mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

745
active users

#openbsd

45 posts39 participants0 posts today
Continued thread

Now this is very cool! :flan_cool:

#OpenBSD btrace(8) now supports symbolizing utrace addresses for DSO (dynamic shared objects), including dynamically linked programs, thanks to Alexandr Nedvedicky (sashan@)! :flan_hacker:

marc.info/?l=openbsd-cvs&m=175

Back in 2023, btrace(8)/bt(4), OpenBSD's bpftrace/dtrace-like dynamic tracing framework, gained initial utrace (userland tracing) support on amd64/i386, but it required programs be statically linked to symbolize addresses.

marc.info'CVS: cvs.openbsd.org: src' - MARC
Replied in thread
Thanks!

I submitted a Pull Request to update MacPorts' rpki-client to 9.6 here:

https://github.com/macports/macports-ports/pull/29428

GitHub Continuous Integration checks passed OK.

It's up to someone else with commit access to merge it.

I also prepped a submission to undeadly.org with the release announcement, but I'll leave it up to one of the other editors to publish it to make sure any errors I may have inadvertently introduced are caught.

#RPKI #rpkiclient #MacPorts #BGP #OpenBSD #macOS
Description

Type(s)


 bugfix
 enhancement
 security fix

Tested on

macOS 26.0 25A354 arm64
Command Line Tools 26.0.0.0.1.1757719676
Verification 
Have you

 followed our Commit Message Guideline...
GitHubrpki-client: update to 9.6 by artkiver · Pull Request #29428 · macports/macports-portsBy artkiver
Continued thread

And I should add -

* we are making final tweaks to labs and slides still
* we will be covering #FreeBSD 14 as well as #OpenBSD, with labs supporting both.

You could see the session as a Book of PF, 4th edition preview, however physical copies will not yet be available at the conference, see nxdomain.no/~peter/yes_the_boo (also bsdly.blogspot.com/2025/07/yes) #bookofpf

nxdomain.noYes, The Book of PF, 4th Edition Is Coming Soon

On Thursday, September 25, 2025, Tom Smyth and I will be giving a "Network Management with the OpenBSD Packet Filter Toolset" tutorial events.eurobsdcon.org/2025/tal at #eurobsdcon in #zagreb. Register: 2025.eurobsdcon.org/registrati #openbsd #freebsd #networking #pf #packetfilter #security #trickery

events.eurobsdcon.orgNetwork Management with the OpenBSD Packet Filter Toolset (T5) EuroBSDCon 2025The OpenBSD Packet Filter (PF) is at the core of the network management toolset available to professionals working with the OpenBSD and FreeBSD operating systems. Understanding the PF subsystem and the set of networking tools that interact with it is essential to building and maintaining a functional environment. The present session will both teach networking and security principles and provide opportunity for hands-on operation of the extensive network tools available on OpenBSD and FreeBSD in a lab environment. Basic to intermediate understanding of TCP/IP networking is expected and required for this session. Topics covered include The basics of and network design and taking it a bit further Building rulesets Keeping your configurations readable and maintainable Seeing what your traffic is really about with your friend tcpdump(8) Filtering, diversion, redirection, Network Address Translation Handling services that require proxying (ftp-proxy and others) Address tables and daemons that interact with your setup through them The whys and hows of network segmentation, DMZs and other separation techniques Tackling noisy attacks and other pattern recognition and learning tricks Annoying spammers with spamd Basics of and not-so basic traffic shaping Monitoring your traffic Resilience, High Availability with CARP and pfsync Troubleshooting: Discovering and correcting errors and faults (tcpdump is your friend) Your network and its interactions with the Internet at large Common mistakes in internetworking and peering Keeping the old IPv4 world in touch with the new of IPv6 The tutorial is lab centered and fast paced. Time allowing and to the extent necessary, we will cover recent developments in the networking tools and variations between the implementations in the OpenBSD and FreeBSD operating systems. Participants should bring a laptop for the hands on labs part and for note taking. The format of the session will be compact lectures interspersed with hands-on lab excercises based directly on the theory covered in the lecture parts. This session is an evolutionary successor to previous sessions. Slides for the most recent version of the PF tutorial session are up at https://nxdomain.no/~peter/pf_fullday.pdf, to be updated with the present version when the session opens.

a fairly common complaint I see about #OpenBSD is lack of support from upstream for electron (and thus all electron-based "modern" applications).

This depends on who is talking:
- On one hand it bars #OpenBSD from a lot of "modern apps", which some may see as a problem.
- On the other hand it bars #OpenBSD from a lot of "modern apps", which some people may actually like.

is electron worth it?

Oof, that was painful. Looks like tusky for iOS at least plays moderately well with Snac2. It appears (at least with httpd on #OpenBSD) that most iOS apps are either not setting a file type or Snac2 isn't reading it. Snac2 then sets the mimetype to application/octet-stream and attachments are served as downloads. More work needed before the big BRS migration though.