I am pleased to announce the availability the fist ALPHA build of the 10.1-RELEASE Release cycle which is available on SourceForge for the amd64 and i386 architectures.
Changes and fix between 4.0-RELEASE and 10.1-ALPHA1 include:
- GDM as been replaced by PCDM
- Wifimgr is now fully replaced by Networkmgr
- A beta version of Update Station is now in GhostBSD whish update FreeBSD base system and software
- The installer partition editor got a lot of improment
- The installer use the latest pc-sysinstall from PCBSD GitHup
- GhostBSD is now following the same release number then FreeBSD and PCBSD
Where to download:
The image checksums, ISO images and USB images are available here:
Please be aware that this release provides beta tester and developers with a system to test out new features for the upcoming release. This release may contain buggy code and features, so we encourage you to run it only on non-critical systems.
If you notice problems please make sure to read http://wiki.ghostbsd.org/index.php?title=Becoming_a_Beta_Tester before reporting them through testing GhostBSD mailing list or the appropriate Forums. We encourage you to use our new issue system build with MantisBT http://issues.ghostbsd.org/main_page.php.
Note: Developers can't fix problems that we are not aware and can't reproduce; if you report a problem give us a detailed reports that we can reproduce the problem.
Thank you for using GhostBSD and have a lot of fun beta testing GhostBSD!
Well, it's been a while since we did a post on development news, and we do have a few exciting things News. First and foremost the next release of GhostBSD will jump to 10.1 instead of 4.5 this will help user to know on which FreeBSD version GhostBSD is build from.
I make some improvement and fixed problem with installer disk partition editor focusing on auto/create/delete partition system.
GhostBSD 10.1 will include a beta update manager call Update Station that is for the moment updating the FreeBSD base system and Packages.
Networkmgr is now ready to use without Wifimgr.
GhostBSD 10.1 will be ship with PCDM instead of GDM.
GhostBSD 10.1 APHA1 is plan to be release this week and I invite you to help to test the development release.
After we had released GhostBSD 4.0 people add trouble with upgrading software. Today I have discover that FreeBSD had a new_xorg software repository that is containing the same configuration than GhostBSD for Xorg.
If you planing to upgrade software on GhostBSD you will need to change the repository URL in FreeBSD.conf.
This is a three step:
- First open a terminal and type sudoee /etc/pkg/FreeBSD.conf
- Second replace
- Third press Esc, press a and press a again to save.
This will fix all upgrade problem no need pkg look anymore.
The GhostBSD Team is pleased to announce the availability of GhostBSD 4.0 Karine. This is the first release of the 4.* branch, which is base on FreeBSD 10 and introduces some new features.
Some of the highlights:
- GCC is no longer installed by default, clang is the default compiler.
- make(1) has been replaced with bmake(1), obtained from the NetBSD Project.
- pkg(7) is now the default package management utility.
- pkg_add(1), pkg_delete(1), bxpkg and related tools have been removed.
- Networkmgr is the default network manager.
- Mate is the default Desktop.
- 3 workstation to chose
GhostBSD 4.0-RELEASE is now available for the amd64 and i386 architectures, it GhostBSD 4.0 can be installed from bootable ISO images or from a USB memory stick. The required files can be downloaded via SourceForge or TorrentFTP as described in the section below.
MD5 and SHA256 hashes for the release ISOs and memory stick images are included the bottom of this message and in Download page.
The purpose of the images provided as part of the release are as follows:
iso: This should be all you need if you can burn and use DVD-sized media.
img: This can be written to an USB memory stick (flash drive) and used to do an install on machines capable of booting off USB drives.
Assuming the USB drive appears as /dev/da0 on your machine something like this should work:
dd if=GhostBSD4.0-RELEASE-amd64.img of=/dev/da0 bs=1m conv=sync
Be careful to make sure you get the target (of=) correct.
Were to download
amd64(x86-64, x64) http://sourceforge.net/projects/ghostbsdproject/files/release/amd64/4.0/
GhostBSD CD-ROM, DVD or USB memory sticks will also be available for purchase from several vendors. One of the vendors that will be offering GhostBSD products is:
You can find help information at http://ghostbsd.org/help.
Due to some bug with BASH, it is recommended that all users update via the command-line using the following steps:sudo pkg update –f
sudo pkg upgrade pkg
sudo pkg update –f
sudo pkg upgrade bash
Updating software using "pkg upgrade" alone will corrupt xorg and might corrupt GDM too. The solution is to use update the software that you want to update with "pkg upgrade the-software-to-update" , you can see the list of update by doing "pkg upgrade -n", "pkg install" automatically update software dependency when installint new software. Be sure to not upgrade xorg-server, xorg-drivers, and any xf86 with pkg use "portupgrade" instead
Mate 1.8 is available, users can update via the command-line using the following steps:sudo pkg update –f sudo pkg upgrade mate
Many people donated money or time to test the release version of GhostBSD 4.0, we would like to say thanks to all of you. Also we would like to say thanks to our sponsors and partners that make it possible as well.
If you notice problems we encourage you to use our new issue system build with MantisBT http://issues.ghostbsd.org/main_page.php.
MD5 (GhostBSD4.0-RELEASE-i386.iso) = 3e99cc3308cdff6f0779b1c5a4af0a43
MD5 (GhostBSD4.0-RELEASE-i386.img) = 50f31ff9302ae650a94ba54a56d0ccb2
MD5 (GhostBSD4.0-RELEASE-amd64.iso) = 883eda3d622e6d8e8c763546708d7070
MD5 (GhostBSD4.0-RELEASE-amd64.img) = 8ea4e4dd1ddb29e47e7bb35483bda936
SHA256 (GhostBSD4.0-RELEASE-i386.iso) = 421af9b7088b64a9e7037d946c59b16f1b324ee68b24d20fb10f5e137c78d6c8
SHA256 (GhostBSD4.0-RELEASE-i386.img) = 18450f2b06c1ba3bd44fe3c17128f168c6ea5985d35a6d6023f9bad2f03bc7ae
SHA256 (GhostBSD4.0-RELEASE-amd64.iso) = ef99e0af4be70147b4cb4700d07a7dced19e12f02db3ef1e19fa3f1c5d25a6ad
SHA256 (GhostBSD4.0-RELEASE-amd64.img) = adcb50f217ec4a2e7d047c054c1db05217b306b7a5baa76cfd02fcd1dba07b6b
Love GhostBSD? Support this and future releases with a donation to GhostBSD!
As many of you are probably aware, there is a serious security issue that is currently all over the web regarding the GNU bash shell. We are well aware of the issue, a fix is already in place to plug this security hole, and packages with this fix are currently building. Nothing written by the GhostBSD project uses bash and bash is not built-in to the FreeBSD operating system itself (it is an optional port/package), so the level of severity of this bug is lower on FreeBSD than on other operating systems.
We recommend you to update bash with sudo pkg install -f bash command line.
According to the FreeBSD mailing list: Bryan Drewery has already sent a notice that the port is fixed in FreeBSD. However, since he also added some good recommendations in the email for BASH users, we decided to copy that email here for anyone else that is interested.
From: Bryan Drewery FreeBSD mailing list
The port is fixed with all known public exploits. The package is
However bash still allows the crazy exporting of functions and may still
have other parser bugs. I would recommend for the immediate future not
using bash for forced ssh commands as well as these guidelines:
1. Do not ever link /bin/sh to bash. This is why it is such a big
problem on Linux, as system(3) will run bash by default from CGI.
2. Web/CGI users should have shell of /sbin/nologin.
3. Don’t write CGI in shell script / Stop using CGI :)
4. httpd/CGId should never run as root, nor “apache”. Sandbox each
application into its own user.
5. Custom restrictive shells, like scponly, should not be written in bash.
6. SSH authorized_keys/sshd_config forced commands should also not be
written in bash.
For more information the bug itself you can visit arstechnica and read the article by clicking the link below.