Rafael Sadowski

rsadowski@openbsd.org

location
Nürnberg (German)
www
rsadowski.de
Consultancy
open23.de
Rafael Sadowskisizeofvoid@bsd.network
2026-01-15

@tobhe Neither did I, and then Robert came around the corner

Rafael Sadowskisizeofvoid@bsd.network
2026-01-15

Kudos to Robert Nagy (robert@). Without much fuss, he committed OpenWV and enabled Widevine support in Chromium. Now we can all enjoy Netflix, Disney+, and other DRM content on #OpenBSD.

marc.info/?l=openbsd-ports-cvs
marc.info/?l=openbsd-ports-cvs

Rafael Sadowski boosted:
2026-01-04
I nearly forgot to wish those that celebrate a very happy OpenBSDmas too. 😉 :openbsd: :runbsd:
#OpenBSD #RunBSD
A Christmas tree made out of pufferfish ( OpenBSD logo ) wearing Santa hats
Rafael Sadowskisizeofvoid@bsd.network
2026-01-01

I hope you all had a good start to the new year. For my part, I am looking forward to 2026! Every year can be the best year ever. It's up to you!

2025 was a year in which I wrote more than I had done in a long time. I am considering continuing to do so. Perhaps in a slightly different way. I would like to use this blog more to summaries what I am learning during a month or events.

The travel list has also grown this year and welcomed a new guest with Japan.

rsadowski.de/posts/

Rafael Sadowski boosted:
Miguel de Icaza ᯅ🍉Migueldeicaza
2025-12-26

Golden opportunity to become a reverse centaur! You only need to audit/review 5,600 lines of c++ code ported to rust per hour!

Rafael Sadowskisizeofvoid@bsd.network
2025-12-24

Driving home for Christmas...

Rafael Sadowskisizeofvoid@bsd.network
2025-12-23

@ezaquarii When I have time again to make countless forks, clones, patches, pushes, PRs, yes ;)

Rafael Sadowskisizeofvoid@bsd.network
2025-12-23

@Quillaja No, I built it from a ports proposal. But it should be available in the next package build.

Rafael Sadowskisizeofvoid@bsd.network
2025-12-19

I'm looking for an Apple Mac mini (M2 Pro) to build and test arm64 ports. openbsd.org/want.html

Rafael Sadowski boosted:
2025-12-18

OpenSSH runs a large number of tests via Github Runners, both Github supplied ones on a public repo, and on selfhosted runners on a private repo. The latter covers a bunch of platforms Github doesn't support, and is private not because we don't want it accessible (in fact we would prefer it be public) but because as far as we can tell, making it public would represent a significant security risk.

Github have announced that they will begin charging per-minute fees for Github Actions self-hosted runners starting next year. These fees apply only to runners on private repos, but "actions will remain free in public repositories."[0] This is going to be a significant problem for us.

Github's own documentation points out allowing selfhosted runners on public repositories is unsafe, because it's a potential remote code execution vector via running arbitrary workflows in modified pull requests:

"As a result, self-hosted runners should almost never be used for public repositories on GitHub, because any user can open pull requests against the repository and compromise the environment."[2]

There are some controls[1], but the documentation on them doesn't exactly instill confidence (emphasis on the weasel words added):

"Anyone can fork a public repository, and then submit a pull request that proposes changes to the repository's GitHub Actions workflows. [...] To *help* prevent this, workflows on pull requests to public repositories from *some* outside contributors will not run automatically, and *might* need to be approved first. Depending on the "Approval for running fork pull request workflows from contributors" setting, workflows on pull requests to public repositories will not run automatically and *may* need approval if: The pull request is created by a user that requires approvals based on the selected policy.[or] The pull request event is triggered by a user that requires approvals based on the selected policy."

All of this uncertainty could be addressed by completely disabling pull requests on a repo, but while that has been requested many many times over the course of a decade([3] [4]), this is still not possible.

It *is* possble to *temporarily* disable pull requests on a repository via Interaction Limits[5], but using this as a security control that (silently?) fails open after some amount of time is problematic to say the least. The required functionality is almost there, it just needs a "forever" option.

So, in summary: self-hosted runners remain free as long as you run them on public repos, which you shouldn't because it's unsafe, unless you also disable pull requests, which you probably can't.

[0] resources.github.com/actions/2
[1] docs.github.com/en/repositorie
[2] docs.github.com/en/actions/ref
[3] github.com/orgs/community/disc
[4] github.com/dear-github/dear-gi
[5] docs.github.com/en/communities

Rafael Sadowskisizeofvoid@bsd.network
2025-12-18

Native Signal Messenger support via net/#flare-messenger on #OpenBSD

Rafael Sadowskisizeofvoid@bsd.network
2025-12-13

OpenBSD ports are in an incredible rush!

- devel/gdb is currently getting a lot of improvements by kurt@

- The default GCC compiler has been switched from 8 to 15! This means modern C++ under sparc64!

- Qt 6.10.1 is here (still a bit glitchy but soon to be stable as packages)

- KDE Plasma 6.5

- Python 3.13.11 and thus 3.13 for OpenBSD 7.9

- Go 1.25.5

Rafael Sadowskisizeofvoid@bsd.network
2025-11-29

Petition for German residents regarding Open Source Contribution:

openpetition.de/petition/onlin

I would be delighted if many people would sign. Thank you!

Rafael Sadowskisizeofvoid@bsd.network
2025-11-27

#OpenBSD #KDE #Qt update: Plasma 6.5.3, Qt 6.10.1, Qt 5.15.18 + KDE patches, Newest QtPy stack. It couldn't be any more up to date. That was a lot of work! Now it's time to get it into the cvs tree so that everyone can use it soon.

Rafael Sadowskisizeofvoid@bsd.network
2025-11-19

3 major outages in a few weeks: AWS, Azure, now Cloudflare. Is there a correlation between AI age and these outages?

The AI age paradox: The "smarter" our systems get, the dumber the errors that kill them?

Rafael Sadowskisizeofvoid@bsd.network
2025-11-10

Marathonas - Athens Marathon - The Authentic

Rafael Sadowskisizeofvoid@bsd.network
2025-11-07

I forced some of my boxes to only use SSH post-quantum algorithms like mlkem768x25519-sha256. I have #OpenSUSE Tumbleweed on one of my desktops. It turns out that these are not enabled by default: bugzilla.suse.com/show_bug.cgi

First, you have to make complicated adjustments to two files:

/etc/crypto-policies/config
/etc/crypto-policies/policies/modules/SSH-QUANTUM.pmod

What kind of nonsense is this? #Unsecure by default?

news.opensuse.org/2025/05/02/t

Rafael Sadowskisizeofvoid@bsd.network
2025-10-31

This how "try-and-error qtwebengine-6.10.0 porting" looks like:

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst