weirdr.net is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
This is a dual Pentium Pro running NetBSD.
Check out the floppy museum for hints on how to get in touch. Or, you know, ping me on the fediverse. :)
Admin account
@ltning@weirdr.net

Search results for tag #netbsd

Jay 🚩 :runbsd: boosted

[?]Matthias Petermann » 🌐
@mpeterma@mastodon.bsd.cafe

Thanks everyone for the constructive discussion and participation in the naming poll over the past days. It was really helpful.

The former "Jails for NetBSD" project will move forward under the name "Cells for NetBSD".

New project page:
netbsd-cells.petermann-digital

Next steps will focus on stabilizing the current prototype, testing it with real-world workloads, and exploring further ideas around a NetBSD-native container technology.

    Jay 🚩 :runbsd: boosted

    [?]ltning » 🌐
    @ltning@wii.cafe

    Welcome to the Wii Cafe!

    This instance is running under on a Nintendo Wii. My DMs are open, let me know if you'd like an account here.

    Screenshot from fastfetch showing OS version and hardware platform: NetBSD 11.0-RC2, evbppc, CPU PPC750

    Alt...Screenshot from fastfetch showing OS version and hardware platform: NetBSD 11.0-RC2, evbppc, CPU PPC750

      Jay 🚩 :runbsd: boosted

      [?]Wesley » 🌐
      @obj@mastodon.bsd.cafe

      Just stumbled on bsdsec.net and damn, it’s perfect.All the security advisories & errata from , , , and the rest… all in one dead-simple page.
      👉bsdsec.net

      bsdsec.net

      Alt...bsdsec.net

        Jay 🚩 :runbsd: boosted

        [?]hubertf » 🌐
        @hubertf@mastodon.social

        This afternoon's fun: pwning NetBSD-aarch64 (ARM)

        (venv-pwn) qnetbsd$ python3 -c 'from pwn import * ; p = b"A" * 16 + p64(0x2001009f4); sys.stdout.buffer.write(p)' | ./win2
        What is your name? Hello AAAAAAAAAAAAAAAA�
        Goodbye, winner.
        (venv-pwn) qnetbsd$ uname -a
        NetBSD qnetbsd 11.0_RC2 NetBSD 11.0_RC2 (GENERIC64) #0: Wed Mar 4 21:02:00 UTC 2026 mkrepro@mkrepro.NetBSD.org:/usr/src/sys/arch/evbarm/compile/GENERIC64 evbarm

          Jay 🚩 :runbsd: boosted

          [?]Bitslingers-R-Us » 🌐
          @AnachronistJohn@zia.io

          Here’re some pictures from #NetBSD at SCALE

          There’s a lot of interest in NetBSD :)

          First is a Raspberry Pi 400 with ctwm running as a stratum 2 NTP server. Our neighbors just happen to be the Network Time Foundation.

          @socallinuxexpo

          This is a picture of a Raspberry Pi 400 running NetBSD with ctwm showing several terminal windows running various things. It's running as a public NTP stratrum 2 time server as "timescale.zia.io" (the expo is called SCALE - ha ha)

          Alt...This is a picture of a Raspberry Pi 400 running NetBSD with ctwm showing several terminal windows running various things. It's running as a public NTP stratrum 2 time server as "timescale.zia.io" (the expo is called SCALE - ha ha)

            Jay 🚩 :runbsd: boosted

            [?]hubertf » 🌐
            @hubertf@mastodon.social

            Testdriving NetBSD-11.0RC2 on ARM hardware (in VM!)

            feyrer.de/NetBSD/blog.html/nb_

              [?]ltning » 🌐
              @ltning@larry.weirdr.net

              The ol' 486 has also been upgraded to 11.0-RC2. It's frankly amazing this thing still holds together.


              Neofetch output showing the config: NetBSD 11.0 RC2, AMD 486-class CPU, 128MB RAM

              Alt...Neofetch output showing the config: NetBSD 11.0 RC2, AMD 486-class CPU, 128MB RAM

                Jay 🚩 :runbsd: boosted

                [?]Remiberry » 🌐
                @Remiberry@donotsta.re

                Has anyone tried running #NetBSD on a Dell #Chromebook 3100 (fleex)? I don't have the logs right now but despite initializing eMMC it only manages to mangle the partition table and fails installing :(

                  12 ★ 8 ↺

                  [?]Ltning » 🌐
                  @ltning@weirdr.net

                  UPgraded this Pentium Pro to 11.0-RC2 - Thanks, logix! ;)


                  Screenfetch output showing an Xterm window with the specifications of the machine: NetBSD 11, Intel 686-class CPU, R200-class GPU, 492MiB RAM (?)

                  Alt...Screenfetch output showing an Xterm window with the specifications of the machine: NetBSD 11, Intel 686-class CPU, R200-class GPU, 492MiB RAM (?)

                  Emoji reactions:

                    [?]Jay 🚩 :runbsd: » 🌐
                    @jaypatelani@bsd.network

                    troubleshooting BSD TCP network performance

                    omaera.org/wlog/tech/bsd_netwo

                      🗳

                      [?]Matthias Petermann » 🌐
                      @mpeterma@mastodon.bsd.cafe

                      I’ve been following the discussions about the name of my NetBSD project ("Jails for NetBSD") across a few platforms over the past days and really appreciate the thoughtful feedback.

                      The short version: the current prototype is probably closer to a cell or a cage than a strict jail, so the name might indeed not be perfect. The project originally started as an experiment inspired by FreeBSD jails, but while exploring NetBSD internals it evolved into something slightly different: controlled process isolation built around the secmodel framework, a different approach for the tool chain and configuration, and without resource limits and network virtualization.

                      Because of that, I’m open to renaming the project at this stage.

                      I’ve attached a small poll with a few candidate names — please vote if you like.
                      And if the right name isn’t listed yet, feel free to drop suggestions in the comments 🙂

                      Project site: netbsd-jails.petermann-digital

                      Jails (current name):11
                      Cells:14
                      Realms:5
                      Domains (clash with Xen):0
                      Enclaves:4
                      Cages:9
                        Jay 🚩 :runbsd: boosted

                        [?]nia » 🌐
                        @washbear@mastodon.sdf.org

                        verifying users of our text based operating system are over 18 by asking them questions about saddam hussein and invader zim

                          Jay 🚩 :runbsd: boosted

                          [?]meka » 🌐
                          @meka@bsd.network

                          I started working on my implementation of and production software (aka DAW) called Maolan. It supports and , with experimental support for and . I am currently working on support for and . When I get it to work on all the mentioned OSes at least in virtual machine, is next. Once the core architecture is in place, contributions will be more than welcome. Stay tuned.

                          github.com/maolan/maolan

                            [?]Jay 🚩 :runbsd: » 🌐
                            @jaypatelani@bsd.network

                            Jay 🚩 :runbsd: boosted

                            [?]Klaus Zimmermann :unverified: [He/Him] » 🌐
                            @kzimmermann@c.im

                            @sylvie wow, this looks great! Guess I'm not the only one who thinks this is a good idea :)

                            and are the only OSes that keep my very old machines (turning 20 years old this year!) still running.

                            Enjoy!

                              Jay 🚩 :runbsd: boosted

                              [?]JdeBP » 🌐
                              @JdeBP@mastodonapp.uk

                              is written by people who are either very ignorant or very incompetent.

                              leginfo.legislature.ca.gov/fac

                              They have assumed that all operating systems are like Microsoft Windows 11, Android, or iOS; and have written legislation for operating systems where people download glorified WWW client 'apps', from 'stores', which use 'accounts' that they have with vendors or Microsoft/Google/Apple.

                              But the legislation *as worded* *also* covers everything from and through Linux and to and and ; where users anonymously use package managers or ports systems to install applications, written by developers, on operating systems, from 'publicly available internet website' repositories.

                              There is no age field in the GECOS data in master.passwd(5) of course, and the reality is that no BSD or Linux-based operating system has this concept of apps/stores/accounts.

                                [?]Peter N. M. Hansteen » 🌐
                                @pitrh@mastodon.social

                                The 2026 Call for Papers is open!

                                2026.eurobsdcon.org/cfp/

                                Submit by June 20th, come to Brussels September 9-13 and mingle with people!

                                We also offer pre-submission guidance/mentoring, see within.

                                Wonder what BSD and the conferences are about? See nxdomain.no/~peter/what_is_bsd

                                @EuroBSDCon

                                  ltning boosted

                                  [?]Peter N. M. Hansteen » 🌐
                                  @pitrh@mastodon.social

                                  Jay 🚩 :runbsd: boosted

                                  [?]dch :flantifa: :flan_hacker: » 🌐
                                  @dch@bsd.network

                                  [?]Matthias Petermann » 🌐
                                  @mpeterma@mastodon.bsd.cafe

                                  Since the last article, the secmodel_jail / jailctl / jailmgr stack has moved closer to a coherent whole. The original guardrails remain unchanged: no modifications to existing kernel paths, no UVM hooks, no NPF integration, no hidden coupling. The scope stays explicit and the risk bounded.

                                  Progress has focused on operations. Logging, lightweight supervision, and basic metrics are in place, shifting the question from "can this work?" to "can this be run?". Networking remains intentionally simple and host-based; for hard isolation, Xen is still the right boundary. Jails provide an operational frame inside the host, not a replacement for virtualization.

                                  Resource budgeting is being prototyped again via the secmodel evaluation interface, touching allocation paths and scheduler run queues in a minimally invasive way, but it needs careful review.

                                  There is now also a small landing page to make the ideas visible, including an experimental amd64 ISO based on NetBSD 10.1 for testing. If it sparks upstream interest or discussion around lightweight, explicit isolation on NetBSD, that is already a win.

                                  netbsd-jails.petermann-digital

                                    [?]Jay 🚩 :runbsd: » 🌐
                                    @jaypatelani@bsd.network

                                    🚩: for when you need your OS to run on anything, including prism power!

                                      [?]Leonardo Taccari » 🌐
                                      @iamleot@mastodon.sdf.org

                                      The NetBSD Foundation will participate to Google Summer of Code 2026!

                                      Google Summer of Code is a great opportunity to contribute to NetBSD and/or pkgsrc!

                                      To learn more please give a look to NetBSD Blog post: blog.NetBSD.org/tnf/entry/gsoc

                                        Jay 🚩 :runbsd: boosted

                                        [?]Jay 🚩 :runbsd: » 🌐
                                        @jaypatelani@bsd.network

                                        Jay 🚩 :runbsd: boosted

                                        [?]Jay 🚩 :runbsd: » 🌐
                                        @jaypatelani@bsd.network

                                        Jay 🚩 :runbsd: boosted

                                        [?]Jim Spath » 🌐
                                        @jspath55@chaos.social

                                        The moebius continue to crawl on the Pi 0W, 2 weeks later.

                                        Mesh onscreen with 3d ants, escher like.

                                        Alt...Mesh onscreen with 3d ants, escher like.

                                          Jay 🚩 :runbsd: boosted

                                          [?]hubertf » 🌐
                                          @hubertf@mastodon.social

                                          Jay 🚩 :runbsd: boosted

                                          [?]Stefano Marinelli » 🌐
                                          @stefano@mastodon.bsd.cafe

                                          My old friend, a Raspberry Pi A+, has been running my home heating system for months, just like it did back in 2014.

                                          It has not missed a single moment.
                                          It has sailed through every so called cloud outage.
                                          It kept working flawlessly even when the Internet connection was down, because it simply does not need it.

                                          This is the kind of technology I love.
                                          Of course, it runs NetBSD!

                                          rpicaldaia# uptime
                                          6:23PM up 78 days, 20:16, 4 users, load averages: 0.33, 0.17, 0.13
                                          rpicaldaia# uname -a
                                          NetBSD rpicaldaia 10.1 NetBSD 10.1 (RPI) #0: Mon Dec 16 13:08:11 UTC 2024 mkrepro@mkrepro.NetBSD.org:/usr/src/sys/arch/evbarm/compile/RPI evbarm

                                            Jay 🚩 :runbsd: boosted

                                            [?]Bitslingers-R-Us » 🌐
                                            @AnachronistJohn@zia.io

                                            Mid February #NetBSD #pkgsrc package counts for 2025Q4:

                                            10.0: earmv4 12805 (didn’t have it listed before) 10.0: m68k 9622 (+1394) 10.0: powerpc 20711 (+2833) 10.0: sparc64 16866 (+1635) 10.0: vax 7495 (+748)

                                            11.0: aarch64eb 24042 (+4001) 11.0: earmv4 4362 (+612) 11.0: m68k 8132 (+1271) 11.0: mips64eb 3852 (+363) 11.0: mipsel 440 (+449 - needs a new power supply) 11.0: powerpc 4552 (unchanged - needs space and power) 11.0: riscv64 18616 (+3233) 11.0: sh3el 7809 (+2239) 11.0: vax 5245 (+1879)

                                              Jay 🚩 :runbsd: boosted

                                              [?]Matthias Petermann » 🌐
                                              @mpeterma@mastodon.bsd.cafe

                                              @kaveman Thank you so much for mentioning my little experiment with bringing Jails to NetBSD here - I really appreciate it.

                                              In the meantime I’ve brought it to a somewhat usable state (at least in its core) and experimented with some interesting - though highly experimental - integration paths with UVM and NPF.

                                              I’m currently thinking about what the best next step would be. One idea is a stripped-down version that complements the kernel code - essentially just secmodel_jail+kauth+jailctl+jailmgr, but without UVM and without NPF integration - possibly as a pkgsrc package?

                                              The current experimental state is described here:
                                              petermann-digital.de/blog/netb

                                              (Sorry - at the moment it’s available in German only.)

                                              A visualization of a atom with the core (secmodel_jail) and orbits of jailctl and jailmgr.

                                              Alt...A visualization of a atom with the core (secmodel_jail) and orbits of jailctl and jailmgr.

                                                Jay 🚩 :runbsd: boosted

                                                [?]Matthias Petermann » 🌐
                                                @mpeterma@mastodon.bsd.cafe

                                                While writing my article, it became clear to me how much responsibility — and especially experience — is required to touch areas like UVM or NPF inside NetBSD.

                                                I’ve learned a lot over the past weeks. But I’m also honest enough to say: I don’t yet have the depth of experience needed to modify those subsystems responsibly.

                                                So I made a conscious decision.

                                                I’ve created a new experimental branch for secmodel_jail / jailctl / jailmgr that is strictly additive:

                                                - No changes to existing kernel code paths

                                                - No UVM hooks

                                                - No NPF integration

                                                - No hidden coupling between subsystems

                                                It adds new code only.

                                                The reason is simple: even without deep UVM or NPF integration, the security model already delivers significant practical value for me. And in this reduced, explicit form, the attack surface is clear and the audit scope sharply defined.

                                                This feels like the right first alpha candidate: understandable, bounded, and reversible.

                                                github.com/MatthiasPetermann/n

                                                  Jay 🚩 :runbsd: boosted

                                                  [?]jmcunx » 🌐
                                                  @jmcunx@mastodon.sdf.org

                                                  @osnews

                                                  Well, learn something new every day :)

                                                  I just tried this on and it worked as described. Since now has nvi, it will be interesting for people there too.

                                                    [?]Jay 🚩 :runbsd: » 🌐
                                                    @jaypatelani@bsd.network

                                                    @lcheylus running ? 🤠

                                                      Jay 🚩 :runbsd: boosted

                                                      [?]Stefano Marinelli » 🌐
                                                      @stefano@mastodon.bsd.cafe

                                                      I just wrapped up an interesting call that was originally scheduled for last week but rescheduled for today. The client is looking for a unique setup, and thanks to having an early re-read of the fantastic The Book of PF - 4th Edition, I was able to propose some configurations that had completely slipped my mind. The client is extremely curious, and this will likely lead to a new OpenBSD deployment in an interesting environment.

                                                      At the same time, I received an email from a professor at an Italian university whom I had encouraged to extend his lectures to include BSDs. I piqued his curiosity as well and proposed a session specifically on firewalls, focusing on OpenBSD and pf. He will be reading The Book of PF soon and will likely add it to his students' recommended reading list. I'll probably present them, too.

                                                      In short - one book, a thousand new possibilities. Infinite thanks to @pitrh for the massive and wonderful work behind it.

                                                      nostarch.com/book-of-pf-4th-ed

                                                       

                                                        Jay 🚩 :runbsd: boosted

                                                        [?]Jay 🚩 :runbsd: » 🌐
                                                        @jaypatelani@bsd.network

                                                        [?]/home/rqm » 🌐
                                                        @rqm@exquisite.social

                                                        Tracked down the 11 WiFi problems I was having on i386! IT WAS EERO'S FAULT.

                                                        Eero has some wonky behaviour when it runs in WPA3/WPA2 mixed mode, sometimes it seems to return NULL packets during auth.

                                                        NetBSD11 has wpa_supplicant upgraded to 2.11, which blocks this kind of behaviour.

                                                        The fix turned out to be really simple: force wpa_supplicant to only use WPA2 and also specify "ieee80211w=0" in the network config.

                                                        I've got a working install; AND also built perfectly this time. I am really quite happy.

                                                        I will be even happier when I finally replace these stupid AP's, I have grown to detest them.

                                                          Jay 🚩 :runbsd: boosted

                                                          [?]/home/rqm » 🌐
                                                          @rqm@exquisite.social

                                                          [?]Stefano Marinelli » 🌐
                                                          @stefano@mastodon.bsd.cafe

                                                          Make Your Own CDN with NetBSD

                                                          NetBSD is a lightweight, stable, and secure operating system that supports a wide range of hardware, making it an excellent choice for a caching reverse proxy.

                                                          it-notes.dragas.net/2024/09/03

                                                            [?]Jay 🚩 :runbsd: » 🌐
                                                            @jaypatelani@bsd.network

                                                            Celebrating with the most portable OS on the planet. 🌍

                                                            Whether it's the embedded controller inside a vintage radio or the legendary NetBSD Toaster 🍞, the ham/ 📻category in has you covered.

                                                            Why just make toast when you can transmit packets over the airwaves at the same time?

                                                              Jay 🚩 :runbsd: boosted

                                                              [?]Stefano Marinelli » 🌐
                                                              @stefano@mastodon.bsd.cafe

                                                              Make your own Read-Only Device with NetBSD

                                                              One detail that is often overlooked when dealing with embedded (or remote) devices is a key point of vulnerability: the file system.

                                                              it-notes.dragas.net/2024/09/10

                                                                Back to top - More...