<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 29 Apr 2026 01:59:50 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Authentication”</title>
    <link>https://www.bsdnow.tv/tags/authentication</link>
    <pubDate>Thu, 07 Mar 2024 08:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>549: htop Tetris</title>
  <link>https://www.bsdnow.tv/549</link>
  <guid isPermaLink="false">09b0aba7-84c8-48f6-8901-4bd391e42348</guid>
  <pubDate>Thu, 07 Mar 2024 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/09b0aba7-84c8-48f6-8901-4bd391e42348.mp3" length="54510336" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD Foundation Statement on the European Union Cyber Resiliency Act, DragonFly BSD on a Thinkpad T480s, How FreeBSD 
 Employs Ampere Arm64 Servers in the Data Center, FreeBSD Yubikey authentication, that time I almost added Tetris to htop, and more</itunes:subtitle>
  <itunes:duration>56:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD Foundation Statement on the European Union Cyber Resiliency Act, DragonFly BSD on a Thinkpad T480s, How FreeBSD 
 Employs Ampere Arm64 Servers in the Data Center, FreeBSD Yubikey authentication, that time I almost added Tetris to htop, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
FreeBSD Foundation Statement on the European Union Cyber Resiliency Act (https://freebsdfoundation.org/blog/freebsd-foundation-statement-on-the-european-union-cyber-resiliency-act/?utm_source=bsdweekly)
DragonFly BSD on a Thinkpad T480s (https://git.sr.ht/~tomh/dragonflybsd-on-a-laptop/tree/master/item/README.md)
News Roundup
Ampere in the Wild: How FreeBSD Employs Ampere Arm64 Servers in the Data Center (https://amperecomputing.com/blogs/ampere-in-the-wild)
FreeBSD Yubikey authentication (https://gist.github.com/daemonhorn/bdd77a7bc0ff5842e5a31d999b96e1f1)
That time I almost added Tetris to htop (https://hisham.hm/2024/02/12/that-time-i-almost-added-tetris-to-htop/)
Beastie Bits
Mail Software Projects for You (https://mwl.io/archives/23419)
At long last: the MWL Title Index (https://mwl.io/archives/23401)
FreeBSD on a RPi (https://linux.slashdot.org/story/24/01/07/0327229/how-does-freebsd-compare-to-linux-on-a-raspberry-pi)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, statement, cyber resiliency act, thinkpad t480s, ampere, arm64, data center, yubikey, authentication, tetris, htop</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD Foundation Statement on the European Union Cyber Resiliency Act, DragonFly BSD on a Thinkpad T480s, How FreeBSD <br>
 Employs Ampere Arm64 Servers in the Data Center, FreeBSD Yubikey authentication, that time I almost added Tetris to htop, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://freebsdfoundation.org/blog/freebsd-foundation-statement-on-the-european-union-cyber-resiliency-act/?utm_source=bsdweekly" rel="nofollow">FreeBSD Foundation Statement on the European Union Cyber Resiliency Act</a></p>

<hr>

<p><a href="https://git.sr.ht/%7Etomh/dragonflybsd-on-a-laptop/tree/master/item/README.md" rel="nofollow">DragonFly BSD on a Thinkpad T480s</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://amperecomputing.com/blogs/ampere-in-the-wild" rel="nofollow">Ampere in the Wild: How FreeBSD Employs Ampere Arm64 Servers in the Data Center</a></p>

<hr>

<p><a href="https://gist.github.com/daemonhorn/bdd77a7bc0ff5842e5a31d999b96e1f1" rel="nofollow">FreeBSD Yubikey authentication</a></p>

<hr>

<p><a href="https://hisham.hm/2024/02/12/that-time-i-almost-added-tetris-to-htop/" rel="nofollow">That time I almost added Tetris to htop</a></p>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://mwl.io/archives/23419" rel="nofollow">Mail Software Projects for You</a><br>
<a href="https://mwl.io/archives/23401" rel="nofollow">At long last: the MWL Title Index</a><br>
<a href="https://linux.slashdot.org/story/24/01/07/0327229/how-does-freebsd-compare-to-linux-on-a-raspberry-pi" rel="nofollow">FreeBSD on a RPi</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD Foundation Statement on the European Union Cyber Resiliency Act, DragonFly BSD on a Thinkpad T480s, How FreeBSD <br>
 Employs Ampere Arm64 Servers in the Data Center, FreeBSD Yubikey authentication, that time I almost added Tetris to htop, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://freebsdfoundation.org/blog/freebsd-foundation-statement-on-the-european-union-cyber-resiliency-act/?utm_source=bsdweekly" rel="nofollow">FreeBSD Foundation Statement on the European Union Cyber Resiliency Act</a></p>

<hr>

<p><a href="https://git.sr.ht/%7Etomh/dragonflybsd-on-a-laptop/tree/master/item/README.md" rel="nofollow">DragonFly BSD on a Thinkpad T480s</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://amperecomputing.com/blogs/ampere-in-the-wild" rel="nofollow">Ampere in the Wild: How FreeBSD Employs Ampere Arm64 Servers in the Data Center</a></p>

<hr>

<p><a href="https://gist.github.com/daemonhorn/bdd77a7bc0ff5842e5a31d999b96e1f1" rel="nofollow">FreeBSD Yubikey authentication</a></p>

<hr>

<p><a href="https://hisham.hm/2024/02/12/that-time-i-almost-added-tetris-to-htop/" rel="nofollow">That time I almost added Tetris to htop</a></p>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://mwl.io/archives/23419" rel="nofollow">Mail Software Projects for You</a><br>
<a href="https://mwl.io/archives/23401" rel="nofollow">At long last: the MWL Title Index</a><br>
<a href="https://linux.slashdot.org/story/24/01/07/0327229/how-does-freebsd-compare-to-linux-on-a-raspberry-pi" rel="nofollow">FreeBSD on a RPi</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>504: Release the BSD</title>
  <link>https://www.bsdnow.tv/504</link>
  <guid isPermaLink="false">2d02bfb1-4e33-4be1-8424-a707ddbeac55</guid>
  <pubDate>Thu, 27 Apr 2023 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2d02bfb1-4e33-4be1-8424-a707ddbeac55.mp3" length="34665600" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more</itunes:subtitle>
  <itunes:duration>36:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
FreeBSD 13.2 Release Announcement (https://www.freebsd.org/releases/13.2R/announce/)
Using DTrace to find block sizes of ZFS, NFS, and iSCSI (https://axcient.com/blog/using-dtrace-to-find-block-sizes-of-zfs-nfs-and-iscsi/)
News Roundup
Midnight BSD 3.0.1 (https://www.phoronix.com/news/MidnightBSD-3.0.1)
Closing a stale SSH connection (https://davidisaksson.dev/posts/closing-stale-ssh-connections/)
How to automatically add identity to the SSH authentication agent (https://sleeplessbeastie.eu/2023/04/10/how-to-automatically-add-identity-to-the-ssh-authentication-agent/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Dan - ZFS question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Dan%20-%20ZFS%20question.md)
Matt - Thanks (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Matt%20-%20Thanks.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, cli, unix, os, berkeley, software, distribution, development, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, dtrace, nfs, iscsi, block size, midnightbsd, ssh, connection, identity, public key, authentication, agent, virtual server</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.2R/announce/" rel="nofollow">FreeBSD 13.2 Release Announcement</a></h3>

<hr>

<h3><a href="https://axcient.com/blog/using-dtrace-to-find-block-sizes-of-zfs-nfs-and-iscsi/" rel="nofollow">Using DTrace to find block sizes of ZFS, NFS, and iSCSI</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.phoronix.com/news/MidnightBSD-3.0.1" rel="nofollow">Midnight BSD 3.0.1</a></h3>

<hr>

<h3><a href="https://davidisaksson.dev/posts/closing-stale-ssh-connections/" rel="nofollow">Closing a stale SSH connection</a></h3>

<hr>

<h3><a href="https://sleeplessbeastie.eu/2023/04/10/how-to-automatically-add-identity-to-the-ssh-authentication-agent/" rel="nofollow">How to automatically add identity to the SSH authentication agent</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Dan%20-%20ZFS%20question.md" rel="nofollow">Dan - ZFS question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Matt%20-%20Thanks.md" rel="nofollow">Matt - Thanks</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.2R/announce/" rel="nofollow">FreeBSD 13.2 Release Announcement</a></h3>

<hr>

<h3><a href="https://axcient.com/blog/using-dtrace-to-find-block-sizes-of-zfs-nfs-and-iscsi/" rel="nofollow">Using DTrace to find block sizes of ZFS, NFS, and iSCSI</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.phoronix.com/news/MidnightBSD-3.0.1" rel="nofollow">Midnight BSD 3.0.1</a></h3>

<hr>

<h3><a href="https://davidisaksson.dev/posts/closing-stale-ssh-connections/" rel="nofollow">Closing a stale SSH connection</a></h3>

<hr>

<h3><a href="https://sleeplessbeastie.eu/2023/04/10/how-to-automatically-add-identity-to-the-ssh-authentication-agent/" rel="nofollow">How to automatically add identity to the SSH authentication agent</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Dan%20-%20ZFS%20question.md" rel="nofollow">Dan - ZFS question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Matt%20-%20Thanks.md" rel="nofollow">Matt - Thanks</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>427: Logging is important</title>
  <link>https://www.bsdnow.tv/427</link>
  <guid isPermaLink="false">e0be5e06-7a29-4e22-9828-6a34074a48e5</guid>
  <pubDate>Thu, 04 Nov 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0be5e06-7a29-4e22-9828-6a34074a48e5.mp3" length="27413712" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Build Your FreeBSD Developer Workstation, logging is important, how BSD authentication works, pfSense turns 15 years old, OPNsense Business Edition 21.10 released,  getting started with pot, and more</itunes:subtitle>
  <itunes:duration>43:45</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Build Your FreeBSD Developer Workstation, logging is important, how BSD authentication works, pfSense turns 15 years old, OPNsense Business Edition 21.10 released,  getting started with pot, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
If you like BSDNow, consider supporting us on Patreon (https://www.patreon.com/bsdnow)
Headlines
Building Your FreeBSD Developer Workstation Setup (https://klarasystems.com/articles/freebsd-developer-workstation-setup/)
What I learned from Russian students: logging is important (https://peter.czanik.hu/posts/russian_students_logging)
News Roundup
How BSD Authentication works (https://blog.lambda.cx/posts/how-bsd-authentication-works/)
pfSense Software is 15 Today! (https://www.netgate.com/blog/pfsense-software-is-15-today)
OPNsense® Business Edition 21.10 released (https://opnsense.org/opnsense-business-edition-21-10-released/)
Getting started with pot (https://pot.pizzamig.dev/Getting/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
## Feedback/Questions
Benjamin - Question for Benedict (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/427/feedback/Benjamin%20-%20Question%20for%20Benedict.md)
Nelson - Episode 419 correction (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/427/feedback/Nelson%20-%20Episode%20419%20correction.md)
Peter - state machines (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/427/feedback/Peter%20-%20state%20machines.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, build, setup, workstation, developer, logging, log, authentication, pfsense, opnsense, pot</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Build Your FreeBSD Developer Workstation, logging is important, how BSD authentication works, pfSense turns 15 years old, OPNsense Business Edition 21.10 released,  getting started with pot, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a><br>
If you like BSDNow, consider supporting us on <a href="https://www.patreon.com/bsdnow" rel="nofollow">Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-developer-workstation-setup/" rel="nofollow">Building Your FreeBSD Developer Workstation Setup</a></h3>

<hr>

<h3><a href="https://peter.czanik.hu/posts/russian_students_logging" rel="nofollow">What I learned from Russian students: logging is important</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.lambda.cx/posts/how-bsd-authentication-works/" rel="nofollow">How BSD Authentication works</a></h3>

<hr>

<h3><a href="https://www.netgate.com/blog/pfsense-software-is-15-today" rel="nofollow">pfSense Software is 15 Today!</a></h3>

<hr>

<h3><a href="https://opnsense.org/opnsense-business-edition-21-10-released/" rel="nofollow">OPNsense® Business Edition 21.10 released</a></h3>

<hr>

<h3><a href="https://pot.pizzamig.dev/Getting/" rel="nofollow">Getting started with pot</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
## Feedback/Questions</li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/427/feedback/Benjamin%20-%20Question%20for%20Benedict.md" rel="nofollow">Benjamin - Question for Benedict</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/427/feedback/Nelson%20-%20Episode%20419%20correction.md" rel="nofollow">Nelson - Episode 419 correction</a></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/427/feedback/Peter%20-%20state%20machines.md" rel="nofollow">Peter - state machines</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Build Your FreeBSD Developer Workstation, logging is important, how BSD authentication works, pfSense turns 15 years old, OPNsense Business Edition 21.10 released,  getting started with pot, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a><br>
If you like BSDNow, consider supporting us on <a href="https://www.patreon.com/bsdnow" rel="nofollow">Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-developer-workstation-setup/" rel="nofollow">Building Your FreeBSD Developer Workstation Setup</a></h3>

<hr>

<h3><a href="https://peter.czanik.hu/posts/russian_students_logging" rel="nofollow">What I learned from Russian students: logging is important</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.lambda.cx/posts/how-bsd-authentication-works/" rel="nofollow">How BSD Authentication works</a></h3>

<hr>

<h3><a href="https://www.netgate.com/blog/pfsense-software-is-15-today" rel="nofollow">pfSense Software is 15 Today!</a></h3>

<hr>

<h3><a href="https://opnsense.org/opnsense-business-edition-21-10-released/" rel="nofollow">OPNsense® Business Edition 21.10 released</a></h3>

<hr>

<h3><a href="https://pot.pizzamig.dev/Getting/" rel="nofollow">Getting started with pot</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
## Feedback/Questions</li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/427/feedback/Benjamin%20-%20Question%20for%20Benedict.md" rel="nofollow">Benjamin - Question for Benedict</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/427/feedback/Nelson%20-%20Episode%20419%20correction.md" rel="nofollow">Nelson - Episode 419 correction</a></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/427/feedback/Peter%20-%20state%20machines.md" rel="nofollow">Peter - state machines</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>330: Happy Holidays, All(an)</title>
  <link>https://www.bsdnow.tv/330</link>
  <guid isPermaLink="false">af84425c-c562-4d3b-b28c-cce7a148a3ad</guid>
  <pubDate>Thu, 26 Dec 2019 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/af84425c-c562-4d3b-b28c-cce7a148a3ad.mp3" length="54074955" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.</itunes:subtitle>
  <itunes:duration>1:15:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.
Headlines
Authentication vulnerabilities in OpenBSD (https://www.openwall.com/lists/oss-security/2019/12/04/5)
We discovered an authentication-bypass vulnerability in OpenBSD's authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis. For example, sshd is not exploitable thanks to its defense-in-depth mechanisms.
From the manual page of login.conf:
OpenBSD uses BSD Authentication, which is made up of a variety of authentication styles.  The authentication styles currently provided are:
         passwd     Request a password and check it against the password in the master.passwd file.  See loginpasswd(8).
         skey       Send a challenge and request a response, checking it with S/Key (tm) authentication.  See loginskey(8).
         yubikey    Authenticate using a Yubico YubiKey token.  See loginyubikey(8).
         For any given style, the program /usr/libexec/auth/loginstyle is used to
         perform the authentication.  The synopsis of this program is:
         /usr/libexec/auth/login_style [-v name=value] [-s service] username class
This is the first piece of the puzzle: if an attacker specifies a username of the form "-option", they can influence the behavior of the authentication program in unexpected ways.
 login_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user [class] The service argument specifies which protocol to use with the invoking program.  The allowed protocols are login, challenge, and response.  (The challenge protocol is silently ignored but will report success as passwd-style authentication is not challenge-response based).
This is the second piece of the puzzle: if an attacker specifies the username "-schallenge" (or "-schallenge:passwd" to force a passwd-style authentication), then the authentication is automatically successful and therefore bypassed.
Case study: smtpd
Case study: ldapd
Case study: radiusd
Case study: sshd
Acknowledgments: We thank Theo de Raadt and the OpenBSD developers for their incredibly quick response: they published patches for these vulnerabilities less than 40 hours after our initial contact. We also thank MITRE's CVE Assignment Team.
First release candidate for NetBSD 9.0 available! (https://blog.netbsd.org/tnf/entry/first_release_candidate_for_netbsd)
Since the start of the release process four months ago a lot of improvements went into the branch - more than 500 pullups were processed!
This includes usbnet (a common framework for usb ethernet drivers), aarch64 stability enhancements and lots of new hardware support, installer/sysinst fixes and changes to the NVMM (hardware virtualization) interface.
We hope this will lead to the best NetBSD release ever (only to be topped by NetBSD 10 next year).
Here are a few highlights of the new release:
Support for Arm AArch64 (64-bit Armv8-A) machines, including "Arm ServerReady"
compliant machines (SBBR+SBSA)
Enhanced hardware support for Armv7-A
Updated GPU drivers (e.g. support for Intel Kabylake)
Enhanced virtualization support
Support for hardware-accelerated virtualization (NVMM)
Support for Performance Monitoring Counters
Support for Kernel ASLR
Support several kernel sanitizers (KLEAK, KASAN, KUBSAN)
Support for userland sanitizers
Audit of the network stack
Many improvements in NPF
Updated ZFS
Reworked error handling and NCQ support in the SATA subsystem
Support a common framework for USB Ethernet drivers (usbnet)
More information on the RC can be found on the NetBSD 9 release page (https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html)
News Roundup
Running FreeNAS on a Digitalocean droplet (https://www.shlomimarco.com/post/running-freenas-on-a-digitalocean-droplet)
ZFS is awesome. FreeBSD even more so. FreeNAS is the battle-tested, enterprise-ready-yet-home-user-friendly software defined storage solution which is cooler then deep space, based on FreeBSD and makes heavy use of ZFS. This is what I (and soooooo many others) use for just about any storage-related task. I can go on and on and on about what makes it great, but if you're here, reading this, you probably know all that already and we can skip ahead.
I've needed an offsite FreeNAS setup to replicate things to, to run some things, to do some stuff, basically, my privately-owned, tightly-controlled NAS appliance in the cloud, one I control from top to bottom and with support for whatever crazy thing I'm trying to do. Since I'm using DigitalOcean as my main VPS provider, it seemed logical to run FreeNAS there, however, you can't. While DO supports many many distos and pre-setup applications (e.g OpenVPN), FreeNAS isn't a supported feature, at least not in the traditional way :)
Before we begin, here's the gist of what we're going to do:
Base of a FreeBSD droplet, we'll re-image our boot block device with FreeNAS iso. We'll then install FreeNAS on the second block device. Once done we're going to do the ol' switcheroo: we're going to re-image our original boot block device using the now FreeNAS-installed second block device. 
Part 1: re-image our boot block device to boot FreeNAS install media.
Part 2: Install FreeNAS on the second block-device
Part 3: Re-image the boot block device using the FreeNAS-installed block device
NomadBSD 1.3 is now available (https://nomadbsd.org/)
From the release notes:
The base system has been changed to FreeBSD 12.1-RELEASE-p1
 Due to a deadlock problem, FreeBSD's unionfs has been replaced by unionfs-fuse
 The GPT layout has been changed to MBR. This prevents problems with Lenovo
 systems that refuse to boot from GPT if "lenovofix" is not set, and systems that
 hang on boot if "lenovofix" is set.
 Support for ZFS installations has been added to the NomadBSD installer.
 The rc-script for setting up the network interfaces has been fixed and improved.
 Support for setting the country code for the wlan device has been added.
 Auto configuration for running in VirtualBox has been added.
 A check for the default display has been added to the graphics configuration scripts. This fixes problems where users with Optimus have their NVIDIA card disabled, and use the integrated graphics chip instead.
 NVIDIA driver version 440 has been added.
 nomadbsd-dmconfig, a Qt tool for selecting the display manager theme, setting the
default user and autologin has been added.
 nomadbsd-adduser, a Qt tool for added preconfigured user accounts to the system has been added.
 Martin Orszulik added Czech translations to the setup and installation wizard.
 The NomadBSD logo, designed by Ian Grindley, has been changed.
 Support for localized error messages has been added.
 Support for localizing the password prompts has been added.
 Some templates for starting other DEs have been added to ~/.xinitrc.
 The interfaces of nomadbsd-setup-gui and nomadbsd-install-gui have been improved.
 A script that helps users to configure a multihead systems has been added.
 The Xorg driver for newer Intel GPUs has been changed from "intel" to "modesetting".
 /proc has been added to /etc/fstab
 A D-Bus session issue has been fixed which prevented thunar from accessing  samba shares.
 DSBBg which allows users to change and manage wallpapers has been added.
 The latest version of update_obmenu now supports auto-updating the Openbox menu. Manually updating the Openbox menu after packet (de)installation is therefore no longer needed.
Support for multiple keyboard layouts has been added.
 www/palemoon has been removed.
 mail/thunderbird has been removed.
 audio/audacity has been added.
 deskutils/orage has been added.
 the password manager fpm2 has been replaced by KeePassXC
 mail/sylpheed has been replaced by mail/claws-mail
 multimedia/simplescreenrecorder has been added.
 DSBMC has been changed to DSBMC-Qt
 Many small improvements and bug fixes.
At e2k19 nobody can hear you scream (https://undeadly.org/cgi?action=article;sid=20191204170908)
After 2 years it was once again time to pack skis and snowshoes, put a satellite dish onto a sledge and hike through the snowy rockies to the Elk Lakes hut.
I did not really have much of a plan what I wanted to work on but there were a few things I wanted to look into. One of them was rpki-client and the fact that it was so incredibly slow. Since Bob beck@ was around I started to ask him innocent X509 questions ... as if there are innocent X509 questions! Mainly about the abuse of the X509STORE in rpki-client. Pretty soon it was clear that rpki-client did it all wrong and most of the X509 verification had to be rewritten. Instead of only storing the root certificates in the store and passing the intermediate certs as a chain to the verification function rpki-client threw everything into it. The X509STORE is just not built for such an abuse and so it was no wonder that this was slow.
Lucky me I pulled benno@ with me into this dark hole of libcrypto code. He managed to build up an initial diff to pass the chains as a STACKOF(X509) and together we managed to get it working. A big thanks goes to ingo@ who documented most of the functions we had to use. Have a look at STACKOF(3) and skpopfree(3) to understand why benno@ and I slowly turned crazy.
Our next challenge was to only load the necessary certificate revocation list into the X509STORECTX. While doing those changes it became obvious that some of the data structures needed better lookup functions. Looking up certificates was done using a linear lookup and so we replaced the internal certificate and CRL tables with RB trees for fast lookups. deraadt@ also joined the rpki-client commit fest and changed the output code to use rename(2) so that files are replaced in an atomic operation. Thanks to this rpki-client can now be safely run from cron (there is an example in the default crontab).
I did not plan to spend most of my week hacking on rpki-client but in the end I'm happy that I did and the result is fairly impressive. Working with libcrypto code and especially X509 was less than pleasant. Our screams of agony died away in the snowy rocky mountains and made Bob deep dive into UVM with a smile since he knew that benno@ and I had it worse.
In case you wonder thanks to all changes at e2k19 rpki-client improved from over 20min run time to validate all VRPS to roughly 1min to do the same job. A factor 20 improvement!
Thanks to Theo, Bob and Howie to make this possible. To all the cooks for the great food and to Xplornet for providing us with Internet at the hut.
Beastie Bits
FOSDEM 2020 BSD Devroom schedule (https://fosdem.org/2020/schedule/track/bsd/)
Easy Minecraft Server on FreeBSD Howto (https://www.freebsdfoundation.org/freebsd/how-to-guides/easy-minecraft-server-on-freebsd/)
stats(3) framework in the TCP stack (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=355304)
4017 days of uptime (https://twitter.com/EdwinKremer/status/1203071684535889921)
sysget - A front-end for every package manager (https://github.com/emilengler/sysget)
PlayOnBSD’s Cross-BSD Shopping Guide (https://www.playonbsd.com/shopping_guide/)
Feedback/Questions
Pat asks about the proper disk drive type for ZFS (http://dpaste.com/2FDN26X#wrap)
Brad asks about a ZFS rosetta stone (http://dpaste.com/2X8PBMC#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 Special Guest: Mariusz Zaborski.
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, Authentication, vulnerabilities, release candidate, digitalocean, droplet, freenas, nomadbsd, e2k19, hackathon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.openwall.com/lists/oss-security/2019/12/04/5" rel="nofollow">Authentication vulnerabilities in OpenBSD</a></h3>

<ul>
<li>We discovered an authentication-bypass vulnerability in OpenBSD&#39;s authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis. For example, sshd is not exploitable thanks to its defense-in-depth mechanisms.</li>
<li>From the manual page of login.conf:</li>
</ul>

<blockquote>
<p>OpenBSD uses BSD Authentication, which is made up of a variety of authentication styles.  The authentication styles currently provided are:<br>
         passwd     Request a password and check it against the password in the master.passwd file.  See login_passwd(8).<br>
         skey       Send a challenge and request a response, checking it with S/Key (tm) authentication.  See login_skey(8).<br>
         yubikey    Authenticate using a Yubico YubiKey token.  See login_yubikey(8).<br>
         For any given style, the program /usr/libexec/auth/login_style is used to<br>
         perform the authentication.  The synopsis of this program is:<br>
         /usr/libexec/auth/login_style [-v name=value] [-s service] username class</p>
</blockquote>

<ul>
<li>This is the first piece of the puzzle: if an attacker specifies a username of the form &quot;-option&quot;, they can influence the behavior of the authentication program in unexpected ways.</li>
</ul>

<blockquote>
<pre><code> login_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user [class] The service argument specifies which protocol to use with the invoking program.  The allowed protocols are login, challenge, and response.  (The challenge protocol is silently ignored but will report success as passwd-style authentication is not challenge-response based).
</code></pre>
</blockquote>

<ul>
<li>This is the second piece of the puzzle: if an attacker specifies the username &quot;-schallenge&quot; (or &quot;-schallenge:passwd&quot; to force a passwd-style authentication), then the authentication is automatically successful and therefore bypassed.</li>
<li>Case study: smtpd</li>
<li>Case study: ldapd</li>
<li>Case study: radiusd</li>
<li>Case study: sshd</li>
<li>Acknowledgments: We thank Theo de Raadt and the OpenBSD developers for their incredibly quick response: they published patches for these vulnerabilities less than 40 hours after our initial contact. We also thank MITRE&#39;s CVE Assignment Team.</li>
</ul>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/first_release_candidate_for_netbsd" rel="nofollow">First release candidate for NetBSD 9.0 available!</a></h3>

<ul>
<li>Since the start of the release process four months ago a lot of improvements went into the branch - more than 500 pullups were processed!</li>
<li>This includes usbnet (a common framework for usb ethernet drivers), aarch64 stability enhancements and lots of new hardware support, installer/sysinst fixes and changes to the NVMM (hardware virtualization) interface.</li>
<li>We hope this will lead to the best NetBSD release ever (only to be topped by NetBSD 10 next year).</li>
<li><p>Here are a few highlights of the new release:</p>

<blockquote>
<p>Support for Arm AArch64 (64-bit Armv8-A) machines, including &quot;Arm ServerReady&quot;<br>
compliant machines (SBBR+SBSA)<br>
Enhanced hardware support for Armv7-A<br>
Updated GPU drivers (e.g. support for Intel Kabylake)<br>
Enhanced virtualization support<br>
Support for hardware-accelerated virtualization (NVMM)<br>
Support for Performance Monitoring Counters<br>
Support for Kernel ASLR<br>
Support several kernel sanitizers (KLEAK, KASAN, KUBSAN)<br>
Support for userland sanitizers<br>
Audit of the network stack<br>
Many improvements in NPF<br>
Updated ZFS<br>
Reworked error handling and NCQ support in the SATA subsystem<br>
Support a common framework for USB Ethernet drivers (usbnet)</p>
</blockquote></li>
<li><p>More information on the RC can be found on the <a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html" rel="nofollow">NetBSD 9 release page</a></p></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.shlomimarco.com/post/running-freenas-on-a-digitalocean-droplet" rel="nofollow">Running FreeNAS on a Digitalocean droplet</a></h3>

<ul>
<li>ZFS is awesome. FreeBSD even more so. FreeNAS is the battle-tested, enterprise-ready-yet-home-user-friendly software defined storage solution which is cooler then deep space, based on FreeBSD and makes heavy use of ZFS. This is what I (and soooooo many others) use for just about any storage-related task. I can go on and on and on about what makes it great, but if you&#39;re here, reading this, you probably know all that already and we can skip ahead.</li>
<li>I&#39;ve needed an offsite FreeNAS setup to replicate things to, to run some things, to do some stuff, basically, my privately-owned, tightly-controlled NAS appliance in the cloud, one I control from top to bottom and with support for whatever crazy thing I&#39;m trying to do. Since I&#39;m using DigitalOcean as my main VPS provider, it seemed logical to run FreeNAS there, however, you can&#39;t. While DO supports many many distos and pre-setup applications (e.g OpenVPN), FreeNAS isn&#39;t a supported feature, at least not in the traditional way :)</li>
<li>Before we begin, here&#39;s the gist of what we&#39;re going to do:</li>
</ul>

<blockquote>
<p>Base of a FreeBSD droplet, we&#39;ll re-image our boot block device with FreeNAS iso. We&#39;ll then install FreeNAS on the second block device. Once done we&#39;re going to do the ol&#39; switcheroo: we&#39;re going to re-image our original boot block device using the now FreeNAS-installed second block device. </p>
</blockquote>

<ul>
<li>Part 1: re-image our boot block device to boot FreeNAS install media.</li>
<li>Part 2: Install FreeNAS on the second block-device</li>
<li>Part 3: Re-image the boot block device using the FreeNAS-installed block device</li>
</ul>

<hr>

<h3><a href="https://nomadbsd.org/" rel="nofollow">NomadBSD 1.3 is now available</a></h3>

<ul>
<li>From the release notes:</li>
</ul>

<blockquote>
<p>The base system has been changed to FreeBSD 12.1-RELEASE-p1<br>
 Due to a deadlock problem, FreeBSD&#39;s unionfs has been replaced by unionfs-fuse<br>
 The GPT layout has been changed to MBR. This prevents problems with Lenovo<br>
 systems that refuse to boot from GPT if &quot;lenovofix&quot; is not set, and systems that<br>
 hang on boot if &quot;lenovofix&quot; is set.<br>
 Support for ZFS installations has been added to the NomadBSD installer.<br>
 The rc-script for setting up the network interfaces has been fixed and improved.<br>
 Support for setting the country code for the wlan device has been added.<br>
 Auto configuration for running in VirtualBox has been added.<br>
 A check for the default display has been added to the graphics configuration scripts. This fixes problems where users with Optimus have their NVIDIA card disabled, and use the integrated graphics chip instead.<br>
 NVIDIA driver version 440 has been added.<br>
 nomadbsd-dmconfig, a Qt tool for selecting the display manager theme, setting the<br>
default user and autologin has been added.<br>
 nomadbsd-adduser, a Qt tool for added preconfigured user accounts to the system has been added.<br>
 Martin Orszulik added Czech translations to the setup and installation wizard.<br>
 The NomadBSD logo, designed by Ian Grindley, has been changed.<br>
 Support for localized error messages has been added.<br>
 Support for localizing the password prompts has been added.<br>
 Some templates for starting other DEs have been added to ~/.xinitrc.<br>
 The interfaces of nomadbsd-setup-gui and nomadbsd-install-gui have been improved.<br>
 A script that helps users to configure a multihead systems has been added.<br>
 The Xorg driver for newer Intel GPUs has been changed from &quot;intel&quot; to &quot;modesetting&quot;.<br>
 /proc has been added to /etc/fstab<br>
 A D-Bus session issue has been fixed which prevented thunar from accessing  samba shares.<br>
 DSBBg which allows users to change and manage wallpapers has been added.<br>
 The latest version of update_obmenu now supports auto-updating the Openbox menu. Manually updating the Openbox menu after packet (de)installation is therefore no longer needed.</p>

<p>Support for multiple keyboard layouts has been added.<br>
 www/palemoon has been removed.<br>
 mail/thunderbird has been removed.<br>
 audio/audacity has been added.<br>
 deskutils/orage has been added.<br>
 the password manager fpm2 has been replaced by KeePassXC<br>
 mail/sylpheed has been replaced by mail/claws-mail<br>
 multimedia/simplescreenrecorder has been added.<br>
 DSBMC has been changed to DSBMC-Qt<br>
 Many small improvements and bug fixes.</p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20191204170908" rel="nofollow">At e2k19 nobody can hear you scream</a></h3>

<ul>
<li>After 2 years it was once again time to pack skis and snowshoes, put a satellite dish onto a sledge and hike through the snowy rockies to the Elk Lakes hut.</li>
<li>I did not really have much of a plan what I wanted to work on but there were a few things I wanted to look into. One of them was rpki-client and the fact that it was so incredibly slow. Since Bob beck@ was around I started to ask him innocent X509 questions ... as if there are innocent X509 questions! Mainly about the abuse of the X509_STORE in rpki-client. Pretty soon it was clear that rpki-client did it all wrong and most of the X509 verification had to be rewritten. Instead of only storing the root certificates in the store and passing the intermediate certs as a chain to the verification function rpki-client threw everything into it. The X509_STORE is just not built for such an abuse and so it was no wonder that this was slow.</li>
<li>Lucky me I pulled benno@ with me into this dark hole of libcrypto code. He managed to build up an initial diff to pass the chains as a STACK_OF(X509) and together we managed to get it working. A big thanks goes to ingo@ who documented most of the functions we had to use. Have a look at STACK_OF(3) and sk_pop_free(3) to understand why benno@ and I slowly turned crazy.</li>
<li>Our next challenge was to only load the necessary certificate revocation list into the X509_STORE_CTX. While doing those changes it became obvious that some of the data structures needed better lookup functions. Looking up certificates was done using a linear lookup and so we replaced the internal certificate and CRL tables with RB trees for fast lookups. deraadt@ also joined the rpki-client commit fest and changed the output code to use rename(2) so that files are replaced in an atomic operation. Thanks to this rpki-client can now be safely run from cron (there is an example in the default crontab).</li>
<li>I did not plan to spend most of my week hacking on rpki-client but in the end I&#39;m happy that I did and the result is fairly impressive. Working with libcrypto code and especially X509 was less than pleasant. Our screams of agony died away in the snowy rocky mountains and made Bob deep dive into UVM with a smile since he knew that benno@ and I had it worse.</li>
<li>In case you wonder thanks to all changes at e2k19 rpki-client improved from over 20min run time to validate all VRPS to roughly 1min to do the same job. A factor 20 improvement!</li>
<li>Thanks to Theo, Bob and Howie to make this possible. To all the cooks for the great food and to Xplornet for providing us with Internet at the hut.</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://fosdem.org/2020/schedule/track/bsd/" rel="nofollow">FOSDEM 2020 BSD Devroom schedule</a></li>
<li><a href="https://www.freebsdfoundation.org/freebsd/how-to-guides/easy-minecraft-server-on-freebsd/" rel="nofollow">Easy Minecraft Server on FreeBSD Howto</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=355304" rel="nofollow">stats(3) framework in the TCP stack</a></li>
<li><a href="https://twitter.com/EdwinKremer/status/1203071684535889921" rel="nofollow">4017 days of uptime</a></li>
<li><a href="https://github.com/emilengler/sysget" rel="nofollow">sysget - A front-end for every package manager</a></li>
<li><a href="https://www.playonbsd.com/shopping_guide/" rel="nofollow">PlayOnBSD’s Cross-BSD Shopping Guide</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/2FDN26X#wrap" rel="nofollow">Pat asks about the proper disk drive type for ZFS</a></li>
<li><a href="http://dpaste.com/2X8PBMC#wrap" rel="nofollow">Brad asks about a ZFS rosetta stone</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0330.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video><p>Special Guest: Mariusz Zaborski.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.openwall.com/lists/oss-security/2019/12/04/5" rel="nofollow">Authentication vulnerabilities in OpenBSD</a></h3>

<ul>
<li>We discovered an authentication-bypass vulnerability in OpenBSD&#39;s authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis. For example, sshd is not exploitable thanks to its defense-in-depth mechanisms.</li>
<li>From the manual page of login.conf:</li>
</ul>

<blockquote>
<p>OpenBSD uses BSD Authentication, which is made up of a variety of authentication styles.  The authentication styles currently provided are:<br>
         passwd     Request a password and check it against the password in the master.passwd file.  See login_passwd(8).<br>
         skey       Send a challenge and request a response, checking it with S/Key (tm) authentication.  See login_skey(8).<br>
         yubikey    Authenticate using a Yubico YubiKey token.  See login_yubikey(8).<br>
         For any given style, the program /usr/libexec/auth/login_style is used to<br>
         perform the authentication.  The synopsis of this program is:<br>
         /usr/libexec/auth/login_style [-v name=value] [-s service] username class</p>
</blockquote>

<ul>
<li>This is the first piece of the puzzle: if an attacker specifies a username of the form &quot;-option&quot;, they can influence the behavior of the authentication program in unexpected ways.</li>
</ul>

<blockquote>
<pre><code> login_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user [class] The service argument specifies which protocol to use with the invoking program.  The allowed protocols are login, challenge, and response.  (The challenge protocol is silently ignored but will report success as passwd-style authentication is not challenge-response based).
</code></pre>
</blockquote>

<ul>
<li>This is the second piece of the puzzle: if an attacker specifies the username &quot;-schallenge&quot; (or &quot;-schallenge:passwd&quot; to force a passwd-style authentication), then the authentication is automatically successful and therefore bypassed.</li>
<li>Case study: smtpd</li>
<li>Case study: ldapd</li>
<li>Case study: radiusd</li>
<li>Case study: sshd</li>
<li>Acknowledgments: We thank Theo de Raadt and the OpenBSD developers for their incredibly quick response: they published patches for these vulnerabilities less than 40 hours after our initial contact. We also thank MITRE&#39;s CVE Assignment Team.</li>
</ul>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/first_release_candidate_for_netbsd" rel="nofollow">First release candidate for NetBSD 9.0 available!</a></h3>

<ul>
<li>Since the start of the release process four months ago a lot of improvements went into the branch - more than 500 pullups were processed!</li>
<li>This includes usbnet (a common framework for usb ethernet drivers), aarch64 stability enhancements and lots of new hardware support, installer/sysinst fixes and changes to the NVMM (hardware virtualization) interface.</li>
<li>We hope this will lead to the best NetBSD release ever (only to be topped by NetBSD 10 next year).</li>
<li><p>Here are a few highlights of the new release:</p>

<blockquote>
<p>Support for Arm AArch64 (64-bit Armv8-A) machines, including &quot;Arm ServerReady&quot;<br>
compliant machines (SBBR+SBSA)<br>
Enhanced hardware support for Armv7-A<br>
Updated GPU drivers (e.g. support for Intel Kabylake)<br>
Enhanced virtualization support<br>
Support for hardware-accelerated virtualization (NVMM)<br>
Support for Performance Monitoring Counters<br>
Support for Kernel ASLR<br>
Support several kernel sanitizers (KLEAK, KASAN, KUBSAN)<br>
Support for userland sanitizers<br>
Audit of the network stack<br>
Many improvements in NPF<br>
Updated ZFS<br>
Reworked error handling and NCQ support in the SATA subsystem<br>
Support a common framework for USB Ethernet drivers (usbnet)</p>
</blockquote></li>
<li><p>More information on the RC can be found on the <a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html" rel="nofollow">NetBSD 9 release page</a></p></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.shlomimarco.com/post/running-freenas-on-a-digitalocean-droplet" rel="nofollow">Running FreeNAS on a Digitalocean droplet</a></h3>

<ul>
<li>ZFS is awesome. FreeBSD even more so. FreeNAS is the battle-tested, enterprise-ready-yet-home-user-friendly software defined storage solution which is cooler then deep space, based on FreeBSD and makes heavy use of ZFS. This is what I (and soooooo many others) use for just about any storage-related task. I can go on and on and on about what makes it great, but if you&#39;re here, reading this, you probably know all that already and we can skip ahead.</li>
<li>I&#39;ve needed an offsite FreeNAS setup to replicate things to, to run some things, to do some stuff, basically, my privately-owned, tightly-controlled NAS appliance in the cloud, one I control from top to bottom and with support for whatever crazy thing I&#39;m trying to do. Since I&#39;m using DigitalOcean as my main VPS provider, it seemed logical to run FreeNAS there, however, you can&#39;t. While DO supports many many distos and pre-setup applications (e.g OpenVPN), FreeNAS isn&#39;t a supported feature, at least not in the traditional way :)</li>
<li>Before we begin, here&#39;s the gist of what we&#39;re going to do:</li>
</ul>

<blockquote>
<p>Base of a FreeBSD droplet, we&#39;ll re-image our boot block device with FreeNAS iso. We&#39;ll then install FreeNAS on the second block device. Once done we&#39;re going to do the ol&#39; switcheroo: we&#39;re going to re-image our original boot block device using the now FreeNAS-installed second block device. </p>
</blockquote>

<ul>
<li>Part 1: re-image our boot block device to boot FreeNAS install media.</li>
<li>Part 2: Install FreeNAS on the second block-device</li>
<li>Part 3: Re-image the boot block device using the FreeNAS-installed block device</li>
</ul>

<hr>

<h3><a href="https://nomadbsd.org/" rel="nofollow">NomadBSD 1.3 is now available</a></h3>

<ul>
<li>From the release notes:</li>
</ul>

<blockquote>
<p>The base system has been changed to FreeBSD 12.1-RELEASE-p1<br>
 Due to a deadlock problem, FreeBSD&#39;s unionfs has been replaced by unionfs-fuse<br>
 The GPT layout has been changed to MBR. This prevents problems with Lenovo<br>
 systems that refuse to boot from GPT if &quot;lenovofix&quot; is not set, and systems that<br>
 hang on boot if &quot;lenovofix&quot; is set.<br>
 Support for ZFS installations has been added to the NomadBSD installer.<br>
 The rc-script for setting up the network interfaces has been fixed and improved.<br>
 Support for setting the country code for the wlan device has been added.<br>
 Auto configuration for running in VirtualBox has been added.<br>
 A check for the default display has been added to the graphics configuration scripts. This fixes problems where users with Optimus have their NVIDIA card disabled, and use the integrated graphics chip instead.<br>
 NVIDIA driver version 440 has been added.<br>
 nomadbsd-dmconfig, a Qt tool for selecting the display manager theme, setting the<br>
default user and autologin has been added.<br>
 nomadbsd-adduser, a Qt tool for added preconfigured user accounts to the system has been added.<br>
 Martin Orszulik added Czech translations to the setup and installation wizard.<br>
 The NomadBSD logo, designed by Ian Grindley, has been changed.<br>
 Support for localized error messages has been added.<br>
 Support for localizing the password prompts has been added.<br>
 Some templates for starting other DEs have been added to ~/.xinitrc.<br>
 The interfaces of nomadbsd-setup-gui and nomadbsd-install-gui have been improved.<br>
 A script that helps users to configure a multihead systems has been added.<br>
 The Xorg driver for newer Intel GPUs has been changed from &quot;intel&quot; to &quot;modesetting&quot;.<br>
 /proc has been added to /etc/fstab<br>
 A D-Bus session issue has been fixed which prevented thunar from accessing  samba shares.<br>
 DSBBg which allows users to change and manage wallpapers has been added.<br>
 The latest version of update_obmenu now supports auto-updating the Openbox menu. Manually updating the Openbox menu after packet (de)installation is therefore no longer needed.</p>

<p>Support for multiple keyboard layouts has been added.<br>
 www/palemoon has been removed.<br>
 mail/thunderbird has been removed.<br>
 audio/audacity has been added.<br>
 deskutils/orage has been added.<br>
 the password manager fpm2 has been replaced by KeePassXC<br>
 mail/sylpheed has been replaced by mail/claws-mail<br>
 multimedia/simplescreenrecorder has been added.<br>
 DSBMC has been changed to DSBMC-Qt<br>
 Many small improvements and bug fixes.</p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20191204170908" rel="nofollow">At e2k19 nobody can hear you scream</a></h3>

<ul>
<li>After 2 years it was once again time to pack skis and snowshoes, put a satellite dish onto a sledge and hike through the snowy rockies to the Elk Lakes hut.</li>
<li>I did not really have much of a plan what I wanted to work on but there were a few things I wanted to look into. One of them was rpki-client and the fact that it was so incredibly slow. Since Bob beck@ was around I started to ask him innocent X509 questions ... as if there are innocent X509 questions! Mainly about the abuse of the X509_STORE in rpki-client. Pretty soon it was clear that rpki-client did it all wrong and most of the X509 verification had to be rewritten. Instead of only storing the root certificates in the store and passing the intermediate certs as a chain to the verification function rpki-client threw everything into it. The X509_STORE is just not built for such an abuse and so it was no wonder that this was slow.</li>
<li>Lucky me I pulled benno@ with me into this dark hole of libcrypto code. He managed to build up an initial diff to pass the chains as a STACK_OF(X509) and together we managed to get it working. A big thanks goes to ingo@ who documented most of the functions we had to use. Have a look at STACK_OF(3) and sk_pop_free(3) to understand why benno@ and I slowly turned crazy.</li>
<li>Our next challenge was to only load the necessary certificate revocation list into the X509_STORE_CTX. While doing those changes it became obvious that some of the data structures needed better lookup functions. Looking up certificates was done using a linear lookup and so we replaced the internal certificate and CRL tables with RB trees for fast lookups. deraadt@ also joined the rpki-client commit fest and changed the output code to use rename(2) so that files are replaced in an atomic operation. Thanks to this rpki-client can now be safely run from cron (there is an example in the default crontab).</li>
<li>I did not plan to spend most of my week hacking on rpki-client but in the end I&#39;m happy that I did and the result is fairly impressive. Working with libcrypto code and especially X509 was less than pleasant. Our screams of agony died away in the snowy rocky mountains and made Bob deep dive into UVM with a smile since he knew that benno@ and I had it worse.</li>
<li>In case you wonder thanks to all changes at e2k19 rpki-client improved from over 20min run time to validate all VRPS to roughly 1min to do the same job. A factor 20 improvement!</li>
<li>Thanks to Theo, Bob and Howie to make this possible. To all the cooks for the great food and to Xplornet for providing us with Internet at the hut.</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://fosdem.org/2020/schedule/track/bsd/" rel="nofollow">FOSDEM 2020 BSD Devroom schedule</a></li>
<li><a href="https://www.freebsdfoundation.org/freebsd/how-to-guides/easy-minecraft-server-on-freebsd/" rel="nofollow">Easy Minecraft Server on FreeBSD Howto</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=355304" rel="nofollow">stats(3) framework in the TCP stack</a></li>
<li><a href="https://twitter.com/EdwinKremer/status/1203071684535889921" rel="nofollow">4017 days of uptime</a></li>
<li><a href="https://github.com/emilengler/sysget" rel="nofollow">sysget - A front-end for every package manager</a></li>
<li><a href="https://www.playonbsd.com/shopping_guide/" rel="nofollow">PlayOnBSD’s Cross-BSD Shopping Guide</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/2FDN26X#wrap" rel="nofollow">Pat asks about the proper disk drive type for ZFS</a></li>
<li><a href="http://dpaste.com/2X8PBMC#wrap" rel="nofollow">Brad asks about a ZFS rosetta stone</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0330.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video><p>Special Guest: Mariusz Zaborski.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>102: May Contain ZFS</title>
  <link>https://www.bsdnow.tv/102</link>
  <guid isPermaLink="false">e0de53ca-3dcf-4df7-a556-faa52c7788a7</guid>
  <pubDate>Wed, 12 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0de53ca-3dcf-4df7-a556-faa52c7788a7.mp3" length="48985492" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.</itunes:subtitle>
  <itunes:duration>1:08:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD on Olimex RT5350F-OLinuXino (https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino)
If you haven't heard of the RT5350F-OLinuXino-EVB, you're not alone (actually, we probably couldn't even remember the name if we did know about it)
It's a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM
This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment
In part two of the series (https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2), he talks about the GPIO and how you can configure it
Part three is still in the works, so check the site later on for further progress and info
***
The modern OpenBSD home router (https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html)
In a new series of blog posts, one guy takes you through the process of building an OpenBSD-based gateway (http://www.bsdnow.tv/tutorials/openbsd-router) for his home network
"It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst"
Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless
This guide also covers PPP and IPv6, in case you have those requirements
In a similar but unrelated series (http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html), another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge
He also has a separate post (http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html) for setting up an IPSEC VPN on the router
***
NetBSD at Open Source Conference 2015 Kansai (https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html)
The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference
They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event
Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k
They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it
And what conference would be complete without an LED-powered towel
***
OpenSSH 7.0 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html)
The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code
SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled
The syntax for permitting root logins has been changed, and is now called "prohibit-password" instead of "without-password" (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now
If you're using an older configuration file, the "without-password" option still works, so no change is required
You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications
Various bug fixes and documentation improvements are also included
Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users
In the next release, even more deprecation is planned: RSA keys will be refused if they're under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***
Interview - Peter Toth - peter.toth198@gmail.com (mailto:peter.toth198@gmail.com) / @pannonp (https://twitter.com/pannonp)
Containment with iocage (https://github.com/iocage/iocage)
News Roundup
More c2k15 reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150809105132)
A few more hackathon reports from c2k15 in Calgary are still slowly trickling in
Alexander Bluhm's up first, and he continued improving OpenBSD's regression test suite (this ensures that no changes accidentally break existing things)
He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging
Renato Westphal sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150811171006) of his very first hackathon
He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network
Philip Guenther also wrote in (http://undeadly.org/cgi?action=article&amp;amp;sid=20150809165912), getting some very technical and low-level stuff done at the hackathon
His report opens with "First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking." - not exactly beginner stuff
There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***
FreeBSD jails, the hard way (https://clinta.github.io/freebsd-jails-the-hard-way)
As you learned from our interview this week, there's quite a selection of tools available to manage your jails
This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf
Unlike with iocage, ZFS isn't actually a requirement for this method
If you are using it, though, you can make use of snapshots for making template jails
***
OpenSSH hardware tokens (http://www.tancsa.com/mdtblog/?p=73)
We've talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client and server?
This blog post will show you how to use a hardware token as a second authentication factor, for the "something you know, something you have" security model
It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd
Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***
LibreSSL 2.2.2 released (http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt)
The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes
At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don't want in a crypto tool...) and much more
SSLv3 support was removed from the "openssl" command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it'll be removed completely
Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc
It'll be in 5.8 (due out earlier than usual) and it's in the FreeBSD ports tree as well
***
Feedback/Questions
James writes in (http://slexy.org/view/s216lrsVVd)
Stuart writes in (http://slexy.org/view/s20uGUHWLr)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, jails, iocage, bhyve, containers, lxc, docker, ezjail, router, gateway, ipsec, vpn, libressl, authentication, uefi, jails</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>29: P.E.F.S.</title>
  <link>https://www.bsdnow.tv/29</link>
  <guid isPermaLink="false">4af36dea-3dd3-4ac1-9ee9-a2e34dd54e3a</guid>
  <pubDate>Wed, 19 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4af36dea-3dd3-4ac1-9ee9-a2e34dd54e3a.mp3" length="82610606" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from AsiaBSDCon! This week we'll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we'll give you a step by step guide on how to actually use it. There's also the usual round of your questions and we've got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:54:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back from AsiaBSDCon! This week we'll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we'll give you a step by step guide on how to actually use it. There's also the usual round of your questions and we've got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
Using OpenSSH Certificate Authentication (http://neocri.me/documentation/using-ssh-certificate-authentication/)
SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you're using
They're not really that complex, there just isn't a lot of documentation on how to use them - this post tries to solve that
There's the benefit of not needing a knownhosts file or authorizedusers file anymore
The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***
Back to FreeBSD, a new series (http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more)
Similar to the "FreeBSD Challenge" blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey
"So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10"
He's starting off with PCBSD since it's easy to get working with dual graphics
Should be a fun series to follow!
***
OpenBSD's recent experiments in package building (http://undeadly.org/cgi?action=article&amp;amp;sid=20140307130554)
If you'll remember back to our poudriere tutorial (http://www.bsdnow.tv/tutorials/poudriere), it lets you build FreeBSD binary packages in bulk - OpenBSD's version is called dpb (http://www.bsdnow.tv/tutorials/dpb)
Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware
This article goes through some of his findings and plans for future versions that increase performance
We'll be showing a tutorial of dpb on the show in a few weeks
***
Securing FreeBSD with 2FA (http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/)
So maybe you've set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?
This post walks us through the process of locking down an ssh server (http://www.bsdnow.tv/tutorials/ssh-tmux) with 2FA
With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***
Interview - Gleb Kurtsou - gleb.kurtsou@gmail.com (mailto:gleb.kurtsou@gmail.com)
PEFS (security audit results here (https://defuse.ca/audits/pefs.htm))
Tutorial
Filesystem-based encryption with PEFS (http://www.bsdnow.tv/tutorials/pefs)
News Roundup
BSDCan 2014 registration (https://www.bsdcan.org/2014/registration.php)
Registration is finally open!
The prices are available along with a full list of presentations
Tutorial sessions for various topics as well
You have to go
***
Big changes for OpenBSD 5.6 (http://undeadly.org/cgi?action=article&amp;amp;sid=20140314080734)
Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising
OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3
They've also imported nginx into base a few years ago, but now have finally removed Apache
Sendmail is also no longer the default MTA, OpenSMTPD is the new default (http://undeadly.org/cgi?action=article&amp;amp;sid=20140313052817)
Will BIND be removed next? Maybe so (http://marc.info/?l=openbsd-cvs&amp;amp;m=139492163427518&amp;amp;w=2)
They've also discontinued the hp300, mvme68k and mvme88k ports
***
Getting to know your portmgr lurkers (http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/)
The "getting to know your portmgr" series makes its return
This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)
How he got into FreeBSD? He "wanted a unix system that I could understand and that would not get bloated as time goes by"
Mentions why he's still heavily involved with the project and lots more
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/)
Work has started to port Pulseaudio to PCBSD 10.0.1
There's a new "pc-mixer" utility being worked on for sound management as well
New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more
PCBSD 10.0.1 was released (http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/) too
***
Feedback/Questions
Alex writes in (http://slexy.org/view/s2QwjHkL2n)
Ben writes in (http://slexy.org/view/s2wLGlHF15)
Nick writes in (http://slexy.org/view/s21JsgRjMU)
Sami writes in (http://slexy.org/view/s2UX4sYdHy)
Christopher writes in (http://slexy.org/view/s26z60Qd6z)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, encryption, pefs, fde, disk, asiabsdcon, 2014, asiabsdcon2014, presentation, talk, video, recording, openssh, certificate, authentication, dpb, two factor, 2fa, yubikey</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week we&#39;ll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we&#39;ll give you a step by step guide on how to actually use it. There&#39;s also the usual round of your questions and we&#39;ve got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" rel="nofollow">Using OpenSSH Certificate Authentication</a></h3>

<ul>
<li>SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you&#39;re using</li>
<li>They&#39;re not really that complex, there just isn&#39;t a lot of documentation on how to use them - this post tries to solve that</li>
<li>There&#39;s the benefit of not needing a known_hosts file or authorized_users file anymore</li>
<li>The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***</li>
</ul>

<h3><a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" rel="nofollow">Back to FreeBSD, a new series</a></h3>

<ul>
<li>Similar to the &quot;FreeBSD Challenge&quot; blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey</li>
<li>&quot;So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10&quot;</li>
<li>He&#39;s starting off with PCBSD since it&#39;s easy to get working with dual graphics</li>
<li>Should be a fun series to follow!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140307130554" rel="nofollow">OpenBSD&#39;s recent experiments in package building</a></h3>

<ul>
<li>If you&#39;ll remember back to our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a>, it lets you build FreeBSD binary packages in bulk - OpenBSD&#39;s version is called <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a></li>
<li>Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware</li>
<li>This article goes through some of his findings and plans for future versions that increase performance</li>
<li>We&#39;ll be showing a tutorial of dpb on the show in a few weeks
***</li>
</ul>

<h3><a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" rel="nofollow">Securing FreeBSD with 2FA</a></h3>

<ul>
<li>So maybe you&#39;ve set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?</li>
<li>This post walks us through the process of locking down an <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">ssh server</a> with 2FA</li>
<li>With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***</li>
</ul>

<h2>Interview - Gleb Kurtsou - <a href="mailto:gleb.kurtsou@gmail.com" rel="nofollow">gleb.kurtsou@gmail.com</a></h2>

<p>PEFS (security audit results <a href="https://defuse.ca/audits/pefs.htm" rel="nofollow">here</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pefs" rel="nofollow">Filesystem-based encryption with PEFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.bsdcan.org/2014/registration.php" rel="nofollow">BSDCan 2014 registration</a></h3>

<ul>
<li>Registration is finally open!</li>
<li>The prices are available along with a full list of presentations</li>
<li>Tutorial sessions for various topics as well</li>
<li>You have to go
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140314080734" rel="nofollow">Big changes for OpenBSD 5.6</a></h3>

<ul>
<li>Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising</li>
<li>OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3</li>
<li>They&#39;ve also imported nginx into base a few years ago, but now have finally removed Apache</li>
<li>Sendmail is also no longer the default MTA, OpenSMTPD <a href="http://undeadly.org/cgi?action=article&sid=20140313052817" rel="nofollow">is the new default</a></li>
<li>Will BIND be removed next? <a href="http://marc.info/?l=openbsd-cvs&m=139492163427518&w=2" rel="nofollow">Maybe so</a></li>
<li>They&#39;ve also discontinued the hp300, mvme68k and mvme88k ports
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The &quot;getting to know your portmgr&quot; series makes its return</li>
<li>This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)</li>
<li>How he got into FreeBSD? He &quot;wanted a unix system that I could understand and that would not get bloated as time goes by&quot;</li>
<li>Mentions why he&#39;s still heavily involved with the project and lots more
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Work has started to port Pulseaudio to PCBSD 10.0.1</li>
<li>There&#39;s a new &quot;pc-mixer&quot; utility being worked on for sound management as well</li>
<li>New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more</li>
<li>PCBSD 10.0.1 <a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" rel="nofollow">was released</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2QwjHkL2n" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s2wLGlHF15" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21JsgRjMU" rel="nofollow">Nick writes in</a></li>
<li><a href="http://slexy.org/view/s2UX4sYdHy" rel="nofollow">Sami writes in</a></li>
<li><a href="http://slexy.org/view/s26z60Qd6z" rel="nofollow">Christopher writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week we&#39;ll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we&#39;ll give you a step by step guide on how to actually use it. There&#39;s also the usual round of your questions and we&#39;ve got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" rel="nofollow">Using OpenSSH Certificate Authentication</a></h3>

<ul>
<li>SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you&#39;re using</li>
<li>They&#39;re not really that complex, there just isn&#39;t a lot of documentation on how to use them - this post tries to solve that</li>
<li>There&#39;s the benefit of not needing a known_hosts file or authorized_users file anymore</li>
<li>The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***</li>
</ul>

<h3><a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" rel="nofollow">Back to FreeBSD, a new series</a></h3>

<ul>
<li>Similar to the &quot;FreeBSD Challenge&quot; blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey</li>
<li>&quot;So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10&quot;</li>
<li>He&#39;s starting off with PCBSD since it&#39;s easy to get working with dual graphics</li>
<li>Should be a fun series to follow!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140307130554" rel="nofollow">OpenBSD&#39;s recent experiments in package building</a></h3>

<ul>
<li>If you&#39;ll remember back to our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a>, it lets you build FreeBSD binary packages in bulk - OpenBSD&#39;s version is called <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a></li>
<li>Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware</li>
<li>This article goes through some of his findings and plans for future versions that increase performance</li>
<li>We&#39;ll be showing a tutorial of dpb on the show in a few weeks
***</li>
</ul>

<h3><a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" rel="nofollow">Securing FreeBSD with 2FA</a></h3>

<ul>
<li>So maybe you&#39;ve set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?</li>
<li>This post walks us through the process of locking down an <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">ssh server</a> with 2FA</li>
<li>With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***</li>
</ul>

<h2>Interview - Gleb Kurtsou - <a href="mailto:gleb.kurtsou@gmail.com" rel="nofollow">gleb.kurtsou@gmail.com</a></h2>

<p>PEFS (security audit results <a href="https://defuse.ca/audits/pefs.htm" rel="nofollow">here</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pefs" rel="nofollow">Filesystem-based encryption with PEFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.bsdcan.org/2014/registration.php" rel="nofollow">BSDCan 2014 registration</a></h3>

<ul>
<li>Registration is finally open!</li>
<li>The prices are available along with a full list of presentations</li>
<li>Tutorial sessions for various topics as well</li>
<li>You have to go
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140314080734" rel="nofollow">Big changes for OpenBSD 5.6</a></h3>

<ul>
<li>Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising</li>
<li>OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3</li>
<li>They&#39;ve also imported nginx into base a few years ago, but now have finally removed Apache</li>
<li>Sendmail is also no longer the default MTA, OpenSMTPD <a href="http://undeadly.org/cgi?action=article&sid=20140313052817" rel="nofollow">is the new default</a></li>
<li>Will BIND be removed next? <a href="http://marc.info/?l=openbsd-cvs&m=139492163427518&w=2" rel="nofollow">Maybe so</a></li>
<li>They&#39;ve also discontinued the hp300, mvme68k and mvme88k ports
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The &quot;getting to know your portmgr&quot; series makes its return</li>
<li>This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)</li>
<li>How he got into FreeBSD? He &quot;wanted a unix system that I could understand and that would not get bloated as time goes by&quot;</li>
<li>Mentions why he&#39;s still heavily involved with the project and lots more
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Work has started to port Pulseaudio to PCBSD 10.0.1</li>
<li>There&#39;s a new &quot;pc-mixer&quot; utility being worked on for sound management as well</li>
<li>New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more</li>
<li>PCBSD 10.0.1 <a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" rel="nofollow">was released</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2QwjHkL2n" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s2wLGlHF15" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21JsgRjMU" rel="nofollow">Nick writes in</a></li>
<li><a href="http://slexy.org/view/s2UX4sYdHy" rel="nofollow">Sami writes in</a></li>
<li><a href="http://slexy.org/view/s26z60Qd6z" rel="nofollow">Christopher writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
