<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 15:11:10 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Donation”</title>
    <link>https://www.bsdnow.tv/tags/donation</link>
    <pubDate>Thu, 05 Oct 2023 11:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>527: Reports are in</title>
  <link>https://www.bsdnow.tv/527</link>
  <guid isPermaLink="false">0a272a48-0c9a-4f75-a363-5263d9f7a342</guid>
  <pubDate>Thu, 05 Oct 2023 11:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0a272a48-0c9a-4f75-a363-5263d9f7a342.mp3" length="58297728" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Unlocking Infrastructure Sovereignty, first meeting of the FreeBSD Enterprise Working Group, HardenedBSD August 2023 Status Report, GhostBSD August 2023 donation report, MidnightBSD 3.1 Released, OpenBSD Webzine ISSUE #14, and more</itunes:subtitle>
  <itunes:duration>1:00:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Unlocking Infrastructure Sovereignty, first meeting of the FreeBSD Enterprise Working Group, HardenedBSD August 2023 Status Report, GhostBSD August 2023 donation report, MidnightBSD 3.1 Released, OpenBSD Webzine ISSUE #14, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Unlocking Infrastructure Sovereignty: Harnessing the Power of Open Source Solutions for Business Flexibility and Cost-Effectiveness (https://klarasystems.com/articles/unlocking-infrastructure-sovereignty-harnessing-the-power-of-open-source-solutions/)
Recap of first meeting of the FreeBSD Enterprise Working Group (https://freebsdfoundation.org/blog/recap-of-first-meeting-of-the-freebsd-enterprise-working-group/)
News Roundup
HardenedBSD August 2023 Status Report (https://hardenedbsd.org/article/shawn-webb/2023-09-01/hardenedbsd-august-2023-status-report)
• [HardenedBSD 14-STABLE Now Available](https://hardenedbsd.org/article/shawn-webb/2023-09-11/hardenedbsd-14-stable-now-available)
August 2023 donation report (http://ghostbsd.org/news/August_2023_donation_report)
• [Late on the announcement but... GhostBSD 23.06.01 ISO is now available](http://ghostbsd.org/23.06.01_iso_is_now_available)
MidnightBSD 3.1 Released (https://www.phoronix.com/news/MidnightBSD-3.1)
OpenBSD Webzine ISSUE #14 is out (https://webzine.puffy.cafe/issue-14.html)
Beastie Bits
• [ZFS for Dummies](https://ikrima.dev/dev-notes/homelab/zfs-for-dummies/)
• [The Switch runs FreeBSD](https://www.reddit.com/r/NintendoSwitch/comments/5xbe5a/the_switch_runs_freebsd_making_it_nintendos_first/)
• [KDE on OpenBSD](https://marc.info/?l=openbsd-ports&amp;amp;m=169391479324962)
• [(Kubernetes v1.28.0) for illumos, FreeBSD and OpenBSD](https://medium.com/@norlin.t/by-the-way-planternetes-kubernetes-v1-28-0-for-illumos-freebsd-and-openbsd-5d57026d6a25)
• [Video: C Programming on System 6 - VCF Midwest, Wi-Fi DA](https://jcs.org/2023/09/20/vcfmw)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, infrastructure, sovereignty, enterprise working group, status report, donation, donors, midnightbsd 3.1, openbsd webzine</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Unlocking Infrastructure Sovereignty, first meeting of the FreeBSD Enterprise Working Group, HardenedBSD August 2023 Status Report, GhostBSD August 2023 donation report, MidnightBSD 3.1 Released, OpenBSD Webzine ISSUE #14, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/unlocking-infrastructure-sovereignty-harnessing-the-power-of-open-source-solutions/" rel="nofollow">Unlocking Infrastructure Sovereignty: Harnessing the Power of Open Source Solutions for Business Flexibility and Cost-Effectiveness</a></h3>

<hr>

<h3><a href="https://freebsdfoundation.org/blog/recap-of-first-meeting-of-the-freebsd-enterprise-working-group/" rel="nofollow">Recap of first meeting of the FreeBSD Enterprise Working Group</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2023-09-01/hardenedbsd-august-2023-status-report" rel="nofollow">HardenedBSD August 2023 Status Report</a></h3>

<pre><code>• [HardenedBSD 14-STABLE Now Available](https://hardenedbsd.org/article/shawn-webb/2023-09-11/hardenedbsd-14-stable-now-available)
</code></pre>

<hr>

<h3><a href="http://ghostbsd.org/news/August_2023_donation_report" rel="nofollow">August 2023 donation report</a></h3>

<pre><code>• [Late on the announcement but... GhostBSD 23.06.01 ISO is now available](http://ghostbsd.org/23.06.01_iso_is_now_available)
</code></pre>

<hr>

<h3><a href="https://www.phoronix.com/news/MidnightBSD-3.1" rel="nofollow">MidnightBSD 3.1 Released</a></h3>

<hr>

<h3><a href="https://webzine.puffy.cafe/issue-14.html" rel="nofollow">OpenBSD Webzine ISSUE #14 is out</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [ZFS for Dummies](https://ikrima.dev/dev-notes/homelab/zfs-for-dummies/)
• [The Switch runs FreeBSD](https://www.reddit.com/r/NintendoSwitch/comments/5xbe5a/the_switch_runs_freebsd_making_it_nintendos_first/)
• [KDE on OpenBSD](https://marc.info/?l=openbsd-ports&amp;m=169391479324962)
• [(Kubernetes v1.28.0) for illumos, FreeBSD and OpenBSD](https://medium.com/@norlin.t/by-the-way-planternetes-kubernetes-v1-28-0-for-illumos-freebsd-and-openbsd-5d57026d6a25)
• [Video: C Programming on System 6 - VCF Midwest, Wi-Fi DA](https://jcs.org/2023/09/20/vcfmw)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Unlocking Infrastructure Sovereignty, first meeting of the FreeBSD Enterprise Working Group, HardenedBSD August 2023 Status Report, GhostBSD August 2023 donation report, MidnightBSD 3.1 Released, OpenBSD Webzine ISSUE #14, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/unlocking-infrastructure-sovereignty-harnessing-the-power-of-open-source-solutions/" rel="nofollow">Unlocking Infrastructure Sovereignty: Harnessing the Power of Open Source Solutions for Business Flexibility and Cost-Effectiveness</a></h3>

<hr>

<h3><a href="https://freebsdfoundation.org/blog/recap-of-first-meeting-of-the-freebsd-enterprise-working-group/" rel="nofollow">Recap of first meeting of the FreeBSD Enterprise Working Group</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2023-09-01/hardenedbsd-august-2023-status-report" rel="nofollow">HardenedBSD August 2023 Status Report</a></h3>

<pre><code>• [HardenedBSD 14-STABLE Now Available](https://hardenedbsd.org/article/shawn-webb/2023-09-11/hardenedbsd-14-stable-now-available)
</code></pre>

<hr>

<h3><a href="http://ghostbsd.org/news/August_2023_donation_report" rel="nofollow">August 2023 donation report</a></h3>

<pre><code>• [Late on the announcement but... GhostBSD 23.06.01 ISO is now available](http://ghostbsd.org/23.06.01_iso_is_now_available)
</code></pre>

<hr>

<h3><a href="https://www.phoronix.com/news/MidnightBSD-3.1" rel="nofollow">MidnightBSD 3.1 Released</a></h3>

<hr>

<h3><a href="https://webzine.puffy.cafe/issue-14.html" rel="nofollow">OpenBSD Webzine ISSUE #14 is out</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [ZFS for Dummies](https://ikrima.dev/dev-notes/homelab/zfs-for-dummies/)
• [The Switch runs FreeBSD](https://www.reddit.com/r/NintendoSwitch/comments/5xbe5a/the_switch_runs_freebsd_making_it_nintendos_first/)
• [KDE on OpenBSD](https://marc.info/?l=openbsd-ports&amp;m=169391479324962)
• [(Kubernetes v1.28.0) for illumos, FreeBSD and OpenBSD](https://medium.com/@norlin.t/by-the-way-planternetes-kubernetes-v1-28-0-for-illumos-freebsd-and-openbsd-5d57026d6a25)
• [Video: C Programming on System 6 - VCF Midwest, Wi-Fi DA](https://jcs.org/2023/09/20/vcfmw)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>486: EuroBSDcon interviews</title>
  <link>https://www.bsdnow.tv/486</link>
  <guid isPermaLink="false">5876d0bf-0a23-4dc7-b582-fed2ae43bd85</guid>
  <pubDate>Thu, 22 Dec 2022 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5876d0bf-0a23-4dc7-b582-fed2ae43bd85.mp3" length="37461120" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This special episode features two interviews we did at EuroBSDcon in Vienna this year. We talk with FreeBSD developers about how they got started, their current projects and more. Also, consider donating to your favorite BSD Foundation to keep the projects going. </itunes:subtitle>
  <itunes:duration>39:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This special episode features two interviews we did at EuroBSDcon in Vienna this year. We talk with FreeBSD developers about how they got started, their current projects and more. Also, consider donating to your favorite BSD Foundation to keep the projects going. 
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Help the OpenBSD Foundation Reach Its 2022 Funding Goal (http://undeadly.org/cgi?action=article;sid=20221202062601)
• [FreeBSD Foundation Donation Link](https://freebsdfoundation.org/donate/)
• [NetBSD Foundation Donation Link](http://www.netbsd.org/donations/#how-to-donate)
Interview 1 - Brooks Davis - email@email (mailto:email@email) / @twitter (https://twitter.com/user)
Interview topic
Interview 2 - Olivier Cochard-Labbe - email@email (mailto:email@email) / @twitter (https://twitter.com/user)
Interview topic
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
***
Feedback/Questions
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, donate, donation, year-end fundraising, Brooks Davis, Olivier Cochard-Labbe</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This special episode features two interviews we did at EuroBSDcon in Vienna this year. We talk with FreeBSD developers about how they got started, their current projects and more. Also, consider donating to your favorite BSD Foundation to keep the projects going. </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20221202062601" rel="nofollow">Help the OpenBSD Foundation Reach Its 2022 Funding Goal</a></h3>

<pre><code>• [FreeBSD Foundation Donation Link](https://freebsdfoundation.org/donate/)
• [NetBSD Foundation Donation Link](http://www.netbsd.org/donations/#how-to-donate)
</code></pre>

<hr>

<h2>Interview 1 - Brooks Davis - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/user" rel="nofollow">@twitter</a></h2>

<p>Interview topic</p>

<hr>

<h2>Interview 2 - Olivier Cochard-Labbe - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/user" rel="nofollow">@twitter</a></h2>

<p>Interview topic</p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This special episode features two interviews we did at EuroBSDcon in Vienna this year. We talk with FreeBSD developers about how they got started, their current projects and more. Also, consider donating to your favorite BSD Foundation to keep the projects going. </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20221202062601" rel="nofollow">Help the OpenBSD Foundation Reach Its 2022 Funding Goal</a></h3>

<pre><code>• [FreeBSD Foundation Donation Link](https://freebsdfoundation.org/donate/)
• [NetBSD Foundation Donation Link](http://www.netbsd.org/donations/#how-to-donate)
</code></pre>

<hr>

<h2>Interview 1 - Brooks Davis - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/user" rel="nofollow">@twitter</a></h2>

<p>Interview topic</p>

<hr>

<h2>Interview 2 - Olivier Cochard-Labbe - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/user" rel="nofollow">@twitter</a></h2>

<p>Interview topic</p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>398: Coordinated Mars Time</title>
  <link>https://www.bsdnow.tv/398</link>
  <guid isPermaLink="false">690f3bec-7d66-4d05-8cee-073e2248cd50</guid>
  <pubDate>Thu, 15 Apr 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/690f3bec-7d66-4d05-8cee-073e2248cd50.mp3" length="30056400" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD 13.0 Full Desktop Experience, FreeBSD on ARM64 in the Cloud, Plan 9 from Bell Labs in Cyberspace, Inferno is open source as well, NetBSD hits donation milestone, grep returns (standard input) on FreeBSD, Random Programming Challenge, OpenBSD Adds Support for Coordinated Mars Time (MTC) and more</itunes:subtitle>
  <itunes:duration>50:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD 13.0 Full Desktop Experience, FreeBSD on ARM64 in the Cloud, Plan 9 from Bell Labs in Cyberspace, Inferno is open source as well, NetBSD hits donation milestone, grep returns (standard input) on FreeBSD, Random Programming Challenge, OpenBSD Adds Support for Coordinated Mars Time (MTC) and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
FreeBSD 13.0 – Full Desktop Experience (https://www.tubsta.com/2021/03/freebsd-13-0-full-desktop-experience/)
With the release of FreeBSD 13.0 on the horizon, I wanted to see how it shapes up on my Lenovo T450 laptop.  Previous major releases on this laptop, using it as a workstation, felt very rough around the edges but with 13, it feels like the developers got it right.
FreeBSD on ARM64 in the Cloud (https://klarasystems.com/articles/the-next-level-freebsd-on-arm64-in-the-cloud/)
Until the end of June, Amazon AWS is offering free ARM64 Graviton instances, learn how to try out FreeBSD to ARMv8 in the cloud
Plan 9 from Bell Labs in Cyberspace! (https://www.bell-labs.com/institute/blog/plan-9-bell-labs-cyberspace/)
The releases below represent the historical releases of Plan 9. (http://p9f.org/dl/index.html) The two versions of 4th Edition represent the initial release and the final version available from Bell Labs as it was updated and patched. All historical releases of Plan 9 have been re-released under the terms of the MIT license.
+ Inferno is open source as well (https://bitbucket.org/inferno-os/inferno64-os/src/master/)
News Roundup
Hitting donation milestone, financial report for 2020 (http://blog.netbsd.org/tnf/entry/hitting_donation_milestone_financial_report)
We nearly hit our 2020 donation milestone set after the release of 9.0 of $50,000.
grep returns (standard input) on FreeBSD (https://rubenerd.com/grep-returns-standard-input/)
I was dealing with a bizarre error with grep(1) on FreeBSD, and it soon infected my macOS and NetBSD machines too. It was driving me crazy!
Random Programming Challenge (https://projecteuler.net/problem=84)
This better not be an April Fools Joke… I want to see this actually implemented. I’ll donate $100 to the first BSD that actually implements this for real.  Who’s with me?
OpenBSD Adds Support for Coordinated Mars Time (MTC) (https://marc.info/?l=openbsd-cvs&amp;amp;m=161730046519995)
To make sure that OpenBSD can be used elsewhere than just earth, this diff introduces Coordinated Mars Time (MTC), the Mars equivalent of earth’s Universal Time (UTC).
OpenZFS had a good one too (https://github.com/openzfs/zfs/pull/11823)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Brandon - router (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Brandon%20-%20router)
Lawrence - Is BSD for me (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Lawrence%20-%20Is%20FreeBSD%20for%20me)
miguel - printing (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/miguel%20-%20printing)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, desktop, arm64, armv8, cloud, aws, plan 9, bell labs, cyberspace, inferno, donation, milestone, financial, report, opnsense, grep, stdin, standard input, random, programming, challenge, Mars, Coordinated Mars Time </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 13.0 Full Desktop Experience, FreeBSD on ARM64 in the Cloud, Plan 9 from Bell Labs in Cyberspace, Inferno is open source as well, NetBSD hits donation milestone, grep returns (standard input) on FreeBSD, Random Programming Challenge, OpenBSD Adds Support for Coordinated Mars Time (MTC) and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.tubsta.com/2021/03/freebsd-13-0-full-desktop-experience/" rel="nofollow">FreeBSD 13.0 – Full Desktop Experience</a></h3>

<blockquote>
<p>With the release of FreeBSD 13.0 on the horizon, I wanted to see how it shapes up on my Lenovo T450 laptop.  Previous major releases on this laptop, using it as a workstation, felt very rough around the edges but with 13, it feels like the developers got it right.</p>

<hr>

<h3><a href="https://klarasystems.com/articles/the-next-level-freebsd-on-arm64-in-the-cloud/" rel="nofollow">FreeBSD on ARM64 in the Cloud</a></h3>

<p>Until the end of June, Amazon AWS is offering free ARM64 Graviton instances, learn how to try out FreeBSD to ARMv8 in the cloud</p>

<hr>
</blockquote>

<h3><a href="https://www.bell-labs.com/institute/blog/plan-9-bell-labs-cyberspace/" rel="nofollow">Plan 9 from Bell Labs in Cyberspace!</a></h3>

<blockquote>
<p><a href="http://p9f.org/dl/index.html" rel="nofollow">The releases below represent the historical releases of Plan 9.</a> The two versions of 4th Edition represent the initial release and the final version available from Bell Labs as it was updated and patched. All historical releases of Plan 9 have been re-released under the terms of the MIT license.</p>

<ul>
<li><a href="https://bitbucket.org/inferno-os/inferno64-os/src/master/" rel="nofollow">Inferno is open source as well</a>
***
## News Roundup
### <a href="http://blog.netbsd.org/tnf/entry/hitting_donation_milestone_financial_report" rel="nofollow">Hitting donation milestone, financial report for 2020</a>
We nearly hit our 2020 donation milestone set after the release of 9.0 of $50,000.
***</li>
</ul>
</blockquote>

<h3><a href="https://rubenerd.com/grep-returns-standard-input/" rel="nofollow">grep returns (standard input) on FreeBSD</a></h3>

<blockquote>
<p>I was dealing with a bizarre error with grep(1) on FreeBSD, and it soon infected my macOS and NetBSD machines too. It was driving me crazy!</p>

<hr>

<h3><a href="https://projecteuler.net/problem=84" rel="nofollow">Random Programming Challenge</a></h3>

<hr>

<h3>This better not be an April Fools Joke… I want to see this actually implemented. I’ll donate $100 to the first BSD that actually implements this for real.  Who’s with me?</h3>
</blockquote>

<p><a href="https://marc.info/?l=openbsd-cvs&m=161730046519995" rel="nofollow">OpenBSD Adds Support for Coordinated Mars Time (MTC)</a></p>

<blockquote>
<p>To make sure that OpenBSD can be used elsewhere than just earth, this diff introduces Coordinated Mars Time (MTC), the Mars equivalent of earth’s Universal Time (UTC).<br>
<a href="https://github.com/openzfs/zfs/pull/11823" rel="nofollow">OpenZFS had a good one too</a></p>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Brandon%20-%20router" rel="nofollow">Brandon - router</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Lawrence%20-%20Is%20FreeBSD%20for%20me" rel="nofollow">Lawrence - Is BSD for me</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/miguel%20-%20printing" rel="nofollow">miguel - printing</a></p></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 13.0 Full Desktop Experience, FreeBSD on ARM64 in the Cloud, Plan 9 from Bell Labs in Cyberspace, Inferno is open source as well, NetBSD hits donation milestone, grep returns (standard input) on FreeBSD, Random Programming Challenge, OpenBSD Adds Support for Coordinated Mars Time (MTC) and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.tubsta.com/2021/03/freebsd-13-0-full-desktop-experience/" rel="nofollow">FreeBSD 13.0 – Full Desktop Experience</a></h3>

<blockquote>
<p>With the release of FreeBSD 13.0 on the horizon, I wanted to see how it shapes up on my Lenovo T450 laptop.  Previous major releases on this laptop, using it as a workstation, felt very rough around the edges but with 13, it feels like the developers got it right.</p>

<hr>

<h3><a href="https://klarasystems.com/articles/the-next-level-freebsd-on-arm64-in-the-cloud/" rel="nofollow">FreeBSD on ARM64 in the Cloud</a></h3>

<p>Until the end of June, Amazon AWS is offering free ARM64 Graviton instances, learn how to try out FreeBSD to ARMv8 in the cloud</p>

<hr>
</blockquote>

<h3><a href="https://www.bell-labs.com/institute/blog/plan-9-bell-labs-cyberspace/" rel="nofollow">Plan 9 from Bell Labs in Cyberspace!</a></h3>

<blockquote>
<p><a href="http://p9f.org/dl/index.html" rel="nofollow">The releases below represent the historical releases of Plan 9.</a> The two versions of 4th Edition represent the initial release and the final version available from Bell Labs as it was updated and patched. All historical releases of Plan 9 have been re-released under the terms of the MIT license.</p>

<ul>
<li><a href="https://bitbucket.org/inferno-os/inferno64-os/src/master/" rel="nofollow">Inferno is open source as well</a>
***
## News Roundup
### <a href="http://blog.netbsd.org/tnf/entry/hitting_donation_milestone_financial_report" rel="nofollow">Hitting donation milestone, financial report for 2020</a>
We nearly hit our 2020 donation milestone set after the release of 9.0 of $50,000.
***</li>
</ul>
</blockquote>

<h3><a href="https://rubenerd.com/grep-returns-standard-input/" rel="nofollow">grep returns (standard input) on FreeBSD</a></h3>

<blockquote>
<p>I was dealing with a bizarre error with grep(1) on FreeBSD, and it soon infected my macOS and NetBSD machines too. It was driving me crazy!</p>

<hr>

<h3><a href="https://projecteuler.net/problem=84" rel="nofollow">Random Programming Challenge</a></h3>

<hr>

<h3>This better not be an April Fools Joke… I want to see this actually implemented. I’ll donate $100 to the first BSD that actually implements this for real.  Who’s with me?</h3>
</blockquote>

<p><a href="https://marc.info/?l=openbsd-cvs&m=161730046519995" rel="nofollow">OpenBSD Adds Support for Coordinated Mars Time (MTC)</a></p>

<blockquote>
<p>To make sure that OpenBSD can be used elsewhere than just earth, this diff introduces Coordinated Mars Time (MTC), the Mars equivalent of earth’s Universal Time (UTC).<br>
<a href="https://github.com/openzfs/zfs/pull/11823" rel="nofollow">OpenZFS had a good one too</a></p>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Brandon%20-%20router" rel="nofollow">Brandon - router</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Lawrence%20-%20Is%20FreeBSD%20for%20me" rel="nofollow">Lawrence - Is BSD for me</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/miguel%20-%20printing" rel="nofollow">miguel - printing</a></p></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>367: Changing jail datasets</title>
  <link>https://www.bsdnow.tv/367</link>
  <guid isPermaLink="false">056d15d3-4908-4073-955a-88e7700ba566</guid>
  <pubDate>Thu, 10 Sep 2020 06:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/056d15d3-4908-4073-955a-88e7700ba566.mp3" length="47196984" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>A 35 Year Old Bug in Patch, Sandbox for FreeBSD, Changing from one dataset to another within a jail, You don’t need tmux or screen for ZFS, HardenedBSD August 2020 Status Report and Call for Donations, and more.</itunes:subtitle>
  <itunes:duration>45:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>A 35 Year Old Bug in Patch, Sandbox for FreeBSD, Changing from one dataset to another within a jail, You don’t need tmux or screen for ZFS, HardenedBSD August 2020 Status Report and Call for Donations, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/)
Headlines
A 35 Year Old Bug in Patch (http://bsdimp.blogspot.com/2020/08/a-35-year-old-bug-in-patch-found-in.html)
Larry Wall posted patch 1.3 to mod.sources on May 8, 1985. A number of versions followed over the years. It's been a faithful alley for a long, long time. I've never had a problem with patch until I embarked on the 2.11BSD restoration project. In going over the logs very carefully, I've discovered a bug that bites this effort twice. It's quite interesting to use 27 year old patches to find this bug while restoring a 29 year old OS...
Sandbox for FreeBSD (https://www.relkom.sk/en/fbsd_sandbox.shtml)
A sandbox is a software which artificially limits access to the specific resources on the target according to the assigned policy. The sandbox installs hooks to the kernel syscalls and other sub-systems in order to interrupt the events triggered by the application. From the application point of view, application working as usual, but when it wants to access, for instance, /dev/kmem the sandbox software decides against the assigned sandbox scheme whether to grant or deny access.
In our case, the sandbox is a kernel module which uses MAC (Mandatory Access Control) Framework developed by the TrustedBSD team. All necessary hooks were introduced to the FreeBSD kernel.
Source Code (https://gitlab.com/relkom/sandbox)
Documentation (https://www.relkom.sk/en/fbsd_sandbox_docs.shtml)
News Roundup
Changing from one dataset to another within a jail (https://dan.langille.org/2020/08/16/changing-from-one-dataset-to-another-within-a-freebsd-iocage-jail/)
ZFS has a the ability to share itself within a jail. That gives the jail some autonomy, and I like that.
I’ve written briefly about that, specifically for iocage. More recently, I started using a zfs snapshot for caching clearing.
The purpose of this post is to document the existing configuration of the production FreshPorts webserver and outline the plan on how to modify it for more zfs-snapshot-based cache clearing.
You don’t need tmux or screen for ZFS (https://rubenerd.com/you-dont-need-tmux-or-screen-for-zfs/)
Back in January I mentioned how to add redundancy to a ZFS pool by adding a mirrored drive. Someone with a private account on Twitter asked me why FreeBSD—and NetBSD!—doesn’t ship with a tmux or screen equivilent in base in order to daemonise the process and let them run in the background.
ZFS already does this for its internal commands.
HardenedBSD August 2020 Status Report and Call for Donations (https://hardenedbsd.org/article/shawn-webb/2020-08-15/hardenedbsd-august-2020-status-report-and-call-donations)
This last month has largely been a quiet one. I've restarted work on porting five-year-old work from the Code Pointer Integrity (CPI) project into HardenedBSD. Chiefly, I've started forward-porting the libc and rtld bits from the CPI project and now need to look at llvm compiler/linker enhancements. We need to be able to apply SafeStack to shared objects, not just application binaries. This forward-porting work I'm doing is to support that effort.
The infrastructure has settled and is now churning normally and happily. We're still working out bandwidth issues. We hope to have a new fiber line ran by the end of September.
As part of this status report, I'm issuing a formal call for donations. I'm aiming for $4,000.00 USD for a newer self-hosted Gitea server. I hope to purchase the new server before the end of 2020.
Important parts of Unix's history happened before readline support was common (https://utcc.utoronto.ca/~cks/space/blog/unix/TimeBeforeReadline)
Unix and things that run on Unix have been around for a long time now. In particular, GNU Readline was first released in 1989 (as was Bash), which is long enough ago for it (or lookalikes) to become pretty much pervasive, especially in Unix shells. Today it's easy to think of readline support as something that's always been there. But of course this isn't the case. Unix in its modern form dates from V7 in 1979 and 4.2 BSD in 1983, so a lot of Unix was developed before readline and was to some degree shaped by the lack of it.
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Mason - mailserver (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/367/feedback/Mason%20-%20mailserver.md)
casey - freebsd on decline (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/367/feedback/casey%20-%20freebsd%20on%20decline.md)
denis - postgres (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/367/feedback/denis%20-%20postgres.md)
***
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, berkeley, software, distribution, zfs, interview, patch, bug, bugfix, sandbox, dataset, jail, tmux, screen, status, status report, call for donations, donation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A 35 Year Old Bug in Patch, Sandbox for FreeBSD, Changing from one dataset to another within a jail, You don’t need tmux or screen for ZFS, HardenedBSD August 2020 Status Report and Call for Donations, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="http://bsdimp.blogspot.com/2020/08/a-35-year-old-bug-in-patch-found-in.html" rel="nofollow">A 35 Year Old Bug in Patch</a></h3>

<blockquote>
<p>Larry Wall posted patch 1.3 to mod.sources on May 8, 1985. A number of versions followed over the years. It&#39;s been a faithful alley for a long, long time. I&#39;ve never had a problem with patch until I embarked on the 2.11BSD restoration project. In going over the logs very carefully, I&#39;ve discovered a bug that bites this effort twice. It&#39;s quite interesting to use 27 year old patches to find this bug while restoring a 29 year old OS...</p>
</blockquote>

<hr>

<h3><a href="https://www.relkom.sk/en/fbsd_sandbox.shtml" rel="nofollow">Sandbox for FreeBSD</a></h3>

<blockquote>
<p>A sandbox is a software which artificially limits access to the specific resources on the target according to the assigned policy. The sandbox installs hooks to the kernel syscalls and other sub-systems in order to interrupt the events triggered by the application. From the application point of view, application working as usual, but when it wants to access, for instance, /dev/kmem the sandbox software decides against the assigned sandbox scheme whether to grant or deny access.<br>
In our case, the sandbox is a kernel module which uses MAC (Mandatory Access Control) Framework developed by the TrustedBSD team. All necessary hooks were introduced to the FreeBSD kernel.</p>
</blockquote>

<ul>
<li><a href="https://gitlab.com/relkom/sandbox" rel="nofollow">Source Code</a></li>
<li><a href="https://www.relkom.sk/en/fbsd_sandbox_docs.shtml" rel="nofollow">Documentation</a></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dan.langille.org/2020/08/16/changing-from-one-dataset-to-another-within-a-freebsd-iocage-jail/" rel="nofollow">Changing from one dataset to another within a jail</a></h3>

<blockquote>
<p>ZFS has a the ability to share itself within a jail. That gives the jail some autonomy, and I like that.<br>
I’ve written briefly about that, specifically for iocage. More recently, I started using a zfs snapshot for caching clearing.<br>
The purpose of this post is to document the existing configuration of the production FreshPorts webserver and outline the plan on how to modify it for more zfs-snapshot-based cache clearing.</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/you-dont-need-tmux-or-screen-for-zfs/" rel="nofollow">You don’t need tmux or screen for ZFS</a></h3>

<blockquote>
<p>Back in January I mentioned how to add redundancy to a ZFS pool by adding a mirrored drive. Someone with a private account on Twitter asked me why FreeBSD—and NetBSD!—doesn’t ship with a tmux or screen equivilent in base in order to daemonise the process and let them run in the background.<br>
ZFS already does this for its internal commands.</p>
</blockquote>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2020-08-15/hardenedbsd-august-2020-status-report-and-call-donations" rel="nofollow">HardenedBSD August 2020 Status Report and Call for Donations</a></h3>

<blockquote>
<p>This last month has largely been a quiet one. I&#39;ve restarted work on porting five-year-old work from the Code Pointer Integrity (CPI) project into HardenedBSD. Chiefly, I&#39;ve started forward-porting the libc and rtld bits from the CPI project and now need to look at llvm compiler/linker enhancements. We need to be able to apply SafeStack to shared objects, not just application binaries. This forward-porting work I&#39;m doing is to support that effort.<br>
The infrastructure has settled and is now churning normally and happily. We&#39;re still working out bandwidth issues. We hope to have a new fiber line ran by the end of September.<br>
As part of this status report, I&#39;m issuing a formal call for donations. I&#39;m aiming for $4,000.00 USD for a newer self-hosted Gitea server. I hope to purchase the new server before the end of 2020.</p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/TimeBeforeReadline" rel="nofollow">Important parts of Unix&#39;s history happened before readline support was common</a></h3>

<blockquote>
<p>Unix and things that run on Unix have been around for a long time now. In particular, GNU Readline was first released in 1989 (as was Bash), which is long enough ago for it (or lookalikes) to become pretty much pervasive, especially in Unix shells. Today it&#39;s easy to think of readline support as something that&#39;s always been there. But of course this isn&#39;t the case. Unix in its modern form dates from V7 in 1979 and 4.2 BSD in 1983, so a lot of Unix was developed before readline and was to some degree shaped by the lack of it.</p>
</blockquote>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/367/feedback/Mason%20-%20mailserver.md" rel="nofollow">Mason - mailserver</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/367/feedback/casey%20-%20freebsd%20on%20decline.md" rel="nofollow">casey - freebsd on decline</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/367/feedback/denis%20-%20postgres.md" rel="nofollow">denis - postgres</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A 35 Year Old Bug in Patch, Sandbox for FreeBSD, Changing from one dataset to another within a jail, You don’t need tmux or screen for ZFS, HardenedBSD August 2020 Status Report and Call for Donations, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="http://bsdimp.blogspot.com/2020/08/a-35-year-old-bug-in-patch-found-in.html" rel="nofollow">A 35 Year Old Bug in Patch</a></h3>

<blockquote>
<p>Larry Wall posted patch 1.3 to mod.sources on May 8, 1985. A number of versions followed over the years. It&#39;s been a faithful alley for a long, long time. I&#39;ve never had a problem with patch until I embarked on the 2.11BSD restoration project. In going over the logs very carefully, I&#39;ve discovered a bug that bites this effort twice. It&#39;s quite interesting to use 27 year old patches to find this bug while restoring a 29 year old OS...</p>
</blockquote>

<hr>

<h3><a href="https://www.relkom.sk/en/fbsd_sandbox.shtml" rel="nofollow">Sandbox for FreeBSD</a></h3>

<blockquote>
<p>A sandbox is a software which artificially limits access to the specific resources on the target according to the assigned policy. The sandbox installs hooks to the kernel syscalls and other sub-systems in order to interrupt the events triggered by the application. From the application point of view, application working as usual, but when it wants to access, for instance, /dev/kmem the sandbox software decides against the assigned sandbox scheme whether to grant or deny access.<br>
In our case, the sandbox is a kernel module which uses MAC (Mandatory Access Control) Framework developed by the TrustedBSD team. All necessary hooks were introduced to the FreeBSD kernel.</p>
</blockquote>

<ul>
<li><a href="https://gitlab.com/relkom/sandbox" rel="nofollow">Source Code</a></li>
<li><a href="https://www.relkom.sk/en/fbsd_sandbox_docs.shtml" rel="nofollow">Documentation</a></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dan.langille.org/2020/08/16/changing-from-one-dataset-to-another-within-a-freebsd-iocage-jail/" rel="nofollow">Changing from one dataset to another within a jail</a></h3>

<blockquote>
<p>ZFS has a the ability to share itself within a jail. That gives the jail some autonomy, and I like that.<br>
I’ve written briefly about that, specifically for iocage. More recently, I started using a zfs snapshot for caching clearing.<br>
The purpose of this post is to document the existing configuration of the production FreshPorts webserver and outline the plan on how to modify it for more zfs-snapshot-based cache clearing.</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/you-dont-need-tmux-or-screen-for-zfs/" rel="nofollow">You don’t need tmux or screen for ZFS</a></h3>

<blockquote>
<p>Back in January I mentioned how to add redundancy to a ZFS pool by adding a mirrored drive. Someone with a private account on Twitter asked me why FreeBSD—and NetBSD!—doesn’t ship with a tmux or screen equivilent in base in order to daemonise the process and let them run in the background.<br>
ZFS already does this for its internal commands.</p>
</blockquote>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2020-08-15/hardenedbsd-august-2020-status-report-and-call-donations" rel="nofollow">HardenedBSD August 2020 Status Report and Call for Donations</a></h3>

<blockquote>
<p>This last month has largely been a quiet one. I&#39;ve restarted work on porting five-year-old work from the Code Pointer Integrity (CPI) project into HardenedBSD. Chiefly, I&#39;ve started forward-porting the libc and rtld bits from the CPI project and now need to look at llvm compiler/linker enhancements. We need to be able to apply SafeStack to shared objects, not just application binaries. This forward-porting work I&#39;m doing is to support that effort.<br>
The infrastructure has settled and is now churning normally and happily. We&#39;re still working out bandwidth issues. We hope to have a new fiber line ran by the end of September.<br>
As part of this status report, I&#39;m issuing a formal call for donations. I&#39;m aiming for $4,000.00 USD for a newer self-hosted Gitea server. I hope to purchase the new server before the end of 2020.</p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/TimeBeforeReadline" rel="nofollow">Important parts of Unix&#39;s history happened before readline support was common</a></h3>

<blockquote>
<p>Unix and things that run on Unix have been around for a long time now. In particular, GNU Readline was first released in 1989 (as was Bash), which is long enough ago for it (or lookalikes) to become pretty much pervasive, especially in Unix shells. Today it&#39;s easy to think of readline support as something that&#39;s always been there. But of course this isn&#39;t the case. Unix in its modern form dates from V7 in 1979 and 4.2 BSD in 1983, so a lot of Unix was developed before readline and was to some degree shaped by the lack of it.</p>
</blockquote>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/367/feedback/Mason%20-%20mailserver.md" rel="nofollow">Mason - mailserver</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/367/feedback/casey%20-%20freebsd%20on%20decline.md" rel="nofollow">casey - freebsd on decline</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/367/feedback/denis%20-%20postgres.md" rel="nofollow">denis - postgres</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
