<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 17 May 2026 10:56:36 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Cloud Computing”</title>
    <link>https://www.bsdnow.tv/tags/cloud%20computing</link>
    <pubDate>Wed, 20 Aug 2014 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>51: Engineering Nginx</title>
  <link>https://www.bsdnow.tv/51</link>
  <guid isPermaLink="false">4502bfee-e803-4a0d-bdcc-fd4420b30bb1</guid>
  <pubDate>Wed, 20 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4502bfee-e803-4a0d-bdcc-fd4420b30bb1.mp3" length="62975956" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on the show, we'll be showing you how to set up a secure, SSL-only webserver. There's also an interview with Eric Le Blan about community participation and FreeBSD's role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up on the show, we'll be showing you how to set up a secure, SSL-only webserver. There's also an interview with Eric Le Blan about community participation and FreeBSD's role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" target="_blank" rel="nofollow noopener"&gt;Password gropers take spamtrap bait&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" target="_blank" rel="nofollow noopener"&gt;Peter Hansteen&lt;/a&gt;, who keeps his eyes glued to his log files, has a new blog post&lt;/li&gt;
&lt;li&gt;He seems to have discovered another new weird phenomenon in his pop3 logs&lt;/li&gt;
&lt;li&gt;"yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia"&lt;/li&gt;
&lt;li&gt;Someone tried to log in to his service with an address that was known to be invalid&lt;/li&gt;
&lt;li&gt;The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" target="_blank" rel="nofollow noopener"&gt;Inside the Atheros wifi chipset&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd - sometimes known in the FreeBSD community as "the wireless guy" - gave a talk at the Defcon Wireless Village 2014&lt;/li&gt;
&lt;li&gt;He covers a lot of topics on wifi, specifically on Atheros chips and why they're so popular for open source development&lt;/li&gt;
&lt;li&gt;There's a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards&lt;/li&gt;
&lt;li&gt;Very technical talk; some parts might go over your head if you're not a driver developer&lt;/li&gt;
&lt;li&gt;The raw video file is also available &lt;a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" target="_blank" rel="nofollow noopener"&gt;to download&lt;/a&gt; on archive.org&lt;/li&gt;
&lt;li&gt;Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" target="_blank" rel="nofollow noopener"&gt;Trip report and hackathon mini-roundup&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted&lt;/li&gt;
&lt;li&gt;Mark Linimon mentions some of the future plans for FreeBSD's release engineering and ports&lt;/li&gt;
&lt;li&gt;Bapt &lt;a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" target="_blank" rel="nofollow noopener"&gt;also has a BSDCan report&lt;/a&gt; detailing his work on ports and packages&lt;/li&gt;
&lt;li&gt;Antoine Jacoutot &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140812064946" target="_blank" rel="nofollow noopener"&gt;writes about&lt;/a&gt; his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout&lt;/li&gt;
&lt;li&gt;Peter Hessler, a latecomer to the hackathon, &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140806125308" target="_blank" rel="nofollow noopener"&gt;details his experience&lt;/a&gt; too, hacking on the installer and built-in upgrade function&lt;/li&gt;
&lt;li&gt;Christian Weisgerber &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140803122705" target="_blank" rel="nofollow noopener"&gt;talks about&lt;/a&gt; starting some initial improvements of OpenBSD's ports infrastructure
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD 3.8.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Although it was already branched, the release media is now available for DragonFly 3.8.2&lt;/li&gt;
&lt;li&gt;This is a minor update, mostly to fix the recent OpenSSL vulnerabilities&lt;/li&gt;
&lt;li&gt;It also includes some various other small fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Eric Le Blan - &lt;a href="mailto:info@xinuos.com" target="_blank" rel="nofollow noopener"&gt;info@xinuos.com&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Xinuos' recent FreeBSD integration, BSD in the commercial server space&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/nginx" target="_blank" rel="nofollow noopener"&gt;Building a hardened, feature-rich webserver&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" target="_blank" rel="nofollow noopener"&gt;Defend your network and privacy, FreeBSD version&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back in &lt;a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" target="_blank" rel="nofollow noopener"&gt;episode 39&lt;/a&gt;, we covered a blog post about creating an OpenBSD gateway - partly based on &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;our tutorial&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This is a follow-up post, by the same author, about doing a similar thing with FreeBSD&lt;/li&gt;
&lt;li&gt;He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs&lt;/li&gt;
&lt;li&gt;The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" target="_blank" rel="nofollow noopener"&gt;Don't encrypt all the things&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another couple of interesting blog posts from &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; about encryption&lt;/li&gt;
&lt;li&gt;It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good&lt;/li&gt;
&lt;li&gt;After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie&lt;/li&gt;
&lt;li&gt;He also talks a bit about some PGP weaknesses and a possible future replacement&lt;/li&gt;
&lt;li&gt;He also has another, similar post entitled "&lt;a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" target="_blank" rel="nofollow noopener"&gt;in defense of opportunistic encryption&lt;/a&gt;"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=270096" target="_blank" rel="nofollow noopener"&gt;New automounter lands in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The work on the new automounter has just landed in 11-CURRENT&lt;/li&gt;
&lt;li&gt;With help from the FreeBSD Foundation, we'll have a new "autofs" kernel option&lt;/li&gt;
&lt;li&gt;Check the SVN viewer online to read over the man pages if you're not running -CURRENT&lt;/li&gt;
&lt;li&gt;You can also read a bit about it in the &lt;a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" target="_blank" rel="nofollow noopener"&gt;recent newsletter&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.7 CFT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It's been a little while since the last OpenSSH release, but 6.7 is almost ready&lt;/li&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;Damien Miller&lt;/a&gt; issued a call for testing for the upcoming version, which includes a fair amount of new features&lt;/li&gt;
&lt;li&gt;It includes some old code removal, some new features and some internal reworkings - we'll cover the full list in detail when it's released&lt;/li&gt;
&lt;li&gt;This version also officially supports being built with LibreSSL now&lt;/li&gt;
&lt;li&gt;Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20yIP7VXa" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2DeeUjAn6" target="_blank" rel="nofollow noopener"&gt;Lachlan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216imwEb0" target="_blank" rel="nofollow noopener"&gt;Francis writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2oc8vavWe" target="_blank" rel="nofollow noopener"&gt;Frank writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20wL61sSr" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, xinuos, cloud computing, hosting solution, nginx, webserver, httpd, spamd, atheros, wifi, aircrack-ng, kismet, defcon, wireless, bsdcan, hackathon, autofs, automounter, https, tls, ssl, openssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on the show, we&#39;ll be showing you how to set up a secure, SSL-only webserver. There&#39;s also an interview with Eric Le Blan about community participation and FreeBSD&#39;s role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" rel="nofollow">Password gropers take spamtrap bait</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a>, who keeps his eyes glued to his log files, has a new blog post</li>
<li>He seems to have discovered another new weird phenomenon in his pop3 logs</li>
<li>&quot;yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia&quot;</li>
<li>Someone tried to log in to his service with an address that was known to be invalid</li>
<li>The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" rel="nofollow">Inside the Atheros wifi chipset</a></h3>

<ul>
<li>Adrian Chadd - sometimes known in the FreeBSD community as &quot;the wireless guy&quot; - gave a talk at the Defcon Wireless Village 2014</li>
<li>He covers a lot of topics on wifi, specifically on Atheros chips and why they&#39;re so popular for open source development</li>
<li>There&#39;s a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards</li>
<li>Very technical talk; some parts might go over your head if you&#39;re not a driver developer</li>
<li>The raw video file is also available <a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" rel="nofollow">to download</a> on archive.org</li>
<li>Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" rel="nofollow">Trip report and hackathon mini-roundup</a></h3>

<ul>
<li>A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted</li>
<li>Mark Linimon mentions some of the future plans for FreeBSD&#39;s release engineering and ports</li>
<li>Bapt <a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" rel="nofollow">also has a BSDCan report</a> detailing his work on ports and packages</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20140812064946" rel="nofollow">writes about</a> his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout</li>
<li>Peter Hessler, a latecomer to the hackathon, <a href="http://undeadly.org/cgi?action=article&sid=20140806125308" rel="nofollow">details his experience</a> too, hacking on the installer and built-in upgrade function</li>
<li>Christian Weisgerber <a href="http://undeadly.org/cgi?action=article&sid=20140803122705" rel="nofollow">talks about</a> starting some initial improvements of OpenBSD&#39;s ports infrastructure
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" rel="nofollow">DragonFly BSD 3.8.2 released</a></h3>

<ul>
<li>Although it was already branched, the release media is now available for DragonFly 3.8.2</li>
<li>This is a minor update, mostly to fix the recent OpenSSL vulnerabilities</li>
<li>It also includes some various other small fixes
***</li>
</ul>

<h2>Interview - Eric Le Blan - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a></h2>

<p>Xinuos&#39; recent FreeBSD integration, BSD in the commercial server space</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nginx" rel="nofollow">Building a hardened, feature-rich webserver</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy, FreeBSD version</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">episode 39</a>, we covered a blog post about creating an OpenBSD gateway - partly based on <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a></li>
<li>This is a follow-up post, by the same author, about doing a similar thing with FreeBSD</li>
<li>He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs</li>
<li>The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" rel="nofollow">Don&#39;t encrypt all the things</a></h3>

<ul>
<li>Another couple of interesting blog posts from <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> about encryption</li>
<li>It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good</li>
<li>After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie</li>
<li>He also talks a bit about some PGP weaknesses and a possible future replacement</li>
<li>He also has another, similar post entitled &quot;<a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" rel="nofollow">in defense of opportunistic encryption</a>&quot;
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=270096" rel="nofollow">New automounter lands in FreeBSD</a></h3>

<ul>
<li>The work on the new automounter has just landed in 11-CURRENT</li>
<li>With help from the FreeBSD Foundation, we&#39;ll have a new &quot;autofs&quot; kernel option</li>
<li>Check the SVN viewer online to read over the man pages if you&#39;re not running -CURRENT</li>
<li>You can also read a bit about it in the <a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" rel="nofollow">recent newsletter</a>
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" rel="nofollow">OpenSSH 6.7 CFT</a></h3>

<ul>
<li>It&#39;s been a little while since the last OpenSSH release, but 6.7 is almost ready</li>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> issued a call for testing for the upcoming version, which includes a fair amount of new features</li>
<li>It includes some old code removal, some new features and some internal reworkings - we&#39;ll cover the full list in detail when it&#39;s released</li>
<li>This version also officially supports being built with LibreSSL now</li>
<li>Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20yIP7VXa" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DeeUjAn6" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s216imwEb0" rel="nofollow">Francis writes in</a></li>
<li><a href="http://slexy.org/view/s2oc8vavWe" rel="nofollow">Frank writes in</a></li>
<li><a href="http://slexy.org/view/s20wL61sSr" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on the show, we&#39;ll be showing you how to set up a secure, SSL-only webserver. There&#39;s also an interview with Eric Le Blan about community participation and FreeBSD&#39;s role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" rel="nofollow">Password gropers take spamtrap bait</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a>, who keeps his eyes glued to his log files, has a new blog post</li>
<li>He seems to have discovered another new weird phenomenon in his pop3 logs</li>
<li>&quot;yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia&quot;</li>
<li>Someone tried to log in to his service with an address that was known to be invalid</li>
<li>The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" rel="nofollow">Inside the Atheros wifi chipset</a></h3>

<ul>
<li>Adrian Chadd - sometimes known in the FreeBSD community as &quot;the wireless guy&quot; - gave a talk at the Defcon Wireless Village 2014</li>
<li>He covers a lot of topics on wifi, specifically on Atheros chips and why they&#39;re so popular for open source development</li>
<li>There&#39;s a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards</li>
<li>Very technical talk; some parts might go over your head if you&#39;re not a driver developer</li>
<li>The raw video file is also available <a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" rel="nofollow">to download</a> on archive.org</li>
<li>Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" rel="nofollow">Trip report and hackathon mini-roundup</a></h3>

<ul>
<li>A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted</li>
<li>Mark Linimon mentions some of the future plans for FreeBSD&#39;s release engineering and ports</li>
<li>Bapt <a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" rel="nofollow">also has a BSDCan report</a> detailing his work on ports and packages</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20140812064946" rel="nofollow">writes about</a> his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout</li>
<li>Peter Hessler, a latecomer to the hackathon, <a href="http://undeadly.org/cgi?action=article&sid=20140806125308" rel="nofollow">details his experience</a> too, hacking on the installer and built-in upgrade function</li>
<li>Christian Weisgerber <a href="http://undeadly.org/cgi?action=article&sid=20140803122705" rel="nofollow">talks about</a> starting some initial improvements of OpenBSD&#39;s ports infrastructure
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" rel="nofollow">DragonFly BSD 3.8.2 released</a></h3>

<ul>
<li>Although it was already branched, the release media is now available for DragonFly 3.8.2</li>
<li>This is a minor update, mostly to fix the recent OpenSSL vulnerabilities</li>
<li>It also includes some various other small fixes
***</li>
</ul>

<h2>Interview - Eric Le Blan - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a></h2>

<p>Xinuos&#39; recent FreeBSD integration, BSD in the commercial server space</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nginx" rel="nofollow">Building a hardened, feature-rich webserver</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy, FreeBSD version</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">episode 39</a>, we covered a blog post about creating an OpenBSD gateway - partly based on <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a></li>
<li>This is a follow-up post, by the same author, about doing a similar thing with FreeBSD</li>
<li>He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs</li>
<li>The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" rel="nofollow">Don&#39;t encrypt all the things</a></h3>

<ul>
<li>Another couple of interesting blog posts from <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> about encryption</li>
<li>It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good</li>
<li>After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie</li>
<li>He also talks a bit about some PGP weaknesses and a possible future replacement</li>
<li>He also has another, similar post entitled &quot;<a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" rel="nofollow">in defense of opportunistic encryption</a>&quot;
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=270096" rel="nofollow">New automounter lands in FreeBSD</a></h3>

<ul>
<li>The work on the new automounter has just landed in 11-CURRENT</li>
<li>With help from the FreeBSD Foundation, we&#39;ll have a new &quot;autofs&quot; kernel option</li>
<li>Check the SVN viewer online to read over the man pages if you&#39;re not running -CURRENT</li>
<li>You can also read a bit about it in the <a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" rel="nofollow">recent newsletter</a>
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" rel="nofollow">OpenSSH 6.7 CFT</a></h3>

<ul>
<li>It&#39;s been a little while since the last OpenSSH release, but 6.7 is almost ready</li>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> issued a call for testing for the upcoming version, which includes a fair amount of new features</li>
<li>It includes some old code removal, some new features and some internal reworkings - we&#39;ll cover the full list in detail when it&#39;s released</li>
<li>This version also officially supports being built with LibreSSL now</li>
<li>Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20yIP7VXa" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DeeUjAn6" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s216imwEb0" rel="nofollow">Francis writes in</a></li>
<li><a href="http://slexy.org/view/s2oc8vavWe" rel="nofollow">Frank writes in</a></li>
<li><a href="http://slexy.org/view/s20wL61sSr" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>43: Package Design</title>
  <link>https://www.bsdnow.tv/43</link>
  <guid isPermaLink="false">d4b10034-d20a-44a6-a918-a57335debcae</guid>
  <pubDate>Wed, 25 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d4b10034-d20a-44a6-a918-a57335debcae.mp3" length="62389876" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's a big show this week! We'll be interviewing Marc Espie about OpenBSD's package system and build cluster. Also, we've been asked many times "how do I keep my BSD box up to date?" Well, today's tutorial should finally answer that. Answers to all your emails and this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's a big show this week! We'll be interviewing Marc Espie about OpenBSD's package system and build cluster. Also, we've been asked many times "how do I keep my BSD box up to date?" Well, today's tutorial should finally answer that. Answers to all your emails and this week's headlines, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.eurobsdcon.org/talks-and-schedule/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2014 talks and schedule&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The talks and schedules for EuroBSDCon 2014 are finally revealed&lt;/li&gt;
&lt;li&gt;The opening keynote is called "FreeBSD, looking forward to another 10 years" by jkh&lt;/li&gt;
&lt;li&gt;Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great&lt;/li&gt;
&lt;li&gt;It looks like Theo even has a talk, but the title isn't on the page... how mysterious&lt;/li&gt;
&lt;li&gt;There are also days dedicated to some really interesting tutorials&lt;/li&gt;
&lt;li&gt;Register now, the conference is on September 25-28th in Bulgaria&lt;/li&gt;
&lt;li&gt;If you see Allan and Kris walking towards you and you haven't given us an interview yet... well you know what's going to happen&lt;/li&gt;
&lt;li&gt;Why aren't the videos up from last year yet? Will this year also not have any?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" target="_blank" rel="nofollow noopener"&gt;FreeNAS vs NAS4Free&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;More mainstream news covering BSD, this time with an article about different NAS solutions&lt;/li&gt;
&lt;li&gt;In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free&lt;/li&gt;
&lt;li&gt;Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect&lt;/li&gt;
&lt;li&gt;Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project&lt;/li&gt;
&lt;li&gt;"One is pleasantly functional; the other continues devolving during a journey of pain" - uh oh, who's the loser?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://queue.acm.org/detail.cfm?id=2636165" target="_blank" rel="nofollow noopener"&gt;Quality software costs money, heartbleed was free&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" target="_blank" rel="nofollow noopener"&gt;PHK&lt;/a&gt; writes an article for ACM Queue about open source software projects' funding efforts&lt;/li&gt;
&lt;li&gt;A lot of people don't realize just how widespread open source software is - TVs, printers, gaming consoles, etc&lt;/li&gt;
&lt;li&gt;The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish's funding&lt;/li&gt;
&lt;li&gt;The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them&lt;/li&gt;
&lt;li&gt;On that subject, "Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software"&lt;/li&gt;
&lt;li&gt;Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" target="_blank" rel="nofollow noopener"&gt;Geoblock evasion with pf and OpenBSD rdomains&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Geoblocking is a way for websites to block visitors based on the location of their IP&lt;/li&gt;
&lt;li&gt;This is a blog post about how to get around it, using pf and rdomains&lt;/li&gt;
&lt;li&gt;It has the advantage of not requiring any browser plugins or DNS settings on the users' computers, you just need to be running OpenBSD on your router (hmm, if only a website had &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;a tutorial about that&lt;/a&gt;...)&lt;/li&gt;
&lt;li&gt;In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia&lt;/li&gt;
&lt;li&gt;It's got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Marc Espie - &lt;a href="mailto:espie@openbsd.org" target="_blank" rel="nofollow noopener"&gt;espie@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/espie_openbsd" target="_blank" rel="nofollow noopener"&gt;@espie_openbsd&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenBSD's package system, building cluster, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/upgrade" target="_blank" rel="nofollow noopener"&gt;Keeping your BSD up to date&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" target="_blank" rel="nofollow noopener"&gt;BoringSSL and LibReSSL&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Yet another OpenSSL fork pops up, this time from Google, called BoringSSL&lt;/li&gt;
&lt;li&gt;Adam Langley has a blog post about it, why they did it and how they're going to maintain it&lt;/li&gt;
&lt;li&gt;You can easily browse &lt;a href="https://boringssl.googlesource.com/" target="_blank" rel="nofollow noopener"&gt;the source code&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Theo de Raadt also &lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=140332790726752&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;weighs in&lt;/a&gt; with how this effort relates to LibReSSL&lt;/li&gt;
&lt;li&gt;More eyes on the code is good, and patches will be shared between the two projects
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" target="_blank" rel="nofollow noopener"&gt;More BSD Tor nodes wanted&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" target="_blank" rel="nofollow noopener"&gt;Originally discussed&lt;/a&gt; on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network&lt;/li&gt;
&lt;li&gt;If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.&lt;/li&gt;
&lt;li&gt;The EFF is also holding a &lt;a href="https://www.eff.org/torchallenge/" target="_blank" rel="nofollow noopener"&gt;Tor challenge&lt;/a&gt; for people to start up new relays and keep them online for over a year&lt;/li&gt;
&lt;li&gt;Check out our &lt;a href="http://www.bsdnow.tv/tutorials/tor" target="_blank" rel="nofollow noopener"&gt;Tor tutorial&lt;/a&gt; and help out the network, and promote BSD at the same time!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 OpenStack images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenStack, to quote Wikipedia, is "a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution."&lt;/li&gt;
&lt;li&gt;The article goes into detail about creating a FreeBSD instant, installing and converting it for use with "bsd-cloudinit"&lt;/li&gt;
&lt;li&gt;The author of the article is a regular listener and emailer of the show, hey!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" target="_blank" rel="nofollow noopener"&gt;BSDday 2014 call for papers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSD Day, a conference not so well-known, is going to be held August 9th in Argentina&lt;/li&gt;
&lt;li&gt;It was created in 2008 and is the only BSD conference around that area&lt;/li&gt;
&lt;li&gt;The "call for papers" was issued, so if you're around Argentina and use BSD, consider submitting a talk&lt;/li&gt;
&lt;li&gt;Sysadmins, developers and regular users are, of course, all welcome to come to the event
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20nTYO2w1" target="_blank" rel="nofollow noopener"&gt;Maruf writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21cvV6mRP" target="_blank" rel="nofollow noopener"&gt;Solomon writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2MK8sbea0" target="_blank" rel="nofollow noopener"&gt;Silas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2Yz97YlzI" target="_blank" rel="nofollow noopener"&gt;Bert writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ports, packages, cluster, building, pkg_add, freenas, ixsystems, tarsnap, eurobsdcon, bulgaria, 2014, talks, presentation, slides, Poul-Henning Kamp, phk, schedule, freenas, nas4free, nas, geoblock, evasion, bypassing, ip ban, pf, firewall, rdomains, glusterfs, marc espie, boringssl, openssl, libressl, upgrades, how to upgrade, update, rebuild, tor, tor nodes, relays, exit node, eff, tor challenge, aslr, pie, security, bsdday, openstack, bsd-cloudinit, cloud computing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s a big show this week! We&#39;ll be interviewing Marc Espie about OpenBSD&#39;s package system and build cluster. Also, we&#39;ve been asked many times &quot;how do I keep my BSD box up to date?&quot; Well, today&#39;s tutorial should finally answer that. Answers to all your emails and this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and schedule</a></h3>

<ul>
<li>The talks and schedules for EuroBSDCon 2014 are finally revealed</li>
<li>The opening keynote is called &quot;FreeBSD, looking forward to another 10 years&quot; by jkh</li>
<li>Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great</li>
<li>It looks like Theo even has a talk, but the title isn&#39;t on the page... how mysterious</li>
<li>There are also days dedicated to some really interesting tutorials</li>
<li>Register now, the conference is on September 25-28th in Bulgaria</li>
<li>If you see Allan and Kris walking towards you and you haven&#39;t given us an interview yet... well you know what&#39;s going to happen</li>
<li>Why aren&#39;t the videos up from last year yet? Will this year also not have any?
***</li>
</ul>

<h3><a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" rel="nofollow">FreeNAS vs NAS4Free</a></h3>

<ul>
<li>More mainstream news covering BSD, this time with an article about different NAS solutions</li>
<li>In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free</li>
<li>Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect</li>
<li>Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project</li>
<li>&quot;One is pleasantly functional; the other continues devolving during a journey of pain&quot; - uh oh, who&#39;s the loser?
***</li>
</ul>

<h3><a href="https://queue.acm.org/detail.cfm?id=2636165" rel="nofollow">Quality software costs money, heartbleed was free</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">PHK</a> writes an article for ACM Queue about open source software projects&#39; funding efforts</li>
<li>A lot of people don&#39;t realize just how widespread open source software is - TVs, printers, gaming consoles, etc</li>
<li>The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish&#39;s funding</li>
<li>The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them</li>
<li>On that subject, &quot;Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software&quot;</li>
<li>Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***</li>
</ul>

<h3><a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" rel="nofollow">Geoblock evasion with pf and OpenBSD rdomains</a></h3>

<ul>
<li>Geoblocking is a way for websites to block visitors based on the location of their IP</li>
<li>This is a blog post about how to get around it, using pf and rdomains</li>
<li>It has the advantage of not requiring any browser plugins or DNS settings on the users&#39; computers, you just need to be running OpenBSD on your router (hmm, if only a website had <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">a tutorial about that</a>...)</li>
<li>In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia</li>
<li>It&#39;s got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p>OpenBSD&#39;s package system, building cluster, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/upgrade" rel="nofollow">Keeping your BSD up to date</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" rel="nofollow">BoringSSL and LibReSSL</a></h3>

<ul>
<li>Yet another OpenSSL fork pops up, this time from Google, called BoringSSL</li>
<li>Adam Langley has a blog post about it, why they did it and how they&#39;re going to maintain it</li>
<li>You can easily browse <a href="https://boringssl.googlesource.com/" rel="nofollow">the source code</a></li>
<li>Theo de Raadt also <a href="http://marc.info/?l=openbsd-tech&m=140332790726752&w=2" rel="nofollow">weighs in</a> with how this effort relates to LibReSSL</li>
<li>More eyes on the code is good, and patches will be shared between the two projects
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" rel="nofollow">More BSD Tor nodes wanted</a></h3>

<ul>
<li>Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous</li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" rel="nofollow">Originally discussed</a> on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network</li>
<li>If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.</li>
<li>The EFF is also holding a <a href="https://www.eff.org/torchallenge/" rel="nofollow">Tor challenge</a> for people to start up new relays and keep them online for over a year</li>
<li>Check out our <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor tutorial</a> and help out the network, and promote BSD at the same time!
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" rel="nofollow">FreeBSD 10 OpenStack images</a></h3>

<ul>
<li>OpenStack, to quote Wikipedia, is &quot;a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution.&quot;</li>
<li>The article goes into detail about creating a FreeBSD instant, installing and converting it for use with &quot;bsd-cloudinit&quot;</li>
<li>The author of the article is a regular listener and emailer of the show, hey!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" rel="nofollow">BSDday 2014 call for papers</a></h3>

<ul>
<li>BSD Day, a conference not so well-known, is going to be held August 9th in Argentina</li>
<li>It was created in 2008 and is the only BSD conference around that area</li>
<li>The &quot;call for papers&quot; was issued, so if you&#39;re around Argentina and use BSD, consider submitting a talk</li>
<li>Sysadmins, developers and regular users are, of course, all welcome to come to the event
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20nTYO2w1" rel="nofollow">Maruf writes in</a></li>
<li><a href="http://slexy.org/view/s21cvV6mRP" rel="nofollow">Solomon writes in</a></li>
<li><a href="http://slexy.org/view/s2MK8sbea0" rel="nofollow">Silas writes in</a></li>
<li><a href="http://slexy.org/view/s2Yz97YlzI" rel="nofollow">Bert writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s a big show this week! We&#39;ll be interviewing Marc Espie about OpenBSD&#39;s package system and build cluster. Also, we&#39;ve been asked many times &quot;how do I keep my BSD box up to date?&quot; Well, today&#39;s tutorial should finally answer that. Answers to all your emails and this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and schedule</a></h3>

<ul>
<li>The talks and schedules for EuroBSDCon 2014 are finally revealed</li>
<li>The opening keynote is called &quot;FreeBSD, looking forward to another 10 years&quot; by jkh</li>
<li>Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great</li>
<li>It looks like Theo even has a talk, but the title isn&#39;t on the page... how mysterious</li>
<li>There are also days dedicated to some really interesting tutorials</li>
<li>Register now, the conference is on September 25-28th in Bulgaria</li>
<li>If you see Allan and Kris walking towards you and you haven&#39;t given us an interview yet... well you know what&#39;s going to happen</li>
<li>Why aren&#39;t the videos up from last year yet? Will this year also not have any?
***</li>
</ul>

<h3><a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" rel="nofollow">FreeNAS vs NAS4Free</a></h3>

<ul>
<li>More mainstream news covering BSD, this time with an article about different NAS solutions</li>
<li>In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free</li>
<li>Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect</li>
<li>Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project</li>
<li>&quot;One is pleasantly functional; the other continues devolving during a journey of pain&quot; - uh oh, who&#39;s the loser?
***</li>
</ul>

<h3><a href="https://queue.acm.org/detail.cfm?id=2636165" rel="nofollow">Quality software costs money, heartbleed was free</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">PHK</a> writes an article for ACM Queue about open source software projects&#39; funding efforts</li>
<li>A lot of people don&#39;t realize just how widespread open source software is - TVs, printers, gaming consoles, etc</li>
<li>The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish&#39;s funding</li>
<li>The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them</li>
<li>On that subject, &quot;Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software&quot;</li>
<li>Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***</li>
</ul>

<h3><a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" rel="nofollow">Geoblock evasion with pf and OpenBSD rdomains</a></h3>

<ul>
<li>Geoblocking is a way for websites to block visitors based on the location of their IP</li>
<li>This is a blog post about how to get around it, using pf and rdomains</li>
<li>It has the advantage of not requiring any browser plugins or DNS settings on the users&#39; computers, you just need to be running OpenBSD on your router (hmm, if only a website had <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">a tutorial about that</a>...)</li>
<li>In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia</li>
<li>It&#39;s got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p>OpenBSD&#39;s package system, building cluster, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/upgrade" rel="nofollow">Keeping your BSD up to date</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" rel="nofollow">BoringSSL and LibReSSL</a></h3>

<ul>
<li>Yet another OpenSSL fork pops up, this time from Google, called BoringSSL</li>
<li>Adam Langley has a blog post about it, why they did it and how they&#39;re going to maintain it</li>
<li>You can easily browse <a href="https://boringssl.googlesource.com/" rel="nofollow">the source code</a></li>
<li>Theo de Raadt also <a href="http://marc.info/?l=openbsd-tech&m=140332790726752&w=2" rel="nofollow">weighs in</a> with how this effort relates to LibReSSL</li>
<li>More eyes on the code is good, and patches will be shared between the two projects
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" rel="nofollow">More BSD Tor nodes wanted</a></h3>

<ul>
<li>Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous</li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" rel="nofollow">Originally discussed</a> on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network</li>
<li>If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.</li>
<li>The EFF is also holding a <a href="https://www.eff.org/torchallenge/" rel="nofollow">Tor challenge</a> for people to start up new relays and keep them online for over a year</li>
<li>Check out our <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor tutorial</a> and help out the network, and promote BSD at the same time!
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" rel="nofollow">FreeBSD 10 OpenStack images</a></h3>

<ul>
<li>OpenStack, to quote Wikipedia, is &quot;a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution.&quot;</li>
<li>The article goes into detail about creating a FreeBSD instant, installing and converting it for use with &quot;bsd-cloudinit&quot;</li>
<li>The author of the article is a regular listener and emailer of the show, hey!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" rel="nofollow">BSDday 2014 call for papers</a></h3>

<ul>
<li>BSD Day, a conference not so well-known, is going to be held August 9th in Argentina</li>
<li>It was created in 2008 and is the only BSD conference around that area</li>
<li>The &quot;call for papers&quot; was issued, so if you&#39;re around Argentina and use BSD, consider submitting a talk</li>
<li>Sysadmins, developers and regular users are, of course, all welcome to come to the event
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20nTYO2w1" rel="nofollow">Maruf writes in</a></li>
<li><a href="http://slexy.org/view/s21cvV6mRP" rel="nofollow">Solomon writes in</a></li>
<li><a href="http://slexy.org/view/s2MK8sbea0" rel="nofollow">Silas writes in</a></li>
<li><a href="http://slexy.org/view/s2Yz97YlzI" rel="nofollow">Bert writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>24: The Cluster &amp; The Cloud</title>
  <link>https://www.bsdnow.tv/24</link>
  <guid isPermaLink="false">4472f6f6-5fb3-4ee9-b20c-04e927cf1299</guid>
  <pubDate>Wed, 12 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4472f6f6-5fb3-4ee9-b20c-04e927cf1299.mp3" length="50214172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:09:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 as a firewall&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead&lt;/li&gt;
&lt;li&gt;Now, with the release of 10.0, he's apparently changed his mind and switched back over&lt;/li&gt;
&lt;li&gt;It mentions the SMP version of pf, general performance advantages and more modern features&lt;/li&gt;
&lt;li&gt;The author is a regular listener of BSD Now, hi Joe!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" target="_blank" rel="nofollow noopener"&gt;Network Noise Reduction Using Free Tools&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD&lt;/li&gt;
&lt;li&gt;Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD's spamd and other security features to combat spam and malware&lt;/li&gt;
&lt;li&gt;He goes through his experiences with content filtering and disappointment with a certain proprietary vendor&lt;/li&gt;
&lt;li&gt;Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" target="_blank" rel="nofollow noopener"&gt;FreeBSD ASLR patches submitted&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;So far, FreeBSD hasn't had Address Space Layout Randomization&lt;/li&gt;
&lt;li&gt;ASLR is a nice security feature, &lt;a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" target="_blank" rel="nofollow noopener"&gt;see wikipedia&lt;/a&gt; for more information&lt;/li&gt;
&lt;li&gt;With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)&lt;/li&gt;
&lt;li&gt;We might have Shawn on the show to talk about it, but he's also giving a presentation at BSDCan about his work with ASLR
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" target="_blank" rel="nofollow noopener"&gt;Old-style pkg_ tools retired&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;At last the old pkg_add tools are being retired in FreeBSD&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;pkgng&lt;/a&gt; is a huge improvement, and now portmgr@ thinks it's time to cut the cord on the legacy toolset&lt;/li&gt;
&lt;li&gt;Ports aren't going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go&lt;/li&gt;
&lt;li&gt;All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Luke Marsden - &lt;a href="mailto:luke@hybridcluster.com" target="_blank" rel="nofollow noopener"&gt;luke@hybridcluster.com&lt;/a&gt; / &lt;a href="https://twitter.com/lmarsden" target="_blank" rel="nofollow noopener"&gt;@lmarsden&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD at HybridCluster&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/chroot-sftp" target="_blank" rel="nofollow noopener"&gt;Filesharing with chrooted SFTP&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://pellaeon.github.io/bsd-cloudinit/" target="_blank" rel="nofollow noopener"&gt;FreeBSD on OpenStack&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/OpenStack" target="_blank" rel="nofollow noopener"&gt;OpenStack&lt;/a&gt; is a cloud computing project&lt;/li&gt;
&lt;li&gt;It consists of "a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API."&lt;/li&gt;
&lt;li&gt;Until now, there wasn't a good way to run a full BSD instance on OpenStack&lt;/li&gt;
&lt;li&gt;With a project in the vein of &lt;a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" target="_blank" rel="nofollow noopener"&gt;Colin Percival&lt;/a&gt;'s AWS startup scripts, now that's no longer the case! 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://fosdem.org/2014/schedule/track/bsd/" target="_blank" rel="nofollow noopener"&gt;FOSDEM BSD videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's FOSDEM had seven BSD presentations&lt;/li&gt;
&lt;li&gt;The videos are &lt;a href="https://video.fosdem.org/2014/" target="_blank" rel="nofollow noopener"&gt;slowly being uploaded&lt;/a&gt; for your viewing pleasure&lt;/li&gt;
&lt;li&gt;Not all of the BSD ones are up yet, but by the time you're watching this they might be!&lt;/li&gt;
&lt;li&gt;Check &lt;a href="https://video.fosdem.org/2014/AW1121/Saturday/" target="_blank" rel="nofollow noopener"&gt;this directory&lt;/a&gt; for most of 'em&lt;/li&gt;
&lt;li&gt;The BSD dev room was full, lots of interest in what's going on from the other communities
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD challenge finally returns!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Due to prodding from a certain guy of a certain podcast, the "FreeBSD Challenge" series has finally resumed&lt;/li&gt;
&lt;li&gt;Our friend from the Linux foundation picks up with &lt;a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" target="_blank" rel="nofollow noopener"&gt;day 11&lt;/a&gt; and &lt;a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" target="_blank" rel="nofollow noopener"&gt;day 12&lt;/a&gt; on his switching from Linux journey&lt;/li&gt;
&lt;li&gt;This time he outlines the upgrade process of going from 9 to 10, using freebsd-update&lt;/li&gt;
&lt;li&gt;There's also some notes about different options for upgrading ports and some extra tips
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while&lt;/li&gt;
&lt;li&gt;During their "fine tuning phase" users are encouraged to submit any and all bugs via the trac system&lt;/li&gt;
&lt;li&gt;Warden got some fixes and the package manager got some updates as well&lt;/li&gt;
&lt;li&gt;Huge size reduction in PBI format
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21nbJKYmb" target="_blank" rel="nofollow noopener"&gt;Derrick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yhziVsBP" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20PuccWbo" target="_blank" rel="nofollow noopener"&gt;Patrick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s22PL0SbUO" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20dkbjuOK" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, cluster, cloud, cloud computing, hybridcluster, jails, scaling, virtualization, zfs, big data, provisioning, webhosting, instances, web hosting, chroot, sftp, filesharing, file sharing, shell, linux, switching to bsd, linux user, smp, pkg_add, pkg, pkgng, binary packages, openstack, open stack, httperf, performance, http, vpn, nycbsdcon, nycbug, nyc, conference, convention, talks, presentation, keynote, ssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
