shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

282
active users

#openbsd

25 posts24 participants2 posts today
Ariadne Conill 🐰:therian:<p>As <a href="https://social.treehouse.systems/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> begins to adopt <a href="https://social.treehouse.systems/tags/pkgconf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pkgconf</span></a>, they have been revamping the pkgconf manual.</p><p>Questions asked during that process have led us to identify a few corner case bugs in pkgconf that probably don't really matter to anyone in practice.</p><p>But we are fixing them anyway.</p>
Kenji Aoyama<p>A test toot from nanotodon running on <a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>/luna88k.</p>
NoGoo.me<p>Today's testings is using <a href="https://gts.nogoo.me/tags/gotosocial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoToSocial</span></a> 0.19.1 on <a href="https://gts.nogoo.me/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> 7.7, using NOWASM (because :openbsd: ). So far, it seems to work ok. The data have been migrated from the FreeBSD test-instance, the monitoring looks normal and so does the inbox.<br><br>Feel free to interact with this post to have my Grafana draw colored waves ;-)<br>If it gets pretty, I may publish an extract of them :p</p>
Nico Cartron<p>[BLOG] Losing one of my evenings after an <a href="https://masto.hivane.net/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> upgrade - <a href="https://www.ncartron.org/losing-one-of-my-evenings-after-an-openbsd-upgrade.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ncartron.org/losing-one-of-my-</span><span class="invisible">evenings-after-an-openbsd-upgrade.html</span></a></p>
Bryan Steele :flan_beard:<p>Good news for anyone running heavily threaded programs (using futexes) on <a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>.</p><p>David Gwynne (dlg@) has followed up on previous work on __thrsleep/ __thrwakeup, mostly improving Go programs, to now also avoid lock contention in futex(2) calls as well.</p><p>Zoom zoom. :flan_racer:​ 🏎️​</p><p><a href="https://marc.info/?l=openbsd-cvs&amp;m=174657800928110&amp;w=2" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">marc.info/?l=openbsd-cvs&amp;m=174</span><span class="invisible">657800928110&amp;w=2</span></a></p><p>Context: <a href="https://marc.info/?l=openbsd-cvs&amp;m=173275914606965&amp;w=2" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">marc.info/?l=openbsd-cvs&amp;m=173</span><span class="invisible">275914606965&amp;w=2</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mstdn.io/@wolf480pl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>wolf480pl</span></a></span> So yeah, I think that <em>everything has compromises</em> to some extent.</p><ul><li>I'm shure <a href="https://infosec.space/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> could even up their <a href="https://infosec.space/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> if they were willing to break <a href="https://infosec.space/tags/POSIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>POSIX</span></a> and <a href="https://infosec.space/tags/compatibility" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compatibility</span></a> in general for their distro, but that'll only introduce more headaches and pain along the way.</li></ul><p>I chose <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> as basis for <span class="h-card" translate="no"><a href="https://infosec.space/@OS1337" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>OS1337</span></a></span> because it solves the <a href="https://infosec.space/tags/driver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>driver</span></a> problem for me and I know it. I'm just complete shit with <a href="https://infosec.space/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> which may arguably be the better option targeting low-end systems, but that'll again result in more pain and frustration getting other <a href="https://infosec.space/tags/apps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apps</span></a> ported over when I can't just say: "Target linux-<a href="https://infosec.space/tags/i486" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>i486</span></a> and statically compile in all your dependencies" to any 3rd party as starting point.</p>
Bryan Steele :flan_beard:<p>7.7 release packages are now ready for <a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>/macppc (powerpc). 🐡:flan_thumbs:​</p><p><a href="https://marc.info/?l=openbsd-cvs&amp;m=174656129420745&amp;w=2" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">marc.info/?l=openbsd-cvs&amp;m=174</span><span class="invisible">656129420745&amp;w=2</span></a></p>
Parade du Grotesque 💀<p>You should know: <a href="https://mastodon.sdf.org/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> 7.7 now has its first security patch for an NFS issue:</p><p><a href="https://www.openbsd.org/errata77.html#p001_nfs" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openbsd.org/errata77.html#p001</span><span class="invisible">_nfs</span></a></p><p>001: SECURITY FIX: May 5, 2025 All architectures<br>Kernel of NFS server could crash if nfsd(8) is enabled and an evil NFS request is sent to it. </p><p>:openbsd:</p>
alios<p>Anyone success in implementing NAT64 on <a href="https://23.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> where the egress interface lives in another rdomain then the incoming interface. Path out works just fine (af-to + rtable in pf work as expected) and I see ipv4 packets going out and replys coming back. There is also a pf state created but unlinke "normal v6 traffic" where returning packages are put back into the correct rdomain this does not seem to work for af-to + trable created pf states.</p>
vermaden<p>Latest 𝗩𝗮𝗹𝘂𝗮𝗯𝗹𝗲 𝗡𝗲𝘄𝘀 - 𝟮𝟬𝟮𝟱/𝟬𝟱/𝟬𝟱 (Valuable News - 2025/05/05) available.</p><p> <a href="https://vermaden.wordpress.com/2025/05/05/valuable-news-2025-05-05/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vermaden.wordpress.com/2025/05</span><span class="invisible">/05/valuable-news-2025-05-05/</span></a></p><p>Past releases: <a href="https://vermaden.wordpress.com/news/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vermaden.wordpress.com/news/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.bsd.cafe/tags/verblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>verblog</span></a> <a href="https://mastodon.bsd.cafe/tags/vernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vernews</span></a> <a href="https://mastodon.bsd.cafe/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.bsd.cafe/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a> <a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/netbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.bsd.cafe/tags/unix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unix</span></a> <a href="https://mastodon.bsd.cafe/tags/zfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zfs</span></a> <a href="https://mastodon.bsd.cafe/tags/opnsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.bsd.cafe/tags/ghostbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ghostbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/solaris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>solaris</span></a> <a href="https://mastodon.bsd.cafe/tags/vermadenday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vermadenday</span></a></p>
Bryan Steele :flan_beard:<p>A very welcome change in <a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> -current that impacts software which restrict filesystem access with unveil(2), but permit access to /tmp (like web browsers). :flan_thumbs:​</p><p>ssh-agent(1) listener sockets and forwarded sockets in sshd(8) will now be under ~/.ssh/agent instead.</p><blockquote><p>djm@ modified src/usr.bin/ssh/*: Move agent listener sockets from /tmp to under ~/.ssh/agent for both ssh-agent(1) and forwarded sockets in sshd(8).</p><p>This ensures processes (such as Firefox) that have restricted filesystem access that includes /tmp (via unveil(3)) do not have the ability to use keys in an agent.</p><p>Moving the default directory has the consequence that the OS will no longer clean up stale agent sockets, so ssh-agent now gains this<br>ability.</p><p>To support $HOME on NFS, the socket path includes a truncated hash of the hostname. ssh-agent will by default only clean up sockets from the same hostname.</p><p>ssh-agent gains some new flags: -U suppresses the automatic cleanup of stale sockets when it starts. -u forces a cleanup without keeping a running agent, -uu forces a cleanup that ignores the hostname. -T makes ssh-agent put the socket back in /tmp.</p><p>feedback deraadt@ naddy@<br>doitdoitdoit deraadt@</p></blockquote><p><a href="https://bsd.network/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a></p>
Fossery Tech :debian: :gnome:<p>Brave open sources Cookiecrumbler, an AI-powered tool to automatically detect and block cookie consent banners, currently running on Brave servers, with plans to move it to the browser:<br><a href="https://betanews.com/2025/04/27/brave-cookiecrumbler-open-source-cookie-notice-blocker/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">betanews.com/2025/04/27/brave-</span><span class="invisible">cookiecrumbler-open-source-cookie-notice-blocker/</span></a></p><p>Kdenlive 25.04 released with AI-powered background removal plugin, OpenTimelineIO import/export, refactored audio thumbnail system, ability to change the duration of multiple adjacent clips in a single action and more:<br><a href="https://alternativeto.net/news/2025/4/kdenlive-25-04-is-out-with-background-removal-opentimelineio-import-export-and-much-more/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alternativeto.net/news/2025/4/</span><span class="invisible">kdenlive-25-04-is-out-with-background-removal-opentimelineio-import-export-and-much-more/</span></a><br>(That background removal tool is actually a pretty good use of AI, and it runs locally, so no need to give Kdenlive Internet access.)<br>(The ability to change duration of multiple clips at once is also pretty useful, I might attempt to update Kdenlive to get that feature, and hope it doesn't break lol.)</p><p>Joplin 3.3 released with various accessibility improvements (keyboard navigation, screen reader support, higher contrast UI elements etc.), option to collapse or expand all notebook hierarchies with a single button, run multiple independent instances for better workspace management on desktop, new search dialog for quick linking of notes, Markdown auto-replacement in Rich Text Editor, improved focus handling in modals on mobile, support for attaching audio recordings to notes and enhanced voice typing on Android, redesigned "New Note" menu:<br><a href="https://alternativeto.net/news/2025/4/joplin-3-3-brings-rich-text-updates-audio-recording-attachments-ui-improvements-and-more/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alternativeto.net/news/2025/4/</span><span class="invisible">joplin-3-3-brings-rich-text-updates-audio-recording-attachments-ui-improvements-and-more/</span></a></p><p>AdGuard's CLI adblocker for Linux reached version 1.0, includes app exclusion feature, differential filter updating, interactive setup wizard:<br><a href="https://betanews.com/2025/04/29/how-to-install-adguard-v1-0-stable-on-linux/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">betanews.com/2025/04/29/how-to</span><span class="invisible">-install-adguard-v1-0-stable-on-linux/</span></a></p><p>OpenBSD 7.7 released with performance boosts, expanded hardware support, support for Scalable Vector Extension (SVE) and enabling PAC on hardware with the new QARMA3 cipher, improved support for running the system in QEMU, kernel improvements etc.:<br><a href="https://alternativeto.net/news/2025/4/openbsd-7-7-released-with-performance-boosts-expanded-hardware-support-and-much-more/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alternativeto.net/news/2025/4/</span><span class="invisible">openbsd-7-7-released-with-performance-boosts-expanded-hardware-support-and-much-more/</span></a></p><p>(more FOSS news in comment)</p><p><a href="https://social.linux.pizza/tags/WeeklyNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WeeklyNews</span></a> <a href="https://social.linux.pizza/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://social.linux.pizza/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://social.linux.pizza/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://social.linux.pizza/tags/FOSSNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSSNews</span></a> <a href="https://social.linux.pizza/tags/OpenSourceNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSourceNews</span></a> <a href="https://social.linux.pizza/tags/Brave" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Brave</span></a> <a href="https://social.linux.pizza/tags/Cookiecrumbler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cookiecrumbler</span></a> <a href="https://social.linux.pizza/tags/Kdenlive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kdenlive</span></a> <a href="https://social.linux.pizza/tags/Joplin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Joplin</span></a> <a href="https://social.linux.pizza/tags/AdGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AdGuard</span></a> <a href="https://social.linux.pizza/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://social.linux.pizza/tags/BSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSD</span></a> <a href="https://social.linux.pizza/tags/VideoEditor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VideoEditor</span></a> <a href="https://social.linux.pizza/tags/VideoEditing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VideoEditing</span></a> <a href="https://social.linux.pizza/tags/ContentCreation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ContentCreation</span></a> <a href="https://social.linux.pizza/tags/Notetaking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Notetaking</span></a> <a href="https://social.linux.pizza/tags/AdBlocker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AdBlocker</span></a> <a href="https://social.linux.pizza/tags/OperatingSystem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperatingSystem</span></a> <a href="https://social.linux.pizza/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://social.linux.pizza/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://social.linux.pizza/tags/FosseryTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FosseryTech</span></a></p>
Ricardo Martín<p>Better the *daemon* you know than the *devil* you don't<br>:netbsd: :freebsd: :openbsd: </p><p><a href="https://mastodon.bsd.cafe/tags/runbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>runbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/netbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> <span class="h-card" translate="no"><a href="https://flipboard.com/@ZDNet" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ZDNet</span></a></span> TBH, I'd always recommend people to use <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> / <span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> / <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a> if they want a secure and private OS.</p><ul><li>Shure <em>in theory</em> one could do more <a href="https://infosec.space/tags/secure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secure</span></a> with <a href="https://infosec.space/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>, but that's neither easy to use for non-<a href="https://infosec.space/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a>-folks nor easy to onboard people into.</li></ul><p>Tails by contrast just comes with <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a>, <span class="h-card" translate="no"><a href="https://mastodon.online/@thunderbird" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thunderbird</span></a></span> and other nifty tools preconfigured from the get go and allows people to get started, regardless if it's a <a href="https://infosec.space/tags/journalist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>journalist</span></a> or someones' grandma who may not have her own dedicaded machine but instead uses an external SSD/HDD to just boot into her desktop and not rely on the <a href="https://infosec.space/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a>-laced <a href="https://infosec.space/tags/Internetcaf%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internetcafé</span></a>'s <a href="https://infosec.space/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> installation...</p><ul><li>And getting people setup is really easy, as <span class="h-card" translate="no"><a href="https://chaos.social/@cryptoparty" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cryptoparty@chaos.social</span></a></span> / <span class="h-card" translate="no"><a href="https://mastodon.earth/@cryptoparty" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cryptoparty@mastodon.earth</span></a></span> / <a href="https://infosec.space/tags/CryptoParty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CryptoParty</span></a> have shown folks all the time.</li></ul><p>Not to mention it avoids a lot of <a href="https://infosec.space/tags/pitfalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pitfalls</span></a> that other distros like <span class="h-card" translate="no"><a href="https://infosec.exchange/@kalilinux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kalilinux</span></a></span> will deliberaltely keep open because their goals are diametral to that.</p>
Felix Palmen :freebsd: :c64:<p><span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@jadi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jadi</span></a></span> This "<a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> is secure!" claim always annoyed me a lot, mainly because it doesn't tell anything: <a href="https://mastodon.bsd.cafe/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> in IT can only ever be defined in a context of <a href="https://mastodon.bsd.cafe/tags/threat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threat</span></a> models. Without that, it's meaningless. Somewhat recently, I discovered this:</p><p><a href="https://isopenbsdsecu.re/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">isopenbsdsecu.re/</span><span class="invisible"></span></a></p><p>I should warn it uses some sarcasm and other confrontative language in some parts, unfortunately. But it seems to be a pretty professional analysis and assessment of (mostly) the "mitigations" OpenBSD provides in an attempt to counter "typical" attacks by at least making them harder.</p><p>I should also add that I consider this a very interesting and helpful read, and still consider OpenBSD a great project that came up with lots of great stuff (I recently used their <a href="https://mastodon.bsd.cafe/tags/bcrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bcrypt</span></a> code after doing some research on password hashing, for example). And I don't agree with every single criticism on that page either. I just think it's important to build assessments whether something "is secure" on a serious analytical foundation.</p>
Jadi<p>What if I told you there’s an OS that’s ultra-secure, actively developed — but without much noise? What if I add that Windows, Mac &amp; Android are all using parts of this Operating System?</p><p><a href="https://youtu.be/CuieeXXhfvY" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/CuieeXXhfvY</span><span class="invisible"></span></a></p><p>Yes, its <a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a> <a href="https://mastodon.bsd.cafe/tags/review" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>review</span></a> <a href="https://mastodon.bsd.cafe/tags/release" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>release</span></a></p>
David Cantrell 🏏<p>The new <a href="https://fosstodon.org/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> release seems to not like <a href="https://fosstodon.org/tags/CPAN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPAN</span></a>, so rolling back to 7.6 for now, I may attempt to debug later.</p>
Stefano Marinelli<p>Let me introduce you to aceBSD! Yesterday, while I was out grocery shopping, I saw a special offer on a final unit, and I had already been thinking for a while about getting a mid-range laptop to take with me to conferences, on trips, etc. Something small, practical, with an HDMI port, and capable of running at least one of the BSDs decently. After some careful thought, I decided to go for it today.</p><p>It's an Acer Swift Go 14 - with an Intel i5, 16 GB of RAM, and a 512 GB NVMe SSD. What I really like is that it’s compact and has a high-definition OLED screen, a good keyboard, and for the rest... we’ll see. I just used Clonezilla to make a backup of the preinstalled Windows (I didn’t even boot into it...) and I’m now installing OpenBSD. I had to disable VMD (from a hidden BIOS menu) because otherwise the installer wouldn’t detect the NVMe. It also seems to detect the Wi-Fi, but I’m proceeding with a USB-C Ethernet adapter just to be safe.</p><p>I got it at a good price, so this could be the ideal solution. Fingers crossed, and… we’ll see!</p><p>I'll keep posting about this adventure, with the hashtag <a href="https://mastodon.bsd.cafe/tags/aceBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aceBSD</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/RunBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/aceBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aceBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/NewLaptop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NewLaptop</span></a></p>
Bryan Steele :flan_beard:<p><a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> -current has replaced its own aging (freedesktop.org compatible) pkg-config(1), originally written in Perl by ckuethe@, espie@ &amp; jasper@, with the more modern and actively maintained pkgconf implementation.</p><blockquote><p>tb@ modified src/usr.bin/pkgconf/*: import pkgconf 2.4.3</p><p>Our homegrown Perl-based pkg-config cannot cope with the giant DAGs [Directed Acyclic Dependency Graphs] arising in modern software, especially from the abseil-cpp and protobuf family. Waiting minutes for configure to complete in some ports is just awful.</p><p>Thus we're switching to the sanely-licenced, widely used pkgconf, which is actively maintained, written in a sensible dialect of C, and does not suffer from these performance issues.</p><p>Work that should happen in tree during this cycle:</p><ul><li>see what we want to do with our old manual and pkgconf's</li><li>add pledge and unveil.</li></ul><p>Initial work done by espie during or right after p2k23, support from many.<br>ok semarie</p></blockquote><p>The old pkg-config implementation has now been unlinked from the build, but not yet removed from the tree.</p><blockquote><p>tb@ modified src/usr.bin/Makefile: switch from pkg-config to pkgconf</p><p>leave the old pkg-config in the tree for now.</p></blockquote>
arosano 🇩🇰🇮🇱<p>Qubit and I are pair programming python solutions for my undergraduate students.<br><a href="https://mastodon.bsd.cafe/tags/caturday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>caturday</span></a> <a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a></p>