{"$schema": "https://c3voc.de/schedule/schema.json", "generator": {"name": "pretalx", "version": "2025.2.0.dev0"}, "schedule": {"url": "https://2026.asiabsdcon.org/entry/schedule/", "version": "20260303", "base_url": "https://2026.asiabsdcon.org", "conference": {"acronym": "entry", "title": "AsiaBSDCon 2026", "start": "2026-03-19", "end": "2026-03-22", "daysCount": 4, "timeslot_duration": "00:05", "time_zone_name": "Asia/Taipei", "colors": {"primary": "#ff0000"}, "rooms": [{"name": "Room A", "slug": "1-room-a", "guid": "465ffaa8-d147-59f4-8352-f8b3de1ff052", "description": "Main Conference Room", "capacity": null}, {"name": "Room B", "slug": "2-room-b", "guid": "b8a88211-17fe-5ab3-9c35-85a0ecfd0d33", "description": "Sub Conference Room", "capacity": null}, {"name": "Room C", "slug": "3-room-c", "guid": "d2cb40ab-eecb-577e-ab9a-ba645cccd62e", "description": "Meeting Room 1", "capacity": null}, {"name": "Storage Room", "slug": "4-storage-room", "guid": "5baaf8f0-990f-515c-ab58-aac17caf80cc", "description": null, "capacity": null}], "tracks": [], "days": [{"index": 1, "date": "2026-03-19", "day_start": "2026-03-19T04:00:00+08:00", "day_end": "2026-03-20T03:59:00+08:00", "rooms": {"Room A": [{"guid": "466de81c-4bec-5f96-ab51-96880d1149b6", "code": "ZUQPMV", "id": 18, "logo": null, "date": "2026-03-19T09:30:00+08:00", "start": "09:30", "duration": "07:30", "room": "Room A", "slug": "entry-18-network-management-with-the-openbsd-packet-filter-toolset", "url": "https://2026.asiabsdcon.org/entry/talk/ZUQPMV/", "title": "Network Management with the OpenBSD Packet Filter Toolset", "subtitle": "", "track": null, "type": "Tutorial (full-day)", "language": "en", "abstract": "The OpenBSD Packet Filter (PF) is at the core of the network management toolset available to professionals working with the BSD family of operating systems.\r\n\r\nUnderstanding the networking toolset is essential to building and maintaining a functional envirionment. The present session will both teach principles and provide opportunity for hands-on operation of the extensive network tools available on OpenBSD and sister operating systems in a lab environment. Basic to intermediate understanding of TCP/IP networking is expected and required for this session.\r\n\r\nTopics covered include\r\n\r\n  * The basics of and network design and taking it a bit further\r\n\r\n  * Building rulesets\r\n\r\n  * Keeping your configurations readable and maintainable\r\n\r\n  * Seeing what your traffic is really about with your friend tcpdump(8)\r\n\r\n  * Filtering, diversion, redirection, Network Address Translation\r\n\r\n  * Handling services that require proxying (ftp-proxy and others)\r\n\r\n  * Address tables and daemons that interact with your setup through them\r\n\r\n  * The whys and hows of network segmentation, DMZs and other separation techniques\r\n\r\n  * Tackling noisy attacks and other pattern recognition and learning tricks\r\n\r\n  * Annoying spammers with spamd\r\n\r\n  * Basics of and not-so basic traffic shaping\r\n\r\n  * Monitoring your traffic\r\n\r\n  * Resilience, High Availability with CARP and pfsync\r\n\r\n  * Troubleshooting: Discovering and correcting errors and faults\r\n\r\n  * Your network and its interactions with the Internet at large\r\n\r\n  * Common mistakes in internetworking and peering\r\n\r\n  * Keeping the old IPv4 world in touch with the new of IPv6\r\n\r\nThe tutorial is lab centered and fast paced. Time allowing and to the extent necessary, we will cover recent developments in the networking tools and variations between the implementations in the sister BSD operating systems.\r\n\r\nParticipants should bring a laptop for the hands on labs part and for note taking. The format of the session will be compact lectures interspersed with hands-on lab excercises based directly on the theory covered in the lecture parts.\r\n\r\nThis session is an evolutionary successor to previous sessions. Slides for the most recent version of the PF tutorial session are up at https://nxdomain.no/~peter/pf_fullday.pdf, to be updated with the present version when the session opens.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "8DWLWE", "name": "Massimiliano Stucchi", "avatar": "https://2026.asiabsdcon.org/media/avatars/8DWLWE_91jguBJ.jpg", "biography": "Massimiliano \"Max\" stucchi  is the main person behind Glevia, a Swiss organisation providing training and consulting on networking.  In his past, he founded an ISP and WISP in Italy, worked at the RIPE NCC as trainer and subsequently as IPv6 Programme Manager and last at the Internet Society.  He is involved in a number of programme committees and helps run a couple of Internet Exchanges. Max also runs his own autonomous systems - AS58280 - for fun, testing and research.  He is based in Zurich, Switzerland.", "public_name": "Massimiliano Stucchi", "guid": "1342b461-dea0-5683-84cd-52dfc29175ff", "url": "https://2026.asiabsdcon.org/entry/speaker/8DWLWE/"}, {"code": "MZFGZ9", "name": "Peter Hansteen", "avatar": "https://2026.asiabsdcon.org/media/avatars/MZFGZ9_SLkSnvy.jpg", "biography": "Chief Technical Specialist at Tieto Tech Consulting. Author of The Book of PF (https://nostarch.com/book-of-pf-4th-edition), occasional blogger (https://bsdly.blogspot.com) and lecturer on IT security with a strong preference for OpenBSD.", "public_name": "Peter Hansteen", "guid": "722bb0fa-d221-58e8-afd5-cf3912f6ca4c", "url": "https://2026.asiabsdcon.org/entry/speaker/MZFGZ9/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/ZUQPMV/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/ZUQPMV/", "attachments": []}], "Room B": [{"guid": "eddbf354-0f14-5e7c-ae4f-bc515c18859a", "code": "QTNJ7B", "id": 27, "logo": null, "date": "2026-03-19T09:30:00+08:00", "start": "09:30", "duration": "03:00", "room": "Room B", "slug": "entry-27-freebsd-ports-any-speedrun-180min", "url": "https://2026.asiabsdcon.org/entry/talk/QTNJ7B/", "title": "FreeBSD Ports Any% Speedrun 180min", "subtitle": "", "track": null, "type": "Tutorial (half-day)", "language": "en", "abstract": "The FreeBSD Ports Collection is one of the largest third-party software repositories in the open-source world. According to Repology, it ranks in the top four in terms of the number of packages, maintainers, and up-to-date packages. Alright, that's all fine and dandy, but how does it work? What is this mystical ports framework? Why is it so powerful?\r\n\r\nThe workshop has 3 parts: user usage, ports maintenance, and framework development. The ports framework is a dense codebase and you'll need a map to navigate it. This workshop is the map. The workshop's goal is to raise your confidence in using ports, help you understand the framework's current limitations, and enable you to modify the framework and contribute those changes back.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "TMMPSB", "name": "Mateusz Piotrowski", "avatar": "https://2026.asiabsdcon.org/media/avatars/TMMPSB_m2au4Cu.jpg", "biography": "Mateusz Piotrowski is a systems engineer based in Berlin, Germany. He has long contributed to open source, primarily to the FreeBSD and OpenZFS projects, and served on the FreeBSD Core Team from 2022 to 2024. Professionally, he consults for companies on performance engineering and open-source development. He received his ports commit bit in 2018 and has since helped maintain various ports, including Ansible, Samba, and the DTrace Toolkit.", "public_name": "Mateusz Piotrowski", "guid": "56c753f6-e5ea-527d-b308-722f2447e603", "url": "https://2026.asiabsdcon.org/entry/speaker/TMMPSB/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/QTNJ7B/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/QTNJ7B/", "attachments": []}, {"guid": "157807d0-e0e6-5c95-a1b6-a2a5e2c1d162", "code": "DALTGJ", "id": 21, "logo": null, "date": "2026-03-19T14:00:00+08:00", "start": "14:00", "duration": "03:00", "room": "Room B", "slug": "entry-21-freebsd-jails-orchestration-with-ansible", "url": "https://2026.asiabsdcon.org/entry/talk/DALTGJ/", "title": "FreeBSD Jails Orchestration with Ansible", "subtitle": "", "track": null, "type": "Tutorial (half-day)", "language": "en", "abstract": "This tutorial delves into the practical application of FreeBSD Jails, specifically focusing on enhancing their usability and orchestration using powerful tools: iocage and Ansible. The examples presented herein are derived from and complement the official [documentation](https://ansible-collection-freebsd.readthedocs.io/en/latest/ug_examples.html) of the proposed [collection](https://galaxy.ansible.com/ui/repo/published/vbotka/freebsd), offering a hands-on approach to managing complex jail environments. This guide is tailored for advanced FreeBSD users who possess a working knowledge of: FreeBSD operating system fundamentals, the iocage utility for jail management, and Ansible for configuration management and automation. The goal is to move beyond basic jail creation and demonstrate how to effectively orchestrate a production-ready jail infrastructure. As a preparation for this tutorial, the users are encouraged to read the [documentation](https://ansible-collection-freebsd.readthedocs.io/en/latest/ug_examples.html) and test the proposed [collection](https://galaxy.ansible.com/ui/repo/published/vbotka/freebsd). The [source code](https://github.com/vbotka/ansible-collection-freebsd) is available at GitHub.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "TJTGMZ", "name": "Vladimir Botka", "avatar": "https://2026.asiabsdcon.org/media/avatars/TJTGMZ_nVcjv8o.jpg", "biography": "My professional background is diverse, stemming from my time as a research assistant and Ph.D. student at the Slovak University of Technology in Bratislava. My academic work, culminating in a 1991 thesis, involved solid-state physics, measurement, automation, data processing, numerical mathematics, and programming. I also served as an instructor for the \"Operating System Elements\" course, with engagement in VLSI technology design and testing, software engineering, and operating systems administration.\r\n\r\nI have been a dedicated administrator of FreeBSD since version 4.3, supporting small and medium-sized businesses. My commitment to open-source extended to developing software for Novell SUSE Linux, including device drivers for networking, wireless LAN, and Bluetooth. I later managed the \"SUSE Linux Enterprise Point of Service\" product for the same company.\r\n\r\nCurrently, I operate as a freelancer specializing in FreeBSD and Ansible. My expertise is underscored by a decade-long commitment to maintaining Ansible roles for FreeBSD, all publicly accessible on [GitHub](https://github.com/vbotka?tab=repositories). A key recent contribution is the development of the Ansible collection [vbotka.freebsd](https://galaxy.ansible.com/ui/repo/published/vbotka/freebsd), which has garnered over 5,000 downloads. This collection includes specialized plugins for iocage\u2014a module, a filter, and an inventory plugin\u2014with comprehensive documentation on essential jails usability.\r\n\r\nFurthermore, I have significantly contributed upstream to the [community.general](https://github.com/ansible-collections/community.general/) Ansible collection, including 25 commits and 12k additions. This work encompasses numerous plugins, documentation updates, and bug fixes, notably the integration of the iocage inventory plugin [community.general.iocage](https://docs.ansible.com/projects/ansible/latest/collections/community/general/docsite/guide_iocage_inventory.html) into the collection. I also contributed the \"Setting the Python interpreter\" section to the Ansible Community Documentation chapter, [Managing BSD hosts with Ansible](https://docs.ansible.com/projects/ansible/latest/os_guide/intro_bsd.html#managing-bsd-hosts-with-ansible).", "public_name": "Vladimir Botka", "guid": "3c00f7c1-cb0f-5beb-8eb5-86370ac0bf70", "url": "https://2026.asiabsdcon.org/entry/speaker/TJTGMZ/"}], "links": [{"title": "Documentation of the proposed Ansible collection.", "url": "https://ansible-collection-freebsd.readthedocs.io/en/latest/", "type": "related"}, {"title": "Ansible collection vbotka.freebsd at Ansible Galaxy.", "url": "https://galaxy.ansible.com/ui/repo/published/vbotka/freebsd/", "type": "related"}, {"title": "Ansible collection vbotka.freebsd source code.", "url": "https://github.com/vbotka/ansible-collection-freebsd/", "type": "related"}], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/DALTGJ/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/DALTGJ/", "attachments": []}], "Room C": [{"guid": "5203ff1f-db09-5921-b4ea-9f0f1b423221", "code": "ENSUSJ", "id": 29, "logo": null, "date": "2026-03-19T09:30:00+08:00", "start": "09:30", "duration": "07:30", "room": "Room C", "slug": "entry-29-freebsd-devsummit-1st-day", "url": "https://2026.asiabsdcon.org/entry/talk/ENSUSJ/", "title": "FreeBSD DevSummit 1st Day", "subtitle": "", "track": null, "type": "Co-located Event Proposal", "language": "en", "abstract": "FreeBSD Developer Summit is an invited-only event for FreeBSD project members.  For more details, see https://wiki.FreeBSD.org/DevSummit/202603", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/ENSUSJ/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/ENSUSJ/", "attachments": []}]}}, {"index": 2, "date": "2026-03-20", "day_start": "2026-03-20T04:00:00+08:00", "day_end": "2026-03-21T03:59:00+08:00", "rooms": {"Room A": [{"guid": "6889583c-11c8-5f0d-97d5-6055fd4c0bfc", "code": "7MKHNC", "id": 17, "logo": null, "date": "2026-03-20T09:30:00+08:00", "start": "09:30", "duration": "07:30", "room": "Room A", "slug": "entry-17-ipv6-tutorial", "url": "https://2026.asiabsdcon.org/entry/talk/7MKHNC/", "title": "IPv6 Tutorial", "subtitle": "", "track": null, "type": "Tutorial (full-day)", "language": "en", "abstract": "This tutorial is for those who have not yet jumped on the IPv6 bandwagon.\r\n\r\nThe goal is for participants to be able to understand how IPv6 works, how an addressing plan could be built for an enterprise network, and how this can be configured on FreeBSD and OpenBSD.\r\n\r\nWe will also configure services to work on IPv6 and discuss the implications of configuring PF rules for them.\r\n\r\nTo complete the tutorial, we will configure an IPv6-mostly network, where IPv6 is a first-class citizen and IPv4 is not. This should give participants enough confidence to configure IPv6 in their own environment.\r\n\r\nThe tutorial is supported by a remote lab where every participant will be given a series of virtual machines to configure following the topics presented in the theory sessions, and will also have to relate to others to complete the required exercises, like setting up web services and interacting with other groups to test their communication on the live internet.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "8DWLWE", "name": "Massimiliano Stucchi", "avatar": "https://2026.asiabsdcon.org/media/avatars/8DWLWE_91jguBJ.jpg", "biography": "Massimiliano \"Max\" stucchi  is the main person behind Glevia, a Swiss organisation providing training and consulting on networking.  In his past, he founded an ISP and WISP in Italy, worked at the RIPE NCC as trainer and subsequently as IPv6 Programme Manager and last at the Internet Society.  He is involved in a number of programme committees and helps run a couple of Internet Exchanges. Max also runs his own autonomous systems - AS58280 - for fun, testing and research.  He is based in Zurich, Switzerland.", "public_name": "Massimiliano Stucchi", "guid": "1342b461-dea0-5683-84cd-52dfc29175ff", "url": "https://2026.asiabsdcon.org/entry/speaker/8DWLWE/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/7MKHNC/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/7MKHNC/", "attachments": []}], "Room B": [{"guid": "5d68f839-0257-5ae1-bb4a-a1b36d9b4b03", "code": "JWXMK9", "id": 23, "logo": null, "date": "2026-03-20T09:30:00+08:00", "start": "09:30", "duration": "07:30", "room": "Room B", "slug": "entry-23-netbsd-devsummit", "url": "https://2026.asiabsdcon.org/entry/talk/JWXMK9/", "title": "NetBSD devsummit", "subtitle": "", "track": null, "type": "Co-located Event Proposal", "language": "en", "abstract": "The NetBSD Foundation is looking forward to organizing a NetBSD devsummit at AsiaBSDCon 2026.\r\n\r\nThe primary focus of this are NetBSD and pkgsrc developers, but others may join too.\r\n\r\nThe details of the summit are yet to be planned in detail, but overall the idea can be summarized as sharing knowledge about things in NetBSD and pkgsrc that are not (yet) known to many other developers and in general connecting NetBSD and pkgsrc developers.  Some potential topics for the devsummit are PGP key signing, NetBSD 11, and knowledge sharing about personal development\r\nenvironments.\r\n\r\nA wiki page is available on the NetBSD wiki and the schedule will be kept up to date there: https://wiki.netbsd.org/summits/asiabsdcon_2026_netbsd_summit/", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "T9BETK", "name": "Harold Gutch", "avatar": null, "biography": "Harold has been using operating systems in the BSD family since 1997.  He started with FreeBSD on x86 and soon used NetBSD on other architectures, most of which would not run anything modern other than NetBSD.  In recent years he also runs NetBSD on more mainstream architectures (x86 and Arm).  He joined The NetBSD Foundation as a NetBSD developer in 2021.  More recently, he joined the EuroBSDCon Foundation board in 2025 as the NetBSD liaison.\r\n\r\nSysadmin at day, NetBSD hacker at night.", "public_name": "Harold Gutch", "guid": "a1eaed72-ac4c-5966-b598-8661124c5606", "url": "https://2026.asiabsdcon.org/entry/speaker/T9BETK/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/JWXMK9/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/JWXMK9/", "attachments": []}], "Room C": [{"guid": "da78c03b-5959-5d1f-9472-ab58acc9e0fa", "code": "EB8MPX", "id": 30, "logo": null, "date": "2026-03-20T09:30:00+08:00", "start": "09:30", "duration": "07:30", "room": "Room C", "slug": "entry-30-freebsd-devsummit-2nd-day", "url": "https://2026.asiabsdcon.org/entry/talk/EB8MPX/", "title": "FreeBSD DevSummit 2nd Day", "subtitle": "", "track": null, "type": "Co-located Event Proposal", "language": "en", "abstract": "FreeBSD Developer Summit is an invited-only event for FreeBSD project members.  For more details, see https://wiki.FreeBSD.org/DevSummit/202603", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/EB8MPX/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/EB8MPX/", "attachments": []}]}}, {"index": 3, "date": "2026-03-21", "day_start": "2026-03-21T04:00:00+08:00", "day_end": "2026-03-22T03:59:00+08:00", "rooms": {"Room A": [{"guid": "eff90b3f-bfdc-58e1-a4c4-419ac2c3cdaa", "code": "ZP9C9S", "id": 33, "logo": null, "date": "2026-03-21T10:00:00+08:00", "start": "10:00", "duration": "00:20", "room": "Room A", "slug": "entry-33-openning", "url": "https://2026.asiabsdcon.org/entry/talk/ZP9C9S/", "title": "Openning", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "The formal openning of AsiaBSDCon 2026", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/ZP9C9S/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/ZP9C9S/", "attachments": []}, {"guid": "4ec3a2aa-9b0f-52f6-af68-d49330572cd2", "code": "KAAFGX", "id": 38, "logo": null, "date": "2026-03-21T10:30:00+08:00", "start": "10:30", "duration": "01:30", "room": "Room A", "slug": "entry-38-rethinking-the-forms-of-os-functionality-development", "url": "https://2026.asiabsdcon.org/entry/talk/KAAFGX/", "title": "Rethinking the forms of OS functionality development", "subtitle": "", "track": null, "type": "Keynote", "language": "en", "abstract": "Major production-grade Operating Systems (OSes), such as the BSD OSes, have continued to advance thanks to the substantial efforts of their developer and user communities.\r\nThis talk explores the question of whether there are other possible forms of OS functionality development that can accelerate development velocity while reducing the burden on these communities.\r\nSpecifically, we discuss what a software architecture should look like to enable the easy incorporation of implementations developed by different parties in a decentralized manner, without introducing significant performance bottlenecks.\r\nThe discussion will be informed by the speaker\u2019s experiences with the development of a portable TCP/IP stack [1] and the exploration of approaches for implementing OS functionalities in user space [2, 3, 4].\r\nTo conclude, I would like to humbly put forward several modest feature requests for the BSD community.\r\n\r\n[1] https://doi.org/10.1145/3687230.3687233\r\n[2] https://www.usenix.org/conference/atc23/presentation/yasukata\r\n[3] https://doi.org/10.1145/3721462.3770771\r\n[4] https://doi.org/10.1145/3678015.3680481", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "VBWCJP", "name": "Kenichi Yasukata", "avatar": null, "biography": "He is a researcher at IIJ Research Laboratory. His research interests include operating systems, networking, and virtualization. In particular, he has been working on networking subsystems, including I/O backends for virtual machines, TCP/IP stacks, and their integration methodologies.", "public_name": "Kenichi Yasukata", "guid": "e04b6025-cdaa-572b-a9cc-bce1e19ad45d", "url": "https://2026.asiabsdcon.org/entry/speaker/VBWCJP/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/KAAFGX/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/KAAFGX/", "attachments": []}, {"guid": "a761c7a0-8d5f-56f9-8420-d683d0eb1e08", "code": "VMUKBR", "id": 16, "logo": null, "date": "2026-03-21T13:00:00+08:00", "start": "13:00", "duration": "00:45", "room": "Room A", "slug": "entry-16-faster-smolbsd-boot-boot", "url": "https://2026.asiabsdcon.org/entry/talk/VMUKBR/", "title": "Faster, smolBSD! Boot! Boot!", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "Virtualisation technology has gone a long way. It began as early as the 1960s with IBM CP/CMS, and was even available as Open Source back then. On modern hardware though, the technology exploded in the mid-2000s, and has become a new normal in the form of containers since 2014. BSD systems have both pioneered and lagged behind on different aspects, between innovation and catch up with the latest industry standards. The gang of NetBSD, EdgeBSD, and smolBSD projects is no stranger to this: coming from the desert, it is now proudly lining up for drag races to the boot finish line, still plundering ideas and patches all over to solve the case.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "DVZ3NB", "name": "Pierre Pronchery", "avatar": "https://2026.asiabsdcon.org/media/avatars/DVZ3NB_BMckBKi.png", "biography": "Pierre Pronchery is a NetBSD developer since 2012, FreeBSD developer since 2025, and currently serving on the Board of Directors for the NetBSD Foundation. He regularly contributes to different sides of either projects, from kernel patches to software packaging, or contributing to public events. His passion for Operating System development took shape with the DeforaOS Project since 2001, which led him to research the Future Internet as well.\r\nAs founder and CEO of Defora Networks GmbH in Germany, he performs IT-Security consulting and development services around all of these projects, most notably with the FreeBSD Foundation since 2023.", "public_name": "Pierre Pronchery", "guid": "232afc24-05ff-5ca3-9461-88c418e3bd3d", "url": "https://2026.asiabsdcon.org/entry/speaker/DVZ3NB/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/VMUKBR/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/VMUKBR/", "attachments": [{"title": "Final paper", "url": "/media/entry/submissions/VMUKBR/resources/Faster_smolBSD_Boot_Bo_39MbuMp.pdf", "type": "related"}]}, {"guid": "eee0091b-892d-561d-a9a8-874b6cc87a10", "code": "XEZDKT", "id": 10, "logo": null, "date": "2026-03-21T14:00:00+08:00", "start": "14:00", "duration": "00:45", "room": "Room A", "slug": "entry-10-porting-stunmesh-go-to-freebsd-and-macos-building-peer-to-peer-wireguard-networks", "url": "https://2026.asiabsdcon.org/entry/talk/XEZDKT/", "title": "Porting STUNMESH-go to FreeBSD and macOS: Building Peer-to-Peer WireGuard Networks", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "The open-source tool STUNMESH-go helps devices create WireGuard connections when they all sit behind NAT or CGNAT networks. These network setups make it hard for devices to connect directly to each other. NAT and CGNAT are common in many situations: home networks, mobile networks, and enterprise networks. The tool uses STUN protocol to help devices find their public IP addresses and ports. It has a special feature: it can use the same port for both WireGuard and STUN traffic by working directly with the WireGuard kernel module. This approach is more efficient than solutions using embedded wireguard-go with a proxy setup, like Tailscale does. It means devices can connect directly without needing a central relay server. This saves bandwidth and reduces latency.\r\nSTUNMESH-go works well on Linux systems. This means it already supports popular network solutions like VyOS and OpenWrt. However, many network devices and firewalls use FreeBSD-based systems. pfSense and OPNsense are two popular firewall systems that run on FreeBSD. To support these important platforms, we needed to add proper FreeBSD support. Also, macOS support is valuable for developers and network engineers who want to test and develop P2P VPN solutions on their computers. In this work, we added full support for FreeBSD and macOS. This helps developers and network engineers who use BSD or Apple systems to build P2P WireGuard networks, even when they are behind NAT or CGNAT.\r\nWe explain the technical problems we met during this work. On Linux, STUNMESH-go uses raw sockets with BPF filtering. This lets it watch all network interfaces at the same time. But FreeBSD and macOS work differently. They use BPF with interface-specific packet capture. We had to write code that listens on all network interfaces for STUN messages, but not on the WireGuard interface itself. This design works better when systems have multiple network connections or backup routes. We tested this with OPNsense virtual machines to check that it works correctly in real firewall situations.\r\nWe also added the health monitoring system to both platforms. This system checks if the tunnel is working by sending ping messages to each peer. If a connection fails, it tries to reconnect automatically. It uses smart retry logic with exponential backoff. This means it waits longer between each retry attempt to avoid overloading the network. Each peer can have its own ping settings with different timeout and interval values. This feature is very useful for mobile networks and changing network situations common on BSD and macOS. In ideal conditions, when network changes happen, the system can detect the connection problem and reconnect quickly.\r\nThe tool has a plugin system that we also ported to these platforms. STUNMESH-go supports different key-value storage backends through plugins. Users can even write custom plugins using the exec plugin interface. We made sure this plugin system works on all platforms. Users can connect to various DNS providers or key-value storage services like Cloudflare. This helps with automatic peer discovery and configuration sharing. When a peer's IP address changes, it updates the DNS record automatically. Other peers can then find the new address and reconnect. This works well with WireGuard's built-in roaming capability. As the WireGuard documentation describes, the server finds peer endpoints by checking where authenticated data comes from. If endpoints change, both client and server update their settings by learning from where they receive correctly authenticated data. This means there is full IP roaming on both ends. STUNMESH-go uses this feature by helping peers discover their new public addresses quickly through STUN and updating the shared configuration storage.\r\nWe successfully built and ran STUNMESH-go on FreeBSD and modern macOS versions. We set up full-mesh P2P networks with nodes behind NAT or CGNAT. We tested that direct P2P connections work reliably on these platforms. Our tests included VyOS routers with LTE modems, OPNsense firewalls running on FreeBSD, and mixed environments with BSD, macOS, and Linux nodes. We did not measure detailed performance like latency or speed. Our main goal was to check that connections work in real network conditions. The results show that BSD and macOS platforms can run direct P2P WireGuard networks using STUNMESH-go reliably.\r\nWe share our experience and future directions. Important insights include how to handle networking across different platforms in Go, best ways to prepare build environments on Unix-like systems, and why good documentation matters for platform-specific setup. We also worked with BSD and macOS communities to get feedback and support. This helped us find unusual problems and platform-specific issues. Future work includes making the build process easier, improving documentation for BSD and macOS users, and helping more people in these communities use P2P network tools. We also plan to add support for more BSD variants and improve the testing framework for firewall platforms like pfSense and OPNsense.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "PRCTQP", "name": "Yu-Chiang (Date) Huang", "avatar": "https://2026.asiabsdcon.org/media/avatars/PRCTQP_mxNoU10.png", "biography": "Date Huang is a Solution Architect with 5 years of customer-facing experience in designing scalable cloud and datacenter networks. He is the creator and maintainer of STUNMESH-go, an open-source WireGuard helper tool for NAT traversal, and the maintainer of EZIO Project, a bare-metal server massive deployment solution.\r\nHis expertise includes AWS/Azure/GCP Cloud DataCenter Networking, OpenStack, Kubernetes, and SD-WAN. He has a strong background in networking, automation, and open-source development, with proven abilities in cross-team coordination and delivering high-performance solutions.\r\nSpeaking Experience: OpenStack Day Taiwan 2016-2017, Open Source Summit North America 2017, ISC High Performance Project Poster 2018, Hong Kong Open Source Conference 2019, Open Source Conference Tokyo 2019 Fall, China Open Source Conference 2019, TWNOG 4.0, COSCUP 2021, COSCUP 2023, Kubernetes Community Day 2023, OSC Nagoya 2024, COSCUP 2024, Kubernetes Community Day Taipei 2024, ALASCA Tech-Talk #19, COSCUP 2025", "public_name": "Yu-Chiang (Date) Huang", "guid": "6b28bfb3-3dd7-54d5-96ae-5fefd9561b97", "url": "https://2026.asiabsdcon.org/entry/speaker/PRCTQP/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/XEZDKT/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/XEZDKT/", "attachments": []}, {"guid": "d82c368f-5536-52a8-a7cb-373978fd0d47", "code": "LN93RP", "id": 9, "logo": null, "date": "2026-03-21T15:00:00+08:00", "start": "15:00", "duration": "00:45", "room": "Room A", "slug": "entry-9-enhancing-teaching-methods-in-freebsd-education-through-chaos-engineering-and-gamification", "url": "https://2026.asiabsdcon.org/entry/talk/LN93RP/", "title": "Enhancing Teaching Methods in FreeBSD Education through Chaos Engineering and Gamification", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "Over the past few years, I have observed that the misuse of AI in education for cheating purposes has created significant challenges in assessing students' authentic contributions. Another issue I identified is that university labs rarely teach the kind of problem-solving skills that are relevant in real-world scenarios \u2014 the kinds of problems graduates will face in their professional lives, such as fixing production issues. Traditional assignments often lacked real-world relevance and, because they could easily be solved with AI assistance, left students unprepared for professional challenges.\r\n\r\nTo address these shortcomings, I developed \u2014 as part of my master\u2019s thesis at the University of Applied Sciences, Darmstadt, Germany \u2014 a new teaching framework that leverages Chaos Engineering and Gamification to modernize Unix education on FreeBSD. With my new system, instructors can simulate realistic problems that students must solve using system administrator permissions. I also designed the framework to make it difficult for participants to \u201ccheat\u201d using AI, and I evaluated its effectiveness through a controlled test with a group of students.\r\n\r\nIn my presentation, I introduce this \u201cChaos Education System\u201d, which I tested in the Unix for Software Developers course at the university. The name is inspired by the concept of chaos monkey systems, which intentionally \u201cwreak havoc\u201d on production systems to improve their resiliency and train system administrators to diagnose and repair failures. My approach enables instructors to inject intentional faults (error scenarios) into student-managed FreeBSD jails. The students must then identify, resolve, and prevent these issues from recurring using standard system administration tools \u2014 including full root permissions.\r\n\r\nTo increase student motivation and simulate real-world \u201cproduction pressure,\u201d I implemented a global highscore list as a gamification element. Each time an issue is solved, the system awards points based on elapsed time and an instructor-defined difficulty bonus. After each exercise, a post-mortem group discussion allows students to share their solution approaches, compare methodologies, and reflect on lessons learned. Through this process, students gain valuable practical skills such as troubleshooting, system recovery, and proactive system management \u2014 all within a realistic and dynamic environment that traditional \u201cone-size-fits-all\u201d assignments fail to provide.\r\n\r\nI built the entire system using BSD-licensed open-source components, including FreeBSD, pf, VNET, Bastille jails, and templates. Shell scripts act as the glue, connecting these technologies and implementing the logic for the chaos monkey framework. I tested the prototype with two groups of 16 students each in January 2025. One group was allowed to use ChatGPT during the exercises to assess whether AI assistance improved their performance (if at all). Insights from this testing were used to refine and enhance the system further.\r\n\r\nIn my talk, I will present the concept and implementation of the Chaos Education System, demonstrate its functionality, and discuss potential future developments. FreeBSD has proven to be an outstanding foundation for this project due to its modularity, open-source availability, low resource consumption, and excellent documentation. I believe the system can be expanded beyond academic use \u2014 for example, in corporate training or workshop-style events. It allows instructors or trainers to easily create and deploy custom scenarios, scaling efficiently to multiple parallel users thanks to the lightweight nature of FreeBSD jails.\r\n\r\nAudience: This project is aimed at educators, trainers, and system administrators interested in modernizing Unix/Linux education through hands-on, interactive methods. Managers and team leads may also find the system useful for training employees through customized scenarios that replicate their own production environments.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "GNZNFK", "name": "Andreas Kirchner", "avatar": null, "biography": "IT Consultant and Lecturer with broad experience in software development, IT consulting, and academic teaching. Skilled in C++, Java, and SQL, as well as modern development tools and cloud technologies such as Docker, Terraform, and VMware ESXi. Brings a combination of technical expertise, structured problem-solving, and collaborative working style.", "public_name": "Andreas Kirchner", "guid": "f768ef9c-013c-51ea-938e-9a748e11809f", "url": "https://2026.asiabsdcon.org/entry/speaker/GNZNFK/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/LN93RP/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/LN93RP/", "attachments": []}, {"guid": "3a9bf118-eb75-547e-82cd-95a70b7139c6", "code": "TXCDXP", "id": 19, "logo": null, "date": "2026-03-21T16:00:00+08:00", "start": "16:00", "duration": "00:45", "room": "Room A", "slug": "entry-19-revolutionizing-pc-classroom-with-freebsd", "url": "https://2026.asiabsdcon.org/entry/talk/TXCDXP/", "title": "Revolutionizing PC Classroom with FreeBSD", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "This paper presents a redesign of PC classroom infrastructure using FreeBSD and its native hypervisor, Bhyve. The proposed system addresses limitations of current Proxmox VE based virtual machine deployments by enabling direct hardware control and improved system flexibility. Key contributions include a user-friendly guest-switching mechanism, an accelerated deployment system utilizing ZFS incremental backups, and an integrated screen sharing solution for enhanced classroom interactivity.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "XGR8QK", "name": "Chun-Cheng Yeh", "avatar": "https://2026.asiabsdcon.org/media/avatars/XGR8QK_KmZVuUT.jpg", "biography": "A 4th grade NYCU CS student who mostly studies system administration, network and operating system.", "public_name": "Chun-Cheng Yeh", "guid": "fafb5935-9403-5914-b120-949de466b0eb", "url": "https://2026.asiabsdcon.org/entry/speaker/XGR8QK/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/TXCDXP/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/TXCDXP/", "attachments": []}], "Room B": [{"guid": "b86201e8-1409-5f73-a151-9f75a0fe18cb", "code": "7XTQRC", "id": 8, "logo": null, "date": "2026-03-21T13:00:00+08:00", "start": "13:00", "duration": "00:45", "room": "Room B", "slug": "entry-8-logstor-a-log-structured-virtual-storage", "url": "https://2026.asiabsdcon.org/entry/talk/7XTQRC/", "title": "Logstor: a log-structured virtual storage", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "Logstor uses the idea from log-structured file system to build a virtual disk on top of a physical disk. It is a virtual disk so its size can be larger then the underlying physical disk. It\u2019s log-structured  so it treats the underlying disk as a log and transforms the write requests from upper layer file system to log append operations. Since the random write operations are transformed to log append, the random write operations are transformed to sequential write operations.\r\n\r\nLogstor is implemented by using FreeBSD\u2019s GEOM framework. This is the second version of this program. The differences with the previous version are:\r\n* The previous version runs in user-level and this version runs in kernel.\r\n* Remove garbage collection and replace it with Stale Sector Recycle (SSR).\r\n* Add new logstor commands snapshot and rollback.\r\n\r\nSnapshot command is used to take a snapshot of the virtual disk and the rollback command can revert the virtual disk back to its previous snapshot.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "TLHHFU", "name": "Wuyang Chung", "avatar": null, "biography": "Wuyang Chung is currently working as a freelancer. Previously, Chung worked at Industrial Technology Research Institute as a Windows CE system integrator. After that he worked in ALi as a firmware engineer. His last work was in Hewlett-Packard Taiwan branch as a system software engineer and worked on writing test programs and helping to analyze product issues detected by those test programs.", "public_name": "Wuyang Chung", "guid": "e8f74395-d2c2-579a-81c7-1fb56b163a96", "url": "https://2026.asiabsdcon.org/entry/speaker/TLHHFU/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/7XTQRC/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/7XTQRC/", "attachments": []}, {"guid": "1ad11609-e33a-57ee-ace6-a4c071d181cd", "code": "RQYGCE", "id": 11, "logo": null, "date": "2026-03-21T14:00:00+08:00", "start": "14:00", "duration": "00:45", "room": "Room B", "slug": "entry-11-enhancing-the-casper-library-security-with-mandatory-access-control", "url": "https://2026.asiabsdcon.org/entry/talk/RQYGCE/", "title": "Enhancing the Casper Library Security with Mandatory Access Control", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "Casper, a userspace library in FreeBSD, provides system services such as DNS resolution to applications confined by Capsicum. However, these Casper services execute with normal privileges, exposing the system to potential security threats including privilege escalation and unauthorized resource access. To address this issue, we present a sandboxing mechanism for Casper based on FreeBSD\u2019s Mandatory Access Control (MAC) framework. Our design confines Casper services within MAC-enforced domains, thereby limiting their privileges and isolating their interactions with the system. We evaluate the proposed mechanism across multiple Casper services and show that it strengthens system security while incurring less than 16\\% performance overhead.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "GQNBYM", "name": "Yan-Hao Wang", "avatar": "https://2026.asiabsdcon.org/media/avatars/GQNBYM_6ZNdx7S.jpg", "biography": "I am a second-year master\u2019s student in Computer Science at National Central University, Taiwan. I previously worked on the FreeBSD online documentation and manual page editor, and participated in Google Summer of Code 2024, where I contributed to IPv6 support and the cleanup of address family dependencies in FreeBSD userland utilities, improving code maintainability and protocol support.", "public_name": "Yan-Hao Wang", "guid": "ab16685a-aa0c-55d6-9ec7-8904bf5a0b0e", "url": "https://2026.asiabsdcon.org/entry/speaker/GQNBYM/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/RQYGCE/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/RQYGCE/", "attachments": []}, {"guid": "e13aa1e9-000d-5854-805d-a6adbf856b12", "code": "V9NXVN", "id": 14, "logo": null, "date": "2026-03-21T15:00:00+08:00", "start": "15:00", "duration": "00:45", "room": "Room B", "slug": "entry-14-design-and-implementation-of-bhyve-management-daemon", "url": "https://2026.asiabsdcon.org/entry/talk/V9NXVN/", "title": "Design and Implementation of Bhyve Management Daemon", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "This paper introduces the Bhyve Management Daemon (hereafter BMD), which manages bhyve virtual machines according to configuration files. BMD is not a replacement for existing bhyve management tools. The design focuses on lightweight, simple configuration and secure operations for unprivileged users.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "BHRCUM", "name": "Yuichiro Naito", "avatar": null, "biography": "Yuichiro Naito is a software developer at SOUM Corp. who runs FreeBSD as a daily driver for development.", "public_name": "Yuichiro Naito", "guid": "200b2cf9-d8ef-5754-9986-f066aeff3e3c", "url": "https://2026.asiabsdcon.org/entry/speaker/BHRCUM/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/V9NXVN/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/V9NXVN/", "attachments": []}, {"guid": "eb8c5de6-1203-5856-8ed3-329877b6f07e", "code": "FA3B7P", "id": 25, "logo": null, "date": "2026-03-21T16:00:00+08:00", "start": "16:00", "duration": "00:45", "room": "Room B", "slug": "entry-25-bring-cloud-native-networking-to-freebsd-jails-porting-calico-from-linux", "url": "https://2026.asiabsdcon.org/entry/talk/FA3B7P/", "title": "Bring Cloud-Native Networking to FreeBSD Jails: Porting Calico from Linux", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "While Linux containers benefit from a rich ecosystem of Container Network Interface (CNI) plugins such as Calico and Cilium, FreeBSD Jails have lacked native, standardized solutions for advanced networking. As a result, users have relied on manual, error-prone configurations, which limit scalability and integration with modern orchestration platforms.\r\n\r\nThis presentation introduces porting Calico, a widely adopted CNI plugin, to the FreeBSD operating system. Our approach replaced Linux-specific components with FreeBSD-native equivalents: iptables with ipfw, netlink sockets with routing sockets, and Linux network namespaces with FreeBSD's VNET.\r\n\r\nThis work aims to bridge the gap between Linux and BSD container networking. By providing scalable, policy-driven capabilities that are compatible with existing Linux-centric infrastructure, FreeBSD will be empowered to participate more fully in the broader container networking ecosystem.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "AANU7M", "name": "Soma Sakaguchi", "avatar": "https://2026.asiabsdcon.org/media/avatars/AANU7M_fdGqBwU.png", "biography": "Soma Sakaguchi is a graduate student at Future University Hakodate, Japan. His research focuses on container networking, virtualization, and operating system compatibility between Linux and FreeBSD. Currently, he is exploring Linux-compatible container networking for FreeBSD.", "public_name": "Soma Sakaguchi", "guid": "1719c8b8-0521-5c99-9246-b53ea91153fe", "url": "https://2026.asiabsdcon.org/entry/speaker/AANU7M/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/FA3B7P/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/FA3B7P/", "attachments": []}]}}, {"index": 4, "date": "2026-03-22", "day_start": "2026-03-22T04:00:00+08:00", "day_end": "2026-03-23T03:59:00+08:00", "rooms": {"Room A": [{"guid": "85ffa385-e59d-5adf-8d55-0e27cb0f4340", "code": "UARU9B", "id": 40, "logo": null, "date": "2026-03-22T10:30:00+08:00", "start": "10:30", "duration": "01:30", "room": "Room A", "slug": "entry-40-run-time-reoptimization-for-modern-heterogenous-systems", "url": "https://2026.asiabsdcon.org/entry/talk/UARU9B/", "title": "Run Time Reoptimization for Modern Heterogenous Systems", "subtitle": "", "track": null, "type": "Keynote", "language": "en", "abstract": "Modern computers are collections of heterogeneous components, including GPUs, TPUs, NPUs, FPGAs and other devices that carry out computing tasks but which are not the central CPU. We are proposing novel methods of program compilation, transformation and scheduling that take advantage of the entire system so that computation takes place in the most appropriate place at the most propitious time. Using LLVM IR, optimizers, and a performance aware scheduler, we can maximize utilization while reducing execution times for arbitrary workloads, freeing developers from treating modern computers as if they were fixed function platforms. This research has applications in high performance computing, embedded systems and security due to the centrality of run time program transformation in our system.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "HNZLTU", "name": "George V. Neville-Neil", "avatar": "https://2026.asiabsdcon.org/media/avatars/HNZLTU_E3be2SK.jpg", "biography": "George likes to say that he, \"Works on networking and operating system code for fun and profit.\" Writing machine code, building hardware and teaching computing since his teens, his first paid programming gig was hacking DBase III code for an insurance company while still in High School. Standing firmly at the intersection of industry and academia and due to his top ranking in the development of open source software, George has worked on research projects with several leading Universities, including the University of Cambridge, University of California at Santa Cruz, and the University of Twente in the Netherlands. He has spent over 30 years producing commercial software for companies such as Wind River Systems, who, along with NASA, put a bit of his code on Mars with each successful landing there since the Pathfinder probe in 1997. He is the author of two leading books on operating systems, the latest co-authored with Marshall Kirk McKusick and Robert N. M. Watson of The Design and Implementation of the FreeBSD Operating System 2nd Ed. For over twenty years he has been the columnist better known as Kode Vicious, producing the most widely read column in both of ACM's premier flagship magazines, \"Queue\" and \"Communications of the ACM\". George has been a FreeBSD committer for nearly 20 years, and has served on the elected Core team which helps manage the overall project.", "public_name": "George V. Neville-Neil", "guid": "1621f830-57cf-5e87-9234-9339400fd7a0", "url": "https://2026.asiabsdcon.org/entry/speaker/HNZLTU/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/UARU9B/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/UARU9B/", "attachments": []}, {"guid": "377b40a0-f2e9-564d-90d7-6f823e1c864e", "code": "LHKQG9", "id": 22, "logo": null, "date": "2026-03-22T13:00:00+08:00", "start": "13:00", "duration": "00:45", "room": "Room A", "slug": "entry-22-bringing-memory-safety-to-bsd-with-cheri", "url": "https://2026.asiabsdcon.org/entry/talk/LHKQG9/", "title": "Bringing memory safety to BSD with CHERI", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "After a decade and a half of academic and industrial research, products using CHERI to provide hardware enforced, deterministic memory safety are making their way to market.  CheriBSD, a research fork of FreeBSD, has been the primary vehicle for operating system research on supporting CHERI's memory safety and compartmentalization potential.  We are now bringing the most complete and stable work from CheriBSD to FreeBSD with the goal shipping FreeBSD 16 with spatial and temporal memory safety.  This talk will motivate this upstreaming, explain our plan, and cover progress to date.  We hope to update the FreeBSD community on our progress and encourage other BSDs to learn from our adoption of CHERI.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "FBPNRB", "name": "Brooks Davis", "avatar": "https://2026.asiabsdcon.org/media/avatars/FBPNRB_x2Op2YD.jpg", "biography": "Brooks Davis is a Principle Research Scientist at Capabilities Limited. He holds a Bachelor's Degree in Computer Science from Harvey Mudd College (1998).  Since 2012 he has worked on the CHERI project and leads the engineering effort for CheriBSD, a memory safe UNIX-like operating system. He has co-authored more than 15 papers on CHERI in contexts including security, operating systems, programming languages, and architecture.\r\n\r\nPrior to joining Capabilities Limited in 2025, Brooks worked on CHERI and CheriBSD at SRI International and before that worked on high-performance computing and networking at The Aerospace Corporation.  Brooks Davis has been a member of the FreeBSD open-source operating system project since 2001 and has served on the project's elected core team.  He is also a Visiting Industrial Fellow at the University of Cambridge Department of Computer Science and Technology (Computer Laboratory).", "public_name": "Brooks Davis", "guid": "4ad68be6-e1b2-56b4-92b6-abc232377d7e", "url": "https://2026.asiabsdcon.org/entry/speaker/FBPNRB/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/LHKQG9/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/LHKQG9/", "attachments": []}, {"guid": "3d0ae6e8-81f5-5638-bd2c-0aa44007a94a", "code": "PT7VFL", "id": 26, "logo": null, "date": "2026-03-22T14:00:00+08:00", "start": "14:00", "duration": "00:45", "room": "Room A", "slug": "entry-26-sleep-on-freebsd-a-bedtime-story-about-s0ix", "url": "https://2026.asiabsdcon.org/entry/talk/PT7VFL/", "title": "Sleep on FreeBSD: A bedtime story about S0ix", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "Modern laptops have largely abandoned the legacy ACPI S3 sleep state in favor of low-power idle states collectively known as S0ix. As a result, operating systems that rely on S3 for suspend-to-RAM functionality are increasingly unable to provide effective sleep support on contemporary hardware.\r\n\r\nThis talk presents ongoing work to implement suspend-to-idle (s2idle) and S0ix (specifically S0i3) support in FreeBSD. We describe the architectural differences between S3 and S0ix, the necessary kernel infrastructure for suspend-to-idle, platform coordination via ACPI System Power Management Controllers, and vendor-specific requirements, with a focus on AMD platforms.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "LHCTCE", "name": "Aymeric Wibo", "avatar": "https://2026.asiabsdcon.org/media/avatars/LHCTCE_nhGn7pB.jpg", "biography": "I'm a software freelancer in Belgium and have been using FreeBSD since high school. I am contracted by the FreeBSD foundation to work on modern standby on FreeBSD, and also work for Klara. My primary interests lie in OSs and graphics.", "public_name": "Aymeric Wibo", "guid": "a187f5d3-f81a-5a5c-8380-28367fe8541b", "url": "https://2026.asiabsdcon.org/entry/speaker/LHCTCE/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/PT7VFL/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/PT7VFL/", "attachments": []}, {"guid": "fa37a4fa-74af-5a8c-bf08-6b6512890924", "code": "MSBLUR", "id": 35, "logo": null, "date": "2026-03-22T15:00:00+08:00", "start": "15:00", "duration": "01:30", "room": "Room A", "slug": "entry-35-work-in-progress", "url": "https://2026.asiabsdcon.org/entry/talk/MSBLUR/", "title": "Work-in-Progress", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "This session invites you all to give short talks about your ongoing projects.", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/MSBLUR/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/MSBLUR/", "attachments": []}, {"guid": "eccdc8fb-a61a-529d-9060-d0c30b3f08cd", "code": "FGQVQL", "id": 34, "logo": null, "date": "2026-03-22T16:30:00+08:00", "start": "16:30", "duration": "00:20", "room": "Room A", "slug": "entry-34-closing", "url": "https://2026.asiabsdcon.org/entry/talk/FGQVQL/", "title": "Closing", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "The formal closing of AsiaBSDCon 2026", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/FGQVQL/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/FGQVQL/", "attachments": []}], "Room B": [{"guid": "644ca499-6c29-5d9d-8452-0ff044569f3f", "code": "DMS8QV", "id": 20, "logo": null, "date": "2026-03-22T13:00:00+08:00", "start": "13:00", "duration": "00:45", "room": "Room B", "slug": "entry-20-running-freebsd-on-wsl2-without-modifying-freebsd-a-working-implementation", "url": "https://2026.asiabsdcon.org/entry/talk/DMS8QV/", "title": "Running FreeBSD on WSL2 Without Modifying FreeBSD: A Working Implementation", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "Author: Balaje Sankar\r\nRepository: https://github.com/BalajeS/WSL-For-FreeBSD\r\nAbstract\r\nThis work presents a successful and practical implementation of running FreeBSD on Microsoft\u2019s Windows Subsystem for Linux version 2 (WSL2) without modifying the FreeBSD base system. With the recent open-sourcing of WSL2, it became possible to examine whether the subsystem\u2019s VM-based environment could support a non-Linux guest with minimal changes on the Windows side. The resulting prototype demonstrates that FreeBSD can be booted reliably inside WSL2 using a full disk image, provides a fully functional and responsive console, and operates with performance comparable to a Linux distribution running under the same subsystem.\r\n1. Introduction and Motivation\r\nThe motivation for this project comes from longstanding community interest in seeing FreeBSD operate under WSL2. Prior to WSL2\u2019s open-sourcing, the feasibility of this was unclear, as external reports primarily focused on Linux-specific behaviour. Once the source code became available, the architecture could be studied in detail.\r\n2. HCS - VM Orchestration and Lifecycle\r\nA key early finding was that WSL2 does not depend heavily on traditional Hyper-V management interfaces but instead orchestrates virtual machines through the Host Compute Service (HCS) API. HCS provides a more generic VM lifecycle and resource description mechanism. A small test program using HCS APIs confirmed that FreeBSD could be instantiated within this framework, indicating that the subsystem did not impose a Linux-only restriction at the virtualization layer.\r\n3. Implementation Challenges\r\nThe next major challenge was obtaining usable console output during boot. WSL2 typically uses a virtio-console for interactive output in Linux distributions. However, FreeBSD does not currently support virtio-console output for early boot messages, resulting in a stuck boot process when enabling virtio-console in HCS configuration.\r\nTo resolve this, the system was configured to boot using a serial console, which FreeBSD supports robustly. With serial I/O enabled, FreeBSD\u2019s kernel and userland initialization proceeded without issue, providing a clear view of the boot sequence and allowing interactive access to the system. Testing showed that the resulting console performance is effectively on par with Linux WSL2 instances, with low-latency input and smooth terminal behaviour.\r\n4. hvsock - Host-Guest Communication\r\nHost\u2013guest communication within WSL2 relies heavily on Hyper-V sockets (hvsock), and supporting these was another necessary step toward full integration. Experiments were conducted to verify that FreeBSD\u2019s hvsock implementation could function in this environment. These tests confirmed that FreeBSD can operate as both an hvsock client and server, enabling it to participate in the minimal handshake mechanisms the subsystem expects from its guest systems.\r\nBased on this, two small utilities\u2014hvinit and hvbridge\u2014were developed. These programs perform the initialization exchanges needed for WSL2 to treat the FreeBSD VM similarly to how it treats a Linux distribution during early startup, without requiring any changes to FreeBSD itself.\r\n5. Boot Strategy\r\nStandard WSL2 Linux workflows heavily modify the boot process, often relying on a host-provided kernel and a specialized initrd (minit init) to bootstrap the environment. In distinct contrast, this implementation enforces a strict 'stock-only' policy for the guest.\r\nBy leveraging the HCS API\u2019s native capability to boot full disk images, we bypass the Linux specific kernel loading mechanism entirely. This approach eliminates the need for custom kernels or minit-init type custom init programs. It demonstrates that the unmodified FreeBSD base system is robust enough to operate within the WSL2 architecture.\r\n6. Limitations and Future Work\r\nNetworking and host filesystem integration remain areas for future work. Although WSL2 uses the Host Compute Network (HCN) API to configure networking for Linux distributions, this project has so far only explored HCN behaviour conceptually and generated example configurations. No guest-side networking setup for FreeBSD has yet been implemented, and WSL2\u2019s Plan9/9P filesystem integration has similarly not been enabled. These features remain logical next steps, particularly networking which will significantly increase the prototype\u2019s usability.\r\n7. Conclusion\r\nThis paper demonstrates the technical feasibility of running successfully a stock FreeBSD environment natively on Windows via WSL2. It suggests a future where developers and students might experiment with FreeBSD tools without the need for dual-booting or dedicated hardware. By establishing that the underlying virtualization architecture is compatible with FreeBSD, this work provides a foundation for the community to further refine the experience and expand the FreeBSD ecosystem to a wider audience.\r\n\r\nSource Code: https://github.com/BalajeS/WSL-For-FreeBSD\r\nDemo: https://x.com/balajesankar/status/1970585411153207715?s=20", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "SJBYWT", "name": "Balaje Sankar", "avatar": null, "biography": "Balaje Sankar is an Enterprise Cloud Architect and long-time FreeBSD enthusiast. With a background in network programming and C, he focuses on systems virtualization and cross-platform compatibility. He is the author of the WSL-For-FreeBSD implementation.", "public_name": "Balaje Sankar", "guid": "6bc18f7f-b368-5cb9-9d96-191ccab6da32", "url": "https://2026.asiabsdcon.org/entry/speaker/SJBYWT/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/DMS8QV/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/DMS8QV/", "attachments": []}, {"guid": "615b28a3-56db-5092-a657-e2dcdb9c6b86", "code": "DSEXKX", "id": 28, "logo": null, "date": "2026-03-22T14:00:00+08:00", "start": "14:00", "duration": "00:45", "room": "Room B", "slug": "entry-28-macdo-4-mdo-1-and-setcred-2-role-based-credentials-transitions-without-privileges", "url": "https://2026.asiabsdcon.org/entry/talk/DSEXKX/", "title": "mac_do(4), mdo(1) and setcred(2): Role-based credentials transitions without privileges", "subtitle": "", "track": null, "type": "Paper", "language": "en", "abstract": "In this talk, we present the mac_do(4) and mdo(1) FreeBSD components, which aim at supporting a role-based security model by allowing controlled process credentials transitions, and do so without the use of setuid executables by leveraging instead the mac(4) framework.  We describe their architecture and illustrate their practical functionalities to administrators and users.\r\n\r\nThe mac_do(4) kernel module has been introduced to allow unprivileged processes to change credentials, provided the requested changes are explicitly allowed by rules set by an administrator.  Its companion userland program, mdo(1), serves to request credentials changes.\r\n\r\nBoth components have undergone major changes that have been shipped into FreeBSD 15.  First, thanks to a redesign of mac_do(4)'s rules, it is now possible to completely specify the full sets of user and group IDs that must be present or absent in the final credentials for a transition to be accepted.  Second, mac_do(4)'s configuration is per jail, allowing different sets of rules as needed or inheritance from the parent jail.  This configuration can be tuned from inside and outside the jail.  Third, mdo(1), initially limited to changing users and possibly switching to their groups, has grown the ability to fine-tune the target credentials' users and groups while retaining simplicity for the most common use cases.\r\n\r\nWe will describe how mac_do(4)'s credentials rules work, what you can accomplish with the mdo(1) companion program in FreeBSD 15, and the changes that are in the works at time of this writing.  Some of them have been developed as part of Google Summer of Code 2025, which also gave birth to the new mdo(1) features described above, and are in the process of being integrated, such as per-jail configurability of \"approved\" companion programs for mac_do(4).  In general, more logging, auditing and ease of use facilities are to come next.  We will report on the progress of these new features.\r\n\r\nWe will also touch on some aspects of the implementation, notably why we needed to introduce the new setcred(2) system call, which allows to change all process credentials in a single call, and, time-permitting, those that are related to the use of some FreeBSD's kernel sub-systems (notably, sysctl, jails and OSD).", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "NAT7FR", "name": "Olivier Certner", "avatar": "https://2026.asiabsdcon.org/media/avatars/NAT7FR_RZ2PzXF.jpg", "biography": "Olivier has been continuously using FreeBSD on all his machines and those of some of the companies he worked with since the end of 2004. During this time, he has grown a set of private customizations including modifications to rc scripts and some kernel bits. After having worked for over 15 years in the CAD and finance sectors, he lately switched back to pure IT topics, and in particular operating system development. His main interests are centered around kernel development, with particular focuses on power management, security, scheduling, file systems and jails. He's currently a contractor for the FreeBSD Foundation.", "public_name": "Olivier Certner", "guid": "650475db-d993-5a9f-a148-60e911169e06", "url": "https://2026.asiabsdcon.org/entry/speaker/NAT7FR/"}], "links": [], "feedback_url": "https://2026.asiabsdcon.org/entry/talk/DSEXKX/feedback/", "origin_url": "https://2026.asiabsdcon.org/entry/talk/DSEXKX/", "attachments": []}]}}]}}}