techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.9K
active users

#freebsd

127 posts98 participants9 posts today

My transition from #macOS to #FreeBSD continues. I set up most of the shortcuts in #Mate to use CMD instead of CTRL, including those in #Firefox. This time, however, I'm changing the shortcuts on a per-app basis rather than globally, since the latter approach didn't work well.

CMD+C/V, CMD+TAB, CMD+W/Q works well and it's very nice.

I'm also thinking Dock's theme or even code, to match macOS better. In macOS it has a margin to the edge.

After some days of troubleshooting FreeBSD networking and pf firewalling (and learning a lot in the process!), I finally made an article about FreeBSD VNet jails behind a dedicated firewall jail, that works with both IPv4 AND IPv6:

Internet <-> firewall-jail <-> application jail

I hope, someone might find that helpful. The detailed article is here in my Codeberg gists:

codeberg.org/Larvitz/gists/src

My next step is trying to get IPv6 address support into the marvelous tool jmore from @vermaden and sending him a pull-request for that :)

#bsd#freebsd#jails
Continued thread

After some research, it was easier than I expected.

I followed xyinn.org/blog/freebsd/zfs_man to setup GELI. I also configured encrypted swap using the example from the geli man page. Then I switched over to wiki.freebsd.org/RootOnZFS/GPT to setup the zpool.
After installation dropped into the shell and made sure to add all incantations from both blog & wiki to loader.conf and fstab.

Reboot, done! #freebsd

xyinn.orgHow to partition your drive using OpenZFS w/ GELI Encryption and continue using the FreeBSD Installer | @fearedbliss
Replied in thread

@snonux I really like #NetBSD for its simplicity and love for old architectures, the others choose to abandon. But it really feels so much slower than #FreeBSD or #Debian. They just seem to prefer simple/portable code much more than speed (even if it makes a huge difference).

Just compare:
github.com/NetBSD/src/blob/tru
with
github.com/freebsd/freebsd-src
or even
github.com/coreutils/coreutils

(I guess the rest of the code follows similar patterns and this is completely fine!)

Automatic conversion of the NetBSD src CVS module, use with care. Please submit bugs/changes via https://gnats.netbsd.org - NetBSD/src
GitHubsrc/usr.bin/yes/yes.c at trunk · NetBSD/srcAutomatic conversion of the NetBSD src CVS module, use with care. Please submit bugs/changes via https://gnats.netbsd.org - NetBSD/src

Day 16 of #31DaysOfFreeBSD :freebsd:

I'm happy with how my Openbox config is coming together! This time around I'm not using any kind of panel/taskbar and have set windows to open maximized by default:

gitlab.com/dwarmstrong/dotfile

Next up: further configure `.xinitrc` to run some helper applications at `startx`.

Onward!

GitLab.config/openbox · master · Daniel Wayne Armstrong / dotfiles · GitLabConfiguration files in $HOME
Replied to Larvitz :fedora: :redhat:

@Larvitz

It's still on my "to-do" to try/review it, but you might like:

github.com/austinhyde/ansible-

It allows to manage the #FreeBSD #jails through an SSH connection on the Jail host.

You can also use #OCI #Docker style containers on FreeBSD. Even #Linux containers work on FreeBSD.

I don't think there is solution to run FreeBSD containers on #Linux ;-)

An Ansible connection plugin for provisioning FreeBSD jails remotely - austinhyde/ansible-sshjail
GitHubGitHub - austinhyde/ansible-sshjail: An Ansible connection plugin for provisioning FreeBSD jails remotelyAn Ansible connection plugin for provisioning FreeBSD jails remotely - austinhyde/ansible-sshjail

After a while of fiddling, I got dual-stack for FreeBSD (IPv4 and IPv6) VNet Jails working properly and reliably 🙂

The important lessons, I've learned:

/etc/sysctl.conf:
+net.link.bridge.inherit_mac=1

/boot/loader.conf:
+if_epair_load="YES"

/etc/rc.conf:
+create_args_bridge0="inet6 auto_linklocal -ifdisabled addm vtnet0"
+ifconfig_vtnet0="up -tso -vlanhwtso"
+rtsold_enable="YES"
+rtsold_flags="-i -m bridge0"

Then, configuring ifconfig_bridge0_ipv6 as well as ipv6_defaultrouter for the host to have IPv6 connectivity as well as the network-configuration in the jail via $jail/etc/rc.conf (The jail of course needs it's own IP on the same subnet as the host)

Screenshots of the fully working configuration with a connectivity test are attached :-)

#freebsd#jails#vnet

Hi #DNS admins :)
I have a problem with an #unbound server (on #FreeBSD). Suddenly it started failing, and tried (and failed) to recurse massively instead of using its cache. Eventually DNS resolution was no longer possible.
Any idea of markers / settings I could look for?

Today's real champion is this one. One of my PC Engines APU devices - I don’t remember the exact year I bought it, probably 2017.

It worked at my home as a router/firewall with OPNsense for several months, then in 2018 I installed it at a client’s site, "as a temporary emergency solution". Still running OPNsense, always kept updated, and it hasn’t missed a bit since then.

During a severe thunderstorm, the access point and switch connected to it were fried, but it kept going - silently and reliably. Zerotier, Wireguard, port forwarding, bandwidth graphs - all handled in a hot office, often with the air conditioning turned off during holidays.

It did everything, and it still works.

The client moved to a new location this morning, and the APU was replaced with a more powerful device (in anticipation of a future Internet upgrade). I decided to take it back with me (technically, it’s still mine) - they couldn’t find the power adapter, probably still packed in boxes, but up until 07:30 this morning (the last time I connected to the server behind it via VPN), it was perfectly reliable.

I’ll probably keep using it - I have others - maybe in the office as a file server with two attached drives.

Honor to the device, honor to OPNsense, honor to FreeBSD.