BlendIT BSD Cafe - NetBSD
This is my method to dual-boot NetBSD and Archilnux in my laptop. Please, feel free to comment everything I'm doing wrong. I'm not exactly an expert on the topic.
I have no idea how to do full-disk-encryption with NetBSD in UEFI systems. Closest thing I can do is plain-text rootfs and encrypted `/home`, `/var`, `/usr` and swap. So, it's secure enough if my laptop get lost or stolen. I wrote [a post](https://vsis.online/posts/2024-05-27-uefi-full-disk-encryption/) about how I do that. If anyone can guide me to a rootfs on CGD or LVM, I'd appreciate that.
NetBSD 10 RC 4 [https://www.netbsd.org/releases/formal-10/NetBSD-10.0.html](https://www.netbsd.org/releases/formal-10/NetBSD-10.0.html) Almost 10 :) [@netbsd](https://blendit.bsd.cafe/c/netbsd)
NetBSD 10.0 RC 3 is out [https://blog.netbsd.org/tnf/entry/netbsd\_10\_0\_rc3\_available](https://blog.netbsd.org/tnf/entry/netbsd_10_0_rc3_available) [@netbsd](https://blendit.bsd.cafe/c/netbsd)
NetBSD 10.0RC2 available [https://blog.netbsd.org/tnf/entry/netbsd\_10\_0\_rc2\_available](https://blog.netbsd.org/tnf/entry/netbsd_10_0_rc2_available) [@netbsd](https://blendit.bsd.cafe/c/netbsd)
Building a NetBSD ramdisk kernel [https://bentsukun.ch/posts/ramdisk-kernel/](https://bentsukun.ch/posts/ramdisk-kernel/) [@netbsd](https://blendit.bsd.cafe/c/netbsd) [\#NetBSD](https://mastodon.bsd.cafe/tags/NetBSD)
Almost every NetBSD user knows about [pkgsrc](http://www.pkgsrc.org/), the equivalent of FreeBSD port system. You can use it on NetBSD of course, but also on other Unix-like OS like *BSD or Linux. Besides that, there is also [pkgsrc/wip](http://www.pkgsrc.org/wip/), where new maintainers can practise their skills. It may be worth taking a look there, whether you want to contribute or to find a package not present in the main pkgsrc tree. You also have [pkgin](https://pkgin.net/), equivalent to FreeBSD's pkg. Finally, [Joyent](http://pkgsrc.joyent.com/) proposes prebuilt packages for a variety of platforms.
A vulnerability in the NetBSD FTP server allows unauthenticated users to execute MLST and MLSD commands without authentication. This can lead to information leakage - unauthorized party may be able to download the listing of the current ftpd(8) directory. This vulnerability has been assigned CVE-2023-45198. Additionally, potential buffer overflow in count_users() and reading outside of allocated memory issues due to wrong struct type used in the pam_set_item() call have been identified.
NetBSD sysupgrade [\#openBSD](https://mastodon.bsd.cafe/tags/openBSD) upgrade tool is praised, and with reason. From what Ijust read, [#NetBSD](https://mastodon.bsd.cafe/tags/NetBSD) [#sysupgrade](https://mastodon.bsd.cafe/tags/sysupgrade) one is also a great tool : [https://www.netbsd.org/docs/guide/en/chap-upgrading.html](https://www.netbsd.org/docs/guide/en/chap-upgrading.html) let's try the crosspost [@netbsd](https://blendit.bsd.cafe/c/netbsd)
BlendIT BSD Cafe - NetBSD
!netbsd@blendit.bsd.cafeWelcome to the "NetBSD" community at the BSD Cafe BlendIT server!
Step into our cozy virtual cafe, where we sip on the finest digital espressos and chat about all things NetBSD. We're thrilled to have you here, and we hope you'll find this room to be a vibrant hub for all things related to NetBSD. Whether you're a seasoned NetBSD aficionado, a curious newcomer, or simply intrigued by the world of BSD operating systems, this space is your haven for discussions, questions, and knowledge sharing. Feel free to introduce yourself, inquire about anything, share your experiences, or engage in conversations about NetBSD's portability, versatility, and its rich history. We encourage a friendly and respectful atmosphere where everyone can learn and contribute. So, pull up a virtual seat at our cozy cafe, order your favorite virtual beverage, and let's delve into the fascinating realm of NetBSD together! Your thoughts and inquiries are warmly welcomed, and we look forward to enlightening discussions in this community.