<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
	<channel>
		<title>DEF CON Forums - HardenedBSD</title>
		<link>https://forum.defcon.org/</link>
		<description><![CDATA[The HardenedBSD Project is a clean-room reimplementation of the grsecurity patchset for the wider BSD community. (site <a href="https://hardenedbsd.org/">https://hardenedbsd.org/</a>)]]></description>
		<language>en</language>
		<lastBuildDate>Fri, 01 May 2026 11:56:59 GMT</lastBuildDate>
		<generator>vBulletin</generator>
		<ttl>60</ttl>
		<image>
			<url>https://forum.defcon.org/images/misc/rss.png</url>
			<title>DEF CON Forums - HardenedBSD</title>
			<link>https://forum.defcon.org/</link>
		</image>
		<item>
			<title>HardenedBSD February 2026 Status Report</title>
			<link>https://forum.defcon.org/node/255479</link>
			<pubDate>Wed, 04 Mar 2026 21:39:21 GMT</pubDate>
			<description><![CDATA[February saw a few changes in HardenedBSD. The majority of my time was spent chasing down the kernel crash in HardenedBSD 15-STABLE that has been plaguing our users. I worked on narrowing down to a three-day window during which a commit was made that causes the crash. 
 
As I write this, I'm...]]></description>
			<content:encoded><![CDATA[February saw a few changes in HardenedBSD. The majority of my time was spent chasing down the kernel crash in HardenedBSD 15-STABLE that has been plaguing our users. I worked on narrowing down to a three-day window during which a commit was made that causes the crash.<br />
<br />
As I write this, I'm narrowing that down further to the specific commit. I'm hoping to have this resolved this month. If I find and fix the problem this week, I will create new builds for folks to use. Otherwise, the next scheduled regular quarterly build is for 01 Apr 2026.<br />
<br />
I appreciate everyone's patience on this. This has been a tricky bug (at times, it fit the description of a &quot;heisenbug&quot;). My spare time is limited (I have a rather large amount of tasks/obligations in everyday ${LIFE} right now), so it has naturally taken a long while to get to this point.<br />
<br />
While inbetween clients at my dayjob, I have been granted the opportunity to research meshtastic and other mesh networking projects. I'm getting a lot closer in my censorship- and surveillance-resistant mesh network proof-of-concept. I'm now at the point where I need to port Linux-specific code to HardenedBSD. I'm hoping to get normal tcp/ip packets flowing through Reticulum nodes on the inside of six months. This project, <a href="https://hardenedbsd.org/article/shawn-webb/2024-09-23/hardenedbsd-and-protectli-collaborates-censorship-and-surveillance" target="_blank" rel="nofollow">announced</a> in partnership with Protectli one-and-a-half years ago[1], is starting to move along at a nice pace. I will have more to share on that by the next status report.<br />
<br />
On Saturday, 28 Feb 2026, I had given my local Hackers N' Hops chapter a little show &amp; tell of Meshtastic, Reticulum, and HardenedBSD. I met with a bunch of really cool hacckers there, and demoed two Reticulum RNodes backed by Reticulum instances on two HardenedBSD laptops. I demoed an exec-over-meshtastic Python script I wrote the day prior. The script is available on Radicle as rad:z44pvAJS7SiQf2CGtpn8hY44GDMyu.<br />
<br />
Speaking of Radicle, I plan to migrate some of my personal repos away from our self-hosted GitLab and onto the Radicle network. With time, I'm hoping to migrate us completely towards Radicle. Now would be a good time for those who want to contribute to HardenedBSD to start playing around and experimenting with Radicle.<br />
<br />
<b>In src:</b><ol class="decimal"><li>Contributor &quot;gmg&quot; hardened the kernel crashdump interface.</li>
<li>Opt zlib kernel module into -ftrivial-var-auto-init=zero.</li>
<li>bsdinstall(8): Align us more closely with FreeBSD.</li>
</ol><b>In ports:</b><ol class="decimal"><li>net-p2p/reticulum was updated to 1.1.3_2</li>
<li>Disable PaX PAGEEXEC and PaX NOEXEC for science/zotero</li>
<li>Bring in candidate patch to fix dns/unbound</li>
<li>Hook hardenedbsd/ctrl into the build</li>
<li>0x1eef added a new port: hardenedbsd/ctrl</li>
<li>Bump ports-mgmt/pkg to 3.5.1_1</li>
<li>0x1eef updated a port: portzap v2.1.1</li>
<li>0x1eef updated a port: sourcezap v2.1.1</li>
</ol><br />
Once I have figured out what's going on with the 15-STABLE panic and have a proper fix in place, I plan to quickly switch gears towards hbsdfw. I haven't produced a working hbsdfw build in a long time, and it's far past due. After that, I plan to switch right back to the Reticulum research and development.<br />
<br />
I'll make sure to keep the community informed of the 15-STABLE findings and fixes.<br />
 ]]></content:encoded>
			<category domain="https://forum.defcon.org/node/240318">HardenedBSD</category>
			<dc:creator>shawn.webb</dc:creator>
			<guid isPermaLink="true">https://forum.defcon.org/node/255479</guid>
		</item>
		<item>
			<title>HardenedBSD January 2026 Status Report</title>
			<link>https://forum.defcon.org/node/255389</link>
			<pubDate>Wed, 04 Feb 2026 16:50:03 GMT</pubDate>
			<description><![CDATA[January was a busy month with regards to infrastructure. With both OpenSSL and FreeBSD announcing security fixes, we published new builds just weeks after our new quarterlies dropped. :-) 
 
Now that we have the new quarterlies, I plan to &quot;MFC&quot; (old FreeBSD CVS/SVN term for &quot;Merge From Current&quot;.)...]]></description>
			<content:encoded><![CDATA[January was a busy month with regards to infrastructure. With both OpenSSL and FreeBSD announcing security fixes, we published new builds just weeks after our new quarterlies dropped. :-)<br />
<br />
Now that we have the new quarterlies, I plan to &quot;MFC&quot; (old FreeBSD CVS/SVN term for &quot;Merge From Current&quot;.) Kids these days call it `git cherry-pick`. MFC is shorter to type, so that's what I'll use. I plan to MFC a number of commits made in hardened/current/master to the hardened/15-stable/main branch this week.<br />
<br />
I've also received multiple reports of crashes with the 15-STABLE installer. I haven't been able to work on this just yet, but am hoping to in the next two weeks. It is almost my current first priority (the MFCs being first.) I figure that if testing the cherry-picked code proves successful, I could cherry-pick those commits into the relevant quarterly branch. Kind of a &quot;thank you&quot; gesture for being patient with me. :-)<br />
<br />
I applied relevant updates across the entire infrastructure. I migrated the package repos from being served by a leased server with limited storage to out of my home with plenty of storage. My next goal is to fully automate the build, including syncing. This will mark a good next step to eventually supporting mirroring our package repos. It's much easier to transfer a 140GB package repo over a local 2.5Gbps LAN than a 150Mbps link upstream.<br />
<br />
I spent some time experimenting with Meshtastic and Reticulum. I'm getting a better picture from a user's perspective on the current state of mesh networking. My next goal is to teach Reticulum's BackboneInterface implementation how to work on FreeBSD/HardenedBSD.<br />
<br />
Two of the four donated Protectli devices are providing the testing lab for this Meshtastic and Reticulum research. Even though the timeframe has shifted pretty dramatically, I'm grateful for their donations and their support.<br />
<br />
<b>In src:</b><ol class="decimal"><li>Opt ipfw into -ftrivial-var-auto-init=zero</li>
<li>Remove our old MAC hook for jail/prison destruction (this commit breaks building secadm. I'm waiting on upstream to implement a specific MAC hook, and a patch for (for src, not for secadm) is being worked on by FreeBSD's Kyle Evans.)</li>
<li>Disable WITNESS' checking of vnode locks by default. FreeBSD changed some vnode locking semantics and not all filesystem code paths have been updated. As such, we are seeing vnode locking-related panics. I need to get a consequtive block of time to dive in. I'm not a filesytems developer, so this one might take a while to figure out unless someone beats me to it.</li>
<li>rc.subr: Ignore required_modules failures in jails (patch submission by leper4{ _AT_ }protnmail.com.)</li>
</ol><b>In ports:</b><ol class="decimal"><li>Bump ftp/curl to 8.18.0</li>
<li>Update Reticulum to latest git HEAD</li>
<li>Disable HARDCFLAGS for devel/avr-gcc</li>
<li>Enable ZEROREG for security/openssl3*. This could induce a noticeable performance hit. Please let me know if you have any serious performance issues after this next package build.</li>
</ol>]]></content:encoded>
			<category domain="https://forum.defcon.org/node/240318">HardenedBSD</category>
			<dc:creator>shawn.webb</dc:creator>
			<guid isPermaLink="true">https://forum.defcon.org/node/255389</guid>
		</item>
	</channel>
</rss>
