<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 03 May 2026 16:45:35 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Arc4random”</title>
    <link>https://www.bsdnow.tv/tags/arc4random</link>
    <pubDate>Wed, 19 Nov 2014 08:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>64: Rump Kernels Revisited</title>
  <link>https://www.bsdnow.tv/64</link>
  <guid isPermaLink="false">b5100d19-f472-4a18-93f7-72e1494ce394</guid>
  <pubDate>Wed, 19 Nov 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b5100d19-f472-4a18-93f7-72e1494ce394.mp3" length="81755572" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with Justin Cormack about NetBSD rump kernels. We'll learn how to run them on other operating systems, what's planned for the future and a lot more. As always, answers to viewer-submitted questions and all the news for the week, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:53:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking with Justin Cormack about NetBSD rump kernels. We'll learn how to run them on other operating systems, what's planned for the future and a lot more. As always, answers to viewer-submitted questions and all the news for the week, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
EuroBSDCon 2014 talks and tutorials (http://2014.eurobsdcon.org/talks-and-schedule/)
The 2014 EuroBSDCon videos have been online for over a month, but unannounced - keep in mind these links may be temporary (but we'll mention their new location in a future show and fix the show notes if that's the case)

Arun Thomas, BSD ARM Kernel Internals (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/01.BSD-ARM%20Kernel%20Internals%20-%20Arun%20Thomas.mp4)

Ted Unangst, Developing Software in a Hostile Environment (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/02.Developing%20Software%20in%20a%20Hostile%20Environment%20-%20Ted%20Unangst.mp4)

Martin Pieuchot, Taming OpenBSD Network Stack Dragons (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4)

Henning Brauer, OpenBGPD turns 10 years (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/04.OpenBGPD%20turns%2010%20years%20-%20%20Henning%20Brauer.mp4)

Claudio Jeker, vscsi and iscsid iSCSI initiator the OpenBSD way (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/05.vscsi(4)%20and%20iscsid%20-%20iSCSI%20initiator%20the%20OpenBSD%20way%20-%20Claudio%20Jeker.mp4)

Paul Irofti, Making OpenBSD Useful on the Octeon Network Gear (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/06.Making%20OpenBSD%20Useful%20on%20the%20Octeon%20Network%20Gear%20-%20Paul%20Irofti.mp4)

Baptiste Daroussin, Cross Building the FreeBSD ports tree (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/01.Cross%20Building%20the%20FreeBSD%20ports%20tree%20-%20Baptiste%20Daroussin.mp4)

Boris Astardzhiev, Smartcom’s control plane software, a customized version of FreeBSD (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/02.Smartcom%e2%80%99s%20control%20plane%20software,%20a%20customized%20version%20of%20FreeBSD%20-%20Boris%20Astardzhiev.mp4)

Michał Dubiel, OpenStack and OpenContrail for FreeBSD platform (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/03.OpenStack%20and%20OpenContrail%20for%20FreeBSD%20platform%20-%20Micha%c5%82%20Dubiel.mp4)

Martin Husemann &amp;amp; Joerg Sonnenberger, Tool-chaining the Hydra, the ongoing quest for modern toolchains in NetBSD (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/04.(Tool-)chaining%20the%20Hydra%20The%20ongoing%20quest%20for%20modern%20toolchains%20in%20NetBSD%20-%20Martin%20Huseman%20&amp;amp;%20Joerg%20Sonnenberger.mp4)

Taylor R Campbell, The entropic principle: /dev/u?random and NetBSD (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/05.The%20entropic%20principle:%20dev-u%3frandom%20and%20NetBSD%20-%20Taylor%20R%20Campbell.mp4)

Dag-Erling Smørgrav, Securing sensitive &amp;amp; restricted data (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/06.Securing%20sensitive%20&amp;amp;%20restricted%20data%20-%20Dag-Erling%20Sm%c3%b8rgrav.mp4)

Peter Hansteen, Building The Network You Need (https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/01.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4) With PF (https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/02.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4)

Stefan Sperling, Subversion for FreeBSD developers (https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/03.Subversion%20for%20FreeBSD%20developers%20-%20Stefan%20Sperling.mp4)

Peter Hansteen, Transition to (https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/01.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4) OpenBSD 5.6 (https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/02.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4)

Ingo Schwarze, Let’s make manuals (https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/03.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4) more useful (https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/04.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4)

Francois Tigeot, Improving DragonFly’s performance with PostgreSQL (https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/01.Improving%20DragonFly%e2%80%99s%20performance%20with%20PostgreSQL%20-%20Francois%20Tigeot.mp4)

Justin Cormack, Running Applications on the NetBSD Rump Kernel (https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/02.Running%20Applications%20on%20the%20NetBSD%20Rump%20Kernel%20-%20Justin%20Cormack.mp4)

Pierre Pronchery, EdgeBSD, a year later (https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/04.EdgeBSD,%20a%20year%20later%20-%20%20Pierre%20Pronchery.mp4)

Peter Hessler, Using routing domains or tables in a production network (https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/05.Using%20routing%20domains%20or%20tables%20in%20a%20production%20network%20-%20%20Peter%20Hessler.mp4)

Sean Bruno, QEMU user mode on FreeBSD (https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/06.QEMU%20user%20mode%20on%20FreeBSD%20-%20%20Sean%20Bruno.mp4)

Kristaps Dzonsons, Bugs Ex Ante (https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/01.Bugs%20Ex%20Ante%20-%20Kristaps%20Dzonsons.mp4)

Yann Sionneau, Porting NetBSD to the LatticeMico32 open source CPU (https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/02.Porting%20NetBSD%20to%20the%20LatticeMico32%20open%20source%20CPU%20-%20Yann%20Sionneau.mp4)

Alexander Nasonov, JIT Code Generator for NetBSD (https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/03.JIT%20Code%20Generator%20for%20NetBSD%20-%20Alexander%20Nasonov.mp4)

Masao Uebayashi, Porting Valgrind to NetBSD and OpenBSD (https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/04.Porting%20Valgrind%20to%20NetBSD%20and%20OpenBSD%20-%20Masao%20Uebayashi.mp4)

Marc Espie, parallel make, working with legacy code (https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/05.parallel%20make:%20working%20with%20legacy%20code%20-%20Marc%20Espie.mp4)

Francois Tigeot, Porting the drm-kms graphic drivers to DragonFly (https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/06.Porting%20the%20drm-kms%20graphic%20drivers%20to%20DragonFly%20-%20Francois%20Tigeot.mp4)

The following talks (from the Vitosha track room) are all currently missing:
Jordan Hubbard, FreeBSD, Looking forward to another 10 years (but we have another recording)
Theo de Raadt, Randomness, how arc4random has grown since 1998 (but we have another recording)
Kris Moore, Snapshots, Replication, and Boot-Environments
Kirk McKusick, An Introduction to the Implementation of ZFS
John-Mark Gurney, Optimizing GELI Performance
Emmanuel Dreyfus, FUSE and beyond, bridging filesystems
Lourival Vieira Neto, NPF scripting with Lua
Andy Tanenbaum, A Reimplementation of NetBSD Based on a Microkernel
Stefano Garzarella, Software segmentation offloading for FreeBSD
Ted Unangst, LibreSSL
Shawn Webb, Introducing ASLR In FreeBSD
Ed Maste, The LLDB Debugger in FreeBSD
Philip Guenther, Secure lazy binding
***
OpenBSD adopts SipHash (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141614801713457&amp;amp;w=2)
Even more DJB crypto somehow finds its way into OpenBSD's base system
This time it's SipHash (https://131002.net/siphash/), a family of pseudorandom functions that's resistant to hash bucket flooding attacks while still providing good performance
After an initial import (http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/crypto/siphash.c?rev=1.1&amp;amp;content-type=text/x-cvsweb-markup) and some clever early usage (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141604896822253&amp;amp;w=2), a few developers agreed that it would be better to use it in a lot more places
It will now be used in the filesystem, and the plan is to utilize it to protect all kernel hash functions
Some other places (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) that Bernstein's work can be found in OpenBSD include the ChaCha20-Poly1305 authenticated stream cipher and Curve25519 KEX used in SSH, ChaCha20 used in the RNG, and Ed25519 keys used in signify (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) and SSH
***
FreeBSD 10.1-RELEASE (https://www.freebsd.org/releases/10.1R/announce.html)
FreeBSD's release engineering team (http://www.bsdnow.tv/episodes/2013-09-11_engineering_powder_kegs) likes to troll us by uploading new versions just a few hours after we finish recording an episode
The first maintenance update for the 10.x branch is out, improving upon a lot of things found in 10.0-RELEASE
The vt driver was merged from -CURRENT and can now be enabled with a loader.conf switch (and can even be used on a PlayStation 3)
Bhyve has gotten quite a lot of fixes and improvements from its initial debut in 10.0, including boot support for ZFS
Lots of new ARM hardware is supported now, including SMP support for most of them
A new kernel selection menu was added to the loader, so you can switch between newer and older kernels at boot time
10.1 is the first to support UEFI booting on amd64, which also has serial console support now
Lots of third party software (OpenSSH, OpenSSL, Unbound..) and drivers have gotten updates to newer versions
It's a worthy update from 10.0, or a good time to try the 10.x branch if you were avoiding the first .0 release, so grab an ISO (http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.1/) or upgrade (https://www.freebsd.org/cgi/man.cgi?query=freebsd-update) today
Check the detailed release notes (https://www.freebsd.org/releases/10.1R/relnotes.html) for more information on all the changes
Also take a look at some of the known problems (https://www.freebsd.org/releases/10.1R/errata.html#open-issues) to see if (https://forums.freebsd.org/threads/segmentation-fault-while-upgrading-from-10-0-release-to-10-1-release.48977/) you'll (https://lists.freebsd.org/pipermail/freebsd-stable/2014-October/080599.html) be (https://forums.freebsd.org/threads/10-0-10-1-diocaddrule-operation-not-supported-by-device.49016/) affected (https://www.reddit.com/r/freebsd/comments/2mmzzy/101release_restart_problems_anyone/) by any of them
PC-BSD was also updated accordingly (http://wiki.pcbsd.org/index.php/What%27s_New/10.1) with some of their own unique features and changes
***
arc4random - Randomization for All Occasions (https://www.youtube.com/watch?v=aWmLWx8ut20)
Theo de Raadt gave an updated version of his EuroBSDCon presentation at Hackfest 2014 in Quebec
The presentation is mainly about OpenBSD's arc4random function, and outlines the overall poor state of randomization in the 90s and how it has evolved in OpenBSD over time
It begins with some interesting history on OpenBSD and how it became a security-focused OS - in 1996, their syslogd got broken into and "suddenly we became interested in security"
The talk also touches on how low-level changes can shake up the software ecosystem and third party packages that everyone uses
There's some funny history on the name of the function (being called arc4random despite not using RC4 anymore) and an overall status update on various platforms' usage of it
Very detailed and informative presentation, and the slides can be found here (http://www.openbsd.org/papers/hackfest2014-arc4random/index.html)
A great quote from the beginning: "We consider ourselves a community of (probably rather strange) people who work on software specifically for the purpose of trying to make it better. We take a 'whole-systems' approach: trying to change everything in the ecosystem that's under our control, trying to see if we can make it better. We gain a lot of strength by being able to throw backwards compatibility out the window. So that means that we're able to do research and the minute that we decide that something isn't right, we'll design an alternative for it and push it in. And if it ends up breaking everybody's machines from the previous stage to the next stage, that's fine because we'll end up in a happier place."
***
Interview - Justin Cormack - justin@netbsd.org (mailto:justin@netbsd.org) / @justincormack (https://twitter.com/justincormack)
NetBSD on Xen, rump kernels, various topics
News Roundup
The FreeBSD foundation's biggest donation (http://freebsdfoundation.blogspot.com/2014/11/freebsd-foundation-announces-generous.html)
The FreeBSD foundation has a new blog post about the largest donation they've ever gotten
From the CEO of WhatsApp comes a whopping one million dollars in a single donation
It also has some comments from the donor about why they use BSD and why it's important to give back
Be sure to donate to the foundation of whatever BSD you use when you can - every little bit helps, especially for OpenBSD (http://www.openbsd.org/donations.html), NetBSD (https://www.netbsd.org/donations/) and DragonFly (http://www.dragonflybsd.org/donations/) who don't have huge companies supporting them regularly like FreeBSD does
***
OpenZFS Dev Summit 2014 videos (http://open-zfs.org/wiki/OpenZFS_Developer_Summit)
Videos from the recent OpenZFS developer summit are being uploaded, with speakers from different represented platforms and companies

Matt Ahrens (http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods), opening keynote (https://www.youtube.com/watch?v=XnTzbisLYzg)

Raphael Carvalho, Platform Overview: ZFS on OSv (https://www.youtube.com/watch?v=TJLOBLSRoHE)

Brian Behlendorf, Platform Overview: ZFS on Linux (https://www.youtube.com/watch?v=_MVOpMNV7LY)

Prakash Surya, Platform Overview: illumos (https://www.youtube.com/watch?v=UtlGt3ag0o0)

Xin Li, Platform Overview: FreeBSD (https://www.youtube.com/watch?v=xO0x5_3A1X4)

All platforms, Group Q&amp;amp;A Session (https://www.youtube.com/watch?v=t4UlT0RmSCc)

Dave Pacheco, Manta (https://www.youtube.com/watch?v=BEoCMpdB8WU)

Saso Kiselkov, Compression (https://www.youtube.com/watch?v=TZF92taa_us)

George Wilson (http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days), Performance (https://www.youtube.com/watch?v=deJc0EMKrM4)

Tim Feldman, Host-Aware SMR (https://www.youtube.com/watch?v=b1yqjV8qemU)

Pavel Zakharov, Fast File Cloning (https://www.youtube.com/watch?v=-4c4gsLi1LI)

The audio is pretty poor (https://twitter.com/OpenZFS/status/534005125853888512) on all of them unfortunately
***
BSDTalk 248 (http://bsdtalk.blogspot.com/2014/11/bsdtalk248-dragonflybsd-with-matthew.html)
Our friend Will Backman is still busy getting BSD interviews as well
This time he sits down with Matthew Dillon, the lead developer of DragonFly BSD
We've never had Dillon on the show, so you'll definitely want to give this one a listen
They mainly discuss all the big changes coming in DragonFly's upcoming 4.0 release
***
MeetBSD 2014 videos (https://www.meetbsd.com/)
The presentations from this year's MeetBSD conference are starting to appear online as well

Kirk McKusick (http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache), A Narrative History of BSD (https://www.youtube.com/watch?v=DEEr6dT-4uQ)

Jordan Hubbard (http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap), FreeBSD: The Next 10 Years (https://www.youtube.com/watch?v=Mri66Uz6-8Y)

Brendan Gregg, Performance Analysis (https://www.youtube.com/watch?v=uvKMptfXtdo)

The slides can be found here (https://www.meetbsd.com/agenda/) 
***
Feedback/Questions
Dominik writes in (http://slexy.org/view/s20PXjp55N)
Steven writes in (http://slexy.org/view/s2LwEYT3bA)
Florian writes in (http://slexy.org/view/s2ubK8vQVt)
Richard writes in (http://slexy.org/view/s216Eq8nFG)
Kevin writes in (http://slexy.org/view/s21D2ugDUy)
***
Mailing List Gold
Contributing without code (https://www.marc.info/?t=141600819500004&amp;amp;r=1&amp;amp;w=2)
Compression isn't a CRIME (https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033176.html)
Securing web browsers (https://www.marc.info/?t=141616714600001&amp;amp;r=1&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, rump kernels, xen, userspace, networking, siphash, 10.1, review, 10.1 review, openzfs, zfs, devsummit, hackfest, arc4random, meetbsd, presentation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Justin Cormack about NetBSD rump kernels. We&#39;ll learn how to run them on other operating systems, what&#39;s planned for the future and a lot more. As always, answers to viewer-submitted questions and all the news for the week, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and tutorials</a></h3>

<ul>
<li>The 2014 EuroBSDCon videos have been online for over a month, but unannounced - keep in mind these links may be temporary (but we&#39;ll mention their new location in a future show and fix the show notes if that&#39;s the case)
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Arun Thomas, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/01.BSD-ARM%20Kernel%20Internals%20-%20Arun%20Thomas.mp4" rel="nofollow">BSD ARM Kernel Internals</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Ted Unangst, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/02.Developing%20Software%20in%20a%20Hostile%20Environment%20-%20Ted%20Unangst.mp4" rel="nofollow">Developing Software in a Hostile Environment</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Martin Pieuchot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" rel="nofollow">Taming OpenBSD Network Stack Dragons</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Henning Brauer, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/04.OpenBGPD%20turns%2010%20years%20-%20%20Henning%20Brauer.mp4" rel="nofollow">OpenBGPD turns 10 years</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Claudio Jeker, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/05.vscsi(4)%20and%20iscsid%20-%20iSCSI%20initiator%20the%20OpenBSD%20way%20-%20Claudio%20Jeker.mp4" rel="nofollow">vscsi and iscsid iSCSI initiator the OpenBSD way</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Paul Irofti, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/06.Making%20OpenBSD%20Useful%20on%20the%20Octeon%20Network%20Gear%20-%20Paul%20Irofti.mp4" rel="nofollow">Making OpenBSD Useful on the Octeon Network Gear</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Baptiste Daroussin, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/01.Cross%20Building%20the%20FreeBSD%20ports%20tree%20-%20Baptiste%20Daroussin.mp4" rel="nofollow">Cross Building the FreeBSD ports tree</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Boris Astardzhiev, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/02.Smartcom%e2%80%99s%20control%20plane%20software,%20a%20customized%20version%20of%20FreeBSD%20-%20Boris%20Astardzhiev.mp4" rel="nofollow">Smartcom’s control plane software, a customized version of FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Michał Dubiel, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/03.OpenStack%20and%20OpenContrail%20for%20FreeBSD%20platform%20-%20Micha%c5%82%20Dubiel.mp4" rel="nofollow">OpenStack and OpenContrail for FreeBSD platform</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Martin Husemann &amp; Joerg Sonnenberger, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/04.(Tool-)chaining%20the%20Hydra%20The%20ongoing%20quest%20for%20modern%20toolchains%20in%20NetBSD%20-%20Martin%20Huseman%20&%20Joerg%20Sonnenberger.mp4" rel="nofollow">Tool-chaining the Hydra, the ongoing quest for modern toolchains in NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Taylor R Campbell, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/05.The%20entropic%20principle:%20dev-u%3frandom%20and%20NetBSD%20-%20Taylor%20R%20Campbell.mp4" rel="nofollow">The entropic principle: /dev/u?random and NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Dag-Erling Smørgrav, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/06.Securing%20sensitive%20&%20restricted%20data%20-%20Dag-Erling%20Sm%c3%b8rgrav.mp4" rel="nofollow">Securing sensitive &amp; restricted data</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hansteen, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/01.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" rel="nofollow">Building The Network You Need</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/02.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" rel="nofollow">With PF</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Stefan Sperling, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/03.Subversion%20for%20FreeBSD%20developers%20-%20Stefan%20Sperling.mp4" rel="nofollow">Subversion for FreeBSD developers</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hansteen, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/01.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" rel="nofollow">Transition to</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/02.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" rel="nofollow">OpenBSD 5.6</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Ingo Schwarze, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/03.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" rel="nofollow">Let’s make manuals</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/04.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" rel="nofollow">more useful</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Francois Tigeot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/01.Improving%20DragonFly%e2%80%99s%20performance%20with%20PostgreSQL%20-%20Francois%20Tigeot.mp4" rel="nofollow">Improving DragonFly’s performance with PostgreSQL</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Justin Cormack, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/02.Running%20Applications%20on%20the%20NetBSD%20Rump%20Kernel%20-%20Justin%20Cormack.mp4" rel="nofollow">Running Applications on the NetBSD Rump Kernel</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Pierre Pronchery, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/04.EdgeBSD,%20a%20year%20later%20-%20%20Pierre%20Pronchery.mp4" rel="nofollow">EdgeBSD, a year later</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hessler, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/05.Using%20routing%20domains%20or%20tables%20in%20a%20production%20network%20-%20%20Peter%20Hessler.mp4" rel="nofollow">Using routing domains or tables in a production network</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Sean Bruno, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/06.QEMU%20user%20mode%20on%20FreeBSD%20-%20%20Sean%20Bruno.mp4" rel="nofollow">QEMU user mode on FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Kristaps Dzonsons, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/01.Bugs%20Ex%20Ante%20-%20Kristaps%20Dzonsons.mp4" rel="nofollow">Bugs Ex Ante</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Yann Sionneau, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/02.Porting%20NetBSD%20to%20the%20LatticeMico32%20open%20source%20CPU%20-%20Yann%20Sionneau.mp4" rel="nofollow">Porting NetBSD to the LatticeMico32 open source CPU</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Alexander Nasonov, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/03.JIT%20Code%20Generator%20for%20NetBSD%20-%20Alexander%20Nasonov.mp4" rel="nofollow">JIT Code Generator for NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Masao Uebayashi, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/04.Porting%20Valgrind%20to%20NetBSD%20and%20OpenBSD%20-%20Masao%20Uebayashi.mp4" rel="nofollow">Porting Valgrind to NetBSD and OpenBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Marc Espie, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/05.parallel%20make:%20working%20with%20legacy%20code%20-%20Marc%20Espie.mp4" rel="nofollow">parallel make, working with legacy code</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Francois Tigeot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/06.Porting%20the%20drm-kms%20graphic%20drivers%20to%20DragonFly%20-%20Francois%20Tigeot.mp4" rel="nofollow">Porting the drm-kms graphic drivers to DragonFly</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><strong>The following talks (from the Vitosha track room) are all currently missing:</strong></li>
<li>Jordan Hubbard, FreeBSD, Looking forward to another 10 years (but we have another recording)</li>
<li>Theo de Raadt, Randomness, how arc4random has grown since 1998 (but we have another recording)</li>
<li>Kris Moore, Snapshots, Replication, and Boot-Environments</li>
<li>Kirk McKusick, An Introduction to the Implementation of ZFS</li>
<li>John-Mark Gurney, Optimizing GELI Performance</li>
<li>Emmanuel Dreyfus, FUSE and beyond, bridging filesystems</li>
<li>Lourival Vieira Neto, NPF scripting with Lua</li>
<li>Andy Tanenbaum, A Reimplementation of NetBSD Based on a Microkernel</li>
<li>Stefano Garzarella, Software segmentation offloading for FreeBSD</li>
<li>Ted Unangst, LibreSSL</li>
<li>Shawn Webb, Introducing ASLR In FreeBSD</li>
<li>Ed Maste, The LLDB Debugger in FreeBSD</li>
<li>Philip Guenther, Secure lazy binding
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=141614801713457&w=2" rel="nofollow">OpenBSD adopts SipHash</a></h3>

<ul>
<li>Even more DJB crypto somehow finds its way into OpenBSD&#39;s base system</li>
<li>This time it&#39;s <a href="https://131002.net/siphash/" rel="nofollow">SipHash</a>, a family of pseudorandom functions that&#39;s resistant to hash bucket flooding attacks while still providing good performance</li>
<li>After an <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/crypto/siphash.c?rev=1.1&content-type=text/x-cvsweb-markup" rel="nofollow">initial import</a> and some <a href="https://www.marc.info/?l=openbsd-cvs&m=141604896822253&w=2" rel="nofollow">clever early usage</a>, a few developers agreed that it would be better to use it in a lot more places</li>
<li>It will now be used in the filesystem, and the plan is to utilize it to protect <strong>all kernel hash functions</strong></li>
<li>Some <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">other places</a> that Bernstein&#39;s work can be found in OpenBSD include the ChaCha20-Poly1305 authenticated stream cipher and Curve25519 KEX used in SSH, ChaCha20 used in the RNG, and Ed25519 keys used in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">signify</a> and SSH
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.1R/announce.html" rel="nofollow">FreeBSD 10.1-RELEASE</a></h3>

<ul>
<li>FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2013-09-11_engineering_powder_kegs" rel="nofollow">release engineering team</a> likes to troll us by uploading new versions just a few hours after we finish recording an episode</li>
<li>The first maintenance update for the 10.x branch is out, improving upon a lot of things found in 10.0-RELEASE</li>
<li>The vt driver was merged from -CURRENT and can now be enabled with a loader.conf switch (and can even be used on a PlayStation 3)</li>
<li>Bhyve has gotten quite a lot of fixes and improvements from its initial debut in 10.0, including boot support for ZFS</li>
<li>Lots of new ARM hardware is supported now, including SMP support for most of them</li>
<li>A new kernel selection menu was added to the loader, so you can switch between newer and older kernels at boot time</li>
<li>10.1 is the first to support UEFI booting on amd64, which also has serial console support now</li>
<li>Lots of third party software (OpenSSH, OpenSSL, Unbound..) and drivers have gotten updates to newer versions</li>
<li>It&#39;s a worthy update from 10.0, or a good time to try the 10.x branch if you were avoiding the first .0 release, so <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.1/" rel="nofollow">grab an ISO</a> or <a href="https://www.freebsd.org/cgi/man.cgi?query=freebsd-update" rel="nofollow">upgrade</a> today</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.1R/relnotes.html" rel="nofollow">detailed release notes</a> for more information on all the changes</li>
<li>Also take a look at some of the <a href="https://www.freebsd.org/releases/10.1R/errata.html#open-issues" rel="nofollow">known problems</a> to see <a href="https://forums.freebsd.org/threads/segmentation-fault-while-upgrading-from-10-0-release-to-10-1-release.48977/" rel="nofollow">if</a> <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-October/080599.html" rel="nofollow">you&#39;ll</a> <a href="https://forums.freebsd.org/threads/10-0-10-1-diocaddrule-operation-not-supported-by-device.49016/" rel="nofollow">be</a> <a href="https://www.reddit.com/r/freebsd/comments/2mmzzy/101release_restart_problems_anyone/" rel="nofollow">affected</a> by any of them</li>
<li>PC-BSD was also <a href="http://wiki.pcbsd.org/index.php/What%27s_New/10.1" rel="nofollow">updated accordingly</a> with some of their own unique features and changes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=aWmLWx8ut20" rel="nofollow">arc4random - Randomization for All Occasions</a></h3>

<ul>
<li>Theo de Raadt gave an updated version of his EuroBSDCon presentation at Hackfest 2014 in Quebec</li>
<li>The presentation is mainly about OpenBSD&#39;s arc4random function, and outlines the overall poor state of randomization in the 90s and how it has evolved in OpenBSD over time</li>
<li>It begins with some interesting history on OpenBSD and how it became a security-focused OS - in 1996, their syslogd got broken into and &quot;suddenly we became interested in security&quot;</li>
<li>The talk also touches on how low-level changes can shake up the software ecosystem and third party packages that everyone uses</li>
<li>There&#39;s some funny history on the name of the function (being called arc4random despite not using RC4 anymore) and an overall status update on various platforms&#39; usage of it</li>
<li>Very detailed and informative presentation, and the slides can be found <a href="http://www.openbsd.org/papers/hackfest2014-arc4random/index.html" rel="nofollow">here</a></li>
<li>A great quote from the beginning: &quot;We consider ourselves a community of (probably rather strange) people who work on software specifically for the purpose of trying to make it better. We take a &#39;whole-systems&#39; approach: trying to change everything in the ecosystem that&#39;s under our control, trying to see if we can make it better. We gain a lot of strength by being able to throw backwards compatibility out the window. So that means that we&#39;re able to do research and the minute that we decide that something isn&#39;t right, we&#39;ll design an alternative for it and push it in. And if it ends up breaking everybody&#39;s machines from the previous stage to the next stage, that&#39;s fine because we&#39;ll end up in a happier place.&quot;
***</li>
</ul>

<h2>Interview - Justin Cormack - <a href="mailto:justin@netbsd.org" rel="nofollow">justin@netbsd.org</a> / <a href="https://twitter.com/justincormack" rel="nofollow">@justincormack</a></h2>

<p>NetBSD on Xen, rump kernels, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/11/freebsd-foundation-announces-generous.html" rel="nofollow">The FreeBSD foundation&#39;s biggest donation</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post about the largest donation they&#39;ve ever gotten</li>
<li>From the CEO of WhatsApp comes a whopping one million dollars in a single donation</li>
<li>It also has some comments from the donor about why they use BSD and why it&#39;s important to give back</li>
<li>Be sure to donate to the foundation of whatever BSD you use when you can - every little bit helps, especially for <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/donations/" rel="nofollow">NetBSD</a> and <a href="http://www.dragonflybsd.org/donations/" rel="nofollow">DragonFly</a> who don&#39;t have huge companies supporting them regularly like FreeBSD does
***</li>
</ul>

<h3><a href="http://open-zfs.org/wiki/OpenZFS_Developer_Summit" rel="nofollow">OpenZFS Dev Summit 2014 videos</a></h3>

<ul>
<li>Videos from the recent OpenZFS developer summit are being uploaded, with speakers from different represented platforms and companies
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a>, <a href="https://www.youtube.com/watch?v=XnTzbisLYzg" rel="nofollow">opening keynote</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Raphael Carvalho, <a href="https://www.youtube.com/watch?v=TJLOBLSRoHE" rel="nofollow">Platform Overview: ZFS on OSv</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Brian Behlendorf, <a href="https://www.youtube.com/watch?v=_MVOpMNV7LY" rel="nofollow">Platform Overview: ZFS on Linux</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Prakash Surya, <a href="https://www.youtube.com/watch?v=UtlGt3ag0o0" rel="nofollow">Platform Overview: illumos</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Xin Li, <a href="https://www.youtube.com/watch?v=xO0x5_3A1X4" rel="nofollow">Platform Overview: FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>All platforms, <a href="https://www.youtube.com/watch?v=t4UlT0RmSCc" rel="nofollow">Group Q&amp;A Session</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Dave Pacheco, <a href="https://www.youtube.com/watch?v=BEoCMpdB8WU" rel="nofollow">Manta</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Saso Kiselkov, <a href="https://www.youtube.com/watch?v=TZF92taa_us" rel="nofollow">Compression</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a>, <a href="https://www.youtube.com/watch?v=deJc0EMKrM4" rel="nofollow">Performance</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Tim Feldman, <a href="https://www.youtube.com/watch?v=b1yqjV8qemU" rel="nofollow">Host-Aware SMR</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=-4c4gsLi1LI" rel="nofollow">Fast File Cloning</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>The audio is <a href="https://twitter.com/OpenZFS/status/534005125853888512" rel="nofollow">pretty poor</a> on all of them unfortunately
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/11/bsdtalk248-dragonflybsd-with-matthew.html" rel="nofollow">BSDTalk 248</a></h3>

<ul>
<li>Our friend Will Backman is still busy getting BSD interviews as well</li>
<li>This time he sits down with Matthew Dillon, the lead developer of DragonFly BSD</li>
<li>We&#39;ve never had Dillon on the show, so you&#39;ll definitely want to give this one a listen</li>
<li>They mainly discuss all the big changes coming in DragonFly&#39;s upcoming 4.0 release
***</li>
</ul>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">MeetBSD 2014 videos</a></h3>

<ul>
<li>The presentations from this year&#39;s MeetBSD conference are starting to appear online as well
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://www.youtube.com/watch?v=DEEr6dT-4uQ" rel="nofollow">A Narrative History of BSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://www.youtube.com/watch?v=Mri66Uz6-8Y" rel="nofollow">FreeBSD: The Next 10 Years</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Brendan Gregg, <a href="https://www.youtube.com/watch?v=uvKMptfXtdo" rel="nofollow">Performance Analysis</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>The slides can be found <a href="https://www.meetbsd.com/agenda/" rel="nofollow">here</a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20PXjp55N" rel="nofollow">Dominik writes in</a></li>
<li><a href="http://slexy.org/view/s2LwEYT3bA" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s2ubK8vQVt" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s216Eq8nFG" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s21D2ugDUy" rel="nofollow">Kevin writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141600819500004&r=1&w=2" rel="nofollow">Contributing without code</a></li>
<li><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033176.html" rel="nofollow">Compression isn&#39;t a CRIME</a></li>
<li><a href="https://www.marc.info/?t=141616714600001&r=1&w=2" rel="nofollow">Securing web browsers</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Justin Cormack about NetBSD rump kernels. We&#39;ll learn how to run them on other operating systems, what&#39;s planned for the future and a lot more. As always, answers to viewer-submitted questions and all the news for the week, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and tutorials</a></h3>

<ul>
<li>The 2014 EuroBSDCon videos have been online for over a month, but unannounced - keep in mind these links may be temporary (but we&#39;ll mention their new location in a future show and fix the show notes if that&#39;s the case)
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Arun Thomas, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/01.BSD-ARM%20Kernel%20Internals%20-%20Arun%20Thomas.mp4" rel="nofollow">BSD ARM Kernel Internals</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Ted Unangst, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/02.Developing%20Software%20in%20a%20Hostile%20Environment%20-%20Ted%20Unangst.mp4" rel="nofollow">Developing Software in a Hostile Environment</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Martin Pieuchot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" rel="nofollow">Taming OpenBSD Network Stack Dragons</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Henning Brauer, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/04.OpenBGPD%20turns%2010%20years%20-%20%20Henning%20Brauer.mp4" rel="nofollow">OpenBGPD turns 10 years</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Claudio Jeker, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/05.vscsi(4)%20and%20iscsid%20-%20iSCSI%20initiator%20the%20OpenBSD%20way%20-%20Claudio%20Jeker.mp4" rel="nofollow">vscsi and iscsid iSCSI initiator the OpenBSD way</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Paul Irofti, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/06.Making%20OpenBSD%20Useful%20on%20the%20Octeon%20Network%20Gear%20-%20Paul%20Irofti.mp4" rel="nofollow">Making OpenBSD Useful on the Octeon Network Gear</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Baptiste Daroussin, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/01.Cross%20Building%20the%20FreeBSD%20ports%20tree%20-%20Baptiste%20Daroussin.mp4" rel="nofollow">Cross Building the FreeBSD ports tree</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Boris Astardzhiev, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/02.Smartcom%e2%80%99s%20control%20plane%20software,%20a%20customized%20version%20of%20FreeBSD%20-%20Boris%20Astardzhiev.mp4" rel="nofollow">Smartcom’s control plane software, a customized version of FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Michał Dubiel, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/03.OpenStack%20and%20OpenContrail%20for%20FreeBSD%20platform%20-%20Micha%c5%82%20Dubiel.mp4" rel="nofollow">OpenStack and OpenContrail for FreeBSD platform</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Martin Husemann &amp; Joerg Sonnenberger, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/04.(Tool-)chaining%20the%20Hydra%20The%20ongoing%20quest%20for%20modern%20toolchains%20in%20NetBSD%20-%20Martin%20Huseman%20&%20Joerg%20Sonnenberger.mp4" rel="nofollow">Tool-chaining the Hydra, the ongoing quest for modern toolchains in NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Taylor R Campbell, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/05.The%20entropic%20principle:%20dev-u%3frandom%20and%20NetBSD%20-%20Taylor%20R%20Campbell.mp4" rel="nofollow">The entropic principle: /dev/u?random and NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Dag-Erling Smørgrav, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/06.Securing%20sensitive%20&%20restricted%20data%20-%20Dag-Erling%20Sm%c3%b8rgrav.mp4" rel="nofollow">Securing sensitive &amp; restricted data</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hansteen, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/01.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" rel="nofollow">Building The Network You Need</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/02.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" rel="nofollow">With PF</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Stefan Sperling, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/03.Subversion%20for%20FreeBSD%20developers%20-%20Stefan%20Sperling.mp4" rel="nofollow">Subversion for FreeBSD developers</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hansteen, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/01.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" rel="nofollow">Transition to</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/02.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" rel="nofollow">OpenBSD 5.6</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Ingo Schwarze, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/03.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" rel="nofollow">Let’s make manuals</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/04.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" rel="nofollow">more useful</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Francois Tigeot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/01.Improving%20DragonFly%e2%80%99s%20performance%20with%20PostgreSQL%20-%20Francois%20Tigeot.mp4" rel="nofollow">Improving DragonFly’s performance with PostgreSQL</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Justin Cormack, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/02.Running%20Applications%20on%20the%20NetBSD%20Rump%20Kernel%20-%20Justin%20Cormack.mp4" rel="nofollow">Running Applications on the NetBSD Rump Kernel</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Pierre Pronchery, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/04.EdgeBSD,%20a%20year%20later%20-%20%20Pierre%20Pronchery.mp4" rel="nofollow">EdgeBSD, a year later</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hessler, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/05.Using%20routing%20domains%20or%20tables%20in%20a%20production%20network%20-%20%20Peter%20Hessler.mp4" rel="nofollow">Using routing domains or tables in a production network</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Sean Bruno, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/06.QEMU%20user%20mode%20on%20FreeBSD%20-%20%20Sean%20Bruno.mp4" rel="nofollow">QEMU user mode on FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Kristaps Dzonsons, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/01.Bugs%20Ex%20Ante%20-%20Kristaps%20Dzonsons.mp4" rel="nofollow">Bugs Ex Ante</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Yann Sionneau, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/02.Porting%20NetBSD%20to%20the%20LatticeMico32%20open%20source%20CPU%20-%20Yann%20Sionneau.mp4" rel="nofollow">Porting NetBSD to the LatticeMico32 open source CPU</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Alexander Nasonov, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/03.JIT%20Code%20Generator%20for%20NetBSD%20-%20Alexander%20Nasonov.mp4" rel="nofollow">JIT Code Generator for NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Masao Uebayashi, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/04.Porting%20Valgrind%20to%20NetBSD%20and%20OpenBSD%20-%20Masao%20Uebayashi.mp4" rel="nofollow">Porting Valgrind to NetBSD and OpenBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Marc Espie, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/05.parallel%20make:%20working%20with%20legacy%20code%20-%20Marc%20Espie.mp4" rel="nofollow">parallel make, working with legacy code</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Francois Tigeot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/06.Porting%20the%20drm-kms%20graphic%20drivers%20to%20DragonFly%20-%20Francois%20Tigeot.mp4" rel="nofollow">Porting the drm-kms graphic drivers to DragonFly</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><strong>The following talks (from the Vitosha track room) are all currently missing:</strong></li>
<li>Jordan Hubbard, FreeBSD, Looking forward to another 10 years (but we have another recording)</li>
<li>Theo de Raadt, Randomness, how arc4random has grown since 1998 (but we have another recording)</li>
<li>Kris Moore, Snapshots, Replication, and Boot-Environments</li>
<li>Kirk McKusick, An Introduction to the Implementation of ZFS</li>
<li>John-Mark Gurney, Optimizing GELI Performance</li>
<li>Emmanuel Dreyfus, FUSE and beyond, bridging filesystems</li>
<li>Lourival Vieira Neto, NPF scripting with Lua</li>
<li>Andy Tanenbaum, A Reimplementation of NetBSD Based on a Microkernel</li>
<li>Stefano Garzarella, Software segmentation offloading for FreeBSD</li>
<li>Ted Unangst, LibreSSL</li>
<li>Shawn Webb, Introducing ASLR In FreeBSD</li>
<li>Ed Maste, The LLDB Debugger in FreeBSD</li>
<li>Philip Guenther, Secure lazy binding
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=141614801713457&w=2" rel="nofollow">OpenBSD adopts SipHash</a></h3>

<ul>
<li>Even more DJB crypto somehow finds its way into OpenBSD&#39;s base system</li>
<li>This time it&#39;s <a href="https://131002.net/siphash/" rel="nofollow">SipHash</a>, a family of pseudorandom functions that&#39;s resistant to hash bucket flooding attacks while still providing good performance</li>
<li>After an <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/crypto/siphash.c?rev=1.1&content-type=text/x-cvsweb-markup" rel="nofollow">initial import</a> and some <a href="https://www.marc.info/?l=openbsd-cvs&m=141604896822253&w=2" rel="nofollow">clever early usage</a>, a few developers agreed that it would be better to use it in a lot more places</li>
<li>It will now be used in the filesystem, and the plan is to utilize it to protect <strong>all kernel hash functions</strong></li>
<li>Some <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">other places</a> that Bernstein&#39;s work can be found in OpenBSD include the ChaCha20-Poly1305 authenticated stream cipher and Curve25519 KEX used in SSH, ChaCha20 used in the RNG, and Ed25519 keys used in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">signify</a> and SSH
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.1R/announce.html" rel="nofollow">FreeBSD 10.1-RELEASE</a></h3>

<ul>
<li>FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2013-09-11_engineering_powder_kegs" rel="nofollow">release engineering team</a> likes to troll us by uploading new versions just a few hours after we finish recording an episode</li>
<li>The first maintenance update for the 10.x branch is out, improving upon a lot of things found in 10.0-RELEASE</li>
<li>The vt driver was merged from -CURRENT and can now be enabled with a loader.conf switch (and can even be used on a PlayStation 3)</li>
<li>Bhyve has gotten quite a lot of fixes and improvements from its initial debut in 10.0, including boot support for ZFS</li>
<li>Lots of new ARM hardware is supported now, including SMP support for most of them</li>
<li>A new kernel selection menu was added to the loader, so you can switch between newer and older kernels at boot time</li>
<li>10.1 is the first to support UEFI booting on amd64, which also has serial console support now</li>
<li>Lots of third party software (OpenSSH, OpenSSL, Unbound..) and drivers have gotten updates to newer versions</li>
<li>It&#39;s a worthy update from 10.0, or a good time to try the 10.x branch if you were avoiding the first .0 release, so <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.1/" rel="nofollow">grab an ISO</a> or <a href="https://www.freebsd.org/cgi/man.cgi?query=freebsd-update" rel="nofollow">upgrade</a> today</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.1R/relnotes.html" rel="nofollow">detailed release notes</a> for more information on all the changes</li>
<li>Also take a look at some of the <a href="https://www.freebsd.org/releases/10.1R/errata.html#open-issues" rel="nofollow">known problems</a> to see <a href="https://forums.freebsd.org/threads/segmentation-fault-while-upgrading-from-10-0-release-to-10-1-release.48977/" rel="nofollow">if</a> <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-October/080599.html" rel="nofollow">you&#39;ll</a> <a href="https://forums.freebsd.org/threads/10-0-10-1-diocaddrule-operation-not-supported-by-device.49016/" rel="nofollow">be</a> <a href="https://www.reddit.com/r/freebsd/comments/2mmzzy/101release_restart_problems_anyone/" rel="nofollow">affected</a> by any of them</li>
<li>PC-BSD was also <a href="http://wiki.pcbsd.org/index.php/What%27s_New/10.1" rel="nofollow">updated accordingly</a> with some of their own unique features and changes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=aWmLWx8ut20" rel="nofollow">arc4random - Randomization for All Occasions</a></h3>

<ul>
<li>Theo de Raadt gave an updated version of his EuroBSDCon presentation at Hackfest 2014 in Quebec</li>
<li>The presentation is mainly about OpenBSD&#39;s arc4random function, and outlines the overall poor state of randomization in the 90s and how it has evolved in OpenBSD over time</li>
<li>It begins with some interesting history on OpenBSD and how it became a security-focused OS - in 1996, their syslogd got broken into and &quot;suddenly we became interested in security&quot;</li>
<li>The talk also touches on how low-level changes can shake up the software ecosystem and third party packages that everyone uses</li>
<li>There&#39;s some funny history on the name of the function (being called arc4random despite not using RC4 anymore) and an overall status update on various platforms&#39; usage of it</li>
<li>Very detailed and informative presentation, and the slides can be found <a href="http://www.openbsd.org/papers/hackfest2014-arc4random/index.html" rel="nofollow">here</a></li>
<li>A great quote from the beginning: &quot;We consider ourselves a community of (probably rather strange) people who work on software specifically for the purpose of trying to make it better. We take a &#39;whole-systems&#39; approach: trying to change everything in the ecosystem that&#39;s under our control, trying to see if we can make it better. We gain a lot of strength by being able to throw backwards compatibility out the window. So that means that we&#39;re able to do research and the minute that we decide that something isn&#39;t right, we&#39;ll design an alternative for it and push it in. And if it ends up breaking everybody&#39;s machines from the previous stage to the next stage, that&#39;s fine because we&#39;ll end up in a happier place.&quot;
***</li>
</ul>

<h2>Interview - Justin Cormack - <a href="mailto:justin@netbsd.org" rel="nofollow">justin@netbsd.org</a> / <a href="https://twitter.com/justincormack" rel="nofollow">@justincormack</a></h2>

<p>NetBSD on Xen, rump kernels, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/11/freebsd-foundation-announces-generous.html" rel="nofollow">The FreeBSD foundation&#39;s biggest donation</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post about the largest donation they&#39;ve ever gotten</li>
<li>From the CEO of WhatsApp comes a whopping one million dollars in a single donation</li>
<li>It also has some comments from the donor about why they use BSD and why it&#39;s important to give back</li>
<li>Be sure to donate to the foundation of whatever BSD you use when you can - every little bit helps, especially for <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/donations/" rel="nofollow">NetBSD</a> and <a href="http://www.dragonflybsd.org/donations/" rel="nofollow">DragonFly</a> who don&#39;t have huge companies supporting them regularly like FreeBSD does
***</li>
</ul>

<h3><a href="http://open-zfs.org/wiki/OpenZFS_Developer_Summit" rel="nofollow">OpenZFS Dev Summit 2014 videos</a></h3>

<ul>
<li>Videos from the recent OpenZFS developer summit are being uploaded, with speakers from different represented platforms and companies
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a>, <a href="https://www.youtube.com/watch?v=XnTzbisLYzg" rel="nofollow">opening keynote</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Raphael Carvalho, <a href="https://www.youtube.com/watch?v=TJLOBLSRoHE" rel="nofollow">Platform Overview: ZFS on OSv</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Brian Behlendorf, <a href="https://www.youtube.com/watch?v=_MVOpMNV7LY" rel="nofollow">Platform Overview: ZFS on Linux</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Prakash Surya, <a href="https://www.youtube.com/watch?v=UtlGt3ag0o0" rel="nofollow">Platform Overview: illumos</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Xin Li, <a href="https://www.youtube.com/watch?v=xO0x5_3A1X4" rel="nofollow">Platform Overview: FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>All platforms, <a href="https://www.youtube.com/watch?v=t4UlT0RmSCc" rel="nofollow">Group Q&amp;A Session</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Dave Pacheco, <a href="https://www.youtube.com/watch?v=BEoCMpdB8WU" rel="nofollow">Manta</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Saso Kiselkov, <a href="https://www.youtube.com/watch?v=TZF92taa_us" rel="nofollow">Compression</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a>, <a href="https://www.youtube.com/watch?v=deJc0EMKrM4" rel="nofollow">Performance</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Tim Feldman, <a href="https://www.youtube.com/watch?v=b1yqjV8qemU" rel="nofollow">Host-Aware SMR</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=-4c4gsLi1LI" rel="nofollow">Fast File Cloning</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>The audio is <a href="https://twitter.com/OpenZFS/status/534005125853888512" rel="nofollow">pretty poor</a> on all of them unfortunately
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/11/bsdtalk248-dragonflybsd-with-matthew.html" rel="nofollow">BSDTalk 248</a></h3>

<ul>
<li>Our friend Will Backman is still busy getting BSD interviews as well</li>
<li>This time he sits down with Matthew Dillon, the lead developer of DragonFly BSD</li>
<li>We&#39;ve never had Dillon on the show, so you&#39;ll definitely want to give this one a listen</li>
<li>They mainly discuss all the big changes coming in DragonFly&#39;s upcoming 4.0 release
***</li>
</ul>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">MeetBSD 2014 videos</a></h3>

<ul>
<li>The presentations from this year&#39;s MeetBSD conference are starting to appear online as well
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://www.youtube.com/watch?v=DEEr6dT-4uQ" rel="nofollow">A Narrative History of BSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://www.youtube.com/watch?v=Mri66Uz6-8Y" rel="nofollow">FreeBSD: The Next 10 Years</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Brendan Gregg, <a href="https://www.youtube.com/watch?v=uvKMptfXtdo" rel="nofollow">Performance Analysis</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>The slides can be found <a href="https://www.meetbsd.com/agenda/" rel="nofollow">here</a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20PXjp55N" rel="nofollow">Dominik writes in</a></li>
<li><a href="http://slexy.org/view/s2LwEYT3bA" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s2ubK8vQVt" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s216Eq8nFG" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s21D2ugDUy" rel="nofollow">Kevin writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141600819500004&r=1&w=2" rel="nofollow">Contributing without code</a></li>
<li><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033176.html" rel="nofollow">Compression isn&#39;t a CRIME</a></li>
<li><a href="https://www.marc.info/?t=141616714600001&r=1&w=2" rel="nofollow">Securing web browsers</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>63: A Man's man(1)</title>
  <link>https://www.bsdnow.tv/63</link>
  <guid isPermaLink="false">0dbe70cc-bfdd-4af8-b67f-a5d1e85b7115</guid>
  <pubDate>Wed, 12 Nov 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0dbe70cc-bfdd-4af8-b67f-a5d1e85b7115.mp3" length="70356244" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we've got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week's news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:37:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we've got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week's news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Updates to FreeBSD's random(4) (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=273872)
FreeBSD's random device, which presents itself as "/dev/random" to users (https://news.ycombinator.com/item?id=8550457), has gotten a fairly major overhaul in -CURRENT
The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna
Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)
Pluggable modules can now be written to add more sources of entropy
These changes are expected to make it in 11.0-RELEASE, but there hasn't been any mention of MFCing them to 10 or 9
***
OpenBSD Tor relays and network diversity (https://lists.torproject.org/pipermail/tor-relays/2014-November/005661.html)
We've talked about getting more BSD-based Tor nodes (http://lists.nycbug.org/mailman/listinfo/tor-bsd) a few times in previous episodes
The "tor-relays" mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes
With the security features and attention to detail, it makes for an excellent dedicated Tor box
More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large
A few users are even saying they'll convert their Linux nodes to OpenBSD to help out
Check the archive for the full conversation, and maybe run a node yourself (http://www.bsdnow.tv/tutorials/tor) on any of the BSDs
The Tor wiki page on OpenBSD is pretty out of date (https://lists.torproject.org/pipermail/tor-dev/2014-November/007715.html) (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it
***
SSP now default for FreeBSD ports (https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096344.html)
SSP, or Stack Smashing Protection (https://en.wikipedia.org/wiki/Buffer_overflow_protection), is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces
It's now enabled by default in FreeBSD's ports tree, and the pkgng packages will have it as well - but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)
This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates
If you were using the temporary "new Xorg" or SSP package repositories instead of the default ones, you need to switch back over
NetBSD made this the default on i386 and amd64 two years ago (https://www.netbsd.org/releases/formal-6/NetBSD-6.0.html) and OpenBSD made this the default on all architectures twelve years ago (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=103881967909595&amp;amp;w=2)
Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed
***
Building an OpenBSD firewall and router (https://www.reddit.com/r/BSD/comments/2ld0yw/building_an_openbsd_firewall_and_router/)
While we've discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side
The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris
Most agree that, if it's for a business especially, it's worth the extra money to go with something that's well known in the BSD community
They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.
Through the comments, we also find out that QuakeCon runs OpenBSD on their network
Hopefully most of our listeners are running some kind of BSD as their gateway - try it out (http://www.bsdnow.tv/tutorials/openbsd-router) if you haven't already
***
Interview - Kristaps Džonsons - kristaps@bsd.lv (mailto:kristaps@bsd.lv)
Mandoc, historical man pages, various topics
Tutorial
Throttling bandwidth with PF (http://www.bsdnow.tv/tutorials/openbsd-router#queues)
News Roundup
NetBSD at Kansai Open Forum 2014 (https://mail-index.netbsd.org/netbsd-advocacy/2014/11/08/msg000672.html)
Japanese NetBSD users invade yet another conference, demonstrating that they can and will install NetBSD on everything
From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all
As always, you can find lots of pictures in the trip report
***
Getting to know your portmgr lurkers (http://blogs.freebsdish.org/portmgr/2014/11/04/getting-to-know-your-portmgr-lurker-ak/)
The lovable "getting to know your portmgr" series makes its triumphant return
This time around, they interview Alex, one of the portmgr lurkers that joined just this month
"How would you describe yourself?" "Too lazy."
Another post (http://blogs.freebsdish.org/portmgr/2014/11/08/getting-to-know-your-portmgr-lurker-ehaupt/) includes a short interview with Emanuel, another new lurker
We discussed the portmgr lurkers initiative with Steve Wills a while back (http://www.bsdnow.tv/episodes/2014_10_01-the_daemons_apprentice)
***
NetBSD's ARM port gets SMP (https://blog.netbsd.org/tnf/entry/working_arm_multiprocessor_support)
The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used
This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X
NetBSD's release team is working on getting these changes into the 7 branch before 7.0 is released
There are also a few nice pictures in the article
***
A high performance mid-range NAS (http://pivotallabs.com/high-performing-mid-range-nas-server-part-2-performance-tuning-iscsi/)
This blog post is about FreeNAS and optimizing iSCSI performance
It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance
There are some nice graphs and lots of detail if you're interested in tweaking some of your own settings
They conclude "there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload"
***
Feedback/Questions
Heto writes in (http://slexy.org/view/s2xGCUj8mC)
Brad writes in (http://slexy.org/view/s2SJ8xppDJ)
Tyler writes in (http://slexy.org/view/s20Ktl6BMk)
Tim writes in (http://slexy.org/view/s2AsrxU0ZQ)
Brad writes in (http://slexy.org/view/s21yn0xLv2)
***
Mailing List Gold
Suspicious contributions (https://www.marc.info/?t=141379917200003&amp;amp;r=1&amp;amp;w=2)
La puissance du fromage (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141538800019451&amp;amp;w=2)
Nothing unusual here (https://mail-index.netbsd.org/tech-ports/2002/07/05/0000.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, mandoc, sysjail, mdocml, mdoc, mancgi, mult, random, arc4random, libressl, meetbsd, fortuna, yarrow, soekris, alix, apu, altq, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ve got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week&#39;s news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=273872" rel="nofollow">Updates to FreeBSD&#39;s random(4)</a></h3>

<ul>
<li>FreeBSD&#39;s random device, which presents itself as &quot;/dev/random&quot; to <a href="https://news.ycombinator.com/item?id=8550457" rel="nofollow">users</a>, has gotten a fairly major overhaul in -CURRENT</li>
<li>The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna</li>
<li>Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)</li>
<li>Pluggable modules can now be written to add more sources of entropy</li>
<li>These changes are expected to make it in 11.0-RELEASE, but there hasn&#39;t been any mention of MFCing them to 10 or 9
***</li>
</ul>

<h3><a href="https://lists.torproject.org/pipermail/tor-relays/2014-November/005661.html" rel="nofollow">OpenBSD Tor relays and network diversity</a></h3>

<ul>
<li>We&#39;ve talked about getting <a href="http://lists.nycbug.org/mailman/listinfo/tor-bsd" rel="nofollow">more BSD-based Tor nodes</a> a few times in previous episodes</li>
<li>The &quot;tor-relays&quot; mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes</li>
<li>With the security features and attention to detail, it makes for an excellent dedicated Tor box</li>
<li>More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large</li>
<li>A few users are even saying they&#39;ll <em>convert their Linux nodes</em> to OpenBSD to help out</li>
<li>Check the archive for the full conversation, and maybe <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">run a node yourself</a> on any of the BSDs</li>
<li>The Tor wiki page on OpenBSD is pretty <a href="https://lists.torproject.org/pipermail/tor-dev/2014-November/007715.html" rel="nofollow">out of date</a> (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096344.html" rel="nofollow">SSP now default for FreeBSD ports</a></h3>

<ul>
<li>SSP, or <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">Stack Smashing Protection</a>, is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces</li>
<li>It&#39;s now enabled by default in FreeBSD&#39;s ports tree, and the pkgng packages will have it as well - but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)</li>
<li>This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates</li>
<li>If you were using the temporary &quot;new Xorg&quot; or SSP package repositories instead of the default ones, you need to switch back over</li>
<li>NetBSD made this the default on i386 and amd64 <a href="https://www.netbsd.org/releases/formal-6/NetBSD-6.0.html" rel="nofollow">two years ago</a> and OpenBSD made this the default on all architectures <a href="https://www.marc.info/?l=openbsd-cvs&m=103881967909595&w=2" rel="nofollow">twelve years ago</a></li>
<li>Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2ld0yw/building_an_openbsd_firewall_and_router/" rel="nofollow">Building an OpenBSD firewall and router</a></h3>

<ul>
<li>While we&#39;ve discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side</li>
<li>The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris</li>
<li>Most agree that, if it&#39;s for a business especially, it&#39;s worth the extra money to go with something that&#39;s well known in the BSD community</li>
<li>They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.</li>
<li>Through the comments, we also find out that <strong>QuakeCon runs OpenBSD</strong> on their network</li>
<li>Hopefully most of our listeners are running some kind of BSD as their gateway - <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">try it out</a> if you haven&#39;t already
***</li>
</ul>

<h2>Interview - Kristaps Džonsons - <a href="mailto:kristaps@bsd.lv" rel="nofollow">kristaps@bsd.lv</a></h2>

<p>Mandoc, historical man pages, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router#queues" rel="nofollow">Throttling bandwidth with PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/11/08/msg000672.html" rel="nofollow">NetBSD at Kansai Open Forum 2014</a></h3>

<ul>
<li>Japanese NetBSD users invade yet another conference, demonstrating that they <strong>can and will</strong> install NetBSD <em>on everything</em></li>
<li>From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all</li>
<li>As always, you can find lots of pictures in the trip report
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/11/04/getting-to-know-your-portmgr-lurker-ak/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The lovable &quot;getting to know your portmgr&quot; series makes its triumphant return</li>
<li>This time around, they interview Alex, one of the portmgr lurkers that joined just this month</li>
<li>&quot;How would you describe yourself?&quot; &quot;Too lazy.&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2014/11/08/getting-to-know-your-portmgr-lurker-ehaupt/" rel="nofollow">Another post</a> includes a short interview with Emanuel, another new lurker</li>
<li>We discussed the portmgr lurkers initiative with Steve Wills <a href="http://www.bsdnow.tv/episodes/2014_10_01-the_daemons_apprentice" rel="nofollow">a while back</a>
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/working_arm_multiprocessor_support" rel="nofollow">NetBSD&#39;s ARM port gets SMP</a></h3>

<ul>
<li>The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used</li>
<li>This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X</li>
<li>NetBSD&#39;s release team is working on getting these changes into the 7 branch before 7.0 is released</li>
<li>There are also a few nice pictures in the article
***</li>
</ul>

<h3><a href="http://pivotallabs.com/high-performing-mid-range-nas-server-part-2-performance-tuning-iscsi/" rel="nofollow">A high performance mid-range NAS</a></h3>

<ul>
<li>This blog post is about FreeNAS and optimizing iSCSI performance</li>
<li>It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance</li>
<li>There are some nice graphs and lots of detail if you&#39;re interested in tweaking some of your own settings</li>
<li>They conclude &quot;there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload&quot;
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xGCUj8mC" rel="nofollow">Heto writes in</a></li>
<li><a href="http://slexy.org/view/s2SJ8xppDJ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s20Ktl6BMk" rel="nofollow">Tyler writes in</a></li>
<li><a href="http://slexy.org/view/s2AsrxU0ZQ" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s21yn0xLv2" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141379917200003&r=1&w=2" rel="nofollow">Suspicious contributions</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141538800019451&w=2" rel="nofollow">La puissance du fromage</a></li>
<li><a href="https://mail-index.netbsd.org/tech-ports/2002/07/05/0000.html" rel="nofollow">Nothing unusual here</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ve got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week&#39;s news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=273872" rel="nofollow">Updates to FreeBSD&#39;s random(4)</a></h3>

<ul>
<li>FreeBSD&#39;s random device, which presents itself as &quot;/dev/random&quot; to <a href="https://news.ycombinator.com/item?id=8550457" rel="nofollow">users</a>, has gotten a fairly major overhaul in -CURRENT</li>
<li>The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna</li>
<li>Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)</li>
<li>Pluggable modules can now be written to add more sources of entropy</li>
<li>These changes are expected to make it in 11.0-RELEASE, but there hasn&#39;t been any mention of MFCing them to 10 or 9
***</li>
</ul>

<h3><a href="https://lists.torproject.org/pipermail/tor-relays/2014-November/005661.html" rel="nofollow">OpenBSD Tor relays and network diversity</a></h3>

<ul>
<li>We&#39;ve talked about getting <a href="http://lists.nycbug.org/mailman/listinfo/tor-bsd" rel="nofollow">more BSD-based Tor nodes</a> a few times in previous episodes</li>
<li>The &quot;tor-relays&quot; mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes</li>
<li>With the security features and attention to detail, it makes for an excellent dedicated Tor box</li>
<li>More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large</li>
<li>A few users are even saying they&#39;ll <em>convert their Linux nodes</em> to OpenBSD to help out</li>
<li>Check the archive for the full conversation, and maybe <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">run a node yourself</a> on any of the BSDs</li>
<li>The Tor wiki page on OpenBSD is pretty <a href="https://lists.torproject.org/pipermail/tor-dev/2014-November/007715.html" rel="nofollow">out of date</a> (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096344.html" rel="nofollow">SSP now default for FreeBSD ports</a></h3>

<ul>
<li>SSP, or <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">Stack Smashing Protection</a>, is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces</li>
<li>It&#39;s now enabled by default in FreeBSD&#39;s ports tree, and the pkgng packages will have it as well - but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)</li>
<li>This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates</li>
<li>If you were using the temporary &quot;new Xorg&quot; or SSP package repositories instead of the default ones, you need to switch back over</li>
<li>NetBSD made this the default on i386 and amd64 <a href="https://www.netbsd.org/releases/formal-6/NetBSD-6.0.html" rel="nofollow">two years ago</a> and OpenBSD made this the default on all architectures <a href="https://www.marc.info/?l=openbsd-cvs&m=103881967909595&w=2" rel="nofollow">twelve years ago</a></li>
<li>Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2ld0yw/building_an_openbsd_firewall_and_router/" rel="nofollow">Building an OpenBSD firewall and router</a></h3>

<ul>
<li>While we&#39;ve discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side</li>
<li>The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris</li>
<li>Most agree that, if it&#39;s for a business especially, it&#39;s worth the extra money to go with something that&#39;s well known in the BSD community</li>
<li>They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.</li>
<li>Through the comments, we also find out that <strong>QuakeCon runs OpenBSD</strong> on their network</li>
<li>Hopefully most of our listeners are running some kind of BSD as their gateway - <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">try it out</a> if you haven&#39;t already
***</li>
</ul>

<h2>Interview - Kristaps Džonsons - <a href="mailto:kristaps@bsd.lv" rel="nofollow">kristaps@bsd.lv</a></h2>

<p>Mandoc, historical man pages, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router#queues" rel="nofollow">Throttling bandwidth with PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/11/08/msg000672.html" rel="nofollow">NetBSD at Kansai Open Forum 2014</a></h3>

<ul>
<li>Japanese NetBSD users invade yet another conference, demonstrating that they <strong>can and will</strong> install NetBSD <em>on everything</em></li>
<li>From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all</li>
<li>As always, you can find lots of pictures in the trip report
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/11/04/getting-to-know-your-portmgr-lurker-ak/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The lovable &quot;getting to know your portmgr&quot; series makes its triumphant return</li>
<li>This time around, they interview Alex, one of the portmgr lurkers that joined just this month</li>
<li>&quot;How would you describe yourself?&quot; &quot;Too lazy.&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2014/11/08/getting-to-know-your-portmgr-lurker-ehaupt/" rel="nofollow">Another post</a> includes a short interview with Emanuel, another new lurker</li>
<li>We discussed the portmgr lurkers initiative with Steve Wills <a href="http://www.bsdnow.tv/episodes/2014_10_01-the_daemons_apprentice" rel="nofollow">a while back</a>
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/working_arm_multiprocessor_support" rel="nofollow">NetBSD&#39;s ARM port gets SMP</a></h3>

<ul>
<li>The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used</li>
<li>This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X</li>
<li>NetBSD&#39;s release team is working on getting these changes into the 7 branch before 7.0 is released</li>
<li>There are also a few nice pictures in the article
***</li>
</ul>

<h3><a href="http://pivotallabs.com/high-performing-mid-range-nas-server-part-2-performance-tuning-iscsi/" rel="nofollow">A high performance mid-range NAS</a></h3>

<ul>
<li>This blog post is about FreeNAS and optimizing iSCSI performance</li>
<li>It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance</li>
<li>There are some nice graphs and lots of detail if you&#39;re interested in tweaking some of your own settings</li>
<li>They conclude &quot;there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload&quot;
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xGCUj8mC" rel="nofollow">Heto writes in</a></li>
<li><a href="http://slexy.org/view/s2SJ8xppDJ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s20Ktl6BMk" rel="nofollow">Tyler writes in</a></li>
<li><a href="http://slexy.org/view/s2AsrxU0ZQ" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s21yn0xLv2" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141379917200003&r=1&w=2" rel="nofollow">Suspicious contributions</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141538800019451&w=2" rel="nofollow">La puissance du fromage</a></li>
<li><a href="https://mail-index.netbsd.org/tech-ports/2002/07/05/0000.html" rel="nofollow">Nothing unusual here</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>48: Liberating SSL</title>
  <link>https://www.bsdnow.tv/48</link>
  <guid isPermaLink="false">e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809</guid>
  <pubDate>Wed, 30 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809.mp3" length="43106548" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>59:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2014-04-2014-06.html)
FreeBSD has gotten quite a lot done this quarter
Changes in the way release branches are supported - major releases will get at least five years over their lifespan
A new automounter is in the works, hoping to replace amd (which has some issues)
The CAM target layer and RPC stack have gotten some major optimization and speed boosts
Work on ZFSGuru continues, with a large status report specifically for that
The report also mentioned some new committers, both source and ports
It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we've already mentioned on the show
"Foundation-sponsored work resulted in 226 commits to FreeBSD over the April to June period"
***
A new OpenBSD HTTPD is born (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724094043)
Work has begun on a new HTTP daemon in the OpenBSD base system
A lot of people are asking (http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/) "why?" since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?
Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn't trying to be a full-featured replacement)
It's partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter
This has the added benefit of the usual, easy-to-understand syntax and privilege separation 
There's a very brief man page (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8) online already
It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs
Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***
pkgng 1.3 announced (https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html)
The newest version of FreeBSD's second generation package management system (http://www.bsdnow.tv/tutorials/pkgng) has been released, with lots of new features
It has a new "real" solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)
Lots of the code has been sandboxed for extra security
You'll probably notice some new changes to the UI too, making things more user friendly
A few days later 1.3.1 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;sortby=date&amp;amp;revision=362996) was released to fix a few small bugs, then 1.3.2 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363108) shortly thereafter and 1.3.3 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363363) yesterday
***
FreeBSD after-install security tasks (http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be)
A number of people have written in to ask us "how do I secure my BSD box after I install it?"
With this blog post, hopefully most of their questions will finally be answered in detail
It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things
Not only does it just list things to do, but the post also does a good job of explaining why you should do them
Maybe we'll see some more posts in this series in the future
***
Interview - Brent Cook - bcook@openbsd.org (mailto:bcook@openbsd.org) / @busterbcook (https://twitter.com/busterbcook)
LibreSSL's portable version and development
News Roundup
FreeBSD Mastery - Storage Essentials (https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials)
MWL (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop)'s new book about the FreeBSD storage subsystems now has an early draft available
Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes
Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance
You'll get access to the completed (e)book when it's done if you buy the early draft
The suggested price is $8
***
Why BSD and not Linux? (http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/)
Yet another thread comes up asking why you should choose BSD over Linux or vice-versa
Lots of good responses from users of the various BSDs
Directly ripping a quote: "Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is "GCC free". DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity."
And "Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS."
Some other users share their switching experiences - worth a read
***
More g2k14 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550)
Following up from last week's huge list (http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv) of hackathon reports, we have a few more
Landry Breuil (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550) spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream
Andrew Fresh (http://undeadly.org/cgi?action=article&amp;amp;sid=20140728122850) enjoyed his first hackathon, pushing OpenBSD's perl patches upstream and got tricked into rewriting the adduser utility in perl
Ted Unangst (http://undeadly.org/cgi?action=article&amp;amp;sid=20140729070721) did his usual "teduing" (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth
Luckily we didn't have to cover 20 new ones this time!
***
BSDTalk episode 243 (http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html)
The newest episode of BSDTalk (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) is out, featuring an interview with Ingo Schwarze of the OpenBSD team
The main topic of discussion is mandoc, which some users might not be familiar with
mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it's not built by default)
We'll catch up to you soon, Will!
***
Feedback/Questions
Thomas writes in (http://slexy.org/view/s2xLRQytAZ)
Stephen writes in (http://slexy.org/view/s21AYng20n)
Sha'ul writes in (http://slexy.org/view/s2DwLRdQDS)
Florian writes in (http://slexy.org/view/s2E05L31BC)
Bob Beck writes in (http://slexy.org/view/s21Nmg3Jrk) - and note the "Caution" section that was added to libressl.org (http://www.libressl.org/)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, portable, openssh, security, linux, arc4random, intrinsic functions, rng, prng, status report, pkgng, openhttpd, relayd, httpd, web server, zfsguru, zfs, freebsd mastery, book, storage, ufs, geom, disks, presentation, talk, comparison, mandoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
