<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 06 May 2026 22:24:23 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “C2k15”</title>
    <link>https://www.bsdnow.tv/tags/c2k15</link>
    <pubDate>Wed, 05 Aug 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>101: I'll Fix Everything</title>
  <link>https://www.bsdnow.tv/101</link>
  <guid isPermaLink="false">b0fef23d-9748-4e29-9419-eb23bd948f84</guid>
  <pubDate>Wed, 05 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b0fef23d-9748-4e29-9419-eb23bd948f84.mp3" length="67071892" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like "what would you like to see in FreeBSD?" and hundreds of responses, well, we've got a lot to cover...</itunes:subtitle>
  <itunes:duration>1:33:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like "what would you like to see in FreeBSD?" and hundreds of responses, well, we've got a lot to cover...&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/from-distribution-to-project" target="_blank" rel="nofollow noopener"&gt;OpenBSD, from distribution to project&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ted Unangst has yet another interesting blog post up, this time covering a bit of BSD history and some different phases OpenBSD has been through&lt;/li&gt;
&lt;li&gt;It's the third part of his &lt;a href="http://www.openbsd.org/papers/pruning.html" target="_blank" rel="nofollow noopener"&gt;ongoing&lt;/a&gt; &lt;a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" target="_blank" rel="nofollow noopener"&gt;series&lt;/a&gt; of posts about OpenBSD removing large bits of code in favor of smaller replacements&lt;/li&gt;
&lt;li&gt;In the earliest days, OpenBSD collected and maintained code from lots of other projects (Apache, lynx, perl..)&lt;/li&gt;
&lt;li&gt;After importing new updates every release cycle, they eventually hit a transitional phase - things were updated, but nothing new was imported&lt;/li&gt;
&lt;li&gt;When the need arose, instead of importing a known tool to do the job, homemade replacements (OpenNTPD, OpenBGPD, etc) were slowly developed&lt;/li&gt;
&lt;li&gt;In more recent times, a lot of the imported code has been completely removed in favor of the homegrown daemons&lt;/li&gt;
&lt;li&gt;More discussion &lt;a href="https://news.ycombinator.com/item?id=9980373" target="_blank" rel="nofollow noopener"&gt;on HN&lt;/a&gt; &lt;a href="https://www.reddit.com/r/openbsd/comments/3f9o19/from_distribution_to_project/" target="_blank" rel="nofollow noopener"&gt;and reddit&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/hughobrien/zfs-remote-mirror" target="_blank" rel="nofollow noopener"&gt;Remote ZFS mirrors, the hard way&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Backups to "the cloud" have become a hot topic in recent years, but most of them require trade-offs between convenience and security&lt;/li&gt;
&lt;li&gt;You have to trust (some of) the providers not to snoop on your data, but even the ones who allow you to locally encrypt files aren't without some compromise&lt;/li&gt;
&lt;li&gt;As the author puts it: "We don't need live synchronisation, cloud scaling, SLAs, NSAs, terms of service, lock-ins, buy-outs, up-sells, shut-downs, DoSs, fail whales, pay-us-or-we'll-deletes, or any of the noise that comes with using someone else's infrastructure."&lt;/li&gt;
&lt;li&gt;This guide walks you through setting up a FreeBSD server with ZFS to do secure offsite backups yourself&lt;/li&gt;
&lt;li&gt;The end result is an automatic system for incremental backups that's backed (pun intended) by ZFS&lt;/li&gt;
&lt;li&gt;If you're serious about keeping your important data safe and sound, you'll want to give this one a read - lots of detailed instructions
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419064.html" target="_blank" rel="nofollow noopener"&gt;Various DragonFlyBSD updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The DragonFly guys have been quite busy this week, making an assortment of improvements throughout the tree&lt;/li&gt;
&lt;li&gt;Intel ValleyView graphics support was finally committed to the main repository&lt;/li&gt;
&lt;li&gt;While on the topic of graphics, they've also issued &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207923.html" target="_blank" rel="nofollow noopener"&gt;a call for testing&lt;/a&gt; for a DRM update (matching Linux 3.16's and including some more Broadwell fixes)&lt;/li&gt;
&lt;li&gt;Their base GCC compiler is also now &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419045.html" target="_blank" rel="nofollow noopener"&gt;upgraded to version 5.2&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;If your hardware supports it, DragonFly will now &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419070.html" target="_blank" rel="nofollow noopener"&gt;use an accelerated console by default&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://youtu.be/mOv62lBdlXU?t=292" target="_blank" rel="nofollow noopener"&gt;QuakeCon runs on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/QuakeCon" target="_blank" rel="nofollow noopener"&gt;QuakeCon&lt;/a&gt;, everyone's favorite event full of rocket launchers, recently gave a mini-tour of their network setup&lt;/li&gt;
&lt;li&gt;For such a crazy network, unsurprisingly, they seem to be big fans of OpenBSD and PF&lt;/li&gt;
&lt;li&gt;In this video interview, one of the sysadmins discusses why he chose OpenBSD, what he likes about it, different packet queueing systems, how their firewalls and servers are laid out and much more&lt;/li&gt;
&lt;li&gt;He also talks about why they went with vanilla PF, writing their ruleset from the ground up rather than relying on a prebuilt solution&lt;/li&gt;
&lt;li&gt;There's also some general networking talk about nginx, reverse proxies, caching, fiber links and all that good stuff&lt;/li&gt;
&lt;li&gt;Follow-up questions can be asked in &lt;a href="https://www.reddit.com/r/BSD/comments/3f43fh/bsd_runs_quakecon/" target="_blank" rel="nofollow noopener"&gt;this reddit thread&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The host doesn't seem to be that familiar with the topics at hand, mentioning "OpenPF" multiple times among other things, so our listeners should get a kick out of it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Adrian Chadd - &lt;a href="mailto:adrian@freebsd.org" target="_blank" rel="nofollow noopener"&gt;adrian@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/erikarn" target="_blank" rel="nofollow noopener"&gt;@erikarn&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Rethinking &lt;a href="https://www.reddit.com/r/freebsd/comments/3d80vt" target="_blank" rel="nofollow noopener"&gt;ways to improve FreeBSD&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150804161939" target="_blank" rel="nofollow noopener"&gt;CII contributes to OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you recall back to &lt;a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" target="_blank" rel="nofollow noopener"&gt;when we talked to the OpenBSD foundation&lt;/a&gt;, one of the things Ken mentioned was the &lt;a href="https://www.coreinfrastructure.org" target="_blank" rel="nofollow noopener"&gt;Core Infrastructure Initiative&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;In &lt;a href="https://www.coreinfrastructure.org/faq" target="_blank" rel="nofollow noopener"&gt;a nutshell&lt;/a&gt;, it's an organization of security experts that helps facilitate (with money, in most cases) the advancement of the more critical open source components of the internet&lt;/li&gt;
&lt;li&gt;The group is organized by the Linux foundation, and gets its multi-million dollar backing from various big companies in the technology space (and donations from volunteers) &lt;/li&gt;
&lt;li&gt;To ensure that OpenBSD and its related projects (OpenSSH, LibreSSL and PF likely being the main ones here) remain healthy, they've just made a large donation to the foundation - this makes them &lt;a href="http://www.openbsdfoundation.org/contributors.html" target="_blank" rel="nofollow noopener"&gt;the first&lt;/a&gt; "platinum" level donor as well&lt;/li&gt;
&lt;li&gt;While the exact amount wasn't disclosed, it was somewhere between $50,000 and $100,000&lt;/li&gt;
&lt;li&gt;The donation comes less than a month after &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150708134520" target="_blank" rel="nofollow noopener"&gt;Microsoft's big donation&lt;/a&gt;, so it's good to see these large organizations helping out important open source projects that we depend on every day
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-mark-linimon.html" target="_blank" rel="nofollow noopener"&gt;Another BSDCan report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation is still getting trip reports from BSDCan, and this one comes from Mark Linimon&lt;/li&gt;
&lt;li&gt;In his report, he mainly covers the devsummit and some discussion with the portmgr team&lt;/li&gt;
&lt;li&gt;One notable change for the upcoming 10.2 release is that the default binary repository is now the quarterly branch - Mark talks a bit about this as well&lt;/li&gt;
&lt;li&gt;He also gives his thoughts on using &lt;a href="http://www.bsdnow.tv/episodes/2015_03_04-just_add_qemu" target="_blank" rel="nofollow noopener"&gt;QEMU for cross-compiling packages&lt;/a&gt; and network performance testing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/08/lumina-desktop-0-8-6-released/" target="_blank" rel="nofollow noopener"&gt;Lumina 0.8.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The PC-BSD team has released another version of &lt;a href="http://www.lumina-desktop.org/" target="_blank" rel="nofollow noopener"&gt;Lumina&lt;/a&gt;, their BSD-licensed desktop environment&lt;/li&gt;
&lt;li&gt;This is mainly a bugfix and performance improvement release, rather than one with lots of new features&lt;/li&gt;
&lt;li&gt;The on-screen display widget should be much faster now, and the configuration now allows for easier selection of default applications (which browser, which terminal, etc)&lt;/li&gt;
&lt;li&gt;Lots of non-English translation updates and assorted fixes are included as well&lt;/li&gt;
&lt;li&gt;If you haven't given it a try yet, or maybe you're looking for a new window manager, Lumina runs on all the BSDs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150730180506" target="_blank" rel="nofollow noopener"&gt;More c2k15 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Even more reports from OpenBSD's latest hackathon are starting to pour in&lt;/li&gt;
&lt;li&gt;The first one is from Alexandr Nedvedicky, one of their brand new developers (the guy from Oracle)&lt;/li&gt;
&lt;li&gt;He talks about his experience going to a hackathon for the first time, and lays out some of the plans for integrating their (very large) SMP PF patch into OpenBSD&lt;/li&gt;
&lt;li&gt;Second up &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150731191156&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;is Andrew Fresh&lt;/a&gt;, who went without any specific plans, but still ended up getting some UTF8 work done&lt;/li&gt;
&lt;li&gt;On the topic of ARMv7, "I did enjoy being there when things weren't working so [Brandon Mercer] could futilely try to explain the problem to me (I wasn't much help with kernel memory layouts). Fortunately others overheard and provided words of encouragement and some help which was one of my favorite parts of attending this hackathon."&lt;/li&gt;
&lt;li&gt;Florian Obser sent in a report that includes &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150805151453" target="_blank" rel="nofollow noopener"&gt;a little bit of everything&lt;/a&gt;: setting up the hackathon's network, relayd and httpd work, bidirectional forwarding detection, airplane stories and even lots of food&lt;/li&gt;
&lt;li&gt;Paul Irofti &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150801100002&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;wrote in as well&lt;/a&gt; about his activities, which were mainly focused on the Octeon CPU architecture&lt;/li&gt;
&lt;li&gt;He wrote a new driver for the onboard flash of a DSR-500 machine, which was built following the Common Flash Interface specification&lt;/li&gt;
&lt;li&gt;This means that, going forward, OpenBSD will have out-of-the-box support for any flash memory device (often the case for MIPS and ARM-based embedded devices)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s205kqTEIj" target="_blank" rel="nofollow noopener"&gt;Hamza writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ogIP6cEf" target="_blank" rel="nofollow noopener"&gt;Florian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s214xE9ulK" target="_blank" rel="nofollow noopener"&gt;Dominik writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, quakecon, pf, firewall, gateway, server, reddit, c2k15, hackathon, octeon, zfs, backups, offsite, valleyview, bsdcan, cii</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like &quot;what would you like to see in FreeBSD?&quot; and hundreds of responses, well, we&#39;ve got a lot to cover...</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/from-distribution-to-project" rel="nofollow">OpenBSD, from distribution to project</a></h3>

<ul>
<li>Ted Unangst has yet another interesting blog post up, this time covering a bit of BSD history and some different phases OpenBSD has been through</li>
<li>It&#39;s the third part of his <a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">ongoing</a> <a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">series</a> of posts about OpenBSD removing large bits of code in favor of smaller replacements</li>
<li>In the earliest days, OpenBSD collected and maintained code from lots of other projects (Apache, lynx, perl..)</li>
<li>After importing new updates every release cycle, they eventually hit a transitional phase - things were updated, but nothing new was imported</li>
<li>When the need arose, instead of importing a known tool to do the job, homemade replacements (OpenNTPD, OpenBGPD, etc) were slowly developed</li>
<li>In more recent times, a lot of the imported code has been completely removed in favor of the homegrown daemons</li>
<li>More discussion <a href="https://news.ycombinator.com/item?id=9980373" rel="nofollow">on HN</a> <a href="https://www.reddit.com/r/openbsd/comments/3f9o19/from_distribution_to_project/" rel="nofollow">and reddit</a>
***</li>
</ul>

<h3><a href="https://github.com/hughobrien/zfs-remote-mirror" rel="nofollow">Remote ZFS mirrors, the hard way</a></h3>

<ul>
<li>Backups to &quot;the cloud&quot; have become a hot topic in recent years, but most of them require trade-offs between convenience and security</li>
<li>You have to trust (some of) the providers not to snoop on your data, but even the ones who allow you to locally encrypt files aren&#39;t without some compromise</li>
<li>As the author puts it: &quot;We don&#39;t need live synchronisation, cloud scaling, SLAs, NSAs, terms of service, lock-ins, buy-outs, up-sells, shut-downs, DoSs, fail whales, pay-us-or-we&#39;ll-deletes, or any of the noise that comes with using someone else&#39;s infrastructure.&quot;</li>
<li>This guide walks you through setting up a FreeBSD server with ZFS to do secure offsite backups yourself</li>
<li>The end result is an automatic system for incremental backups that&#39;s backed (pun intended) by ZFS</li>
<li>If you&#39;re serious about keeping your important data safe and sound, you&#39;ll want to give this one a read - lots of detailed instructions
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419064.html" rel="nofollow">Various DragonFlyBSD updates</a></h3>

<ul>
<li>The DragonFly guys have been quite busy this week, making an assortment of improvements throughout the tree</li>
<li>Intel ValleyView graphics support was finally committed to the main repository</li>
<li>While on the topic of graphics, they&#39;ve also issued <a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207923.html" rel="nofollow">a call for testing</a> for a DRM update (matching Linux 3.16&#39;s and including some more Broadwell fixes)</li>
<li>Their base GCC compiler is also now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419045.html" rel="nofollow">upgraded to version 5.2</a></li>
<li>If your hardware supports it, DragonFly will now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419070.html" rel="nofollow">use an accelerated console by default</a>
***</li>
</ul>

<h3><a href="https://youtu.be/mOv62lBdlXU?t=292" rel="nofollow">QuakeCon runs on OpenBSD</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/QuakeCon" rel="nofollow">QuakeCon</a>, everyone&#39;s favorite event full of rocket launchers, recently gave a mini-tour of their network setup</li>
<li>For such a crazy network, unsurprisingly, they seem to be big fans of OpenBSD and PF</li>
<li>In this video interview, one of the sysadmins discusses why he chose OpenBSD, what he likes about it, different packet queueing systems, how their firewalls and servers are laid out and much more</li>
<li>He also talks about why they went with vanilla PF, writing their ruleset from the ground up rather than relying on a prebuilt solution</li>
<li>There&#39;s also some general networking talk about nginx, reverse proxies, caching, fiber links and all that good stuff</li>
<li>Follow-up questions can be asked in <a href="https://www.reddit.com/r/BSD/comments/3f43fh/bsd_runs_quakecon/" rel="nofollow">this reddit thread</a></li>
<li>The host doesn&#39;t seem to be that familiar with the topics at hand, mentioning &quot;OpenPF&quot; multiple times among other things, so our listeners should get a kick out of it
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>Rethinking <a href="https://www.reddit.com/r/freebsd/comments/3d80vt" rel="nofollow">ways to improve FreeBSD</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150804161939" rel="nofollow">CII contributes to OpenBSD</a></h3>

<ul>
<li>If you recall back to <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">when we talked to the OpenBSD foundation</a>, one of the things Ken mentioned was the <a href="https://www.coreinfrastructure.org" rel="nofollow">Core Infrastructure Initiative</a></li>
<li>In <a href="https://www.coreinfrastructure.org/faq" rel="nofollow">a nutshell</a>, it&#39;s an organization of security experts that helps facilitate (with money, in most cases) the advancement of the more critical open source components of the internet</li>
<li>The group is organized by the Linux foundation, and gets its multi-million dollar backing from various big companies in the technology space (and donations from volunteers) </li>
<li>To ensure that OpenBSD and its related projects (OpenSSH, LibreSSL and PF likely being the main ones here) remain healthy, they&#39;ve just made a large donation to the foundation - this makes them <a href="http://www.openbsdfoundation.org/contributors.html" rel="nofollow">the first</a> &quot;platinum&quot; level donor as well</li>
<li>While the exact amount wasn&#39;t disclosed, it was somewhere between $50,000 and $100,000</li>
<li>The donation comes less than a month after <a href="http://undeadly.org/cgi?action=article&sid=20150708134520" rel="nofollow">Microsoft&#39;s big donation</a>, so it&#39;s good to see these large organizations helping out important open source projects that we depend on every day
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-mark-linimon.html" rel="nofollow">Another BSDCan report</a></h3>

<ul>
<li>The FreeBSD foundation is still getting trip reports from BSDCan, and this one comes from Mark Linimon</li>
<li>In his report, he mainly covers the devsummit and some discussion with the portmgr team</li>
<li>One notable change for the upcoming 10.2 release is that the default binary repository is now the quarterly branch - Mark talks a bit about this as well</li>
<li>He also gives his thoughts on using <a href="http://www.bsdnow.tv/episodes/2015_03_04-just_add_qemu" rel="nofollow">QEMU for cross-compiling packages</a> and network performance testing
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/08/lumina-desktop-0-8-6-released/" rel="nofollow">Lumina 0.8.6 released</a></h3>

<ul>
<li>The PC-BSD team has released another version of <a href="http://www.lumina-desktop.org/" rel="nofollow">Lumina</a>, their BSD-licensed desktop environment</li>
<li>This is mainly a bugfix and performance improvement release, rather than one with lots of new features</li>
<li>The on-screen display widget should be much faster now, and the configuration now allows for easier selection of default applications (which browser, which terminal, etc)</li>
<li>Lots of non-English translation updates and assorted fixes are included as well</li>
<li>If you haven&#39;t given it a try yet, or maybe you&#39;re looking for a new window manager, Lumina runs on all the BSDs
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150730180506" rel="nofollow">More c2k15 hackathon reports</a></h3>

<ul>
<li>Even more reports from OpenBSD&#39;s latest hackathon are starting to pour in</li>
<li>The first one is from Alexandr Nedvedicky, one of their brand new developers (the guy from Oracle)</li>
<li>He talks about his experience going to a hackathon for the first time, and lays out some of the plans for integrating their (very large) SMP PF patch into OpenBSD</li>
<li>Second up <a href="http://undeadly.org/cgi?action=article&sid=20150731191156&mode=flat" rel="nofollow">is Andrew Fresh</a>, who went without any specific plans, but still ended up getting some UTF8 work done</li>
<li>On the topic of ARMv7, &quot;I did enjoy being there when things weren&#39;t working so [Brandon Mercer] could futilely try to explain the problem to me (I wasn&#39;t much help with kernel memory layouts). Fortunately others overheard and provided words of encouragement and some help which was one of my favorite parts of attending this hackathon.&quot;</li>
<li>Florian Obser sent in a report that includes <a href="http://undeadly.org/cgi?action=article&sid=20150805151453" rel="nofollow">a little bit of everything</a>: setting up the hackathon&#39;s network, relayd and httpd work, bidirectional forwarding detection, airplane stories and even lots of food</li>
<li>Paul Irofti <a href="http://undeadly.org/cgi?action=article&sid=20150801100002&mode=flat" rel="nofollow">wrote in as well</a> about his activities, which were mainly focused on the Octeon CPU architecture</li>
<li>He wrote a new driver for the onboard flash of a DSR-500 machine, which was built following the Common Flash Interface specification</li>
<li>This means that, going forward, OpenBSD will have out-of-the-box support for any flash memory device (often the case for MIPS and ARM-based embedded devices)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205kqTEIj" rel="nofollow">Hamza writes in</a></li>
<li><a href="http://slexy.org/view/s2ogIP6cEf" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s214xE9ulK" rel="nofollow">Dominik writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like &quot;what would you like to see in FreeBSD?&quot; and hundreds of responses, well, we&#39;ve got a lot to cover...</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/from-distribution-to-project" rel="nofollow">OpenBSD, from distribution to project</a></h3>

<ul>
<li>Ted Unangst has yet another interesting blog post up, this time covering a bit of BSD history and some different phases OpenBSD has been through</li>
<li>It&#39;s the third part of his <a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">ongoing</a> <a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">series</a> of posts about OpenBSD removing large bits of code in favor of smaller replacements</li>
<li>In the earliest days, OpenBSD collected and maintained code from lots of other projects (Apache, lynx, perl..)</li>
<li>After importing new updates every release cycle, they eventually hit a transitional phase - things were updated, but nothing new was imported</li>
<li>When the need arose, instead of importing a known tool to do the job, homemade replacements (OpenNTPD, OpenBGPD, etc) were slowly developed</li>
<li>In more recent times, a lot of the imported code has been completely removed in favor of the homegrown daemons</li>
<li>More discussion <a href="https://news.ycombinator.com/item?id=9980373" rel="nofollow">on HN</a> <a href="https://www.reddit.com/r/openbsd/comments/3f9o19/from_distribution_to_project/" rel="nofollow">and reddit</a>
***</li>
</ul>

<h3><a href="https://github.com/hughobrien/zfs-remote-mirror" rel="nofollow">Remote ZFS mirrors, the hard way</a></h3>

<ul>
<li>Backups to &quot;the cloud&quot; have become a hot topic in recent years, but most of them require trade-offs between convenience and security</li>
<li>You have to trust (some of) the providers not to snoop on your data, but even the ones who allow you to locally encrypt files aren&#39;t without some compromise</li>
<li>As the author puts it: &quot;We don&#39;t need live synchronisation, cloud scaling, SLAs, NSAs, terms of service, lock-ins, buy-outs, up-sells, shut-downs, DoSs, fail whales, pay-us-or-we&#39;ll-deletes, or any of the noise that comes with using someone else&#39;s infrastructure.&quot;</li>
<li>This guide walks you through setting up a FreeBSD server with ZFS to do secure offsite backups yourself</li>
<li>The end result is an automatic system for incremental backups that&#39;s backed (pun intended) by ZFS</li>
<li>If you&#39;re serious about keeping your important data safe and sound, you&#39;ll want to give this one a read - lots of detailed instructions
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419064.html" rel="nofollow">Various DragonFlyBSD updates</a></h3>

<ul>
<li>The DragonFly guys have been quite busy this week, making an assortment of improvements throughout the tree</li>
<li>Intel ValleyView graphics support was finally committed to the main repository</li>
<li>While on the topic of graphics, they&#39;ve also issued <a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207923.html" rel="nofollow">a call for testing</a> for a DRM update (matching Linux 3.16&#39;s and including some more Broadwell fixes)</li>
<li>Their base GCC compiler is also now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419045.html" rel="nofollow">upgraded to version 5.2</a></li>
<li>If your hardware supports it, DragonFly will now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419070.html" rel="nofollow">use an accelerated console by default</a>
***</li>
</ul>

<h3><a href="https://youtu.be/mOv62lBdlXU?t=292" rel="nofollow">QuakeCon runs on OpenBSD</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/QuakeCon" rel="nofollow">QuakeCon</a>, everyone&#39;s favorite event full of rocket launchers, recently gave a mini-tour of their network setup</li>
<li>For such a crazy network, unsurprisingly, they seem to be big fans of OpenBSD and PF</li>
<li>In this video interview, one of the sysadmins discusses why he chose OpenBSD, what he likes about it, different packet queueing systems, how their firewalls and servers are laid out and much more</li>
<li>He also talks about why they went with vanilla PF, writing their ruleset from the ground up rather than relying on a prebuilt solution</li>
<li>There&#39;s also some general networking talk about nginx, reverse proxies, caching, fiber links and all that good stuff</li>
<li>Follow-up questions can be asked in <a href="https://www.reddit.com/r/BSD/comments/3f43fh/bsd_runs_quakecon/" rel="nofollow">this reddit thread</a></li>
<li>The host doesn&#39;t seem to be that familiar with the topics at hand, mentioning &quot;OpenPF&quot; multiple times among other things, so our listeners should get a kick out of it
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>Rethinking <a href="https://www.reddit.com/r/freebsd/comments/3d80vt" rel="nofollow">ways to improve FreeBSD</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150804161939" rel="nofollow">CII contributes to OpenBSD</a></h3>

<ul>
<li>If you recall back to <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">when we talked to the OpenBSD foundation</a>, one of the things Ken mentioned was the <a href="https://www.coreinfrastructure.org" rel="nofollow">Core Infrastructure Initiative</a></li>
<li>In <a href="https://www.coreinfrastructure.org/faq" rel="nofollow">a nutshell</a>, it&#39;s an organization of security experts that helps facilitate (with money, in most cases) the advancement of the more critical open source components of the internet</li>
<li>The group is organized by the Linux foundation, and gets its multi-million dollar backing from various big companies in the technology space (and donations from volunteers) </li>
<li>To ensure that OpenBSD and its related projects (OpenSSH, LibreSSL and PF likely being the main ones here) remain healthy, they&#39;ve just made a large donation to the foundation - this makes them <a href="http://www.openbsdfoundation.org/contributors.html" rel="nofollow">the first</a> &quot;platinum&quot; level donor as well</li>
<li>While the exact amount wasn&#39;t disclosed, it was somewhere between $50,000 and $100,000</li>
<li>The donation comes less than a month after <a href="http://undeadly.org/cgi?action=article&sid=20150708134520" rel="nofollow">Microsoft&#39;s big donation</a>, so it&#39;s good to see these large organizations helping out important open source projects that we depend on every day
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-mark-linimon.html" rel="nofollow">Another BSDCan report</a></h3>

<ul>
<li>The FreeBSD foundation is still getting trip reports from BSDCan, and this one comes from Mark Linimon</li>
<li>In his report, he mainly covers the devsummit and some discussion with the portmgr team</li>
<li>One notable change for the upcoming 10.2 release is that the default binary repository is now the quarterly branch - Mark talks a bit about this as well</li>
<li>He also gives his thoughts on using <a href="http://www.bsdnow.tv/episodes/2015_03_04-just_add_qemu" rel="nofollow">QEMU for cross-compiling packages</a> and network performance testing
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/08/lumina-desktop-0-8-6-released/" rel="nofollow">Lumina 0.8.6 released</a></h3>

<ul>
<li>The PC-BSD team has released another version of <a href="http://www.lumina-desktop.org/" rel="nofollow">Lumina</a>, their BSD-licensed desktop environment</li>
<li>This is mainly a bugfix and performance improvement release, rather than one with lots of new features</li>
<li>The on-screen display widget should be much faster now, and the configuration now allows for easier selection of default applications (which browser, which terminal, etc)</li>
<li>Lots of non-English translation updates and assorted fixes are included as well</li>
<li>If you haven&#39;t given it a try yet, or maybe you&#39;re looking for a new window manager, Lumina runs on all the BSDs
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150730180506" rel="nofollow">More c2k15 hackathon reports</a></h3>

<ul>
<li>Even more reports from OpenBSD&#39;s latest hackathon are starting to pour in</li>
<li>The first one is from Alexandr Nedvedicky, one of their brand new developers (the guy from Oracle)</li>
<li>He talks about his experience going to a hackathon for the first time, and lays out some of the plans for integrating their (very large) SMP PF patch into OpenBSD</li>
<li>Second up <a href="http://undeadly.org/cgi?action=article&sid=20150731191156&mode=flat" rel="nofollow">is Andrew Fresh</a>, who went without any specific plans, but still ended up getting some UTF8 work done</li>
<li>On the topic of ARMv7, &quot;I did enjoy being there when things weren&#39;t working so [Brandon Mercer] could futilely try to explain the problem to me (I wasn&#39;t much help with kernel memory layouts). Fortunately others overheard and provided words of encouragement and some help which was one of my favorite parts of attending this hackathon.&quot;</li>
<li>Florian Obser sent in a report that includes <a href="http://undeadly.org/cgi?action=article&sid=20150805151453" rel="nofollow">a little bit of everything</a>: setting up the hackathon&#39;s network, relayd and httpd work, bidirectional forwarding detection, airplane stories and even lots of food</li>
<li>Paul Irofti <a href="http://undeadly.org/cgi?action=article&sid=20150801100002&mode=flat" rel="nofollow">wrote in as well</a> about his activities, which were mainly focused on the Octeon CPU architecture</li>
<li>He wrote a new driver for the onboard flash of a DSR-500 machine, which was built following the Common Flash Interface specification</li>
<li>This means that, going forward, OpenBSD will have out-of-the-box support for any flash memory device (often the case for MIPS and ARM-based embedded devices)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205kqTEIj" rel="nofollow">Hamza writes in</a></li>
<li><a href="http://slexy.org/view/s2ogIP6cEf" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s214xE9ulK" rel="nofollow">Dominik writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>100: Straight from the Src</title>
  <link>https://www.bsdnow.tv/100</link>
  <guid isPermaLink="false">06d71c41-6630-4fa3-8cd3-46e35a9a535c</guid>
  <pubDate>Wed, 29 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/06d71c41-6630-4fa3-8cd3-46e35a9a535c.mp3" length="53030452" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</itunes:subtitle>
  <itunes:duration>1:13:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" target="_blank" rel="nofollow noopener"&gt;Remote DoS in the TCP stack&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing &lt;em&gt;remote&lt;/em&gt; attackers to exhaust the resources of a system with nothing more than TCP connections&lt;/li&gt;
&lt;li&gt;While in the LAST_ACK state, which is one of the final stages of a connection's lifetime, the connection can get stuck and hang there indefinitely&lt;/li&gt;
&lt;li&gt;This problem has a slightly confusing history that involves different fixes at different points in time from different people&lt;/li&gt;
&lt;li&gt;Juniper originally discovered the bug and &lt;a href="https://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=JSA10686" target="_blank" rel="nofollow noopener"&gt;announced a fix&lt;/a&gt; for their proprietary networking gear on June 8th&lt;/li&gt;
&lt;li&gt;On June 29th, FreeBSD caught wind of it and fixed the bug &lt;a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=284941&amp;amp;r2=284940&amp;amp;pathrev=284941" target="_blank" rel="nofollow noopener"&gt;in their -current branch&lt;/a&gt;, but did not issue a security notice or MFC the fix back to the -stable branches&lt;/li&gt;
&lt;li&gt;On July 13th, two weeks later, OpenBSD &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143682919807388&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;fixed the issue&lt;/a&gt; in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found&lt;/li&gt;
&lt;li&gt;Immediately afterwards, they merged it back to -stable and issued &lt;a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" target="_blank" rel="nofollow noopener"&gt;an errata notice&lt;/a&gt; for 5.7 and 5.6&lt;/li&gt;
&lt;li&gt;On July 21st, three weeks after their original fix, FreeBSD committed &lt;a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=285777&amp;amp;r2=285776&amp;amp;pathrev=285777" target="_blank" rel="nofollow noopener"&gt;yet another slightly different fix&lt;/a&gt; and issued &lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" target="_blank" rel="nofollow noopener"&gt;a security notice&lt;/a&gt; for the problem (which didn't include the first fix)&lt;/li&gt;
&lt;li&gt;After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way&lt;/li&gt;
&lt;li&gt;NetBSD confirmed they were vulnerable too, and &lt;a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&amp;amp;r2=1.184&amp;amp;only_with_tag=MAIN" target="_blank" rel="nofollow noopener"&gt;applied another completely different fix&lt;/a&gt; to -current on July 24th, but haven't released a security notice yet&lt;/li&gt;
&lt;li&gt;DragonFly is also investigating the issue now to see if they're affected as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150721180312&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;c2k15 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Reports from OpenBSD's latest &lt;a href="http://www.openbsd.org/hackathons.html" target="_blank" rel="nofollow noopener"&gt;hackathon&lt;/a&gt;, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)&lt;/li&gt;
&lt;li&gt;The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event&lt;/li&gt;
&lt;li&gt;He writes, "Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the "command" built-in command - and had to step through dozens of false positives with the less '/' and 'n' search keys before you finally found the actual definition?"&lt;/li&gt;
&lt;li&gt;With mandoc's new internal jump targets, this is a problem of the past now&lt;/li&gt;
&lt;li&gt;Jasper &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150723124332&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;also sent in a report&lt;/a&gt;, doing his usual work with Puppet (and specifically "Facter," a tool used by Puppet to gather various bits of system information)&lt;/li&gt;
&lt;li&gt;Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an "-i" flag for sed (hooray!)&lt;/li&gt;
&lt;li&gt;Antoine Jacoutot &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150722205349&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;gave a report&lt;/a&gt; on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)&lt;/li&gt;
&lt;li&gt;It now has an "ls" subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this "the poor man's service monitoring tool")&lt;/li&gt;
&lt;li&gt;He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)&lt;/li&gt;
&lt;li&gt;His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades&lt;/li&gt;
&lt;li&gt;Foundation director Ken Westerback &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150722105658&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;was also there&lt;/a&gt;, getting some disk-related and laptop work done&lt;/li&gt;
&lt;li&gt;He cleaned up and committed the 4k sector softraid code that he'd been working on, as well as fixing some trackpad issues&lt;/li&gt;
&lt;li&gt;Stefan Sperling, OpenBSD's token "wireless guy," had &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150722182236&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;a lot to say&lt;/a&gt; about the hackathon and what he did there (and even sent in his write-up before he got home)&lt;/li&gt;
&lt;li&gt;He taught tcpdump about some new things, including 802.11n metadata beacons (there's a lot more specific detail about this one in the report)&lt;/li&gt;
&lt;li&gt;Bringing &lt;em&gt;a bag full of USB wireless devices&lt;/em&gt; with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work&lt;/li&gt;
&lt;li&gt;One quote from Stefan's report that a lot of people seem to be talking about: "Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We'll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year."&lt;/li&gt;
&lt;li&gt;Jeremy Evans &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150725180527&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;wrote in&lt;/a&gt; to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem&lt;/li&gt;
&lt;li&gt;While he's mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon&lt;/li&gt;
&lt;li&gt;Rafael Zalamena, who got commit access at the event, &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150725183439&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;gives his very first report&lt;/a&gt; on his networking-related hackathon activities&lt;/li&gt;
&lt;li&gt;With Rafael's diffs and help from a couple other developers, OpenBSD now has support for &lt;a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" target="_blank" rel="nofollow noopener"&gt;VPLS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jonathan Gray &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150728184743&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;got a lot done&lt;/a&gt; in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code&lt;/li&gt;
&lt;li&gt;As he's become somewhat known for, Jonathan was also busy running three things in the background: clang's fuzzer, cppcheck and AFL (looking for any potential crashes to fix)&lt;/li&gt;
&lt;li&gt;Martin Pieuchot &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150724183210&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;gave an write-up&lt;/a&gt; on his experience: "I always though that hackathons were the best place to write code, but what's even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that's what I did."&lt;/li&gt;
&lt;li&gt;He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack&lt;/li&gt;
&lt;li&gt;Unfortunately, most of Martin's secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle&lt;/li&gt;
&lt;li&gt;We're still eagerly awaiting a report from one of OpenBSD's &lt;a href="https://twitter.com/phessler/status/623291827878137856" target="_blank" rel="nofollow noopener"&gt;newest developers&lt;/a&gt;, Alexandr Nedvedicky (the Oracle guy who's working on SMP PF and some other PF fixes)&lt;/li&gt;
&lt;li&gt;OpenBSD 5.8's "beta" status was recently &lt;strong&gt;reverted&lt;/strong&gt;, with the message "&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143766883514831&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;take that as a hint&lt;/a&gt;," so that may mean more big changes are still to come...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD quarterly status report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far&lt;/li&gt;
&lt;li&gt;It's broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others&lt;/li&gt;
&lt;li&gt;Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just "svn.freebsd.org") are now using GeoGNS with official SSL certs and general redundancy was increased&lt;/li&gt;
&lt;li&gt;In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages&lt;/li&gt;
&lt;li&gt;The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon&lt;/li&gt;
&lt;li&gt;Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)&lt;/li&gt;
&lt;li&gt;The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support&lt;/li&gt;
&lt;li&gt;Multipath TCP was also a hot topic, and there's a brief summary of the current status on that patch (it will be available publicly soon)&lt;/li&gt;
&lt;li&gt;ZFSguru, a project we haven't talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August&lt;/li&gt;
&lt;li&gt;PCIe hotplug support is also mentioned, though it's still in the development stages (basic hot-swap functions are working though)&lt;/li&gt;
&lt;li&gt;The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling&lt;/li&gt;
&lt;li&gt;Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report&lt;/li&gt;
&lt;li&gt;Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot&lt;/li&gt;
&lt;li&gt;Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" target="_blank" rel="nofollow noopener"&gt;The OpenSSH bug that wasn't&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There's been a lot of &lt;a href="https://www.marc.info/?t=143766048000005&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt; about &lt;a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" target="_blank" rel="nofollow noopener"&gt;a supposed flaw&lt;/a&gt; in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)&lt;/li&gt;
&lt;li&gt;There's no actual &lt;em&gt;exploit&lt;/em&gt; to speak of; this bug would only help someone get more bruteforce tries in with a &lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" target="_blank" rel="nofollow noopener"&gt;fewer number of connections&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FreeBSD in its default configuration, with &lt;a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" target="_blank" rel="nofollow noopener"&gt;PAM&lt;/a&gt; and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143767296016252&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;not upstream OpenSSH&lt;/a&gt;, nor any of the other BSDs, and not even the majority of Linux distros&lt;/li&gt;
&lt;li&gt;If you disable all forms of authentication except public keys, &lt;a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" target="_blank" rel="nofollow noopener"&gt;like you're supposed to&lt;/a&gt;, then this is also not a big deal for FreeBSD systems&lt;/li&gt;
&lt;li&gt;Realistically speaking, it's more of &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143782167322500&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;a PAM bug&lt;/a&gt; than anything else&lt;/li&gt;
&lt;li&gt;OpenSSH &lt;a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" target="_blank" rel="nofollow noopener"&gt;added an additional check&lt;/a&gt; for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can &lt;a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" target="_blank" rel="nofollow noopener"&gt;run freebsd-update&lt;/a&gt;)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Sebastian Wiedenroth - &lt;a href="mailto:wiedi@netbsd.org" target="_blank" rel="nofollow noopener"&gt;wiedi@netbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/wied0r" target="_blank" rel="nofollow noopener"&gt;@wied0r&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/Pkgsrc" target="_blank" rel="nofollow noopener"&gt;pkgsrc&lt;/a&gt; and &lt;a href="http://pkgsrc.org/pkgsrcCon/" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://tribaal.io/this-now-served-by-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Now served by OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it&lt;/li&gt;
&lt;li&gt;The use case for the author was for a webserver, so he decided to try out the httpd in base&lt;/li&gt;
&lt;li&gt;Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting&lt;/li&gt;
&lt;li&gt;TLS 1.2 by default, strong ciphers with LibreSSL and &lt;a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" target="_blank" rel="nofollow noopener"&gt;HSTS&lt;/a&gt; combined give you a pretty secure web server
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/sean-/freebsd-laptops" target="_blank" rel="nofollow noopener"&gt;FreeBSD laptop playbooks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named "freebsd-laptops"&lt;/li&gt;
&lt;li&gt;It's based on ansible, and uses the playbook format for automatic set up and configuration&lt;/li&gt;
&lt;li&gt;Right now, it's only working on a single Lenovo laptop, but the plan is to add instructions for many more models&lt;/li&gt;
&lt;li&gt;Check the Github page for instructions on how to get started, and maybe get involved if you're running FreeBSD on a laptop
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" target="_blank" rel="nofollow noopener"&gt;NetBSD on the NVIDIA Jetson TK1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've never heard of the &lt;a href="https://developer.nvidia.com/jetson-tk1" target="_blank" rel="nofollow noopener"&gt;Jetson TK1&lt;/a&gt;, we can go ahead and spoil the secret here: NetBSD runs on it&lt;/li&gt;
&lt;li&gt;As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE&lt;/li&gt;
&lt;li&gt;This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)&lt;/li&gt;
&lt;li&gt;You can even run X11 on it, pretty sweet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" target="_blank" rel="nofollow noopener"&gt;DragonFly power mangement options&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFly developer Sepherosa, who we've had on the show, has been doing some ACPI work over there&lt;/li&gt;
&lt;li&gt;In this email, he presents some of DragonFly's different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well&lt;/li&gt;
&lt;li&gt;He also did some testing with each of them and gave his findings about power saving&lt;/li&gt;
&lt;li&gt;If you've been thinking about running DragonFly on a laptop, this would be a good one to read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" target="_blank" rel="nofollow noopener"&gt;OpenBSD router under FreeBSD bhyve&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If one BSD just isn't enough for you, and you've only got one machine, why not run two at once&lt;/li&gt;
&lt;li&gt;This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it&lt;/li&gt;
&lt;li&gt;If you've been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware&lt;/li&gt;
&lt;li&gt;The author also includes a little bit of history on how he got into both operating systems&lt;/li&gt;
&lt;li&gt;There are lots of mixed opinions about virtualizing core network components, so we'll leave it up to you to do your research&lt;/li&gt;
&lt;li&gt;Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yPVV5Wyp" target="_blank" rel="nofollow noopener"&gt;Kevin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21zcz9rut" target="_blank" rel="nofollow noopener"&gt;Logan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21CRmiPwK" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s211zfIXff" target="_blank" rel="nofollow noopener"&gt;Randy writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, pkgsrccon, portability, illumos, solaris, openindiana, opensolaris, zfs, openzfs, tcp, dos, c2k15, hackathon, openssh, pam, exploit, smartos, omnios, joyent, delphix</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
