Firewall shuffling

Sepherosa Ziehau is planning to get rid of ipfilter.  It’s one of 3 firewall-ish programs in DragonFly right now, along with ipfw and pf.  Currently, pf is getting the most attention with Jan Lentfer’s porting work, though npf is also on the horizon.   However, ipfilter is currently in use at nfrance.com, so its removal may be on hold until it can be shown that ipfw or pf can stand in for it.  It looks like it will work out.

Avalon returns

avalon.dragonflybsd.org, also known as mirror-master.dragonflybsd.org, is back up at a new location, with new disks and new connectivity.  pkg_radd should work by default again, as should git.dragonflybsd.org.

State of the binary build

Here’s the state of my build of pkgsrc-2010Q4 packages:

  1. DragonFly 2.8/i386 – in progress
  2. DragonFly 2.8/x86_64 – in progress
  3. DragonFly 2.9/i386 – just started (happens on Avalon)
  4. DragonFly 2.9/x86_64 – in progress

So it will be some days yet…  building over 4000 packages total is never quick.

Lazy Reading: cheatsheet, disks, pkgsrc, more

Normally I hold this for Sunday, but I’ve got a good batch of links already.  Something here for everyone, this week.

  • A git cheatsheet, and another git cheatsheet.  I may have linked to the latter one before, as it looks vaguely familiar.  Anyway, bookmark.  (Thanks, luxh on EFNet #dragonflybsd)
  • What should you do about bad blocks on a disk?  Get a new disk.
  • If you ever wanted to port software, there’s a pkgsrc developer’s guide (thanks Francois Tigeot) that shows you how.
  • It’s NOT LINUX, for the billionth time.  It’s BSD UNIX (certified, even) under there!
  • Children of the Cron“.  An entertaining pun.  (via)
  • Nothing to do with BSD, or even computers, really: Gary Gorton, interviewed about the recent financial crisis, at a Fed bank website (!?).  Interesting because I like economic matters, and because it’s the first web page where I’ve ever seen pop-up links added usefully, as a sort of footnote that you don’t have to scroll.  (via)
  • Michael Lucas recently had a machine broken into.  Since everything on the machine is suspect, he’s using Netflow data to figure out when it happened, and how, which is not surprising given his most recent book.  He has two posts describing how he backtracks his way to the probable source.