mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

16K
active users

#relayd

0 posts0 participants0 posts today
Joel Carnat ♑ 🤪 :runbsd:<p>Keeping an eye on <a href="https://piou.foolbazar.eu/tags/SearXNG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SearXNG</span></a> logs makes me realize how many fuckers try to badly access web sites all day long... I'll have to see if I can implement all the live-bans that I have build based on nginx log using <a href="https://piou.foolbazar.eu/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> on some other web site.</p>
Stuart Longland (VK4MSL)<p>This afternoon, I got close to what I wanted to achieve in terms of load-balancing between the two <a href="https://mastodon.longlandclan.id.au/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.longlandclan.id.au/tags/sabots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sabots</span></a> I have running.</p><p>I had originally planned to use <a href="https://mastodon.longlandclan.id.au/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>'s <a href="https://mastodon.longlandclan.id.au/tags/OpenHTTPD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenHTTPD</span></a> or <a href="https://mastodon.longlandclan.id.au/tags/RelayD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RelayD</span></a> to do the job, but <a href="https://mastodon.longlandclan.id.au/tags/HAProxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HAProxy</span></a> <a href="https://mastodon.longlandclan.id.au/tags/PROXY" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PROXY</span></a> protocol was the limiting factor… so I went <a href="https://mastodon.longlandclan.id.au/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> instead.</p><p>One thing I haven't worked out yet, is how to pass the client IP by PROXY protocol to a HTTP back-end. Seems I can do it for a generic TCP stream, but not HTTP.</p><p>The alternative is to set X-Forwarded-For, and have the back-ends trust it, like they trust PROXY for the gateway's IPv4 address for <a href="https://mastodon.longlandclan.id.au/tags/sniproxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sniproxy</span></a>.</p><p>But… it works, you can hit <a href="https://sabot.vk4msl.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sabot.vk4msl.com/</span><span class="invisible"></span></a> and you'll either get sabot01 (which uses nepenthes) or sabot02 (which uses iocaine). Since neither cares about the URI, I can bounce the client between them.</p><p>This did get me thinking though, if enough of us did it, we could have a <a href="https://mastodon.longlandclan.id.au/tags/AISabotAsAService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AISabotAsAService</span></a> for websites to redirect/link to when they think they're being scraped by an AI bot.</p><p>We could provide a pool of servers that would provide the link maze. Front-end proxies would just bounce you between all the pool members, feeding your bot nonsense.</p>
napierge<p>If I would like to use relayd to add security headers and tls to my website hosted via httpd, is there any solution how to specify custom path to keypair to tls?</p><p><a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> <a href="https://mastodon.bsd.cafe/tags/httpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpd</span></a> <a href="https://mastodon.bsd.cafe/tags/tls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tls</span></a></p>
Paul Buetow<p>I found these are excellent examples of how <a href="https://fosstodon.org/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>'s <a href="https://fosstodon.org/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> can be used. <a href="https://www.tumfatig.net/2023/using-openbsd-relayd8-as-an-application-layer-gateway/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tumfatig.net/2023/using-openbs</span><span class="invisible">d-relayd8-as-an-application-layer-gateway/</span></a></p>
Bradley Taunt<p>I've updated <a href="https://httpd.rocks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">httpd.rocks/</span><span class="invisible"></span></a> to use <a href="https://mastodon.bsd.cafe/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> instead of <a href="https://mastodon.bsd.cafe/tags/HAProxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HAProxy</span></a> by default! I took some time to brute force my brain to understand relayd and it worked out (much cleaner than haproxy I find!)</p><p>The instructions for HAProxy still exist; they've just been moved to their own page: <a href="https://httpd.rocks/haproxy.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">httpd.rocks/haproxy.html</span><span class="invisible"></span></a></p>
Martin Pugh<p>Do we have any OpenBSD relayd experts out there that can help me figure out what I'm missing?</p><p>I'm back to getting my home lab cleaned up and moving my blog over to a server running relayd and httpd. http/https traffic from a client reaches relayd and is passed to httpd running on the local machine on port 8083.</p><p>I'm struggling to get relayd to forward the client source IP to httpd so I can grep the access logs for bad actors. All the traffic is showing as sourced from ::1</p><p>Here's a snippet of my relayd.conf with I think the relevent bits</p><p>```</p><p>http protocol www {<br> match request header append "X-Forwarded-For" value "$REMOTE_ADDR"<br> pass request header "Host" value "martin.hatstand.org.uk" forward to &lt;martin_blog&gt;<br>}</p><p>http protocol https {<br> tls { keypair martin.hatstand.org.uk }<br> match request header append "X-Forwarded-For" value "$REMOTE_ADDR"<br> match request header append "X-Forwarded-By" value "$SERVER_ADDR:$SERVER_PORT"<br> match request header set "Connection" value "close"<br> tcp { sack, backlog 128 }<br> match request header "Host" value "martin.hatstand.org.uk" forward to &lt;martin_blog&gt;<br>}<br>```</p><p><a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://bsd.network/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a></p>
Martin Pugh<p>New Blog Post</p><p>OpenBSD relayd and httpd woes</p><p>tl;dr - 5 hours going round in circles with something that appears to be simple. Still not fixed, just brain dumping.</p><p><a href="https://martin.hatstand.org.uk/posts/2024/2024-11-28-openbsd-and-relayd-woes/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">martin.hatstand.org.uk/posts/2</span><span class="invisible">024/2024-11-28-openbsd-and-relayd-woes/</span></a></p><p><a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://bsd.network/tags/LocalHosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LocalHosted</span></a> <a href="https://bsd.network/tags/SelfHosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosted</span></a> <a href="https://bsd.network/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a></p>
Martin Pugh<p>Finally getting back to cleaning up my home lab and starting to work on the VM hosting my blog. I'm not moving the blog yet, instead I stood up a new simple page so I can work out the kinks first.</p><p>I've got simple HTTP traffic working through my reverse proxy and I've just managed to persuade acme-client to retrieve a certificate that appears to be in the right location on the server.</p><p>tcpdump on the reverse proxy can see my inbound traffic arriving on port 443 but no sign of the website loading. Debugging....</p><p>EDIT: erm, yeah, local server firewall rules allowing traffic on TCP/443 would help, but get me another error, but that's still progress.</p><p><a href="https://bsd.network/tags/HomeLab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HomeLab</span></a> <a href="https://bsd.network/tags/LocalHosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LocalHosted</span></a> <a href="https://bsd.network/tags/SelfHosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosted</span></a> <a href="https://bsd.network/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://bsd.network/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a></p>
Paul Buetow<p>Revamping my home lab a little bit. <a href="https://foo.zone/gemfeed/2024-11-17-f3s-kubernetes-with-freebsd-part-1.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">foo.zone/gemfeed/2024-11-17-f3</span><span class="invisible">s-kubernetes-with-freebsd-part-1.html</span></a> <a href="https://fosstodon.org/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://fosstodon.org/tags/bhyve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bhyve</span></a> <a href="https://fosstodon.org/tags/rocky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rocky</span></a> <a href="https://fosstodon.org/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://fosstodon.org/tags/vm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vm</span></a> <a href="https://fosstodon.org/tags/k3s" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>k3s</span></a> <a href="https://fosstodon.org/tags/kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubernetes</span></a> <a href="https://fosstodon.org/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://fosstodon.org/tags/zfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zfs</span></a> <a href="https://fosstodon.org/tags/nfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nfs</span></a> <a href="https://fosstodon.org/tags/ha" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ha</span></a> <a href="https://fosstodon.org/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> <a href="https://fosstodon.org/tags/k8s" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>k8s</span></a> <a href="https://fosstodon.org/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://fosstodon.org/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> (removed the GenAI logo from Mastodon, as some were offended)</p>
Paul Buetow<p>Concept / diagram: 3xFreeBSD with each <a href="https://fosstodon.org/tags/Rocky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rocky</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/bhyve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bhyve</span></a> VMs, in Linux there's a <a href="https://fosstodon.org/tags/k3s" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>k3s</span></a> (3 nodes cluster), as a persistent storage k3s will be using HA HAST <a href="https://fosstodon.org/tags/NFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NFS</span></a> from <a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> and backed by a <a href="https://fosstodon.org/tags/ZFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZFS</span></a> zpool. All 3 nodes have a <a href="https://fosstodon.org/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> tunnel to my two <a href="https://fosstodon.org/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> internet VMs, from there, we will have Let's Encrypt certificates and <a href="https://fosstodon.org/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> forwarding requests to the services running in k3s. OpenBSDs are HA via DNS failover. Alerting via <a href="https://fosstodon.org/tags/OpenSMTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSMTP</span></a>/#Gogios, <a href="https://fosstodon.org/tags/Prometheus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Prometheus</span></a>(k3s) (<a href="https://fosstodon.org/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a>)</p>
copsewood<p><span class="h-card" translate="no"><a href="https://linuxrocks.online/@haircode" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>haircode</span></a></span> Nothing in networking is straightforward. While not having tried this using the <a href="https://social.linux.pizza/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> , it is likely to be a standard firewalling destination NAT (see DNAT) capability, suitable for running a server inside a firewall protected LAN. . So I've configured firewalls to do this many times, including using IPTABLE rules on Linux. </p><p>Some useful notes linked, but note that in this example:</p><p>==========================<br>Packets destined for IP 10.1.1.7 will be forwaded to 192.168.1.2 UDP,TCP</p><p> Does NOT work with ping (ICMP) correctly, does not handle ICMP protocol WLAN IP reply on a ping without</p><p>iptables -t nat -A PREROUTING -p tcp -i wlan0 -d 10.1.1.7 -j DNAT --to-destination 192.168.1.2<br>iptables -t nat -A PREROUTING -p udp -i wlan0 -d 10.1.1.7 -j DNAT --to-destination 192.168.1.2</p><p>========================== <br>traffic on all ports are forwarded, while it's more likely you will want to forward traffic on specific ports for the Minecraft server port requirements, as that is more secure.</p><p><a href="https://gist.github.com/tomasinouk/eec152019311b09905cd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/tomasinouk/eec</span><span class="invisible">152019311b09905cd</span></a></p>
haircode<p>Surely port-forwarding UDP and TCP packets to a <a href="https://linuxrocks.online/tags/Minecraft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Minecraft</span></a> (Debian) server using <a href="https://linuxrocks.online/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> on <a href="https://linuxrocks.online/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> should be straightforward? </p><p>Spent quite a bit of time on this yesterday and didn't manage it. I'm a relative newb when it comes to networking, <a href="https://linuxrocks.online/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a>, etc but even <a href="https://linuxrocks.online/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> couldn't get me through it.</p><p>Has anyone done this? Grateful for any tips.</p>
aCiReP<p>Amazing relayd story, thank you <span class="h-card" translate="no"><a href="https://piou.foolbazar.eu/@joel" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>joel</span></a></span> !</p><p><a href="https://youtu.be/yW8QSZyEs6E?feature=shared" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/yW8QSZyEs6E?feature=s</span><span class="invisible">hared</span></a></p><p><a href="https://www.tumfatig.net/2023/using-openbsd-relayd8-as-an-application-layer-gateway/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tumfatig.net/2023/using-openbs</span><span class="invisible">d-relayd8-as-an-application-layer-gateway/</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> <a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/EuroBSDCon2023" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EuroBSDCon2023</span></a></p>
r1w1s1 :slackware:<p><span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@stefano" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>stefano</span></a></span> the nice thing about <a href="https://fosstodon.org/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a> and <a href="https://fosstodon.org/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> they maintain some great tools and <a href="https://fosstodon.org/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> it's just one of them great tools they created.</p>
Stefano Marinelli<p>I've just finished drafting the article on the custom and "home-made" CDN created for BSD Cafe's media and my blog - should be out by Monday. </p><p>I also set up another VPS and performed the same setup using OpenBSD, replacing nginx with relayd (but keeping Varnish). </p><p>It was even easier... I might write a dedicated post on the OpenBSD setup soon.</p><p><a href="https://mastodon.bsd.cafe/tags/CDN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CDN</span></a> <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.bsd.cafe/tags/RelayD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RelayD</span></a> <a href="https://mastodon.bsd.cafe/tags/Varnish" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Varnish</span></a> <a href="https://mastodon.bsd.cafe/tags/BSDCafe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSDCafe</span></a></p>
EK<p>Can I swap <a href="https://mastodonapp.uk/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> for <a href="https://mastodonapp.uk/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> in <a href="https://mastodonapp.uk/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> for reverse proxying tcp connections? Thinking of migrating my cloud reverse proxy for my <a href="https://mastodonapp.uk/tags/geminiprotocol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geminiprotocol</span></a> capsule from a Linux VPS to <span class="h-card" translate="no"><a href="https://bsd.network/@OpenBSDAms" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>OpenBSDAms</span></a></span> and I want to use system standard tools rather than install another package. Seems possible?</p>
NoGoo.me<p>Dear <a href="https://gts.nogoo.me/tags/nogoome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoGooMe</span></a> users,<br><br>I’ve just added a blocklist towards Bots at the <a href="https://gts.nogoo.me/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> level. If that ever blocks your legit traffic, please reach me ;-)</p>
Stefano Marinelli<p>Using OpenBSD relayd(8) as an Application Layer Gateway</p><p><a href="https://www.tumfatig.net/2023/using-openbsd-relayd8-as-an-application-layer-gateway" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tumfatig.net/2023/using-openbs</span><span class="invisible">d-relayd8-as-an-application-layer-gateway</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> <a href="https://mastodon.bsd.cafe/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://mastodon.bsd.cafe/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mastodon.bsd.cafe/tags/RunBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/NoteHUB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoteHUB</span></a></p>
0mp at FreeBSD<p>Version 7.4.2024.01.15-p1 of <a href="https://mastodon.social/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.social/tags/relayd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relayd</span></a> has just been released and is available in the FreeBSD Ports tree:</p><p><a href="https://cgit.freebsd.org/ports/commit/?id=a66b8f6102fe56d83583db9f4041f3e7fa6c1ba9" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cgit.freebsd.org/ports/commit/</span><span class="invisible">?id=a66b8f6102fe56d83583db9f4041f3e7fa6c1ba9</span></a></p><p>One of the interesting changes is fix for a crash that can be triggered by a config reload. The commit message contains a nice write-up:</p><p><a href="https://github.com/KlaraSystems/freebsd-relayd/pull/1/commits/cc381fdfa454a9b24c0a061602f2ef25472d06e2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/KlaraSystems/freebs</span><span class="invisible">d-relayd/pull/1/commits/cc381fdfa454a9b24c0a061602f2ef25472d06e2</span></a></p><p>We are working on getting the fix upstreamed to <a href="https://mastodon.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>. Here's the bug report if you want to take a look:</p><p><a href="https://marc.info/?l=openbsd-bugs&amp;m=171288115606488&amp;w=2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">marc.info/?l=openbsd-bugs&amp;m=17</span><span class="invisible">1288115606488&amp;w=2</span></a></p><p><a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/osdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>osdev</span></a> <a href="https://mastodon.social/tags/CFT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CFT</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a></p>
gonzalo<p>Tunnels and cloud across countries with <a class="mention u-url" href="https://h.x61.ar/o/openbsd" rel="nofollow noopener noreferrer" target="_blank">#OpenBSD</a> <a class="mention u-url" href="https://h.x61.ar/o/wireguard" rel="nofollow noopener noreferrer" target="_blank">#Wireguard</a> <a class="mention u-url" href="https://h.x61.ar/o/httpd" rel="nofollow noopener noreferrer" target="_blank">#httpd</a> <a class="mention u-url" href="https://h.x61.ar/o/nextcloud" rel="nofollow noopener noreferrer" target="_blank">#Nextcloud</a> and <a class="mention u-url" href="https://h.x61.ar/o/relayd" rel="nofollow noopener noreferrer" target="_blank">#relayd</a></p> <p><a class="mention u-url" href="https://x61.ar/log/2024/01/11012024104105-cloud_and_tunnels.html" rel="nofollow noopener noreferrer" target="_blank">https://x61.ar/log/2024/01/11012024104105-cloud_and_tunnels.html</a></p>