• OpenBSD 6.3 Released - Apr 2, 2018 (1/2)

    From Theo de Raadt@21:1/5 to All on Tue Apr 3 03:05:02 2018
    The release was scheduled for April 15, but since all the components
    are ready ahead of schedule it is being released now.

    ------------------------------------------------------------------------
    - OpenBSD 6.3 RELEASED -------------------------------------------------

    Apr 15, 2018.

    We are pleased to announce the official release of OpenBSD 6.3.
    This is our 44th release. We remain proud of OpenBSD's record of more
    than twenty years with only two remote holes in the default install.

    As in our previous releases, 6.3 provides significant improvements,
    including new features, in nearly all areas of the system:

    - Improved hardware support, including:
    o SMP support on OpenBSD/arm64 platforms.
    o VFP and NEON support on OpenBSD/armv7 platforms.
    o New acrtc(4) driver for X-Powers AC100 audio codec and Real Time
    Clock.
    o New axppmic(4) driver for X-Powers AXP Power Management ICs.
    o New bcmrng(4) driver for Broadcom BCM2835/BCM2836/BCM2837 random
    number generator.
    o New bcmtemp(4) driver for Broadcom BCM2835/BCM2836/BCM2837
    temperature monitor.
    o New bgw(4) driver for Bosch motion sensor.
    o New bwfm(4) driver for Broadcom and Cypress FullMAC 802.11 devices
    (still experimental and not compiled into the kernel by default).
    o New efi(4) driver for EFI runtime services.
    o New imxanatop(4) driver for i.MX6 integrated regulator.
    o New rkpcie(4) driver for Rockchip RK3399 Host/PCIe bridge.
    o New sxirsb(4) driver for Allwinner Reduced Serial Bus controller.
    o New sxitemp(4) driver for Allwinner temperature monitor.
    o New sxits(4) driver for temperature sensor on Allwinner A10/A20
    touchpad controller.
    o New sxitwi(4) driver for two-wire bus found on several Allwinner
    SoCs.
    o New sypwr(4) driver for the Silergy SY8106A regulator.
    o Support for Rockchip RK3328 SoCs has been added to the dwge(4),
    rkgrf(4), rkclock(4) and rkpinctrl(4) drivers.
    o Support for Rockchip RK3288/RK3328 SoCs has been added to the
    rktemp(4) driver.
    o Support for Allwinner A10/A20, A23/A33, A80 and R40/V40 SoCs has
    been added to the sxiccmu(4) driver.
    o Support for Allwinner A33, GR8 and R40/V40 SoCs has been added to
    the sxipio(4) driver.
    o Support for SAS3.5 MegaRAIDs has been added to the mfii(4) driver.
    o Support for Intel Cannon Lake and Ice Lake integrated Ethernet has
    been added to the em(4) driver.
    o cnmac(4) ports are now assigned to different CPU cores for
    distributed interrupt processing.
    o The pms(4) driver now detects and handles reset announcements.
    o On amd64 Intel CPU microcode is loaded on boot and
    installed/updated by fw_update(1).
    o Support the sun4v hypervisor interrupt cookie API, adding support
    for SPARC T7-1/2/4 machines.
    o Hibernate support has been added for SD/MMC storage attached to
    sdhc(4) controllers.
    o clang(1) is now used as the system compiler on armv7, and it is
    also provided on sparc64.

    - vmm(4)/ vmd(8) improvements:
    o Add CD-ROM/DVD ISO support to vmd(8) via vioscsi(4).
    o vmd(8) no longer creates an underlying bridge interface for
    virtual switches defined in vm.conf(5).
    o vmd(8) receives switch information (rdomain, etc) from underlying
    switch interface in conjunction of settings in vm.conf(5).
    o Time Stamp Counter (TSC) support in guest VMs.
    o Support ukvm/Solo5 unikernels in vmm(4).
    o Handle valid (but uncommon) instruction encodings better.
    o Better PAE paging support for 32-bit Linux guest VMs.
    o vmd(8) now allows up to four network interfaces in each VM.
    o Add paused migration and snapshotting support to vmm(4) for AMD
    SVM/RVI hosts.
    o BREAK commands sent over a pty(4) are now understood by vmd(8).
    o Many fixes to vmctl(8) and vmd(8) error handling.

    - IEEE 802.11 wireless stack improvements:
    o The iwm(4) and iwn(4) drivers will automatically roam between
    access points which share an ESSID. Forcing a particular AP's MAC
    address with ifconfig's bssid command disables roaming.
    o Automatically clear configured WEP/WPA keys when a new network
    ESSID is configured.
    o Removed the ability for userland to read configured WEP/WPA keys
    back from the kernel.
    o The iwm(4) driver can now connect to networks with a hidden SSID.
    o USB devices supported by the athn(4) driver now use an open source
    firmware, and hostap mode now works with these devices.

    - Generic network stack improvements:
    o The network stack no longer runs with the KERNEL_LOCK() when IPsec
    is enabled.
    o Processing of incoming TCP/UDP packets is now done without
    KERNEL_LOCK().
    o The socket splicing task runs without KERNEL_LOCK().
    o Cleanup and removal of code in sys/netinet6 since
    autoconfiguration runs in userland now.
    o bridge(4) members can now be prevented to talk to each others with
    the new protected option.
    o The pf divert-packet feature has been simplified. The IP_DIVERTFL
    socket option has been removed from divert(4).
    o Various corner cases of pf divert-to and divert-reply are more
    consistent now.
    o Enforce in pf(4) that all neighbor discovery packets have 255 in
    their IPv6 header hop limit field.
    o New set syncookies option in pf.conf(5).
    o Support for GRE over IPv6.
    o New egre(4) driver for Ethernet over GRE tunnels.
    o Support for the optional GRE key header and GRE key entropy in
    gre(4) and egre(4).
    o New nvgre(4) driver for Network Virtualization using Generic
    Routing Encapsulation.
    o Support for configuring the Don't Fragment flag packets
    encapsulated by tunnel interfaces.

    - Installer improvements:
    o if install.site or upgrade.site fails, notify the user and error
    out after storing rand.seed.
    o allow CIDR notation when entering IPv4 and IPv6 addresses.
    o repair selection of a HTTP mirror from the list of mirrors.
    o allow '-' in usernames.
    o ask a question at the end of the install/upgrade process so
    carriage return causes the appropriate action, e.g. reboot.
    o display the mode (install or upgrade) shell prompts as long as no
    hostname is known.
    o correctly detect which interface has the default route and if it
    was configured via DHCP.
    o ensure sets can be read from the prefetch area.
    o ensure URL redirection is effective for entire install/upgrade.
    o add the HTTP proxy used when fetching sets to rc.firsttime, where
    fw_update and syspatch can find and use it.
    o add logic to support RFC 7217 with SLAAC.
    o ensure that IPv6 is configured for dynamically created network
    interfaces like vlan(4).
    o create correct hostname when both domain-name and domain-search
    options are provided in the DHCP lease.

    - Routing daemons and other userland network improvements:
    o bgpctl(8) has a new ssv option which outputs rib entries as a
    single semicolon-separated like for selection before output.
    o slaacd(8) generates random but stable IPv6 stateless
    autoconfiguration addresses according to RFC 7217. These are
    enabled per default in accordance with RFC 8064.
    o slaacd(8) follows RFC 4862 by removing an artificial limitation on
    /64 sized prefixes using RFC 7217 (random but stable) and RFC 4941
    (privacy) style stateless autoconfiguration addresses.
    o ospfd(8) can now set the metric for a route depending on the
    status of an interface.
    o ifconfig(8) has a new staticarp option to make interfaces reply to
    ARP requests only.
    o ipsecctl(8) can now collapse flow outputs having the same source
    or destination.
    o The -n option in netstart(8) no longer messes with the default
    route. It is now documented as well.

    - Security improvements:
    o Use even more trap-sleds on various architectures.
    o More use of .rodata for constant variables in assembly source.
    o Stop using x86 "repz ret" in dusty corners of the tree.
    o Introduce "execpromises" in pledge(2).
    o The elfrdsetroot utility used to build ramdisks and the rebound(8)
    monitoring process now use pledge(2).
    o Prepare for the introduction of MAP_STACK to mmap(2) after 6.3.
    o Push a small piece of KARL-linked kernel text into the random
    number generator as entropy at startup.
    o Put a small random gap at the top of thread stacks, so that
    attackers have yet another calculation to perform for their ROP
    work.
    o Mitigation for Meltdown vulnerability for Intel brand amd64 CPUs.
    o OpenBSD/arm64 now uses kernel page table isolation to mitigate
    Spectre variant 3 (Meltdown) attacks.
    o OpenBSD/armv7 and OpenBSD/arm64 now flush the Branch Target Buffer
    (BTB) on processors that do speculative execution to mitigate
    Spectre variant 2 attacks.
    o pool_get(9) perturbs the order of items on newly allocated pages,
    making the kernel heap layout harder to predict.
    o The fktrace(2) system call was deleted.

    - dhclient(8) improvements:
    o Parsing dhclient.conf(5) no longer leaks SSID strings, strings
    that are too long for the parsing buffer or repeated string
    options and commands.
    o Storing leases in dhclient.conf(5) is no longer supported.
    o 'DENY' is no longer valid in dhclient.conf(5).
    o dhclient.conf(5) and dhclient.leases(5) parsing error messages
    have been simplified and clarified, with improved behaviour in the
    presence of unexpected semicolons.
    o More care is taken to only use configuration information that was
    successfully parsed.
    o '-n' has been added, which causes dhclient(8) to exit after
    parsing dhclient.conf(5).
    o Default routes in options classless-static-routes (121) and
    classless-ms-static-routes (249) are now correctly represented in
    dhclient.leases(5) files.
    o Overwrite the file specified with '-L' rather than appending to
    it.
    o Leases in dhclient.leases(5) now contain an 'epoch' attribute
    recording the time the lease was accepted, which is used to
    calculate correct renewal, rebinding and expiry times.
    o No longer nag about underscores in names violating RFC 952.
    o Unconditionally send host-name information when requesting a
    lease, eliminating the need for dhclient.conf(5) in the default
    installation.
    o Be quiet by default. '-q' has been removed and '-v' added to
    enable verbose logging.
    o Decline duplicate offers for the requested address.
    o Unconditionally go into the background after link-timeout seconds.
    o Significantly reduce logging when being quiet, but make '-v' log
    all debug information without needing to compile a custom
    executable.
    o Ignore 'interface' statements in dhclient.leases(5) and assume all
    leases in the file are for the interface being configured.
    o Display the source of the lease bound to the interface.
    o 'ignore', 'request' and 'require' declarations in dhclient.conf(5)
    now add the specified options to the relevant list rather than
    replacing the list.
    o Eliminate a startup race that could result in dhclient(8) exiting
    without configuring the interface.

    - Assorted improvements:
    o Code reorganization and other improvements to malloc(3) and
    friends to make them more efficient.
    o When performing suspend or hibernate operations, ensure all
    filesystems are properly synchronized and marked clean, or if they
    cannot be put into perfectly clean state on disk (due to
    open+unlinked files) then mark them dirty, so that a failed
    resume/unhibernate is guaranteed to perform fsck(8).
    o acme-client(1) autodetects the agreement URL and follows 30x HTTP
    redirects.
    o Added __cxa_thread_atexit() to support modern C++ tool chains.
    o Added EVFILT_DEVICE support to kqueue(2) for monitoring changes to
    drm(4) devices.
    o ldexp(3) now handles the sign of denormal numbers correctly on
    mips64.
    o New sincos(3) functions in libm.
    o fdisk(8) now ensures the validity of MBR partition offsets entered
    while editing.
    o fdisk(8) now ensures that default values lie within the valid
    range.
    o less(1) now splits only the environment variable LESS on '$'.
    o less(1) no longer creates a spurious file when encountering '$' in
    the initial command.
    o softraid(4) now validates the number of chunks when assembling a
    volume, ensuring the on-disk and in-memory metadata are in sync.
    o disklabel(8) now always offers to edit an FFS partition's fragment
    size before offering to edit the blocksize.
    o disklabel(8) now allows editing the cylinders/group (cpg)
    attribute whenever the partition blocksize can be edited.
    o disklabel(8) now detects ^D and invalid input during (R)esize
    commands.
    o disklabel(8) now detects underflows and overflows when -/+
    operators are used.
    o disklabel(8) now avoids an off-by-one when calculating the number
    of cylinders in a free chunk.
    o disklabel(8) now validates the requested partition size against
    the size of the largest free chunk instead of the total free
    space.
    o Support for dumping USB transfers via bpf(4).
    o tcpdump(8) can now understand dumps of USB transfers in the
    USBPcap format.
    o The default prompts of csh(1), ksh(1) and sh(1) now include the
    hostname.
    o Memory allocation in ksh(1) was switched from calloc(3) back to
    malloc(3), making it easier to recognize uninitialized memory. As
    a result, a history-related bug in emacs editing mode was
    discovered and fixed.
    o New script(1) -c option to run a command instead of a shell.
    o New grep(1) -m option to limit the number of matches.
    o New uniq(1) -i option for case-insensitive comparison.
    o The printf(3) format string is no longer validated when looking
    for % formats. Based on a commit by android and following most
    other operating systems.
    o Improved error checking in vfwprintf(3).
    o Many base programs have been audited and fixed for stale file
    descriptors, including cron(8), ftp(1), mandoc(1), openssl(1),
    ssh(1) and sshd(8).
    o Various bug fixes and improvements in jot(1):
    - Arbitrary length limits for the arguments for the -b, -s, -w
    options were removed.
    - The %F format specifier is now supported and a bug in the %D
    format was fixed.
    - Better code coverage in regression tests.
    - Several buffer overruns were fixed.
    o The patch(1) utility now copes better with git diffs that create
    or delete files.
    o pkg_add(1) now has improved support for HTTP(S) redirectors such
    as cdn.openbsd.org.
    o ftp(1) and pkg_add(1) now support HTTPS session resumption for
    improved speed.
    o mandoc(1) -T ps output file size reduced by more than 50%.
    o syslogd(8) logs if there were warnings during startup.
    o syslogd(8) stopped logging to files in a full filesystem. Now it
    writes a warning and continues after space has been made
    available.
    o vmt(4) now allows cloning and taking disk-only snapshots of
    running guests.

    - OpenSMTPD 6.0.4
    o Add spf walk option to smtpctl(8).
    o Assorted cleanups and improvements.
    o Numerous manual page fixes and improvements.

    - OpenSSH 7.7
    o New/changed features:
    - All: Add experimental support for PQC XMSS keys (Extended
    Hash- Based Signatures) based on the algorithm described in
    https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-s
    ignatures-12 The XMSS signature code is experimental and not
    compiled in by default.
    - sshd(8): Add a "rdomain" criteria for the sshd_config Match
    keyword to allow conditional configuration that depends on
    which routing domain a connection was received on (currently
    supported on OpenBSD and Linux).
    - sshd_config(5): Add an optional rdomain qualifier to the
    ListenAddress directive to allow listening on different
    routing domains. This is supported only on OpenBSD and Linux
    at present.
    - sshd_config(5): Add RDomain directive to allow the
    authenticated session to be placed in an explicit routing
    domain. This is only supported on OpenBSD at present.
    - sshd(8): Add "expiry-time" option for authorized_keys files
    to allow for expiring keys.
    - ssh(1): Add a BindInterface option to allow binding the
    outgoing connection to an interface's address (basically a
    more usable BindAddress).
    - ssh(1): Expose device allocated for tun/tap forwarding via a
    new %T expansion for LocalCommand. This allows LocalCommand
    to be used to prepare the interface.
    - sshd(8): Expose the device allocated for tun/tap forwarding
    via a new SSH_TUNNEL environment variable. This allows
    automatic setup of the interface and surrounding network
    configuration automatically on the server.
    - ssh(1)/scp(1)/sftp(1): Add URI support to ssh, sftp and scp,
    e.g. ssh://user@host or sftp://user@host/path. Additional
    connection parameters described in
    draft-ietf-secsh-scp-sftp-ssh-uri-04 are not implemented
    since the ssh fingerprint format in the draft uses the
    deprecated MD5 hash with no way to specify the any other
    algorithm.
    - ssh-keygen(1): Allow certificate validity intervals that
    specify only a start or stop time (instead of both or
    neither).
    - sftp(1): Allow "cd" and "lcd" commands with no explicit path
    argument. lcd will change to the local user's home directory
    as usual. cd will change to the starting directory for
    session (because the protocol offers no way to obtain the
    remote user's home directory). bz#2760
    - sshd(8): When doing a config test with sshd -T, only require
    the attributes that are actually used in Match criteria
    rather than (an incomplete list of) all criteria.
    o The following significant bugs have been fixed in this release:
    - ssh(1)/sshd(8): More strictly check signature types during
    key exchange against what was negotiated. Prevents downgrade
    of RSA signatures made with SHA-256/512 to SHA-1.
    - sshd(8): Fix support for client that advertise a protocol
    version of "1.99" (indicating that they are prepared to
    accept both SSHv1 and SSHv2). This was broken in OpenSSH 7.6
    during the removal of SSHv1 support. bz#2810
    - ssh(1): Warn when the agent returns a ssh-rsa (SHA1)
    signature when a rsa-sha2-256/512 signature was requested.
    This condition is possible when an old or non-OpenSSH agent
    is in use. bz#2799
    - ssh-agent(1): Fix regression introduce in 7.6 that caused
    ssh-agent to fatally exit if presented an invalid signature
    request message.
    - sshd_config(5): Accept yes/no flag options
    case-insensitively, as has been the case in ssh_config(5) for
    a long time. bz#2664
    - ssh(1): Improve error reporting for failures during
    connection. Under some circumstances misleading errors were
    being shows. bz#2814
    - ssh-keyscan(1): Add -D option to allow printing of results
    directly in SSHFP format. bz#2821
    - regress tests: fix PuTTY interop test broken in last
    release's SSHv1 removal. bz#2823
    - ssh(1): Compatibility fix for some servers that erroneously
    drop the connection when the IUTF8 (RFC8160) option is sent.
    - scp(1): Disable RemoteCommand and RequestTTY in the ssh
    session started by scp (sftp was already doing this.)
    - ssh-keygen(1): Refuse to create a certificate with an
    unusable number of principals.
    - ssh-keygen(1): Fatally exit if ssh-keygen is unable to write
    all the public key during key generation. Previously it would
    silently ignore errors writing the comment and terminating
    newline.
    - ssh(1): Do not modify hostname arguments that are addresses
    by automatically forcing them to lower-case. Instead
    canonicalise them to resolve ambiguities (e.g. ::0001 => ::1)
    before they are matched against known_hosts. bz#2763
    - ssh(1): Don't accept junk after "yes" or "no" responses to
    hostkey prompts. bz#2803
    - sftp(1): Have sftp print a warning about shell cleanliness
    when decoding the first packet fails, which is usually caused
    by shells polluting stdout of non-interactive startups.
    bz#2800
    - ssh(1)/sshd(8): Switch timers in packet code from using
    wall-clock time to monotonic time, allowing the packet layer
    to better function over a clock step and avoiding possible
    integer overflows during steps.
    - Numerous manual page fixes and improvements.

    - LibreSSL 2.7.2
    o Added support for many OpenSSL 1.0.2 and 1.1 APIs, based on
    observations of real-world usage in applications. These are
    implemented in parallel with existing OpenSSL 1.0.1 APIs -
    visibility changes have not been made to existing structs,
    allowing code written for older OpenSSL APIs to continue working.
    o Extensive corrections, improvements, and additions to the API
    documentation, including new public APIs from OpenSSL that had no
    pre-existing documentation.
    o Added support for automatic library initialization in libcrypto,
    libssl, and libtls. Support for pthread_once or a compatible
    equivalent is now required of the target operating system. As a
    side-effect, minimum Windows support is Vista or higher.
    o Converted more packet handling methods to CBB, which improves
    resiliency when generating TLS messages.
    o Completed TLS extension handling rewrite, improving consistency of
    checks for malformed and duplicate extensions.
    o Rewrote ASN1_TYPE_{get,set}_octetstring() using templated ASN.1.
    This removes the last remaining use of the old M_ASN1_* macros
    (asn1_mac.h) from API that needs to continue to exist.
    o Added support for client-side session resumption in libtls. A
    libtls client can specify a session file descriptor (a regular
    file with appropriate ownership and permissions) and libtls will
    manage reading and writing of session data across TLS handshakes.
    o Improved support for strict alignment on ARMv7 architectures,
    conditionally enabling assembly in those cases.
    o Fixed a memory leak in libtls when reusing a tls_config.
    o Merged more DTLS support into the regular TLS code path, removing
    duplicated code.

    - Ports and packages:
    o Pre-built packages are available for the following architectures on
    the day of release:
    - aarch64 (arm64): 7790
    - alpha: 1
    - amd64: 9912
    - i386: 9361
    - mips64: 8149
    - sh: 1
    o Packages for the following architectures will be made available as
    their builds complete:
    - arm
    - hppa
    - mips64el
    - powerpc
    - sparc64
    o dpb(1) and normal ports(7) can now enjoy the same privilege
    separated model by setting PORTS_PRIVSEP=Yes

    - Some highlights:

    o AFL 2.52b o Mutt 1.9.4 and NeoMutt 20180223
    o Cmake 3.10.2 o Node.js 8.9.4
    o Chromium 65.0.3325.181 o Ocaml 4.03.0
    o Emacs 21.4 and 25.3 o OpenLDAP 2.3.43 and 2.4.45
    o GCC 4.9.4 o PHP 5.6.34 and 7.0.28
    o GHC 8.2.2 o Postfix 3.3.0 and 3.4-20180203
    o Gimp 2.8.22 o PostgreSQL 10.3
    o GNOME 3.26.2 o Python 2.7.14 and 3.6.4
    o Go 1.10 o R 3.4.4
    o Groff 1.22.3 o Ruby 2.3.6, 2.4.3 and 2.5.0
    o JDK 8u144 o Rust 1.24.0
    o KDE 3.5.10 and 4.14.3 (plus o Sendmail 8.16.0.21
    KDE4 core updates) o SQLite 3.22.0
    o LLVM/Clang 5.0.1 o Sudo 1.8.22
    o LibreOffice 6.0.2.1 o Tcl/Tk 8.5.19 and 8.6.8
    o Lua 5.1.5, 5.2.4, and 5.3.4 o TeX Live 2017
    o MariaDB 10.0.34 o Vim 8.0.1589
    o Mozilla Firefox 52.7.2esr and o Xfce 4.12
    59.0.1
    o Mozilla Thunderbird 52.6.0

    - As usual, steady improvements in manual pages and other documentation.

    - The system includes the following major components from outside suppliers:
    o Xenocara (based on X.Org 7.7 with xserver 1.19.6 + patches,
    freetype 2.8.1, fontconfig 2.12.4, Mesa 13.0.6, xterm 330,
    xkeyboard-config 2.20 and more)
    o LLVM/Clang 5.0.1 (+ patches)
    o GCC 4.2.1 (+ patches) and 3.3.6 (+ patches)
    o Perl 5.24.3 (+ patches)
    o NSD 4.1.20
    o Unbound 1.6.8
    o Ncurses 5.7
    o Binutils 2.17 (+ patches)
    o Gdb 6.3 (+ patches)
    o Awk Aug 10, 2011 version
    o Expat 2.2.5

    ------------------------------------------------------------------------
    - SECURITY AND ERRATA --------------------------------------------------

    We provide patches for known security threats and other important
    issues discovered after each release. Our continued research into
    security means we will find new security problems -- and we always
    provide patches as soon as possible. Therefore, we advise regular
    visits to

    https://www.OpenBSD.org/security.html
    and
    https://www.OpenBSD.org/errata.html

    ------------------------------------------------------------------------
    - MAILING LISTS AND FAQ ------------------------------------------------

    Mailing lists are an important means of communication among users and developers of OpenBSD. For information on OpenBSD mailing lists, please
    see:

    https://www.OpenBSD.org/mail.html

    You are also encouraged to read the Frequently Asked Questions (FAQ) at:

    https://www.OpenBSD.org/faq/

    ------------------------------------------------------------------------
    - DONATIONS ------------------------------------------------------------

    The OpenBSD Project is volunteer-driven software group funded by
    donations. Besides OpenBSD itself, we also develop important software
    like OpenSSH, LibreSSL, OpenNTPD, OpenSMTPD, the ubiquitous pf packet
    filter, the quality work of our ports development process, and many
    others. This ecosystem is all handled under the same funding umbrella.

    We hope our quality software will result in contributions that maintain
    our build/development infrastructure, pay our electrical/internet costs,
    and allow us to continue operating very productive developer hackathon
    events.

    All of our developers strongly urge you to donate and support our future efforts. Donations to the project are highly appreciated, and are
    described in more detail at:

    https://www.OpenBSD.org/donations.html

    ------------------------------------------------------------------------
    - OPENBSD FOUNDATION ---------------------------------------------------

    For those unable to make their contributions as straightforward gifts,
    the OpenBSD Foundation (http://www.openbsdfoundation.org) is a Canadian not-for-profit corporation that can accept larger contributions and
    issue receipts. In some situations, their receipt may qualify as a
    business expense write-off, so this is certainly a consideration for
    some organizations or businesses.

    There may also be exposure benefits since the Foundation may be
    interested in participating in press releases. In turn, the Foundation
    then uses these contributions to assist OpenBSD's infrastructure needs.
    Contact the foundation directors at directors@openbsdfoundation.org for
    more information.

    ------------------------------------------------------------------------
    - RELEASE SONGS --------------------------------------------------------

    Every OpenBSD release is accompanied by artwork and a song. A song may
    be coming for the 6.3 release, but later. If so, lyrics (and an
    explanation) of the song may be found at:

    https://www.OpenBSD.org/lyrics.html

    ------------------------------------------------------------------------
    - HTTP/HTTPS INSTALLS --------------------------------------------------

    OpenBSD can be easily installed via HTTP/HTTPS downloads. Typically you
    need a single small piece of boot media (e.g., a USB flash drive) and
    then the rest of the files can be installed from a number of locations, including directly off the Internet. Follow this simple set of
    instructions to ensure that you find all of the documentation you will
    need while performing an install via HTTP/HTTPS.

    1) Read either of the following two files for a list of HTTP/HTTPS
    mirrors which provide OpenBSD, then choose one near you:

    https://www.OpenBSD.org/ftp.html
    https://ftp.openbsd.org/pub/OpenBSD/ftplist

    As of March 31, 2018, the following HTTP/HTTPS mirror sites have
    the 6.3 release:

    https://ftp.eu.openbsd.org/pub/OpenBSD/6.3/ Stockholm, Sweden
    https://ftp.hostserver.de/pub/OpenBSD/6.3/ Frankfurt, Germany
    http://ftp.bytemine.net/pub/OpenBSD/6.3/ Oldenburg, Germany
    https://ftp.fr.openbsd.org/pub/OpenBSD/6.3/ Paris, France
    https://mirror.aarnet.edu.au/pub/OpenBSD/6.3/ Brisbane, Australia
    https://ftp.usa.openbsd.org/pub/OpenBSD/6.3/ CO, USA
    https://ftp5.usa.openbsd.org/pub/OpenBSD/6.3/ CA, USA
    https://mirror.esc7.net/pub/OpenBSD/6.3/ TX, USA
    https://openbsd.cs.toronto.edu/pub/OpenBSD/6.3/ Toronto, Canada
    https://fastly.cdn.openbsd.org/pub/OpenBSD/6.3/ Global

    The release is also available at the master site:

    https://ftp.openbsd.org/pub/OpenBSD/6.3/ Alberta, Canada

    However it is strongly suggested you use a mirror.

    Other mirror sites may take a day or two to update.

    2) Connect to that HTTP/HTTPS mirror site and go into the directory
    pub/OpenBSD/6.3/ which contains these files and directories.
    This is a list of what you will see:

    ANNOUNCEMENT arm64/ macppc/ src.tar.gz
    Changelogs/ armv7/ octeon/ sys.tar.gz
    README hppa/ packages/ tools/
    SHA256 i386/ ports.tar.gz xenocara.tar.gz
    SHA256.sig landisk/ root.mail
    alpha/ loongson/ sgi/
    amd64/ luna88k/ sparc64/

    It is quite likely that you will want at LEAST the following
    files which apply to all the architectures OpenBSD supports.

    README - generic README
    root.mail - a copy of root's mail at initial login.
    (This is really worthwhile reading).

    3) Read the README file. It is short, and a quick read will make
    sure you understand what else you need to fetch.

    4) Next, go into the directory that applies to your architecture,
    for example, amd64. This is a list of what you will see:

    BOOTIA32.EFI* bsd* floppy63.fs pxeboot*
    BOOTX64.EFI* bsd.mp* game63.tgz xbase63.tgz
    BUILDINFO bsd.rd* index.txt xfont63.tgz
    INSTALL.amd64 cd63.iso install63.fs xserv63.tgz
    SHA256 cdboot* install63.iso xshare63.tgz
    SHA256.sig cdbr* man63.tgz
    base63.tgz comp63.tgz miniroot63.fs

    If you are new to OpenBSD, fetch _at least_ the file INSTALL.amd64
    and install63.iso. The install63.iso file (roughly 346MB in size)

    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)