The post tries to cover the very basics of jails, jail networking and thin jails using only base system tools, so there's no iocage, ezjail or other magic stuff. I hope to get to more elaborate topics at some point in the future.
Feedback is - of course - always welcome!
It's sad to see companies like System76, PogoLinux and Lulzbot sponsoring self proclaimed messiah of open source world (just the way ISIS is messiah of Islamic world) who are spreading lies and creating toxic content. I will NOT write about these three companies unless they fix their mess.
I've submitted a new port: uperf, which is a network performance tool to model and replay of networking patterns.
It might still have some rough edges so all the reviews are warmly welcomed.
Uperf homepage: http://uperf.org/
#FreeBSD now has support for drm-next-kmod in STABLE-11.
So now there's no reason for me to upgrade to CURRENT.
If you are new to Mastodon, you might wanna read this article I wrote recently, that illustrates the principles of Mastodon: https://medium.com/tootsuite/twitter-is-not-a-public-utility-2bc49567152b
And share it around outside of Mastodon for other people to see 😋
The existence of strong BSD community here on Mastodon (and reading AST’s book about operating systems) has reminded me about good old days of using #FreeBSD. One of the effects is writing and submitting a port of #BlackCoin daemon/CLI: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=226501
Whohoo! I made it to the WikiFixitGroup on #FreeBSD Wiki: https://wiki.freebsd.org/action/diff/WikiFixitGroup?action=diff&rev1=2&rev2=3
I've submitted a PR to intel_backlight for #FreeBSD with a brand new manual page and an improved makefile.
This is really important stuff.
They do surveys which show school teachers require children to sign up to proprietary services which kids younger than 13 aren't even able to legally sign up to.
They are trying to teach today's teachers to not ask kids to use WhatsApp or github.
They provide alternative FOSS solutions for schools, such edugit.org with kid-compatible TOS.
Move over cultists, deciphering the necromonicon is nothing compared to documenting OpenSSL..
Introducing #Tor with support for #FreeBSD #Capsicum in the #HardenedBSD ports tree: https://github.com/HardenedBSD/hardenedbsd-ports/blob/master/security/tor-capsicum/pkg-descr
Enable Capsicum support by setting "Sandbox 1" in your torrc file.
Note that security/tor-capsicum is compiled with CFI (w/o cfi-icall), PIE, RELRO, Retpoline, and SafeStack by default on HardenedBSD 12-CURRENT/amd64. Threat actors attempting to exploit vulnerabilities in Tor on HardenedBSD are going to have a really hard time. :)