x11/drawterm - The NetBSD Packages Collection

Utility to connect to Plan9 CPU servers

Drawterm  is a program that users of non-Plan 9 systems can use to
establish graphical cpu(1) connections with Plan 9 CPU servers.  Just as
a real Plan 9 terminal does, drawterm serves its local name space as
well as some devices (the keyboard, mouse, and screen) to a remote CPU
server, which mounts this name space on /mnt/term and starts a shell.
Typically, either explicitly or via the profile, one uses the shell to
start rio(1).

This is a fork of Russ Cox's drawterm to incorporate features from
Plan9front (http://9front.org), most importantly DP9IK authentication
support (see authsrv(6)) and the TLS based rcpu(1) protocol.

Build dependencies

pkgtools/x11-links pkgtools/mktools pkgtools/cwrappers

Runtime dependencies

(none)

Binary packages

OSArchitectureVersion
NetBSD 10.0i386drawterm-20240703.tgz
NetBSD 10.0i386drawterm-20230224.tgz
NetBSD 10.0i386drawterm-20231223.tgz
NetBSD 10.0i386drawterm-20231223.tgz
NetBSD 10.0x86_64drawterm-20240703.tgz
NetBSD 10.0x86_64drawterm-20230224.tgz
NetBSD 10.0x86_64drawterm-20231223.tgz
NetBSD 10.0x86_64drawterm-20231223.tgz
NetBSD 9.0i386drawterm-20240703.tgz
NetBSD 9.0i386drawterm-20230224.tgz
NetBSD 9.0i386drawterm-20231223.tgz
NetBSD 9.0i386drawterm-20231223.tgz
NetBSD 9.0x86_64drawterm-20240703.tgz
NetBSD 9.0x86_64drawterm-20230224.tgz
NetBSD 9.0x86_64drawterm-20231223.tgz
NetBSD 9.0x86_64drawterm-20231223.tgz
NetBSD 9.3x86_64drawterm-20240703.tgz
NetBSD 9.3x86_64drawterm-20240703.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.