<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 08 Mar 2026 22:08:13 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Browser”</title>
    <link>https://www.bsdnow.tv/tags/browser</link>
    <pubDate>Thu, 23 Jan 2025 08:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>595: Arc: the Triumph</title>
  <link>https://www.bsdnow.tv/595</link>
  <guid isPermaLink="false">2773a8f7-f763-4055-a36b-f722e1b273e6</guid>
  <pubDate>Thu, 23 Jan 2025 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2773a8f7-f763-4055-a36b-f722e1b273e6.mp3" length="104050944" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Applying the ARC Algorithm to the ARC, Advancing Cloud Native Containers on FreeBSD: Podman Testing Highlights, Running Web Browsers in FreeBSD Jail, Fixing pf not allowing IPv6 traffic on FreeBSD, Minitel: The Online World France Built Before the Web, Why Google Stores Billions of Lines of Code in a Single Repository, and more</itunes:subtitle>
  <itunes:duration>1:48:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Applying the ARC Algorithm to the ARC, Advancing Cloud Native Containers on FreeBSD: Podman Testing Highlights, Running Web Browsers in FreeBSD Jail, Fixing pf not allowing IPv6 traffic on FreeBSD, Minitel: The Online World France Built Before the Web, Why Google Stores Billions of Lines of Code in a Single Repository, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Applying the ARC Algorithm to the ARC (https://klarasystems.com/articles/applying-the-arc-algorithm-to-the-arc/?utm_source=BSD%20Now&amp;amp;utm_medium=Podcast)
Advancing Cloud Native Containers on FreeBSD: Podman Testing Highlights (https://freebsdfoundation.org/blog/advancing-cloud-native-containers-on-freebsd-podman-testing-highlights/)
News Roundup
Running Web Browsers in FreeBSD Jail (https://tumfatig.net/2024/running-web-browsers-in-freebsd-jail/)
Fixing pf not allowing IPv6 traffic on FreeBSD (https://www.ncartron.org/fixing-pf-not-allowing-ipv6-traffic-on-freebsd.html)
Minitel: The Online World France Built Before the Web (https://spectrum.ieee.org/minitel-the-online-world-france-built-before-the-web)
Why Google Stores Billions of Lines of Code in a Single Repository (https://cacm.acm.org/research/why-google-stores-billions-of-lines-of-code-in-a-single-repository/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Sam - EDR Support (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/595/feedback/Sam%20-%20EDR%20Support.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, arc, adaptive replacement cache, Algorithm, cloud native, Containers, podman, testing, browser, jailed browser, pf, packet filter, firewall, ipv6 traffic, minitel, france, google inc. repository</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Applying the ARC Algorithm to the ARC, Advancing Cloud Native Containers on FreeBSD: Podman Testing Highlights, Running Web Browsers in FreeBSD Jail, Fixing pf not allowing IPv6 traffic on FreeBSD, Minitel: The Online World France Built Before the Web, Why Google Stores Billions of Lines of Code in a Single Repository, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/applying-the-arc-algorithm-to-the-arc/?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Applying the ARC Algorithm to the ARC</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/advancing-cloud-native-containers-on-freebsd-podman-testing-highlights/" rel="nofollow">Advancing Cloud Native Containers on FreeBSD: Podman Testing Highlights</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://tumfatig.net/2024/running-web-browsers-in-freebsd-jail/" rel="nofollow">Running Web Browsers in FreeBSD Jail</a></p>

<hr>

<p><a href="https://www.ncartron.org/fixing-pf-not-allowing-ipv6-traffic-on-freebsd.html" rel="nofollow">Fixing pf not allowing IPv6 traffic on FreeBSD</a></p>

<hr>

<p><a href="https://spectrum.ieee.org/minitel-the-online-world-france-built-before-the-web" rel="nofollow">Minitel: The Online World France Built Before the Web</a></p>

<hr>

<p><a href="https://cacm.acm.org/research/why-google-stores-billions-of-lines-of-code-in-a-single-repository/" rel="nofollow">Why Google Stores Billions of Lines of Code in a Single Repository</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/595/feedback/Sam%20-%20EDR%20Support.md" rel="nofollow">Sam - EDR Support</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Applying the ARC Algorithm to the ARC, Advancing Cloud Native Containers on FreeBSD: Podman Testing Highlights, Running Web Browsers in FreeBSD Jail, Fixing pf not allowing IPv6 traffic on FreeBSD, Minitel: The Online World France Built Before the Web, Why Google Stores Billions of Lines of Code in a Single Repository, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/applying-the-arc-algorithm-to-the-arc/?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Applying the ARC Algorithm to the ARC</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/advancing-cloud-native-containers-on-freebsd-podman-testing-highlights/" rel="nofollow">Advancing Cloud Native Containers on FreeBSD: Podman Testing Highlights</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://tumfatig.net/2024/running-web-browsers-in-freebsd-jail/" rel="nofollow">Running Web Browsers in FreeBSD Jail</a></p>

<hr>

<p><a href="https://www.ncartron.org/fixing-pf-not-allowing-ipv6-traffic-on-freebsd.html" rel="nofollow">Fixing pf not allowing IPv6 traffic on FreeBSD</a></p>

<hr>

<p><a href="https://spectrum.ieee.org/minitel-the-online-world-france-built-before-the-web" rel="nofollow">Minitel: The Online World France Built Before the Web</a></p>

<hr>

<p><a href="https://cacm.acm.org/research/why-google-stores-billions-of-lines-of-code-in-a-single-repository/" rel="nofollow">Why Google Stores Billions of Lines of Code in a Single Repository</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/595/feedback/Sam%20-%20EDR%20Support.md" rel="nofollow">Sam - EDR Support</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>359: Throwaway Browser</title>
  <link>https://www.bsdnow.tv/359</link>
  <guid isPermaLink="false">b066740d-03a5-423b-9ab9-8936c3246979</guid>
  <pubDate>Thu, 16 Jul 2020 07:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b066740d-03a5-423b-9ab9-8936c3246979.mp3" length="44787992" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Throw-Away Browser on FreeBSD With "pot" within 5 minutes, OmniOS as OpenBSD guest with bhyve, BSD vs Linux distro development, My FreeBSD Laptop Build, FreeBSD CURRENT Binary Upgrades, and more.</itunes:subtitle>
  <itunes:duration>43:25</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Throw-Away Browser on FreeBSD With "pot" within 5 minutes, OmniOS as OpenBSD guest with bhyve, BSD vs Linux distro development, My FreeBSD Laptop Build, FreeBSD CURRENT Binary Upgrades, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/)
Headlines
Throw-Away Browser on FreeBSD With "pot" Within 5 Minutes (https://honeyguide.eu/posts/pot-throwaway-firefox/)
pot is a great and relatively new jail management tool. It offers DevOps style provisioning and can even be used to provide Docker-like, scalable cloud services together with nomad and consul (more about this in Orchestrating jails with nomad and pot).
OpenBSD guest with bhyve - OmniOS (https://www.pbdigital.org/omniosce/bhyve/openbsd/2020/06/08/bhyve-zones-omnios.html)
Today I will be creating a OpenBSD guest via bhyve on OmniOS. I will also be adding a Pass Through Ethernet Controller so I can have a multi-homed guest that will serve as a firewall/router.
This post will cover setting up bhyve on OmniOS, so it will also be a good introduction to bhyve. As well, I look into OpenBSD’s uEFI boot loader so if you have had trouble with this, then you are in the right place.
News Roundup
BSD versus Linux distribution development (https://distrowatch.com/weekly.php?issue=20200622#qa)
Q: Comparing-apples-to-BSDs asks: I was reading one of the old articles from the archive. One of the things mentioned was how the BSDs have a distinct approach in terms of packaging the base system relative to userland apps, and that the Linux distros at the time were not following the same practice. Are there Linux distros that have adopted the same approach in modern times? If not, are there technical limitations that are preventing them from doing so, such as some distros supporting multiple kernel versions maybe?
DistroWatch answers: In the article mentioned above, I made the observation that Linux distributions tend to take one of two approaches when it comes to packaging software. Generally a Linux distribution will either offer a rolling release, where virtually all packages are regularly upgraded to their latest stable releases, or a fixed release where almost all packages are kept at a set version number and only receive bug fixes for the life cycle of the distribution. Projects like Arch Linux and Void are popular examples of rolling, always-up-to-date distributions while Fedora and Ubuntu offer fixed platforms.
My FreeBSD Laptop Build (https://corrupted.io/2020/06/21/my-freebsd-laptop-build.html)
I have always liked Thinkpad hardware and when I started to do more commuting I decided I needed something that had a decent sized screen but fit well on a bus. Luckily about this time Lenovo gave me a nice gift in the Thinkpad X390. Its basically the famous X2xx series but with a 13” screen and smaller bezel.
So with this laptop I figured it was time to actually put the docs together on how I got my FreeBSD workstation working on it. I will here in the near future have another post that will cover this for HardenedBSD as well since the steps are similar but have a few extra gotchas due to the extra hardening.
FreeBSD CURRENT Binary Upgrades (http://up.bsd.lv)
Disclaimer
This proof-of-concept is not a publication of FreeBSD.
Description
up.bsd.lv is a proof-of-concept of binary updates for FreeBSD/amd64 CURRENT/HEAD to facilitate the exhaustive testing of FreeBSD and the bhyve hypervisor and OpenZFS 2.0 specifically. Updates are based on the SVN revisions of official FreeBSD Release Engineering bi-monthly snapshots.
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Karl - pfsense (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Karl%20-%20pfsense.md)
Val - esxi question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Val%20-%20esxi%20question.md)
lars - openbsd router hardware (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/lars%20-%20openbsd%20router%20hardware.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, zfs, interview, browser, throw-away, throw away, pot, omnios, vm, guest, virtualization, bhyve, linux, development, distribution, laptop, binary upgrades</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Throw-Away Browser on FreeBSD With &quot;pot&quot; within 5 minutes, OmniOS as OpenBSD guest with bhyve, BSD vs Linux distro development, My FreeBSD Laptop Build, FreeBSD CURRENT Binary Upgrades, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://honeyguide.eu/posts/pot-throwaway-firefox/" rel="nofollow">Throw-Away Browser on FreeBSD With &quot;pot&quot; Within 5 Minutes</a></h3>

<blockquote>
<p>pot is a great and relatively new jail management tool. It offers DevOps style provisioning and can even be used to provide Docker-like, scalable cloud services together with nomad and consul (more about this in Orchestrating jails with nomad and pot).</p>
</blockquote>

<hr>

<h3><a href="https://www.pbdigital.org/omniosce/bhyve/openbsd/2020/06/08/bhyve-zones-omnios.html" rel="nofollow">OpenBSD guest with bhyve - OmniOS</a></h3>

<blockquote>
<p>Today I will be creating a OpenBSD guest via bhyve on OmniOS. I will also be adding a Pass Through Ethernet Controller so I can have a multi-homed guest that will serve as a firewall/router.<br>
This post will cover setting up bhyve on OmniOS, so it will also be a good introduction to bhyve. As well, I look into OpenBSD’s uEFI boot loader so if you have had trouble with this, then you are in the right place.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20200622#qa" rel="nofollow">BSD versus Linux distribution development</a></h3>

<blockquote>
<p>Q: Comparing-apples-to-BSDs asks: I was reading one of the old articles from the archive. One of the things mentioned was how the BSDs have a distinct approach in terms of packaging the base system relative to userland apps, and that the Linux distros at the time were not following the same practice. Are there Linux distros that have adopted the same approach in modern times? If not, are there technical limitations that are preventing them from doing so, such as some distros supporting multiple kernel versions maybe?<br>
DistroWatch answers: In the article mentioned above, I made the observation that Linux distributions tend to take one of two approaches when it comes to packaging software. Generally a Linux distribution will either offer a rolling release, where virtually all packages are regularly upgraded to their latest stable releases, or a fixed release where almost all packages are kept at a set version number and only receive bug fixes for the life cycle of the distribution. Projects like Arch Linux and Void are popular examples of rolling, always-up-to-date distributions while Fedora and Ubuntu offer fixed platforms.</p>

<hr>

<h3><a href="https://corrupted.io/2020/06/21/my-freebsd-laptop-build.html" rel="nofollow">My FreeBSD Laptop Build</a></h3>

<p>I have always liked Thinkpad hardware and when I started to do more commuting I decided I needed something that had a decent sized screen but fit well on a bus. Luckily about this time Lenovo gave me a nice gift in the Thinkpad X390. Its basically the famous X2xx series but with a 13” screen and smaller bezel.<br>
So with this laptop I figured it was time to actually put the docs together on how I got my FreeBSD workstation working on it. I will here in the near future have another post that will cover this for HardenedBSD as well since the steps are similar but have a few extra gotchas due to the extra hardening.</p>

<hr>

<h3><a href="http://up.bsd.lv" rel="nofollow">FreeBSD CURRENT Binary Upgrades</a></h3>

<ul>
<li>Disclaimer
This proof-of-concept is not a publication of FreeBSD.</li>
<li>Description
up.bsd.lv is a proof-of-concept of binary updates for FreeBSD/amd64 CURRENT/HEAD to facilitate the exhaustive testing of FreeBSD and the bhyve hypervisor and OpenZFS 2.0 specifically. Updates are based on the SVN revisions of official FreeBSD Release Engineering bi-monthly snapshots.</li>
</ul>
</blockquote>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Karl%20-%20pfsense.md" rel="nofollow">Karl - pfsense</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Val%20-%20esxi%20question.md" rel="nofollow">Val - esxi question</a></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/lars%20-%20openbsd%20router%20hardware.md" rel="nofollow">lars - openbsd router hardware</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Throw-Away Browser on FreeBSD With &quot;pot&quot; within 5 minutes, OmniOS as OpenBSD guest with bhyve, BSD vs Linux distro development, My FreeBSD Laptop Build, FreeBSD CURRENT Binary Upgrades, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://honeyguide.eu/posts/pot-throwaway-firefox/" rel="nofollow">Throw-Away Browser on FreeBSD With &quot;pot&quot; Within 5 Minutes</a></h3>

<blockquote>
<p>pot is a great and relatively new jail management tool. It offers DevOps style provisioning and can even be used to provide Docker-like, scalable cloud services together with nomad and consul (more about this in Orchestrating jails with nomad and pot).</p>
</blockquote>

<hr>

<h3><a href="https://www.pbdigital.org/omniosce/bhyve/openbsd/2020/06/08/bhyve-zones-omnios.html" rel="nofollow">OpenBSD guest with bhyve - OmniOS</a></h3>

<blockquote>
<p>Today I will be creating a OpenBSD guest via bhyve on OmniOS. I will also be adding a Pass Through Ethernet Controller so I can have a multi-homed guest that will serve as a firewall/router.<br>
This post will cover setting up bhyve on OmniOS, so it will also be a good introduction to bhyve. As well, I look into OpenBSD’s uEFI boot loader so if you have had trouble with this, then you are in the right place.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20200622#qa" rel="nofollow">BSD versus Linux distribution development</a></h3>

<blockquote>
<p>Q: Comparing-apples-to-BSDs asks: I was reading one of the old articles from the archive. One of the things mentioned was how the BSDs have a distinct approach in terms of packaging the base system relative to userland apps, and that the Linux distros at the time were not following the same practice. Are there Linux distros that have adopted the same approach in modern times? If not, are there technical limitations that are preventing them from doing so, such as some distros supporting multiple kernel versions maybe?<br>
DistroWatch answers: In the article mentioned above, I made the observation that Linux distributions tend to take one of two approaches when it comes to packaging software. Generally a Linux distribution will either offer a rolling release, where virtually all packages are regularly upgraded to their latest stable releases, or a fixed release where almost all packages are kept at a set version number and only receive bug fixes for the life cycle of the distribution. Projects like Arch Linux and Void are popular examples of rolling, always-up-to-date distributions while Fedora and Ubuntu offer fixed platforms.</p>

<hr>

<h3><a href="https://corrupted.io/2020/06/21/my-freebsd-laptop-build.html" rel="nofollow">My FreeBSD Laptop Build</a></h3>

<p>I have always liked Thinkpad hardware and when I started to do more commuting I decided I needed something that had a decent sized screen but fit well on a bus. Luckily about this time Lenovo gave me a nice gift in the Thinkpad X390. Its basically the famous X2xx series but with a 13” screen and smaller bezel.<br>
So with this laptop I figured it was time to actually put the docs together on how I got my FreeBSD workstation working on it. I will here in the near future have another post that will cover this for HardenedBSD as well since the steps are similar but have a few extra gotchas due to the extra hardening.</p>

<hr>

<h3><a href="http://up.bsd.lv" rel="nofollow">FreeBSD CURRENT Binary Upgrades</a></h3>

<ul>
<li>Disclaimer
This proof-of-concept is not a publication of FreeBSD.</li>
<li>Description
up.bsd.lv is a proof-of-concept of binary updates for FreeBSD/amd64 CURRENT/HEAD to facilitate the exhaustive testing of FreeBSD and the bhyve hypervisor and OpenZFS 2.0 specifically. Updates are based on the SVN revisions of official FreeBSD Release Engineering bi-monthly snapshots.</li>
</ul>
</blockquote>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Karl%20-%20pfsense.md" rel="nofollow">Karl - pfsense</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Val%20-%20esxi%20question.md" rel="nofollow">Val - esxi question</a></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/lars%20-%20openbsd%20router%20hardware.md" rel="nofollow">lars - openbsd router hardware</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>79: Just Add QEMU</title>
  <link>https://www.bsdnow.tv/79</link>
  <guid isPermaLink="false">cb3fc5ef-1795-4d76-8b42-56a205255a03</guid>
  <pubDate>Wed, 04 Mar 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cb3fc5ef-1795-4d76-8b42-56a205255a03.mp3" length="60830644" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be talking to Sean Bruno. He's been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We've also got answers to viewer-submitted questions and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:24:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this time on the show, we'll be talking to Sean Bruno. He's been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We've also got answers to viewer-submitted questions and all this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
AsiaBSDCon 2015 schedule (http://2015.asiabsdcon.org/timetable.html.en)
Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up
This year's conference will be between 12-15 March at the Tokyo University of Science in Japan
The first and second days are for tutorials, as well as the developer summit and vendor summit
Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again
Not counting the ones that have yet to be revealed (as of the day we're recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD
Summaries of all the presentations are on the timetable page if you scroll down a bit
***
FreeBSD foundation updates and more (https://www.freebsdfoundation.org/press/2015febupdate.pdf)
The FreeBSD foundation (http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1) has posted a number of things this week, the first of which is their February 2015 status update
It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform
There's a FOSDEM recap and another update of their fundraising goal for 2015
They also have two new blog posts: a trip report from SCALE13x (http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html) and a featured "FreeBSD in the trenches (http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html)" article about how a small typo caused a lot of ZFS chaos in the cluster
"Then panic ensued.  The machine didn't panic -- I did."
***
OpenBSD improves browser security (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142523501726732&amp;amp;w=2)
No matter what OS you run on your desktop, the most likely entry point for an exploit these days is almost certainly the web browser
Ted Unangst writes in to the OpenBSD misc list to introduce a new project he's working on, simply titled "improving browser security"
He gives some background on the W^X memory protection (https://en.wikipedia.org/wiki/W%5EX) in the base system, but also mentions that some applications in ports don't adhere to it
For it to be enforced globally instead of just recommended, at least one browser (or specifically, one JIT (https://en.wikipedia.org/wiki/Just-in-time_compilation) engine) needs to be fixed to use it
"A system that is 'all W^X except where it's not' is the same as a system that's not W^X. We've worked hard to provide a secure foundation for programs; we'd like to see them take advantage of it."
The work is being supported by the OpenBSD foundation (http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2), and we'll keep you updated on this undertaking as more news about it is released
There's also some discussion on Hacker News (https://news.ycombinator.com/item?id=9128360) and Undeadly (http://undeadly.org/cgi?action=article&amp;amp;sid=20150303075848&amp;amp;mode=expanded) about it
***
NetBSD at Open Source Conference 2015 Tokyo (https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html)
The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo
There's even a spreadsheet (https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0) of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)
If you just can't get enough strange devices running BSD, check the mailing list post for lots of pictures
Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we'll run into them
***
Interview - Sean Bruno - sbruno@freebsd.org (mailto:sbruno@freebsd.org) / @franknbeans (https://twitter.com/franknbeans)
Cross-compiling packages with poudriere (http://www.bsdnow.tv/tutorials/poudriere) and QEMU
News Roundup
The Crypto Bone (http://crypto-bone.com/what.html)
The Crypto Bone is a new device (http://www.crypto-bone.com/) that's aimed at making encryption and secure communications easier (http://crypto-bone.com/cbb-usersview.html) and more accessible
Under the hood, it's actually just a Beaglebone (http://beagleboard.org/bone) board, running stock OpenBSD with a few extra packages
It includes a web interface (http://crypto-bone.com/release/root/var/www/apache/html/) for configuring keys and secure tunnels
The source code (http://crypto-bone.com/release/root/) is freely available for anyone interested in hacking on it (or auditing the crypto), and there's a technical overview (http://crypto-bone.com/cbb-technicalview.html) of how everything works on their site
If you don't want to teach your mom how to use PGP, buy her one of these(?)
***
BSD in the 2015 Google Summer of Code (https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page)
For those who don't know, GSoC is a way for students to get paid to work on a coding project for an open source organization
Good news: both FreeBSD and OpenBSD were accepted (https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015) for the 2015 event
FreeBSD has a wiki page (https://wiki.freebsd.org/SummerOfCodeIdeas) of ideas for people to work on
OpenBSD also has an ideas page (http://www.openbsdfoundation.org/gsoc2015.html) where you can see some of the initial things that might be interesting
If you're a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it
Who knows, you may even end up on the show (http://www.bsdnow.tv/episodes/2015_01_07-system_disaster) if you work on a cool project
GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you'd like to hack on
***
pfSense 2.3 roadmap (https://blog.pfsense.org/?p=1588)
The pfSense team has posted a new blog entry, detailing some of their plans for future versions
PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions
PBIs are scheduled to be replaced with native pkgng packages
Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely
Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***
PCBSD 10.1.2 security features (http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/)
PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post
A new "personacrypt" utility is introduced, which allows for easy encryption and management of external drives for your home directory
Going along with this, it also has a "stealth mode" that allows for one-time temporary home directories (but it doesn't self-destruct, don't worry)
The LibreSSL integration also continues, and now packages will be built with it by default
If you're using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update
They've also been working on introducing some new options to enable tunneling your traffic through Tor
There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week
A small disclaimer: remember that many things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity
Look forward to Kris wearing a Tor shirt (https://www.torproject.org/getinvolved/tshirt.html) in future episodes
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s2ofBPRT5n)
Chris writes in (http://slexy.org/view/s26LsYcoJF)
Van writes in (http://slexy.org/view/s28Rho0jvL)
Stu writes in (http://slexy.org/view/s21AkGbniU)
***
Mailing List Gold
H (https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html)
Pay up, mister Free (https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html)
Heritage protected (https://www.mail-archive.com/tech%40openbsd.org/msg22663.html)
Blind leading the blind (https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html)
What are the chances (https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, qemu, mips, arm, poudriere, packages, scale13x, asiabsdcon 2015, tor, tails, w^m, browser, exploit</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking to Sean Bruno. He&#39;s been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2015.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon 2015 schedule</a></h3>

<ul>
<li>Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up</li>
<li>This year&#39;s conference will be between 12-15 March at the Tokyo University of Science in Japan</li>
<li>The first and second days are for tutorials, as well as the developer summit and vendor summit</li>
<li>Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again</li>
<li>Not counting the ones that have yet to be revealed (as of the day we&#39;re recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD</li>
<li>Summaries of all the presentations are on the timetable page if you scroll down a bit
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015febupdate.pdf" rel="nofollow">FreeBSD foundation updates and more</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">FreeBSD foundation</a> has posted a number of things this week, the first of which is their February 2015 status update</li>
<li>It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform</li>
<li>There&#39;s a FOSDEM recap and another update of their fundraising goal for 2015</li>
<li>They also have two new blog posts: <a href="http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html" rel="nofollow">a trip report from SCALE13x</a> and a featured &quot;<a href="http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html" rel="nofollow">FreeBSD in the trenches</a>&quot; article about how a small typo caused a lot of ZFS chaos in the cluster</li>
<li>&quot;Then panic ensued.  The machine didn&#39;t panic -- I did.&quot;
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142523501726732&w=2" rel="nofollow">OpenBSD improves browser security</a></h3>

<ul>
<li>No matter what OS you run on your desktop, the most likely entry point for an exploit these days is <em>almost certainly</em> the web browser</li>
<li>Ted Unangst writes in to the OpenBSD misc list to introduce a new project he&#39;s working on, simply titled &quot;improving browser security&quot;</li>
<li>He gives some background on the <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup> memory protection</a> in the base system, but also mentions that some applications in ports don&#39;t adhere to it</li>
<li>For it to be enforced globally instead of just recommended, at least one browser (or specifically, one <a href="https://en.wikipedia.org/wiki/Just-in-time_compilation" rel="nofollow">JIT</a> engine) needs to be fixed to use it</li>
<li>&quot;A system that is &#39;all W<sup>X</sup> except where it&#39;s not&#39; is the same as a system that&#39;s not W<sup>X.</sup> We&#39;ve worked hard to provide a secure foundation for programs; we&#39;d like to see them take advantage of it.&quot;</li>
<li>The work is being supported by the <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">OpenBSD foundation</a>, and we&#39;ll keep you updated on this undertaking as more news about it is released</li>
<li>There&#39;s also some discussion <a href="https://news.ycombinator.com/item?id=9128360" rel="nofollow">on Hacker News</a> <a href="http://undeadly.org/cgi?action=article&sid=20150303075848&mode=expanded" rel="nofollow">and Undeadly</a> about it
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html" rel="nofollow">NetBSD at Open Source Conference 2015 Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo</li>
<li>There&#39;s even a <a href="https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0" rel="nofollow">spreadsheet</a> of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)</li>
<li>If you just can&#39;t get enough strange devices running BSD, check the mailing list post for lots of pictures</li>
<li>Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we&#39;ll run into them
***</li>
</ul>

<h2>Interview - Sean Bruno - <a href="mailto:sbruno@freebsd.org" rel="nofollow">sbruno@freebsd.org</a> / <a href="https://twitter.com/franknbeans" rel="nofollow">@franknbeans</a></h2>

<p>Cross-compiling packages with <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> and QEMU</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://crypto-bone.com/what.html" rel="nofollow">The Crypto Bone</a></h3>

<ul>
<li>The Crypto Bone is a new <a href="http://www.crypto-bone.com/" rel="nofollow">device</a> that&#39;s aimed at making encryption and secure communications <a href="http://crypto-bone.com/cbb-usersview.html" rel="nofollow">easier</a> and more accessible</li>
<li>Under the hood, it&#39;s actually just a <a href="http://beagleboard.org/bone" rel="nofollow">Beaglebone</a> board, running stock OpenBSD with a few extra packages</li>
<li>It includes a <a href="http://crypto-bone.com/release/root/var/www/apache/html/" rel="nofollow">web interface</a> for configuring keys and secure tunnels</li>
<li>The <a href="http://crypto-bone.com/release/root/" rel="nofollow">source code</a> is freely available for anyone interested in hacking on it (or auditing the crypto), and there&#39;s <a href="http://crypto-bone.com/cbb-technicalview.html" rel="nofollow">a technical overview</a> of how everything works on their site</li>
<li>If you don&#39;t want to teach your mom how to use PGP, buy her one of these(?)
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page" rel="nofollow">BSD in the 2015 Google Summer of Code</a></h3>

<ul>
<li>For those who don&#39;t know, GSoC is a way for students to get paid to work on a coding project for an open source organization</li>
<li>Good news: both FreeBSD and OpenBSD were <a href="https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015" rel="nofollow">accepted</a> for the 2015 event</li>
<li>FreeBSD has <a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">a wiki page</a> of ideas for people to work on</li>
<li>OpenBSD also has <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">an ideas page</a> where you can see some of the initial things that might be interesting</li>
<li>If you&#39;re a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it</li>
<li>Who knows, you may even <a href="http://www.bsdnow.tv/episodes/2015_01_07-system_disaster" rel="nofollow">end up on the show</a> if you work on a cool project</li>
<li>GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you&#39;d like to hack on
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1588" rel="nofollow">pfSense 2.3 roadmap</a></h3>

<ul>
<li>The pfSense team has posted a new blog entry, detailing some of their plans for future versions</li>
<li>PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions</li>
<li>PBIs are scheduled to be replaced with native pkgng packages</li>
<li>Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely</li>
<li>Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/" rel="nofollow">PCBSD 10.1.2 security features</a></h3>

<ul>
<li>PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post</li>
<li>A new &quot;personacrypt&quot; utility is introduced, which allows for easy encryption and management of external drives for your home directory</li>
<li>Going along with this, it also has a &quot;stealth mode&quot; that allows for one-time temporary home directories (but it doesn&#39;t self-destruct, don&#39;t worry)</li>
<li>The LibreSSL integration also continues, and now packages will be built with it by default</li>
<li>If you&#39;re using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update</li>
<li>They&#39;ve also been working on introducing some new options to enable tunneling your traffic through Tor</li>
<li>There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week</li>
<li>A small disclaimer: remember that <strong>many</strong> things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity</li>
<li>Look forward to Kris wearing a <a href="https://www.torproject.org/getinvolved/tshirt.html" rel="nofollow">Tor shirt</a> in future episodes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ofBPRT5n" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s26LsYcoJF" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s28Rho0jvL" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s21AkGbniU" rel="nofollow">Stu writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html" rel="nofollow">H</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html" rel="nofollow">Pay up, mister Free</a></li>
<li><a href="https://www.mail-archive.com/tech%40openbsd.org/msg22663.html" rel="nofollow">Heritage protected</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html" rel="nofollow">Blind leading the blind</a></li>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html" rel="nofollow">What are the chances</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking to Sean Bruno. He&#39;s been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2015.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon 2015 schedule</a></h3>

<ul>
<li>Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up</li>
<li>This year&#39;s conference will be between 12-15 March at the Tokyo University of Science in Japan</li>
<li>The first and second days are for tutorials, as well as the developer summit and vendor summit</li>
<li>Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again</li>
<li>Not counting the ones that have yet to be revealed (as of the day we&#39;re recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD</li>
<li>Summaries of all the presentations are on the timetable page if you scroll down a bit
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015febupdate.pdf" rel="nofollow">FreeBSD foundation updates and more</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">FreeBSD foundation</a> has posted a number of things this week, the first of which is their February 2015 status update</li>
<li>It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform</li>
<li>There&#39;s a FOSDEM recap and another update of their fundraising goal for 2015</li>
<li>They also have two new blog posts: <a href="http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html" rel="nofollow">a trip report from SCALE13x</a> and a featured &quot;<a href="http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html" rel="nofollow">FreeBSD in the trenches</a>&quot; article about how a small typo caused a lot of ZFS chaos in the cluster</li>
<li>&quot;Then panic ensued.  The machine didn&#39;t panic -- I did.&quot;
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142523501726732&w=2" rel="nofollow">OpenBSD improves browser security</a></h3>

<ul>
<li>No matter what OS you run on your desktop, the most likely entry point for an exploit these days is <em>almost certainly</em> the web browser</li>
<li>Ted Unangst writes in to the OpenBSD misc list to introduce a new project he&#39;s working on, simply titled &quot;improving browser security&quot;</li>
<li>He gives some background on the <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup> memory protection</a> in the base system, but also mentions that some applications in ports don&#39;t adhere to it</li>
<li>For it to be enforced globally instead of just recommended, at least one browser (or specifically, one <a href="https://en.wikipedia.org/wiki/Just-in-time_compilation" rel="nofollow">JIT</a> engine) needs to be fixed to use it</li>
<li>&quot;A system that is &#39;all W<sup>X</sup> except where it&#39;s not&#39; is the same as a system that&#39;s not W<sup>X.</sup> We&#39;ve worked hard to provide a secure foundation for programs; we&#39;d like to see them take advantage of it.&quot;</li>
<li>The work is being supported by the <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">OpenBSD foundation</a>, and we&#39;ll keep you updated on this undertaking as more news about it is released</li>
<li>There&#39;s also some discussion <a href="https://news.ycombinator.com/item?id=9128360" rel="nofollow">on Hacker News</a> <a href="http://undeadly.org/cgi?action=article&sid=20150303075848&mode=expanded" rel="nofollow">and Undeadly</a> about it
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html" rel="nofollow">NetBSD at Open Source Conference 2015 Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo</li>
<li>There&#39;s even a <a href="https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0" rel="nofollow">spreadsheet</a> of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)</li>
<li>If you just can&#39;t get enough strange devices running BSD, check the mailing list post for lots of pictures</li>
<li>Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we&#39;ll run into them
***</li>
</ul>

<h2>Interview - Sean Bruno - <a href="mailto:sbruno@freebsd.org" rel="nofollow">sbruno@freebsd.org</a> / <a href="https://twitter.com/franknbeans" rel="nofollow">@franknbeans</a></h2>

<p>Cross-compiling packages with <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> and QEMU</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://crypto-bone.com/what.html" rel="nofollow">The Crypto Bone</a></h3>

<ul>
<li>The Crypto Bone is a new <a href="http://www.crypto-bone.com/" rel="nofollow">device</a> that&#39;s aimed at making encryption and secure communications <a href="http://crypto-bone.com/cbb-usersview.html" rel="nofollow">easier</a> and more accessible</li>
<li>Under the hood, it&#39;s actually just a <a href="http://beagleboard.org/bone" rel="nofollow">Beaglebone</a> board, running stock OpenBSD with a few extra packages</li>
<li>It includes a <a href="http://crypto-bone.com/release/root/var/www/apache/html/" rel="nofollow">web interface</a> for configuring keys and secure tunnels</li>
<li>The <a href="http://crypto-bone.com/release/root/" rel="nofollow">source code</a> is freely available for anyone interested in hacking on it (or auditing the crypto), and there&#39;s <a href="http://crypto-bone.com/cbb-technicalview.html" rel="nofollow">a technical overview</a> of how everything works on their site</li>
<li>If you don&#39;t want to teach your mom how to use PGP, buy her one of these(?)
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page" rel="nofollow">BSD in the 2015 Google Summer of Code</a></h3>

<ul>
<li>For those who don&#39;t know, GSoC is a way for students to get paid to work on a coding project for an open source organization</li>
<li>Good news: both FreeBSD and OpenBSD were <a href="https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015" rel="nofollow">accepted</a> for the 2015 event</li>
<li>FreeBSD has <a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">a wiki page</a> of ideas for people to work on</li>
<li>OpenBSD also has <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">an ideas page</a> where you can see some of the initial things that might be interesting</li>
<li>If you&#39;re a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it</li>
<li>Who knows, you may even <a href="http://www.bsdnow.tv/episodes/2015_01_07-system_disaster" rel="nofollow">end up on the show</a> if you work on a cool project</li>
<li>GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you&#39;d like to hack on
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1588" rel="nofollow">pfSense 2.3 roadmap</a></h3>

<ul>
<li>The pfSense team has posted a new blog entry, detailing some of their plans for future versions</li>
<li>PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions</li>
<li>PBIs are scheduled to be replaced with native pkgng packages</li>
<li>Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely</li>
<li>Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/" rel="nofollow">PCBSD 10.1.2 security features</a></h3>

<ul>
<li>PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post</li>
<li>A new &quot;personacrypt&quot; utility is introduced, which allows for easy encryption and management of external drives for your home directory</li>
<li>Going along with this, it also has a &quot;stealth mode&quot; that allows for one-time temporary home directories (but it doesn&#39;t self-destruct, don&#39;t worry)</li>
<li>The LibreSSL integration also continues, and now packages will be built with it by default</li>
<li>If you&#39;re using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update</li>
<li>They&#39;ve also been working on introducing some new options to enable tunneling your traffic through Tor</li>
<li>There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week</li>
<li>A small disclaimer: remember that <strong>many</strong> things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity</li>
<li>Look forward to Kris wearing a <a href="https://www.torproject.org/getinvolved/tshirt.html" rel="nofollow">Tor shirt</a> in future episodes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ofBPRT5n" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s26LsYcoJF" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s28Rho0jvL" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s21AkGbniU" rel="nofollow">Stu writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html" rel="nofollow">H</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html" rel="nofollow">Pay up, mister Free</a></li>
<li><a href="https://www.mail-archive.com/tech%40openbsd.org/msg22663.html" rel="nofollow">Heritage protected</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html" rel="nofollow">Blind leading the blind</a></li>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html" rel="nofollow">What are the chances</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
