OpenBSD 7.3 Release

What’s New

This is a partial list of new features and systems included in OpenBSD 7.3. For a comprehensive list, see the changelog leading to 7.3.

  • Various kernel improvements:
    • Added waitid(2), wait for process state change.
    • Added pinsyscall(2), specify the call stub for a specific system call.
    • Added getthrname(2) and setthrname(2), get or set thread name.
    • Added WTRAPPED option for waitid(2) to control whether CLD_TRAPPED state changes, i.e., ptrace(2) on a process, are reported.
    • Introduced clockintr(9), a machine-independent clock interrupt scheduler. Switched all architectures to use the new subsystem.
    • Introduced a new kern.autoconf_serial sysctl(8) that can be used by userland to monitor state changes of the kernel device tree.
    • Fixed pmap(9) bugs involving entering an executable mapping for a page before synchronizing the data and instruction cache on arm64 and riscv64.
    • Removed copystr(9) from the public API.
    • Added getnsecruntime(9). Offers fast access to the system runtime clock at the cost of precision.
    • Prevent detaching (“bioctl -d detach”) of a boot volume on a RAID managed by bioctl(8).
    • On arm64, avoid using 1GB mappings for the identity map in the early kernel bootstrap phase and when booting the secondary CPUs. This avoids accidentally mapping memory regions that should not be mapped (i.e. secure memory) as all mapped memory can be accessed speculatively.
    • On arm64, add a machdep.lidaction sysctl(8) for aplsmc(4) Apple Silicon laptops.
      The arm64 default for the machdep.lidaction is 1, making the system suspend when the lid is closed. aplsmc(4) provides support for the lid position sensor.
    • Changed arm64 suspend idle loop from WFE to WFI, avoiding spurious wakeups while other CPUs are still active.
    • Added new dt(4) tracing ioctl DTIOCARGS to get the type of probe arguments.
  • SMP Improvements
  • Direct Rendering Manager and graphics drivers
    • Updated drm(4) to Linux 6.1.15
    • amdgpu(4): Added support for Ryzen 7000 “Raphael”, Ryzen 7020 series “Mendocino”, Ryzen 7045 series “Dragon Range”, Radeon RX 7900 XT/XTX “Navi 31”, Radeon RX 7600M (XT), 7700S, and 7600S “Navi 33.”
    • Fixed frame buffer corruption and additional bugs after wakeup on Apple Silicon laptops and the Lenovo x13s.
    • Added support for the backlight connector property to amdgpu(4) as in inteldrm(4), making xbacklight(1) work when using the Xorg modesetting driver.
  • VMM/VMD improvements
    • Updated vmm(4) to permit SVM guests read access to MSR_HWCR and MSR_PSTATEDEF. Guests can use these registers on AMD 17h and 19h hosts to determine the TSC frequency without calibrating against a second clock.
    • Allocated reference for vm and vcpu SLISTs in vmm(4), keeping vmm from triggering excessive wakeup calls while iterating through the list of vms while servicing an ioctl(2).
    • Set vmm(4) RAX guest register state based on VMCB.
    • Removed locking in vmm(4) vmm_intr_pending, reducing slowdowns due to requests for a lock held while the VM is running.
    • Increased speed of delivery of interrupts to a running vcpu in vmm(4).
    • Made vmm(4) treat vcpu lists as immutable, removing the need to reference count individual vcpu objects and use a rwlock.
    • Implemented zero-copy operations on virtqueues in vmd(8).
    • Provided a detailed e820 memory map when booting vmd(8) guests with SeaBIOS. When a vm initializes memory ranges, we now track what each range represents. This information can be used to supply the e820 memory map to SeaBIOS via the fw_cfg interface allowing it to properly communicate memory ranges to a guest operating system. With this special cases in ports can be removed.
    • Added thread names to vm processes in vmd(8), visible in ps(1).
    • Hid the WAITPKG cpu feature from vmm(4) guests, preventing invalid instruction exceptions. Also added WAITPKG feature identification to i386 and amd64.
    • Changed vmd(8) to only open /dev/vmm once, having the parent process send the fd to the vmm child process.
    • Restricted vmm(4) exposed cpuid extended feature flags.
    • Adjusted vmd(8) error paths to avoid removal of configuration-defined (known) VMs on error.
    • Stopped being paranoid about hypervisor correct PKU handling.
      Added saving and restoring guest PKRU to vmm(4). Expose the PKU cpuid bit to the guest if in use on the host.
    • Made vmd(8) scan the PCI bus to determine bootorder strings.
  • Various new userland features:
  • Various bugfixes and tweaks in userland:
    • Allow TZ to contain absolute paths starting with /usr/share/zoneinfo. All absolute paths were ignored in 7.2 to avoid unveil(2) violations.
    • Made ldomctl(8) accept more descriptive name-based paths in addition to number-based paths in ldom.conf(5).
    • Dropped support for $rc_exec in rc.subr(8). The rc_exec function should be used instead.
    • Excluded /tmp/*.shm files from /tmp cleaning in daily(8). Removing them interferes with programs that use shared memory via shm_open(3).
    • Added zap-to-char and zap-up-to-char to mg(1). Bound zap-to-char to M-z.
    • Fixed handling of escaped backslashes in vi(1) ex_range.
    • Added support to gunzip(1) for zip files that contain a single member.
    • Fixed ed(1) to print bytes read/written and the ? prompt to stdout, not stderr.
    • Changed the vmstat view in systat(1) to measure elapsed time with clock_gettime(2) instead of statclock ticks.
    • Improved the periodic display in iostat(8).
    • Fixed an edge case in top(1) where summary statistics for offline CPUs were displayed.
    • Added support for a personal units(1) library by passing -f multiple times.
    • Changed df(1) to round up fractional percentages.
    • Fixed unbounded variable expansion in pkg-config(1).
    • Switched to use llvm-strip(1) on architectures that use ld.lld(1).
    • Made rc(8) reorder libraries in parallel to netstart(8), as this does not depend on network access.
    • Made rc(8) print the name of each library before relinking as a signal to the operator that boot has not stalled.
    • Added a -w flag to audioctl(8) for displaying variables periodically.
    • Added short options for timeout(1) –foreground and –preserve-status.
    • Added signal as a full argument name for timeout(1) -s.
    • Fixed .wav files generated by aucat(1) by using extended header format.
    • In disklabel(8), use the size of the largest chunk of free space, not the total of all such chunks, when checking for sufficient space to add a partition.
    • Extended disklabel(8) template parsing to allow “[mount point] *” as the specification for putting the maximum available free space into a partition. Extended command line parsing to allow “T-” as the specification to read the template from stdin.
    • Repaired disklabel(8) to check for D_VENDOR flag in d_flags, not d_secpercyl.
    • Removed remnants of DEC standard 144 bad sector code from disklabel(8) and disktab(5).
    • Removed last references to d_drivedata field from disklabel(8)
    • Enhanced disklabel(8) auto allocation to use all possible free space.
    • Enhanced disklabel(8) to ensure valid partition offsets and sizes after rounding.
    • Enhanced disklabel(8) simple editor to allow ‘*’ when the action is ‘delete’.
    • Removed disklabel(8) code related to defunct disk types ‘hd’ and ‘svnd’.
    • Repaired fdisk(8) to set the correct ‘bootable’ bit in GPT partitions.
    • Repaired fdisk(8) to use GPT_UUID_NBSD_UFS for NetBSD GPT partition entries.
    • Added UEFI defined GPT partition type GPT_UUID_LEGACY_MBR to the partition types fdisk(8) recognizes.
    • Enhanced fdisk(8) to avoid spurious warnings when editing unused GPT partition.
    • Fixed cdio(1) error displays and plugged a leak in the error path.
    • Removed pointless :ob#0:pb#0:[tb=swap:] and :pb#N:ob#0: lines from various disktab(5) entries.
  • Improved hardware support and driver bugfixes, including:
    • Suspend/Resume improvements
      • Extended arm64 suspend/resume to include support for parking CPUs in a WFE/WFI loop.
      • Put CPUs in the lowest P-state before the final suspend step, needed for systems where we park CPUs in a low-power idle state ourselves.
    • system-on-chip devices
      • Added support for the Rockchip RK3566/RK3568 SoCs.
      • Added support for the Rockchip RK3568 processor.
      • Added support for the RK3568 PCIe controller to dwpcie(4).
      • Added qcdwusb(4), a driver controlling the interface logic for the Synopsys DesignWare USB 3.0 controller found on various Qualcomm Snapdragon SoCs.
      • Added support for the PCIe controller on the Qualcomm SC8280XP to dwpcie(4).
      • Added qcpmicgpio(4), a driver for the GPIO block inside the Qualcomm PMICs.
      • Added qcpmic(4), a driver for the SPMI-connected PMICs found on Qualcomm SoCs.
      • Added qcspmi(4), a driver for the SPMI PMIC Arbiter found on Qualcomm SoCs.
      • Added qcpdc(4), a driver for the Qualcomm Power Domain controller found on Qualcomm SoCs.
      • Added qcpwm(4), a driver for the PWM found on Qualcomm SoCs.
      • Added qcpon(4), a driver for the Qualcomm PMIC block that hosts the powerkey and reset input.
      • In rkgpio(4), handled different register layouts in modern Rockchip SoCs as seen in the RK356x and RK3588.
      • Added support for RK356x TSADC clocks to rkclock(4).
      • Added GMAC-related RK356x clocks to rkclock(4).
      • Added RK3588 support to rkclock(4) and rkpinctrl(4).
      • Added mvortc(4), a driver for the RTC on the ARMADA 38x series.
      • Added mvodog(4), a driver for the watchdog on the ARMADA 38x series.
      • Implemented rkpinctrl(4) support for explicit routing to use alternative pin muxings.
      • Added ytphy(4), a driver for the MotorComm YT8511 PHY.
      • Made rktemp(4) work on RK356x with U-Boot.
      • Added initialization code for RK356x in dwpcie(4) to prevent kernel hangs.
      • Implemented setting the parent clock for RK356x in rkclock(4).
      • Added dwpcie(4) code to bring up the PCIe controller on the RK356x.
      • Added rkpciephy(4), a driver for the PCIe 3.0 PHY found on the RK356x.
      • Added rkcomphy(4), a driver for the “naneng” combo PHY found on the RK356x (and RK3588). Only PCIe, SATA and USB3 support are implemented.
    • Improved support for Apple arm64 hardware
      • Made aplhidev(4) recognize M1 laptops with touchbars and translated Fn+(1-10,-,=) keys to F1-F12 on these systems.
      • Added suspend/resume support to aplns(4).
      • Implemented wakeup interrupt support in aplintc(4).
      • Added suspend/resume support to control the power domain to aplsart(4).
      • Made the power button function as a wakeup button during suspend in aplsmc(4).
      • Added aplpwm(4), a driver for the PWM controller found on Apple Silicon.
      • Improve Apple support by increasing the apliic(4) transfer completion timeout to 100ms to accommodate USB Type-C PD chips.
      • Added tipd(4), a driver fixing USB hotplug of type-C connectors on Apple Silicon hardware.
      • Improved aplpmu(4) range check to protect against overflow.
      • Added aplefuse(4), a driver for the eFuses on Apple Silicon SoCs.
      • Enabled aplpcie(4) power management for PCI devices.
      • Disable the screen backlight with aplsmc(4) on Apple Silicon laptops when the lid is closed.
    • X13s support
      • Worked around incomplete ACPI tables on the Lenovo x13s by loading the alternate device tree binaries from disk.
      • Set console output to the framebuffer on Lenovo x13s machines.
      • Made the USB ports work after a suspend/resume cycle on the x13s.
    • Improved audio devices
      • Made aplaudio(4) calculate the bit clock based on numbers of channels, bytes/sample and sample rate.
      • Set sncodec(4) and tascodec(4) default volume to -30dB instead of the hardware default of 0dB (maximum).
      • Added sncodec(4), a driver for the TI SNO12776/TAS2764 digital amplifier.
    • Other changes
      • Added support for the Wacom One M CTL-672 tablet to uwacom(4).
      • Hooked up the same USB device drivers on riscv64 as done in the arm64 architecture kernel.
        Enabled access to usb(4)ugen(4)ulpt(4)ucom(4) and ujoy(4).
      • Added uftdi(4) support for FTDI FT232R.
      • Added uhidpp(4) support for Bolt receivers and the Unified Battery feature often found on newer Logitech HID++ hardware.
      • Converted more RTC drivers to use todr_attach(). Quality of the RTC is set such that “discrete” RTC chips are preferred over RTCs integrated on a SoC.
      • Added support for the DS1339 RTC as found on the PiJuice.
      • Added qcrtc(4), a driver for the RTC found on Qualcomm PMICs.
      • Improved qcrtc(4) RTC reliability.
      • Added cursor back tab support to wscons(4) VT100 emulation.
        Added aixterm bright color sequences (SGR 90-97 and 100-107).
      • Added missing wscons(4) bounds checks when processing terminal escape sequences.
      • Replaced broken UTF-8 logic in wscons(4) with a better one borrowed from Citrus.
      • Introduced pijuice(4), an apm/sensor driver for the PiJuice HAT UPS.
      • Added pwmleds(4), a driver for PWM controlled LEDs.
      • Implemented dwpcie(4) support for the (optional) MSI controller of the Synopsys DesignWare PCIe host bridge.
      • Added icc(4) driver for I2C Consumer Control devices.
      • Prevented a possible crash when a ugen(4) device is detached.
      • Implemented wakeup interrupt handling in agintc(4).
      • Enabled pcagpio(4) and pcamux(4), making the SFP port on the ClearFog Base (CN9130) work.
      • Adopted a workaround for a bug in the ARM generic timer on the A64, disabling userland timecounter support on affected hardware pending a similar libc workaround.
      • Made amd64 cpuid recognize protection keys for Protection Key Supervisor (PKS).
      • Implemented access to EFI variables ESRT through an ioctl(2) interface compatible with what FreeBSD and NetBSD have.
        Created /dev/efi on amd64 and arm64.
      • Added dwge(4) support for “enhanced descriptor” mode found on some variants of the Synopsys DesignWare GMAC.
      • Removed the elansc(4) driver for AMD Elan SC520 System Controller.
      • Made ppb(4) bus range available after detaching, fixing unplugging and replugging thunderbolt devices that were plugged in when the machine was booted.
      • Reworked the arm64 architecture cpu_init_secondary() function to allow use for both initial powerup and wakeup from deeper sleep states.
      • Added ufshci(4), a driver for Universal Flash Storage (UFS) Host Controllers.
      • Added scmi(4), a driver for the ARM System Control and Management Interface.
      • Added support for the Shenzhen Tangcheng Technology TCS4525 voltage regulator to fanpwr(4).
      • Added psci(4) (ARM Power State Coordination Interface) support for available deep idle states as advertised in device trees.
      • Added eephy(4), found on the Turris Omnia WAN port, to armv7.
      • Added polling to tipmic(4) driver when starting from a cold boot, fixing a hang on boot.
      • Added a workaround for Intel Braswell/Cherry Trail mwait hang.
      • Added the Armada 380 temperature sensor to mvtemp(4) and enabled the driver on armv7.
  • New or improved network hardware support:
    • Enabled em(4) IPv4, TCP and UDP checksum offloading and hardware VLAN tagging on devices with 82575, 82576, i350 and i210 chipsets.
    • Improved mcx(4) performance by using interrupt-based command completion.
    • Fixed a panic seen with rge(4) RTL8125 with MCLGETL.
    • Add dwqe(4), a driver for the Synopsys DesignWare Ethernet QoS controller used on the NXP i.MX8MP, the Rockchip RK35xx series and Intel Elkhart Lake.
    • Worked around an issue on the StarFive JH7100 SoC to make dwge(4) Ethernet work reliably on the StarFive VisionFive 1 board.
    • In mvneta(4), passed MII flags depending on the phy mode specified in the device tree, making the WAN port work on the Turris Omnia.
  • Added or improved wireless network drivers:
    • Increased the timeout for bwfm(4) PCI devices to avoid spurious firmware load failures, particularly on Apple M2 laptops.
    • Implemented alternative mailbox handling mechanism required by newer bwfm(4) firmware.
    • Fixed bwfm(4) issues with suspend/resume and possible firmware crashes on the M2 MacBook Air.
    • Prevented an iwx(4) firmware error when authentication to the AP times out.
    • Fixed a crash in iwx(4) when connecting to WEP networks via ifconfig(8) join.
    • Fixed an alignment issue in iwx(4) Rx descriptors.
    • Avoided trying to remove keys while doing crypto in hardware if the station is not active in iwx(4) firmware, fixing a firmware panic.
    • Prevented potential panics by disallowing the iwx(4) init task from running in parallel to wakeup code during resume.
    • Switched all iwx(4) devices to -77 firmware images.
    • Upgraded firmware images for iwm(4) 9260 and 9560 devices.
    • Made iwx(4) get the primary channel number from AP beacon info, preventing problems on 40/80Mhz channels if there is a mismatch.
    • Fixed iwx(4) session protection event duration.
  • IEEE 802.11 wireless stack improvements and bugfixes:
    • Made net80211 drop beacons received on secondary HT/VHT channels, preventing iwm(4) firmware panics and making association work with 11ac APs which transmit beacons on channels other than their primary.
    • Made WEP encryption work on bwfm(4).
  • Installer, upgrade and bootloader improvements:
    • Made installer answers ! and (S)hell drop into a ksh(1) environment rather than the more limited sh(1).
    • Added support for configuring interfaces by lladdr (MAC).
    • Made the installer skip interface configuration questions when no interfaces are available.
    • Fixed resizing partitions on an auto-allocated disk that had a boot partition.
    • Stopped the installer from asking to initialize disks that have softraid(4) chunks.
    • Made efiboot fdt support device trees with NOPs in them (like the kernel version).
    • Improved the default choice for the installer’s install media disk question to show the first disk that (a) is not the root disk and (b) is not a disk with softraid chunks (hosting the root disk, for example).
    • Stopped offering WEP in the installer if not supported.
    • Fixed lock file error on installer exit/abort.
    • Made installboot(8) -p support softraid(4).
    • Made installboot(8) silently skip softraid(4) keydisks.
    • Fixed passing explicit stages files to installboot(8).
    • Added mount_nfs(8) to the sparc64 installer, to fetch sets over NFS.
    • Copy the apple-boot firmware to EFI system partition, enabling automatic bootloader updates on Apple Silicon computers.
    • Made the installer stop printing MD post installation instructions on upgrades.
    • Made it possible to set keyboard layout(s) in arm64’s installer.
    • Added initial support in the installer for guided disk encryption for amd64, i386, riscv64 and sparc64.
    • Added passing of boot device information from the bootloader to the kernel on luna88k.
    • Switched luna88k boot loader to MI boot code.
    • Made the luna88k bootloader display a puffy boot logo.
    • Made ls(1) work correctly in the luna88k bootloader.
    • Made time(1) work correctly in the luna88k bootloader.
    • Removed dangerous user-settable “addr” variable from MI bootloader, only compiling tty-related code on platforms where it makes sense for the bootloader to control it.
    • Added “machine poweroff” command on luna88k bootloader.
    • Switched alpha to machine-independent boot blocks.
    • Switched all architectures’ ramdisks (except alpha’s and luna88k’s) to use installboot(8) -p.
    • Fixed ofwboot OpenFirmware map call to unbreak boot on some machines.
    • Reduced ofwboot.net size after libz update to unbreak netboot on some machines.
    • Made riscv64 bootloader support boot from RAID 1C softraid volumes.
    • Made installboot(8) support softraid(4) on riscv64.
    • Stopped creating defunct vax (ra, rx), hp300 (hd) and sparc (xy, xd) devices in /dev.
  • Security improvements:
    • Permissions (RWX, MAP_STACK, etc.) on address space regions can be made immutable, so that mmap(2)mprotect(2) or munmap(2) fail with EPERM. Most of the program static address space is now automatically immutable (main program, ld.so, main stack, load-time shared libraries, and dlopen()’d libraries mapped without RTLD_NODELETE). Programmers can request non-immutable static data using the “openbsd.mutable” section, or manually bring immutability to (page aligned heap objects) using mimmutable(2). The main internal data of malloc(3) is marked immutable.
    • Some architectures now have non-readable code (“xonly”), both from the perspective of userland reading its own memory, or the kernel trying to read memory in a system call. Many sloppy practices in userland code had to be repaired to allow this. The linker (ld.lld(1) or ld.bfd(1)) option –execute-only is enabled by default. In order of development: arm64, riscv64, hppa, amd64, powerpc64, powerpc (G5 only), octeon, and sparc64 (sun4u only; unfinished).
    • These can still benefit from switching to –execute-only binaries if the cpu generates different traps for instruction-fetch versus data-fetch. The VM system will not allow memory to be read before it was executed which is valuable together with library relinking. Architectures switched over include loongson.
    • ld.so(1) and crt0 register the location of the execve(2) stub with the kernel using pinsyscall(2), after which the kernel only accepts an execve call from that specific location.
    • Added execve(2) violations of pinsyscall(2) policy to the daily mail, available by setting rc.conf.local(5) accounting=YES.
    • Added retguard (consistency-check the return address on the stack) to amd64 syscalls.
    • sshd random relinking at boot: Randomly relink and install sshd(8), resulting in a sshd binary with unknown address layout after every reboot.
    • Add another mitigation against classic BROP on systems without execute-only mmu hardware-enforcement. A range-checking wrapper in front of copyin(9) and copyinstr(9) ensures the userland source address doesn’t overlap the main program text and other text segments, thereby making these address ranges unreadable to the kernel. No programs have been discovered which require reading their own text segments with a system call.
    • On arm64, introduce mitigation of the Spectre-BHB (Branch History Injection) CPU vulnerability by using core-specific trampoline vectors.
    • Enabled the arm64 Data Independent Timing (DIT) feature in both the kernel and userland on CPUs that support it to mitigate timing side-channel attacks.
  • Changes in the network stack:
    • Made /dev/pf a clonable device to better track kernel resources used by processes.
    • Modified TCP receive buffer size auto-scaling to use the smoothed RTT (SRTT) instead of the timestamp option, which improves performance on high latency networks if the timestamp option isn’t available.
    • Relaxed the requirement for multicast support of interfaces for configuring IPv6. This allows non-multicast interfaces such as point-to-point interfaces and the NBMA / point-to-multipoint interfaces like mpe(4), mgre(4) and wg(4) to work with IPv6.
    • Measure the TCP_KEEPALIVE timeout with getnsecruntime(9) instead of the system uptime. Prevents TCP connections from needlessly failing en masse after waking a system from suspend.
    • Used stoeplitz (symmetric Toeplitz hash algorithm) to generate a hash/flowid for pf(4) state keys. With this change, pf will hash traffic the same way that hardware using a stoeplitz key will hash incoming traffic on rings. stoeplitz is also used by the TCP stack to generate a flow id, which is used to pick which transmit ring is used on nics with multiple queues, too. Using the same algorithm throughout the stack encourages affinity of packets to rings and softnet threads the whole way through.
    • Prevented possible kernel crashes by dropping TCP packets with destination port 0 in pf(4) and the stack.
    • Fixed an endian swap bug causing problems with vlan(4) on em(4) sparc64 systems.
    • Denied “pipex no” tunnel setting for pppx(4) interfaces.
    • Fixed pfsync(4) crashing on pf_state_key removal.
    • Fixed a panic in pfsync(4) when there is no data ready for bulk transfer.
    • Turned off TCP Segmentation Offload (TSO) if interface is added to layer 2 devices.
    • Improved vnet(4) to work better in busy conditions.
    • Added a bpf(4) timeout (BIOCSWTIMEOUT) between capturing a packet and making the buffer readable, preventing, for example, pflogd(8) waking every half second even if there is nothing to read. By default this buffer is infinite and must be filled to become readable.
    • Avoided enabling TSO on interfaces which are already attached to a bridge.
  • Routing daemons and other userland network improvements:
    • IPsec support was improved:
      • Added iked(8) support for configuring multiple name servers.
      • Synced proc.c from vmd(8) to iked(8) to enable fork + exec for all processes. This gives each process a fresh and unique address space to further improve randomization of ASLR and stack protector.
    • In bgpd(8)bgpctl(8) and bgplgd(8):
      • Improved performance by optimising the output filters.
      • Add Autonomous System Provider Authorization (ASPA) validation based on draft-ietf-sidrops-aspa-verification-12
      • Introduce avs (ASPA validation state) filter and bgpctl filter argument.
      • Add ASPA support for the RTR protocol based on draft-ietf-sidrops-8210bis-10.
      • Improve open policy (RFC 9234) support and enable the capability automatically if a role is specified for the peer.
      • Introduce a per-neighbor ‘role’ configuration option to specify the session role used by ASPA verification and the open policy capability. The ‘announce policy’ statement was simplified at the same time.
      • Improve startup behaviour by introducing a small delay before opening the connection to a new peer.
      • Support for aspa-set table config which can be provided by rpki-client(8).
      • Make it possible to filter the RIB by invalid and leaked prefixes in bgpctl and bgplgd.
      • Add OpenMetrics output to bgpctl for various BGP statistics and add /metrics endpoint to bgplgd.
      • Fix of incorrect length checks that allowed an out-of-bounds read in bgpd.
    • rpki-client(8) saw some changes:
      • Add a new ‘-H’ command line option to create a shortlist of repositories to synchronize to. For example, when invoking “rpki-client -H rpki.ripe.net -H chloe.sobornost.net”, the utility will not connect to any other hosts other than the two specified through the -H option.
      • Add support for validating Geofeed (RFC 9092) authenticators. To see an example download https://sobornost.net/geofeed.csv and run “rpki-client -f geofeed.csv”
      • Add support for validating Trust Anchor Key (TAK) objects. TAK objects can be used to produce new Trust Anchor Locators (TALs) signed by and verified against the previous Trust Anchor. See draft-ietf-sidrops-signed-tal for the full specification.
      • Log lines related to RRDP/HTTPS connection problems now include the IP address of the problematic endpoint (in brackets).
      • Improve the error message when an invalid filename is encountered in the rpkiManifest field in the Subject Access Information (SIA) extension.
      • Emit a warning when unexpected X.509 extensions are encountered.
      • Restrict the ROA ipAddrBlocks field to only allow two ROAIPAddressFamily structures (one per address family). See draft-ietf-sidrops-rfc6482bis.
      • Check the absence of the Path Length constraint in the Basic Constraints extension.
      • Restrict the SIA extension to only allow the signedObject and rpkiNotify accessMethods.
      • Check that the Signed Object access method is present in ROA, MFT, ASPA, TAK, and GBR End-Entity certificates.
      • In addition to the ‘rsync://’ scheme, also permit other schemes (such as ‘https://’) in the SIA signedObject access method.
      • Check that the KeyUsage extension is set to nothing but digitalSignature on End-Entity certificates.
      • Check that the KeyUsage extension is set to nothing but keyCertSign and CRLSign on CA certificates.
      • Check that the ExtendedKeyUsage extension is absent on CA certificates.
      • Fix a bug in the handling of the port of http_proxy.
      • The ‘-r’ command line option has been deprecated.
      • Filemode (-f) output is now presented as a text based table.
      • The ’expires’ key in the JSON/CSV/OpenBGPD output formats is now calculated with more accuracy. The calculation takes into account the nextUpdate value of all intermediate CRLs in the signature path towards the trust anchor, in addition to the expiry moment of the leaf-CRL and CAs.
      • Handling of CRLs and Manifests in the face of inconsistent RRDP delta publications has been improved. A copy of an alternative version of the applicable CRL is kept in the staging area of the cache directory, in order to increase the potential for establishing a complete publication point, in cases where a single publication point update was smeared across multiple RRDP delta files.
      • The OpenBGPD configuration output now includes validated Autonomous System Provider Authorization (ASPA) payloads as an ‘aspa-set {}’ configuration block.
      • When rpki-client is invoked with increased verbosity (’-v’), the current RRDP Serial and Session ID are shown to aid debugging.
      • Self-signed X.509 certificates (such as Trust Anchor certificates) now are considered invalid if they contain an X.509 AuthorityInfoAccess extension.
      • Signed Objects where the CMS signing-time attribute contains a timestamp later then the X.509 certificate’s notAfter timestamp are considered invalid.
      • Manifests where the CMS signing-time attribute contains a timestamp later then the Manifest eContent nextUpdate timestamp are considered invalid.
      • Any objects whose CRL Distribution Points extension contains a CRLIssuer, CRL Reasons, or nameRelativeToCRLIssuer field are considered invalid in accordance with RFC 6487 section 4.8.6.
      • For every X.509 certificate the SHA-1 of the Subject Public Key is calculated and compared to the Subject Key Identifier (SKI). If a mismatch is found the certificate is not trusted.
      • Require the outside-TBS signature OID for every X.509 intermediate CA certificate and CRL to be sha256WithRSAEncryption.
      • Require the RSA key pair modulus and public exponent parameters to strictly conform to the RFC 7935 profile.
      • Ensure there is no trailing garbage present in Signed Objects beyond the self-embedded length field.
      • Require RRDP Session IDs to strictly be version 4 UUIDs.
      • When decoding and validating an individual RPKI file using filemode (rpki-client -f file), display the signature path towards the trust anchor and the timestamp when the signature path will expire.
      • When decoding and validating an individual RPKI file using filemode (rpki-client -f file), display the optional CMS signing-time, non-optional X.509 notBefore timestamp and non-optional X.509 notAfter timestamp.
    • Updated zlib to 1.2.13.
    • Fixed a long-standing bug in a libreadline header that broke the interactive Python command line interface.
    • Switched tftpd(8) to default to read-only unless -w is specified for write access (the previous default).
    • Stopped printing the prompt for non-interactive usage of tftp(1).
    • Changed rarpd(8) to only unveil /tftpboot if -t is specified.
    • Added client certificate authentication and an optional SASL EXTERNAL bind to ypldap(8).
    • Adjusted ipv6 address width to align the display columns better in the output of ndp(8)route(8) and netstat(1) as already available in systat(1)’s netstat.
    • Used stravis(3) to sanitize redirect URIs from ftp(1) fetch before printing.
    • Prevent an unwind(8) crash when a TCP query is larger than the length field indicated.
    • Preserve the original order of nameservers as configured via resolv.conf(5) in resolvd(8).
    • Restrict the characters allowed in the hostname argument of getaddrinfo(3) to the set [A-z0-9-_.]. Additionally, two consecutive dots (’.’) are not allowed nor can the string start with – or ‘.’. This removes characters like ‘$’, ‘`’, ‘\n’ or ‘*’ that can traverse the DNS without problems but have special meaning as in a shell.
    • Fixed a number of out of bounds reads in DNS response parsing of the async DNS resolver in libc.
    • Added ifconfig(8) -M (mac) to find the mac address on an interface and print it.
    • Added support for configuring interfaces by lladdr to support interface configurations bound to a specific hardware device. The “if” part of the hostname.if(5) configuration file can now be a MAC address.
    • Limited display of wireguard peers by ifconfig(8) to when either a wireguard interface is specified or the flag “-A” is used.
    • Implemented the RFC 8781 PREF64 router advertisement option in rad(8) which is used to communicate NAT64 prefixes to hosts.
    • Moved the documentation of flag mappings displayed by “route show” from the netstat(1) manpage to route(8).
    • Improvements in nc(1):
      • Stop claiming connection success in UDP mode unless true.
      • Do not test the connection in non-interactive mode. The test writes characters to the socket which can corrupt data that is possibly piped into nc.
      • Some refactoring and code cleanup.
    • Improvements in acme-client(1):
      • Added support for newlines inside the alternative names block in acme-client.conf(5).
      • Use proper data structures for retrieving subject alternative names in certificates rather than printing them to a buffer and tokenizing and parsing the undocumented string.
      • Simplified, corrected and modernized the use of libcrypto interfaces.
      • Plugged various memory leaks.
      • Use ASN1_TIME_to_tm(3) instead of a poor man’s hand-rolled version of it.
      • Use timegm(3) instead of mktime(3) to eliminate time-zone variation.
      • Encode Subject Alternative Name (SAN) entries before printing.
      • Prevent acme-client(1) from leaking an http get request when receiving a redirect without a location header.
    • Prevented smtpd(8) abort due to a connection from a local, scoped ipv6 address.
    • Fixed a potential NULL dereference in the unpriv child expanding %{mda} in smtpd(8).
    • Corrected the order of arguments for calls to shutdown(2) on the route socket of slaacd(8)dhcpleased(8) and unwind(8).
    • Made route(8) sourceaddr print the used addresses for inet and inet6, or “default” if no sourceaddr is set and the default algorithm is used.
    • Added -mpls option to the route(8) monitor command. It can be used to restrict displayed route messages to the mpls address family.
    • Fixed rsync(1) handling of port numbers in rsync://host[:port]/module URLs.
    • Made tcpdrop(8) accept netstat-style address.port syntax.
    • Ensured pfctl(8) correctly adds addresses to the undefined/inactive table.
    • Switched tftpd(8) to default to read-only unless -w is specified for write access (the previous default).
    • Changed rarpd(8) to only unveil /tftpboot if -t is specified.
    • Fixed the DIOCIGETIFACES ioctl so all network interfaces and interface groups are reported in pfctl(8).
  • tmux(1) improvements and bug fixes:
    • Added scroll-top and scroll-bottom tmux(1) commands to scroll so cursor is at the top or bottom respectively.
    • Added a -T flag to tmux(1) capture-pane to capture up to the last used cell and not the full width of the pane.
    • Preserved the marked pane when renumbering windows in tmux(1).
    • Added modified tab key sequences to tmux(1).
    • Changed tmux(1) to only set the extended flag when searching, which allows send-keys to work.
    • Added a -l flag to tmux(1) display-message to disable format expansion.
    • Fixed a tmux(1) crash when there are no window buffers.
    • Fixed tmux(1) C-S-Tab without extended keys.
    • Added tmux(1) send-keys -K to handle keys directly as if typed.
    • Made tmux(1) tty-keys accept \007 as terminator to OSC 10 or 11.
    • Made tmux(1) recognize pasted texts wrapped in bracket paste sequences, rather than only forwarding to the program inside.
    • Supported -1 without -N for list-keys in tmux(1).
    • Added a flag to tmux(1) display-menu to select the menu item chosen first.
    • Added Backtab key support to tmux(1)
    • Disallowed multiple consecutive line separators in tmux(1) menu.
    • Extended display-message to work for control clients in tmux(1).
    • Added -f to list-clients in tmux(1).
    • Added a tmux(1) L modifier like P, W, S to loop over clients.
  • LibreSSL version 3.7.2
    • New features
      • Added Ed25519 support both as a primitive and via OpenSSL’s EVP interfaces.
      • X25519 is now also supported via EVP.
      • The OpenSSL 1.1 raw public and private key API is available with support for EVP_PKEY_ED25519, EVP_PKEY_HMAC and EVP_PKEY_X25519. Poly1305 is not currently supported via this interface.
      • Added EVP_CIPHER_meth_*() setter API.
      • Added various X.509 accessor functions.
    • Compatibility changes
      • BIO_read() and BIO_write() now behave more closely to OpenSSL 3 in various corner cases.
    • Bug fixes
      • Added EVP_chacha20_poly1305() to the list of all ciphers.
      • Fixed potential leaks of EVP_PKEY in various printing functions
      • Fixed potential leak in OBJ_NAME_add().
      • Avoid signed overflow in i2c_ASN1_BIT_STRING().
      • Cleaned up EVP_PKEY_ASN1_METHOD related tables and code.
      • Fixed long standing bugs BN_GF2m_poly2arr() and BN_GF2m_mod().
      • Fixed segfaults in BN_{dec,hex}2bn().
      • Fixed NULL dereference in x509_constraints_uri_host() reachable only in the process of generating certificates.
      • Fixed a variety of memory corruption issues in BIO chains coming from poor old and new API: BIO_push(), BIO_pop(), BIO_set_next().
      • Avoid potential divide by zero in BIO_dump_indent_cb()
      • Fixed a memory leak, a double free and various other issues in BIO_new_NDEF().
      • Fixed various crashes in the openssl(1) testing utility.
      • Do not check policies by default in the new X.509 verifier.
      • Avoid crash with ASN.1 BOOLEANS in openssl(1) asn1parse.
      • Added missing error checking in PKCS7.
      • Call CRYPTO_cleanup_all_ex_data() from OPENSSL_cleanup().
    • Documentation improvements
      • Numerous improvements and additions for ASN.1, BIO, BN, and X.509.
      • The BN documentation is now considered to be complete.
      • Marked BIO_s_log(3) BIO_nread0(3), BIO_nread(3), BIO_nwrite0(3), BIO_nwrite(3), BIO_dump_cb(3) and BIO_dump_indent_cb(3) as intentionally undocumented.
      • Documented various BIO_* interfaces.
      • Documented ED25519_keypair(3), ED25519_sign(3), and ED25519_verify(3).
      • Documented EVP_PKEY raw private/public key interfaces.
      • Documented ASN1_buf_print(3).
      • Documented DH_get0_, DSA_get0_, ECDSA_SIG_get0_* and RSA_get0_*.
      • Merged documentation of UI_null() from OpenSSL 1.1
      • Various spelling and other documentation improvements.
    • Internal improvements
      • Remove dependency on system timegm() and gmtime() by replacing traditional Julian date conversion with POSIX epoch-seconds date conversion from BoringSSL.
      • Removed old and unused BN code dealing with primes.
      • Started rewriting name constraints code using CBS.
      • Removed support for the HMAC PRIVATE KEY.
      • Reworked DSA signing and verifying internals.
      • Rewrote the TLSv1.2 key exporter.
      • Cleaned up and refactored various aspects of the legacy TLS stack.
      • Initial overhaul of the BIGNUM code:
        • Added a new framework that allows architecture-dependent replacement implementations for bignum primitives.
        • Imported various s2n-bignum’s constant time assembly primitives and switched amd64 to them.
        • Lots of cleanup, simplification and bug fixes.
      • Changed Perl assembly generators to move constants into .rodata, allowing code to run with execute-only permissions.
      • Capped the number of iterations in DSA and ECDSA signing (avoiding infinite loops), added additional sanity checks to DSA.
      • ASN.1 parsing improvements.
      • Cleanup and improvements in EC code, including always clearing EC groups and points on free.
      • Various openssl(1) improvements.
      • Various nc(1) improvements.
    • Security fixes
      • A malicious certificate revocation list or timestamp response token would allow an attacker to read arbitrary memory.
  • OpenSSH 9.3 and OpenSSH 9.2
    This release of OpenBSD includes the changes made to OpenSSH since release 9.1:
    • Security
      • ssh-add(1): when adding smartcard keys to ssh-agent(1) with the per-hop destination constraints (ssh-add -h …) added in OpenSSH 8.9, a logic error prevented the constraints from being communicated to the agent. This resulted in the keys being added without constraints. The common cases of non-smartcard keys and keys without destination constraints are unaffected. This problem was reported by Luci Stanescu.
      • ssh(1): Portable OpenSSH provides an implementation of the getrrsetbyname(3) function if the standard library does not provide it, for use by the VerifyHostKeyDNS feature. A specifically crafted DNS response could cause this function to perform an out-of-bounds read of adjacent stack data, but this condition does not appear to be exploitable beyond denial-of-service to the ssh(1) client.
        The getrrsetbyname(3) replacement is only included if the system’s standard library lacks this function and portable OpenSSH was not compiled with the ldns library (–with-ldns). getrrsetbyname(3) is only invoked if using VerifyHostKeyDNS to fetch SSHFP records. This problem was found by the Coverity static analyzer.
      • sshd(8): fix a pre-authentication double-free memory fault introduced in OpenSSH 9.1. This is not believed to be exploitable, and it occurs in the unprivileged pre-auth process that is subject to chroot(2) and is further sandboxed on most major platforms.
      • ssh(8): in OpenSSH releases after 8.7, the PermitRemoteOpen option would ignore its first argument unless it was one of the special keywords “any” or “none”, causing the permission list to fail open if only one permission was specified. bz3515
      • ssh(1): if the CanonicalizeHostname and CanonicalizePermittedCNAMEs options were enabled, and the system/libc resolver did not check that names in DNS responses were valid, then use of these options could allow an attacker with control of DNS to include invalid characters (possibly including wildcards) in names added to known_hosts files when they were updated. These names would still have to match the CanonicalizePermittedCNAMEs allow-list, so practical exploitation appears unlikely.
    • Potentially-incompatible changes
      • ssh(1): add a new EnableEscapeCommandline ssh_config(5) option that controls whether the client-side ~C escape sequence that provides a command-line is available. Among other things, the ~C command-line could be used to add additional port-forwards at runtime.
        This option defaults to “no”, disabling the ~C command-line that was previously enabled by default. Turning off the command-line allows platforms that support sandboxing of the ssh(1) client (currently only OpenBSD) to use a stricter default sandbox policy.
    • New features
      • ssh-keygen(1), ssh-keyscan(1): accept -Ohashalg=sha1|sha256 when outputting SSHFP fingerprints to allow algorithm selection. bz3493
      • sshd(8): add a sshd -G option that parses and prints the effective configuration without attempting to load private keys and perform other checks. This allows usage of the option before keys have been generated and for configuration evaluation and verification by unprivileged users.
      • sshd(8): add support for channel inactivity timeouts via a new sshd_config(5) ChannelTimeout directive. This allows channels that have not seen traffic in a configurable interval to be automatically closed. Different timeouts may be applied to session, X11, agent and TCP forwarding channels.
      • sshd(8): add a sshd_config UnusedConnectionTimeout option to terminate client connections that have no open channels for a length of time. This complements the ChannelTimeout option above.
      • sshd(8): add a -V (version) option to sshd like the ssh client has.
      • ssh(1): add a “Host” line to the output of ssh -G showing the original hostname argument. bz3343
      • scp(1), sftp(1): add a -X option to both scp(1) and sftp(1) to allow control over some SFTP protocol parameters: the copy buffer length and the number of in-flight requests, both of which are used during upload/download. Previously these could be controlled in sftp(1) only. This makes them available in both SFTP protocol clients using the same option character sequence.
      • ssh-keyscan(1): allow scanning of complete CIDR address ranges, e.g. “ssh-keyscan 192.168.0.0/24”. If a CIDR range is passed, then it will be expanded to all possible addresses in the range including the all-0s and all-1s addresses. bz#976
      • ssh(1): support dynamic remote port forwarding in escape command-line’s -R processing. bz#3499
    • Bugfixes
      • scp(1), sftp(1): fix progressmeter corruption on wide displays; bz3534
      • ssh-add(1), ssh-keygen(1): use RSA/SHA256 when testing usability of private keys as some systems are starting to disable RSA/SHA1 in libcrypto.
      • sftp-server(8): fix a memory leak. GHPR363
      • ssh(1), sshd(8), ssh-keyscan(1): remove vestigial protocol compatibility code and simplify what’s left.
      • Fix a number of low-impact Coverity static analysis findings. These include several reported via bz2687
      • ssh_config(5), sshd_config(5): mention that some options are not first-match-wins.
      • Rework logging for the regression tests. Regression tests will now capture separate logs for each ssh and sshd invocation in a test.
      • ssh(1): make ssh -Q CASignatureAlgorithms work as the manpage says it should; bz3532.
      • ssh(1): ensure that there is a terminating newline when adding a new entry to known_hosts; bz3529
      • ssh(1): when restoring non-blocking mode to stdio fds, restore exactly the flags that ssh started with and don’t just clobber them with zero, as this could also remove the append flag from the set. bz3523
      • ssh(1): avoid printf(“%s”, NULL) if using UserKnownHostsFile=none and a hostkey in one of the system known hosts file changes.
      • scp(1): switch scp from using pipes to a socket-pair for communication with its ssh sub-processes, matching how sftp(1) operates.
      • sshd(8): clear signal mask early in main(); sshd may have been started with one or more signals masked (sigprocmask(2) is not cleared on fork/exec) and this could interfere with various things, e.g. the login grace timer. Execution environments that fail to clear the signal mask before running sshd are clearly broken, but apparently they do exist.
      • ssh(1): warn if no host keys for hostbased auth can be loaded.
      • sshd(8): Add server debugging for hostbased auth that is queued and sent to the client after successful authentication, but also logged to assist in diagnosis of HostbasedAuthentication problems. bz3507
      • ssh(1): document use of the IdentityFile option as being usable to list public keys as well as private keys. GHPR352
      • sshd(8): check for and disallow MaxStartups values less than or equal to zero during config parsing, rather than failing later at runtime. bz3489
      • ssh-keygen(1): fix parsing of hex cert expiry times specified on the command-line when acting as a CA.
      • scp(1): when scp(1) is using the SFTP protocol for transport (the default), better match scp/rcp’s handling of globs that don’t match the globbed characters but do match literally (e.g. trying to transfer a file named “foo.[1]”). Previously scp(1) in SFTP mode would not match these pathnames but legacy scp/rcp mode would. bz3488
      • ssh-agent(1): document the “-O no-restrict-websafe” command-line option.
      • ssh(1): honour user’s umask(2) if it is more restrictive then the ssh default (022).
  • Ports and packages:Many pre-built packages for each architecture:
    • aarch64: 11561
    • amd64: 11764
    • arm: 8653
    • i386: 10572
    • mips64: 8936
    • powerpc: 9893
    • powerpc64: 8474
    • riscv64: 10191
    • sparc64: 9325
    Some highlights:
    • Asterisk 16.30.0, 18.17.0 and 20.2.0
    • Audacity 3.2.5
    • CMake 3.25.2
    • Chromium 111.0.5563.110
    • Emacs 28.2
    • FFmpeg 4.4.3
    • GCC 8.4.0 and 11.2.0
    • GHC 9.2.7
    • GNOME 43.3
    • Go 1.20.1
    • JDK 8u362, 11.0.18 and 17.0.6
    • KDE Applications 22.12.3
    • KDE Frameworks 5.103.0
    • Krita 5.1.5
    • LLVM/Clang 13.0.0
    • LibreOffice 7.5.1.2
    • Lua 5.1.5, 5.2.4, 5.3.6 and 5.4.4
    • MariaDB 10.9.4
    • Mono 6.12.0.182
    • Mozilla Firefox 111.0 and ESR 102.9.0
    • Mozilla Thunderbird 102.9.0
    • Mutt 2.2.9 and NeoMutt 20220429
    • Node.js 18.15.0
    • OCaml 4.12.1
    • OpenLDAP 2.6.4
    • PHP 7.4.33, 8.0.28, 8.1.16 and 8.2.3
    • Postfix 3.5.17 and 3.7.3
    • PostgreSQL 15.2
    • Python 2.7.18, 3.9.16, 3.10.10 and 3.11.2
    • Qt 5.15.8 and 6.4.2
    • R 4.2.1
    • Ruby 3.0.5, 3.1.3 and 3.2.1
    • Rust 1.68.0
    • SQLite 2.8.17 and 3.41.0
    • Shotcut 22.12.21
    • Sudo 1.9.13.3
    • Suricata 6.0.10
    • Tcl/Tk 8.5.19 and 8.6.13
    • TeX Live 2022
    • Vim 9.0.1388 and Neovim 0.8.3
    • Xfce 4.18
  • As usual, steady improvements in manual pages and other documentation.
  • The system includes the following major components from outside suppliers:
    • Xenocara (based on X.Org 7.7 with xserver 21.1.6 + patches, freetype 2.12.1, fontconfig 2.14, Mesa 22.3.4, xterm 378, xkeyboard-config 2.20, fonttosfnt 1.2.2 and more)
    • LLVM/Clang 13.0.0 (+ patches)
    • GCC 4.2.1 (+ patches) and 3.3.6 (+ patches)
    • Perl 5.36.0 (+ patches)
    • NSD 4.6.1
    • Unbound 1.17.0
    • Ncurses 5.7
    • Binutils 2.17 (+ patches)
    • Gdb 6.3 (+ patches)
    • Awk September 12, 2022
    • Expat 2.5.0

How to install

Please refer to the following files on the mirror site for extensive details on how to install OpenBSD 7.3 on your machine:


Quick installer information for people familiar with OpenBSD, and the use of the “disklabel -E” command. If you are at all confused when installing OpenBSD, read the relevant INSTALL.* file as listed above!

OpenBSD/alpha:

If your machine can boot from CD, you can write install73.iso or cd73.iso to a CD and boot from it. Refer to INSTALL.alpha for more details.

OpenBSD/amd64:

If your machine can boot from CD, you can write install73.iso or cd73.iso to a CD and boot from it. You may need to adjust your BIOS options first.

If your machine can boot from USB, you can write install73.img or miniroot73.img to a USB stick and boot from it.

If you can’t boot from a CD, floppy disk, or USB, you can install across the network using PXE as described in the included INSTALL.amd64 document.

If you are planning to dual boot OpenBSD with another OS, you will need to read INSTALL.amd64.

OpenBSD/arm64:

Write install73.img or miniroot73.img to a disk and boot from it after connecting to the serial console. Refer to INSTALL.arm64 for more details.

OpenBSD/armv7:

Write a system specific miniroot to an SD card and boot from it after connecting to the serial console. Refer to INSTALL.armv7 for more details.

OpenBSD/hppa:

Boot over the network by following the instructions in INSTALL.hppa or the hppa platform page.

OpenBSD/i386:

If your machine can boot from CD, you can write install73.iso or cd73.iso to a CD and boot from it. You may need to adjust your BIOS options first.

If your machine can boot from USB, you can write install73.img or miniroot73.img to a USB stick and boot from it.

If you can’t boot from a CD, floppy disk, or USB, you can install across the network using PXE as described in the included INSTALL.i386 document.

If you are planning on dual booting OpenBSD with another OS, you will need to read INSTALL.i386.

OpenBSD/landisk:

Write miniroot73.img to the start of the CF or disk, and boot normally.

OpenBSD/loongson:

Write miniroot73.img to a USB stick and boot bsd.rd from it or boot bsd.rd via tftp. Refer to the instructions in INSTALL.loongson for more details.

OpenBSD/luna88k:

Copy ‘boot’ and ‘bsd.rd’ to a Mach or UniOS partition, and boot the bootloader from the PROM, and then bsd.rd from the bootloader. Refer to the instructions in INSTALL.luna88k for more details.

OpenBSD/macppc:

Burn the image from a mirror site to a CDROM, and power on your machine while holding down the C key until the display turns on and shows OpenBSD/macppc boot.

Alternatively, at the Open Firmware prompt, enter boot cd:,ofwboot /7.3/macppc/bsd.rd

OpenBSD/octeon:

After connecting a serial port, boot bsd.rd over the network via DHCP/tftp. Refer to the instructions in INSTALL.octeon for more details.

OpenBSD/powerpc64:

To install, write install73.img or miniroot73.img to a USB stick, plug it into the machine and choose the OpenBSD install menu item in Petitboot. Refer to the instructions in INSTALL.powerpc64 for more details.

OpenBSD/riscv64:

To install, write install73.img or miniroot73.img to a USB stick, and boot with that drive plugged in. Make sure you also have the microSD card plugged in that shipped with the HiFive Unmatched board. Refer to the instructions in INSTALL.riscv64 for more details.

OpenBSD/sparc64:

Burn the image from a mirror site to a CDROM, boot from it, and type boot cdrom.

If this doesn’t work, or if you don’t have a CDROM drive, you can write floppy73.img or floppyB73.img (depending on your machine) to a floppy and boot it with boot floppy. Refer to INSTALL.sparc64 for details.

Make sure you use a properly formatted floppy with NO BAD BLOCKS or your install will most likely fail.

You can also write miniroot73.img to the swap partition on the disk and boot with boot disk:b.

If nothing works, you can boot over the network as described in INSTALL.sparc64.


How to upgrade

If you already have an OpenBSD 7.2 system, and do not want to reinstall, upgrade instructions and advice can be found in the Upgrade Guide.


Notes about the source code

src.tar.gz contains a source archive starting at /usr/src. This file contains everything you need except for the kernel sources, which are in a separate archive. To extract:

mkdir -p /usr/src

cd /usr/src

tar xvfz /tmp/src.tar.gz

sys.tar.gz contains a source archive starting at /usr/src/sys. This file contains all the kernel sources you need to rebuild kernels. To extract:

mkdir -p /usr/src/sys

cd /usr/src

tar xvfz /tmp/sys.tar.gz

Both of these trees are a regular CVS checkout. Using these trees it is possible to get a head-start on using the anoncvs servers as described here. Using these files results in a much faster initial CVS update than you could expect from a fresh checkout of the full OpenBSD source tree.


Ports Tree

A ports tree archive is also provided. To extract:

cd /usr

tar xvfz /tmp/ports.tar.gz

Go read the ports page if you know nothing about ports at this point. This text is not a manual of how to use ports. Rather, it is a set of notes meant to kickstart the user on the OpenBSD ports system.

The ports/ directory represents a CVS checkout of our ports. As with our complete source tree, our ports tree is available via AnonCVS. So, in order to keep up to date with the -stable branch, you must make the ports/ tree available on a read-write medium and update the tree with a command like:

cd /usr/ports

cvs -d anoncvs@server.openbsd.org:/cvs update -Pd -rOPENBSD_7_3

[Of course, you must replace the server name here with a nearby anoncvs server.]

Note that most ports are available as packages on our mirrors. Updated ports for the 7.3 release will be made available if problems arise.

If you’re interested in seeing a port added, would like to help out, or just would like to know more, the mailing list ports@openbsd.org is a good place to know.