<?xml version="1.0" encoding="UTF-8"?>
<feed xml:lang="en-US" xmlns="http://www.w3.org/2005/Atom">
  <id>tag:discoverbsd.com,2005:/feeds/posts/default?alt=rss</id>
  <link rel="alternate" type="text/html" href="https://discoverbsd.com"/>
  <link rel="self" type="application/atom+xml" href="https://discoverbsd.com/feeds/posts/default?alt=rss"/>
  <title>DiscoverBSD - The BSD community linklog</title>
  <updated>2026-04-10T13:03:28Z</updated>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4846</id>
    <published>2026-04-10T13:03:28Z</published>
    <updated>2026-04-10T13:03:34Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/337cafbde0"/>
    <title>FreeBSD 14.4 on Raspberry Pi Zero 2W</title>
    <content type="html">&lt;p&gt;This article details the installation and configuration of FreeBSD 14.4 on a Raspberry Pi Zero 2 W, including hardware setup with a WaveShare ETH/USB HUB HAT and PoE power. The process involves downloading the FreeBSD RPI image, writing it to an SD card, and booting the system, which automatically resizes storage on first launch. While the onboard wireless card (BCM43438) is unsupported, Ethernet connectivity is achieved via the USB HAT, and basic configurations like timezone, NTP synchronization, and static IP assignment are covered. The system demonstrates stability with CPU frequency scaling between 600 MHz and 1 GHz, and the author plans to use it as a DNS resolver and DHCP server. Documentation links and troubleshooting steps are provided for reference.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4845</id>
    <published>2026-04-10T13:02:52Z</published>
    <updated>2026-04-10T13:02:56Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/6cce486284"/>
    <title>OpenSSH 10.3/10.3p1 released with security fixes and new features</title>
    <content type="html">&lt;p&gt;OpenSSH 10.3 and 10.3p1 were released on April 2, 2026, introducing security fixes, feature improvements, and bug corrections. Key security updates include fixes for shell metacharacter validation in usernames, certificate principal matching, and &lt;code&gt;scp&lt;/code&gt; handling of setuid/setgid bits. The release also removes compatibility for implementations lacking rekeying support and tightens handling of empty certificate principals. New features include support for IANA-assigned SSH agent forwarding codepoints, improved multiplexing commands, and floating-point time precision for &lt;code&gt;PerSourcePenalties&lt;/code&gt;. Additionally, the release enhances FIDO/webauthn support, adds ED25519 PKCS8 key writing, and improves performance for the &lt;code&gt;sntrup761&lt;/code&gt; key agreement algorithm. A future deprecation of SHA1 SSHFP records was also announced due to security weaknesses.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4844</id>
    <published>2026-04-10T05:42:11Z</published>
    <updated>2026-04-10T05:42:55Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/8d10522dbc"/>
    <title>BSD performance and compatibility on PINE64 ROCKPro64</title>
    <content type="html">&lt;p&gt;A detailed evaluation of the PINE64 ROCKPro64 single-board computer running NetBSD, OpenBSD, and FreeBSD highlights its capabilities for lightweight NAS and general-purpose use. The article emphasizes the importance of updating U-Boot to version 2022.01 for improved hardware support, including PCI-e expansion cards and NVMe/SATA storage, which were poorly recognized under the default 2017.09 firmware. Performance metrics show idle power consumption around &lt;em&gt;3.2–3.5W&lt;/em&gt; across all three OSes, with temperatures hovering near &lt;em&gt;46–48°C&lt;/em&gt;, while CPU load tests (via &lt;code&gt;ubench&lt;/code&gt;) push power usage to &lt;em&gt;6.7–7.5W&lt;/em&gt; and temperatures to &lt;em&gt;70–78°C&lt;/em&gt;. NetBSD and OpenBSD fully utilize the Cortex-A72’s 1.8GHz max frequency, whereas FreeBSD caps at 1.4GHz, possibly due to configuration limits. All systems support dynamic CPU frequency scaling (via &lt;code&gt;estd&lt;/code&gt;, &lt;code&gt;apmd&lt;/code&gt;, or &lt;code&gt;powerd&lt;/code&gt;) and recognize USB storage, though the USB-C port remains non-functional. The ROCKPro64’s &lt;em&gt;4GB RAM model&lt;/em&gt; proves viable for ZFS-based NAS setups, with each BSD variant offering stable performance, leaving the choice to administrative preference or specific features like FreeBSD’s &lt;code&gt;pkg&lt;/code&gt; ecosystem or OpenBSD’s conservative thermal throttling.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4843</id>
    <published>2026-04-10T05:41:22Z</published>
    <updated>2026-04-10T05:41:28Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/5d4b5a3cb1"/>
    <title>Valuable News – 2026/04/06</title>
    <content type="html">&lt;p&gt;The &lt;em&gt;Valuable News&lt;/em&gt; weekly roundup curates notable updates, articles, and resources primarily focused on UNIX, BSD, and Linux systems. This edition highlights Sylve 0.2.1’s release and its inclusion in FreeBSD ports, a humorous April Fools&amp;#39; prank by GhostBSD introducing an AI assistant named Casper, and advancements like FreeBSD’s planned adoption of newer Linux graphics drivers. It also covers security topics such as SSH certificates for improved authentication and a FreeBSD kernel remote code execution vulnerability (CVE-2026-4747) demonstrated by an AI. Additional content includes NetBSD’s Cells for kernel-enforced isolation, OpenBSD 7.8 on Raspberry Pi Zero 2W, and community discussions on tools like &lt;code&gt;less(1)&lt;/code&gt; and &lt;code&gt;pkg(8)&lt;/code&gt;.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4842</id>
    <published>2026-04-08T09:41:06Z</published>
    <updated>2026-04-08T09:41:13Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/ce2acda7ca"/>
    <title>NetBSD 11.0 RC3 released for final testing</title>
    <content type="html">&lt;p&gt;The NetBSD project has announced the third and likely final release candidate for NetBSD 11.0, marking nearly a year since the netbsd-11 branch was created. This version addresses several issues from the first candidate, including performance improvements for the ftp client during large file downloads, updates to tmux, reliability fixes for blocklistd, and corrections in the Mesa library. The release provides both CD-sized and full-featured DVD ISO images, with the latter recommended for most users unless constrained by media size limits. Installation files are available via the project&amp;#39;s CDN for standard architectures, while ARM-based systems can use builds from the dedicated ARM images page. Users encountering issues are encouraged to report them through the project&amp;#39;s mailing lists or bug-tracking system.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4841</id>
    <published>2026-04-05T15:48:49Z</published>
    <updated>2026-04-05T15:49:08Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/776a5ffada"/>
    <title>BSD Now 657</title>
    <content type="html">&lt;p&gt;This episode of &lt;em&gt;BSD Now&lt;/em&gt; explores the risks of technology dependence and advocates for open-source storage solutions to reduce vendor lock-in. It highlights FreeBSD 15’s Linux compatibility layer (Linuxator) now supporting CUDA, enabling GPU-accelerated workloads, and details a tool for bidirectional migration between OPNsense and pfSense firewall configurations. Additional topics include hierarchical jails on FreeBSD 15, a SYN attack analysis with follow-up, and Netbase—a port of NetBSD utilities to other Unix-like systems. The episode also notes OpenBSD’s transition to 7.9-beta and the addition of delayed hibernation for amd64 laptops.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4840</id>
    <published>2026-04-04T15:51:56Z</published>
    <updated>2026-04-04T15:52:20Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/96b0d84c6f"/>
    <title>OpenBSD Errata: April 4, 2026 (iked)</title>
    <content type="html">&lt;p&gt;OpenBSD has issued errata patches for the iked daemon affecting versions 7.7 and 7.8 of the operating system. The updates address vulnerabilities or bugs in the IKEv2 key exchange protocol implementation, which is used for IPsec VPN connections. Binary patches are available for amd64, arm64, and i386 architectures through the syspatch utility, while source code fixes can be obtained from the official errata pages for each version.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4839</id>
    <published>2026-04-02T15:15:11Z</published>
    <updated>2026-04-02T15:15:18Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/f46dd3f825"/>
    <title>BSD Cafe launches hybrid forum and Fediverse platform called Billboard</title>
    <content type="html">&lt;p&gt;The BSD Cafe Journal has introduced &lt;em&gt;Billboard&lt;/em&gt;, a platform combining traditional forum features with Fediverse integration. Designed as a hybrid space, it functions as a classic discussion forum with persistent threads while also supporting ActivityPub federation, enabling cross-platform interactions without algorithmic curation. The project is built on NodeBB and aims to serve as a social hub for BSD and open-source communities, allowing users to engage in long-form discussions while participating in the broader decentralized social web. The platform is accessible at &lt;a href="https://billboard.bsd.cafe"&gt;billboard.bsd.cafe&lt;/a&gt;, with early feedback highlighting requests for dedicated testing areas and integration with existing community spaces.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4838</id>
    <published>2026-03-31T16:55:02Z</published>
    <updated>2026-03-31T16:55:08Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/184290eb7b"/>
    <title>OpenBSD 7.8 installation guide for ODROID HC4</title>
    <content type="html">&lt;p&gt;This article details the process of installing OpenBSD 7.8 on an ODROID HC4 arm64 board, replacing an earlier unsuccessful attempt with version 7.2 due to multi-disk issues. The guide covers removing the default Petitboot bootloader, compiling a custom u-boot from source, and preparing the OpenBSD installer with HDMI output support. Installation requires an SD card as the USB and SATA ports are non-functional during setup, with the final system booting from a SATA SSD. The article also notes improved multi-disk support in OpenBSD 7.8, power consumption metrics (5W–6.8W), and performance comparisons to an APU4D4 board, highlighting the HC4&amp;#39;s efficiency and capability.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4837</id>
    <published>2026-03-31T16:54:22Z</published>
    <updated>2026-03-31T16:54:30Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/224f025c1c"/>
    <title>Building a welcoming BSD community with the BSD Cafe</title>
    <content type="html">&lt;p&gt;The BSD Cafe is a virtual space inspired by traditional Italian bars, designed to foster a positive and inclusive community around BSD systems and open-source technology. Founded by Stefano Marinelli, it aims to create a serene environment where users—referred to as &amp;quot;bar friends&amp;quot;—can engage in constructive discussions, share knowledge, and collaborate without the toxicity often found on commercial social platforms. The project emphasizes self-hosting, transparency, and ideological autonomy, running services like Mastodon, Matrix, and Lemmy on BSD-based infrastructure while avoiding proprietary or cloud-dependent solutions. Marinelli highlights the challenges of moderation and maintaining a balanced atmosphere, prioritizing open dialogue over censorship while addressing concerns about &amp;quot;toxic positivity.&amp;quot; The BSD Cafe&amp;#39;s success reflects the strength of its community, offering a refuge for technology enthusiasts seeking meaningful interactions.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4836</id>
    <published>2026-03-31T05:27:46Z</published>
    <updated>2026-03-31T05:27:54Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/bc2f03234e"/>
    <title>IP Technics switches office lab from Proxmox to FreeBSD and Sylve</title>
    <content type="html">&lt;p&gt;A tech firm transitioned its office lab from Proxmox to FreeBSD with Sylve to streamline workflow efficiency and reduce infrastructure management overhead. The shift was driven by the need for a lighter, more native stack that aligned better with repetitive tasks like VM provisioning, storage adjustments, and hardware passthrough testing. FreeBSD’s built-in tools—such as ZFS, bhyve, and jails—provided a simpler, more integrated environment, while Sylve’s minimal management layer avoided unnecessary complexity. Practical benefits included faster image downloads via torrent, on-the-fly VM disk conversions, and an improved web terminal experience. The team emphasized that the change reflected a preference for infrastructure that required less cognitive effort rather than pursuing more ambitious solutions.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4835</id>
    <published>2026-03-30T08:20:24Z</published>
    <updated>2026-03-31T05:27:06Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/0ca220fd29"/>
    <title>Valuable News – 2026/03/30</title>
    <content type="html">&lt;p&gt;The &lt;em&gt;Valuable News&lt;/em&gt; weekly roundup curates notable updates, articles, and tools primarily related to UNIX/BSD/Linux ecosystems. This edition highlights FreeBSD advancements like dual FIB policy routing and native OCI containers, alongside broader topics such as the ZXC compression algorithm, Wine 11&amp;#39;s performance gains for Windows games, and the revival of XMMS with GTK4/PipeWire. Hardware discussions include the 3Dfx Voodoo FPGA revival, Samsung&amp;#39;s discontinuation of SATA SSDs, and AMD&amp;#39;s Ryzen 9 9950X3D2 processor. The roundup also covers AI industry critiques, Firefox 149&amp;#39;s new features, and a multi-stage ZFS/Proxmox backup strategy.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4834</id>
    <published>2026-03-30T08:19:17Z</published>
    <updated>2026-03-30T10:51:46Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/65489b2efb"/>
    <title>HardenedBSD March 2026 progress update</title>
    <content type="html">&lt;p&gt;Key developments include progress on porting Reticulum&amp;#39;s BackboneInterface to HardenedBSD and resolving build issues for 15-STABLE and 16-CURRENT branches, though pkgbase installer support remains unresolved. Updates were made to tools like &lt;em&gt;sourcezap&lt;/em&gt; and &lt;em&gt;portzap&lt;/em&gt;, along with fixes for &lt;em&gt;snowflake-tor&lt;/em&gt; and an upgrade to &lt;em&gt;pkg 2.6.2_1&lt;/em&gt;. The report also notes preparations for the next quarterly release and minor security adjustments, such as disabling retpolines for the bootloader.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4833</id>
    <published>2026-03-30T08:16:29Z</published>
    <updated>2026-03-30T08:16:53Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/2a93c0c981"/>
    <title>Claude Code transforms FreeBSD self-hosting workflows</title>
    <content type="html">&lt;p&gt;The article explores how Claude Code, an AI-powered CLI assistant, streamlines complex FreeBSD self-hosting tasks by automating configurations, compiling custom packages, and hardening security. The author details real-world use cases, including deploying Authelia 2FA in minutes, translating Docker-based software into native FreeBSD builds, and optimizing Nginx security headers without manual trial-and-error. While the tool significantly reduces setup time and debugging effort, the author notes occasional over-eagerness in changes and a persistent update issue on FreeBSD that requires community attention. The piece also reflects on how AI assistance shifts the self-hosting experience from hands-on troubleshooting to higher-level system oversight, though some of the traditional &amp;quot;challenge-based&amp;quot; satisfaction is lost. FreeBSD compatibility and context-aware suggestions are highlighted as key strengths.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4832</id>
    <published>2026-03-30T07:56:31Z</published>
    <updated>2026-03-30T07:56:35Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/258b3079f6"/>
    <title>BSD Now 656 explores OpenZFS storage design and retro computing</title>
    <content type="html">&lt;p&gt;This episode of &lt;em&gt;BSD Now&lt;/em&gt; covers strategies for designing OpenZFS storage with a focus on independence, failure domains, and migration paths, including a detailed guide on pool architecture. It also discusses the decline of Telnet and conflicting reports about its obsolescence, alongside updates like the PiDP-11/70 build workshop and OpenBSD’s porting efforts on SGI hardware. Additional topics include terminal color palette generation, FreeBSD snapshot strategy changes, and a major update to OpenBSD’s DRM code. The episode wraps with community news such as BSDCan registration and an oral history of Unix.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4831</id>
    <published>2026-03-30T07:54:05Z</published>
    <updated>2026-03-30T07:54:13Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/58235bc4f0"/>
    <title>Running a Plan 9 network on OpenBSD</title>
    <content type="html">&lt;p&gt;This guide explains how to set up a Plan 9 distributed system on OpenBSD or other Unix-like systems using emulated components. Plan 9&amp;#39;s architecture separates authentication, file storage, computation, and user terminals into distinct networked services, but this approach simplifies deployment by running all services on a single machine. The file server (&lt;em&gt;u9fs&lt;/em&gt;) uses the host&amp;#39;s filesystem, the authentication server (&lt;em&gt;authsrv9&lt;/em&gt;) relies on Unix permissions, and the diskless CPU server runs in QEMU, booting from a floppy image. Terminal access is provided via &lt;em&gt;drawterm&lt;/em&gt;, a Unix-based Plan 9 terminal emulator. The guide covers IP configuration, user setup, service integration via &lt;em&gt;inetd&lt;/em&gt;, and basic terminal usage, offering a practical way to experiment with Plan 9’s network-centric design without dedicated hardware. Appendices detail floppy image creation, system updates, and additional configurations like timezone settings.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4830</id>
    <published>2026-03-28T09:23:54Z</published>
    <updated>2026-03-28T09:24:08Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/89fd8fd70e"/>
    <title>FreeBSD Security Advisory FreeBSD-SA-26:09.pf</title>
    <content type="html">&lt;p&gt;FreeBSD Security Advisory FreeBSD-SA-26:09.pf addresses a vulnerability in the pf packet filter where rules using address range syntax (e.g., &lt;code&gt;x.x.x.x - y.y.y.y&lt;/code&gt;) are incorrectly hashed and silently dropped as duplicates. Only the first rule with the same hash is loaded, potentially causing unexpected blocking or filtering behavior. The issue affects FreeBSD 14.x and 15.0, with patches released for stable and release branches as of March 25–26, 2026. Workarounds include rewriting rules with tables or labels, while solutions involve upgrading via &lt;code&gt;pkg&lt;/code&gt;, &lt;code&gt;freebsd-update&lt;/code&gt;, or applying source patches. The flaw is tracked as CVE-2026-4748.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4829</id>
    <published>2026-03-28T09:23:32Z</published>
    <updated>2026-03-28T09:23:38Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/4f34d31aac"/>
    <title>FreeBSD Security Advisory FreeBSD-SA-26:08.rpcsec_gss</title>
    <content type="html">&lt;p&gt;A critical vulnerability in FreeBSD&amp;#39;s RPCSEC&lt;em&gt;GSS implementation allows remote code execution in the kernel due to insufficient stack buffer validation during packet signature checks. The flaw, identified as CVE-2026-4747, affects all supported FreeBSD versions and does not require prior authentication, enabling unauthenticated attackers to exploit it via maliciously crafted packets sent to the kernel&amp;#39;s NFS server when the kgssapi.ko module is loaded. Userspace applications linked with librpcgss&lt;/em&gt;sec and running an RPC server are also vulnerable, though no such applications exist in FreeBSD&amp;#39;s base system. Patches were released on March 26, 2026, for all affected branches, including stable/15, releng/15.0, and older releases down to 13.5, with no workaround available beyond unloading the vulnerable module. Updates can be applied via pkg, freebsd-update, or manual source patches.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4828</id>
    <published>2026-03-28T09:22:44Z</published>
    <updated>2026-03-28T09:22:51Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/ea4ff3dbbc"/>
    <title>FreeBSD Security Advisory FreeBSD-SA-26:06.tcp</title>
    <content type="html">&lt;p&gt;A critical vulnerability in FreeBSD&amp;#39;s TCP stack (CVE-2026-4247) allows remote attackers to trigger an mbuf memory leak by sending crafted packets that exploit the challenge ACK rate-limiting mechanism. The flaw affects FreeBSD 14.x and 15.0, where mbufs are leaked when challenge ACKs exceed the default rate limit of 5 packets per second. Attackers on-path or with established connections can reliably exploit this, while off-path exploitation is possible but harder due to sequence number guessing requirements. The issue stems from improper mbuf handling in &lt;code&gt;tcp_respond()&lt;/code&gt; when challenge ACKs are suppressed. Workarounds include disabling rate limiting via &lt;code&gt;net.inet.tcp.ack_war_timewindow=0&lt;/code&gt;, though this increases CPU overhead, while permanent fixes require upgrading to patched versions released on March 26, 2026.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4827</id>
    <published>2026-03-28T09:22:20Z</published>
    <updated>2026-03-28T09:22:24Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/7a2e082000"/>
    <title>FreeBSD and OpenZFS for storage independence</title>
    <content type="html">&lt;p&gt;Technical independence in storage architecture emphasizes control over data, hardware, and software to avoid vendor lock-in and maintain long-term flexibility. FreeBSD provides a stable, open-source operating system foundation that supports hardware portability across diverse manufacturers and CPU architectures, ensuring compatibility and observability. OpenZFS enhances this independence with its portable, endian-neutral on-disk format, allowing seamless data migration across operating systems and hardware without replatforming. Together, they enable transparent, hardware-agnostic storage solutions that prioritize data integrity, scalability, and long-term adaptability. The community-driven development behind these platforms further ensures resilience, broad compatibility, and continuous evolution independent of single-vendor constraints.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4826</id>
    <published>2026-03-27T11:28:45Z</published>
    <updated>2026-03-27T11:28:52Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/467d1b5578"/>
    <title>Five-Year OpenZFS Storage Design Guide</title>
    <content type="html">&lt;p&gt;This article explores strategic OpenZFS storage design for five-year horizons, focusing on media refresh cycles, pool expansion, and hardware independence. It compares mirror and RAIDZ configurations, explaining their trade-offs in capacity efficiency, performance, and resilver behavior over time. The guide emphasizes designing pools with consistent VDEV geometry to enable predictable growth and refresh operations without disruptive migrations. Key practices include symmetric expansion, intentional rebalancing via ZFS send/receive, and maintaining hardware independence through commodity controllers. The approach ensures storage infrastructure can evolve seamlessly while preserving data integrity and minimizing operational risk.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4825</id>
    <published>2026-03-27T11:24:56Z</published>
    <updated>2026-03-27T11:24:59Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/c784d68eb8"/>
    <title>OpenBSD's Motorola 88000 port documented in new multi-part series</title>
    <content type="html">&lt;p&gt;Miod Vallat has begun publishing a detailed account of porting OpenBSD to Motorola&amp;#39;s 88000 RISC architecture as part of his &lt;em&gt;OpenBSD Stories&lt;/em&gt; collection. The first two chapters cover the architecture&amp;#39;s obscure history and the initial challenges of reviving support for a long-abandoned platform. The series is planned to span nine chapters, offering technical insights into the porting process and the unique hurdles posed by the 88k hardware. This follows Vallat&amp;#39;s previous work documenting OpenBSD&amp;#39;s adaptation to other niche architectures, including SGI systems. The project reflects ongoing efforts within the OpenBSD community to preserve and extend support for legacy hardware.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4824</id>
    <published>2026-03-25T09:45:09Z</published>
    <updated>2026-03-25T13:47:14Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/e51c40f0d8"/>
    <title>FreeBSD audio diagnostics and optimization</title>
    <content type="html">&lt;p&gt;A comprehensive guide to audio diagnostics and optimization in FreeBSD, especially for USB DAC devices and music interfaces operating in bitperfect mode and real-time. Solid documentation of practical solutions for sound system analysis and calibration.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4823</id>
    <published>2026-03-24T15:25:16Z</published>
    <updated>2026-03-24T15:26:36Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/d783aab492"/>
    <title>Valuable News – 2026/03/23 UNIX/BSD/Linux and tech roundup</title>
    <content type="html">&lt;p&gt;The &lt;em&gt;Valuable News&lt;/em&gt; weekly series curates notable updates, articles, and resources primarily focused on UNIX, BSD, and Linux systems, along with broader tech-related content. This edition highlights FreeBSD advancements, including Git weekly updates, security reports on login tracking, and tutorials like setting up a NAS on Raspberry Pi or using Docker containers on FreeBSD. OpenBSD developments feature PF queue performance breaking 4 Gbps and &lt;em&gt;pledge(2)&lt;/em&gt; enhancements in the 7.9-beta release. Hardware discussions cover AMD’s Ryzen AI systems, NVIDIA’s new CPU ventures, and high-performance NVMe SSDs. Additional topics span AI integration on FreeBSD via Linux emulator, critiques of Wayland’s impact on Linux desktops, and retrospectives on tech pioneers like Tony Hoare. The roundup also includes multimedia content such as BSD Now podcasts, OpenBSD installation guides, and critiques of modern tech trends like &amp;quot;enshittifAIcation&amp;quot;.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4822</id>
    <published>2026-03-24T15:24:23Z</published>
    <updated>2026-03-24T15:24:28Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/5ca70443ae"/>
    <title>OpenBSD's init system explored</title>
    <content type="html">&lt;p&gt;The OpenBSD init system is highlighted as a traditional and straightforward approach to system initialization, contrasting with more complex modern alternatives like systemd. It operates by executing a shell script during boot, allowing users to directly implement custom commands and configurations. This simplicity makes it an appealing option for those seeking transparency and control over their system&amp;#39;s startup process. The discussion also touches on broader concerns about systemd, including recent controversies such as the adoption of &amp;quot;slopcoding&amp;quot; practices and the integration of age verification mechanisms. These developments have prompted some users to reconsider alternatives like OpenBSD or systemd-free Linux distributions such as Void, aiming to maintain greater autonomy over their systems.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4821</id>
    <published>2026-03-23T11:53:03Z</published>
    <updated>2026-03-23T11:53:12Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/d6d1cd24ba"/>
    <title>OpenBSD Errata: March 21, 2026 (expat sack)</title>
    <content type="html">&lt;p&gt;OpenBSD 7.7 and 7.8 have received security updates addressing vulnerabilities in the expat XML parsing library and a TCP selective acknowledgment (SACK) issue in the kernel. Binary patches are available for amd64, arm64, and i386 architectures through the syspatch utility, while source code fixes can be obtained from the official errata pages for each release. The updates were announced on March 20, 2026, with details provided by the OpenBSD project. No additional mitigation steps or workarounds were specified in the advisory.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4820</id>
    <published>2026-03-23T11:52:42Z</published>
    <updated>2026-03-24T15:23:48Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/ec777e31a8"/>
    <title>OpenBSD 7.9-beta tightens pledge(2) file access rules</title>
    <content type="html">&lt;p&gt;OpenBSD 7.9-beta introduces stricter enforcement of the &lt;code&gt;pledge(2)&lt;/code&gt; system call, removing previous exceptions that allowed certain files or devices to be opened without the &amp;quot;rpath&amp;quot; or &amp;quot;wpath&amp;quot; promises. The change affects programs relying on implicit access to paths like &lt;code&gt;/dev/null&lt;/code&gt;, &lt;code&gt;/etc/resolv.conf&lt;/code&gt;, and timezone databases, which now require explicit &lt;code&gt;pledge()&lt;/code&gt; or &lt;code&gt;unveil(2)&lt;/code&gt; permissions. Port maintainers are advised to test software on snapshots and update code to either open files before calling &lt;code&gt;pledge()&lt;/code&gt;, add necessary promises, or configure &lt;code&gt;unveil()&lt;/code&gt; for specific paths. The update particularly impacts Go-based software, which often implements its own libc-like functionality, and common use cases such as DNS resolution or null device access.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4819</id>
    <published>2026-03-23T11:51:51Z</published>
    <updated>2026-03-23T11:52:51Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/7fdfbb05cb"/>
    <title>OpenBSD PF removes 4 Gbps queue limit</title>
    <content type="html">&lt;p&gt;OpenBSD’s PF packet filter has resolved a long-standing 32-bit limitation in its HFSC traffic-shaping queues, which previously capped bandwidth at ~4.29 Gbps due to integer overflow. The constraint became problematic as 10G, 25G, and 100G network interfaces grew common, causing incorrect scheduling when values exceeded the limit. A new patch expands the kernel’s HFSC scheduler to use 64-bit integers, eliminating the bottleneck and enabling correct configuration of queues up to 999 Gbps, far exceeding current hardware capabilities. Existing configurations under 4 Gbps remain unaffected, while the update also fixes a display bug in &lt;code&gt;pftop(1)&lt;/code&gt; that misreported higher bandwidth values. &lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4818</id>
    <published>2026-03-23T11:51:27Z</published>
    <updated>2026-03-23T11:51:32Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/8daad8ee52"/>
    <title>BSD Now 655: No Reboot Required</title>
    <content type="html">&lt;p&gt;This episode covers the implementation of jails in NetBSD, offering lightweight virtualization similar to FreeBSD&amp;#39;s feature. It also explores ARC and L2ARC memory caching optimizations for Proxmox environments using ZFS, along with a detailed breakdown of OpenBSD&amp;#39;s &lt;em&gt;bsd.rd&lt;/em&gt; ramdisk structure. Additional topics include running Docker containers on FreeBSD, configuring Apple Time Machine backups within a FreeBSD jail, and a user&amp;#39;s perspective on switching from Linux to FreeBSD after decades. &lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4817</id>
    <published>2026-03-20T08:13:38Z</published>
    <updated>2026-03-20T08:13:43Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/b687f1b620"/>
    <title>OpenBSD Errata: March 19, 2026 (calendar)</title>
    <content type="html">&lt;p&gt;OpenBSD has issued errata patches for the &lt;em&gt;calendar&lt;/em&gt; utility affecting versions 7.7 and 7.8, addressing unspecified issues in the software. Binary updates are available for amd64, arm64, and i386 architectures through the &lt;em&gt;syspatch&lt;/em&gt; utility, allowing users to apply fixes without manual compilation. Source code patches are also provided on the official OpenBSD errata pages for both releases. The announcement follows standard OpenBSD procedures for distributing security and reliability updates outside regular release cycles. No additional details about the vulnerabilities or their severity were included in the advisory.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4816</id>
    <published>2026-03-20T08:13:05Z</published>
    <updated>2026-03-20T08:13:50Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/5c2805ea39"/>
    <title>FreeBSD Raspberry Pi NAS setup guide</title>
    <content type="html">&lt;p&gt;This guide demonstrates how to build a network-attached storage (NAS) system using FreeBSD 15.0 on a Raspberry Pi 4, leveraging ZFS for storage management and Samba for file sharing. The process involves downloading a pre-built FreeBSD image for the Pi, configuring necessary hardware like Ethernet and HDMI, and modifying the boot configuration for display compatibility. The tutorial covers creating a mirrored ZFS storage pool with external USB drives, installing and configuring Samba for cross-platform file sharing, and enabling network discovery via Avahi. While the setup is not recommended for production environments, it serves as an accessible introduction to FreeBSD&amp;#39;s storage capabilities and basic NAS implementation, with the added benefit of easy pool import/export functionality for portable storage needs.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4815</id>
    <published>2026-03-19T13:03:49Z</published>
    <updated>2026-03-20T08:11:58Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/bf99d7c604"/>
    <title>Jailrun — cross-platform orchestration for FreeBSD jails</title>
    <content type="html">&lt;p&gt;Jailrun is an orchestration layer for FreeBSD jails. Define your stack in declarative UCL, run &lt;code&gt;jrun up&lt;/code&gt;, and get jails wired together with port forwarding, process supervision, provisioning via Ansible, and instant clones via ZFS snapshots. Every component is transparent and accessible — nothing is hidden behind abstractions.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4814</id>
    <published>2026-03-19T09:44:59Z</published>
    <updated>2026-03-19T09:45:08Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/3c16e83257"/>
    <title>Running Generative AI with Linuxulator and eGPU on FreeBSD</title>
    <content type="html">&lt;p&gt;This guide details how to run generative AI workloads on FreeBSD using Linux binary compatibility (Linuxulator) and an external NVIDIA GPU (eGPU). The author initially faced dependency and Python compilation issues when attempting native FreeBSD execution, leading them to leverage FreeBSD&amp;#39;s Linux emulator to run AI tools like Real-ESRGAN (for image upscaling) and Fooocus (for image generation). The process involves configuring FreeBSD&amp;#39;s NVIDIA drivers, setting up a Rocky Linux 9 environment within &lt;code&gt;/compat/linux&lt;/code&gt;, compiling Python 3.10 from source, and deploying a custom UVM workaround to enable GPU access. Performance and power consumption were comparable to native Linux setups, though the author acknowledges the complexity of maintaining version alignment between FreeBSD and Linux layers. The guide serves as a proof-of-concept for running AI tools on BSD systems while highlighting the trade-offs of relying on Linux emulation.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4813</id>
    <published>2026-03-19T09:44:34Z</published>
    <updated>2026-03-19T09:45:04Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/187016740b"/>
    <title>Valuable News – 2026/03/16</title>
    <content type="html">&lt;p&gt;The &lt;em&gt;Valuable News&lt;/em&gt; weekly series curates a summary of news, articles, and resources primarily related to UNIX, BSD, and Linux systems. This edition highlights key developments such as the release of FreeBSD 14.4, which introduces improved security, storage, and cloud support, alongside reviews and user experiences. It also covers OpenBSD&amp;#39;s transition to 7.9-beta, NetBSD security testing on ARM hardware, and updates to tools like Arkime 6 for network analysis.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4812</id>
    <published>2026-03-19T09:41:24Z</published>
    <updated>2026-03-19T09:41:29Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/c43fd9c70d"/>
    <title>FreeBSD's enduring appeal through a sysadmin's 20-year journey</title>
    <content type="html">&lt;p&gt;A long-time sysadmin recounts discovering FreeBSD in 2002 after years with Linux, highlighting its superior documentation, stability, and performance on limited hardware. The FreeBSD Handbook became a foundational resource, emphasizing a philosophy of understanding before action, while features like jails, ZFS integration, and predictable upgrades reinforced its reliability for production environments. The author contrasts FreeBSD&amp;#39;s measured evolution with Linux&amp;#39;s rapid changes, praising its consistency across decades, including unchanged tool behavior and backward compatibility. Beyond technical strengths, the piece underscores the BSD community&amp;#39;s passion, collaboration, and resistance to commercialization, citing interactions with developers and the FreeBSD Foundation&amp;#39;s user-focused approach. The reflection concludes by framing FreeBSD as a tool built for longevity, where &amp;quot;The Power to Serve&amp;quot; manifests in both code and community ethos.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4811</id>
    <published>2026-03-15T12:01:39Z</published>
    <updated>2026-03-15T12:01:45Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/b18a547a5a"/>
    <title>Podman on FreeBSD enables home-lab containerization</title>
    <content type="html">&lt;p&gt;Podman is now functional on FreeBSD, allowing users to run containerized applications like Immich without requiring Linux-based virtualization workarounds. The &lt;a href="https://daemonless.io"&gt;daemonless.io&lt;/a&gt; project provides pre-built Podman-compatible images for FreeBSD, simplifying deployment with minimal configuration. While the solution works well for personal use—such as hosting photo management tools with NFS-mounted storage—it lacks the isolation and security maturity of FreeBSD Jails, making it unsuitable for production environments. Minor issues, like PostgreSQL dump bugs in older &lt;code&gt;conmon&lt;/code&gt; versions, are documented and largely resolved, though the ecosystem remains early-stage. The approach reduces resource overhead compared to virtual machines but spreads storage mounts across the ZFS filesystem.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4810</id>
    <published>2026-03-14T18:22:26Z</published>
    <updated>2026-03-14T18:22:29Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/5fbedfc1bb"/>
    <title>OpenBSD/amd64 introduces delayed hibernation</title>
    <content type="html">&lt;p&gt;OpenBSD/amd64 laptops now support delayed hibernation via the new &lt;code&gt;machdep.hibernatedelay&lt;/code&gt; sysctl, allowing users to configure a time delay before the system automatically transitions from suspend to hibernation. This feature, implemented by Mark Kettenis, helps balance battery conservation with quick resume times by hibernating only after a user-defined period. If the laptop is reopened before the delay expires, it resumes from suspend; otherwise, it wakes from hibernation, preventing battery drain during prolonged inactivity. The change is available in &lt;code&gt;-current&lt;/code&gt; snapshots and is expected in the next OpenBSD release. Similar functionality exists in other operating systems like Windows, macOS, and Linux.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4809</id>
    <published>2026-03-14T15:20:50Z</published>
    <updated>2026-03-14T15:21:00Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/f6ae6f68fb"/>
    <title>OpenBSD Errata: March 15, 2026 (recvfd)</title>
    <content type="html">&lt;p&gt;OpenBSD released errata patches addressing a vulnerability in the &lt;code&gt;pledge&lt;/code&gt; system call related to &lt;code&gt;recvfd&lt;/code&gt; for versions 7.7 and 7.8. The issue affects the handling of file descriptor reception, which could potentially bypass intended security restrictions. Binary updates are available for amd64, arm64, and i386 architectures via the &lt;code&gt;syspatch&lt;/code&gt; utility.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4808</id>
    <published>2026-03-13T21:02:16Z</published>
    <updated>2026-03-13T21:02:28Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/7d61f494cb"/>
    <title>Is OpenBSD exotic</title>
    <content type="html">&lt;p&gt;An interview with Vyacheslav Voroncov, an active OpenBSD community member, explores the operating system&amp;#39;s unique characteristics and its position in the broader BSD ecosystem. Unlike GNU/Linux, OpenBSD emphasizes a tightly integrated &amp;quot;base system&amp;quot; designed for everyday use, prioritizing security, minimalism, and developer alignment through &amp;quot;dogfooding.&amp;quot; The discussion highlights OpenBSD&amp;#39;s intuitive structure, secure defaults, and smaller attack surface compared to mainstream alternatives, while acknowledging challenges like hardware support and software portability. The article also examines the influence of small, focused communities in driving innovation, citing examples like OpenSSH and tmux, and addresses collaboration among BSD projects and niche OS communities like ReactOS. Voroncov shares insights on OpenBSD&amp;#39;s strengths in specific use cases, such as servers and firewalls, and outlines future goals for community growth and infrastructure development.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4807</id>
    <published>2026-03-13T21:01:23Z</published>
    <updated>2026-03-13T21:02:25Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/8a7660c31b"/>
    <title>FreeBSD risks losing relevance by ignoring AI tooling like Claude Code</title>
    <content type="html">&lt;p&gt;Anthropic’s shift from an npm-based installer to a native installer for Claude Code has left FreeBSD users with a deprecation warning, signaling potential abandonment of the platform. The author argues that historical precedents—like Unix outlasting MULTICS or Windows surpassing the Macintosh—show that dismissing &amp;quot;impure&amp;quot; or scrappier technologies often backfires, as user adoption tends to favor accessibility over purity. For FreeBSD, this means risking irrelevance if it fails to support modern AI tools that developers, including newcomers, increasingly rely on for tasks like debugging, porting software, or learning the system. While acknowledging ethical and sustainability concerns around AI, the post emphasizes its practical value in extending users&amp;#39; capabilities, citing personal successes like porting NEXTSPACE to FreeBSD. The call to action urges FreeBSD’s community to advocate for platform support, warning that refusal to engage with AI tools could alienate future generations of users and developers.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4806</id>
    <published>2026-03-12T10:36:07Z</published>
    <updated>2026-03-12T10:36:21Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/f23dd1668c"/>
    <title>OpenBSD Errata March 2026: FreeType fixes and missing calendar binary</title>
    <content type="html">&lt;p&gt;OpenBSD released errata patches for the FreeType library addressing vulnerabilities in versions 7.7 and 7.8, while also correcting a prior oversight where the &lt;em&gt;calendar&lt;/em&gt; binary was omitted from a system patch. Binary updates are available for amd64, arm64, and i386 architectures through the &lt;em&gt;syspatch&lt;/em&gt; utility, with corresponding source patches listed on the official errata pages. The fixes follow OpenBSD’s routine security maintenance process, ensuring timely mitigation of identified issues. Users of affected versions are encouraged to apply updates to maintain system integrity and security.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4805</id>
    <published>2026-03-10T16:51:12Z</published>
    <updated>2026-03-10T16:51:17Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/9130c6def0"/>
    <title>OpenBSD updates drm(4) subsystem to Linux 6.1.18 level</title>
    <content type="html">&lt;p&gt;A significant update to OpenBSD-current&amp;#39;s &lt;strong&gt;drm(4)&lt;/strong&gt; (Direct Rendering Manager) subsystem aligns its codebase with Linux 6.1.18, as committed by Jonathan Gray. This extensive change arrives late in the development cycle, signaling its inclusion in the upcoming &lt;strong&gt;OpenBSD 7.9&lt;/strong&gt; release. The update was sponsored by the OpenBSD Foundation, highlighting its role in funding critical development work. The commit underscores ongoing efforts to modernize graphics support while maintaining OpenBSD’s security and stability focus. The timing suggests broader hardware compatibility and performance improvements for the next major release.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4804</id>
    <published>2026-03-10T16:50:29Z</published>
    <updated>2026-03-10T16:50:45Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/02e171c913"/>
    <title>FreeBSD 14.4-RELEASE updates and security advisories</title>
    <content type="html">&lt;p&gt;FreeBSD 14.4-RELEASE introduces security patches, userland improvements, and hardware support updates as part of the 14-STABLE branch. Key security advisories address vulnerabilities in OpenSSL, libarchive, xz, and jail escape risks, alongside fixes for network stack issues like SO&lt;em&gt;REUSEPORT&lt;/em&gt;LB and unbound cache poisoning. Userland changes include updates to utilities like &lt;code&gt;diff(1)&lt;/code&gt;, &lt;code&gt;jail(8)&lt;/code&gt;, and &lt;code&gt;bsdinstall(8)&lt;/code&gt;, with new features such as stable MAC addresses for &lt;code&gt;epair(4)&lt;/code&gt; and encrypted swap file support. The release also enhances cloud support via &lt;code&gt;nuageinit(7)&lt;/code&gt; improvements, adds 9P filesystem support for &lt;code&gt;bhyve(8)&lt;/code&gt;, and updates drivers for Intel Ethernet, NVMe, and wireless chips. Documentation has been expanded with new manuals for DTrace providers, Ethernet switch controllers, and clarified behavior in tools like &lt;code&gt;ipfw(8)&lt;/code&gt; and &lt;code&gt;mtree(8)&lt;/code&gt;.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4803</id>
    <published>2026-03-10T16:49:38Z</published>
    <updated>2026-03-10T16:49:49Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/9c2e2cb79d"/>
    <title>Valuable News – 2026/03/09</title>
    <content type="html">&lt;p&gt;The &lt;em&gt;Valuable News&lt;/em&gt; weekly roundup curates notable updates and articles primarily focused on UNIX, BSD, and Linux systems, filtering key developments from the overwhelming flow of online information. This edition highlights a range of topics, including the release of nanobrew, a fast macOS package manager, and updates like FreeBSD Git Weeklyand NetBSD 11.0 RC2. &lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4802</id>
    <published>2026-03-08T14:36:42Z</published>
    <updated>2026-03-08T14:36:52Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/1dc1952c4d"/>
    <title>NetBSD 11.0 RC2 released for testing</title>
    <content type="html">&lt;p&gt;The NetBSD project has announced the second release candidate for NetBSD 11.0, urging community testing before the final release. This version addresses issues from the first candidate, including improvements to the ftp client for large file downloads, updates to tmux, reliability fixes for blocklistd, and corrections in the Mesa library. The release branch, nearly a year old, now offers split ISO images—smaller CD/R-sized versions and full-featured DVD variants—with users encouraged to select the latter unless constrained by media size. Installation notes and download links are provided for multiple architectures, including ARM devices via dedicated bootable images. Feedback on issues can be submitted through mailing lists or the project’s problem report system.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4801</id>
    <published>2026-03-08T14:35:47Z</published>
    <updated>2026-03-09T17:35:10Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/a9c96d57c4"/>
    <title>BSD Now 653: Filesystem comparisons and BSD advancements</title>
    <content type="html">&lt;p&gt;This episode of &lt;em&gt;BSD Now&lt;/em&gt; explores a technical comparison between ZFS and BTRFS, examining their architectural differences, feature sets, and stability considerations. It also covers unconventional implementations like running RHEL and Slackware on ZFS-root setups, including encrypted configurations, while highlighting OpenIndiana’s efforts to modernize Solaris’ IPS package management system using Rust. Additional topics include FreeBSD’s jail memory metrics for resource monitoring, a WireGuard VPN setup guide for OpenBSD, and a discussion on Tcl as an underrated yet highly productive programming language.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4800</id>
    <published>2026-03-08T14:35:07Z</published>
    <updated>2026-03-09T17:35:04Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/384d951b1b"/>
    <title>Designing OpenZFS Storage for Independence</title>
    <content type="html">&lt;p&gt;This article explores strategies for achieving storage independence using OpenZFS by addressing four key facets: lifecycle control, component choice, interoperability, and exit strategy. It emphasizes the importance of open-source software for operational autonomy, allowing organizations to avoid vendor lock-in and maintain sovereignty over their data. The article discusses OpenZFS&amp;#39;s flexibility across CPU architectures, operating systems, and storage hardware, including HDDs, SSDs, and NVMe devices, while highlighting its compatibility with protocols like SMB, NFS, and iSCSI. It also covers pool architecture design, failure domain planning, and migration paths to ensure seamless transitions between systems. The focus is on creating resilient, portable storage solutions that prioritize long-term independence and minimize risks associated with hardware or software changes.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4799</id>
    <published>2026-03-08T14:34:34Z</published>
    <updated>2026-03-08T14:34:41Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/2bec0bdce1"/>
    <title>DIY Home Network Setup with OpenBSD, OpenWrt, and Pi-hole</title>
    <content type="html">&lt;p&gt;This guide details a custom home network configuration using OpenBSD as a router, OpenWrt as a wireless access point, and Pi-hole for network-wide ad blocking. The OpenBSD router handles firewall rules via &lt;code&gt;pf.conf&lt;/code&gt;, DHCP assignments, and DNS resolution through Unbound, with detailed configurations provided for each service. The OpenWrt device operates in AP-only mode, managing WiFi while delegating DHCP and DNS to the OpenBSD router. Pi-hole integrates as a dedicated ad-blocking DNS server, forwarding queries to Quad9 as a fallback. The setup emphasizes security with default-deny firewall rules, anti-spoofing measures, and DNS hardening, while maintaining simplicity with clear instructions for each component. Costs are minimized using affordable hardware like a Raspberry Pi Zero and a repurposed D-Link router.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4798</id>
    <published>2026-03-08T14:33:52Z</published>
    <updated>2026-03-08T14:33:55Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/1d48d99cd8"/>
    <title>HardenedBSD February 2026 development update</title>
    <content type="html">&lt;p&gt;The February 2026 HardenedBSD status report highlights ongoing efforts to resolve a persistent kernel crash in the 15-STABLE branch, with progress narrowing the issue to a specific commit window. Development also includes research into mesh networking projects like Meshtastic and Reticulum, aiming to create a censorship-resistant network proof-of-concept within six months. Key updates include kernel hardening contributions, ports maintenance like the addition of &lt;code&gt;hardenedbsd/ctrl&lt;/code&gt;, and plans to migrate repositories from GitLab to Radicle. The report also mentions community engagement through a local Hackers N&amp;#39; Hops demonstration and upcoming priorities like reviving the &lt;code&gt;hbsdfw&lt;/code&gt; firewall build system.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
  <entry>
    <id>tag:discoverbsd.com,2005:Post/4797</id>
    <published>2026-03-08T14:33:23Z</published>
    <updated>2026-03-08T14:33:33Z</updated>
    <link rel="alternate" type="text/html" href="https://discoverbsd.com/p/868bc49467"/>
    <title>Sprinkling a little Cinnamon on GhostBSD</title>
    <content type="html">&lt;p&gt;The default desktops in GhostBSD are very nice, be they Mate or XFCE - but what of the others? In this video they have a look at Cinnamon and see whether it is any good.&lt;/p&gt;
</content>
    <author>
      <name>DiscoverBSD</name>
    </author>
  </entry>
</feed>
