November 1, 2014.

We are pleased to announce the official release of OpenBSD 5.6.
This is our 36th release on CD-ROM (and 37th via FTP/HTTP).  We remain
proud of OpenBSD's record of more than ten years with only two remote
holes in the default install.

As in our previous releases, 5.6 provides significant improvements,
including new features, in nearly all areas of the system:

 - LibreSSL:
    o This release forks OpenSSL into LibreSSL, a version of the
      TLS/crypto stack with goals of modernizing the codebase, improving
      security, and applying best practice development processes.
    o No support for legacy MacOS, Netware, OS/2, VMS and Windows
      platforms, as well as antique compilers.
    o Removal of the IBM 4758, Broadcom ubsec, Sureware, Nuron, GOST,
      GMP, CSwift, CHIL, CAPI, Atalla and AEP engines, either because
      the hardware is irrelevant, or because they require external
      non-free libraries to work.
    o No support for FIPS-140 compliance.
    o No EBCDIC support.
    o No support for big-endian i386 and amd64 platforms.
    o Use standard routines from the C library (malloc, strdup,
      snprintf...) instead of rolling our own, sometimes badly.
    o Remove the old OpenSSL PRNG, and rely upon arc4random_buf from
      libc for all the entropy needs.
    o Remove the MD2 and SEED algorithms.
    o Remove J-PAKE, PSK and SRP (mis)features.
    o Aggressive cleaning of BN memory when no longer used.
    o No support for Kerberos.
    o No support for SSLv2.
    o No support for the questionable DTLS heartbeat extension.
    o No support for TLS compression.
    o No support for US-Export SSL ciphers.
    o Do not use the current time as a random seed in libssl.
    o Support for ChaCha and Poly1305 algorithm.
    o Support for Brainpool and ANSSI elliptic curves.
    o Support for AES-GCM and ChaCha20-Poly1305 AEAD modes.

 - Improved hardware support, including:
    o SCSI Multipathing support via mpath(4) and associated path drivers
      on several architectures.
    o New qlw(4) driver for QLogic ISP SCSI HBAs.
    o New qla(4) driver for QLogic ISP2100/2200/2300 Fibre Channel HBAs.
    o New upd(4) sensor driver for USB Power Devices (UPS).
    o New brswphy(4) driver for Broadcom BCM53xx 10/100/1000TX Ethernet
      PHYs.
    o New uscom(4) driver for simple USB serial adapters.
    o New axen(4) driver for ASIX Electronics AX88179 10/100/Gigabit USB
      Ethernet devices.
    o The inteldrm(4) and radeondrm(4) drivers have improved
      suspend/resume support.
    o The userland interface for the agp(4) driver has been removed.
    o The rtsx(4) driver now supports card readers based on the RTS5227
      and RTL8402 chipsets.
    o The firmware for the run(4) driver has been updated to version 0.33.
    o The run(4) driver now supports devices based on the RT3900E
      chipset.
    o The zyd(4) driver, which was broken for some time, has been fixed.
    o The bwi(4) driver now works in systems with more than 1GB of RAM.
    o The re(4) driver now supports devices based on the RTL8168EP/8111EP,
      RTL8168G/8111G, and RTL8168GU/8111GU chipsets.

 - Generic network stack improvements:
    o divert(4) now supports checksum offload.
    o IPv6 is now turned off on new interfaces by default. Assigning an
      IPv6 address will enable IPv6 on an interface.
    o Support for RFC4620 IPv6 Node Information Queries has been removed.
    o The kernel no longer supports the SO_DONTROUTE socket option.
    o The getaddrinfo(3) function now supports the AI_ADDRCONFIG flag
      defined in RFC 3493.
    o Include router alert option (RAO) in IGMP packets, as required by
      RFC2236.
    o ALTQ has been removed.
    o The hash table for Protocol Control Block (PCB) of TCP and UDP now
      resize automatically on load.

 - Installer improvements:
    o Remove ftp and tape as install methods.
    o Preserve the disklabel (and next 6 blocks) when installing boot
      block on 4k-sector disk drives.
    o Change the "Server?" question to "HTTP Server?" to allow unambiguous
      autoinstall(8) handling.
    o Allow autoinstall(8) to fetch and install sets from multiple
      locations.
    o Many sample configuration files have moved from /etc to
      /etc/examples.

 - Routing daemons and other userland network improvements:
    o When used with the -v flag, tcpdump(8) now shows the actual bad
      checksum within the IP/protocol header itself and what the good
      checksum should be.
    o ftp(1) now allows its User-Agent to be changed via the -U
      command-line option.
    o The -r option of ping(8) and traceroute(8) has been removed.
    o ifconfig(8) can now explicitly assign an IPv6 link-local address
      and turn IPv6 autoconf on or off.
    o ifconfig(8) has been made smarter about parsing WEP keys on the
      command line.
    o ifconfig(8) scan now shows the encryption type of wireless networks
      (WEP, WPA, WPA2, 802.1x).
    o MS-CHAPv1 (RFC2433) support has been removed from pppd(8).
    o traceroute6(8) has been merged into traceroute(8).
    o The asr API for asynchronous address resolution and nameserver
      querying is now public.
    o pflow(4)'s pflowproto 9 has been removed.
    o The userland ppp(8) daemon and its associated PPPoE helper,
      pppoe(8), have been removed.
    o snmpd(8), snmpctl(8), and relayd(8) now communicate via the AgentX
      protocol.
    o relayd(8) has a new filtering subsystem, where the new configuration
      language uses last-matching pf-like rules.
    o The new relayd(8) filter rules now support URL-based relaying.
    o relayd(8) now uses privilege separation for private keys. This acts
      as an additional mitigation to prevent leakage of the private keys
      from the processes doing SSL/TLS.
    o New httpd(8) HTTP server with FastCGI and SSL support.

 - OpenSMTPD 5.4.3 (includes changes to 5.4.2):
    o New/changed features:
      - OpenSMTPD replaces Sendmail as the default MTA.
      - Queue process now runs under a different user for better
        isolation.
      - Merged MDA, MTA and SMTP processes into a single unprivileged
        process.
      - Killed the MFA process, it is no longer needed.
      - Added support for email addresses lookups in the table_db
        backend.
      - Added RSA privilege separation support to prevent possible
        private key leakage.
    o The following significant bugs have been fixed in this release:
      - Minor bug fixes in some corner cases of the routing logic.
      - The enqueuer no longer adds its own User-Agent.
      - Disabled profiling code, allowing all processes to rest rather
        than waking up every second.
      - Reworked the purge task to avoid disk-hits unless necessary...
        only once at startup.
      - Fix various header parsing bugs in the local enqueuer.
      - Assorted minor fixes and code cleanups.

 - Security improvements:
    o Changed the heuristics of the stack protector to also protect
      functions with local array definitions and references to local
      frame addresses. This matches the -fstack-protector-strong option
      of upstream GCC.
    o Position-independent executables (PIE) are now used by default on
      powerpc.
    o Removed Kerberos.
    o Default bcrypt hash type is now $2b$.
    o Remove md5crypt support.
    o Improved easier to use bcrypt API is now available.
    o Increase randomness of random mmap mappings.
    o Added getentropy(2).
    o Added timingsafe_memcmp(3).
    o Removed the MD4 hash algorithm and functions from cksum(1), S/Key,
      and libc.
    o gets(3) has been removed.
    o Added reallocarray(3), which allows multiple sized objects to be
      allocated without the cost of clearing memory while avoiding
      possible integer overflows.
    o Extended fread(3) and fwrite(3) to check for integer overflows.

 - Assorted improvements:
    o locate databases for both base and xenocara, as
      /usr/lib/locate/src.db and /usr/X11R6/lib/locate/xorg.db.
    o Much faster package updates, due to package contents reordering
      that precludes re-downloading unchanged files.
    o Fix many programs that failed when accessing disks having sector
      sizes other than 512 bytes, including badsect(8), df(1), dump(8),
      dumpfs(8), fsck_ext2fs(8), fsck_ffs(8), fsdb(8), growfs(8),
      ncheck_ffs(8), quotacheck(8), tunefs(8).
    o Constrain MSDOS timestamps to 1/1/1980 through 12/31/2107. 64-bit
      time_t values outside that range are stored as 1/1/1980.
    o bs(6) now prints a battleship splash screen.
    o rcp, rsh, rshd, rwho, rwhod, ruptime, asa, bdes, fpr, mkstr, page,
      spray, xstr, oldrdist, fsplit, uyap, and bluetooth have been
      removed.
    o rmail(8) and uucpd(8) have been removed from the base system and
      added to the ports tree.
    o Lynx has been removed from the base system and added to the ports
      tree.
    o TCP Wrappers have been removed.
    o Fix atexit(3) recursive handlers.
    o Enhance disklabel(8) to recover filesystem mountpoint information
      when reading saved ascii labels.
    o Properly handle msgbuf_write(3) EOF conditions, including uses in
      tmux(1), dvmrpd(8), ldapd(8), ldpd(8), ospf6d(8), ospfd(8),
      relayd(8), ripd(8), smtpd(8), ypldap(8).
    o Constrain fdisk(8) '-l' to disk sizes of 64 blocks or more.
    o Sync fdisk(8) built-in MBR with current /usr/mdec/mbr.
    o Quiet dhclient(8) '-q' even more.
    o Log less redundant dhclient(8) info.
    o New leases, lease renewals, cable state changes more obvious to
      applications monitoring dhclient(8) files.
    o Preserve chronological order of leases in the dhclient.leases(5)
      leases files.
    o Use 'lease {}' statements in dhclient.conf(5), allowing interfaces
      to get an address when no dynamic lease is available.
    o Improve dhclient(8) parsing and printing of classess static routes.
    o Eliminate unnecessary rewrites of resolv.conf(5) by dhclient(8).
    o Added sendsyslog(2): syslog(3) now works even when out of file
      descriptors or in a chroot.
    o Added errc(3), verrc(3), warnc(3) and vwarnc(3).
    o Faster hibernate/unhibernate performance on amd64 and i386
      platforms.
    o Support hibernating to softraid(4) crypto volumes.
    o Improved performance of seekdir(3) to start of current buffer.
    o Added <endian.h> per the revision of the POSIX spec in progress.
    o Apache has been removed.
    o Read support for ext4 filesystems.
    o Reworked mplocks as ticket locks instead of spinlocks on amd64,
      i386, and sparc64. This provides fairer access to the kernel lock
      between logical CPUs, especially in multi socket systems.

 - OpenSSH 6.7:
    o Potentially-incompatible changes:
      - sshd(8): The default set of ciphers and MACs has been altered to
        remove unsafe algorithms. In particular, CBC ciphers and
        arcfour* are disabled by default.
      - sshd(8): Support for tcpwrappers/libwrap has been removed.
      - OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
        using the "curve25519-sha...@libssh.org" KEX exchange method to
        fail when connecting with something that implements the
        specification correctly. OpenSSH 6.7 disables this KEX method
        when speaking to one of the affected versions.
    o New/changed features:
      - Major internal refactoring to begin to make part of OpenSSH
        usable as a library. So far the wire parsing, key handling and
        KRL code has been refactored. Please note that we do not
        consider the API stable yet, nor do we offer the library in
        separable form.
      - ssh(1), sshd(8): Add support for Unix domain socket forwarding.
        A remote TCP port may be forwarded to a local Unix domain socket
        and vice versa or both ends may be a Unix domain socket.
      - ssh(1), ssh-keygen(1): Add support for SSHFP DNS records for
        Ed25519 key types.
      - sftp(1): Allow resumption of interrupted uploads.
      - ssh(1): When rekeying, skip file/DNS lookups of the hostkey if
        it is the same as the one sent during initial key exchange.
        (bz#2154)
      - sshd(8): Allow explicit ::1 and 127.0.0.1 forwarding bind
        addresses when GatewayPorts=no; allows client to choose address
        family. (bz#2222)
      - sshd(8): Add a sshd_config(5) PermitUserRC option to control
        whether ~/.ssh/rc is executed, mirroring the no-user-rc
        authorized_keys option. (bz#2160)
      - ssh(1): Add a %C escape sequence for LocalCommand and ControlPath
        that expands to a unique identifer based on a hash of the tuple
        of (local host, remote user, hostname, port). Helps avoid
        exceeding miserly pathname limits for Unix domain sockets in
        multiplexing control paths. (bz#2220)
      - sshd(8): Make the "Too many authentication failures" message
        include the user, source address, port and protocol in a format
        similar to the authentication success/failure messages. (bz#2199)
      - Added unit and fuzz tests for refactored code.
    o The following significant bugs have been fixed in this release:
      - sshd(8): Fix remote forwarding with same listen port but
        different listen address.
      - ssh(1): Fix inverted test that caused PKCS#11 keys that were
        explicitly listed in ssh_config(5) or on the commandline not to
        be preferred.
      - ssh-keygen(1): Fix bug in KRL generation: multiple consecutive
        revoked certificate serial number ranges could be serialised to
        an invalid format. Readers of a broken KRL caused by this bug
        will fail closed, so no should-have-been-revoked key will be
        accepted.
      - ssh(1): Reflect stdio-forward ("ssh -W host:port ...") failures
        in exit status. Previously we were always returning 0. (bz#2255)
      - ssh(1), ssh-keygen(1): Make Ed25519 keys' title fit properly in
        the randomart border. (bz#2247)
      - ssh-agent(1): Only cleanup agent socket in the main agent process
        and not in any subprocesses it may have started (e.g. forked
        askpass). Fixes agent sockets being zapped when askpass processes
        fatal(). (bz#2236)
      - ssh-add(1): Make stdout line-buffered; saves partial output
        getting lost when ssh-add(1) fatal()s part-way through (e.g. when
        listing keys from an agent that supports key types that
        ssh-add(1) doesn't). (bz#2234)
      - ssh-keygen(1): When hashing or removing hosts, don't choke on
        "@revoked" markers and don't remove "@cert-authority" markers.
        (bz#2241)
      - ssh(1): Don't fatal when hostname canonicalisation fails and a
        ProxyCommand is in use; continue and allow the ProxyCommand to
        connect anyway (e.g. to a host with a name outside the DNS behind
        a bastion).
      - scp(1): When copying local->remote fails during read, don't send
        uninitialised heap to the remote end.
      - sftp(1): Fix fatal "el_insertstr failed" errors when
        tab-completing filenames with a single quote char somewhere in
        the string. (bz#2238)
      - ssh-keyscan(1): Scan for Ed25519 keys by default.
      - ssh(1): When using VerifyHostKeyDNS with a DNSSEC resolver,
        down-convert any certificate keys to plain keys and attempt SSHFP
        resolution. Prevents a server from skipping SSHFP lookup and
        forcing a new-hostkey dialog by offering only certificate keys.
      - sshd(8): Avoid crash at exit via NULL pointer reference.
        (bz#2225)
      - Fix some strict-alignment errors.

 - mandoc 1.13.0:
    o New implementation of apropos(1), whatis(1), and makewhatis(8)
      based on SQLite3 databases.
    o Substantial improvements of mandoc(1) error and warning messages.
    o Almost complete implementation of roff(7) numerical expressions.
    o About a dozen minor new features and numerous bug fixes.

 - Ports and packages:
    o Over 8,800 ports.

 - Many pre-built packages for each architecture:
    o i386:   8588                    o sparc64:  7965
    o alpha:  6278                    o sh:       2626
    o amd64:  8588                    o powerpc:  8049
    o sparc:  3394                    o arm:      5633
    o hppa:   6143                    o vax:      1995
    o mips64: 4686                    o mips64el: 6697
    o m88k:   2475

 - Some highlights:
    o GNOME 3.12.2                    o KDE 3.5.10 and 4.13.3
    o Xfce 4.10                       o MySQL 5.1.73
    o PostgreSQL 9.3.4                o Postfix 2.11.1
    o OpenLDAP 2.3.43 and 2.4.39      o GHC 7.6.3
    o Mozilla Firefox 31.0            o LibreOffice 4.1.6.2
    o Mozilla Thunderbird 31.0        o Vim 7.4.135
    o Emacs 21.4 and 24.3             o Python 2.7.8, 3.3.5 and 3.4.1
    o PHP 5.3.28, 5.4.30 and 5.5.14   o Mono 3.4.0
    o Ruby 1.8.7.374, 1.9.3.545, 2.0.0.481 and 2.1.2
    o Tcl/Tk 8.5.15 and 8.6.1         o Groff 1.22.2
    o JDK 1.6.0.32 and 1.7.0.55       o GCC 4.6.4, 4.8.3 and 4.9.0
    o Chromium 36.0.1985.125          o Go 1.3
    o LLVM/Clang 3.5 (20140228)       o Node.js 0.10.28

 - As usual, steady improvements in manual pages and other documentation.

 - The system includes the following major components from outside suppliers:
    o Xenocara (based on X.Org 7.7 with xserver 1.15.2 + patches,
      freetype 2.5.3, fontconfig 2.11.1, Mesa 10.2.3, xterm 309,
      xkeyboard-config 2.11 and more)
    o Gcc 4.2.1 (+ patches) and 3.3.6 (+ patches)
    o Perl 5.18.2 (+ patches)
    o Nginx 1.6.0 (+ patches)
    o SQLite 3.8.4.3 (+ patches)
    o Sendmail 8.14.8, with libmilter
    o Bind 9.4.2-P2 (+ patches)
    o NSD 4.0.3
    o Sudo 1.7.2p8
    o Ncurses 5.7
    o Binutils 2.15 (+ patches)
    o Gdb 6.3 (+ patches)
    o Less 458 (+ patches)
    o Awk Aug 10, 2011 version

If you'd like to see a list of what has changed between OpenBSD 5.5
and 5.6, look at

        http://www.OpenBSD.org/plus56.html

Even though the list is a summary of the most important changes
made to OpenBSD, it still is a very very long list.

------------------------------------------------------------------------
- SECURITY AND ERRATA --------------------------------------------------

We provide patches for known security threats and other important
issues discovered after each CD release.  As usual, between the
creation of the OpenBSD 5.6 HTTP/CD-ROM binaries and the actual 5.6
release date, our team found and fixed some new reliability problems
(note: most are minor and in subsystems that are not enabled by
default).  Our continued research into security means we will find
new security problems -- and we always provide patches as soon as
possible.  Therefore, we advise regular visits to

        http://www.OpenBSD.org/security.html
and
        http://www.OpenBSD.org/errata.html

------------------------------------------------------------------------
- MAILING LISTS --------------------------------------------------------

Mailing lists are an important means of communication among users and
developers of OpenBSD.  For information on OpenBSD mailing lists, please
see:

        http://www.OpenBSD.org/mail.html

------------------------------------------------------------------------
- CD-ROM SALES ---------------------------------------------------------

OpenBSD 5.6 is also available on CD-ROM.  The 3-CD set costs 44 EUR and
is available via web order worldwide.

The CD set includes a colourful booklet which carefully explains the
installation of OpenBSD.  A new set of cute little stickers is also
included (sorry, but our HTTP mirror sites do not support STP, the Sticker
Transfer Protocol).  As an added bonus, the second CD contains an audio
track, a song entitled "Ride of the Valkyries".  MP3 and OGG versions of
the audio track can be found on the first CD.

Lyrics (and an explanation) for the songs may be found at:

    http://www.OpenBSD.org/lyrics.html#56

Profits from CD sales are the primary income source for the OpenBSD
project -- in essence selling these CD-ROM units ensures that OpenBSD
will continue to make another release six months from now.

The OpenBSD 5.6 CD-ROMs are bootable on the following platforms:

  o i386
  o amd64
  o macppc
  o sparc64

(Other platforms must boot from network, floppy, or other method).

For more information on ordering CD-ROMs, see:

        http://www.OpenBSD.org/orders.html

All of our developers strongly urge you to buy a CD-ROM and support
our future efforts.  Additionally, donations to the project are
highly appreciated, as described in more detail at:

        http://www.OpenBSD.org/donations.html

------------------------------------------------------------------------
- OPENBSD FOUNDATION ---------------------------------------------------

For those unable to make their contributions as straightforward gifts,
the OpenBSD Foundation (http://www.openbsdfoundation.org) is a Canadian
not-for-profit corporation that can accept larger contributions and
issue receipts.  In some situations, their receipt may qualify as a
business expense write-off, so this is certainly a consideration for
some organizations or businesses.  There may also be exposure benefits
since the Foundation may be interested in participating in press releases.
In turn, the Foundation then uses these contributions to assist OpenBSD's
infrastructure needs.  Contact the foundation directors at
direct...@openbsdfoundation.org for more information.

------------------------------------------------------------------------
- T-SHIRT SALES --------------------------------------------------------

The OpenBSD distribution companies also sell T-shirts and polo shirts,
with new and old designs, available from our web ordering system.

------------------------------------------------------------------------
- HTTP INSTALLS --------------------------------------------------------

If you choose not to buy an OpenBSD CD-ROM, OpenBSD can be easily
installed via HTTP downloads.  Typically you need a single
small piece of boot media (e.g., a USB flash drive) and then the rest
of the files can be installed from a number of locations, including
directly off the Internet.  Follow this simple set of instructions
to ensure that you find all of the documentation you will need
while performing an install via HTTP.  With the CD-ROMs,
the necessary documentation is easier to find.

1) Read either of the following two files for a list of HTTP
   mirrors which provide OpenBSD, then choose one near you:

        http://www.OpenBSD.org/ftp.html
        http://ftp.openbsd.org/pub/OpenBSD/ftplist

   As of November 1, 2014, the following HTTP mirror sites have the 5.6 release:

        http://ftp.eu.openbsd.org/pub/OpenBSD/5.6/      Stockholm, Sweden
        http://ftp.bytemine.net/pub/OpenBSD/5.6/        Oldenburg, Germany
        http://ftp.ch.openbsd.org/pub/OpenBSD/5.6/      Zurich, Switzerland
        http://ftp.fr.openbsd.org/pub/OpenBSD/5.6/      Paris, France
        http://ftp5.eu.openbsd.org/pub/OpenBSD/5.6/     Vienna, Austria
        http://mirror.aarnet.edu.au/pub/OpenBSD/5.6/    Brisbane, Australia
        http://ftp.usa.openbsd.org/pub/OpenBSD/5.6/     CO, USA
        http://ftp5.usa.openbsd.org/pub/OpenBSD/5.6/    CA, USA
        http://mirror.esc7.net/pub/OpenBSD/5.6/         TX, USA

        The release is also available at the master site:

        http://ftp.openbsd.org/pub/OpenBSD/5.6/          Alberta, Canada

        However it is strongly suggested you use a mirror.

   Other mirror sites may take a day or two to update.

2) Connect to that HTTP mirror site and go into the directory
   pub/OpenBSD/5.6/ which contains these files and directories.
   This is a list of what you will see:

        ANNOUNCEMENT     alpha/           luna88k/         sparc/
        Changelogs/      amd64/           macppc/          sparc64/
        HARDWARE         armv7/           octeon/          src.tar.gz
        PACKAGES         aviion/          packages/        sys.tar.gz
        PORTS            hppa/            ports.tar.gz     tools/
        README           i386/            root.mail        vax/
        SHA256           landisk/         sgi/             xenocara.tar.gz
        SHA256.sig       loongson/        socppc/          zaurus/

   It is quite likely that you will want at LEAST the following
   files which apply to all the architectures OpenBSD supports.

        README          - generic README
        HARDWARE        - list of hardware we support
        PORTS           - description of our ports tree
        PACKAGES        - description of pre-compiled packages
        root.mail       - a copy of root's mail at initial login.
                          (This is really worthwhile reading).

3) Read the README file.  It is short, and a quick read will make
   sure you understand what else you need to fetch.

4) Next, go into the directory that applies to your architecture,
   for example, amd64.  This is a list of what you will see:

        INSTALL.amd64   cd56.iso        index.txt       xetc56.tgz
        SHA256          cdboot*         install56.fs    xfont56.tgz
        SHA256.sig      cdbr*           install56.iso   xserv56.tgz
        base56.tgz      comp56.tgz      man56.tgz       xshare56.tgz
        bsd*            etc56.tgz       miniroot56.fs
        bsd.mp*         floppy56.fs     pxeboot*
        bsd.rd*         game56.tgz      xbase56.tgz

   If you are new to OpenBSD, fetch _at least_ the file INSTALL.amd64
   and install56.iso.  The install56.iso file (roughly 250MB in size)
   is a one-step ISO-format install CD image which contains the various
   *.tgz files so you do not need to fetch them separately.

   If you prefer to use a USB flash drive, fetch install56.fs and
   follow the instructions in INSTALL.amd64.

5) If you are an expert, follow the instructions in the file called
   README; otherwise, use the more complete instructions in the
   file called INSTALL.amd64.  INSTALL.amd64 may tell you that you
   need to fetch other files.

6) Just in case, take a peek at:

        http://www.OpenBSD.org/errata.html

   This is the page where we talk about the mistakes we made while
   creating the 5.6 release, or the significant bugs we fixed
   post-release which we think our users should have fixes for.
   Patches and workarounds are clearly described there.

Note: If you end up needing to write a raw floppy using Windows,
      you can use "fdimage.exe" located in the pub/OpenBSD/5.6/tools
      directory to do so.

------------------------------------------------------------------------
- X.ORG FOR MOST ARCHITECTURES -----------------------------------------

X.Org has been integrated more closely into the system.  This release
contains X.Org 7.7.  Most of our architectures ship with X.Org, including
amd64, sparc, sparc64 and macppc.  During installation, you can install
X.Org quite easily.  Be sure to try out xdm(1) and see how we have
customized it for OpenBSD.

------------------------------------------------------------------------
- PORTS TREE -----------------------------------------------------------

The OpenBSD ports tree contains automated instructions for building
third party software.  The software has been verified to build and
run on the various OpenBSD architectures.  The 5.6 ports collection,
including many of the distribution files, is included on the 3-CD
set.  Please see the PORTS file for more information.

Note: some of the most popular ports, e.g., the nginx web server
and several X applications, come standard with OpenBSD.  Also, many
popular ports have been pre-compiled for those who do not desire
to build their own binaries (see BINARY PACKAGES, below).

------------------------------------------------------------------------
- BINARY PACKAGES WE PROVIDE -------------------------------------------

A large number of binary packages are provided.  Please see the PACKAGES
file (http://ftp.OpenBSD.org/pub/OpenBSD/5.6/PACKAGES) for more details.

------------------------------------------------------------------------
- SYSTEM SOURCE CODE ---------------------------------------------------

The CD-ROMs contain source code for all the subsystems explained
above, and the README (http://ftp.OpenBSD.org/pub/OpenBSD/5.6/README)
file explains how to deal with these source files.  For those who
are doing an HTTP install, the source code for all four subsystems
can be found in the pub/OpenBSD/5.6/ directory:

        xenocara.tar.gz     ports.tar.gz   src.tar.gz     sys.tar.gz

------------------------------------------------------------------------
- THANKS ---------------------------------------------------------------

Ports tree and package building by Jasper Lievisse Adriaanse,
Pierre-Emmanuel Andre, Landry Breuil, Stuart Henderson, Peter Hessler,
Nick Holland, Paul Irofti, Sebastian Reitenbach, Miod Vallat, and
Christian Weisgerber.  System builds by Jasper Lievisse Adriaanse,
Kenji Aoyama, Theo de Raadt, Nick Holland, and Miod Vallat.
X11 builds by Jasper Lievisse Adriaanse, Kenji Aoyama, Todd Fries,
Nick Holland, and Miod Vallat.  ISO-9660 filesystem layout by
Theo de Raadt.

We would like to thank all of the people who sent in bug reports, bug
fixes, donation cheques, and hardware that we use.  We would also like
to thank those who pre-ordered the 5.6 CD-ROM or bought our previous
CD-ROMs.  Those who did not support us financially have still helped
us with our goal of improving the quality of the software.

Our developers are:

    Aaron Bieber, Alexander Bluhm, Alexander Hall, Alexandr Shadchin,
    Alexandre Ratchov, Andrew Fresh, Anil Madhavapeddy,
    Anthony J. Bentley, Antoine Jacoutot, Austin Hook, Benoit Lecocq,
    Bob Beck, Brad Smith, Brandon Mercer, Brent Cook, Bret Lambert,
    Brett Mahar, Brian Callahan, Camiel Dobbelaar, Charles Longeau,
    Chris Cappuccio, Christian Weisgerber, Christopher Zimmermann,
    Claudio Jeker, Damien Miller, Daniel Dickman, Darren Tucker,
    David Coppa, David Gwynne, Doug Hogan, Edd Barrett, Eric Faurot,
    Federico G. Schwindt, Florian Obser, Gerhard Roth, Gilles Chehade,
    Giovanni Bechis, Gleydson Soares, Gonzalo L. Rodriguez,
    Henning Brauer, Ian Darwin, Igor Sobrado, Ingo Schwarze,
    Jakob Schlyter, James Turner, Jason McIntyre,
    Jasper Lievisse Adriaanse, Jeremie Courreges-Anglas, Jeremy Evans,
    Jim Razmus II, Joel Sing, Joerg Jung, Jonathan Armani,
    Jonathan Gray, Jonathan Matthew, Jordan Hargrave, Joshua Elsasser,
    Joshua Stein, Juan Francisco Cantero Hurtado, Kazuya Goda,
    Kenji Aoyama, Kenneth R Westerback, Kirill Bychkov, Kurt Miller,
    Landry Breuil, Lawrence Teo, Loganaden Velvindron, Luke Tymowski,
    Marc Espie, Marco Pfatschbacher, Mark Kettenis, Mark Lumsden,
    Markus Friedl, Martin Pelikan, Martin Pieuchot, Martin Reindl,
    Martynas Venckus, Masao Uebayashi, Mats O Jansson, Matthew Dempsky,
    Matthias Kilian, Matthieu Herrb, Mike Belopuhov, Mike Larkin,
    Miod Vallat, Naoya Kaneko, Nayden Markatchev, Nicholas Marriott,
    Nick Holland, Nigel Taylor, Okan Demirmen, Otto Moerbeek,
    Pascal Stumpf, Paul de Weerd, Paul Irofti, Peter Hessler,
    Philip Guenther, Pierre-Emmanuel Andre, Raphael Graf, Remi Pointel,
    Renato Westphal, Reyk Floeter, Robert Nagy, Robert Peichaer,
    Ryan Thomas McBride, Sasano Takayoshi, Sebastian Benoit,
    Sebastian Reitenbach, Simon Perreault, Stefan Fritsch,
    Stefan Sperling, Stephan Rickauer, Steven Mestdagh, Stuart Cassoff,
    Stuart Henderson, Sylvestre Gallon, Ted Unangst, Theo de Raadt,
    Tobias Stoeckmann, Tobias Ulmer, Todd C. Miller, Todd Fries,
    Vadim Zhukov, William Yodlowsky, Wouter Wijngaards,
    Yasuoka Masahiko, Yojiro Uo

Reply via email to