<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 12 Mar 2026 20:45:28 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Compiling”</title>
    <link>https://www.bsdnow.tv/tags/compiling</link>
    <pubDate>Thu, 16 Jun 2022 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>459: NetBSD Kernel benchmark</title>
  <link>https://www.bsdnow.tv/459</link>
  <guid isPermaLink="false">111c15bd-3906-4d2b-aaec-9d29bc06672a</guid>
  <pubDate>Thu, 16 Jun 2022 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/111c15bd-3906-4d2b-aaec-9d29bc06672a.mp3" length="32577552" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Evaluating FreeBSD CURRENT for Production Use, Time Machine-like Backups on OpenBSD, FreeBSD on the Graviton 3, Compiling the NetBSD kernel as a benchmark, Network Management with the OpenBSD Packet Filter Toolset from BSDCan 2022, Hardware Detection &amp; Diagnostics for New FreeBSD Users, and more</itunes:subtitle>
  <itunes:duration>54:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Evaluating FreeBSD CURRENT for Production Use, Time Machine-like Backups on OpenBSD, FreeBSD on the Graviton 3, Compiling the NetBSD kernel as a benchmark, Network Management with the OpenBSD Packet Filter Toolset from BSDCan 2022, Hardware Detection &amp;amp; Diagnostics for New FreeBSD Users, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Evaluating FreeBSD CURRENT for Production Use (https://klarasystems.com/articles/evaluating-freebsd-current-for-production-use/)
Time Machine like Backups on OpenBSD (https://xosc.org/timemachine.html)
News Roundup
FreeBSD on the Graviton 3 (https://www.daemonology.net/blog/2022-05-23-FreeBSD-Graviton-3.html)
Compiling the NetBSD kernel as a benchmark (https://blog.anotherhomepage.org/post/2022/05/25/Compiling-the-NetBSD-kernel-as-a-benchmark/)
Network Management with the OpenBSD Packet Filter Toolset from BSDCan 2022 (http://undeadly.org/cgi?action=article;sid=20220607112236)
Hardware Detection &amp;amp; Diagnostics for New FreeBSD Users &amp;amp; PCs (https://forums.FreeBSD.org/threads/hardware-detection-diagnostics-for-new-freebsd-users-pcs.84596/)
Beastie Bits
• [NetBSD - Announcing Google Summer of Code 2022 projects](https://blog.netbsd.org/tnf/entry/announcing_google_summer_of_code3)
• [Welcome FreeBSD Google Summer of Code Participants](https://freebsdfoundation.org/blog/welcome-freebsd-google-summer-of-code-participants/)
• [Network from Scratch](https://www.networksfromscratch.com)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, filesystem, interview, ports, packages, jails, production use, time machine, backups, backup, graviton 3, compiling, compiler benchmark, kernel compile, benchmark, network management, pf, packet filter, hardware detection, diagnostics</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Evaluating FreeBSD CURRENT for Production Use, Time Machine-like Backups on OpenBSD, FreeBSD on the Graviton 3, Compiling the NetBSD kernel as a benchmark, Network Management with the OpenBSD Packet Filter Toolset from BSDCan 2022, Hardware Detection &amp; Diagnostics for New FreeBSD Users, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/evaluating-freebsd-current-for-production-use/" rel="nofollow">Evaluating FreeBSD CURRENT for Production Use</a></h3>

<hr>

<h3><a href="https://xosc.org/timemachine.html" rel="nofollow">Time Machine like Backups on OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.daemonology.net/blog/2022-05-23-FreeBSD-Graviton-3.html" rel="nofollow">FreeBSD on the Graviton 3</a></h3>

<hr>

<h3><a href="https://blog.anotherhomepage.org/post/2022/05/25/Compiling-the-NetBSD-kernel-as-a-benchmark/" rel="nofollow">Compiling the NetBSD kernel as a benchmark</a></h3>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20220607112236" rel="nofollow">Network Management with the OpenBSD Packet Filter Toolset from BSDCan 2022</a></h3>

<hr>

<h3><a href="https://forums.FreeBSD.org/threads/hardware-detection-diagnostics-for-new-freebsd-users-pcs.84596/" rel="nofollow">Hardware Detection &amp; Diagnostics for New FreeBSD Users &amp; PCs</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [NetBSD - Announcing Google Summer of Code 2022 projects](https://blog.netbsd.org/tnf/entry/announcing_google_summer_of_code3)
• [Welcome FreeBSD Google Summer of Code Participants](https://freebsdfoundation.org/blog/welcome-freebsd-google-summer-of-code-participants/)
• [Network from Scratch](https://www.networksfromscratch.com)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Evaluating FreeBSD CURRENT for Production Use, Time Machine-like Backups on OpenBSD, FreeBSD on the Graviton 3, Compiling the NetBSD kernel as a benchmark, Network Management with the OpenBSD Packet Filter Toolset from BSDCan 2022, Hardware Detection &amp; Diagnostics for New FreeBSD Users, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/evaluating-freebsd-current-for-production-use/" rel="nofollow">Evaluating FreeBSD CURRENT for Production Use</a></h3>

<hr>

<h3><a href="https://xosc.org/timemachine.html" rel="nofollow">Time Machine like Backups on OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.daemonology.net/blog/2022-05-23-FreeBSD-Graviton-3.html" rel="nofollow">FreeBSD on the Graviton 3</a></h3>

<hr>

<h3><a href="https://blog.anotherhomepage.org/post/2022/05/25/Compiling-the-NetBSD-kernel-as-a-benchmark/" rel="nofollow">Compiling the NetBSD kernel as a benchmark</a></h3>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20220607112236" rel="nofollow">Network Management with the OpenBSD Packet Filter Toolset from BSDCan 2022</a></h3>

<hr>

<h3><a href="https://forums.FreeBSD.org/threads/hardware-detection-diagnostics-for-new-freebsd-users-pcs.84596/" rel="nofollow">Hardware Detection &amp; Diagnostics for New FreeBSD Users &amp; PCs</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [NetBSD - Announcing Google Summer of Code 2022 projects](https://blog.netbsd.org/tnf/entry/announcing_google_summer_of_code3)
• [Welcome FreeBSD Google Summer of Code Participants](https://freebsdfoundation.org/blog/welcome-freebsd-google-summer-of-code-participants/)
• [Network from Scratch](https://www.networksfromscratch.com)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>325: Cracking Rainbows</title>
  <link>https://www.bsdnow.tv/325</link>
  <guid isPermaLink="false">a971b40e-d33a-44ac-9cf8-dfaf7e4aaff7</guid>
  <pubDate>Thu, 21 Nov 2019 07:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a971b40e-d33a-44ac-9cf8-dfaf7e4aaff7.mp3" length="41526775" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD 12.1 is here, A history of Unix before Berkeley, FreeBSD development setup, HardenedBSD 2019 Status Report, DNSSEC, compiling RainbowCrack on OpenBSD, and more.</itunes:subtitle>
  <itunes:duration>57:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD 12.1 is here, A history of Unix before Berkeley, FreeBSD development setup, HardenedBSD 2019 Status Report, DNSSEC, compiling RainbowCrack on OpenBSD, and more.
Headlines
FreeBSD 12.1 (https://www.freebsd.org/releases/12.1R/announce.html)
Some of the highlights:
BearSSL has been imported to the base system.
The clang, llvm, lld, lldb, compiler-rt utilities and libc++ have been updated to version 8.0.1.
OpenSSL has been updated to version 1.1.1d.
Several userland utility updates.
For a complete list of new features and known problems, please see the online release notes and errata list, available at: https://www.FreeBSD.org/releases/12.1R/relnotes.html
A History of UNIX before Berkeley: UNIX Evolution: 1975-1984. (http://www.darwinsys.com/history/hist.html)
Nobody needs to be told that UNIX is popular today. In this article we will show you a little of where it was yesterday and over the past decade. And, without meaning in the least to minimise the incredible contributions of Ken Thompson and Dennis Ritchie, we will bring to light many of the others who worked on early versions, and try to show where some of the key ideas came from, and how they got into the UNIX of today.
Our title says we are talking about UNIX evolution. Evolution means different things to different people. We use the term loosely, to describe the change over time among the many different UNIX variants in use both inside and outside Bell Labs. Ideas, code, and useful programs seem to have made their way back and forth - like mutant genes - among all the many UNIXes living in the phone company over the decade in question.
Part One looks at some of the major components of the current UNIX system - the text formatting tools, the compilers and program development tools, and so on. Most of the work described in Part One took place at Research'', a part of Bell Laboratories (now AT&amp;amp;T Bell Laboratories, then as nowthe Labs''), and the ancestral home of UNIX. In planned (but not written) later parts, we would have looked at some of the myriad versions of UNIX - there are far more than one might suspect. This includes a look at Columbus and USG and at Berkeley Unix. You'll begin to get a glimpse inside the history of the major streams of development of the system during that time.
News Roundup
My FreeBSD Development Setup (https://adventurist.me/posts/00296)
I do my FreeBSD development using git, tmux, vim and cscope.
I keep a FreeBSD fork on my github, I have forked https://github.com/freebsd/freebsd to https://github.com/adventureloop/freebsd
OPNsense 19.7.6 released (https://opnsense.org/opnsense-19-7-6-released/)
As we are experiencing the Suricata community first hand in Amsterdam we thought to release this version a bit earlier than planned. Included is the latest Suricata 5.0.0 release in the development version. That means later this November we will releasing version 5 to the production version as we finish up tweaking the integration and maybe pick up 5.0.1 as it becomes available.
LDAP TLS connectivity is now integrated into the system trust store, which ensures that all required root and intermediate certificates will be seen by the connection setup when they have been added to the authorities section. The same is true for trusting self-signed certificates. On top of this, IPsec now supports public key authentication as contributed by Pascal Mathis.
HardenedBSD November 2019 Status Report. (https://hardenedbsd.org/article/shawn-webb/2019-11-09/hardenedbsd-status-report)
We at HardenedBSD have a lot of news to share. On 05 Nov 2019, Oliver Pinter resigned amicably from the project. All of us at HardenedBSD owe Oliver our gratitude and appreciation. This humble project, named by Oliver, was born out of his thesis work and the collaboration with Shawn Webb. Oliver created the HardenedBSD repo on GitHub in April 2013. The HardenedBSD Foundation was formed five years later to carry on this great work. 
DNSSEC enabled in default unbound(8) configuration. (https://undeadly.org/cgi?action=article;sid=20191110123908)
DNSSEC validation has been enabled in the default unbound.conf(5) in -current. The relevant commits were from Job Snijders (job@)
How to Install Shopware with NGINX and Let's Encrypt on FreeBSD 12 (https://www.howtoforge.com/how-to-install-shopware-with-nginx-and-lets-encrypt-on-freebsd-12/)
Shopware is the next generation of open source e-commerce software. Based on bleeding edge technologies like Symfony 3, Doctrine2 and Zend Framework Shopware comes as the perfect platform for your next e-commerce project. This tutorial will walk you through the Shopware Community Edition (CE) installation on FreeBSD 12 system by using NGINX as a web server.
Requirements
Make sure your system meets the following minimum requirements:
 + Linux-based operating system with NGINX or Apache 2.x (with mod_rewrite) web server installed. 
 + PHP 5.6.4 or higher with ctype, gd, curl, dom, hash, iconv, zip, json, mbstring, openssl, session, simplexml, xml, zlib, fileinfo, and pdo/mysql extensions. PHP 7.1 or above is strongly recommended.
 + MySQL 5.5.0 or higher.
 + Possibility to set up cron jobs.
 + Minimum 4 GB available hard disk space.
 + IonCube Loader version 5.0.0 or higher (optional).
How to Compile RainbowCrack on OpenBSD (https://cromwell-intl.com/open-source/compiling-rainbowcrack-on-openbsd.html)
Project RainbowCrack was originally Zhu Shuanglei's implementation, it's not clear to me if the project is still just his or if it's even been maintained for a while. His page seems to have been last updated in August 2007.
The Project RainbowCrack web page now has just binaries for Windows XP and Linux, both 32-bit and 64-bit versions.
Earlier versions were available as source code. The version 1.2 source code does not compile on OpenBSD, and in my experience it doesn't compile on Linux, either. It seems to date from 2004 at the earliest, and I think it makes some version-2.4 assumptions about Linux kernel headers.
You might also look at ophcrack, a more modern tool, although it seems to be focused on cracking Windows XP/Vista/7/8/10 password hashes
Feedback/Questions
Reese - Amature radio info (http://dpaste.com/2RDG9K4#wrap)
Chris - VPN (http://dpaste.com/2K4T2FQ#wrap)
Malcolm - NAT (http://dpaste.com/138NEMA)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, 12.1, Unix, history, berkeley, OPNsense, development, setup, dev, devel, status report, dnssec, unbound, shopware, let’s encrypt, nginx, rainbowcrack, compiling</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 12.1 is here, A history of Unix before Berkeley, FreeBSD development setup, HardenedBSD 2019 Status Report, DNSSEC, compiling RainbowCrack on OpenBSD, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/12.1R/announce.html" rel="nofollow">FreeBSD 12.1</a></h3>

<ul>
<li><p>Some of the highlights:</p>

<ul>
<li>BearSSL has been imported to the base system.</li>
<li>The clang, llvm, lld, lldb, compiler-rt utilities and libc++ have been updated to version 8.0.1.</li>
<li>OpenSSL has been updated to version 1.1.1d.</li>
<li>Several userland utility updates.</li>
</ul></li>
<li><p>For a complete list of new features and known problems, please see the online release notes and errata list, available at: <a href="https://www.FreeBSD.org/releases/12.1R/relnotes.html" rel="nofollow">https://www.FreeBSD.org/releases/12.1R/relnotes.html</a></p></li>
</ul>

<hr>

<h3><a href="http://www.darwinsys.com/history/hist.html" rel="nofollow">A History of UNIX before Berkeley: UNIX Evolution: 1975-1984.</a></h3>

<blockquote>
<p>Nobody needs to be told that UNIX is popular today. In this article we will show you a little of where it was yesterday and over the past decade. And, without meaning in the least to minimise the incredible contributions of Ken Thompson and Dennis Ritchie, we will bring to light many of the others who worked on early versions, and try to show where some of the key ideas came from, and how they got into the UNIX of today.</p>

<p>Our title says we are talking about UNIX evolution. Evolution means different things to different people. We use the term loosely, to describe the change over time among the many different UNIX variants in use both inside and outside Bell Labs. Ideas, code, and useful programs seem to have made their way back and forth - like mutant genes - among all the many UNIXes living in the phone company over the decade in question.</p>

<p>Part One looks at some of the major components of the current UNIX system - the text formatting tools, the compilers and program development tools, and so on. Most of the work described in Part One took place at <code>Research&#39;&#39;, a part of Bell Laboratories (now AT&amp;T Bell Laboratories, then as now</code>the Labs&#39;&#39;), and the ancestral home of UNIX. In planned (but not written) later parts, we would have looked at some of the myriad versions of UNIX - there are far more than one might suspect. This includes a look at Columbus and USG and at Berkeley Unix. You&#39;ll begin to get a glimpse inside the history of the major streams of development of the system during that time.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://adventurist.me/posts/00296" rel="nofollow">My FreeBSD Development Setup</a></h3>

<blockquote>
<p>I do my FreeBSD development using git, tmux, vim and cscope.</p>

<p>I keep a FreeBSD fork on my github, I have forked <a href="https://github.com/freebsd/freebsd" rel="nofollow">https://github.com/freebsd/freebsd</a> to <a href="https://github.com/adventureloop/freebsd" rel="nofollow">https://github.com/adventureloop/freebsd</a></p>
</blockquote>

<hr>

<h3><a href="https://opnsense.org/opnsense-19-7-6-released/" rel="nofollow">OPNsense 19.7.6 released</a></h3>

<blockquote>
<p>As we are experiencing the Suricata community first hand in Amsterdam we thought to release this version a bit earlier than planned. Included is the latest Suricata 5.0.0 release in the development version. That means later this November we will releasing version 5 to the production version as we finish up tweaking the integration and maybe pick up 5.0.1 as it becomes available.</p>

<p>LDAP TLS connectivity is now integrated into the system trust store, which ensures that all required root and intermediate certificates will be seen by the connection setup when they have been added to the authorities section. The same is true for trusting self-signed certificates. On top of this, IPsec now supports public key authentication as contributed by Pascal Mathis.</p>
</blockquote>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2019-11-09/hardenedbsd-status-report" rel="nofollow">HardenedBSD November 2019 Status Report.</a></h3>

<blockquote>
<p>We at HardenedBSD have a lot of news to share. On 05 Nov 2019, Oliver Pinter resigned amicably from the project. All of us at HardenedBSD owe Oliver our gratitude and appreciation. This humble project, named by Oliver, was born out of his thesis work and the collaboration with Shawn Webb. Oliver created the HardenedBSD repo on GitHub in April 2013. The HardenedBSD Foundation was formed five years later to carry on this great work. </p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20191110123908" rel="nofollow">DNSSEC enabled in default unbound(8) configuration.</a></h3>

<blockquote>
<p>DNSSEC validation has been enabled in the default unbound.conf(5) in -current. The relevant commits were from Job Snijders (job@)</p>
</blockquote>

<hr>

<h3><a href="https://www.howtoforge.com/how-to-install-shopware-with-nginx-and-lets-encrypt-on-freebsd-12/" rel="nofollow">How to Install Shopware with NGINX and Let&#39;s Encrypt on FreeBSD 12</a></h3>

<blockquote>
<p>Shopware is the next generation of open source e-commerce software. Based on bleeding edge technologies like Symfony 3, Doctrine2 and Zend Framework Shopware comes as the perfect platform for your next e-commerce project. This tutorial will walk you through the Shopware Community Edition (CE) installation on FreeBSD 12 system by using NGINX as a web server.</p>
</blockquote>

<ul>
<li>Requirements</li>
</ul>

<blockquote>
<p>Make sure your system meets the following minimum requirements:</p>

<ul>
<li>Linux-based operating system with NGINX or Apache 2.x (with mod_rewrite) web server installed. </li>
<li>PHP 5.6.4 or higher with ctype, gd, curl, dom, hash, iconv, zip, json, mbstring, openssl, session, simplexml, xml, zlib, fileinfo, and pdo/mysql extensions. PHP 7.1 or above is strongly recommended.</li>
<li>MySQL 5.5.0 or higher.</li>
<li>Possibility to set up cron jobs.</li>
<li>Minimum 4 GB available hard disk space.</li>
<li>IonCube Loader version 5.0.0 or higher (optional).</li>
</ul>
</blockquote>

<hr>

<h3><a href="https://cromwell-intl.com/open-source/compiling-rainbowcrack-on-openbsd.html" rel="nofollow">How to Compile RainbowCrack on OpenBSD</a></h3>

<blockquote>
<p>Project RainbowCrack was originally Zhu Shuanglei&#39;s implementation, it&#39;s not clear to me if the project is still just his or if it&#39;s even been maintained for a while. His page seems to have been last updated in August 2007.</p>

<p>The Project RainbowCrack web page now has just binaries for Windows XP and Linux, both 32-bit and 64-bit versions.</p>

<p>Earlier versions were available as source code. The version 1.2 source code does not compile on OpenBSD, and in my experience it doesn&#39;t compile on Linux, either. It seems to date from 2004 at the earliest, and I think it makes some version-2.4 assumptions about Linux kernel headers.</p>
</blockquote>

<ul>
<li>You might also look at ophcrack, a more modern tool, although it seems to be focused on cracking Windows XP/Vista/7/8/10 password hashes</li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Reese - <a href="http://dpaste.com/2RDG9K4#wrap" rel="nofollow">Amature radio info</a></li>
<li>Chris - <a href="http://dpaste.com/2K4T2FQ#wrap" rel="nofollow">VPN</a></li>
<li>Malcolm - <a href="http://dpaste.com/138NEMA" rel="nofollow">NAT</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0325.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 12.1 is here, A history of Unix before Berkeley, FreeBSD development setup, HardenedBSD 2019 Status Report, DNSSEC, compiling RainbowCrack on OpenBSD, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/12.1R/announce.html" rel="nofollow">FreeBSD 12.1</a></h3>

<ul>
<li><p>Some of the highlights:</p>

<ul>
<li>BearSSL has been imported to the base system.</li>
<li>The clang, llvm, lld, lldb, compiler-rt utilities and libc++ have been updated to version 8.0.1.</li>
<li>OpenSSL has been updated to version 1.1.1d.</li>
<li>Several userland utility updates.</li>
</ul></li>
<li><p>For a complete list of new features and known problems, please see the online release notes and errata list, available at: <a href="https://www.FreeBSD.org/releases/12.1R/relnotes.html" rel="nofollow">https://www.FreeBSD.org/releases/12.1R/relnotes.html</a></p></li>
</ul>

<hr>

<h3><a href="http://www.darwinsys.com/history/hist.html" rel="nofollow">A History of UNIX before Berkeley: UNIX Evolution: 1975-1984.</a></h3>

<blockquote>
<p>Nobody needs to be told that UNIX is popular today. In this article we will show you a little of where it was yesterday and over the past decade. And, without meaning in the least to minimise the incredible contributions of Ken Thompson and Dennis Ritchie, we will bring to light many of the others who worked on early versions, and try to show where some of the key ideas came from, and how they got into the UNIX of today.</p>

<p>Our title says we are talking about UNIX evolution. Evolution means different things to different people. We use the term loosely, to describe the change over time among the many different UNIX variants in use both inside and outside Bell Labs. Ideas, code, and useful programs seem to have made their way back and forth - like mutant genes - among all the many UNIXes living in the phone company over the decade in question.</p>

<p>Part One looks at some of the major components of the current UNIX system - the text formatting tools, the compilers and program development tools, and so on. Most of the work described in Part One took place at <code>Research&#39;&#39;, a part of Bell Laboratories (now AT&amp;T Bell Laboratories, then as now</code>the Labs&#39;&#39;), and the ancestral home of UNIX. In planned (but not written) later parts, we would have looked at some of the myriad versions of UNIX - there are far more than one might suspect. This includes a look at Columbus and USG and at Berkeley Unix. You&#39;ll begin to get a glimpse inside the history of the major streams of development of the system during that time.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://adventurist.me/posts/00296" rel="nofollow">My FreeBSD Development Setup</a></h3>

<blockquote>
<p>I do my FreeBSD development using git, tmux, vim and cscope.</p>

<p>I keep a FreeBSD fork on my github, I have forked <a href="https://github.com/freebsd/freebsd" rel="nofollow">https://github.com/freebsd/freebsd</a> to <a href="https://github.com/adventureloop/freebsd" rel="nofollow">https://github.com/adventureloop/freebsd</a></p>
</blockquote>

<hr>

<h3><a href="https://opnsense.org/opnsense-19-7-6-released/" rel="nofollow">OPNsense 19.7.6 released</a></h3>

<blockquote>
<p>As we are experiencing the Suricata community first hand in Amsterdam we thought to release this version a bit earlier than planned. Included is the latest Suricata 5.0.0 release in the development version. That means later this November we will releasing version 5 to the production version as we finish up tweaking the integration and maybe pick up 5.0.1 as it becomes available.</p>

<p>LDAP TLS connectivity is now integrated into the system trust store, which ensures that all required root and intermediate certificates will be seen by the connection setup when they have been added to the authorities section. The same is true for trusting self-signed certificates. On top of this, IPsec now supports public key authentication as contributed by Pascal Mathis.</p>
</blockquote>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2019-11-09/hardenedbsd-status-report" rel="nofollow">HardenedBSD November 2019 Status Report.</a></h3>

<blockquote>
<p>We at HardenedBSD have a lot of news to share. On 05 Nov 2019, Oliver Pinter resigned amicably from the project. All of us at HardenedBSD owe Oliver our gratitude and appreciation. This humble project, named by Oliver, was born out of his thesis work and the collaboration with Shawn Webb. Oliver created the HardenedBSD repo on GitHub in April 2013. The HardenedBSD Foundation was formed five years later to carry on this great work. </p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20191110123908" rel="nofollow">DNSSEC enabled in default unbound(8) configuration.</a></h3>

<blockquote>
<p>DNSSEC validation has been enabled in the default unbound.conf(5) in -current. The relevant commits were from Job Snijders (job@)</p>
</blockquote>

<hr>

<h3><a href="https://www.howtoforge.com/how-to-install-shopware-with-nginx-and-lets-encrypt-on-freebsd-12/" rel="nofollow">How to Install Shopware with NGINX and Let&#39;s Encrypt on FreeBSD 12</a></h3>

<blockquote>
<p>Shopware is the next generation of open source e-commerce software. Based on bleeding edge technologies like Symfony 3, Doctrine2 and Zend Framework Shopware comes as the perfect platform for your next e-commerce project. This tutorial will walk you through the Shopware Community Edition (CE) installation on FreeBSD 12 system by using NGINX as a web server.</p>
</blockquote>

<ul>
<li>Requirements</li>
</ul>

<blockquote>
<p>Make sure your system meets the following minimum requirements:</p>

<ul>
<li>Linux-based operating system with NGINX or Apache 2.x (with mod_rewrite) web server installed. </li>
<li>PHP 5.6.4 or higher with ctype, gd, curl, dom, hash, iconv, zip, json, mbstring, openssl, session, simplexml, xml, zlib, fileinfo, and pdo/mysql extensions. PHP 7.1 or above is strongly recommended.</li>
<li>MySQL 5.5.0 or higher.</li>
<li>Possibility to set up cron jobs.</li>
<li>Minimum 4 GB available hard disk space.</li>
<li>IonCube Loader version 5.0.0 or higher (optional).</li>
</ul>
</blockquote>

<hr>

<h3><a href="https://cromwell-intl.com/open-source/compiling-rainbowcrack-on-openbsd.html" rel="nofollow">How to Compile RainbowCrack on OpenBSD</a></h3>

<blockquote>
<p>Project RainbowCrack was originally Zhu Shuanglei&#39;s implementation, it&#39;s not clear to me if the project is still just his or if it&#39;s even been maintained for a while. His page seems to have been last updated in August 2007.</p>

<p>The Project RainbowCrack web page now has just binaries for Windows XP and Linux, both 32-bit and 64-bit versions.</p>

<p>Earlier versions were available as source code. The version 1.2 source code does not compile on OpenBSD, and in my experience it doesn&#39;t compile on Linux, either. It seems to date from 2004 at the earliest, and I think it makes some version-2.4 assumptions about Linux kernel headers.</p>
</blockquote>

<ul>
<li>You might also look at ophcrack, a more modern tool, although it seems to be focused on cracking Windows XP/Vista/7/8/10 password hashes</li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Reese - <a href="http://dpaste.com/2RDG9K4#wrap" rel="nofollow">Amature radio info</a></li>
<li>Chris - <a href="http://dpaste.com/2K4T2FQ#wrap" rel="nofollow">VPN</a></li>
<li>Malcolm - <a href="http://dpaste.com/138NEMA" rel="nofollow">NAT</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0325.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
