mastodon.green is one of the many independent Mastodon servers you can use to participate in the fediverse.
Plant trees while you use Mastodon. A server originally for people in the EU, but now open for anyone in the world

Administered by:

Server stats:

1.2K
active users

#freebsd

83 posts74 participants1 post today
Tom<p>I started porting a game server to <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> then realized that OpenBSD doesn't have MySQL 9.1 in ports, so I'm going to see if I can get it working in <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>. At least I'll be able to jail it.</p>
Joshua Aspinall<p>Good evening <a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> friends, I'm taking the plunge on a spare Laptop to install and use FreeBSD with a GNOME desktop under Wayland. </p><p>Having checked and re-checked the manual for Wayland and Desktop Environment install I can't get beyond a console. GDM does not start and gnome-session has a list of complaints I am unfamiliar with.</p><p>Is there a guide someone has written of achieving such a setup I could link to?</p><p>Thanks in advance!</p>
hyperreal<p>Is there a FreeBSD-equivalent to systemd drop-in replacements for services?</p><p>The only way I can see at the moment is just by backing up the original <code>/etc/rc.d/service</code> file and creating a new one to replace it.</p><p><a href="https://tilde.zone/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://tilde.zone/tags/BSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSD</span></a> <a href="https://tilde.zone/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://tilde.zone/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a></p>
Puffy Fan<p>To run KDE Plasma 6, is it mandatory to install xorg or will it work only off Wayland? <a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a></p>
mms :runbsd: :emacs: :c64:<p>4chan servers were running <a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> 10.1....</p>
ax6761<p><span class="h-card" translate="no"><a href="https://bsd.network/@vermaden" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vermaden</span></a></span> <span class="h-card" translate="no"><a href="https://snac.smithies.me.uk/justine" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>justine</span></a></span> <br>Addendum: prefix "pkg upgrade" with "make-snapshots" to be able to rollback the file systems(s) without fuss ...</p><p>make-snapshots \<br>&amp;&amp; pkg upgrade &amp;&amp; make-snapshots \<br>&amp;&amp; pkg autoremove &amp;&amp; make-snapshots \<br>&amp;&amp; pkg clean &amp;&amp; make-snapshots</p><p>... I had made the change before the issue of {missing,disappearing}-packages-on-upgrade that various other peoples are experiencing currently.</p><p><a href="https://freeradical.zone/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://freeradical.zone/tags/ZFSEverywhere_possible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZFSEverywhere_possible</span></a> <a href="https://freeradical.zone/tags/ZFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZFS</span></a></p>
Eugene :emacs: :freebsd:<p>I found the problem even with ImageMagick7, which can't convert SVG to PNG. Instead it crashes with coredump.</p><p>Before April's update all programs works perfectly fine.</p><p>For now, I creating the account in the <a href="https://mas.to/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> bugtracker to describe this bug...</p>
meka<p>As promiced, I wrote a blog post about how to create NAM <a href="https://bsd.network/tags/audio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>audio</span></a> files using ardour on <a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> (although not FreeBSD specific). <a href="https://meka.rs/blog/2025/04/15/neural-amp-modeling/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">meka.rs/blog/2025/04/15/neural</span><span class="invisible">-amp-modeling/</span></a></p>
Eugene :emacs: :freebsd:<p>Looks like I learnt about <a href="https://mas.to/tags/Poudriere" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Poudriere</span></a> just in time, because since April updates <a href="https://mas.to/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> became ... unstable :dragnshock: even in quarterly branch.</p><p>Because of the broken build of Go, a LOT of packages were vanished. As a result a lot of software were removed from user computers after running pkg upgrade (<a href="https://forums.freebsd.org/threads/can-someone-explain-to-me-whats-going-on-with-pkg.97532/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forums.freebsd.org/threads/can</span><span class="invisible">-someone-explain-to-me-whats-going-on-with-pkg.97532/</span></a>).</p><p>Some software became extremly buggy (<a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=286083" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bugs.freebsd.org/bugzilla/show</span><span class="invisible">_bug.cgi?id=286083</span></a>, <a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=286082" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bugs.freebsd.org/bugzilla/show</span><span class="invisible">_bug.cgi?id=286082</span></a>).</p><p>Can't recommend anyone to switch to FreeBSD right now :dragnsad:</p>
David Chisnall (*Now with 50% more sarcasm!*)<p><span class="h-card" translate="no"><a href="https://bsd.network/@dexter" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dexter</span></a></span> If any <a href="https://infosec.exchange/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> folks are looking for a jails-related project, the one I’d really like someone to do is UID mapping:</p><p>For each jail, record the UID of the creator in the jail structure (we should reserve space for this in 15).</p><p>For filesystem access, do two checks, one of the creator UID against the file, the other of the jailed user UID against a field in extended attributes. If that field does not exist, do the check against the real rights for the file. </p><p>When file permissions or ownership are changed, record that change in xattrs, not in the file’s permissions.</p><p>Do not allow modification of these xattrs by jailed users.</p><p>This is most of what is required to permit jails to be created by non-root users. A jailed user’s rights are never more than those of the user, but may be less.</p>
The Psychotic Network Ferret<p>So, if I ever recommended <span class="h-card" translate="no"><a href="https://fosstodon.org/@system76" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>system76</span></a></span>... disregard that shit.</p><p>I had to bury yet another battery in a bucket of sand in my yard for the same laptop. Fracking thing went all spicy pillow on me, again.</p><p>It wasn't even decent Linux centric hardware. The gorram Realtek on-board Ethernet was always dogshit slow. The wireless required me to use wifibox on <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> to get anything beyond 802.11g speeds. The speakers were tinty as hell, and the webcam was pathetic. It all worked.... barely.</p><p>I'm not paying for another battery. They took over a month the last time I needed a replacement. I'm going back to my Lenovo x230 from 2012, which is still far more reliable than anything I have wasted money on from System76.</p>
Michael Dexter<p>The April 15th, 2025 Jail/Zones Production User Call is up:</p><p><a href="https://youtu.be/7JzanDRuhlg" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/7JzanDRuhlg</span><span class="invisible"></span></a></p><p>We <a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> 15.0 goals, jail escape mitigations (please review!), attracting Kubernetes users, configuration file delimiters, an update on Kleene.dev, Jail names vs. IDs, and more!</p><p>"Don't forget to slam those Like and Subscribe buttons."</p>
Steven G. Harms<p><span class="h-card" translate="no"><a href="https://tenforward.social/@elight" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>elight</span></a></span> yeah. I’m‘ finding <a href="https://techhub.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> lovely these days. No AI; blissfully elegant upgrades…granted I’m not using it to earn my meals, but I’d be trying to build on this.</p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/TrueNAS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrueNAS</span></a> 25.04 Released For Unifying SCALE &amp; CORE Offerings<br>TrueNAS 25.04 is notable for unifying their <a href="https://hachyderm.io/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>-based <a href="https://hachyderm.io/tags/TrueNASSCALE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrueNASSCALE</span></a> and <a href="https://hachyderm.io/tags/TrueNASCORE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrueNASCORE</span></a> <a href="https://hachyderm.io/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>-based platforms. While TrueNAS was previously known for its BSD base, Linux has proven viable for this network attached storage platform. TrueNAS 25.04 is powered by the Linux 6.12 LTS kernel while employing the <a href="https://hachyderm.io/tags/OpenZFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenZFS</span></a> file-system support. <br><a href="https://www.phoronix.com/news/TrueNAS-25.04-Released" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/TrueNAS-25.0</span><span class="invisible">4-Released</span></a> <a href="https://hachyderm.io/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://hachyderm.io/tags/NAS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NAS</span></a></p>
Jason Tubnor 🇦🇺<span class="h-card"><a class="u-url mention" href="https://fosstodon.org/@ianthetechie" rel="nofollow noopener noreferrer" target="_blank">@<span>ianthetechie</span></a></span> <span class="h-card"><a class="u-url mention" href="https://friedcheese.us/users/feld" rel="nofollow noopener noreferrer" target="_blank">@<span>feld</span></a></span> I can confirm that <a class="hashtag" href="https://soc.feditime.com/tag/python" rel="nofollow noopener noreferrer" target="_blank">#Python</a> on <a class="hashtag" href="https://soc.feditime.com/tag/freebsd" rel="nofollow noopener noreferrer" target="_blank">#FreeBSD</a> behaves as one would expect. It consumes all RAM (with <a class="hashtag" href="https://soc.feditime.com/tag/zfs" rel="nofollow noopener noreferrer" target="_blank">#ZFS</a> releasing ARC as expected) and then dips into swap. As soon as Python releases memory after the ingestion routine, the swap is purged to near zero and the RAM then becomes available (and used) by the system. Far more predictable and reliable.<br><br>If you have big, vertical workloads, FreeBSD is where it is at.
Dan Langille<p>Here's a new-to-me <a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> tool:</p><p><a href="https://man.freebsd.org/cgi/man.cgi?bsdconfig" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">man.freebsd.org/cgi/man.cgi?bs</span><span class="invisible">dconfig</span></a></p>
Uwe Trenkner<p><span class="h-card" translate="no"><a href="https://mastodon.hetzner.social/@hetzner" class="u-url mention">@<span>hetzner</span></a></span> <br />I am responsible for two dedicated <a href="https://mastodon.green/tags/FreeBSD" class="mention hashtag" rel="tag">#<span>FreeBSD</span></a> servers at Hetzner in Germany. For backup, we use a StorageBox at your Finnish datacenter to protect us from incidents like the big OHV fire a few years ago.</p>
Felix Palmen :freebsd: :c64:<p>About the <a href="https://mastodon.bsd.cafe/tags/random" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>random</span></a> thingie ... I need random data in <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> to generate unpredictable <a href="https://mastodon.bsd.cafe/tags/session" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>session</span></a> IDs.</p><p>I previously had an implementation trying the <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>-originating <a href="https://mastodon.bsd.cafe/tags/getrandom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getrandom</span></a> if available, with a fallback to a stupid internal <a href="https://mastodon.bsd.cafe/tags/xorshift" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xorshift</span></a> <a href="https://mastodon.bsd.cafe/tags/PRNG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PRNG</span></a>, which could be disabled because it's obviously NOT cryptographically secure, and WAS disabled for the generation of session IDs.</p><p>Then I learned <a href="https://mastodon.bsd.cafe/tags/arc4random" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arc4random</span></a> is available on many systems nowadays (<a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a>, even Linux with a recent-enough glibc), so I decided to add a compile check for it and replace the whole mess with nothing but an arc4random call IF it is available.</p><p>arc4random originates from <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> and provides the only sane way to get cryptographically secure random data. It automatically and transparently (re-)seeds from OS entropy sources, but uses an internal CSPRNG most of the time (nowadays typically <a href="https://mastodon.bsd.cafe/tags/ChaCha20" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChaCha20</span></a>, so it's a misnomer, but hey ...). It never fails, it never blocks. It just works. Awesome.</p>
Colin<p><span class="h-card" translate="no"><a href="https://mastodon.decentralised.social/@wezm" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>wezm</span></a></span> <span class="h-card" translate="no"><a href="https://squawk.social/@hexaitos" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hexaitos</span></a></span> lol there’s someone in those threads who sounds just like you when you recently tried goin Quarterly and it wiped out KDE etc &gt;v&lt; </p><p><a href="https://birdbutt.com/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a></p>
lw<p>the FreeBSD ${svc}_svcj_ipaddrs rc.conf option for service jail was committed, so how you can limit an rc service to a specific set of IP addresses: <a href="https://cgit.freebsd.org/src/commit/?id=6fbd1bed6e7bf880a6cc579b06bdc6476983613a" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cgit.freebsd.org/src/commit/?i</span><span class="invisible">d=6fbd1bed6e7bf880a6cc579b06bdc6476983613a</span></a></p><p>thanks netchild@</p><p><a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a></p>