tpid98

joined 2 years ago
 

We are pleased to announce [registration] is now open for BSDCan 2026 and the slate of papers and tutorials are as follows.

BSDCan 2026 Talks:
* Evolving a FreeBSD-Based Chaos Engineering Platform for Teaching – Andreas Kirchner
* Running Stock FreeBSD on Windows Subsystem for Linux 2 – Balaje Sankar
* Model Checking in BSD Userland and Kernel – Justin Handville
* Through MAC and Back – Kyle Evans
* Lightning Talks – Graham Percival
* A Two-Step FreeBSD Installer: Current Status and Future Plans – Alfonso Sabato Siciliano
* How FreeBSD 15 Landed – Colin Percival
* Universal Flash Storage on FreeBSD – Jaeyoon Choi
* Supporting hibernate (S4) on FreeBSD – Olivier Certner
* FreeBSD Implementation of the SMT transport protocol – Eugenio Luo
* geomman: Bringing GParted-like Partition Management to FreeBSD – Braulio Rivas Abad
* Getting Extended Error Messages from the FreeBSD Kernel – Marshall Kirk McKusick
* OpenNTPD – 20 years and a few milliseconds later – Henning Brauer
* Return of the Segment: Thread Local Storage – John Baldwin
* Heterogeneous Scheduling on FreeBSD – Minsoo Choo
* NetManager – Building products with NetBSD round 2 – Stephen Borrill
* Bringing memory safety to BSD with CHERI – Brooks Davis
* Don’t Freeze in the Cloud: Reclaiming Home Control with NetBSD – Stefano Marinelli
* What happens when you write to /dev/null – Martin Vahlensieck
* Low friction temporary VMs on FreeBSD – Martin Vahlensieck
* ZFS AnyRAID: Flexible Disk Layout – Allan Jude
* BSD Iterative Infrastructure with ZFS and Zelta: From Battle-Tested Backups to Zero-Cost Iteration – Daniel Bell
* BSD as a Foundational Platform for Nationwide Semiconductor Education in Japan – Hiroki Sato
* pkgbase in Production: A Practical Overview – Lukas Engelhardt
* Migrating from VMWare to FreeBSD bhyve – Sarder Kamal
* Geographically fault-tolerant SSH on OpenBSD – Rob Keizer
* Community Event Organizing – Michael Dexter
* OpenBSD and Temporary Blindness – Sean Howard
* Using Coverity Scan for static code analysis in NetBSD – Emmanuel Nyarko
* How Hard Could It Be? Modernizing XigmaNAS for OpenZFS 2.4.0 – Ken Wong
* “Escaping Plato’s Cave with Software Freedom: A Classical Greek Symposium with Fred – Puffy – and Beastie” – Corey Stephan

Tutorials:

* VPP on FreeBSD Tutorial – Building high capacity networks – Massimiliano Stucchi
* Introduction to TUI Programming using bsddialog – Benedict Reuschling
* Shell Scripting Tutorial for Beginners and Sysadmins – Mathias Eggers
* Build Your Own Secure Private Cloud with FreeBSD – Nils Imhoff
* Network Management with the OpenBSD Packet Filter Toolset – Peter Hansteen

BoFs
* Audio BoF – Michael Williams

Registration is now open! The closing reception, including drinks, is now included for everyone who registers before May 1st 2026. Please be sure to click the box during registration if you’re planning to attend so we can get an accurate count. Vegans, vegetarians, and omnivores will be catered to as we continue to improve conference food offerings.

See you in June!

https://www.bsdcan.org/2026/registration.html

[–] tpid98 36 points 2 months ago

Perhaps we could start by surveilling private citizens on private jets. They seem to be causing the most problems.

[–] tpid98 64 points 3 months ago (1 children)
16
submitted 5 months ago* (last edited 5 months ago) by tpid98 to c/bsd
 

Did you know that all the BSDCan 2025 videos have now been released? There are two complete playlists for each of the distribution channels: Peertube and Youtube. Thank you to the SDF for hosting Toobnix and giving us a good Peertube home to host the BSDCan videos. 

Peertube - Toobnix, by the good people of sdf.org https://toobnix.org/w/p/7xSAyg6QNPPBM38zkmWPLy

Youtube - https://www.youtube.com/playlist?list=PLeF8ZihVdpFe4u2cwVY8GgxjoFICIYyfY

#bsdcan #runbsd

 

A new BSDCan video has been posted:

Automating My FreeBSD Lab: From Setup to Daily Use with Ansible & Salt by Roller Angel
Automating My FreeBSD Lab: From Setup to Daily Use with Ansible & Salt
Abstract

<>

Managing multiple FreeBSD machines can be time-consuming, but automation makes it effortless. In this talk, I will demonstrate how I use Ansible to set up my FreeBSD lab and Salt to maintain and scale it across multiple machines—including how I configured a second FreeBSD laptop with just SSH access.

Attendees will see how automation enables:

    Seamless FreeBSD system setup using Ansible.

    Automated configuration management with Salt.

    Effortless scaling to new machines, reducing manual setup to a few commands.

By the end of the talk, attendees will understand how to leverage Ansible and Salt to build a reproducible and maintainable FreeBSD infrastructure.
Intended Audience

    FreeBSD users interested in automating system setup and maintenance.

    System administrators managing multiple FreeBSD machines.

    Anyone curious about Ansible and Salt for FreeBSD automation.

Attendees should have basic FreeBSD knowledge, but no prior experience with automation tools is required.
Outline
1. Introduction (5 min)

    Why automate?

    My FreeBSD lab & laptop setup overview.

2. Building My FreeBSD Lab with Ansible (15 min)

    Bootstrapping a new system.

    Automating system installation & package setup.

    Adding a second laptop with just SSH access.

3. Maintaining & Scaling with Salt (15 min)

    Managing configs, packages, and updates.

    Enforcing system state across multiple machines.

    How I maintain consistency between multiple devices.

4. Lessons Learned & Challenges (5 min)

    Why this method works well for FreeBSD.

    Troubleshooting automation quirks.

5. Q&A (5 min)
What Attendees Will Learn

    How to use Ansible to set up FreeBSD machines quickly.

    How Salt makes long-term configuration management effortless.

    How to automate multiple FreeBSD machines with minimal manual work.

For more information, please visit: 
https://www.bsdcan.org/2025/
- and -
https://www.bsdcan.org/2025/timetable/timetable-Automating-My-FreeBSD.html

#runbsd #freebsd #ansible

 

A new BSDCan video has been posted: ZFS Direct IO Benchmarking Pitfalls by Mateusz Piotrowski

Not too long ago, support for direct IO landed in OpenZFS after years of discussions and reviews. We truly live in the future where we can finally reject complicated caching and fully embrace the unbuffered conversations with our disks. Or can we really?

Those of you who know a bit about ZFS know that the ARC is actually pretty important (without one ZFS would historically stand for zzz 😴 instead of Zetta). How could it be then that skipping the ARC might improve performance?

During the presentation we will discuss what workloads and setups benefit from direct IO, what its limitations are, and what pitfalls to avoid during benchmarking. We will also look at the implementation to understand how all the promises of stability and compatibility were kept.

Direct IO is reported to deliver amazing performance boosts in some deployments. Understanding how not to hold it wrong is a great first step to potentially unlocking that speed-up on your systems too!

For more information, please visit: https://www.bsdcan.org/2025/

#zfs #benchmarking #freebsd

 

A new BSDCan video has been posted:
Effective Bug Reports, Code Change Requests, and Conference Proposals by  Michael Dexter\

Open Source is participatory and BSD Unix is no exception, with its own unique development workflows and events. Bug reporting, code proposing, and event participation are fundamental elements of the BSD Unix community and despite appearances, are open to anyone to participate.

This talk will take a pragmatic tour of effective engagement on these topics with real-world examples and tips for:

    Bug reports that are actionable and inspire attention

    Code change requests and reviews that are more likely to review and acceptance

    Conference proposals that stand out, accurately set expectations, and are more likely to be accepted

The secret is that all of that all of these are fundamentally indistinguishable: You are tasked with marketing your idea to others and must show your work, justify your points, demonstrate sincerity, and ultimately convince others of your initiative, regardless of its size.

For more information, please visit: 
https://www.bsdcan.org/2025/
- and -
https://www.bsdcan.org/2025/timetable/timetable-Effective-Bug-Reports,.html

#runbsd #freebsd #opensource #unix

 

A new BSDCan video has been posted: The NetBSD Packet Filter(NPF)by Emmanuel Nyarko

One of NetBSD's goal with network security is to upgrade NPF with lots of useful features and then be used as the primary packet filter. In this talk, As NetBSD's current primary maintainer of NPF, I will reveal the improvements I have added to NetBSD's NPF packet filter. I will also reveal Further improvements in relation to performance and the direction of the project to reaching completion.

For more information, please visit: 
https://www.bsdcan.org/2025/
- and -
https://www.bsdcan.org/2025/timetable/timetable-The-NetBSD-Packet.html

 

A new BSDCan video has been posted: Enhancing Unix Education through Chaos Engineering and Gamification using FreeBSD by Andreas Kirchner, Benedict Reuschling

The misuse of AI in education for cheating purposes has created challenges in assessing students' authentic contributions in the last couple of years. Another issue we identified is that University labs rarely teach problem-solving skills for a real-world scenario that students have to deal with in their post-academic working life (i.e. fixing production issues). Traditional assignments lacked real-world relevance (and were easily solved with the help of AI), leaving students unprepared for professional challenges in their later jobs. To address this, we developed as part of a master's thesis for University of Applied Sciences, Darmstadt, Germany a new teaching framework leveraging Chaos Engineering and Gamification elements to modernize Unix education on FreeBSD. With our new system, real-world problems can be simulated by instructors and allows students to use system administrator permissions to solve them. We also developed this system to make it difficult for participants to "cheat" using AI and evaluated the system towards that end with a group of students.

This talk will introduce our new "Chaos education system" tested in the "Unix for Software Developers" course at the University. The name stems from the chaos monkey systems that intentionally "wreak havoc" on production systems to improve their resiliency and train the sysadmins managing them to find and fix them. Our approach lets instructors inject intentional faults (error scenarios) into student-managed FreeBSD jails. The students must then identify, resolve, and prevent these issues from occurring again using standard system administration tools, including root permissions. To increase student motivation to solve these scenarios quickly (and to create artificial "production system is at stake" pressure), a global highscore list is used as a gamification element: each time an issue is solved, points are awarded to that team based on the elapsed time and an instructor-defined difficulty bonus. A post-mortem group discussion with the instructor lets students talk through various ways of solving the issue, giving the group deeper insights on possible solutions each group had used. Using the system, the students gain practical skills like troubleshooting, system recovery, and proactive system management with real-world scenarios, something that traditional "one size fits all" assignments lack.

We built the whole system using BSD-licensed open source components: FreeBSD, pf, VNET, bastille jails and templates. Shells scripts act as the glue to tie them together and implement the logic for the rest of the chaos monkey system. The prototype system has been tested with two student groups of 16 students each in January 2025. One group was allowed to use ChatGPT during the scenarios to see how AI-support helps them (if at all). Insights from this testing was used to enhance the system further.

This talk will introduce the chaos education system idea, implementation, demonstrate its functionality, and discuss future work in this area. FreeBSD proved to be an excellent building platform for this system, due to its great modularity, open source, low resource overhead, and available documentation. The system can be enhanced further and used outside of an academic environment, like employee training or workshop-style challenges at events. It is easy for instructors to construct a custom scenario for participants and inject it into the training jails. The system can scale to a number of parallel users due to the lightweight nature that FreeBSD jails provide.

Audience: Educators, trainers, and system administrators interested in modernizing Unix/Linux education through hands-on, interactive methods. Managers may find the system interesting for training their own employees by constructing scenarios mimicking their own environment.

For more information, please visit:  https://www.bsdcan.org/2025/

#runbsd #freebsd #pf

 

A new BSDCan video has been posted: Why (and how) we're migrating many of our servers from Linux to the BSDs by Stefano Marinelli

A few years ago, we decided to migrate many of our servers (and many of those of our clients) from Linux to the BSDs - FreeBSD, OpenBSD, NetBSD - depending on the specific services. In this presentation, I will discuss the reasons behind our decision, the technical and organizational challenges we faced, the tangible benefits we have experienced, and why we believe this migration is successful. I will provide specific examples and real-life case studies. In an increasingly complex world, relying on simple, stable, and secure solutions is becoming more and more important, and the BSDs can make a significant contribution in this direction.

For more information, please visit:  https://www.bsdcan.org/2025/

#runbsd

 

A new BSDCan video has been posted: ELF Nightmares: GOTs, PLTs, and Relocations Oh My by John Baldwin

Mapping abstract symbol names in source code to concrete addresses at runtime requires cooperation between the compiler, static linker, and runtime loader. This talk will talk about some of the practices and data structures used for this task including ELF relocations, Global Offset Tables and Procedure Linkage Tables. Depending on time, it may also cover some more advanced topics such as initialization functions ("ifuncs").

For more information, please visit:  https://www.bsdcan.org/2025/

#runbsd #freebsd

 

A new BSDCan video has been posted: Automated and Distributed Testing Using TTCN-3 by Hiroki Sato

Testing an operating system is not easy. FreeBSD project uses Kyua testing framework and has continuously made efforts to add more test cases. They are mostly written in shell scripts or some lightweight programming languages. Writing and maintaining complex test cases is still challenging.

This talk introduces TTCN-3, Testing and Test Control Notation version 3. This is a domain-specific language designed for automated testing and is widely used in telecommunicating systems as an ETSI industry standard. While the primary target is conformance testing of communication protocols, it is also helpful to write complex test cases for operating system testing that cannot be covered by shell scripting.

Eclipse Titan is a TTCN-3 toolchain that Ericsson internally developed and Eclipse Foundation now maintains under Eclipse Public License 2.0. It translates test cases in TTCN-3 to a C++ program, and it generates a single binary without annoying library dependency to perform testing. The toolchain runs on *BSD or other Unix-like systems with GCC, and includes powerful orchestrating controller and logging capability. This project also maintains production-quality test case implementations for various protocols we can reuse.

The talk will cover how to get started with Eclipse Titan on FreeBSD, and how to write test cases of networking and multiple nodes. It includes examples such as a simple string matching of messages over STDIN/STDOUT, a simple request/response packet exchange over IP, and more complex scenarios that show both the upside and downside of using TTCN-3.

Speaker Biography: Hiroki Sato is an assistant professor at Institute of Science Tokyo. He is one of the FreeBSD core team members and has been a FreeBSD committer since 2001.

For more information, please visit:  https://www.bsdcan.org/2025/

 

A new BSDCan video has been posted: Confidential Computing with OpenBSD -- The Next Step by Hans-Jörg Höxer

Confidential computing is a family of techniques to enhance security and confidentiality for data in use. One technical approach is strong isolation for virtual machines.

AMDs Secure Encrypted Virtualization (SEV) offers several feature sets for isolation of guest virtual machines from a non-trusted host hypervisor and operating system. These feature sets include memory encryption, encryption of guest state including CPU registers and an attestation framework.

With OpenBSD 7.6 released in October 2024 we are now able to use the memory encryption features of AMD SEV to run OpenBSD as both

    a confidential guest VM and     as a hypervisor providing a confidential execution environment.

Now, thanks to memory encryption the hypervisor is not able to peek into a guests memory and is not able to retrieve sensitive information. However, the state of the CPU registers used by the guest is still visible to the hypervisor.

Therefore, we implemented support of AMDs "Secure Encrypted Virtualization with State Encryption" (SEV-ES) for OpenBSD guests and hypervisor. With SEV-ES all CPU guest state is encrypted and hidden from the hypervisor.

In this talk we will explain the fundamentals of SEV and SEV-ES. Then we explore the challenges imposed by SEV-ES for both guest and hypervisor. Finally we will take a closer look into selected implementation details.

Hans-Jörg Höxer is employed at genua, a German firewall manufacturer, who is using OpenBSD as a secure and stable base for its products.

For more information, please visit:  https://www.bsdcan.org/2025/

[–] tpid98 2 points 5 months ago

The BSDCan Endbox video has been posted: https://youtu.be/WZFYTInWAqc

Enjoy

 

A new BSDCan video has been posted: Flipping Bits: Memory Errors in the Machine by Taylor Campbell

We've all heard stories of the dreaded cosmic ray angrily flipping bits in your RAM. But how much does it matter, really? And, more importantly, how do you tell?

This talk will cover an overview of hardware architecture around detecting and correcting memory errors, software support for handling them and other types of hardware errors, and stories of memory errors in the real world.

And, if the stars align (specifically, the cosmic-ray-generating supernovae), perhaps we'll have a live demo.

For more information, please visit: 
https://www.bsdcan.org/2025/
- and -
https://www.bsdcan.org/2025/timetable/timetable-Flipping-Bits-Memory.html

[–] tpid98 20 points 6 months ago (1 children)

The New York Public Library has Dial 917-ASK-NYPL (917-275-6975) to connect with librarians via phone Monday through Saturday from 10 AM to 6 PM. Available in English and español.

NYPL Amazing Service Offerings

[–] tpid98 3 points 6 months ago (1 children)

A stray thumb is responsible for that, but I am sure many would have opinions on exposing the young and innocent to pf. Including some of the committers!

[–] tpid98 2 points 7 months ago (1 children)

Fixed. Thank you for the reminder.

[–] tpid98 2 points 7 months ago* (last edited 7 months ago) (1 children)

Image from a service access door on the path leading to Stonehenge. The screw placement is truly inspired.

[–] tpid98 9 points 7 months ago

And the award for the least surprising opinion column title goes to...

[–] tpid98 1 points 8 months ago

If you don't want to ditch your Apple Intel hardware but want to run modern software, you can always checkout NetBSD They even have PPC Apple hardware support!

[–] tpid98 1 points 8 months ago

I wonder if they are having trouble with microplastics in the Paris Subway system. I marveled at their quiet subways while I was there and saw they use what looks like rubber wheels on their carriages.

[–] tpid98 16 points 9 months ago (1 children)

A Leatherman wave I purchased when I first started working and they had just come out. Blade holds its edge and everything still works smoothly. Plus I have worked out a one handed flick to fully open the pliers.

view more: next ›