17 days to go!
The story of migrating an entire server from Proxmox to FreeBSD.
https://it-notes.dragas.net/2024/10/21/from-proxmox-to-freebsd-story-of-a-migration/
#EuroBSDConAdvent#EuroBSDCon#BSD#FreeBSD#OpenBSD#NetBSD#DragonFlyBSD#ZFS#PF#RunBSD
17 days to go!
The story of migrating an entire server from Proxmox to FreeBSD.
https://it-notes.dragas.net/2024/10/21/from-proxmox-to-freebsd-story-of-a-migration/
#EuroBSDConAdvent#EuroBSDCon#BSD#FreeBSD#OpenBSD#NetBSD#DragonFlyBSD#ZFS#PF#RunBSD
18 days to go!
From heavy VMs to lightweight BastilleBSD jails - saving resources and simplifying ops.
https://it-notes.dragas.net/2023/11/27/migrating-from-vm-to-hierarchical-jails-freebsd/
#EuroBSDConAdvent#EuroBSDCon#BSD#FreeBSD#OpenBSD#NetBSD#DragonFlyBSD#ZFS#PF#RunBSD
19 days to go!
How to install FreeBSD on providers that don’t support it, using mfsBSD.
https://it-notes.dragas.net/2025/07/02/install_freebsd_providers_mfsbsd/
#EuroBSDConAdvent#EuroBSDCon#BSD#FreeBSD#OpenBSD#NetBSD#DragonFlyBSD#ZFS#PF#RunBSD
20 days to go!
Guide: Move an entire FreeBSD installation to a new host or VM with ZFS send/recv.
https://it-notes.dragas.net/2024/09/16/moving-freebsd-installation-new-host-vm/
#EuroBSDConAdvent#EuroBSDCon#BSD#FreeBSD#OpenBSD#NetBSD#DragonFlyBSD#ZFS#PF#RunBSD
My upcoming book, The Book of PF 4th edition, is part of B&N’s pre-order sale Sept 3–5! Use code PREORDER25 for 25% off (35% for Premium members).
#bookofpf #bnpreorder #openbsd #freebsd #pf #packetfilter #networking #security #nostarch #barnesandnoble
My upcoming book, The Book of PF 4th edition, is part of B&N’s pre-order sale Sept 3–5! Use code PREORDER25 for 25% off (35% for Premium members).
#bookofpf #bnpreorder #openbsd #freebsd #pf #packetfilter #networking #security #nostarch #barnesandnoble
21 days to go!
How we ditched Kubernetes and regained sanity with FreeBSD.
https://it-notes.dragas.net/2024/07/04/from-cloud-chaos-to-freebsd-efficiency/
#EuroBSDConAdvent#EuroBSDCon#BSD#FreeBSD#OpenBSD#NetBSD#DragonFlyBSD#ZFS#PF#RunBSD
A new BSDCan video has been posted:
Enhancing Unix Education through Chaos Engineering and Gamification using FreeBSD by Andreas Kirchner, Benedict Reuschling
For more information, please visit:
https://www.bsdcan.org/2025/
- and -
https://www.bsdcan.org/2025/timetable/timetable-Enhancing-Unix-Education.html
A new BSDCan video has been posted:
Enhancing Unix Education through Chaos Engineering and Gamification using FreeBSD by Andreas Kirchner, Benedict Reuschling
For more information, please visit:
https://www.bsdcan.org/2025/
- and -
https://www.bsdcan.org/2025/timetable/timetable-Enhancing-Unix-Education.html
22 days to go!
Why BSDs in 2025?
My perspective and why we moved many services from Linux to the BSDs.
https://it-notes.dragas.net/2025/03/23/osday-2025-why-choose-bsd-in-2025/
#EuroBSDConAdvent#EuroBSDCon#BSD#FreeBSD#OpenBSD#NetBSD#DragonFlyBSD#ZFS#PF#RunBSD
Hey #illumos friends, I'm experimenting on a VPS. They assigned me a /64 IPv6 subnet, but I can't use it. Long story short, I think I need an NDP proxy, but as far as I know, one isn't available on illumos. So, I've created a ULA and mapped it using NAT66: map vioif0 myULA/64 -> publicIPV6/128. It works, but the server eventually crashes and reboots. When I look at the /var/adm/messages file, I see:
[...]
2025-09-01T17:47:59.314554+00:00 hostname unix: [ID 836849 kern.notice] #012#015panic[cpu1]/thread=fffffe00040f4c20:
2025-09-01T17:47:59.314564+00:00 hostname genunix: [ID 335743 kern.notice] BAD TRAP: type=e ( #pf Page fault) rp=fffffe00040f3b20 addr=0 occurred in module "unix" due to a NULL pointer dereference
2025-09-01T17:47:59.314569+00:00 hostname unix: [ID 100000 kern.notice] #012
2025-09-01T17:47:59.314574+00:00 hostname unix: [ID 839527 kern.notice] sched:
2025-09-01T17:47:59.314578+00:00 hostname unix: [ID 753105 kern.notice] #pf Page fault
2025-09-01T17:47:59.314582+00:00 hostname unix: [ID 532287 kern.notice] Bad kernel fault at addr=0x0
2025-09-01T17:47:59.314587+00:00 hostname unix: [ID 243837 kern.notice] pid=0, pc=0xfffffffffb887d3b, sp=0xfffffe00040f3c18, eflags=0x10246
2025-09-01T17:47:59.314591+00:00 hostname unix: [ID 619397 kern.notice] cr0: 8005003b cr4: 3606f8
2025-09-01T17:47:59.314596+00:00 hostname unix: [ID 152204 kern.notice] cr2: 0
2025-09-01T17:47:59.314599+00:00 hostname unix: [ID 634440 kern.notice] cr3: 22800000
2025-09-01T17:47:59.314603+00:00 hostname unix: [ID 625715 kern.notice] cr8: 0
[...]
If I disable that map, it's stable (but I can't use ipV6 from the non global zones)
Any ideas?
Hey #illumos friends, I'm experimenting on a VPS. They assigned me a /64 IPv6 subnet, but I can't use it. Long story short, I think I need an NDP proxy, but as far as I know, one isn't available on illumos. So, I've created a ULA and mapped it using NAT66: map vioif0 myULA/64 -> publicIPV6/128. It works, but the server eventually crashes and reboots. When I look at the /var/adm/messages file, I see:
[...]
2025-09-01T17:47:59.314554+00:00 hostname unix: [ID 836849 kern.notice] #012#015panic[cpu1]/thread=fffffe00040f4c20:
2025-09-01T17:47:59.314564+00:00 hostname genunix: [ID 335743 kern.notice] BAD TRAP: type=e ( #pf Page fault) rp=fffffe00040f3b20 addr=0 occurred in module "unix" due to a NULL pointer dereference
2025-09-01T17:47:59.314569+00:00 hostname unix: [ID 100000 kern.notice] #012
2025-09-01T17:47:59.314574+00:00 hostname unix: [ID 839527 kern.notice] sched:
2025-09-01T17:47:59.314578+00:00 hostname unix: [ID 753105 kern.notice] #pf Page fault
2025-09-01T17:47:59.314582+00:00 hostname unix: [ID 532287 kern.notice] Bad kernel fault at addr=0x0
2025-09-01T17:47:59.314587+00:00 hostname unix: [ID 243837 kern.notice] pid=0, pc=0xfffffffffb887d3b, sp=0xfffffe00040f3c18, eflags=0x10246
2025-09-01T17:47:59.314591+00:00 hostname unix: [ID 619397 kern.notice] cr0: 8005003b cr4: 3606f8
2025-09-01T17:47:59.314596+00:00 hostname unix: [ID 152204 kern.notice] cr2: 0
2025-09-01T17:47:59.314599+00:00 hostname unix: [ID 634440 kern.notice] cr3: 22800000
2025-09-01T17:47:59.314603+00:00 hostname unix: [ID 625715 kern.notice] cr8: 0
[...]
If I disable that map, it's stable (but I can't use ipV6 from the non global zones)
Any ideas?
Today is Monday, 1st September. And September means one thing: EuroBSDCon!
23 days to go until EuroBSDCon 2025 in Zagreb!
I’m doing a little “advent calendar” for BSD fans: each day until the conference I’ll share one article from it-notes.dragas.net about FreeBSD, OpenBSD, NetBSD, DragonFlyBSD, ZFS, PF and more. The dedicated hashtag will be #EuroBSDConAdvent
Let’s start right away with "I Solve Problems" - my EuroBSDCon 2024 (and #BSDCan 2025) talk about migrating from Linux to BSDs:
https://it-notes.dragas.net/2024/10/03/i-solve-problems-eurobsdcon/
If you’re coming to Zagreb, reply to this post - it would be nice to meet up with fellow BSD users!
#EuroBSDCon#BSD#FreeBSD#OpenBSD#NetBSD#DragonFlyBSD#ZFS#PF#RunBSD#EuroBSDConAdvent
The next scheduled "Network Management with the OpenBSD Packet Filter Toolset" fullday session is at EuroBSDcon in Zagreb, 2025-09-25 10:30–17:30: https://events.eurobsdcon.org/2025/talk/FW39CX/
register here: https://2025.eurobsdcon.org/registration.html
#openbsd #freebsd #pf #packetfilter #networking #security #eurobsdcon
The next scheduled "Network Management with the OpenBSD Packet Filter Toolset" fullday session is at EuroBSDcon in Zagreb, 2025-09-25 10:30–17:30: https://events.eurobsdcon.org/2025/talk/FW39CX/
register here: https://2025.eurobsdcon.org/registration.html
#openbsd #freebsd #pf #packetfilter #networking #security #eurobsdcon
"Yes, The Book of PF, 4th Edition Is Coming Soon" https://nxdomain.no/~peter/yes_the_book_of_pf_4th_ed_is_coming.html (also https://bsdly.blogspot.com/2025/07/yes-book-of-pf-4th-edition-is-coming.html), title still true, actual publication date TBD, #bookofpf #pf #packetfilter #openbsd #freebsd #networking #security #trickery #hacking
"Yes, The Book of PF, 4th Edition Is Coming Soon" https://nxdomain.no/~peter/yes_the_book_of_pf_4th_ed_is_coming.html (also https://bsdly.blogspot.com/2025/07/yes-book-of-pf-4th-edition-is-coming.html), title still true, actual publication date TBD, #bookofpf #pf #packetfilter #openbsd #freebsd #networking #security #trickery #hacking
A new BSDCan video has been posted:
A packet's journey through pf By Kristof Provost
A walkthrough of a packet's journey through (FreeBSD's) pf, concentrating on the big picture and its implications.
We'll cover when packets are inspected, when rules are evaluated and how states are used. Along the way we'll cover what DTrace probes can show us, what some of pfctl's counters mean and just how many times pf can look at a single packet.
This talk is intended for firewall admins looking for a deeper understanding and aspiring pf developers. It is not a "How to use pf" talk.
A space for Bonfire maintainers and contributors to communicate