

    SAP HANA runs exclusively on Linux, which means that a moment of change is coming for many SAP customers that have not yet adopted SAP HANA. Companies using other platforms, like Microsoft Windows, will need to migrate to Linux — and this is not an insignificant segment of the install base: As many as 68.2% of SAP customers still run on operating systems other than Linux, according to this IDC study. Companies know the strategic importance and business benefits of SAP HANA but have been slow to begin this migration to adopt the in-memory database.

    We’ve heard several common questions and concerns from SAP customers about their migration to Linux, such as whether a Linux migration will disrupt system operations, or whether they will be as comfortable managing the new system as they were with legacy platforms. In this article, we’ll explore how, with the proper technology and management, you can mitigate such concerns and undertake a smooth transition.

    A Successful Migration
    Technology migrations often disrupt existing business operations, resulting in downtime, data loss, or extra costs. The way to avoid these types of issues is with the appropriate knowledge transfer and tools. SUSE offers SUSE Linux Enterprise Server for SAP Applications, a Linux-based operating system designed for SAP customers that includes a number of features and functionalities intended to help companies migrate smoothly. To ensure stable SAP operations, the platform includes technology for high availability and disaster recovery. SUSE Linux Enterprise Server for SAP Applications, for example, includes features that enable SAP HANA users to reduce downtime by clustering physical and virtual servers.

    This clustering capability eliminates single points of failure and lets users implement automated failover. Additionally, SUSE Linux Enterprise Live Patching facilitates interruption-free SAP HANA operations by allowing companies to install patches on the Linux kernel without having to restart servers or slow down applications. This feature also boosts security and compliance, as the systems are always up to date with the latest security patches. A successful migration is not solely about the tools that are used, however; it’s also about the skills of the people who implement those tools. SUSE offers special training to prepare SAP system administrators for the operation of SUSE Linux Enterprise Server for SAP Applications to ease their transition from familiar legacy platforms.

    Simplified Deployment and Management
    But what about deploying and managing the new Linux platform? Will organizing these tasks be more complicated than on a familiar operating system? SUSE provides a number of management tools to make the deployment and management of the new platform easier. The standard Installation Wizard is a graphical configuration tool that SAP system administrators can use to walk through an automated workflow to install Linux and the desired SAP applications and SAP HANA in just a few steps. Additionally, administrators can maintain the availability of their infrastructure with SUSE Manager. Automating Linux server management and monitoring reduces administrative effort, increases productivity, and ensures less downtime. With SUSE Manager, companies can automate their patch and update management, ensuring compliance with guidelines.

    Migrating with Confidence
    SAP customers and partners alike are working with SUSE on their Linux migrations. “SUSE is a piece of the puzzle for us delivering guaranteed performance for customers who are running production SAP workloads,” says Christian Teeft, Chief Technology Officer and Senior Vice President of Cloud Services at Symmetry, an enterprise cloud services provider that uses SUSE Linux Enterprise Server for SAP Applications as the operating system for its proprietary SAP HANA cloud solution. Ibrahim Mahmoud, IT Director at Saudi Company for Hardware, adds “Thanks to SUSE Linux Enterprise Server for SAP Applications, we’re getting the proper IT quality and support that our business needs to run smoothly — now and as we expand in the future.”

    For more information about SUSE Linux Enterprise Server for SAP Applications, visit www.suse.com/products/sles-for-sap.

    Originally featured on SAP Insider in September 2018

    Share with friends and colleagues on social media

      Source

      Automating Security Compliance with Ease – Red Hat Enterprise Linux Blog

      Organizations today are seeking to increase productivity, flexibility and innovation to deliver services faster without sacrificing security, stability and performance. As hybrid IT environments continue to expand and evolve, security must be automated to scale and mitigate risks to achieve compliance and meet the needs of the business.

      Why should security and compliance be automated? According to the 2017 Verizon Data Breach Report, “81% of hacking-related breaches leveraged either stolen and/or weak passwords”. Ensuring protection against stolen and/or weak passwords is preventable by defining and implementing strong password policies using automation. In this article by Gartner, “99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident”. Automation can help enforce and ensure security and compliance and help protect against security vulnerabilities and security breaches.

      Red Hat Enterprise Linux provides security technologies, certifications, and the ongoing support of the Product Security team to combat vulnerabilities, protect your data, and meet regulatory compliance. You can automate regulatory compliance and security configuration remediation across your systems and within containers with OpenSCAP, Red Hat’s National Institute of Standards and Technology (NIST)-certified scanner that checks and remediates against vulnerabilities and configuration security baselines, including against National Checklist content for PCI-DSS, DISA STIG, and more. Additionally, centralize and scale out configuration remediation across your entire hybrid environment with the broader Red Hat management portfolio.

      OpenSCAP is a family of open source SCAP tools and content that help users create standard security checklists for enterprise systems. Natively shipping in Red Hat Enterprise Linux and Red Hat Satellite, OpenSCAP provides practical security hardening advice for Red Hat technologies and links to compliance requirements, making deployment activities like certifications and accreditations easier. OpenSCAP allows you to perform both vulnerability and security compliance checks in a fully automated way.

      To better meet the varied security needs of hybrid computing, Red Hat Enterprise Linux 7.5 provides enhanced software security automation to mitigate risk through the integration of OpenSCAP with Red Hat Ansible Automation. This enables the creation of Ansible playbooks directly from OpenSCAP scans which can then be used to implement remediations more rapidly and consistently across a hybrid IT environment. The remediations are generated in the form of Ansible playbooks, either based on profiles or based on scan results.

      A playbook based on a SCAP Security Guide (SSG) profile contains fixes for all rules, and the system is remediated according to the profile regardless of the state of the machine. On the other hand, playbooks based on scan results contain only fixes for rules that failed during an evaluation.

      In Red Hat Enterprise Linux 7.5, Red Hat provides pre-built Ansible playbooks for many compliance profiles. The playbooks are stored in the /usr/share/scap-security-guide/ansible/ directory. You can apply the pre-generated Ansible playbooks provided by the scap-security-guide in this directory on your host.

      Alternatively, to generate an Ansible playbook based on a profile (for example, the DISA STIG profile for Red Hat Enterprise Linux 7), enter the following command:

      $ oscap xccdf generate fix –fix-type ansible
      –profile xccdf_org.ssgproject.content_profile_stig-rhel7-disa
      –output stig-rhel7-role.yml
      /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml

      To generate an Ansible playbook based on the results of a scan, enter the following command:

      $ oscap xccdf generate fix –fix-type ansible
      –result-id “”
      –output stig-playbook-result.yml
      results.xml

      where the results.xml file contains results of the scan obtained when scanning with the –results option and the result-id option contains an ID of the TestResult component in the file with results. In the example, above, we are using empty result-id. This is a trick to avoid specifying the full result ID.

      To apply the Ansible playbook, enter the following command:

      $ ansible-playbook -i inventory.ini stig-playbook-result.yml

      Note that the ansible-playbook command is provided by the ansible package. See the ansible-playbook(1) man page and the Ansible Tower User Guide for more information.

      The atomic scan command enables users to use OpenSCAP scanning capabilities to scan docker-formatted container images and containers on the system. It is possible to scan for known CVE vulnerabilities or for configuration compliance. Additionally, users can remediate docker-formatted container images to the specified policy.

      The OpenSCAP scanner and SCAP content are provided in a container image that allows for easier updating and and deployment of the scanning tools. The `atomic scan` command enables the evaluation of Red Hat Enterprise Linux based container images and running containers against any provided SCAP profile.

      For example, here is how to scan the container for configuration compliance to the RHEL 7 DISA STIG profile.

      $ sudo atomic scan –scan_type configuration_compliance
      –scaner_args profile=stig-rhel7-disa, report registry.access.redhat.com/rhel7:latest

      To remediate docker-formatted container images to the specified policy, you need to add the –remediate option to the atomic scan command when scanning for configuration compliance. The following command builds a new remediated container image compliant with the DISA STIG policy from the Red Hat Enterprise Linux 7 container image:

      $ sudo atomic scan –remediate –scan_type configuration_compliance
      –scanner_args profile=xccdf_org.ssgproject.content_profile_stig-rhel7-disa,report
      registry.access.redhat.com/rhel7:latest

      Finally, in order to automate security and compliance at scale for hybrid environments, you will need an automation strategy that includes products and tools that will help you scan and remediate more than a single machine at a time. For example, you can use OpenSCAP with a combination of Red Hat’s Management Portfolio, which includes Red Hat CloudForms, Red Hat Ansible Automation, Red Hat Satellite , and Red Hat Insights. Using OpenSCAP with these Red Hat Management portfolio projects, you can automate security and compliance at scale for your hybrid environment.

      The built-in security automation capabilities of Red Hat Enterprise Linux with the integration of OpenSCAP with Red Hat Ansible Automation gives you the flexibility and ease of automating security compliance. This integration also provides the secure foundation to do security automation at scale by extending these built-in capabilities with Red Hat’s management portfolio.

      Learn more in this webcast: Automating Security Compliance with Ease.

      Source

      Ubuntu Linux 18.10 Cosmic Cuttlefish Beta Now Available For Desktop, Cloud and Server Versions

       

       

      binspamdupenotthebestofftopicslownewsdaystalestupid
      freshfunnyinsightfulinterestingmaybe
      descriptive

      103129272
      story

       

      UbuntuOperating SystemsLinux

      Ubuntu Linux 18.10 Cosmic Cuttlefish Beta Now Available For Desktop, Cloud and Server Versions (betanews.com)

      Posted
      by

      msmash

      on Sunday September 30, 2018 @03:30PM

      from the weekend-projects dept.

      Roughly three weeks ahead of the scheduled release of Ubuntu Linux 18.10 “Cosmic Cuttlefish”, the latest major update for the popular Linux distro,

      beta of all of its flavors — desktop, cloud and server — is now available for download

      . From a report:

      Codenamed ‘Cosmic Cuttlefish,’ 18.10 continues Ubuntu’s proud tradition of integrating the latest and greatest open source technologies into a high-quality, easy-to-use Linux distribution. The team has been hard at work through this cycle, introducing new features and fixing bugs,” says Adam Conrad, Software Engineer, Canonical. Conrad further says, “This beta release includes images from not only the Ubuntu Desktop, Server, and Cloud products, but also the Kubuntu, Lubuntu, Ubuntu Budgie, UbuntuKylin, Ubuntu MATE, Ubuntu Studio, and Xubuntu flavours. The beta images are known to be reasonably free of showstopper CD build or installer bugs, while representing a very recent snapshot of 18.10 that should be representative of the features intended to ship with the final release expected on October 18th, 2018.” Further reading: Canonical Shares Desktop Plans For Ubuntu 18.10

      .

       

      Can’t open /usr/games/lib/fortunes.dat.

      Working…

      Source

      Hacker-Powered Security » Linux Magazine

      Mårten Mickos is one of the most respected members of the open source world. The former CEO of MySQL AB during its prime now serves as the CEO of HackerOne, a vulnerability coordination and bug bounty platform. I sat down with Mickos to understand HackerOne’s purpose and his perspective on the security of open source software.

      Mårten Mickos is one of the most respected members of the open source world. The former CEO of MySQL AB during its prime now serves as the CEO of HackerOne, a vulnerability coordination and bug bounty platform. I sat down with Mickos to understand HackerOne’s purpose and his perspective on the security of open source software.

      HackerOne’s Role

      In layman’s terms, HackerOne brings the hacker community to an organization to hack into their code in search of vulnerabilities. As Mickos said, “Sometimes we joke that if you are going to be hacked anyway, it’s better to get hacked by someone you can trust.” HackerOne has built a platform for secure intelligence report sharing and payment, along with a reputation system for hackers.

      When an organization announces a bug bounty program through HackerOne, the hacker community starts looking at the organization’s code and filing their reports. The platform enables the bug bounty program’s organizer to vet these vulnerabilities. The hacker who filed the report gets rewarded.

      […]

      Use Express-Checkout link below to read the full article (PDF).

      Source

      Doing Date Math on the Command Line, Part I

      If you’ve ever used a spreadsheet, you’ve probably used or seen
      functions for doing date math—in other words, taking one date and adding some number
      of days or months to it to get a new date, or taking two
      dates and finding the number days between them.
      The same thing can be done from the command line using
      the lowly date command, possibly with a little
      help from Bash’s arithmetic.

      The two most important features of the date command to
      understand for doing date math are the +FORMAT option
      and the –date option.
      The formatting option allows you to format the date in different ways
      or get just certain parts of the date, such as the year,
      the month, the day and so on:

      $ date ‘+%Y’
      2018
      $ date ‘+%m’
      09
      $ date ‘+%d’
      16

      There are a few dozen formatting options; see the date(1)
      man page for more.

      The second option, the –date (or -d) option, allows you to specify
      the date to use, rather than the current date:

      $ date –date ‘March 1, 2015’ “+%Y”
      2015
      $ date –date=’March 1, 2015′ “+%m”
      03
      $ date -d ‘March 1, 2015’ “+%d”
      01

      The interesting part of the –date option is that it allows you to
      specify date strings in a variety of ways. For example, given the
      above date of “March 1, 2015”, you can calculate dates relative to it:

      $ date –date ‘March 1, 2015 +7 days’
      Sun Mar 8 00:00:00 MST 2015
      $ date –date ‘March 1, 2015 -1 year’
      Sat Mar 1 00:00:00 MST 2014
      $ date –date ‘March 1, 2015 +12 days +12 hours +15 minutes’
      Fri Mar 13 12:15:00 MST 2015

      You also can use strings that refer to previous or upcoming days
      of the week (relative to the current date):

      $ date –date ‘last Monday’
      Mon Sep 10 00:00:00 MST 2018
      $ date –date ‘next Monday’
      Mon Sep 17 00:00:00 MST 2018

      Note, however, that combining a date and things like “next Monday” does not work.
      The date(1) man page has a bit more information about the types
      of date strings you can specify, however, the GNU Info date page
      has much more complete documentation.

      So now that you’ve seen the basics of doing date math, let’s use it
      to do something.
      This example comes from some recent scripts I was working on
      while organizing Linux Journal’s online archives.
      Each month we publish a new issue.
      Each issue has an issue number that’s one more than the previous issue.
      Issue numbers are easy to deal with when specifying arguments
      to a script, but readers tend to think more in terms of months and years.
      So in a couple places I needed to generate months and years from issue numbers.

      To not complicate the example, let’s ignore a couple breaks in
      LJ‘s publishing history.
      So, let’s use issue #284 from March 2018 as the starting point
      and make all calculations relative to it.
      The script takes one or more issue numbers and prints out the month
      and year corresponding to that issue number:

      $ cat date1.sh
      1 for inum in $*
      2 do
      3 [[ “$inum” =~ ^[0-9]$ ]] || { echo “Invalid issue number: $inum”; continue; }
      4
      5 month=$(date –date=”March 1, 2018 +$((inum – 284)) month” +’%B’)
      6 year=$(date –date=”March 1, 2018 +$((inum – 284)) month” +’%Y’)
      7 printf “Issue %d is from %s, %sn” $inum $month $year
      8 done

      $ bash date1.sh 284 285
      Issue 284 is from March, 2018
      Issue 285 is from April, 2018

      Lines 5 and 6 calculate the number of issues
      that have elapsed since issue 284 using Bash’s arithmetic
      expression syntax: $((inum – 284)).
      That result then is used to add that many months onto the
      date of the first issue, which gives the date
      of the issue in question.
      Then the date command’s format options provides the month and year
      (the %B and %Y format specifiers, respectively).
      Those values next are used to print out the month and year of the issue.
      And just in case you were wondering, issue #1000 will be coming out
      in November 2077.

      One thing that can you trip you up when doing date math is that
      if you use dates near the end of the month when adding or
      subtracting months, you can end up with unexpected results.
      This is because the date command uses the same value for the
      length of each month when it adds months and ignores the fact
      that not all months are the same length.
      So, for example, look what happens if you change the reference
      date in the script above from the start of the month to the end of the month:

      $ cat date2.sh
      5 month=$(date –date=”March 31, 2018 +$((inum – 284)) month” +’%B’)
      6 year=$(date –date=”March 31, 2018 +$((inum – 284)) month” +’%Y’)

      $ bash date2.sh 284 285
      Issue 284 is from March, 2018
      Issue 285 is from May, 2018

      This incorrectly labels issue 285 as being in May rather
      than April.
      You can verify this if you run the effective date command
      by itself:

      $ date –date=”March 31, 2018 +1 month”
      Tue May 1 00:00:00 MST 2018

      Since April has only 30 days, you end up skipping to the first of May.

      The other common type of date math that I mentioned above is calculating
      the difference between two dates.
      Unfortunately, the date command doesn’t support this directly.
      To do that, you need to convert the dates in question into the number
      of seconds since the epoch (using the %s format specifier),
      and then subtract the values and divide by the number of seconds
      in a day (86,400) to get the days in between:

      $ cat date3.sh
      start_date=”March 1, 2018″
      end_date=”March 31, 2018″

      sdate=$(date –date=”$start_date” ‘+%s’)
      edate=$(date –date=”$end_date” ‘+%s’)
      days=$(( (edate – sdate) / 86400 ))
      echo “$days days between $start_date and $end_date”

      $ bash date3.sh
      30 days between March 1, 2018 and March 31, 2018

      In part two of this article, I plan to tackle how to get a
      specific previous day of the week relative to a specific date
      (which, as I noted above, is not directly doable with the date command).
      In other words, I want to be able to do something that effectively
      does the following:

      $ date –date ‘March 1, 2015 previous Monday’ # won’t work
      date: invalid date ‘March 1 2015 previous Monday’

      Source

      Thirty-Eight New Organizations Join The Linux Foundation in August

      SAN FRANCISCO – September 28, 2018 – The Linux Foundation, the nonprofit organization enabling mass innovation through open source, announced the addition of 31 Silver members and 7 Associate members in the month of August. Linux Foundation members help support development of the shared technology resources, while accelerating their own innovation through open source leadership and participation. Linux Foundation member contributions help provide the infrastructure and resources that enable the world’s largest open collaboration communities.

      Since the start of 2018, a new organization has joined the Linux Foundation every day and we are honored to be their partners in Open Source.

      “We are incredibly excited to see the commitment to open source continue to grow with so many new organizations joining The Linux Foundation,” said Jim Zemlin, executive director, The Linux Foundation. “By choosing to invest in the open source community, these members have shown their dedication to advancing innovation, inclusivity and collaboration, and we are eager to work with them going forward.”

      In addition to joining the Foundation, many of the new members have joined Linux Foundation projects like the Academy Software Foundation, Automotive Grade Linux, Cloud Native Computing Foundation, Hyperledger and The Zephyr Project. For a full list of members, visit https://www.linuxfoundation.org/membership/members/.

      Linux Foundation Silver members are organizations that contribute to or otherwise support open source communities and projects. The new Linux Foundation Silver members who joined in the month of August are:

      • Armory Inc. helps software teams ship better software, faster.
      • Arrikto is a self service, multi-cloud, data management system.
      • Beijing Yan Rong Technology Co Ltd is committed to the promotion and development of applications in the field of next-generation software-defined data centers.
      • Blink.inc is a real-time technology photography studio chain.
      • ChainNinja Solutions LLC enables global business transactions with lesser friction at a higher degree of trust using blockchain technologies.
      • CloudBolt Software helps enterprise IT build, deploy, and manage access to multiple private and public clouds for effective hybrid cloud orchestration.
      • CStack Technology offers full-stack cloud products and business oriented hybrid-cloud solutions.
      • Datapace is a blockchain powered data marketplace with technical and policy-based data verification, and access to the worldwide network of sensors.
      • DNEG is one of the world’s leading visual effects, animation and stereo conversion companies for feature film and television.
      • Education Ecosystem is a decentralized learning ecosystem that teaches people how to build complete products in future technological fields.
      • Foundries.io delivers secure, over-the-air updatable software platforms for embedded product development.
      • KubeMQ is a messaging backend for microservices, built for efficient migration from .NET/MSMQ to containers managed by Kubernetes.
      • Lacework brings speed and automation to every cloud security process.
      • NextCloud offers industry-leading on-premises file sync and online collaboration technology.
      • Northstar Ventures (BlockTech) is a full service technology commercialization company specializing in enterprise software solutions, security token offerings, strategic portfolio investments and joint ventures.
      • One Convergence provides infrastructure solutions to optimize the cloud native data center.
      • Opsani applies machine learning to automate and continuously optimize performance of cloud applications and enable autonomous operations.
      • OVH Hosting Inc provides digital, innovative and secure infrastructures for professionals, startups, small and large companies and large accounts.
      • Peer Ledger uses cutting edge blockchain technology to help companies collaborate to protect humans rights, improve environmental performance and significantly reduce risks in their supply chains.
      • PipelineAI continuously trains, optimizes, and serves machine-learning models on live-streaming data directly in production.
      • PRODYNA is an innovative IT consultancy serving the digital needs of corporate enterprises across the continent.
      • Pulumi delivers cloud native infrastructure as code on any cloud with real programming languages and a consistent programming model.
      • Robin Systems, Inc. operates as an application virtualization software company that provides application-defined data center software solutions to enterprises.
      • Shanghai Qiniu Information Technologies Co., Inc. provides Internet data storage services.
      • SoluTech, Inc. is a data storage and management platform that leverages in-house Blockchain technology
      • Synadia Communications is a simple, high performance open source messaging system for cloud native applications, IoT messaging, and microservices architecture.
      • Syncsort Inc provides enterprise software for Fortune 100 companies to collect, integrate, sort, and distribute data.
      • Transwarp Technology (Shanghai) Co., Ltd specializes in developing database platforms in the Big Date era.
      • Veniam, Inc builds city-scale networks of connected vehicles that expand wireless coverage.
      • VEXXHOST Inc. works with its users to help architect, configure and optimize their cloud infrastructure to reduce expenses and increase productivity.
      • YLD! Limited provides expert advice on implementing the newest technologies into your business strategy.

      Associate members of The Linux Foundation include government agencies and not-for-profit organizations that have demonstrated a commitment to building, sustaining, and using open source technologies. The following organizations are new Linux Foundation Associate members:

      With the support of its members, The Linux Foundation hosts open source projects across technologies including networking, security, cloud, blockchain, and more. This collaborative development model is helping technology advance at a rapid pace in a way that benefits individuals and organizations around the world.

      Note – The Linux Foundation releases a look back list of new members joining the organization every month.

      About The Linux Foundation

      The Linux Foundation is the organization of choice for the world’s top developers and companies to build ecosystems that accelerate open technology development and industry adoption. Together with the worldwide open source community, it is solving the hardest technology problems by creating the largest shared technology investment in history. Founded in 2000, The Linux Foundation today provides tools, training and events to scale any open source project, which together deliver an economic impact not achievable by any one company. More information can be found at www.linuxfoundation.org.

      # # #

      The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page: https://www.linuxfoundation.org/trademark-usage. Linux is a registered trademark of Linus Torvalds.

      Source

      OpenBSD 6.3 released ( Download of the day )

      OpenBSD version 6.3 has been released. OpenBSD is demonstrating to be an excellent server operating system. Security is more critical now than ever before. OpenBSD leads the pack when it comes to security features. OpenBSD provides a very robust and trustworthy system that comes with the cutting-edge security feature. OpenBSD 6.3 continues to offer the “multi-platform, ultra-secure operating system” experience. The OpenBSD team releases a new version every six months.

      What’s new in OpenBSD 6.3

      Some of the new features and systems include improved hardware support for:

      • Raspberry PI soc i.e. Broadcom BCM2835/BCM2836/BCM2837
      • New driver for EFI runtime services
      • Rockchip RK3328/RK3328 SoC support has been addedd
      • Allwinner A10/A20, A23/A33, A80 and R40/V40 SoCs support has been added
      • Allwinner A33, GR8 and R40/V40 SoCs support has been added
      • SAS3.5 MegaRAIDs support has been added
      • Intel Cannon Lake and Ice Lake integrated Ethernet support has been added
      • Virtual machine monitor (vmm) and virtual machine daemon (vmd) support has been improved
      • Network stack improvements
      • Installer improvements
      • Routing daemons and other userland network improvements
      • OpenBSD/arm64 now uses kernel page table isolation to mitigate Spectre variant 3 (Meltdown) attacks
      • Introduce “execpromises” in pledge
      • OpenSSH 7.7
      • OpenSMTPD 6.0.4
      • LibreSSL 2.7.2
      • Many pre-built packages for various architecture like aarch64, amd64 and more

      How to upgrade OpenBSD 6.2 to 6.3

      Upgrades only supported from version 6.2 release to the 6.3 release. The procedure to update version 6.2 to 6.3 is a pretty stretch forward and simple:

      1. Boot into version 6.2 server/desktop
      2. Grab version 6.3 kernel install kernel named bsd.rd
      3. Verify kernel file
      4. Install the kernel using the mv command
      5. Reboot the box
      6. Boot from the install kernel by typing ‘b bsd.rd’ at boot> prompt
      7. Follow on-screen installation procedure for upgrade
      8. When done reboot the box and upgrade all package by running the ‘pkg_add -u -v’ command

      OpenBSD 6.3 releasedMy OpenBSD version 6.3 server

      Video demo

      Download OpenBSD 6.3 iso images and more

      You can grab OpenBSD iso images or usb images by visiting this page. The release page contains a more complete list of changes, and the upgrade page gives recommendations on how to upgrade to the version 6.3 release.

      Posted by: Vivek Gite

      The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

      Source

      The Illustrated TLS Connection | Linux.com

      Every byte of a TLS connection explained and reproduced.

      In this demonstration, a client has connection to a server, negotiated a TLS 1.2 session, sent “ping”, received “pong”, and then terminated the session. Click below to begin exploring.

      Client Hello

      The session begins with the client saying “Hello”. The client provides the following:

      • protocol version
      • client random data (used later in the handshake)
      • an optional session id to resume
      • a list of cipher suites
      • a list of compression methods
      • a list of extensions

      Annotations16 03 01 00 a5 01 00 00 a1 03 03 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 00 00 20 cc a8 cc a9 c0 2f c0 30 c0 2b c0 2c c0 13 c0 09 c0 14 c0 0a 00 9c 00 9d 00 2f 00 35 c0 12 00 0a01 00 00 58 00 00 00 18 00 16 00 00 13 65 78 61 6d 70 6c 65 2e 75 6c 66 68 65 69 6d 2e 6e 65 74 00 05 00 05 01 00 00 00 00 00 0a 00 0a 00 08 00 1d 00 17 00 18 00 19 00 0b 00 02 01 00 00 0d 00 12 00 10 04 01 04 03 05 01 05 03 06 01 06 03 02 01 02 03 ff 01 00 01 00 00 12 00 00

      Read more at Ulfheim.net

      Click Here!

      Source

      WP2Social Auto Publish Powered By : XYZScripts.com