mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#runbsd

10 Beiträge10 Beteiligte2 Beiträge heute

Updated post!

The first time I installed NetBSD I used `sysinst`, a menu-based program that runs in the console. It has a concise layout and I was quickly up-and-running on my new BSD system.

For my next install I wanted to include disk encryption to protect personal data in case the device is lost or stolen. There is a trade-off to be made between how much to encrypt, the convenience of operating the system, and the ability for the system to boot...

dwarmstrong.org/netbsd-encrypt

www.dwarmstrong.orgManual NetBSD Installation with Disk Encryption ☯ Daniel Wayne ArmstrongLibre all the things

Some time ago I tried to build my own blog using amazing #BSSG It was surprisingly easy.
I did it mostly for educational purposes. I never blogged in English or wrote any lengthy texts. And I never used BSSG, so I wanted to test that out too.
But I had some thoughts about our current state of affairs, so I wrote my musings called "Digital Doomsday is coming and we should prepare for it".
It's just some thoughts about the world where there is no more Internet (or worse).
Let me know what do you think about it.
iyer.ru/2025/08/09/digital-doo

P.S. My blog is still under construction, I'm still figuring out some things.

iyer.ruDigital Doomsday is coming and we should prepare for it | iyer.ruWhat would we do if the Internet disappeared?

Did you notice? The registration was temporary open today and we welcome all new users! 🥳

While we still have a plenty of free resources, we might switch from an open registration model to a recommendation / mentor model where already present users can invite new users.

This is not yet fix but a possibility to avoid misusage and abuse where our primary goal is still to provide resources for people interested into BSD based systems. Maybe also closer integrations with BSD communities like the BSD Cafe (@stefano) could be an approach.

#freevps #free #education #ipv6 #hosting #bhyve #proxmox #freebsd #netbsd #openbsd #runbsd #boxybsd @gyptazy

Thanks to SeaweedFS, I've set up two replicas of the BSD Cafe's media. One is on a backup server (for disaster recovery purposes only, also containing the hourly zfs-autobackup backups), and the other is on a Raspberry Pi 4 running FreeBSD, which is one of my home backup servers - just one meter away from my desk.
I've also configured Nginx in a jail, so when I'm at home, the BSD Cafe's media is served directly from the local replica.
The performance is lightning fast.

#BSDCafe#SeaweedFS#S3

A new BSDCan video has posted:

Improvements to FreeBSD KASAN By Zhuo Ying Jiang Li

youtu.be/pwwSdQi0NUI

KASAN is a kernel sanitizer commonly combined with fuzzing techniques to detect memory corruption bugs, some of which could lead to security compromise. Currently, FreeBSD's KASAN can only detect a subset of temporal safety vulnerabilities due to the lack of a delayed freeing mechanism of freed items. Furthermore, the effectiveness of detecting spatial safety vulnerabilities is also limited because FreeBSD's KASAN does not add redzone padding around UMA allocations.

In this talk, I will present my current work on improving the effectiveness of KASAN by extending it with a quarantining mechanism and injecting redzones around UMA allocations. The development was done on CheriBSD, a fork of FreeBSD with CHERI support, to explore the synergy between CHERI and KASAN. I plan to upstream the relevant improvements to FreeBSD.

A new BSDCan video has been posted:

Sleep on FreeBSD: A bedtime story about S0ix By Aymeric Wibo

youtu.be/RCjPc4X2Edc

One of the main things still missing in FreeBSD for it to be usable on modern laptops is the ability to go to sleep. In the past, this was done using ACPI S3, but newer laptops have removed this in favour of S0ix, leaving FreeBSD without support for suspend on those machines.

This talk aims to get the casual user familiar enough with the terms and concepts behind power management, such that they can understand what's going on, what's already possible, what can be done, and be able to narrow down power management issues they might encounter.
Full description

This talk will cover:

The background and history of power management on FreeBSD, from APM, to ACPI S3, and finally to s2idle/S0ix, and how to know whether or not a given laptop supports S3 or S0ix or both.

What the full suspend process looks like with modern standby, going into details like ACPI D-states & power resources, SPMC DSMs (acpi_spmc), the AMD SMU (system management unit, amdsmu), etc. and some of the challenges encountered.

Specifics about sleep on AMD, such as USB4 power management in the HCM (host connection manager) and GPIO controller interrupt servicing.

Cover debugging with residency counters, with the SMU on AMD, _LPI objects, and LPIT on Intel.

Niceties and potential future work, such as idleness determination, a powertop equivalent, a built in amd_s2idle.py equivalent (for debugging sleep issues), etc.

A new BSDCan Video has been posted:

porch(1): it's not what you expect(1) By Kyle Evans

youtu.be/Drbk4rEH1sk

In a world ruled by expect(1) and TCL, we discuss an alternative that was developed based on scripting with lua instead. porch(1) was developed with a language already available and used in FreeBSD base in mind, with the aim of TTY testing via pts(4).

The overall aim of this project is to provide a simple subset of expect(1) functionality specifically aimed at developer and sysadmin automation in another popular language with many niceties for scripted interaction.

In this talk, we'll specifically discuss:

The motivation for writing porch

The underlying design/philosophy (with diagrams to describe the model)

Bundled-in functionality beyond script execution

Practical samples used in FreeBSD today

--

The author has been a FreeBSD src committer since 2017, working on many parts of the tree and gradually introducing lua into the base system. His most recent exploits include improving base system boot environment management with bectl(8) and excursions into the tty layer.

Get ready for the European *BSD event of 2025! 😈⛳🐡

54 days to go!

BSDCan Videos are being published. It can give you a taste of the great content you can witness live in Zagreb.

Grab your tickets 🎟️ at tickets.eurobsdcon.org

The schedule 📅 is at events.eurobsdcon.org/2025/sch

For everything else, peek at 2025.eurobsdcon.org/
More information is added all the time.

EuroBSDCon 2025 in Zagreb, Croatia 🇭🇷
September 25-28, 2025

#RUNBSD#FreeBSD#NetBSD

A new BSDCan video has been posted:

A packet's journey through pf By Kristof Provost

youtu.be/JtSg6ylDALo

A walkthrough of a packet's journey through (FreeBSD's) pf, concentrating on the big picture and its implications.

We'll cover when packets are inspected, when rules are evaluated and how states are used. Along the way we'll cover what DTrace probes can show us, what some of pfctl's counters mean and just how many times pf can look at a single packet.

This talk is intended for firewall admins looking for a deeper understanding and aspiring pf developers. It is not a "How to use pf" talk.

Another record broken! Highest monthly donation to date, it tipped the scale even earlier for silver sponsorship again.

21 new VMs were added and 79 VMs were renewed.

We donated €1395 to the #OpenBSD Foundation, €55070 since we started.

Thank you, our users, and OpenBSD developers for an awesome OS!

Stay safe, healthy & sane!

#RUNBSD in 2025