Serdar Yegulalp
Senior Writer

OpenBSD 6.0 tightens security by losing Linux compatibility

news
Jul 25, 20162 mins

The newest version of OpenBSD closes potential security loopholes -- such as its Linux compatibility layer

security open lock
Credit: Thinkstock

OpenBSD, one of the more prominent variants of the BSD family of Unix-like operating systems, will be released at the beginning of September, according to a note on the official OpenBSD website.

Often touted as an alternative to Linux. OpenBSD is known for the lack of proprietary influence on its software and has garnered a reputation for shipping with better default security than other OSes and for being highly vigilant (some might say strident) about the safety of its users. Many software router/firewall projects are based on OpenBSD because of its security-conscious development process.

Most significant among the latest security-related changes for OpenBSD is the removal of Linux emulation support. Prior versions of OpenBSD made it possible to run Linux applications via a compatibility layer, but the release notes for OpenBSD 6.0 indicate the Linux subsystem was removed as a “security improvement.”

OpenBSD has a collection of software available as add-on binary packages. They’re not screened for security in the same way that the OS itself is, but OpenBSD’s maintainers try to keep those third-party offerings as current as possible to avoid problems. OpenBSD also supplies recent versions of many popular applications — the Chromium and Firefox browsers, for instance — meaning there’s less need to use the Linux compatibility layer to get work done.

OpenBSD has also ditched the systrace system policy-enforcement tool for the sake of security. Previous versions of OpenBSD included it, but didn’t actually employ it for anything crucial. Systrace has been regarded for some time as insecure, so it’s been dropped from the base OpenBSD distribution.

The removal of the “usermount” option, which if enabled allowed nonprivileged users to mount filesystems, is yet another security enhancement. OpenBSD project lead Theo de Raadt stated that usermount “allows any non-pledged program to call the mount/umount system calls,” meaning “there is no way any user can be expected to keep their system safe/reliable with this feature.”

The previous release of OpenBSD — version 5.9, which emerged at the end of March — provided a number of major security improvements of its own. The sudo tool for running programs as a privileged user was replaced with doas, which has a simpler and potentially less problematic configuration mechanism. A change this radical would have been far more difficult to implement in the Linux world, but OpenBSD prides itself on making efforts to keep its codebase modern.

Serdar Yegulalp

Serdar Yegulalp is a senior writer at InfoWorld. A veteran technology journalist, Serdar has been writing about computers, operating systems, databases, programming, and other information technology topics for 30 years. Before joining InfoWorld in 2013, Serdar wrote for Windows Magazine, InformationWeek, Byte, and a slew of other publications. At InfoWorld, Serdar has covered software development, devops, containerization, machine learning, and artificial intelligence, winning several B2B journalism awards including a 2024 Neal Award and a 2025 Azbee Award for best instructional content and best how-to article, respectively. He currently focuses on software development tools and technologies and major programming languages including Python, Rust, Go, Zig, and Wasm. Tune into his weekly Dev with Serdar videos for programming tips and techniques and close looks at programming libraries and tools.

More from this author