mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#openbsd

49 Beiträge45 Beteiligte0 Beiträge heute
Paul SomeoneElse<a href="https://alive.d34d.net/" rel="nofollow noopener" target="_blank">https://alive.d34d.net/</a><br><br>I am so stuck in making this C/OpenBSD based website.<br><br>It's funny how much work it is to do things that are like trivial in<br>Flask/PHP/Django etc.<br><br>But I don't mind at all. I'm pretty confident I could run this on<br>any low level hardware. Like I keep wanting a 486 or pentium 1<br>and it would probably run just fine. I guess the https might be<br>the real expensive part :)<br><br>Anywho, I added email sending:<br><a href="https://alive.d34d.net/emailtest/" rel="nofollow noopener" target="_blank">https://alive.d34d.net/emailtest/</a><br><br>Again you won't see anything, it sends it to me.<br>I am afraid to put an email form on a public page that did<br>anything more than email me.<br><br>If you notice I put ?r=12312312-123123 url params on all of<br>links that would have dynamic content. That is because I am using<br><a href="https://snac.d34d.net?t=links2" class="mention hashtag" rel="nofollow noopener" target="_blank">#links2</a> to an it will otherwise cache the pages.<br><br><a href="https://snac.d34d.net?t=openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#OpenBSD</a> <a href="https://snac.d34d.net?t=c" class="mention hashtag" rel="nofollow noopener" target="_blank">#C</a> <a href="https://snac.d34d.net?t=links2" class="mention hashtag" rel="nofollow noopener" target="_blank">#links2</a><br><br><br>
Justine SmithiesCan some <a href="https://snac.smithies.me.uk?t=openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#OpenBSD</a> wiz look over this error I get when trying to install <code>fastfetch</code> and I am on the latest current snapshot and have run <code>doas pkg_add -u</code>.<br><br><pre>openbsd-desktop$ doas pkg_add fastfetch<br>doas (justine@openbsd-desktop.localdomain) password: <br>quirks-7.124 signed on 2025-07-17T15:51:04Z<br>Can't install python-3.12.11 because of libraries<br>|library util.20.1 not found<br>| /usr/lib/libutil.so.20.0 (system): minor is too small<br>| /usr/lib/libutil.so.21.0 (system): bad major<br>Direct dependencies for python-3.12.11 resolve to gettext-runtime-0.23.1 libb2-0.98.1v0 xz-5.8.1 libffi-3.5.1 sqlite3-3.49.1p1 bzip2-1.0.8p0<br>Full dependency tree is libiconv-1.17 bzip2-1.0.8p0 libb2-0.98.1v0 gettext-runtime-0.23.1 sqlite3-3.49.1p1 libffi-3.5.1 xz-5.8.1<br>Can't install python-3.12.11 because of libraries<br>Direct dependencies for python-3.12.11 resolve to bzip2-1.0.8p0 xz-5.8.1 sqlite3-3.49.1p1 libffi-3.5.1 libb2-0.98.1v0 gettext-runtime-0.23.1<br>Full dependency tree is libiconv-1.17 gettext-runtime-0.23.1 libb2-0.98.1v0 xz-5.8.1 bzip2-1.0.8p0 sqlite3-3.49.1p1 libffi-3.5.1<br>Can't install py3-packaging-25.0: can't resolve python-3.12.11<br>Can't install glib2-2.84.3: can't resolve python-3.12.11,py3-packaging-25.0<br>Can't install glib2-2.84.3: can't resolve python-3.12.11,py3-packaging-25.0<br>Can't install dconf-0.40.0p2: can't resolve glib2-2.84.3<br>Can't install fastfetch-2.47.0: can't resolve glib2-2.84.3,dconf-0.40.0p2,python-3.12.11<br>Couldn't install dconf-0.40.0p2 fastfetch-2.47.0 glib2-2.84.3 py3-packaging-25.0 python-3.12.11<br>openbsd-desktop$ <br></pre>I get the same if I try and install <code>firefox</code> and <code>neovim</code> too. I'm hoping it's as Bryan said earlier and I'm going to have to wait for things to catch up. But thought I'd better post the output showing the exact errors about <code>libutil</code>.<br><br>
JdeBP<p>[…Continued]</p><p><a href="https://tty0.social/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a>, <a href="https://tty0.social/tags/NetBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetBSD</span></a>, and <a href="https://tty0.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> still directly maintain actual utmpx files</p><p>Once one realizes that instead of looking at this as login running stuff one can regard it as effectively UPSERT/DELETE triggers on the active logins table, that need not be enacted by login at all, the most currently BSD-ish way of doing this presents itself: a kqueue() EVFILT_VNODE watch on utmpx/utx.active and some way of detecting what the diffs are.</p><p>[Continued…] <a href="https://tty0.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://tty0.social/tags/DesktopBus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DesktopBus</span></a> <a href="https://tty0.social/tags/nosh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nosh</span></a></p>
Stefano Marinelli<p>My inaugural article for the BSD Journal is slated for publication - it will be released Monday morning. </p><p>The first authors are already being granted their accounts to contribute new, engaging content - by the community, for the community. </p><p>Stay tuned!</p><p><a href="https://mastodon.bsd.cafe/tags/BSDJournal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSDJournal</span></a> <a href="https://mastodon.bsd.cafe/tags/BSDCafe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSDCafe</span></a> <a href="https://mastodon.bsd.cafe/tags/StayTuned" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StayTuned</span></a> <a href="https://mastodon.bsd.cafe/tags/RunBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RunBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a></p>
OSNews<p>When root meets immutable: OpenBSD chflags vs. log tampering</p><p>ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauth</p><p><a href="https://www.osnews.com/story/142841/when-root-meets-immutable-openbsd-chflags-vs-log-tampering/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">osnews.com/story/142841/when-r</span><span class="invisible">oot-meets-immutable-openbsd-chflags-vs-log-tampering/</span></a></p><p><a href="https://mstdn.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a></p>
Alexander Shendi<p>New computing setup...</p><p><a href="https://rollenspiel.social/tags/HP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HP</span></a> <a href="https://rollenspiel.social/tags/Stream7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stream7</span></a> <a href="https://rollenspiel.social/tags/Baytrail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Baytrail</span></a> <a href="https://rollenspiel.social/tags/amd64" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amd64</span></a> <a href="https://rollenspiel.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a></p>
Ólafur Jens Sigurðsson<p><span class="h-card" translate="no"><a href="https://fediscience.org/@m_correa_m" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>m_correa_m</span></a></span> meh, Linux is so yesterday, <a href="https://c.im/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> is my daily driver 🙂</p>
Justine Smithies<a href="https://snac.smithies.me.uk?t=openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#OpenBSD</a> question:<br><br>Is there a site that shows the build status of various ports ?<br>
Rav Sha'ul<p>What is the best way to install <a href="https://mastodon.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> with 2 SSD with the first drive for OS and programs and second drive for storage of files but able to remove second drive and connect to other OpenBSD systems to read/write the drive?</p>
jcccb<p>Immutable Logs are very important for any forensic investigation and even a requirement in ISO 27001.</p><p>Here is one way to do it on <a href="https://mastodon.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a>!<br><a href="https://rsadowski.de/posts/2025/openbsd-immutable-system-logs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rsadowski.de/posts/2025/openbs</span><span class="invisible">d-immutable-system-logs/</span></a></p>
Lobsters<p>When Root Meets Immutable: OpenBSD chflags vs. Log Tampering <a href="https://lobste.rs/s/xzxxng" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/xzxxng</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a><br><a href="https://rsadowski.de/posts/2025/openbsd-immutable-system-logs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rsadowski.de/posts/2025/openbs</span><span class="invisible">d-immutable-system-logs/</span></a></p>
Hacker News<p>When Root Meets Immutable: OpenBSD Chflags vs. Log Tampering</p><p><a href="https://rsadowski.de/posts/2025/openbsd-immutable-system-logs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rsadowski.de/posts/2025/openbs</span><span class="invisible">d-immutable-system-logs/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> <a href="https://mastodon.social/tags/Immutable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Immutable</span></a> <a href="https://mastodon.social/tags/Log" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Log</span></a> <a href="https://mastodon.social/tags/Tampering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tampering</span></a> <a href="https://mastodon.social/tags/Root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Root</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a></p>
Peter N. M. Hansteen<p>"Recent and not so recent changes in OpenBSD that make life better (and may turn up elsewhere too)" <a href="https://nxdomain.no/~peter/recent-and-not-so-recent_changes_in_openbsd_that_make_life_better.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/recent-and-</span><span class="invisible">not-so-recent_changes_in_openbsd_that_make_life_better.html</span></a> and "The Impending Doom of Your Operating System Going to or Past 11, Versus the Lush Oasis of Open Source Systems" <a href="https://nxdomain.no/~peter/blog_wild_wild_world_of_windows.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/blog_wild_w</span><span class="invisible">ild_world_of_windows.html</span></a> - two 2021-vintage pieces of mine that are still relevant, unfortunately/fortunately <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows11</span></a> <a href="https://mastodon.social/tags/freesofware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesofware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libresoftware</span></a> <a href="https://mastodon.social/tags/softwarefreedom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>softwarefreedom</span></a> <a href="https://mastodon.social/tags/sovereigncomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sovereigncomputing</span></a></p>
Nico Cartron<p>[BLOG] One of my blog articles featured on the <span class="h-card" translate="no"><a href="https://bsd.network/@bsdnow" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bsdnow</span></a></span> podcast! - <a href="https://www.ncartron.org/one-of-my-blog-articles-featured-on-the-bsd-now-podcast-episode.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ncartron.org/one-of-my-blog-ar</span><span class="invisible">ticles-featured-on-the-bsd-now-podcast-episode.html</span></a> <a href="https://masto.hivane.net/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a></p>
Peter N. M. Hansteen<p>When Root Meets Immutable: OpenBSD chflags vs. Log Tampering <a href="https://www.undeadly.org/cgi?action=article;sid=20250718072438" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250718072438</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/immutable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>immutable</span></a> <a href="https://mastodon.social/tags/chflags" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chflags</span></a> <a href="https://mastodon.social/tags/logs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>logs</span></a> <a href="https://mastodon.social/tags/logtampering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>logtampering</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Rafael Sadowski<p>New blog post: When Root Meets Immutable: OpenBSD chflags vs. Log Tampering</p><p>Started as curiosity about "dead" kernel code, ended up solving real-world log tampering problems. Sometimes the best security features are hiding in plain sight. </p><p><a href="https://rsadowski.de/posts/2025/openbsd-immutable-system-logs/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rsadowski.de/posts/2025/openbs</span><span class="invisible">d-immutable-system-logs/</span></a> </p><p><a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> <a href="https://bsd.network/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://bsd.network/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://bsd.network/tags/Compliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Compliance</span></a></p>
BastilleBSD :freebsd:<p>This question is for anyone that manages their own servers and monitors the health of services.</p><p>What is your preferred method of receiving alerts?</p><p><a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosting</span></a> <a href="https://fosstodon.org/tags/monitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>monitoring</span></a> <a href="https://fosstodon.org/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> <a href="https://fosstodon.org/tags/Cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloud</span></a> <a href="https://fosstodon.org/tags/BastilleBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BastilleBSD</span></a></p>
Alexander Shendi<p><span class="h-card" translate="no"><a href="https://honk.tedunangst.com/u/tedu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tedu</span></a></span> </p><p>Regarding:<br><a href="https://flak.tedunangst.com/post/OpenBSD-on-HP-Stream-7" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">flak.tedunangst.com/post/OpenB</span><span class="invisible">SD-on-HP-Stream-7</span></a></p><p>I noticed that the latest release (<a href="https://rollenspiel.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> 7.7) installs without a hitch. Of course you still need the following:<br>* USB hub.<br>* USB keyboard<br>* USB WiFi Dongle or Ethernet card<br>* For X11: USB mouse</p><p>But no disabling of kernel drivers in GENERIC.<br>Even the Intel graphics are supported.</p>
Justine SmithiesAny <a href="https://snac.smithies.me.uk?t=openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#OpenBSD</a> folk running <code>7.7-current</code> having issues not being able to install <code>python-3.12.11</code> ???<br><br>I get the following error just doing <code>doas pkg_add -u</code><br><br><pre>Can't install python-3.12.11 because of libraries | library util.20.1 not found<br></pre>I can't even install <code>neovim</code> or <code>firefox</code> because of similar issues. This is a new install and I did the normal documented <code>doas sysupgrade -s</code> to get to current. I'm considering a full wipe and start again although I never had this problem doing the same a few months ago ???<br>
JdeBP<p><span class="h-card" translate="no"><a href="https://mastodon.social/@pitrh" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>pitrh</span></a></span> </p><p>I remember this one from the 1990s. Unless one carefully retains the same structure layout, everything that uses getc(), putc(), and fileno() at minimum is broken until recompiled from source.</p><p><a href="https://mastodonapp.uk/tags/StandardC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StandardC</span></a> <a href="https://mastodonapp.uk/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a></p>