|
|
Subscribe / Log in / New account

LWN.net Weekly Edition for August 24, 2006

Resolved: firmware is not software

On July 17, the Debian release team posted an update on the upcoming "etch" distribution. Things appeared to be moving along nicely. Many of the important transitions have been made, the kernel was set to be frozen on July 30, and the final release (to be numbered 4.0) was on track to happen, as scheduled, on December 4 of this year. It all looks like the smoothest release process Debian has had in quite some time.

For experienced Debian watchers, this seems too good to be true. And, in fact, that's exactly what it might be; behind the scenes, it looks like the etch release may get caught up on an old problem. On August 3, Debian developer Nathanael Nerode claimed that the etch timeline is unrealistic because the kernel will not be ready in time. The issue, in particular, is that of device firmware.

Some background: most devices attached to a modern systems are special-purpose computers in their own right, running their own software. Some of these devices store that software ("firmware") in a ROM within the device itself. Over the years, however, manufacturers have found that loading the firmware from the host system is both cheaper and more flexible. As a result, much current hardware is unable to function in any useful way until the host computer has fed it the requisite firmware. This firmware load is handled by the device driver.

Once upon a time, a great many drivers had the necessary firmware linked into the kernel itself. In many cases, over time, that firmware has been stripped out into a separate file which can be fed to the kernel at device initialization time. In others, however, the firmware remains in the kernel itself. Often, that firmware carries explicit permission which allows it to be distributed in that way, so licensing issues do not usually come into the picture.

The Debian Project, however, is not satisfied with distributable firmware - or, at least, many vocal Debian developers are not satisfied. Unless there is accompanying source which can be used to rebuild that firmware, said firmware is not seen to be truly free, and, thus, has no part in Debian. According to this point of view, it is not possible to ship a kernel which is compliant with the Debian Free Software Guidelines (DFSG) until all of that firmware has been torn out of it. Since this work has not been done - the Debian kernel maintainers being more concerned with the production of a working and secure kernel - the kernel cannot be frozen, and the etch timeline cannot be met.

There is another point of view within the project however. According to this perspective, Debian is shipping an operating system for the host CPU, not for all of the peripherals attached to that CPU. As long as the core operating system is free, that is good enough. The peripheral devices will, regardless of anything Debian does, be running non-free software. Adopting a policy which favors devices having their proprietary software in ROM (where it can never, ever be changed) over those which accept their firmware from the host (where, maybe, someday it could be rebuilt and tinkered with) seems like a step in the wrong direction. To people who see things this way, trying to purge non-free firmware distracts developers from more useful work while simultaneously making things harder for Debian's users.

This is, to put it mildly, not a particularly new discussion. Despite having come around many times over the years, however, this question has never really been resolved. In an effort to bring it to a resolution this time around, Steve Langasek has proposed a general resolution stating, in essence, that Debian can ship "data" without the need for accompanying source. Data, in this sense, includes things like graphics (splash screens, icons, etc.), videos, and fonts. If this resolution is voted on and passes, the position taken by the project will be that, as long as the "data" itself is freely distributable, the project can ship it without source and remain true to its goals.

The final part of the proposed resolution takes things one step further by stating explicitly that firmware is, for the purposes of the DFSG's source requirements, not a program. Device firmware is, instead, data which, under the terms of the resolution, can be shipped without source.

Needless to say, this proposal has inspired some discussion. Many developers are in favor of the proposal, and have seconded it. Others have requested that it be split into two parts, with the firmware-as-data issue being voted upon separately. Some remain firmly opposed to shipping anything without source; these people do not like the resolution at all.

Then, there is the position taken by Sven Luther, a member of the Debian kernel team. Sven states that calling firmware "data" is fundamentally dishonest, and that this fiction will inevitably lead Debian toward becoming a non-free distribution. What he would like to see, instead, is a resolution that, while firmware remains a problem, it is one which has been with Debian for a long time and which is not going to be solved within the etch release schedule. So, Sven proposes:

We thus ask the project to temporarily waive the DFSG requirement for those non-free firmware blobs, in order to let the etch release to ship in a timely fashion, and let us work on these issues, within the kernel and related affected teams, the project as a whole (The DPL could mandate a delegate or delegate team to contact manufacturers and such), but also upstream, in a calm and posed way, not hurried by the needs of the release, and other such pressure.

Sven will likely format this proposal into a competing resolution for a vote by the developers.

What this alternative resolution really looks like, of course, is yet another decision to defer the issue and argue about it again in the next release cycle. But this could be just how the decision goes in the end. Many developers have little patience with the firmware battles and with the push to break working drivers. There is also a real unease, however, with shipping binary firmware blobs, and simply rebranding those blobs as "data" may not be enough to make people feel better about it. So Debian may well punt the issue again; expect its return in a year or two.

Comments (41 posted)

Who maintains RPM?

RPM is an important piece of Linux infrastructure. It is the native package manager for a number of major distributions, including Red Hat's enterprise offerings, Fedora, and SUSE. The Linux Standard Base specification requires that all compliant systems offer RPM - even those which are built around a different package management system. If RPM does not work, the system is not generally manageable. So it may be a little surprising to learn that the current status and maintainership of RPM is unclear at best.

Once upon a time, RPM was the "Red Hat Package Manager." In a bid to establish RPM as a wider standard - and, perhaps, to get some development help - Red Hat tried to turn RPM into a community project - rebranding it as the "RPM Package Manager" in the process. But core RPM development remained at Red Hat, under the care of an employee named Jeff Johnson. That, it would seem, is where the trouble starts.

Back in early 2004, an RPM bug report was filed. The reporting user had made a little mistake, in that he had tried to install a package on a system where /usr was mounted read-only. Needless to say, this operation did not work as intended - an outcome which the bug reporter could live with. This person, however, did think that it might have been better if RPM had not corrupted its internal database in the process of failing. He suggested that RPM should keep its internal records in order, even if the system administrator has requested something which cannot be done.

The ensuing conversation - lasting for over two years - deserves to become a textbook example in how not to respond to bug reports. Mr. Johnson took the position that, since RPM was being asked to do something erroneous, its subsequent mangling of the package database was not a bug. Instead, it seems, this behavior should be seen as an appropriate consequence for having done something stupid. Mr. Johnson repeatedly closed the bug, stating his refusal to fix it. Numerous other participants in the discussion made it clear that they disagreed with this "resolution" of the bug, but nothing, it seemed, could convince the RPM maintainer to put in a fix.

In February, 2006 - almost two years after the bug report had been entered - Mr. Johnson posted a one-line comment to the effect that read-only mounts were properly detected in RPM-4.4.5. This might seem like the end of the story, except for one little problem: Fedora currently ships version 4.4.2, and even the Fedora development repository has not gone beyond that. SUSE remains at 4.4.2, and the current RHEL offerings have rather older versions. Mr. Johnson has continued to make RPM releases, but the distributors are not picking them up. They are, instead, shipping an older version of this crucial tool, augmented with a rather hefty list of patches.

Part of what is happening here is that Mr. Johnson is no longer a Red Hat employee, having been encouraged to pursue other opportunities. He does, however, continue to show up on the Red Hat bug tracker when RPM issues are being discussed; as a current example shows, he does not appear to have adopted a friendlier attitude toward RPM users (or his former employer) over time. There has been talk on the mailing lists about removing his access to the bugzilla database - an action which may have occurred by now.

Red Hat's Greg DeKoenigsberg, who has responsibility for the company's relations with the development community has stood up and pointed out, however, that simply silencing one difficult personality will not address the real problem:

When we fired jbj, we didn't have the courage to draw a line in the sand and say "we're taking upstream ownership of RPM back." Why not? Because we thought it would be difficult politically? Because we didn't want the responsibility anymore? Because nobody in management actually cared enough to think about the ramifications? I don't know.

Fast forward a year plus, and here we are. We're in a position where we have, essentially, forked RPM -- and no one is willing to admit it. No one is willing to take ownership of what we've done.

Perhaps jbj "owns" RPM, in its current incarnation, by default, because no one else is willing to touch it. That's fine. He can have it. But that is not what *we* are using.

So, when Jeff Johnson walked out the door at Red Hat, he took RPM with him. Since then, few distributors have wanted to use his releases, but no other organized project around RPM has come into existence. For the purposes of the people using distributions from Red Hat and SUSE, RPM is essentially unmaintained.

There has been no clear message to users about the state of RPM. Some Fedora users have asked, via yet another bugzilla entry, for an update to Jeff Johnson's current release, but nobody has posted a definitive reason as to why that will not happen. But it does appear that there is no interest within Fedora to depend on Mr. Johnson for anything, much less an important piece of infrastructure, so Fedora appears unlikely to move to the newer releases.

What Greg DeKoenigsberg has said - backed up by Michael Tiemann - is that the time has come for Fedora and Red Hat to own up to what has happened and formalize the new status of RPM. The current situation, where RPM has been forked but nobody is saying so, will not lead to anything good in the long run. The new RPM - perhaps the "Red Hat Package Manager" yet again - needs to have its existence acknowledged and its maintainership made clear. Either that, or Red Hat and Fedora should acknowledge the current RPM maintainer and move toward rejoining with his version of the code. Until one of those things happen, there will continue to be a dark cloud of uncertainty surrounding a tool which is heavily depended upon by vast numbers of Linux users.

(See also: the the Fedora rpm-devel wiki page, which lists features found in the current RPM release but not in Fedora's version).

Comments (63 posted)

What is a Linux laptop?

Recently, Lenovo announced that it would be supporting Linux on one of its Thinkpad laptop models. This announcement was seen as a big turnaround, given that the company had said, only a few months ago, that it was no longer interested in Linux. Since Thinkpads tend to be relatively nice machines, and since support for Linux among laptop manufacturers tends to be nonexistent, Lenovo's announcement looks like good news. It is not, however, as good as many in the community might have hoped.

Your editor had a brief conversation with Lenovo, and was able to confirm the news that came out of LinuxWorld: Lenovo's "Linux-supported" laptop does not, in fact, come with Linux installed. This machine is shipped with a blank disk and a note instructing the purchaser to go buy a copy of SUSE Linux Enterprise Desktop 10 and install it him- or herself. The only real differences with this offering are that (1) the proud owner has some reasonable assurance that the installation will actually work - a valuable thing - and (2) there is no Windows certificate to throw away.

The other surprise is that this machine features the ATI "Mobility FireGL V5200" video adapter. This adapter is, by all accounts, a nice piece of hardware, but it lacks a free driver. The associated ThinkWiki page goes into what must be done to get this card working properly on a Linux system; it involves installing ATI's proprietary driver. So people who have bought this "Linux supported" system are not, in the end, running free software.

Doubtless there will be customers who are happy with this deal - though Lenovo's pricing does not seem particularly attractive. But this offering raises an important question: what does it really mean for a vendor or a computer to "support Linux"? How can customers for such systems know whether they are getting a truly free system, or, instead, one which forces the use of proprietary software?

Somehow, we need to get a handle on the claim of "supporting Linux" and make the distinction between free and proprietary systems clear. Without this transparency, there will be little incentive for manufacturers to create truly free systems. An independent body which could certify 100% free Linux systems would be ideal, but this body does not currently exist and it is not clear who could credibly take on that task. In its absence, all we can do is to insist that systems vendors be clear about just what they are selling.

Comments (38 posted)

Page editor: Jonathan Corbet

Security

Fighting image spam

August 23, 2006

This article was contributed by Jake Edge.

A number of spammers have been evading filters like SpamAssassin (SA) recently by encoding their messages as images. SA already has a set of rules that are meant to combat image spam, but the more recent messages (typically for stock scams or pharmacy products) have been crafted to avoid them. This would indicate, once again, that spammers are using SA to pre-test their messages and are modifying them to get through. SA developers, however, are up to the challenge and two specific countermeasures have been released.

The first technique uses Optical Character Recognition (OCR) software to pull words out of the images and then uses a blacklist of words to increase the SA score. It was quickly realized that spammers are using similar obfuscation techniques in the images that they have long used in text emails (misspelling words, using characters that look like others, etc.) so a fuzzy matching was added to the plugin.

Unsurprisingly, there are already reports of images that put a light background of random 'snow' behind the text (example). This practice does not affect the readability for humans, but does affect the quality of the OCR output. The FuzzyOCR developers have quickly adapted by using a feature that removes smaller particles before doing the OCR scan. The question remains, of course, whether the OCR software will be able to keep up with obfuscations that will still be readable to humans. Human pattern matching may be too good for the state of the art in OCR.

The plugin uses several external programs from the netpbm tools, the gocr open source OCR program and several other libraries and perl modules. This is a fairly heavy handed approach, requiring a good bit of installation and configuration of the various pieces.

Another approach is the ImageInfo plugin, which does not require any external tools. It looks at the GIF and PNG headers of images in the email and calculates the area, in pixels, that they cover. Those values can be used in SA rules to increase the score of those having the characteristics of the latest image spam. The current ruleset penalizes single images that are larger than 180K pixels as well as a combinations of four or more images that total to more than 180K. It seems very likely that the spammers will be using the plugin and testing their images so this ruleset will likely have to evolve rather quickly.

It is interesting to watch the battle over our email inboxes as the level of cleverness of the spammers seems to be increasing over time. This is clearly an arms race and one that spam filtering developers will have to stay on top of for the foreseeable future. Long term solutions to the problem do not seem to exist and this incremental measure-countermeasure war is here to stay.

Comments (48 posted)

New vulnerabilities

binutils: buffer overflow

Package(s):binutils CVE #(s):CVE-2005-4807
Created:August 17, 2006 Updated:October 19, 2006
Description: The GNU assembler (gas) in binutils is vulnerable to a buffer overflow. If a user can be tricked into assembling a specially crafted file with gcc or gas, arbitrary code can be executed with the privileges of the user.
Alerts:
Ubuntu USN-366-1 binutils 2006-10-18
Ubuntu USN-336-1 binutils 2006-08-16

Comments (3 posted)

imagemagick: buffer overflow

Package(s):imagemagick CVE #(s):CVE-2006-4144
Created:August 17, 2006 Updated:August 29, 2006
Description: The imagemagick SGI file format decoder is vulnerable to a buffer overflow. If a user can be tricked into processing a specially crafted SGI image, arbitrary code may be executed with the privileges of the user.
Alerts:
Mandriva MDKSA-2006:155 ImageMagick 2006-08-29
rPath rPSA-2006-0159-1 ImageMagick 2006-08-29
Trustix TSLSA-2006-0048 imagemagick, kernel, php, php4 2006-08-25
Red Hat RHSA-2006:0633-03 ImageMagick 2006-08-24
Fedora FEDORA-2006-929 ImageMagick 2006-08-23
Ubuntu USN-337-1 imagemagick 2006-08-16

Comments (none posted)

php: multiple vulnerabilities

Package(s):php CVE #(s):
Created:August 18, 2006 Updated:August 23, 2006
Description: Several vulnerabilities have been fixed in PHP 4.4.4 and 5.1.5.
  • Added missing safe_mode/open_basedir checks inside the error_log(), file_exists(), imap_open() and imap_reopen() functions.
  • Fixed overflows inside str_repeat() and wordwrap() functions on 64bit systems.
  • Fixed possible open_basedir/safe_mode bypass in cURL extension and on PHP 5.1.5 with realpath cache.
  • Fixed overflow in GD extension on invalid GIF images.
  • Fixed a buffer overflow inside sscanf() function.
  • Fixed an out of bounds read inside stripos() function.
  • Fixed memory_limit restriction on 64 bit system.
Alerts:
Slackware SSA:2006-230-02 php 2006-08-18

Comments (none posted)

php: arbitrary code execution

Package(s):php CVE #(s):CVE-2006-4020
Created:August 22, 2006 Updated:September 21, 2006
Description: A vulnerability was discovered in the sscanf function that could allow attackers in certain circumstances to execute arbitrary code via argument swapping which incremented an index past the end of an array and triggered a buffer over-read.
Alerts:
Red Hat RHSA-2006:0682-01 PHP 2006-09-21
Ubuntu USN-342-1 php4, php5 2006-09-07
Gentoo 200608-28 php 2006-08-29
Mandriva MDKSA-2006:144 php 2006-08-21

Comments (none posted)

trac: missing input sanitizing

Package(s):trac CVE #(s):CVE-2006-3695
Created:August 18, 2006 Updated:August 23, 2006
Description: Felix Wiemann discovered that trac, an enhanced Wiki and issue tracking system for software development projects, can be used to disclose arbitrary local files. To fix this problem, python-docutils needs to be updated as well.
Alerts:
Debian DSA-1152-1 trac 2006-08-18

Comments (none posted)

Page editor: Jonathan Corbet

Kernel development

Brief items

Kernel release status

The current stable 2.6 kernel is 2.6.17.11, released on August 23. It is a relatively large patch set with fixes for a number of important bugs. Before that, 2.6.17.10 was released on August 22. This one has three security fixes: one for a privilege escalation problem in the SCTP code, one for a UDF filesystem memory corruption bug, and one for a crash which can only be triggered by a privileged user. 2.6.17.9 was released on August 18 with a single, PowerPC-specific security fix.

The current 2.6 prepatch remains 2.6.18-rc4. Linus surfaced from his vacation long enough to merge 100 or so fixes into the mainline repository, but little more than that has happened on that front.

The current -mm tree is 2.6.18-rc4-mm2. Recent changes to -mm include a kernel stack protector patch set (labeled "security placebo"), the ability to filter core dumps through a helper application, and a lot of fixes.

The current stable 2.4 kernel is 2.4.33.2, released on August 22. It contains a small number of fixes, including one for the latest SCTP vulnerability. Previously, 2.4.33.1 came out on August 19 with another pair of security fixes.

The 2.4.34 process has begun with 2.4.34-pre1, with another small set of fixes (but see below as well).

Comments (none posted)

Kernel development news

Old kernels and new compilers

Under the long-lasting maintainership of Marcelo Tosatti, the 2.4 kernel went into a deep maintenance mode, with only important fixes being considered for merging. For some people, perhaps, it was a little too deep - Marcelo clearly had other tasks besides 2.4 maintenance keeping him busy. Even so, few expected major changes when Willy Tarreau took over 2.4 maintenance after the 2.4.33 release. Why mess with 2.4 at this point?

So Willy's 2.4.34-pre1 announcement raised a few eyebrows. The prepatch itself contains a relatively small number of patches of the type one would expect. But the announcement itself notes that Willy is considering merging a set of patches to allow 2.4 kernels to be built with current gcc 4.x compilers. This is not a trivial set of changes; gcc 4.x is sufficiently different that a fairly wide-ranging set of fixes is required. The gcc 4.x transition for 2.6 was not an overnight affair.

A clear question comes immediately to mind: why would somebody who is not interested in running a current kernel be bothering with contemporary compilers? One answer is to be found in the announcement itself: there are administrators who deploy 2.4 kernels on ultra-stable systems, but who build those kernels on their desktops. It is getting increasingly hard to find a current distribution with a compiler old enough to build 2.4 kernels, so these administrators are finding themselves in a bit of a bind. A 2.4 kernel which could be compiled with a current gcc would allow current systems to be used to build kernels for deployment on stable, production systems, many of which may not have their own compilers installed at all.

Solar Designer has also noted that Openwall GNU/*/Linux is planning to upgrade to gcc 4.x and would really rather not have to change to the 2.6 kernel at the same time.

For an interesting read, see Willy's description of the user base, as he sees it, for the 2.4 kernel. In his view, the major users are those setting up very high-reliability sites. These people prefer 2.4 kernels for this job:

Simply because we already know from collective experience that these versions can achieve very long uptimes (while we don't know this yet for a fresh new version which got 5700 patches in the last 3 months), and because with the addition of very few patches, you can make a bet on security: as long as newly discovered vulnerabilities don't affect you or are covered by your additional patches, you win. If you need to update and induce excessive downtime, you lose and pay penalties.

The idea is to keep these people happy - by enabling the use of current compilers, among other things - until a 2.6 kernel comes along which is able to provide the same sort of stability guarantees. The 2.6 development model makes that sort of guarantee harder, however, because older 2.6.x kernels go out of general maintenance relatively quickly (though distributors can and do maintain them for longer). It is hard to find a 2.6 kernel with a multi-year track record of reliability, security, and ongoing fixes.

Willy's hope is that the current 2.6.16 kernel, which Adrian Bunk has stepped forward to maintain for the long term, will help in this regard. Once 2.6.16 has received a year or two of fixes (and nothing else), it might reach a point where high-reliability people might trust it in deployed systems. Time will tell if this kernel is able to reach that point.

As an aside, it's worth mentioning that a small number of developers (well, OK, one developer) have expressed some discontent about the 2.6.16 long-term process. This developer has said that it would have been better to elect an extra-stable tree maintainer through some sort of popular vote, and, perhaps, to move on to a 2.7 development series as well. This complaint ignores the fact that volunteers to maintain 2.6 kernels over the long term have been in relatively short supply; in fact, Adrian would appear to be about the only one. It does not appear that Adrian's appointment as the long-term 2.6.16 maintainer has deprived anybody else of their lifetime dreams. So maintainer elections - other than those of the "vote with your feet" variety - seem unlikely to happen in the near future.

Comments (12 posted)

Kevents and review of new APIs

The proposed kevent interface has been covered here before - see this article and this one too. Kevents appear to have gained significant momentum over the last few weeks, to the point that inclusion in 2.6.19 is not entirely out of the question. Most developers who have reviewed the code seem to like the core idea (a unified interface for applications to get information on all events of interest) and the implementation within the kernel. Only now, however, is significant attention being paid to the user-space API which comes with kevents. But the definition of that API is of crucial importance. This article will look at it from two perspectives - first technical, then political.

The discussion of the proposed API has been hampered somewhat by the lack of associated documentation - and the fact that said API is still changing quickly. In an attempt to pull together some of the available information, Stephen Hemminger has put up a page at OSDL describing the system call API. That page misses one important aspect of kevents, however: the ability to receive events via a shared memory interface. In an attempt to fill that gap, we'll look at the August 23 version of the memory-mapped kevent API.

One of the goals behind kevents is to make the processing of events as fast as possible - the idea being that a high-performance network server (say) can work through vast numbers of events per second without appreciable system overhead. One way to achieve this is to avoid system calls altogether whenever possible. That is why there is interest in mapping kevents directly into user space; this approach will allow the application to consume them without calling into the kernel for each one.

To use the mmap interface, the application obtains a kevent file descriptor, as usual. A simple call to mmap() will then create the shared buffer for kevent communication. The size of this buffer is currently determined by an in-kernel parameter - the maximum number of kevents which will be stored there. Presumably there will eventually be a KEVENT_MMAP_PAGES macro (or some such) to free the application from trying to figure out how many pages it should map, but that is not yet provided.

The resulting memory array is treated as a big circular buffer by the kernel. There is a single index only, however - where the next event will be written by the kernel. In other words, the kernel has no way to know which events have been consumed by the application; if that application falls too far behind, the kernel will begin to overwrite unprocessed events. For this reason, perhaps, the buffer is made relatively large - 4096 events fit there in the current version of the patch.

The events stored in the buffer are not the same ukevent structures used by the system call interface. There is, instead, a shortened version in the form of struct mukevent:

    struct kevent_id
    {
	union {
	    __u32 raw[2];
	    __u64 raw_u64 __attribute__((aligned(8)));
	};
    };

    struct mukevent
    {
	struct kevent_id	id;
	__u32			ret_flags;
    };

The id field contains some information about what happened: the relevant file descriptor, for example. The actual event code itself is not present, however.

The event ring is not quite a pure circular buffer. It is formatted with a four-byte field at the beginning of each page, followed by as many mukevent structures as will fit within the page. The four-byte field in the first page contains the current event index - where the kernel will write the next event. The application will, presumably, keep track of the last event it read from the buffer, moving that counter forward until it catches up with the kernel. The application must take care, however, to notice every time it crosses a page boundary so it can skip the count field.

Since there is no way to inform the kernel that events have been consumed from the memory-mapped ring, and since the full event information is not available via that ring, the application must still call into the kernel for events. Otherwise, if nothing else, they will accumulate there until they reach their maximum allowed number. So the advantage of the memory-mapped approach will be hard to obtain with the current code. As was noted above, however, this API is very young. One assumes that these little problems will be ironed out in the near future.

Meanwhile, kevents have created a separate discussion on how new APIs go into the kernel. One Nicholas Miell requested that some documentation for this interface be written:

Is any of this documented anywhere? I'd think that any new userspace interfaces should have man pages explaining their use and some example code before getting merged into the kernel to shake out any interface problems.

The response he got was "Get real". Others suggested that, if Mr. Miell really wanted documentation, he could sit down and write it himself. It must be said that, through the discussion, Mr. Miell has comported himself in a way which is highly unlikely to inspire cooperation from anybody. He seems to carry a certain contempt for the interface, the process, and the people involved in it.

But it must also be said that he has a point. The creation of user-space APIs differs from how most kernel code is written. Much is made of the evolutionary nature of the kernel itself - things continually evolve as better solutions to problems are found. User-space interfaces, however, cannot evolve - once they are shipped as part of a mainline kernel, they are set in stone and must be maintained forever. They must be right from the outset. So it is not unreasonable to expect that the level of review for new user-space APIs would be higher, and that documentation of proposed APIs, which can be expected to help the review process, should be provided. It is true, however, that the original developer is not always the best person to provide that documentation.

One question which has been raised about this interface has to do with its similarity to the FreeBSD kqueue mechanism. The intent of the interface is the same, but no attempt to emulate the kqueue API has been made. Andrew Morton has said:

I mean, if there's nothing wrong with kqueue then let's minimise app developer pain and copy it exactly. If there _is_ something wrong with kqueue then let us identify those weaknesses and then diverge. Doing something which looks the same and works the same and does the same thing but has a different API doesn't benefit anyone.

There are, evidently, real reasons for not replicating the kqueue interface, but those reasons have not, yet, been made clear.

Kevents will, it is hoped, be a major improvement for people writing applications for Linux. This new API should bring together all information of interest into a single place, provide significant performance benefits, and ease porting of applications from other operating systems. But, if this API is going to meet the high expectations being placed on it, it will require a high level of review from a number of interested parties. That review is now starting to happen, so expect this API to remain in flux for some time yet.

Comments (7 posted)

KHB: A Filesystems reading list

August 21, 2006

This article was contributed by Valerie Aurora

We've all been there - you're wandering around a party at some Linux event clutching your drink and looking for someone to talk to, but everyone is having some obscure technical conversation full of unfamiliar jargon. Then, as you slide past a cluster of important-looking people, you overhear the word "superblock" and think, "Superblock, that's a file system thing... I read about file systems in operating systems class once." Gratefully, you join the conversation, only to discover while you know some of the terms - cylinder group, indirect block, inode - you're still unable to come up with stunning ripostes like, "Aha, but that's really just another version of soft updates, and it doesn't solve the nlinks problem." (Admiring silence ensues.) Now what? You want to be able to make witty remarks about the pros and cons of journaling while throwing back the last of your martini, but you don't know where to start.

Fortunately, you can get a decent grasp of modern file systems without reading a whole book on file systems. (I haven't yet read a book on file systems I would recommend, anyway.) After reading these file systems papers (or at least their abstracts), you'll be able to at least fake a working knowledge of file systems - as long as everyone is drinking and it's too loud to hear anyone clearly. Enjoy!

The Basics

These papers are oldies but goodies. While the systems they describe are fairly obsolete and have been heavily improved since these initial descriptions, they make a good introduction to file systems structure and terminology.

A Fast File System for UNIX by Marshall Kirk McKusick, William Joy, Samuel Leffler and Robert Fabry. This paper describes the first version of the original UNIX file system that was suitable for production use. It became known as FFS (Fast File System) or UFS (UNIX File System). The "fast" part of the name comes from the fact that the original UNIX file system maxed out at about 5% of disk bandwidth, whereas the first iteration of FFS could use about 50% - a huge improvement. This paper is absolutely foundational, as the majority of production UNIX file systems are FFS-style file systems. While some parts of this paper are obsolete (check out the section on rotational delay), it's a simple, readable explanation of basic file system architecture that you can refer back to time and again. Also, it's pretty fun to read a paper describing the first implementation of, for example, symbolic links for a UNIX file system.

For extra credit, you can read the original file system checker paper, Fsck - the UNIX file system check program, by Marshall Kirk McKusick and T. J. Kowalski. It describes the major issues in checking and repairing file system metadata consistency. Improving fsck is a hot topic in file systems right now, so reading this paper might be worthwhile.

Vnodes: An Architecture for Multiple File System Types in Sun UNIX by Steve Kleiman. The original UNIX file system interface had been designed to support exactly one kind of file system. With the advent of FFS and other file systems, operating systems now needed to support several different file systems. Several solutions were proposed, but the dominant solution ended up being the VFS (Virtual File System) interface, first proposed and implemented by Sun. This paper explains the rationale behind VFS and vnodes.

Design and Implementation of the Sun Network Filesystem by Russel Sandberg, David Goldberg, Steve Kleiman, Dan Walsh, and Bob Lyon. Once upon a time (1985, specifically), people weren't really clear on why you would want a network file system (as opposed to, for example, a network disk or copying around files via rcp). This paper explains the needs and requirements that resulted in the invention of NFS, the network file system everyone loves to hate but uses all the time anyway. It also discusses the design of the VFS. A fun quote from the paper: "One of the advantages of the NFS was immediately obvious: as the df output below shows, a diskless workstation can have access to more than a Gigabyte of disk!"

Slaying the fsck dragon

One of the major problems in file systems is keeping the on-disk data consistent in the event that a file system is interrupted in the middle of update (for example, if the system loses power). Original FFS solved this problem by running fsck on the file system after a crash or other unclean unmount, but this took a really long time and could lose data. Many smart people thought about this problem and came up with four major approaches: journaling, log-structured file systems, soft updates, and copy-on-write. Each method provided a way of quickly recovering the file system after a crash. The most popular approach was journaling, since it was both relatively simple and easy to "bolt-on" to existing FFS-style file systems.

Journaling file systems solve the fsck problem by first writing an entry describing an update to the file system to a on-disk journal - a record of file system operations. Once the journal entry is complete, the main file system is updated; if the operation is interrupted, the journal entry is replayed on the next mount, completing any half-finished operations in progress at the time of the crash. Most production file systems (including ext3, XFS, VxFS, logging UFS, and reiserfs) use journaling to avoid fsck after a crash. No canonical journaling paper exists outside the database literature (from whence the idea was lifted wholesale), but Journaling the Linux ext2fs Filesystem by Stephen Tweedie is a good choice for learning both journaling techniques in general and the details of ext3 in particular.

The Design and Implementation of a Log-Structured File System by Mendel Rosenblum and John K. Ousterhout. Journaling file systems have to write each operation to disk twice: once in the log, and once in the final location. What would happen if we only wrote the data to disk once - in the journal? While the log-structured architecture was an electrifying new idea, it ultimately turned out to be impractical for production use, despite the concerted efforts of many computer science researchers. Today, no major production file system is log-structured. (Note that a log-structured file system is not the same as a logging file system - logging is another name for journaling.)

If you're looking for cocktail party gossip, Margot Seltzer and several colleagues published papers critiquing and comparing log-structured file systems to variations of FFS-style file systems, in which LFS usually came out rather the worse for the wear. This led to a semi-famous flame war in the form of web pages, archived here.

Soft Updates: A Technique for Eliminating Most Synchronous Writes in the Fast Filesystem by Marshall Kirk McKusick and Greg Ganger. Soft updates carefully orders writes to a file system such that in the event of a crash, the only inconsistencies are relatively harmless ones - leaked blocks and inodes. After a crash, the file system is mounted immediately and fsck runs in the background. The performance of soft updates is excellent, but the complexity is very high - as in, soft updates has been implemented only once (on BSD) to my knowledge. Personally, it took me about 5 years to thoroughly understand soft updates and I haven't met anyone other than the authors who claimed to understand it well enough to implement it. The paper is pretty understandable up to about page 5, at which point your head will explode. Don't feel bad about this, it happens to everyone.

File System Design for an NFS File Server Appliance by Dave Hitz, James Lau, and Michael Malcom. This paper describes the file system used inside NetApp file servers, Write-Anywhere File Layout (WAFL), as of 1994 (it's been improved in many ways since then). WAFL was the first major use of a copy-on-write file system - one in which "live" (in use) metadata is never overwritten in place but copied elsewhere on disk. Once a consistent set of updates has been written to disk, the "superblock" is re-written to point to the new set of metadata. Copy-on-write has an interesting set of trade-offs all its own, but has been implemented in a production file system twice now; Solaris's ZFS is also a copy-on-write file system.

File system performance

Each of these papers focuses on file system performance, but also introduces more than one interesting idea and makes a good starting point for exploring several areas of file system design and implementation.

Extent-like Performance from a UNIX File System by Larry McVoy and Steve Kleiman. This 1991 paper describes optimizations to FFS that doubled file system bandwidth for sequential I/O workloads. While the optimizations described in this paper are considered old hat these days (ever heard of readahead?), it's a good introduction to file system performance.

Sidebar: Where are they now?

You might have recognized some of the names in the author lists of the papers in this article - and chances are, you aren't recognizing their names because of their file system work. What else did these people do? Here's a totally non-scientific selection.

  • Bill Joy - co-founded Sun Microsystems
  • Larry McVoy - wrote BitKeeper, co-founded BitMover
  • Steve Kleiman - CTO, Network Appliance
  • Mendel Rosenblum - co-founder, VMWare
  • John Ousterhout - wrote Tcl/Tk, co-founded several companies
  • Margot Seltzer - co-founder, Sleepycat Software
  • Dave Hitz - co-founder, Network Appliance
Obviously, anyone wanting to found a successful company and make millions of dollars should consider writing a file system first.
Scalability in the XFS File System by Adam Sweeney, Doug Doucette, Wei Hu, Curtis Anderson, Mike Nishimoto, and Geoff Peck. This paper describes the motivation and implementation of XFS, a 64-bit file system using extents, B+ trees, dynamically allocated inodes, and journaling. XFS is not by any means an FFS-style file system and reading this paper will give you the basics on most extent-based file systems. It also describes quite a few useful optimizations for avoiding fragmentation, scaling to multiple threads, and the like.

The Utility of File Names by Daniel Ellard, Jonathan Ledlie, and Margot Seltzer. File system performance and on-disk layout can be vastly improved if the file system can predict (with reasonable accuracy) the size and access pattern of a file before it writes it to disk. The obvious solution is to add a new set of file system interfaces allowing the application to give explicit hints about the size and properties of a new file. Unfortunately, the history of file systems is littered with unused per-file interfaces like this (how often do you set the noatime flag on a file?). However, it turns out that applications are already giving these hints - in the form of file names, permissions, and other per-file properties. This paper is the first in a series demonstrating that a file system can make useful predictions about the future of a file based on the file name and other properties.

Further reading and acknowledgments

If you are interested in learning more about file systems, check out the Linux file systems wiki, especially the reading list. If you have a good file systems paper or book, please add it to the list, which is publicly editable (look for the password on the front page of the wiki). Note that I will ignore any comments of the form "You should have included paper XYZ!" unless it is also added to the reading list on the file systems wiki - WITH a short summary of the paper. With any luck, we'll have a fairly complete list of Linux file systems papers in the next few days.

If you are interested in working on file systems, or any other area of systems programming, you should contact the author at val dot henson at gmail dot com.

Thanks to Nikita Danilov, Zach Brown, and Kristen Accardi for paper suggestions and encouragement to write this article. Thanks to Theodore Y. Ts'o for actually saying something very similar to the stunning riposte in the first paragraph (which was, by the way, a completely accurate and very incisive criticism of what I was working on at the moment).

Comments (38 posted)

Patches and updates

Kernel trees

Andrew Morton 2.6.18-rc4-mm2 ?
Greg KH Linux 2.6.17.9 ?
Greg KH Linux 2.6.17.10 ?
Greg KH Linux 2.6.17.11 ?
Adrian Bunk Linux 2.6.16.28-rc2 ?
Willy Tarreau Linux 2.4.34-pre1 ?
Willy Tarreau Linux 2.4.33.1 ?
Willy Tarreau Linux 2.4.33.2 ?

Core kernel code

Development tools

Device drivers

Documentation

Filesystems and block I/O

Janitorial

Memory management

Networking

Security-related

Virtualization and containers

Rusty Russell paravirt.h header ?

Miscellaneous

Kay Sievers udev 098 release ?
Douglas Gilbert smp_utils-0.91 available ?

Page editor: Jonathan Corbet

Distributions

News and Editorials

Fedora house keeping

The Fedora Project states that it is "always free for anyone to use, modify and distribute, now and forever". This is a great goal, but sometimes it is harder to achieve in practice. Sometimes a package might slip through without a proper audit, or maybe the license has changed. For whatever reason, there are a few packages in Fedora that do not meet the definition of free software. As a result, the project is currently in the midst of a software licensing audit.

Such audits take many iterations and are not without some pain, at least for some. As a result of this work, cdrtools has been moved back to an earlier, GPL-only version, netpbm has had a number of files removed, and ckermit and macutils are gone altogether. Openmotif looks likely to come out - and to take xpdf with it.

Most people seem to embrace the concept of a totally free distribution, until some pet package is deemed "not free enough". Then the sparks fly and an adherence to open source is equated with religious zealotry.

Sometimes freedom can be inconvenient. But Red Hat's Michael Tiemann objects to allegations that Fedora is trying to become another Debian:

You forget that Fedora participants have an inside track on seeing their stuff become enterprise-ready. Some people actually care about seeing their code running in mission-critical environments. And some people actually appreciate the close interaction with Red Hat's engineers that comes as a result in working in the same tree we do. So Fedora is the best of both worlds (free software and proto-enterprise).

What we are seeing here is that Fedora is trying to take the "free software" part of the equation seriously.

Comments (10 posted)

New Releases

64 Studio 0.9.2 'Toe Rag Update 2' released

The third beta release of the 64 Studio is out. Click below for a short list of known bugs in this release.

Full Story (comments: none)

BLAG50001 Released

BLAG50001 (smack) has been released. "BLAG50001 (smack) is based on Fedora Core 5 and uses packages from Extras, FreshRPMS, Dries, and ATrpms. It includes all Fedora updates as of time of release."

Full Story (comments: none)

Familiar v0.8.4 released

Familiar v0.8.4 is out with initial support for the HP iPAQ h2200, hx4700, and h6300 series of devices. "Please consider support for these devices as a technology preview. h2200 and hx4700 are approaching full support although there may be a few rough edges. h6300 support is still in an earlier stage and may not be ready for daily use."

Full Story (comments: 1)

LFS LiveCD x86-6.2-2

The Linux From Scratch LiveCD x86-6.2-2 is available. "The main change is that the CD now includes a 64-bit kernel for x86_64 (type "linux64" at the boot prompt). This makes it possible to use the "chroot" scenario from the CLFS book when building a CLFS x86_64 system (either pure 64-bit, or multilib) from this CD. Userspace on the CD is still 32-bit, and the old 32-bit kernel is still available for those people who have 32-bit PCs."

Full Story (comments: none)

Slackware 11.0 release candidate 2

The Slackware change log for August 19 says, "This is mostly frozen now unless bugs (or irresistible upgrades) come up, so I'll call this update Slackware 11.0 release candidate 2. :-)" See the full change log for details.

Full Story (comments: none)

Trustix Secure Linux 3.0.5 Beta 1

The first beta release of Comodo Trustix Secure Linux 3.0.5 is available. "The focus of this release is to re-introduce Anaconda as being the community preferred choice of installer. Trustix wishes to make use of Anaconda's features and integrate it into installing a secure right server."

Full Story (comments: none)

Distribution News

Debian BSP Marathon / BSP in Vienna 8.-10. September

A Debian Bug Squashing marathon is underway with bug squashing parties coming up in Vienna, Germany, the Netherlands, and France.

Full Story (comments: none)

Distribution Newsletters

Debian Weekly News

The Debian Weekly News for August 22, 2006 covers the backports archive and the tilde character, Debian GNU/Linux support on HP servers, event coordination in the German-speaking area, a review of Debian development tools, new desktop features, publicity for Debian events, and several other topics.

Full Story (comments: none)

Fedora Weekly News Issue 60

This week the Fedora Weekly News looks at Max Spevack: Fedora on Slashdot, Jesse Keating: Fedora Legacy Answers, Rahul Sundaram: Red Hat and Intellectual Property Reform, Luke Macken: Teaching an old pup some new tricks, Tom Tromey: Fedora Core 6 Test 2, XenSource CTO Talks Up Xen Virtualization, OLPC laptops to debut with Thai kids, Where's Red Hat? Peek Under Fedora, and more.

Comments (none posted)

Gentoo Weekly Newsletter

The Gentoo Weekly Newsletter for August 14, 2006 covers Linux World Conference and Expo, OSL Rackathon, PyBugz and more.

Comments (none posted)

Ubuntu Weekly News #10

The Ubuntu Weekly Newsletter for August 19, 2006 covers Ubuntu wins Golden Penguin, Ubuntu at LinuxWorldExpo in San Francisco, Ubuntu 6.06 LTS updates, Edgy new and updated apps, Summer of Code update and several other topics.

Full Story (comments: none)

DistroWatch Weekly, Issue 165

The DistroWatch Weekly for August 21, 2006 is out. "A slow week in terms of distribution releases, but an exciting one for those who attended the LinuxWorld show in San Francisco. Missing from the exhibition for the first time in years, Red Hat also failed to release the first beta of Red Hat Enterprise Linux 5 - apparently due to issues with Xen. But the company was represented by a Fedora booth - a distribution that is rapidly regaining trust among its users and passion among its developers. In other news, we'll take a quick look at Linux in Cuba, point you to a list of new features in Ubuntu "Edgy Eft", and link to a chart depicting Linux distribution timeline. A range of new distributions should make up for the lack of other news this week."

Comments (none posted)

Package updates

Fedora updates

Updates for Fedora Core 5: kdeaccessibility (update to KDE 3.5.4), kdeaddons (update to KDE 3.5.4), arts (update to KDE 3.5.4), kdeadmin (update to KDE 3.5.4), kdebase (update to KDE 3.5.4), kdebindings (update to KDE 3.5.4), kdeedu (update to KDE 3.5.4), kdegames (update to KDE 3.5.4), kdegraphics (update to KDE 3.5.4), kde-i18n (update to KDE 3.5.4), kdelibs (update to KDE 3.5.4), kdemultimedia (update to KDE 3.5.4), kdenetwork (update to KDE 3.5.4), kdepim (update to KDE 3.5.4), kdesdk (update to KDE 3.5.4), kdeutils (update to KDE 3.5.4), kdevelop (update to KDE 3.5.4), kdewebdev (update to KDE 3.5.4), kdeartwork (update to KDE 3.5.4), cups (bug fixes), ksh (build for FC5), ftp (support for IPv6 multihome), scim-chewing (add patch), ypbind (bug fix), nfs-utils (bug fix), iptraf (bug fix), ncompress (CVE-2006-1168), system-config-printer (bug fixes), eject (update to 2.1.5), tzdata (upstream 2006j), transfig (add requires: ghostscript), nfs-utils (bug fix).

Comments (none posted)

Ubuntu updates

Updates for Ubuntu 6.06 LTS: xorg-server 1:1.0.2-0ubuntu10.3 (bug fixes), xorg-server 1:1.0.2-0ubuntu10.2 (bug fixes), xorg-server 1:1.0.2-0ubuntu10.4 (reverted patch 005_pci_domain.dpatch), yaboot 1.3.13-4.1ubuntu6 (backport bug fixes from Debian/Edgy).

Comments (none posted)

Newsletters and articles of interest

Securing the CentOS Perfect Setup with Bastille (HowtoForge)

HowtoForge looks at securing CentOS. "This article shows how to secure a CentOS server using psad, Bastille, and some other tweaks. psad is a tool that helps detect port scans and other suspicious traffic, and the Bastille hardening program locks down an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise."

Comments (none posted)

Installing Debian GNU/Linux using debootstrap (Linux.com)

Linux.com shows how to use debootstrap to install Debian. "If you're not afraid of getting your hands dirty with the command line, you can try an alternative method for installing Debian. Debootstrap creates a basic Debian installation, and can also be used for creating custom, minimal installations on embedded systems or for replacing a pre-installed Linux distribution with Debian on a co-located server."

Comments (2 posted)

Fedora Project Leader Max Spevack Responds (Slashdot)

Slashdot interviews Fedora project leader Max Spevack. "The Fedora Project, as many of you know, is a partnership between Red Hat and the OSS community. The highest level of decision-making within Fedora is the Fedora Project Board, a group that is empowered to make the decisions about Fedora policy, to set priorities, and to hold the rest of the Fedora sub-projects accountable for what they are doing. The Fedora Board has nine members, five of whom are Red Hat employees, and four of whom are community members. That breakdown is not set in stone -- that's just what we started with. It is my hope that down the road, the majority of the Board will be Fedora's community leaders."

Comments (none posted)

Distribution reviews

Ark Linux 2006.1 Review (ExtremeTech)

ExtremeTech reviews the recent release of Ark Linux 2006.1. "Ark is very much a KDE-based Linux distribution. After booting into it you'll see a snazzy KDE desktop. The welcome wizard greets you after Ark Linux boots and it allows you to customize your desktop to your preferences. If you've run Windows XP before, the Ark Linux desktop will remind you somewhat of that operating system."

Comments (none posted)

A walk in the park with Puppy Linux (Linux.com)

Linux.com reviews Puppy Linux. "Puppy Linux is a small Linux live CD distribution that can boot from a CD, DVD, or USB drive; a hard disk is optional. According to the Puppy Linux Web site, Puppy's goals include being Linux newbie-friendly, booting and running quickly, and including all the applications typical users need. The newest version is its most usable yet."

Comments (none posted)

Page editor: Rebecca Sobol

Development

A comparison of Mail Transfer Agents - Part One

August 23, 2006

This article was contributed by Dan Shearer

For a lot of people the choice of the Mail Transfer Agent is important. The wrong choice can mean lost time and money, lower reliability and increased risk to networks.

Debates over MTAs sometimes last for years, and this article covers the main points that come up over and over. Unfortunately, apart from this article there are no general comparisons of MTA characteristics on the Internet, and even very little benchmarking. The remarks here are personal opinions drawn from readily-verifiable facts and subjective comments drawn from experience. Nearly every MTA has a vociferous and sometimes combative group of supporters, not always including the principal authors of the MTA.

It is easy to see why administrators care about which MTA they use. Large installations require a lot of time spent tuning the MTA, and for any site email is without doubt the most important use of the Internet. End users can get by without a web site or a browser for a little, but without email business stops. And so countless administrators invest time in learning how to tweak their internet mail delivery tool in order to meet their various goals. But which tool should they use when?

Most Internet email seems to be delivered by one of four MTAs:

There are other worthy free MTAs to talk about, such as zmailer and smail3, but since they are not so widely used I decided to omit them. There are some unworthy MTAs too, these I am delighted to omit.

How To Compare MTAs

Each of these four widely-used MTAs have broadly similar features. All of them can handle large amounts of mail; can interact with databases in many formats; have an extensive knowledge of the many SMTP variants in use; are not trivially exploitable; have the source code available in a free manner; have third-party documentation available; and have significant user communities. They even have logos!

There are some assumptions implicit in the rest of this article. If you are looking for a product that presents an administrative interface and performance results similar to Microsoft Exchange or Lotus Notes, this document is not for you. I do not believe either of these products and their aspiring competitors can be classed as MTAs, since they attempt to address dozens or hundreds of other functions besides delivering mail. On the other hand, if you want some guidance for selecting between credible alternatives for an important mail hub, read on.

No MTA can score well in every way of measuring an MTA. The needs of users vary greatly and some criteria are mutually orthogonal. Commonly cited MTA selection criteria are:

  • Ease of administration
  • Security
  • Performance
  • Long-term viability

Design features decide how much each MTA meets these criteria. But since opinions vary widely there are many equally valid different comparisons. Contradictory examples of these features are:

  • single configuration file, so everything is in one place
  • many single-purpose and optional configuration files
  • minimal and careful syntax
  • powerful embedded scripting language
  • maximum code stability
  • source code contributions regularly incorporated
  • minimum possible features added
Just about every mail delivery scenario can be met, in one way or another, by all four MTAs. So there is no one right answer.

The rest of part one of this two-part article series is available here, it presents a detailed look at qmail and Postfix. Part two will be featured on next week's LWN.net development page.

Comments (17 posted)

System Applications

Audio Projects

Rivendell v0.9.71 announced

Version 0.9.71 of the Rivendell radio automation system is out. Changes include: "Copying Carts from SoundPanel in RDAirPlay. It's now possible to copy carts from the SoundPanel button in RDAirPlay when touching the COPY button. VoiceTracker Rubberbanding. Audio fadeup/fadedown points and levels can now be set independently of the segue overlap in the Voice Tracker dialog by moving the 'rubberbands' in the waveform windows. Bugfixes."

Full Story (comments: 1)

Libraries

IT++ 3.10.5 announced

Version 3.10.5 of IT++ has been announced. " IT++ is a C++ library of mathematical, signal processing, speech processing, and communications classes and functions. It is being developed by researchers in these areas and is widely used by researchers, both in the communications industry and universities. Since 2004, IT++ is also being developed as a part of the European Network of Excellence in Wireless Communications (NEWCOM)." See the change log for more information on this release.

Comments (none posted)

Networking Tools

The ZABBIX monitoring System

ZABBIX is a new network monitoring system. "ZABBIX is software that monitors numerous parameters of a network and the health and integrity of servers. ZABBIX uses a flexible notification mechanism that allows users to configure e-mail based alerts for virtually any event. This allows a fast reaction to server problems. ZABBIX offers excellent reporting and data visualisation features based on the stored data."

Comments (none posted)

Security

Sussen 0.28 released

Version 0.28 of Sussen, a vulnerability and configuration scanner, is out with new capabilities and bug fixes.

Full Story (comments: none)

Web Site Development

Campsite 2.6.1 released

Version 2.6.1 of Campsite, a multi-lingual content management system for newspaper and magazine-style websites, is available. "Campsite 2.6.1, a bug-fix update for 2.6.0, has been released. All users are encouraged to upgrade. A noteworthy news item for this release is that our automatic bug reporting tool, new in the 2.6.0 release, has already paid off with eight bugs reported by our users."

Full Story (comments: none)

Gallery 1.5.4 released (SourceForge)

Version 1.5.4 of Gallery, a web-based photo album, is available. "This release is a pure bug fix release with no security fixes. The most annoying bug was the broken permission dialog. See the Changelog for more detailed info. We recommend all Gallery 1 users upgrade to 1.5.4 to keep their Gallery up to date and avoid problems."

Comments (none posted)

The Python Web Framework (about:cmlenz)

Christopher Lenz' blog suggests that Python creator Guido van Rossum likes the Django web development framework. "Apparently, the unthinkable (in the Python microcosm, anyway) has happened over at SciPy’06 during Greg Wilson's software carpentry talk. “Guido just pronounced: Django is the [Python] web framework." This is a change of course for Guido, who previously avoided any web platform endorsements.

Comments (none posted)

Zope 3.3.0 beta 2 released

Version 3.3.0 beta 2 of the Zope web development platform is available. "Zope 3 is the next major Zope release and has been written from scratch based on the latest software design patterns and the experiences of Zope 2. Cleanup of the Zope 3 packages has continued to ensure a flexible and scalable platform. We continued the work on making the transition from Zope 2 to Zope 3 by making Zope 2.10 use even more of the Zope 3 packages. But we're not there yet. **You can't run Zope 2 applications in Zope 3.**"

Full Story (comments: none)

Miscellaneous

Jitterbit 1.1 released (SourceForge)

Version 1.1 of Jitterbit has been announced. "Jitterbit 1.1 is a major release for the Jitterbit open source integration product. Jitterbit is an open source integration tool that delivers a quick and simple way to design, configure, test, and deploy integration solutions. It supports many document types and protocols: XML, web services, database, LDAP, text, FTP, HTTP(S), file."

Comments (1 posted)

TightVNC 1.3.8 released (SourceForge)

Version 1.3.8 of TightVNC, a free remote control package derived from the VNC system, has been announced. "Version 1.3.8 is expected to be final Release Candidate for the upcoming stable release. The changes include improved support for Win32 mirror display driver (DFMirage by DemoForge), GUI improvements, and a number of bugfixes including one for infamous disconnect problem of the Win32 Server."

Comments (none posted)

Desktop Applications

Audio Applications

Traverso 0.30.1 released

Version 0.30.1 of Traverso, multi-track audio recording and editing program, has been announced. "Changes include 2 crash fixes, traverso builds on Mac OS X, and some improvements like improved Snapping and merged waveform drawing for stereo tracks."

Full Story (comments: none)

BitTorrent Applications

Azureus 2.5.0.0 released (SourceForge)

Version 2.5.0.0 of Azureus has been announced. "Azureus is a powerful, full-featured, cross-platform Java BitTorrent client. This release contains many new features, improvements and fixes."

Comments (none posted)

Business Applications

SQL-Ledger 2.6.16 announced

Version 2.6.16 of SQL-Ledger, a web-based accounting system, is out with several new features and a bug fix. See the What's New document for details.

Comments (none posted)

Data Visualization

Fltk_Contour 3.0 released

Version 3.0 of The Fltk_Contour widget has been announced. "This is the new Fltk_Contour widget which I developed from the old code Fl_Contour, I did rewrite a big part of the code to get a better performance and improved visualization, now you can get a good quality visualization of irregular distributed data, like topographic, population, temperature and so on, the new widget can make a complete 2D and 3D graphics as contour map and color map."

Comments (none posted)

Desktop Environments

GNOME Software Announcements

The following new GNOME software has been announced this week: You can find more new GNOME software releases at gnomefiles.org.

Comments (none posted)

KDE Software Announcements

The following new KDE software has been announced this week: You can find more new KDE software releases at kde-apps.org.

Comments (none posted)

KDE Commit-Digest for 20th August 2006 (KDE.News)

KDE.News has announced the August 20, 2006 edition of the KDE Commit-Digest. "In this week's KDE Commit-Digest: As the Summer Of Code draws to a conclusion, functional code imports and work in the avKode Phonon backend, KDevelop Teamwork and Advanced Session Management projects. Work begins on version 2 of the Kross scripting framework. More work on video file support in KPhotoAlbum. New features and streamlining in Konversation and Konsole. New Oxygen icons and other improvements in KGet. The introduction of wizards to automate many tasks in KMobileTools. Initial porting to KDE 4 of the console-based kdepim tools, with Kopete 0.12 moved into the KDE 3.5 branch. Experiments in fast PDF parsing in Strigi."

Comments (none posted)

First Development Snapshot of KDE4: 'Krash' (KDE.News)

KDE.News has the announcement for the first KDE4 snapshot. "This snapshot is meant as a reference for developers who want to play with parts of the new technology KDE4 will provide, those who want to start porting their applications to the new KDE4 platform and for those that want to start to develop applications based on KDE4." Some of the discussion on the lists suggest that the "Krash" name is appropriate - this is early-stage software.

Comments (none posted)

Games

WFMath 0.3.5 released

Version 0.3.5 of WFMath has been announced. "WFMath, or the WorldForge Math library’s main focus is geomotric objects, and it has classes for several shapes as well as the basic math objects, points, vectors, matrices and quaternions. It is required by all WorldForge components." This version features improvements to the Quaternion class and code efficiency improvements.

Comments (2 posted)

Instant Messaging

ChatSniff 1.0 released

Version 1.0 of ChatSniff has been announced, it features bug fixes and code size reduction. "ChatSniff is an easy to use program for Linux that monitors, or "sniffs" networks for AIM, ICQ, MSN, Yahoo! and Jabber instant messages."

Comments (none posted)

Mail Clients

SquirrelMail 1.4.8 Released (SourceForge)

Version 1.4.8 of SquirrelMail has been announced. "SquirrelMail is a PHP4-based Web email client. It includes built-in pure PHP support for IMAP and SMTP, and renders all pages in pure HTML 4.0 for maximum compatibility across browsers. It has strong MIME support and a flexible plugin system. This release contains an important security fix where a logged-in user could overwrite variables, and a collection of regular bugfixes. Details on all the changes in this release can be found in the ChangeLog. There's also two patches available against the 1.4.7 release for just the security issue: a minimal one that removes the function, because it was broken anyway, or more extended one which fixes the functionality and closes the hole."

Comments (none posted)

Medical Applications

New GNUmed Release (LinuxMedNews)

LinuxMedNews has announced the release of version 0.2 of the GNUmed open-source medical practice management application, several new features have been added.

Comments (none posted)

Music Applications

NoteEdit 2.8.1 released

Version 2.8.1 of NoteEdit, a musical score editor, is out. "This is the last major release on NoteEdit. Since some month the core team concentrates it's development on the NoteEdit successor called Canorus. More information can be found here".

Full Story (comments: none)

Miscellaneous

Monopod Is Back (GnomeDesktop)

GnomeDesktop.org covers the return of the Monopod project. "Monopod is a Podcast client for people who want to select a few channels, come back later, and find the the Podcast MP3s turn up on their hard disk. The application was originally written by the well-known Edd Dumbill & James Willcox hackers but after a year without updates the maintainership has passed to Nickolay Shmyrev who added some new goodies in the newly released v0.5: compiles with the newest Mono, Russian translation, cleanup of the EggTrayIcon and fixed an sqlite bug."

Comments (none posted)

Languages and Tools

Caml

Caml Weekly News

The August 22, 2006 edition of the Caml Weekly News is out with new Caml language articles.

Full Story (comments: none)

HTML

Website Meta Language version 2.0.11 released

Version 2.0.11 of Website Meta Language is out with bug fixes and Cygwin platform build improvements. "Website Meta Language is a sophisticated offline HTML preprocessor that is composed of 9 different passes. It is very powerful, and suitable for the automatic generation of simple and complex web-sites."

Full Story (comments: none)

Lisp

CDR - Common Lisp Document Repository

The Common Lisp Document Repository has been launched. "This resource is 'a repository of documents that are of interest to the Common Lisp community'. Each document is guaranteed not to change, and references will always refer to it."

Full Story (comments: none)

PHP

PHP 4.4.4 and PHP 5.1.5 Released

Versions 4.4.4 and 5.1.5 of PHP are out. "These two releases address a series of security problems that were discovered since the release of PHP 5.1.4 and 4.4.3."

Comments (none posted)

PHP OpenID 1.2.0-pre1 released

Version 1.2.0-pre1 of PHP OpenID has been announced. "This release includes i-name support, some small fixes, and the Ya[r]dis discovery library (bundled). Please give it a spin and give feedback!"

Full Story (comments: none)

Python

Python 2.5 release candidate 1

Release candidate 1 of Python 2.5 has been announced. "This is not yet the final release - it is not suitable for production use. It is being released to solicit feedback and hopefully discover bugs, as well as allowing you to determine how changes in 2.5 might impact you. As a release candidate, this is one of your last chances to test the new code in 2.5 before the final release. Please try this release out and let us know about any problems you find. In particular, note that changes to improve Python's support of 64 bit systems mean that some C extension modules may very well break."

Comments (none posted)

Urwid 0.9.6 announced

Version 0.9.6 of Urwid, a console-based user interface library for Python, is out. "This release improves Unicode support with Python < 2.4 and new features were added to the tutorial and reference generation scripts. The graph.py example program introduced in 0.9.5 should now work properly for everyone."

Full Story (comments: none)

Ruby

Ruby Weekly News

The August 13th, 2006 edition of the Ruby Weekly News looks at the latest discussions on the ruby-talk mailing list and comp.lang.ruby newsgroup.

Comments (none posted)

Tcl/Tk

Dr. Dobb's Tcl-URL!

The August 16, 2006 edition of Dr. Dobb's Tcl-URL! is online with new Tcl/Tk articles and resources.

Full Story (comments: none)

Dr. Dobb's Tcl-URL!

The August 21, 2006 edition of Dr. Dobb's Tcl-URL! is online with new Tcl/Tk articles and resources.

Full Story (comments: none)

Cross Assemblers

gputils 0.13.4 released

Version 0.13.4 of gputils, the GNU PIC Utilities, is out with bug fixes.

Comments (none posted)

Profilers

Profiling Your Applications with Eclipse Callisto (O'ReillyNet)

John Ferguson Smart reviews Callisto on O'Reilly. "Callisto, a bundle of optional plugins for Eclipse, now comes with a profiling tool called the Test & Performance Tools Platform (TPTP). TPTP includes testing, tracing, performance monitoring, profiling, and static-code analysis tools. John Ferguson Smart offers this guided tour of how to use TPTP to speed up your apps."

Comments (none posted)

Version Control

monotone 0.29 released

Version 0.29 of monotone, a distributed version control system, is out with several new features and bug fixes.

Full Story (comments: none)

Page editor: Forrest Cook

Linux in the news

Recommended Reading

Free software's secret weapon: FOOGL (Linux Journal)

Is FOOGL - Firefox/OpenOffice/GNU/Linux - the key to Linux desktop adoption? "It's a long-standing joke in the free software world that this will be the year when we see GNU/Linux make its breakthrough on the desktop - just like last year, and the year before that. What's really funny is that all the key GNU/Linux desktop apps are already being widely deployed, but not in the way that people have long assumed."

Comments (16 posted)

Linux phones will lock down users (vnunet)

vnunet warns us that Linux phones will not be as hackable as we might like. "Consumers who run Linux on a PC are used to having full control over the operating system, but should not expect that same level of control on a Linux powered mobile phone, warned Mike Kelley, senior vice president of engineering at PalmSource".

Comments (26 posted)

Trade Shows and Conferences

Get rid of software patents says leading open source law professor (ZDNet)

ZDNet covers Eben Moglen's comments on software patents, made during a LinuxWorld panel discussion. "He said that tech companies were having to register software patents as a defensive move, and that none could "unilaterally disarm" and stop filing for patents. And with potentially many rights holders in software, negotiating licenses becomes very difficult and harms innovation. He said that many companies were having to bear the burden of IP laws that have been influenced by pharma, and that it was time for the tech industry to be freed of constraints created to serve the interests of just "the few.""

Comments (none posted)

Lessig Addresses 'Crazy' Linux Users at LinuxWorld (ABC News)

ABC News covers Lawrence Lessig's LinuxWorld keynote speech. ""What is read-only culture in the digital age? It's an Internet that can increasingly protect the control that the copywrite owner has over that content," Lessig said. "In that sense, the law embraces the read-only Internet. At the same time, there is a different Internet being built. A read-write Internet built by companies much more interested in how people create and share their creativity.""

Comments (none posted)

LinuxWorld Expo Report, Part 2 - by Marty Connor (Groklaw)

Groklaw has this LinuxWorld report. "In this part of my LinuxWorld Expo report, I'll share with you how we plan, prepare for, and execute our show experience. Hopefully, you will find it interesting to see how things look look from the inside. This is Open Source, after all, and transparency of mechanism is a central theme in what we do."

Comments (none posted)

Linux’s iPod Generation Gap (Red Herring)

Red Herring covers a LinuxWorld panel that looked at the intersection of desktop Linux and portable music players. "'The question I get asked most about Linux by people under 30 is ‘will it work with my iPod?'' said Eric Raymond, a celebrated figure in the open-source movement who penned the popular book 'The Cathedral and the Bazaar.' For Windows and OS X fans, such questions don’t enter the discussion. But the runaway popularity of iPods, iTunes, and digital media on PCs and devices has forced the open-source community to consider the wave of expectations for multimedia."

Comments (37 posted)

LinuxWorld day three (NewsForge)

Joe 'Zonker' Brockmeier covers day three of the LinuxWorld Conference & Expo. "I went to two sessions on Wednesday, one about the GNU Compiler Collection (GCC) and another about desktop development and the Linux Standard Base (LSB). The GCC presentation by Janis Johnson, "Recent Developments in GCC," was an overview of the GCC project and recent changes in it -- with "recent" being within the last few years. Johnson is the test suite maintainer for GCC and is employed with IBM's Linux Technology Center. Since my main interaction with GCC is watching compiler messages float by when I build software from source, I found the talk somewhat interesting. Johnson explained the way that GCC works as a project and as a compiler, how decisions are made to add features, and what platforms supported by GCC."

Comments (none posted)

LinuxWorld wraps up (NewsForge)

NewsForge has a final LinuxWorld report. "During the last session, Kroah-Hartman gave a presentation on doing kernel version control with Quilt, Ketchup, and Git. As it turned out, Quilt and Git are actually useful for other projects as well, and Ketchup also looks like it could be useful for admins, so the presentation was of value for those of us who aren't kernel developers."

Comments (14 posted)

Open Warfare in Open Source (BusinessWeek)

For the curious, here is how BusinessWeek sees the GPLv3 process. "At a panel at LinuxWorld, [Eben] Moglen described the process as nothing short of a massive community looking deep within itself and answering the lofty question: What does freedom mean? It's a very open-source way to solve a problem; only unlike fixing bugs in a code, there's no easy answer and big divides that are hard to bridge. 'It's an unusual activity,' Moglen says. 'It's more about the development of the society and less about the software license.'"

Comments (9 posted)

Companies

Linux heavies plan lightweight virtualisation (ZDNet)

ZDNet reports on containers and Linux distributions without getting into the vast amount of work which remains before an unpatched mainline kernel will support these technologies. "Novell, which wants to maintain Suse's reputation as the first place to find advanced new features for Linux, is more eager and is considering adding OpenVZ in Service Pack 1 of SLES 10. 'We are still evaluating if this is something we can take into SP1,' said Holger Dyroff, vice president of Linux product management."

Comments (2 posted)

Linux Adoption

Hoosier Daddy? Indiana Schools Adopt Linux (Information Week)

Information Week reports on a large Linux deployment by the Indiana Department of Education. "Local schools can choose which platform to use, according to Huffman. "Many will install Windows machines. What we're doing in our grant program is, when we put one-to-one computers in language arts classrooms, they are loaded with Linux. "We have a million kids in the state of Indiana," he continued. "If we were to pay $100 for software on each machine, each year, that's $100 million for software. That's well beyond our ability. That's why open source is so attractive. We can cut those costs down to $5 [on each computer] per year." Huffman said he's eager to get a read on student acceptance of Linux. In surveying one classroom last year, he asked a student what he thought of using a Linux desktop vs. a Windows desktop, and the student responded, "Who cares?""

Comments (1 posted)

Interviews

Exclusive Q&A: Linus Torvalds (Red Herring)

Red Herring has a brief interview with Linus Torvalds. "I don't think five-year planned economies work, and I don't think it works when you do software design, either. Linux development has always been a kind of open market, where the development direction gets set by customer demand, together with obviously a lot of what I simply call good taste - the avoidance of things that are obviously going to be problematic in the long run."

Comments (27 posted)

Resources

Protect your applications with AppArmor (Linux.com)

Linux.com presents an excerpt on AppArmor from the new O'Reilly book, SUSE Linux. "AppArmor is a product that Novell acquired when they bought the company Immunix in May 2005. It provides an interesting alternative to traditional security measures. AppArmor works by profiling the applications that it is protecting. A profile records the files that an application needs to access, and the capabilities it needs to exercise, during normal, "good" operation. Subsequently, a profile can be "enforced"; that is, attempts by the application to access resources not explicitly permitted by the profile are denied. Properly configured, AppArmor ensures that each profiled application is allowed to do what it is supposed to do, and nothing else."

Comments (none posted)

Free Open Document label templates (Free Software Magazine)

Free Software Magazine looks at open document format templates for labels, business cards and more. "If you've ever spent hours at work doing mailings, cursed your printer for printing outside the lines on your labels, or moaned "There has got to be a better way to do this," here's the solution you've been looking for. Working smarter, not harder, with the OpenOffice label templates will save you time, effort, and (if you want) make really cool-looking labels."

Comments (none posted)

OOoBasic crash course: Creating a lookup macro (Linux.com)

Dmitri Popov shows how to use OpenOffice.org's OOoBasic to write a macro. "Learning OOoBasic can be a bit like learning a foreign language. If you have the time and ambition to communicate fluently, you can spend months or even years studying grammar and expanding your vocabulary. But sometimes you just need some basic skills to get you through daily situations. In this case, a crash course that introduces you to some basic principles and building blocks of the language would do just fine. The same is true for OOoBasic -- if you need to write a simple macro that makes your daily computing life a bit easier, you don't have to spend time reading about methods, routines, and object properties. What you need is some working examples and an explanation of how they work."

Comments (2 posted)

W3C Updates XML (eWeek)

eWeek covers the release of four core XML specifications by the World Wide Web Consortium. "The Cambridge, Mass.-based standards body announced the release of the fourth edition of XML (Extensible Markup Language) 1.0 and second editions of Extensible Markup Language (XML) 1.1, Namespaces in XML 1.0 and Namespaces in XML 1.1. W3C officials said these core XML specifications stand as the foundation for W3C-defined technologies for querying, transforming, displaying, encrypting, and optimizing XML. The new releases includes corrections for "all known errata and clarifications where there was some potential for misunderstanding," according to a W3C document about the XML updates."

Comments (none posted)

Reviews

Edgy Eft (Ubuntu 6.10) & GNOME 2.16 Features (A Stranger's Universe)

A site called A Stranger's Universe has a review of GNOME 2.16 Beta under Ubuntu 6.10. "GNOME 2.16 Beta has been in Edgy Eft (Ubuntu 6.10) for the past few days [or even a week or so]. It is functioning extremely well. I’ve seen some occasional crashes with Epiphany and Nautilus but I hope that it will be fixed soon. Other than that, there are lots of new things in GNOME 2.16".

Comments (none posted)

The ongoing MythTV saga continues (Linux Journal)

Linux Journal editor Nicholas Petreley is having a MythTV experience. "I admit that I find everything I have learned interesting, and I will enjoy writing it up as a Linux Journal article when I'm done taking this project to a point where I'm satisfied with the results. But I don't think I should have had to become so familiar with everything from driver firmware to the way television signals are formatted in order to get satisfactory results. It was never my goal to learn any of this."

Comments (15 posted)

Using screen for remote interaction (Linux.com)

Linux.com looks at GNU Screen. "Recently I needed to do some distance education; one of my coworkers wanted me to show him how to do software builds on Linux. The only problem was that I'm on the East Coast and he is on the West. How could I show him the build and install process? After considering some alternatives, we found our solution in GNU Screen."

Comments (4 posted)

Syllable: A different open source OS (NewsForge)

NewsForge reviews Syllable, a GPL-licensed operating system. "Once I had Syllable installed, I was floored by how fast it was on my test machine, a 1.8GHz Pentium 4 with 512 MB RAM. Syllable blew away Windows, Linux, and Solaris as far as speed is concerned. From the time the boot loader came up to the time the login prompt appeared was just under eight seconds. It took another two seconds or less from the time I logged in to the time the desktop was ready to go."

Comments (9 posted)

Take notes with Tomboy (Linux.com)

Linux.com reviews Tomboy. "A few weeks ago, I started looking around for an application that makes it easy to take notes. I do all my writing in Vim, but I wanted something that was good for quick and dirty notetaking and for organizing information without maintaining a collection of text files. After some research, I settled on Tomboy."

Comments (40 posted)

Miscellaneous

GNOME and Google reach out to women (NewsForge)

NewsForge covers GNOME's Women's Summer Outreach Program. "Originally, the proposal was for three women, but after the GNOME Foundation gave thumbs up, Google doubled the funding so that six women could participate. The projects that were accepted are Cecilia Gonzalez Alvarez's work on optimizing Evolution components; Clare So's work to edit MathML expressions in GtkMathView; Fernanda Foertter's gJournaler, a tool for create a virtual library of PDFs; Maria Soler Climent's work to synchronize Tomboy notes; Monia Ghobadi's proposal to integrate GNU Screen with gnome-terminal; and Umran Kamar's project to create an Evince plugin for Mozilla."

Comments (6 posted)

Mozilla opens Calendar testing to user community (NewsForge)

NewsForge announces a Mozilla Corp. Calendar Community Test Day. "Mozilla Corp. is preparing to release updates to its calendar applications for Sunbird and Lightning early next month. Before then, developers hope to get "lots of eyeballs" on it by inviting users to participate in Calendar Community Test Day on Tuesday, August 22."

Comments (none posted)

Page editor: Forrest Cook

Announcements

Non-Commercial announcements

EFF: Dangerous Patent Law Ruling Threatens Free and Open Source Software

The EFF has sent out a release stating that it is going to the U.S. Supreme Court in an attempt to overturn a bad lower-court ruling. "In a recent decision, the Federal Circuit Court of Appeals affirmed its own 'suggestion test' as the main method for determining when a patent should be found obvious over knowledge in the public domain. Under this test, even the most obvious incremental advances and add-ons can be patented unless the Patent Office or a defendant in court produces a document that shows someone else suggested it prior to the patent being filed."

Full Story (comments: none)

Commercial announcements

EnterpriseDB launches EnterpriseDB Network

The EnterpriseDB Network has been launched. "EnterpriseDB, the world’s leading enterprise-class, open source database company, announced today the immediate availability of EnterpriseDB Network, a new service that includes real-time notification and delivery of product updates and patches, access to EnterpriseDB online forums, and enhanced product documentation. In addition, subscribers to EnterpriseDB Network receive access to a variety of advanced product features."

Comments (none posted)

LVL7 and Wind River Strike Linux Partnership

LVL7 Systems, Inc. has announced its commitment to support the Wind River(r) Platform for Network Equipment, Linux Edition. The complementary solution of LVL7's FASTPATH(r) software combined with Wind River's Linux-based device software platforms provides a shared customer base of networking OEMs with support for high-end network devices.

Full Story (comments: none)

Montilio, Penguin Computing announce Storage Access File Server

Penguin Computing has announced that it will use the Montilio RapidFile(TM) storage-to-LAN gateway on a PCI card in its file server offerings. "One RapidFile-enabled Penguin Computing server will be able to provide the I/O throughput of four traditional multi-processor systems without the prohibitive configuration cost of a 4-CPU or 8-CPU system. These Penguin Computing servers with RapidFile cards are ideal solutions for customers in the high performance computing (HPC) or enterprise markets with significant storage capacity and performance needs."

Comments (none posted)

Sun releases Netbeans mobility pack

Sun has announced the release of the NetBeans Mobility Pack (and the Connected Device Configuration version as well) under the CDDL. "Java ME development tools represent the cutting edge in mobile Java development and boasts unique visual authoring features that can simplify and speed the creation of applications for the vast majority of mobile devices."

Comments (none posted)

Win4Lin announces support for Ubuntu 6.06

Win4Lin has announced full support for the Ubuntu 6.06 distribution by its Win4Lin Pro Desktop and Win4Lin Virtual Desktop Server products. "Win4Lin Pro Desktop allows Linux users to run Windows applications from the security of the Linux desktop. Win4Lin Virtual Desktop Server is the enterprise/SMB product for delivering Windows applications on thin clients via a Linux server. Both products have been fully tested on Ubuntu 6.06."

Full Story (comments: none)

New Books

JavaScript: The Definitive Guide, Fifth Edition - O'Reilly's Latest Release

O'Reilly has published the book JavaScript: The Definitive Guide, Fifth Edition by David Flanagan.

Full Story (comments: none)

Resources

IDC report on open source

IDC has announced the availability of a new study on open source and the software industry. "Although open source will significantly reduce the industry opportunity over the next ten years, the real impact of open source is to sustain innovations in mature software markets, thus extending the useful life of software assets and saving customers money."

Comments (1 posted)

Contests and Awards

The Free Software Directory D5000 Contest

The Free Software Foundation has announced its plans to celebrate the upcoming milestone of 5000 software packages on the Free Software Directory. "To mark the milestone of reaching 5000 entries, the FSF is holding a "D5000 contest" the winner of which will be rewarded for submitting the five thousandth entry. From now, 2006-08-21, until 2006-09-21, each new, valid and completed directory entry that is submitted will count as one chit in the raffle for the prize. The winner will receive a thank you on the front page of gnu.org and directory.fsf.org."

Full Story (comments: none)

Linux Journal and IDG World Expo Announce Winners of Product Excellence Awards

Linux Journal and IDG World Expo have announced the winners of the Product Excellence Awards. "The Linux Journal Product Excellence Awards distinguish product and service innovations by LinuxWorld exhibitors and are divided into 13 categories, including an overall “Best of Show” award. "All of the judges were very impressed by the nominations we received, it was a very difficult decision. We’ve seen many new innovations, and improvements on old favorites," commented Linux Journal Products Editor and Product Excellence Awards judge James Gray."

Comments (5 posted)

LinuxWorld.com, Network World Announce Open Source Challenge

LinuxWorld.com, in conjunction with Network World, Inc., has announced the LinuxWorld Open Source Challenge, which will honor the most innovative use of open source in today's enterprise. "The contest invites organizations of all sizes to enter their most ingenious, business-critical open-source solutions for judging. Each project entered must use Linux with an open-source business application, and one or more other open-source software components such as Apache, MySQL, Ruby, PHP or Perl. Entries must be received by September 30, 2006."

Full Story (comments: none)

Summer of Code Goodies Arriving (Blue Sky on Mars)

Kevin Dangoor looks at early arrivals in the Google Summer of Code student coding effort. "Though we still have more than a month of good weather to look forward to here in Michigan, the thought of summer ending and heading into another long winter isn’t pleasant. On the plus side, the end of summer brings the results of Google’s Summer of Code. The one that I’ve been most looking forward to is Migrate, assistance for SQLAlchemy database schema migration."

Comments (none posted)

Education and Certification

Python Bootcamp to be held Nov. 13-17

The next Python Bootcamp will take place at the Big Nerd Ranch near Atlanta, Georgia on November 13-17, 2006. "The class, which provides instruction in one of the fundamental languages in the programming arena, marks the return of instructor Mark Lutz, who’s the author of a number of textbooks in Python including Learning Python and the O’Reilly books Programming Python and Python Pocket Reference."

Comments (none posted)

Calls for Presentations

ETech 2007 Call for Participation Is Open

A Call for Participation has gone out for the 2007 O'Reilly Emerging Technology Conference. "The call for participation for ETech 2007 has just opened, and O'Reilly Media invites technologists and strategists, CTOs and chief scientists, researchers, programmers, hackers, and standards workers, business developers, and entrepreneurs to lead conference sessions and tutorials. The next ETech takes place on March 26-29, 2007 in San Diego, California. Proposals are due no later than October 9, 2006."

Full Story (comments: none)

Upcoming Events

aKademy 2006 Sponsors (KDE.News)

KDE.News has announced the KDE World Summit sponsors. "This is one of the our most impressive list of sponsors to date. Our Gold sponsors are the home of Linus Torvalds OSDL and the KDE based distribution Kubuntu. Housing the conference as our host institution is The School of Computer Science at Trinity College Dublin. Read on for the full list."

Comments (none posted)

OOoCon 2006 announced

The next OpenOffice.org conference will take place in Lyon, France on September 11-13, 2006. "This, our fourth conference, celebrates a year of triumphs. Governments, led by France, have adopted OpenOffice.org, replacing the proprietary Microsoft Office. Corporations such as Novell have switched entirely; and we have tracked over 67.5 million downloads to date. All want a suite that uses an open standard for the file format, that is flexible, that is easy to learn, and that is free."

Full Story (comments: none)

Security OPUS Infosec Conference registration opens

The Security OPUS Infosec Conference will be held in San Francisco, CA on October 2-5 2006. Registration is now open.

Full Story (comments: none)

World Summit on Intrusion Prevention

The World Summit on Intrusion Prevention will take place in Baltimore, Maryland on May 8 and 9, 2007. "The Summit is co-located with the 2nd Annual Web Services Security Conference."

Full Story (comments: none)

Events: August 31, 2006 to October 30, 2006

The following event listing is taken from the LWN.net Calendar.

Date(s)EventLocation
August 28
August 31
Bellua Cyber Security Asia 2006 Jakarta, Indonesia
August 30
September 1
YAPC::EU 2006 - Yet Another Perl Conference - Birmingham Birmingham, UK
September 5
September 8
Linux Kongress 2006, 13th International Linux System Technology Conference Nürnburg, Germany
September 8 Leipzig Python Workshop Leipzig, Germany
September 9
September 10
Linuxtage in Essen Essen, Germany
September 11
September 13
OpenOffice.org Conference Lyon, France
September 12
September 15
php|works/db|works 2006 Toronto, Canada
September 13
September 15
2006 WebGUI Users Conference Las Vegas, NV
September 14 NLUUG najaarsconferentie 2006 Gelderland, The Netherlands
September 14
September 16
Wizards of OS 4 - Information Freedom Rules Berlin, Germany
September 14
September 15
RailsConf Europe 2006 London, UK
September 14 Open Source: New DoD Paradigm, or Business as Usual? Arlington, VA, USA
September 14
September 15
Software Tagging Workshop Portland, OR, USA
September 16
September 17
WineConf Reading, UK
September 16
September 17
Linux-Delhi (India Linux users group Delhi chapter) Freedel 2006 Delhi, India
September 17 KLDP 10 year Anniversary Free/Open Source Software Conference Seoul, Korea
September 18
September 21
2006 European Open Source Convention Brussels, Belgium
September 18
September 21
New Security Paradigms Workshop Schloss Dagstuhl, Germany
September 19
September 21
High Performance Embedded Computing Workshop Lexington, MA, USA
September 23
September 30
KDE World Summit 2006 Dublin, Ireland
September 25
September 28
Embedded Systems Conference Boston, MA
September 29
September 30
No cON Name 2006 Congress Palma de Mallorca, Spain
September 29
October 1
ToorCon 2006 San Diego, CA
September 29
October 1
Encuentro de Desarrolladores de GNOME Zaragoza Zaragoza, Spain
September 30
October 1
RuxCon 2006 Sydney, Australia
September 30 Ohio LinuxFest 2006 Columbus, Ohio
September 30 Defective by Design, 2pm-5pm, Apple Store, Regent Street, London, UK London, UK
October 1
October 4
Gelato ICE Itanium Conference and Expo Biopolis, Singapore
October 1
October 3
LinuxBIOS Symposium 2006 Hamburg, Germany
October 2
October 5
Security OPUS Infosec Conference San Francisco, CA, USA
October 7
October 9
GNOME Boston Summit Boston, MA, USA
October 9
October 13
ApacheCon US Austin, TX
October 9
October 13
13th Annual Tcl/Tk Conference Naperville, IL
October 11
October 12
Eclipse Summit Europe Esslingen, Germany
October 11
October 12
Linux World Conference and Expo Utrecht, The Netherlands
October 12
October 15
Eighth Real-Time Linux Workshop Lanzhou, Gansu, China
October 18
October 19
International Conference on IT-Incident Management and IT-Forensics Stuttgart, Germany
October 18
October 22
Pike Conference 2006 Riga, Latvia
October 19
October 21
HackLu 2006 Kirchberg, Luxembourg
October 19
October 20
DC PHP Conference Washington, D.C.
October 20
October 22
aLANtejo 06 Évora, Portugal
October 20
October 22
RubyConf 2006 Denver, Colorado
October 22
October 27
Colorado Software Summit Keystone, CO, USA
October 23
October 24
Mono User and Developers Meeting Cambridge, MA, USA
October 23
October 26
Enterprise Architecture Practitioners Conf Lisbon, Portugal
October 25
October 26
LinuxWorld UK 2006 London, UK
October 25
October 27
Plone Conference 2006 Seattle, WA
October 26
October 27
IT Underground Warsaw, Poland
October 26
October 27
Free Software and Open Source Symposium Toronto, Canada
October 28 LinuxDay 2006 Many of them, Italy

If your event does not appear here, please tell us about it.

Event Reports

Gelato GCC Improvement on Itanium Workshop Summary

An event report has been posted from the Gelato GCC Improvement on Itanium Workshop that was held in Moscow on August 7-8, 2006. "Compiler experts from the GCC open-source community, Red Hat, SuSE, Intel, HP, and the Gelato Member community discussed specific GCC improvements for the Itanium platform. Several key areas were identified to improve Itanium GCC performance."

Full Story (comments: 1)

LinuxWorld Healthcare Day Presentations (LinuxMedNews)

LinuxMedNews mentions the medical events at the recent LinuxWorld Expo. "There is a wiki page of all the presentations at the recent Linux World Healthcare Day presentations: 'On August 15th, 2006 OSDL hosted the first ever Healthcare Day at LinuxWorld Expo. Below is a recap of the event as well as links to the presentations from Medsphere CEO Dr. Kennth Kizer, Joe Alexander - Bull's Director of Strategy and Planning as well as panel discussions moderated by Bernard Golden and Fred Trotter...'"

Comments (none posted)

Mailing Lists

A new cross-distribution collaboration

Ubuntu's Daniel Holbach has announced a cross-distribution discussion list. "In one of the GUADEC sessions we discussed the need of more collaboration across distributors. Especially long term support of GNOME releases was identified as one specific need. It's important to have a forum to discuss bugs, patches and implementation details on the distro side. The discussion continued on IRC and everybody liked the idea. Thanks Jeff for bringing the list to life."

Full Story (comments: none)

Web sites

FossExchange to create open-source banner exchange program

FossExchange.com has been launched. "The site's primary purpose is creating a free advertising network among open source oriented websites. "FossExchange.com was created to fill the void, since no other open source banner exchange system exists", says FossExchange.com and Fossystems.com creator Ronnie Whisler. "We wanted to build an advertising exchange that was targeted specifically at the open source market.""

Full Story (comments: 1)

LinuxSecurity.com launches new web site

Guardian Digital has announced the launch of the LinuxSecurity.com web site. "LinuxSecurity.com, the Web's leading information source for Linux security, is pleased to announce the launch of its completely redesigned Web site. The new site is carefully tailored to meet the needs of our elite community of security-minded engineers, programmers, Web designers, system administrators and open source enthusiasts. The new LinuxSecurity.com offers the very latest security news as well as years of archived news items, features, HOWTOs, white papers and security advisories."

Full Story (comments: none)

Page editor: Forrest Cook

Letters to the editor

Free drivers aren't enough

From:  Karol Lewandowski <kl-AT-jasmine.eu.org>
To:  letters-AT-lwn.net
Subject:  Free drivers aren't enough
Date:  Sun, 20 Aug 2006 21:20:32 +0200

Being non-subscriber, but having read "X.org, distributors, and
proprietary modules" (via Subscriber Link, thanks!) I have few
observations to share.
 
Reading through comments of that fine article made me think. It seems
that for most LWN.net readers (percisely -- for subscribers) having
free driver is very important. I, as ususal, happen to not agree
fully with them.
 
For me, free driver is just small part of the whole picture -- freely
accessible documentation is much more important. Free driver can't be
really free without documentation -- driver written under NDA is
better than dissasembled binary blob, but it's not that great after
all.
 
For me free driver has freely accessible documentation.
 
Given that definition of free driver one can notice that there
is few (if any) free graphics drivers. ATI's r200 drivers were
written under NDA... who will fix the drivers when maintainers will
dissapear? Where is documentation for these hyped Intel Free Drivers?
(I wasn't able to find any.)
 
 
As for NVIDIA and Xorg R7.1 + Fedora Core 5, I also happen to have
different view on that issue.
 
Let's assume for a while that NVIDIA driver is free (but maintained
out-of-tree). Let's also assume that that driver was written by few
dedicated developers under NDA. Now, does this change situation?
I don't think so. If needed changes are really cosmetic, then yeah,
"anyone" could fix that. On the other hand, if fixing problem is more
serve -- i.e. it requires knowledge of hardware registers or something
like that, then we are in exactly same situation as we're now -- we
depend of few people to do the work. It isn't nice.
 
Additionaly there is out-of-tree issue.
 
How it's possible that drivers for utterly-unsupportive company's wifi
chipset (Broadcom) are in mainline kernel but not for the nice one
(Ralink)?
 
I would like to see more support (i.e. preference) for company that
provided free docs!
 
Yes, I know that rt2x00 drivers are in wireless-dev and will be
merged when DeviceScape will be merged too (if ever...) But,
well... Linux developers, especially Linus, was always very
pragmatic... wouldn't that be very pragmatic to provide best
experience (read -- in-tree driver) for those who choose really free
hardware?
 
OpenBSD-like focus on hardware with free docs is something I'm hoping
to see in Linux community some day!
 
 
(Fell free to correct my english, edit this mail or destroy it
altogether :-)
--
This signature intentionally says nothing.

Comments (9 posted)

Page editor: Jonathan Corbet


Copyright © 2006, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds