------------------------------------------------------------------------ - OpenBSD 5.6 RELEASED ------------------------------------------------- November 1, 2014. We are pleased to announce the official release of OpenBSD 5.6. This is our 36th release on CD-ROM (and 37th via FTP/HTTP). We remain proud of OpenBSD's record of more than ten years with only two remote holes in the default install. As in our previous releases, 5.6 provides significant improvements, including new features, in nearly all areas of the system: - LibreSSL: o This release forks OpenSSL into LibreSSL, a version of the TLS/crypto stack with goals of modernizing the codebase, improving security, and applying best practice development processes. o No support for legacy MacOS, Netware, OS/2, VMS and Windows platforms, as well as antique compilers. o Removal of the IBM 4758, Broadcom ubsec, Sureware, Nuron, GOST, GMP, CSwift, CHIL, CAPI, Atalla and AEP engines, either because the hardware is irrelevant, or because they require external non-free libraries to work. o No support for FIPS-140 compliance. o No EBCDIC support. o No support for big-endian i386 and amd64 platforms. o Use standard routines from the C library (malloc, strdup, snprintf...) instead of rolling our own, sometimes badly. o Remove the old OpenSSL PRNG, and rely upon arc4random_buf from libc for all the entropy needs. o Remove the MD2 and SEED algorithms. o Remove J-PAKE, PSK and SRP (mis)features. o Aggressive cleaning of BN memory when no longer used. o No support for Kerberos. o No support for SSLv2. o No support for the questionable DTLS heartbeat extension. o No support for TLS compression. o No support for US-Export SSL ciphers. o Do not use the current time as a random seed in libssl. o Support for ChaCha and Poly1305 algorithm. o Support for Brainpool and ANSSI elliptic curves. o Support for AES-GCM and ChaCha20-Poly1305 AEAD modes. - Improved hardware support, including: o SCSI Multipathing support via mpath(4) and associated path drivers on several architectures. o New qlw(4) driver for QLogic ISP SCSI HBAs. o New qla(4) driver for QLogic ISP2100/2200/2300 Fibre Channel HBAs. o New upd(4) sensor driver for USB Power Devices (UPS). o New brswphy(4) driver for Broadcom BCM53xx 10/100/1000TX Ethernet PHYs. o New uscom(4) driver for simple USB serial adapters. o New axen(4) driver for ASIX Electronics AX88179 10/100/Gigabit USB Ethernet devices. o The inteldrm(4) and radeondrm(4) drivers have improved suspend/resume support. o The userland interface for the agp(4) driver has been removed. o The rtsx(4) driver now supports card readers based on the RTS5227 and RTL8402 chipsets. o The firmware for the run(4) driver has been updated to version 0.33. o The run(4) driver now supports devices based on the RT3900E chipset. o The zyd(4) driver, which was broken for some time, has been fixed. o The bwi(4) driver now works in systems with more than 1GB of RAM. o The re(4) driver now supports devices based on the RTL8168EP/8111EP, RTL8168G/8111G, and RTL8168GU/8111GU chipsets. - Generic network stack improvements: o divert(4) now supports checksum offload. o IPv6 is now turned off on new interfaces by default. Assigning an IPv6 address will enable IPv6 on an interface. o Support for RFC4620 IPv6 Node Information Queries has been removed. o The kernel no longer supports the SO_DONTROUTE socket option. o The getaddrinfo(3) function now supports the AI_ADDRCONFIG flag defined in RFC 3493. o Include router alert option (RAO) in IGMP packets, as required by RFC2236. o ALTQ has been removed. o The hash table for Protocol Control Block (PCB) of TCP and UDP now resize automatically on load. - Installer improvements: o Remove ftp and tape as install methods. o Preserve the disklabel (and next 6 blocks) when installing boot block on 4k-sector disk drives. o Change the "Server?" question to "HTTP Server?" to allow unambiguous autoinstall(8) handling. o Allow autoinstall(8) to fetch and install sets from multiple locations. o Many sample configuration files have moved from /etc to /etc/examples. - Routing daemons and other userland network improvements: o When used with the -v flag, tcpdump(8) now shows the actual bad checksum within the IP/protocol header itself and what the good checksum should be. o ftp(1) now allows its User-Agent to be changed via the -U command-line option. o The -r option of ping(8) and traceroute(8) has been removed. o ifconfig(8) can now explicitly assign an IPv6 link-local address and turn IPv6 autoconf on or off. o ifconfig(8) has been made smarter about parsing WEP keys on the command line. o ifconfig(8) scan now shows the encryption type of wireless networks (WEP, WPA, WPA2, 802.1x). o MS-CHAPv1 (RFC2433) support has been removed from pppd(8). o traceroute6(8) has been merged into traceroute(8). o The asr API for asynchronous address resolution and nameserver querying is now public. o pflow(4)'s pflowproto 9 has been removed. o The userland ppp(8) daemon and its associated PPPoE helper, pppoe(8), have been removed. o snmpd(8), snmpctl(8), and relayd(8) now communicate via the AgentX protocol. o relayd(8) has a new filtering subsystem, where the new configuration language uses last-matching pf-like rules. o The new relayd(8) filter rules now support URL-based relaying. o relayd(8) now uses privilege separation for private keys. This acts as an additional mitigation to prevent leakage of the private keys from the processes doing SSL/TLS. o New httpd(8) HTTP server with FastCGI and SSL support. - OpenSMTPD 5.4.3 (includes changes to 5.4.2): o New/changed features: - OpenSMTPD replaces Sendmail as the default MTA. - Queue process now runs under a different user for better isolation. - Merged MDA, MTA and SMTP processes into a single unprivileged process. - Killed the MFA process, it is no longer needed. - Added support for email addresses lookups in the table_db backend. - Added RSA privilege separation support to prevent possible private key leakage. o The following significant bugs have been fixed in this release: - Minor bug fixes in some corner cases of the routing logic. - The enqueuer no longer adds its own User-Agent. - Disabled profiling code, allowing all processes to rest rather than waking up every second. - Reworked the purge task to avoid disk-hits unless necessary... only once at startup. - Fix various header parsing bugs in the local enqueuer. - Assorted minor fixes and code cleanups. - Security improvements: o Changed the heuristics of the stack protector to also protect functions with local array definitions and references to local frame addresses. This matches the -fstack-protector-strong option of upstream GCC. o Position-independent executables (PIE) are now used by default on powerpc. o Removed Kerberos. o Default bcrypt hash type is now $2b$. o Remove md5crypt support. o Improved easier to use bcrypt API is now available. o Increase randomness of random mmap mappings. o Added getentropy(2). o Added timingsafe_memcmp(3). o Removed the MD4 hash algorithm and functions from cksum(1), S/Key, and libc. o gets(3) has been removed. o Added reallocarray(3), which allows multiple sized objects to be allocated without the cost of clearing memory while avoiding possible integer overflows. o Extended fread(3) and fwrite(3) to check for integer overflows. - Assorted improvements: o locate databases for both base and xenocara, as /usr/lib/locate/src.db and /usr/X11R6/lib/locate/xorg.db. o Much faster package updates, due to package contents reordering that precludes re-downloading unchanged files. o Fix many programs that failed when accessing disks having sector sizes other than 512 bytes, including badsect(8), df(1), dump(8), dumpfs(8), fsck_ext2fs(8), fsck_ffs(8), fsdb(8), growfs(8), ncheck_ffs(8), quotacheck(8), tunefs(8). o Constrain MSDOS timestamps to 1/1/1980 through 12/31/2107. 64-bit time_t values outside that range are stored as 1/1/1980. o bs(6) now prints a battleship splash screen. o rcp, rsh, rshd, rwho, rwhod, ruptime, asa, bdes, fpr, mkstr, page, spray, xstr, oldrdist, fsplit, uyap, and bluetooth have been removed. o rmail(8) and uucpd(8) have been removed from the base system and added to the ports tree. o Lynx has been removed from the base system and added to the ports tree. o TCP Wrappers have been removed. o Fix atexit(3) recursive handlers. o Enhance disklabel(8) to recover filesystem mountpoint information when reading saved ascii labels. o Properly handle msgbuf_write(3) EOF conditions, including uses in tmux(1), dvmrpd(8), ldapd(8), ldpd(8), ospf6d(8), ospfd(8), relayd(8), ripd(8), smtpd(8), ypldap(8). o Constrain fdisk(8) '-l' to disk sizes of 64 blocks or more. o Sync fdisk(8) built-in MBR with current /usr/mdec/mbr. o Quiet dhclient(8) '-q' even more. o Log less redundant dhclient(8) info. o New leases, lease renewals, cable state changes more obvious to applications monitoring dhclient(8) files. o Preserve chronological order of leases in the dhclient.leases(5) leases files. o Use 'lease {}' statements in dhclient.conf(5), allowing interfaces to get an address when no dynamic lease is available. o Improve dhclient(8) parsing and printing of classess static routes. o Eliminate unnecessary rewrites of resolv.conf(5) by dhclient(8). o Added sendsyslog(2): syslog(3) now works even when out of file descriptors or in a chroot. o Added errc(3), verrc(3), warnc(3) and vwarnc(3). o Faster hibernate/unhibernate performance on amd64 and i386 platforms. o Support hibernating to softraid(4) crypto volumes. o Improved performance of seekdir(3) to start of current buffer. o Added per the revision of the POSIX spec in progress. o Apache has been removed. o Read support for ext4 filesystems. o Reworked mplocks as ticket locks instead of spinlocks on amd64, i386, and sparc64. This provides fairer access to the kernel lock between logical CPUs, especially in multi socket systems. - OpenSSH 6.7: o Potentially-incompatible changes: - sshd(8): The default set of ciphers and MACs has been altered to remove unsafe algorithms. In particular, CBC ciphers and arcfour* are disabled by default. - sshd(8): Support for tcpwrappers/libwrap has been removed. - OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections using the "curve25519-sha256@libssh.org" KEX exchange method to fail when connecting with something that implements the specification correctly. OpenSSH 6.7 disables this KEX method when speaking to one of the affected versions. o New/changed features: - Major internal refactoring to begin to make part of OpenSSH usable as a library. So far the wire parsing, key handling and KRL code has been refactored. Please note that we do not consider the API stable yet, nor do we offer the library in separable form. - ssh(1), sshd(8): Add support for Unix domain socket forwarding. A remote TCP port may be forwarded to a local Unix domain socket and vice versa or both ends may be a Unix domain socket. - ssh(1), ssh-keygen(1): Add support for SSHFP DNS records for Ed25519 key types. - sftp(1): Allow resumption of interrupted uploads. - ssh(1): When rekeying, skip file/DNS lookups of the hostkey if it is the same as the one sent during initial key exchange. (bz#2154) - sshd(8): Allow explicit ::1 and 127.0.0.1 forwarding bind addresses when GatewayPorts=no; allows client to choose address family. (bz#2222) - sshd(8): Add a sshd_config(5) PermitUserRC option to control whether ~/.ssh/rc is executed, mirroring the no-user-rc authorized_keys option. (bz#2160) - ssh(1): Add a %C escape sequence for LocalCommand and ControlPath that expands to a unique identifer based on a hash of the tuple of (local host, remote user, hostname, port). Helps avoid exceeding miserly pathname limits for Unix domain sockets in multiplexing control paths. (bz#2220) - sshd(8): Make the "Too many authentication failures" message include the user, source address, port and protocol in a format similar to the authentication success/failure messages. (bz#2199) - Added unit and fuzz tests for refactored code. o The following significant bugs have been fixed in this release: - sshd(8): Fix remote forwarding with same listen port but different listen address. - ssh(1): Fix inverted test that caused PKCS#11 keys that were explicitly listed in ssh_config(5) or on the commandline not to be preferred. - ssh-keygen(1): Fix bug in KRL generation: multiple consecutive revoked certificate serial number ranges could be serialised to an invalid format. Readers of a broken KRL caused by this bug will fail closed, so no should-have-been-revoked key will be accepted. - ssh(1): Reflect stdio-forward ("ssh -W host:port ...") failures in exit status. Previously we were always returning 0. (bz#2255) - ssh(1), ssh-keygen(1): Make Ed25519 keys' title fit properly in the randomart border. (bz#2247) - ssh-agent(1): Only cleanup agent socket in the main agent process and not in any subprocesses it may have started (e.g. forked askpass). Fixes agent sockets being zapped when askpass processes fatal(). (bz#2236) - ssh-add(1): Make stdout line-buffered; saves partial output getting lost when ssh-add(1) fatal()s part-way through (e.g. when listing keys from an agent that supports key types that ssh-add(1) doesn't). (bz#2234) - ssh-keygen(1): When hashing or removing hosts, don't choke on "@revoked" markers and don't remove "@cert-authority" markers. (bz#2241) - ssh(1): Don't fatal when hostname canonicalisation fails and a ProxyCommand is in use; continue and allow the ProxyCommand to connect anyway (e.g. to a host with a name outside the DNS behind a bastion). - scp(1): When copying local->remote fails during read, don't send uninitialised heap to the remote end. - sftp(1): Fix fatal "el_insertstr failed" errors when tab-completing filenames with a single quote char somewhere in the string. (bz#2238) - ssh-keyscan(1): Scan for Ed25519 keys by default. - ssh(1): When using VerifyHostKeyDNS with a DNSSEC resolver, down-convert any certificate keys to plain keys and attempt SSHFP resolution. Prevents a server from skipping SSHFP lookup and forcing a new-hostkey dialog by offering only certificate keys. - sshd(8): Avoid crash at exit via NULL pointer reference. (bz#2225) - Fix some strict-alignment errors. - mandoc 1.13.0: o New implementation of apropos(1), whatis(1), and makewhatis(8) based on SQLite3 databases. o Substantial improvements of mandoc(1) error and warning messages. o Almost complete implementation of roff(7) numerical expressions. o About a dozen minor new features and numerous bug fixes. - Ports and packages: o Over 8,800 ports. - Many pre-built packages for each architecture: o i386: 8588 o sparc64: 7965 o alpha: 6278 o sh: 2626 o amd64: 8588 o powerpc: 8049 o sparc: 3394 o arm: 5633 o hppa: 6143 o vax: 1995 o mips64: 4686 o mips64el: 6697 o m88k: 2475 - Some highlights: o GNOME 3.12.2 o KDE 3.5.10 and 4.13.3 o Xfce 4.10 o MySQL 5.1.73 o PostgreSQL 9.3.4 o Postfix 2.11.1 o OpenLDAP 2.3.43 and 2.4.39 o GHC 7.6.3 o Mozilla Firefox 31.0 o LibreOffice 4.1.6.2 o Mozilla Thunderbird 31.0 o Vim 7.4.135 o Emacs 21.4 and 24.3 o Python 2.7.8, 3.3.5 and 3.4.1 o PHP 5.3.28, 5.4.30 and 5.5.14 o Mono 3.4.0 o Ruby 1.8.7.374, 1.9.3.545, 2.0.0.481 and 2.1.2 o Tcl/Tk 8.5.15 and 8.6.1 o Groff 1.22.2 o JDK 1.6.0.32 and 1.7.0.55 o GCC 4.6.4, 4.8.3 and 4.9.0 o Chromium 36.0.1985.125 o Go 1.3 o LLVM/Clang 3.5 (20140228) o Node.js 0.10.28 - As usual, steady improvements in manual pages and other documentation. - The system includes the following major components from outside suppliers: o Xenocara (based on X.Org 7.7 with xserver 1.15.2 + patches, freetype 2.5.3, fontconfig 2.11.1, Mesa 10.2.3, xterm 309, xkeyboard-config 2.11 and more) o Gcc 4.2.1 (+ patches) and 3.3.6 (+ patches) o Perl 5.18.2 (+ patches) o Nginx 1.6.0 (+ patches) o SQLite 3.8.4.3 (+ patches) o Sendmail 8.14.8, with libmilter o Bind 9.4.2-P2 (+ patches) o NSD 4.0.3 o Sudo 1.7.2p8 o Ncurses 5.7 o Binutils 2.15 (+ patches) o Gdb 6.3 (+ patches) o Less 458 (+ patches) o Awk Aug 10, 2011 version If you'd like to see a list of what has changed between OpenBSD 5.5 and 5.6, look at http://www.OpenBSD.org/plus56.html Even though the list is a summary of the most important changes made to OpenBSD, it still is a very very long list. ------------------------------------------------------------------------ - SECURITY AND ERRATA -------------------------------------------------- We provide patches for known security threats and other important issues discovered after each CD release. As usual, between the creation of the OpenBSD 5.6 HTTP/CD-ROM binaries and the actual 5.6 release date, our team found and fixed some new reliability problems (note: most are minor and in subsystems that are not enabled by default). Our continued research into security means we will find new security problems -- and we always provide patches as soon as possible. Therefore, we advise regular visits to http://www.OpenBSD.org/security.html and http://www.OpenBSD.org/errata.html ------------------------------------------------------------------------ - MAILING LISTS -------------------------------------------------------- Mailing lists are an important means of communication among users and developers of OpenBSD. For information on OpenBSD mailing lists, please see: http://www.OpenBSD.org/mail.html ------------------------------------------------------------------------ - CD-ROM SALES --------------------------------------------------------- OpenBSD 5.6 is also available on CD-ROM. The 3-CD set costs 44 EUR and is available via web order worldwide. The CD set includes a colourful booklet which carefully explains the installation of OpenBSD. A new set of cute little stickers is also included (sorry, but our HTTP mirror sites do not support STP, the Sticker Transfer Protocol). As an added bonus, the second CD contains an audio track, a song entitled "Ride of the Valkyries". MP3 and OGG versions of the audio track can be found on the first CD. Lyrics (and an explanation) for the songs may be found at: http://www.OpenBSD.org/lyrics.html#56 Profits from CD sales are the primary income source for the OpenBSD project -- in essence selling these CD-ROM units ensures that OpenBSD will continue to make another release six months from now. The OpenBSD 5.6 CD-ROMs are bootable on the following platforms: o i386 o amd64 o macppc o sparc64 (Other platforms must boot from network, floppy, or other method). For more information on ordering CD-ROMs, see: http://www.OpenBSD.org/orders.html All of our developers strongly urge you to buy a CD-ROM and support our future efforts. Additionally, donations to the project are highly appreciated, as described in more detail at: http://www.OpenBSD.org/donations.html ------------------------------------------------------------------------ - OPENBSD FOUNDATION --------------------------------------------------- For those unable to make their contributions as straightforward gifts, the OpenBSD Foundation (http://www.openbsdfoundation.org) is a Canadian not-for-profit corporation that can accept larger contributions and issue receipts. In some situations, their receipt may qualify as a business expense write-off, so this is certainly a consideration for some organizations or businesses. There may also be exposure benefits since the Foundation may be interested in participating in press releases. In turn, the Foundation then uses these contributions to assist OpenBSD's infrastructure needs. Contact the foundation directors at directors@openbsdfoundation.org for more information. ------------------------------------------------------------------------ - T-SHIRT SALES -------------------------------------------------------- The OpenBSD distribution companies also sell T-shirts and polo shirts, with new and old designs, available from our web ordering system. ------------------------------------------------------------------------ - HTTP INSTALLS -------------------------------------------------------- If you choose not to buy an OpenBSD CD-ROM, OpenBSD can be easily installed via HTTP downloads. Typically you need a single small piece of boot media (e.g., a USB flash drive) and then the rest of the files can be installed from a number of locations, including directly off the Internet. Follow this simple set of instructions to ensure that you find all of the documentation you will need while performing an install via HTTP. With the CD-ROMs, the necessary documentation is easier to find. 1) Read either of the following two files for a list of HTTP mirrors which provide OpenBSD, then choose one near you: http://www.OpenBSD.org/ftp.html http://ftp.openbsd.org/pub/OpenBSD/ftplist As of November 1, 2014, the following HTTP mirror sites have the 5.6 release: http://ftp.eu.openbsd.org/pub/OpenBSD/5.6/ Stockholm, Sweden http://ftp.bytemine.net/pub/OpenBSD/5.6/ Oldenburg, Germany http://ftp.ch.openbsd.org/pub/OpenBSD/5.6/ Zurich, Switzerland http://ftp.fr.openbsd.org/pub/OpenBSD/5.6/ Paris, France http://ftp5.eu.openbsd.org/pub/OpenBSD/5.6/ Vienna, Austria http://mirror.aarnet.edu.au/pub/OpenBSD/5.6/ Brisbane, Australia http://ftp.usa.openbsd.org/pub/OpenBSD/5.6/ CO, USA http://ftp5.usa.openbsd.org/pub/OpenBSD/5.6/ CA, USA http://mirror.esc7.net/pub/OpenBSD/5.6/ TX, USA The release is also available at the master site: http://ftp.openbsd.org/pub/OpenBSD/5.6/ Alberta, Canada However it is strongly suggested you use a mirror. Other mirror sites may take a day or two to update. 2) Connect to that HTTP mirror site and go into the directory pub/OpenBSD/5.6/ which contains these files and directories. This is a list of what you will see: ANNOUNCEMENT alpha/ luna88k/ sparc/ Changelogs/ amd64/ macppc/ sparc64/ HARDWARE armv7/ octeon/ src.tar.gz PACKAGES aviion/ packages/ sys.tar.gz PORTS hppa/ ports.tar.gz tools/ README i386/ root.mail vax/ SHA256 landisk/ sgi/ xenocara.tar.gz SHA256.sig loongson/ socppc/ zaurus/ It is quite likely that you will want at LEAST the following files which apply to all the architectures OpenBSD supports. README - generic README HARDWARE - list of hardware we support PORTS - description of our ports tree PACKAGES - description of pre-compiled packages root.mail - a copy of root's mail at initial login. (This is really worthwhile reading). 3) Read the README file. It is short, and a quick read will make sure you understand what else you need to fetch. 4) Next, go into the directory that applies to your architecture, for example, amd64. This is a list of what you will see: INSTALL.amd64 cd56.iso index.txt xetc56.tgz SHA256 cdboot* install56.fs xfont56.tgz SHA256.sig cdbr* install56.iso xserv56.tgz base56.tgz comp56.tgz man56.tgz xshare56.tgz bsd* etc56.tgz miniroot56.fs bsd.mp* floppy56.fs pxeboot* bsd.rd* game56.tgz xbase56.tgz If you are new to OpenBSD, fetch _at least_ the file INSTALL.amd64 and install56.iso. The install56.iso file (roughly 250MB in size) is a one-step ISO-format install CD image which contains the various *.tgz files so you do not need to fetch them separately. If you prefer to use a USB flash drive, fetch install56.fs and follow the instructions in INSTALL.amd64. 5) If you are an expert, follow the instructions in the file called README; otherwise, use the more complete instructions in the file called INSTALL.amd64. INSTALL.amd64 may tell you that you need to fetch other files. 6) Just in case, take a peek at: http://www.OpenBSD.org/errata.html This is the page where we talk about the mistakes we made while creating the 5.6 release, or the significant bugs we fixed post-release which we think our users should have fixes for. Patches and workarounds are clearly described there. Note: If you end up needing to write a raw floppy using Windows, you can use "fdimage.exe" located in the pub/OpenBSD/5.6/tools directory to do so. ------------------------------------------------------------------------ - X.ORG FOR MOST ARCHITECTURES ----------------------------------------- X.Org has been integrated more closely into the system. This release contains X.Org 7.7. Most of our architectures ship with X.Org, including amd64, sparc, sparc64 and macppc. During installation, you can install X.Org quite easily. Be sure to try out xdm(1) and see how we have customized it for OpenBSD. ------------------------------------------------------------------------ - PORTS TREE ----------------------------------------------------------- The OpenBSD ports tree contains automated instructions for building third party software. The software has been verified to build and run on the various OpenBSD architectures. The 5.6 ports collection, including many of the distribution files, is included on the 3-CD set. Please see the PORTS file for more information. Note: some of the most popular ports, e.g., the nginx web server and several X applications, come standard with OpenBSD. Also, many popular ports have been pre-compiled for those who do not desire to build their own binaries (see BINARY PACKAGES, below). ------------------------------------------------------------------------ - BINARY PACKAGES WE PROVIDE ------------------------------------------- A large number of binary packages are provided. Please see the PACKAGES file (http://ftp.OpenBSD.org/pub/OpenBSD/5.6/PACKAGES) for more details. ------------------------------------------------------------------------ - SYSTEM SOURCE CODE --------------------------------------------------- The CD-ROMs contain source code for all the subsystems explained above, and the README (http://ftp.OpenBSD.org/pub/OpenBSD/5.6/README) file explains how to deal with these source files. For those who are doing an HTTP install, the source code for all four subsystems can be found in the pub/OpenBSD/5.6/ directory: xenocara.tar.gz ports.tar.gz src.tar.gz sys.tar.gz ------------------------------------------------------------------------ - THANKS --------------------------------------------------------------- Ports tree and package building by Jasper Lievisse Adriaanse, Pierre-Emmanuel Andre, Landry Breuil, Stuart Henderson, Peter Hessler, Nick Holland, Paul Irofti, Sebastian Reitenbach, Miod Vallat, and Christian Weisgerber. System builds by Jasper Lievisse Adriaanse, Kenji Aoyama, Theo de Raadt, Nick Holland, and Miod Vallat. X11 builds by Jasper Lievisse Adriaanse, Kenji Aoyama, Todd Fries, Nick Holland, and Miod Vallat. ISO-9660 filesystem layout by Theo de Raadt. We would like to thank all of the people who sent in bug reports, bug fixes, donation cheques, and hardware that we use. We would also like to thank those who pre-ordered the 5.6 CD-ROM or bought our previous CD-ROMs. Those who did not support us financially have still helped us with our goal of improving the quality of the software. Our developers are: Aaron Bieber, Alexander Bluhm, Alexander Hall, Alexandr Shadchin, Alexandre Ratchov, Andrew Fresh, Anil Madhavapeddy, Anthony J. Bentley, Antoine Jacoutot, Austin Hook, Benoit Lecocq, Bob Beck, Brad Smith, Brandon Mercer, Brent Cook, Bret Lambert, Brett Mahar, Brian Callahan, Camiel Dobbelaar, Charles Longeau, Chris Cappuccio, Christian Weisgerber, Christopher Zimmermann, Claudio Jeker, Damien Miller, Daniel Dickman, Darren Tucker, David Coppa, David Gwynne, Doug Hogan, Edd Barrett, Eric Faurot, Federico G. Schwindt, Florian Obser, Gerhard Roth, Gilles Chehade, Giovanni Bechis, Gleydson Soares, Gonzalo L. Rodriguez, Henning Brauer, Ian Darwin, Igor Sobrado, Ingo Schwarze, Jakob Schlyter, James Turner, Jason McIntyre, Jasper Lievisse Adriaanse, Jeremie Courreges-Anglas, Jeremy Evans, Jim Razmus II, Joel Sing, Joerg Jung, Jonathan Armani, Jonathan Gray, Jonathan Matthew, Jordan Hargrave, Joshua Elsasser, Joshua Stein, Juan Francisco Cantero Hurtado, Kazuya Goda, Kenji Aoyama, Kenneth R Westerback, Kirill Bychkov, Kurt Miller, Landry Breuil, Lawrence Teo, Loganaden Velvindron, Luke Tymowski, Marc Espie, Marco Pfatschbacher, Mark Kettenis, Mark Lumsden, Markus Friedl, Martin Pelikan, Martin Pieuchot, Martin Reindl, Martynas Venckus, Masao Uebayashi, Mats O Jansson, Matthew Dempsky, Matthias Kilian, Matthieu Herrb, Mike Belopuhov, Mike Larkin, Miod Vallat, Naoya Kaneko, Nayden Markatchev, Nicholas Marriott, Nick Holland, Nigel Taylor, Okan Demirmen, Otto Moerbeek, Pascal Stumpf, Paul de Weerd, Paul Irofti, Peter Hessler, Philip Guenther, Pierre-Emmanuel Andre, Raphael Graf, Remi Pointel, Renato Westphal, Reyk Floeter, Robert Nagy, Robert Peichaer, Ryan Thomas McBride, Sasano Takayoshi, Sebastian Benoit, Sebastian Reitenbach, Simon Perreault, Stefan Fritsch, Stefan Sperling, Stephan Rickauer, Steven Mestdagh, Stuart Cassoff, Stuart Henderson, Sylvestre Gallon, Ted Unangst, Theo de Raadt, Tobias Stoeckmann, Tobias Ulmer, Todd C. Miller, Todd Fries, Vadim Zhukov, William Yodlowsky, Wouter Wijngaards, Yasuoka Masahiko, Yojiro Uo