<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 14:20:33 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Banana Pi”</title>
    <link>https://www.bsdnow.tv/tags/banana%20pi</link>
    <pubDate>Wed, 04 Feb 2015 08:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>75: From the Foundation (Part 1)</title>
  <link>https://www.bsdnow.tv/75</link>
  <guid isPermaLink="false">34bf4647-35b0-4919-9b96-c12799506f14</guid>
  <pubDate>Wed, 04 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/34bf4647-35b0-4919-9b96-c12799506f14.mp3" length="61549780" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we'll talk about what all they've been up to lately. All this week's news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:25:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we'll talk about what all they've been up to lately. All this week's news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Key rotation in OpenSSH 6.8 (http://blog.djm.net.au/2015/02/key-rotation-in-openssh-68.html)
Damien Miller (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) posted a new blog entry about one of the features in the upcoming OpenSSH 6.8
Times changes, key types change, problems are found with old algorithms and we switch to new ones
In OpenSSH (and the SSH protocol) however, there hasn't been an easy way to rotate host keys... until now
With this change, when you connect to a server, it will log all the server's public keys in your known_hosts file, instead of just the first one used during the key exchange
Keys that are in your known_hosts file but not on the server will get automatically removed
This fixes the problem of old servers still authenticating with ancient DSA or small RSA keys, as well as providing a way for the server to rotate keys every so often
There are some instructions in the blog post for how you'll be able to rotate host keys and eventually phase out the older ones - it's really simple
There are a lot of big changes coming in OpenSSH 6.8, so we'll be sure to cover them all when it's released
***
NetBSD Banana Pi images (https://mail-index.netbsd.org/port-arm/2015/01/30/msg002809.html)
We've talked about the Banana Pi (http://www.bananapi.org/p/product.html) a bit before - it's a small ARM board that's comparable to the popular Raspberry Pi
Some NetBSD -current images were posted on the mailing list, so now you can get some BSD action on one of these little devices
There are even a set of prebuilt pkgsrc packages, so you won't have to compile everything initially
The email includes some steps to get everything working and an overview of what comes with the image
Also check the wiki page (https://wiki.netbsd.org/ports/evbarm/allwinner/) for some related boards and further instructions on getting set up
On a related note, NetBSD also recently got GPU acceleration working (https://blog.netbsd.org/tnf/entry/raspberry_pi_gpu_acceleration_in) for the Raspberry Pi (which is a first for their ARM port)
***
LibreSSL shirts and other BSD goodies (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142255048510669&amp;amp;w=2)
If you've been keeping up with the LibreSSL saga and want a shirt to show your support, they're finally available to buy online
There are two versions, either "keep calm and use LibreSSL (https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTLSSL.jpg)" or the slightly more snarky "keep calm and abandon OpenSSL (https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTOSSL.jpg)"
While on the topic, we thought it would be good to make people aware of shirts for other BSD projects too
You can get some FreeBSD, PCBSD (https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=pc-bsd) and FreeNAS stuff (https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=shirts) from the FreeBSD mall site (https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=tshirt)
OpenBSD recently launched their new store (https://www.openbsdstore.com), but the selection is still a bit limited right now
NetBSD has a couple places (https://www.netbsd.org/gallery/devotionalia.html#cafepress) where you can buy shirts and other apparel with the flag logo on it
We couldn't find any DragonFlyBSD shirts unfortunately, which is a shame since their logo (http://www.dragonflybsd.org/images/small_logo.png) is pretty cool
Profits from the sale of the gear go back to the projects, so pick up some swag and support your BSD of choice (and of course wear them at any Linux events you happen to go to)
***
OPNsense 15.1.4 released (https://forum.opnsense.org/index.php?topic=35.0)
The OPNsense guys have been hard at work since we spoke to them (http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach), fixing lots of bugs and keeping everything up to date
A number of versions have come out since then, with 15.1.4 being the latest (assuming they haven't updated it again by the time this airs)
This version includes the latest round of FreeBSD kernel security patches, as well as minor SSL and GUI fixes
They're doing a great job of getting upstream fixes pushed out to users quickly, a very welcome change
A developer has also posted an interesting write-up titled "Development Workflow in OPNsense (http://lastsummer.de/development-workflow-in-opnsense/)"
If any of our listeners are trying OPNsense as their gateway firewall, let us know how you like it
***
Interview - Ed Maste - board@freebsdfoundation.org (mailto:board@freebsdfoundation.org)
The FreeBSD foundation (https://www.freebsdfoundation.org/donate)'s activities
News Roundup
Rolling with OpenBSD snapshots (http://homing-on-code.blogspot.com/2015/02/rolling-with-snapshots.html)
One of the cool things about the -current branch of OpenBSD is that it doesn't require any compiling
There are signed binary snapshots being continuously re-rolled and posted on the FTP sites for every architecture
This provides an easy method to get onboard with the latest features, and you can also easily upgrade between them without reformatting or rebuilding
This blog post will walk you through the process of using snapshots to stay on the bleeding edge of OpenBSD goodness
After using -current for seven weeks, the author comes to the conclusion that it's not as unstable as people might think
He's now helping test out patches and new ports since he's running the same code as the developers
***
Signing pkgsrc packages (https://mail-index.netbsd.org/tech-pkg/2015/02/02/msg014224.html)
As of the time this show airs, the official pkgsrc (http://www.bsdnow.tv/tutorials/pkgsrc) packages aren't cryptographically signed
Someone from Joyent has been working on that, since they'd like to sign their pkgsrc packages for SmartOS
Using GNUPG pulled in a lot of dependencies, and they're trying to keep the bootstrapping process minimal
Instead, they're using netpgpverify, a fork of NetBSD's netpgp (https://en.wikipedia.org/wiki/Netpgp) utility
Maybe someday this will become the official way to sign packages in NetBSD?
***
FreeBSD support model changes (https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html)
Starting with 11.0-RELEASE, which won't be for a few months probably, FreeBSD releases are going to have a different support model
The plan is to move "from a point release-based support model to a set of releases from a branch with a guaranteed support lifetime"
There will now be a five-year lifespan for each major release, regardless of how many minor point releases it gets
This new model should reduce the turnaround time for errata and security patches, since there will be a lot less work involved to build and verify them
Lots more detail can be found in the mailing list post, including some important changes to the -STABLE branch, so give it a read
***
OpenSMTPD, Dovecot and SpamAssassin (http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.html)
We've been talking about setting up your own BSD-based mail server on the last couple episodes
Here we have another post from a user setting up OpenSMTPD, including Dovecot for IMAP and SpamAssassin for spam filtering
A lot of people regularly ask the developers (http://permalink.gmane.org/gmane.mail.opensmtpd.general/2265) how to combine OpenSMTPD with spam filtering, and this post should finally reveal the dark secrets
In addition, it also covers SSL certificates, PKI and setting up MX records - some things that previous posts have lacked
Just be sure to replace those "apt-get" commands and "eth0" interface names with something a bit more sane…
In related news, OpenSMTPD has got some interesting new features coming soon (http://article.gmane.org/gmane.mail.opensmtpd.general/2272)
They're also planning to switch to LibreSSL by default (https://github.com/OpenSMTPD/OpenSMTPD/issues/534) for the portable version
***
FreeBSD 10 on the Thinkpad T400 (http://lastsummer.de/freebsd-desktop-on-the-t400/)
BSD laptop articles are becoming popular it seems - this one is about FreeBSD on a T400
Like most of the ones we've mentioned before, it shows you how to get a BSD desktop set up with all the little tweaks you might not think to do
This one differs in that it takes a more minimal approach to graphics: instead of a full-featured environment like XFCE or KDE, it uses the i3 tiling window manager
If you're a commandline junkie that basically just uses X11 to run more than one terminal at once, this might be an ideal setup for you
The post also includes some bits about the DRM and KMS in the 10.x branch, as well as vt
***
PC-BSD 10.1.1 Released (http://blog.pcbsd.org/2015/02/1810/)
Automatic background updater now in
Shiny new Qt5 utils
OVA files for VM’s
Full disk encryption with GELI v7
***
Feedback/Questions
Camio writes in (http://slexy.org/view/s2MsjllAyU)
Sha'ul writes in (http://slexy.org/view/s20eYELsAg)
John writes in (http://slexy.org/view/s20Y2GN1az)
Sean writes in (http://slexy.org/view/s20ARVQ1T6) (TJ's lengthy reply (http://slexy.org/view/s212XezEYt))
Christopher writes in (http://slexy.org/view/s2DRgEv4j8)
***
Mailing List Gold
Special Instructions (https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264010.html)
Pretending to be a VT220 (https://mail-index.netbsd.org/netbsd-users/2015/01/19/msg015669.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, ed25519, banana pi, opnsense, libressl, t400, opensmtpd, dovecot, mail server, spamassassin, foundation, donations</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we&#39;ll talk about what all they&#39;ve been up to lately. All this week&#39;s news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.djm.net.au/2015/02/key-rotation-in-openssh-68.html" rel="nofollow">Key rotation in OpenSSH 6.8</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> posted a new blog entry about one of the features in the upcoming OpenSSH 6.8</li>
<li>Times changes, key types change, problems are found with old algorithms and we switch to new ones</li>
<li>In OpenSSH (and the SSH protocol) however, there hasn&#39;t been an easy way to rotate host keys... until now</li>
<li>With this change, when you connect to a server, it will log <em>all</em> the server&#39;s public keys in your known_hosts file, instead of just the first one used during the key exchange</li>
<li>Keys that are in your known_hosts file but not on the server will get automatically removed</li>
<li>This fixes the problem of old servers still authenticating with ancient DSA or small RSA keys, as well as providing a way for the server to rotate keys every so often</li>
<li>There are some instructions in the blog post for how you&#39;ll be able to rotate host keys and eventually phase out the older ones - it&#39;s really simple</li>
<li>There are a lot of big changes coming in OpenSSH 6.8, so we&#39;ll be sure to cover them all when it&#39;s released
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/port-arm/2015/01/30/msg002809.html" rel="nofollow">NetBSD Banana Pi images</a></h3>

<ul>
<li>We&#39;ve talked about the <a href="http://www.bananapi.org/p/product.html" rel="nofollow">Banana Pi</a> a bit before - it&#39;s a small ARM board that&#39;s comparable to the popular Raspberry Pi</li>
<li>Some NetBSD -current images were posted on the mailing list, so now you can get some BSD action on one of these little devices</li>
<li>There are even a set of prebuilt pkgsrc packages, so you won&#39;t have to compile everything initially</li>
<li>The email includes some steps to get everything working and an overview of what comes with the image</li>
<li>Also check <a href="https://wiki.netbsd.org/ports/evbarm/allwinner/" rel="nofollow">the wiki page</a> for some related boards and further instructions on getting set up</li>
<li>On a related note, NetBSD also recently <a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_gpu_acceleration_in" rel="nofollow">got GPU acceleration working</a> for the Raspberry Pi (which is a first for their ARM port)
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142255048510669&w=2" rel="nofollow">LibreSSL shirts and other BSD goodies</a></h3>

<ul>
<li>If you&#39;ve been keeping up with the LibreSSL saga and want a shirt to show your support, they&#39;re finally available to buy online</li>
<li>There are two versions, either &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTLSSL.jpg" rel="nofollow">keep calm and use LibreSSL</a>&quot; or the slightly more snarky &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTOSSL.jpg" rel="nofollow">keep calm and abandon OpenSSL</a>&quot;</li>
<li>While on the topic, we thought it would be good to make people aware of shirts for other BSD projects too</li>
<li>You can get some FreeBSD, <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=pc-bsd" rel="nofollow">PCBSD</a> and FreeNAS <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=shirts" rel="nofollow">stuff</a> from the <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=tshirt" rel="nofollow">FreeBSD mall site</a></li>
<li>OpenBSD recently launched their <a href="https://www.openbsdstore.com" rel="nofollow">new store</a>, but the selection is still a bit limited right now</li>
<li>NetBSD has a <a href="https://www.netbsd.org/gallery/devotionalia.html#cafepress" rel="nofollow">couple places</a> where you can buy shirts and other apparel with the flag logo on it</li>
<li>We couldn&#39;t find any DragonFlyBSD shirts unfortunately, which is a shame since <a href="http://www.dragonflybsd.org/images/small_logo.png" rel="nofollow">their logo</a> is pretty cool</li>
<li>Profits from the sale of the gear go back to the projects, so pick up some swag and support your BSD of choice (and of course wear them at any Linux events you happen to go to)
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=35.0" rel="nofollow">OPNsense 15.1.4 released</a></h3>

<ul>
<li>The OPNsense guys have been hard at work since <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">we spoke to them</a>, fixing lots of bugs and keeping everything up to date</li>
<li>A number of versions have come out since then, with 15.1.4 being the latest (assuming they haven&#39;t updated it <strong>again</strong> by the time this airs)</li>
<li>This version includes the latest round of FreeBSD kernel security patches, as well as minor SSL and GUI fixes</li>
<li>They&#39;re doing a great job of getting upstream fixes pushed out to users quickly, a very welcome change</li>
<li>A developer has also posted an interesting write-up titled &quot;<a href="http://lastsummer.de/development-workflow-in-opnsense/" rel="nofollow">Development Workflow in OPNsense</a>&quot;</li>
<li>If any of our listeners are trying OPNsense as their gateway firewall, let us know how you like it
***</li>
</ul>

<h2>Interview - Ed Maste - <a href="mailto:board@freebsdfoundation.org" rel="nofollow">board@freebsdfoundation.org</a></h2>

<p><a href="https://www.freebsdfoundation.org/donate" rel="nofollow">The FreeBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/02/rolling-with-snapshots.html" rel="nofollow">Rolling with OpenBSD snapshots</a></h3>

<ul>
<li>One of the cool things about the -current branch of OpenBSD is that it doesn&#39;t require any compiling</li>
<li>There are signed binary snapshots being continuously re-rolled and posted on the FTP sites for every architecture</li>
<li>This provides an easy method to get onboard with the latest features, and you can also easily upgrade between them without reformatting or rebuilding</li>
<li>This blog post will walk you through the process of using snapshots to stay on the bleeding edge of OpenBSD goodness</li>
<li>After using -current for seven weeks, the author comes to the conclusion that it&#39;s not as unstable as people might think</li>
<li>He&#39;s now helping test out patches and new ports since he&#39;s running the same code as the developers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/tech-pkg/2015/02/02/msg014224.html" rel="nofollow">Signing pkgsrc packages</a></h3>

<ul>
<li>As of the time this show airs, the official <a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">pkgsrc</a> packages aren&#39;t cryptographically signed</li>
<li>Someone from Joyent has been working on that, since they&#39;d like to sign their pkgsrc packages for SmartOS</li>
<li>Using GNUPG pulled in a lot of dependencies, and they&#39;re trying to keep the bootstrapping process minimal</li>
<li>Instead, they&#39;re using netpgpverify, a fork of NetBSD&#39;s <a href="https://en.wikipedia.org/wiki/Netpgp" rel="nofollow">netpgp</a> utility</li>
<li>Maybe someday this will become the official way to sign packages in NetBSD?
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html" rel="nofollow">FreeBSD support model changes</a></h3>

<ul>
<li>Starting with 11.0-RELEASE, which won&#39;t be for a few months probably, FreeBSD releases are going to have a different support model</li>
<li>The plan is to move &quot;from a point release-based support model to a set of releases from a branch with a guaranteed support lifetime&quot;</li>
<li>There will now be a five-year lifespan for each major release, regardless of how many minor point releases it gets</li>
<li>This new model should reduce the turnaround time for errata and security patches, since there will be a lot less work involved to build and verify them</li>
<li>Lots more detail can be found in the mailing list post, including some important changes to the -STABLE branch, so give it a read
***</li>
</ul>

<h3><a href="http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.html" rel="nofollow">OpenSMTPD, Dovecot and SpamAssassin</a></h3>

<ul>
<li>We&#39;ve been talking about setting up your own BSD-based mail server on the last couple episodes</li>
<li>Here we have another post from a user setting up OpenSMTPD, including Dovecot for IMAP and SpamAssassin for spam filtering</li>
<li>A <strong>lot</strong> of people <a href="http://permalink.gmane.org/gmane.mail.opensmtpd.general/2265" rel="nofollow">regularly ask the developers</a> how to combine OpenSMTPD with spam filtering, and this post should finally reveal the dark secrets</li>
<li>In addition, it also covers SSL certificates, PKI and setting up MX records - some things that previous posts have lacked</li>
<li>Just be sure to replace those &quot;apt-get&quot; commands and &quot;eth0&quot; interface names with something a bit more sane…</li>
<li>In related news, OpenSMTPD has got some interesting new features <a href="http://article.gmane.org/gmane.mail.opensmtpd.general/2272" rel="nofollow">coming soon</a></li>
<li>They&#39;re also planning to <a href="https://github.com/OpenSMTPD/OpenSMTPD/issues/534" rel="nofollow">switch to LibreSSL by default</a> for the portable version
***</li>
</ul>

<h3><a href="http://lastsummer.de/freebsd-desktop-on-the-t400/" rel="nofollow">FreeBSD 10 on the Thinkpad T400</a></h3>

<ul>
<li>BSD laptop articles are becoming popular it seems - this one is about FreeBSD on a T400</li>
<li>Like most of the ones we&#39;ve mentioned before, it shows you how to get a BSD desktop set up with all the little tweaks you might not think to do</li>
<li>This one differs in that it takes a more minimal approach to graphics: instead of a full-featured environment like XFCE or KDE, it uses the i3 tiling window manager</li>
<li>If you&#39;re a commandline junkie that basically just uses X11 to run more than one terminal at once, this might be an ideal setup for you</li>
<li>The post also includes some bits about the DRM and KMS in the 10.x branch, as well as vt
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/1810/" rel="nofollow">PC-BSD 10.1.1 Released</a></h3>

<ul>
<li>Automatic background updater now in</li>
<li>Shiny new Qt5 utils</li>
<li>OVA files for VM’s</li>
<li>Full disk encryption with GELI v7
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2MsjllAyU" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s20eYELsAg" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s20Y2GN1az" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20ARVQ1T6" rel="nofollow">Sean writes in</a> (<a href="http://slexy.org/view/s212XezEYt" rel="nofollow">TJ&#39;s lengthy reply</a>)</li>
<li><a href="http://slexy.org/view/s2DRgEv4j8" rel="nofollow">Christopher writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264010.html" rel="nofollow">Special Instructions</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-users/2015/01/19/msg015669.html" rel="nofollow">Pretending to be a VT220</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we&#39;ll talk about what all they&#39;ve been up to lately. All this week&#39;s news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.djm.net.au/2015/02/key-rotation-in-openssh-68.html" rel="nofollow">Key rotation in OpenSSH 6.8</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> posted a new blog entry about one of the features in the upcoming OpenSSH 6.8</li>
<li>Times changes, key types change, problems are found with old algorithms and we switch to new ones</li>
<li>In OpenSSH (and the SSH protocol) however, there hasn&#39;t been an easy way to rotate host keys... until now</li>
<li>With this change, when you connect to a server, it will log <em>all</em> the server&#39;s public keys in your known_hosts file, instead of just the first one used during the key exchange</li>
<li>Keys that are in your known_hosts file but not on the server will get automatically removed</li>
<li>This fixes the problem of old servers still authenticating with ancient DSA or small RSA keys, as well as providing a way for the server to rotate keys every so often</li>
<li>There are some instructions in the blog post for how you&#39;ll be able to rotate host keys and eventually phase out the older ones - it&#39;s really simple</li>
<li>There are a lot of big changes coming in OpenSSH 6.8, so we&#39;ll be sure to cover them all when it&#39;s released
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/port-arm/2015/01/30/msg002809.html" rel="nofollow">NetBSD Banana Pi images</a></h3>

<ul>
<li>We&#39;ve talked about the <a href="http://www.bananapi.org/p/product.html" rel="nofollow">Banana Pi</a> a bit before - it&#39;s a small ARM board that&#39;s comparable to the popular Raspberry Pi</li>
<li>Some NetBSD -current images were posted on the mailing list, so now you can get some BSD action on one of these little devices</li>
<li>There are even a set of prebuilt pkgsrc packages, so you won&#39;t have to compile everything initially</li>
<li>The email includes some steps to get everything working and an overview of what comes with the image</li>
<li>Also check <a href="https://wiki.netbsd.org/ports/evbarm/allwinner/" rel="nofollow">the wiki page</a> for some related boards and further instructions on getting set up</li>
<li>On a related note, NetBSD also recently <a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_gpu_acceleration_in" rel="nofollow">got GPU acceleration working</a> for the Raspberry Pi (which is a first for their ARM port)
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142255048510669&w=2" rel="nofollow">LibreSSL shirts and other BSD goodies</a></h3>

<ul>
<li>If you&#39;ve been keeping up with the LibreSSL saga and want a shirt to show your support, they&#39;re finally available to buy online</li>
<li>There are two versions, either &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTLSSL.jpg" rel="nofollow">keep calm and use LibreSSL</a>&quot; or the slightly more snarky &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTOSSL.jpg" rel="nofollow">keep calm and abandon OpenSSL</a>&quot;</li>
<li>While on the topic, we thought it would be good to make people aware of shirts for other BSD projects too</li>
<li>You can get some FreeBSD, <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=pc-bsd" rel="nofollow">PCBSD</a> and FreeNAS <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=shirts" rel="nofollow">stuff</a> from the <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=tshirt" rel="nofollow">FreeBSD mall site</a></li>
<li>OpenBSD recently launched their <a href="https://www.openbsdstore.com" rel="nofollow">new store</a>, but the selection is still a bit limited right now</li>
<li>NetBSD has a <a href="https://www.netbsd.org/gallery/devotionalia.html#cafepress" rel="nofollow">couple places</a> where you can buy shirts and other apparel with the flag logo on it</li>
<li>We couldn&#39;t find any DragonFlyBSD shirts unfortunately, which is a shame since <a href="http://www.dragonflybsd.org/images/small_logo.png" rel="nofollow">their logo</a> is pretty cool</li>
<li>Profits from the sale of the gear go back to the projects, so pick up some swag and support your BSD of choice (and of course wear them at any Linux events you happen to go to)
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=35.0" rel="nofollow">OPNsense 15.1.4 released</a></h3>

<ul>
<li>The OPNsense guys have been hard at work since <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">we spoke to them</a>, fixing lots of bugs and keeping everything up to date</li>
<li>A number of versions have come out since then, with 15.1.4 being the latest (assuming they haven&#39;t updated it <strong>again</strong> by the time this airs)</li>
<li>This version includes the latest round of FreeBSD kernel security patches, as well as minor SSL and GUI fixes</li>
<li>They&#39;re doing a great job of getting upstream fixes pushed out to users quickly, a very welcome change</li>
<li>A developer has also posted an interesting write-up titled &quot;<a href="http://lastsummer.de/development-workflow-in-opnsense/" rel="nofollow">Development Workflow in OPNsense</a>&quot;</li>
<li>If any of our listeners are trying OPNsense as their gateway firewall, let us know how you like it
***</li>
</ul>

<h2>Interview - Ed Maste - <a href="mailto:board@freebsdfoundation.org" rel="nofollow">board@freebsdfoundation.org</a></h2>

<p><a href="https://www.freebsdfoundation.org/donate" rel="nofollow">The FreeBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/02/rolling-with-snapshots.html" rel="nofollow">Rolling with OpenBSD snapshots</a></h3>

<ul>
<li>One of the cool things about the -current branch of OpenBSD is that it doesn&#39;t require any compiling</li>
<li>There are signed binary snapshots being continuously re-rolled and posted on the FTP sites for every architecture</li>
<li>This provides an easy method to get onboard with the latest features, and you can also easily upgrade between them without reformatting or rebuilding</li>
<li>This blog post will walk you through the process of using snapshots to stay on the bleeding edge of OpenBSD goodness</li>
<li>After using -current for seven weeks, the author comes to the conclusion that it&#39;s not as unstable as people might think</li>
<li>He&#39;s now helping test out patches and new ports since he&#39;s running the same code as the developers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/tech-pkg/2015/02/02/msg014224.html" rel="nofollow">Signing pkgsrc packages</a></h3>

<ul>
<li>As of the time this show airs, the official <a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">pkgsrc</a> packages aren&#39;t cryptographically signed</li>
<li>Someone from Joyent has been working on that, since they&#39;d like to sign their pkgsrc packages for SmartOS</li>
<li>Using GNUPG pulled in a lot of dependencies, and they&#39;re trying to keep the bootstrapping process minimal</li>
<li>Instead, they&#39;re using netpgpverify, a fork of NetBSD&#39;s <a href="https://en.wikipedia.org/wiki/Netpgp" rel="nofollow">netpgp</a> utility</li>
<li>Maybe someday this will become the official way to sign packages in NetBSD?
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html" rel="nofollow">FreeBSD support model changes</a></h3>

<ul>
<li>Starting with 11.0-RELEASE, which won&#39;t be for a few months probably, FreeBSD releases are going to have a different support model</li>
<li>The plan is to move &quot;from a point release-based support model to a set of releases from a branch with a guaranteed support lifetime&quot;</li>
<li>There will now be a five-year lifespan for each major release, regardless of how many minor point releases it gets</li>
<li>This new model should reduce the turnaround time for errata and security patches, since there will be a lot less work involved to build and verify them</li>
<li>Lots more detail can be found in the mailing list post, including some important changes to the -STABLE branch, so give it a read
***</li>
</ul>

<h3><a href="http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.html" rel="nofollow">OpenSMTPD, Dovecot and SpamAssassin</a></h3>

<ul>
<li>We&#39;ve been talking about setting up your own BSD-based mail server on the last couple episodes</li>
<li>Here we have another post from a user setting up OpenSMTPD, including Dovecot for IMAP and SpamAssassin for spam filtering</li>
<li>A <strong>lot</strong> of people <a href="http://permalink.gmane.org/gmane.mail.opensmtpd.general/2265" rel="nofollow">regularly ask the developers</a> how to combine OpenSMTPD with spam filtering, and this post should finally reveal the dark secrets</li>
<li>In addition, it also covers SSL certificates, PKI and setting up MX records - some things that previous posts have lacked</li>
<li>Just be sure to replace those &quot;apt-get&quot; commands and &quot;eth0&quot; interface names with something a bit more sane…</li>
<li>In related news, OpenSMTPD has got some interesting new features <a href="http://article.gmane.org/gmane.mail.opensmtpd.general/2272" rel="nofollow">coming soon</a></li>
<li>They&#39;re also planning to <a href="https://github.com/OpenSMTPD/OpenSMTPD/issues/534" rel="nofollow">switch to LibreSSL by default</a> for the portable version
***</li>
</ul>

<h3><a href="http://lastsummer.de/freebsd-desktop-on-the-t400/" rel="nofollow">FreeBSD 10 on the Thinkpad T400</a></h3>

<ul>
<li>BSD laptop articles are becoming popular it seems - this one is about FreeBSD on a T400</li>
<li>Like most of the ones we&#39;ve mentioned before, it shows you how to get a BSD desktop set up with all the little tweaks you might not think to do</li>
<li>This one differs in that it takes a more minimal approach to graphics: instead of a full-featured environment like XFCE or KDE, it uses the i3 tiling window manager</li>
<li>If you&#39;re a commandline junkie that basically just uses X11 to run more than one terminal at once, this might be an ideal setup for you</li>
<li>The post also includes some bits about the DRM and KMS in the 10.x branch, as well as vt
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/1810/" rel="nofollow">PC-BSD 10.1.1 Released</a></h3>

<ul>
<li>Automatic background updater now in</li>
<li>Shiny new Qt5 utils</li>
<li>OVA files for VM’s</li>
<li>Full disk encryption with GELI v7
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2MsjllAyU" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s20eYELsAg" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s20Y2GN1az" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20ARVQ1T6" rel="nofollow">Sean writes in</a> (<a href="http://slexy.org/view/s212XezEYt" rel="nofollow">TJ&#39;s lengthy reply</a>)</li>
<li><a href="http://slexy.org/view/s2DRgEv4j8" rel="nofollow">Christopher writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264010.html" rel="nofollow">Special Instructions</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-users/2015/01/19/msg015669.html" rel="nofollow">Pretending to be a VT220</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>54: Luminary Environment</title>
  <link>https://www.bsdnow.tv/54</link>
  <guid isPermaLink="false">c6ff3386-0834-4798-809e-dd4917c5bc7b</guid>
  <pubDate>Wed, 10 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c6ff3386-0834-4798-809e-dd4917c5bc7b.mp3" length="56630740" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, it's all about Lumina. We'll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There's also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, it's all about Lumina. We'll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There's also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Portscout ported to OpenBSD (http://blog.jasper.la/portscout-for-openbsd/)
Portscout is a popular utility used in the FreeBSD ports infrastructure
It lets port maintainers know when there's a new version of the upstream software available by automatically checking the distfile mirror
Now OpenBSD porters can enjoy the same convenience, as it's been ported over
You can view the status online (http://portscout.jasper.la/) to see how it works and who maintains what (http://portscout.jasper.la/index-total.html)
The developer who ported it is working to get all the current features working on OpenBSD, and added a few new features as well
He decided to fork and rename it (https://jasperla.github.io/portroach/) a few days later
***
Sysadmins and systemd refugees flocking to BSD (https://www.reddit.com/r/freebsd/comments/2fgb90/you_have_your_windows_in_my_linux_or_why_many/)
With all the drama in Linux land about the rapid changes to their init system, a lot of people are looking at BSD alternatives
This "you got your Windows in my Linux (http://www.infoworld.com/d/data-center/you-have-your-windows-in-my-linux-249483)" article (and accompanying comments) give a nice glimpse into the minds of some of those switchers
Both server administrators and regular everyday users are switching away from Linux, as more and more distros give them no choice but to use systemd
Fortunately, the BSD communities are usually very welcoming of switchers - it's pretty nice on this side!
***
OpenBSD's versioning schemes (http://www.tedunangst.com/flak/post/OpenBSD-version-numbers)
Ted Unangst explains the various versioning systems within OpenBSD, from the base to libraries to other included software
In contrast to FreeBSD's release cycle, OpenBSD isn't as concerned with breaking backwards compatibility (but only if it's needed to make progress)
This allows them to innovate and introduce new features a lot more easily, and get those features in a stable release that everyone uses
He also details the difference between branches, their errata system and lack of "patch levels" for security
Some other things in OpenBSD don't have version numbers at all, like tmux
"Every release adds some new features, fixes some old bugs, probably adds a new bug or two, and, if I have anything to say about it, removes some old features."
***
VAXstation 4000 Model 90 booting NetBSD (https://www.youtube.com/watch?v=zLsgFPaMPyg)
We found a video of NetBSD booting on a 22 year old VAX workstation, circa 1992
This system has a monstrous 71 MHz CPU and 128MB of ECC RAM
It continues in part two (https://www.youtube.com/watch?v=YKzDXKmn66U), where we learn that it would've cost around $25,000 when it was released!
The uploader talks about his experiences getting NetBSD on it, what does and doesn't work, etc
It's interesting to see that such old hardware isn't necessarily obsolete just because newer things have come out since then (but maybe don't try to build world on it...)
***
Interview - Ken Moore - ken@pcbsd.org (mailto:ken@pcbsd.org)
The Lumina desktop environment
Special segment
Lumina walkthrough
News Roundup
Suricata for IDS on pfSense (http://pfsensesetup.com/suricata-intrusion-detection-system-part-one)
While most people are familiar with Snort as an intrusion detection system, Suricata is another choice
This guide goes through the steps of installing and configuring it on a public-facing pfSense box
Part two (http://pfsensesetup.com/suricata-intrusion-detection-system-part-two/) details some of the configuration steps
One other cool thing about Suricata - it's compatible with Snort rules, so you can use the same updates
There's also another recent post (http://www.allamericancomputerrepair.com/Blog/Post/29/Install-Snort-on-FreeBSD) about snort as well, if that's more your style
If you run pfSense (or any BSD) as an edge router for a lot of users, this might be worth looking into
***
OpenBSD's systemd API emulation project (http://bsd.slashdot.org/story/14/09/08/0250207/gsoc-project-works-to-emulate-systemd-for-openbsd)
This story was pretty popular in the mainstream news this week
For the Google Summer of Code, a student is writing emulation wrappers for some of systemd's functions (https://twitter.com/blakkheim/status/509092821773848577)
There was consideration from some Linux users to port over the finished emulation back to Linux, so they wouldn't have to run the full systemd
One particularly interesting Slashdot comment snippet (http://bsd.slashdot.org/comments.pl?sid=5663319&amp;amp;cid=47851361): "We are currently migrating a large number (much larger than planned after initial results) of systems from RHEL to BSD - a decision taken due to general unhappiness with RHEL6, but SystemD pushed us towards BSD rather than another Linux distro - and in some cases are seeing throughput gains of greater than 10% on what should be equivalent Linux and BSD server builds. The re-learning curve wasn't as steep as we expected, general system stability seems to be better too, and BSD's security reputation goes without saying."
It will NOT be in the base system - only in ports, and only installed as a dependency for things like newer GNOME (http://blogs.gnome.org/ovitters/2014/09/07/systemd-in-gnome-3-14-and-beyond/) that require such APIs
In the long run, BSD will still be safe from systemd's reign of terror, but will hopefully still be compatible with some third party packages like GNOME that insist on using it
***
GhostBSD 4 previewed (http://www.linuxbsdos.com/2014/05/19/preview-of-ghostbsd-4-0/)
The GhostBSD project is moving along, slowly getting closer to the 4 release
This article shows some of the progress made, and includes lots of screenshots and interesting graphical frontends
If you're not too familiar with GhostBSD, we interviewed the lead developer (http://www.bsdnow.tv/episodes/2014_03_12-ghost_of_partition) a little while back
***
NetBSD on the Banana Pi (http://rizzoandself.blogspot.com/2014/09/netbsd-on-banana-pi.html)
The Banana Pi is a tasty alternative to the Raspberry Pi, with similar hardware specs
In this blog post, a NetBSD developer details his experiences in getting NetBSD to run on it
After studying how the prebuilt Linux image booted, he made some notes and started hacking
Ethernet, one of the few things not working, is being looked into and he's hoping to get it fully supported for the upcoming NetBSD 7.0
They're only about $65 as of the time we're recording this, so it might be a fun project to try
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s28iKdBEbm)
Garegin writes in (http://slexy.org/view/s21Wfnv87h)
Erno writes in (http://slexy.org/view/s2Fzryxhdz)
Brandon writes in (http://slexy.org/view/s2ILcqdFfF)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, lumina, desktop environment, window manager, graphical user interface, tiling, floating, gnome3, kde5, kde4, qt5, banana pi, raspberry pi, portscout, vax, vaxstation, linux vs bsd, systemd, portroach, ids, suricata</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, it&#39;s all about Lumina. We&#39;ll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There&#39;s also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.jasper.la/portscout-for-openbsd/" rel="nofollow">Portscout ported to OpenBSD</a></h3>

<ul>
<li>Portscout is a popular utility used in the FreeBSD ports infrastructure</li>
<li>It lets port maintainers know when there&#39;s a new version of the upstream software available by automatically checking the distfile mirror</li>
<li>Now OpenBSD porters can enjoy the same convenience, as it&#39;s been ported over</li>
<li>You can view the status <a href="http://portscout.jasper.la/" rel="nofollow">online</a> to see how it works and <a href="http://portscout.jasper.la/index-total.html" rel="nofollow">who maintains what</a></li>
<li>The developer who ported it is working to get all the current features working on OpenBSD, and added a few new features as well</li>
<li>He decided to <a href="https://jasperla.github.io/portroach/" rel="nofollow">fork and rename it</a> a few days later
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2fgb90/you_have_your_windows_in_my_linux_or_why_many/" rel="nofollow">Sysadmins and systemd refugees flocking to BSD</a></h3>

<ul>
<li>With all the drama in Linux land about the rapid changes to their init system, a lot of people are looking at BSD alternatives</li>
<li>This &quot;<a href="http://www.infoworld.com/d/data-center/you-have-your-windows-in-my-linux-249483" rel="nofollow">you got your Windows in my Linux</a>&quot; article (and accompanying comments) give a nice glimpse into the minds of some of those switchers</li>
<li>Both server administrators and regular everyday users are switching away from Linux, as more and more distros give them no choice but to use systemd</li>
<li>Fortunately, the BSD communities are usually very welcoming of switchers - it&#39;s pretty nice on this side!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-version-numbers" rel="nofollow">OpenBSD&#39;s versioning schemes</a></h3>

<ul>
<li>Ted Unangst explains the various versioning systems within OpenBSD, from the base to libraries to other included software</li>
<li>In contrast to FreeBSD&#39;s release cycle, OpenBSD isn&#39;t as concerned with breaking backwards compatibility (but only if it&#39;s needed to make progress)</li>
<li>This allows them to innovate and introduce new features a lot more easily, and get those features in a stable release that everyone uses</li>
<li>He also details the difference between branches, their errata system and lack of &quot;patch levels&quot; for security</li>
<li>Some other things in OpenBSD don&#39;t have version numbers at all, like tmux</li>
<li>&quot;Every release adds some new features, fixes some old bugs, probably adds a new bug or two, and, if I have anything to say about it, removes some old features.&quot;
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=zLsgFPaMPyg" rel="nofollow">VAXstation 4000 Model 90 booting NetBSD</a></h3>

<ul>
<li>We found a video of NetBSD booting on a 22 year old VAX workstation, circa 1992</li>
<li>This system has a monstrous 71 MHz CPU and 128MB of ECC RAM</li>
<li>It <a href="https://www.youtube.com/watch?v=YKzDXKmn66U" rel="nofollow">continues in part two</a>, where we learn that it would&#39;ve cost around $25,000 when it was released!</li>
<li>The uploader talks about his experiences getting NetBSD on it, what does and doesn&#39;t work, etc</li>
<li>It&#39;s interesting to see that such old hardware isn&#39;t necessarily obsolete just because newer things have come out since then (but maybe don&#39;t try to build world on it...)
***</li>
</ul>

<h2>Interview - Ken Moore - <a href="mailto:ken@pcbsd.org" rel="nofollow">ken@pcbsd.org</a></h2>

<p>The Lumina desktop environment</p>

<hr>

<h2>Special segment</h2>

<h3>Lumina walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-one" rel="nofollow">Suricata for IDS on pfSense</a></h3>

<ul>
<li>While most people are familiar with Snort as an intrusion detection system, Suricata is another choice</li>
<li>This guide goes through the steps of installing and configuring it on a public-facing pfSense box</li>
<li><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-two/" rel="nofollow">Part two</a> details some of the configuration steps</li>
<li>One other cool thing about Suricata - it&#39;s compatible with Snort rules, so you can use the same updates</li>
<li>There&#39;s also <a href="http://www.allamericancomputerrepair.com/Blog/Post/29/Install-Snort-on-FreeBSD" rel="nofollow">another recent post</a> about snort as well, if that&#39;s more your style</li>
<li>If you run pfSense (or any BSD) as an edge router for a lot of users, this might be worth looking into
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/14/09/08/0250207/gsoc-project-works-to-emulate-systemd-for-openbsd" rel="nofollow">OpenBSD&#39;s systemd API emulation project</a></h3>

<ul>
<li>This story was pretty popular in the mainstream news this week</li>
<li>For the Google Summer of Code, a student is writing emulation wrappers for some of <a href="https://twitter.com/blakkheim/status/509092821773848577" rel="nofollow">systemd&#39;s functions</a></li>
<li>There was consideration from some Linux users to port over the finished emulation back to Linux, so they wouldn&#39;t have to run the full systemd</li>
<li>One particularly interesting Slashdot comment <a href="http://bsd.slashdot.org/comments.pl?sid=5663319&cid=47851361" rel="nofollow">snippet</a>: &quot;We are currently migrating a large number (much larger than planned after initial results) of systems from RHEL to BSD - a decision taken due to general unhappiness with RHEL6, but SystemD pushed us towards BSD rather than another Linux distro - and in some cases are seeing throughput gains of greater than 10% on what should be equivalent Linux and BSD server builds. The re-learning curve wasn&#39;t as steep as we expected, general system stability seems to be better too, and BSD&#39;s security reputation goes without saying.&quot;</li>
<li>It will NOT be in the base system - only in ports, and only installed as a dependency for things like <a href="http://blogs.gnome.org/ovitters/2014/09/07/systemd-in-gnome-3-14-and-beyond/" rel="nofollow">newer GNOME</a> that require such APIs</li>
<li>In the long run, BSD will still be safe from systemd&#39;s reign of terror, but will hopefully still be compatible with some third party packages like GNOME that insist on using it
***</li>
</ul>

<h3><a href="http://www.linuxbsdos.com/2014/05/19/preview-of-ghostbsd-4-0/" rel="nofollow">GhostBSD 4 previewed</a></h3>

<ul>
<li>The GhostBSD project is moving along, slowly getting closer to the 4 release</li>
<li>This article shows some of the progress made, and includes lots of screenshots and interesting graphical frontends</li>
<li>If you&#39;re not too familiar with GhostBSD, we <a href="http://www.bsdnow.tv/episodes/2014_03_12-ghost_of_partition" rel="nofollow">interviewed the lead developer</a> a little while back
***</li>
</ul>

<h3><a href="http://rizzoandself.blogspot.com/2014/09/netbsd-on-banana-pi.html" rel="nofollow">NetBSD on the Banana Pi</a></h3>

<ul>
<li>The Banana Pi is a tasty alternative to the Raspberry Pi, with similar hardware specs</li>
<li>In this blog post, a NetBSD developer details his experiences in getting NetBSD to run on it</li>
<li>After studying how the prebuilt Linux image booted, he made some notes and started hacking</li>
<li>Ethernet, one of the few things not working, is being looked into and he&#39;s hoping to get it fully supported for the upcoming NetBSD 7.0</li>
<li>They&#39;re only about $65 as of the time we&#39;re recording this, so it might be a fun project to try
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28iKdBEbm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21Wfnv87h" rel="nofollow">Garegin writes in</a></li>
<li><a href="http://slexy.org/view/s2Fzryxhdz" rel="nofollow">Erno writes in</a></li>
<li><a href="http://slexy.org/view/s2ILcqdFfF" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, it&#39;s all about Lumina. We&#39;ll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There&#39;s also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.jasper.la/portscout-for-openbsd/" rel="nofollow">Portscout ported to OpenBSD</a></h3>

<ul>
<li>Portscout is a popular utility used in the FreeBSD ports infrastructure</li>
<li>It lets port maintainers know when there&#39;s a new version of the upstream software available by automatically checking the distfile mirror</li>
<li>Now OpenBSD porters can enjoy the same convenience, as it&#39;s been ported over</li>
<li>You can view the status <a href="http://portscout.jasper.la/" rel="nofollow">online</a> to see how it works and <a href="http://portscout.jasper.la/index-total.html" rel="nofollow">who maintains what</a></li>
<li>The developer who ported it is working to get all the current features working on OpenBSD, and added a few new features as well</li>
<li>He decided to <a href="https://jasperla.github.io/portroach/" rel="nofollow">fork and rename it</a> a few days later
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2fgb90/you_have_your_windows_in_my_linux_or_why_many/" rel="nofollow">Sysadmins and systemd refugees flocking to BSD</a></h3>

<ul>
<li>With all the drama in Linux land about the rapid changes to their init system, a lot of people are looking at BSD alternatives</li>
<li>This &quot;<a href="http://www.infoworld.com/d/data-center/you-have-your-windows-in-my-linux-249483" rel="nofollow">you got your Windows in my Linux</a>&quot; article (and accompanying comments) give a nice glimpse into the minds of some of those switchers</li>
<li>Both server administrators and regular everyday users are switching away from Linux, as more and more distros give them no choice but to use systemd</li>
<li>Fortunately, the BSD communities are usually very welcoming of switchers - it&#39;s pretty nice on this side!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-version-numbers" rel="nofollow">OpenBSD&#39;s versioning schemes</a></h3>

<ul>
<li>Ted Unangst explains the various versioning systems within OpenBSD, from the base to libraries to other included software</li>
<li>In contrast to FreeBSD&#39;s release cycle, OpenBSD isn&#39;t as concerned with breaking backwards compatibility (but only if it&#39;s needed to make progress)</li>
<li>This allows them to innovate and introduce new features a lot more easily, and get those features in a stable release that everyone uses</li>
<li>He also details the difference between branches, their errata system and lack of &quot;patch levels&quot; for security</li>
<li>Some other things in OpenBSD don&#39;t have version numbers at all, like tmux</li>
<li>&quot;Every release adds some new features, fixes some old bugs, probably adds a new bug or two, and, if I have anything to say about it, removes some old features.&quot;
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=zLsgFPaMPyg" rel="nofollow">VAXstation 4000 Model 90 booting NetBSD</a></h3>

<ul>
<li>We found a video of NetBSD booting on a 22 year old VAX workstation, circa 1992</li>
<li>This system has a monstrous 71 MHz CPU and 128MB of ECC RAM</li>
<li>It <a href="https://www.youtube.com/watch?v=YKzDXKmn66U" rel="nofollow">continues in part two</a>, where we learn that it would&#39;ve cost around $25,000 when it was released!</li>
<li>The uploader talks about his experiences getting NetBSD on it, what does and doesn&#39;t work, etc</li>
<li>It&#39;s interesting to see that such old hardware isn&#39;t necessarily obsolete just because newer things have come out since then (but maybe don&#39;t try to build world on it...)
***</li>
</ul>

<h2>Interview - Ken Moore - <a href="mailto:ken@pcbsd.org" rel="nofollow">ken@pcbsd.org</a></h2>

<p>The Lumina desktop environment</p>

<hr>

<h2>Special segment</h2>

<h3>Lumina walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-one" rel="nofollow">Suricata for IDS on pfSense</a></h3>

<ul>
<li>While most people are familiar with Snort as an intrusion detection system, Suricata is another choice</li>
<li>This guide goes through the steps of installing and configuring it on a public-facing pfSense box</li>
<li><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-two/" rel="nofollow">Part two</a> details some of the configuration steps</li>
<li>One other cool thing about Suricata - it&#39;s compatible with Snort rules, so you can use the same updates</li>
<li>There&#39;s also <a href="http://www.allamericancomputerrepair.com/Blog/Post/29/Install-Snort-on-FreeBSD" rel="nofollow">another recent post</a> about snort as well, if that&#39;s more your style</li>
<li>If you run pfSense (or any BSD) as an edge router for a lot of users, this might be worth looking into
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/14/09/08/0250207/gsoc-project-works-to-emulate-systemd-for-openbsd" rel="nofollow">OpenBSD&#39;s systemd API emulation project</a></h3>

<ul>
<li>This story was pretty popular in the mainstream news this week</li>
<li>For the Google Summer of Code, a student is writing emulation wrappers for some of <a href="https://twitter.com/blakkheim/status/509092821773848577" rel="nofollow">systemd&#39;s functions</a></li>
<li>There was consideration from some Linux users to port over the finished emulation back to Linux, so they wouldn&#39;t have to run the full systemd</li>
<li>One particularly interesting Slashdot comment <a href="http://bsd.slashdot.org/comments.pl?sid=5663319&cid=47851361" rel="nofollow">snippet</a>: &quot;We are currently migrating a large number (much larger than planned after initial results) of systems from RHEL to BSD - a decision taken due to general unhappiness with RHEL6, but SystemD pushed us towards BSD rather than another Linux distro - and in some cases are seeing throughput gains of greater than 10% on what should be equivalent Linux and BSD server builds. The re-learning curve wasn&#39;t as steep as we expected, general system stability seems to be better too, and BSD&#39;s security reputation goes without saying.&quot;</li>
<li>It will NOT be in the base system - only in ports, and only installed as a dependency for things like <a href="http://blogs.gnome.org/ovitters/2014/09/07/systemd-in-gnome-3-14-and-beyond/" rel="nofollow">newer GNOME</a> that require such APIs</li>
<li>In the long run, BSD will still be safe from systemd&#39;s reign of terror, but will hopefully still be compatible with some third party packages like GNOME that insist on using it
***</li>
</ul>

<h3><a href="http://www.linuxbsdos.com/2014/05/19/preview-of-ghostbsd-4-0/" rel="nofollow">GhostBSD 4 previewed</a></h3>

<ul>
<li>The GhostBSD project is moving along, slowly getting closer to the 4 release</li>
<li>This article shows some of the progress made, and includes lots of screenshots and interesting graphical frontends</li>
<li>If you&#39;re not too familiar with GhostBSD, we <a href="http://www.bsdnow.tv/episodes/2014_03_12-ghost_of_partition" rel="nofollow">interviewed the lead developer</a> a little while back
***</li>
</ul>

<h3><a href="http://rizzoandself.blogspot.com/2014/09/netbsd-on-banana-pi.html" rel="nofollow">NetBSD on the Banana Pi</a></h3>

<ul>
<li>The Banana Pi is a tasty alternative to the Raspberry Pi, with similar hardware specs</li>
<li>In this blog post, a NetBSD developer details his experiences in getting NetBSD to run on it</li>
<li>After studying how the prebuilt Linux image booted, he made some notes and started hacking</li>
<li>Ethernet, one of the few things not working, is being looked into and he&#39;s hoping to get it fully supported for the upcoming NetBSD 7.0</li>
<li>They&#39;re only about $65 as of the time we&#39;re recording this, so it might be a fun project to try
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28iKdBEbm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21Wfnv87h" rel="nofollow">Garegin writes in</a></li>
<li><a href="http://slexy.org/view/s2Fzryxhdz" rel="nofollow">Erno writes in</a></li>
<li><a href="http://slexy.org/view/s2ILcqdFfF" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
