Search results

0

New blog post: GeoIP-Aware Firewalling with PF on FreeBSD

Running a mail server means constant brute-force attempts. My solution: geographic filtering. SMTP stays open for global mail delivery, but client ports (IMAP, Submission, webmail) are restricted to Central European IP ranges only.

Result: ~90% reduction in attack logs, cleaner signal-to-noise ratio, smaller attack surface.

Using MaxMind GeoLite2 + PF tables with ~273k CIDR blocks.

blog.hofstede.it/geoip-aware-f

0
0
0
0

Fresh from the BSDCan program committee - submissions are coming in, but we can still take more!

If you have not made your submission, you have until Saturday, January 17th to get yours in!

Go to bsdcan.org/2026/papers.html to orient yourself, then submit via the submission link.

BSDCan is in Ottawa, with tutorials June 17-18, 2026, talks June 19-20, 2026

@bsdcan

0

Bueno, venga, va, nunca he hecho a pesar de que me he mudado más veces de las que puedo contar.

Soy , o , depende de cómo vaya el día. Mi trabajo no me define, pero me flipan los ordenadores desde lechón, así que un poco si.

Me gusta la broma y la chanza, pero si te ofendo con algún chiste, avísame para cambiarlo.

No me interesaba la política hasta que LOS PUTOS FASCISTAS me obligaron.

Para lo demás, la bio, o pregunta. 😉

0
0
0

@xameerHoldMyType I think the list furthers
incorporating seccomp for process isolation on capable GNU/Linux systems, while FreeBSD has its own sandboxing mechanism called Capsicum
> Process Isolation (OS-level) separates processes' memory/resources for stability; chroot (filesystem-level) changes a process's root directory for simple file access restriction (weak security); while Sandboxing (application/security-focused) uses stronger kernel features (containers, VMs, or specialized tools)

@xameerHoldMyType contd go without user namespace isolation to build app in Rootless container like you need dynamically alloc builder uids and with it as root ( rarely with it) , without sandbox , app
i ll do that on , how ll you do it onother
do you every use `sysctl -w kernel.unprivileged_userns_clone=1`?
.

0

chroot - fs isolation
systemd nspawn container - namespace isolation
podman - hardware isolation
are designed to create bootable images from container inputs, allowing for the deployment and management of entire operating systems using container technology. , on the other hand, is a hardware virtualization tool that can run virtual machines, including those created from bootc images, providing a way to emulate different hardware architectures.

what about how is this different?-- correct me if I am wrong
Containers package an application with its dependencies and run on a shared operating system, while compile an application with only the necessary OS components, allowing them to run independently and more efficiently, especially in resource-constrained environments.

0

New blog post: Managing FreeBSD Jails with Ansible.

I wrote jailexec - an Ansible connection plugin that lets you manage FreeBSD jails without running SSH inside each one. It connects to the jail host via SSH and uses jexec to run commands, just like you would manually.

Features:
• Single Python file, easy install
• Supports doas and sudo
• Secure two-stage file transfers
• Works with any jail manager

Blog: blog.hofstede.it/managing-free

Code: github.com/chofstede/ansible_j

0

Hi everyone! My name is Cenk, I'm interested in platform engineering and an enthusiast of all things related to building secure and reliable systems.
Recently also tinkering around with .

When not working, you can find me doing endurance sports, like riding on .
Feel free to reach out and connect with me about all things platform engineering or endurance sports.
I'm always looking to learn and connect with others!

0
0
0

.NET 10 LTS는 이제 진정한 **'유비쿼터스 패키지'**입니다. 더 이상 복잡한 피드 구독이나 리포지토리 설정에 시간을 허비할 필요가 없습니다.

Windows, macOS, Linux, 그리고 Container까지. 각 OS의 기본 패키지 매니저에서 명령어 한 줄이면 즉시 개발 환경이 완성됩니다.

특히 Ubuntu 24.04 (Noble Numbat) 사용자분들, 2026년 1월 정식 배포를 기대해 주세요.

설정의 시대는 가고, 즉시 실행의 시대가 왔습니다. .NET 10으로 바로 시작하세요!

🔗 자세한 설치 정보 확인하기: https://forum.dotnetdev.kr/t/os-net-10/14006

1

Reminder for , , and other programming types. You have now passed the last point to push to production for 2025. Pushing to production now means you risk debugging your fixes next week sat in your childhood bedroom, on dodgy WiFi, while your uncle makes rude and sexist remarks with your partner downstairs. Don't risk it. Your changes can wait until 2026.

0
0
0
0
0