设为首页收藏本站我的广告

运维网

 找回密码
 注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

搜索
总共321条微博

每日一博

查看: 609|回复: 0

[更新动态] 【站长推荐】OpenBSD 5.8 发布,改进硬件支持【顶】

[复制链接]

该用户从未签到

cn2015 发表于 2015-10-19 10:35:26 | 显示全部楼层 |阅读模式
【重大新闻】

OpenBSD 5.8 发布,改进硬件支持

OpenBSD 5.8 发布,改进硬件支持
OpenBSD 5.8 正式发布,此版本是第 38 个基于 CD-ROM 的版本(and 39th via FTP/HTTP)。此版本包括系统各个方面的新特性和一些重要改进。更多改进内容请看发行说明或者是 errataDownload (pkglist): amd64/install58.iso (220MB, SHA256), i386/install58.iso (210MB, SHA256)。
详细改进列表:
  1. - Improved hardware support, including:
  2.     o New rtwn(4) driver for Realtek RTL8188CE wifi cards.
  3.     o New hpb(4) driver for HyperTransport bridges as found in the IBM
  4.       CPC945.
  5.     o The ugold(4) driver now supports TEMPerHUMV1.x temperature and
  6.       humidity sensors.
  7.     o Improved sensor support for the upd(4) driver for USB Power
  8.       Devices (UPS).
  9.     o Support for jumbo frames on re(4) devices using RTL8168C/D/E/F/G
  10.       and RTL8411, including PC Engines APU.
  11.     o re(4) now works with newer devices e.g. RTL8111GU.
  12.     o Partial support has been added for full-speed isochronous devices
  13.       in ehci(4), allowing USB 1.1 audio devices to be used on
  14.       EHCI-only systems in some cases.
  15.     o Improved macppc stability and G5 performances with MP kernels.
  16.     o acpicpu(4) uses ACPI C-state information to reduce power
  17.       consumption of idle CPUs.
  18.     o Kernel supports x86 AVX instructions on CPUs that have them.
  19.     o Avoid assigning low address to PCI BARs, fixing various issues on
  20.       machines whose BIOSes neglect to claim low memory.
  21.     o wscons(4) works with even more odd trackpads.
  22.     o Added pvbus(4) paravirtual device tree root on virtual machines
  23.       that are running on hypervisors.
  24.     o New octdwctwo(4) driver for USB support on OpenBSD/octeon.
  25.     o New amdcf(4) driver for embedded flash on OpenBSD/octeon.
  26.     o Support for RTL8188EU devices was added to the urtwn(4) driver.  - Removed hardware support:
  27.     o The lmc(4) driver for Lan Media Corporation SSI/T1/DS1/HSSI/DS3
  28.       devices has been removed.
  29.     o The san(4) driver for Sangoma Technologies AFT T1/E1 devices has
  30.       been removed.  - Generic network stack improvements:
  31.     o MTU of vlan(4) devices can now be set independently from the
  32.       parent interface's MTU.
  33.     o The same network range can now be assigned to multiple
  34.       interfaces, using interface priorities to choose between them.
  35.     o New MPLS pseudowire driver mpw(4).
  36.     o Much preparatory work for MP unlocking of the network stack.  - Installer improvements:
  37.     o The logic of the 'Allow root ssh login?' question has been
  38.       changed.
  39.        - The default answer is now 'no'.
  40.        - 'prohibit-password' has been added to the list of possible
  41.          answers.
  42.     o autoinstall(8) has been extended to allow
  43.        - hostname-mode.conf response file names.
  44.        - response files to be placed in a subdir of the webserver's
  45.          document root.
  46.        - passing a template file to disklabel(8) to automatically
  47.          partition the disk.
  48.     o ntpd(8) is now enabled by default at install time.
  49.     o DUID support has improved enough that new installs now use them
  50.       unconditionally.
  51.     o Installing sets from CD-ROM has been fixed if more than one
  52.       CD-ROM drive is present.
  53.     o The 'Which CD-ROM contains the install media?' question has been
  54.       removed. Available cdrom devices are now shown directly in the
  55.       'Location of sets?' prompt.  - Routing daemons and other userland network improvements:
  56.     o Many improvements and simplifications in ldpd(8), including
  57.       configuration reload and support for mpw(4) pseudowire interfaces.
  58.     o bgpd(8) now allows rules to match on the peer AS number.
  59.     o For terminated BGP sessions, bgpctl(8) now displays the number of
  60.       prefixes received on the last session.
  61.     o ospfd(8) now correctly handles carp(4) interfaces in "backup" mode
  62.       at startup.
  63.     o Log messages in bgpd(8) and ospfd(8) have been made more specific.
  64.     o The default Diffie-Hellman group for VPNs configured by
  65.       ipsec.conf(5) has been changed to modp3072.
  66.     o New radiusd(8), Remote Authentication Dial In User Service
  67.       (RADIUS) daemon.  - Security improvements:
  68.     o sudo in base has been replaced with doas(1), sudo is available as
  69.       a package.
  70.     o file(1) has been replaced with a new modern implementation,
  71.       including sandbox and privilege separation.
  72.     o pax(1) (and tar(1) and cpio(1)) now prevent archive extraction
  73.       from escaping the current directory via symlinks; tar(1) without
  74.       -P option now strips up through any ".." path components.
  75.     o Static PIE support for sparc.
  76.     o Alpha switched to secure PLT.
  77.     o Improved kernel checks of ELF headers.
  78.     o Support for the NX (No-eXecute) bit on i386, resulting in much
  79.       better W^X enforcement in userland for hardware that has this
  80.       feature.
  81.     o Enforcement of W^X in the kernel address space on i386 when using
  82.       processors with the NX bit.
  83.     o Work started on a new process-containment facility called tame(2).  - Assorted improvements:
  84.     o The worm(6) now grows at a rate proportional to terminal size.
  85.     o dlclose(3) now unregisters handlers registered by a
  86.       pthread_atfork(3) call from the unloaded libraries.
  87.     o cp(1), mv(1), and pax(1) with the -rw option now preserve
  88.       timestamps with full nanosecond precision.
  89.     o pax(1) now detects failure to decompress an archive when reading
  90.       it and errors out immediately.
  91.     o nm(1) now supports the -D option for displaying the dynamic symbol
  92.       table.
  93.     o dump(8) now uses DUIDs in /etc/dumpdates when present and the -U
  94.       option has thus been removed.
  95.     o Corrected kdump(1) reporting of lseek(2) return value on ILP32
  96.       archs and getsockopt/setsockopt(2) level and optname arguments.
  97.       iovec, msghdr, and cmsghdr structures are now dumped.
  98.     o sed(1) -i option added.
  99.     o New, much simpler man.conf(5) configuration file format for
  100.       man(1), apropos(1), and makewhatis(8).
  101.     o When using man(1) with the less(1) pager, support the :t internal
  102.       command to search for definitions of keywords similar to what
  103.       ctags(1) provides.
  104.     o Improvements in checking of numeric option values in many
  105.       utilities.
  106.     o Upgraded to binutils version 2.17 with additional fixes.
  107.     o Improved correctness of poll(2) and poll(2) of O_RDONLY FIFO fds.
  108.     o Restored reporting of closed sockets by netstat(1) and systat(1).
  109.     o fdisk(8) now zeros correct GPT sector at end of disk.
  110.     o fdisk(8) now accepts 'T' sizes for terabytes.
  111.     o fdisk(8) repaired to work on 4K sector disks again.
  112.     o dhcpd(8) now logs correct giaddr and ciaddr information even when
  113.       DHCP relays are present.
  114.     o dhcpd(8) now accommodates Linux and MS clients by not sending
  115.       routers or static routes info when classless static routes are
  116.       sent.
  117.     o dhcpd(8) and dhclient(8) now accept hostnames beginning with a
  118.       digit.
  119.     o dhclient(8) no longer rejects leases with addresses overlapping
  120.       existing subnets on other interfaces. Kernel routing logic now
  121.       just works.
  122.     o Improvements to realloc(3) decrease system calls and increase
  123.       efficiency.
  124.     o The reaper now tears down dead processes without holding on to the
  125.       kernel lock. This greatly reduces latency and increases
  126.       performance on multi-processor systems.  - OpenBSD httpd(8):
  127.     o New features:
  128.        - Added support for matching and redirections with Lua
  129.          patterns(7).
  130.        - Implemented If-Modified-Since for conditional GET or HEAD
  131.          requests (RFC 7232).
  132.        - Added byte-range support for range requests (RFC 7233).
  133.        - Allowing to specify a global or per-location default media
  134.          type instead of application/octet-stream.
  135.        - Added support for HTTP Strict Transport Security (HSTS; RFC
  136.          6797).
  137.        - Added initial regression test suite based on relayd(8)'s
  138.          implementation.
  139.     o Fixes and improvements:
  140.        - TLS in httpd(8) and relayd(8) now defaults to TLSv1.2-only.
  141.        - Fixed support for large TLS keys or certificate bundles with
  142.          up to 16KB each.
  143.        - Fixed the Content-Length header for files larger than 2 GB on
  144.          32-bit architectures.
  145.        - Fixed translation of CGI environment variables in accordance
  146.          with RFCs 7230 and 3875.
  147.        - Improved memory usage and fixed possible memory exhaustion on
  148.          large file transfers.
  149.        - Added URL-encoding of specific CGI variables before using
  150.          them in the Location header.
  151.        - Prepend files or directories containing ":" with "./" in
  152.          directory indexes as per RFC 3986.
  153.        - Allowing to specify characters like "?" in the Location URI.
  154.        - Various other bug fixes and improvements.  - OpenSMTPD 5.4.4
  155.     o smtpd(8) reliability and bug fixes.
  156.     o NOTE: Some security risks were discovered and fixed after the
  157.       OpenBSD 5.8 release. See 5.8 errata 004.  - OpenSSH 7.0:
  158.     o Security:
  159.        - ssh(1): when forwarding X11 connections with
  160.          ForwardX11Trusted=no, connections made after
  161.          ForwardX11Timeout expired could be permitted and no longer
  162.          subject to XSECURITY restrictions because of an ineffective
  163.          timeout check in ssh(1) coupled with "fail open" behaviour in
  164.          the X11 server when clients attempted connections with
  165.          expired credentials. This problem was reported by Jann Horn.
  166.        - ssh-agent(1): fix weakness of agent locking (ssh-add -x) to
  167.          password guessing by implementing an increasing failure
  168.          delay, storing a salted hash of the password rather than the
  169.          password itself and using a timing-safe comparison function
  170.          for verifying unlock attempts. This problem was reported by
  171.          Ryan Castellucci.
  172.        - sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be
  173.          world-writable. Local attackers may be able to write
  174.          arbitrary messages to logged-in users, including terminal
  175.          escape sequences.
  176.        - sshd(8): fix circumvention of MaxAuthTries using
  177.          keyboard-interactive authentication. By specifying a long,
  178.          repeating keyboard-interactive "devices" string, an attacker
  179.          could request the same authentication method be tried
  180.          thousands of times in a single pass. The LoginGraceTime
  181.          timeout in sshd(8) and any authentication failure delays
  182.          implemented by the authentication mechanism itself were still
  183.          applied.
  184.     o Potentially-incompatible changes:
  185.        - Support for the legacy SSH version 1 protocol is disabled by
  186.          default at compile time.
  187.        - Support for the 1024-bit diffie-hellman-group1-sha1 key
  188.          exchange is disabled by default at run-time. It may be
  189.          re-enabled using the instructions at
  190.          http://www.openssh.com/legacy.html.
  191.        - Support for ssh-dss, ssh-dss-cert-* host and user keys is
  192.          disabled by default at run-time. These may be re-enabled
  193.          using the instructions at http://www.openssh.com/legacy.html.
  194.        - Support for the legacy v00 cert format has been removed.
  195.        - The default for the sshd_config(5) PermitRootLogin option has
  196.          changed from "yes" to "prohibit-password" (but the OpenBSD
  197.          installer defaults to "no").
  198.        - NOTE: 'PermitRootLogin prohibit-password' is subtly broken in
  199.          the OpenBSD 5.8 / OpenSSH 7.0; see 5.8 errata 001.
  200.     o New/changed features:
  201.        - ssh(1), sshd(8): promote chacha20-poly1305@openssh.com to be
  202.          the default cipher.
  203.        - sshd(8): support admin-specified arguments to
  204.          AuthorizedKeysCommand. (bz#2081)
  205.        - sshd(8): add AuthorizedPrincipalsCommand that allows
  206.          retrieving authorized principals information from a
  207.          subprocess rather than a file.
  208.        - ssh(1), ssh-add(1): support PKCS#11 devices with external PIN
  209.          entry devices. (bz#2240)
  210.        - sshd(8): allow GSSAPI host credential check to be relaxed for
  211.          multihomed hosts via GSSAPIStrictAcceptorCheck option.
  212.          (bz#928)
  213.        - ssh-keygen(1): support ssh-keygen -lF hostname to search
  214.          known_hosts and print key hashes rather than full keys.
  215.        - ssh-agent(1): add -D flag to leave ssh-agent(1) in foreground
  216.          without enabling debug mode. (bz#2381)
  217.        - ssh_config(5): add PubkeyAcceptedKeyTypes option to control
  218.          which public key types are available for user authentication.
  219.        - sshd_config(5): add HostKeyAlgorithms option to control which
  220.          public key types are offered for host authentications.
  221.        - ssh(1), sshd(8): extend Ciphers, MACs, KexAlgorithms,
  222.          HostKeyAlgorithms, PubkeyAcceptedKeyTypes and
  223.          HostbasedKeyTypes options to allow appending to the default
  224.          set of algorithms instead of replacing it. Options may now be
  225.          prefixed with a + to append to the default, e.g.
  226.          "HostKeyAlgorithms=+ssh-dss".
  227.     o The following significant bugs have been fixed in this release:
  228.        - ssh(1), sshd(8): deprecate legacy
  229.          SSH2_MSG_KEX_DH_GEX_REQUEST_OLD message and do not try to use
  230.          it against some 3rd-party SSH implementations that use it
  231.          (older PuTTY, WinSCP).
  232.        - Many fixes for problems caused by compile-time deactivation
  233.          of SSH1 support. (including bz#2369)
  234.        - ssh(1), sshd(8): cap DH-GEX group size at 4Kbits for Cisco
  235.          implementations as some would fail when attempting to use
  236.          group sizes greater than 4K. (bz#2209)
  237.        - ssh(1): fix out-of-bound read in EscapeChar configuration
  238.          option parsing. (bz#2396)
  239.        - sshd(8): fix application of PermitTunnel, LoginGraceTime,
  240.          AuthenticationMethods and StreamLocalBindMask options in
  241.          Match blocks.
  242.        - ssh(1), sshd(8): improve disconnection message on TCP reset.
  243.          (bz#2257)
  244.        - ssh(1): remove failed remote forwards established by
  245.          multiplexing from the list of active forwards. (bz#2363)
  246.        - sshd(8): make parsing of authorized_keys "environment="
  247.          options independent of PermitUserEnv being enabled. (bz#2329)
  248.        - sshd(8): fix post-auth crash with permitopen=none. (bz#2355)
  249.        - ssh(1), ssh-add(1), ssh-keygen(1): allow new-format private
  250.          keys to be encrypted with AEAD ciphers. (bz#2366)
  251.        - ssh(1): allow ListenAddress, Port and AddressFamily
  252.          configuration options to appear in any order. (bz#86)
  253.        - sshd(8): check for and reject missing arguments for
  254.          VersionAddendum and ForceCommand. (bz#2281)
  255.        - ssh(1), sshd(8): don't treat unknown certificate extensions
  256.          as fatal. (bz#2387)
  257.        - ssh-keygen(1): make stdout and stderr output consistent.
  258.          (bz#2325)
  259.        - ssh(1): mention missing DISPLAY environment in debug log when
  260.          X11 forwarding requested. (bz#1682)
  261.        - sshd(8): correctly record login when UseLogin is set.
  262.          (bz#378)
  263.        - sshd(8): add some missing options to sshd -T output and fix
  264.          output of VersionAddendum and HostCertificate. (bz#2346)
  265.        - Document and improve consistency of options that accept a
  266.          "none" argument: TrustedUserCAKeys, RevokedKeys (bz#2382),
  267.          AuthorizedPrincipalsFile (bz#2288).
  268.        - ssh(1): include remote username in debug output. (bz#2368)
  269.        - sshd(8): avoid compatibility problem with some versions of
  270.          Tera Term, which would crash when they received the hostkeys
  271.          notification message (hostkeys-00@openssh.com).
  272.        - sshd(8): mention ssh-keygen -E as useful when comparing
  273.          legacy MD5 host key fingerprints. (bz#2332)
  274.        - ssh(1): clarify pseudo-terminal request behaviour and use
  275.          make manual language consistent. (bz#1716)
  276.        - ssh(1): document that the TERM environment variable is not
  277.          subject to SendEnv and AcceptEnv. (bz#2386)
  278.        - ssh(1), sshd(8): add compatability workarounds for Cisco and
  279.          more PuTTY versions. (bz#2424)
  280.        - Fix some omissions and errors in the PROTOCOL and PROTCOL.mux
  281.          documentation relating to Unix domain socket forwarding.
  282.          (bz#2421, bz#2422)
  283.        - ssh(1): Improve the ssh(1) manual page to include a better
  284.          desciption of Unix domain socket forwarding. (bz#2423)
  285.        - ssh(1), ssh-agent(1): skip uninitialised PKCS#11 slots,
  286.          fixing failures to load keys when they are present. (bz#2427)
  287.        - ssh(1), ssh-agent(1): do not ignore PKCS#11 hosted keys that
  288.          wth empty CKA_ID. (bz#2429)
  289.        - sshd(8): clarify documentation for UseDNS option. (bz#2045)  - LibreSSL
  290.     o User-visible features:
  291.        - Reject all server DH keys smaller than 1024 bits.
  292.        - Multiple CVEs fixed including CVE-2015-0207, CVE-2015-0209,
  293.          CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289,
  294.          CVE-2015-1788, CVE-2015-1789, CVE-2015-1792.
  295.        - Protocol parsing conversions to BoringSSL's CRYPTO ByteString
  296.          (CBS) API.
  297.        - Added EC_curve_nid2nist and EC_curve_nist2nid from OpenSSL.
  298.        - Removed Dynamic Engine support.
  299.        - Removed MDC-2DES support.
  300.        - Switched openssl dhparam default from 512 to 2048 bits.
  301.        - Fixed openssl pkeyutl -verify to exit with a 0 on success.
  302.        - Fixed dozens of Coverity issues including dead code, memory
  303.          leaks, logic errors and more.
  304.        - Ensure that openssl(1) restores terminal echo state after
  305.          reading a password.
  306.        - Incorporated fix for OpenSSL issue #3683.
  307.        - Removed SSLv3 support from openssl(1).
  308.        - Modified tls_write in libtls to allow partial writes,
  309.          clarified with examples in the documentation.
  310.        - Removed RSAX engine.
  311.        - Tested SSLv3 removal with the OpenBSD ports tree and found
  312.          several applications that were not ready to build without
  313.          SSLv3 yet. For now, building a program that intentionally
  314.          uses SSLv3 will result in a linker warning.
  315.        - Added TLS_method, TLS_client_method and TLS_server_method as
  316.          a replacement for the SSLv23_*method calls.
  317.        - Default cert.pem, openssl.cnf, and x509v3.cnf files are now
  318.          installed under $sysconfdir/ssl or the directory specified by
  319.          --with-openssldir. Previous versions of LibreSSL left these
  320.          empty.
  321.        - NOTE: LibreSSL 2.2.2 in OpenBSD 5.8 incorrectly handles
  322.          ClientHello messages that do not include TLS extensions,
  323.          resulting in such handshakes being aborted. see 5.8 errata
  324.          002.
  325.     o Code improvements:
  326.        - Fix incorrect comparison function in openssl(1) certhash
  327.          command. Thanks to Christian Neukirchen / Void Linux.
  328.        - Removal of OPENSSL_issetugid and all library getenv calls.
  329.          Applications can and should no longer rely on environment
  330.          variables for changing library behavior. OPENSSL_CONF and
  331.          SSLEAY_CONF are still supported with the openssl(1) command,
  332.          but note that $ENV:: is no longer supported in .cnf files.
  333.        - libtls API and documentation additions.
  334.        - Various bug fixes and simplifications to libssl and
  335.          libcrypto.
  336.        - Reworked openssl(1) option handling.
  337.        - LibreSSL version define LIBRESSL_VERSION_NUMBER will now be
  338.          bumped for each portable release.
  339.        - Removed workarounds for TLS client padding bugs.
  340.        - Removed IE 6 SSLv3 workarounds.
  341.        - --with-enginesdir is removed as a configuration parameter.  - Syslogd:
  342.     o OpenBSD syslogd(8) can bind to explicitly given UDP or TCP sockets
  343.       to receive messages. TCP streams are accepted with the octet
  344.       counting or the non transparent framing method.
  345.     o Blocks in syslog.conf(5) started with +host process messages
  346.       created by certain hosts specifically.
  347.     o Handle situations when the file descriptor limit is exhausted
  348.       gracefully.
  349.     o Since libtls handles short writes smarter, syslogd(8) can use the
  350.       complete output buffer to save messages, coping with longer TLS
  351.       server down times without losing messages.  - Ports and packages:
  352.    Many pre-built packages for each architecture:
  353.     o alpha:    7093                  o powerpc:  8114
  354.     o amd64:    8866                  o sh:       133
  355.     o hppa:     5813                  o sparc:    3655
  356.     o i386:     8839                  o sparc64:  7851
  357.     o mips64:   4267                  o vax:      1959
  358.     o mips64el: 5922  - Some highlights:     o Chromium 44.0.2403.125          o Mozilla Thunderbird 38.1.0
  359.     o Emacs 21.4 and 24.5             o Node.js 0.10.35
  360.     o GCC 4.8.4 and 4.9.3             o OpenLDAP 2.3.43 and 2.4.41
  361.     o GHC 7.8.4                       o PHP 5.4.43, 5.5.27 and 5.6.11
  362.     o GNOME 3.14.2                    o Postfix 2.11.4
  363.     o Go 1.4.2                        o PostgreSQL 9.4.1
  364.     o Groff 1.22.3                    o Python 2.7.9 and 3.4.2
  365.     o JDK 1.7.0.80 and 1.8.0.45       o R 3.1.2
  366.     o KDE 3.5.10 and 4.14.3 (plus     o Ruby 1.8.7.374, 1.9.3.551,
  367.       KDE4 core updates)                2.0.0.598, 2.1.5, and 2.2.0
  368.     o LLVM/Clang 3.5 (20140228)       o Sendmail 8.15.2
  369.     o LibreOffice 4.4.4.3             o Tcl/Tk 8.5.18 and 8.6.4
  370.     o MariaDB 10.0.20                 o TeX Live 2014
  371.     o Mono 3.12.1                     o Vim 7.4.769
  372.     o Mozilla Firefox 38.1.1esr and   o Xfce 4.12
  373.       39.0.3  - As usual, steady improvements in manual pages and other documentation.  - The system includes the following major components from outside suppliers:
  374.     o Xenocara (based on X.Org 7.7 with xserver 1.16.4 + patches,
  375.       freetype 2.6, fontconfig 2.11.1, Mesa 10.2.9, xterm 314,
  376.       xkeyboard-config 2.14 and more)
  377.     o Gcc 4.2.1 (+ patches) and 3.3.6 (+ patches)
  378.     o Perl 5.20.2 (+ patches)
  379.     o SQLite 3.8.9 (+ patches)
  380.     o NSD 4.1.3
  381.     o Unbound 1.5.4
  382.     o Ncurses 5.7
  383.     o Binutils 2.17 (+ patches)
  384.     o Gdb 6.3 (+ patches)
  385.     o Less 458 (+ patches)
  386.     o Awk Aug 10, 2011 version
复制代码
via distrowatch.com

OpenBSD是一个从NetBSD衍生出来的类Unix操作系统。专案领导人Theo de Raadt在1995年]发起了OpenBSD专案,希望创造一个注重安全的操作系统,此外OpenBSD也以高品质的文件、坚持开放程式码以及严格的软件授权著名。OpenBSD的吉祥物是河豚。
OpenBSD包含了一些在其他操作系统缺少或是选择性的安全功能,此外OpenBSD极度重视程式码的品质,任何对核心的修改都需要经过严格的程式码审阅。OpenBSD可以在17种不同的硬件环境下运作,包含DEC Alpha、Intel i386、Hewlett-Packard PA-RISC、AMD64、Motorola 68000、PowerPC、Sun SPARC等。

OpenBSD 5.8 发布,改进硬件支持

OpenBSD 5.8 发布,改进硬件支持

源自:oschina
运维网 感谢您的阅读

相关帖子

您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|申请友链|sitemap|手机版|小黑屋|Archiver|运维网 ( 京ICP备16008201号  

GMT+8, 2016-12-11 18:01 , Processed in 0.066687 second(s), 40 queries , Xcache On.

Powered by Discuz! X3.2 Licensed

© 2001-2013 Comsenz Inc.

快速回复 返回顶部 返回列表