New OPNsense release, FreeBSD Errata and Notices plus all the news and tutorials from the BSD world.
OPNsense 21.1.6 released: With a bit of delay it bring to you the usual mix of security and reliablilty updates. It is of note that the OpenVPN advisory tracked as CVE-2020-15078 does not affect the provided version 2.4.11, but the security audit will falsely flag it as vulnerable because the source of the audit is FreeBSD where OpenVPN was migrated to 2.5 series already.
- FreeBSD Security Advisory FreeBSD-SA-21:11.smap
- FreeBSD Errata Notice FreeBSD-EN-21:11.aesni
- FreeBSD Errata Notice FreeBSD-EN-21:14.pms
- FreeBSD Errata Notice FreeBSD-EN-21:15.virtio
- FreeBSD Errata Notice FreeBSD-EN-21:16.bc
- FreeBSD Errata Notice FreeBSD-EN-21:12.divert
- FreeBSD Errata Notice FreeBSD-EN-21:13.mpt
- FreeBSD Errata Notice FreeBSD-EN-21:16.bc
Public NetBSD IRC chat channels moved to Libera: Due to the unfortunate situation regarding changes in administration on freenode.net, and the resulting chaos, NetBSD team has decided to move the public NetBSD IRC chat channels from freenode to irc.libera.chat.
Write Better Firewall Rules in OPNsense using Aliases: When you first learned to write firewall rules in OPNsense, you may have simply used the pre-defined aliases for the network interfaces/ports and IP addresses such as “LAN net”, “LAN interface”, “HTTP”, “HTTPS”, etc. You may not have even realized you were using aliases since they do not appear in the list on the “Aliases” page. Using the predefined aliases is not only convenient but helps make your rules easier to understand (imagine having a large number of rules and seeing only IP/network addresses).
Updating GCC GNAT (Ada) in pkgsrc/NetBSD: This page is meant to document the findings about getting a modern version of GCC, in this case GCC 10, running on NetBSD with Ada support. It contains Current state of the art, Getting it to compile, Findings and Further work, aka, TODO.
FreeBSD IRC Channels on Libera Chat: Libera Chat is now FreeBSD’s primary and official IRC network and presence. You can find the official home at libera.chat: freebsd IRC channel. If you need help or support, please reach out on freebsd-irc or
DragonFlyBSD 6.0 Is Performing Very Well Against Ubuntu Linux, FreeBSD 13.0: Earlier this month in our initial benchmarking of DragonFlyBSD 6.0 we found DragonFlyBSD 6.0 performing much better than DragonFlyBSD 5.8, but how does that put its performance up against FreeBSD 13.0 and Ubuntu Linux for reference? Here are such benchmarks in our latest benchmarking of DragonFlyBSD 6.0, FreeBSD 13.0 (with both GCC and Clang), and Ubuntu Linux.
History of ZFS – Part 2: Exploding in Popularity: From its birth at Sun, ZFS grew exponentially in popularity. Many were impressed by its revolutionary features, and ported it to run on their systems. Find out how more about its journey and the rise of OpenZFS in the second part of our series.
Using dpb on OpenBSD for package compilation cluster: This article will explain how to easily setup your own OpenBSD dpb infra. dpb is a tool to manage port building and can use chroot to use a sane environment for building packages. This is particularly useful when you want to test packages or build your own, it can parallelize package compilation in two way: multiples packages at once and multiples processes for one package.
How to Configure WAN and NAT Port Forward Rules in OPNsense: Understanding how to forward ports and create firewall rules for the WAN interface of your router is important if you wish to access services hosted on your router or a server in your internal network. Knowing when to use a WAN rule versus a NAT Port Forward rule may be confusing to new users. WAN vs. NAT Port Forward Rule: Which one to use? Generally speaking, WAN rules should be used for any service running directly on your router and NAT port forward rules for any service host on a server in your internal network (either virtualized or physical).
Opening a Garage Door Using OpenBSD on a Raspberry Pi: Sven G is back with another tale of using a Raspberry Pi in his garage.
Did we miss anything?
Do you have an OSS BSD-related project that you would like to showcase in BSD Weekly? Reply to sender and we can showcase you as a sponsor of an issue (for free).
Do you know anyone who would like this newsletter? Consider forwarding and tell them to subscribe.
Thanks for reading and see you next week! Stay home and stay safe!