Skip to main content.

Episode 077: Noah's L2ARC


Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent

This episode was brought to you by

iXsystems - Enterprise Servers and Storage for Open SourceDigitalOcean - Simple Cloud Hosting, Built for DevelopersTarsnap - Online Backups for the Truly Paranoid


Revisiting FreeBSD after 20 years

  • With comments like "has Linux lost its way?" floating around, a Debian developer was prompted to revisit FreeBSD after nearly two decades
  • This blog post goes through his experiences trying out a modern BSD variant, and includes the good, the bad and the ugly - not just praise this time
  • He loves ZFS and the beadm tool, and finds the FreeBSD implementation to be much more stable than ZoL
  • On the topic of jails, he summarizes: "Linux has tried so hard to get this right, and fallen on its face so many times, a person just wants to take pity sometimes. We’ve had linux-vserver, openvz, lxc, and still none of them match what FreeBSD jails have done for a long time."
  • The post also goes through the "just plain different" aspects of a complete OS vs. a distribution of various things pieced together
  • Finally, he includes some things he wasn't so happy about: subpar laptop support, virtualization being a bit behind, a myriad of complaints about pkgng and a few other things
  • There was some decent discussion on Hacker News about this article too, with counterpoints from both sides

s2k15 hackathon report: network stack SMP

  • The first trip report from the recent OpenBSD hackathon in Australia has finally been submitted
  • One of the themes of this hackathon was SMP (symmetric multiprocessing) improvement, and Martin Pieuchot did some hacking on the network stack
  • If you're not familiar with him, he gave a presentation at EuroBSDCon last year, titled Taming OpenBSD Network Stack Dragons
  • Teaming up with David Gwynne, they worked on getting some bits of the networking code out of the big lock
  • Hopefully more trip reports will be sent in during the coming weeks
  • Most of the big code changes should probably appear after the 5.7-release testing period

From BIND to NSD and Unbound

  • If you've been running a DNS server on any of the BSDs, you've probably noticed a semi-recent trend: BIND being replaced with Unbound
  • BIND was ripped out in FreeBSD 10.0 and will be gone in OpenBSD 5.7, but both systems include Unbound now as an alternative
  • OpenBSD goes a step further, also including NSD in the base system, whereas you'll need to install that from ports on FreeBSD
  • Instead of one daemon doing everything like BIND tried to do, this new setup splits the authoritative nameserver and the caching resolver into two separate daemons
  • This post takes you through the transitional phase of going from a single BIND setup to a combination of NSD and Unbound
  • All in all, everyone wins here, as there will be a lot less security advisories in both BSDs because of it...

m0n0wall calls it quits

  • The original, classic BSD firewall distribution m0n0wall has finally decided to close up shop
  • For those unfamiliar, m0n0wall was a FreeBSD-based firewall project that put a lot of focus on embedded devices: running from a CF card, CD, USB drive or even a floppy disk
  • It started over twelve years ago, which is pretty amazing when you consider that's around half of FreeBSD itself's lifespan
  • The project was probably a lot of people's first encounter with BSD in any form
  • If you were a m0n0wall user, fear not, you've got plenty of choices for a potential replacement: doing it yourself with something like FreeBSD or OpenBSD, or going the premade route with something like pfSense, OPNsense or the BSD Router Project
  • The founder's announcement includes these closing words: "m0n0wall has served as the seed for several other well known open source projects, like pfSense, FreeNAS and AskoziaPBX. The newest offspring, OPNsense, aims to continue the open source spirit of m0n0wall while updating the technology to be ready for the future. In my view, it is the perfect way to bring the m0n0wall idea into 2015, and I encourage all current m0n0wall users to check out OPNsense and contribute if they can."
  • While m0n0wall didn't get a lot of on-air mention, surely a lot of our listeners will remember it fondly

Interview - Alex Reece & Matt Ahrens - & / @openzfs

What's new in OpenZFS


Making your first patch (OpenBSD)

News Roundup

Overlaying remote LANs with OpenBSD's VXLAN

  • Have you ever wanted to "merge" multiple remote LANs? OpenBSD's vxlan(4) is exactly what you need
  • This article talks about using it to connect two virtualized infrastructures on different ESXi servers
  • It gives a bit of networking background first, in case you're not quite up to speed on all this stuff
  • This tool opens up a lot of very cool possibilities, even possibly doing a "remote" LAN party
  • Be sure to check the AsiaBSDCon talk about VXLANs if you haven't already

2020, year of the PCBSD desktop

  • Here we have a blog post about BSD on the desktop, straight from a KDE developer
  • He predicts that PCBSD is going to take off before the year 2020, possibly even overtaking Linux's desktop market share (small as it may be)
  • With PCBSD making a preconfigured FreeBSD desktop a reality, and the new KMS work, the author is impressed with how far BSD has come as a viable desktop option
  • ZFS and easy-to-use boot environments top the list of things he says differentiate the BSD desktop experience from the Linux one
  • There was also some discussion on Slashdot that might be worth reading

OpenSSH host key rotation, redux

  • We mentioned the new OpenSSH host key rotation and other goodies in a previous episode, but things have changed a little bit since then
  • djm says "almost immediately after smugly declaring 'mission accomplished', the bug reports started rolling in."
  • There were some initial complaints from developers about the new options, and a serious bug shortly thereafter
  • After going back to the drawing board, he refactored some of the new code (and API) and added some more regression tests
  • Most importantly, the bigger big fix was described as: "a malicious server (say, "host-a") could advertise the public key of another server (say, "host-b"). Then, when the client subsequently connects back to host-a, instead of answering the connection as usual itself, host-a could proxy the connection to host-b. This would cause the user to connect to host-b when they think they are connecting to host-a, which is a violation of the authentication the host key is supposed to provide."
  • None of this code has been in a formal OpenSSH release just yet, but hopefully it will soon

PCBSD tries out LibreSSL

  • PCBSD users may soon be seeing a lot less security problems because of two recent changes
  • After switching over to OpenNTPD last week, PCBSD decides to give the portable LibreSSL a try too
  • Note that this is only for the packages built from ports, not the base system unfortunately
  • They're not the first ones to do this - OPNsense has been experimenting with replacing OpenSSL in their ports tree for a little while now, and of course all of OpenBSD's ports are built against it
  • A good number of patches are still not committed in vanilla FreeBSD ports, so they had to borrow some from Bugzilla
  • Look forward to Kris wearing a "keep calm and abandon OpenSSL" shirt in the near future


Mailing List Gold

  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to
  • If you write an article or blog post about BSD, or even just come across one you like, be sure to send it our way
  • If you're in or around the southern California area, there's going to be at least two BSD-related talks at this year's SCALE 13x conference, as well as an OpenBSD booth, FreeBSD booth and some BSD certification exams as well
  • That's going on between February 19th-22nd at the Hilton Los Angeles Airport
  • A special thanks to our anonymous listener for writing most of this week's tutorial - we'll be doing ones for PCBSD (using git) and FreeBSD (using svn) sometime soon

Latest News

New announcement


We understand that Michael Dexter, Brad Davis, and George Rosamond think there should be more real news....

Two Year Anniversary


We're quickly approaching our two-year anniversary, which will be on episode 105. To celebrate, we've created a unique t-shirt design, available for purchase until the end of August. Shirts will be shipped out around September 1st. Most of the proceeds will support the show, and specifically allow us to buy...

New discussion segment


We're thinking about adding a new segment to the show where we discuss a topic that the listeners suggest. It's meant to be informative like a tutorial, but more of a "free discussion" format. If you have any subjects you want us to explore, or even just a good name...

How did you get into BSD?


We've got a fun idea for the holidays this year: just like we ask during the interviews, we want to hear how all the viewers and listeners first got into BSD. Email us your story, either written or a video version, and we'll read and play some of them for...

Episode 281: EPYC Server battle


Direct Download:MP3 AudioVideo Headlines scp client multiple vulnerabilities Overview SCP clients from multiple vendors are susceptible to a malicious scp server performing unauthorized changes to target directory and/or client output manipulation. Description Many scp clients fail to verify if the objects returned by the scp server match those it asked for. This issue dates back to 1983 and...

Episode 280: FOSS clothing


Direct Download:MP3 AudioVideo Headlines A EULA in FOSS clothing? There was a tremendous amount of reaction to and discussion about my blog entry on the midlife crisis in open source. As part of this discussion on HN, Jay Kreps of Confluent took the time to write a detailed response — which...

Episode 279: Future of ZFS


Direct Download:MP3 AudioVideo Headlines The future of ZFS in FreeBSD The sources for FreeBSD's ZFS support are currently taken directly from Illumos with local ifdefs to support the peculiarities of FreeBSD where the Solaris Portability Layer (SPL) shims fall short. FreeBSD has regularly pulled changes from Illumos and tried to push...

Episode 278: The real McCoy


Direct Download:MP3 AudioVideo Interview - Kirk McKusick - 25 years of FreeBSD How Kirk got started in BSD, at the very beginning Predicting the Future How the code and community grew The leadership of the project, and how it changed over time UFS over the years (reading disks from 1982 in 2018) Conferences The rise and fall of...