norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.5K
active users

#netbsd

23 posts19 participants1 post today
Jay 🚩 :runbsd:<p>Celebrating NetBSD's 32nd birthday today! Marked the occasion by donating $32 to the <span class="h-card"><a href="https://bsd.network/@netbsd" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>netbsd</span></a></span> Foundation. So much respect for a project that truly lives up to "Of course it runs NetBSD". 💪 Consider donating too! <a href="https://www.netbsd.org/donations/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">netbsd.org/donations/</span><span class="invisible"></span></a><br><a href="https://bsd.network/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> <a href="https://bsd.network/tags/RunBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunBSD</span></a> <a href="https://bsd.network/tags/unix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unix</span></a> <a href="https://bsd.network/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://bsd.network/tags/pkgsrc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pkgsrc</span></a></p>
Bitslingers-R-Us<a class="hashtag" href="https://zia.io/tag/netbsd" rel="nofollow noopener noreferrer" target="_blank">#NetBSD</a> <a class="hashtag" href="https://zia.io/tag/pkgsrc" rel="nofollow noopener noreferrer" target="_blank">#pkgsrc</a> 2025Q1 binary package counts for mid April:<br><br>9.0: earmv4 2468 (not yet started)<br>9.0: m68k 1598 (+87)<br><br>10.0: aarch64eb 19765 (+3015)<br>10.0: earmv4 9645 (+55)<br>10.0: m68k 5408 (+312)<br>10.0: sh3el 9940 (-24 - cleaned up some stragglers)<br>10.0: sparc64 13707 (-7 - cleaned up some stragglers)<br>10.0: vax 8353 (+83)
Daniel Wayne Armstrong<p>Discovered today the `last(1)` command in NetBSD (also in Linux) that outputs a list of the last logins of users. Nice! :netbsd:</p><p><a href="https://fosstodon.org/tags/Shell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shell</span></a> <a href="https://fosstodon.org/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a></p>
Stephen Borrill<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@dwarmstrong" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dwarmstrong</span></a></span> Great write-up. I think <a href="https://justfollow.me.uk/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> dmesg is pretty much the cleanest out there which makes this sort of thing much easier compared to grubbing about in e.g. /dev/disk</p>
TronNerd82<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@linux_mclinuxface" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>linux_mclinuxface</span></a></span> I use <a href="https://mastodon.social/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> from time to time. Good OS, but <a href="https://mastodon.social/tags/Slackware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Slackware</span></a> is my one true love. I'm 19.</p>
Felix Palmen :freebsd: :c64:<p>Next <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> improvement: Make sure to <a href="https://mastodon.bsd.cafe/tags/wipe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wipe</span></a> <a href="https://mastodon.bsd.cafe/tags/passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a> from RAM directly after used. That's more of a <a href="https://mastodon.bsd.cafe/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> precaution, because there *should* be no way how an attacker can access a running process' memory, but you never know which bugs surface 🙈.</p><p>Unexpectedly, that posed <a href="https://mastodon.bsd.cafe/tags/portability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>portability</span></a> issues. <a href="https://mastodon.bsd.cafe/tags/C11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C11</span></a> has <a href="https://mastodon.bsd.cafe/tags/memset_s" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memset_s</span></a> ... a pretty weird function, but suitable for wiping. It's there on <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> and on <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>. Not on <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> though. But NetBSD offers the much saner <a href="https://mastodon.bsd.cafe/tags/C23" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C23</span></a> function <a href="https://mastodon.bsd.cafe/tags/memset_explicit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memset_explicit</span></a>. Looking at <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>, there's neither. But there is the (non-standard!) <a href="https://mastodon.bsd.cafe/tags/explicit_bzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>explicit_bzero</span></a> 🤯 .. and with glibc, it requires _DEFAULT_SOURCE to be defined as soon as you compile with a C standard version given to the compiler. This function exists on some other systems as well, but there's confusion whether it should be declared in string.h or strings.h. 🤪 </p><p>Here's the full set of compile-tests I'm now doing, only to find the best way to really erase memory:<br><a href="https://github.com/Zirias/swad/blob/master/src/bin/swad/swad.mk#L6" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Zirias/swad/blob/ma</span><span class="invisible">ster/src/bin/swad/swad.mk#L6</span></a></p><p>And if none of these functions is found, swad uses the "hacky" way that most likely works as well: Access the normal memset function via a volatile pointer.</p>
Stefano Marinelli<p>Mmm parallel seem to have some troubles on NetBSD. Sometimes it's just stuck, doesn't start to process the task.<br>For now, when BSSG will detect it's running on NetBSD, it will use the slower but more reliable sequential build process</p><p><a href="https://mastodon.bsd.cafe/tags/BSSG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSSG</span></a> <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a></p>
Daniel Wayne Armstrong<p>Disable password logins on the SERVER in favour of using SSH keys for authentication. Create the necessary SSH keys on a NetBSD CLIENT that will be used to secure access to remote devices:</p><p><a href="https://www.dwarmstrong.org/netbsd-ssh-keys/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">dwarmstrong.org/netbsd-ssh-key</span><span class="invisible">s/</span></a></p><p><a href="https://fosstodon.org/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://fosstodon.org/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> <a href="https://fosstodon.org/tags/RunBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunBSD</span></a> <a href="https://fosstodon.org/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a></p>
Felix Palmen :freebsd: :c64:<p>Today, I implemented the <a href="https://mastodon.bsd.cafe/tags/async" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>async</span></a> / <a href="https://mastodon.bsd.cafe/tags/await" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>await</span></a> pattern (as known from <a href="https://mastodon.bsd.cafe/tags/csharp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>csharp</span></a> and meanwhile quite some other languages) ...</p><p>... in good old <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a>! 😎 </p><p>Well, at least sort of.</p><p>* It requires some standard library support, namely <a href="https://mastodon.bsd.cafe/tags/POSIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>POSIX</span></a> user context switching with <a href="https://mastodon.bsd.cafe/tags/getcontext" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getcontext</span></a> and friends, which was deprecated in POSIX-1.2008. But it's still available on many systems, including <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> (with <a href="https://mastodon.bsd.cafe/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a>). It's NOT available e.g. on <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>, or Linux with some alternative libc.</p><p>* I can't do anything about the basic language syntax, so some boilerplate comes with using it.</p><p>* It has some overhead (room for extra stacks, even extra syscalls as getcontext unfortunately also always saves/restores the signal mask)</p><p>But then ... async/await in C! 🥳 </p><p>Here are the docs:<br><a href="https://zirias.github.io/poser/api/latest/class_p_s_c___async_task.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zirias.github.io/poser/api/lat</span><span class="invisible">est/class_p_s_c___async_task.html</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Felix Palmen :freebsd: :c64:<p>I finally eliminated the need for a dedicated <a href="https://mastodon.bsd.cafe/tags/thread" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thread</span></a> controlling the pam helper <a href="https://mastodon.bsd.cafe/tags/process" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>process</span></a> in <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a>. 🥳 </p><p>The building block that was still missing from <a href="https://mastodon.bsd.cafe/tags/poser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poser</span></a> was a way to await some async I/O task performed on the main thread from a worker thread. So I added a class to allow exactly that. The naive implementation just signals the main thread to carry out the requested task and then waits on a <a href="https://mastodon.bsd.cafe/tags/semaphore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>semaphore</span></a> for completion, which of course blocks the worker thread.</p><p>Turns out we can actually do better, reaching similar functionality like e.g. <a href="https://mastodon.bsd.cafe/tags/async" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>async</span></a> / <a href="https://mastodon.bsd.cafe/tags/await" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>await</span></a> in C#: Release the worker thread to do other jobs while waiting. The key to this is user context switching support like offered by <a href="https://mastodon.bsd.cafe/tags/POSIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>POSIX</span></a>-1.2001 <a href="https://mastodon.bsd.cafe/tags/getcontext" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getcontext</span></a> and friends. Unfortunately it was deprecated in POSIX-1.2008 without an obvious replacement (the docs basically say "use threads", which doesn't work for my scenario), but still lots of systems provide it, e.g. <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> (with <a href="https://mastodon.bsd.cafe/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a>) ...</p><p>The posercore lib now offers both implementations, prefering to use user context switching if available. It comes at a price: Every thread job now needs its private stack space (I allocated 64kiB there for now), and of course the switching takes some time as well, but that's very likely better than leaving a task idle waiting. And there's a restriction, resuming must still happen on the same thread that called the "await", so if this thread is currently busy, we have to wait a little bit longer. I still think it's a very nice solution. 😎 </p><p>In any case, the code for the PAM credential checker module looks much cleaner now (the await "magic" happens on line 174):<br><a href="https://github.com/Zirias/swad/blob/57eefe93cdad0df55ebede4bd877d22e7be1a7f8/src/bin/swad/cred/pamchecker.c" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Zirias/swad/blob/57</span><span class="invisible">eefe93cdad0df55ebede4bd877d22e7be1a7f8/src/bin/swad/cred/pamchecker.c</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
benz<p>Does <a href="https://mastodon.sdf.org/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> support ZRAM?</p>
Daniel Wayne Armstrong<p>In regards to DNS domains, previously when setting up Linux machines on the LAN I have just gone with whatever the installer chose as the default: "home", "lan", etc.</p><p>NetBSD amd64 installer defaults to "home" and, in reading a bit about such domains I discovered RFC 8375, which designates "'.home.arpa.'... as a special-use domain name... for non-unique use in residential home networks."</p><p>I'm using it now.</p><p><a href="https://datatracker.ietf.org/doc/html/rfc8375" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/html/</span><span class="invisible">rfc8375</span></a></p><p><a href="https://fosstodon.org/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://fosstodon.org/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a></p>
Daniel Wayne Armstrong<p>For my NetBSD install I wanted to include _disk encryption_ to protect personal data in case the device is lost or stolen.</p><p>Its not really enough to simply encrypt home directories. Passphrases and sensitive data can linger and be extracted from locations such as system logs and swap memory. There is a trade-off to be made between how much to encrypt, the convenience of operating the system, and the ability for the system to boot.</p><p>This is how I do it...</p><p><a href="https://www.dwarmstrong.org/netbsd-encrypt-install/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">dwarmstrong.org/netbsd-encrypt</span><span class="invisible">-install/</span></a></p><p><a href="https://fosstodon.org/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> <a href="https://fosstodon.org/tags/RunBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunBSD</span></a></p>
Bitslingers-R-Us<a class="hashtag" href="https://zia.io/tag/netbsd" rel="nofollow noopener noreferrer" target="_blank">#NetBSD</a> <a class="hashtag" href="https://zia.io/tag/pkgsrc" rel="nofollow noopener noreferrer" target="_blank">#pkgsrc</a> 2025Q1 package building continues!<br><br>An unexpected power outage has caused some work to need to be restarted, plus has indicated that some new UPS batteries need to be purchased :P<br><br>Some new build machines will be coming online soon :)
Felix Palmen :freebsd: :c64:<p>About the <a href="https://mastodon.bsd.cafe/tags/random" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>random</span></a> thingie ... I need random data in <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> to generate unpredictable <a href="https://mastodon.bsd.cafe/tags/session" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>session</span></a> IDs.</p><p>I previously had an implementation trying the <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>-originating <a href="https://mastodon.bsd.cafe/tags/getrandom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getrandom</span></a> if available, with a fallback to a stupid internal <a href="https://mastodon.bsd.cafe/tags/xorshift" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xorshift</span></a> <a href="https://mastodon.bsd.cafe/tags/PRNG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PRNG</span></a>, which could be disabled because it's obviously NOT cryptographically secure, and WAS disabled for the generation of session IDs.</p><p>Then I learned <a href="https://mastodon.bsd.cafe/tags/arc4random" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arc4random</span></a> is available on many systems nowadays (<a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a>, even Linux with a recent-enough glibc), so I decided to add a compile check for it and replace the whole mess with nothing but an arc4random call IF it is available.</p><p>arc4random originates from <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> and provides the only sane way to get cryptographically secure random data. It automatically and transparently (re-)seeds from OS entropy sources, but uses an internal CSPRNG most of the time (nowadays typically <a href="https://mastodon.bsd.cafe/tags/ChaCha20" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChaCha20</span></a>, so it's a misnomer, but hey ...). It never fails, it never blocks. It just works. Awesome.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@dec_hl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dec_hl</span></a></span> I know.</p><p>Besides <a href="https://infosec.space/tags/RaspberryPiOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RaspberryPiOS</span></a> there's like <span class="h-card" translate="no"><a href="https://linuxrocks.online/@bunsenlabs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bunsenlabs</span></a></span> / <a href="https://infosec.space/tags/BunsenLabs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BunsenLabs</span></a> and me dabbling (<span class="h-card" translate="no"><a href="https://infosec.space/@OS1337" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>OS1337</span></a></span>) tho technically they all are <a href="https://infosec.space/tags/i486" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>i486</span></a> as they use <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> kernels beyond the cutoff date for <a href="https://infosec.space/tags/i386" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>i386</span></a> support.</p><ul><li><a href="https://infosec.space/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> propably still supports i386 and potentially even i286...</li></ul>
vermaden<p>Latest 𝗩𝗮𝗹𝘂𝗮𝗯𝗹𝗲 𝗡𝗲𝘄𝘀 - 𝟮𝟬𝟮𝟱/𝟬𝟰/𝟭𝟰 (Valuable News - 2025/04/14) available.</p><p> <a href="https://vermaden.wordpress.com/2025/04/14/valuable-news-2025-04-14/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vermaden.wordpress.com/2025/04</span><span class="invisible">/14/valuable-news-2025-04-14/</span></a></p><p>Past releases: <a href="https://vermaden.wordpress.com/news/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vermaden.wordpress.com/news/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.bsd.cafe/tags/verblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>verblog</span></a> <a href="https://mastodon.bsd.cafe/tags/vernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vernews</span></a> <a href="https://mastodon.bsd.cafe/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.bsd.cafe/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a> <a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/netbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.bsd.cafe/tags/unix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unix</span></a> <a href="https://mastodon.bsd.cafe/tags/zfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zfs</span></a> <a href="https://mastodon.bsd.cafe/tags/opnsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.bsd.cafe/tags/ghostbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ghostbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/solaris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>solaris</span></a> <a href="https://mastodon.bsd.cafe/tags/vermadenday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vermadenday</span></a></p>
BSD NL<p>📢 Exciting news! 📢</p><p>We've set up a Signal 📱 announcement group to keep you all in the loop about the upcoming events and talks. 🚀</p><p>Join us to stay connected and never miss a 🐡😈⛳ bit! </p><p>Announcements: <a href="https://signal.group/#CjQKIPCuAMW0SvteNYtoyndOVEy2xYPIozPWlzpeAqSfmHE4EhCDjTBBLEftyzv28_Ny4SdT" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">signal.group/#CjQKIPCuAMW0Svte</span><span class="invisible">NYtoyndOVEy2xYPIozPWlzpeAqSfmHE4EhCDjTBBLEftyzv28_Ny4SdT</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/BSDNL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSDNL</span></a> <a href="https://mastodon.bsd.cafe/tags/RUNBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RUNBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/BSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSD</span></a> <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/HardenedBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HardenedBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/SecBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/DragonflyBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DragonflyBSD</span></a></p>
sinza<p>Look at my makeshift exhibit at <a href="https://bitbang.social/tags/IndyClassic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IndyClassic</span></a>!</p><p><a href="https://bitbang.social/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> <a href="https://bitbang.social/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrocomputing</span></a></p>
Stefan Scholl<p>Oops, almost forgot. My first <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> was S.u.S.E. Linux April 1995. That was 30 years ago.</p><p>Before that, I had <a href="https://mastodon.social/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> on my <a href="https://mastodon.social/tags/Amiga" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amiga</span></a> 3000, but I only booted into it to play Hack.</p>