User: Password:
Subscribe / Log in / New account Weekly Edition for July 28, 2005

An OLS wrapup

The seventh annual Ottawa Linux Symposium has come to an end. Your editor, who has attended six of the seven OLS events, finds the conference in good [Ottawa art shot] health. OLS was larger this year - some 700 people - but it has handled its growth well. OLS remains one of the premier Linux development gatherings worldwide.

A look at the schedule reveals some clear themes for this event. Virtualization is obviously at the top of the list for many OLS attendees; the largest room was dedicated to the topic for a full day. This was perhaps the most kernel-oriented schedule yet from an already kernel-dominated event; there was hardly enough non-kernel content to fill even a single track. Those who are interested in the user space side of free software may find themselves drifting toward other events; but kernel people will find plenty of interest at OLS.

OLS is an increasingly professional event; the proportion of students and part-time hackers attending the event appears to have dropped over the years. Registration fees can be as high as C$750. A surprising number of the attendees are mostly concerned with what their customers want from Linux; these are people who are making their living in a way which at least involves Linux and free software.

As always, there was no trade show floor at OLS; nobody is trying to sell anything to the attendees. OLS is very much about technology and development communities, and little about hype.

Your editor, rather than trying to provide exhaustive coverage of the event, attended some of the more interesting sessions. The resulting articles have been posted over the last week; for convenience, they are:

  • A challenge for developers. Jim Gettys thinks that free software developers have to get past the "mantra of one," build the multiuser, cooperative systems of the future, and take the lead for the next generation of computing.

  • Linux and trusted computing. IBM engineers Emily Ratliff and Tom Lendacky discuss the current state of Linux support for the "trusted platform module" (TPM) chip and some of the good things that it can do for us. Trusted computing does not have to be an evil thing.

  • Xen and UML. Lead developers from the two most prominent Linux paravirtualization projects discuss where those projects are and what's coming next.

There was much more than the above at OLS this year; your editor, in particular, appreciated Keith Packard's discussion of the TWIN window system (designed for very small devices), Michael Austin Halcrow's description of the eCryptfs filesystem (hopefully to be written up in the future), Rusty Russell's discussion of nfsim, and Pat Mochel's sysfs talk. The Wednesday reception featured talks by Doug Fisher of Intel (who nearly got booed off the stage when it became clear that his talk was being run from a Windows system) and Art Cannon from IBM. Art's talk, a buzzword-loaded presentation on how to talk to business people about open source, was well received but hard to follow due to the poor acoustics and high noise level in the room. If you gather several hundred people (many of whom have not seen each other over the past year) into a room and give them all the beer they want, it can be hard to get them to sit down, be quiet, and listen to somebody talk about business stuff.

[Dave Jones and Andrew Morton] Dave Jones's ending keynote, instead, got everybody's full attention. Dave, who, among other things, is the current maintainer of Red Hat's kernels, is concerned with the number of regressions and other bugs seen in recent kernels. The quality of our kernels, says Dave, is going down as a result of regressions, and driver regressions in particular.

There's a lot of reasons for the problems. They date back, perhaps, to the adoption of BitKeeper. With BK, Linus could quickly pull in a large set of patches from a subsystem maintainer without really looking at them all. So BitKeeper increased the velocity of patches through the system, with some cost as to the quality. The real problem, however, is one of testing. The only way to really find kernel bugs is to have the kernel tested by a wide variety of users. This is particularly true for driver bugs; nobody, not even the driver maintainer, can possibly have all of the hardware needed to perform even remotely comprehensive testing. It takes a large community of users to do that.

When testing does happen, we need to make it easier for users to report bugs. Requiring a user to create a BugZilla account and fill in vast amounts of information for a (possibly) tiny bug is counterproductive; many bug reporters will simply give up and go away. Bug reporting should be a simple and quick operation.

There are, in any case, quite a few challenges involved in dealing with bug reporters; this was Dave's opportunity to complain a little about the frustrations of his job. Bug reporters tend to always see their bug as the most important one (so, he says, bug reporting systems should not allow reporters to set the severity of the bug); they will continue to mess with the system while others are trying to fix the bug, making confirmation of fixes difficult; some of them file a bug and disappear, not responding to requests for important information; they will lie about the configuration of their systems (and the presence of binary-only modules in particular); and so on. The receiving end of a major distribution's bug tracking system can be a difficult place to be.

The question of the proper place to report bugs came up. Many bugs seen by end users are really bugs in the upstream package, not in a particular distribution's version of it. Those bugs should be reported to the real, upstream maintainer. Some distributions (Debian, for example) see this reporting as their responsibility; others would like bug reporters to go directly upstream. Dave, in particular, notes that quite a few kernel bugs show up only in the Red Hat BugZilla system; they never make it to the (not universally used) kernel BugZilla. How many other distributors, he wonders, have kernel bugs sitting in their bug trackers which should really be reported to the community? In the future, it would be nice if BugZilla installations could talk to each other so that bugs could be forwarded to the right place; however, each BugZilla evidently has its own schema, making that sort of communication difficult.

Dave noted that the kernel has gotten significantly more complicated over the time he has been working on it. Coming up to speed and really understanding what is happening inside the kernel is a challenging task. Kernel developers need to recognize this and take advantage of all the techniques and tools which are available to them to produce better releases.

Next year's keynote speaker will be Greg Kroah-Hartman.

The final event of OLS is the infamous Black Thorn party; it is the ideal way to unwind after an intense week of conferencing. The Black Thorn is getting a little small, however; one of the OLS organizers was asking people to put their backpacks aside so there would be room for everybody to stand. If OLS continues to grow, the final event may have to happen somewhere else.

Comments (11 posted)

Git approaches 1.0

On April 5, 2005, it was announced that BitMover would "focus exclusively" on its commercial BitKeeper offering and withdraw the free-beer client used by a number of free software developers. This was a nervous moment; BitKeeper had become an integral part of the Linux kernel development process. Nobody wanted to go back to the old days - when no source code management system was used at all - but there was no clear successor to BitKeeper on offer.

And where might such a successor have been expected to come from? We had been told many times that the development of BitKeeper required numerous person-years of work and millions of dollars of funding. The free software community was simply not up to the task of creating a tool with that sort of capabilities - especially not in a hurry. The kernel development community, having lost a tool it relied upon heavily, appeared doomed to a long painful period of adjustment.

Two full days later, Linus announced the first release of a tool called "git." It was, he said, "_really_ nasty," but it was a starting point. On April 20, fifteen days after the withdrawal of BitKeeper, the 2.6.12-rc3 kernel prepatch, done entirely with git, was released. The git tool, in those days, was clearly suitable only for early adopters, but, even then, it was also clearly going somewhere.

Git brings with it some truly innovative concepts; it is not a clone of any other source code management system. Indeed, at its core, it is not really an SCM at all. What git offers is a content-addressable object filesystem. If you store a file in git, it does not really have a name; instead, it can be looked up using its contents (as represented by an SHA hash). A hierarchical grouping of files - a particular kernel release, for example - is represented by a separate "tree" object listing which files are part of the group and where they are to be found. Files do not have any history - they simply exist or not, and two versions of the same file are only linked by virtue of being in the same place in two different tree objects.

This way of organizing things is hard to grasp, initially, but it makes some interesting things possible. One of the harder problems in many SCM systems - handling the renaming of files - requires no special care with git. A single git repository can hold any number of branches or parallel trees without confusion. File integrity checking is built into the basic lookup mechanism, so that corruption will be detected automatically, and, if desired, kernel releases can be cryptographically signed easily. Perhaps most importantly, however: git made certain options, such as the merging of patches, very fast.

It's worth noting that git is not a clone of BitKeeper, or of any other SCM. Certainly it incorporates lessons learned from years of use of BitKeeper and other tools; it supports changesets, for example, and is designed to be used in a distributed mode. But git is something new, it brings a unique approach to the problem.

Watching the git development process snowball over the last few months has been fascinating. A large and active development community coalesced around git in short order; interestingly, relatively few of the core git developers were significant kernel contributors. In a short period of time, git has acquired most of the features expected from an SCM, its rough edges have been smoothed, it has picked up a variety of graphical interfaces, and it is widely used in the kernel development community. Git is clearly a success.

The git developers are now working toward a 1.0 release. As part of that process, Linus has now handed git over to a new maintainer: Junio Hamano. Junio has been an active git developer for some time; he will now attempt to take the project forward as its leader. He will have plenty of work ahead of him as git moves into a more stable (though still fast-moving) phase.

Git is an example of how well the free software process can work. Linus has shown us, once again, that he knows how to get a successful free software project started: put out a minimal (but well thought out) core that begins to solve a problem, then let the community run with it. The result is a vibrant, living project which incorporates the best of what has been learned before while simultaneously breaking new ground. The creator of the Linux kernel appears to have launched another winner.

But, then, some things still seem to surprise even Linus:

August 25, 1991July 26, 2005
"I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones." "...this thing ended up being a bit bigger and more professional than I originally even envisioned."

Let this be a lesson to all free software developers out there: the humblest of projects can, with the right ideas and participation, become far more "big and professional" than one might ever imagine.

Comments (6 posted)

A Firefox roadmap update

July 27, 2005

This article was contributed by Joe 'Zonker' Brockmeier.

The Mozilla Foundation is shaking up its roadmap a little -- though not "scrapping" the 1.1 release as had been reported in some outlets. The 1.1 release was originally planned for this month, but that has been changed to a 1.5 release planned for September. Chris Hofmann, Mozilla's director of engineering, talked to us about the change in the roadmap, and what's ahead for Firefox and Thunderbird.

Hofmann said that the version number change was made for a number of reasons:

[The change] is partly technical, one of the features that is going into this next release is a software updating feature, so we were able to do a better job of testing incremental updates with this software update feature. As we move up the numbering scale, and make sure that all of that detection and ability to deal with numbering changes works with part of the software update system and more importantly, recognizes the progress that we've made in the last six months getting a number of features into the product that we hadn't expected to be there and this far along.

Firefox developer Asa Dotzler also wrote about the change:

One major consideration in this decision was the sheer volume of changes in the Firefox core (Gecko) made a minor .1 increment seem misleading. While it may not be obvious by looking simply at release dates, today's Gecko core of Firefox has seen nearly 16 months worth of changes compared to what shipped in Firefox 1.0. This is because we created our Gecko 1.7 branch (the branch from which Firefox 1.0 shipped) back in April of 2004. At that time, Gecko development on the trunk continued and very little of that work was carried over to the 1.7 branch to be included in Firefox 1.0.

Indeed, there are quite a few new features and other changes in Firefox 1.5, many of which we covered on LWN with the first Deer Park Alpha release. The 1.5 release should have improvements in pop-up blocking, tab reordering, Scalable Vector Graphics (SVG) support and ECMAScript for XML (E4X) support.

One of the improvements that Hofmann highlighted for 1.5 is Firefox's extensions system. According to Hofmann, the 1.5 release will handle versioning information of extensions and "ability for the browser to recognize extensions that might be incompatible with specific releases." Hofmann also said that this release would allow the user to turn extensions on and off, something that the Firefox 1.0 does not allow -- though some extensions, like Greasemonkey do provide that feature directly.

The 1.0 to 1.5 jump will also bring about some changes to the Firefox API, which may affect extensions that work with the current interface.

There's a pretty big shift in the API set for applications and extensions that are moving from 1.0 to 1.5, most of the extension authors have taken the work to make extensions that are going to be compatible with 1.5. There might be a few more changes we make in the next few weeks of the development cycle, but by the time we get to 1.5 release, the goal is to have a very large percentage of the extensions available be compatible with that release.

Thunderbird is also being shifted from a 1.1 release to a 1.5 release around the same time frame as Firefox. Hofmann said that the version bump for Thunderbird was, in part, because development had been moving along nicely for Thunderbird as well -- but also because the Mozilla Foundation is trying to keep version numbers for both applications in sync. He noted that Thunderbird 1.5 would have improvements in spam detection and for detecting phishing attacks, in-line spell checking and improved RSS features. Thunderbird 1.5 will also feature improvements for updates, and users should be able to do updates from Thunderbird directly.

Though the feature sets are sketchy at this point, the Mozilla Foundation's roadmap calls for a Firefox 2.0 release in early 2006 and a Firefox 3.0 by the end of 2006. One feature that Hofmann talked about for future releases is Xul Runner. According to Hofmann, Xul Runner will allow Firefox, Thunderbird and other applications "to share core components of technology." According to Hofmann, any one of the Mozilla applications would include the core features, and then users would only need to download "a thin layer" for additional applications.

Hofmann said that the first instance of Xul Runner would be available "around the time we ship Firefox 1.5," and that the next versions of Firefox and Thunderbird would be built on top of Xul Runner and "allow sharing of common code" that both applications use.

Given the amount of time 1.5 has been in development (Firefox 1.0 was released in November, 2004) it seems a bit ambitious to plan the 2.0 and 3.0 releases in 2006. However, anything is possible. Meanwhile, the Firefox 1.5 Beta is scheduled for August, and a second alpha release is available now for brave souls who can't wait for new features, or who are eager to help in testing.

Comments (4 posted)

Page editor: Jonathan Corbet


Greasemonkey gets into trouble

July 27, 2005

This article was contributed by Joe 'Zonker' Brockmeier.

The ability to add extensions to Firefox has proven to be a popular feature. One of the most popular extensions for Firefox, inspiring countless user scripts, is the Greasemonkey extension, which allows users change the behavior of web sites.

A serious vulnerability was found in Greasemonkey last week by Mark Pilgrim, author of the upcoming book "Greasemonkey Hacks," and Dive Into Greasemonkey. Pilgrim discovered that a combination of two flaws in Greasemonkey could allow user data to be transmitted to virtually any site.

We spoke to Pilgrim about the vulnerabilities, and the security of Greasemonkey in general. According to Pilgrim, Greasemonkey's first flaw would allow a web page access to the APIs to call remote pages. A page with an exploit for this vulnerability would allow the exploit to call code from other sites without the user being aware of it. This could include posting data to another site.

The second exploit allowed pages to access file URLs, which could allow a remote site to browse the content of a user's hard drive. In conjunction with the first vulnerability, "remote pages could access any file on your system... [they could] recurse through the entire hard drive and post it anywhere in the world, really. And that's bad."

These vulnerabilities are fixed in the 3.5 version of Greasemonkey, though it is a "neutered" version that lacks the Greasemonkey APIs. Pilgrim said that a beta had been released that should retain functionality and clear up the security holes that he had found.

The new version disables file URLs altogether for that API function, so even user scripts are not allowed to do that anymore, and second of all, closes the hole that allows remote page you're browsing to trap the API call. The pages you browse now no longer have access to any of the Greasemonkey internals. User scripts can still use it... but the page you're browsing can't steal access to those pages.

Even though the vulnerability has been closed in the latest versions of Greasemonkey, Pilgrim said that users could still be vulnerable to malicious user scripts. "Greasemonkey is very powerful, and people need to be aware what they're installing." Indeed, there does seem to be a level of concern that the problems with Greasemonkey are in its features, not its vulnerabilities. The concept of allowing users to run scripts in the browser developed by third parties, who may not have the users' best interests in mind, opens up some scary possibilities.

Since Firefox and Greasemonkey are becoming increasingly popular with less technical users, we asked Pilgrim how those users could verify that the scripts they install were safe, and if there was any way for the Greasemonkey team to protect those users.

Basically, there's no technical solution to that, Greasemonkey allows you so much power, that you can't stop people from writing malicious scripts...without making Greasemonkey useless.

We also asked Chris Hofmann, director of engineering for Mozilla, about the Greasemonkey vulnerability and whether the Mozilla developers could do anything to make extensions safer for users. Hofmann also said that much of the responsibility lies with the user to verify the source and function of extensions. "Users should take caution for any extensions they download, and to authenticate the source of the extension." He also explained that the default operation of the browser was to warn users before installing any software, to prevent any extensions or scripts from being installed without the user's knowledge.

It's worth noting that Firefox is not unique in allowing extensions or add-ons like Greasemonkey. Pilgrim noted that Turnabout for Internet Explorer performed the same function for IE, by allowing users to run scripts to change the function of websites. Just as with Firefox, Turnabout users could easily run malicious scripts if they're not careful about where they acquire them.

There's really nothing unique about the Greasemonkey situation, though. Spyware and adware have propagated in large part because users have been willing to download and install software without questioning the source of the software or any possible side-effects. The best that the Greasemonkey team can do is ensure that their software is not subject to vulnerabilities like the two that Pilgrim discovered. Beyond that, the responsibility will remain with the user to verify that extensions, scripts and other software is suitable for use.

Comments (4 posted)

New vulnerabilities

ClamAntiVirus: integer overflows

Package(s):clamav CVE #(s):CAN-2005-2450
Created:July 26, 2005 Updated:August 16, 2005
Description: Clam AntiVirus versions < 0.86.2 is vulnerable to integer overflows when handling the TNEF, CHM and FSG file formats. By sending a specially-crafted file an attacker could execute arbitrary code with the permissions of the user running Clam AntiVirus.
Debian DSA-776-1 clamav 2005-08-16
Mandriva MDKSA-2005:125 clamav 2005-07-27
Gentoo 200507-25 clamav 2005-07-26

Comments (none posted)

fetchmail: buffer overflow

Package(s):fetchmail CVE #(s):CAN-2005-2335
Created:July 21, 2005 Updated:August 12, 2005
Description: The fetchmail POP3 client has an arbitrary code execution vulnerability that may be triggered by a malicious POP server. See this advisory for more information.
Debian DSA-774-1 fetchmail 2005-08-12
Mandriva MDKSA-2005:126 fetchmail 2005-07-28
OpenPKG OpenPKG-SA-2005.016 fetchmail 2005-07-28
Ubuntu USN-153-1 fetchmail 2005-07-26
Gentoo 200507-21 fetchmail 2005-07-25
Red Hat RHSA-2005:640-01 fetchmail 2005-07-25
Slackware SSA:2005-203-05 fetchmail 2005-07-23
Fedora FEDORA-2005-614 fetchmail 2005-07-21
Fedora FEDORA-2005-613 fetchmail 2005-07-21

Comments (none posted)

httpd: off-by-one overflow and cross-site scripting

Package(s):apache httpd CVE #(s):CAN-2005-1268 CAN-2005-2088
Created:July 25, 2005 Updated:November 7, 2005
Description: Watchfire reported a flaw that occurred when using the Apache server as an HTTP proxy. A remote attacker could send an HTTP request with both a "Transfer-Encoding: chunked" header and a "Content-Length" header. This caused Apache to incorrectly handle and forward the body of the request in a way that the receiving server processes it as a separate HTTP request. This could allow the bypass of Web application firewall protection or lead to cross-site scripting (XSS) attacks.

Marc Stern reported an off-by-one overflow in the mod_ssl CRL verification callback. In order to exploit this issue the Apache server would need to be configured to use a malicious certificate revocation list (CRL).

Slackware SSA:2005-310-04 apache 2005-11-07
Debian DSA-803-1 apache 2005-09-08
Ubuntu USN-160-2 apache 2005-09-07
SuSE SUSE-SA:2005:046 apache,apache2 2005-08-16
Fedora-Legacy FLSA:157701 Apache 2005-08-10
Ubuntu USN-160-1 apache2 2005-08-04
Mandriva MDKSA-2005:130 apache 2005-08-03
Mandriva MDKSA-2005:129 apache2 2005-08-03
Fedora FEDORA-2005-638 httpd 2005-08-02
Fedora FEDORA-2005-639 httpd 2005-08-02
Trustix TSLSA-2005-0038 multi 2005-07-29
SuSE SUSE-SR:2005:018 multi 2005-07-28
Red Hat RHSA-2005:582-01 apache httpd 2005-07-25

Comments (none posted)

libgadu: integer overflows

Package(s):libgadu CVE #(s):CAN-2005-1852
Created:July 22, 2005 Updated:July 27, 2005
Description: libgadu, a library implementing the Gadu messaging protocol, suffers from a set of integer overflow vulnerabilities. This vulnerability affects a number of other packages; see, for example, this KDE advisory for kdenetwork and Kopete.
Gentoo 200507-26 gnugadu 2005-07-27
Debian DSA-767-1 ekg 2005-07-27
Gentoo 200507-23 kopete 2005-07-25
Slackware SSA:2005-203-02 kdenetwork 2005-07-22
Fedora FEDORA-2005-623 kdenetwork 2005-07-22
Fedora FEDORA-2005-624 kdenetwork 2005-07-22
Red Hat RHSA-2005:639-01 kdenetwork 2005-07-21

Comments (none posted)

movemail: arbitrary code execution

Package(s):movemail CVE #(s):
Created:July 21, 2005 Updated:July 27, 2005
Description: The emacs movemail POP utility has an arbitrary code execution vulnerability that can be activated by connecting to a malicious POP server.
Slackware SSA:2005-201-02 emacs 2005-07-21

Comments (none posted)

phpbb2: cross-site scripting

Package(s):phpbb2 CVE #(s):CAN-2005-2161
Created:July 27, 2005 Updated:July 27, 2005
Description: The phpbb2 package suffers from a cross-site scripting vulnerability.
Debian DSA-768-1 phpbb2 2005-07-27

Comments (none posted)

sandbox: insecure temporary file handling

Package(s):sandbox CVE #(s):
Created:July 25, 2005 Updated:July 27, 2005
Description: The Gentoo Linux Security Audit Team discovered that the sandbox utility was vulnerable to multiple TOCTOU (Time of Check, Time of Use) file creation race conditions. Local users may be able to create or overwrite arbitrary files with the permissions of the root user.
Gentoo 200507-22 sandbox 2005-07-25

Comments (none posted)

shorewall: rule bypass vulnerability

Package(s):shorewall CVE #(s):CAN-2005-2317
Created:July 21, 2005 Updated:October 10, 2005
Description: Shorewall has a vulnerability in which a client that is accepted by MAC address filtering can bypass other rules, allowing access to all open services on the firewall.
Ubuntu USN-197-1 shorewall 2005-10-10
Debian DSA-849-1 shorewall 2005-10-08
Gentoo 200507-20:02 Shorewall 2005-07-22
Gentoo 200507-20 Shorewall 2005-07-22
Mandriva MDKSA-2005:123 shorewall 2005-07-20

Comments (none posted)

vim: arbitrary command execution

Package(s):vim CVE #(s):CAN-2005-2368
Created:July 26, 2005 Updated:August 23, 2005
Description: Georgi Guninski discovered that it was possible to construct Vim 6.3 modelines that execute arbitrary shell commands by wrapping them in glob() or expand() function calls. If an attacker tricked an user to open a file with a specially crafted modeline, he could exploit this to execute arbitrary commands with the user's privileges.
Mandriva MDKSA-2005:148 vim 2005-08-22
Red Hat RHSA-2005:745-01 vim 2005-08-22
Fedora FEDORA-2005-741 vim 2005-08-15
Fedora FEDORA-2005-738 vim 2005-08-10
Fedora FEDORA-2005-737 vim 2005-08-10
Ubuntu USN-154-1 vim 2005-07-26

Comments (1 posted)

webcalendar: information disclosure

Package(s):webcalendar CVE #(s):CAN-2005-2320
Created:July 27, 2005 Updated:July 27, 2005
Description: The webcalendar utility suffers from an information disclosure vulnerability.
Debian DSA-766-1 webcalendar 2005-07-26

Comments (none posted)

zlib: buffer overflow

Package(s):zlib CVE #(s):CAN-2005-1849
Created:July 21, 2005 Updated:April 11, 2006
Description: zlib has a vulnerability that can cause code that executes it to crash if a corrupted file is opened.
Mandriva MDKSA-2006:070 sash 2006-04-10
Debian DSA-1026-1 sash 2006-04-06
Gentoo 200603-18 pngcrush 2006-03-21
Ubuntu USN-151-4 rpm 2005-11-09
Ubuntu USN-151-3 aide 2005-10-28
Fedora-Legacy FLSA:162680 Zlib 2005-09-14
Debian DSA-797-1 zsync 2005-09-01
Gentoo 200508-01 Compress-Zlib 2005-08-01
Gentoo 200507-28 AMD64 x86 emulation base libraries 2005-07-30
SuSE SUSE-SA:2005:043 zlib 2005-07-28
OpenPKG OpenPKG-SA-2005.014 zlib 2005-07-28
Mandriva MDKSA-2005:124 zlib 2005-07-22
Slackware SSA:2005-203-03 zlib 2005-07-23
Ubuntu USN-151-2 dpkg, ia32-libs, amd64-libs 2005-07-22
Fedora FEDORA-2005-626 zlib 2005-07-22
Fedora FEDORA-2005-625 zlib 2005-07-22
Gentoo 200507-19 zlib 2005-07-22
Red Hat RHSA-2005:584-01 zlib 2005-07-21
Ubuntu USN-151-1 zlib 2005-07-21
Debian DSA-763-1 zlib 2005-07-20

Comments (none posted)

Page editor: Jonathan Corbet

Kernel development

Brief items

Kernel release status

The current 2.6 prepatch remains 2.6.13-rc3. Linus's git repository continues to accumulate patches; most of them are fixes, but there is also a set of SCSI updates and a set of cleanups for the system shutdown and reboot code.

The current -mm tree is 2.6.13-rc3-mm2. Quite a few patches have been added to -mm recently, but they are almost exclusively fixes for various problems. Andrew estimates there are over 100 patches in -mm which need to go straight into 2.6.13.

The current 2.4 prepatch is 2.4.32-pre2, released by Marcelo on July 27. It includes a small number of fixes, including one which closes a security hole.

Comments (none posted)

Kernel development news

A pair of suspend2 patches

One of the outcomes from the power management summit held on July 17 was a decision to move toward merging Nigel Cunningham's suspend2 patches - at least, those which appear to make sense to the wider community. Suspend2 is an out-of-tree implementation of the suspend-to-disk and suspend-to-ram features which are so nice to have on laptop systems. The suspend2 implementation offers a number of features not found in the mainline version, including nice displays, progress bars, interruptible operation, and, it is said, greater reliability. Getting the better parts of suspend2 into the mainline seems like a clearly desirable goal. Since the summit, Nigel has posted a pair of patches which provide some clues as to what is coming, and how it will be received.

A big part of the software suspend problem is getting the system into a quiescent state before putting it on ice. To that end, processes are put into the "refrigerator," a special sort of suspended animation. When suspend time comes around, every process on the system is sent a special signal telling it that refrigeration time has come; each process, once it gets to a good stopping point, checks itself into the fridge and does not run again until after the system has been resumed.

The problem that this scheme runs into is that some processes are dependent on others. If a process which, for example, is involved with getting data written to disk is refrigerated too early in the process, it may never be possible to get the system to a state where it can be suspended. So the software suspend patches try to figure out which processes must be allowed to continue running while the system is being quiesced. It has always been a bit of a hit-and-miss business. The current suspend2 patches try to clean up that process a bit.

Many of the processes which should not be refrigerated are associated with various driver workqueues. So the mainline suspend code marks every workqueue process with the special PF_NOFREEZE flag, keeping it out of the clutches of the refrigerator. But most of those processes can be refrigerated just fine with no ill effect, and they should be. Having unneeded processes running when the system is trying to suspend itself can only serve to destabilize the entire situation.

Previous versions of the suspend2 patches changed the workqueue API so that every creator of a workqueue had to explicitly state whether it should be refrigerated or not. That approach worked, but it broke every create_workqueue() call. The current patch, instead, leaves the existing calls alone, but extends the API with a couple of new calls:

    struct workqueue_struct *create_nofreeze_workqueue(const char *name);
    struct workqueue_struct *create_nofreeze_singlethread_workqueue(const char *name);

As an aside, one notes that kernel namespace is starting to acquire some very long function names. One might almost wish for the good old days, when only the first six characters of a function name were used.

Seriously, however, these functions show how refrigeration is now handled with workqueues. By default, worker tasks associated with workqueues will be put on ice when the system is suspended. Anybody wishing to create a workqueue which does not behave that way must call one of the new functions.

This change has been propagated down to the generic kernel threads layer, which also picked up a new function:

    struct task_struct *kthread_nofreeze_create(int (fn)(void *data),
                                                void *data,
						const char *namefmt, ...);

This patch seems likely to be merged with, at most, minor tweaks. Nigel's second patch, however, got a somewhat less friendly reception. It creates a new process flag called PF_SYNCTHREAD. Any process which is actively trying to flush data to disk is marked with this flag; the end result is that it will be passed over by the refrigerator during the early part of the suspend process. In this way, processes which are creating dirty pages can be put on hold prior to those which are trying to clean those pages up. This patch is not popular, however; it has been criticized for being overly intrusive when simply flushing all pages to disk prior to beginning the suspend process would do the trick. So, unless things change, this patch will not go in.

In any case, these patches are just preparatory work for a larger event: the merging of a new refrigerator implementation. That code has not (recently) been posted; stay tuned.

Comments (7 posted)

Kernel testing and regressions: an example

Kernel testing, or the lack thereof, is considered to be a significant part of the kernel quality problem. Recent kernels, while quite good in many regards, contain more bugs than they should because people have not gotten around to testing them before the final release. Many regressions are in device drivers, which present special testing problems: drivers can only be tested by people who have the relevant hardware. Core kernel code, however, is hardware independent and should be easier to test. But bugs can slip through in that code as well.

Consider, for example, the realtime rlimits feature, which can be used to enable otherwise unprivileged users to run processes with elevated priority. Andreas Steinmetz recently noticed that this feature does not work in the 2.6.13-rc3 kernel. This would seem to be just the sort of feedback the process needs: a user, testing a feature in a -rc kernel, found a bug and provided a patch to fix it. As a result, that particular bug will not be present in 2.6.13.

The only problem is that, as confirmed by Ingo Molnar, the bug is a little older than that. In fact, the realtime resource limit feature does not work at all in the stable 2.6.12 kernel, and nobody noticed until now. This is a feature which can be tested by just about anybody, but that work clearly had not been done. Given that nobody appears to be using this feature, Ingo is not confident that the fix can go into a 2.6.12 stable release; this one will have to wait for 2.6.13.

It should be said that testing realtime resource limits is not an entirely straightforward operation; setting that limit requires changes to the PAM library, C library, and the shells as well. Very few distributions - and no major ones - are shipping those changes at this time. Even so, unprivileged realtime scheduling is a feature that a number of people had been asking for. It is a little surprising that none of those people noticed that it failed to work in a major kernel release. Getting comprehensive testing coverage for the kernel is clearly still a problem - even before drivers are taken into account.

Comments (8 posted)

Is CKRM worth it?

Anytime your editor gives a talk on kernel development efforts, there seems to be one project which inspires scattered boos and hisses from the audience. The lucky project this year was Class-based Kernel Resource Management (CKRM). The CKRM patches have been under development for some time, and the developers involved have been pushing for inclusion. The future of the CKRM patches seems uncertain, however; there is significant opposition to them being merged.

The idea behind CKRM is to give system administrators a high degree of control over how the resources on a system are used. To that end, it puts every process into a "class," then applies rules specifying which resources are available to each class. On the classification side, CKRM includes a rule-based classification engine which can pigeonhole processes in a number of ways: its user or group IDs, the command it is running, which ports it is listening to, etc. Classification engines are pluggable, however, so a site with specific needs could write its own. It is also possible for an administrator to directly shove a process into a given class by way of a virtual filesystem interface.

The controlling side regulates how much of the system each class can use. Maximum limits can be applied, in a way similar to the resource limits built into the kernel now. There is also a mechanism for specifying a "guarantee," a minimum amount of resource which will be allocated to a class. So an administrator can set things up such that the web server will not take more than half the CPU, or that the X server will always get at least 20% if it needs it.

That leads to another component of CKRM: controllers. Each controller manages the allocation of one specific resource in the system. CPU usage is regulated by the CPU controller; as it happens, the CKRM patches in the -mm tree do not currently include that controller. The CPU controller extends its fingers fairly deeply into the Linux scheduler, and the developers do not feel that it is ready for inclusion quite yet. In fact, the only controllers currently in -mm handle the total number of tasks and the rate at which processes can fork. Many other controllers are in development, handling resources like main memory, disk I/O bandwidth, network bandwidth, and more.

The CKRM patches are large - over 14,000 lines in -mm. They also must place hooks into many sensitive parts of the kernel in order to be able to monitor process transitions and enforce resource limits and guarantees. Any patch which digs into parts of the core kernel in this way is going to see a fair amount of scrutiny, and CKRM is no exception. In this case, many developers see CKRM as an overly complex subsystem which is aimed at the needs of the customers of one specific vendor. Most Linux users simply do not need to have such fine-grained control over resource usage on their systems.

CKRM looks like a bit of a long-term maintenance headache as well. Every subsystem which requires distributing hooks around the kernel (think of the Linux security modules, the audit subsystem, or inotify as other subsystems of this type) is essentially overlaying a new structure on top of the base kernel. Any changes to the kernel must be done carefully so that none of the overlaid structures will break. So each one of these structures makes kernel programming a little harder; it is one more thing a developer must keep in mind when making changes. Mix in the fact that most kernel developers (and testers, for that matter) will not have CKRM configured into their kernels, and it becomes clear that a subsystem like CKRM could turn out to be relatively fragile.

Supporters of CKRM see it as a useful tool for the management of larger systems (they see applications for smaller systems as well). In particular, it can be used with virtualization systems (Xen or UML, for example) to consolidate servers onto a smaller hardware base while providing appropriate resource guarantees for the guest servers. Thus, says Gerrit Huizenga, CKRM can be thought of as part of the "eco-computing movement." CKRM imposes no overhead on the system if it is configured out, and almost no overhead if it is built in but not used. Since CKRM is useful for some users, and stays out of the way for the rest, it is worth adding to the kernel.

For now, CKRM is in -mm for people to play with; Andrew Morton has noted that it is not, yet, on a path toward inclusion in the near future. He wants to see a real debate, however, and not a simple, offhand rejection:

But there's been a lot of work put into this and if we're to flatly reject the feature then the developers are owed a much better reason than "eww yuk".

So far, that reason has not been provided in any definitive way. So expect to see this topic come up again as the developers try to get a real answer on whether CKRM is headed for the mainline or not.

Comments (3 posted)

Older kernel history in git format

Linus has announced the availability of a git repository containing all of the kernel development history back to the beginning of the BitKeeper era. Using the new "pack" format, the entire history fits in less than 200MB of disk space - less than a single, uncompressed kernel source tree. This history does not currently tie into the current mainline, though there are ways to stitch it all together. Note that this history is obtained by way of the CVS repository; some information is lost by taking this path, but potential disputes over the use of the BitKeeper metadata are avoided.

Linus's note does not say where the repository can be found; it will be on your favorite mirror under /pub/scm/linux/kernel/git/torvalds/old-2.6-bkcvs.git.

Comments (11 posted)

Patches and updates

Kernel trees


Core kernel code

Development tools

Device drivers


Filesystems and block I/O


Memory management




Page editor: Jonathan Corbet


News and Editorials

Slamd64: Slackware Linux for AMD64

July 27, 2005

This article was contributed by Ladislav Bodnar

One of the main disadvantages of Slackware Linux is the fact that, unlike most other major distributions, its developers have so far ignored any non-x86 platforms, including the increasingly popular AMD64 processor. The good news is that, because Slackware development is completely open and transparent, it is often just a matter of time before an itch is scratched and a new project is born. This is the case of Slamd64, a port of Slackware Linux to the AMD64 processor.

Developed by a UK-based college student named Fred Emmott, the first stable version of Slamd64 was released in June 2005 as version 10.1, following a long series of alpha releases and four release candidates. We installed it on a machine with the following specifications: AMD64 3500+ processor (2.2GHz), K8N Neo2 (Socket939) mainboard from Micro-Star International, 2 GB of DDR SDRAM, 2 x 120 GB Maxtor hard disks, Plextor PX-712A DVD/CD rewritable drive, and NVIDIA GeForce4 Ti 4600 graphics card. The monitor was a standard 19 inch LCD from Mozo International.

Before booting the installation CD, we noted a few differences between Slackware Linux and Slamd64. Firstly, Slamd64 is an unofficial port without any endorsement from the Slackware project. Unlike Slackware 10.1 and its current branch, both of which still default to the 2.4 kernel series, Slamd64 10.1 comes with kernel, inclusive of support for SATA drives. KDE, the distribution's default desktop, is present in the same version as in Slackware 10.1, but more recent KDE 3.4.1 packages are also provided on download mirrors. GNOME is not included, although contributed Freerock GNOME packages, compiled for x86_64, are available from a third-party source. And despite its name, Slamd64 will also work on Intel's EM64T chips.

The installation program differs very little from the one in standard Slackware. The curses-based, menu-driven process has not changed much in years, providing a simple, but well-tested and reliable installer. Why, then, did it suddenly collapse with a segmentation fault, right after setting up the swap partition? A quick trip to the project's online forum provided an answer - this is a known issue that occurs on certain system configurations. Our workaround was simply to skip setting up the swap partition; we added it to /etc/fstab later, once we booted into the newly installed system. Luckily, this was the only bump on the otherwise neat and smooth road.

The first boot took us to a console boot prompt. As is the case with any Slackware installation, a fair amount of manual work awaits a user who intends to set up the system as a graphical workstation - we had to make some changes to the network configuration file, set up xorg.conf and create new users. We also downloaded the most recent version of NVIDIA binary graphics driver, which installed and worked flawlessly at first try. Once done, we were able to launch KDM and login to the KDE desktop.

Compared to other major Linux distributions, Slackware is a lean system. It is slightly on the conservative side, especially when it comes to the selection of packages included with the distribution, often favoring well-established packages over newer and more progressive ones (don't expect to find GRUB or Postfix among the included packages). It goes without saying that Slamd64 is still leaner. There is no or Firefox, and besides KDE, the only other available desktop environments are Fluxbox and XFce. Since Slackware 10.1 was released some 5 months ago, most of these packages are now somewhat outdated. Of course, there is nothing wrong with running KDE 3.3.2, but since the distribution maintainers have been kind enough to provide binary packages for KDE 3.4.1, we decided to take advantage of the offer. The installation with pkgtool went without a hitch.

Next, we started looking for some other applications to install. We visited, a web site providing the largest collection of contributed packages for Slackware Linux. To out delight, we found a section listing x86_64 packages, and although it wasn't nearly as well-populated as the i386 section, we were able to locate a few dozens of useful packages, including Audacity, Firefox, Postfix, Snort, and Subversion, just to name a few. Some of the packages already present in Slamd64 were available in newer versions - such was the case with The GIMP and K3b. Many packages were fresh - Firefox 1.0.6 for Slamd64 was released within days after its source code became available upstream. GNOME 2.10.1 was also listed. Although we discovered that the number of Slackware packages for the x86_64 architecture were nowhere near the numbers one might find in third-party repositories for Fedora, Mandriva or SUSE, there clearly is an ongoing effort to build 64-bit Slackware packages and provide them to the community.

Like other major distributions, Slamd64 ships with compatibility libraries for running 32-bit applications. We were able to install and use several 32-bit binary packages, such as 1.1.4 or Opera 8.01. According to Fred Emmott, many other 32-bit binary packages will work, although they are not officially supported. As is the case with Fedora or SUSE, the 32-bit libraries are stored in /lib, while the 64-bit ones are placed in /lib64.

Our overall impressions of Slamd64 were positive. Although we came across a minor installation glitch, once the system was installed, we found it blazingly fast. The 32-bit Writer and Calc launched in under 3 seconds, while the native 64-bit applications felt still more responsive. Like its parent, Slamd64 is a clean, robust system which is a pleasure to work with. Users who prefer a package manager with a dependency resolution feature can easily install slapt-get, which reportedly works well on Slamd64. We didn't expect to find a large number of third-party 64-bit binary packages for Slackware on the Internet, but were pleased to see a reasonably active developer community making an effort at building some of the more important ones. And although the Slamd64 web site provides little in terms of documentation, it does have a fairly active user forum and mailing list. Frequent updates in the "current" directory are a further testament that the developers of this young project are serious about building a solid Slackware-based distribution for the x86_64 platform

Comments (5 posted)

New Releases

Mandriva Linux 2006 Beta officially out

The first beta for Mandriva Linux 2006 is now available. "If you already have a Mandriva system installed you can simply perform an update with urpmi: the file trees for i586 processors or 64 bit x86_64 compatible processors are on the /devel/2006.0/ subdirectory of the mirrors. You will also find ISO images for 3 CDs, also available for both architectures. Mini ISO files contain the minimum needed to perform an installation and allow to add extra package sources from FTP mirrors during the installation."

Full Story (comments: none)

MEPIS SoHoServer Test01

MEPIS has begun formal testing of the MEPIS SoHoServer. "SoHoServer is a general purpose SoHo solution based on the recent release of Debian "sarge". The preinstalled and configured server software includes Apache2, PHP4, Perl, Mysql, Proftpd, Bind, DHCPd, Postfix, Dovecot, Shorewall, Squid, DansGuardian, Webmin, and Usermin."

Full Story (comments: none)

Whax v.3.0 Live CD released

The public release of WHAX v.3.0 has been announced. "WHAX is the natural evolution of WHoppix - a live cd, standalone penetration testing toolkit. There are some major new features in WHAX which add huge functionality compared Whoppix, and may change the way we use live distributions."

Full Story (comments: none)

Distribution News

Debian GNU/Linux announcements

The sixth annual Debian Developers' Conference (Debconf5) has been declared a success. "More than 300 people attended this year's Debian Conference, which took place from July 9th to 17th at the University of Helsinki, Finland. The conference has been supported by more than 20 sponsors and featured a lot of talks, workshops, demonstrations, coding marathons and round table discussions on various aspects of the Debian project."

Henrique de Moraes Holschuh looks at a new Alioth project to host the planning, design work, any documentation and eventual reference implementation and deployment coordination for new initscript engines in Debian.

Pascal Hakim reports that it is now possible to subscribe and unsubscribe from individual bugs in the Bug Tracking System.

Enrico Zini provides a status report on the merging of Debtags data into the Packages file.

Comments (none posted)

Unofficial FAQ Updated For Fedora Core 4

The Unofficial Fedora FAQ has been updated for Fedora Core 4. "One of the major updates in the Fedora Core 4 FAQ is an entirely new, super-simple method of configuring yum."

Full Story (comments: none)

Fedora Bug Day Event - Pick Your Poison

The Fedora BugZappers Triage Team is holding a Bug Day on July 29, 2005. "The theme for our first bug day will be 'Pick Your Poison.' Anything in bugzilla is fair game! The goal will be to try and triage as many bugs as possible, close out duplicates as well as linking to upstream bug trackers. Additionally, we have the special honor of trying to file and close out as many Documentation Bugs as possible."

Full Story (comments: none)

Distribution Newsletters

Debian Weekly News

The Debian Weekly News for July 26 is out; this week's topics include graylisting, the multi-architecture proposal, CPU frequency policy, and more.

Full Story (comments: none)

Fedora Weekly News #6

This issue of the Fedora Weekly News includes articles on Red Hat Magazine - July 2005, Fedora BugZappers Triage Team, FUDCon London, 2005, Introducing Deer Park, Rev'ing up Your Backups, Thomas Guide: Remote Desktop, Current Status of, Firefox 1.0.6 Released, mplayerplug-in 3.01 Released, Safe way to remove old kernels, and more.

Comments (none posted)

Gentoo Weekly Newsletter

The Gentoo Weekly Newsletter for the week of July 25, 2005 is out. This week's edition marks Bug #100,000 since the Gentoo Bugzilla was started in 2002, plus another look at keeping gentoo-sources-2.4, and other topics.

Comments (none posted)

DistroWatch Weekly, Issue 110

The DistroWatch Weekly for July 25, 2005 is out. "It is 'shoulder season' in the distribution land. Apart from several minor distribution releases, it was a slow week, with only the launch of the Utnubu initiative and a new beta release from Mandriva providing some excitement. Prompted by a satisfied user, we have taken a closer look at StartCom MultiMedia Edition, an interesting distribution based on Red Hat Enterprise Linux. Apart from these topics, we have all the usual columns, complemented by a quick tip for using digital cameras, mobile phones and music players under Linux."

Comments (none posted)

Package updates

Fedora Core updates

Fedora Core 4 updates: freeradius-1.0.4-1.FC4.1 (new version 1.0.4), ypserv-2.13-7 (crash with ypxfr), setarch-1.8-1.FC4 (fix possible segfault), (add patch to avoid missing FormWizard spam on save), pvm-3.4.5-5_FC4 (bug fixes), subversion-1.2.1-2.1 (update to 1.2.1), module-init-tools-3.1-4 (fix depmod segfault), system-config-netboot-0.1.22-1_FC4 (bug fixes), setools-2.1.1-2 (upgrade to 2.1.1-2), nfs-utils-1.0.7-10 (add patches), libsepol-1.5.10-1.1 (fix reset booleans warning message again), gnbd-kernel-, dlm-kernel-, cman-kernel-, GFS-kernel-, gnome-panel-2.10.1-10.2 (backport fix for recent-files memory leak), system-config-printer- (fix an unwanted interaction with SELinux), tar-1.15.1-7.FC4 (bug fixes, clean up), util-linux-2.12p-9.7 (bug fixes), gcc-4.0.1-4.fc4 (fixes, updated from CVS, rebuilt for FC4), libtool-1.5.16.multilib2-2 (needed for gcc-4.0.1 update), system-config-bind-4.0.0-20_FC4 (bug fixes), mgetty-1.1.33-3_FC4 (bug fixes), apr-0.9.6-3.1 (updated libtool script), audit-0.9.19-2.FC4 (minor fixes).

Fedora Core 3 updates: pvm-3.4.5-5_FC3 (bug fixes), mgetty-1.1.31-3_FC3 (bug fixes), system-config-netboot-0.1.22-1_FC3 (bug fixes), util-linux-2.12a-24.4 (add support for OCFS2), tar-1.14-5.FC3 (bug fixes, clean up), gcc-3.4.4-2.fc3 (updates and fixes), system-config-bind-4.0.0-20 (bug fixes), mgetty-1.1.31-4_FC3 (bug fixes).

Comments (none posted)

Mandriva Linux

Mandriva Linux update MDKA-2005:035 provides updated clamav packages for versions 10.1, 10.2, and Corporate 3.0.

Full Story (comments: none)

Slackware updates

This week some glibc packages have been rebuilt and recompiled, there's a switch to udev-058 (older but more stable), linux- packages in testing, and upgrades to emacs-21.4a, mysql-4.1.13, zlib-1.2.3, fetchmail-, gxine-0.4.6, abiword-2.2.8, fluxbox-0.9.13, firefox-1.0.6, mozilla-1.7.10, thunderbird-1.0.6, nail-11.24, ppp-2.4.3 and radiusclient-0.3.2, libxml-2.6.20, cyrus-sasl-2.1.21, iproute2-2.6.11-050330, lftp-3.2.1, sendmail-8.13.4, wireless_tools.27, guile-1.6.7, links-2.1pre17, and much more. See the slackware-current changelog for complete details.

Comments (none posted)

Distribution reviews

Life Is Good When You're a Slacker (Mad Penguin)

Mad Penguin reviews Slackware Linux version 10.1. "Performance of the Slackware desktop itself is superb. I've not found a desktop yet that outperforms it on my systems (save for VectorLinux, which is a Slackware variant designed to perform well on older hardware). Gentoo, and consequently VidaLinux , come close but Slackware rocks them all."

Comments (none posted)

My workstation OS: ELX Biz Desktop 4.0 (NewsForge)

NewsForge looks at ELX Biz Desktop. "When I installed ELX I was pleasantly surprised. All the applications functioned properly, the multimedia applications worked immediately upon installation, the interface was intuitive and easy to configure, and I could find almost no bugs. It appears to be a very mature product."

Comments (none posted)

Page editor: Rebecca Sobol


GnuPG: The GNU Privacy Guard

The Gnu Privacy Guard (GnuPG) is an open-source encryption, key management, and decryption application that is available under the GNU General Public License (GPL). GnuPG is intended to be used for securing digital communications and data storage.

GnuPG is a complete and free replacement for PGP. Because it does not use the patented IDEA algorithm, it can be used without any restrictions. GnuPG is a RFC2440 (OpenPGP) compliant application.

[GnuPG] The main GnuPG features include:

  • Is a full replacement for PGP.
  • No (known) patented algorithms are used.
  • Functions in a command-line mode and as a UNIX filter.
  • Fully implements the OpenPGP specification.
  • Is compatible with PGP versions 5-7.
  • Supports the following encryption methods: ElGamal, DSA, RSA, AES, 3DES, Blowfish, Twofish, CAST5, MD5, SHA-1, RIPE-MD-160 and TIGER.
  • Allows expiration dates for keys and signatures.
  • Has translation support for many languages.
  • Has an online help system.
  • Can use keys stored on removable smart-cards.
  • Supports the HKP keyservers.
  • And more..

A wide variety of front-end applicaions are available for GnuPG, they include GUI interfaces, mail and chat program interfaces, and scripting interfaces.

Building GnuPG from source was a simple matter of downloading and verifying the code, unpacking, then running the usual configure, make, and make install steps. Using the code was easy, a quick pass through the GnuPG Mini-Howto document showed how to create a key, and perform simple encryption and decryption of a file.

A wealth of documentation is available online including numerous Howtos, Guides, FAQs, and online manual pages.

Stable version 1.4.2 of GnuPG was released this week. It features a number of changes to the ID card software, new command completion capabilities, improvements to the key cleaning function, and more. If you should need any encryption capabilities, from simple secure file trading to complicated security systems, GnuPG is there to help.

Comments (2 posted)

System Applications

Database Software

Firebird 2 Alpha 3 released to testers

The Alpha 3 release of the Firebird 2 database is available for testing. "Read the general notes on page 2 of the Alpha 3 release notes carefully FIRST! Particularly, try out the new international language support that has been introduced in this alpha."

Comments (1 posted)

PostgreSQL Weekly News

The July 24, 2005 edition of the PostgreSQL Weekly News is online with the latest PostgreSQL database news.

Full Story (comments: none)

An Introduction to Test::MockDBI (O'Reilly)

Mark Leighton Fisher introduces Perl's Test::MockDBI on O'Reilly. "Test::MockDBI mocks up the entire DBI API by using Test::MockObject::Extends to substitute a Test::MockObject::Extends object in place of the DBI. A feature of this approach is that if the DBI API changes (and you use that change), you will notice during testing if you haven't upgraded Test::MockDBI, as your program will complain about missing DBI API method(s)"

Comments (none posted)

LDAP Software

LAT 0.6.1 Released

Version 0.6 of LAT, the LDAP Administration Tool, is out with new features and bug fixes.

Full Story (comments: none)


libgdither 0.6 released

Version 0.6 of libgdither, a library for applying dithering to PCM audio sources as a noise reduction technique, is out with bug fixes.

Full Story (comments: none)

Web Site Development

aroundme 0.5.2 (alpha) released

Version 0.5.2 alpha of aroundme is available for testing. "'aroundme' is social networking and team interaction software. It has three central components: a social network, groupware, and activities and task management. It works with standard Web server configurations, and uses only about 3Mb of disk space. The amount of space each user has for image storage is configurable at installation. Features include membership and group wiki, blog, events, tasks, and polls; user multiple profiles, customisable social networking; simple publishing tools; a membership and group access control system; and an RSS feed."

Comments (none posted)

Midgard 1.7.0 released

Version 1.7.0 of Midgard, a web content management system, is out. "Midgard's 1.7 release is a major overhaul of the whole Content Management System. Besides the stable and mature Content Management features of first generation Midgard, it also ships a preview version of second generation Midgard capabilities, allowing developers to have a glimpse at the new day of Midgard2."

Full Story (comments: none)

phpBB 2.0.17 released

Version 2.0.17 of phpBB, a web-based bulletin board system, is out. "This release addresses several bugfixes and some low security issues as well as the recently seemingly wide-spread XSS issue (only affecting Internet Explorer)."

Full Story (comments: none)

Tapestry 4.0 beta released

Version 4.0 beta of Tapestry, an Apache Jakarta object-oriented web application framework, is out. "Tapestry is unlike most other frameworks in that it doesn't use code generation; instead it uses a true component object model based on JavaBeans properties and strong specifications. Tapestry applications require far less Java coding and are far more robust than equivalent applications developed with other popular frameworks." The Tapestry Support Network has also been launched.

Full Story (comments: none)

XOOPS 2.2 RC2 released (SourceForge)

Version 2.2 RC 2 of XOOPS, an Object Oriented PHP-based dynamic web content management system, has been announced. "This Release Candidate is meant for testing purposes only, and contains a number of new features that make management of XOOPS powered websites easier and more flexible. Among the major changes are the dynamic userprofile, which is now a module for easier upgrading and enhancement, an extended Private Message system (also as a module), themable administration interface, and many many smaller enhancements, fixes and features."

Comments (none posted)

Desktop Applications

Business Applications

Four 'enterprise' applications from

A company called Tiny has announced the availability of four "enterprise" applications, all released under the GPL. They are: Tiny Project, a project management tool; Tiny Accounting, a double-entry bookkeeping system; Tiny Marketing, a marketing campaign manager, and Tiny CRM, a customer relationship management tool. The tools are written in Python, and there are Debian packages available.

Comments (none posted)

Desktop Environments

Fisterra 2 stable release published (GnomeDesktop)

A stable release of Fisterra 2, a development framework for GNOME, has been announced. "Fisterra 2 at the moment contains: "fisterra-base": a stable and mature GNOME framework to develop sectorial applications. "fisterra-distribution": a beta implementation yet, with POS (point of sale) functionality."

Comments (none posted)

GNOME Software Announcements

The following new GNOME software has been announced this week:

Comments (none posted)

KDE Software Announcements

The following new KDE software has been announced this week:

Comments (none posted)

KDE Commit Digest

The July 22, 2005 issue of the KDE Commit-Digest is available. Here is the content summary: "Umbrello adds a Ruby code generator. Kalzium now has a chemical equations solver. New recurrence code for libkcal. Kopete adds support for receiving AIM buddy icons. Kopete supports Richtext formatting in Yahoo! Messages."

Comments (none posted)

Desktop Publishing

Inkscape 0.42 released

Version 0.42 of the Inkscape SVG drawing tool is out. 0.42 is said to be "the most feature-filled release to date"; it includes flowed text (with any shape), proper text selection, a reworked gradient tool, a new set of effects, and more. Click below for the details and download information.

Full Story (comments: 5)


Kicad 2005-07-25 released

Release 2005-07-25 of Kicad, a printed circuit CAD application, is available. Changes include cosmetic enhancements, a new mouse function, translation and documentation improvements.

Comments (none posted)

XCircuit 3.3.29 released

Version 3.3.29 of XCircuit, an electronic schematic drawing package, is out. The device auto-numbering system is being reworked.

Comments (none posted)


Phil's pyGame Utilities 1.1 released

Version 1.1 of Phil's pyGame Utilities, a tile and level editor, has been announced. The Changes include: "command line interface improved considerably - use .ini files for init". Also, version 1.0 of Phil's pyGame Library is available.

Comments (none posted)


CYGWIN/X needs a new maintainer

Alexander Gottwald is stepping down from the position of maintainer of CYGWIN/X, a new voluneer is needed.

Full Story (comments: none)

Wine-20050725 released

Release 20050725 of Wine has been announced. Changes include early theme support in common controls, MSHTML improvements, Direct3D improvements, early LDAP support, bug fixes and more.

Comments (none posted)

Mail Clients

Sylpheed-Claws 1.9.13 unleashed (SourceForge)

Version 1.9.13 of Sylpheed-Claws is available. "Sylpheed-Claws is an extended version of Sylpheed, a GTK+ based, lightweight, and fast e-mail client. This is the GTK 2 version of Sylpheed-Claws. This release includes improved GPGME, IMAP, and printing support."

Comments (none posted)

Music Applications

E-Radium V0.61c announced

Version 0.61c of E-Radium, a midi music editor that runs under the E-Uae Amiga emulator, is out with bug fixes and performance improvements.

Full Story (comments: none)

Hydrogen 0.9.2 released

Version 0.9.2 of Hydrogen, a musical drum machine, is out with bug fixes and lots of new capabilities.

Full Story (comments: none)

kluppe 0.5.1 released

Version 0.5.1 of kluppe, a jackified loop-player for Linux, is out with the beginnings of MIDI support and bug fixes.

Full Story (comments: none)

mma beta 0.15 released

The initial beta release of mma, Musical MIDI Accompaniment is out. "MMA is a accompaniment generator -- it creates midi tracks for a soloist to perform with. User supplied files contain pattern selections, chords, and MMA directives. MMA is very versatile and generates excellent tracks. It comes with an extensive user-extendable library with a variety of patterns for various popular rhythms, an extensive user manual, and many demo songs."

Full Story (comments: none)

Office Suites

KOffice 1.4.1 with Improved OASIS Support (KDE.News)

KDE.News covers the release of KOffice 1.4.1. "Among various bugfixes and language improvements, the KOffice 1.4.1 release further improves support for the OASIS OpenDocument file format."

Comments (none posted)

KDE Plugin in the Official Packages (KDE.News)

KDE.News looks at the KDE plugin for "A year and a half after launching the Integration Project, the KDE plugin with the Native Widget Framework as become part of the official development packages."

Comments (none posted)

OO.o build 1.9.118 announced

Build 1.9.118 of is available. It features bug fixes, build improvements and some new capabilities.

Full Story (comments: none)


GeoTools 2.1.0 released (SourceForge)

Version 2.1.0 of GeoTools, an open-source Java GIS toolkit, is available. "This release features improved performance of LiteRenderer, Shapefile (now indexable), and PostGIS."

Comments (none posted)

Web Browsers

Epiphany: The Web through the eyes of GNOME (GnomeDesktop)

GnomeDesktop looks at the development of Epiphany, the default GNOME web browser. "Since the GNOME 2.12 feature freeze is in effect, it’s time to reflect on where Epiphany, GNOME’s default web browser, stands and where it’s going."

A followup article addresses some of the concerns raised in the first article.

Comments (none posted)

Mozilla 1.7.10 Released (MozillaZine)

MozillaZine reports that Mozilla 1.7.10 has been released, with a security update to the Mozilla Application Suite. "There was no Mozilla 1.7.9 release: it was cancelled after it was discovered that changes in the equivalent 1.0.5 releases of Mozilla Firefox and Mozilla Thunderbird caused some problems."

Comments (none posted)

Mozilla 1.7.11 Release Candidates Available (MozillaZine)

Release Candidates of Mozilla 1.7.11 are available. "The test builds made available today contain a fix for the folder switching issue (bug 300749) but do not feature code to correct the problem that makes cursor keys non-functional in the message composition window (bug 301917)."

Comments (none posted)

Mozilla Firefox 1.1 Delayed, Renamed to 1.5 (MozillaZine)

MozillaZine covers the release plans for Firefox 1.5. "ZDNet UK is reporting that the next major release of Mozilla Firefox has been delayed and will now be known as Firefox 1.5 rather than 1.1. The upgrade is now set for a September release."

Comments (none posted)

Minutes of the Staff Meeting (MozillaZine)

MozillaZine has announced the publication of the minutes from the July 18, 2005 staff meeting. "Issues discussed include new hires, Mozilla Firefox 1.0.5 release feedback, release management in general, the Firefox 1.0.6 API fix release, Firefox 1.1 Beta 1, Mozilla Thunderbird 1.1 Alpha 2, Spread Firefox and quality assurance."

Comments (none posted)

Word Processors

AbiWord Development snapshot 2.3.4 released (GnomeDesktop)

Development snapshot 2.3.4 of The AbiWord word processor has been announced. "The changes from 2.3.2 to 2.3.4 (2.3.3 was never any good) include a lot of bugfixes, as we are working on stablizing the 2.3 development series towards our first stable 2.4 release. No record of the exact list of changes is available for this release."

Comments (none posted)


KnowledgeTree 2.0.7 released (SourceForge)

Version 2.0.7 of KnowledgeTree is available. "KnowledgeTree is a powerful Open Source document management system. Capabilities include advanced document version control, full text search, multiple search types, extensible metadata for documents, customizable dashboard and authoring workflow. Version 2.0.7 of KnowledgeTree continues the incremental bug fixes and behind-the-scenes improvements to the Document Management System."

Comments (none posted)

Languages and Tools


Caml Weekly News

The July 26, 2005 edition of the Caml Weekly News is online with the latest Caml language articles.

Full Story (comments: none)


JasperReports 1.0.0 released (SourceForge)

Version 1.0.0 of JasperReports has been released. "JasperReports, our July 2005 Project of the Month, is a free Java reporting library. XML report templates are used to generate ready to print documents using data from customizable data sources, including JDBC. The output can be delivered to the screen, printer, or stored in PDF, HTML, XLS, CSV and XML format".

Comments (none posted)


GNU CLISP 2.34 feature release (SourceForge)

Version 2.34 of GNU CLISP has been announced. "GNU CLISP [2.33.2] is now available for download. CLISP is a portable ANSI Common Lisp implementation, a compiled, object-oriented, dynamic, functional, interactive programming environment. New features: MOP, weak structures, case sensitive symbols, global error handlers. New modules: matlab, rawsock, zlib, i18n, pari."

Comments (none posted)


This Week in Perl 6 (O'Reilly)

The July 13-19, 2005 edition of O'Reilly's This Week in Perl 6 is available with the latest Perl 6 news.

Comments (none posted)

Ten Essential Development Practices (O'Reilly)

Damian Conway presents ten Perl tips on O'Reilly. "The following ten tips come from Perl Best Practices, a new book of Perl coding and development guidelines by Damian Conway."

Comments (none posted)


PHP Weekly Summary for July 25, 2005

The PHP Weekly Summary for July 25, 2005 is out. Topics include: Inheriting apxs compiler flags; ext/mail?; SQLite row size; internal static properties; fread() bug; ext/standard dependencies; regression change in HEAD; preparing for 5.1.0.

Comments (none posted)


Dr. Dobb's Tcl-URL!

The July 21, 2005 edition of Dr. Dobb's Tcl-URL! is online with the latest Tcl/Tk news and resources.

Full Story (comments: none)

Dr. Dobb's Tcl-URL!

The July 26, 2005 edition of Dr. Dobb's Tcl-URL! is online with the latest Tcl/Tk articles.

Full Story (comments: none)


Stani's Python Editor 0.7.4.a

Version 0.7.4.a of Stani's Python Editor, a Python language IDE, is available. "This is a major bugfix release for wxPython 2.6 and Mac OS X. The new features are configurable shortcuts and a realtime updating sidebar."

Comments (none posted)


OProfile 0.9.1 has been released

Version 0.9.1 of the OProfile profiler is out. Changes include support for MIPS 24K performance counters and bug fixes.

Full Story (comments: none)

Page editor: Forrest Cook

Linux in the news

Recommended Reading

Boot Fedora Linux Faster (Improved Source)

Here's an article that shows how one person modified a Fedora Core 4 system to make it boot faster. "As Linux has advanced it has increasingly become slower to boot. I have tested on my machine 4 Linux distributions: Linspire, Fedora 3 & 4, Suse 9.2 & 9.3, and Debian. And on average between all these distributions Linux needs around a minute to 1 and half minutes to go from boot loader to graphical login screen. So I decided to look into reducing the time it takes to boot my current setup, which is Fedora 4. In doing so I was able to reduce the boot time of my Fedora 4 installation to less than 25 seconds (just above 24 seconds on average). Below I have documented what I did, and what you can use to potentially reduce your boot up time for Linux."

Comments (27 posted)

Linux and Audio Production: Simplicity Required (O'ReillyNet)

Here's an O'ReillyNet article calling for more usability in Linux audio applications. "Don't get me wrong, there are certainly efforts going in to this area and applications such as Ardour, Wired and Rosegarden, but these tools face a number of uphill battles in winning me over. The interesting point is that the challenge is not focused so much on features but on usability and integration."

Comments (5 posted)

Linux vendors cosy up to Debian to push into enterprise (Techworld)

Techworld has an update on the Debian Core Consortium, which is set to be formally announced at LinuxWorld. "Debian's technology is highly regarded, and it is already widely used for tasks such as web hosting, but its diffuse nature has made it difficult for software and hardware vendors to put support plans into place. The DCC aims to give Debian a more predictable release cycle, and to give software and hardware vendors a single point of contact."

Comments (5 posted)

Trade Shows and Conferences

Ottawa Linux Symposium2005: first day (O'Reilly)

Andy Oram covers the first day of the 2005 Ottawa Linux Symposium on O'Reilly. "One advantage of the close examination that a conference like this one gives to its subject matter is that you see the unsavory underside. Marcel Holtmann zipped expertly through a comprehensive assessment of the state of Bluetooth on Linux (the BlueZ project) and how far each protocol had come. Martin J. Bligh reported the frustrations of making memory management robust on Linux. Even though millions of sites are comfortably and reliably running Linux, the basic operating system task of memory management has a way to go."

Comments (7 posted)

The SCO Problem

SCO Added to "New Russell Microcap Index" (Groklaw)

Groklaw does some digging into SCO's recent addition to the New Russell Microcap Index. ""If you're a busy person and don't want to play around with your investments, Russell offers opportunities to get the type of solid investment program that some of the world's largest, most sophisticated investors use. We bring together some of the world's best money managers to meet our clients' needs. We do this through industry-leading money manager research used by corporate investors like AT&T, Boeing, United Airlines, and organizations like the Bill & Melinda Gates Foundation." Well, well. What do you know? Look who just showed up. Mr. Gates. Purely coincidentally, I'm sure."

Comments (3 posted)


IBM steps into open-source Java project ( examines IBM's involvement in the Harmony project, an effort to make an open-source version of the Java Platform, Standard Edition. "In the past week, IBM has dedicated an employee to working with the proposed open-source project, which is being done at the Apache Software Foundation, said Rod Smith, vice president of advanced technology at IBM. At this point, IBM's participation is limited to thoughts on design, but the company likely will contribute code to the project, Smith said. "I think you'll see some code down the road. I'm sure you will. But right now, it's getting involved in some of the ideas and design they're trying to put together," he said."

Comments (7 posted)

Microsoft Patents Emoticon (Groklaw)

Groklaw examines a recent patent application by Microsoft. "Microsoft has filed for a patent on the smiley face. No. Really. Literally, they have applied for this: "A method, comprising: selecting pixels to be used as an emoticon; assigning a character sequence to the pixels; and transmitting the character sequence to a destination to allow for reconstruction of the pixels at the destination.""

Comments (36 posted)

Linux Adoption

Healthcare Experts Question Open-Source Apps (LinuxInsider)

LinuxInsider discusses a reluctance in moving to Linux and open-source code by the health care industry. "Health-care organizations are not planning to replace their Unix or Microsoft operating systems with Linux, said Massimiliano Claps, senior research analyst at IDC Canada, adding if that's going to happen, it's going to happen first with Unix. Despite the much-touted advances open source is making in various government IT projects around the globe, it's not even on the radar when it comes to electronic health records, said panelists at the recent e-Health 2005 Conference." (Found on LinuxMedNews.)

Comments (13 posted)


An Interview with John Markoff (O'ReillyNet)

O'Reilly has published an interview with John Markoff. "John Markoff is the author of What the Dormouse Said. In this interview, John expands on the idea he presents in his book that the counterculture shaped the evolution of the computer industry. He touches on all the players here: visionaries like Doug Engelbart and his team at SRI, John McCarthy and the people at Stanford Artificial Intelligence Laboratory), activist Fred Moore, and roleplayers like Stewart Brand and Ken Kesey."

Comments (none posted)

Information Security with Colin Percival (O'ReillyNet)

O'ReillyNet interviews Colin Percival, a FreeBSD security officer. "To the second question: you should listen to me because I have written a 12-page academic paper presenting and discussing a serious security vulnerability, and nobody has been able to refute my results. I believe that my work stands on its own; it doesn't need my name attached to give it credibility."

Comments (9 posted)

People Behind KDE: Thiago Macieira (KDE.News)

KDE.News has announced a new People Behind KDE interview with Thiago Macieira. "Thiago is a Brazilian who spends his time reading the kde-bugs-dist mailing list. Somehow he also finds time to look after the networking code in kdelibs and his dog Kayla. He also tells us why he has two clocks and includes a Unix story in Old English."

Comments (none posted)


Add vision to your robot submarine (developerWorks)

developerWorks continues with a series of articles on migrating from x86 to PowerPC. "In this episode of the ongoing Kuro Box project, learn how to add a USB camera to the machine. This article includes example Linux code to initialize and read from a USB camera through Video4Linux. Also find a brief introduction to edge detection techniques in captured images."

Comments (none posted)

What Is Business Process Modeling? (O'ReillyNet)

Mike Havey introduces Business Process Modeling in an O'Reilly article. "Business Process Modeling (BPM) is a set of technologies and standards for the design, execution, administration, and monitoring of business processes. In this article, Mike Havey, author of Essential Business Process Modeling, briefly describes the state of BPM today and the BPM standards, then builds an ideal BPM architecture using the example of a retailer process."

Comments (none posted)

Build a Wireless ISP on Linux (developerWorks)

developerWorks builds a wireless ISP (WISP). "Setting up a wireless Internet Service provider (WISP) for your office or neighborhood doesn't have to be a taxing or expensive ordeal. If you build your network from easy-to-buy equipment and use Linux, you can use the power of shell scripts to make network management easy. This article gives you the tips and scripts you need."

Comments (1 posted)

Linux in Government: You Can Use the Desktop on a Laptop Now (Linux Journal)

Linux Journal takes a look at running desktop Linux on a laptop. "I spent the better part of two days trying a variety of distributions. Before people start writing comments about how much better their distributions run than the one I chose, let me say I played no favorites. I wanted performance and I got it with Ubuntu. Contrary to what some of you might believe, it's not my favorite Linux distro. It simply performed the best in this case."

Comments (3 posted)

Best practices for portable patches (NewsForge)

NewsForge has an article on writing portable patches. "One of the things I usually take care of as a Gentoo packages maintainer is sending patches to upstream developers. If a patch is applied upstream, we can remove it from future versions of a package so we have less work to do to maintain the package. Unfortunately, it seems that other distributions and packagers don't always do the same. This is true not only for Linux distributions such as Debian, Fedora Core, and SUSE, but also for maintainers of packages in places like FreeBSD's Ports, DarwinPorts or Fink. Here are some tips for developers on making things easier for yourself and everyone who has to touch your code."

Comments (13 posted)

Live Backups of MySQL Using Replication (O'ReillyNet)

Here's an O'ReillyNet tutorial on how to set up replication with MySQL. "Typically, replication is a system configuration whereby the MySQL server, known in this context as a master server, houses the data and handles client requests, while another MySQL server (a slave server) contains a complete copy of the data and duplicates all SQL statements in which data is changed on the master server right after it happens. There are several uses for replication (e.g., load balancing), but the concern of this article has to do with using replication for data backups."

Comments (none posted)


JLP's KDE 3.5 Previews - Part 1 (KDE.News)

Jure Repinc provides a preview of KDE 3.5. "Stability of this prebeta version is very good. I rarely encountered crashes or freezes. Speed is also about the same as with current stable version 3.4.1. The default font sizes have been reduced to 10 points, which makes a little bit more room on the screen." (Found on KDE.News)

Comments (none posted)

Desktop Publishing With Scribus 1.3.0 (Linux Magazine)

Joe 'Zonker' Brockmeier takes a look at Scribus, on Linux Magazine. "For the most part, Scribus should have all of the features most users need to create complex documents for publication. It's more than suitable for home users who might want to create nice-looking documents (expect this year's Christmas newsletters to look extra-nice), and should be able to handle a great deal of professional DTP work as well. It's apparently quite good at creating PDF forms for small businesses as well."

Comments (1 posted)


Second visit to Taiwan (RMS Blog)

Richard Stallman writes about a recent trip to Taiwan in a Blog posting. Many interesting culinary delights were sampled. "I took the opportunity presented by the visit to arrange speeches at a few other universities, and meet with hardware companies to ask them to cooperate with free software. We visited the campus of ASUS (which always made me think of Spanish "Jesús" without the J). There one person deigned to meet us, and his attitude was that the free software community was beneath their notice. On discovering this, I told him I was sorry to waste his time, and left. However, the people at VIA, Realtek, RALink and MSI showed an interest in cooperating. Some even offered to provide advance specs for free BIOS support." (Thanks to Keith Howanitz.)

Comments (8 posted)

LinuxFund names new director, schedules payouts (NewsForge)

NewsForge reports that the LinuxFund credit card program is getting back in business. "LinuxFund's new head, David Mandel, told NewsForge in an interview the funding -- $500 per month for a year to Debian, Freenode, and Wikipedia -- will be given to the projects quarterly and is part of an effort to get LinuxFund back on track. Mandel said that with help from LinuxFund's founder, Benjamin Cox, he was confident the project, and more importantly its payments to FOSS developers, would resume and possibly even grow."

Comments (none posted)

The unity of Unix (ZDNet)

This ZDNet column tries to draw attention to the set of core ideas which characterize all Unix-derived systems. "People who categorize the Unix market as splintered or fractured are generally trying to compare it unfavorably to Microsoft's Windows. That's simply wrong: Windows is a brand, Unix a set of ideas. The Windows brand has been consistently handled, but there's essentially no continuity of ideas between the 3.0, 95, NT, and Longhorn Windows generations. The Unix hardware makers, in contrast, have tried hard to differentiate their products through branding when, in reality, all of their products have been part of the same family. Oddly enough, therefore, both beliefs: that Microsoft has been consistent and that Unix hasn't, are consequences of marketing fictions."

Comments (8 posted)

Page editor: Forrest Cook


Non-Commercial announcements

EU Public Licence: join the debate

The EU's IDABC Programme has released a draft of the EU public licence. Interested parties are invited to join the online discussions on the EUPL at the eGovernment Observatory's forum.

Full Story (comments: none)

WSIS PCT WG: WIPO should prevent software patents, shorten copyright span

The Free Software Foundation Europe has sent out a statement by the UN WSIS Patents, Copyrights and Trademarks Working Group of Civil Society concerning software patents.

Full Story (comments: none)

Commercial announcements

Levanta announces Linux management appliance

Levanta (once a high-flying company called Linuxcare) has announced the availability of "Intrepid M", a standalone box intended to help with the management of networks of Linux systems. "Through an intuitive interface, a Linux systems administrator with as little as two years of experience can use the Intrepid M to quickly deploy, rollback and migrate RPM-based Linux servers (whether running RedHat, SuSE, or Fedora distributions) from a central location -- all without the need to install the operating system or applications directly on computers."

Comments (none posted)

PostgreSQL Achieves Coverity Quality Certification

EnterpriseDB Corp has announced the receipt of a Coverity Quality Certification for the PostgreSQL-based RDBMS database. "EnterpriseDB Corporation, an enterprise-class database company, announced today that its PostgreSQL-based RDBMS was analyzed by Coverity Prevent, the world’s most advanced static software analysis tool, and found to contain only 20 defects in more than 775,000 lines of code. This is the lowest defect density (one defect per nearly 39,000 lines of code) reported by Coverity for an open source relational database."

Comments (none posted)

Open-Xchange to Appear at LinuxWorld Expo in San Francisco

Open-Xchange Inc. has announced that it will hold a demonstration of the Open-Xchange Server at the LinuxWorld Expo in San Francisco, CA on August 9-11, 2005. "Open-Xchange enables easy migration and integration to an open source environment -- allowing IT administrators to create and implement killer-apps without changing existing infrastructure components, i.e. databases, directory services, message transfer agents, e-mail servers or web-servers."

Comments (none posted)

Xandros extends Enterprise Linux Challenge

Xandros has extended its Enterprise Linux Challenge through September 30, 2005. "To date over 1,000 companies have signed up to qualify for a free copy of the Xandros replacement for Windows business desktops. This clear sign of enterprises being ready for Linux, surpassed even Xandros expectations. Challenge participants download a free trial of the new Version 3 of the Xandros Business Desktop Operating System (OS), which provides seamless compatibility with the latest Windows servers, including domain authentication support, logon scripts, and group policy profiles. Participants who fill in a detailed questionnaire to help Xandros identify future enterprise needs will be rewarded with a fully licensed boxed copy of the Xandros Business Desktop OS."

Full Story (comments: none)

New Books

C++ Books from Addison-Wesley/Prentice Hall PTR

Addison-Wesley and Prentice Hall PTR have published three new C++ books.

Full Story (comments: none)

Book: Free software for busy people

Mohammad Al-Ubaydli has written a brief book, called Free software for busy people. It serves as a quick introduction to the free software world for people who don't want to know all the details; much of the book is about and Firefox. Linux comes in toward the end. It is available online (Creative Commons noncommercial license), or can be purchased. (Seen on BoingBoing).

Comments (none posted)

Learning Perl, Fourth Edition - O'Reilly's Newest Release

O'Reilly has published the book Learning Perl, Fourth Edition by Randal L. Schwartz, Tom Phoenix, and brian d foy.

Full Story (comments: none)

Perl Testing: A Developer's Notebook - O'Reilly's Latest Release

O'Reilly has published the book Perl Testing: A Developer's Notebook by Ian Langworth and chromatic.

Full Story (comments: none)

No Starch Press publishes "Linux Made Easy"

No Starch Press has published the book Linux Made Easy: The Official Guide to Xandros 3 for Everyday Users by Rickford Grant.

Full Story (comments: none)

Upcoming Events

FAVE 2005: Open Source Creativity in Bristol, UK

The FAVE 2005 event will take place in Bristol, UK on August 20, 2005. "FAVE is a new event for people who are interested in free and open source creative software on Linux and other computer platforms."

Full Story (comments: none)

GOTO10 ASP digital sound workshop

A digital sound workshop will take place in Rotterdam, the Netherlands on September 1-4, 2005. "In a four-day workshop hosted by V2_, sound artists Frank Barknecht and Aymeric Mansoux will introduce the basics of Audio Signal Processing (ASP) in the fields of real-time music production. This workshop specifically targets people who want to develop their work in the digital sound field or those people curious about the processes involved behind the audio software they already use."

Full Story (comments: none)

IBM eServer pSeries, AIX and Linux Technical Conference

IBM will be holding two instances of its eServer pSeries and Linux technical conference. the first will be held in Orlando, FL on September 12-16, 2005 and the second will be held in Barcelona, Spain on November 7-10, 2005.

Comments (none posted)

LinuxWorld London

A LinuxWorld conference will be held in Olympia, London on October 5 and 6, 2005.

Full Story (comments: none)

OSCON public meeting

The Open Source Initiative is holding a meeting at the upcoming OSCON event. "OSI is going to be holding a public meeting at O'Reilly's OSCON the first week of August. It's to be held on Thursday evening at 7:30PM in room D135 of the conference hotel."

Full Story (comments: none)


A call for papers has gone out for the 2005 Open Source Developer's Conference. The event takes place in Melbourne, Australia on December 5-7, 2005. Proposals are due by August 19.

Comments (none posted)

The Pacific Northwest Venture Capital Symposium

Strategic Research Institute has announced the Pacific Northwest Venture Capital Symposium. The event will take place in Bellevue, Washington on September 12-13, 2005.

Comments (none posted)

Python Bootcamp Back at the Big Nerd Ranch

Mark Lutz will be holding another Python Bootcamp at the Big Nerd Ranch in Atlanta, Georgia on October 17-21, 2005.

Full Story (comments: none)

Southern California Linux Expo - Call For Papers

A Call For Papers has gone out for the Southern California Linux Expo. The event takes place near Los Angeles, CA on February 11-12, 2006. Papers are due in November.

Full Story (comments: none)

Events: July 28 - September 22, 2005

Date Event Location
July 28, 2005Black Hat Briefings USA 2005Las Vegas, NV
July 29 - 31, 2005DefCon 13(Alexis Park)Las Vegas, Nevada
July 31 - August 4, 20052005 SIGGRAPH Computer Animation FestivalLos Angeles, CA
July 31 - August 5, 2005USENIX Security SymposiumBaltimore, MD
August 1 - 5, 2005O'Reilly Open Source Convention(Oregon Convention Center)Portland, Oregon
August 1 - 5, 2005CIFS 2005 Conference and Plugfest(Doubletree Hotel)San Jose, CA
August 4, 2005Penguincon 2005Israel
August 4 - 7, 2005Linux 2005(University of Wales)Swansea, UK
August 8 - 11, 2005LinuxWorld Conference and Expo(Moscone Center)San Francisco, CA
August 20, 2005Free Audio and Video Event(FAVE)(Trinity Community and Arts Centre)Bristol, UK
August 27 - September 4, 2005aKademy 2005(University of Málaga)Málaga Spain
August 31 - September 2, 2005YAPC::EU::2005(University of Minho)Braga, Portugal
September 1 - 2, 2005Symposium on Security for Asia Network(SyScAN'05)(The Dusit Thani Hotel)Bangkok, Thailand
September 1, 2005GOTO10 ASP digital sound workshopRotterdam, the Netherlands
September 1 - 4, 2005GOTO10 ASP digital sound workshopRotterdam, the Netherlands
September 5 - 9, 2005International Computer Music Conference(ICMC 2005)Barcelona, Spain
September 14 - 16, 2005php|works(Holiday Inn Yorkdale)Toronto, Canada
September 16 - 18, 2005ToorCon 7(San Diego Convention Center)San Diego, CA
September 19 - 21, 2005Plone Conference 2005(Semper Depot, Lehargasse)Vienna, Austria
September 20 - 23, 2005New Security Paradigms Workshop(NSPW)(UCLA Conference Center)Lake Arrowhead, California

Comments (none posted)

Web sites

Samba Project and Developer Blogs

The Samba Project has announced two new Project and Developer Blogs. "This will be the permanent home of project lists, status updates and what is happening with a given project or feature. The site's success will really depend on developer interaction and whether or not the community finds the status information helpful."

Comments (none posted)

Page editor: Forrest Cook

Copyright © 2005, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds