DistroWatch Weekly |
DistroWatch Weekly, Issue 616, 29 June 2015 |
Welcome to this year's 26th issue of DistroWatch Weekly!
One of the great things about open source software is the way developers can take existing code and tailor it to work in new ways or on different platforms. This week we look at customized projects and operating systems being adjusted to suit specific needs. We begin with a review of MidnightBSD, a fork of the FreeBSD project designed with the desktop in mind. We also follow up last week's review of Raspbian with quick look at what it is like to run FreeBSD on the Raspberry Pi computer. In our News section this week we explore utilities for customizing Fedora Workstation, talk about funding Debian developers are receiving to improve reproducible builds and talk about Linux's new file system encryption technology. We also share information about an upcoming openSUSE release with the code name "42" and report on Johnathan Riddell leaving the Kubuntu Community Council. Plus we share a list of torrents we are seeding this week and supply a list of the distributions released last week. In our Opinion Poll we ask whether our readers run 32-bit or 64-bit systems and why. We wish you all a fantastic week and happy reading!
Content:
|
Feature Story (by Jesse Smith) |
Running BSD on the desktop with MidnightBSD 0.6
FreeBSD is a fine operating system to run on servers and some people feel the characteristics which make FreeBSD suitable for servers (conservative updates, stability, performance) also make the operating system a good choice for desktop computers. Or, at least, FreeBSD could be a good desktop operating system with a few tweaks. That is the premise behind MidnightBSD, a desktop-oriented project that forked from FreeBSD. "MidnightBSD was forked from FreeBSD 6.1 beta. The system was forked to allow us to customize and integrate the environment including the ports and system configuration. We wish for the system to appeal to beginners as well as more experienced BSD users. Many operating systems are under active development; with MidnightBSD, we wish to focus on optimization and usability improvements for desktop users."
The most recent release of MidnightBSD, version 0.6, focuses primarily on fixing bugs and patching security flaws. The latest release also ships with a new version of the mport package manager utility. MidnightBSD's mport package manager is used to manipulate the operating system's third-party software, in much the same way FreeBSD's pkg utility manages third-party packages. MidnightBSD 0.6 is available in 32-bit and 64-bit x86 builds. The installation ISO we download is approximately 765MB in size. On the download page there is a link to live discs which would allow users to test the operating system's desktop environment, however the link to live media downloads is broken.
Booting from MidnightBSD's installation media brings up a text menu asking if we would like to launch the project's system installer or drop to a command line shell. Taking the install option walks us through a number of text screens where we are asked to type in information or make selections from menus. We are first asked if we would like to change our keyboard's layout and then we are asked to set a hostname for our computer. The next screen asks us to select which packages we wish to have installed. These packages include documentation, games, 32-bit compatibility libraries, mport and the operating system's source code. The following screen asks if we would like to manually partition our hard drive or if the installer should automatically partition it for us. I tried the automated partitioning option and found it offered a default layout with three GPT partitions (a GPT boot partition, a root partition formatted with UFS and swap space). We can change our partitions after the installer has made its suggestions before any alterations are made to our disk. The installer copies its files to our hard drive before asking some additional questions. We are asked to create a password for the root account, configure our network interface and select our time zone from a list of locations. The following screen asks us which background services the operating system should run - with the options including network time synchronization, a mouse daemon, powerd for power management and the OpenSSH secure shell service. We can then optionally create as many user accounts as we like. When we are done the installer asks us to reboot the computer.
The first time we boot into our new copy of MidnightBSD we are presented with a text console where we are asked two questions. The first prompt asks if we would like to submit our computer to a BSD statistics tracking website. The second prompt asks if we wish to enable a graphical user interface. I answered negative to the first question and affirmative to the second. MidnightBSD then downloaded several packages and, a few minutes later, presented me with a login prompt.
One of the first things I wanted to do was transition from a text console to a graphical user interface. Getting to a graphical desktop proved to be somewhat difficult as most of the X display server packages were not installed. (Which does make me wonder what MidnightBSD was installing after I requested a graphical interface be put into place.) I turned to the mport utility in order to download and install the X display server and a display manager.. MidnightBSD does not use its parent's pkg repositories or ports tree. Instead, MidnightBSD uses what appears to be a modified fork of the FreeBSD ports collection, compiled into binary packages. The mport package manager works in a similar manner to pkg or apt-get, allowing us to search for, install and upgrade software on our system. The mport repository appears to be fairly small, a quick estimate places its size at less than 5,000 packages compared with FreeBSD's 24,000 ports.
Using mport, I was able to locate and download Xorg packages. However, with the packages installed and the display server services enabled, I still was not able to launch a graphical interface. Since the MidnightBSD website has very little documentation, I ended up following the instructions provided by FreeBSD's Handbook to get the X display server running. At this point I was able to launch a graphical interface and get a few terminal windows open. Unfortunately, I still did not have a proper desktop, just a bare bones window manager, and closing a window would usually cause the entire graphical interface to crash, returning me to the text console. I performed searches of the mport software repository, looking for a desktop environment, but I was unable to find packages for KDE, GNOME, Xfce or LXDE.
At this point in my experiment, I decided to give up on getting a full featured desktop environment running and turned my attention to experimenting with the operating system's command line. I found MidnightBSD was fairly light on memory. The operating system used about 20MB of active memory and 75MB of wired memory. The operating system required about 1.5GB of disk space with the X display server installed. MidnightBSD ships with the standard collection of UNIX command line tools and two compilers (Clang and GCC). When working from the command line, MidnightBSD was stable and worked quickly. At least MidnightBSD worked well in a VirtualBox virtual machine, the operating system was unable to boot on my desktop computer.
Earlier I mentioned we can install and update third-party software using MidnightBSD's mport package manager. The mport program works quickly and well. However, so far as I could tell, mport is designed to work on third-party software only and does not appear to offer updates to the base operating system. This concerned me as the project's website contains many security notices, but I could not find any instructions for patching known vulnerabilities. MidnightBSD does not ship with a copy of FreeBSD's freebsd-update utility and the documentation on the project's website does not cover performing software upgrades. FreeBSD includes update instructions in their security advisories, but MidnightBSD's advisories do not appear to have any specific instructions for keeping the system up to date. I suspect that checking out new copies of the MidnightBSD source code may be required for keeping up to date with patches and we may need to build and install patches from the source code, but I cannot find confirmation of this on MidnightBSD's website. During my hunt for information on dealing with security updates I found the project's website has a number of broken links, preventing the user from accessing documentation, live discs and information on past releases.
Conclusions
I found using MidnightBSD strange. While the low level tools and general environment felt familiar to me as a FreeBSD user, there were frequently pieces of the experience missing. MidnightBSD has virtually none of FreeBSD's extensive documentation, which may not have been a problem when the project originally forked from FreeBSD, but now MidnightBSD has diverged enough that it really should have its own Handbook. MidnightBSD offers some of the same ports as its parent, but has fallen about 20,000 packages behind. Further, according to the MidnightBSD website, the project aims to provide a beginner friendly, desktop-oriented operating system, similar to FreeBSD. However, from my experiences this past week, it seems as though MidnightBSD lags behind GhostBSD, PC-BSD and even FreeBSD in providing a newcomer friendly platform. A few years ago tools like mport might have been quite welcome to FreeBSD users, but now pkg fills that role in the FreeBSD community. In short, I feel that MidnightBSD, while it began with promise and admirable goals, has fallen behind in technology, user experience and documentation.
* * * * *
Hardware used in this review
My physical test equipment for this review was a desktop HP Pavilon p6 Series with the following specifications:
- Processor: Dual-core 2.8GHz AMD A4-3420 APU
- Storage: 500GB Hitachi hard drive
- Memory: 6GB of RAM
- Networking: Realtek RTL8111 wired network card
- Display: AMD Radeon HD 6410D video card
|
Miscellaneous News (by Jesse Smith) |
Customizing Fedora, Debian gains sponsorship for reproducible builds, Linux's ext4 file system to get built in encryption, openSUSE unveils "42" and Johnathan Riddell leaves the Kubuntu Council
The Fedora distribution is an interesting platform that is
always shipping new software and integrating new technologies. While Fedora is a
fun testing ground for new software, the distribution is not the easiest to set
up and desktop users often need to perform extra configuration steps
post-installation. As the Open Content & Software Magazine reports, "Fedora ships with free software only, by default, which means that some of the common, popular stuff many people use will not be available by default. Proprietary solutions like Adobe Flash, MP3 codecs, Steam, Skype, and whole bunch of other programs will not be in the repos, and you will need to take some extra steps to get them. This little guide should make your life
easier in that regard." The article goes on to explore various utilities available that facilitate installing third-party software and customizing the Fedora distribution.
* * * * *
We have talked before about the Debian project's quest to
create reproducible
builds and how this can improve security and trust with regards to the
distribution's packages. The Debian project announced last week that the Core Infrastructure Initiative will sponsor two of its developers to continue their work on reproducible builds. "The Core Infrastructure Initiative announced today that they will support two Debian Developers, Holger Levsen and Jeremy Bobbio, with $200,000 to advance their Debian work in reproducible builds and to collaborate more closely with other distributions such as Fedora, Ubuntu, OpenWrt to benefit from this effort. The Core Infrastructure Initiative (CII) was established in 2014 to fortify the security of key open source projects. This initiative is funded by more than 20 companies and managed by The Linux Foundation." Further information on Debian's goals for reproducible builds can be found in the announcement.
* * * * *
File system encryption is often something that is added on to an existing file system, acting as a separate layer of functionality, rather than a built-in feature of the file system itself. Often times complexity and performance concerns prevent data encryption from being a core component of a file system. Linux users will soon be able to use a file system with built in encryption via ext4. "Encryption in ext4 is a per-directory-tree affair. One starts by setting an encryption policy for a given directory, which must be empty at the time; that policy includes a master key used for all files and directories stored below the target directory. Each individual file is encrypted with its own key, which is derived from the master key and a per-file random nonce value (which is stored in an extended attribute attached to the file's inode). File names and symbolic links are also encrypted." Additional information on how encryption will work on ext4 and its benefits over other forms of encryption, such as eCryptfs, are covered in this LWN article.
* * * * *
The openSUSE project is working on a new version of their popular distribution and the new release is expected to be a departure from the openSUSE releases of the past few years. The new version, code named "42", will be aligned more closely with SUSE Linux Enterprise releases and service packs. The openSUSE blog explains: "Some people might be perplexed over the next regular release, but rather than bikeshedding the name over the next few months, for the moment, we will call it openSUSE 42 after its project name in the Open Build Service. And we are going to explain the roadmap for this regular release. openSUSE 42 is scheduled to be released around SUSECon, which is in Amsterdam this year from November 2 - 6. Unlike old releases, future releases of `42' are expected to align with the releases of SLE service packs and major releases. `There are about 2,000 packages in openSUSE 42 right now,' said Stephan `Coolo' Kulow, release manager. Of course, many more are expected. openSUSE 42 will be a long-term type release with enduring updates and maintenance commitments by the community and SUSE." A development snapshot is expected to be released soon in order to give openSUSE users a chance to test "42" and provide feedback.
* * * * *
Back at the beginning of June we mentioned that the Ubuntu Community Council had ordered Johnathan Riddell to vacate his Kubuntu leadership roles, including his position on the Kubuntu Community Council. At the time the demand appeared to come out of the blue and the Kubuntu Community Council voted to keep Riddell in his position while the matter was explored further. Last week Laura Czajkowski, a member of the Ubuntu Community Council, announced a resolution has been reached. "After much public controversy, the Ubuntu Community Council and Kubuntu
Council have met with Mark Shuttleworth and Jonathan Riddell to chart a path forward. Jonathan Riddell has removed his membership in ~kubuntu-council as the Community Council required, and the Fridge post has been removed as the Kubuntu Council requested. Provisions are being made to better handle cases where there is a potential conflict of interest for a member of the CC. We have mutually agreed that KDE is important to Ubuntu, and the Kubuntu Council believes that Ubuntu is important to the KDE community as well. Therefore we have a basis to work together on putting out a lovely Wily release. We recognize that there are honest and strong feelings about both the things that led up to the current controversy and the way that resolution of it was handled. Despite that, we would all like to move forward as best we can for the betterment of the Ubuntu project, including Kubuntu."
|
Rapid Review (by Jesse Smith) |
FreeBSD on a Raspberry Pi 2
Last week I shared my experience of running the Raspbian distribution on a Raspberry Pi computer. A number of people asked how the experience compares to running one of the BSD operating systems on a Pi and so I decided to load FreeBSD onto my tiny Pi computer.
Before diving into my experiment with FreeBSD on the Pi, I think it is important to note that FreeBSD is just now getting support for the Raspberry Pi 2. The wiki page for FreeBSD's status on the Pi has been changing quickly. In fact, the week I purchased my Raspberry Pi 2, virtually no features were reported to work on the device. A week or so later, most of the feature matrix changed from red to green, indicating most of the Pi's hardware would work with FreeBSD. I think it is also worth mentioning there are no images of FreeBSD's stable (10.x) branch for the Raspberry Pi 2. There are stable releases for the earlier Raspberry Pi machines, but not the most recent hardware. People who want to use FreeBSD on a Raspberry Pi 2 need to download an image of FreeBSD 11, the development branch of FreeBSD. Running the development (aka Current) branch of FreeBSD may lead to some regressions or unstable behaviour. In short, FreeBSD on the Raspberry Pi 2 is highly experimental and likely to be unstable, use it at your own risk.
The compressed image file we download for the Pi is 93MB in size. Once the image is decompressed it expands to 1024MB. We can transfer the image to a microSD card and use it to boot the Raspberry Pi. The first time I booted the Pi with FreeBSD I did so in a headless environment where the Pi was only accessible via a network connection. The Pi came on-line and I could connect to its OpenSSH service, but I was unable to login and I could not find a username/password combination in the documentation. I eventually found out the FreeBSD image has a root account only and it has no password. The image also disables remote root login attempts. This means we need to hook the Pi up to a monitor and keyboard, create a new user account and then we will be able to login remotely. Something else I noticed early on was that FreeBSD turns off the Pi's external "power on" light when it boots. This makes it appear as though the Pi has been deactivated, but it is, in fact, still running. Raspbian, by contrast, leaves the light on to let us know the Pi is working.
I attached a monitor and keyboard to the Pi. FreeBSD boots to a text console where we can login as the root user. We can then explore the operating system, create new user accounts and access the Internet since FreeBSD kindly enables networking by default. Unlike Raspbian, which offers a desktop interface, FreeBSD keeps its environment to a minimum and grants us a command line interface only. FreeBSD's minimal environment (it runs only a dozen processes, including our login shell) offers us a very lightweight operating system. FreeBSD uses a mere 5MB of active memory and about 90MB of wired memory. The operating system takes up about 500MB of space on the SD card.
Since most people will probably want to use additional software on their Pi computers, I went looking for software I could install on FreeBSD. Here I ran into a few problems. The first is that there is no official FreeBSD package repository for ARM devices such as the Raspberry Pi. A few people have set up unofficial repositories, but those need to be located through forums or mailing lists. I'm a bit wary of enabling third-party repositories so I decided to download the FreeBSD ports collection which would enable me to build software from its source code. At first I tried to use the portsnap command to download the ports collection. The portsnap tool reported the port meta data it found on the server was not correct and it refused to download the ports collection for me.
Instead I manually downloaded an archive containing a snapshot of the FreeBSD ports collection, unpacked it and accessed ports that way. Building ports worked passably well. Building software, especially larger packages, on a Raspberry Pi can be time consuming. The Pi has a relatively slow processor and little memory so most ports will take a good deal longer to build on the Pi than on a modern desktop or server. Still, it seems most ports will build and run, given enough time.
At this point I had a basic FreeBSD system that appeared to be stable. I could build some additional software for the Pi and all the normal command line tools were working for me. Though the Pi is not a fast machine, the minimal FreeBSD operating system was responsive. I was using less than 100MB of memory (the Pi provides 1024MB of RAM) and my average system load was typically under 0.2.
When I experimented with Raspbian on the Pi I added support for ZFS, an advanced file system capable of managing snapshots and vast amounts of storage. Since ZFS is available natively as a part of the FreeBSD operating system I decided to mount my external hard drive which was acting as a ZFS storage volume. Here is where things got difficult.
As it happens, while ZFS is available on the x86 build of FreeBSD, ZFS is not available to people using the ARM image of the operating system. ZFS support must be added manually*. Once I compiled the necessary ZFS modules and enabled them in my configuration, I was able to mount my external drive and access the storage pool I had created under Raspbian. With ZFS running, FreeBSD's memory usage remained mostly unchanged, with the operating system using a total of 160MB of RAM.
At this point my experience turned from difficult to weird. I found, for example, that I could copy one file at a time from the UFS formatted SD card to my ZFS volume, or one file from my ZFS volume to my UFS formatted partition. However, attempting to copy multiple files, say five or more at a time, across devices using the cp command would cause the operating system to crash. At one point I unpacked the ports collection on my ZFS volume and found that I could read and access all the files, until I ran the make command in any port. Attempting to run make would fail and render the port's Makefile unreadable. The file was still there and still the same size, but its data was unreadable. The Makefiles I clobbered in this fashion could be restored by simply unmounting and remounting the ZFS volume.
At first I thought these problems might be caused by an incompatibility between the Raspbian implementation of ZFS and FreeBSD's implementation. I found another hard drive and used FreeBSD to set up a new ZFS volume on the second hard disk. The same issues persisted with the operating system crashing while copying multiple files across file system boundaries and Makefiles becoming unreadable when accessed by the make command. As before, unmounting and remounting the drive caused clobbered files to be restored to their normal condition.
I eventually gave up getting ZFS to work on FreeBSD's ARM port. However, other than the trouble I experienced with ZFS, I found FreeBSD worked well on the Raspberry Pi. The images being built for the Raspberry Pi 2 are still quite experimental and changing each month, but the latest snapshot (at time of writing) works well for most things. Video, networking and compiling all work. The system is stable when only accessing UFS partitions and tasks complete quickly.
What I generally found during my time running FreeBSD on the Pi was the technology was generally sound, but the documentation is currently sparse. Trying to find even basic bits of information such as the default login credentials resulted in a trip to the FreeBSD forums in search of answers. It is my hope that, before FreeBSD 11 is released, the Pi port will gain additional documentation. I also hope the project creates an official ARM repository as, at the moment, compiling ports from source code is a time consuming task. In short, the base operating system works well, the foundation is in place, but the Raspberry Pi branch of FreeBSD is still in the early stages and does not yet have infrastructure in place on par with the x86 branch of the project.
* * * * *
* Adding ZFS support to FreeBSD's Raspberry Pi port is not well documented and I had to visit a few different forums and mailing lists to piece together what I would need to add (and enable) ZFS modules on my Pi. Most of the documentation and discussions revolved around older versions of FreeBSD from before ZFS was made a part of the base system on x86 architectures. To assist others who may want to experiment with ZFS support on ARM-powered machines I have put together the steps I performed to build ZFS modules.
First, we need to download the FreeBSD ports collection.
cd /root
fetch ftp://ftp.freebsd.org/pub/FreeBSD/ports/ports/ports.tar.gz
Next we need to unpack the ports and build the Subversion package.
cd /usr
tar xzf /root/ports.tar.gz
cd ports/devel/subversion
make install
make clean
With Subversion installed we next need to use Subversion to download the latest version of the kernel source code. There are a few ways to do this, but I found it expeditious to download all of FreeBSD's source code and proceed from there.
cd /root
svn co https://svn0.us-west.freebsd.org/base/head/
The next thing we need to do is build three modules: opensolaris, zlib and zfs.
cd head/sys/modules/opensolaris
make
cp opensolaris.k* /boot/kernel
cd ../zlib
make
cp zlib.k* /boot/kernel
cd ../zfs
make
cp zfs.k* /boot/kernel
The modules are now installed, but not yet enabled. To enable the ZFS module we need to add the following text to the /etc/rc.conf file. We can do this using the vi text editor.
zfs_enable="YES"
At this point we can either reboot the operating system to load the ZFS module, or manually load it ourselves using the following command:
kldload zfs
At this point commands such as zpool and zfs should work and enable us to create, mount and snapshot ZFS storage pools.
|
Torrent Corner |
Weekly Torrents
Bittorrent is a great way to transfer large files, particularly open source operating system images, from one place to another. Most bittorrent clients recover from dropped connections automatically, check the integrity of files and can re-download corrupted bits of data without starting a download over from scratch. These characteristics make bittorrent well suited for distributing open source operating systems, particularly to regions where Internet connections are slow or unstable.
Many Linux and BSD projects offer bittorrent as a download option, partly for the reasons listed above and partly because bittorrent's peer-to-peer nature takes some of the strain off the project's servers. However, some projects do not offer bittorrent as a download option. There can be several reasons for excluding bittorrent as an option. Some projects do not have enough time or volunteers, some may be restricted by their web host provider's terms of service. Whatever the reason, the lack of a bittorrent option puts more strain on a distribution's bandwidth and may prevent some people from downloading their preferred open source operating system.
With this in mind, DistroWatch plans to give back to the open source community by hosting and seeding bittorrent files for distributions that do not offer a bittorrent option themselves. For now, we are hosting a small number of distribution torrents, listed below. The list of torrents offered will be updated each week and we invite readers to e-mail us with suggestions as to which distributions we should be hosting. When you message us, please place the word "Torrent" in the subject line, make sure to include a link to the ISO file you want us to seed and please make sure the project you are recommending does not already host its own torrents. We want to primarily help distributions and users who do not already have a torrent option. To help us maintain and grow this free service, please consider making a donation.
The table below provides a list of torrents we currently host. If you do not currently have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found here. All torrents we make available here are also listed on the very useful Linux Tracker website. Thanks to Linux Tracker we are able to share the following torrent statistics.
Torrent Corner statistics:
- Total torrents seeded: 77
- Total downloads completed: 44,042
- Total data uploaded: 8.1TB
|
Released Last Week |
pfSense 2.2.3
Chris Buechler has announced the release of pfSense 2.2.3, a security and bug-fix update of the specialist operating system designed for firewalls and routers, based on FreeBSD: "pfSense software version 2.2.3 release is now available, bringing a number of bug fixes and some security updates. Security fixes: multiple XSS vulnerabilities in the pfSense WebGUI, the complete list of affected pages and fields is large and all are listed in the linked SA; multiple OpenSSL vulnerabilities (including Logjam). The bug fixes and changes in this release are detailed here. As always, you can upgrade from any previous version straight to 2.2.3. For those already running any 2.2x version, this is a low-risk upgrade. This is a high-priority upgrade for those using IPsec on 2.2x versions. For those on 2.1.x or earlier versions, there are a number of significant changes which may impact you. Pay close attention to the 2.2 upgrade notes for the details." Here is the brief release announcement.
SparkyLinux 4.0
The developers of SparkyLinux, a distribution based on Debian's Testing branch (also know as Debian "Stretch"), have announced the availability of a new release. SparkyLinux 4.0 ships with version 4.0.5 of the Linux kernel, offers package compatibility with Debian "Stretch" and can be installed on machines featuring UEFI. "[The] 32-bit edition of SparkyLinux features Linux kernel i586 non-PAE. If you would like to install i686-pae kernel, you can do it via Sparky APTus-> Install tab-> Install i686-PAE Kernel. Just remember to refresh package list before. Starting from Sparky 4.0, the live images offer support for installing the system on 32-bit machines with UEFI motherboard. As an addition, all the traditional 'grub-efi' files have been removed from the live ISO images and replaced by our own, custom 'efi.img' files built by MoroS using his custom script." SparkyLinux is presently available in five different desktop editions (LXDE, LXQt, KDE, MATE and Xfce). Further information can be found in the project's release announcement.

VectorLinux 7.1 -- Running the LXDE desktop
(full image size: 2.6MB, resolution: 1280x1024 pixels)
VectorLinux 7.1
It took quite a while to build, but finally it's here - the brand new VectorLinux 7.1. A Slackware-derived distribution with Xfce and without systemd. From the release announcement: "The VectorLinux team is proud to announce the final release of VectorLinux 7.1. This release is the culmination of years of work to make our distro the standard which all others hope to achieve. We have successfully developed an easy-to-use installer that can be used in both GUI and text modes depending on the hardware involved. It requires very little user intervention to achieve a successful installation of the system. We have completely automated our internal package system so that all packages are constantly up-to-date and patched as necessary. The system is available both in 32-bit and 64-bit variants and features the latest linux 3.18.16 LTS kernel. We use the latest Xfce as our GUI desktop with Fluxbox as an alternative. The repository contains the bigger systems like KDE and thousands of other programs easily installed through the tried and trusted gslapt/slaptget package installer."
* * * * *
Development, unannounced and minor bug-fix releases
|
Upcoming Releases and Announcements |
Summary of expected upcoming releases
|
Opinion Poll |
32-bit vs 64-bit
Last week, one of our readers asked if we would run a poll on 32-bit vs 64-bit computing. Several distributions have decided to support 64-bit computers exclusively in the past few years. However, it is common to see posts on support forums asking where users can find 32-bit installation media, so there are clearly still people who continue to use 32-bit operating systems. Our question this week is: Do you use 32-bit operating systems exclusively, a mixture of 32-bit and 64-bit systems or have you gone 64-bit exclusively? If you do still use 32-bit distributions, please tell us why in the comments section.
You can see the results of last week's poll on distro-hopping frequency here.
|
My OSes are (32- vs 64-bit)
32-bit only: | 397 (12%) |
A mix of 32-bit and 64-bit: | 1226 (38%) |
64-bit only: | 1346 (42%) |
64-bit x86 and 32-bit ARM: | 232 (7%) |
Other: | 10 (0%) |
|
|
DistroWatch.com News |
Expanding search capabilities
We often receive suggestions for ways we can improve DistroWatch and this past week we implemented a few of the more popular ideas. Specifically, one of the things we did was add a new category to our Search page. When performing simple or advanced searches it is now possible to find distributions based on which packaging format the operating system uses. At the moment we support searching for distributions which use RPM, Debian packages, Pacman, Portage and TGZ files. We plan to fine tune the searches over time to include more formats and specific package managers, such as DNF, APT and PKG-NG. If you happen to find an error in our package management data or would like to help us improve our coverage of package managers in distributions, please e-mail Jesse and put "Package Management" in the subject line.
The second feature we have added is a new sidebar widget on our front page. Some readers pointed out they would like to have quick access to new distributions being added to our waiting list. The new widget, called "New To Waiting List", appears about halfway down the main page and displays the most recent projects added to our waiting list.
Finally, when performing searches from the top bar (where it says "Type Distribution Name"), our system now displays both distributions in our database and distributions on our waiting list. We know some distributions sit on our waiting list for a long time and we want to make those projects easier to find for people who want to try something new.
We have more planned and will post updates as new features and data are added to our system.
* * * * *
Distributions added to waiting list
- Clear Linux. The Clear Linux Project for Intel architecture is a distribution built for various cloud use cases.
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 6 July 2015. To contact the authors please send email to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, suggestions and corrections: news, donations, distribution submissions, comments)
|
|
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 0, value: US$0.00) |
|
|
|
 bc1qtede6f7adcce4kjpgx0e5j68wwgtdxrek2qvc4  lnurl1dp68gurn8ghj7ampd3kx2ar0veekzar0wd5xjtnrdakj7tnhv4kxctttdehhwm30d3h82unvwqhhxarpw3jkc7tzw4ex6cfexyfua2nr  86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le paypal.me/distrowatchweekly • patreon.com/distrowatch |
|
Linux Foundation Training |
| |
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Issue 1046 (2023-11-20): Slackel 7.7 "Openbox", restricting CPU usage, Haiku improves font handling and software centre performance, Canonical launches MicroCloud |
• Issue 1045 (2023-11-13): Fedora 39, how to trust software packages, ReactOS booting with UEFI, elementary OS plans to default to Wayland, Mir gaining ability to split work across video cards |
• Issue 1044 (2023-11-06): Porteus 5.01, disabling IPv6, applications unique to a Linux distro, Linux merges bcachefs, OpenELA makes source packages available |
• Issue 1043 (2023-10-30): Murena Two with privacy switches, where old files go when packages are updated, UBports on Volla phones, Mint testing Cinnamon on Wayland, Peppermint releases ARM build |
• Issue 1042 (2023-10-23): Ubuntu Cinnamon compared with Linux Mint, extending battery life on Linux, Debian resumes /usr merge, Canonical publishes fixed install media |
• Issue 1041 (2023-10-16): FydeOS 17.0, Dr.Parted 23.09, changing UIDs, Fedora partners with Slimbook, GNOME phasing out X11 sessions, Ubuntu revokes 23.10 install media |
• Issue 1040 (2023-10-09): CROWZ 5.0, changing the location of default directories, Linux Mint updates its Edge edition, Murena crowdfunding new privacy phone, Debian publishes new install media |
• Issue 1039 (2023-10-02): Zenwalk Current, finding the duration of media files, Peppermint OS tries out new edition, COSMIC gains new features, Canonical reports on security incident in Snap store |
• Issue 1038 (2023-09-25): Mageia 9, trouble-shooting launchers, running desktop Linux in the cloud, New documentation for Nix, Linux phasing out ReiserFS, GNU celebrates 40 years |
• Issue 1037 (2023-09-18): Bodhi Linux 7.0.0, finding specific distros and unified package managemnt, Zevenet replaced by two new forks, openSUSE introduces Slowroll branch, Fedora considering dropping Plasma X11 session |
• Issue 1036 (2023-09-11): SDesk 2023.08.12, hiding command line passwords, openSUSE shares contributor survery results, Ubuntu plans seamless disk encryption, GNOME 45 to break extension compatibility |
• Issue 1035 (2023-09-04): Debian GNU/Hurd 2023, PCLinuxOS 2023.07, do home users need a firewall, AlmaLinux introduces new repositories, Rocky Linux commits to RHEL compatibility, NetBSD machine runs unattended for nine years, Armbian runs wallpaper contest |
• Issue 1034 (2023-08-28): Void 20230628, types of memory usage, FreeBSD receives port of Linux NVIDIA driver, Fedora plans improved theme handling for Qt applications, Canonical's plans for Ubuntu |
• Issue 1033 (2023-08-21): MiniOS 20230606, system user accounts, how Red Hat clones are moving forward, Haiku improves WINE performance, Debian turns 30 |
• Issue 1032 (2023-08-14): MX Linux 23, positioning new windows on the desktop, Linux Containers adopts LXD fork, Oracle, SUSE, and CIQ form OpenELA |
• Issue 1031 (2023-08-07): Peppermint OS 2023-07-01, preventing a file from being changed, Asahi Linux partners with Fedora, Linux Mint plans new releases |
• Issue 1030 (2023-07-31): Solus 4.4, Linux Mint 21.2, Debian introduces RISC-V support, Ubuntu patches custom kernel bugs, FreeBSD imports OpenSSL 3 |
• Issue 1029 (2023-07-24): Running Murena on the Fairphone 4, Flatpak vs Snap sandboxing technologies, Redox OS plans to borrow Linux drivers to expand hardware support, Debian updates Bookworm media |
• Issue 1028 (2023-07-17): KDE Connect; Oracle, SUSE, and AlmaLinux repsond to Red Hat's source code policy change, KaOS issues media fix, Slackware turns 30; security and immutable distributions |
• Issue 1027 (2023-07-10): Crystal Linux 2023-03-16, StartOS (embassyOS 0.3.4.2), changing options on a mounted filesystem, Murena launches Fairphone 4 in North America, Fedora debates telemetry for desktop team |
• Issue 1026 (2023-07-03): Kumander Linux 1.0, Red Hat changing its approach to sharing source code, TrueNAS offers SMB Multichannel, Zorin OS introduces upgrade utility |
• Issue 1025 (2023-06-26): KaOS with Plasma 6, information which can leak from desktop environments, Red Hat closes door on sharing RHEL source code, SUSE introduces new security features |
• Issue 1024 (2023-06-19): Debian 12, a safer way to use dd, Debian releases GNU/Hurd 2023, Ubuntu 22.10 nears its end of life, FreeBSD turns 30 |
• Issue 1023 (2023-06-12): openSUSE 15.5 Leap, the differences between independent distributions, openSUSE lengthens Leap life, Murena offers new phone for North America |
• Issue 1022 (2023-06-05): GetFreeOS 2023.05.01, Slint 15.0-3, Liya N4Si, cleaning up crowded directories, Ubuntu plans Snap-based variant, Red Hat dropping LireOffice RPM packages |
• Issue 1021 (2023-05-29): rlxos GNU/Linux, colours in command line output, an overview of Void's unique features, how to use awk, Microsoft publishes a Linux distro |
• Issue 1020 (2023-05-22): UBports 20.04, finding another machine's IP address, finding distros with a specific kernel, Debian prepares for Bookworm |
• Issue 1019 (2023-05-15): Rhino Linux (Beta), checking which applications reply on a package, NethServer reborn, System76 improving application responsiveness |
• Issue 1018 (2023-05-08): Fedora 38, finding relevant manual pages, merging audio files, Fedora plans new immutable edition, Mint works to fix Secure Boot issues |
• Issue 1017 (2023-05-01): Xubuntu 23.04, Debian elects Project Leaders and updates media, systemd to speed up restarts, Guix System offering ground-up source builds, where package managers install files |
• Issue 1016 (2023-04-24): Qubes OS 4.1.2, tracking bandwidth usage, Solus resuming development, FreeBSD publishes status report, KaOS offers preview of Plasma 6 |
• Issue 1015 (2023-04-17): Manjaro Linux 22.0, Trisquel GNU/Linux 11.0, Arch Linux powering PINE64 tablets, Ubuntu offering live patching on HWE kernels, gaining compression on ex4 |
• Issue 1014 (2023-04-10): Quick looks at carbonOS, LibreELEC, and Kodi, Mint polishes themes, Fedora rolls out more encryption plans, elementary OS improves sideloading experience |
• Issue 1013 (2023-04-03): Alpine Linux 3.17.2, printing manual pages, Ubuntu Cinnamon becomes official flavour, Endeavour OS plans for new installer, HardenedBSD plans for outage |
• Issue 1012 (2023-03-27): siduction 22.1.1, protecting privacy from proprietary applications, GNOME team shares new features, Canonical updates Ubuntu 20.04, politics and the Linux kernel |
• Issue 1011 (2023-03-20): Serpent OS, Security Onion 2.3, Gentoo Live, replacing the scp utility, openSUSE sees surge in downloads, Debian runs elction with one candidate |
• Issue 1010 (2023-03-13): blendOS 2023.01.26, keeping track of which files a package installs, improved network widget coming to elementary OS, Vanilla OS changes its base distro |
• Issue 1009 (2023-03-06): Nemo Mobile and the PinePhone, matching the performance of one distro on another, Linux Mint adds performance boosts and security, custom Ubuntu and Debian builds through Cubic |
• Issue 1008 (2023-02-27): elementary OS 7.0, the benefits of boot environments, Purism offers lapdock for Librem 5, Ubuntu community flavours directed to drop Flatpak support for Snap |
• Issue 1007 (2023-02-20): helloSystem 0.8.0, underrated distributions, Solus team working to repair their website, SUSE testing Micro edition, Canonical publishes real-time edition of Ubuntu 22.04 |
• Issue 1006 (2023-02-13): Playing music with UBports on a PinePhone, quick command line and shell scripting questions, Fedora expands third-party software support, Vanilla OS adds Nix package support |
• Issue 1005 (2023-02-06): NuTyX 22.12.0 running CDE, user identification numbers, Pop!_OS shares COSMIC progress, Mint makes keyboard and mouse options more accessible |
• Issue 1004 (2023-01-30): OpenMandriva ROME, checking the health of a disk, Debian adopting OpenSnitch, FreeBSD publishes status report |
• Issue 1003 (2023-01-23): risiOS 37, mixing package types, Fedora seeks installer feedback, Sparky offers easier persistence with USB writer |
• Issue 1002 (2023-01-16): Vanilla OS 22.10, Nobara Project 37, verifying torrent downloads, Haiku improvements, HAMMER2 being ports to NetBSD |
• Issue 1001 (2023-01-09): Arch Linux, Ubuntu tests new system installer, porting KDE software to OpenBSD, verifying files copied properly |
• Issue 1000 (2023-01-02): Our favourite projects of all time, Fedora trying out unified kernel images and trying to speed up shutdowns, Slackware tests new kernel, detecting what is taking up disk space |
• Issue 999 (2022-12-19): Favourite distributions of 2022, Fedora plans Budgie spin, UBports releasing security patches for 16.04, Haiku working on new ports |
• Issue 998 (2022-12-12): OpenBSD 7.2, Asahi Linux enages video hardware acceleration on Apple ARM computers, Manjaro drops proprietary codecs from Mesa package |
• Issue 997 (2022-12-05): CachyOS 221023 and AgarimOS, working with filenames which contain special characters, elementary OS team fixes delta updates, new features coming to Xfce |
• Issue 996 (2022-11-28): Void 20221001, remotely shutting down a machine, complex aliases, Fedora tests new web-based installer, Refox OS running on real hardware |
• Issue 995 (2022-11-21): Fedora 37, swap files vs swap partitions, Unity running on Arch, UBports seeks testers, Murena adds support for more devices |
• Issue 994 (2022-11-14): Redcore Linux 2201, changing the terminal font size, Fedora plans Phosh spin, openSUSE publishes on-line manual pages, disabling Snap auto-updates |
• Issue 993 (2022-11-07): Static Linux, working with just a kernel, Mint streamlines Flatpak management, updates coming to elementary OS |
• Full list of all issues |
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Shells.com |

Your own personal Linux computer in the cloud, available on any device. Supported operating systems include Android, Debian, Fedora, KDE neon, Kubuntu, Linux Mint, Manjaro and Ubuntu, ready in minutes.
Starting at US$4.95 per month, 7-day money-back guarantee
|
Random Distribution | 
Qimo 4 Kids
Qimo 4 Kids was a distribution of Linux, derived from the popular Ubuntu, customised for use by children ages 3 and up. It comes pre-installed with free and open source games that are both educational and entertaining, with many more educational titles available for download from Ubuntu. The interface of Qimo 4 Kids has been specifically designed to be easy to navigate by the youngest of users.
Status: Discontinued
|
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|