[20170521]
|
Support for Controller Area Networks (CAN) in NetBSD
Manuel Bouyer has worked on NetBSD CAN-support, and now he
writes:
``I'd like to merge the bouyer-socketcan branch to HEAD in the next few
days (hopefully early next week, or maybe sunday), unless someone objects
to the idea of a socketcan implementation in NetBSD.
CAN stands for Controller Area Network, a broadcast network used
in automation and automotive fields. For example, the NMEA2000 standard
developped for marine devices uses a CAN network as the link layer.
This is an implementation of the linux socketcan API:
https://www.kernel.org/doc/Documentation/networking/can.txt
you can also see can(4) in the branch.
This adds a new socket family (AF_CAN) and protocol (PF_CAN),
as well as the canconfig(8) utility, used to set timing parameter of
CAN hardware. The branch also includes a driver for the CAN controller
found in the allwinner A20 SoC (I tested it with an Olimex lime2 board,
connected with PIC18-based CAN devices).
There is also the canloop(4) pseudo-device, which allows to use
the socketcan API without CAN hardware.
At this time the CANFD part of the linux socketcan API is not implemented.
Error frames are not implemented either. But I could get the cansend and
canreceive utilities from the canutils package to build and run with minimal
changes. tcpdump(8) can also be used to record frames, which can be
decoded with etherreal.
A review of the code in src/sys/netcan/ is welcome, especially for possible
locking issues.''
What CAN devices would you address with NetBSD? Drop me mail!
[Tags: can, networking]
|
[20070816]
|
Network auto-detection scripts
Some time ago
I had to redo the network auto-detection scripts on
my laptop when the harddisk crashed and I had no backup.
Here's an attempt at documenting things.
The picture: My laptop has an ethernet and a wireless card,
tlp0 and ath0. Ethernet can be plugged in at times, and should have
precedence over wireless -- this is mostly to prevent a wifi network
bouncing up and down interrupting operating via the cable. Wireless can be
configured in several ways, including no security, WEP or WPA.
The machine should try to find network when
waking up from APM, when ethernet is plugged in, or when a
wireless network is found (using whatever SSID).
The idea is to use
wpa_supplicant(8)
to detect wifi networks and mark the ath0 interface as
"connected".
NetBSD's
ifwatchd(8)
is used
to detect if either ethernet or wifi is "connected" or disconnected
when the machine's either running, or returning from sleep.
A shell script then runs dhcp and does assorted setup and cleanup.
The main engine in this setup is ifwatchd(8),
which basically handles all the work that's either induced by
kicking wpa_supplicant(8) via APM, wpa_supplicant(8) finding a
working wifi network, or by plugging in/out an ethernet cable.
The configuration:
- /etc/rc.conf:
apmd=yes
wpa_supplicant=yes
wpa_supplicant_flags="-B -iath0 -c/root/wpa.conf"
ifwatchd=yes
ifwatchd_flags="-c /root/ifwatch-up -n /root/ifwatch-down tlp0 ath0"
- WPA supplicant config: /root/wpa.conf
Here's a sample config file for wpa_supplicant(8) that I use
for University, home and another place. Note that the WPA in there
is a bit more complex than in a home-setup with just a pre-shared key
(PSK):
% cat /root/wpa.conf
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=wheel
#
# WPA-enabled network with identities
# (used at uni-regensburg.de and fh-regensburg.de)
#
network={
ssid="802.11i"
key_mgmt=WPA-EAP
eap=TTLS
identity="abc12345"
password="foobar"
phase2="auth=PAP"
}
#
# An unencrypted (open) network:
#
network={
ssid="eyeswideshut"
scan_ssid=1
key_mgmt=NONE
}
#
# A WEP-encrypted network with pre-shared key:
#
network={
ssid="wepssid"
scan_ssid=1
key_mgmt=NONE
wep_key0="wepkey"
#wep_tx_keyidx=0
#priority=5
}
- Watching interfaces: /root/ifwatch-updown
ifwatchd(8) can't pass parameters, so I'm using two different
scripts, and then look at $0 to see if we're going up or down:
% ls -la /root/ifwatch-*
lrwxr-xr-x 1 root wheel 14 Mar 10 12:27 /root/ifwatch-down -> ifwatch-updown
lrwxr-xr-x 1 root wheel 14 Mar 10 12:27 /root/ifwatch-up -> ifwatch-updown
-rwxr-xr-x 1 root wheel 760 Aug 16 11:45 /root/ifwatch-updown
Here is the script that handles ethernet and wifi networks
going up and down:
% cat /root/ifwatch-updown
#!/bin/sh
#
# See if network is going up or down, to be called via ifwatchd(8)
#
# Copyright (c) 2007 Hubert Feyrer <hubert@feyrer.de>
# All rights reserved.
#
case $0 in
*-up)
case $1 in
tlp*)
# Disable wireless bouncing up and down if we're on wire
#
logger stopping wpa_supplicant
sh /etc/rc.d/wpa_supplicant stop
;;
esac
pkill dhclient
sh /etc/rc.d/network restart
dhclient $1
sh /etc/rc.d/ntpd restart
;;
*-down)
case $1 in
tlp*)
# Re-enable wireless if we go off-wire
#
logger starting wpa_supplicant
sh /etc/rc.d/wpa_supplicant start
;;
esac
pkill -x ssh
sh /etc/rc.d/ntpd stop
pkill dhclient
sh /etc/rc.d/network stop
route delete 194.95.108.0/24
;;
*)
logger "$0 $@": unknown
;;
esac
logger "$0 $@" done.
echo ^G >/dev/console
A few comments:
- As the comment says, if the ethernet interface (tlp)
is found to be connected, wpa_supplicant(8) is stopped to prevent
it from bouncing up and down and possibly disrupt things.
- I stop the network at every time, to flush routes and everything.
This mostly works, but not completely, thus I remove one route
manually. Someone please fix "route flush"...
- I use NTP, and to prevent ntpd(8) from spamming the logs when
offline, I disable it when offline.
- When network goes away, I kill my ssh sessions. I prefer this
over dead sessions that I have to kill with ~.
- The echo-command in the last line sends a beep with ^G to give
a signal that network's up/down now.
- APM setup:
During my experiments, wpa_supplicant(8) died during suspend/resume,
I thus stop it before suspending, and start after resuming. This
may also have positive effects on power consumption (if not it should
probably be hooked in here). My machine uses APM, and I mostly use
/usr/share/examples/apm/script, see that file for install instructions.
Here's the diff that I use to handle wpa_supplicant - dhclient is
restarted via ifwatchd:
% diff -u /usr/share/examples/apm/script /etc/apm/battery
--- /usr/share/examples/apm/script 2003-03-11 15:56:54.000000000 +0100
+++ /etc/apm/battery 2007-03-10 12:57:21.000000000 +0100
@@ -25,7 +25,7 @@
S=/usr/X11R6/share/kde/sounds
# What my network card's recognized as:
-if=ne0
+if=ath0
LOGGER='logger -t apm'
@@ -43,8 +43,11 @@
# In case some NFS mounts still exist - we don't want them to hang:
umount -a -t nfs
umount -a -f -t nfs
- ifconfig $if down
- sh /etc/rc.d/dhclient stop
+
+ sh /etc/rc.d/wpa_supplicant stop
+
+ cd /usr/tmp ; make off
+
$LOGGER 'Suspending done.'
;;
@@ -62,7 +65,9 @@
*resume)
$LOGGER 'Resuming...'
noise $S/KDE_Startup.wav
- sh /etc/rc.d/dhclient start
+
+ sh /etc/rc.d/wpa_supplicant start
+
# mount /home
# mount /data
$LOGGER 'Resuming done.'
The "make off" when shutting down the machine unmounts the
cgf-encrypted data partition
that I'm using for SSH and PGP keys. I manually mount it when
I need it again.
With these four steps -- rc.conf, wpa.conf, ifwatch-script, and APM script
-- things should be in place to auto-detect cable and wifi networks,
and get things online.
The future -- more work on this would include
adding ACPI/powerd(8) scripts,
and putting all of this either into the default NetBSD install,
or at least into NetBSD's /usr/share/examples.
[Tags: apm, cgd, cgf, ifwatchd, networking, wlan, wpa]
|
[20070715]
|
Catchup: bootprops, pkgsrc logo and security, Chaos Singularity, ... (Updated)
OK, so I was lazy (busy :) again the past few weeks. Here's another
big catch-up of the miracles that happened in NetBSD and pkgsrc land:
Enjoy!
Update:
Thomas Bieg has made a
webpage that documents the progress of his logo suggestion.
[Tags: bootprops, Events, logos, networking, pkgsrc, Security]
|
[20070214]
|
Force10 Networks uses NetBSD to build Software Scalability into FTOS Operating System (Update #4)
OK, citing from the
news item
I've managed to get up on our webserver, despite some hassles:
``Force10 Networks® has
leveraged NetBSD® as
the foundation for the Force10 Operating System (FTOS). Based
on the open source UNIX-like system, FTOS provides the software
scalability and resiliency that powers the Force10 TeraScale E-Series® family of
switch/routers.
See our full press
release for more details.
Some technical details that did not make it into the press
release: Today, many of the worlds largest Gigabit Ethernet and
10 Gigabit Ethernet networks depend on Force10 Networks. The
Force10
TeraScale E-Series switches/routers support this by
providing features like massive scalability, 1260 Gigabit
Ethernet ports or 224 Ten Gigabit Ethernet ports per
chassis. The machines are battle tested and provide full
function L2 switching and L3 routing.
Internally, they are equipped with PowerPC CPUs, and for
communication, dedicated 100M Ethernet networks are used in each
system that connect the Route Processor Module (RPM) and line
cards that are for system control.
There are three active CPUs on the primary RPM, and a CPU on
each line card that are all active in the control
plane.
While data itself is forwarded by the hardware, management
overhead exists if you consider running 1.500 VRRP groups, 600
OSPF neighbors, BFD on thousands of ports, ARPs on thousands of
ports, collecting statistics on thousands of ports etc. All
this work is done by the
Force10 Operating System, FTOS''.
|
Force10 Networks
TeraScale E-Series Products
|
The release of this was coordinated for today with
Force10 Networks,
and I'm told that the same press release will occur on
several news sites. I'll put some URLs here when I know them. :)
Update:
The news item is now
on the Force10 Networks frontpage,
and also available as press release from their site
in HTML and
in PDF.
It's also available
on BusinessWire.
Update #2:
There's another text that seems to be written down from the announcement
with some Linux-babble put in
at Linuxworld
Update #3:
The Linuxworld text was now published
on NetworkWorld.
Same author, same Linux-babble.
Update #4:
OSNEWS has
an item on it too, including user comments.
[Tags: force10, networking, Products]
|
[20070116]
|
More fighting ssh password guessing attempts (Updated)
About one year ago (coincidence?) there was some discussion about
how to protect your server against ssh password guessing, see
elsewhere in my blog.
Apparently the topic came up
again,
for ssh and other services this time,
and quite a number of people chimed in and mentioned their preferred
solutions to the same old problem. Solutions fall into three categories:
administrative settings, logfile-parsing, and PAM-based solutions.
Administrative policies to
using password-less ssh logins only is something that needs some adjusting
from users.
Most of the mentioned programs parse logfiles and then act on them.
Among them are
fail2ban,
denyhost and
a similar script,
OSsec,
blockhosts and
a shell-based approach by Rhialto.
The latter post also mentions going the PAM way, which hooks right
into the authentication framework and can detect repeated authentication
failures best - at the place where they get detected first. This is implemented by
the anti-bruteforce PAM module in pkgsrc/security/pam-af.
I guess that's some food for thoughts, and a lot of programs to do the job.
Let's see what comes up in Jan 2008 for this topic... :-)
Update:
Elad Efrat wrote me to tell that server site log parsing may not
be such a good idea as it has a potential to open up for some nasty attacks,
see this thread on the fulldisclosuer list. You've been warned!
[Tags: ids, ipfilter, networking, Security, ssh]
|
[20061124]
|
TCPv6 Transmit Segment Offload (TSO) support in hardware
Work performed by TCP/IP networking stacks include many tasks, among them
are calculation of packet checksums and splitting of "big" packets that exceed the
hardware's maximum transport unit (MTU) into smaller, MTU-sized packets.
The latter process is called fragmentation, and re-assembly of the
fragmented packet on the receiving side has to be done as well, before
the original 'big' packet can be processed.
Modern network cards can do a lot of things in hardware today, and
-- depending on the card! -- some do support calculating checksums
for IP, TCP and UDP for both IPv4 and IPv6, and some even support
packet fragmentation. The latter is known as
TCP segmentation offloading (TSO),
as it reduces the load on the hosts's CPU by moving the
job to the network card.
NetBSD supports calculating of various checksums in hardware for
quite some time now (see the {ip,tcp,udp}{4,6}sum options in
ifconfig(8)), and support for TSO is available for TCP/IPv4
for some time, too, see the 'tso4' option of ifconfig(8).
In the past weeks, Matthias Scheler and Yamamoto Takashi have worked
on adding support for TCP/IPv6 TSO and the wm(4) driver, and the code
is now available in NetBSD-current, it can be enabled via the 'tso6' option
of ifconfig(8).
According to measurements by Matthias,
load on the host CPU
was reduced from ~16% to ~12%, while
throughput went up at the same time
from ~710MBit/s to ~806MBit/s.
For comparison: TSO for IPv4 bumps the throughput
from ~624MBit/s to ~713MBit/s.
[Tags: ipv6, networking, tso]
|
[20061101]
|
EtherIP driver
Hans 'woodstock' Rosenfeld has reworked the current EtherIP driver
for NetBSD 4.0 based on tap(4) and gif(4), citing from the manpage:
``The etherip interface is a tunneling pseudo device for ethernet frames.
It can tunnel ethernet traffic over IPv4 and IPv6 using the EtherIP
protocol specified in RFC 3378.
The only difference between an etherip interface and a real ethernet
interface is that there is an IP tunnel instead of a wire. Therefore, to
use etherip the administrator must first create the interface and then
configure protocol and addresses used for the outer header. This can be
done by using ifconfig(8) create and tunnel subcommands, or SIOCIFCREATE
and SIOCSLIFPHYADDR ioctls.''
See
Hans' posting to tech-net
for more details and a link to the code.
[Tags: driver, etherip, networking]
|
[20060829]
|
Catching up
There were a number of interesting items in the past week or so
that I didn't manage to put here so far. Instead of putting them
into seperate entries, I'll take the liberty to assemble them
into one entry here:
- The Newsforge article
"Which distro should I choose?"
refers us to a
Comparison between NetBSD and OpenBSD,
the website apparently allows other comparisons.
- Parallels
is a
``powerful, easy to use, cost effective desktop virtualization solution that empowers PC users with the ability to create completely networked, fully portable, entirely independent virtual machines on a single physical machine.''
In other words "something like VMware".
In contrast to the leading(?) product in that area,
Parallels supports NetBSD as guest OS officially.
- PC-98
is a PC-like computer from NEC that has a Intel CPU and that was
only sold in Japan. Due to some subtle differences from
the "original" (IBMesque) PC architecture, it can't run
NetBSD/i386 and was so far supported e.g. by FreeBSD/PC98.
Now, Kiyohara Takashi has made patches and a floppy image
available for a NetBSD/pc98 port - see
Kiyohara's mail to tech-kern for more details,
and also some discussion about further abstraction of the
current x86 architecture to support machines with Intel
CPUs that can't run NetBSD/i386.
- Staying on the technical side, David Young has a need to tunnel
packets through consumer-grade (and consumer-intelligence)
devices, which are unlikely to cope with anything outside of
the IP protocol. As such, he has posted patches to
tunnel gre(4) over UDP.
Now let's hope this works as a foundation for
Teredo (tunneling IPv6 over UDP)... :-)
- Verified Exec
is a security subsystem inside NetBSD that verified
fingerprints of binaries before loading them. This prevents
binaries from being changed unnoticed, e.g. by trojan horses.
Now when NetBSD runs such a system and memory becomes tight,
only the process' data is paged to disk, the executables text
is simply discarded with the assumption that it can be paged
in from the disk again when needed.
Of course this assumes that the binary won't change, which
may not be true in a networked scenario with NFS or a
disk on a fiber channel SAN that may be beyond control of the
local system administrator. To prevent attacks of this kind,
Brett Lymn has worked to generate per-page fingerprints that
are kept in memory even when the executable pages are freed,
for later verification when they are paged in from storage
again.
The code is currently under review and available as a patch
set - see
Brett's mail to tech-kern
for all the details!
- While talking about security subsystems, Elad Efrat, who also
worked on veriexec previously continued his work to factor out
authentication inside the kernel: After introducing the
kauth(9)
framework and replacing all manual checks for
"am I running as root" or "does the current secure level allow
this operating" with calls to it, the next step is to
seperate the the place where those calls are made from
a back-end implementation that will determine what is allowed
and what is not, who is privileged and what is not, etc.
While these questions are traditionally answered via special
user ids (0, root), group membership or secure levels,
other methods like capability databases could be imagined.
Elad has been working along these lines, and he has posted
the next step in his work, outlining the upcoming
security model abstraction - see
Elad's mail to tech-security
for details & code references.
- NetBSD 3.1 is around the corner, which will be an update to
NetBSD 3.0 with lots of bugfixes and some minor feature enhancements
like new drivers and also support for Xen 3 DomainU.
There's a
NetBSD 3.1 Release Candidate 1
available - be sure to have a look!
- FWIW, I've also updated the
overview of NetBSD release branches
a few days ago, as I still see a lot of people that are
confused over NetBSD's three lines of release branches
(well, counting the development branch NetBSD-current as release
branch :), and the differences between what a branch and what
a release is.
With NetBSD 3.0, 3.0.1 and 3.1 this sure makes my little head spin...
- But there's more than NetBSD 3.x! If you've watched the above
link, you will understand that the next release after the
NetBSD 3.x set of releases is NetBSD 4.x.
The release cycle for NetBSD 4.0 has started a few days
ago, and there's also
an announcement about the start of the NetBSD 4.0 release process
by the NetBSD 4.0 release engineer Jef Rizzo which has information
on schedule, how YOU can help and getting beta binaries and sources.
- The working period of the Google Summer of Code is over, and
while mentors are still evaluating the code submitted by students,
there are some public status reports:
Alwe MainD'argent about the status of the 'ipsec6' project
and
Sumantra Kundu about the 'congest' project
- Sysjail 1.0 has been released!
Includes some interesting
overhead benchmarks.
- As reported in the #NetBSD Community Blog,
an alpha version of
sBSD
was released: It's a NetBSD-based system for easy installation
on USB sticks and CF cards.
So much for now. Enjoy!
[Tags: Articles, google-soc, gre, kauth, networking, openbsd, parallels, pc98, releases, sbsd, Security, sysjail, veriexec, vmware]
|
[20060509]
|
Using WPA
Someone asked about how to use WPA, and before searching the
docs and mailing lists again,
this link
may come in handy next time.
[Tags: Docs, networking, wpa]
|
[20060131]
|
NetBSD thanks WIDE and KAME for IPv6 implementation
As a reaction of
KAME's conclusion,
official mail to thank WIDE and KAME for the fine IPv6 implementation
were sent out to them, see
the copy sent to tech-net@.
I can't say I wasn't involved in this mail... :-)
[Tags: ipv6, kame, networking]
|
|
Tags: ,
2bsd,
34c3,
3com,
501c3,
64bit,
acl,
acls,
acm,
acorn,
acpi,
acpitz,
adobe,
adsense,
Advocacy,
advocacy,
advogato,
aes,
afs,
aiglx,
aio,
airport,
alereon,
alex,
alix,
alpha,
altq,
am64t,
amazon,
amd64,
anatomy,
ansible,
apache,
apm,
apple,
arkeia,
arla,
arm,
art,
Article,
Articles,
ascii,
asiabsdcon,
aslr,
asterisk,
asus,
atf,
ath,
atheros,
atmel,
audio,
audiocodes,
autoconf,
avocent,
avr32,
aws,
axigen,
azure,
backup,
balloon,
banners,
basename,
bash,
bc,
beaglebone,
benchmark,
bigip,
bind,
blackmouse,
bldgblog,
blog,
blogs,
blosxom,
bluetooth,
board,
bonjour,
books,
boot,
boot-z,
bootprops,
bozohttpd,
bs2000,
bsd,
bsdca,
bsdcan,
bsdcertification,
bsdcg,
bsdforen,
bsdfreak,
bsdmac,
bsdmagazine,
bsdnexus,
bsdnow,
bsdstats,
bsdtalk,
bsdtracker,
bug,
build.sh,
busybox,
buttons,
bzip,
c-jump,
c99,
cafepress,
calendar,
callweaver,
camera,
can,
candy,
capabilities,
card,
carp,
cars,
cauldron,
ccc,
ccd,
cd,
cddl,
cdrom,
cdrtools,
cebit,
centrino,
cephes,
cert,
certification,
cfs,
cgd,
cgf,
checkpointing,
china,
christos,
cisco,
cloud,
clt,
cobalt,
coccinelle,
codian,
colossus,
common-criteria,
community,
compat,
compiz,
compsci,
concept04,
config,
console,
contest,
copyright,
core,
cortina,
coverity,
cpu,
cradlepoint,
cray,
crosscompile,
crunchgen,
cryptography,
csh,
cu,
cuneiform,
curses,
curtain,
cuwin,
cvs,
cvs-digest,
cvsup,
cygwin,
daemon,
daemonforums,
daimer,
danger,
darwin,
data,
date,
dd,
debian,
debugging,
dell,
desktop,
devd,
devfs,
devotionalia,
df,
dfd_keeper,
dhcp,
dhcpcd,
dhcpd,
dhs,
diezeit,
digest,
digests,
dilbert,
dirhash,
disklabel,
distcc,
dmesg,
Docs,
Documentation,
donations,
draco,
dracopkg,
dragonflybsd,
dreamcast,
dri,
driver,
drivers,
drm,
dsl,
dst,
dtrace,
dvb,
ec2,
eclipse,
eeepc,
eeepca,
ehci,
ehsm,
eifel,
elf,
em64t,
embedded,
Embedded,
emips,
emulate,
encoding,
envsys,
eol,
espresso,
etcupdate,
etherip,
euca2ools,
eucalyptus,
eurobsdcon,
eurosys,
Events,
exascale,
ext3,
f5,
facebook,
falken,
fan,
faq,
fatbinary,
features,
fefe,
ffs,
filesystem,
fileysstem,
firefox,
firewire,
fireworks,
flag,
flash,
flashsucks,
flickr,
flyer,
fmslabs,
force10,
fortunes,
fosdem,
fpga,
freebsd,
freedarwin,
freescale,
freex,
freshbsd,
friendlyAam,
friendlyarm,
fritzbox,
froscamp,
fsck,
fss,
fstat,
ftp,
ftpd,
fujitsu,
fun,
fundraising,
funds,
funny,
fuse,
fusion,
g4u,
g5,
galaxy,
games,
gcc,
gdb,
gentoo,
geode,
getty,
gimstix,
git,
gnome,
google,
google-soc,
googlecomputeengine,
gpio,
gpl,
gprs,
gracetech,
gre,
groff,
groupwise,
growfs,
grub,
gumstix,
guug,
gzip,
hackathon,
hackbench,
hal,
hanoi,
happabsd,
hardware,
Hardware,
haze,
hdaudio,
heat,
heimdal,
hf6to4,
hfblog,
hfs,
history,
hosting,
hotplug,
hp,
hp700,
hpcarm,
hpcsh,
hpux,
html,
httpd,
hubertf,
hurd,
i18n,
i386,
i386pkg,
ia64,
ian,
ibm,
ids,
ieee,
ifwatchd,
igd,
iij,
image,
images,
imx233,
imx7,
information,
init,
initrd,
install,
intel,
interix,
internet2,
interview,
interviews,
io,
ioccc,
iostat,
ipbt,
ipfilter,
ipmi,
ipplug,
ipsec,
ipv6,
irbsd,
irc,
irix,
iscsi,
isdn,
iso,
isp,
itojun,
jail,
jails,
japanese,
java,
javascript,
jetson,
jibbed,
jihbed,
jobs,
jokes,
journaling,
kame,
kauth,
kde,
kerberos,
kergis,
kernel,
keyboardcolemak,
kirkwood,
kitt,
kmod,
kolab,
kvm,
kylin,
l10n,
landisk,
laptop,
laptops,
law,
ld.so,
ldap,
lehmanns,
lenovo,
lfs,
libc,
license,
licensing,
linkedin,
links,
linksys,
linux,
linuxtag,
live-cd,
lkm,
localtime,
locate.updatedb,
logfile,
logging,
logo,
logos,
lom,
lte,
lvm,
m68k,
macmini,
macppc,
macromedia,
magicmouse,
mahesha,
mail,
makefs,
malo,
mame,
manpages,
marvell,
matlab,
maus,
max3232,
mbr95,
mbuf,
mca,
mdns,
mediant,
mediapack,
meetbsd,
mercedesbenz,
mercurial,
mesh,
meshcube,
mfs,
mhonarc,
microkernel,
microsoft,
midi,
mini2440,
miniroot,
minix,
mips,
mirbsd,
missile,
mit,
mixer,
mobile-ip,
modula3,
modules,
money,
mouse,
mp3,
mpls,
mprotect,
mtftp,
mult,
multics,
multilib,
multimedia,
music,
mysql,
named,
nas,
nasa,
nat,
ncode,
ncq,
ndis,
nec,
nemo,
neo1973,
netbook,
netboot,
netbsd,
netbsd.se,
nethack,
nethence,
netksb,
netstat,
netwalker,
networking,
neutrino,
nforce,
nfs,
nis,
npf,
npwr,
nroff,
nslu2,
nspluginwrapper,
ntfs-3f,
ntp,
nullfs,
numa,
nvi,
nvidia,
nycbsdcon,
office,
ofppc,
ohloh,
olimex,
olinuxino,
olpc,
onetbsd,
openat,
openbgpd,
openblocks,
openbsd,
opencrypto,
opendarwin,
opengrok,
openmoko,
openoffice,
openpam,
openrisk,
opensolaris,
openssl,
or1k,
oracle,
oreilly,
oscon,
osf1,
osjb,
paas,
packages,
pad,
pae,
pam,
pan,
panasonic,
parallels,
pascal,
patch,
patents,
pax,
paypal,
pc532,
pc98,
pcc,
pci,
pdf,
pegasos,
penguin,
performance,
pexpect,
pf,
pfsync,
pgx32,
php,
pie,
pike,
pinderkent,
pkg_install,
pkg_select,
pkgin,
pkglint,
pkgmanager,
pkgsrc,
pkgsrc.se,
pkgsrccon,
pkgsrcCon,
Platforms,
plathome,
pleiades,
pocketsan,
podcast,
pofacs,
politics,
polls,
polybsd,
portability,
posix,
postinstall,
power3,
powernow,
powerpc,
powerpf,
pppoe,
precedence,
preemption,
prep,
presentations,
prezi,
products,
Products,
proplib,
protectdrive,
proxy,
ps,
ps3,
psp,
psrset,
pthread,
ptp,
ptyfs,
Publications,
puffs,
puredarwin,
pxe,
qemu,
qnx,
qos,
qt,
quality-management,
quine,
quote,
quotes,
r-project,
ra5370,
radio,
radiotap,
raid,
raidframe,
rants,
raptor,
raq,
raspberrypi,
rc.d,
readahead,
realtime,
record,
refuse,
reiserfs,
Release,
releases,
Releases,
releng,
reports,
resize,
restore,
ricoh,
rijndael,
rip,
riscos,
rng,
roadmap,
robopkg,
robot,
robots,
roff,
rootserver,
rotfl,
rox,
rs323,
rs6k,
rss,
ruby,
rump,
rzip,
sa,
safenet,
san,
sata,
savin,
sbsd,
scampi,
scheduler,
scheduling,
schmonz,
sco,
screen,
script,
sdf,
sdtemp,
secmodel,
security,
Security,
sed,
segvguard,
seil,
sendmail,
serial,
serveraptor,
sfu,
sge,
sgi,
sgimips,
sh,
sha2,
shark,
sharp,
shisa,
shutdown,
sidekick,
size,
slackware,
slashdot,
slides,
slit,
smbus,
smp,
sockstat,
soekris,
softdep,
softlayer,
software,
solaris,
sony,
sound,
source,
source-changes,
spanish,
sparc,
sparc64,
spider,
spreadshirt,
spz,
squid,
ssh,
sshfs,
ssp,
statistics,
stereostream,
stickers,
storage,
stty,
studybsd,
subfile,
sudbury,
sudo,
summit,
sun,
sun2,
sun3,
sunfire,
sunpci,
support,
sus,
suse,
sushi,
susv3,
svn,
swcrypto,
symlinks,
sysbench,
sysctl,
sysinst,
sysjail,
syslog,
syspkg,
systat,
systrace,
sysupdate,
t-shirt,
tabs,
talks,
tanenbaum,
tape,
tcp,
tcp/ip,
tcpdrop,
tcpmux,
tcsh,
teamasa,
tegra,
teredo,
termcap,
terminfo,
testdrive,
testing,
tetris,
tex,
TeXlive,
thecus,
theopengroup,
thin-client,
thinkgeek,
thorpej,
threads,
time,
time_t,
timecounters,
tip,
tk1,
tme,
tmp,
tmpfs,
tnf,
toaster,
todo,
toolchain,
top,
torvalds,
toshiba,
touchpanel,
training,
translation,
tso,
tty,
ttyrec,
tulip,
tun,
tuning,
uboot,
ucom,
udf,
ufs,
ukfs,
ums,
unetbootin,
unicos,
unix,
updating,
upnp,
uptime,
usb,
usenix,
useradd,
userconf,
userfriendly,
usermode,
usl,
utc,
utf8,
uucp,
uvc,
uvm,
valgrind,
vax,
vcfe,
vcr,
veriexec,
vesa,
video,
videos,
virtex,
virtualization,
vm,
vmware,
vnd,
vobb,
voip,
voltalinux,
vpn,
vpnc,
vulab,
w-zero3,
wallpaper,
wapbl,
wargames,
wasabi,
webcam,
webfwlog,
wedges,
wgt624v3,
wiki,
willcom,
wimax,
window,
windows,
winmodem,
wireless,
wizd,
wlan,
wordle,
wpa,
wscons,
wstablet,
X,
x.org,
x11,
x2apic,
xbox,
xcast,
xen,
Xen,
xfree,
xfs,
xgalaxy,
xilinx,
xkcd,
xlockmore,
xmms,
xmp,
xorg,
xscale,
youos,
youtube,
zaurus,
zdump,
zfs,
zlib
'nuff.
Grab the RSS-feed,
index,
or go back to my regular NetBSD page
Disclaimer: All opinion expressed here is purely my own.
No responsibility is taken for anything.