<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 29 Apr 2026 11:41:10 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Clang”</title>
    <link>https://www.bsdnow.tv/tags/clang</link>
    <pubDate>Thu, 30 Nov 2023 08:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>535: Untitled Episode</title>
  <link>https://www.bsdnow.tv/535</link>
  <guid isPermaLink="false">610bc47e-40b5-420b-bfd1-343fadf60a04</guid>
  <pubDate>Thu, 30 Nov 2023 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/610bc47e-40b5-420b-bfd1-343fadf60a04.mp3" length="54371712" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD 14 has been released, Reading your RSS feed on FreeBSD, Manipulate PDF files easily with pdftk, clang(1)/llvm updated to version 16 in OpenBSD, NetBSD Security Advisory: multiple vulnerabilities in ftpd(8), and more</itunes:subtitle>
  <itunes:duration>56:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD 14 has been released, Reading your RSS feed on FreeBSD, Manipulate PDF files easily with pdftk, clang(1)/llvm updated to version 16 in OpenBSD, NetBSD Security Advisory: multiple vulnerabilities in ftpd(8), and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
FreeBSD 14 (https://www.freebsd.org/releases/14.0R/relnotes/)
• [Quick update](https://www.daemonology.net/blog/2023-11-21-late-breaking-FreeBSD-14-breakage.html)
• [Vermaden’s FreeBSD 14 valuable news] (https://vermaden.wordpress.com/2023/11/17/valuable-freebsd-14-0-release-updates)
News Roundup
Reading your RSS feed on FreeBSD (https://www.ncartron.org/reading-your-rss-feed-on-freebsd.html)
Manipulate PDF files easily with pdftk (https://dataswamp.org/~solene/2023-08-19-pdftk-guide.html)
clang(1)/llvm updated to version 16 (https://www.undeadly.org/cgi?action=article;sid=20231113160314&amp;amp;utm_source=bsdweekly)
NetBSD Security Advisory 2023-007: multiple vulnerabilities in ftpd(8) (https://bsdsec.net/articles/netbsd-security-advisory-2023-007-multiple-vulnerabilities-in-ftpd-8)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Brad - zpool disk allocation questions (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/535/feedback/Brad%20-%20zpool%20disk%20allocation%20questions.md)
Kevin - shell question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/535/feedback/Kevin%20-%20shell%20question.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, freebsd 14, rss, feed, feed reader, pdftk, clang, llvm, security advisory, ftpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 14 has been released, Reading your RSS feed on FreeBSD, Manipulate PDF files easily with pdftk, clang(1)/llvm updated to version 16 in OpenBSD, NetBSD Security Advisory: multiple vulnerabilities in ftpd(8), and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/14.0R/relnotes/" rel="nofollow">FreeBSD 14</a></h3>

<pre><code>• [Quick update](https://www.daemonology.net/blog/2023-11-21-late-breaking-FreeBSD-14-breakage.html)
• [Vermaden’s FreeBSD 14 valuable news] (https://vermaden.wordpress.com/2023/11/17/valuable-freebsd-14-0-release-updates)
</code></pre>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.ncartron.org/reading-your-rss-feed-on-freebsd.html" rel="nofollow">Reading your RSS feed on FreeBSD</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2023-08-19-pdftk-guide.html" rel="nofollow">Manipulate PDF files easily with pdftk</a></h3>

<hr>

<h3><a href="https://www.undeadly.org/cgi?action=article;sid=20231113160314&utm_source=bsdweekly" rel="nofollow">clang(1)/llvm updated to version 16</a></h3>

<hr>

<h3><a href="https://bsdsec.net/articles/netbsd-security-advisory-2023-007-multiple-vulnerabilities-in-ftpd-8" rel="nofollow">NetBSD Security Advisory 2023-007: multiple vulnerabilities in ftpd(8)</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/535/feedback/Brad%20-%20zpool%20disk%20allocation%20questions.md" rel="nofollow">Brad - zpool disk allocation questions</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/535/feedback/Kevin%20-%20shell%20question.md" rel="nofollow">Kevin - shell question</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 14 has been released, Reading your RSS feed on FreeBSD, Manipulate PDF files easily with pdftk, clang(1)/llvm updated to version 16 in OpenBSD, NetBSD Security Advisory: multiple vulnerabilities in ftpd(8), and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/14.0R/relnotes/" rel="nofollow">FreeBSD 14</a></h3>

<pre><code>• [Quick update](https://www.daemonology.net/blog/2023-11-21-late-breaking-FreeBSD-14-breakage.html)
• [Vermaden’s FreeBSD 14 valuable news] (https://vermaden.wordpress.com/2023/11/17/valuable-freebsd-14-0-release-updates)
</code></pre>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.ncartron.org/reading-your-rss-feed-on-freebsd.html" rel="nofollow">Reading your RSS feed on FreeBSD</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2023-08-19-pdftk-guide.html" rel="nofollow">Manipulate PDF files easily with pdftk</a></h3>

<hr>

<h3><a href="https://www.undeadly.org/cgi?action=article;sid=20231113160314&utm_source=bsdweekly" rel="nofollow">clang(1)/llvm updated to version 16</a></h3>

<hr>

<h3><a href="https://bsdsec.net/articles/netbsd-security-advisory-2023-007-multiple-vulnerabilities-in-ftpd-8" rel="nofollow">NetBSD Security Advisory 2023-007: multiple vulnerabilities in ftpd(8)</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/535/feedback/Brad%20-%20zpool%20disk%20allocation%20questions.md" rel="nofollow">Brad - zpool disk allocation questions</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/535/feedback/Kevin%20-%20shell%20question.md" rel="nofollow">Kevin - shell question</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>302: Contention Reduction</title>
  <link>https://www.bsdnow.tv/302</link>
  <guid isPermaLink="false">42938801-0d4a-4cf9-a297-c1eeddac85dc</guid>
  <pubDate>Wed, 12 Jun 2019 23:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/42938801-0d4a-4cf9-a297-c1eeddac85dc.mp3" length="50043425" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>DragonFlyBSD's kernel optimizations pay off, differences between OpenBSD and Linux, NetBSD 2019 Google Summer of Code project list, Reducing that contention, fnaify 1.3 released, vmctl(8): CLI syntax changes, and things that Linux distributions should not do when packaging.</itunes:subtitle>
  <itunes:duration>1:09:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>DragonFlyBSD's kernel optimizations pay off, differences between OpenBSD and Linux, NetBSD 2019 Google Summer of Code project list, Reducing that contention, fnaify 1.3 released, vmctl(8): CLI syntax changes, and things that Linux distributions should not do when packaging.
Headlines
DragonFlyBSD's Kernel Optimizations Are Paying Off (https://www.phoronix.com/scan.php?page=article&amp;amp;item=dragonfly-55-threadripper&amp;amp;num=1)
DragonFlyBSD lead developer Matthew Dillon has been working on a big VM rework in the name of performance and other kernel improvements recently. Here is a look at how those DragonFlyBSD 5.5-DEVELOPMENT improvements are paying off compared to DragonFlyBSD 5.4 as well as FreeBSD 12 and five Linux distribution releases. With Dillon using an AMD Ryzen Threadripper system, we used that too for this round of BSD vs. Linux performance benchmarks.
The work by Dillon on the VM overhaul and other changes (including more HAMMER2 file-system work) will ultimately culminate with the DragonFlyBSD 5.6 release (well, unless he opts for DragonFlyBSD 6.0 or so). These are benchmarks of the latest DragonFlyBSD 5.5-DEVELOPMENT daily ISO as of this week benchmarked across DragonFlyBSD 5.4.3 stable, FreeBSD 12.0, Ubuntu 19.04, Red Hat Enterprise Linux 8.0, Debian 9.9, Debian Buster, and CentOS 7 1810 as a wide variety of reference points both from newer and older Linux distributions. (As for no Clear Linux reference point for a speedy reference point, it currently has a regression with AMD + Samsung NVMe SSD support on some hardware, including this box, prohibiting the drive from coming up due to a presumed power management issue that is still being resolved.)
With Matthew Dillon doing much of his development on an AMD Ryzen Threadripper system after he last year proclaimed the greatness of these AMD HEDT CPUs, for this round of testing I also used a Ryzen Threadripper 2990WX with 32 cores / 64 threads. Tests of other AMD/Intel hardware with DragonFlyBSD will come as the next stable release is near and all of the kernel work has settled down. For now it's mostly entertaining our own curiosity how well these DragonFlyBSD optimizations are paying off and how it's increasing the competition against FreeBSD 12 and Linux distributions.
What are the differences between OpenBSD and Linux? (https://cfenollosa.com/blog/what-are-the-differences-between-openbsd-and-linux.html)
Maybe you have been reading recently about the release of OpenBSD 6.5 and wonder, "What are the differences between Linux and OpenBSD?"
I've also been there at some point in the past and these are my conclusions.
They also apply, to some extent, to other BSDs. However, an important disclaimer applies to this article.
This list is aimed at people who are used to Linux and are curious about OpenBSD. It is written to highlight the most important changes from their perspective, not the absolute most important changes from a technical standpoint.
Please bear with me.
A terminal is a terminal is a terminal
Practical differences
Security and system administration
Why philosophical differences matter
So what do I choose?
How to try OpenBSD
***
News Roundup
NetBSD 2019 Google Summer of Code (http://blog.netbsd.org/tnf/entry/announcing_google_summer_of_code1)
We are very happy to announce The NetBSD Foundation Google Summer of Code 2019 projects:
Akul Abhilash Pillai - Adapting TriforceAFL for NetBSD kernel fuzzing
Manikishan Ghantasala - Add KNF (NetBSD style) clang-format configuration
Siddharth Muralee - Enhancing Syzkaller support for NetBSD
Surya P - Implementation of COMPATLINUX and COMPATNETBSD32 DRM ioctls support for NetBSD kernel
Jason High - Incorporation of Argon2 Password Hashing Algorithm into NetBSD
Saurav Prakash - Porting NetBSD to HummingBoard Pulse
Naveen Narayanan - Porting WINE to amd64 architecture on NetBSD
The communiting bonding period - where students get in touch with mentors and community - started yesterday. The coding period will start from May 27 until August 19.
Please welcome all our students and a big good luck to students and mentors! A big thank to Google and The NetBSD Foundation organization mentors and administrators! Looking forward to a great Google Summer of Code!
Reducing that contention (http://www.grenadille.net/post/2019/05/09/Reducing-that-contention)
The opening keynote at EuroBSDCon 2016 predicted the future 10 years of BSDs. Amongst all the funny previsions, gnn@FreeBSD said that by 2026 OpenBSD will have its first implementation of SMP. Almost 3 years after this talk, that sounds like a plausible forecast... Why? Where are we? What can we do? Let's dive into the issue!
State of affairs
Most of OpenBSD's kernel still runs under a single lock, ze KERNEL_LOCK(). That includes most of the syscalls, most of the interrupt handlers and most of the fault handlers. Most of them, not all of them. Meaning we have collected &amp;amp; fixed bugs while setting up infrastructures and examples. Now this lock remains the principal responsible for the spin % you can observe in top(1) and systat(1).
I believe that we opted for a difficult hike when we decided to start removing this lock from the bottom. As a result many SCSI &amp;amp; Network interrupt handlers as well as all Audio &amp;amp; USB ones can be executed without big lock. On the other hand very few syscalls are already or almost ready to be unlocked, as we incorrectly say. This explains why basic primitives like tsleep(9), csignal() and selwakeup() are only receiving attention now that the top of the Network Stack is running (mostly) without big lock.
Next steps
In the past years, most of our efforts have been invested into the Network Stack. As I already mentioned it should be ready to be parallelized. However think we should now concentrate on removing the KERNEL_LOCK(), even if the code paths aren't performance critical. 
See the Article for the rest of the post
fnaify 1.3 released - more games are "fnaify &amp;amp; run" now (https://www.reddit.com/r/openbsd_gaming/comments/btste9/fnaify_13_released_more_games_are_fnaify_run_now/)
This release finally addresses some of the problems that prevent simple running of several games.
This happens for example when an old FNA.dll library comes with the games that doesn't match the API of our native libraries like SDL2, OpenAL, or MojoShader anymore. Some of those cases can be fixed by simply dropping in a newer FNA.dll. fnaify now asks if FNA 17.12 should be automatically added if a known incompatible FNA version is found. You simply answer yes or no. 
Another blocker happens when the game expects to check the SteamAPI - either from a running Steam process, or a bundled steam_api library. OpenBSD 6.5-current now has steamworks-nosteam in ports, a stub library for Steamworks.NET that prevents games from crashing simply because an API function isn't found. The repo is here. fnaify now finds this library in /usr/local/share/steamstubs and uses it instead of the bundled (full) Steamworks.NET.dll.
This may help with any games that use this layer to interact with the SteamAPI, mostly those that can only be obtained via Steam. 
vmctl(8): command line syntax changed (https://www.openbsd.org/faq/current.html#r20190529)
The order of the arguments in the create, start, and stop commands of vmctl(8) has been changed to match a commonly expected style. Manual usage or scripting with vmctl must be adjusted to use the new syntax. 
For example, the old syntax looked like this:
# vmctl create disk.qcow2 -s 50G
The new syntax specifies the command options before the argument:
# vmctl create -s 50G disk.qcow2
Something that Linux distributions should not do when packaging things (https://utcc.utoronto.ca/~cks/space/blog/linux/PackageNameClashProblem)
Right now I am a bit unhappy at Fedora for a specific packaging situation, so let me tell you a little story of what I, as a system administrator, would really like distributions to not do.
For reasons beyond the scope of this blog entry, I run a Prometheus and Grafana setup on both my home and office Fedora Linux machines (among other things, it gives me a place to test out various things involving them). When I set this up, I used the official upstream versions of both, because I needed to match what we are running (or would soon be).
Recently, Fedora decided to package Grafana themselves (as a RPM), and they called this RPM package 'grafana'. Since the two different packages are different versions of the same thing as far as package management tools are concerned, Fedora basically took over the 'grafana' package name from Grafana. This caused my systems to offer to upgrade me from the Grafana.com 'grafana-6.1.5-1' package to the Fedora 'grafana-6.1.6-1.fc29' one, which I actually did after taking reasonable steps to make sure that the Fedora version of 6.1.6 was compatible with the file layouts and so on from the Grafana version of 6.1.5.
Why is this a problem? It's simple. If you're going to take over a package name from the upstream, you should keep up with the upstream releases. If you take over a package name and don't keep up to date or keep up to date only sporadically, you cause all sorts of heartburn for system administrators who use the package. The least annoying future of this situation is that Fedora has abandoned Grafana at 6.1.6 and I am going to 'upgrade' it with the upstream 6.2.1, which will hopefully be a transparent replacement and not blow up in my face. The most annoying future is that Fedora and Grafana keep ping-ponging versions back and forth, which will make 'dnf upgrade' into a minefield (because it will frequently try to give me a 'grafana' upgrade that I don't want and that would be dangerous to accept). And of course this situation turns Fedora version upgrades into their own minefield, since now I risk an upgrade to Fedora 30 actually reverting the 'grafana' package version on me.
Beastie Bits
[talk] ZFS v UFS on APU2 msata SSD with FreeBSD (http://lists.nycbug.org:8080/pipermail/talk/2019-May/017885.html)
NetBSD 8.1 is out (http://www.netbsd.org/releases/formal-8/NetBSD-8.1.html)
lazyboi – the laziest possible way to send raw HTTP POST data (https://github.com/ctsrc/lazyboi)
A Keyboard layout that changes by markov frequency (https://github.com/shapr/markovkeyboard)
Open Source Game Clones (https://osgameclones.com/)
EuroBSDcon program &amp;amp; registration open (https://eurobsdcon.org)
***
Feedback/Questions
John - A segment idea (http://dpaste.com/3YTBQTX#wrap)
Johnny - Audio only format please don't (http://dpaste.com/3WD0A25#wrap)
Alex - Thanks and some Linux Snaps vs PBI feedback (http://dpaste.com/1RQF4QM#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <content:encoded>
    <![CDATA[<p>DragonFlyBSD&#39;s kernel optimizations pay off, differences between OpenBSD and Linux, NetBSD 2019 Google Summer of Code project list, Reducing that contention, fnaify 1.3 released, vmctl(8): CLI syntax changes, and things that Linux distributions should not do when packaging.</p>

<h2>Headlines</h2>

<h3><a href="https://www.phoronix.com/scan.php?page=article&item=dragonfly-55-threadripper&num=1" rel="nofollow">DragonFlyBSD&#39;s Kernel Optimizations Are Paying Off</a></h3>

<blockquote>
<p>DragonFlyBSD lead developer Matthew Dillon has been working on a big VM rework in the name of performance and other kernel improvements recently. Here is a look at how those DragonFlyBSD 5.5-DEVELOPMENT improvements are paying off compared to DragonFlyBSD 5.4 as well as FreeBSD 12 and five Linux distribution releases. With Dillon using an AMD Ryzen Threadripper system, we used that too for this round of BSD vs. Linux performance benchmarks.<br>
The work by Dillon on the VM overhaul and other changes (including more HAMMER2 file-system work) will ultimately culminate with the DragonFlyBSD 5.6 release (well, unless he opts for DragonFlyBSD 6.0 or so). These are benchmarks of the latest DragonFlyBSD 5.5-DEVELOPMENT daily ISO as of this week benchmarked across DragonFlyBSD 5.4.3 stable, FreeBSD 12.0, Ubuntu 19.04, Red Hat Enterprise Linux 8.0, Debian 9.9, Debian Buster, and CentOS 7 1810 as a wide variety of reference points both from newer and older Linux distributions. (As for no Clear Linux reference point for a speedy reference point, it currently has a regression with AMD + Samsung NVMe SSD support on some hardware, including this box, prohibiting the drive from coming up due to a presumed power management issue that is still being resolved.)<br>
With Matthew Dillon doing much of his development on an AMD Ryzen Threadripper system after he last year proclaimed the greatness of these AMD HEDT CPUs, for this round of testing I also used a Ryzen Threadripper 2990WX with 32 cores / 64 threads. Tests of other AMD/Intel hardware with DragonFlyBSD will come as the next stable release is near and all of the kernel work has settled down. For now it&#39;s mostly entertaining our own curiosity how well these DragonFlyBSD optimizations are paying off and how it&#39;s increasing the competition against FreeBSD 12 and Linux distributions.</p>

<hr>
</blockquote>

<h3><a href="https://cfenollosa.com/blog/what-are-the-differences-between-openbsd-and-linux.html" rel="nofollow">What are the differences between OpenBSD and Linux?</a></h3>

<blockquote>
<p>Maybe you have been reading recently about the release of OpenBSD 6.5 and wonder, &quot;What are the differences between Linux and OpenBSD?&quot;<br>
I&#39;ve also been there at some point in the past and these are my conclusions.<br>
They also apply, to some extent, to other BSDs. However, an important disclaimer applies to this article.<br>
This list is aimed at people who are used to Linux and are curious about OpenBSD. It is written to highlight the most important changes from their perspective, not the absolute most important changes from a technical standpoint.<br>
Please bear with me.</p>
</blockquote>

<ul>
<li>A terminal is a terminal is a terminal</li>
<li>Practical differences</li>
<li>Security and system administration</li>
<li>Why philosophical differences matter</li>
<li>So what do I choose?</li>
<li>How to try OpenBSD
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.netbsd.org/tnf/entry/announcing_google_summer_of_code1" rel="nofollow">NetBSD 2019 Google Summer of Code</a></h3>

<blockquote>
<p>We are very happy to announce The NetBSD Foundation Google Summer of Code 2019 projects:</p>
</blockquote>

<ul>
<li>Akul Abhilash Pillai - Adapting TriforceAFL for NetBSD kernel fuzzing</li>
<li>Manikishan Ghantasala - Add KNF (NetBSD style) clang-format configuration</li>
<li>Siddharth Muralee - Enhancing Syzkaller support for NetBSD</li>
<li>Surya P - Implementation of COMPAT_LINUX and COMPAT_NETBSD32 DRM ioctls support for NetBSD kernel</li>
<li>Jason High - Incorporation of Argon2 Password Hashing Algorithm into NetBSD</li>
<li>Saurav Prakash - Porting NetBSD to HummingBoard Pulse</li>
<li>Naveen Narayanan - Porting WINE to amd64 architecture on NetBSD</li>
</ul>

<blockquote>
<p>The communiting bonding period - where students get in touch with mentors and community - started yesterday. The coding period will start from May 27 until August 19.<br>
Please welcome all our students and a big good luck to students and mentors! A big thank to Google and The NetBSD Foundation organization mentors and administrators! Looking forward to a great Google Summer of Code!</p>
</blockquote>

<hr>

<h3><a href="http://www.grenadille.net/post/2019/05/09/Reducing-that-contention" rel="nofollow">Reducing that contention</a></h3>

<blockquote>
<p>The opening keynote at EuroBSDCon 2016 predicted the future 10 years of BSDs. Amongst all the funny previsions, gnn@FreeBSD said that by 2026 OpenBSD will have its first implementation of SMP. Almost 3 years after this talk, that sounds like a plausible forecast... Why? Where are we? What can we do? Let&#39;s dive into the issue!</p>
</blockquote>

<ul>
<li>State of affairs</li>
</ul>

<blockquote>
<p>Most of OpenBSD&#39;s kernel still runs under a single lock, ze KERNEL_LOCK(). That includes most of the syscalls, most of the interrupt handlers and most of the fault handlers. Most of them, not all of them. Meaning we have collected &amp; fixed bugs while setting up infrastructures and examples. Now this lock remains the principal responsible for the spin % you can observe in top(1) and systat(1).<br>
I believe that we opted for a difficult hike when we decided to start removing this lock from the bottom. As a result many SCSI &amp; Network interrupt handlers as well as all Audio &amp; USB ones can be executed without big lock. On the other hand very few syscalls are already or almost ready to be unlocked, as we incorrectly say. This explains why basic primitives like tsleep(9), csignal() and selwakeup() are only receiving attention now that the top of the Network Stack is running (mostly) without big lock.</p>
</blockquote>

<ul>
<li>Next steps</li>
</ul>

<blockquote>
<p>In the past years, most of our efforts have been invested into the Network Stack. As I already mentioned it should be ready to be parallelized. However think we should now concentrate on removing the KERNEL_LOCK(), even if the code paths aren&#39;t performance critical. </p>
</blockquote>

<ul>
<li>See the Article for the rest of the post</li>
</ul>

<hr>

<h3><a href="https://www.reddit.com/r/openbsd_gaming/comments/btste9/fnaify_13_released_more_games_are_fnaify_run_now/" rel="nofollow">fnaify 1.3 released - more games are &quot;fnaify &amp; run&quot; now</a></h3>

<blockquote>
<p>This release finally addresses some of the problems that prevent simple running of several games.<br>
This happens for example when an old FNA.dll library comes with the games that doesn&#39;t match the API of our native libraries like SDL2, OpenAL, or MojoShader anymore. Some of those cases can be fixed by simply dropping in a newer FNA.dll. fnaify now asks if FNA 17.12 should be automatically added if a known incompatible FNA version is found. You simply answer yes or no. </p>

<p>Another blocker happens when the game expects to check the SteamAPI - either from a running Steam process, or a bundled steam_api library. OpenBSD 6.5-current now has steamworks-nosteam in ports, a stub library for Steamworks.NET that prevents games from crashing simply because an API function isn&#39;t found. The repo is here. fnaify now finds this library in /usr/local/share/steamstubs and uses it instead of the bundled (full) Steamworks.NET.dll.<br>
This may help with any games that use this layer to interact with the SteamAPI, mostly those that can only be obtained via Steam. </p>
</blockquote>

<h3><a href="https://www.openbsd.org/faq/current.html#r20190529" rel="nofollow">vmctl(8): command line syntax changed</a></h3>

<blockquote>
<p>The order of the arguments in the create, start, and stop commands of vmctl(8) has been changed to match a commonly expected style. Manual usage or scripting with vmctl must be adjusted to use the new syntax. <br>
For example, the old syntax looked like this:</p>
</blockquote>

<p><code># vmctl create disk.qcow2 -s 50G</code></p>

<blockquote>
<p>The new syntax specifies the command options before the argument:</p>
</blockquote>

<p><code># vmctl create -s 50G disk.qcow2</code></p>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/linux/PackageNameClashProblem" rel="nofollow">Something that Linux distributions should not do when packaging things</a></h3>

<blockquote>
<p>Right now I am a bit unhappy at Fedora for a specific packaging situation, so let me tell you a little story of what I, as a system administrator, would really like distributions to not do.<br>
For reasons beyond the scope of this blog entry, I run a Prometheus and Grafana setup on both my home and office Fedora Linux machines (among other things, it gives me a place to test out various things involving them). When I set this up, I used the official upstream versions of both, because I needed to match what we are running (or would soon be).<br>
Recently, Fedora decided to package Grafana themselves (as a RPM), and they called this RPM package &#39;grafana&#39;. Since the two different packages are different versions of the same thing as far as package management tools are concerned, Fedora basically took over the &#39;grafana&#39; package name from Grafana. This caused my systems to offer to upgrade me from the Grafana.com &#39;grafana-6.1.5-1&#39; package to the Fedora &#39;grafana-6.1.6-1.fc29&#39; one, which I actually did after taking reasonable steps to make sure that the Fedora version of 6.1.6 was compatible with the file layouts and so on from the Grafana version of 6.1.5.<br>
Why is this a problem? It&#39;s simple. If you&#39;re going to take over a package name from the upstream, you should keep up with the upstream releases. If you take over a package name and don&#39;t keep up to date or keep up to date only sporadically, you cause all sorts of heartburn for system administrators who use the package. The least annoying future of this situation is that Fedora has abandoned Grafana at 6.1.6 and I am going to &#39;upgrade&#39; it with the upstream 6.2.1, which will hopefully be a transparent replacement and not blow up in my face. The most annoying future is that Fedora and Grafana keep ping-ponging versions back and forth, which will make &#39;dnf upgrade&#39; into a minefield (because it will frequently try to give me a &#39;grafana&#39; upgrade that I don&#39;t want and that would be dangerous to accept). And of course this situation turns Fedora version upgrades into their own minefield, since now I risk an upgrade to Fedora 30 actually reverting the &#39;grafana&#39; package version on me.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://lists.nycbug.org:8080/pipermail/talk/2019-May/017885.html" rel="nofollow">[talk] ZFS v UFS on APU2 msata SSD with FreeBSD</a></li>
<li><a href="http://www.netbsd.org/releases/formal-8/NetBSD-8.1.html" rel="nofollow">NetBSD 8.1 is out</a></li>
<li><a href="https://github.com/ctsrc/lazyboi" rel="nofollow">lazyboi – the laziest possible way to send raw HTTP POST data</a></li>
<li><a href="https://github.com/shapr/markovkeyboard" rel="nofollow">A Keyboard layout that changes by markov frequency</a></li>
<li><a href="https://osgameclones.com/" rel="nofollow">Open Source Game Clones</a></li>
<li><a href="https://eurobsdcon.org" rel="nofollow">EuroBSDcon program &amp; registration open</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>John - <a href="http://dpaste.com/3YTBQTX#wrap" rel="nofollow">A segment idea</a></li>
<li>Johnny - <a href="http://dpaste.com/3WD0A25#wrap" rel="nofollow">Audio only format please don&#39;t</a></li>
<li>Alex - <a href="http://dpaste.com/1RQF4QM#wrap" rel="nofollow">Thanks and some Linux Snaps vs PBI feedback</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0302.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>DragonFlyBSD&#39;s kernel optimizations pay off, differences between OpenBSD and Linux, NetBSD 2019 Google Summer of Code project list, Reducing that contention, fnaify 1.3 released, vmctl(8): CLI syntax changes, and things that Linux distributions should not do when packaging.</p>

<h2>Headlines</h2>

<h3><a href="https://www.phoronix.com/scan.php?page=article&item=dragonfly-55-threadripper&num=1" rel="nofollow">DragonFlyBSD&#39;s Kernel Optimizations Are Paying Off</a></h3>

<blockquote>
<p>DragonFlyBSD lead developer Matthew Dillon has been working on a big VM rework in the name of performance and other kernel improvements recently. Here is a look at how those DragonFlyBSD 5.5-DEVELOPMENT improvements are paying off compared to DragonFlyBSD 5.4 as well as FreeBSD 12 and five Linux distribution releases. With Dillon using an AMD Ryzen Threadripper system, we used that too for this round of BSD vs. Linux performance benchmarks.<br>
The work by Dillon on the VM overhaul and other changes (including more HAMMER2 file-system work) will ultimately culminate with the DragonFlyBSD 5.6 release (well, unless he opts for DragonFlyBSD 6.0 or so). These are benchmarks of the latest DragonFlyBSD 5.5-DEVELOPMENT daily ISO as of this week benchmarked across DragonFlyBSD 5.4.3 stable, FreeBSD 12.0, Ubuntu 19.04, Red Hat Enterprise Linux 8.0, Debian 9.9, Debian Buster, and CentOS 7 1810 as a wide variety of reference points both from newer and older Linux distributions. (As for no Clear Linux reference point for a speedy reference point, it currently has a regression with AMD + Samsung NVMe SSD support on some hardware, including this box, prohibiting the drive from coming up due to a presumed power management issue that is still being resolved.)<br>
With Matthew Dillon doing much of his development on an AMD Ryzen Threadripper system after he last year proclaimed the greatness of these AMD HEDT CPUs, for this round of testing I also used a Ryzen Threadripper 2990WX with 32 cores / 64 threads. Tests of other AMD/Intel hardware with DragonFlyBSD will come as the next stable release is near and all of the kernel work has settled down. For now it&#39;s mostly entertaining our own curiosity how well these DragonFlyBSD optimizations are paying off and how it&#39;s increasing the competition against FreeBSD 12 and Linux distributions.</p>

<hr>
</blockquote>

<h3><a href="https://cfenollosa.com/blog/what-are-the-differences-between-openbsd-and-linux.html" rel="nofollow">What are the differences between OpenBSD and Linux?</a></h3>

<blockquote>
<p>Maybe you have been reading recently about the release of OpenBSD 6.5 and wonder, &quot;What are the differences between Linux and OpenBSD?&quot;<br>
I&#39;ve also been there at some point in the past and these are my conclusions.<br>
They also apply, to some extent, to other BSDs. However, an important disclaimer applies to this article.<br>
This list is aimed at people who are used to Linux and are curious about OpenBSD. It is written to highlight the most important changes from their perspective, not the absolute most important changes from a technical standpoint.<br>
Please bear with me.</p>
</blockquote>

<ul>
<li>A terminal is a terminal is a terminal</li>
<li>Practical differences</li>
<li>Security and system administration</li>
<li>Why philosophical differences matter</li>
<li>So what do I choose?</li>
<li>How to try OpenBSD
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.netbsd.org/tnf/entry/announcing_google_summer_of_code1" rel="nofollow">NetBSD 2019 Google Summer of Code</a></h3>

<blockquote>
<p>We are very happy to announce The NetBSD Foundation Google Summer of Code 2019 projects:</p>
</blockquote>

<ul>
<li>Akul Abhilash Pillai - Adapting TriforceAFL for NetBSD kernel fuzzing</li>
<li>Manikishan Ghantasala - Add KNF (NetBSD style) clang-format configuration</li>
<li>Siddharth Muralee - Enhancing Syzkaller support for NetBSD</li>
<li>Surya P - Implementation of COMPAT_LINUX and COMPAT_NETBSD32 DRM ioctls support for NetBSD kernel</li>
<li>Jason High - Incorporation of Argon2 Password Hashing Algorithm into NetBSD</li>
<li>Saurav Prakash - Porting NetBSD to HummingBoard Pulse</li>
<li>Naveen Narayanan - Porting WINE to amd64 architecture on NetBSD</li>
</ul>

<blockquote>
<p>The communiting bonding period - where students get in touch with mentors and community - started yesterday. The coding period will start from May 27 until August 19.<br>
Please welcome all our students and a big good luck to students and mentors! A big thank to Google and The NetBSD Foundation organization mentors and administrators! Looking forward to a great Google Summer of Code!</p>
</blockquote>

<hr>

<h3><a href="http://www.grenadille.net/post/2019/05/09/Reducing-that-contention" rel="nofollow">Reducing that contention</a></h3>

<blockquote>
<p>The opening keynote at EuroBSDCon 2016 predicted the future 10 years of BSDs. Amongst all the funny previsions, gnn@FreeBSD said that by 2026 OpenBSD will have its first implementation of SMP. Almost 3 years after this talk, that sounds like a plausible forecast... Why? Where are we? What can we do? Let&#39;s dive into the issue!</p>
</blockquote>

<ul>
<li>State of affairs</li>
</ul>

<blockquote>
<p>Most of OpenBSD&#39;s kernel still runs under a single lock, ze KERNEL_LOCK(). That includes most of the syscalls, most of the interrupt handlers and most of the fault handlers. Most of them, not all of them. Meaning we have collected &amp; fixed bugs while setting up infrastructures and examples. Now this lock remains the principal responsible for the spin % you can observe in top(1) and systat(1).<br>
I believe that we opted for a difficult hike when we decided to start removing this lock from the bottom. As a result many SCSI &amp; Network interrupt handlers as well as all Audio &amp; USB ones can be executed without big lock. On the other hand very few syscalls are already or almost ready to be unlocked, as we incorrectly say. This explains why basic primitives like tsleep(9), csignal() and selwakeup() are only receiving attention now that the top of the Network Stack is running (mostly) without big lock.</p>
</blockquote>

<ul>
<li>Next steps</li>
</ul>

<blockquote>
<p>In the past years, most of our efforts have been invested into the Network Stack. As I already mentioned it should be ready to be parallelized. However think we should now concentrate on removing the KERNEL_LOCK(), even if the code paths aren&#39;t performance critical. </p>
</blockquote>

<ul>
<li>See the Article for the rest of the post</li>
</ul>

<hr>

<h3><a href="https://www.reddit.com/r/openbsd_gaming/comments/btste9/fnaify_13_released_more_games_are_fnaify_run_now/" rel="nofollow">fnaify 1.3 released - more games are &quot;fnaify &amp; run&quot; now</a></h3>

<blockquote>
<p>This release finally addresses some of the problems that prevent simple running of several games.<br>
This happens for example when an old FNA.dll library comes with the games that doesn&#39;t match the API of our native libraries like SDL2, OpenAL, or MojoShader anymore. Some of those cases can be fixed by simply dropping in a newer FNA.dll. fnaify now asks if FNA 17.12 should be automatically added if a known incompatible FNA version is found. You simply answer yes or no. </p>

<p>Another blocker happens when the game expects to check the SteamAPI - either from a running Steam process, or a bundled steam_api library. OpenBSD 6.5-current now has steamworks-nosteam in ports, a stub library for Steamworks.NET that prevents games from crashing simply because an API function isn&#39;t found. The repo is here. fnaify now finds this library in /usr/local/share/steamstubs and uses it instead of the bundled (full) Steamworks.NET.dll.<br>
This may help with any games that use this layer to interact with the SteamAPI, mostly those that can only be obtained via Steam. </p>
</blockquote>

<h3><a href="https://www.openbsd.org/faq/current.html#r20190529" rel="nofollow">vmctl(8): command line syntax changed</a></h3>

<blockquote>
<p>The order of the arguments in the create, start, and stop commands of vmctl(8) has been changed to match a commonly expected style. Manual usage or scripting with vmctl must be adjusted to use the new syntax. <br>
For example, the old syntax looked like this:</p>
</blockquote>

<p><code># vmctl create disk.qcow2 -s 50G</code></p>

<blockquote>
<p>The new syntax specifies the command options before the argument:</p>
</blockquote>

<p><code># vmctl create -s 50G disk.qcow2</code></p>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/linux/PackageNameClashProblem" rel="nofollow">Something that Linux distributions should not do when packaging things</a></h3>

<blockquote>
<p>Right now I am a bit unhappy at Fedora for a specific packaging situation, so let me tell you a little story of what I, as a system administrator, would really like distributions to not do.<br>
For reasons beyond the scope of this blog entry, I run a Prometheus and Grafana setup on both my home and office Fedora Linux machines (among other things, it gives me a place to test out various things involving them). When I set this up, I used the official upstream versions of both, because I needed to match what we are running (or would soon be).<br>
Recently, Fedora decided to package Grafana themselves (as a RPM), and they called this RPM package &#39;grafana&#39;. Since the two different packages are different versions of the same thing as far as package management tools are concerned, Fedora basically took over the &#39;grafana&#39; package name from Grafana. This caused my systems to offer to upgrade me from the Grafana.com &#39;grafana-6.1.5-1&#39; package to the Fedora &#39;grafana-6.1.6-1.fc29&#39; one, which I actually did after taking reasonable steps to make sure that the Fedora version of 6.1.6 was compatible with the file layouts and so on from the Grafana version of 6.1.5.<br>
Why is this a problem? It&#39;s simple. If you&#39;re going to take over a package name from the upstream, you should keep up with the upstream releases. If you take over a package name and don&#39;t keep up to date or keep up to date only sporadically, you cause all sorts of heartburn for system administrators who use the package. The least annoying future of this situation is that Fedora has abandoned Grafana at 6.1.6 and I am going to &#39;upgrade&#39; it with the upstream 6.2.1, which will hopefully be a transparent replacement and not blow up in my face. The most annoying future is that Fedora and Grafana keep ping-ponging versions back and forth, which will make &#39;dnf upgrade&#39; into a minefield (because it will frequently try to give me a &#39;grafana&#39; upgrade that I don&#39;t want and that would be dangerous to accept). And of course this situation turns Fedora version upgrades into their own minefield, since now I risk an upgrade to Fedora 30 actually reverting the &#39;grafana&#39; package version on me.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://lists.nycbug.org:8080/pipermail/talk/2019-May/017885.html" rel="nofollow">[talk] ZFS v UFS on APU2 msata SSD with FreeBSD</a></li>
<li><a href="http://www.netbsd.org/releases/formal-8/NetBSD-8.1.html" rel="nofollow">NetBSD 8.1 is out</a></li>
<li><a href="https://github.com/ctsrc/lazyboi" rel="nofollow">lazyboi – the laziest possible way to send raw HTTP POST data</a></li>
<li><a href="https://github.com/shapr/markovkeyboard" rel="nofollow">A Keyboard layout that changes by markov frequency</a></li>
<li><a href="https://osgameclones.com/" rel="nofollow">Open Source Game Clones</a></li>
<li><a href="https://eurobsdcon.org" rel="nofollow">EuroBSDcon program &amp; registration open</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>John - <a href="http://dpaste.com/3YTBQTX#wrap" rel="nofollow">A segment idea</a></li>
<li>Johnny - <a href="http://dpaste.com/3WD0A25#wrap" rel="nofollow">Audio only format please don&#39;t</a></li>
<li>Alex - <a href="http://dpaste.com/1RQF4QM#wrap" rel="nofollow">Thanks and some Linux Snaps vs PBI feedback</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0302.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>91: Vox Populi</title>
  <link>https://www.bsdnow.tv/91</link>
  <guid isPermaLink="false">fb5f8b6c-3786-48ec-b8ed-0e2d4d62f539</guid>
  <pubDate>Wed, 27 May 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/fb5f8b6c-3786-48ec-b8ed-0e2d4d62f539.mp3" length="52090996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we've got something pretty different. We went to a Linux convention and asked various people if they've ever tried BSD and what they know about it. Stay tuned for that, all this week's news and, of course, answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:12:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we've got something pretty different. We went to a Linux convention and asked various people if they've ever tried BSD and what they know about it. Stay tuned for that, all this week's news and, of course, answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
LUKS in OpenBSD (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143247114716771&amp;amp;w=2)
Last week, we were surprised to find out that DragonFlyBSD has support (http://leaf.dragonflybsd.org/cgi/web-man?command=cryptsetup&amp;amp;section=8) for dm-crypt (https://en.wikipedia.org/wiki/Dm-crypt), sometimes referred to as LUKS (Linux Unified Key Setup (https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup))
It looks like they might not be the only BSD with support for it for much longer, as OpenBSD is currently reviewing a patch for it as well
LUKS would presumably be an additional option in OpenBSD's softraid (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4) system, which already provides native disk encryption
Support hasn't been officially committed yet, it's still going through testing, but the code is there if you want to try it out and report your findings
If enabled, this might pave the way for the first (semi-)cross platform encryption scheme since the demise of TrueCrypt (and maybe other BSDs will get it too in time)
***
FreeBSD gets 64bit Linux emulation (https://lists.freebsd.org/pipermail/svn-src-head/2015-May/072255.html)
For those who might be unfamiliar, FreeBSD has an emulation layer (https://www.freebsd.org/doc/handbook/linuxemu.html) to run Linux-only binaries (as rare as they may be)
The most common use case is for desktop users, enabling them to run proprietary applications like Adobe Flash or Skype
Similar systems can also be found in NetBSD (https://www.netbsd.org/docs/guide/en/chap-linux.html) and OpenBSD (http://www.openbsd.org/faq/faq9.html#Interact) (though disabled by default on the latter)
However, until now, it's only supported binaries compiled for the i386 architecture
This new update, already committed to -CURRENT, will open some new possibilities that weren't previously possible
Meanwhile, HardenedBSD considers removing the emulation layer (https://hardenedbsd.org/content/poll-linuxulator-removal) entirely
***
BSD at Open Source Conference 2015 Nagoya (https://mail-index.netbsd.org/netbsd-advocacy/2015/05/23/msg000686.html)
We've covered the Japanese NetBSD users group setting up lots of machines at various conferences in the past, but now they're expanding
Their latest report includes many of the NetBSD things you'd expect, but also a couple OpenBSD machines
Some of the NetBSD ones included a Power Mac G4, SHARP NetWalker, Cubieboard2 and the not-so-foreign Raspberry Pi
One new addition of interest is the OMRON LUNA88k, running the luna88k (http://www.openbsd.org/luna88k.html) port of OpenBSD
There was even an old cell phone running Windows games (https://twitter.com/tsutsuii/status/601458973338775553) on NetBSD
Check the mailing list post for some (https://pbs.twimg.com/media/CFrSmztWEAAS2uE.jpg) links (http://image.movapic.com/pic/m_201505230541335560130d49213.jpeg) to (http://image.movapic.com/pic/m_2015052305145455600ccea723a.jpeg) all (https://pbs.twimg.com/media/CFjPv9_UEAA8iEx.jpg:large) of (https://pbs.twimg.com/media/CD4k6ZUUMAA0tEM.jpg) the (https://pbs.twimg.com/media/CFqn1GXUsAAFuro.jpg) nice (https://pbs.twimg.com/media/CFdIS2IUkAAZvjc.jpg) pictures (https://pbs.twimg.com/media/CFf5mToUIAAFrRU.jpg)
***
LLVM introduces OpenMP support (http://blog.llvm.org/2015/05/openmp-support_22.html)
One of the things that has kept some people in the GCC camp is the lack of OpenMP (https://en.wikipedia.org/wiki/OpenMP) support in LLVM
According to the blog post, it "enables Clang users to harness full power of modern multi-core processors with vector units"
With Clang being the default in FreeBSD, Bitrig and OS X, and with some other BSDs exploring the option of switching, the need for this potential speed boost was definitely there
This could also open some doors for more BSD in the area of high performance computing, putting an end to the current Linux monopoly
***
Interview - Eric, FSF, John, Jose, Kris and Stewart
Various "man on the street" style mini-interviews
News Roundup
BSD-licensed gettext replacement (https://gitlab.com/worr/libintl/blob/master/src/usr.bin/gettext/gettext.c)
If you've ever installed ports on any of the BSDs, you've probably had GNU's gettext pulled in as a dependency
Wikipedia says "gettext is an internationalization and localization (i18n) system commonly used for writing multilingual programs on Unix-like computer operating systems"
A new BSD-licensed rewrite has begun, with the initial version being for NetBSD (but it's likely to be portable)
If you've got some coding skills, get involved with the project - the more freely-licensed replacements, the better
***
Unix history git repo (https://github.com/dspinellis/unix-history-repo)
A git repository was recently created to show off some Unix source code history
The repository contains 659 thousand commits and 2306 merges
You can see early 386BSD commits all the way up to some of the more modern FreeBSD code
If you want to browse through the giant codebase, it can be a great history lesson
***
PCBSD 10.1.2 and Lumina updates (http://blog.pcbsd.org/2015/05/hotfix-release-to-10-1-2-now-available/)
We mentioned 10.1.1 being released last week (and all the cool features a couple weeks before) but now 10.1.2 is out
This minor update contained a few hotfixes: RAID-Z installation, cache and log devices and the text-only installer in UEFI mode
There's also a new post (http://blog.pcbsd.org/2015/05/lumina-desktop-status-updatefaq/) on the PCBSD blog about Lumina, answering some frequently asked questions and giving a general status update
***
Feedback/Questions
Jake writes in (http://slexy.org/view/s25h4Biwzq)
Van writes in (http://slexy.org/view/s2AF0bGmL6)
Anonymous writes in (http://slexy.org/view/s20Ie1USFD)
Dominik writes in (http://slexy.org/view/s20vBtoKqL) (text answer (http://slexy.org/view/s20RjbIT5v))
Chris writes in (http://slexy.org/view/s20USR3WzT)
***
Mailing List Gold
Death by chocolate (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-May/033945.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, lfnw, linuxfest northwest, fsf, rms, hammer fs, nagoya, osc, dm-crypt, luks, cryptography, openmp, clang, llvm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ve got something pretty different. We went to a Linux convention and asked various people if they&#39;ve ever tried BSD and what they know about it. Stay tuned for that, all this week&#39;s news and, of course, answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143247114716771&w=2" rel="nofollow">LUKS in OpenBSD</a></h3>

<ul>
<li>Last week, we were surprised to find out that DragonFlyBSD <a href="http://leaf.dragonflybsd.org/cgi/web-man?command=cryptsetup&section=8" rel="nofollow">has support</a> for <a href="https://en.wikipedia.org/wiki/Dm-crypt" rel="nofollow">dm-crypt</a>, sometimes referred to as LUKS (<a href="https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup" rel="nofollow">Linux Unified Key Setup</a>)</li>
<li>It looks like they might not be the only BSD with support for it for much longer, as OpenBSD is currently reviewing a patch for it as well</li>
<li>LUKS would presumably be an additional option in OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> system, which already provides native disk encryption</li>
<li>Support hasn&#39;t been officially committed yet, it&#39;s still going through testing, but the code is there if you want to try it out and report your findings</li>
<li><strong>If enabled</strong>, this might pave the way for the first (semi-)cross platform encryption scheme since the demise of TrueCrypt (and maybe other BSDs will get it too in time)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-May/072255.html" rel="nofollow">FreeBSD gets 64bit Linux emulation</a></h3>

<ul>
<li>For those who might be unfamiliar, FreeBSD has an <a href="https://www.freebsd.org/doc/handbook/linuxemu.html" rel="nofollow">emulation layer</a> to run Linux-only binaries (as rare as they may be)</li>
<li>The most common use case is for desktop users, enabling them to run proprietary applications like Adobe Flash or Skype</li>
<li>Similar systems can also be found <a href="https://www.netbsd.org/docs/guide/en/chap-linux.html" rel="nofollow">in NetBSD</a> <a href="http://www.openbsd.org/faq/faq9.html#Interact" rel="nofollow">and OpenBSD</a> (though disabled by default on the latter)</li>
<li>However, until now, it&#39;s only supported binaries compiled for the i386 architecture</li>
<li>This new update, already committed to -CURRENT, will open some new possibilities that weren&#39;t previously possible</li>
<li>Meanwhile, HardenedBSD considers <a href="https://hardenedbsd.org/content/poll-linuxulator-removal" rel="nofollow">removing the emulation layer</a> entirely
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/05/23/msg000686.html" rel="nofollow">BSD at Open Source Conference 2015 Nagoya</a></h3>

<ul>
<li>We&#39;ve covered the Japanese NetBSD users group setting up lots of machines at various conferences in the past, but now they&#39;re expanding</li>
<li>Their latest report includes many of the NetBSD things you&#39;d expect, but also a couple OpenBSD machines</li>
<li>Some of the NetBSD ones included a Power Mac G4, SHARP NetWalker, Cubieboard2 and the not-so-foreign Raspberry Pi</li>
<li>One new addition of interest is the OMRON LUNA88k, running the <a href="http://www.openbsd.org/luna88k.html" rel="nofollow">luna88k</a> port of OpenBSD</li>
<li>There was even an old cell phone <a href="https://twitter.com/tsutsuii/status/601458973338775553" rel="nofollow">running Windows games</a> on NetBSD</li>
<li>Check the mailing list post for <a href="https://pbs.twimg.com/media/CFrSmztWEAAS2uE.jpg" rel="nofollow">some</a> <a href="http://image.movapic.com/pic/m_201505230541335560130d49213.jpeg" rel="nofollow">links</a> <a href="http://image.movapic.com/pic/m_2015052305145455600ccea723a.jpeg" rel="nofollow">to</a> <a href="https://pbs.twimg.com/media/CFjPv9_UEAA8iEx.jpg:large" rel="nofollow">all</a> <a href="https://pbs.twimg.com/media/CD4k6ZUUMAA0tEM.jpg" rel="nofollow">of</a> <a href="https://pbs.twimg.com/media/CFqn1GXUsAAFuro.jpg" rel="nofollow">the</a> <a href="https://pbs.twimg.com/media/CFdIS2IUkAAZvjc.jpg" rel="nofollow">nice</a> <a href="https://pbs.twimg.com/media/CFf5mToUIAAFrRU.jpg" rel="nofollow">pictures</a>
***</li>
</ul>

<h3><a href="http://blog.llvm.org/2015/05/openmp-support_22.html" rel="nofollow">LLVM introduces OpenMP support</a></h3>

<ul>
<li>One of the things that has kept some people in the GCC camp is the lack of <a href="https://en.wikipedia.org/wiki/OpenMP" rel="nofollow">OpenMP</a> support in LLVM</li>
<li>According to the blog post, it &quot;enables Clang users to harness full power of modern multi-core processors with vector units&quot;</li>
<li>With Clang being the default in FreeBSD, Bitrig and OS X, and with some other BSDs exploring the option of switching, the need for this potential speed boost was definitely there</li>
<li>This could also open some doors for more BSD in the area of high performance computing, putting an end to the current Linux monopoly
***</li>
</ul>

<h2>Interview - Eric, FSF, John, Jose, Kris and Stewart</h2>

<p>Various &quot;man on the street&quot; style mini-interviews</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://gitlab.com/worr/libintl/blob/master/src/usr.bin/gettext/gettext.c" rel="nofollow">BSD-licensed gettext replacement</a></h3>

<ul>
<li>If you&#39;ve ever installed ports on any of the BSDs, you&#39;ve probably had GNU&#39;s gettext pulled in as a dependency</li>
<li>Wikipedia says &quot;gettext is an internationalization and localization (i18n) system commonly used for writing multilingual programs on Unix-like computer operating systems&quot;</li>
<li>A new BSD-licensed rewrite has begun, with the initial version being for NetBSD (but it&#39;s likely to be portable)</li>
<li>If you&#39;ve got some coding skills, get involved with the project - the more freely-licensed replacements, the better
***</li>
</ul>

<h3><a href="https://github.com/dspinellis/unix-history-repo" rel="nofollow">Unix history git repo</a></h3>

<ul>
<li>A git repository was recently created to show off some Unix source code history</li>
<li>The repository contains 659 thousand commits and 2306 merges</li>
<li>You can see early 386BSD commits all the way up to some of the more modern FreeBSD code</li>
<li>If you want to browse through the <em>giant</em> codebase, it can be a great history lesson
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/hotfix-release-to-10-1-2-now-available/" rel="nofollow">PCBSD 10.1.2 and Lumina updates</a></h3>

<ul>
<li>We mentioned 10.1.1 being released last week (and all the cool features a couple weeks before) but now 10.1.2 is out</li>
<li>This minor update contained a few hotfixes: RAID-Z installation, cache and log devices and the text-only installer in UEFI mode</li>
<li>There&#39;s also a <a href="http://blog.pcbsd.org/2015/05/lumina-desktop-status-updatefaq/" rel="nofollow">new post</a> on the PCBSD blog about Lumina, answering some frequently asked questions and giving a general status update
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s25h4Biwzq" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s2AF0bGmL6" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s20Ie1USFD" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s20vBtoKqL" rel="nofollow">Dominik writes in</a> (<a href="http://slexy.org/view/s20RjbIT5v" rel="nofollow">text answer</a>)</li>
<li><a href="http://slexy.org/view/s20USR3WzT" rel="nofollow">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-May/033945.html" rel="nofollow">Death by chocolate</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ve got something pretty different. We went to a Linux convention and asked various people if they&#39;ve ever tried BSD and what they know about it. Stay tuned for that, all this week&#39;s news and, of course, answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143247114716771&w=2" rel="nofollow">LUKS in OpenBSD</a></h3>

<ul>
<li>Last week, we were surprised to find out that DragonFlyBSD <a href="http://leaf.dragonflybsd.org/cgi/web-man?command=cryptsetup&section=8" rel="nofollow">has support</a> for <a href="https://en.wikipedia.org/wiki/Dm-crypt" rel="nofollow">dm-crypt</a>, sometimes referred to as LUKS (<a href="https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup" rel="nofollow">Linux Unified Key Setup</a>)</li>
<li>It looks like they might not be the only BSD with support for it for much longer, as OpenBSD is currently reviewing a patch for it as well</li>
<li>LUKS would presumably be an additional option in OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> system, which already provides native disk encryption</li>
<li>Support hasn&#39;t been officially committed yet, it&#39;s still going through testing, but the code is there if you want to try it out and report your findings</li>
<li><strong>If enabled</strong>, this might pave the way for the first (semi-)cross platform encryption scheme since the demise of TrueCrypt (and maybe other BSDs will get it too in time)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-May/072255.html" rel="nofollow">FreeBSD gets 64bit Linux emulation</a></h3>

<ul>
<li>For those who might be unfamiliar, FreeBSD has an <a href="https://www.freebsd.org/doc/handbook/linuxemu.html" rel="nofollow">emulation layer</a> to run Linux-only binaries (as rare as they may be)</li>
<li>The most common use case is for desktop users, enabling them to run proprietary applications like Adobe Flash or Skype</li>
<li>Similar systems can also be found <a href="https://www.netbsd.org/docs/guide/en/chap-linux.html" rel="nofollow">in NetBSD</a> <a href="http://www.openbsd.org/faq/faq9.html#Interact" rel="nofollow">and OpenBSD</a> (though disabled by default on the latter)</li>
<li>However, until now, it&#39;s only supported binaries compiled for the i386 architecture</li>
<li>This new update, already committed to -CURRENT, will open some new possibilities that weren&#39;t previously possible</li>
<li>Meanwhile, HardenedBSD considers <a href="https://hardenedbsd.org/content/poll-linuxulator-removal" rel="nofollow">removing the emulation layer</a> entirely
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/05/23/msg000686.html" rel="nofollow">BSD at Open Source Conference 2015 Nagoya</a></h3>

<ul>
<li>We&#39;ve covered the Japanese NetBSD users group setting up lots of machines at various conferences in the past, but now they&#39;re expanding</li>
<li>Their latest report includes many of the NetBSD things you&#39;d expect, but also a couple OpenBSD machines</li>
<li>Some of the NetBSD ones included a Power Mac G4, SHARP NetWalker, Cubieboard2 and the not-so-foreign Raspberry Pi</li>
<li>One new addition of interest is the OMRON LUNA88k, running the <a href="http://www.openbsd.org/luna88k.html" rel="nofollow">luna88k</a> port of OpenBSD</li>
<li>There was even an old cell phone <a href="https://twitter.com/tsutsuii/status/601458973338775553" rel="nofollow">running Windows games</a> on NetBSD</li>
<li>Check the mailing list post for <a href="https://pbs.twimg.com/media/CFrSmztWEAAS2uE.jpg" rel="nofollow">some</a> <a href="http://image.movapic.com/pic/m_201505230541335560130d49213.jpeg" rel="nofollow">links</a> <a href="http://image.movapic.com/pic/m_2015052305145455600ccea723a.jpeg" rel="nofollow">to</a> <a href="https://pbs.twimg.com/media/CFjPv9_UEAA8iEx.jpg:large" rel="nofollow">all</a> <a href="https://pbs.twimg.com/media/CD4k6ZUUMAA0tEM.jpg" rel="nofollow">of</a> <a href="https://pbs.twimg.com/media/CFqn1GXUsAAFuro.jpg" rel="nofollow">the</a> <a href="https://pbs.twimg.com/media/CFdIS2IUkAAZvjc.jpg" rel="nofollow">nice</a> <a href="https://pbs.twimg.com/media/CFf5mToUIAAFrRU.jpg" rel="nofollow">pictures</a>
***</li>
</ul>

<h3><a href="http://blog.llvm.org/2015/05/openmp-support_22.html" rel="nofollow">LLVM introduces OpenMP support</a></h3>

<ul>
<li>One of the things that has kept some people in the GCC camp is the lack of <a href="https://en.wikipedia.org/wiki/OpenMP" rel="nofollow">OpenMP</a> support in LLVM</li>
<li>According to the blog post, it &quot;enables Clang users to harness full power of modern multi-core processors with vector units&quot;</li>
<li>With Clang being the default in FreeBSD, Bitrig and OS X, and with some other BSDs exploring the option of switching, the need for this potential speed boost was definitely there</li>
<li>This could also open some doors for more BSD in the area of high performance computing, putting an end to the current Linux monopoly
***</li>
</ul>

<h2>Interview - Eric, FSF, John, Jose, Kris and Stewart</h2>

<p>Various &quot;man on the street&quot; style mini-interviews</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://gitlab.com/worr/libintl/blob/master/src/usr.bin/gettext/gettext.c" rel="nofollow">BSD-licensed gettext replacement</a></h3>

<ul>
<li>If you&#39;ve ever installed ports on any of the BSDs, you&#39;ve probably had GNU&#39;s gettext pulled in as a dependency</li>
<li>Wikipedia says &quot;gettext is an internationalization and localization (i18n) system commonly used for writing multilingual programs on Unix-like computer operating systems&quot;</li>
<li>A new BSD-licensed rewrite has begun, with the initial version being for NetBSD (but it&#39;s likely to be portable)</li>
<li>If you&#39;ve got some coding skills, get involved with the project - the more freely-licensed replacements, the better
***</li>
</ul>

<h3><a href="https://github.com/dspinellis/unix-history-repo" rel="nofollow">Unix history git repo</a></h3>

<ul>
<li>A git repository was recently created to show off some Unix source code history</li>
<li>The repository contains 659 thousand commits and 2306 merges</li>
<li>You can see early 386BSD commits all the way up to some of the more modern FreeBSD code</li>
<li>If you want to browse through the <em>giant</em> codebase, it can be a great history lesson
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/hotfix-release-to-10-1-2-now-available/" rel="nofollow">PCBSD 10.1.2 and Lumina updates</a></h3>

<ul>
<li>We mentioned 10.1.1 being released last week (and all the cool features a couple weeks before) but now 10.1.2 is out</li>
<li>This minor update contained a few hotfixes: RAID-Z installation, cache and log devices and the text-only installer in UEFI mode</li>
<li>There&#39;s also a <a href="http://blog.pcbsd.org/2015/05/lumina-desktop-status-updatefaq/" rel="nofollow">new post</a> on the PCBSD blog about Lumina, answering some frequently asked questions and giving a general status update
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s25h4Biwzq" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s2AF0bGmL6" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s20Ie1USFD" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s20vBtoKqL" rel="nofollow">Dominik writes in</a> (<a href="http://slexy.org/view/s20RjbIT5v" rel="nofollow">text answer</a>)</li>
<li><a href="http://slexy.org/view/s20USR3WzT" rel="nofollow">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-May/033945.html" rel="nofollow">Death by chocolate</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>85: PIE in the Sky</title>
  <link>https://www.bsdnow.tv/85</link>
  <guid isPermaLink="false">7b947cd6-04e4-4210-a3a1-3f80d96ccc79</guid>
  <pubDate>Wed, 15 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/7b947cd6-04e4-4210-a3a1-3f80d96ccc79.mp3" length="58114516" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He'll tell us what types of attacks it prevents, and why it's such a big deal. We've also got answers to questions from you in the audience and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He'll tell us what types of attacks it prevents, and why it's such a big deal. We've also got answers to questions from you in the audience and all this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Solaris' networking future is with OpenBSD (http://bsdly.blogspot.com/2015/04/solaris-admins-for-glimpse-of-your.html)
A curious patch from someone with an Oracle email address was recently sent in (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142822852613581&amp;amp;w=2) to one of the OpenBSD mailing lists
It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the current version of PF
For anyone unfamiliar with the history of PF, it was actually made as a replacement for IPFilter in OpenBSD, due to some licensing issues
What's more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting
This blog post goes through some of the backstory of the two firewalls
PF is in a lot of places - other BSDs, Mac OS X and iOS - but there are plenty of other OpenBSD-developed technologies end up ported to other projects too
"Many of the world's largest corporations and government agencies are heavy Solaris users, meaning that even if you're neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD's PF for their filtering needs, we will all be benefiting even more from the OpenBSD project's emphasis on correctness, quality and security"
You're welcome, Oracle
***
BAFUG discussion videos (https://www.youtube.com/watch?v=Cb--h-iOQEM#t=15)
The Bay Area FreeBSD users group has been uploading some videos from their recent meetings
Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)
Craig Rodrigues also gave a talk (https://www.youtube.com/watch?v=kPs8Dni_g3M#t=15) about Kyua and the FreeBSD testing framework
Lastly, Kip Macy gave a talk (https://www.youtube.com/watch?v=Q13WtuqbZ7E#t=15) titled "network stack changes, user-level FreeBSD"
The main two subjects there are some network stack changes, and how to get more people contributing, but there's also open discussion about a variety of FreeBSD topics
If you're close to the Bay Area in California, be sure to check out their group and attend a meeting sometime
***
More than just a makefile (http://homing-on-code.blogspot.com/2015/04/ports-are-more-than-just-makefile.html)
If you're not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux
This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs
As it turns out, the ports system really isn't that different from a binary package manager - they are what's used to create binary packages, after all
The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream
After that, he shows you how to get your new port tested, if you're interesting in doing some porting yourself, and getting involved with the rest of the community
This post is very long and there's a lot more to it, so check it out (and more discussion on Hacker News (https://news.ycombinator.com/item?id=9360827))
***
Securing your home fences (http://www.scip.ch/en/?labs.20150409)
Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a bad (http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/) idea (https://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970) by now
We hear from a lot of users who want to set up some kind of BSD-based firewall, but don't hear back from them after they've done it.. until now
In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines APU board (http://www.pcengines.ch/apu1d4.htm)
He notes that you have a lot of options software-wise, including vanilla FreeBSD (http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/), OpenBSD (http://www.bsdnow.tv/tutorials/openbsd-router) or even Linux, but decided to go with OPNsense because of the easy interface and configuration
The post covers all the hardware you'll need, getting the OS installed to a flash drive or SD card and going through the whole process
Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up
If you don't have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)
We love super-detailed guides like this, so everyone should write more and send them to us immediately
***
Interview - Pascal Stumpf - pascal@openbsd.org (mailto:pascal@openbsd.org)
Static PIE in OpenBSD
News Roundup
LLVM's new libFuzzer (http://blog.llvm.org/2015/04/fuzz-all-clangs.html)
We've discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility
It looks like LLVM is going to have their own fuzzing tool too now
The Clang and LLVM guys are no strangers to this type of code testing, but decided to "close the loop" and start fuzzing parts of LLVM (including Clang) using LLVM itself
With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future
***
HardenedBSD upgrades secadm (http://hardenedbsd.org/article/shawn-webb/2015-04-14/introducing-secadm-02)
The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support
We covered both the secadm tool and integriforce in previous episodes, but the short version is that it's a way to prevent files from being altered (even as root)
Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now
***
RAID5 returns to OpenBSD (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142877132517229&amp;amp;w=2)
OpenBSD's softraid (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4) subsystem, somewhat similar to FreeBSD's GEOM, has had experimental RAID5 support for a while
However, it was exactly that - experimental - and required a recompile to enable
With some work from recent hackathons, the final piece (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142876943116907&amp;amp;w=2) was added to enable resuming partial array rebuilds
Now it's on by default (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142877026917030&amp;amp;w=2), and there's a call for testing being put out, so grab a snapshot and put the code through its paces
The bioctl softraid command also now supports (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142877223817406&amp;amp;w=2) DUIDs during pseudo-device detachment, possibly paving the way for the installer to drop (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142643313416298&amp;amp;w=2) the "do you want to enable DUIDs?" question entirely
***
pkgng 1.5.0 released (https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055463.html)
Going back to what we talked about last week (http://www.bsdnow.tv/episodes/2015_04_08-pkg_remove_freebsd-update), the final version of pkgng 1.5.0 is out
The "provides" and "requires" support is finally in a regular release
A new "-r" switch will allow for direct installation to a chroot or alternate root directory
Memory usage should be much better now, and some general code speed-ups were added
This version also introduces support for Mac OS X, NetBSD and EdgeBSD - it'll be interesting to see if anything comes of that
Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)
***
p2k15 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150411160247)
There was another OpenBSD hackathon that just finished up in the UK - this time it was mainly for ports work
As usual, the developers sent in reports of some of the things they got done at the event
Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit
Stefan Sperling wrote in (http://undeadly.org/cgi?action=article&amp;amp;sid=20150414064710), detailing his work with wireless chipsets, specifically when the vendor doesn't provide any hardware documentation, as well as updating some of the games in ports
Ken Westerback also sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150413163333), but decided to be a rebel and not work on ports at all - he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier
***
Feedback/Questions
Shaun writes in (http://slexy.org/view/s2iNBo2swq)
Hrishi writes in (http://slexy.org/view/s202BRLwrd)
Randy writes in (http://slexy.org/view/s2KT7M35uY)
Zach writes in (http://slexy.org/view/s2Q5lOoxzl)
Ben writes in (http://slexy.org/view/s2ynDjuzVi)
***
Mailing List Gold
Gstreamer hates us (https://www.marc.info/?l=openbsd-ports&amp;amp;m=142884995931428&amp;amp;w=2)
At least he's honest (https://lists.torproject.org/pipermail/tor-relays/2015-April/006765.html)
I find myself in a situation (https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055390.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, aslr, pie, position-independent executable, static, binary, dynamic, linking, security, llvm, fuzzing, clang, opnsense, pcengines, apu, alix, hammer2, zfs, oracle, solaris, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He&#39;ll tell us what types of attacks it prevents, and why it&#39;s such a big deal. We&#39;ve also got answers to questions from you in the audience and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2015/04/solaris-admins-for-glimpse-of-your.html" rel="nofollow">Solaris&#39; networking future is with OpenBSD</a></h3>

<ul>
<li>A curious patch from someone with an Oracle email address was <a href="https://www.marc.info/?l=openbsd-tech&m=142822852613581&w=2" rel="nofollow">recently sent in</a> to one of the OpenBSD mailing lists</li>
<li>It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the <strong>current</strong> version of PF</li>
<li>For anyone unfamiliar with the history of PF, it was actually made <em>as a replacement for</em> IPFilter in OpenBSD, due to some licensing issues</li>
<li>What&#39;s more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting</li>
<li>This blog post goes through some of the backstory of the two firewalls</li>
<li>PF is in a lot of places - other BSDs, Mac OS X and iOS - but there are plenty of other OpenBSD-developed technologies end up ported to other projects too</li>
<li>&quot;Many of the world&#39;s largest corporations and government agencies are heavy Solaris users, meaning that even if you&#39;re neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD&#39;s PF for their filtering needs, we will all be benefiting even more from the OpenBSD project&#39;s emphasis on correctness, quality and security&quot;</li>
<li>You&#39;re welcome, Oracle
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=Cb--h-iOQEM#t=15" rel="nofollow">BAFUG discussion videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos from their recent meetings</li>
<li>Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)</li>
<li>Craig Rodrigues also gave <a href="https://www.youtube.com/watch?v=kPs8Dni_g3M#t=15" rel="nofollow">a talk</a> about Kyua and the FreeBSD testing framework</li>
<li>Lastly, Kip Macy gave <a href="https://www.youtube.com/watch?v=Q13WtuqbZ7E#t=15" rel="nofollow">a talk</a> titled &quot;network stack changes, user-level FreeBSD&quot;</li>
<li>The main two subjects there are some network stack changes, and how to get more people contributing, but there&#39;s also open discussion about a variety of FreeBSD topics</li>
<li>If you&#39;re close to the Bay Area in California, be sure to check out their group and attend a meeting sometime
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/04/ports-are-more-than-just-makefile.html" rel="nofollow">More than just a makefile</a></h3>

<ul>
<li>If you&#39;re not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux</li>
<li>This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs</li>
<li>As it turns out, the ports system really isn&#39;t that different from a binary package manager - they are what&#39;s <em>used</em> to create binary packages, after all</li>
<li>The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream</li>
<li>After that, he shows you how to get your new port tested, if you&#39;re interesting in doing some porting yourself, and getting involved with the rest of the community</li>
<li>This post is very long and there&#39;s a lot more to it, so check it out (and more discussion <a href="https://news.ycombinator.com/item?id=9360827" rel="nofollow">on Hacker News</a>)
***</li>
</ul>

<h3><a href="http://www.scip.ch/en/?labs.20150409" rel="nofollow">Securing your home fences</a></h3>

<ul>
<li>Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a <a href="http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/" rel="nofollow">bad</a> <a href="https://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970" rel="nofollow">idea</a> by now</li>
<li>We hear from a lot of users who want to set up some kind of BSD-based firewall, but don&#39;t hear back from them after they&#39;ve done it.. until now</li>
<li>In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines <a href="http://www.pcengines.ch/apu1d4.htm" rel="nofollow">APU board</a></li>
<li>He notes that you have a lot of options software-wise, including vanilla <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a>, <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a> or even Linux, but decided to go with OPNsense because of the easy interface and configuration</li>
<li>The post covers all the hardware you&#39;ll need, getting the OS installed to a flash drive or SD card and going through the whole process</li>
<li>Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up</li>
<li>If you don&#39;t have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)</li>
<li>We love super-detailed guides like this, so everyone should write more and send them to us immediately
***</li>
</ul>

<h2>Interview - Pascal Stumpf - <a href="mailto:pascal@openbsd.org" rel="nofollow">pascal@openbsd.org</a></h2>

<p>Static PIE in OpenBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.llvm.org/2015/04/fuzz-all-clangs.html" rel="nofollow">LLVM&#39;s new libFuzzer</a></h3>

<ul>
<li>We&#39;ve discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility</li>
<li>It looks like LLVM is going to have their own fuzzing tool too now</li>
<li>The Clang and LLVM guys are no strangers to this type of code testing, but decided to &quot;close the loop&quot; and start fuzzing parts of LLVM (including Clang) using LLVM itself</li>
<li>With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-04-14/introducing-secadm-02" rel="nofollow">HardenedBSD upgrades secadm</a></h3>

<ul>
<li>The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support</li>
<li>We covered both the secadm tool and integriforce in previous episodes, but the short version is that it&#39;s a way to prevent files from being altered (even as root)</li>
<li>Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142877132517229&w=2" rel="nofollow">RAID5 returns to OpenBSD</a></h3>

<ul>
<li>OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> subsystem, somewhat similar to FreeBSD&#39;s GEOM, has had experimental RAID5 support for a while</li>
<li>However, it was exactly that - experimental - and required a recompile to enable</li>
<li>With some work from recent hackathons, the <a href="https://www.marc.info/?l=openbsd-cvs&m=142876943116907&w=2" rel="nofollow">final piece</a> was added to enable resuming partial array rebuilds</li>
<li>Now it&#39;s <a href="https://www.marc.info/?l=openbsd-cvs&m=142877026917030&w=2" rel="nofollow">on by default</a>, and there&#39;s a call for testing being put out, so grab a snapshot and put the code through its paces</li>
<li>The bioctl softraid command also <a href="https://www.marc.info/?l=openbsd-cvs&m=142877223817406&w=2" rel="nofollow">now supports</a> DUIDs during pseudo-device detachment, possibly paving the way for the installer to <a href="https://www.marc.info/?l=openbsd-tech&m=142643313416298&w=2" rel="nofollow">drop</a> the &quot;do you want to enable DUIDs?&quot; question entirely
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055463.html" rel="nofollow">pkgng 1.5.0 released</a></h3>

<ul>
<li>Going back to what we <a href="http://www.bsdnow.tv/episodes/2015_04_08-pkg_remove_freebsd-update" rel="nofollow">talked about last week</a>, the final version of pkgng 1.5.0 is out</li>
<li>The &quot;provides&quot; and &quot;requires&quot; support is finally in a regular release</li>
<li>A new &quot;-r&quot; switch will allow for direct installation to a chroot or alternate root directory</li>
<li>Memory usage should be much better now, and some general code speed-ups were added</li>
<li>This version also introduces support for Mac OS X, NetBSD and EdgeBSD - it&#39;ll be interesting to see if anything comes of that</li>
<li>Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150411160247" rel="nofollow">p2k15 hackathon reports</a></h3>

<ul>
<li>There was another OpenBSD hackathon that just finished up in the UK - this time it was mainly for ports work</li>
<li>As usual, the developers sent in reports of some of the things they got done at the event</li>
<li>Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit</li>
<li>Stefan Sperling <a href="http://undeadly.org/cgi?action=article&sid=20150414064710" rel="nofollow">wrote in</a>, detailing his work with wireless chipsets, specifically when the vendor doesn&#39;t provide any hardware documentation, as well as updating some of the games in ports</li>
<li>Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150413163333" rel="nofollow">also sent in a report</a>, but decided to be a rebel and not work on ports at all - he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iNBo2swq" rel="nofollow">Shaun writes in</a></li>
<li><a href="http://slexy.org/view/s202BRLwrd" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2KT7M35uY" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2Q5lOoxzl" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s2ynDjuzVi" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142884995931428&w=2" rel="nofollow">Gstreamer hates us</a></li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2015-April/006765.html" rel="nofollow">At least he&#39;s honest</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055390.html" rel="nofollow">I find myself in a situation</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He&#39;ll tell us what types of attacks it prevents, and why it&#39;s such a big deal. We&#39;ve also got answers to questions from you in the audience and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2015/04/solaris-admins-for-glimpse-of-your.html" rel="nofollow">Solaris&#39; networking future is with OpenBSD</a></h3>

<ul>
<li>A curious patch from someone with an Oracle email address was <a href="https://www.marc.info/?l=openbsd-tech&m=142822852613581&w=2" rel="nofollow">recently sent in</a> to one of the OpenBSD mailing lists</li>
<li>It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the <strong>current</strong> version of PF</li>
<li>For anyone unfamiliar with the history of PF, it was actually made <em>as a replacement for</em> IPFilter in OpenBSD, due to some licensing issues</li>
<li>What&#39;s more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting</li>
<li>This blog post goes through some of the backstory of the two firewalls</li>
<li>PF is in a lot of places - other BSDs, Mac OS X and iOS - but there are plenty of other OpenBSD-developed technologies end up ported to other projects too</li>
<li>&quot;Many of the world&#39;s largest corporations and government agencies are heavy Solaris users, meaning that even if you&#39;re neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD&#39;s PF for their filtering needs, we will all be benefiting even more from the OpenBSD project&#39;s emphasis on correctness, quality and security&quot;</li>
<li>You&#39;re welcome, Oracle
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=Cb--h-iOQEM#t=15" rel="nofollow">BAFUG discussion videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos from their recent meetings</li>
<li>Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)</li>
<li>Craig Rodrigues also gave <a href="https://www.youtube.com/watch?v=kPs8Dni_g3M#t=15" rel="nofollow">a talk</a> about Kyua and the FreeBSD testing framework</li>
<li>Lastly, Kip Macy gave <a href="https://www.youtube.com/watch?v=Q13WtuqbZ7E#t=15" rel="nofollow">a talk</a> titled &quot;network stack changes, user-level FreeBSD&quot;</li>
<li>The main two subjects there are some network stack changes, and how to get more people contributing, but there&#39;s also open discussion about a variety of FreeBSD topics</li>
<li>If you&#39;re close to the Bay Area in California, be sure to check out their group and attend a meeting sometime
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/04/ports-are-more-than-just-makefile.html" rel="nofollow">More than just a makefile</a></h3>

<ul>
<li>If you&#39;re not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux</li>
<li>This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs</li>
<li>As it turns out, the ports system really isn&#39;t that different from a binary package manager - they are what&#39;s <em>used</em> to create binary packages, after all</li>
<li>The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream</li>
<li>After that, he shows you how to get your new port tested, if you&#39;re interesting in doing some porting yourself, and getting involved with the rest of the community</li>
<li>This post is very long and there&#39;s a lot more to it, so check it out (and more discussion <a href="https://news.ycombinator.com/item?id=9360827" rel="nofollow">on Hacker News</a>)
***</li>
</ul>

<h3><a href="http://www.scip.ch/en/?labs.20150409" rel="nofollow">Securing your home fences</a></h3>

<ul>
<li>Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a <a href="http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/" rel="nofollow">bad</a> <a href="https://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970" rel="nofollow">idea</a> by now</li>
<li>We hear from a lot of users who want to set up some kind of BSD-based firewall, but don&#39;t hear back from them after they&#39;ve done it.. until now</li>
<li>In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines <a href="http://www.pcengines.ch/apu1d4.htm" rel="nofollow">APU board</a></li>
<li>He notes that you have a lot of options software-wise, including vanilla <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a>, <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a> or even Linux, but decided to go with OPNsense because of the easy interface and configuration</li>
<li>The post covers all the hardware you&#39;ll need, getting the OS installed to a flash drive or SD card and going through the whole process</li>
<li>Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up</li>
<li>If you don&#39;t have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)</li>
<li>We love super-detailed guides like this, so everyone should write more and send them to us immediately
***</li>
</ul>

<h2>Interview - Pascal Stumpf - <a href="mailto:pascal@openbsd.org" rel="nofollow">pascal@openbsd.org</a></h2>

<p>Static PIE in OpenBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.llvm.org/2015/04/fuzz-all-clangs.html" rel="nofollow">LLVM&#39;s new libFuzzer</a></h3>

<ul>
<li>We&#39;ve discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility</li>
<li>It looks like LLVM is going to have their own fuzzing tool too now</li>
<li>The Clang and LLVM guys are no strangers to this type of code testing, but decided to &quot;close the loop&quot; and start fuzzing parts of LLVM (including Clang) using LLVM itself</li>
<li>With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-04-14/introducing-secadm-02" rel="nofollow">HardenedBSD upgrades secadm</a></h3>

<ul>
<li>The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support</li>
<li>We covered both the secadm tool and integriforce in previous episodes, but the short version is that it&#39;s a way to prevent files from being altered (even as root)</li>
<li>Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142877132517229&w=2" rel="nofollow">RAID5 returns to OpenBSD</a></h3>

<ul>
<li>OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> subsystem, somewhat similar to FreeBSD&#39;s GEOM, has had experimental RAID5 support for a while</li>
<li>However, it was exactly that - experimental - and required a recompile to enable</li>
<li>With some work from recent hackathons, the <a href="https://www.marc.info/?l=openbsd-cvs&m=142876943116907&w=2" rel="nofollow">final piece</a> was added to enable resuming partial array rebuilds</li>
<li>Now it&#39;s <a href="https://www.marc.info/?l=openbsd-cvs&m=142877026917030&w=2" rel="nofollow">on by default</a>, and there&#39;s a call for testing being put out, so grab a snapshot and put the code through its paces</li>
<li>The bioctl softraid command also <a href="https://www.marc.info/?l=openbsd-cvs&m=142877223817406&w=2" rel="nofollow">now supports</a> DUIDs during pseudo-device detachment, possibly paving the way for the installer to <a href="https://www.marc.info/?l=openbsd-tech&m=142643313416298&w=2" rel="nofollow">drop</a> the &quot;do you want to enable DUIDs?&quot; question entirely
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055463.html" rel="nofollow">pkgng 1.5.0 released</a></h3>

<ul>
<li>Going back to what we <a href="http://www.bsdnow.tv/episodes/2015_04_08-pkg_remove_freebsd-update" rel="nofollow">talked about last week</a>, the final version of pkgng 1.5.0 is out</li>
<li>The &quot;provides&quot; and &quot;requires&quot; support is finally in a regular release</li>
<li>A new &quot;-r&quot; switch will allow for direct installation to a chroot or alternate root directory</li>
<li>Memory usage should be much better now, and some general code speed-ups were added</li>
<li>This version also introduces support for Mac OS X, NetBSD and EdgeBSD - it&#39;ll be interesting to see if anything comes of that</li>
<li>Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150411160247" rel="nofollow">p2k15 hackathon reports</a></h3>

<ul>
<li>There was another OpenBSD hackathon that just finished up in the UK - this time it was mainly for ports work</li>
<li>As usual, the developers sent in reports of some of the things they got done at the event</li>
<li>Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit</li>
<li>Stefan Sperling <a href="http://undeadly.org/cgi?action=article&sid=20150414064710" rel="nofollow">wrote in</a>, detailing his work with wireless chipsets, specifically when the vendor doesn&#39;t provide any hardware documentation, as well as updating some of the games in ports</li>
<li>Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150413163333" rel="nofollow">also sent in a report</a>, but decided to be a rebel and not work on ports at all - he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iNBo2swq" rel="nofollow">Shaun writes in</a></li>
<li><a href="http://slexy.org/view/s202BRLwrd" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2KT7M35uY" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2Q5lOoxzl" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s2ynDjuzVi" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142884995931428&w=2" rel="nofollow">Gstreamer hates us</a></li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2015-April/006765.html" rel="nofollow">At least he&#39;s honest</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055390.html" rel="nofollow">I find myself in a situation</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>67: Must Be Rigged</title>
  <link>https://www.bsdnow.tv/67</link>
  <guid isPermaLink="false">5e135afe-0a75-46d6-b995-ae5d3ca228ba</guid>
  <pubDate>Wed, 10 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5e135afe-0a75-46d6-b995-ae5d3ca228ba.mp3" length="58310356" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Bitrig 1.0 released (http://article.gmane.org/gmane.os.bitrig.devel/6)
If you haven't heard of it, Bitrig (https://www.bitrig.org/) is a fork of OpenBSD that started a couple years ago
According to their FAQ (https://github.com/bitrig/bitrig/wiki/Faq), some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support
They've finally announced their first official release, 1.0
This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version
It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background
One of the developers answered some questions (https://news.ycombinator.com/item?id=8701936) about it on Hacker News too
***
Is it time to try BSD? (http://www.technewsworld.com/story/81424.html)
Here we get a little peek into the Linux world - more and more people are considering switching
On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD
People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side
This article explores some pros and cons of switching, and features opinions of various users
***
Poudriere 3.1 released (https://github.com/freebsd/poudriere/wiki/release_notes_31)
One of the first things we ever covered on the show was poudriere (http://www.bsdnow.tv/tutorials/poudriere), a tool with a funny name that's used to build binary packages from FreeBSD ports
It's come a long way since then, and bdrewery (http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry) and bapt (http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries) have just announced a new major version
This new release features a redesigned web interface to check on the status of your packages
There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier
It also introduces a useful new "pkgclean" subcommand to clean out your repository of packages that aren't needed anymore, and poudriere keeps it cleaner by default as well now
Check the full release notes for all the additions and bug fixes
***
Firewalling with OpenBSD's pf and pfsync (https://www.youtube.com/watch?v=mN5E2EYJnrw)
A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync
He uses pf to manage 60 internal networks with a single firewall
The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated
It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more
The second half of the presentation focuses on pfsync and carp for failover and redundancy
With two BSD boxes running pfsync, you can actually patch your kernel and still stay connected to IRC
***
Interview - Patrick Wildt - patrick@bitrig.org (mailto:patrick@bitrig.org) / @bitrig (https://twitter.com/bitrig)
The initial release of Bitrig
News Roundup
Infrastructural enhancements at NYI (http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html)
The FreeBSD foundation put up a new blog post detailing some hardware improvements they've recently done
Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things
There've been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there
This blog post goes into detail about how those servers are used and details some of the network topology
***
The long tail of MD5 (http://www.tedunangst.com/flak/post/the-long-tail-of-MD5)
Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD's tree with something more modern
In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace
Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect
Some other places (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141763065223567&amp;amp;w=4) require a bit more care… 
***
DragonFly cheat sheet (http://www.dragonflybsd.org/varialus/)
If you've been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier
A user-created "cheat sheet" on the website lists some common answers to beginner questions
The page features a walkthrough of the installer, some shell tips and workarounds for various issues
At the end, it also has some things that new users can get involved with to help out
***
Experiences with an OpenBSD laptop (http://alxjsn.com/unix/openbsd-laptop/)
A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that
The author got interested in OpenBSD mostly because of the security focus and the fact that it's not Linux
In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad
He even gives us a mention as a good place to learn more about BSD, thanks!
***
PC-BSD Updates (http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html)
A call for testing of a new update system has gone out
Conversion to Qt5 for utils has taken place
***
Feedback/Questions
Chris writes in (http://slexy.org/view/s2ihSmjpLu)
AJ writes in (http://slexy.org/view/s20JXhXS6o)
Dan writes in (http://slexy.org/view/s21hfeWB2K)
Jeff writes in (http://slexy.org/view/s2k6SmuDGB)
***
Mailing List Gold
Over 440% faster (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141775233603723&amp;amp;w=2)
The (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html) PF (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html) conundrum (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html) (edit: Allan misspoke about PF performance during this segment, apologies.)
Violating (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141807513728073&amp;amp;w=4) bad standards (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141807224826859&amp;amp;w=2)
apt-get rid of systemd (https://www.marc.info/?l=openbsd-misc&amp;amp;m=141798194330985&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bitrig, fork, clang, llvm, virtualization, poudriere, srand, random, md5, sha512, rand, srand, systemd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>36: Let's Get RAID</title>
  <link>https://www.bsdnow.tv/36</link>
  <guid isPermaLink="false">485b12e9-ea67-4bc6-9709-4b0e38a76184</guid>
  <pubDate>Wed, 07 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/485b12e9-ea67-4bc6-9709-4b0e38a76184.mp3" length="65368948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
OpenBSD 5.5 released (http://www.openbsd.org/55.html)
If you ordered (https://https.openbsd.org/cgi-bin/order) a CD set (https://twitter.com/blakkheim/status/461909893813784576) then you've probably had it for a little while already, but OpenBSD has formally announced the public release (http://undeadly.org/cgi?action=article&amp;amp;sid=20140501153339) of 5.5
This is one of the biggest releases to date, with a very long list of changes and improvements
Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more
The full list of changes (http://www.openbsd.org/plus55.html) is HUGE, be sure to read through it all if you're interested in the details
If you're doing an upgrade from 5.4 instead of a fresh install, pay careful attention to the upgrade guide (http://www.openbsd.org/faq/upgrade55.html) as there are some very specific steps for this version
Also be sure to apply the errata patches (http://www.openbsd.org/errata55.html) on your new installations... especially those OpenSSL ones (some of which still aren't fixed (http://marc.info/?l=oss-security&amp;amp;m=139906348230995&amp;amp;w=2) in the other BSDs yet)
On the topic of errata patches, the project is now going to also send them out (signed (http://undeadly.org/cgi?action=article&amp;amp;sid=20140502103355)) via the announce mailing list (http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&amp;amp;passw=&amp;amp;func=lists-long-full&amp;amp;extra=announce), a very welcome change
Congrats to the whole team on this great release - 5.6 is going to be even more awesome with "Libre"SSL and lots of other stuff that's currently in development
***
FreeBSD foundation funding highlights (http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html)
The FreeBSD foundation posts a new update on how they're spending the money that everyone donates
"As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we've done to help FreeBSD become the most innovative, reliable, and high-performance operation system"
During this spring, they want to highlight the new UEFI boot support and newcons (http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html)
There's a lot of details about what exactly UEFI is and why we need it going forward
FreeBSD has also needed some updates to its console to support UTF8 and wide characters
Hopefully this series will continue and we'll get to see what other work is being sponsored
***
OpenSSH without OpenSSL (http://marc.info/?l=openbsd-cvs&amp;amp;m=139879453001957&amp;amp;w=2)
The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional
Since it won't have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security
This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the new combination (http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain) of the Chacha20 stream cipher with Poly1305 for packet integrity
Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs
No support for RSA, DSA or ECDSA public keys - only Ed25519
It also includes a new buffer API (http://marc.info/?l=openbsd-cvs&amp;amp;m=139883582313750&amp;amp;w=2) and a set of wrappers to make it compatible with the existing API
Believe it or not, this was planned before all the heartbleed craziness
Maybe someday soon we'll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***
BSDMag's April 2014 issue is out (http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue)
The free monthly BSD magazine has got a new issue available for download
This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online
Anyone can contribute to the magazine, just send the editors an email about what you want to write
No Linux articles this time around, good
***
Interview - David Chisnall - theraven@freebsd.org (mailto:theraven@freebsd.org)
The LLVM/Clang switch, FreeBSD's core team, various topics
Tutorial
RAID in FreeBSD and OpenBSD (http://www.bsdnow.tv/tutorials/raid)
News Roundup
BSDTalk episode 240 (http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html)
Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time
Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more
GNN also talks a little about the Precision Time Protocol (https://en.wikipedia.org/wiki/Precision_Time_Protocol) and how it's different than NTP
Two people (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) we've interviewed (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) talking to each other, awesome
If you're interested in NTP, be sure to see our tutorial (http://www.bsdnow.tv/tutorials/ntpd) too
***
m2k14 trip reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140502092427)
We've got a few more reports from the recent OpenBSD hackathon in Morocco
The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the OpenBSD desktop tutorial (http://www.bsdnow.tv/tutorials/the-desktop-obsd))
"Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do"
He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports' compatibility with LibreSSL
Speaking of LibreSSL, there's an article (http://undeadly.org/cgi?action=article&amp;amp;sid=20140505062023) all would-be portable version writers should probably read and take into consideration
Jasper Adriaanse also writes (http://undeadly.org/cgi?action=article&amp;amp;sid=20140501185019) about what he got done over there
He cleaned up and fixed the puppet port to work better with OpenBSD
***
Why you should use FreeBSD on your cloud VPS (https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/)
Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD
Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows
The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options
The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/)
Big changes coming in the way PCBSD manages software
The PBI system, AppCafe and related tools are all going to use pkgng now
The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree
New rating system coming soon and much more
***
Feedback/Questions
Martin writes in (http://slexy.org/view/s21bk2oPuQ)
John writes in (http://slexy.org/view/s2n9fx1Rpw)
Alex writes in (http://slexy.org/view/s2rBBKLA4u)
Goetz writes in (http://slexy.org/view/s20JY6ZI71)
Jarrad writes in (http://slexy.org/view/s20YV5Ohpa)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, theraven, david chisnall, core, core team, clang, gcc, llvm, raid, stripe, mirror, bioctl, gstripe, zfs, gmirror, graid, ufs, ffs, disks, the worst pun i've done so far, i regret this already, redundancy, raid0, raid1, raid5, raidz, raid-z, filesystem, 5.5, pie, aslr, cd set, demo, tour, opensmtpd, pf, gnome, gnome3, marcusports, ports, router, signify, hackathon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>23: Time Signatures</title>
  <link>https://www.bsdnow.tv/23</link>
  <guid isPermaLink="false">d9e9eb7a-e7aa-4029-8881-05cc5f75e8b6</guid>
  <pubDate>Wed, 05 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d9e9eb7a-e7aa-4029-8881-05cc5f75e8b6.mp3" length="54539109" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's episode, we'll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we've got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:15:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>On this week's episode, we'll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we've got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD foundation's 2013 fundraising results (http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html)
The FreeBSD foundation finally counted all the money they made in 2013
$768,562 from 1659 donors
Nice little blog post from the team with a giant beastie picture
"We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon."
A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***
OpenSSH 6.5 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html)
We mentioned the CFT last week, and it's finally here (https://news.ycombinator.com/item?id=7154925)!
New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein's Curve25519 (now the default when both clients support it)
Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA
Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes can't even attempt to login (http://slexy.org/view/s2rI13v8F4) lol~
New bcrypt private key type, 500,000,000 times harder to brute force
Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one
Portable version already in (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=261320) FreeBSD -CURRENT, and ports (https://svnweb.freebsd.org/ports?view=revision&amp;amp;sortby=date&amp;amp;revision=342618)
Lots more bugfixes and features, see the full release note or our interview (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) with Damien
Work has already started on 6.6, which can be used without OpenSSL (https://twitter.com/msfriedl/status/427902493176377344)!
***
Crazed Ferrets in a Berkeley Shower (http://blather.michaelwlucas.com/archives/1942)
In 2000, MWL (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) wrote an essay for linux.com about why he uses the BSD license: "It’s actually stood up fairly well to the test of time, but it’s fourteen years old now."
This is basically an updated version about why he uses the BSD license, in response to recent comments from Richard Stallman (http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html)
Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL
Check out the full post if you're one of those people that gets into license arguments
The takeaway is "BSD is about making the world a better place. For everyone."
***
OpenBSD on BeagleBone Black (http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black)
Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi
A blog post about installing OpenBSD on a BBB from.. our guest for today!
He describes it as "everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black"
It goes through the whole process, details different storage options and some workarounds
Could be a really fun weekend project if you're interested in small or embedded devices
***
Interview - Ted Unangst - tedu@openbsd.org (mailto:tedu@openbsd.org) / @tedunangst (https://twitter.com/tedunangst)
OpenBSD's signify (http://www.tedunangst.com/flak/post/signify) infrastructure, ZFS on OpenBSD
Tutorial
Running an NTP server (http://www.bsdnow.tv/tutorials/ntpd)
News Roundup
Getting started with FreeBSD (http://smyck.net/2014/02/01/getting-started-with-freebsd/)
A new video and blog series about starting out with FreeBSD
The author has been a fan since the 90s and has installed it on every server he's worked with
He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users
The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***
More OpenBSD hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140204080515)
As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience
He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work
This summary goes into detail about all the stuff he got done there
***
X11 in a jail (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=261266)
We've gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!
A new tunable option will let jails access /dev/kmem and similar device nodes
Along with a change to DRM, this allows full X11 in a jail
Be sure to check out our jail tutorial and jailed VNC tutorial (http://www.bsdnow.tv/tutorials) for ideas
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/)
10.0 "Joule Edition" finally released (http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/)!
AMD graphics are now officially supported
GNOME3, MATE and Cinnamon desktops are available
Grub updates and fixes
PCBSD also got a mention in eweek (http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html)
***
Feedback/Questions
Justin writes in (http://slexy.org/view/s21VnbKZsH)
Daniel writes in (http://slexy.org/view/s2nD7RF6bo)
Martin writes in (http://slexy.org/view/s2jwRrj7UV)
Alex writes in (http://slexy.org/view/s201koMD2c) - unofficial FreeBSD RPI Images (http://people.freebsd.org/~gjb/RPI/)
James writes in (http://slexy.org/view/s2AntZmtRU)
John writes in (http://slexy.org/view/s20bGjMsIQ)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, security, gpg, gnupg, signed, packages, iso, set, patches, ted unangst, verify, verification, digital signature, ed25519, chacha20, license, debate, gnu, gpl, general public license, copyleft, copyfree, free software, open source, rms, richard stallman, clang, llvm, cddl, linux, gplv2, gplv3, ntp, ntpd, openntpd, isc, network time protocol, server, ssh, openssh, 6.5, foundation, donations, gcm, aes, aes-gcm, hmac, arm, armv7, beaglebone, black, serial, tty, zol, leaseweb, zfsonlinux, ecc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we&#39;ve got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" rel="nofollow">FreeBSD foundation&#39;s 2013 fundraising results</a></h3>

<ul>
<li>The FreeBSD foundation finally counted all the money they made in 2013</li>
<li><strong>$768,562 from 1659 donors</strong></li>
<li>Nice little blog post from the team with a giant beastie picture</li>
<li>&quot;We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon.&quot;</li>
<li>A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" rel="nofollow">OpenSSH 6.5 released</a></h3>

<ul>
<li>We mentioned the CFT last week, and it&#39;s <a href="https://news.ycombinator.com/item?id=7154925" rel="nofollow">finally here</a>!</li>
<li>New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein&#39;s Curve25519 (now the default when both clients support it)</li>
<li>Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA</li>
<li>Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes <a href="http://slexy.org/view/s2rI13v8F4" rel="nofollow">can&#39;t even attempt to login</a> lol~</li>
<li>New bcrypt private key type, 500,000,000 times harder to brute force</li>
<li>Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one</li>
<li>Portable version <a href="https://svnweb.freebsd.org/base?view=revision&revision=261320" rel="nofollow">already in</a> FreeBSD -CURRENT, <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=342618" rel="nofollow">and ports</a></li>
<li>Lots more bugfixes and features, see the full release note or <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">our interview</a> with Damien</li>
<li>Work has already started on 6.6, which <a href="https://twitter.com/msfriedl/status/427902493176377344" rel="nofollow">can be used without OpenSSL</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1942" rel="nofollow">Crazed Ferrets in a Berkeley Shower</a></h3>

<ul>
<li>In 2000, <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> wrote an essay for linux.com about why he uses the BSD license: &quot;It’s actually stood up fairly well to the test of time, but it’s fourteen years old now.&quot;</li>
<li>This is basically an updated version about why he uses the BSD license, in response to recent <a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" rel="nofollow">comments from Richard Stallman</a></li>
<li>Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL</li>
<li>Check out the full post if you&#39;re one of those people that gets into license arguments</li>
<li>The takeaway is &quot;BSD is about making the world a better place. For everyone.&quot;
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" rel="nofollow">OpenBSD on BeagleBone Black</a></h3>

<ul>
<li>Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi</li>
<li>A blog post about installing OpenBSD on a BBB from.. our guest for today!</li>
<li>He describes it as &quot;everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black&quot;</li>
<li>It goes through the whole process, details different storage options and some workarounds</li>
<li>Could be a really fun weekend project if you&#39;re interested in small or embedded devices
***</li>
</ul>

<h2>Interview - Ted Unangst - <a href="mailto:tedu@openbsd.org" rel="nofollow">tedu@openbsd.org</a> / <a href="https://twitter.com/tedunangst" rel="nofollow">@tedunangst</a></h2>

<p>OpenBSD&#39;s <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">signify</a> infrastructure, ZFS on OpenBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">Running an NTP server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" rel="nofollow">Getting started with FreeBSD</a></h3>

<ul>
<li>A new video and blog series about starting out with FreeBSD</li>
<li>The author has been a fan since the 90s and has installed it on every server he&#39;s worked with</li>
<li>He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users</li>
<li>The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140204080515" rel="nofollow">More OpenBSD hackathon reports</a></h3>

<ul>
<li>As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience</li>
<li>He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work</li>
<li>This summary goes into detail about all the stuff he got done there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=261266" rel="nofollow">X11 in a jail</a></h3>

<ul>
<li>We&#39;ve gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!</li>
<li>A new tunable option will let jails access /dev/kmem and similar device nodes</li>
<li>Along with a change to DRM, this allows full X11 in a jail</li>
<li>Be sure to check out our <a href="http://www.bsdnow.tv/tutorials" rel="nofollow">jail tutorial and jailed VNC tutorial</a> for ideas
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 &quot;Joule Edition&quot; <a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" rel="nofollow">finally released</a>!</li>
<li>AMD graphics are now officially supported</li>
<li>GNOME3, MATE and Cinnamon desktops are available</li>
<li>Grub updates and fixes</li>
<li>PCBSD also <a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" rel="nofollow">got a mention in eweek</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21VnbKZsH" rel="nofollow">Justin writes in</a></li>
<li><a href="http://slexy.org/view/s2nD7RF6bo" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2jwRrj7UV" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s201koMD2c" rel="nofollow">Alex writes in</a> - <a href="http://people.freebsd.org/%7Egjb/RPI/" rel="nofollow">unofficial FreeBSD RPI Images</a></li>
<li><a href="http://slexy.org/view/s2AntZmtRU" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20bGjMsIQ" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we&#39;ve got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" rel="nofollow">FreeBSD foundation&#39;s 2013 fundraising results</a></h3>

<ul>
<li>The FreeBSD foundation finally counted all the money they made in 2013</li>
<li><strong>$768,562 from 1659 donors</strong></li>
<li>Nice little blog post from the team with a giant beastie picture</li>
<li>&quot;We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon.&quot;</li>
<li>A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" rel="nofollow">OpenSSH 6.5 released</a></h3>

<ul>
<li>We mentioned the CFT last week, and it&#39;s <a href="https://news.ycombinator.com/item?id=7154925" rel="nofollow">finally here</a>!</li>
<li>New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein&#39;s Curve25519 (now the default when both clients support it)</li>
<li>Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA</li>
<li>Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes <a href="http://slexy.org/view/s2rI13v8F4" rel="nofollow">can&#39;t even attempt to login</a> lol~</li>
<li>New bcrypt private key type, 500,000,000 times harder to brute force</li>
<li>Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one</li>
<li>Portable version <a href="https://svnweb.freebsd.org/base?view=revision&revision=261320" rel="nofollow">already in</a> FreeBSD -CURRENT, <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=342618" rel="nofollow">and ports</a></li>
<li>Lots more bugfixes and features, see the full release note or <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">our interview</a> with Damien</li>
<li>Work has already started on 6.6, which <a href="https://twitter.com/msfriedl/status/427902493176377344" rel="nofollow">can be used without OpenSSL</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1942" rel="nofollow">Crazed Ferrets in a Berkeley Shower</a></h3>

<ul>
<li>In 2000, <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> wrote an essay for linux.com about why he uses the BSD license: &quot;It’s actually stood up fairly well to the test of time, but it’s fourteen years old now.&quot;</li>
<li>This is basically an updated version about why he uses the BSD license, in response to recent <a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" rel="nofollow">comments from Richard Stallman</a></li>
<li>Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL</li>
<li>Check out the full post if you&#39;re one of those people that gets into license arguments</li>
<li>The takeaway is &quot;BSD is about making the world a better place. For everyone.&quot;
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" rel="nofollow">OpenBSD on BeagleBone Black</a></h3>

<ul>
<li>Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi</li>
<li>A blog post about installing OpenBSD on a BBB from.. our guest for today!</li>
<li>He describes it as &quot;everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black&quot;</li>
<li>It goes through the whole process, details different storage options and some workarounds</li>
<li>Could be a really fun weekend project if you&#39;re interested in small or embedded devices
***</li>
</ul>

<h2>Interview - Ted Unangst - <a href="mailto:tedu@openbsd.org" rel="nofollow">tedu@openbsd.org</a> / <a href="https://twitter.com/tedunangst" rel="nofollow">@tedunangst</a></h2>

<p>OpenBSD&#39;s <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">signify</a> infrastructure, ZFS on OpenBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">Running an NTP server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" rel="nofollow">Getting started with FreeBSD</a></h3>

<ul>
<li>A new video and blog series about starting out with FreeBSD</li>
<li>The author has been a fan since the 90s and has installed it on every server he&#39;s worked with</li>
<li>He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users</li>
<li>The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140204080515" rel="nofollow">More OpenBSD hackathon reports</a></h3>

<ul>
<li>As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience</li>
<li>He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work</li>
<li>This summary goes into detail about all the stuff he got done there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=261266" rel="nofollow">X11 in a jail</a></h3>

<ul>
<li>We&#39;ve gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!</li>
<li>A new tunable option will let jails access /dev/kmem and similar device nodes</li>
<li>Along with a change to DRM, this allows full X11 in a jail</li>
<li>Be sure to check out our <a href="http://www.bsdnow.tv/tutorials" rel="nofollow">jail tutorial and jailed VNC tutorial</a> for ideas
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 &quot;Joule Edition&quot; <a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" rel="nofollow">finally released</a>!</li>
<li>AMD graphics are now officially supported</li>
<li>GNOME3, MATE and Cinnamon desktops are available</li>
<li>Grub updates and fixes</li>
<li>PCBSD also <a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" rel="nofollow">got a mention in eweek</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21VnbKZsH" rel="nofollow">Justin writes in</a></li>
<li><a href="http://slexy.org/view/s2nD7RF6bo" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2jwRrj7UV" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s201koMD2c" rel="nofollow">Alex writes in</a> - <a href="http://people.freebsd.org/%7Egjb/RPI/" rel="nofollow">unofficial FreeBSD RPI Images</a></li>
<li><a href="http://slexy.org/view/s2AntZmtRU" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20bGjMsIQ" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
