<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 12 Mar 2026 20:22:27 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Conference”</title>
    <link>https://www.bsdnow.tv/tags/conference</link>
    <pubDate>Thu, 23 Mar 2023 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>499: Dan Langille Interview</title>
  <link>https://www.bsdnow.tv/499</link>
  <guid isPermaLink="false">b57b3e71-4395-4296-98ea-9eea94bffd1a</guid>
  <pubDate>Thu, 23 Mar 2023 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b57b3e71-4395-4296-98ea-9eea94bffd1a.mp3" length="38735616" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We’re interviewing Dan Langille about his new server project. He’ll talk to us about the things he’s building, some of which are a bit out of the ordinary. We’re also talking about BSDCan 2023 and what to expect after returning to an in-presence conference format. Enjoy!</itunes:subtitle>
  <itunes:duration>40:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We’re interviewing Dan Langille about his new server project. He’ll talk to us about the things he’s building, some of which are a bit out of the ordinary. We’re also talking about BSDCan 2023 and what to expect after returning to an in-presence conference format. Enjoy!
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Interview - Dan Langille - dan@langille.org (mailto:dan@langille.org) / @twitter (https://twitter.com/dlangille)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Special Guest: Dan Langille.
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, cli, unix, os, berkeley, software, distribution, development, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, bsdcan, conference, server, r730, setup</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re interviewing Dan Langille about his new server project. He’ll talk to us about the things he’s building, some of which are a bit out of the ordinary. We’re also talking about BSDCan 2023 and what to expect after returning to an in-presence conference format. Enjoy!</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Interview - Dan Langille - <a href="mailto:dan@langille.org" rel="nofollow">dan@langille.org</a> / <a href="https://twitter.com/dlangille" rel="nofollow">@twitter</a></h2>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul><p>Special Guest: Dan Langille.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re interviewing Dan Langille about his new server project. He’ll talk to us about the things he’s building, some of which are a bit out of the ordinary. We’re also talking about BSDCan 2023 and what to expect after returning to an in-presence conference format. Enjoy!</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Interview - Dan Langille - <a href="mailto:dan@langille.org" rel="nofollow">dan@langille.org</a> / <a href="https://twitter.com/dlangille" rel="nofollow">@twitter</a></h2>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul><p>Special Guest: Dan Langille.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>479: OpenBSD Docker Host</title>
  <link>https://www.bsdnow.tv/479</link>
  <guid isPermaLink="false">1f8daae0-ec33-4016-b70d-b6a31783eeea</guid>
  <pubDate>Thu, 03 Nov 2022 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1f8daae0-ec33-4016-b70d-b6a31783eeea.mp3" length="40382208" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>EuroBSDcon 2022 as first BSD conference, Red Hat’s OpenShift vs FreeBSD Jails, Running a Docker Host under OpenBSD using vmd(8), history of sending signals to Unix process groups, Toolchains adventures - Q3 2022, and more</itunes:subtitle>
  <itunes:duration>42:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>EuroBSDcon 2022 as first BSD conference, Red Hat’s OpenShift vs FreeBSD Jails, Running a Docker Host under OpenBSD using vmd(8), history of sending signals to Unix process groups, Toolchains adventures - Q3 2022, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
EuroBSDCon 2022, my first BSD conference (and how they are different) (https://eerielinux.wordpress.com/2022/09/25/eurobsdcon-2022-my-first-bsd-conference-and-how-they-are-different/)
Red Hat’s OpenShift vs FreeBSD Jails (https://klarasystems.com/articles/red-hats-openshift-vs-freebsd-jails/)
News Roundup
The history of sending signals to Unix process groups (https://utcc.utoronto.ca/~cks/space/blog/unix/ProcessGroupsAndSignals)
Running a Docker Host under OpenBSD using vmd(8) (https://www.tumfatig.net/2022/running-docker-host-openbsd-vmd/)
Toolchains adventures - Q3 2022 (https://www.cambus.net/toolchains-adventures-q3-2022/)
Beastie Bits
-current has moved to 7.2 (https://undeadly.org/cgi?action=article;sid=20220912055003)
Several /sbin daemons are now dynamically-linked (http://undeadly.org/cgi?action=article;sid=20220830052924)
Announcing the pkgsrc 2022Q3 branch (https://mail-index.netbsd.org/netbsd-announce/2022/09/29/msg000341.html)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Hans - datacenters and dust (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/476/feedback/Hans%20-%20datacenters%20and%20dust.md)
Tim - Boot issue (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/476/feedback/Tim%20-%20Boot%20issue.md)
aaron- dwm tiling (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/476/feedback/aaron-%20dwm%20tiling%20.md)
***
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, filesystem, ports, packages, jails, interview, eurobsdcon, conference, openshift, docker, vmd, history, signal, signals, processes, process groups, toolchain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>EuroBSDcon 2022 as first BSD conference, Red Hat’s OpenShift vs FreeBSD Jails, Running a Docker Host under OpenBSD using vmd(8), history of sending signals to Unix process groups, Toolchains adventures - Q3 2022, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://eerielinux.wordpress.com/2022/09/25/eurobsdcon-2022-my-first-bsd-conference-and-how-they-are-different/" rel="nofollow">EuroBSDCon 2022, my first BSD conference (and how they are different)</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/red-hats-openshift-vs-freebsd-jails/" rel="nofollow">Red Hat’s OpenShift vs FreeBSD Jails</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ProcessGroupsAndSignals" rel="nofollow">The history of sending signals to Unix process groups</a></h3>

<hr>

<h3><a href="https://www.tumfatig.net/2022/running-docker-host-openbsd-vmd/" rel="nofollow">Running a Docker Host under OpenBSD using vmd(8)</a></h3>

<hr>

<h3><a href="https://www.cambus.net/toolchains-adventures-q3-2022/" rel="nofollow">Toolchains adventures - Q3 2022</a></h3>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://undeadly.org/cgi?action=article;sid=20220912055003" rel="nofollow">-current has moved to 7.2</a><br>
<a href="http://undeadly.org/cgi?action=article;sid=20220830052924" rel="nofollow">Several /sbin daemons are now dynamically-linked</a><br>
<a href="https://mail-index.netbsd.org/netbsd-announce/2022/09/29/msg000341.html" rel="nofollow">Announcing the pkgsrc 2022Q3 branch</a></p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/476/feedback/Hans%20-%20datacenters%20and%20dust.md" rel="nofollow">Hans - datacenters and dust</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/476/feedback/Tim%20-%20Boot%20issue.md" rel="nofollow">Tim - Boot issue</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/476/feedback/aaron-%20dwm%20tiling%20.md" rel="nofollow">aaron- dwm tiling</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>EuroBSDcon 2022 as first BSD conference, Red Hat’s OpenShift vs FreeBSD Jails, Running a Docker Host under OpenBSD using vmd(8), history of sending signals to Unix process groups, Toolchains adventures - Q3 2022, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://eerielinux.wordpress.com/2022/09/25/eurobsdcon-2022-my-first-bsd-conference-and-how-they-are-different/" rel="nofollow">EuroBSDCon 2022, my first BSD conference (and how they are different)</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/red-hats-openshift-vs-freebsd-jails/" rel="nofollow">Red Hat’s OpenShift vs FreeBSD Jails</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ProcessGroupsAndSignals" rel="nofollow">The history of sending signals to Unix process groups</a></h3>

<hr>

<h3><a href="https://www.tumfatig.net/2022/running-docker-host-openbsd-vmd/" rel="nofollow">Running a Docker Host under OpenBSD using vmd(8)</a></h3>

<hr>

<h3><a href="https://www.cambus.net/toolchains-adventures-q3-2022/" rel="nofollow">Toolchains adventures - Q3 2022</a></h3>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://undeadly.org/cgi?action=article;sid=20220912055003" rel="nofollow">-current has moved to 7.2</a><br>
<a href="http://undeadly.org/cgi?action=article;sid=20220830052924" rel="nofollow">Several /sbin daemons are now dynamically-linked</a><br>
<a href="https://mail-index.netbsd.org/netbsd-announce/2022/09/29/msg000341.html" rel="nofollow">Announcing the pkgsrc 2022Q3 branch</a></p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/476/feedback/Hans%20-%20datacenters%20and%20dust.md" rel="nofollow">Hans - datacenters and dust</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/476/feedback/Tim%20-%20Boot%20issue.md" rel="nofollow">Tim - Boot issue</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/476/feedback/aaron-%20dwm%20tiling%20.md" rel="nofollow">aaron- dwm tiling</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>474: EuroBSDcon 2022</title>
  <link>https://www.bsdnow.tv/474</link>
  <guid isPermaLink="false">7b0f6fc2-b232-4eb6-87e8-d945c7a02f25</guid>
  <pubDate>Thu, 29 Sep 2022 03:15:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/7b0f6fc2-b232-4eb6-87e8-d945c7a02f25.mp3" length="66559680" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Deploying FreeBSD on Oracle Cloud, A Tale of 300,000 Imaginary Friends, EuroBSDcon 2022 recap, OpenBSD Mastery: Filesystems” Status Report, OpenBGPD 7.6 Released, immutable userland mappings, Portable OpenSSH commits now SSH-signed, and more.</itunes:subtitle>
  <itunes:duration>46:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Deploying FreeBSD on Oracle Cloud, A Tale of 300,000 Imaginary Friends, EuroBSDcon 2022 recap, OpenBSD Mastery: Filesystems” Status Report, OpenBGPD 7.6 Released, immutable userland mappings, Portable OpenSSH commits now SSH-signed, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Deploying FreeBSD on Oracle Cloud (https://klarasystems.com/articles/deploying-freebsd-on-oracle-cloud/)
The Things Spammers Believe - A Tale of 300,000 Imaginary Friends (https://bsdly.blogspot.com/2022/09/the-things-spammers-believe-tale-of.html)
EuroBSDcon 2022 (https://peter.czanik.hu/posts/eurobsdcon2022/)
News Roundup
“OpenBSD Mastery: Filesystems” Status Report (https://mwl.io/archives/22031)
OpenBGPD 7.6 Released (https://undeadly.org/cgi?action=article;sid=20220916051806)
OpenBSD may soon gain further memory protections: immutable userland mappings (http://undeadly.org/cgi?action=article;sid=20220902100648)
Portable OpenSSH commits now SSH-signed (https://undeadly.org/cgi?action=article;sid=20220902045137)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, filesystem, interview, ports, packages, jails, oracle cloud, deployment, deploying, spam, antispam, spammer, tale, friends, eurobsdcon, conference, book, openbsd mastery, openbgpd, immutable userland mappings, openssh, portable, ssh-signed commits</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Deploying FreeBSD on Oracle Cloud, A Tale of 300,000 Imaginary Friends, EuroBSDcon 2022 recap, OpenBSD Mastery: Filesystems” Status Report, OpenBGPD 7.6 Released, immutable userland mappings, Portable OpenSSH commits now SSH-signed, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/deploying-freebsd-on-oracle-cloud/" rel="nofollow">Deploying FreeBSD on Oracle Cloud</a></h3>

<hr>

<h3><a href="https://bsdly.blogspot.com/2022/09/the-things-spammers-believe-tale-of.html" rel="nofollow">The Things Spammers Believe - A Tale of 300,000 Imaginary Friends</a></h3>

<hr>

<h3><a href="https://peter.czanik.hu/posts/eurobsdcon2022/" rel="nofollow">EuroBSDcon 2022</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mwl.io/archives/22031" rel="nofollow">“OpenBSD Mastery: Filesystems” Status Report</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20220916051806" rel="nofollow">OpenBGPD 7.6 Released</a></h3>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20220902100648" rel="nofollow">OpenBSD may soon gain further memory protections: immutable userland mappings</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20220902045137" rel="nofollow">Portable OpenSSH commits now SSH-signed</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Deploying FreeBSD on Oracle Cloud, A Tale of 300,000 Imaginary Friends, EuroBSDcon 2022 recap, OpenBSD Mastery: Filesystems” Status Report, OpenBGPD 7.6 Released, immutable userland mappings, Portable OpenSSH commits now SSH-signed, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/deploying-freebsd-on-oracle-cloud/" rel="nofollow">Deploying FreeBSD on Oracle Cloud</a></h3>

<hr>

<h3><a href="https://bsdly.blogspot.com/2022/09/the-things-spammers-believe-tale-of.html" rel="nofollow">The Things Spammers Believe - A Tale of 300,000 Imaginary Friends</a></h3>

<hr>

<h3><a href="https://peter.czanik.hu/posts/eurobsdcon2022/" rel="nofollow">EuroBSDcon 2022</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mwl.io/archives/22031" rel="nofollow">“OpenBSD Mastery: Filesystems” Status Report</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20220916051806" rel="nofollow">OpenBGPD 7.6 Released</a></h3>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20220902100648" rel="nofollow">OpenBSD may soon gain further memory protections: immutable userland mappings</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20220902045137" rel="nofollow">Portable OpenSSH commits now SSH-signed</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>414: Running online conferences</title>
  <link>https://www.bsdnow.tv/414</link>
  <guid isPermaLink="false">8ff1080d-5b31-430b-91ae-f2d5431bb1cb</guid>
  <pubDate>Thu, 05 Aug 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8ff1080d-5b31-430b-91ae-f2d5431bb1cb.mp3" length="41045544" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenZFS 2.1 is out, FreeBSD TCP Performance System Controls, IPFS OpenBSD, tips for running an online conference, fanless OpenBSD laptop, and more.</itunes:subtitle>
  <itunes:duration>1:03:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>OpenZFS 2.1 is out, FreeBSD TCP Performance System Controls, IPFS OpenBSD, tips for running an online conference, fanless OpenBSD laptop, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
OpenZFS 2.1 is out (https://arstechnica.com/gadgets/2021/07/a-deep-dive-into-openzfs-2-1s-new-distributed-raid-topology/)
FreeBSD TCP Performance System Controls (https://klarasystems.com/articles/freebsd-tcp-performance-system-controls/)
News Roundup
IPFS OpenBSD (https://dataswamp.org/~solene/2021-04-17-ipfs-openbsd.html)
Tips for running an online conference (https://dan.langille.org/2021/07/23/tips-for-running-an-online-conference/)
My Fanless OpenBSD Desktop (https://jcs.org/2021/07/19/desktop)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Bruce - Upgrading (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/414/feedback/Bruce%20-%20Upgrading.md)
Chris - SMB Followup (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/414/feedback/Chris%20-%20SMB%20Followup.md)
dmilith - kTLS (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/414/feedback/dmilith%20-%20kTLS.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, openzfs, tcp, performance, system controls, ipfs, conference, online, fanless</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenZFS 2.1 is out, FreeBSD TCP Performance System Controls, IPFS OpenBSD, tips for running an online conference, fanless OpenBSD laptop, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://arstechnica.com/gadgets/2021/07/a-deep-dive-into-openzfs-2-1s-new-distributed-raid-topology/" rel="nofollow">OpenZFS 2.1 is out</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/freebsd-tcp-performance-system-controls/" rel="nofollow">FreeBSD TCP Performance System Controls</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-04-17-ipfs-openbsd.html" rel="nofollow">IPFS OpenBSD</a></h3>

<hr>

<h3><a href="https://dan.langille.org/2021/07/23/tips-for-running-an-online-conference/" rel="nofollow">Tips for running an online conference</a></h3>

<hr>

<h3><a href="https://jcs.org/2021/07/19/desktop" rel="nofollow">My Fanless OpenBSD Desktop</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/414/feedback/Bruce%20-%20Upgrading.md" rel="nofollow">Bruce - Upgrading</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/414/feedback/Chris%20-%20SMB%20Followup.md" rel="nofollow">Chris - SMB Followup</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/414/feedback/dmilith%20-%20kTLS.md" rel="nofollow">dmilith - kTLS</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenZFS 2.1 is out, FreeBSD TCP Performance System Controls, IPFS OpenBSD, tips for running an online conference, fanless OpenBSD laptop, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://arstechnica.com/gadgets/2021/07/a-deep-dive-into-openzfs-2-1s-new-distributed-raid-topology/" rel="nofollow">OpenZFS 2.1 is out</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/freebsd-tcp-performance-system-controls/" rel="nofollow">FreeBSD TCP Performance System Controls</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-04-17-ipfs-openbsd.html" rel="nofollow">IPFS OpenBSD</a></h3>

<hr>

<h3><a href="https://dan.langille.org/2021/07/23/tips-for-running-an-online-conference/" rel="nofollow">Tips for running an online conference</a></h3>

<hr>

<h3><a href="https://jcs.org/2021/07/19/desktop" rel="nofollow">My Fanless OpenBSD Desktop</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/414/feedback/Bruce%20-%20Upgrading.md" rel="nofollow">Bruce - Upgrading</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/414/feedback/Chris%20-%20SMB%20Followup.md" rel="nofollow">Chris - SMB Followup</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/414/feedback/dmilith%20-%20kTLS.md" rel="nofollow">dmilith - kTLS</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>358: OpenBSD Kubernetes Clusters</title>
  <link>https://www.bsdnow.tv/358</link>
  <guid isPermaLink="false">dd2d31ad-23bc-492d-b813-caf9f661e315</guid>
  <pubDate>Thu, 09 Jul 2020 09:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dd2d31ad-23bc-492d-b813-caf9f661e315.mp3" length="43199240" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Yubikey-agent on FreeBSD, Managing Kubernetes clusters from OpenBSD, History of FreeBSD part 1, Running Jitsi-Meet in a FreeBSD Jail, Command Line Bug Hunting in FreeBSD, Game of Github, Wireguard official merged into OpenBSD, and more</itunes:subtitle>
  <itunes:duration>43:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Yubikey-agent on FreeBSD, Managing Kubernetes clusters from OpenBSD, History of FreeBSD part 1, Running Jitsi-Meet in a FreeBSD Jail, Command Line Bug Hunting in FreeBSD, Game of Github, Wireguard official merged into OpenBSD, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/)
Headlines
yubikey-agent on FreeBSD (https://kernelnomicon.org/?p=855)
Some time ago Filippo Valsorda wrote yubikey-agent, seamless SSH agent for YubiKeys. I really like YubiKeys and worked on the FreeBSD support for U2F in Chromium and pyu2f, getting yubikey-agent ported looked like an interesting project. It took some hacking to make it work but overall it wasn’t hard. Following is the roadmap on how to get it set up on FreeBSD. The actual details depend on your system (as you will see)
Manage Kubernetes clusters from OpenBSD (https://e1e0.net/manage-k8s-from-openbsd.html)
This should work with OpenBSD 6.7. I write this while the source tree is locked for release, so even if I use -current this is as close as -current gets to -release
Update 2020-06-05: we now have a port for kubectl. So, at least in -current things get a bit easier.
News Roundup
History of FreeBSD Part 1: Unix and BSD (https://klarasystems.com/articles/history-of-freebsd-unix-and-bsd/?utm_source=bsdnow)
FreeBSD, a free and open-source Unix-like operating system has been around since 1993. However, its origins are directly linked to that of BSD, and further back, those of Unix. During this History of FreeBSD series, we will talk about how Unix came to be, and how Berkeley’s Unix developed at Bell Labs.
Running Jitsi-Meet in a FreeBSD Jail (https://honeyguide.eu/posts/jitsi-freebsd/)
Due to the situation with COVID-19 that also lead to people being confined to their homes in South Africa as well, we decided to provide a (freely usable of course) Jitsi Meet instance to the community being hosted in South Africa on our FreeBSD environment.
That way, communities in South Africa and beyond have a free alternative to the commercial conferencing solutions with sometimes dubious security and privacy histories and at the same time improved user experience due to the lower latency of local hosting.
+ Grafana for Jitsi-Meet (https://honeyguide.eu/posts/jitsi-grafana/)
Command Line Bug Hunting in FreeBSD (https://adventurist.me/posts/00301)
FreeBSD uses bugzilla for tracking bugs, taking feature requests, regressions and issues in the Operating System. The web interface for bugzilla is okay, but if you want to do a lot of batch operations it is slow to deal with. We are planning to run a bugsquash on July 11th and that really needs some tooling to help any hackers that show up process the giant bug list we have.
Beastie Bits
Game of Github (https://glebbahmutov.com/game-of-github/)
+ Wireguard official merged into OpenBSD (https://marc.info/?l=openbsd-cvs&amp;amp;m=159274150512676&amp;amp;w=2)
***
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Florian : Lua for $HOME (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/358/feedback/Florian%20-%20Lua%20for%20%24HOME)
Kevin : FreeBSD Source Question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/358/feedback/Kevin%20-%20FreeBSD%20Source%20Question)
Tom : HomeLabs (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/358/feedback/Tom%20-%20HomeLabs)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, zfs, interview, yubikey, yubikey-agent, yubikey agent, agent, kubernetes, cluster, kubernetes cluster, history, jitsi, jitsi-meet, conference, video conferencing, conferencing, conferencing software, command line, bug, bug hunting, git, github, wireguard, merge</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Yubikey-agent on FreeBSD, Managing Kubernetes clusters from OpenBSD, History of FreeBSD part 1, Running Jitsi-Meet in a FreeBSD Jail, Command Line Bug Hunting in FreeBSD, Game of Github, Wireguard official merged into OpenBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://kernelnomicon.org/?p=855" rel="nofollow">yubikey-agent on FreeBSD</a></h3>

<blockquote>
<p>Some time ago Filippo Valsorda wrote yubikey-agent, seamless SSH agent for YubiKeys. I really like YubiKeys and worked on the FreeBSD support for U2F in Chromium and pyu2f, getting yubikey-agent ported looked like an interesting project. It took some hacking to make it work but overall it wasn’t hard. Following is the roadmap on how to get it set up on FreeBSD. The actual details depend on your system (as you will see)</p>

<hr>
</blockquote>

<h3><a href="https://e1e0.net/manage-k8s-from-openbsd.html" rel="nofollow">Manage Kubernetes clusters from OpenBSD</a></h3>

<blockquote>
<p>This should work with OpenBSD 6.7. I write this while the source tree is locked for release, so even if I use -current this is as close as -current gets to -release<br>
Update 2020-06-05: we now have a port for kubectl. So, at least in -current things get a bit easier.</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://klarasystems.com/articles/history-of-freebsd-unix-and-bsd/?utm_source=bsdnow" rel="nofollow">History of FreeBSD Part 1: Unix and BSD</a></h3>

<blockquote>
<p>FreeBSD, a free and open-source Unix-like operating system has been around since 1993. However, its origins are directly linked to that of BSD, and further back, those of Unix. During this History of FreeBSD series, we will talk about how Unix came to be, and how Berkeley’s Unix developed at Bell Labs.</p>

<hr>
</blockquote>

<h3><a href="https://honeyguide.eu/posts/jitsi-freebsd/" rel="nofollow">Running Jitsi-Meet in a FreeBSD Jail</a></h3>

<blockquote>
<p>Due to the situation with COVID-19 that also lead to people being confined to their homes in South Africa as well, we decided to provide a (freely usable of course) Jitsi Meet instance to the community being hosted in South Africa on our FreeBSD environment.<br>
That way, communities in South Africa and beyond have a free alternative to the commercial conferencing solutions with sometimes dubious security and privacy histories and at the same time improved user experience due to the lower latency of local hosting.</p>

<ul>
<li><a href="https://honeyguide.eu/posts/jitsi-grafana/" rel="nofollow">Grafana for Jitsi-Meet</a>
***</li>
</ul>
</blockquote>

<h3><a href="https://adventurist.me/posts/00301" rel="nofollow">Command Line Bug Hunting in FreeBSD</a></h3>

<blockquote>
<p>FreeBSD uses bugzilla for tracking bugs, taking feature requests, regressions and issues in the Operating System. The web interface for bugzilla is okay, but if you want to do a lot of batch operations it is slow to deal with. We are planning to run a bugsquash on July 11th and that really needs some tooling to help any hackers that show up process the giant bug list we have.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://glebbahmutov.com/game-of-github/" rel="nofollow">Game of Github</a></li>
<li>+ <a href="https://marc.info/?l=openbsd-cvs&m=159274150512676&w=2" rel="nofollow">Wireguard official merged into OpenBSD</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/358/feedback/Florian%20-%20Lua%20for%20%24HOME" rel="nofollow">Florian : Lua for $HOME</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/358/feedback/Kevin%20-%20FreeBSD%20Source%20Question" rel="nofollow">Kevin : FreeBSD Source Question</a></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/358/feedback/Tom%20-%20HomeLabs" rel="nofollow">Tom : HomeLabs</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Yubikey-agent on FreeBSD, Managing Kubernetes clusters from OpenBSD, History of FreeBSD part 1, Running Jitsi-Meet in a FreeBSD Jail, Command Line Bug Hunting in FreeBSD, Game of Github, Wireguard official merged into OpenBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://kernelnomicon.org/?p=855" rel="nofollow">yubikey-agent on FreeBSD</a></h3>

<blockquote>
<p>Some time ago Filippo Valsorda wrote yubikey-agent, seamless SSH agent for YubiKeys. I really like YubiKeys and worked on the FreeBSD support for U2F in Chromium and pyu2f, getting yubikey-agent ported looked like an interesting project. It took some hacking to make it work but overall it wasn’t hard. Following is the roadmap on how to get it set up on FreeBSD. The actual details depend on your system (as you will see)</p>

<hr>
</blockquote>

<h3><a href="https://e1e0.net/manage-k8s-from-openbsd.html" rel="nofollow">Manage Kubernetes clusters from OpenBSD</a></h3>

<blockquote>
<p>This should work with OpenBSD 6.7. I write this while the source tree is locked for release, so even if I use -current this is as close as -current gets to -release<br>
Update 2020-06-05: we now have a port for kubectl. So, at least in -current things get a bit easier.</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://klarasystems.com/articles/history-of-freebsd-unix-and-bsd/?utm_source=bsdnow" rel="nofollow">History of FreeBSD Part 1: Unix and BSD</a></h3>

<blockquote>
<p>FreeBSD, a free and open-source Unix-like operating system has been around since 1993. However, its origins are directly linked to that of BSD, and further back, those of Unix. During this History of FreeBSD series, we will talk about how Unix came to be, and how Berkeley’s Unix developed at Bell Labs.</p>

<hr>
</blockquote>

<h3><a href="https://honeyguide.eu/posts/jitsi-freebsd/" rel="nofollow">Running Jitsi-Meet in a FreeBSD Jail</a></h3>

<blockquote>
<p>Due to the situation with COVID-19 that also lead to people being confined to their homes in South Africa as well, we decided to provide a (freely usable of course) Jitsi Meet instance to the community being hosted in South Africa on our FreeBSD environment.<br>
That way, communities in South Africa and beyond have a free alternative to the commercial conferencing solutions with sometimes dubious security and privacy histories and at the same time improved user experience due to the lower latency of local hosting.</p>

<ul>
<li><a href="https://honeyguide.eu/posts/jitsi-grafana/" rel="nofollow">Grafana for Jitsi-Meet</a>
***</li>
</ul>
</blockquote>

<h3><a href="https://adventurist.me/posts/00301" rel="nofollow">Command Line Bug Hunting in FreeBSD</a></h3>

<blockquote>
<p>FreeBSD uses bugzilla for tracking bugs, taking feature requests, regressions and issues in the Operating System. The web interface for bugzilla is okay, but if you want to do a lot of batch operations it is slow to deal with. We are planning to run a bugsquash on July 11th and that really needs some tooling to help any hackers that show up process the giant bug list we have.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://glebbahmutov.com/game-of-github/" rel="nofollow">Game of Github</a></li>
<li>+ <a href="https://marc.info/?l=openbsd-cvs&m=159274150512676&w=2" rel="nofollow">Wireguard official merged into OpenBSD</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/358/feedback/Florian%20-%20Lua%20for%20%24HOME" rel="nofollow">Florian : Lua for $HOME</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/358/feedback/Kevin%20-%20FreeBSD%20Source%20Question" rel="nofollow">Kevin : FreeBSD Source Question</a></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/358/feedback/Tom%20-%20HomeLabs" rel="nofollow">Tom : HomeLabs</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>335: FreeBSD Down Under</title>
  <link>https://www.bsdnow.tv/335</link>
  <guid isPermaLink="false">12678787-276e-4471-a8a3-115404afed57</guid>
  <pubDate>Thu, 30 Jan 2020 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/12678787-276e-4471-a8a3-115404afed57.mp3" length="38818086" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Hyperbola Developer interview, why you should migrate from Linux to BSD, FreeBSD is an amazing OS, improving the ptrace(2) API in LLVM 10, First FreeBSD conference in Australia, and a guide to containers on FreeNAS.</itunes:subtitle>
  <itunes:duration>53:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Hyperbola Developer interview, why you should migrate from Linux to BSD, FreeBSD is an amazing OS, improving the ptrace(2) API in LLVM 10, First FreeBSD conference in Australia, and a guide to containers on FreeNAS.
Headlines
FreeBSD is an amazing operating System (https://www.unixsheikh.com/articles/freebsd-is-an-amazing-operating-system.html)
Update 2020-01-21: Since I wrote this article it got posted on Hacker News, Reddit and Lobster, and a few people have emailed me with comments. I have updated the article with comments where I have found it needed. As an important side note I would like to point out that I am not a FreeBSD developer, there may be things going on in the FreeBSD world that I know absolutely nothing about. I am also not glued to the FreeBSD developer mailing lists. I am not a FreeBSD "fanboy". I have been using GNU/Linux a ton more for the past two decades than FreeBSD, mainly due to hardware incompatibility (lacking or buggy drivers), and I love both Debian GNU/Linux and Arch Linux just as much as FreeBSD. However, I am concerned about the development of GNU/Linux as of late. Also this article is not about me trying to make anyone switch from something else to FreeBSD. It's about why I like FreeBSD and that I recommend you try it out if you're into messing with operating systems.
I think the year was late 1999 or mid 2000 when I one day was browsing computer books at my favorite bookshop and I discovered the book The Complete FreeBSD third edition from 1999 by Greg Lehey. With the book came 4 CD Roms with FreeBSD 3.3.
I had already familiarized myself with GNU/Linux in 1998, and I was in the process of migrating every server and desktop operating system away from Microsoft Windows, both at home and at my company, to GNU/Linux, initially Red Hat Linux and then later Debian GNU/Linux, which eventually became my favorite GNU/Linux distribution for many years.
When I first saw The Complete FreeBSD book by Greg Lehey I remember noticing the text on the front page that said, "The Free Version of Berkeley UNIX" and "Rock Solid Stability", and I was immediately intrigued! What was that all about? A free UNIX operating system! And rock solid stability? That sounded amazing.
Hyperbola Dev Interview (https://itsfoss.com/hyperbola-linux-bsd/)
In late December 2019, Hyperbola announced that they would be making major changes to their project. They have decided to drop the Linux kernel in favor of forking the OpenBSD kernel. This announcement only came months after Project Trident announced that they were going in the opposite direction (from BSD to Linux).
Hyperbola also plans to replace all software that is not GPL v3 compliant with new versions that are.
To get more insight into the future of their new project, I interviewed Andre, co-founder of Hyperbola.
News Roundup
Improving the ptrace(2) API and preparing for LLVM-10.0 (https://blog.netbsd.org/tnf/entry/improving_the_ptrace_2_api)
This month I have improved the NetBSD ptrace(2) API, removing one legacy interface with a few flaws and replacing it with two new calls with new features, and removing technical debt.
As LLVM 10.0 is branching now soon (Jan 15th 2020), I worked on proper support of the LLVM features for NetBSD 9.0 (today RC1) and NetBSD HEAD (future 10.0).
The first FreeBSD conference in Australia (https://rubenerd.com/the-first-freebsd-conference-in-australia/)
FreeBSD has existed as an operating system, project, and foundation for more than twenty years, and its earlier incantations have exited for far longer. The old guard have been developing code, porting software, and writing documentation for longer than I’ve existed. I’ve been using it for more than a decade for personal projects, and professionally for half that time.
While there are many prominent Australian FreeBSD contributors, sysadmins, and users, we’ve always had to venture overseas for conferences. We’re always told Australians are among the most ardent travellers, but I always wondered if we could do a domestic event as well.
And on Tuesday, we did! Deb Goodkin and the FreeBSD Foundation graciously organised and chaired a dedicated FreeBSD miniconf at the long-running linux.conf.au event held each year in a different city in Australia and New Zealand.
A practical guide to containers on FreeNAS for a depraved psychopath (https://medium.com/@andoriyu/a-practical-guide-to-containers-on-freenas-for-a-depraved-psychopath-c212203c0394)
This is a simple write-up to setup Docker on FreeNAS 11 or FreeBSD 11.
But muh jails?
You know that jails are dope and you know that jails are dope, yet no one else knows it. So here we are stuck with docker. Two years ago I would be the last person to recommend using docker, but a whole lot of things has changes past years… 
So jails are dead then?
No, jails are still dope, but jails lack tools to manage them. Yes, there are a few tools, but they meant for hard-core FreeBSD users who used to suffering. Docker allows you to run applications without deep knowledge of application you’re running. It will also allow you to run applications that are not ported to FreeBSD.
Why you should migrate everything from Linux to BSD (https://www.unixsheikh.com/articles/why-you-should-migrate-everything-from-linux-to-bsd.html)
As an operating system GNU/Linux has become a real mess because of the fragmented nature of the project, the bloatware in the kernel, and because of the jerking around by commercial interests.
Response Should you migrate from Linux to BSD? It depends. (https://fediverse.blog/~/AllGoodThings/should-you-migrate-from-linux-to-bsd-it-depends)
Beastie Bits
Using the OpenBSD ports tree with dedicated users (https://dataswamp.org/~solene/2020-01-11-privsep.html)
broot on FreeBSD (https://vermaden.wordpress.com/2020/01/10/run-broot-on-freebsd/)
A Trip down Memory Lane (https://svnweb.freebsd.org/base/head/share/misc/bsd-family-tree?view=co)
Running syslog-ng in BastilleBSD (https://www.syslog-ng.com/community/b/blog/posts/running-syslog-ng-in-bastillebsd)
NASA : Using Software Packages in pkgsrc (https://www.nas.nasa.gov/hecc/support/kb/using-software-packages-in-pkgsrc_493.html)
Feedback/Questions
All of our questions this week were pretty technical in nature so I'm going to save those for the next episode so Allan can weigh in on them, since if we cover them now we're basically going to be deferring to Allan anyway.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, hyperbola, migrate, migration, ptrace, llvm, conference, australia, containers, freenas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Hyperbola Developer interview, why you should migrate from Linux to BSD, FreeBSD is an amazing OS, improving the ptrace(2) API in LLVM 10, First FreeBSD conference in Australia, and a guide to containers on FreeNAS.</p>

<h2>Headlines</h2>

<h3><a href="https://www.unixsheikh.com/articles/freebsd-is-an-amazing-operating-system.html" rel="nofollow">FreeBSD is an amazing operating System</a></h3>

<blockquote>
<p>Update 2020-01-21: Since I wrote this article it got posted on Hacker News, Reddit and Lobster, and a few people have emailed me with comments. I have updated the article with comments where I have found it needed. As an important side note I would like to point out that I am not a FreeBSD developer, there may be things going on in the FreeBSD world that I know absolutely nothing about. I am also not glued to the FreeBSD developer mailing lists. I am not a FreeBSD &quot;fanboy&quot;. I have been using GNU/Linux a ton more for the past two decades than FreeBSD, mainly due to hardware incompatibility (lacking or buggy drivers), and I love both Debian GNU/Linux and Arch Linux just as much as FreeBSD. However, I am concerned about the development of GNU/Linux as of late. Also this article is not about me trying to make anyone switch from something else to FreeBSD. It&#39;s about why I like FreeBSD and that I recommend you try it out if you&#39;re into messing with operating systems.</p>

<p>I think the year was late 1999 or mid 2000 when I one day was browsing computer books at my favorite bookshop and I discovered the book The Complete FreeBSD third edition from 1999 by Greg Lehey. With the book came 4 CD Roms with FreeBSD 3.3.</p>

<p>I had already familiarized myself with GNU/Linux in 1998, and I was in the process of migrating every server and desktop operating system away from Microsoft Windows, both at home and at my company, to GNU/Linux, initially Red Hat Linux and then later Debian GNU/Linux, which eventually became my favorite GNU/Linux distribution for many years.</p>

<p>When I first saw The Complete FreeBSD book by Greg Lehey I remember noticing the text on the front page that said, &quot;The Free Version of Berkeley UNIX&quot; and &quot;Rock Solid Stability&quot;, and I was immediately intrigued! What was that all about? A free UNIX operating system! And rock solid stability? That sounded amazing.</p>
</blockquote>

<hr>

<h3><a href="https://itsfoss.com/hyperbola-linux-bsd/" rel="nofollow">Hyperbola Dev Interview</a></h3>

<blockquote>
<p>In late December 2019, Hyperbola announced that they would be making major changes to their project. They have decided to drop the Linux kernel in favor of forking the OpenBSD kernel. This announcement only came months after Project Trident announced that they were going in the opposite direction (from BSD to Linux).</p>

<p>Hyperbola also plans to replace all software that is not GPL v3 compliant with new versions that are.</p>

<p>To get more insight into the future of their new project, I interviewed Andre, co-founder of Hyperbola.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.netbsd.org/tnf/entry/improving_the_ptrace_2_api" rel="nofollow">Improving the ptrace(2) API and preparing for LLVM-10.0</a></h3>

<blockquote>
<p>This month I have improved the NetBSD ptrace(2) API, removing one legacy interface with a few flaws and replacing it with two new calls with new features, and removing technical debt.</p>

<p>As LLVM 10.0 is branching now soon (Jan 15th 2020), I worked on proper support of the LLVM features for NetBSD 9.0 (today RC1) and NetBSD HEAD (future 10.0).</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/the-first-freebsd-conference-in-australia/" rel="nofollow">The first FreeBSD conference in Australia</a></h3>

<blockquote>
<p>FreeBSD has existed as an operating system, project, and foundation for more than twenty years, and its earlier incantations have exited for far longer. The old guard have been developing code, porting software, and writing documentation for longer than I’ve existed. I’ve been using it for more than a decade for personal projects, and professionally for half that time.</p>

<p>While there are many prominent Australian FreeBSD contributors, sysadmins, and users, we’ve always had to venture overseas for conferences. We’re always told Australians are among the most ardent travellers, but I always wondered if we could do a domestic event as well.</p>

<p>And on Tuesday, we did! Deb Goodkin and the FreeBSD Foundation graciously organised and chaired a dedicated FreeBSD miniconf at the long-running linux.conf.au event held each year in a different city in Australia and New Zealand.</p>
</blockquote>

<hr>

<h3><a href="https://medium.com/@andoriyu/a-practical-guide-to-containers-on-freenas-for-a-depraved-psychopath-c212203c0394" rel="nofollow">A practical guide to containers on FreeNAS for a depraved psychopath</a></h3>

<blockquote>
<p>This is a simple write-up to setup Docker on FreeNAS 11 or FreeBSD 11.</p>
</blockquote>

<p>But muh jails?</p>

<blockquote>
<p>You know that jails are dope and you know that jails are dope, yet no one else knows it. So here we are stuck with docker. Two years ago I would be the last person to recommend using docker, but a whole lot of things has changes past years… </p>
</blockquote>

<p>So jails are dead then?</p>

<blockquote>
<p>No, jails are still dope, but jails lack tools to manage them. Yes, there are a few tools, but they meant for hard-core FreeBSD users who used to suffering. Docker allows you to run applications without deep knowledge of application you’re running. It will also allow you to run applications that are not ported to FreeBSD.</p>
</blockquote>

<hr>

<h3><a href="https://www.unixsheikh.com/articles/why-you-should-migrate-everything-from-linux-to-bsd.html" rel="nofollow">Why you should migrate everything from Linux to BSD</a></h3>

<blockquote>
<p>As an operating system GNU/Linux has become a real mess because of the fragmented nature of the project, the bloatware in the kernel, and because of the jerking around by commercial interests.</p>
</blockquote>

<ul>
<li>Response <a href="https://fediverse.blog/%7E/AllGoodThings/should-you-migrate-from-linux-to-bsd-it-depends" rel="nofollow">Should you migrate from Linux to BSD? It depends.</a></li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://dataswamp.org/%7Esolene/2020-01-11-privsep.html" rel="nofollow">Using the OpenBSD ports tree with dedicated users</a></li>
<li><a href="https://vermaden.wordpress.com/2020/01/10/run-broot-on-freebsd/" rel="nofollow">broot on FreeBSD</a></li>
<li><a href="https://svnweb.freebsd.org/base/head/share/misc/bsd-family-tree?view=co" rel="nofollow">A Trip down Memory Lane</a></li>
<li><a href="https://www.syslog-ng.com/community/b/blog/posts/running-syslog-ng-in-bastillebsd" rel="nofollow">Running syslog-ng in BastilleBSD</a></li>
<li><a href="https://www.nas.nasa.gov/hecc/support/kb/using-software-packages-in-pkgsrc_493.html" rel="nofollow">NASA : Using Software Packages in pkgsrc</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>All of our questions this week were pretty technical in nature so I&#39;m going to save those for the next episode so Allan can weigh in on them, since if we cover them now we&#39;re basically going to be deferring to Allan anyway.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0335.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Hyperbola Developer interview, why you should migrate from Linux to BSD, FreeBSD is an amazing OS, improving the ptrace(2) API in LLVM 10, First FreeBSD conference in Australia, and a guide to containers on FreeNAS.</p>

<h2>Headlines</h2>

<h3><a href="https://www.unixsheikh.com/articles/freebsd-is-an-amazing-operating-system.html" rel="nofollow">FreeBSD is an amazing operating System</a></h3>

<blockquote>
<p>Update 2020-01-21: Since I wrote this article it got posted on Hacker News, Reddit and Lobster, and a few people have emailed me with comments. I have updated the article with comments where I have found it needed. As an important side note I would like to point out that I am not a FreeBSD developer, there may be things going on in the FreeBSD world that I know absolutely nothing about. I am also not glued to the FreeBSD developer mailing lists. I am not a FreeBSD &quot;fanboy&quot;. I have been using GNU/Linux a ton more for the past two decades than FreeBSD, mainly due to hardware incompatibility (lacking or buggy drivers), and I love both Debian GNU/Linux and Arch Linux just as much as FreeBSD. However, I am concerned about the development of GNU/Linux as of late. Also this article is not about me trying to make anyone switch from something else to FreeBSD. It&#39;s about why I like FreeBSD and that I recommend you try it out if you&#39;re into messing with operating systems.</p>

<p>I think the year was late 1999 or mid 2000 when I one day was browsing computer books at my favorite bookshop and I discovered the book The Complete FreeBSD third edition from 1999 by Greg Lehey. With the book came 4 CD Roms with FreeBSD 3.3.</p>

<p>I had already familiarized myself with GNU/Linux in 1998, and I was in the process of migrating every server and desktop operating system away from Microsoft Windows, both at home and at my company, to GNU/Linux, initially Red Hat Linux and then later Debian GNU/Linux, which eventually became my favorite GNU/Linux distribution for many years.</p>

<p>When I first saw The Complete FreeBSD book by Greg Lehey I remember noticing the text on the front page that said, &quot;The Free Version of Berkeley UNIX&quot; and &quot;Rock Solid Stability&quot;, and I was immediately intrigued! What was that all about? A free UNIX operating system! And rock solid stability? That sounded amazing.</p>
</blockquote>

<hr>

<h3><a href="https://itsfoss.com/hyperbola-linux-bsd/" rel="nofollow">Hyperbola Dev Interview</a></h3>

<blockquote>
<p>In late December 2019, Hyperbola announced that they would be making major changes to their project. They have decided to drop the Linux kernel in favor of forking the OpenBSD kernel. This announcement only came months after Project Trident announced that they were going in the opposite direction (from BSD to Linux).</p>

<p>Hyperbola also plans to replace all software that is not GPL v3 compliant with new versions that are.</p>

<p>To get more insight into the future of their new project, I interviewed Andre, co-founder of Hyperbola.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.netbsd.org/tnf/entry/improving_the_ptrace_2_api" rel="nofollow">Improving the ptrace(2) API and preparing for LLVM-10.0</a></h3>

<blockquote>
<p>This month I have improved the NetBSD ptrace(2) API, removing one legacy interface with a few flaws and replacing it with two new calls with new features, and removing technical debt.</p>

<p>As LLVM 10.0 is branching now soon (Jan 15th 2020), I worked on proper support of the LLVM features for NetBSD 9.0 (today RC1) and NetBSD HEAD (future 10.0).</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/the-first-freebsd-conference-in-australia/" rel="nofollow">The first FreeBSD conference in Australia</a></h3>

<blockquote>
<p>FreeBSD has existed as an operating system, project, and foundation for more than twenty years, and its earlier incantations have exited for far longer. The old guard have been developing code, porting software, and writing documentation for longer than I’ve existed. I’ve been using it for more than a decade for personal projects, and professionally for half that time.</p>

<p>While there are many prominent Australian FreeBSD contributors, sysadmins, and users, we’ve always had to venture overseas for conferences. We’re always told Australians are among the most ardent travellers, but I always wondered if we could do a domestic event as well.</p>

<p>And on Tuesday, we did! Deb Goodkin and the FreeBSD Foundation graciously organised and chaired a dedicated FreeBSD miniconf at the long-running linux.conf.au event held each year in a different city in Australia and New Zealand.</p>
</blockquote>

<hr>

<h3><a href="https://medium.com/@andoriyu/a-practical-guide-to-containers-on-freenas-for-a-depraved-psychopath-c212203c0394" rel="nofollow">A practical guide to containers on FreeNAS for a depraved psychopath</a></h3>

<blockquote>
<p>This is a simple write-up to setup Docker on FreeNAS 11 or FreeBSD 11.</p>
</blockquote>

<p>But muh jails?</p>

<blockquote>
<p>You know that jails are dope and you know that jails are dope, yet no one else knows it. So here we are stuck with docker. Two years ago I would be the last person to recommend using docker, but a whole lot of things has changes past years… </p>
</blockquote>

<p>So jails are dead then?</p>

<blockquote>
<p>No, jails are still dope, but jails lack tools to manage them. Yes, there are a few tools, but they meant for hard-core FreeBSD users who used to suffering. Docker allows you to run applications without deep knowledge of application you’re running. It will also allow you to run applications that are not ported to FreeBSD.</p>
</blockquote>

<hr>

<h3><a href="https://www.unixsheikh.com/articles/why-you-should-migrate-everything-from-linux-to-bsd.html" rel="nofollow">Why you should migrate everything from Linux to BSD</a></h3>

<blockquote>
<p>As an operating system GNU/Linux has become a real mess because of the fragmented nature of the project, the bloatware in the kernel, and because of the jerking around by commercial interests.</p>
</blockquote>

<ul>
<li>Response <a href="https://fediverse.blog/%7E/AllGoodThings/should-you-migrate-from-linux-to-bsd-it-depends" rel="nofollow">Should you migrate from Linux to BSD? It depends.</a></li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://dataswamp.org/%7Esolene/2020-01-11-privsep.html" rel="nofollow">Using the OpenBSD ports tree with dedicated users</a></li>
<li><a href="https://vermaden.wordpress.com/2020/01/10/run-broot-on-freebsd/" rel="nofollow">broot on FreeBSD</a></li>
<li><a href="https://svnweb.freebsd.org/base/head/share/misc/bsd-family-tree?view=co" rel="nofollow">A Trip down Memory Lane</a></li>
<li><a href="https://www.syslog-ng.com/community/b/blog/posts/running-syslog-ng-in-bastillebsd" rel="nofollow">Running syslog-ng in BastilleBSD</a></li>
<li><a href="https://www.nas.nasa.gov/hecc/support/kb/using-software-packages-in-pkgsrc_493.html" rel="nofollow">NASA : Using Software Packages in pkgsrc</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>All of our questions this week were pretty technical in nature so I&#39;m going to save those for the next episode so Allan can weigh in on them, since if we cover them now we&#39;re basically going to be deferring to Allan anyway.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0335.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>311: Conference Gear Breakdown</title>
  <link>https://www.bsdnow.tv/311</link>
  <guid isPermaLink="false">1d57e61a-57d9-4d3b-ac9a-c3a4c061da07</guid>
  <pubDate>Thu, 15 Aug 2019 09:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1d57e61a-57d9-4d3b-ac9a-c3a4c061da07.mp3" length="52868098" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>
NetBSD 9.0 release process has started, xargs, a tale of two spellcheckers, Adapting TriforceAFL for NetBSD, Exploiting a no-name freebsd kernel vulnerability, and more.</itunes:subtitle>
  <itunes:duration>1:13:25</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>NetBSD 9.0 release process has started, xargs, a tale of two spellcheckers, Adapting TriforceAFL for NetBSD, Exploiting a no-name freebsd kernel vulnerability, and more.
Headlines
NetBSD 9.0 release process has started (https://mail-index.netbsd.org/netbsd-announce/2019/07/31/msg000301.html)
If you have been following source-changes, you may have noticed the creation of the netbsd-9 branch! It has some really exciting items that we worked on:
+ New AArch64 architecture support:
 + Symmetric and asymmetrical multiprocessing support (aka big.LITTLE)
 + Support for running 32-bit binaries
 + UEFI and ACPI support
 + Support for SBSA/SBBR (server-class) hardware.
+ The FDT-ization of many ARM boards:
 + the 32-bit GENERIC kernel lists 129 different DTS configurations
 + the 64-bit GENERIC64 kernel lists 74 different DTS configurations
 + All supported by a single kernel, without requiring per-board configuration.
+ Graphics driver update, matching Linux 4.4, adding support for up to Kaby Lake based Intel graphics devices.
+ ZFS has been updated to a modern version and seen many bugfixes.
+ New hardware-accelerated virtualization via NVMM.
+ NPF performance improvements and bug fixes. A new lookup algorithm, thmap, is now the default.
+ NVMe performance improvements
+ Optional kernel ASLR support, and partial kernel ASLR for the default configuration.
+ Kernel sanitizers:
 + KLEAK, detecting memory leaks
 + KASAN, detecting memory overruns
 + KUBSAN, detecting undefined behaviour
 + These have been used together with continuous fuzzing via the syzkaller project to find many bugs that were fixed.
+ The removal of outdated networking components such as ISDN and all of its drivers
+ The installer is now capable of performing GPT UEFI installations.
+ Dramatically improved support for userland sanitizers, as well as the option to build all of NetBSD's userland using them for bug-finding.
+ Update to graphics userland: Mesa was updated to 18.3.4, and llvmpipe is now available for several architectures, providing 3D graphics even in the absence of a supported GPU.
We try to test NetBSD as best as we can, but your testing can help NetBSD 9.0 a great release. Please test it and let us know of any bugs you find.
+ Binaries are available at https://nycdn.netbsd.org/pub/NetBSD-daily/netbsd-9/latest/
xargs wtf (https://medium.com/@aarontharris/xargs-wtf-34d2618286b7)
 xargs is probably one of the more difficult to understand of the unix command arsenal and of course that just means it’s one of the most useful too.
I discovered a handy trick that I thought was worth a share. Please note there are probably other (better) ways to do this but I did my stackoverflow research and found nothing better.
xargs — at least how I’ve most utilized it — is handy for taking some number of lines as input and doing some work per line. It’s hard to be more specific than that as it does so much else.
It literally took me an hour of piecing together random man pages + tips from 11 year olds on stack overflow, but eventually I produced this gem:
This is an example of how to find files matching a certain pattern and rename each of them. It sounds so trivial (and it is) but it demonstrates some cool tricks in an easy concept.
News Roundup
PkgSrc: A Tale of Two Spellcheckers (https://bentsukun.ch/posts/pkgsrccon-2019/)
This is a transcript of the talk I gave at pkgsrcCon 2019 in Cambridge, UK. It is about spellcheckers, but there are much more general software engineering lessons that we can learn from this case study.
The reason I got into this subject at all was my paternal leave last year, when I finally had some more time to spend working on pkgsrc. It was a tiny item in the enormous TODO file at the top of the source tree (“update enchant to version 2.2”) that made me go into this rabbit hole.
Adapting TriforceAFL for NetBSD, Part 2 (https://blog.netbsd.org/tnf/entry/adapting_triforceafl_for_netbsd_part1)
I have been working on adapting TriforceAFL for NetBSD kernel syscall fuzzing. This blog post summarizes the work done until the second evaluation.
For work done during the first coding period, check out this post.
Summary
&amp;gt; So far, the TriforceNetBSDSyscallFuzzer has been made available in the form of a pkgsrc package with the ability to fuzz most of NetBSD syscalls. In the final coding period of GSoC. I plan to analyse the crashes that were found until now. Integrate sanitizers, try and find more bugs and finally wrap up neatly with detailed documentation.
&amp;gt; Last but not least, I would like to thank my mentor, Kamil Rytarowski for helping me through the process and guiding me. It has been a wonderful learning experience so far!
Exploiting a no-name freebsd kernel vulnerability (https://www.synacktiv.com/posts/exploit/exploiting-a-no-name-freebsd-kernel-vulnerability.html)
A new patch has been recently shipped in FreeBSD kernels to fix a vulnerability (cve-2019-5602) present in the cdrom device. In this post, we will introduce the bug and discuss its exploitation on pre/post-SMEP FreeBSD revisions.
&amp;gt; A closer look at the commit 6bcf6e3 shows that when invoking the CDIOCREADSUBCHANNEL_SYSSPACE ioctl, data are copied with bcopy instead of the copyout primitive. This endows a local attacker belonging to the operator group with an arbitrary write primitive in the kernel memory.
[Allan and Benedicts Conference Gear Breakdown]

Benedict’s Gear:
GlocalMe G3 Mobile Travel HotSpot and Powerbank (https://www.glocalme.com/CA/en-US/cloudsim/g3)
Mogics Power Bagel (http://www.mogics.com/3824-2)
Charby Sense Power Cable (https://charbycharge.com/charby-sense-worlds-smartest-auto-cutoff-cable/)
Allan’s Gear:
Huawei E5770s-320 4G LTE 150 Mbps Mobile WiFi Pro (https://smile.amazon.com/gp/product/B013CEGGKI/)
AOW Global Data SIM Card for On-Demand 4G LTE Mobile Data in Over 90 Countries (https://smile.amazon.com/dp/B071HJFX27/)
All my devices charge from USB-C, so that is great
More USB thumb drives than strictly necessary
My Lenovo X270 laptop running FreeBSD 13-current
My 2016 Macbook Pro (a prize from the raffle at vBSDCon 2017) that I use for email and video conferencing to preserve battery on my FreeBSD machine for work
Beastie Bits
Replacing the Unix tradition (Warning may be rage inducing) (https://www.youtube.com/watch?v=L9v4Mg8wi4U&amp;amp;feature=youtu.be)
Installing OpenBSD over remote serial on the AtomicPI (https://www.thanassis.space/remoteserial.html#remoteserial)
Zen 2 and DragonFly (https://www.dragonflydigest.com/2019/08/05/23294.html)
Improve Docking on FreeBSD (https://blog.yukiisbo.red/posts/2019/05/improve-docking-on-freebsd/)
Register for vBSDCon 2019, Sept 5-7 in Reston VA. Early bird ends August 15th. (https://vbsdcon.com/registration)
Register for EuroBSDCon 2019, Sept 19-22 in Lillehammer, Norway (https://2019.eurobsdcon.org/registration/)
Feedback/Questions
JT - Congrats (http://dpaste.com/0D7Y31E#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, xargs, spellchecker, tale, triforceafl, kernel, vulnerability, conference, gear, tools, gadgets, utilities</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>NetBSD 9.0 release process has started, xargs, a tale of two spellcheckers, Adapting TriforceAFL for NetBSD, Exploiting a no-name freebsd kernel vulnerability, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-announce/2019/07/31/msg000301.html" rel="nofollow">NetBSD 9.0 release process has started</a></h3>

<blockquote>
<p>If you have been following source-changes, you may have noticed the creation of the netbsd-9 branch! It has some really exciting items that we worked on:</p>

<ul>
<li>New AArch64 architecture support:

<ul>
<li>Symmetric and asymmetrical multiprocessing support (aka big.LITTLE)</li>
<li>Support for running 32-bit binaries</li>
<li>UEFI and ACPI support</li>
<li>Support for SBSA/SBBR (server-class) hardware.</li>
</ul></li>
<li>The FDT-ization of many ARM boards:

<ul>
<li>the 32-bit GENERIC kernel lists 129 different DTS configurations</li>
<li>the 64-bit GENERIC64 kernel lists 74 different DTS configurations</li>
<li>All supported by a single kernel, without requiring per-board configuration.</li>
</ul></li>
<li>Graphics driver update, matching Linux 4.4, adding support for up to Kaby Lake based Intel graphics devices.</li>
<li>ZFS has been updated to a modern version and seen many bugfixes.</li>
<li>New hardware-accelerated virtualization via NVMM.</li>
<li>NPF performance improvements and bug fixes. A new lookup algorithm, thmap, is now the default.</li>
<li>NVMe performance improvements</li>
<li>Optional kernel ASLR support, and partial kernel ASLR for the default configuration.</li>
<li>Kernel sanitizers:

<ul>
<li>KLEAK, detecting memory leaks</li>
<li>KASAN, detecting memory overruns</li>
<li>KUBSAN, detecting undefined behaviour</li>
<li>These have been used together with continuous fuzzing via the syzkaller project to find many bugs that were fixed.</li>
</ul></li>
<li>The removal of outdated networking components such as ISDN and all of its drivers</li>
<li>The installer is now capable of performing GPT UEFI installations.</li>
<li>Dramatically improved support for userland sanitizers, as well as the option to build all of NetBSD&#39;s userland using them for bug-finding.</li>
<li>Update to graphics userland: Mesa was updated to 18.3.4, and llvmpipe is now available for several architectures, providing 3D graphics even in the absence of a supported GPU.</li>
</ul>

<p>We try to test NetBSD as best as we can, but your testing can help NetBSD 9.0 a great release. Please test it and let us know of any bugs you find.</p>

<ul>
<li>Binaries are available at <a href="https://nycdn.netbsd.org/pub/NetBSD-daily/netbsd-9/latest/" rel="nofollow">https://nycdn.netbsd.org/pub/NetBSD-daily/netbsd-9/latest/</a></li>
</ul>
</blockquote>

<hr>

<h3><a href="https://medium.com/@aarontharris/xargs-wtf-34d2618286b7" rel="nofollow">xargs wtf</a></h3>

<blockquote>
<p>xargs is probably one of the more difficult to understand of the unix command arsenal and of course that just means it’s one of the most useful too.<br>
I discovered a handy trick that I thought was worth a share. Please note there are probably other (better) ways to do this but I did my stackoverflow research and found nothing better.<br>
xargs — at least how I’ve most utilized it — is handy for taking some number of lines as input and doing some work per line. It’s hard to be more specific than that as it does so much else.<br>
It literally took me an hour of piecing together random man pages + tips from 11 year olds on stack overflow, but eventually I produced this gem:<br>
This is an example of how to find files matching a certain pattern and rename each of them. It sounds so trivial (and it is) but it demonstrates some cool tricks in an easy concept.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://bentsukun.ch/posts/pkgsrccon-2019/" rel="nofollow">PkgSrc: A Tale of Two Spellcheckers</a></h3>

<blockquote>
<p>This is a transcript of the talk I gave at pkgsrcCon 2019 in Cambridge, UK. It is about spellcheckers, but there are much more general software engineering lessons that we can learn from this case study.<br>
The reason I got into this subject at all was my paternal leave last year, when I finally had some more time to spend working on pkgsrc. It was a tiny item in the enormous TODO file at the top of the source tree (“update enchant to version 2.2”) that made me go into this rabbit hole.</p>
</blockquote>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/adapting_triforceafl_for_netbsd_part1" rel="nofollow">Adapting TriforceAFL for NetBSD, Part 2</a></h3>

<blockquote>
<p>I have been working on adapting TriforceAFL for NetBSD kernel syscall fuzzing. This blog post summarizes the work done until the second evaluation.<br>
For work done during the first coding period, check out this post.</p>
</blockquote>

<ul>
<li>Summary
&gt; So far, the TriforceNetBSDSyscallFuzzer has been made available in the form of a pkgsrc package with the ability to fuzz most of NetBSD syscalls. In the final coding period of GSoC. I plan to analyse the crashes that were found until now. Integrate sanitizers, try and find more bugs and finally wrap up neatly with detailed documentation.
&gt; Last but not least, I would like to thank my mentor, Kamil Rytarowski for helping me through the process and guiding me. It has been a wonderful learning experience so far!</li>
</ul>

<hr>

<h3><a href="https://www.synacktiv.com/posts/exploit/exploiting-a-no-name-freebsd-kernel-vulnerability.html" rel="nofollow">Exploiting a no-name freebsd kernel vulnerability</a></h3>

<ul>
<li>A new patch has been recently shipped in FreeBSD kernels to fix a vulnerability (cve-2019-5602) present in the cdrom device. In this post, we will introduce the bug and discuss its exploitation on pre/post-SMEP FreeBSD revisions.
&gt; A closer look at the commit 6bcf6e3 shows that when invoking the CDIOCREADSUBCHANNEL_SYSSPACE ioctl, data are copied with bcopy instead of the copyout primitive. This endows a local attacker belonging to the operator group with an arbitrary write primitive in the kernel memory.</li>
</ul>

<hr>

<h3>[Allan and Benedicts Conference Gear Breakdown]</h3>

<ul>
<li></li>
<li><p>Benedict’s Gear:</p>

<blockquote>
<p><a href="https://www.glocalme.com/CA/en-US/cloudsim/g3" rel="nofollow">GlocalMe G3 Mobile Travel HotSpot and Powerbank</a><br>
<a href="http://www.mogics.com/3824-2" rel="nofollow">Mogics Power Bagel</a><br>
<a href="https://charbycharge.com/charby-sense-worlds-smartest-auto-cutoff-cable/" rel="nofollow">Charby Sense Power Cable</a></p>
</blockquote></li>
<li><p>Allan’s Gear:</p>

<blockquote>
<p><a href="https://smile.amazon.com/gp/product/B013CEGGKI/" rel="nofollow">Huawei E5770s-320 4G LTE 150 Mbps Mobile WiFi Pro</a><br>
<a href="https://smile.amazon.com/dp/B071HJFX27/" rel="nofollow">AOW Global Data SIM Card for On-Demand 4G LTE Mobile Data in Over 90 Countries</a><br>
All my devices charge from USB-C, so that is great<br>
More USB thumb drives than strictly necessary<br>
My Lenovo X270 laptop running FreeBSD 13-current<br>
My 2016 Macbook Pro (a prize from the raffle at vBSDCon 2017) that I use for email and video conferencing to preserve battery on my FreeBSD machine for work</p>
</blockquote></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=L9v4Mg8wi4U&feature=youtu.be" rel="nofollow">Replacing the Unix tradition (Warning may be rage inducing)</a></li>
<li><a href="https://www.thanassis.space/remoteserial.html#remoteserial" rel="nofollow">Installing OpenBSD over remote serial on the AtomicPI</a></li>
<li><a href="https://www.dragonflydigest.com/2019/08/05/23294.html" rel="nofollow">Zen 2 and DragonFly</a></li>
<li><a href="https://blog.yukiisbo.red/posts/2019/05/improve-docking-on-freebsd/" rel="nofollow">Improve Docking on FreeBSD</a></li>
<li><a href="https://vbsdcon.com/registration" rel="nofollow">Register for vBSDCon 2019, Sept 5-7 in Reston VA. Early bird ends August 15th.</a></li>
<li><a href="https://2019.eurobsdcon.org/registration/" rel="nofollow">Register for EuroBSDCon 2019, Sept 19-22 in Lillehammer, Norway</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>JT - <a href="http://dpaste.com/0D7Y31E#wrap" rel="nofollow">Congrats</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0311.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>NetBSD 9.0 release process has started, xargs, a tale of two spellcheckers, Adapting TriforceAFL for NetBSD, Exploiting a no-name freebsd kernel vulnerability, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-announce/2019/07/31/msg000301.html" rel="nofollow">NetBSD 9.0 release process has started</a></h3>

<blockquote>
<p>If you have been following source-changes, you may have noticed the creation of the netbsd-9 branch! It has some really exciting items that we worked on:</p>

<ul>
<li>New AArch64 architecture support:

<ul>
<li>Symmetric and asymmetrical multiprocessing support (aka big.LITTLE)</li>
<li>Support for running 32-bit binaries</li>
<li>UEFI and ACPI support</li>
<li>Support for SBSA/SBBR (server-class) hardware.</li>
</ul></li>
<li>The FDT-ization of many ARM boards:

<ul>
<li>the 32-bit GENERIC kernel lists 129 different DTS configurations</li>
<li>the 64-bit GENERIC64 kernel lists 74 different DTS configurations</li>
<li>All supported by a single kernel, without requiring per-board configuration.</li>
</ul></li>
<li>Graphics driver update, matching Linux 4.4, adding support for up to Kaby Lake based Intel graphics devices.</li>
<li>ZFS has been updated to a modern version and seen many bugfixes.</li>
<li>New hardware-accelerated virtualization via NVMM.</li>
<li>NPF performance improvements and bug fixes. A new lookup algorithm, thmap, is now the default.</li>
<li>NVMe performance improvements</li>
<li>Optional kernel ASLR support, and partial kernel ASLR for the default configuration.</li>
<li>Kernel sanitizers:

<ul>
<li>KLEAK, detecting memory leaks</li>
<li>KASAN, detecting memory overruns</li>
<li>KUBSAN, detecting undefined behaviour</li>
<li>These have been used together with continuous fuzzing via the syzkaller project to find many bugs that were fixed.</li>
</ul></li>
<li>The removal of outdated networking components such as ISDN and all of its drivers</li>
<li>The installer is now capable of performing GPT UEFI installations.</li>
<li>Dramatically improved support for userland sanitizers, as well as the option to build all of NetBSD&#39;s userland using them for bug-finding.</li>
<li>Update to graphics userland: Mesa was updated to 18.3.4, and llvmpipe is now available for several architectures, providing 3D graphics even in the absence of a supported GPU.</li>
</ul>

<p>We try to test NetBSD as best as we can, but your testing can help NetBSD 9.0 a great release. Please test it and let us know of any bugs you find.</p>

<ul>
<li>Binaries are available at <a href="https://nycdn.netbsd.org/pub/NetBSD-daily/netbsd-9/latest/" rel="nofollow">https://nycdn.netbsd.org/pub/NetBSD-daily/netbsd-9/latest/</a></li>
</ul>
</blockquote>

<hr>

<h3><a href="https://medium.com/@aarontharris/xargs-wtf-34d2618286b7" rel="nofollow">xargs wtf</a></h3>

<blockquote>
<p>xargs is probably one of the more difficult to understand of the unix command arsenal and of course that just means it’s one of the most useful too.<br>
I discovered a handy trick that I thought was worth a share. Please note there are probably other (better) ways to do this but I did my stackoverflow research and found nothing better.<br>
xargs — at least how I’ve most utilized it — is handy for taking some number of lines as input and doing some work per line. It’s hard to be more specific than that as it does so much else.<br>
It literally took me an hour of piecing together random man pages + tips from 11 year olds on stack overflow, but eventually I produced this gem:<br>
This is an example of how to find files matching a certain pattern and rename each of them. It sounds so trivial (and it is) but it demonstrates some cool tricks in an easy concept.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://bentsukun.ch/posts/pkgsrccon-2019/" rel="nofollow">PkgSrc: A Tale of Two Spellcheckers</a></h3>

<blockquote>
<p>This is a transcript of the talk I gave at pkgsrcCon 2019 in Cambridge, UK. It is about spellcheckers, but there are much more general software engineering lessons that we can learn from this case study.<br>
The reason I got into this subject at all was my paternal leave last year, when I finally had some more time to spend working on pkgsrc. It was a tiny item in the enormous TODO file at the top of the source tree (“update enchant to version 2.2”) that made me go into this rabbit hole.</p>
</blockquote>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/adapting_triforceafl_for_netbsd_part1" rel="nofollow">Adapting TriforceAFL for NetBSD, Part 2</a></h3>

<blockquote>
<p>I have been working on adapting TriforceAFL for NetBSD kernel syscall fuzzing. This blog post summarizes the work done until the second evaluation.<br>
For work done during the first coding period, check out this post.</p>
</blockquote>

<ul>
<li>Summary
&gt; So far, the TriforceNetBSDSyscallFuzzer has been made available in the form of a pkgsrc package with the ability to fuzz most of NetBSD syscalls. In the final coding period of GSoC. I plan to analyse the crashes that were found until now. Integrate sanitizers, try and find more bugs and finally wrap up neatly with detailed documentation.
&gt; Last but not least, I would like to thank my mentor, Kamil Rytarowski for helping me through the process and guiding me. It has been a wonderful learning experience so far!</li>
</ul>

<hr>

<h3><a href="https://www.synacktiv.com/posts/exploit/exploiting-a-no-name-freebsd-kernel-vulnerability.html" rel="nofollow">Exploiting a no-name freebsd kernel vulnerability</a></h3>

<ul>
<li>A new patch has been recently shipped in FreeBSD kernels to fix a vulnerability (cve-2019-5602) present in the cdrom device. In this post, we will introduce the bug and discuss its exploitation on pre/post-SMEP FreeBSD revisions.
&gt; A closer look at the commit 6bcf6e3 shows that when invoking the CDIOCREADSUBCHANNEL_SYSSPACE ioctl, data are copied with bcopy instead of the copyout primitive. This endows a local attacker belonging to the operator group with an arbitrary write primitive in the kernel memory.</li>
</ul>

<hr>

<h3>[Allan and Benedicts Conference Gear Breakdown]</h3>

<ul>
<li></li>
<li><p>Benedict’s Gear:</p>

<blockquote>
<p><a href="https://www.glocalme.com/CA/en-US/cloudsim/g3" rel="nofollow">GlocalMe G3 Mobile Travel HotSpot and Powerbank</a><br>
<a href="http://www.mogics.com/3824-2" rel="nofollow">Mogics Power Bagel</a><br>
<a href="https://charbycharge.com/charby-sense-worlds-smartest-auto-cutoff-cable/" rel="nofollow">Charby Sense Power Cable</a></p>
</blockquote></li>
<li><p>Allan’s Gear:</p>

<blockquote>
<p><a href="https://smile.amazon.com/gp/product/B013CEGGKI/" rel="nofollow">Huawei E5770s-320 4G LTE 150 Mbps Mobile WiFi Pro</a><br>
<a href="https://smile.amazon.com/dp/B071HJFX27/" rel="nofollow">AOW Global Data SIM Card for On-Demand 4G LTE Mobile Data in Over 90 Countries</a><br>
All my devices charge from USB-C, so that is great<br>
More USB thumb drives than strictly necessary<br>
My Lenovo X270 laptop running FreeBSD 13-current<br>
My 2016 Macbook Pro (a prize from the raffle at vBSDCon 2017) that I use for email and video conferencing to preserve battery on my FreeBSD machine for work</p>
</blockquote></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=L9v4Mg8wi4U&feature=youtu.be" rel="nofollow">Replacing the Unix tradition (Warning may be rage inducing)</a></li>
<li><a href="https://www.thanassis.space/remoteserial.html#remoteserial" rel="nofollow">Installing OpenBSD over remote serial on the AtomicPI</a></li>
<li><a href="https://www.dragonflydigest.com/2019/08/05/23294.html" rel="nofollow">Zen 2 and DragonFly</a></li>
<li><a href="https://blog.yukiisbo.red/posts/2019/05/improve-docking-on-freebsd/" rel="nofollow">Improve Docking on FreeBSD</a></li>
<li><a href="https://vbsdcon.com/registration" rel="nofollow">Register for vBSDCon 2019, Sept 5-7 in Reston VA. Early bird ends August 15th.</a></li>
<li><a href="https://2019.eurobsdcon.org/registration/" rel="nofollow">Register for EuroBSDCon 2019, Sept 19-22 in Lillehammer, Norway</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>JT - <a href="http://dpaste.com/0D7Y31E#wrap" rel="nofollow">Congrats</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0311.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 265: Software Disenchantment | BSD Now 265</title>
  <link>https://www.bsdnow.tv/265</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2631</guid>
  <pubDate>Thu, 27 Sep 2018 04:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/01bccaf7-cfe6-48d1-90e8-8fd66badaeb6.mp3" length="61339126" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We report from our experiences at EuroBSDcon, disenchant software, LLVM 7.0.0 has been released, Thinkpad BIOS update options, HardenedBSD Foundation announced, and ZFS send vs. rsync.</itunes:subtitle>
  <itunes:duration>1:41:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We report from our experiences at EuroBSDcon, disenchant software, LLVM 7.0.0 has been released, Thinkpad BIOS update options, HardenedBSD Foundation announced, and ZFS send vs. rsync.
&lt;p&gt;##Headlines&lt;/p&gt;
&lt;p&gt;###[FreeBSD DevSummit &amp;amp; EuroBSDcon 2018 in Romania]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Your hosts are back from EuroBSDcon 2018 held in Bucharest, Romania this year. The first two days of the conference are used for tutorials and devsummits (FreeBSD and NetBSD), while the last two are for talks.&lt;/li&gt;
&lt;li&gt;Although Benedict organized the devsummit in large parts, he did not attend it this year. He held his Ansible tutorial in the morning of the first day, followed by Niclas Zeising’s new ports and poudriere tutorial (which had a record attendance). It was intended for beginners that had never used poudriere before and those who wanted to create their first port. The tutorial was well received and Niclas already has ideas for extending it for future conferences.&lt;/li&gt;
&lt;li&gt;On the second day, Benedict took Kirk McKusick’s “An Introduction to the FreeBSD Open-Source Operating System” tutorial, held as a one full day class this year. Although it was reduced in content, it went into enough depth of many areas of the kernel and operating system to spark many questions from attendees. Clearly, this is a good start into kernel programming as Kirk provides enough material and backstories to understand why certain things are implemented as they are.&lt;/li&gt;
&lt;li&gt;Olivier Robert took &lt;a href="https://www.talegraph.com/tales/l2o9ltrvsE"&gt;https://www.talegraph.com/tales/l2o9ltrvsE&lt;/a&gt; (pictures from the devsummit) and created a nice gallery out of it.&lt;/li&gt;
&lt;li&gt;Devsummit evenings saw dinners at two restaurants that allowed developers to spend some time talking over food and drinks.&lt;/li&gt;
&lt;li&gt;The conference opened on the next day with the opening session held by Mihai Carabas. He introduced the first keynote speaker, a colleague of his who presented “Lightweight virtualization with LightVM and Unikraft”.&lt;/li&gt;
&lt;li&gt;Benedict helped out at the FreeBSD Foundation sponsor table and talked to people. He saw the following talks in between:&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Selfhosting as an alternative to the public cloud (by Albert Dengg)&lt;br&gt;
Using Boot Environments at Scale (by Allan Jude)&lt;br&gt;
Livepatching FreeBSD kernel (by Maciej Grochowski)&lt;br&gt;
FreeBSD: What to (Not) Monitor (by Andrew Fengler)&lt;br&gt;
FreeBSD Graphics (by Niclas Zeising)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Allan spent a lot of time talking to people and helping track down issues they were having, in addition to attending many talks:
&lt;blockquote&gt;
&lt;p&gt;Hacking together a FreeBSD presentation streaming box – For as little as possible (by Tom Jones)&lt;br&gt;
Introduction of FreeBSD in new environments (by Baptiste Daroussin)&lt;br&gt;
Keynote: Some computing and networking historical perspectives (by Ron Broersma)&lt;br&gt;
Livepatching FreeBSD kernel (by Maciej Grochowski)&lt;br&gt;
FreeBSD: What to (Not) Monitor (by Andrew Fengler)&lt;br&gt;
Being a BSD user (by Roller Angel)&lt;br&gt;
From “Hello World” to the VFS Layer: building a beadm for DragonFly BSD (by Michael Voight)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;We also met the winner of our Power Bagel raffle from &lt;a href="http://www.bsdnow.tv/episodes/2018_07_25-2_8_because_computers"&gt;Episode 2^8&lt;/a&gt;. He received the item in the meantime and had it with him at the conference, providing a power outlet to charge other people’s devices.&lt;/li&gt;
&lt;li&gt;During the closing session, &lt;a href="https://twitter.com/groffthebsdgoat"&gt;GroffTheBSDGoat&lt;/a&gt; was handed over to Deb Goodkin, who will bring the little guy to the &lt;a href="https://ghc.anitab.org/"&gt;Grace Hopper Celebration of Women in Computing conference&lt;/a&gt; and then to &lt;a href="http://meetbsd.com"&gt;MeetBSD&lt;/a&gt; later this year. It was also revealed that next year’s EuroBSDcon will be held in Lillehammer, Norway.&lt;/li&gt;
&lt;li&gt;Thanks to all the speakers, helpers, sponsors, organizers, and attendees for making it a successful conferences. There were no talks recorded this year, but the slides will be uploaded to the &lt;a href="http://eurobsdcon.org"&gt;EuroBSDcon website&lt;/a&gt; in a couple of weeks. The &lt;a href="https://www.openbsd.org/events.html#eurobsdcon2018"&gt;OpenBSD talks&lt;/a&gt; are already available, so check them out.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;###&lt;a href="http://tonsky.me/blog/disenchantment/"&gt;Software disenchantment&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;I’ve been programming for 15 years now. Recently our industry’s lack of care for efficiency, simplicity, and excellence started really getting to me, to the point of me getting depressed by my own career and the IT in general.&lt;br&gt;
Modern cars work, let’s say for the sake of argument, at 98% of what’s physically possible with the current engine design. Modern buildings use just enough material to fulfill their function and stay safe under the given conditions. All planes converged to the optimal size/form/load and basically look the same.&lt;br&gt;
Only in software, it’s fine if a program runs at 1% or even 0.01% of the possible performance. Everybody just seems to be ok with it. People are often even proud about how much inefficient it is, as in “why should we worry, computers are fast enough”:&lt;br&gt;
@tveastman: I have a Python program I run every day, it takes 1.5 seconds. I spent six hours re-writing it in rust, now it takes 0.06 seconds. That efficiency improvement means I’ll make my time back in 41 years, 24 days :-)&lt;br&gt;
You’ve probably heard this mantra: “programmer time is more expensive than computer time”. What it means basically is that we’re wasting computers at an unprecedented scale. Would you buy a car if it eats 100 liters per 100 kilometers? How about 1000 liters? With computers, we do that all the time.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Everything is unbearably slow&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Look around: our portable computers are thousands of times more powerful than the ones that brought man to the moon. Yet every other webpage struggles to maintain a smooth 60fps scroll on the latest top-of-the-line MacBook Pro. I can comfortably play games, watch 4K videos but not scroll web pages? How is it ok?&lt;br&gt;
Google Inbox, a web app written by Google, running in Chrome browser also by Google, takes 13 seconds to open moderately-sized emails:&lt;br&gt;
It also animates empty white boxes instead of showing their content because it’s the only way anything can be animated on a webpage with decent performance. No, decent doesn’t mean 60fps, it’s rather “as fast as this web page could possibly go”. I’m dying to see web community answer when 120Hz displays become mainstream. Shit barely hits 60Hz already.&lt;br&gt;
Windows 10 takes 30 minutes to update. What could it possibly be doing for that long? That much time is enough to fully format my SSD drive, download a fresh build and install it like 5 times in a row.&lt;br&gt;
Pavel Fatin: Typing in editor is a relatively simple process, so even 286 PCs were able to provide a rather fluid typing experience.&lt;br&gt;
Modern text editors have higher latency than 42-year-old Emacs. Text editors! What can be simpler? On each keystroke, all you have to do is update tiny rectangular region and modern text editors can’t do that in 16ms. It’s a lot of time. A LOT. A 3D game can fill the whole screen with hundreds of thousands (!!!) of polygons in the same 16ms and also process input, recalculate the world and dynamically load/unload resources. How come?&lt;br&gt;
As a general trend, we’re not getting faster software with more features. We’re getting faster hardware that runs slower software with the same features. Everything works way below the possible speed. Ever wonder why your phone needs 30 to 60 seconds to boot? Why can’t it boot, say, in one second? There are no physical limitations to that. I would love to see that. I would love to see limits reached and explored, utilizing every last bit of performance we can get for something meaningful in a meaningful way.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Everything is HUUUUGE&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;And then there’s bloat. Web apps could open up to 10× faster if you just simply block all ads. Google begs everyone to stop shooting themselves in their feet with AMP initiative—a technology solution to a problem that doesn’t need any technology, just a little bit of common sense. If you remove bloat, the web becomes crazy fast. How smart do you have to be to understand that?&lt;br&gt;
Android system with no apps takes almost 6 Gb. Just think for a second how obscenely HUGE that number is. What’s in there, HD movies? I guess it’s basically code: kernel, drivers. Some string and resources too, sure, but those can’t be big. So, how many drivers do you need for a phone?&lt;br&gt;
Windows 95 was 30Mb. Today we have web pages heavier than that! Windows 10 is 4Gb, which is 133 times as big. But is it 133 times as superior? I mean, functionally they are basically the same. Yes, we have Cortana, but I doubt it takes 3970 Mb. But whatever Windows 10 is, is Android really 150% of that?&lt;br&gt;
Google keyboard app routinely eats 150 Mb. Is an app that draws 30 keys on a screen really five times more complex than the whole Windows 95? Google app, which is basically just a package for Google Web Search, is 350 Mb! Google Play Services, which I do not use (I don’t buy books, music or videos there)—300 Mb that just sit there and which I’m unable to delete.&lt;br&gt;
All that leaves me around 1 Gb for my photos after I install all the essential (social, chats, maps, taxi, banks etc) apps. And that’s with no games and no music at all! Remember times when an OS, apps and all your data fit on a floppy?&lt;br&gt;
Your desktop todo app is probably written in Electron and thus has userland driver for Xbox 360 controller in it, can render 3d graphics and play audio and take photos with your web camera.&lt;br&gt;
A simple text chat is notorious for its load speed and memory consumption. Yes, you really have to count Slack in as a resource-heavy application. I mean, chatroom and barebones text editor, those are supposed to be two of the less demanding apps in the whole world. Welcome to 2018.&lt;br&gt;
At least it works, you might say. Well, bigger doesn’t imply better. Bigger means someone has lost control. Bigger means we don’t know what’s going on. Bigger means complexity tax, performance tax, reliability tax. This is not the norm and should not become the norm. Overweight apps should mean a red flag. They should mean run away scared.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Better world manifesto&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;I want to see progress. I want change. I want state-of-the-art in software engineering to improve, not just stand still. I don’t want to reinvent the same stuff over and over, less performant and more bloated each time. I want something to believe in, a worthy end goal, a future better than what we have today, and I want a community of engineers who share that vision.&lt;br&gt;
What we have today is not progress. We barely meet business goals with poor tools applied over the top. We’re stuck in local optima and nobody wants to move out. It’s not even a good place, it’s bloated and inefficient. We just somehow got used to it.&lt;br&gt;
So I want to call it out: where we are today is bullshit. As engineers, we can, and should, and will do better. We can have better tools, we can build better apps, faster, more predictable, more reliable, using fewer resources (orders of magnitude fewer!). We need to understand deeply what are we doing and why. We need to deliver: reliably, predictably, with topmost quality. We can—and should–take pride in our work. Not just “given what we had…”—no buts!&lt;br&gt;
I hope I’m not alone at this. I hope there are people out there who want to do the same. I’d appreciate if we at least start talking about how absurdly bad our current situation in the software industry is. And then we maybe figure out how to get out.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;##News Roundup&lt;br&gt;
&lt;a href="https://lists.llvm.org/pipermail/llvm-announce/2018-September/000080.html"&gt;[llvm-announce] LLVM 7.0.0 Release&lt;/a&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;I am pleased to announce that LLVM 7 is now available.

Get it here: https://llvm.org/releases/download.html#7.0.0

The release contains the work on trunk up to SVN revision 338536 plus
work on the release branch. It is the result of the community's work
over the past six months, including: function multiversioning in Clang
with the 'target' attribute for ELF-based x86/x86_64 targets, improved
PCH support in clang-cl, preliminary DWARF v5 support, basic support
for OpenMP 4.5 offloading to NVPTX, OpenCL C++ support, MSan, X-Ray
and libFuzzer support for FreeBSD, early UBSan, X-Ray and libFuzzer
support for OpenBSD, UBSan checks for implicit conversions, many
long-tail compatibility issues fixed in lld which is now production
ready for ELF, COFF and MinGW, new tools llvm-exegesis, llvm-mca and
diagtool. And as usual, many optimizations, improved diagnostics, and
bug fixes.

For more details, see the release notes:
https://llvm.org/releases/7.0.0/docs/ReleaseNotes.html
https://llvm.org/releases/7.0.0/tools/clang/docs/ReleaseNotes.html
https://llvm.org/releases/7.0.0/tools/clang/tools/extra/docs/ReleaseNotes.html
https://llvm.org/releases/7.0.0/tools/lld/docs/ReleaseNotes.html

Thanks to everyone who helped with filing, fixing, and code reviewing
for the release-blocking bugs!

Special thanks to the release testers and packagers: Bero
Rosenkränzer, Brian Cain, Dimitry Andric, Jonas Hahnfeld, Lei Huang
Michał Górny, Sylvestre Ledru, Takumi Nakamura, and Vedant Kumar.

For questions or comments about the release, please contact the
community on the mailing lists. Onwards to LLVM 8!

Cheers,
Hans
&lt;/code&gt;&lt;/pre&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://blog.raveland.org/post/thinkpad_update_bios/"&gt;Update your Thinkpad’s bios with Linux or OpenBSD&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get your new bios&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;At first, go to the Lenovo website and download your new bios:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Go to lenovo support&lt;/li&gt;
&lt;li&gt;Use the search bar to find your product (example for me, x270)&lt;/li&gt;
&lt;li&gt;Choose the right product (if necessary) and click search&lt;/li&gt;
&lt;li&gt;On the right side, click on Update Your System&lt;/li&gt;
&lt;li&gt;Click on BIOS/UEFI&lt;/li&gt;
&lt;li&gt;Choose *BIOS Update (Bootable CD) for Windows *&lt;/li&gt;
&lt;li&gt;Download&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;For me the file is called like this : r0iuj25wd.iso&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Extract bios update&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Now you will need to install geteltorito.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;With OpenBSD:&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;$ doas pkgadd geteltorito&lt;/code&gt;&lt;br&gt;
&lt;code&gt;quirks-3.7 signed on 2018-09-09T13:15:19Z&lt;/code&gt;&lt;br&gt;
&lt;code&gt;geteltorito-0.6: ok&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;With Debian:&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;$ sudo apt-get install genisoimage&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Now we will extract the bios update :&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;$ geteltorito -o biosupdate.img r0iuj25wd.iso&lt;/code&gt;&lt;br&gt;
&lt;code&gt;Booting catalog starts at sector: 20&lt;/code&gt;&lt;br&gt;
&lt;code&gt;Manufacturer of CD: NERO BURNING ROM VER 12&lt;/code&gt;&lt;br&gt;
&lt;code&gt;Image architecture: x86&lt;/code&gt;&lt;br&gt;
&lt;code&gt;Boot media type is: harddisk&lt;/code&gt;&lt;br&gt;
&lt;code&gt;El Torito image starts at sector 27 and has 43008 sector(s) of 512 Bytes&lt;/code&gt;&lt;br&gt;
&lt;code&gt;&lt;/code&gt;&lt;br&gt;
&lt;code&gt;Image has been written to file "biosupdate.img".&lt;/code&gt;&lt;br&gt;
&lt;code&gt;This will create a file called biosupdate.img.&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Put the image on an USB key&lt;/li&gt;
&lt;li&gt;CAREFULL : on my computer, my USB key is sda1 on Linux and sd1 on OpenBSD.&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Please check twice on your computer the name of your USB key.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;With OpenBSD :&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;$ doas dd if=biosupdate.img of=/dev/rsd1c&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;With Linux :&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;$ sudo dd if=biosupdate.img of=/dev/sda&lt;/code&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Now all you need is to reboot, to boot on your USB key and follow the instructions. Enjoy 😉&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://hardenedbsd.org/article/shawn-webb/2018-09-17/announcing-hardenedbsd-foundation"&gt;Announcing The HardenedBSD Foundation&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In June of 2018, we announced our intent to become a not-for-profit, tax-exempt 501©(3) organization in the United States. It took a dedicated team months of work behind-the-scenes to make that happen. On 06 September 2018, HardenedBSD Foundation Corp was granted 501©(3) status, from which point all US-based persons making donations can deduct the donation from their taxes.&lt;br&gt;
We are grateful for those who contribute to HardenedBSD in whatever way they can. Thank you for making HardenedBSD possible. We look forward to a bright future, driven by a helpful and positive community.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://utcc.utoronto.ca/~cks/space/blog/solaris/ZFSSendRecvVsRsync"&gt;How you migrate ZFS filesystems matters&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;If you want to move a ZFS filesystem around from one host to another, you have two general approaches; you can use ‘zfs send’ and ‘zfs receive’, or you can use a user level copying tool such as rsync (or ‘tar -cf | tar -xf’, or any number of similar options). Until recently, I had considered these two approaches to be more or less equivalent apart from their convenience and speed (which generally tilted in favour of ‘zfs send’). It turns out that this is not necessarily the case and there are situations where you will want one instead of the other.&lt;br&gt;
We have had two generations of ZFS fileservers so far, the Solaris ones and the OmniOS ones. When we moved from the first generation to the second generation, we migrated filesystems across using ‘zfs send’, including the filesystem with my home directory in it (we did this for various reasons). Recently I discovered that some old things in my filesystem didn’t have file type information in their directory entries. ZFS has been adding file type information to directories for a long time, but not quite as long as my home directory has been on ZFS.&lt;br&gt;
This illustrates an important difference between the ‘zfs send’ approach and the rsync approach, which is that zfs send doesn’t update or change at least some ZFS on-disk data structures, in the way that re-writing them from scratch from user level does. There are both positives and negatives to this, and a certain amount of rewriting does happen even in the ‘zfs send’ case (for example, all of the block pointers get changed, and ZFS will re-compress your data as applicable).&lt;br&gt;
I knew that in theory you had to copy things at the user level if you wanted to make sure that your ZFS filesystem and everything in it was fully up to date with the latest ZFS features. But I didn’t expect to hit a situation where it mattered in practice until, well, I did. Now I suspect that old files on our old filesystems may be partially missing a number of things, and I’m wondering how much of the various changes in ‘zfs upgrade -v’ apply even to old data.&lt;br&gt;
(I’d run into this sort of general thing before when I looked into ext3 to ext4 conversion on Linux.)&lt;br&gt;
With all that said, I doubt this will change our plans for migrating our ZFS filesystems in the future (to our third generation fileservers). ZFS sending and receiving is just too convenient, too fast and too reliable to give up. Rsync isn’t bad, but it’s not the same, and so we only use it when we have to (when we’re moving only some of the people in a filesystem instead of all of them, for example).&lt;br&gt;
PS: I was going to try to say something about what ‘zfs send’ did and didn’t update, but having looked briefly at the code I’ve concluded that I need to do more research before running my keyboard off. In the mean time, you can read the OpenZFS wiki page on ZFS send and receive, which has plenty of juicy technical details.&lt;br&gt;
PPS: Since eliminating all-zero blocks is a form of compression, you can turn zero-filled files into sparse files through a ZFS send/receive if the destination has compression enabled. As far as I know, genuine sparse files on the source will stay sparse through a ZFS send/receive even if they’re sent to a destination with compression off.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;##Beastie Bits&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/BSD-Users-Stockholm/events/254235663/"&gt;BSD Users Stockholm Meetup #4: Tuesday, November 13, 2018 at 18:00&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bsd-pl.org/en"&gt;BSD Poland User Group: Next Meeting: October 11, 2018, 18:15 - 21:15 at Warsaw University of Technology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20180915112028"&gt;n2k18 Hackathon report: Ken Westerback (krw@) on disklabel(8) work, dhclient(8) progress&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.xenproject.org/archives/html/mirageos-devel/2018-09/msg00013.html"&gt;Running MirageOS Unikernels on OpenBSD in vmm (Now Works)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20180910070407"&gt;vmm(4) gets support for qcow2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oshogbo.vexillium.org/blog/52/"&gt;MeetBSD and SecurityBsides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/cperciva/status/1041433506453155840"&gt;Colin Percival reduced FreeBSD startup time from 10627ms (11.2) to 4738ms (12.0)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2018-September/001842.html"&gt;FreeBSD 11.1 end-of-life&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/KnoxBUG-BSD-Linux-and-FOSS-Users-Unite/events/254759084"&gt;KnoxBug: Monday, October 1, 2018 at 18:00: Real-world Performance Advantages of NVDIMM and NVMe: Case Study with OpenZFS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;##Feedback/Questions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Todd - &lt;a href="http://dpaste.com/2QZEZPA"&gt;2 Nics, 1 bhyve and a jail cell&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Thomas - &lt;a href="http://dpaste.com/3SFM1YP#wrap"&gt;Deep Dive&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Morgan - &lt;a href="http://dpaste.com/07EK4RK#wrap"&gt;Send/Receive to Manage Fragmentation?&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Dominik - &lt;a href="http://dpaste.com/0SZJ0V4#wrap"&gt;hierarchical jails -&amp;gt; networking&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, ZFS rsync, Thinkpad, BIOS, LLVM, eurobsdcon, trip report, conference, bsd conference</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We report from our experiences at EuroBSDcon, disenchant software, LLVM 7.0.0 has been released, Thinkpad BIOS update options, HardenedBSD Foundation announced, and ZFS send vs. rsync.</p>

<p>##Headlines</p>

<p>###[FreeBSD DevSummit &amp; EuroBSDcon 2018 in Romania]</p>

<ul>
<li>Your hosts are back from EuroBSDcon 2018 held in Bucharest, Romania this year. The first two days of the conference are used for tutorials and devsummits (FreeBSD and NetBSD), while the last two are for talks.</li>
<li>Although Benedict organized the devsummit in large parts, he did not attend it this year. He held his Ansible tutorial in the morning of the first day, followed by Niclas Zeising’s new ports and poudriere tutorial (which had a record attendance). It was intended for beginners that had never used poudriere before and those who wanted to create their first port. The tutorial was well received and Niclas already has ideas for extending it for future conferences.</li>
<li>On the second day, Benedict took Kirk McKusick’s “An Introduction to the FreeBSD Open-Source Operating System” tutorial, held as a one full day class this year. Although it was reduced in content, it went into enough depth of many areas of the kernel and operating system to spark many questions from attendees. Clearly, this is a good start into kernel programming as Kirk provides enough material and backstories to understand why certain things are implemented as they are.</li>
<li>Olivier Robert took [<a href="https://www.talegraph.com/tales/l2o9ltrvsE">https://www.talegraph.com/tales/l2o9ltrvsE</a>](pictures from the devsummit) and created a nice gallery out of it.</li>
<li>Devsummit evenings saw dinners at two restaurants that allowed developers to spend some time talking over food and drinks.</li>
<li>The conference opened on the next day with the opening session held by Mihai Carabas. He introduced the first keynote speaker, a colleague of his who presented “Lightweight virtualization with LightVM and Unikraft”.</li>
<li>Benedict helped out at the FreeBSD Foundation sponsor table and talked to people. He saw the following talks in between:</li>
</ul>

<blockquote>
<p>Selfhosting as an alternative to the public cloud (by Albert Dengg)<br>
Using Boot Environments at Scale (by Allan Jude)<br>
Livepatching FreeBSD kernel (by Maciej Grochowski)<br>
FreeBSD: What to (Not) Monitor (by Andrew Fengler)<br>
FreeBSD Graphics (by Niclas Zeising)</p>
</blockquote>

<ul>
<li>Allan spent a lot of time talking to people and helping track down issues they were having, in addition to attending many talks:
<blockquote>
<p>Hacking together a FreeBSD presentation streaming box – For as little as possible (by Tom Jones)<br>
Introduction of FreeBSD in new environments (by Baptiste Daroussin)<br>
Keynote: Some computing and networking historical perspectives (by Ron Broersma)<br>
Livepatching FreeBSD kernel (by Maciej Grochowski)<br>
FreeBSD: What to (Not) Monitor (by Andrew Fengler)<br>
Being a BSD user (by Roller Angel)<br>
From “Hello World” to the VFS Layer: building a beadm for DragonFly BSD (by Michael Voight)</p>
</blockquote>
</li>
<li>We also met the winner of our Power Bagel raffle from <a href="http://www.bsdnow.tv/episodes/2018_07_25-2_8_because_computers">Episode 2^8</a>. He received the item in the meantime and had it with him at the conference, providing a power outlet to charge other people’s devices.</li>
<li>During the closing session, <a href="https://twitter.com/groffthebsdgoat">GroffTheBSDGoat</a> was handed over to Deb Goodkin, who will bring the little guy to the <a href="https://ghc.anitab.org/">Grace Hopper Celebration of Women in Computing conference</a> and then to <a href="http://meetbsd.com">MeetBSD</a> later this year. It was also revealed that next year’s EuroBSDcon will be held in Lillehammer, Norway.</li>
<li>Thanks to all the speakers, helpers, sponsors, organizers, and attendees for making it a successful conferences. There were no talks recorded this year, but the slides will be uploaded to the <a href="http://eurobsdcon.org">EuroBSDcon website</a> in a couple of weeks. The <a href="https://www.openbsd.org/events.html#eurobsdcon2018">OpenBSD talks</a> are already available, so check them out.</li>
</ul>

<p>###<a href="http://tonsky.me/blog/disenchantment/">Software disenchantment</a></p>

<blockquote>
<p>I’ve been programming for 15 years now. Recently our industry’s lack of care for efficiency, simplicity, and excellence started really getting to me, to the point of me getting depressed by my own career and the IT in general.<br>
Modern cars work, let’s say for the sake of argument, at 98% of what’s physically possible with the current engine design. Modern buildings use just enough material to fulfill their function and stay safe under the given conditions. All planes converged to the optimal size/form/load and basically look the same.<br>
Only in software, it’s fine if a program runs at 1% or even 0.01% of the possible performance. Everybody just seems to be ok with it. People are often even proud about how much inefficient it is, as in “why should we worry, computers are fast enough”:<br>
@tveastman: I have a Python program I run every day, it takes 1.5 seconds. I spent six hours re-writing it in rust, now it takes 0.06 seconds. That efficiency improvement means I’ll make my time back in 41 years, 24 days :-)<br>
You’ve probably heard this mantra: “programmer time is more expensive than computer time”. What it means basically is that we’re wasting computers at an unprecedented scale. Would you buy a car if it eats 100 liters per 100 kilometers? How about 1000 liters? With computers, we do that all the time.</p>
</blockquote>

<ul>
<li>Everything is unbearably slow</li>
</ul>

<blockquote>
<p>Look around: our portable computers are thousands of times more powerful than the ones that brought man to the moon. Yet every other webpage struggles to maintain a smooth 60fps scroll on the latest top-of-the-line MacBook Pro. I can comfortably play games, watch 4K videos but not scroll web pages? How is it ok?<br>
Google Inbox, a web app written by Google, running in Chrome browser also by Google, takes 13 seconds to open moderately-sized emails:<br>
It also animates empty white boxes instead of showing their content because it’s the only way anything can be animated on a webpage with decent performance. No, decent doesn’t mean 60fps, it’s rather “as fast as this web page could possibly go”. I’m dying to see web community answer when 120Hz displays become mainstream. Shit barely hits 60Hz already.<br>
Windows 10 takes 30 minutes to update. What could it possibly be doing for that long? That much time is enough to fully format my SSD drive, download a fresh build and install it like 5 times in a row.<br>
Pavel Fatin: Typing in editor is a relatively simple process, so even 286 PCs were able to provide a rather fluid typing experience.<br>
Modern text editors have higher latency than 42-year-old Emacs. Text editors! What can be simpler? On each keystroke, all you have to do is update tiny rectangular region and modern text editors can’t do that in 16ms. It’s a lot of time. A LOT. A 3D game can fill the whole screen with hundreds of thousands (!!!) of polygons in the same 16ms and also process input, recalculate the world and dynamically load/unload resources. How come?<br>
As a general trend, we’re not getting faster software with more features. We’re getting faster hardware that runs slower software with the same features. Everything works way below the possible speed. Ever wonder why your phone needs 30 to 60 seconds to boot? Why can’t it boot, say, in one second? There are no physical limitations to that. I would love to see that. I would love to see limits reached and explored, utilizing every last bit of performance we can get for something meaningful in a meaningful way.</p>
</blockquote>

<ul>
<li>Everything is HUUUUGE</li>
</ul>

<blockquote>
<p>And then there’s bloat. Web apps could open up to 10× faster if you just simply block all ads. Google begs everyone to stop shooting themselves in their feet with AMP initiative—a technology solution to a problem that doesn’t need any technology, just a little bit of common sense. If you remove bloat, the web becomes crazy fast. How smart do you have to be to understand that?<br>
Android system with no apps takes almost 6 Gb. Just think for a second how obscenely HUGE that number is. What’s in there, HD movies? I guess it’s basically code: kernel, drivers. Some string and resources too, sure, but those can’t be big. So, how many drivers do you need for a phone?<br>
Windows 95 was 30Mb. Today we have web pages heavier than that! Windows 10 is 4Gb, which is 133 times as big. But is it 133 times as superior? I mean, functionally they are basically the same. Yes, we have Cortana, but I doubt it takes 3970 Mb. But whatever Windows 10 is, is Android really 150% of that?<br>
Google keyboard app routinely eats 150 Mb. Is an app that draws 30 keys on a screen really five times more complex than the whole Windows 95? Google app, which is basically just a package for Google Web Search, is 350 Mb! Google Play Services, which I do not use (I don’t buy books, music or videos there)—300 Mb that just sit there and which I’m unable to delete.<br>
All that leaves me around 1 Gb for my photos after I install all the essential (social, chats, maps, taxi, banks etc) apps. And that’s with no games and no music at all! Remember times when an OS, apps and all your data fit on a floppy?<br>
Your desktop todo app is probably written in Electron and thus has userland driver for Xbox 360 controller in it, can render 3d graphics and play audio and take photos with your web camera.<br>
A simple text chat is notorious for its load speed and memory consumption. Yes, you really have to count Slack in as a resource-heavy application. I mean, chatroom and barebones text editor, those are supposed to be two of the less demanding apps in the whole world. Welcome to 2018.<br>
At least it works, you might say. Well, bigger doesn’t imply better. Bigger means someone has lost control. Bigger means we don’t know what’s going on. Bigger means complexity tax, performance tax, reliability tax. This is not the norm and should not become the norm. Overweight apps should mean a red flag. They should mean run away scared.</p>
</blockquote>

<ul>
<li>Better world manifesto</li>
</ul>

<blockquote>
<p>I want to see progress. I want change. I want state-of-the-art in software engineering to improve, not just stand still. I don’t want to reinvent the same stuff over and over, less performant and more bloated each time. I want something to believe in, a worthy end goal, a future better than what we have today, and I want a community of engineers who share that vision.<br>
What we have today is not progress. We barely meet business goals with poor tools applied over the top. We’re stuck in local optima and nobody wants to move out. It’s not even a good place, it’s bloated and inefficient. We just somehow got used to it.<br>
So I want to call it out: where we are today is bullshit. As engineers, we can, and should, and will do better. We can have better tools, we can build better apps, faster, more predictable, more reliable, using fewer resources (orders of magnitude fewer!). We need to understand deeply what are we doing and why. We need to deliver: reliably, predictably, with topmost quality. We can—and should–take pride in our work. Not just “given what we had…”—no buts!<br>
I hope I’m not alone at this. I hope there are people out there who want to do the same. I’d appreciate if we at least start talking about how absurdly bad our current situation in the software industry is. And then we maybe figure out how to get out.</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://lists.llvm.org/pipermail/llvm-announce/2018-September/000080.html">[llvm-announce] LLVM 7.0.0 Release</a></p>

<pre><code>I am pleased to announce that LLVM 7 is now available.

Get it here: https://llvm.org/releases/download.html#7.0.0

The release contains the work on trunk up to SVN revision 338536 plus
work on the release branch. It is the result of the community's work
over the past six months, including: function multiversioning in Clang
with the 'target' attribute for ELF-based x86/x86_64 targets, improved
PCH support in clang-cl, preliminary DWARF v5 support, basic support
for OpenMP 4.5 offloading to NVPTX, OpenCL C++ support, MSan, X-Ray
and libFuzzer support for FreeBSD, early UBSan, X-Ray and libFuzzer
support for OpenBSD, UBSan checks for implicit conversions, many
long-tail compatibility issues fixed in lld which is now production
ready for ELF, COFF and MinGW, new tools llvm-exegesis, llvm-mca and
diagtool. And as usual, many optimizations, improved diagnostics, and
bug fixes.

For more details, see the release notes:
https://llvm.org/releases/7.0.0/docs/ReleaseNotes.html
https://llvm.org/releases/7.0.0/tools/clang/docs/ReleaseNotes.html
https://llvm.org/releases/7.0.0/tools/clang/tools/extra/docs/ReleaseNotes.html
https://llvm.org/releases/7.0.0/tools/lld/docs/ReleaseNotes.html

Thanks to everyone who helped with filing, fixing, and code reviewing
for the release-blocking bugs!

Special thanks to the release testers and packagers: Bero
Rosenkränzer, Brian Cain, Dimitry Andric, Jonas Hahnfeld, Lei Huang
Michał Górny, Sylvestre Ledru, Takumi Nakamura, and Vedant Kumar.

For questions or comments about the release, please contact the
community on the mailing lists. Onwards to LLVM 8!

Cheers,
Hans
</code></pre>

<p><hr></p>

<p>###<a href="https://blog.raveland.org/post/thinkpad_update_bios/">Update your Thinkpad’s bios with Linux or OpenBSD</a></p>

<ul>
<li>Get your new bios</li>
</ul>

<blockquote>
<p>At first, go to the Lenovo website and download your new bios:</p>
</blockquote>

<ul>
<li>Go to lenovo support</li>
<li>Use the search bar to find your product (example for me, x270)</li>
<li>Choose the right product (if necessary) and click search</li>
<li>On the right side, click on Update Your System</li>
<li>Click on BIOS/UEFI</li>
<li>Choose *BIOS Update (Bootable CD) for Windows *</li>
<li>Download</li>
</ul>

<blockquote>
<p>For me the file is called like this : r0iuj25wd.iso</p>
</blockquote>

<ul>
<li>Extract bios update</li>
</ul>

<blockquote>
<p>Now you will need to install geteltorito.</p>
</blockquote>

<ul>
<li>With OpenBSD:</li>
</ul>

<p><code>$ doas pkg_add geteltorito</code><br>
<code>quirks-3.7 signed on 2018-09-09T13:15:19Z</code><br>
<code>geteltorito-0.6: ok</code></p>

<ul>
<li>With Debian:</li>
</ul>

<p><code>$ sudo apt-get install genisoimage</code></p>

<ul>
<li>Now we will extract the bios update :</li>
</ul>

<p><code>$ geteltorito -o bios_update.img r0iuj25wd.iso</code><br>
<code>Booting catalog starts at sector: 20</code><br>
<code>Manufacturer of CD: NERO BURNING ROM VER 12</code><br>
<code>Image architecture: x86</code><br>
<code>Boot media type is: harddisk</code><br>
<code>El Torito image starts at sector 27 and has 43008 sector(s) of 512 Bytes</code><br>
<code></code><br>
<code>Image has been written to file &quot;bios_update.img&quot;.</code><br>
<code>This will create a file called bios_update.img.</code></p>

<ul>
<li>Put the image on an USB key</li>
<li>CAREFULL : on my computer, my USB key is sda1 on Linux and sd1 on OpenBSD.</li>
</ul>

<blockquote>
<p>Please check twice on your computer the name of your USB key.</p>
</blockquote>

<ul>
<li>With OpenBSD :</li>
</ul>

<p><code>$ doas dd if=bios_update.img of=/dev/rsd1c</code></p>

<ul>
<li>With Linux :</li>
</ul>

<p><code>$ sudo dd if=bios_update.img of=/dev/sda</code></p>

<blockquote>
<p>Now all you need is to reboot, to boot on your USB key and follow the instructions. Enjoy &#x1f609;</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://hardenedbsd.org/article/shawn-webb/2018-09-17/announcing-hardenedbsd-foundation">Announcing The HardenedBSD Foundation</a></p>

<blockquote>
<p>In June of 2018, we announced our intent to become a not-for-profit, tax-exempt 501©(3) organization in the United States. It took a dedicated team months of work behind-the-scenes to make that happen. On 06 September 2018, HardenedBSD Foundation Corp was granted 501©(3) status, from which point all US-based persons making donations can deduct the donation from their taxes.<br>
We are grateful for those who contribute to HardenedBSD in whatever way they can. Thank you for making HardenedBSD possible. We look forward to a bright future, driven by a helpful and positive community.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://utcc.utoronto.ca/~cks/space/blog/solaris/ZFSSendRecvVsRsync">How you migrate ZFS filesystems matters</a></p>

<blockquote>
<p>If you want to move a ZFS filesystem around from one host to another, you have two general approaches; you can use ‘zfs send’ and ‘zfs receive’, or you can use a user level copying tool such as rsync (or ‘tar -cf | tar -xf’, or any number of similar options). Until recently, I had considered these two approaches to be more or less equivalent apart from their convenience and speed (which generally tilted in favour of ‘zfs send’). It turns out that this is not necessarily the case and there are situations where you will want one instead of the other.<br>
We have had two generations of ZFS fileservers so far, the Solaris ones and the OmniOS ones. When we moved from the first generation to the second generation, we migrated filesystems across using ‘zfs send’, including the filesystem with my home directory in it (we did this for various reasons). Recently I discovered that some old things in my filesystem didn’t have file type information in their directory entries. ZFS has been adding file type information to directories for a long time, but not quite as long as my home directory has been on ZFS.<br>
This illustrates an important difference between the ‘zfs send’ approach and the rsync approach, which is that zfs send doesn’t update or change at least some ZFS on-disk data structures, in the way that re-writing them from scratch from user level does. There are both positives and negatives to this, and a certain amount of rewriting does happen even in the ‘zfs send’ case (for example, all of the block pointers get changed, and ZFS will re-compress your data as applicable).<br>
I knew that in theory you had to copy things at the user level if you wanted to make sure that your ZFS filesystem and everything in it was fully up to date with the latest ZFS features. But I didn’t expect to hit a situation where it mattered in practice until, well, I did. Now I suspect that old files on our old filesystems may be partially missing a number of things, and I’m wondering how much of the various changes in ‘zfs upgrade -v’ apply even to old data.<br>
(I’d run into this sort of general thing before when I looked into ext3 to ext4 conversion on Linux.)<br>
With all that said, I doubt this will change our plans for migrating our ZFS filesystems in the future (to our third generation fileservers). ZFS sending and receiving is just too convenient, too fast and too reliable to give up. Rsync isn’t bad, but it’s not the same, and so we only use it when we have to (when we’re moving only some of the people in a filesystem instead of all of them, for example).<br>
PS: I was going to try to say something about what ‘zfs send’ did and didn’t update, but having looked briefly at the code I’ve concluded that I need to do more research before running my keyboard off. In the mean time, you can read the OpenZFS wiki page on ZFS send and receive, which has plenty of juicy technical details.<br>
PPS: Since eliminating all-zero blocks is a form of compression, you can turn zero-filled files into sparse files through a ZFS send/receive if the destination has compression enabled. As far as I know, genuine sparse files on the source will stay sparse through a ZFS send/receive even if they’re sent to a destination with compression off.</p>
</blockquote>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/254235663/">BSD Users Stockholm Meetup #4: Tuesday, November 13, 2018 at 18:00</a></li>
<li><a href="https://bsd-pl.org/en">BSD Poland User Group: Next Meeting: October 11, 2018, 18:15 - 21:15 at Warsaw University of Technology</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20180915112028">n2k18 Hackathon report: Ken Westerback (krw@) on disklabel(8) work, dhclient(8) progress</a></li>
<li><a href="https://lists.xenproject.org/archives/html/mirageos-devel/2018-09/msg00013.html">Running MirageOS Unikernels on OpenBSD in vmm (Now Works)</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20180910070407">vmm(4) gets support for qcow2</a></li>
<li><a href="https://oshogbo.vexillium.org/blog/52/">MeetBSD and SecurityBsides</a></li>
<li><a href="https://twitter.com/cperciva/status/1041433506453155840">Colin Percival reduced FreeBSD startup time from 10627ms (11.2) to 4738ms (12.0)</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2018-September/001842.html">FreeBSD 11.1 end-of-life</a></li>
<li><a href="https://www.meetup.com/KnoxBUG-BSD-Linux-and-FOSS-Users-Unite/events/254759084">KnoxBug: Monday, October 1, 2018 at 18:00: Real-world Performance Advantages of NVDIMM and NVMe: Case Study with OpenZFS</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Todd - <a href="http://dpaste.com/2QZEZPA">2 Nics, 1 bhyve and a jail cell</a></li>
<li>Thomas - <a href="http://dpaste.com/3SFM1YP#wrap">Deep Dive</a></li>
<li>Morgan - <a href="http://dpaste.com/07EK4RK#wrap">Send/Receive to Manage Fragmentation?</a></li>
<li>Dominik - <a href="http://dpaste.com/0SZJ0V4#wrap">hierarchical jails -&gt; networking</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We report from our experiences at EuroBSDcon, disenchant software, LLVM 7.0.0 has been released, Thinkpad BIOS update options, HardenedBSD Foundation announced, and ZFS send vs. rsync.</p>

<p>##Headlines</p>

<p>###[FreeBSD DevSummit &amp; EuroBSDcon 2018 in Romania]</p>

<ul>
<li>Your hosts are back from EuroBSDcon 2018 held in Bucharest, Romania this year. The first two days of the conference are used for tutorials and devsummits (FreeBSD and NetBSD), while the last two are for talks.</li>
<li>Although Benedict organized the devsummit in large parts, he did not attend it this year. He held his Ansible tutorial in the morning of the first day, followed by Niclas Zeising’s new ports and poudriere tutorial (which had a record attendance). It was intended for beginners that had never used poudriere before and those who wanted to create their first port. The tutorial was well received and Niclas already has ideas for extending it for future conferences.</li>
<li>On the second day, Benedict took Kirk McKusick’s “An Introduction to the FreeBSD Open-Source Operating System” tutorial, held as a one full day class this year. Although it was reduced in content, it went into enough depth of many areas of the kernel and operating system to spark many questions from attendees. Clearly, this is a good start into kernel programming as Kirk provides enough material and backstories to understand why certain things are implemented as they are.</li>
<li>Olivier Robert took [<a href="https://www.talegraph.com/tales/l2o9ltrvsE">https://www.talegraph.com/tales/l2o9ltrvsE</a>](pictures from the devsummit) and created a nice gallery out of it.</li>
<li>Devsummit evenings saw dinners at two restaurants that allowed developers to spend some time talking over food and drinks.</li>
<li>The conference opened on the next day with the opening session held by Mihai Carabas. He introduced the first keynote speaker, a colleague of his who presented “Lightweight virtualization with LightVM and Unikraft”.</li>
<li>Benedict helped out at the FreeBSD Foundation sponsor table and talked to people. He saw the following talks in between:</li>
</ul>

<blockquote>
<p>Selfhosting as an alternative to the public cloud (by Albert Dengg)<br>
Using Boot Environments at Scale (by Allan Jude)<br>
Livepatching FreeBSD kernel (by Maciej Grochowski)<br>
FreeBSD: What to (Not) Monitor (by Andrew Fengler)<br>
FreeBSD Graphics (by Niclas Zeising)</p>
</blockquote>

<ul>
<li>Allan spent a lot of time talking to people and helping track down issues they were having, in addition to attending many talks:
<blockquote>
<p>Hacking together a FreeBSD presentation streaming box – For as little as possible (by Tom Jones)<br>
Introduction of FreeBSD in new environments (by Baptiste Daroussin)<br>
Keynote: Some computing and networking historical perspectives (by Ron Broersma)<br>
Livepatching FreeBSD kernel (by Maciej Grochowski)<br>
FreeBSD: What to (Not) Monitor (by Andrew Fengler)<br>
Being a BSD user (by Roller Angel)<br>
From “Hello World” to the VFS Layer: building a beadm for DragonFly BSD (by Michael Voight)</p>
</blockquote>
</li>
<li>We also met the winner of our Power Bagel raffle from <a href="http://www.bsdnow.tv/episodes/2018_07_25-2_8_because_computers">Episode 2^8</a>. He received the item in the meantime and had it with him at the conference, providing a power outlet to charge other people’s devices.</li>
<li>During the closing session, <a href="https://twitter.com/groffthebsdgoat">GroffTheBSDGoat</a> was handed over to Deb Goodkin, who will bring the little guy to the <a href="https://ghc.anitab.org/">Grace Hopper Celebration of Women in Computing conference</a> and then to <a href="http://meetbsd.com">MeetBSD</a> later this year. It was also revealed that next year’s EuroBSDcon will be held in Lillehammer, Norway.</li>
<li>Thanks to all the speakers, helpers, sponsors, organizers, and attendees for making it a successful conferences. There were no talks recorded this year, but the slides will be uploaded to the <a href="http://eurobsdcon.org">EuroBSDcon website</a> in a couple of weeks. The <a href="https://www.openbsd.org/events.html#eurobsdcon2018">OpenBSD talks</a> are already available, so check them out.</li>
</ul>

<p>###<a href="http://tonsky.me/blog/disenchantment/">Software disenchantment</a></p>

<blockquote>
<p>I’ve been programming for 15 years now. Recently our industry’s lack of care for efficiency, simplicity, and excellence started really getting to me, to the point of me getting depressed by my own career and the IT in general.<br>
Modern cars work, let’s say for the sake of argument, at 98% of what’s physically possible with the current engine design. Modern buildings use just enough material to fulfill their function and stay safe under the given conditions. All planes converged to the optimal size/form/load and basically look the same.<br>
Only in software, it’s fine if a program runs at 1% or even 0.01% of the possible performance. Everybody just seems to be ok with it. People are often even proud about how much inefficient it is, as in “why should we worry, computers are fast enough”:<br>
@tveastman: I have a Python program I run every day, it takes 1.5 seconds. I spent six hours re-writing it in rust, now it takes 0.06 seconds. That efficiency improvement means I’ll make my time back in 41 years, 24 days :-)<br>
You’ve probably heard this mantra: “programmer time is more expensive than computer time”. What it means basically is that we’re wasting computers at an unprecedented scale. Would you buy a car if it eats 100 liters per 100 kilometers? How about 1000 liters? With computers, we do that all the time.</p>
</blockquote>

<ul>
<li>Everything is unbearably slow</li>
</ul>

<blockquote>
<p>Look around: our portable computers are thousands of times more powerful than the ones that brought man to the moon. Yet every other webpage struggles to maintain a smooth 60fps scroll on the latest top-of-the-line MacBook Pro. I can comfortably play games, watch 4K videos but not scroll web pages? How is it ok?<br>
Google Inbox, a web app written by Google, running in Chrome browser also by Google, takes 13 seconds to open moderately-sized emails:<br>
It also animates empty white boxes instead of showing their content because it’s the only way anything can be animated on a webpage with decent performance. No, decent doesn’t mean 60fps, it’s rather “as fast as this web page could possibly go”. I’m dying to see web community answer when 120Hz displays become mainstream. Shit barely hits 60Hz already.<br>
Windows 10 takes 30 minutes to update. What could it possibly be doing for that long? That much time is enough to fully format my SSD drive, download a fresh build and install it like 5 times in a row.<br>
Pavel Fatin: Typing in editor is a relatively simple process, so even 286 PCs were able to provide a rather fluid typing experience.<br>
Modern text editors have higher latency than 42-year-old Emacs. Text editors! What can be simpler? On each keystroke, all you have to do is update tiny rectangular region and modern text editors can’t do that in 16ms. It’s a lot of time. A LOT. A 3D game can fill the whole screen with hundreds of thousands (!!!) of polygons in the same 16ms and also process input, recalculate the world and dynamically load/unload resources. How come?<br>
As a general trend, we’re not getting faster software with more features. We’re getting faster hardware that runs slower software with the same features. Everything works way below the possible speed. Ever wonder why your phone needs 30 to 60 seconds to boot? Why can’t it boot, say, in one second? There are no physical limitations to that. I would love to see that. I would love to see limits reached and explored, utilizing every last bit of performance we can get for something meaningful in a meaningful way.</p>
</blockquote>

<ul>
<li>Everything is HUUUUGE</li>
</ul>

<blockquote>
<p>And then there’s bloat. Web apps could open up to 10× faster if you just simply block all ads. Google begs everyone to stop shooting themselves in their feet with AMP initiative—a technology solution to a problem that doesn’t need any technology, just a little bit of common sense. If you remove bloat, the web becomes crazy fast. How smart do you have to be to understand that?<br>
Android system with no apps takes almost 6 Gb. Just think for a second how obscenely HUGE that number is. What’s in there, HD movies? I guess it’s basically code: kernel, drivers. Some string and resources too, sure, but those can’t be big. So, how many drivers do you need for a phone?<br>
Windows 95 was 30Mb. Today we have web pages heavier than that! Windows 10 is 4Gb, which is 133 times as big. But is it 133 times as superior? I mean, functionally they are basically the same. Yes, we have Cortana, but I doubt it takes 3970 Mb. But whatever Windows 10 is, is Android really 150% of that?<br>
Google keyboard app routinely eats 150 Mb. Is an app that draws 30 keys on a screen really five times more complex than the whole Windows 95? Google app, which is basically just a package for Google Web Search, is 350 Mb! Google Play Services, which I do not use (I don’t buy books, music or videos there)—300 Mb that just sit there and which I’m unable to delete.<br>
All that leaves me around 1 Gb for my photos after I install all the essential (social, chats, maps, taxi, banks etc) apps. And that’s with no games and no music at all! Remember times when an OS, apps and all your data fit on a floppy?<br>
Your desktop todo app is probably written in Electron and thus has userland driver for Xbox 360 controller in it, can render 3d graphics and play audio and take photos with your web camera.<br>
A simple text chat is notorious for its load speed and memory consumption. Yes, you really have to count Slack in as a resource-heavy application. I mean, chatroom and barebones text editor, those are supposed to be two of the less demanding apps in the whole world. Welcome to 2018.<br>
At least it works, you might say. Well, bigger doesn’t imply better. Bigger means someone has lost control. Bigger means we don’t know what’s going on. Bigger means complexity tax, performance tax, reliability tax. This is not the norm and should not become the norm. Overweight apps should mean a red flag. They should mean run away scared.</p>
</blockquote>

<ul>
<li>Better world manifesto</li>
</ul>

<blockquote>
<p>I want to see progress. I want change. I want state-of-the-art in software engineering to improve, not just stand still. I don’t want to reinvent the same stuff over and over, less performant and more bloated each time. I want something to believe in, a worthy end goal, a future better than what we have today, and I want a community of engineers who share that vision.<br>
What we have today is not progress. We barely meet business goals with poor tools applied over the top. We’re stuck in local optima and nobody wants to move out. It’s not even a good place, it’s bloated and inefficient. We just somehow got used to it.<br>
So I want to call it out: where we are today is bullshit. As engineers, we can, and should, and will do better. We can have better tools, we can build better apps, faster, more predictable, more reliable, using fewer resources (orders of magnitude fewer!). We need to understand deeply what are we doing and why. We need to deliver: reliably, predictably, with topmost quality. We can—and should–take pride in our work. Not just “given what we had…”—no buts!<br>
I hope I’m not alone at this. I hope there are people out there who want to do the same. I’d appreciate if we at least start talking about how absurdly bad our current situation in the software industry is. And then we maybe figure out how to get out.</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://lists.llvm.org/pipermail/llvm-announce/2018-September/000080.html">[llvm-announce] LLVM 7.0.0 Release</a></p>

<pre><code>I am pleased to announce that LLVM 7 is now available.

Get it here: https://llvm.org/releases/download.html#7.0.0

The release contains the work on trunk up to SVN revision 338536 plus
work on the release branch. It is the result of the community's work
over the past six months, including: function multiversioning in Clang
with the 'target' attribute for ELF-based x86/x86_64 targets, improved
PCH support in clang-cl, preliminary DWARF v5 support, basic support
for OpenMP 4.5 offloading to NVPTX, OpenCL C++ support, MSan, X-Ray
and libFuzzer support for FreeBSD, early UBSan, X-Ray and libFuzzer
support for OpenBSD, UBSan checks for implicit conversions, many
long-tail compatibility issues fixed in lld which is now production
ready for ELF, COFF and MinGW, new tools llvm-exegesis, llvm-mca and
diagtool. And as usual, many optimizations, improved diagnostics, and
bug fixes.

For more details, see the release notes:
https://llvm.org/releases/7.0.0/docs/ReleaseNotes.html
https://llvm.org/releases/7.0.0/tools/clang/docs/ReleaseNotes.html
https://llvm.org/releases/7.0.0/tools/clang/tools/extra/docs/ReleaseNotes.html
https://llvm.org/releases/7.0.0/tools/lld/docs/ReleaseNotes.html

Thanks to everyone who helped with filing, fixing, and code reviewing
for the release-blocking bugs!

Special thanks to the release testers and packagers: Bero
Rosenkränzer, Brian Cain, Dimitry Andric, Jonas Hahnfeld, Lei Huang
Michał Górny, Sylvestre Ledru, Takumi Nakamura, and Vedant Kumar.

For questions or comments about the release, please contact the
community on the mailing lists. Onwards to LLVM 8!

Cheers,
Hans
</code></pre>

<p><hr></p>

<p>###<a href="https://blog.raveland.org/post/thinkpad_update_bios/">Update your Thinkpad’s bios with Linux or OpenBSD</a></p>

<ul>
<li>Get your new bios</li>
</ul>

<blockquote>
<p>At first, go to the Lenovo website and download your new bios:</p>
</blockquote>

<ul>
<li>Go to lenovo support</li>
<li>Use the search bar to find your product (example for me, x270)</li>
<li>Choose the right product (if necessary) and click search</li>
<li>On the right side, click on Update Your System</li>
<li>Click on BIOS/UEFI</li>
<li>Choose *BIOS Update (Bootable CD) for Windows *</li>
<li>Download</li>
</ul>

<blockquote>
<p>For me the file is called like this : r0iuj25wd.iso</p>
</blockquote>

<ul>
<li>Extract bios update</li>
</ul>

<blockquote>
<p>Now you will need to install geteltorito.</p>
</blockquote>

<ul>
<li>With OpenBSD:</li>
</ul>

<p><code>$ doas pkg_add geteltorito</code><br>
<code>quirks-3.7 signed on 2018-09-09T13:15:19Z</code><br>
<code>geteltorito-0.6: ok</code></p>

<ul>
<li>With Debian:</li>
</ul>

<p><code>$ sudo apt-get install genisoimage</code></p>

<ul>
<li>Now we will extract the bios update :</li>
</ul>

<p><code>$ geteltorito -o bios_update.img r0iuj25wd.iso</code><br>
<code>Booting catalog starts at sector: 20</code><br>
<code>Manufacturer of CD: NERO BURNING ROM VER 12</code><br>
<code>Image architecture: x86</code><br>
<code>Boot media type is: harddisk</code><br>
<code>El Torito image starts at sector 27 and has 43008 sector(s) of 512 Bytes</code><br>
<code></code><br>
<code>Image has been written to file &quot;bios_update.img&quot;.</code><br>
<code>This will create a file called bios_update.img.</code></p>

<ul>
<li>Put the image on an USB key</li>
<li>CAREFULL : on my computer, my USB key is sda1 on Linux and sd1 on OpenBSD.</li>
</ul>

<blockquote>
<p>Please check twice on your computer the name of your USB key.</p>
</blockquote>

<ul>
<li>With OpenBSD :</li>
</ul>

<p><code>$ doas dd if=bios_update.img of=/dev/rsd1c</code></p>

<ul>
<li>With Linux :</li>
</ul>

<p><code>$ sudo dd if=bios_update.img of=/dev/sda</code></p>

<blockquote>
<p>Now all you need is to reboot, to boot on your USB key and follow the instructions. Enjoy &#x1f609;</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://hardenedbsd.org/article/shawn-webb/2018-09-17/announcing-hardenedbsd-foundation">Announcing The HardenedBSD Foundation</a></p>

<blockquote>
<p>In June of 2018, we announced our intent to become a not-for-profit, tax-exempt 501©(3) organization in the United States. It took a dedicated team months of work behind-the-scenes to make that happen. On 06 September 2018, HardenedBSD Foundation Corp was granted 501©(3) status, from which point all US-based persons making donations can deduct the donation from their taxes.<br>
We are grateful for those who contribute to HardenedBSD in whatever way they can. Thank you for making HardenedBSD possible. We look forward to a bright future, driven by a helpful and positive community.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://utcc.utoronto.ca/~cks/space/blog/solaris/ZFSSendRecvVsRsync">How you migrate ZFS filesystems matters</a></p>

<blockquote>
<p>If you want to move a ZFS filesystem around from one host to another, you have two general approaches; you can use ‘zfs send’ and ‘zfs receive’, or you can use a user level copying tool such as rsync (or ‘tar -cf | tar -xf’, or any number of similar options). Until recently, I had considered these two approaches to be more or less equivalent apart from their convenience and speed (which generally tilted in favour of ‘zfs send’). It turns out that this is not necessarily the case and there are situations where you will want one instead of the other.<br>
We have had two generations of ZFS fileservers so far, the Solaris ones and the OmniOS ones. When we moved from the first generation to the second generation, we migrated filesystems across using ‘zfs send’, including the filesystem with my home directory in it (we did this for various reasons). Recently I discovered that some old things in my filesystem didn’t have file type information in their directory entries. ZFS has been adding file type information to directories for a long time, but not quite as long as my home directory has been on ZFS.<br>
This illustrates an important difference between the ‘zfs send’ approach and the rsync approach, which is that zfs send doesn’t update or change at least some ZFS on-disk data structures, in the way that re-writing them from scratch from user level does. There are both positives and negatives to this, and a certain amount of rewriting does happen even in the ‘zfs send’ case (for example, all of the block pointers get changed, and ZFS will re-compress your data as applicable).<br>
I knew that in theory you had to copy things at the user level if you wanted to make sure that your ZFS filesystem and everything in it was fully up to date with the latest ZFS features. But I didn’t expect to hit a situation where it mattered in practice until, well, I did. Now I suspect that old files on our old filesystems may be partially missing a number of things, and I’m wondering how much of the various changes in ‘zfs upgrade -v’ apply even to old data.<br>
(I’d run into this sort of general thing before when I looked into ext3 to ext4 conversion on Linux.)<br>
With all that said, I doubt this will change our plans for migrating our ZFS filesystems in the future (to our third generation fileservers). ZFS sending and receiving is just too convenient, too fast and too reliable to give up. Rsync isn’t bad, but it’s not the same, and so we only use it when we have to (when we’re moving only some of the people in a filesystem instead of all of them, for example).<br>
PS: I was going to try to say something about what ‘zfs send’ did and didn’t update, but having looked briefly at the code I’ve concluded that I need to do more research before running my keyboard off. In the mean time, you can read the OpenZFS wiki page on ZFS send and receive, which has plenty of juicy technical details.<br>
PPS: Since eliminating all-zero blocks is a form of compression, you can turn zero-filled files into sparse files through a ZFS send/receive if the destination has compression enabled. As far as I know, genuine sparse files on the source will stay sparse through a ZFS send/receive even if they’re sent to a destination with compression off.</p>
</blockquote>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/254235663/">BSD Users Stockholm Meetup #4: Tuesday, November 13, 2018 at 18:00</a></li>
<li><a href="https://bsd-pl.org/en">BSD Poland User Group: Next Meeting: October 11, 2018, 18:15 - 21:15 at Warsaw University of Technology</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20180915112028">n2k18 Hackathon report: Ken Westerback (krw@) on disklabel(8) work, dhclient(8) progress</a></li>
<li><a href="https://lists.xenproject.org/archives/html/mirageos-devel/2018-09/msg00013.html">Running MirageOS Unikernels on OpenBSD in vmm (Now Works)</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20180910070407">vmm(4) gets support for qcow2</a></li>
<li><a href="https://oshogbo.vexillium.org/blog/52/">MeetBSD and SecurityBsides</a></li>
<li><a href="https://twitter.com/cperciva/status/1041433506453155840">Colin Percival reduced FreeBSD startup time from 10627ms (11.2) to 4738ms (12.0)</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2018-September/001842.html">FreeBSD 11.1 end-of-life</a></li>
<li><a href="https://www.meetup.com/KnoxBUG-BSD-Linux-and-FOSS-Users-Unite/events/254759084">KnoxBug: Monday, October 1, 2018 at 18:00: Real-world Performance Advantages of NVDIMM and NVMe: Case Study with OpenZFS</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Todd - <a href="http://dpaste.com/2QZEZPA">2 Nics, 1 bhyve and a jail cell</a></li>
<li>Thomas - <a href="http://dpaste.com/3SFM1YP#wrap">Deep Dive</a></li>
<li>Morgan - <a href="http://dpaste.com/07EK4RK#wrap">Send/Receive to Manage Fragmentation?</a></li>
<li>Dominik - <a href="http://dpaste.com/0SZJ0V4#wrap">hierarchical jails -&gt; networking</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </itunes:summary>
</item>
<item>
  <title>105: Virginia BSD Assembly</title>
  <link>https://www.bsdnow.tv/105</link>
  <guid isPermaLink="false">09c955b0-1ecf-440f-9aa9-80dc2fb05a49</guid>
  <pubDate>Wed, 02 Sep 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/09c955b0-1ecf-440f-9aa9-80dc2fb05a49.mp3" length="47635924" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's already our two-year anniversary! This time on the show, we'll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year's vBSDCon. What's it have to offer in an already-crowded BSD conference space? We'll find out.</itunes:subtitle>
  <itunes:duration>1:06:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's already our two-year anniversary! This time on the show, we'll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year's vBSDCon. What's it have to offer in an already-crowded BSD conference space? We'll find out.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
OpenBSD hypervisor coming soon (https://www.marc.info/?l=openbsd-tech&amp;amp;m=144104398132541&amp;amp;w=2)
Our buddy Mike Larkin never rests, and he posted some very tight-lipped console output (http://pastebin.com/raw.php?i=F2Qbgdde) on Twitter recently
From what little he revealed at the time (https://twitter.com/mlarkin2012/status/638265767864070144), it appeared to be a new hypervisor (https://en.wikipedia.org/wiki/Hypervisor) (that is, X86 hardware virtualization) running on OpenBSD -current, tentatively titled "vmm"
Later on, he provided a much longer explanation on the mailing list, detailing a bit about what the overall plan for the code is
Originally started around the time of the Australia hackathon, the work has since picked up more steam, and has gotten a funding boost from the OpenBSD foundation
One thing to note: this isn't just a port of something like Xen or Bhyve; it's all-new code, and Mike explains why he chose to go that route
He also answered some basic questions about the requirements, when it'll be available, what OSes it can run, what's left to do, how to get involved and so on
***
Why FreeBSD should not adopt launchd (http://blog.darknedgy.net/technology/2015/08/26/0/)
Last week (http://www.bsdnow.tv/episodes/2015_08_26-beverly_hills_25519) we mentioned a talk Jordan Hubbard gave about integrating various parts of Mac OS X into FreeBSD
One of the changes, perhaps the most controversial item on the list, was the adoption of launchd to replace the init system (replacing init systems seems to cause backlash, we've learned)
In this article, the author talks about why he thinks this is a bad idea
He doesn't oppose the integration into FreeBSD-derived projects, like FreeNAS and PC-BSD, only vanilla FreeBSD itself - this is also explained in more detail
The post includes both high-level descriptions and low-level technical details, and provides an interesting outlook on the situation and possibilities
Reddit had quite a bit (https://www.reddit.com/r/BSD/comments/3ilhpk) to say (https://www.reddit.com/r/freebsd/comments/3ilj4i) about this one, some in agreement and some not
***
DragonFly graphics improvements (http://lists.dragonflybsd.org/pipermail/commits/2015-August/458108.html)
The DragonFlyBSD guys are at it again, merging newer support and fixes into their i915 (Intel) graphics stack
This latest update brings them in sync with Linux 3.17, and includes Haswell fixes, DisplayPort fixes, improvements for Broadwell and even Cherryview GPUs
You should also see some power management improvements, longer battery life and various other bug fixes
If you're running DragonFly, especially on a laptop, you'll want to get this stuff on your machine quick - big improvements all around
***
OpenBSD tames the userland (https://www.marc.info/?l=openbsd-tech&amp;amp;m=144070638327053&amp;amp;w=2)
Last week we mentioned OpenBSD's tame framework getting support for file whitelists, and said that the userland integration was next - well, now here we are
Theo posted a mega diff of nearly 100 smaller diffs, adding tame support to many areas of the userland tools
It's still a work-in-progress version; there's still more to be added (including the file path whitelist stuff)
Some classic utilities are even being reworked to make taming them easier - the "w" command (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144103945031253&amp;amp;w=2), for example
The diff provides some good insight on exactly how to restrict different types of utilities, as well as how easy it is to actually do so (and en masse)
More discussion can be found on HN (https://news.ycombinator.com/item?id=10135901), as one might expect
If you're a software developer, and especially if your software is in ports already, consider adding some more fine-grained tame support in your next release
***
Interview - Scott Courtney - vbsdcon@verisign.com (mailto:vbsdcon@verisign.com) / @verisign (https://twitter.com/verisign)
vBSDCon (http://vbsdcon.com/) 2015
News Roundup
OPNsense, beyond the fork (https://opnsense.org/opnsense-beyond-the-fork)
We first heard about (http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach) OPNsense back in January, and they've since released nearly 40 versions, spanning over 5,000 commits
This is their first big status update, covering some of the things that've happened since the project was born
There's been a lot of community growth and participation, mass bug fixing, new features added, experimental builds with ASLR and much more - the report touches on a little of everything
***
LibreSSL nukes SSLv3 (http://undeadly.org/cgi?action=article&amp;amp;sid=20150827112006)
With their latest release, LibreSSL began to turn off SSLv3 (http://disablessl3.com) support, starting with the "openssl" command
At the time, SSLv3 wasn't disabled entirely because of some things in the OpenBSD ports tree requiring it (apache being one odd example)
They've now flipped the switch, and the process of complete removal has started
From the Undeadly summary, "This is an important step for the security of the LibreSSL library and, by extension, the ports tree. It does, however, require lots of testing of the resulting packages, as some of the fallout may be at runtime (so not detected during the build). That is part of why this is committed at this point during the release cycle: it gives the community more time to test packages and report issues so that these can be fixed. When these fixes are then pushed upstream, the entire software ecosystem will benefit. In short: you know what to do!"
With this change and a few more to follow shortly, LibreSSL won't actually support SSL anymore - time to rename it "LibreTLS"
***
FreeBSD MPTCP updated (http://caia.swin.edu.au/urp/newtcp/mptcp/tools/v05/mptcp-readme-v0.5.txt)
For anyone unaware, Multipath TCP (https://en.wikipedia.org/wiki/Multipath_TCP) is "an ongoing effort of the Internet Engineering Task Force's (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy."
There's been work out of an Australian university to add support for it to the FreeBSD kernel, and the patchset was recently updated
Including in this latest version is an overview of the protocol, how to get it compiled in, current features and limitations and some info about the routing requirements
Some big performance gains can be had with MPTCP, but only if both the client and server systems support it - getting it into the FreeBSD kernel would be a good start
***
UEFI and GPT in OpenBSD (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144092912907778&amp;amp;w=2)
There hasn't been much fanfare about it yet, but some initial UEFI and GPT-related commits have been creeping into OpenBSD recently
Some support (https://github.com/yasuoka/openbsd-uefi) for UEFI booting has landed in the kernel, and more bits are being slowly enabled after review
This comes along with a number (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143732984925140&amp;amp;w=2) of (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144088136200753&amp;amp;w=2) other (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144046793225230&amp;amp;w=2) commits (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144045760723039&amp;amp;w=2) related to GPT, much of which is being refactored and slowly reintroduced
Currently, you have to do some disklabel wizardry to bypass the MBR limit and access more than 2TB of space on a single drive, but it should "just work" with GPT (once everything's in)
The UEFI bootloader support has been committed (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144115942223734&amp;amp;w=2), so stay tuned for more updates (http://undeadly.org/cgi?action=article&amp;amp;sid=20150902074526&amp;amp;mode=flat) as further (https://twitter.com/kotatsu_mi/status/638909417761562624) progress (https://twitter.com/yojiro/status/638189353601097728) is made
***
Feedback/Questions
John writes in (http://slexy.org/view/s2sIWfb3Qh)
Mason writes in (http://slexy.org/view/s2Ybrx00KI)
Earl writes in (http://slexy.org/view/s20FpmR7ZW)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, verisign, vbsdcon, conference, eurobsdcon, bsdcan, meetbsd, asiabsdcon, nextbsd, launchd, darwin, tame, mach, libressl, vmm, hypervisor, bhyve, multipath, tcp</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s already our two-year anniversary! This time on the show, we&#39;ll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year&#39;s vBSDCon. What&#39;s it have to offer in an already-crowded BSD conference space? We&#39;ll find out.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144104398132541&w=2" rel="nofollow">OpenBSD hypervisor coming soon</a></h3>

<ul>
<li>Our buddy Mike Larkin never rests, and he posted some very tight-lipped <a href="http://pastebin.com/raw.php?i=F2Qbgdde" rel="nofollow">console output</a> on Twitter recently</li>
<li>From what little he revealed <a href="https://twitter.com/mlarkin2012/status/638265767864070144" rel="nofollow">at the time</a>, it appeared to be a new <a href="https://en.wikipedia.org/wiki/Hypervisor" rel="nofollow">hypervisor</a> (that is, X86 hardware virtualization) running on OpenBSD -current, tentatively titled &quot;vmm&quot;</li>
<li>Later on, he provided a much longer explanation on the mailing list, detailing a bit about what the overall plan for the code is</li>
<li>Originally started around the time of the Australia hackathon, the work has since picked up more steam, and has gotten a funding boost from the OpenBSD foundation</li>
<li>One thing to note: this <strong>isn&#39;t</strong> just a port of something like Xen or Bhyve; it&#39;s all-new code, and Mike explains why he chose to go that route</li>
<li>He also answered some basic questions about the requirements, when it&#39;ll be available, what OSes it can run, what&#39;s left to do, how to get involved and so on
***</li>
</ul>

<h3><a href="http://blog.darknedgy.net/technology/2015/08/26/0/" rel="nofollow">Why FreeBSD should not adopt launchd</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2015_08_26-beverly_hills_25519" rel="nofollow">Last week</a> we mentioned a talk Jordan Hubbard gave about integrating various parts of Mac OS X into FreeBSD</li>
<li>One of the changes, perhaps the most controversial item on the list, was the adoption of launchd to replace the init system (replacing init systems seems to cause backlash, we&#39;ve learned)</li>
<li>In this article, the author talks about why he thinks this is a bad idea</li>
<li>He doesn&#39;t oppose the integration into FreeBSD-<em>derived</em> projects, like FreeNAS and PC-BSD, only vanilla FreeBSD itself - this is also explained in more detail</li>
<li>The post includes both high-level descriptions and low-level technical details, and provides an interesting outlook on the situation and possibilities</li>
<li>Reddit had <a href="https://www.reddit.com/r/BSD/comments/3ilhpk" rel="nofollow">quite a bit</a> <a href="https://www.reddit.com/r/freebsd/comments/3ilj4i" rel="nofollow">to say</a> about this one, some in agreement and some not
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-August/458108.html" rel="nofollow">DragonFly graphics improvements</a></h3>

<ul>
<li>The DragonFlyBSD guys are at it again, merging newer support and fixes into their i915 (Intel) graphics stack</li>
<li>This latest update brings them in sync with Linux 3.17, and includes Haswell fixes, DisplayPort fixes, improvements for Broadwell and even Cherryview GPUs</li>
<li>You should also see some power management improvements, longer battery life and various other bug fixes</li>
<li>If you&#39;re running DragonFly, especially on a laptop, you&#39;ll want to get this stuff on your machine quick - big improvements all around
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144070638327053&w=2" rel="nofollow">OpenBSD tames the userland</a></h3>

<ul>
<li>Last week we mentioned OpenBSD&#39;s tame framework getting support for file whitelists, and said that the userland integration was next - well, now here we are</li>
<li>Theo posted a <em>mega diff</em> of nearly 100 smaller diffs, adding tame support to many areas of the userland tools</li>
<li>It&#39;s still a work-in-progress version; there&#39;s still more to be added (including the file path whitelist stuff)</li>
<li>Some classic utilities are even being reworked to make taming them easier - <a href="https://www.marc.info/?l=openbsd-cvs&m=144103945031253&w=2" rel="nofollow">the &quot;w&quot; command</a>, for example</li>
<li>The diff provides some good insight on exactly how to restrict different types of utilities, as well as how easy it is to actually do so (and en masse)</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10135901" rel="nofollow">on HN</a>, as one might expect</li>
<li>If you&#39;re a software developer, and especially if your software is in ports already, consider adding some more fine-grained tame support in your next release
***</li>
</ul>

<h2>Interview - Scott Courtney - <a href="mailto:vbsdcon@verisign.com" rel="nofollow">vbsdcon@verisign.com</a> / <a href="https://twitter.com/verisign" rel="nofollow">@verisign</a></h2>

<p><a href="http://vbsdcon.com/" rel="nofollow">vBSDCon</a> 2015</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/opnsense-beyond-the-fork" rel="nofollow">OPNsense, beyond the fork</a></h3>

<ul>
<li>We first <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">heard about</a> OPNsense back in January, and they&#39;ve since released nearly <strong>40</strong> versions, spanning over <strong>5,000</strong> commits</li>
<li>This is their first big status update, covering some of the things that&#39;ve happened since the project was born</li>
<li>There&#39;s been a lot of community growth and participation, mass bug fixing, new features added, experimental builds with ASLR and much more - the report touches on a little of everything
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150827112006" rel="nofollow">LibreSSL nukes SSLv3</a></h3>

<ul>
<li>With their latest release, LibreSSL began to turn off <a href="http://disablessl3.com" rel="nofollow">SSLv3</a> support, starting with the &quot;openssl&quot; command</li>
<li>At the time, SSLv3 wasn&#39;t disabled entirely because of some things in the OpenBSD ports tree requiring it (apache being one odd example)</li>
<li>They&#39;ve now flipped the switch, and the process of complete removal has started</li>
<li>From the Undeadly summary, &quot;This is an important step for the security of the LibreSSL library and, by extension, the ports tree. It does, however, require lots of testing of the resulting packages, as some of the fallout may be at runtime (so not detected during the build). That is part of why this is committed at this point during the release cycle: it gives the community more time to test packages and report issues so that these can be fixed. When these fixes are then pushed upstream, the entire software ecosystem will benefit. In short: you know what to do!&quot;</li>
<li>With this change and a few more to follow shortly, Libre*SSL* won&#39;t actually <em>support SSL</em> anymore - time to rename it &quot;LibreTLS&quot;
***</li>
</ul>

<h3><a href="http://caia.swin.edu.au/urp/newtcp/mptcp/tools/v05/mptcp-readme-v0.5.txt" rel="nofollow">FreeBSD MPTCP updated</a></h3>

<ul>
<li>For anyone unaware, <a href="https://en.wikipedia.org/wiki/Multipath_TCP" rel="nofollow">Multipath TCP</a> is &quot;an ongoing effort of the Internet Engineering Task Force&#39;s (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy.&quot;</li>
<li>There&#39;s been work out of an Australian university to add support for it to the FreeBSD kernel, and the patchset was recently updated</li>
<li>Including in this latest version is an overview of the protocol, how to get it compiled in, current features and limitations and some info about the routing requirements</li>
<li>Some big performance gains can be had with MPTCP, but only if both the client and server systems support it - getting it into the FreeBSD kernel would be a good start
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144092912907778&w=2" rel="nofollow">UEFI and GPT in OpenBSD</a></h3>

<ul>
<li>There hasn&#39;t been much fanfare about it yet, but some initial UEFI and GPT-related commits have been creeping into OpenBSD recently</li>
<li>Some <a href="https://github.com/yasuoka/openbsd-uefi" rel="nofollow">support</a> for UEFI booting has landed in the kernel, and more bits are being slowly enabled after review</li>
<li>This comes along with a <a href="https://www.marc.info/?l=openbsd-cvs&m=143732984925140&w=2" rel="nofollow">number</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144088136200753&w=2" rel="nofollow">of</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144046793225230&w=2" rel="nofollow">other</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144045760723039&w=2" rel="nofollow">commits</a> related to GPT, much of which is being refactored and slowly reintroduced</li>
<li>Currently, you have to do some disklabel wizardry to bypass the MBR limit and access more than 2TB of space on a single drive, but it should &quot;just work&quot; with GPT (once everything&#39;s in)</li>
<li>The UEFI bootloader support <a href="https://www.marc.info/?l=openbsd-cvs&m=144115942223734&w=2" rel="nofollow">has been committed</a>, so stay tuned for <a href="http://undeadly.org/cgi?action=article&sid=20150902074526&mode=flat" rel="nofollow">more updates</a> as <a href="https://twitter.com/kotatsu_mi/status/638909417761562624" rel="nofollow">further</a> <a href="https://twitter.com/yojiro/status/638189353601097728" rel="nofollow">progress</a> is made
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2sIWfb3Qh" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2Ybrx00KI" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s20FpmR7ZW" rel="nofollow">Earl writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s already our two-year anniversary! This time on the show, we&#39;ll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year&#39;s vBSDCon. What&#39;s it have to offer in an already-crowded BSD conference space? We&#39;ll find out.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144104398132541&w=2" rel="nofollow">OpenBSD hypervisor coming soon</a></h3>

<ul>
<li>Our buddy Mike Larkin never rests, and he posted some very tight-lipped <a href="http://pastebin.com/raw.php?i=F2Qbgdde" rel="nofollow">console output</a> on Twitter recently</li>
<li>From what little he revealed <a href="https://twitter.com/mlarkin2012/status/638265767864070144" rel="nofollow">at the time</a>, it appeared to be a new <a href="https://en.wikipedia.org/wiki/Hypervisor" rel="nofollow">hypervisor</a> (that is, X86 hardware virtualization) running on OpenBSD -current, tentatively titled &quot;vmm&quot;</li>
<li>Later on, he provided a much longer explanation on the mailing list, detailing a bit about what the overall plan for the code is</li>
<li>Originally started around the time of the Australia hackathon, the work has since picked up more steam, and has gotten a funding boost from the OpenBSD foundation</li>
<li>One thing to note: this <strong>isn&#39;t</strong> just a port of something like Xen or Bhyve; it&#39;s all-new code, and Mike explains why he chose to go that route</li>
<li>He also answered some basic questions about the requirements, when it&#39;ll be available, what OSes it can run, what&#39;s left to do, how to get involved and so on
***</li>
</ul>

<h3><a href="http://blog.darknedgy.net/technology/2015/08/26/0/" rel="nofollow">Why FreeBSD should not adopt launchd</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2015_08_26-beverly_hills_25519" rel="nofollow">Last week</a> we mentioned a talk Jordan Hubbard gave about integrating various parts of Mac OS X into FreeBSD</li>
<li>One of the changes, perhaps the most controversial item on the list, was the adoption of launchd to replace the init system (replacing init systems seems to cause backlash, we&#39;ve learned)</li>
<li>In this article, the author talks about why he thinks this is a bad idea</li>
<li>He doesn&#39;t oppose the integration into FreeBSD-<em>derived</em> projects, like FreeNAS and PC-BSD, only vanilla FreeBSD itself - this is also explained in more detail</li>
<li>The post includes both high-level descriptions and low-level technical details, and provides an interesting outlook on the situation and possibilities</li>
<li>Reddit had <a href="https://www.reddit.com/r/BSD/comments/3ilhpk" rel="nofollow">quite a bit</a> <a href="https://www.reddit.com/r/freebsd/comments/3ilj4i" rel="nofollow">to say</a> about this one, some in agreement and some not
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-August/458108.html" rel="nofollow">DragonFly graphics improvements</a></h3>

<ul>
<li>The DragonFlyBSD guys are at it again, merging newer support and fixes into their i915 (Intel) graphics stack</li>
<li>This latest update brings them in sync with Linux 3.17, and includes Haswell fixes, DisplayPort fixes, improvements for Broadwell and even Cherryview GPUs</li>
<li>You should also see some power management improvements, longer battery life and various other bug fixes</li>
<li>If you&#39;re running DragonFly, especially on a laptop, you&#39;ll want to get this stuff on your machine quick - big improvements all around
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144070638327053&w=2" rel="nofollow">OpenBSD tames the userland</a></h3>

<ul>
<li>Last week we mentioned OpenBSD&#39;s tame framework getting support for file whitelists, and said that the userland integration was next - well, now here we are</li>
<li>Theo posted a <em>mega diff</em> of nearly 100 smaller diffs, adding tame support to many areas of the userland tools</li>
<li>It&#39;s still a work-in-progress version; there&#39;s still more to be added (including the file path whitelist stuff)</li>
<li>Some classic utilities are even being reworked to make taming them easier - <a href="https://www.marc.info/?l=openbsd-cvs&m=144103945031253&w=2" rel="nofollow">the &quot;w&quot; command</a>, for example</li>
<li>The diff provides some good insight on exactly how to restrict different types of utilities, as well as how easy it is to actually do so (and en masse)</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10135901" rel="nofollow">on HN</a>, as one might expect</li>
<li>If you&#39;re a software developer, and especially if your software is in ports already, consider adding some more fine-grained tame support in your next release
***</li>
</ul>

<h2>Interview - Scott Courtney - <a href="mailto:vbsdcon@verisign.com" rel="nofollow">vbsdcon@verisign.com</a> / <a href="https://twitter.com/verisign" rel="nofollow">@verisign</a></h2>

<p><a href="http://vbsdcon.com/" rel="nofollow">vBSDCon</a> 2015</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/opnsense-beyond-the-fork" rel="nofollow">OPNsense, beyond the fork</a></h3>

<ul>
<li>We first <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">heard about</a> OPNsense back in January, and they&#39;ve since released nearly <strong>40</strong> versions, spanning over <strong>5,000</strong> commits</li>
<li>This is their first big status update, covering some of the things that&#39;ve happened since the project was born</li>
<li>There&#39;s been a lot of community growth and participation, mass bug fixing, new features added, experimental builds with ASLR and much more - the report touches on a little of everything
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150827112006" rel="nofollow">LibreSSL nukes SSLv3</a></h3>

<ul>
<li>With their latest release, LibreSSL began to turn off <a href="http://disablessl3.com" rel="nofollow">SSLv3</a> support, starting with the &quot;openssl&quot; command</li>
<li>At the time, SSLv3 wasn&#39;t disabled entirely because of some things in the OpenBSD ports tree requiring it (apache being one odd example)</li>
<li>They&#39;ve now flipped the switch, and the process of complete removal has started</li>
<li>From the Undeadly summary, &quot;This is an important step for the security of the LibreSSL library and, by extension, the ports tree. It does, however, require lots of testing of the resulting packages, as some of the fallout may be at runtime (so not detected during the build). That is part of why this is committed at this point during the release cycle: it gives the community more time to test packages and report issues so that these can be fixed. When these fixes are then pushed upstream, the entire software ecosystem will benefit. In short: you know what to do!&quot;</li>
<li>With this change and a few more to follow shortly, Libre*SSL* won&#39;t actually <em>support SSL</em> anymore - time to rename it &quot;LibreTLS&quot;
***</li>
</ul>

<h3><a href="http://caia.swin.edu.au/urp/newtcp/mptcp/tools/v05/mptcp-readme-v0.5.txt" rel="nofollow">FreeBSD MPTCP updated</a></h3>

<ul>
<li>For anyone unaware, <a href="https://en.wikipedia.org/wiki/Multipath_TCP" rel="nofollow">Multipath TCP</a> is &quot;an ongoing effort of the Internet Engineering Task Force&#39;s (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy.&quot;</li>
<li>There&#39;s been work out of an Australian university to add support for it to the FreeBSD kernel, and the patchset was recently updated</li>
<li>Including in this latest version is an overview of the protocol, how to get it compiled in, current features and limitations and some info about the routing requirements</li>
<li>Some big performance gains can be had with MPTCP, but only if both the client and server systems support it - getting it into the FreeBSD kernel would be a good start
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144092912907778&w=2" rel="nofollow">UEFI and GPT in OpenBSD</a></h3>

<ul>
<li>There hasn&#39;t been much fanfare about it yet, but some initial UEFI and GPT-related commits have been creeping into OpenBSD recently</li>
<li>Some <a href="https://github.com/yasuoka/openbsd-uefi" rel="nofollow">support</a> for UEFI booting has landed in the kernel, and more bits are being slowly enabled after review</li>
<li>This comes along with a <a href="https://www.marc.info/?l=openbsd-cvs&m=143732984925140&w=2" rel="nofollow">number</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144088136200753&w=2" rel="nofollow">of</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144046793225230&w=2" rel="nofollow">other</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144045760723039&w=2" rel="nofollow">commits</a> related to GPT, much of which is being refactored and slowly reintroduced</li>
<li>Currently, you have to do some disklabel wizardry to bypass the MBR limit and access more than 2TB of space on a single drive, but it should &quot;just work&quot; with GPT (once everything&#39;s in)</li>
<li>The UEFI bootloader support <a href="https://www.marc.info/?l=openbsd-cvs&m=144115942223734&w=2" rel="nofollow">has been committed</a>, so stay tuned for <a href="http://undeadly.org/cgi?action=article&sid=20150902074526&mode=flat" rel="nofollow">more updates</a> as <a href="https://twitter.com/kotatsu_mi/status/638909417761562624" rel="nofollow">further</a> <a href="https://twitter.com/yojiro/status/638189353601097728" rel="nofollow">progress</a> is made
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2sIWfb3Qh" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2Ybrx00KI" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s20FpmR7ZW" rel="nofollow">Earl writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>70: Daemons in the North</title>
  <link>https://www.bsdnow.tv/70</link>
  <guid isPermaLink="false">55684d1a-97da-439b-a037-b02c8d49de70</guid>
  <pubDate>Wed, 31 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/55684d1a-97da-439b-a037-b02c8d49de70.mp3" length="60663316" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our last episode of 2014, and we'll be chatting with Dan Langille about the upcoming BSDCan conference. We'll find out what's planned and what sorts of presentations they're looking for. As usual, answers to viewer-submitted questions and all the week's news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:24:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's our last episode of 2014, and we'll be chatting with Dan Langille about the upcoming BSDCan conference. We'll find out what's planned and what sorts of presentations they're looking for. As usual, answers to viewer-submitted questions and all the week's news, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
More conference presentation videos (http://2014.asiabsdcon.org/timetable.html.en)
Some more of the presentation videos from AsiaBSDCon are appearing online
Masanobu Saitoh, Developing CPE Routers Based on NetBSD (https://www.youtube.com/watch?v=ApruZrU5fVs)
Reyk Floeter (http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time), VXLAN and Cloud-based Networking with OpenBSD (https://www.youtube.com/watch?v=ufeEP_hzFN0)
Jos Jansen, Adapting OS X to the enterprise (https://www.youtube.com/watch?v=gOPfRQgTjNo)
Pierre Pronchery (http://www.bsdnow.tv/episodes/2014_04_01-edgy_bsd_users) &amp;amp; Guillaume Lasmayous, Carve your NetBSD (https://www.youtube.com/watch?v=vh-TjLUj6os) 
Colin Percival (http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten), Everything you need to know about cryptography in 1 hour (https://www.youtube.com/watch?v=jzY3m5Kv7Y8) (not from AsiaBSDCon)
The "bsdconferences" YouTube channel has quite a lot of interesting older BSD talks (https://www.youtube.com/user/bsdconferences/videos?sort=da&amp;amp;view=0&amp;amp;flow=grid) too - you may want to go back and watch them if you haven't already
***
OpenBSD PIE enhancements (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141922027318727&amp;amp;w=2)
ASLR (https://en.wikipedia.org/wiki/Address_space_layout_randomization) and PIE (https://en.wikipedia.org/wiki/Position-independent_executable) are great security features that OpenBSD has had enabled by default for a long time, in both the base system and ports, but they have one inherent problem
They only work with dynamic libraries and binaries, so if you have any static binaries, they don't get the same treatment
For example, the default shells (and many other things in /bin and /sbin) are statically linked
In the case of the static ones, you can always predict the memory layout, which is very bad and sort of defeats the whole purpose (https://en.wikipedia.org/wiki/Return-oriented_programming)
With this and a few related commits (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141927571832106&amp;amp;w=2), OpenBSD fixes this by introducing static self-relocation
More and more CPU architectures are being tested and getting support too; this isn't just for amd64 and i386 - VAX users can rest easy
It'll be available in 5.7 in May, or you can use a -current snapshot (http://www.openbsd.org/faq/faq5.html#BldBinary) if you want to get a slice of the action now
***
FreeBSD foundation semi-annual newsletter (https://www.freebsdfoundation.org/press/2014dec-newsletter.html)
The FreeBSD foundation publishes a huge newsletter twice a year, detailing their funded projects and some community activities
As always, it starts with a letter from the president of the foundation - this time it's about encouraging students and new developers to get involved
The article also has a fundraising update with a list of sponsored projects, and they note that the donations meter has changed from dollars to number of donors (since they exceeded the goal already)
You can read summaries of all the BSD conferences of 2014 and see a list of upcoming ones next year too
There are also sections about the FreeBSD Journal (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates)'s progress, a new staff member and a testimonial from NetApp
It's a very long report, so dedicate some time to read all the way through it
This year was pretty great for BSD: both the FreeBSD and OpenBSD foundations exceeded their goals and the NetBSD foundation came really close too
As we go into 2015, consider donating to whichever (https://www.freebsdfoundation.org/donate) BSD (http://www.openbsdfoundation.org/donations.html) you (https://www.netbsd.org/donations/) use (http://www.dragonflybsd.org/donations/), it really can make a difference
***
Modernizing OpenSSH fingerprints (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141920089614758&amp;amp;w=4)
When you connect to a server for the first time, you'll get what's called a fingerprint of the host's public key - this is used to verify that you're actually talking to the same server you intended to
Up until now, the key fingerprints have been an MD5 hash, displayed as hex
This can be problematic (https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033117.html), especially for larger key types like RSA that give lots of wiggle room for collisions, as an attacker could generate a fake host key that gives the same MD5 string as the one you wanted to connect to
This new change replaces the default MD5 and hex with a base64-encoded SHA256 fingerprint
You can add a "FingerprintHash" line in your ssh_config to force using only the new type
There's also a new option (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141923470520906&amp;amp;w=2) to require users to authenticate with more than one public key, so you can really lock down login access to your servers - also useful if you're not 100% confident in any single key type
The new options should be in the upcoming 6.8 release
***
Interview - Dan Langille - info@bsdcan.org (mailto:info@bsdcan.org) / @bsdcan (https://twitter.com/bsdcan)
Plans for the BSDCan 2015 conference
News Roundup
Introducing ntimed, a new NTP daemon (https://github.com/bsdphk/Ntimed)
As we've mentioned before in our tutorials (http://www.bsdnow.tv/tutorials/ntpd), there are two main daemons for the Network Time Protocol - ISC's NTPd and OpenBSD's OpenNTPD
With all the recent security problems with ISC's NTPd, Poul-Henning Kamp (http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail) has been working on a third NTP daemon
It's called "ntimed" and you can try out a preview version of it right now - it's in FreeBSD ports (https://www.freshports.org/net/ntimed/) or on Github
PHK also has a few blog entries (http://phk.freebsd.dk/time/) about the project, including status updates
***
OpenBSD-maintained projects list (http://mdocml.bsd.lv/openbsd_projects.html)
There was recently a read on the misc mailing list (https://www.marc.info/?t=141961588200003&amp;amp;r=1&amp;amp;w=2) asking about different projects started by OpenBSD developers
The initial list had marks for which software had portable versions to other operating systems (OpenSSH being the most popular example)
A developer compiled a new list from all of the replies to that thread into a nice organized webpage
Most people are only familiar with things like OpenSSH, OpenSMTPD, OpenNTPD and more recently LibreSSL, but there are quite a lot more
This page also serves as a good history lesson for BSD in general: FreeBSD and others have ported some things over, while a couple OpenBSD tools were born from forks of FreeBSD tools (mergemaster, pkg tools, portscout)
***
Monitoring network traffic with FreeBSD (https://forums.freebsd.org/threads/howto-monitor-network-traffic-with-netflow-nfdump-nfsen-on-freebsd.49724/)
If you've ever been curious about monitoring network traffic on your FreeBSD boxes, this forum post may be exactly the thing for you
It'll show you how to combine the Netflow, NfDump and NfSen suite of tools to get some pretty detailed network stats (and of course put them into a fancy webpage)
This is especially useful for finding out what was going on at a certain point in time, for example if you had a traffic spike
***
Trapping spammers with spamd (http://www.protoc.org/blog/2014/12/22/trapping-spammers-with-the-openbsd-spam-deferral-daemon)
This is a blog post about OpenBSD's spamd (https://en.wikipedia.org/wiki/Spamd) - a spam email deferral daemon - and how to use it for your mail
It gives some background on the greylisting approach to spam, rather than just a typical host blacklist
"Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email from a sender it does not recognize. If the sender re-attempts mail delivery at a later time, the sender may be allowed to continue the mail delivery conversation."
The post also shows how to combine it with PF and other tools for a pretty fancy mail setup
You can find spamd in the OpenBSD base system (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/spamd.8), or use it with FreeBSD (https://www.freshports.org/mail/spamd) or NetBSD (http://pkgsrc.se/mail/spamd) via ports and pkgsrc
You might also want to go back and listen to BSDTalk episode 68 (https://archive.org/details/bsdtalk068), where Will talks to Bob Beck about spamd
***
Feedback/Questions
Sean writes in (http://slexy.org/view/s20rUK9XVJ)
Brandon writes in (http://slexy.org/view/s20nfzIuT2)
Anders writes in (http://slexy.org/view/s20wCBhFLO)
David writes in (http://slexy.org/view/s20xGrBIyl)
Kyle writes in (http://slexy.org/view/s2QHRaiZJW)
***
Mailing List Gold
NTP code comparison (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141903858708123&amp;amp;w=2) - 192870 vs. 2898 (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141905854411370&amp;amp;w=2)
NICs have feelings too (https://lists.freebsd.org/pipermail/freebsd-hackers/2014-December/046741.html)
Just think about it (https://www.marc.info/?l=openbsd-ports&amp;amp;m=141998130824977&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bsdcan, call for papers, conference, talk, presentation, vxlan, static, pie, openssh, ntimed, ntp, openntpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our last episode of 2014, and we&#39;ll be chatting with Dan Langille about the upcoming BSDCan conference. We&#39;ll find out what&#39;s planned and what sorts of presentations they&#39;re looking for. As usual, answers to viewer-submitted questions and all the week&#39;s news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">More conference presentation videos</a></h3>

<ul>
<li>Some more of the presentation videos from AsiaBSDCon are appearing online</li>
<li>Masanobu Saitoh, <a href="https://www.youtube.com/watch?v=ApruZrU5fVs" rel="nofollow">Developing CPE Routers Based on NetBSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">Reyk Floeter</a>, <a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" rel="nofollow">VXLAN and Cloud-based Networking with OpenBSD</a></li>
<li>Jos Jansen, <a href="https://www.youtube.com/watch?v=gOPfRQgTjNo" rel="nofollow">Adapting OS X to the enterprise</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_01-edgy_bsd_users" rel="nofollow">Pierre Pronchery</a> &amp; Guillaume Lasmayous, <a href="https://www.youtube.com/watch?v=vh-TjLUj6os" rel="nofollow">Carve your NetBSD</a> &lt;!-- skip to 5:06 for henning trolling --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>, <a href="https://www.youtube.com/watch?v=jzY3m5Kv7Y8" rel="nofollow">Everything you need to know about cryptography in 1 hour</a> (not from AsiaBSDCon)</li>
<li>The &quot;bsdconferences&quot; YouTube channel has quite a lot of interesting <a href="https://www.youtube.com/user/bsdconferences/videos?sort=da&view=0&flow=grid" rel="nofollow">older BSD talks</a> too - you may want to go back and watch them if you haven&#39;t already
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=141922027318727&w=2" rel="nofollow">OpenBSD PIE enhancements</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">ASLR</a> and <a href="https://en.wikipedia.org/wiki/Position-independent_executable" rel="nofollow">PIE</a> are great security features that OpenBSD has had enabled by default for a long time, in both the base system and ports, but they have one inherent problem</li>
<li>They only work with <em>dynamic</em> libraries and binaries, so if you have any static binaries, they don&#39;t get the same treatment</li>
<li>For example, the default shells (and many other things in /bin and /sbin) are statically linked</li>
<li>In the case of the static ones, you can always predict the memory layout, which is very bad and sort of <a href="https://en.wikipedia.org/wiki/Return-oriented_programming" rel="nofollow">defeats the whole purpose</a></li>
<li>With this and a few <a href="https://www.marc.info/?l=openbsd-cvs&m=141927571832106&w=2" rel="nofollow">related commits</a>, OpenBSD fixes this by introducing <strong>static self-relocation</strong></li>
<li>More and more CPU architectures are being tested and getting support too; this isn&#39;t just for amd64 and i386 - VAX users can rest easy</li>
<li>It&#39;ll be available in 5.7 in May, or you can use a <a href="http://www.openbsd.org/faq/faq5.html#BldBinary" rel="nofollow">-current snapshot</a> if you want to get a <em>slice</em> of the action now
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2014dec-newsletter.html" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation publishes a huge newsletter twice a year, detailing their funded projects and some community activities</li>
<li>As always, it starts with a letter from the president of the foundation - this time it&#39;s about encouraging students and new developers to get involved</li>
<li>The article also has a fundraising update with a list of sponsored projects, and they note that the donations meter has changed from dollars to number of donors (since they exceeded the goal already)</li>
<li>You can read summaries of all the BSD conferences of 2014 and see a list of upcoming ones next year too</li>
<li>There are also sections about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a>&#39;s progress, a new staff member and a testimonial from NetApp</li>
<li>It&#39;s a very long report, so dedicate some time to read all the way through it</li>
<li>This year was pretty great for BSD: both the FreeBSD and OpenBSD foundations exceeded their goals and the NetBSD foundation came really close too</li>
<li>As we go into 2015, consider donating to <a href="https://www.freebsdfoundation.org/donate" rel="nofollow">whichever</a> <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">BSD</a> <a href="https://www.netbsd.org/donations/" rel="nofollow">you</a> <a href="http://www.dragonflybsd.org/donations/" rel="nofollow">use</a>, it really can make a difference
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=141920089614758&w=4" rel="nofollow">Modernizing OpenSSH fingerprints</a></h3>

<ul>
<li>When you connect to a server for the first time, you&#39;ll get what&#39;s called a fingerprint of the host&#39;s public key - this is used to verify that you&#39;re actually talking to the same server you intended to</li>
<li>Up until now, the key fingerprints have been an MD5 hash, displayed as hex</li>
<li>This <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033117.html" rel="nofollow">can be problematic</a>, especially for larger key types like RSA that give lots of wiggle room for collisions, as an attacker could generate a fake host key that gives the same MD5 string as the one you wanted to connect to</li>
<li>This new change replaces the default MD5 and hex with a base64-encoded SHA256 fingerprint</li>
<li>You can add a &quot;FingerprintHash&quot; line in your ssh_config to force using only the new type</li>
<li>There&#39;s also a <a href="https://www.marc.info/?l=openbsd-cvs&m=141923470520906&w=2" rel="nofollow">new option</a> to require users to authenticate with <strong>more than one</strong> public key, so you can really lock down login access to your servers - also useful if you&#39;re not 100% confident in any single key type</li>
<li>The new options should be in the upcoming 6.8 release
***</li>
</ul>

<h2>Interview - Dan Langille - <a href="mailto:info@bsdcan.org" rel="nofollow">info@bsdcan.org</a> / <a href="https://twitter.com/bsdcan" rel="nofollow">@bsdcan</a></h2>

<p>Plans for the BSDCan 2015 conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/bsdphk/Ntimed" rel="nofollow">Introducing ntimed, a new NTP daemon</a></h3>

<ul>
<li>As we&#39;ve mentioned before in <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">our tutorials</a>, there are two main daemons for the Network Time Protocol - ISC&#39;s NTPd and OpenBSD&#39;s OpenNTPD</li>
<li>With all the recent security problems with ISC&#39;s NTPd, <a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">Poul-Henning Kamp</a> has been working on a third NTP daemon</li>
<li>It&#39;s called &quot;ntimed&quot; and you can try out a preview version of it right now - it&#39;s <a href="https://www.freshports.org/net/ntimed/" rel="nofollow">in FreeBSD ports</a> or on Github</li>
<li>PHK also has a few <a href="http://phk.freebsd.dk/time/" rel="nofollow">blog entries</a> about the project, including status updates
***</li>
</ul>

<h3><a href="http://mdocml.bsd.lv/openbsd_projects.html" rel="nofollow">OpenBSD-maintained projects list</a></h3>

<ul>
<li>There was recently a read on the <a href="https://www.marc.info/?t=141961588200003&r=1&w=2" rel="nofollow">misc mailing list</a> asking about different projects started by OpenBSD developers</li>
<li>The initial list had marks for which software had portable versions to other operating systems (OpenSSH being the most popular example)</li>
<li>A developer compiled a new list from all of the replies to that thread into a nice organized webpage</li>
<li>Most people are only familiar with things like OpenSSH, OpenSMTPD, OpenNTPD and more recently LibreSSL, but there are quite a lot more</li>
<li>This page also serves as a good history lesson for BSD in general: FreeBSD and others have ported some things over, while a couple OpenBSD tools were born from forks of FreeBSD tools (mergemaster, pkg tools, portscout)
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/howto-monitor-network-traffic-with-netflow-nfdump-nfsen-on-freebsd.49724/" rel="nofollow">Monitoring network traffic with FreeBSD</a></h3>

<ul>
<li>If you&#39;ve ever been curious about monitoring network traffic on your FreeBSD boxes, this forum post may be exactly the thing for you</li>
<li>It&#39;ll show you how to combine the Netflow, NfDump and NfSen suite of tools to get some pretty detailed network stats (and of course put them into a fancy webpage)</li>
<li>This is especially useful for finding out what was going on at a certain point in time, for example if you had a traffic spike
***</li>
</ul>

<h3><a href="http://www.protoc.org/blog/2014/12/22/trapping-spammers-with-the-openbsd-spam-deferral-daemon" rel="nofollow">Trapping spammers with spamd</a></h3>

<ul>
<li>This is a blog post about OpenBSD&#39;s <a href="https://en.wikipedia.org/wiki/Spamd" rel="nofollow">spamd</a> - a spam email deferral daemon - and how to use it for your mail</li>
<li>It gives some background on the greylisting approach to spam, rather than just a typical host blacklist</li>
<li>&quot;Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will &quot;temporarily reject&quot; any email from a sender it does not recognize. If the sender re-attempts mail delivery at a later time, the sender may be allowed to continue the mail delivery conversation.&quot;</li>
<li>The post also shows how to combine it with PF and other tools for a pretty fancy mail setup</li>
<li>You can find spamd in the OpenBSD <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/spamd.8" rel="nofollow">base system</a>, or use it <a href="https://www.freshports.org/mail/spamd" rel="nofollow">with FreeBSD</a> <a href="http://pkgsrc.se/mail/spamd" rel="nofollow">or NetBSD</a> via ports and pkgsrc</li>
<li>You might also want to go back and listen to <a href="https://archive.org/details/bsdtalk068" rel="nofollow">BSDTalk episode 68</a>, where Will talks to Bob Beck about spamd
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20rUK9XVJ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20nfzIuT2" rel="nofollow">Brandon writes in</a></li>
<li><a href="http://slexy.org/view/s20wCBhFLO" rel="nofollow">Anders writes in</a></li>
<li><a href="http://slexy.org/view/s20xGrBIyl" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2QHRaiZJW" rel="nofollow">Kyle writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141903858708123&w=2" rel="nofollow">NTP code comparison</a> - <a href="https://www.marc.info/?l=openbsd-tech&m=141905854411370&w=2" rel="nofollow">192870 vs. 2898</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-December/046741.html" rel="nofollow">NICs have feelings too</a></li>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=141998130824977&w=2" rel="nofollow">Just think about it</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our last episode of 2014, and we&#39;ll be chatting with Dan Langille about the upcoming BSDCan conference. We&#39;ll find out what&#39;s planned and what sorts of presentations they&#39;re looking for. As usual, answers to viewer-submitted questions and all the week&#39;s news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">More conference presentation videos</a></h3>

<ul>
<li>Some more of the presentation videos from AsiaBSDCon are appearing online</li>
<li>Masanobu Saitoh, <a href="https://www.youtube.com/watch?v=ApruZrU5fVs" rel="nofollow">Developing CPE Routers Based on NetBSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">Reyk Floeter</a>, <a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" rel="nofollow">VXLAN and Cloud-based Networking with OpenBSD</a></li>
<li>Jos Jansen, <a href="https://www.youtube.com/watch?v=gOPfRQgTjNo" rel="nofollow">Adapting OS X to the enterprise</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_01-edgy_bsd_users" rel="nofollow">Pierre Pronchery</a> &amp; Guillaume Lasmayous, <a href="https://www.youtube.com/watch?v=vh-TjLUj6os" rel="nofollow">Carve your NetBSD</a> &lt;!-- skip to 5:06 for henning trolling --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>, <a href="https://www.youtube.com/watch?v=jzY3m5Kv7Y8" rel="nofollow">Everything you need to know about cryptography in 1 hour</a> (not from AsiaBSDCon)</li>
<li>The &quot;bsdconferences&quot; YouTube channel has quite a lot of interesting <a href="https://www.youtube.com/user/bsdconferences/videos?sort=da&view=0&flow=grid" rel="nofollow">older BSD talks</a> too - you may want to go back and watch them if you haven&#39;t already
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=141922027318727&w=2" rel="nofollow">OpenBSD PIE enhancements</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">ASLR</a> and <a href="https://en.wikipedia.org/wiki/Position-independent_executable" rel="nofollow">PIE</a> are great security features that OpenBSD has had enabled by default for a long time, in both the base system and ports, but they have one inherent problem</li>
<li>They only work with <em>dynamic</em> libraries and binaries, so if you have any static binaries, they don&#39;t get the same treatment</li>
<li>For example, the default shells (and many other things in /bin and /sbin) are statically linked</li>
<li>In the case of the static ones, you can always predict the memory layout, which is very bad and sort of <a href="https://en.wikipedia.org/wiki/Return-oriented_programming" rel="nofollow">defeats the whole purpose</a></li>
<li>With this and a few <a href="https://www.marc.info/?l=openbsd-cvs&m=141927571832106&w=2" rel="nofollow">related commits</a>, OpenBSD fixes this by introducing <strong>static self-relocation</strong></li>
<li>More and more CPU architectures are being tested and getting support too; this isn&#39;t just for amd64 and i386 - VAX users can rest easy</li>
<li>It&#39;ll be available in 5.7 in May, or you can use a <a href="http://www.openbsd.org/faq/faq5.html#BldBinary" rel="nofollow">-current snapshot</a> if you want to get a <em>slice</em> of the action now
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2014dec-newsletter.html" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation publishes a huge newsletter twice a year, detailing their funded projects and some community activities</li>
<li>As always, it starts with a letter from the president of the foundation - this time it&#39;s about encouraging students and new developers to get involved</li>
<li>The article also has a fundraising update with a list of sponsored projects, and they note that the donations meter has changed from dollars to number of donors (since they exceeded the goal already)</li>
<li>You can read summaries of all the BSD conferences of 2014 and see a list of upcoming ones next year too</li>
<li>There are also sections about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a>&#39;s progress, a new staff member and a testimonial from NetApp</li>
<li>It&#39;s a very long report, so dedicate some time to read all the way through it</li>
<li>This year was pretty great for BSD: both the FreeBSD and OpenBSD foundations exceeded their goals and the NetBSD foundation came really close too</li>
<li>As we go into 2015, consider donating to <a href="https://www.freebsdfoundation.org/donate" rel="nofollow">whichever</a> <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">BSD</a> <a href="https://www.netbsd.org/donations/" rel="nofollow">you</a> <a href="http://www.dragonflybsd.org/donations/" rel="nofollow">use</a>, it really can make a difference
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=141920089614758&w=4" rel="nofollow">Modernizing OpenSSH fingerprints</a></h3>

<ul>
<li>When you connect to a server for the first time, you&#39;ll get what&#39;s called a fingerprint of the host&#39;s public key - this is used to verify that you&#39;re actually talking to the same server you intended to</li>
<li>Up until now, the key fingerprints have been an MD5 hash, displayed as hex</li>
<li>This <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033117.html" rel="nofollow">can be problematic</a>, especially for larger key types like RSA that give lots of wiggle room for collisions, as an attacker could generate a fake host key that gives the same MD5 string as the one you wanted to connect to</li>
<li>This new change replaces the default MD5 and hex with a base64-encoded SHA256 fingerprint</li>
<li>You can add a &quot;FingerprintHash&quot; line in your ssh_config to force using only the new type</li>
<li>There&#39;s also a <a href="https://www.marc.info/?l=openbsd-cvs&m=141923470520906&w=2" rel="nofollow">new option</a> to require users to authenticate with <strong>more than one</strong> public key, so you can really lock down login access to your servers - also useful if you&#39;re not 100% confident in any single key type</li>
<li>The new options should be in the upcoming 6.8 release
***</li>
</ul>

<h2>Interview - Dan Langille - <a href="mailto:info@bsdcan.org" rel="nofollow">info@bsdcan.org</a> / <a href="https://twitter.com/bsdcan" rel="nofollow">@bsdcan</a></h2>

<p>Plans for the BSDCan 2015 conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/bsdphk/Ntimed" rel="nofollow">Introducing ntimed, a new NTP daemon</a></h3>

<ul>
<li>As we&#39;ve mentioned before in <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">our tutorials</a>, there are two main daemons for the Network Time Protocol - ISC&#39;s NTPd and OpenBSD&#39;s OpenNTPD</li>
<li>With all the recent security problems with ISC&#39;s NTPd, <a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">Poul-Henning Kamp</a> has been working on a third NTP daemon</li>
<li>It&#39;s called &quot;ntimed&quot; and you can try out a preview version of it right now - it&#39;s <a href="https://www.freshports.org/net/ntimed/" rel="nofollow">in FreeBSD ports</a> or on Github</li>
<li>PHK also has a few <a href="http://phk.freebsd.dk/time/" rel="nofollow">blog entries</a> about the project, including status updates
***</li>
</ul>

<h3><a href="http://mdocml.bsd.lv/openbsd_projects.html" rel="nofollow">OpenBSD-maintained projects list</a></h3>

<ul>
<li>There was recently a read on the <a href="https://www.marc.info/?t=141961588200003&r=1&w=2" rel="nofollow">misc mailing list</a> asking about different projects started by OpenBSD developers</li>
<li>The initial list had marks for which software had portable versions to other operating systems (OpenSSH being the most popular example)</li>
<li>A developer compiled a new list from all of the replies to that thread into a nice organized webpage</li>
<li>Most people are only familiar with things like OpenSSH, OpenSMTPD, OpenNTPD and more recently LibreSSL, but there are quite a lot more</li>
<li>This page also serves as a good history lesson for BSD in general: FreeBSD and others have ported some things over, while a couple OpenBSD tools were born from forks of FreeBSD tools (mergemaster, pkg tools, portscout)
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/howto-monitor-network-traffic-with-netflow-nfdump-nfsen-on-freebsd.49724/" rel="nofollow">Monitoring network traffic with FreeBSD</a></h3>

<ul>
<li>If you&#39;ve ever been curious about monitoring network traffic on your FreeBSD boxes, this forum post may be exactly the thing for you</li>
<li>It&#39;ll show you how to combine the Netflow, NfDump and NfSen suite of tools to get some pretty detailed network stats (and of course put them into a fancy webpage)</li>
<li>This is especially useful for finding out what was going on at a certain point in time, for example if you had a traffic spike
***</li>
</ul>

<h3><a href="http://www.protoc.org/blog/2014/12/22/trapping-spammers-with-the-openbsd-spam-deferral-daemon" rel="nofollow">Trapping spammers with spamd</a></h3>

<ul>
<li>This is a blog post about OpenBSD&#39;s <a href="https://en.wikipedia.org/wiki/Spamd" rel="nofollow">spamd</a> - a spam email deferral daemon - and how to use it for your mail</li>
<li>It gives some background on the greylisting approach to spam, rather than just a typical host blacklist</li>
<li>&quot;Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will &quot;temporarily reject&quot; any email from a sender it does not recognize. If the sender re-attempts mail delivery at a later time, the sender may be allowed to continue the mail delivery conversation.&quot;</li>
<li>The post also shows how to combine it with PF and other tools for a pretty fancy mail setup</li>
<li>You can find spamd in the OpenBSD <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/spamd.8" rel="nofollow">base system</a>, or use it <a href="https://www.freshports.org/mail/spamd" rel="nofollow">with FreeBSD</a> <a href="http://pkgsrc.se/mail/spamd" rel="nofollow">or NetBSD</a> via ports and pkgsrc</li>
<li>You might also want to go back and listen to <a href="https://archive.org/details/bsdtalk068" rel="nofollow">BSDTalk episode 68</a>, where Will talks to Bob Beck about spamd
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20rUK9XVJ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20nfzIuT2" rel="nofollow">Brandon writes in</a></li>
<li><a href="http://slexy.org/view/s20wCBhFLO" rel="nofollow">Anders writes in</a></li>
<li><a href="http://slexy.org/view/s20xGrBIyl" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2QHRaiZJW" rel="nofollow">Kyle writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141903858708123&w=2" rel="nofollow">NTP code comparison</a> - <a href="https://www.marc.info/?l=openbsd-tech&m=141905854411370&w=2" rel="nofollow">192870 vs. 2898</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-December/046741.html" rel="nofollow">NICs have feelings too</a></li>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=141998130824977&w=2" rel="nofollow">Just think about it</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>66: Conference Connoisseur</title>
  <link>https://www.bsdnow.tv/66</link>
  <guid isPermaLink="false">e76cf015-25d3-4a75-89c3-629d1f6d9a87</guid>
  <pubDate>Wed, 03 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e76cf015-25d3-4a75-89c3-629d1f6d9a87.mp3" length="59426068" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We've also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We've also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
More BSD presentation videos (https://www.meetbsd.com/)
The MeetBSD video uploading spree continues with a few more talks, maybe this'll be the last batch
Corey Vixie, Web Apps in Embedded BSD (https://www.youtube.com/watch?v=Pbks12Mqpp8)
Allan Jude, UCL config (https://www.youtube.com/watch?v=TjP86iWsEzQ)
Kip Macy, iflib (https://www.youtube.com/watch?v=P4FRPKj7F80)
While we're on the topic of conferences, AsiaBSDCon's CFP was extended (https://twitter.com/asiabsdcon/status/538352055245492226) by one week
This year's ruBSD (https://events.yandex.ru/events/yagosti/rubsd14/) will be on December 13th in Moscow
Also, the BSDCan call for papers (http://lists.bsdcan.org/pipermail/bsdcan-announce/2014-December/000135.html) is out, and the event will be in June next year
Lastly, according to Rick Miller, "A potential vBSDcon 2015 event is being explored though a decision has yet to be made."
***
BSD-powered digital library in Africa (http://peercorpsglobal.org/nzegas-digital-library-becomes-a-reality/)
You probably haven't heard much about Nzega, Tanzania, but it's an East African country without much internet access
With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school
They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)
The school's workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it
***
pfSense 2.2 status update (https://blog.pfsense.org/?p=1486)
With lots of people asking when the 2.2 release will be done, some pfSense developers decided to provide a status update
2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc
All these things have taken more time than previously expected
The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release
***
Recommended hardware threads (https://www.reddit.com/r/BSD/comments/2n8wrg/bsd_on_mini_itx/)
A few threads on caught our attention this week, all about hardware recommendations for BSD setups
In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS
Everyone gave some good recommendations for low power, Atom-based systems
The second thread (https://www.marc.info/?t=141694918800006&amp;amp;r=1&amp;amp;w=2) started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread
For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the third (https://www.reddit.com/r/homelab/comments/24m6tj/) and fourth (https://www.reddit.com/r/PFSENSE/comments/2nblgp/) threads confirming this
If you're thinking about building your first BSD box - server, router, NAS, whatever - these might be some good links to read
***
Interview - Paul Schenkeveld - freebsd@psconsult.nl (mailto:freebsd@psconsult.nl)
Running a BSD conference
News Roundup
From Linux to FreeBSD - for reals (https://www.reddit.com/r/freebsd/comments/2nqa60/)
Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)
After being a Linux guy for 20(!) years, he's ready to switch his systems over, and is looking for some helpful guides to transition
In the comments, a lot of new switchers offer some advice and reading material
If any of the listeners have some things that were helpful along your switching journey, maybe send 'em this guy's way
***
Running FreeBSD as a Xen Dom0 (http://wiki.xenproject.org/wiki/FreeBSD_Dom0)
Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor
This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it
Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)
The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet
***
HardenedBSD updates and changes (http://hardenedbsd.org/article/shawn-webb/2014-11-18/aout-and-null-mapping-support-removal)
a.out is the old executable format for Unix
The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968
FreeBSD, on which HardenedBSD is based, switched away from a.out in version 3.0
A restriction against NULL mapping was introduced in FreeBSD 7 (https://www.freebsd.org/security/advisories/FreeBSD-EN-09:05.null.asc) and enabled by default in FreeBSD 8
However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited
HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’
Package building update: more consistent repo, no more i386 packages  (http://hardenedbsd.org/article/shawn-webb/2014-11-30/package-building-infrastructure-maintenance)
***
Feedback/Questions
Boris writes in (http://slexy.org/view/s2kVPKICqj)
Alex writes in (http://slexy.org/view/s21Fic4dZC) (&lt;b&gt;edit:&lt;/b&gt; adding "tinker panic 0" to the ntp.conf will disable the sanity check)
Chris writes in (http://slexy.org/view/s2zk1Tvfe9)
Robert writes in (http://slexy.org/view/s22alvJ4mu)
Jake writes in (http://slexy.org/view/s203YMc2zL)
***
Mailing List Gold
Real world authpf use (https://www.marc.info/?t=141711266800001&amp;amp;r=1&amp;amp;w=2)
The (https://svnweb.freebsd.org/ports/head/UPDATING?r1=373564&amp;amp;r2=373563&amp;amp;pathrev=373564) great (https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096788.html) perl (https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096799.html) event (https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010146.html) of (https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010149.html) 2014 (https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010167.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, eurobsdcon, meetbsd, bsdcan, asiabsdcon, conference, community, organization, foundation, pfsense, soekris, router, alix, apu, netgate, pcengines</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We&#39;ve also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">More BSD presentation videos</a></h3>

<ul>
<li>The MeetBSD video uploading spree continues with a few more talks, maybe this&#39;ll be the last batch</li>
<li>Corey Vixie, <a href="https://www.youtube.com/watch?v=Pbks12Mqpp8" rel="nofollow">Web Apps in Embedded BSD</a></li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=TjP86iWsEzQ" rel="nofollow">UCL config</a></li>
<li>Kip Macy, <a href="https://www.youtube.com/watch?v=P4FRPKj7F80" rel="nofollow">iflib</a></li>
<li>While we&#39;re on the topic of conferences, AsiaBSDCon&#39;s CFP was <a href="https://twitter.com/asiabsdcon/status/538352055245492226" rel="nofollow">extended</a> by one week</li>
<li>This year&#39;s <a href="https://events.yandex.ru/events/yagosti/rubsd14/" rel="nofollow">ruBSD</a> will be on December 13th in Moscow</li>
<li>Also, the <a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2014-December/000135.html" rel="nofollow">BSDCan call for papers</a> is out, and the event will be in June next year</li>
<li>Lastly, according to Rick Miller, &quot;A potential vBSDcon 2015 event is being explored though a decision has yet to be made.&quot;
***</li>
</ul>

<h3><a href="http://peercorpsglobal.org/nzegas-digital-library-becomes-a-reality/" rel="nofollow">BSD-powered digital library in Africa</a></h3>

<ul>
<li>You probably haven&#39;t heard much about Nzega, Tanzania, but it&#39;s an East African country without much internet access</li>
<li>With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school</li>
<li>They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)</li>
<li>The school&#39;s workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1486" rel="nofollow">pfSense 2.2 status update</a></h3>

<ul>
<li>With lots of people asking when the 2.2 release will be done, some pfSense developers decided to provide a status update</li>
<li>2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc</li>
<li>All these things have taken more time than previously expected</li>
<li>The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2n8wrg/bsd_on_mini_itx/" rel="nofollow">Recommended hardware threads</a></h3>

<ul>
<li>A few threads on caught our attention this week, all about hardware recommendations for BSD setups</li>
<li>In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS</li>
<li>Everyone gave some good recommendations for low power, Atom-based systems</li>
<li>The <a href="https://www.marc.info/?t=141694918800006&r=1&w=2" rel="nofollow">second thread</a> started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread</li>
<li>For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the <a href="https://www.reddit.com/r/homelab/comments/24m6tj/" rel="nofollow">third</a> and <a href="https://www.reddit.com/r/PFSENSE/comments/2nblgp/" rel="nofollow">fourth</a> threads confirming this</li>
<li>If you&#39;re thinking about building your first BSD box - server, router, NAS, whatever - these might be some good links to read
***</li>
</ul>

<h2>Interview - Paul Schenkeveld - <a href="mailto:freebsd@psconsult.nl" rel="nofollow">freebsd@psconsult.nl</a></h2>

<p>Running a BSD conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2nqa60/" rel="nofollow">From Linux to FreeBSD - for reals</a></h3>

<ul>
<li>Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)</li>
<li>After being a Linux guy for 20(!) years, he&#39;s ready to switch his systems over, and is looking for some helpful guides to transition</li>
<li>In the comments, a lot of new switchers offer some advice and reading material</li>
<li>If any of the listeners have some things that were helpful along your switching journey, maybe send &#39;em this guy&#39;s way
***</li>
</ul>

<h3><a href="http://wiki.xenproject.org/wiki/FreeBSD_Dom0" rel="nofollow">Running FreeBSD as a Xen Dom0</a></h3>

<ul>
<li>Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor</li>
<li>This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it</li>
<li>Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)</li>
<li>The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-11-18/aout-and-null-mapping-support-removal" rel="nofollow">HardenedBSD updates and changes</a></h3>

<ul>
<li>a.out is the old executable format for Unix</li>
<li>The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968</li>
<li>FreeBSD, on which HardenedBSD is based, switched away from a.out in version 3.0</li>
<li>A restriction against NULL mapping was introduced in <a href="https://www.freebsd.org/security/advisories/FreeBSD-EN-09:05.null.asc" rel="nofollow">FreeBSD 7</a> and enabled by default in FreeBSD 8</li>
<li>However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited</li>
<li>HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’</li>
<li>Package building update: <a href="http://hardenedbsd.org/article/shawn-webb/2014-11-30/package-building-infrastructure-maintenance" rel="nofollow">more consistent repo, no more i386 packages </a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kVPKICqj" rel="nofollow">Boris writes in</a></li>
<li><a href="http://slexy.org/view/s21Fic4dZC" rel="nofollow">Alex writes in</a> (<b>edit:</b> adding &quot;tinker panic 0&quot; to the ntp.conf will disable the sanity check)</li>
<li><a href="http://slexy.org/view/s2zk1Tvfe9" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s22alvJ4mu" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s203YMc2zL" rel="nofollow">Jake writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141711266800001&r=1&w=2" rel="nofollow">Real world authpf use</a></li>
<li><a href="https://svnweb.freebsd.org/ports/head/UPDATING?r1=373564&r2=373563&pathrev=373564" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096788.html" rel="nofollow">great</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096799.html" rel="nofollow">perl</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010146.html" rel="nofollow">event</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010149.html" rel="nofollow">of</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010167.html" rel="nofollow">2014</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We&#39;ve also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">More BSD presentation videos</a></h3>

<ul>
<li>The MeetBSD video uploading spree continues with a few more talks, maybe this&#39;ll be the last batch</li>
<li>Corey Vixie, <a href="https://www.youtube.com/watch?v=Pbks12Mqpp8" rel="nofollow">Web Apps in Embedded BSD</a></li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=TjP86iWsEzQ" rel="nofollow">UCL config</a></li>
<li>Kip Macy, <a href="https://www.youtube.com/watch?v=P4FRPKj7F80" rel="nofollow">iflib</a></li>
<li>While we&#39;re on the topic of conferences, AsiaBSDCon&#39;s CFP was <a href="https://twitter.com/asiabsdcon/status/538352055245492226" rel="nofollow">extended</a> by one week</li>
<li>This year&#39;s <a href="https://events.yandex.ru/events/yagosti/rubsd14/" rel="nofollow">ruBSD</a> will be on December 13th in Moscow</li>
<li>Also, the <a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2014-December/000135.html" rel="nofollow">BSDCan call for papers</a> is out, and the event will be in June next year</li>
<li>Lastly, according to Rick Miller, &quot;A potential vBSDcon 2015 event is being explored though a decision has yet to be made.&quot;
***</li>
</ul>

<h3><a href="http://peercorpsglobal.org/nzegas-digital-library-becomes-a-reality/" rel="nofollow">BSD-powered digital library in Africa</a></h3>

<ul>
<li>You probably haven&#39;t heard much about Nzega, Tanzania, but it&#39;s an East African country without much internet access</li>
<li>With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school</li>
<li>They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)</li>
<li>The school&#39;s workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1486" rel="nofollow">pfSense 2.2 status update</a></h3>

<ul>
<li>With lots of people asking when the 2.2 release will be done, some pfSense developers decided to provide a status update</li>
<li>2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc</li>
<li>All these things have taken more time than previously expected</li>
<li>The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2n8wrg/bsd_on_mini_itx/" rel="nofollow">Recommended hardware threads</a></h3>

<ul>
<li>A few threads on caught our attention this week, all about hardware recommendations for BSD setups</li>
<li>In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS</li>
<li>Everyone gave some good recommendations for low power, Atom-based systems</li>
<li>The <a href="https://www.marc.info/?t=141694918800006&r=1&w=2" rel="nofollow">second thread</a> started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread</li>
<li>For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the <a href="https://www.reddit.com/r/homelab/comments/24m6tj/" rel="nofollow">third</a> and <a href="https://www.reddit.com/r/PFSENSE/comments/2nblgp/" rel="nofollow">fourth</a> threads confirming this</li>
<li>If you&#39;re thinking about building your first BSD box - server, router, NAS, whatever - these might be some good links to read
***</li>
</ul>

<h2>Interview - Paul Schenkeveld - <a href="mailto:freebsd@psconsult.nl" rel="nofollow">freebsd@psconsult.nl</a></h2>

<p>Running a BSD conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2nqa60/" rel="nofollow">From Linux to FreeBSD - for reals</a></h3>

<ul>
<li>Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)</li>
<li>After being a Linux guy for 20(!) years, he&#39;s ready to switch his systems over, and is looking for some helpful guides to transition</li>
<li>In the comments, a lot of new switchers offer some advice and reading material</li>
<li>If any of the listeners have some things that were helpful along your switching journey, maybe send &#39;em this guy&#39;s way
***</li>
</ul>

<h3><a href="http://wiki.xenproject.org/wiki/FreeBSD_Dom0" rel="nofollow">Running FreeBSD as a Xen Dom0</a></h3>

<ul>
<li>Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor</li>
<li>This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it</li>
<li>Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)</li>
<li>The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-11-18/aout-and-null-mapping-support-removal" rel="nofollow">HardenedBSD updates and changes</a></h3>

<ul>
<li>a.out is the old executable format for Unix</li>
<li>The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968</li>
<li>FreeBSD, on which HardenedBSD is based, switched away from a.out in version 3.0</li>
<li>A restriction against NULL mapping was introduced in <a href="https://www.freebsd.org/security/advisories/FreeBSD-EN-09:05.null.asc" rel="nofollow">FreeBSD 7</a> and enabled by default in FreeBSD 8</li>
<li>However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited</li>
<li>HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’</li>
<li>Package building update: <a href="http://hardenedbsd.org/article/shawn-webb/2014-11-30/package-building-infrastructure-maintenance" rel="nofollow">more consistent repo, no more i386 packages </a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kVPKICqj" rel="nofollow">Boris writes in</a></li>
<li><a href="http://slexy.org/view/s21Fic4dZC" rel="nofollow">Alex writes in</a> (<b>edit:</b> adding &quot;tinker panic 0&quot; to the ntp.conf will disable the sanity check)</li>
<li><a href="http://slexy.org/view/s2zk1Tvfe9" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s22alvJ4mu" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s203YMc2zL" rel="nofollow">Jake writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141711266800001&r=1&w=2" rel="nofollow">Real world authpf use</a></li>
<li><a href="https://svnweb.freebsd.org/ports/head/UPDATING?r1=373564&r2=373563&pathrev=373564" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096788.html" rel="nofollow">great</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096799.html" rel="nofollow">perl</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010146.html" rel="nofollow">event</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010149.html" rel="nofollow">of</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010167.html" rel="nofollow">2014</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>59: BSDって聞いたことある？</title>
  <link>https://www.bsdnow.tv/59</link>
  <guid isPermaLink="false">b1712d17-1c5f-4c0a-8722-3ad171336d67</guid>
  <pubDate>Wed, 15 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b1712d17-1c5f-4c0a-8722-3ad171336d67.mp3" length="57694324" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we'll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSD talks at XDC 2014 (https://www.youtube.com/channel/UCXlH5v1PkEhjzLFTUTm_U7g/videos)
This year's Xorg conference featured a few BSD-related talks
Matthieu Herrb, Status of the OpenBSD graphics stack (https://www.youtube.com/watch?v=KopgD4nTtnA)
Matthieu's talk details what's been done recently in Xenocara the OpenBSD kernel for graphics (slides here (http://www.openbsd.org/papers/xdc2014-xenocara.pdf))
Jean-Sébastien Pédron, The status of the graphics stack on FreeBSD (https://www.youtube.com/watch?v=POmxFleN3Bc) 
His presentation gives a history of major changes and outlines the current overall status of graphics in FreeBSD (slides here (http://www.x.org/wiki/Events/XDC2014/XDC2014PedronFreeBSD/XDC-2014_FreeBSD.pdf))
Francois Tigeot, Porting DRM/KMS drivers to DragonFlyBSD (https://www.youtube.com/watch?v=NdM7_yPGFDk)
Francois' talk tells the story of how he ported some of the DRM and KMS kernel drivers to DragonFly (slides here (http://www.x.org/wiki/Events/XDC2014/XDC2014TigeotDragonFlyBSD/XDC-2014_Porting_kms_drivers_to_DragonFly.pdf))
***
FreeBSD Quarterly Status Report (https://www.freebsd.org/news/status/report-2014-07-2014-09.html)
The FreeBSD project has a report of their activities between July and September of this year
Lots of ARM work has been done, and a goal for 11.0 is tier one support for the platform
The release includes reports from the cluster admin team, release team, ports team, core team and much more, but we've already covered most of the items on the show
If you're interested in seeing what the FreeBSD community has been up to lately, check the full report - it's huge
***
Monitoring pfSense logs using ELK (http://elijahpaul.co.uk/monitoring-pfsense-2-1-logs-using-elk-logstash-kibana-elasticsearch/)
If you're one of those people who loves the cool graphs and charts that pfSense can produce, this is the post for you
ELK (ElasticSearch, Logstash, Kibana) is a group of tools that let you collect, store, search and (most importantly) visualize logs
It works with lots of different things that output logs and can be sent to one central server for displaying
This post shows you how to set up pfSense to do remote logging to ELK and get some pretty awesome graphs
***
Some updates to IPFW (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=272840)
Even though PF gets a lot of attention, a lot of FreeBSD people still love IPFW
While mostly a dormant section of the source tree, some updates were recently committed to -CURRENT
The commit lists the user-visible changes, performance changes, ABI changes and internal changes
It should be merged back to -STABLE after a month or so of testing, and will probably end up in 10.2-RELEASE
Also check this blog post (http://blog.cochard.me/2014/10/ipfw-improvement-on-freebsd-current.html) for some more information and fancy graphs
***
Interview - Hiroki Sato (佐藤広生) - hrs@freebsd.org (mailto:hrs@freebsd.org) / @hiroki_sato (https://twitter.com/hiroki_sato)
BSD in Japan, technology conferences, various topics
News Roundup
pfSense on Hyper-V (https://virtual-ops.de/?p=600)
In case you didn't know, the latest pfSense snapshots support running on Hyper-V
Unfortunately, the current stable release is based on an old, unsupported FreeBSD 8.x base, so you have to use the snapshots for now
The author of the post tells about his experience running pfSense and gives lots of links to read if you're interested in doing the same
He also praises pfSense above other Linux-based solutions for its IPv6 support and high quality code
***
OpenBSD as a daily driver (https://www.reddit.com/r/openbsd/comments/2isz24/openbsd_as_a_daily_driver/)
A curious Reddit user posts to ask the community about using OpenBSD as an everyday desktop OS
The overall consensus is that it works great for that, stays out of your way and is quite reliable
Caveats would include there being no Adobe Flash support (though others consider this a blessing..) and it requiring a more hands-on approach to updating
If you're considering running OpenBSD as a "daily driver," check all the comments for more information and tips
***
Getting PF log statistics (https://secure.ciscodude.net/2014/10/09/firewall-log-stats/)
The author of this post runs an OpenBSD box in front of all his VMs at his colocation, and details his experiences with firewall logs
He usually investigates any IPs of interest with whois, nslookup, etc. - but this gets repetitive quickly, so..
He sets out to find the best way to gather firewall log statistics
After coming across a perl script (http://www.pantz.org/software/pf/pantzpfblockstats.html) to do this, he edited it a bit and is now a happy, lazy admin once again
You can try out his updated PF script here (https://github.com/tbaschak/Pantz-PFlog-Stats)
***
FlashRD 1.7 released (http://www.nmedia.net/flashrd/)
In case anyone's not familiar, flashrd is a tool to create OpenBSD images for embedded hardware devices, executing from a virtualized environment
This new version is based on (the currently unreleased) OpenBSD 5.6, and automatically adapts to the number of CPUs you have for building
It also includes fixes for 4k drives and lots of various other improvements
If you're interested in learning more, take a look at some of the slides and audio from the main developer on the website
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s20XvSa4h0)
Don writes in (http://slexy.org/view/s20lGUXW3d)
Andriy writes in (http://slexy.org/view/s2al5DFIO7)
Richard writes in (http://slexy.org/view/s203QoFuWs)
Robert writes in (http://slexy.org/view/s29WIplL6k)
***
Mailing List Gold
Subtle trolling (https://marc.info/?l=openbsd-cvs&amp;amp;m=141271076115386&amp;amp;w=2)
Old bugs with old fixes (https://marc.info/?l=openbsd-cvs&amp;amp;m=141275713329601&amp;amp;w=2)
A pig reinstall (https://lists.freebsd.org/pipermail/freebsd-ports/2014-October/095906.html)
Strange DOS-like environment (https://lists.freebsd.org/pipermail/freebsd-doc/2014-October/024408.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, japan, japanese, 日本語, conference, hiroki sato, daichi goto, 後藤大地, 佐藤広生, allbsd, eurobsdcon, asiabsdcon, flashrd, freenas, pfsense, xdc2014</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCXlH5v1PkEhjzLFTUTm_U7g/videos" rel="nofollow">BSD talks at XDC 2014</a></h3>

<ul>
<li>This year&#39;s Xorg conference featured a few BSD-related talks</li>
<li>Matthieu Herrb, <a href="https://www.youtube.com/watch?v=KopgD4nTtnA" rel="nofollow">Status of the OpenBSD graphics stack</a></li>
<li>Matthieu&#39;s talk details what&#39;s been done recently in Xenocara the OpenBSD kernel for graphics (<a href="http://www.openbsd.org/papers/xdc2014-xenocara.pdf" rel="nofollow">slides here</a>)</li>
<li>Jean-Sébastien Pédron, <a href="https://www.youtube.com/watch?v=POmxFleN3Bc" rel="nofollow">The status of the graphics stack on FreeBSD</a> </li>
<li>His presentation gives a history of major changes and outlines the current overall status of graphics in FreeBSD (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014PedronFreeBSD/XDC-2014_FreeBSD.pdf" rel="nofollow">slides here</a>)</li>
<li>Francois Tigeot, <a href="https://www.youtube.com/watch?v=NdM7_yPGFDk" rel="nofollow">Porting DRM/KMS drivers to DragonFlyBSD</a></li>
<li>Francois&#39; talk tells the story of how he ported some of the DRM and KMS kernel drivers to DragonFly (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014TigeotDragonFlyBSD/XDC-2014_Porting_kms_drivers_to_DragonFly.pdf" rel="nofollow">slides here</a>)
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-07-2014-09.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The FreeBSD project has a report of their activities between July and September of this year</li>
<li>Lots of ARM work has been done, and a goal for 11.0 is tier one support for the platform</li>
<li>The release includes reports from the cluster admin team, release team, ports team, core team and much more, but we&#39;ve already covered most of the items on the show</li>
<li>If you&#39;re interested in seeing what the FreeBSD community has been up to lately, check the full report - it&#39;s huge
***</li>
</ul>

<h3><a href="http://elijahpaul.co.uk/monitoring-pfsense-2-1-logs-using-elk-logstash-kibana-elasticsearch/" rel="nofollow">Monitoring pfSense logs using ELK</a></h3>

<ul>
<li>If you&#39;re one of those people who loves the cool graphs and charts that pfSense can produce, this is the post for you</li>
<li>ELK (ElasticSearch, Logstash, Kibana) is a group of tools that let you collect, store, search and (most importantly) visualize logs</li>
<li>It works with lots of different things that output logs and can be sent to one central server for displaying</li>
<li>This post shows you how to set up pfSense to do remote logging to ELK and get some pretty awesome graphs
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=272840" rel="nofollow">Some updates to IPFW</a></h3>

<ul>
<li>Even though PF gets a lot of attention, a lot of FreeBSD people still love IPFW</li>
<li>While mostly a dormant section of the source tree, some updates were recently committed to -CURRENT</li>
<li>The commit lists the user-visible changes, performance changes, ABI changes and internal changes</li>
<li>It should be merged back to -STABLE after a month or so of testing, and will probably end up in 10.2-RELEASE</li>
<li>Also check <a href="http://blog.cochard.me/2014/10/ipfw-improvement-on-freebsd-current.html" rel="nofollow">this blog post</a> for some more information and fancy graphs
***</li>
</ul>

<h2>Interview - Hiroki Sato (佐藤広生) - <a href="mailto:hrs@freebsd.org" rel="nofollow">hrs@freebsd.org</a> / <a href="https://twitter.com/hiroki_sato" rel="nofollow">@hiroki_sato</a></h2>

<p>BSD in Japan, technology conferences, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://virtual-ops.de/?p=600" rel="nofollow">pfSense on Hyper-V</a></h3>

<ul>
<li>In case you didn&#39;t know, the latest pfSense snapshots support running on Hyper-V</li>
<li>Unfortunately, the current stable release is based on an old, unsupported FreeBSD 8.x base, so you have to use the snapshots for now</li>
<li>The author of the post tells about his experience running pfSense and gives lots of links to read if you&#39;re interested in doing the same</li>
<li>He also praises pfSense above other Linux-based solutions for its IPv6 support and high quality code
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/openbsd/comments/2isz24/openbsd_as_a_daily_driver/" rel="nofollow">OpenBSD as a daily driver</a></h3>

<ul>
<li>A curious Reddit user posts to ask the community about using OpenBSD as an everyday desktop OS</li>
<li>The overall consensus is that it works great for that, stays out of your way and is quite reliable</li>
<li>Caveats would include there being no Adobe Flash support (though others consider this a blessing..) and it requiring a more hands-on approach to updating</li>
<li>If you&#39;re considering running OpenBSD as a &quot;daily driver,&quot; check all the comments for more information and tips
***</li>
</ul>

<h3><a href="https://secure.ciscodude.net/2014/10/09/firewall-log-stats/" rel="nofollow">Getting PF log statistics</a></h3>

<ul>
<li>The author of this post runs an OpenBSD box in front of all his VMs at his colocation, and details his experiences with firewall logs</li>
<li>He usually investigates any IPs of interest with whois, nslookup, etc. - but this gets repetitive quickly, so..</li>
<li>He sets out to find the best way to gather firewall log statistics</li>
<li>After coming across <a href="http://www.pantz.org/software/pf/pantzpfblockstats.html" rel="nofollow">a perl script</a> to do this, he edited it a bit and is now a happy, lazy admin once again</li>
<li>You can try out his updated PF script <a href="https://github.com/tbaschak/Pantz-PFlog-Stats" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.nmedia.net/flashrd/" rel="nofollow">FlashRD 1.7 released</a></h3>

<ul>
<li>In case anyone&#39;s not familiar, flashrd is a tool to create OpenBSD images for embedded hardware devices, executing from a virtualized environment</li>
<li>This new version is based on (the currently unreleased) OpenBSD 5.6, and automatically adapts to the number of CPUs you have for building</li>
<li>It also includes fixes for 4k drives and lots of various other improvements</li>
<li>If you&#39;re interested in learning more, take a look at some of the slides and audio from the main developer on the website
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20XvSa4h0" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s20lGUXW3d" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s2al5DFIO7" rel="nofollow">Andriy writes in</a></li>
<li><a href="http://slexy.org/view/s203QoFuWs" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s29WIplL6k" rel="nofollow">Robert writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141271076115386&w=2" rel="nofollow">Subtle trolling</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141275713329601&w=2" rel="nofollow">Old bugs with old fixes</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-October/095906.html" rel="nofollow">A pig reinstall</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2014-October/024408.html" rel="nofollow">Strange DOS-like environment</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCXlH5v1PkEhjzLFTUTm_U7g/videos" rel="nofollow">BSD talks at XDC 2014</a></h3>

<ul>
<li>This year&#39;s Xorg conference featured a few BSD-related talks</li>
<li>Matthieu Herrb, <a href="https://www.youtube.com/watch?v=KopgD4nTtnA" rel="nofollow">Status of the OpenBSD graphics stack</a></li>
<li>Matthieu&#39;s talk details what&#39;s been done recently in Xenocara the OpenBSD kernel for graphics (<a href="http://www.openbsd.org/papers/xdc2014-xenocara.pdf" rel="nofollow">slides here</a>)</li>
<li>Jean-Sébastien Pédron, <a href="https://www.youtube.com/watch?v=POmxFleN3Bc" rel="nofollow">The status of the graphics stack on FreeBSD</a> </li>
<li>His presentation gives a history of major changes and outlines the current overall status of graphics in FreeBSD (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014PedronFreeBSD/XDC-2014_FreeBSD.pdf" rel="nofollow">slides here</a>)</li>
<li>Francois Tigeot, <a href="https://www.youtube.com/watch?v=NdM7_yPGFDk" rel="nofollow">Porting DRM/KMS drivers to DragonFlyBSD</a></li>
<li>Francois&#39; talk tells the story of how he ported some of the DRM and KMS kernel drivers to DragonFly (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014TigeotDragonFlyBSD/XDC-2014_Porting_kms_drivers_to_DragonFly.pdf" rel="nofollow">slides here</a>)
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-07-2014-09.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The FreeBSD project has a report of their activities between July and September of this year</li>
<li>Lots of ARM work has been done, and a goal for 11.0 is tier one support for the platform</li>
<li>The release includes reports from the cluster admin team, release team, ports team, core team and much more, but we&#39;ve already covered most of the items on the show</li>
<li>If you&#39;re interested in seeing what the FreeBSD community has been up to lately, check the full report - it&#39;s huge
***</li>
</ul>

<h3><a href="http://elijahpaul.co.uk/monitoring-pfsense-2-1-logs-using-elk-logstash-kibana-elasticsearch/" rel="nofollow">Monitoring pfSense logs using ELK</a></h3>

<ul>
<li>If you&#39;re one of those people who loves the cool graphs and charts that pfSense can produce, this is the post for you</li>
<li>ELK (ElasticSearch, Logstash, Kibana) is a group of tools that let you collect, store, search and (most importantly) visualize logs</li>
<li>It works with lots of different things that output logs and can be sent to one central server for displaying</li>
<li>This post shows you how to set up pfSense to do remote logging to ELK and get some pretty awesome graphs
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=272840" rel="nofollow">Some updates to IPFW</a></h3>

<ul>
<li>Even though PF gets a lot of attention, a lot of FreeBSD people still love IPFW</li>
<li>While mostly a dormant section of the source tree, some updates were recently committed to -CURRENT</li>
<li>The commit lists the user-visible changes, performance changes, ABI changes and internal changes</li>
<li>It should be merged back to -STABLE after a month or so of testing, and will probably end up in 10.2-RELEASE</li>
<li>Also check <a href="http://blog.cochard.me/2014/10/ipfw-improvement-on-freebsd-current.html" rel="nofollow">this blog post</a> for some more information and fancy graphs
***</li>
</ul>

<h2>Interview - Hiroki Sato (佐藤広生) - <a href="mailto:hrs@freebsd.org" rel="nofollow">hrs@freebsd.org</a> / <a href="https://twitter.com/hiroki_sato" rel="nofollow">@hiroki_sato</a></h2>

<p>BSD in Japan, technology conferences, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://virtual-ops.de/?p=600" rel="nofollow">pfSense on Hyper-V</a></h3>

<ul>
<li>In case you didn&#39;t know, the latest pfSense snapshots support running on Hyper-V</li>
<li>Unfortunately, the current stable release is based on an old, unsupported FreeBSD 8.x base, so you have to use the snapshots for now</li>
<li>The author of the post tells about his experience running pfSense and gives lots of links to read if you&#39;re interested in doing the same</li>
<li>He also praises pfSense above other Linux-based solutions for its IPv6 support and high quality code
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/openbsd/comments/2isz24/openbsd_as_a_daily_driver/" rel="nofollow">OpenBSD as a daily driver</a></h3>

<ul>
<li>A curious Reddit user posts to ask the community about using OpenBSD as an everyday desktop OS</li>
<li>The overall consensus is that it works great for that, stays out of your way and is quite reliable</li>
<li>Caveats would include there being no Adobe Flash support (though others consider this a blessing..) and it requiring a more hands-on approach to updating</li>
<li>If you&#39;re considering running OpenBSD as a &quot;daily driver,&quot; check all the comments for more information and tips
***</li>
</ul>

<h3><a href="https://secure.ciscodude.net/2014/10/09/firewall-log-stats/" rel="nofollow">Getting PF log statistics</a></h3>

<ul>
<li>The author of this post runs an OpenBSD box in front of all his VMs at his colocation, and details his experiences with firewall logs</li>
<li>He usually investigates any IPs of interest with whois, nslookup, etc. - but this gets repetitive quickly, so..</li>
<li>He sets out to find the best way to gather firewall log statistics</li>
<li>After coming across <a href="http://www.pantz.org/software/pf/pantzpfblockstats.html" rel="nofollow">a perl script</a> to do this, he edited it a bit and is now a happy, lazy admin once again</li>
<li>You can try out his updated PF script <a href="https://github.com/tbaschak/Pantz-PFlog-Stats" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.nmedia.net/flashrd/" rel="nofollow">FlashRD 1.7 released</a></h3>

<ul>
<li>In case anyone&#39;s not familiar, flashrd is a tool to create OpenBSD images for embedded hardware devices, executing from a virtualized environment</li>
<li>This new version is based on (the currently unreleased) OpenBSD 5.6, and automatically adapts to the number of CPUs you have for building</li>
<li>It also includes fixes for 4k drives and lots of various other improvements</li>
<li>If you&#39;re interested in learning more, take a look at some of the slides and audio from the main developer on the website
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20XvSa4h0" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s20lGUXW3d" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s2al5DFIO7" rel="nofollow">Andriy writes in</a></li>
<li><a href="http://slexy.org/view/s203QoFuWs" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s29WIplL6k" rel="nofollow">Robert writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141271076115386&w=2" rel="nofollow">Subtle trolling</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141275713329601&w=2" rel="nofollow">Old bugs with old fixes</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-October/095906.html" rel="nofollow">A pig reinstall</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2014-October/024408.html" rel="nofollow">Strange DOS-like environment</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>38: A BUG's Life</title>
  <link>https://www.bsdnow.tv/38</link>
  <guid isPermaLink="false">01510b66-38e5-40ac-a282-9bff71cb55d9</guid>
  <pubDate>Wed, 21 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/01510b66-38e5-40ac-a282-9bff71cb55d9.mp3" length="63768244" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD 11 goals and discussion (http://blather.michaelwlucas.com/archives/2053)
Something that actually happened at BSDCan this year...
During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE
Some of MWL's notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support
A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more
There's also some notes from the devsummit virtualization session (http://blather.michaelwlucas.com/archives/2060), mostly talking about bhyve
Lastly, he also provides some notes about ports and packages (http://blather.michaelwlucas.com/archives/2065) and where they're going
***
An SSH honeypot with OpenBSD and Kippo (http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/)
Everyone loves messing with script kiddies, right?
This blog post introduces Kippo (https://code.google.com/p/kippo/), an SSH honeypot tool, and how to use it in combination with OpenBSD
It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely
You can use this to get new 0day exploits or find weaknesses in your systems
OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***
NetBSD foundation financial report (https://www.netbsd.org/foundation/reports/financial/2013.html)
The NetBSD foundation has posted their 2013 financial report
It's a very "no nonsense" page, pretty much only the hard numbers
In 2013, they got $26,000 of income in donations
The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else
Be sure to donate to whichever BSDs you like and use!
***
Building a fully-encrypted NAS with OpenBSD (http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html)
Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you're doing
This article takes a look at the OpenBSD side and explains how (http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html) to build a NAS with security in mind
The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected
The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people's needs too
There's also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***
Interview - Brian Callahan &amp;amp; Aaron Bieber - admin@lists.nycbug.org (mailto:admin@lists.nycbug.org) &amp;amp; admin@cobug.org (mailto:admin@cobug.org)
Forming a local BSD Users Group
Tutorial
The basics of pkgsrc (http://www.bsdnow.tv/tutorials/pkgsrc)
News Roundup
FreeBSD periodic mails vs. monitoring (http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/)
If you've ever been an admin for a lot of FreeBSD boxes, you've probably noticed that you get a lot of email
This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them
From bad SSH logins to Zabbix alerts, it all adds up quickly
It highlights the periodic.conf file and FreeBSD's periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***
Doing cool stuff with OpenBSD routing domains (http://www.skogsrud.net/?p=44)
A blog post from our viewer and regular emailer, Kjell-Aleksander!
He manages some internally-routed IP ranges at his work, but didn't want to have equipment for each separate project
This is where OpenBSD routing domains and pf come in to save the day
The blog post goes through the process with all the network details you could ever dream of
He even named his networking equipment... after us (http://i.imgur.com/penYQFP.jpg)
***
LibreSSL, the good and the bad (http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html)
We're all probably familiar with OpenBSD's fork of OpenSSL at this point
However, "for those of you that don't know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk"
This article talks about some of the cryptographic development challenges involved with maintaining such a massive project
You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled
It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/)
Lots going on in PCBSD land this week, AppCafe has been redesigned
The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update
In the more recent post (http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/), there's some further explanation of the PBI system and the reason for the transition
It's got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s2UbEhgjce)
Daniel writes in (http://slexy.org/view/s21XU0y3JP)
Sean writes in (http://slexy.org/view/s2QQtuawFl)
tsyn writes in (http://slexy.org/view/s20XrT5Q8U)
Chris writes in (http://slexy.org/view/s2ayZ1nsdv)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, bug, bsd user group, users group, community, lug, uug, unix users group, packages, signing, binary, source, compile, ports, nycbug, nycbsdcon, cobug, colorado, new york, conference, presentation, 11.0, ssh, honeypot, script kiddies, kippo, foundation, financial report, encrypted, nas, network attached storage, full disk encryption, periodic, routing domains, pf, the book of pf, third edition, 3rd edition, cron, monitoring, openssl, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>37: BSDCanned Goods</title>
  <link>https://www.bsdnow.tv/37</link>
  <guid isPermaLink="false">3519165b-e16c-49e5-9148-ad92396b617e</guid>
  <pubDate>Wed, 14 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3519165b-e16c-49e5-9148-ad92396b617e.mp3" length="92116660" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we're at BSDCan, ganging up on people and forcing them to give us interviews. Assuming we don't get arrested for harassment, we'll be back next week with your regularly scheduled programming. For now, we've got some feedback emails to catch up on, as well as a prerecorded talk Matt Ahrens gave about ZFS. We'll be back to tell you all about the conference next week, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>2:07:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week we're at BSDCan, ganging up on people and forcing them to give us interviews. Assuming we don't get arrested for harassment, we'll be back next week with your regularly scheduled programming. For now, we've got some feedback emails to catch up on, as well as a prerecorded talk Matt Ahrens gave about ZFS. We'll be back to tell you all about the conference next week, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Presentation - Matthew Ahrens - matt@mahrens.org (mailto:matt@mahrens.org) / @mahrens1 (https://twitter.com/mahrens1)
OpenZFS discussion
Feedback/Questions
Remy writes in (http://slexy.org/view/s2kGZUlxjg)
Darin writes in (http://slexy.org/view/s23j9RHsIx)
Steve writes in (http://slexy.org/view/s21dMlBAhM)
Pascal writes in (http://slexy.org/view/s20IyvdSmR)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, openzfs, feedback, emails, questions, support, bsdcan, ottawa, conference, convention</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;re at BSDCan, ganging up on people and forcing them to give us interviews. Assuming we don&#39;t get arrested for harassment, we&#39;ll be back next week with your regularly scheduled programming. For now, we&#39;ve got some feedback emails to catch up on, as well as a prerecorded talk Matt Ahrens gave about ZFS. We&#39;ll be back to tell you all about the conference next week, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Presentation - Matthew Ahrens - <a href="mailto:matt@mahrens.org" rel="nofollow">matt@mahrens.org</a> / <a href="https://twitter.com/mahrens1" rel="nofollow">@mahrens1</a></h2>

<p>OpenZFS discussion</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kGZUlxjg" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s23j9RHsIx" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s21dMlBAhM" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s20IyvdSmR" rel="nofollow">Pascal writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;re at BSDCan, ganging up on people and forcing them to give us interviews. Assuming we don&#39;t get arrested for harassment, we&#39;ll be back next week with your regularly scheduled programming. For now, we&#39;ve got some feedback emails to catch up on, as well as a prerecorded talk Matt Ahrens gave about ZFS. We&#39;ll be back to tell you all about the conference next week, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Presentation - Matthew Ahrens - <a href="mailto:matt@mahrens.org" rel="nofollow">matt@mahrens.org</a> / <a href="https://twitter.com/mahrens1" rel="nofollow">@mahrens1</a></h2>

<p>OpenZFS discussion</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kGZUlxjg" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s23j9RHsIx" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s21dMlBAhM" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s20IyvdSmR" rel="nofollow">Pascal writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>33: Certified Package Delivery</title>
  <link>https://www.bsdnow.tv/33</link>
  <guid isPermaLink="false">f0c15113-8ade-464b-a89f-3398734256dc</guid>
  <pubDate>Wed, 16 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f0c15113-8ade-464b-a89f-3398734256dc.mp3" length="57837748" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
BSDCan schedule, speakers and talks (https://www.bsdcan.org/2014/schedule/)
This year's BSDCan will kick off on May 14th in Ottawa
The list of speakers (https://www.bsdcan.org/2014/schedule/speakers.en.html) is also out
And finally the talks (https://www.bsdcan.org/2014/schedule/events.en.html) everyone's looking forward to
Lots of great tutorials and talks, spanning a wide range of topics of interest
Be sure to come by so you can and meet Allan and Kris in person and get BSDCan shirts (https://twitter.com/bsdcan/status/454990067552247808)
***
NYCBSDCon talks uploaded (https://www.youtube.com/watch?v=4bPduH6O7lI)
The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon
Jeff Rizzo's talk, "Releasing NetBSD: So Many Targets, So Little Time"
Dru Lavigne's talk (https://www.youtube.com/watch?v=DAmZ3cbfigA), "ZFS Management Tools in FreeNAS and PC-BSD"
Scott Long's talk (https://www.youtube.com/watch?v=FL5U4wr86L4), "Serving one third of the Internet via FreeBSD"
Michael W. Lucas' talk (https://www.youtube.com/watch?v=buo5JlMnGPI), "BSD Breaking Barriers"
***
FreeBSD Journal, issue 2 (http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html)
The bi-monthly FreeBSD journal's second issue is out
Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates
In less than two months, they've already gotten over 1000 subscribers! It's available on Google Play, iTunes, Amazon, etc
"We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD"
Check our interview with GNN (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) for more information about the journal
***
OpenSSL, more like OpenSS-Hell (http://bsd.slashdot.org/story/200567)
We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy
There's been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so
We finally have a timeline of events (http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html)
Reactions from ISC (https://isc.sans.edu/diary/Testing+for+Heartbleed/17933), PCBSD (http://blog.pcbsd.org/2014/04/openssl-security-update/), Tarsnap (http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html), the Tor (https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html) project (https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html), FreeBSD (https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html), NetBSD (http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc), oss-sec (http://seclists.org/oss-sec/2014/q2/index.html), PHK (https://queue.acm.org/detail.cfm?id=2602816), Varnish (https://www.varnish-cache.org/docs/trunk/phk/dough.html) and Akamai (https://blogs.akamai.com/2014/04/heartbleed-update.html)
pfSense (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) released a new version to fix it (https://blog.pfsense.org/?p=1253)
OpenBSD disabled heartbeat entirely (http://marc.info/?l=openbsd-cvs&amp;amp;m=139715336230455&amp;amp;w=2) and is very unforgiving of the IETF (https://news.ycombinator.com/item?id=7568921)
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has two good (http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf) write-ups (http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse) about the issue and how horrible the OpenSSL codebase is
A nice quote from one of the OpenBSD lists: "Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL's bug tracker is only used to park bugs, not fix them"
Sounds like someone else (http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html) was having fun with the bug for a while too
There's also another OpenSSL bug that OpenBSD patched (http://marc.info/?l=openbsd-cvs&amp;amp;m=139732441810737&amp;amp;w=2) - it allows an attacker to inject data from one connection into another 
OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we're seeing a fork (http://undeadly.org/cgi?action=article&amp;amp;sid=20140415093252) in real time
***
Interview - Jim Brown - info@bsdcertification.org (mailto:info@bsdcertification.org)
The BSD Certification (http://bsdcertification.org/) exams
Tutorial
Building OpenBSD binary packages in bulk (http://www.bsdnow.tv/tutorials/dpb)
News Roundup
Portable signify (https://github.com/aperezdc/signify)
Back in episode 23 (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) we talked with Ted Unangst about the new "signify" tool in OpenBSD
Now there's a (completely unofficial) portable version of it on github
If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it
Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***
Foundation goals and updates (https://www.mail-archive.com/misc@openbsd.org/msg128240.html)
The OpenBSD foundation has reached their 2014 goal of $150,000
You can check their activities and goals (http://www.openbsdfoundation.org/activities.html) to see where the money is going
Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data
The FreeBSD foundation has kicked off their spring fundraising (http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html) campaign
There's also a list of their activities and goals available to read through
Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/)
New PBI runtime that fixes stability issues and decreases load times
"Update Center" is getting a lot of development and improvements
Lots of misc. bug fixes and updates
***
Feedback/Questions
There's a reddit thread (http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/) we wanted to highlight - a user wants to show his friend BSD and why it's great
Brad writes in (http://slexy.org/view/s20Tso9a6v)
Sha'ul writes in (http://slexy.org/view/s21DfdV9yt)
iGibbs writes in (http://slexy.org/view/s2di8XRt73)
Matt writes in (http://slexy.org/view/s20m2g8UgV)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dpb, distributed ports builder, marc espie, poudriere, package builds, jim brown, bsdcertification, bsd certification, exam, test, openssl, heartbleed, exploit, ssl, tls, heartbeat, openssh, theo de raadt, hole, 0day, zero day, bsdcan, nycbsdcon, presentations, talks, conference, recording, netflix, tarsnap, mitigation, ixsystems, foundation, journal, cve</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>24: The Cluster &amp; The Cloud</title>
  <link>https://www.bsdnow.tv/24</link>
  <guid isPermaLink="false">4472f6f6-5fb3-4ee9-b20c-04e927cf1299</guid>
  <pubDate>Wed, 12 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4472f6f6-5fb3-4ee9-b20c-04e927cf1299.mp3" length="50214172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:09:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD 10 as a firewall (http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html)
Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead
Now, with the release of 10.0, he's apparently changed his mind and switched back over
It mentions the SMP version of pf, general performance advantages and more modern features
The author is a regular listener of BSD Now, hi Joe!
***
Network Noise Reduction Using Free Tools (http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html)
Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD
Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD's spamd and other security features to combat spam and malware
He goes through his experiences with content filtering and disappointment with a certain proprietary vendor
Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***
FreeBSD ASLR patches submitted (http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream)
So far, FreeBSD hasn't had Address Space Layout Randomization
ASLR is a nice security feature, see wikipedia (https://en.wikipedia.org/wiki/Address_space_layout_randomization) for more information
With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)
We might have Shawn on the show to talk about it, but he's also giving a presentation at BSDCan about his work with ASLR
***
Old-style pkg_ tools retired (http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/)
At last the old pkg_add tools are being retired in FreeBSD
pkgng (http://www.bsdnow.tv/tutorials/pkgng) is a huge improvement, and now portmgr@ thinks it's time to cut the cord on the legacy toolset
Ports aren't going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go
All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***
Interview - Luke Marsden - luke@hybridcluster.com (mailto:luke@hybridcluster.com) / @lmarsden (https://twitter.com/lmarsden)
BSD at HybridCluster
Tutorial
Filesharing with chrooted SFTP (http://www.bsdnow.tv/tutorials/chroot-sftp)
News Roundup
FreeBSD on OpenStack (http://pellaeon.github.io/bsd-cloudinit/)
OpenStack (https://en.wikipedia.org/wiki/OpenStack) is a cloud computing project
It consists of "a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API."
Until now, there wasn't a good way to run a full BSD instance on OpenStack
With a project in the vein of Colin Percival (http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten)'s AWS startup scripts, now that's no longer the case! 
***
FOSDEM BSD videos (https://fosdem.org/2014/schedule/track/bsd/)
This year's FOSDEM had seven BSD presentations
The videos are slowly being uploaded (https://video.fosdem.org/2014/) for your viewing pleasure
Not all of the BSD ones are up yet, but by the time you're watching this they might be!
Check this directory (https://video.fosdem.org/2014/AW1121/Saturday/) for most of 'em
The BSD dev room was full, lots of interest in what's going on from the other communities
***
The FreeBSD challenge finally returns! (http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/)
Due to prodding from a certain guy of a certain podcast, the "FreeBSD Challenge" series has finally resumed
Our friend from the Linux foundation picks up with day 11 (http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/) and day 12 (http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/) on his switching from Linux journey
This time he outlines the upgrade process of going from 9 to 10, using freebsd-update
There's also some notes about different options for upgrading ports and some extra tips
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/)
After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while
During their "fine tuning phase" users are encouraged to submit any and all bugs via the trac system
Warden got some fixes and the package manager got some updates as well
Huge size reduction in PBI format
***
Feedback/Questions
Derrick writes in (http://slexy.org/view/s21nbJKYmb)
Sean writes in (http://slexy.org/view/s2yhziVsBP)
Patrick writes in (http://slexy.org/view/s20PuccWbo)
Peter writes in (http://slexy.org/view/s22PL0SbUO)
Sean writes in (http://slexy.org/view/s20dkbjuOK)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, cluster, cloud, cloud computing, hybridcluster, jails, scaling, virtualization, zfs, big data, provisioning, webhosting, instances, web hosting, chroot, sftp, filesharing, file sharing, shell, linux, switching to bsd, linux user, smp, pkg_add, pkg, pkgng, binary packages, openstack, open stack, httperf, performance, http, vpn, nycbsdcon, nycbug, nyc, conference, convention, talks, presentation, keynote, ssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>22: Journaled News-Updates</title>
  <link>https://www.bsdnow.tv/22</link>
  <guid isPermaLink="false">e49b46fd-a367-451d-819a-544b35fc4f89</guid>
  <pubDate>Wed, 29 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e49b46fd-a367-451d-819a-544b35fc4f89.mp3" length="64949427" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it's all about. After that, we've got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it's all about. After that, we've got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/077085.html)
Gabor Pali sent out the October-December 2013 status report to get everyone up to date on what's going on
The report contains 37 entries and is very very long... various reports from all the different teams under the FreeBSD umbrella, probably too many to even list in the show notes
Lots of work going on in the ARM world, EC2/Xen and Google Compute Engine are also improving
Secure boot support hopefully coming by mid-year (www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year)
There's quite a bit going on in the FreeBSD world, many projects happening at the same time
***
n2k14 OpenBSD Hackathon Report (http://undeadly.org/cgi?action=article&amp;amp;sid=20140124142027)
Recently, OpenBSD held one of their hackathons (http://www.openbsd.org/hackathons.html) in New Zealand
15 developers gathered there to sit in a room and write code for a few days
Philip Guenther brings back a nice report of the event
If you've been watching the -current CVS logs, you've seen the flood of commits just from this event alone
Fixes with threading, Linux compat, ACPI, and various other things - some will make it into 5.5 and others need more testing
Another report from Theo (http://undeadly.org/cgi?action=article&amp;amp;sid=20140127083112) details his work
Updates to the random subsystem, some work-in-progress pf fixes, suspend/resume fixes and more signing stuff
***
Four new NetBSD releases (https://blog.netbsd.org/tnf/entry/netbsd_6_1_3_netbsd)
NetBSD released versions 6.1.3, 6.0.4, 5.2.2 and 5.1.4
These updates include lots of bug fixes and some security updates, not focused on new features
You can upgrade depending on what branch you're currently on
Confused about the different branches? See this graph. (https://www.netbsd.org/releases/release-map.html#graph1)
***
The future of open source ZFS development  (http://sites.ieee.org/scv-cs/archives/openzfs-future-open-source-zfs-development)
On February 11, 2014, Matt Ahrens will be giving a presentation about ZFS
The talk will be about the future of ZFS and the open source development since Oracle closed the code
It's in San Jose, California - go if you can!
***
Interview - George Neville-Neil - gnn@freebsd.org (mailto:gnn@freebsd.org) / @gvnn3 (https://twitter.com/gvnn3)
The FreeBSD Journal (http://freebsdjournal.com/)
Tutorial
Tracking -STABLE and -CURRENT (OpenBSD) (http://www.bsdnow.tv/tutorials/stable-current-obsd)
News Roundup
pfSense news and 2.1.1 snapshots (https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes)
pfSense has some snapshots available for the upcoming 2.1.1 release
They include FreeBSD security fixes as well as some other updates
There are recordings posted (https://blog.pfsense.org/?p=1198) of some of the previous hangouts
Unfortunately they're only for subscribers, so you'll have to wait until next month when we have Chris on the show to talk about pfSense!
***
FreeBSD on Google Compute Engine (https://groups.google.com/forum/#!msg/gce-discussion/YWoa3Aa_49U/FYAg9oiRlLUJ)
Recently we mentioned some posts about getting OpenBSD to run on GCE, here's the FreeBSD version
Nice big fat warning: "The team has put together a best-effort posting that will get most, if not all, of you up and running. That being said, we need to remind you that FreeBSD is being supported on Google Compute Engine by the community. The instructions are being provided as-is and without warranty."
Their instructions are a little too Linuxy (assuming wget, etc.) for our taste, someone should probably get it updated!
Other than that it's a pretty good set of instructions on how to get up and running
***
Dragonfly ACPI update (http://www.shiningsilence.com/dbsdlog/2014/01/22/13225.html)
Sascha Wildner committed some new ACPI code (http://lists.dragonflybsd.org/pipermail/commits/2014-January/199071.html)
There's also a "heads up" to update your BIOS (http://lists.dragonflybsd.org/pipermail/users/2014-January/090504.html) if you experience problems
Check the mailing list post for all the details
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-6/)
10.0-RC4 users need to upgrade all their packages for 10.0-RC5
PBIs needed to be rebuilt.. actually everything did
Help test GNOME 3 so we can get it in the official ports tree
By the way, I think Kris has an announcement - PCBSD 10.0 is out!
***
Feedback/Questions
Tony writes in (http://slexy.org/view/s21ZlfOdTt)
Jeff writes in (http://slexy.org/view/s2BFZ68Na5)
Remy writes in (http://slexy.org/view/s20epArsQI)
Nils writes in (http://slexy.org/view/s213CoNvLt)
Solomon writes in (http://slexy.org/view/s21XWnThNS)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, freebsd journal, journal, news, stable, current, cvs, anoncvs, branch, update, upgrade, binary, buildworld, make build, release engineering, ufs, ffs, gce, google compute engine, openzfs, zfs, matt ahrens, uefi, efi, secureboot, secure boot, acpi, pfsense, poudriere, hackathon, new zealand, n2k14, george neville-neil, gnn, nycbsdcon, nyc, convention, conference</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it&#39;s all about. After that, we&#39;ve got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/077085.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>Gabor Pali sent out the October-December 2013 status report to get everyone up to date on what&#39;s going on</li>
<li>The report contains 37 entries and is very very long... various reports from all the different teams under the FreeBSD umbrella, probably too many to even list in the show notes</li>
<li>Lots of work going on in the ARM world, EC2/Xen and Google Compute Engine are also improving</li>
<li>Secure boot support hopefully coming [by mid-year](<a href="http://www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year" rel="nofollow">www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year</a>)</li>
<li>There&#39;s quite a bit going on in the FreeBSD world, many projects happening at the same time
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140124142027" rel="nofollow">n2k14 OpenBSD Hackathon Report</a></h3>

<ul>
<li>Recently, OpenBSD held one of <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">their hackathons</a> in New Zealand</li>
<li>15 developers gathered there to sit in a room and write code for a few days</li>
<li>Philip Guenther brings back a nice report of the event</li>
<li>If you&#39;ve been watching the -current CVS logs, you&#39;ve seen the flood of commits just from this event alone</li>
<li>Fixes with threading, Linux compat, ACPI, and various other things - some will make it into 5.5 and others need more testing</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140127083112" rel="nofollow">Another report from Theo</a> details his work</li>
<li>Updates to the random subsystem, some work-in-progress pf fixes, suspend/resume fixes and more signing stuff
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_3_netbsd" rel="nofollow">Four new NetBSD releases</a></h3>

<ul>
<li>NetBSD released versions 6.1.3, 6.0.4, 5.2.2 and 5.1.4</li>
<li>These updates include lots of bug fixes and some security updates, not focused on new features</li>
<li>You can upgrade depending on what branch you&#39;re currently on</li>
<li>Confused about the different branches? <a href="https://www.netbsd.org/releases/release-map.html#graph1" rel="nofollow">See this graph.</a>
***</li>
</ul>

<h3><a href="http://sites.ieee.org/scv-cs/archives/openzfs-future-open-source-zfs-development" rel="nofollow">The future of open source ZFS development </a></h3>

<ul>
<li>On February 11, 2014, Matt Ahrens will be giving a presentation about ZFS</li>
<li>The talk will be about the future of ZFS and the open source development since Oracle closed the code</li>
<li>It&#39;s in San Jose, California - go if you can!
***</li>
</ul>

<h2>Interview - George Neville-Neil - <a href="mailto:gnn@freebsd.org" rel="nofollow">gnn@freebsd.org</a> / <a href="https://twitter.com/gvnn3" rel="nofollow">@gvnn3</a></h2>

<p><a href="http://freebsdjournal.com/" rel="nofollow">The FreeBSD Journal</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-current-obsd" rel="nofollow">Tracking -STABLE and -CURRENT (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense news and 2.1.1 snapshots</a></h3>

<ul>
<li>pfSense has some snapshots available for the upcoming 2.1.1 release</li>
<li>They include FreeBSD security fixes as well as some other updates</li>
<li>There are <a href="https://blog.pfsense.org/?p=1198" rel="nofollow">recordings posted</a> of some of the previous hangouts</li>
<li>Unfortunately they&#39;re only for subscribers, so you&#39;ll have to wait until next month when we have Chris on the show to talk about pfSense!
***</li>
</ul>

<h3><a href="https://groups.google.com/forum/#!msg/gce-discussion/YWoa3Aa_49U/FYAg9oiRlLUJ" rel="nofollow">FreeBSD on Google Compute Engine</a></h3>

<ul>
<li>Recently we mentioned some posts about getting OpenBSD to run on GCE, here&#39;s the FreeBSD version</li>
<li>Nice big fat warning: &quot;The team has put together a best-effort posting that will get most, if not all, of you up and running. That being said, we need to remind you that FreeBSD is being supported on Google Compute Engine by the community. The instructions are being provided as-is and without warranty.&quot;</li>
<li>Their instructions are a little too Linuxy (assuming wget, etc.) for our taste, someone should probably get it updated!</li>
<li>Other than that it&#39;s a pretty good set of instructions on how to get up and running
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/22/13225.html" rel="nofollow">Dragonfly ACPI update</a></h3>

<ul>
<li>Sascha Wildner committed some <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-January/199071.html" rel="nofollow">new ACPI code</a></li>
<li>There&#39;s also a &quot;heads up&quot; to <a href="http://lists.dragonflybsd.org/pipermail/users/2014-January/090504.html" rel="nofollow">update your BIOS</a> if you experience problems</li>
<li>Check the mailing list post for all the details
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-6/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 users need to upgrade all their packages for 10.0-RC5</li>
<li>PBIs needed to be rebuilt.. actually everything did</li>
<li>Help test GNOME 3 so we can get it in the official ports tree</li>
<li>By the way, I think Kris has an announcement - PCBSD 10.0 is out!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21ZlfOdTt" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s2BFZ68Na5" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20epArsQI" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s213CoNvLt" rel="nofollow">Nils writes in</a></li>
<li><a href="http://slexy.org/view/s21XWnThNS" rel="nofollow">Solomon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it&#39;s all about. After that, we&#39;ve got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/077085.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>Gabor Pali sent out the October-December 2013 status report to get everyone up to date on what&#39;s going on</li>
<li>The report contains 37 entries and is very very long... various reports from all the different teams under the FreeBSD umbrella, probably too many to even list in the show notes</li>
<li>Lots of work going on in the ARM world, EC2/Xen and Google Compute Engine are also improving</li>
<li>Secure boot support hopefully coming [by mid-year](<a href="http://www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year" rel="nofollow">www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year</a>)</li>
<li>There&#39;s quite a bit going on in the FreeBSD world, many projects happening at the same time
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140124142027" rel="nofollow">n2k14 OpenBSD Hackathon Report</a></h3>

<ul>
<li>Recently, OpenBSD held one of <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">their hackathons</a> in New Zealand</li>
<li>15 developers gathered there to sit in a room and write code for a few days</li>
<li>Philip Guenther brings back a nice report of the event</li>
<li>If you&#39;ve been watching the -current CVS logs, you&#39;ve seen the flood of commits just from this event alone</li>
<li>Fixes with threading, Linux compat, ACPI, and various other things - some will make it into 5.5 and others need more testing</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140127083112" rel="nofollow">Another report from Theo</a> details his work</li>
<li>Updates to the random subsystem, some work-in-progress pf fixes, suspend/resume fixes and more signing stuff
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_3_netbsd" rel="nofollow">Four new NetBSD releases</a></h3>

<ul>
<li>NetBSD released versions 6.1.3, 6.0.4, 5.2.2 and 5.1.4</li>
<li>These updates include lots of bug fixes and some security updates, not focused on new features</li>
<li>You can upgrade depending on what branch you&#39;re currently on</li>
<li>Confused about the different branches? <a href="https://www.netbsd.org/releases/release-map.html#graph1" rel="nofollow">See this graph.</a>
***</li>
</ul>

<h3><a href="http://sites.ieee.org/scv-cs/archives/openzfs-future-open-source-zfs-development" rel="nofollow">The future of open source ZFS development </a></h3>

<ul>
<li>On February 11, 2014, Matt Ahrens will be giving a presentation about ZFS</li>
<li>The talk will be about the future of ZFS and the open source development since Oracle closed the code</li>
<li>It&#39;s in San Jose, California - go if you can!
***</li>
</ul>

<h2>Interview - George Neville-Neil - <a href="mailto:gnn@freebsd.org" rel="nofollow">gnn@freebsd.org</a> / <a href="https://twitter.com/gvnn3" rel="nofollow">@gvnn3</a></h2>

<p><a href="http://freebsdjournal.com/" rel="nofollow">The FreeBSD Journal</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-current-obsd" rel="nofollow">Tracking -STABLE and -CURRENT (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense news and 2.1.1 snapshots</a></h3>

<ul>
<li>pfSense has some snapshots available for the upcoming 2.1.1 release</li>
<li>They include FreeBSD security fixes as well as some other updates</li>
<li>There are <a href="https://blog.pfsense.org/?p=1198" rel="nofollow">recordings posted</a> of some of the previous hangouts</li>
<li>Unfortunately they&#39;re only for subscribers, so you&#39;ll have to wait until next month when we have Chris on the show to talk about pfSense!
***</li>
</ul>

<h3><a href="https://groups.google.com/forum/#!msg/gce-discussion/YWoa3Aa_49U/FYAg9oiRlLUJ" rel="nofollow">FreeBSD on Google Compute Engine</a></h3>

<ul>
<li>Recently we mentioned some posts about getting OpenBSD to run on GCE, here&#39;s the FreeBSD version</li>
<li>Nice big fat warning: &quot;The team has put together a best-effort posting that will get most, if not all, of you up and running. That being said, we need to remind you that FreeBSD is being supported on Google Compute Engine by the community. The instructions are being provided as-is and without warranty.&quot;</li>
<li>Their instructions are a little too Linuxy (assuming wget, etc.) for our taste, someone should probably get it updated!</li>
<li>Other than that it&#39;s a pretty good set of instructions on how to get up and running
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/22/13225.html" rel="nofollow">Dragonfly ACPI update</a></h3>

<ul>
<li>Sascha Wildner committed some <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-January/199071.html" rel="nofollow">new ACPI code</a></li>
<li>There&#39;s also a &quot;heads up&quot; to <a href="http://lists.dragonflybsd.org/pipermail/users/2014-January/090504.html" rel="nofollow">update your BIOS</a> if you experience problems</li>
<li>Check the mailing list post for all the details
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-6/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 users need to upgrade all their packages for 10.0-RC5</li>
<li>PBIs needed to be rebuilt.. actually everything did</li>
<li>Help test GNOME 3 so we can get it in the official ports tree</li>
<li>By the way, I think Kris has an announcement - PCBSD 10.0 is out!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21ZlfOdTt" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s2BFZ68Na5" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20epArsQI" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s213CoNvLt" rel="nofollow">Nils writes in</a></li>
<li><a href="http://slexy.org/view/s21XWnThNS" rel="nofollow">Solomon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
