Comparison of BSD operating systems: Difference between revisions

Content deleted Content added
Update the timestamp of "only two remote vulnerabilities in the default install", since that's still what it says in early August, 2024
Line 55:
OpenBSD emphasizes very high standards in all areas. Security policies include disabling all non-essential services and having sane initial settings; and integrated [[cryptography]] (originally made easier due to relaxed Canadian export laws relative to the United States), [[Full disclosure (computer security)|full public disclosure]] of all security flaws discovered; thoroughly [[auditing]] code for bugs and security issues; various security features, including the [[W^X]] page protection technology and heavy use of randomization to mitigate attacks. Coding approaches include an emphasis on searching for similar issues throughout the [[code base]] if any code issue is identified. Concerning software freedom, OpenBSD prefers the [[BSD license|BSD]] or [[ISC license]], with the [[GNU General Public License|GPL]] acceptable only for existing software which is impractical to replace, such as the [[GNU Compiler Collection]]. NDAs are never considered acceptable. In common with its parent, NetBSD, OpenBSD strives to run on a wide variety of hardware.<ref>{{cite web | date = 2005-10-12 | url = http://www.openbsd.org/goals.html | title = OpenBSD Project Goals | publisher = OpenBSD | access-date = 2006-04-22}}</ref> Where licenses conflict with OpenBSD's philosophy, the OpenBSD team has re-implemented major pieces of software from scratch, which have often become the standard used within other versions of BSD. Examples include the [[PF (firewall)|pf]] [[packet filter]], new [[privilege separation]] techniques used to safeguard tools such as [[tcpdump]] and [[tmux]], much of the [[OpenSSH]] codebase, and replacing GPL licensed tools such as [[diff]], [[grep]] and [[pkg-config]] with [[ISC license|ISC]] or [[BSD license|BSD]] licensed equivalents.
 
OpenBSD prominently notes the success of its security approach on its website home page. {{As of|20182024|AprilJuly}}, only two vulnerabilities have ever been found in its default install (an [[OpenSSH]] vulnerability found in 2002, and a remote network vulnerability found in 2007) in a period of almost 22 years. According to OpenBSD expert Michael W. Lucas, OpenBSD "is widely regarded as the most secure operating system available anywhere, under any licensing terms."<ref>{{cite book
| url = https://books.google.com/books?id=WAYvDwAAQBAJ
| last = Lucas