From owner-freebsd-announce Sun Jan 6 10:27:19 2002 Delivered-To: freebsd-announce@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 1E0B937B405; Sun, 6 Jan 2002 10:27:06 -0800 (PST) Received: (from nectar@localhost) by freefall.freebsd.org (8.11.6/8.11.6) id g06IR6392256; Sun, 6 Jan 2002 10:27:06 -0800 (PST) (envelope-from security-advisories@freebsd.org) Date: Sun, 6 Jan 2002 10:27:06 -0800 (PST) Message-Id: <200201061827.g06IR6392256@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: nectar set sender to security-advisories@freebsd.org using -f From: FreeBSD Security Advisories To: FreeBSD Security Advisories Subject: FreeBSD Ports Security Advisory FreeBSD-SA-02:04.mutt [REVISED] Reply-To: security-advisories@freebsd.org Sender: owner-freebsd-announce@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org -----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SA-02:04 Security Advisory FreeBSD, Inc. Topic: mutt ports contain remotely exploitable buffer overflow [REVISED] Category: ports Module: mutt Announced: 2002-01-04 Revised: 2002-01-06 Credits: Joost Pol Affects: Ports collection prior to the correction date Corrected: 2002-01-02 13:52:03 UTC (ports/mail/mutt: 1.2.x) 2002-01-02 03:39:01 UTC (ports/mail/mutt-devel: 1.3.x) FreeBSD only: NO 0. Revision History v1.0 2002-01-04 Initial release v1.1 2002-01-06 Corrected typo in mutt port version. I. Background Mutt is a small but very powerful text-based mail client for Unix operating systems. II. Problem Description The mutt ports, versions prior to mutt-1.2.5_1 and mutt-devel-1.3.24_2, contain a buffer overflow in the handling of email addresses in headers. The mutt and mutt-devel ports are not installed by default, nor are they "part of FreeBSD" as such: they are parts of the FreeBSD ports collection, which contains over 6000 third-party applications in a ready-to-install format. The ports collection shipped with FreeBSD 4.4 contains this problem since it was discovered after the release. FreeBSD makes no claim about the security of these third-party applications, although an effort is underway to provide a security audit of the most security-critical ports. III. Impact An attacker may send an email message with a specially crafted email address in any of several message headers to the victim. When the victim reads the message using mutt and encounters that email address, the buffer overflow is triggered and may result in arbitrary code being executed with the privileges of the victim. IV. Workaround 1) Deinstall the mutt and mutt-devel ports/packages if you have them installed. V. Solution 1) Upgrade your entire ports collection and rebuild the ports. 2) Deinstall the old packages and install news package dated after the correction date, obtained from the following directories: [i386] ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/mail/mutt-1.2.5_1.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/mail/mutt-devel-1.3.24_2.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/mail/mutt-1.2.5_1.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/mail/mutt-devel-1.3.24_2.tgz [alpha] Packages are not automatically generated for the alpha architecture at this time due to lack of build resources. NOTE: It may be several days before updated packages are available. 3) Download a new port skeleton for the mutt or mutt-devel port from: http://www.freebsd.org/ports/ and use it to rebuild the port. 4) Use the portcheckout utility to automate option (3) above. The portcheckout port is available in /usr/ports/devel/portcheckout or the package can be obtained from: ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/devel/portcheckout-2.0.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/devel/portcheckout-2.0.tgz VI. Correction details The following list contains the $FreeBSD$ revision numbers of each file that was corrected in the FreeBSD source Path Revision - ------------------------------------------------------------------------- ports/mail/mutt/Makefile 1.110 ports/mail/mutt/files/patch-rfc822.c 1.1 ports/mail/mutt-devel/Makefile 1.141 ports/mail/mutt-devel/files/patch-rfc822-security 1.1 - ------------------------------------------------------------------------- VII. References -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iQCVAwUBPDiTdlUuHi5z0oilAQFUhwP9GrypvSZsDm4VXsvv0bTXMdgySDM6nR+f lTe+WtKuJu6unu/Befb5ep2Nb/nt4AzRZzwR/8b9amROk63eFa5fHe8RrwZa7aug 9BGGTOWtH+PKYrqB4BAGMBsEYPEleUyED4XTc/wrCrYGXigNTxgRKAeBmxe8UMO1 G7SzKi2sFYE= =dHuU -----END PGP SIGNATURE----- This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message From owner-freebsd-announce Tue Jan 8 10:51:29 2002 Delivered-To: freebsd-announce@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 61E6537B41E; Tue, 8 Jan 2002 10:51:18 -0800 (PST) Received: (from nectar@localhost) by freefall.freebsd.org (8.11.6/8.11.6) id g08IpIq53700; Tue, 8 Jan 2002 10:51:18 -0800 (PST) (envelope-from security-advisories@freebsd.org) Date: Tue, 8 Jan 2002 10:51:18 -0800 (PST) Message-Id: <200201081851.g08IpIq53700@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: nectar set sender to security-advisories@freebsd.org using -f From: FreeBSD Security Advisories To: FreeBSD Security Advisories Subject: FreeBSD Security Advisory FreeBSD-SA-02:01.pkg_add [REVISED] Reply-To: security-advisories@freebsd.org Sender: owner-freebsd-announce@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org -----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SA-02:01 Security Advisory FreeBSD, Inc. Topic: Directory permission vulnerability in pkg_add [REVISED] Category: core Module: pkg_install Announced: 2002-01-04 Revised: 2002-01-07 Credits: The Anarcat Affects: All versions of FreeBSD prior to the correction date. Corrected: 2001/11/22 17:40:36 UTC (4.4-STABLE aka RELENG_4) 2001/12/07 20:58:46 UTC (4.4-RELEASEp1 aka RELENG_4_4) 2001/12/07 20:57:19 UTC (4.3-RELEASEp21 aka RELENG_4_3) FreeBSD only: NO 0. Revision History v1.0 2002-01-04 Initial release v1.1 2002-01-07 Correct terminology in problem description. I. Background pkg_add is a utility program used to install software package distributions on FreeBSD systems. II. Problem Description pkg_add extracts the contents of the package to a temporary directory, then moves files from the temporary directory to their ultimate destination on the system. The temporary directory used in the extraction was created with world-searchable permissions, allowing arbitrary users to examine the contents of the package as it was being extracted. This might allow users to attack world-writable parts of the package during installation. III. Impact A local attacker may be able to modify the package contents and potentially elevate privileges or otherwise compromise the system. There are no known exploits as of the date of this advisory. IV. Workaround 1) Remove or discontinue use of the pkg_add binary until it has been upgraded. 2) When running pkg_add, create a secure temporary directory (such as /var/tmp/inst) and secure the directory permissions (chmod 700 /var/tmp/inst). Set the TMPDIR environment variable to this directory before running pkg_add. V. Solution 1) Upgrade your vulnerable FreeBSD system to 4.4-STABLE, or the RELENG_4_4 or RELENG_4_3 security branches dated after the respective correction dates. 2) FreeBSD 4.x systems prior to the correction date: The following patch has been verified to apply to FreeBSD 4.3-RELEASE, 4.4-RELEASE, and 4-STABLE dated prior to the correction date. This patch may or may not apply to older, unsupported releases of FreeBSD. Download the patch and the detached PGP signature from the following locations, and verify the signature using your PGP utility. ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:01/pkg_add.patch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:01/pkg_add.patch.asc Execute the following commands as root: # cd /usr/src # patch -p < /path/to/patch # cd /usr/src/usr.sbin/pkg_install # make depend && make all install VI. Correction details The following list contains the $FreeBSD$ revision numbers of each file that was corrected in the FreeBSD source Path Revision Branch - ------------------------------------------------------------------------- src/usr.sbin/pkg_install/lib/pen.c HEAD 1.37 RELENG_4 1.31.2.6 RELENG_4_4 1.31.2.2.2.1 RELENG_4_3 1.31.2.1.2.1 - ------------------------------------------------------------------------- VII. References -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iQCVAwUBPDnE7VUuHi5z0oilAQHc3AP+IVLft31MShGngUPRQOQRHsNPjdqwdacj ptKjsMfGCpDRyqgIc8CoaI/Bln6VKkKS3HuOYx4pYOPY5QjBPy9JpPSJrAxP/H/N 424apgpo2eCmGcoIbCdM2RH1YYyKZANzt5igWNss1FbppvYbVwx+zZPBA4dyl9MZ 8rat83zoMAc= =g74K -----END PGP SIGNATURE----- This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message From owner-freebsd-announce Wed Jan 9 0:20:48 2002 Delivered-To: freebsd-announce@freebsd.org Received: from vnode.vmunix.com (vnode.vmunix.com [209.112.4.20]) by hub.freebsd.org (Postfix) with ESMTP id 11F8037B41A for ; Tue, 8 Jan 2002 22:06:05 -0800 (PST) Received: by vnode.vmunix.com (Postfix, from userid 1005) id 6DE5A3; Wed, 9 Jan 2002 01:06:04 -0500 (EST) Received: from localhost (localhost [127.0.0.1]) by vnode.vmunix.com (Postfix) with ESMTP id 6618E49A15 for ; Wed, 9 Jan 2002 01:06:04 -0500 (EST) Date: Wed, 9 Jan 2002 01:06:04 -0500 (EST) From: Chris Coleman To: announce@freebsd.org Subject: FreeBSD 4.5 Pre-Orders Available Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-announce@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Daemon News is pleased to announce the availability of pre-orders for FreeBSD 4.5. This will be our first release of FreeBSD on CD. We will be using the official FreeBSD 4.5 ISOs created by the FreeBSD project. The expected release date for FreeBSD 4.5 is January 20th. We expect to have CDs available two weeks after that. We are taking pre-orders at this time to help gauge the number of CDs we will need to produce. You can pre-order CDs from: http://www.bsdmall.com/freebsd45.html CD Subscriptions are available here: http://www.bsdmall.com/cdsub.html Vendor pricing will be handled through cylogistics.com. Chris Coleman Editor in Chief Daemon News E-Zine http://www.daemonnews.org Print Magazine http://magazine.daemonnews.org Open Packages http://www.openpackages.org This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message From owner-freebsd-announce Thu Jan 10 9:14:53 2002 Delivered-To: freebsd-announce@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id C0DA137B41A; Thu, 10 Jan 2002 09:14:40 -0800 (PST) Received: (from nectar@localhost) by freefall.freebsd.org (8.11.6/8.11.6) id g0AHEel76678; Thu, 10 Jan 2002 09:14:40 -0800 (PST) (envelope-from security-advisories@freebsd.org) Date: Thu, 10 Jan 2002 09:14:40 -0800 (PST) Message-Id: <200201101714.g0AHEel76678@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: nectar set sender to security-advisories@freebsd.org using -f From: FreeBSD Security Advisories To: FreeBSD Security Advisories Subject: FreeBSD Ports Security Advisory FreeBSD-SA-02:05.pine [REVISED] Reply-To: security-advisories@freebsd.org Sender: owner-freebsd-announce@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org -----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SA-02:05 Security Advisory FreeBSD, Inc. Topic: pine port insecure URL handling [REVISED] Category: ports Module: pine Announced: 2002-01-04 Revised: 2002-01-10 Credits: zen-parse Affects: Ports collection prior to the correction date Corrected: 2002-01-10 16:47:18 UTC FreeBSD only: NO 0. Revision History v1.0 2002-01-04 Initial release. v1.1 2002-01-10 Corrected vulnerable versions and the `Corrected details' section. I. Background PINE is an application for reading mail and news. II. Problem Description The pine port, versions previous to pine-4.44, handles URLs in messages insecurely. PINE allows users to launch a web browser to visit a URL embedded in a message. Due to a programming error, PINE does not properly escape meta-characters in the URL before passing it to the command shell as an argument to the web browser. The pine port is not installed by default, nor is it "part of FreeBSD" as such: it is part of the FreeBSD ports collection, which contains over 6000 third-party applications in a ready-to-install format. The ports collection shipped with FreeBSD 4.4 contains this problem since it was discovered after the release. FreeBSD makes no claim about the security of these third-party applications, although an effort is underway to provide a security audit of the most security-critical ports. III. Impact An attacker can supply commands enclosed in single quotes ('') in a URL embedded in a message sent to the victim. If the user then decides to view the URL, PINE will launch a command shell which will then execute the attacker's commands with the victim's privileges. It is possible to obfuscate the URL so that it will not necessarily seem dangerous to the victim. IV. Workaround 1) Deinstall the pine port/package if you have it installed. V. Solution 1) Upgrade your entire ports collection and rebuild the port. 2) Deinstall the old package and install a new package dated after the correction date, obtained from the following directories: [i386] ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/mail/pine-4.44.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/mail/pine-4.44.tgz [alpha] Packages are not automatically generated for the alpha architecture at this time due to lack of build resources. NOTE: It may be several days before updated packages are available. 3) Download a new port skeleton for the pine port from: http://www.freebsd.org/ports/ and use it to rebuild the port. 4) Use the portcheckout utility to automate option (3) above. The portcheckout port is available in /usr/ports/devel/portcheckout or the package can be obtained from: ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/devel/portcheckout-2.0.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/devel/portcheckout-2.0.tgz VI. Correction details The following list contains the $FreeBSD$ revision numbers of each file that was corrected in the FreeBSD Ports Collection since 4.4-RELEASE. Path Revision - ------------------------------------------------------------------------- ports/mail/pine4/Makefile 1.61 ports/mail/pine4/distinfo 1.20 ports/mail/pine4/files/patch-aa 1.4 ports/mail/pine4/files/patch-ac 1.11 ports/mail/pine4/files/patch-af 1.12 ports/mail/pine4/files/patch-ai 1.11 ports/mail/pine4/files/patch-aj 1.5 ports/mail/pine4/files/patch-ak 1.6 ports/mail/pine4/files/patch-al 1.11 ports/mail/pine4/files/patch-am 1.6 ports/mail/pine4/files/patch-an 1.5 ports/mail/pine4/files/patch-ap 1.3 ports/mail/pine4/files/patch-at 1.6 ports/mail/pine4/files/patch-au 1.4 ports/mail/pine4/files/patch-ax 1.5 ports/mail/pine4/files/patch-az 1.3 ports/mail/pine4/files/patch-be 1.1 ports/mail/pine4/files/patch-bf 1.1 ports/mail/pine4/files/patch-bg 1.1 ports/mail/pine4/files/patch-reply.c 1.2 - ------------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iQCVAwUBPD3LZlUuHi5z0oilAQH6EAP/bz0Yeydx2zCmQb0j4zmbKM5R8McyKaYb tl/Vo/ViCll6xKXUuAOjFpyIkQMOmHGLwHXmqjJD+XRb0hSgrsCqRmWhUicppZjH dY0zjvtKspbDN37ScOO+MJmGsmq1mfZGs8JUMCbYivDuLhRM/5bvnenUsigNUaQW hkwKI6heurk= =BQ0F -----END PGP SIGNATURE----- This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message From owner-freebsd-announce Thu Jan 10 15:53:24 2002 Delivered-To: freebsd-announce@freebsd.org Received: from usenix.org (voyager.usenix.org [131.106.3.1]) by hub.freebsd.org (Postfix) with ESMTP id 269EF37B404 for ; Thu, 10 Jan 2002 13:13:53 -0800 (PST) Received: from [131.106.3.65] ([131.106.3.65]) by usenix.org (Switch-2.1.3/Switch-2.1.0) with ESMTP id g0ALE6o13582 for ; Thu, 10 Jan 2002 13:14:06 -0800 (PST) Mime-Version: 1.0 X-Sender: ann@mail.usenix.org (Unverified) Message-Id: Date: Thu, 10 Jan 2002 13:14:07 -0800 To: announce@freebsd.org From: Ann Tsai Subject: BSDCon 2002 - Register by Jan 21 & SAVE! Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-freebsd-announce@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Register by January 21, 2002 and SAVE! http://www.usenix.org/events/bsdcon02 BSDCon 2002 February 11-14, 2002 Cathedral Hill Hotel - San Francisco, California, USA Join the growing BSD community as we meet to explore the latest design and implementation of BSD-based systems software at BSDCon. This years program features keynote presentations by John Mashey of SenseiPartners and Brett Halle of Apple Computer, as well as a unique collection of refereed papers and invited talks covering a variety of topics, including: - MacOS X and Darwin - Multiprocessing work for FreeBSD - NetBSD work on the AMD x86-64 - Packet filtering and virtual private networks - the continuing fight against spam - vulnerabilities of wireless networks - running a company based on open source software In addition to exceptional content, BSDCon also features four professional-level, educational tutorials. Practical and immediately useful, these courses are an excellent way to improve the depth of your knowledge about BSD and to stay current with the technology. BSDCon offers the following tutorials: * FreeBSD Kernel Internals, Part I and II * System and Network Security * Debugging Kernel Problems * Porting BSD Applications to mac OS X BSDCon's combination of technical tracks, invited talks, tutorials, Birds-of-a-Feather sessions, and Work-in-Progress reports provide an unparalleled opportunity for people of all experience levels to learn from BSD experts, professionals with real world experience, and industry leaders. If you want to develop cutting-edge network applications, learn how to use BSD as part of enterprise-grade solutions, or just meet the movers and shakers of the BSD community, then BSDCon is the place to be! ===================================================================== BSDCon 2002 is sponsored by USENIX, the Advanced Computing Systems Association. This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message From owner-freebsd-announce Fri Jan 11 0:57: 2 2002 Delivered-To: freebsd-announce@freebsd.org Received: from freebie.xs4all.nl (freebie.xs4all.nl [213.84.32.253]) by hub.freebsd.org (Postfix) with ESMTP id 7BE6737B405; Fri, 11 Jan 2002 00:01:05 -0800 (PST) Received: (from wkb@localhost) by freebie.xs4all.nl (8.11.6/8.11.6) id g0B814Y27918; Fri, 11 Jan 2002 09:01:04 +0100 (CET) (envelope-from wkb) Date: Fri, 11 Jan 2002 09:01:04 +0100 From: Wilko Bulte To: freebsd-announce@freebsd.org Cc: FreeBSD core team Subject: Announcement FreeBSD core-team secretary Message-ID: <20020111090104.A27890@freebie.xs4all.nl> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-md5; protocol="application/pgp-signature"; boundary="yrj/dFKFPuw6o+aM" Content-Disposition: inline User-Agent: Mutt/1.2.5i X-OS: FreeBSD 4.5-PRERELEASE X-PGP: finger wilko@freebsd.org Sender: owner-freebsd-announce@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org --yrj/dFKFPuw6o+aM Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable - Announcement core-secretary - With this scrap of email I want to announce to the world my appointment=20 as the new FreeBSD Project's core secretary. So what am I going to do? First and foremost the core monthly reports are mine. At least the drafts are, as core does the final edits before I publish them.=20 Secondly I will be the keeper of the core agenda and the tracker of action points, which will hopefully help to ensure less balls will=20 be dropped by email-flooded core members. To help me do so I have been=20 handed a small whip to keep things rollin' :-) This of course includes the procedure around source commit bits.=20 Port commit bit grants should continue to be requested via portmgr@FreeBSD.= org=20 and not via core@FreeBSD.org (so no change of procedure here). If people want to send me email they can do so at core-secretary@FreeBSD.org In general it is probably better to cc: core@FreeBSD.org on such emails as I am not always there to act on emails myself (business trips,=20 vacations etc). In such cases core is informed and will take action themselves. There is no need to explicitely copy me on email sent to core@FreeBSD.org as I am a member of that email alias. For those wondering how I became insane enough^W^W interested in the job: the discussions on developers@ around the core monthly reports and the call for volunteers to write them triggered it. I am convinced that everybody out there has more productive things to do than fight email wars. And that is what made me sign up for the job. Core accepted my offer. Some reports have already been published, others are in the core editing pipeline at the moment. So stay tuned for more. I'm open to any constructive critiscim.=20 For those interested in my background: I hold a BS/EE in computer science. I worked as a hardware design engineer and later as a software engineer in Unix engineering at Philips Information Systems. In later days I was a software integration engineer at Digital Equipment Corporation. Today I'm an enterprise storage consultant for the Compaq storage division. I live in Arnhem, the Netherlands. My vices include good malt whiskeys, dark Belgian beers, German Autobahns with either the Honda motorbike=20 or the Audi A3 turbo :)=20 Wilko=20 FreeBSD Project core-secretary --=20 | / o / /_ _ email: wilko@FreeBSD.org |/|/ / / /( (_) Bulte Arnhem, The Netherlands=09 --yrj/dFKFPuw6o+aM Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use MessageID: gwZY1vVhA408TC7vo4UR7cBjikGSBNwD Comment: Requires PGP version 2.6 or later. iQCVAwUBPD6bvPymwUj/iuMFAQEy+QP/cJtskm3OQzROL+goCFFSdwHl6nV2als7 RgU7pnseIL0KV1AzYtWa+8PUa7QiznxI6r1Jx3QeainkMs8xiLNNx1bH72Hqfqez ElmgkJi9H/01yVgdIzXReNhSedaVrhhO7YdO9w6OuEgi4aITlyP6ZO73d7X/lYU0 /4A9VYuMhCM= =qeaW -----END PGP SIGNATURE----- --yrj/dFKFPuw6o+aM-- This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message From owner-freebsd-announce Sat Jan 12 23:35:17 2002 Delivered-To: freebsd-announce@freebsd.org Received: from clover.kientzle.com (user-112uh9a.biz.mindspring.com [66.47.69.42]) by hub.freebsd.org (Postfix) with ESMTP id EFDE037B400 for ; Sat, 12 Jan 2002 22:19:15 -0800 (PST) Received: from kientzle.com (user-112uh9d.biz.mindspring.com [66.47.69.45]) by clover.kientzle.com (8.11.3/8.11.3) with ESMTP id g0D6JEZ14132 for ; Sat, 12 Jan 2002 22:19:15 -0800 (PST) (envelope-from tim@kientzle.com) Message-ID: <3C4126E2.2030207@kientzle.com> Date: Sat, 12 Jan 2002 22:19:14 -0800 From: Tim Kientzle Reply-To: kientzle@acm.org User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:0.9.6) Gecko/20011206 X-Accept-Language: en-us MIME-Version: 1.0 To: announce@freebsd.org Subject: FreeBSD-related course at UC Berkeley Extension Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-freebsd-announce@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Building a Web Server Using Open Source Software Monday-Tuesday, February 25-26, 2002 425 Market Street, San Francisco, California http://www.unex.berkeley.edu/eng/br435/10-1.html In this two-day hands-on workshop, you will install the FreeBSD operating system and Apache web server and learn how to configure and manage your own PC-based web server. Course fee includes all software and reference books, 12 hours of instruction, lunch and refreshments each day. New this term: The course has been expanded from one to two full days in order to cover the new Apache 2.0 web server and provide additional time to learn practical web server management skills. Instructor: Tim Kientzle, kientzle@acm.org Related courses: Design of High-performance Web Clusters http://www.unex.berkeley.edu/eng/br435/6-1.html Tuesday/Thursday, February 19 and 21, 2002 San Francisco Building Database-Driven Web Applications Using Perl http://www.unex.berkeley.edu/eng/br435/11-1.html Thursday-Friday, February 28-March 1, 2002 San Francisco This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message