<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 14:14:51 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Dpb”</title>
    <link>https://www.bsdnow.tv/tags/dpb</link>
    <pubDate>Wed, 17 Jun 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>94: Builder's Insurance</title>
  <link>https://www.bsdnow.tv/94</link>
  <guid isPermaLink="false">62d29419-94fa-4252-89a9-581546c7e61d</guid>
  <pubDate>Wed, 17 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/62d29419-94fa-4252-89a9-581546c7e61d.mp3" length="61384180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be chatting with Marc Espie. He's recently added some additional security measures to dpb, OpenBSD's package building tool, and we'll find out why they're so important. We've also got all this week's news, answers to your emails and even a BSDCan wrap-up, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:25:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be chatting with Marc Espie. He's recently added some additional security measures to dpb, OpenBSD's package building tool, and we'll find out why they're so important. We've also got all this week's news, answers to your emails and even a BSDCan wrap-up, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
BSDCan 2015 videos (https://www.bsdcan.org/2015/schedule/)
BSDCan just ended last week, but some of the BSD-related presentation videos are already online
Allan Jude, UCL for FreeBSD (https://www.youtube.com/watch?v=8l6bhKIDecg)
Andrew Cagney, What happens when a dwarf and a daemon start dancing by the light of the silvery moon? (https://www.youtube.com/watch?v=XDIcD4LR5HE)
Andy Tanenbaum, A reimplementation of NetBSD (https://www.youtube.com/watch?v=0pebP891V0c) using a MicroKernel (https://www.youtube.com/watch?v=Bu1JuwVfYTc)
Brooks Davis, CheriBSD: A research fork of FreeBSD (https://www.youtube.com/watch?v=DwCg-51vFAs)
Giuseppe Lettieri, Even faster VM networking with virtual passthrough (https://www.youtube.com/watch?v=Lo6wDCapo4k)
Joseph Mingrone, Molecular Evolution, Genomic Analysis and FreeBSD (https://www.youtube.com/watch?v=K2pnf1YcMTY)
Olivier Cochard-Labbe, Large-scale plug&amp;amp;play x86 network appliance deployment over Internet (https://www.youtube.com/watch?v=6jhSvdnu4k0)
Peter Hessler, Using routing domains / routing tables in a production network (https://www.youtube.com/watch?v=BizrC8Zr-YY)
Ryan Lortie, a stitch in time: jhbuild (https://www.youtube.com/watch?v=YSVFnM3_2Ik)
Ted Unangst, signify: Securing OpenBSD From Us To You (https://www.youtube.com/watch?v=9R5s3l-0wh0)
Many more still to come...
***
Documenting my BSD experience (http://pid1.com/posts/post1.html)
Increasingly common scenario: a long-time Linux user (since the mid-90s) decides it's finally time to give BSD a try
"That night I came home, I had been trying to find out everything I could about BSD and I watched many videos, read forums, etc. One of the shows I found was BSD Now. I saw that they helped people and answered questions, so I decided to write in."
In this ongoing series of blog posts, a user named Michael writes about his initial experiences with trying different BSDs for some different tasks
The first post covers ZFS on FreeBSD, used to build a file server for his house (and of course he lists the hardware, if you're into that)
You get a glimpse of a brand new user trying things out, learning how great ZFS-based RAID arrays are and even some of the initial hurdles someone could run into
He's also looking to venture into the realm of replacing some of his VMs with jails and bhyve soon
His second post (http://pid1.com/posts/post2.html) explores replacing the firewall on his self-described "over complicated home network" with an OpenBSD box
After going from ipfwadmin to ipchains to iptables, not even making it to nftables, he found the simple PF syntax to be really refreshing
All the tools for his networking needs, the majority of which are in the base system, worked quickly and were easy to understand
Getting to hear experiences like this are very important - they show areas where all the BSD developers' hard work has paid off, but can also let us know where we need to improve
***
PC-BSD tries HardenedBSD builds (https://github.com/pcbsd/hardenedBSD-stable)
The PC-BSD team has created a new branch of their git repo with the HardenedBSD ASLR patches integrated
They're not the first major FreeBSD-based project to offer an alternate build - OPNsense did that (https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense) a few weeks ago - but this might open the door for more projects to give it a try as well
With Personacrypt, OpenNTPD, LibreSSL and recent Tor integration through the tools, these additional memory protections will offer PC-BSD users even more security that a default FreeBSD install won't have
Time will tell if more projects and products like FreeNAS might be interested too
***
C-states in OpenBSD (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143423172522625&amp;amp;w=2)
People who run BSD on their notebooks, you'll want to pay attention to this one
OpenBSD has recently committed some ACPI improvements for deep C-states (http://www.hardwaresecrets.com/article/Everything-You-Need-to-Know-About-the-CPU-C-States-Power-Saving-Modes/611), enabling the processor to enter a low-power mode
According (https://twitter.com/StevenUniq/status/610586711358316545) to a (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143430996602802&amp;amp;w=2) few users (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143429914700826&amp;amp;w=2) so far (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143425943026225&amp;amp;w=2), the change has resulted in dramatically lower CPU temperatures on their laptops, as well as much better battery life
If you're running OpenBSD -current on a laptop, try out the latest snapshot and report back (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143423391222952&amp;amp;w=2) with your findings
***
NetBSD at Open Source Conference 2015 Hokkaido (https://mail-index.netbsd.org/netbsd-advocacy/2015/06/13/msg000687.html)
The Japanese NetBSD users group never sleeps, and they've hit yet another open source conference
As is usually the case, lots of strange machines on display were running none other than NetBSD (though it was mostly ARM this time)
We'll be having one of these guys on the show next week to discuss some of the lesser-known NetBSD platforms
***
Interview - Marc Espie - espie@openbsd.org (mailto:espie@openbsd.org) / @espie_openbsd (https://twitter.com/espie_openbsd)
Recent (https://www.marc.info/?l=openbsd-ports&amp;amp;m=143051151521627&amp;amp;w=2) improvements (https://www.marc.info/?l=openbsd-ports&amp;amp;m=143151777209226&amp;amp;w=2) to OpenBSD's dpb (http://www.bsdnow.tv/tutorials/dpb) tool
News Roundup
Introducing xhyve, bhyve on OS X (https://github.com/mist64/xhyve/blob/master/README.md)
We've talked about FreeBSD's "bhyve" hypervisor a lot on the show, and now it's been ported to another OS
As the name "xhyve" might imply, it's a port of bhyve to Mac OS X 
Currently it only has support for virtualizing a few Linux distributions, but more guest systems can be added in the future
It runs entirely in userspace, and has no extra requirements beyond OS X 10.10 or newer
There are also a few examples (http://www.pagetable.com/?p=831) on how to use it
***
4K displays on DragonFlyBSD (http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/4KDisplays/)
If you've been using DragonFly as a desktop, maybe with those nice Broadwell graphics, you'll be pleased to know that 4K displays work just fine
Matthew Dillon wrote up a wiki page about some of the specifics, including a couple gotchas
Some GUI applications might look weird on such a huge resolution, 
HDMI ports are mostly limited to a 30Hz refresh rate, and there are slightly steeper hardware requirements for a smooth experience
***
Sandboxing port daemons on OpenBSD (http://coderinaworldofcode.blogspot.com/2015/06/chrooting-mumble-server-on-openbsd.html)
We talked about different containment methods last week, and mentioned that a lot of the daemons in OpenBSD's base as chrooted by default - things from ports or packages don't always get the same treatment
This blog post uses a mumble server as an example, but you can apply it to any service from ports that doesn't chroot by default
It goes through the process of manually building a sandbox with all the libraries you'll need to run the daemon, and this setup will even wipe and refresh the chroot every time you restart it
With a few small changes, similar tricks could be done on the other BSDs as well - everybody has chroots
***
SmallWall 1.8.2 released (http://smallwall.freeforums.net/thread/44/version-1-8-2-released)
SmallWall is a relatively new BSD-based project that we've never covered before
It's an attempt to keep the old m0n0wall codebase going, and appears to have started around the time m0n0wall called it quits
They've just released the first official version (http://www.smallwall.org/download.html), so you can give it a try now
If you're interested in learning more about SmallWall, the lead developer just might be on the show in a few weeks...
***
Feedback/Questions
David writes in (http://slexy.org/view/s21gRTNnk7)
Brian writes in (http://slexy.org/view/s2DdiMvELg)
Dan writes in (http://slexy.org/view/s2h4ZS6SMd)
Joel writes in (http://slexy.org/view/s20kA1jeXY)
Steve writes in (http://slexy.org/view/s2wJ9HP1bs)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dpb, poudriere, pbulk, packages, ports, distributed, bsdcan, pf, zfs, opnsense, pfsense, hardenedbsd, aslr, smallwall, m0n0wall, xhyve, bhyve</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be chatting with Marc Espie. He&#39;s recently added some additional security measures to dpb, OpenBSD&#39;s package building tool, and we&#39;ll find out why they&#39;re so important. We&#39;ve also got all this week&#39;s news, answers to your emails and even a BSDCan wrap-up, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">BSDCan 2015 videos</a></h3>

<ul>
<li>BSDCan just ended last week, but some of the BSD-related presentation videos are already online</li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=8l6bhKIDecg" rel="nofollow">UCL for FreeBSD</a></li>
<li>Andrew Cagney, <a href="https://www.youtube.com/watch?v=XDIcD4LR5HE" rel="nofollow">What happens when a dwarf and a daemon start dancing by the light of the silvery moon?</a></li>
<li>Andy Tanenbaum, <a href="https://www.youtube.com/watch?v=0pebP891V0c" rel="nofollow">A reimplementation of NetBSD</a> <a href="https://www.youtube.com/watch?v=Bu1JuwVfYTc" rel="nofollow">using a MicroKernel</a></li>
<li>Brooks Davis, <a href="https://www.youtube.com/watch?v=DwCg-51vFAs" rel="nofollow">CheriBSD: A research fork of FreeBSD</a></li>
<li>Giuseppe Lettieri, <a href="https://www.youtube.com/watch?v=Lo6wDCapo4k" rel="nofollow">Even faster VM networking with virtual passthrough</a></li>
<li>Joseph Mingrone, <a href="https://www.youtube.com/watch?v=K2pnf1YcMTY" rel="nofollow">Molecular Evolution, Genomic Analysis and FreeBSD</a></li>
<li>Olivier Cochard-Labbe, <a href="https://www.youtube.com/watch?v=6jhSvdnu4k0" rel="nofollow">Large-scale plug&amp;play x86 network appliance deployment over Internet</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">Using routing domains / routing tables in a production network</a></li>
<li>Ryan Lortie, <a href="https://www.youtube.com/watch?v=YSVFnM3_2Ik" rel="nofollow">a stitch in time: jhbuild</a></li>
<li>Ted Unangst, <a href="https://www.youtube.com/watch?v=9R5s3l-0wh0" rel="nofollow">signify: Securing OpenBSD From Us To You</a></li>
<li>Many more still to come...
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post1.html" rel="nofollow">Documenting my BSD experience</a></h3>

<ul>
<li>Increasingly common scenario: a long-time Linux user (since the mid-90s) decides it&#39;s finally time to give BSD a try</li>
<li>&quot;That night I came home, I had been trying to find out everything I could about BSD and I watched many videos, read forums, etc. One of the shows I found was BSD Now. I saw that they helped people and answered questions, so I decided to write in.&quot;</li>
<li>In this ongoing series of blog posts, a user named Michael writes about his initial experiences with trying different BSDs for some different tasks</li>
<li>The first post covers ZFS on FreeBSD, used to build a file server for his house (and of course he lists the hardware, if you&#39;re into that)</li>
<li>You get a glimpse of a brand new user trying things out, learning how great ZFS-based RAID arrays are and even some of the initial hurdles someone could run into</li>
<li>He&#39;s also looking to venture into the realm of replacing some of his VMs with jails and bhyve soon</li>
<li>His <a href="http://pid1.com/posts/post2.html" rel="nofollow">second post</a> explores replacing the firewall on his self-described &quot;over complicated home network&quot; with an OpenBSD box</li>
<li>After going from ipfwadmin to ipchains to iptables, not even making it to nftables, he found the simple PF syntax to be really refreshing</li>
<li>All the tools for his networking needs, the majority of which are in the base system, worked quickly and were easy to understand</li>
<li>Getting to hear experiences like this are very important - they show areas where all the BSD developers&#39; hard work has paid off, but can also let us know where we need to improve
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/hardenedBSD-stable" rel="nofollow">PC-BSD tries HardenedBSD builds</a></h3>

<ul>
<li>The PC-BSD team has created a new branch of their git repo with the HardenedBSD ASLR patches integrated</li>
<li>They&#39;re not the first major FreeBSD-based project to offer an alternate build - OPNsense <a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" rel="nofollow">did that</a> a few weeks ago - but this might open the door for more projects to give it a try as well</li>
<li>With Personacrypt, OpenNTPD, LibreSSL and recent Tor integration through the tools, these additional memory protections will offer PC-BSD users even more security that a default FreeBSD install won&#39;t have</li>
<li>Time will tell if more projects and products like FreeNAS might be interested too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143423172522625&w=2" rel="nofollow">C-states in OpenBSD</a></h3>

<ul>
<li>People who run BSD on their notebooks, you&#39;ll want to pay attention to this one</li>
<li>OpenBSD has recently committed some ACPI improvements for <a href="http://www.hardwaresecrets.com/article/Everything-You-Need-to-Know-About-the-CPU-C-States-Power-Saving-Modes/611" rel="nofollow">deep C-states</a>, enabling the processor to enter a low-power mode</li>
<li><a href="https://twitter.com/StevenUniq/status/610586711358316545" rel="nofollow">According</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143430996602802&w=2" rel="nofollow">to a</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143429914700826&w=2" rel="nofollow">few users</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143425943026225&w=2" rel="nofollow">so far</a>, the change has resulted in dramatically lower CPU temperatures on their laptops, as well as much better battery life</li>
<li>If you&#39;re running OpenBSD -current on a laptop, try out the latest snapshot and <a href="https://www.marc.info/?l=openbsd-misc&m=143423391222952&w=2" rel="nofollow">report back</a> with your findings
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/06/13/msg000687.html" rel="nofollow">NetBSD at Open Source Conference 2015 Hokkaido</a></h3>

<ul>
<li>The Japanese NetBSD users group never sleeps, and they&#39;ve hit yet another open source conference</li>
<li>As is usually the case, lots of strange machines on display were running none other than NetBSD (though it was mostly ARM this time)</li>
<li>We&#39;ll be having one of these guys on the show next week to discuss some of the lesser-known NetBSD platforms
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p><a href="https://www.marc.info/?l=openbsd-ports&m=143051151521627&w=2" rel="nofollow">Recent</a> <a href="https://www.marc.info/?l=openbsd-ports&m=143151777209226&w=2" rel="nofollow">improvements</a> to OpenBSD&#39;s <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a> tool</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/mist64/xhyve/blob/master/README.md" rel="nofollow">Introducing xhyve, bhyve on OS X</a></h3>

<ul>
<li>We&#39;ve talked about FreeBSD&#39;s &quot;bhyve&quot; hypervisor a lot on the show, and now it&#39;s been ported to another OS</li>
<li>As the name &quot;xhyve&quot; might imply, it&#39;s a port of bhyve to Mac OS X </li>
<li>Currently it only has support for virtualizing a few Linux distributions, but more guest systems can be added in the future</li>
<li>It runs entirely in userspace, and has no extra requirements beyond OS X 10.10 or newer</li>
<li>There are also <a href="http://www.pagetable.com/?p=831" rel="nofollow">a few examples</a> on how to use it
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/4KDisplays/" rel="nofollow">4K displays on DragonFlyBSD</a></h3>

<ul>
<li>If you&#39;ve been using DragonFly as a desktop, maybe with those nice Broadwell graphics, you&#39;ll be pleased to know that 4K displays work just fine</li>
<li>Matthew Dillon wrote up a wiki page about some of the specifics, including a couple gotchas</li>
<li>Some GUI applications might look weird on such a huge resolution, </li>
<li>HDMI ports are mostly limited to a 30Hz refresh rate, and there are slightly steeper hardware requirements for a smooth experience
***</li>
</ul>

<h3><a href="http://coderinaworldofcode.blogspot.com/2015/06/chrooting-mumble-server-on-openbsd.html" rel="nofollow">Sandboxing port daemons on OpenBSD</a></h3>

<ul>
<li>We talked about different containment methods last week, and mentioned that a lot of the daemons in OpenBSD&#39;s base as chrooted by default - things from ports or packages don&#39;t always get the same treatment</li>
<li>This blog post uses a mumble server as an example, but you can apply it to <em>any</em> service from ports that doesn&#39;t chroot by default</li>
<li>It goes through the process of manually building a sandbox with all the libraries you&#39;ll need to run the daemon, and this setup will even wipe and refresh the chroot every time you restart it</li>
<li>With a few small changes, similar tricks could be done on the other BSDs as well - everybody has chroots
***</li>
</ul>

<h3><a href="http://smallwall.freeforums.net/thread/44/version-1-8-2-released" rel="nofollow">SmallWall 1.8.2 released</a></h3>

<ul>
<li>SmallWall is a relatively new BSD-based project that we&#39;ve never covered before</li>
<li>It&#39;s an attempt to keep the old m0n0wall codebase going, and appears to have started around the time m0n0wall called it quits</li>
<li>They&#39;ve just released <a href="http://www.smallwall.org/download.html" rel="nofollow">the first official version</a>, so you can give it a try now</li>
<li>If you&#39;re interested in learning more about SmallWall, the lead developer just might be on the show in a few weeks...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21gRTNnk7" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DdiMvELg" rel="nofollow">Brian writes in</a></li>
<li><a href="http://slexy.org/view/s2h4ZS6SMd" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20kA1jeXY" rel="nofollow">Joel writes in</a></li>
<li><a href="http://slexy.org/view/s2wJ9HP1bs" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be chatting with Marc Espie. He&#39;s recently added some additional security measures to dpb, OpenBSD&#39;s package building tool, and we&#39;ll find out why they&#39;re so important. We&#39;ve also got all this week&#39;s news, answers to your emails and even a BSDCan wrap-up, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">BSDCan 2015 videos</a></h3>

<ul>
<li>BSDCan just ended last week, but some of the BSD-related presentation videos are already online</li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=8l6bhKIDecg" rel="nofollow">UCL for FreeBSD</a></li>
<li>Andrew Cagney, <a href="https://www.youtube.com/watch?v=XDIcD4LR5HE" rel="nofollow">What happens when a dwarf and a daemon start dancing by the light of the silvery moon?</a></li>
<li>Andy Tanenbaum, <a href="https://www.youtube.com/watch?v=0pebP891V0c" rel="nofollow">A reimplementation of NetBSD</a> <a href="https://www.youtube.com/watch?v=Bu1JuwVfYTc" rel="nofollow">using a MicroKernel</a></li>
<li>Brooks Davis, <a href="https://www.youtube.com/watch?v=DwCg-51vFAs" rel="nofollow">CheriBSD: A research fork of FreeBSD</a></li>
<li>Giuseppe Lettieri, <a href="https://www.youtube.com/watch?v=Lo6wDCapo4k" rel="nofollow">Even faster VM networking with virtual passthrough</a></li>
<li>Joseph Mingrone, <a href="https://www.youtube.com/watch?v=K2pnf1YcMTY" rel="nofollow">Molecular Evolution, Genomic Analysis and FreeBSD</a></li>
<li>Olivier Cochard-Labbe, <a href="https://www.youtube.com/watch?v=6jhSvdnu4k0" rel="nofollow">Large-scale plug&amp;play x86 network appliance deployment over Internet</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">Using routing domains / routing tables in a production network</a></li>
<li>Ryan Lortie, <a href="https://www.youtube.com/watch?v=YSVFnM3_2Ik" rel="nofollow">a stitch in time: jhbuild</a></li>
<li>Ted Unangst, <a href="https://www.youtube.com/watch?v=9R5s3l-0wh0" rel="nofollow">signify: Securing OpenBSD From Us To You</a></li>
<li>Many more still to come...
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post1.html" rel="nofollow">Documenting my BSD experience</a></h3>

<ul>
<li>Increasingly common scenario: a long-time Linux user (since the mid-90s) decides it&#39;s finally time to give BSD a try</li>
<li>&quot;That night I came home, I had been trying to find out everything I could about BSD and I watched many videos, read forums, etc. One of the shows I found was BSD Now. I saw that they helped people and answered questions, so I decided to write in.&quot;</li>
<li>In this ongoing series of blog posts, a user named Michael writes about his initial experiences with trying different BSDs for some different tasks</li>
<li>The first post covers ZFS on FreeBSD, used to build a file server for his house (and of course he lists the hardware, if you&#39;re into that)</li>
<li>You get a glimpse of a brand new user trying things out, learning how great ZFS-based RAID arrays are and even some of the initial hurdles someone could run into</li>
<li>He&#39;s also looking to venture into the realm of replacing some of his VMs with jails and bhyve soon</li>
<li>His <a href="http://pid1.com/posts/post2.html" rel="nofollow">second post</a> explores replacing the firewall on his self-described &quot;over complicated home network&quot; with an OpenBSD box</li>
<li>After going from ipfwadmin to ipchains to iptables, not even making it to nftables, he found the simple PF syntax to be really refreshing</li>
<li>All the tools for his networking needs, the majority of which are in the base system, worked quickly and were easy to understand</li>
<li>Getting to hear experiences like this are very important - they show areas where all the BSD developers&#39; hard work has paid off, but can also let us know where we need to improve
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/hardenedBSD-stable" rel="nofollow">PC-BSD tries HardenedBSD builds</a></h3>

<ul>
<li>The PC-BSD team has created a new branch of their git repo with the HardenedBSD ASLR patches integrated</li>
<li>They&#39;re not the first major FreeBSD-based project to offer an alternate build - OPNsense <a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" rel="nofollow">did that</a> a few weeks ago - but this might open the door for more projects to give it a try as well</li>
<li>With Personacrypt, OpenNTPD, LibreSSL and recent Tor integration through the tools, these additional memory protections will offer PC-BSD users even more security that a default FreeBSD install won&#39;t have</li>
<li>Time will tell if more projects and products like FreeNAS might be interested too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143423172522625&w=2" rel="nofollow">C-states in OpenBSD</a></h3>

<ul>
<li>People who run BSD on their notebooks, you&#39;ll want to pay attention to this one</li>
<li>OpenBSD has recently committed some ACPI improvements for <a href="http://www.hardwaresecrets.com/article/Everything-You-Need-to-Know-About-the-CPU-C-States-Power-Saving-Modes/611" rel="nofollow">deep C-states</a>, enabling the processor to enter a low-power mode</li>
<li><a href="https://twitter.com/StevenUniq/status/610586711358316545" rel="nofollow">According</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143430996602802&w=2" rel="nofollow">to a</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143429914700826&w=2" rel="nofollow">few users</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143425943026225&w=2" rel="nofollow">so far</a>, the change has resulted in dramatically lower CPU temperatures on their laptops, as well as much better battery life</li>
<li>If you&#39;re running OpenBSD -current on a laptop, try out the latest snapshot and <a href="https://www.marc.info/?l=openbsd-misc&m=143423391222952&w=2" rel="nofollow">report back</a> with your findings
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/06/13/msg000687.html" rel="nofollow">NetBSD at Open Source Conference 2015 Hokkaido</a></h3>

<ul>
<li>The Japanese NetBSD users group never sleeps, and they&#39;ve hit yet another open source conference</li>
<li>As is usually the case, lots of strange machines on display were running none other than NetBSD (though it was mostly ARM this time)</li>
<li>We&#39;ll be having one of these guys on the show next week to discuss some of the lesser-known NetBSD platforms
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p><a href="https://www.marc.info/?l=openbsd-ports&m=143051151521627&w=2" rel="nofollow">Recent</a> <a href="https://www.marc.info/?l=openbsd-ports&m=143151777209226&w=2" rel="nofollow">improvements</a> to OpenBSD&#39;s <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a> tool</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/mist64/xhyve/blob/master/README.md" rel="nofollow">Introducing xhyve, bhyve on OS X</a></h3>

<ul>
<li>We&#39;ve talked about FreeBSD&#39;s &quot;bhyve&quot; hypervisor a lot on the show, and now it&#39;s been ported to another OS</li>
<li>As the name &quot;xhyve&quot; might imply, it&#39;s a port of bhyve to Mac OS X </li>
<li>Currently it only has support for virtualizing a few Linux distributions, but more guest systems can be added in the future</li>
<li>It runs entirely in userspace, and has no extra requirements beyond OS X 10.10 or newer</li>
<li>There are also <a href="http://www.pagetable.com/?p=831" rel="nofollow">a few examples</a> on how to use it
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/4KDisplays/" rel="nofollow">4K displays on DragonFlyBSD</a></h3>

<ul>
<li>If you&#39;ve been using DragonFly as a desktop, maybe with those nice Broadwell graphics, you&#39;ll be pleased to know that 4K displays work just fine</li>
<li>Matthew Dillon wrote up a wiki page about some of the specifics, including a couple gotchas</li>
<li>Some GUI applications might look weird on such a huge resolution, </li>
<li>HDMI ports are mostly limited to a 30Hz refresh rate, and there are slightly steeper hardware requirements for a smooth experience
***</li>
</ul>

<h3><a href="http://coderinaworldofcode.blogspot.com/2015/06/chrooting-mumble-server-on-openbsd.html" rel="nofollow">Sandboxing port daemons on OpenBSD</a></h3>

<ul>
<li>We talked about different containment methods last week, and mentioned that a lot of the daemons in OpenBSD&#39;s base as chrooted by default - things from ports or packages don&#39;t always get the same treatment</li>
<li>This blog post uses a mumble server as an example, but you can apply it to <em>any</em> service from ports that doesn&#39;t chroot by default</li>
<li>It goes through the process of manually building a sandbox with all the libraries you&#39;ll need to run the daemon, and this setup will even wipe and refresh the chroot every time you restart it</li>
<li>With a few small changes, similar tricks could be done on the other BSDs as well - everybody has chroots
***</li>
</ul>

<h3><a href="http://smallwall.freeforums.net/thread/44/version-1-8-2-released" rel="nofollow">SmallWall 1.8.2 released</a></h3>

<ul>
<li>SmallWall is a relatively new BSD-based project that we&#39;ve never covered before</li>
<li>It&#39;s an attempt to keep the old m0n0wall codebase going, and appears to have started around the time m0n0wall called it quits</li>
<li>They&#39;ve just released <a href="http://www.smallwall.org/download.html" rel="nofollow">the first official version</a>, so you can give it a try now</li>
<li>If you&#39;re interested in learning more about SmallWall, the lead developer just might be on the show in a few weeks...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21gRTNnk7" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DdiMvELg" rel="nofollow">Brian writes in</a></li>
<li><a href="http://slexy.org/view/s2h4ZS6SMd" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20kA1jeXY" rel="nofollow">Joel writes in</a></li>
<li><a href="http://slexy.org/view/s2wJ9HP1bs" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>33: Certified Package Delivery</title>
  <link>https://www.bsdnow.tv/33</link>
  <guid isPermaLink="false">f0c15113-8ade-464b-a89f-3398734256dc</guid>
  <pubDate>Wed, 16 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f0c15113-8ade-464b-a89f-3398734256dc.mp3" length="57837748" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
BSDCan schedule, speakers and talks (https://www.bsdcan.org/2014/schedule/)
This year's BSDCan will kick off on May 14th in Ottawa
The list of speakers (https://www.bsdcan.org/2014/schedule/speakers.en.html) is also out
And finally the talks (https://www.bsdcan.org/2014/schedule/events.en.html) everyone's looking forward to
Lots of great tutorials and talks, spanning a wide range of topics of interest
Be sure to come by so you can and meet Allan and Kris in person and get BSDCan shirts (https://twitter.com/bsdcan/status/454990067552247808)
***
NYCBSDCon talks uploaded (https://www.youtube.com/watch?v=4bPduH6O7lI)
The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon
Jeff Rizzo's talk, "Releasing NetBSD: So Many Targets, So Little Time"
Dru Lavigne's talk (https://www.youtube.com/watch?v=DAmZ3cbfigA), "ZFS Management Tools in FreeNAS and PC-BSD"
Scott Long's talk (https://www.youtube.com/watch?v=FL5U4wr86L4), "Serving one third of the Internet via FreeBSD"
Michael W. Lucas' talk (https://www.youtube.com/watch?v=buo5JlMnGPI), "BSD Breaking Barriers"
***
FreeBSD Journal, issue 2 (http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html)
The bi-monthly FreeBSD journal's second issue is out
Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates
In less than two months, they've already gotten over 1000 subscribers! It's available on Google Play, iTunes, Amazon, etc
"We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD"
Check our interview with GNN (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) for more information about the journal
***
OpenSSL, more like OpenSS-Hell (http://bsd.slashdot.org/story/200567)
We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy
There's been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so
We finally have a timeline of events (http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html)
Reactions from ISC (https://isc.sans.edu/diary/Testing+for+Heartbleed/17933), PCBSD (http://blog.pcbsd.org/2014/04/openssl-security-update/), Tarsnap (http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html), the Tor (https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html) project (https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html), FreeBSD (https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html), NetBSD (http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc), oss-sec (http://seclists.org/oss-sec/2014/q2/index.html), PHK (https://queue.acm.org/detail.cfm?id=2602816), Varnish (https://www.varnish-cache.org/docs/trunk/phk/dough.html) and Akamai (https://blogs.akamai.com/2014/04/heartbleed-update.html)
pfSense (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) released a new version to fix it (https://blog.pfsense.org/?p=1253)
OpenBSD disabled heartbeat entirely (http://marc.info/?l=openbsd-cvs&amp;amp;m=139715336230455&amp;amp;w=2) and is very unforgiving of the IETF (https://news.ycombinator.com/item?id=7568921)
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has two good (http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf) write-ups (http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse) about the issue and how horrible the OpenSSL codebase is
A nice quote from one of the OpenBSD lists: "Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL's bug tracker is only used to park bugs, not fix them"
Sounds like someone else (http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html) was having fun with the bug for a while too
There's also another OpenSSL bug that OpenBSD patched (http://marc.info/?l=openbsd-cvs&amp;amp;m=139732441810737&amp;amp;w=2) - it allows an attacker to inject data from one connection into another 
OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we're seeing a fork (http://undeadly.org/cgi?action=article&amp;amp;sid=20140415093252) in real time
***
Interview - Jim Brown - info@bsdcertification.org (mailto:info@bsdcertification.org)
The BSD Certification (http://bsdcertification.org/) exams
Tutorial
Building OpenBSD binary packages in bulk (http://www.bsdnow.tv/tutorials/dpb)
News Roundup
Portable signify (https://github.com/aperezdc/signify)
Back in episode 23 (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) we talked with Ted Unangst about the new "signify" tool in OpenBSD
Now there's a (completely unofficial) portable version of it on github
If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it
Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***
Foundation goals and updates (https://www.mail-archive.com/misc@openbsd.org/msg128240.html)
The OpenBSD foundation has reached their 2014 goal of $150,000
You can check their activities and goals (http://www.openbsdfoundation.org/activities.html) to see where the money is going
Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data
The FreeBSD foundation has kicked off their spring fundraising (http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html) campaign
There's also a list of their activities and goals available to read through
Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/)
New PBI runtime that fixes stability issues and decreases load times
"Update Center" is getting a lot of development and improvements
Lots of misc. bug fixes and updates
***
Feedback/Questions
There's a reddit thread (http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/) we wanted to highlight - a user wants to show his friend BSD and why it's great
Brad writes in (http://slexy.org/view/s20Tso9a6v)
Sha'ul writes in (http://slexy.org/view/s21DfdV9yt)
iGibbs writes in (http://slexy.org/view/s2di8XRt73)
Matt writes in (http://slexy.org/view/s20m2g8UgV)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dpb, distributed ports builder, marc espie, poudriere, package builds, jim brown, bsdcertification, bsd certification, exam, test, openssl, heartbleed, exploit, ssl, tls, heartbeat, openssh, theo de raadt, hole, 0day, zero day, bsdcan, nycbsdcon, presentations, talks, conference, recording, netflix, tarsnap, mitigation, ixsystems, foundation, journal, cve</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>29: P.E.F.S.</title>
  <link>https://www.bsdnow.tv/29</link>
  <guid isPermaLink="false">4af36dea-3dd3-4ac1-9ee9-a2e34dd54e3a</guid>
  <pubDate>Wed, 19 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4af36dea-3dd3-4ac1-9ee9-a2e34dd54e3a.mp3" length="82610606" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from AsiaBSDCon! This week we'll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we'll give you a step by step guide on how to actually use it. There's also the usual round of your questions and we've got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:54:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back from AsiaBSDCon! This week we'll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we'll give you a step by step guide on how to actually use it. There's also the usual round of your questions and we've got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
Using OpenSSH Certificate Authentication (http://neocri.me/documentation/using-ssh-certificate-authentication/)
SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you're using
They're not really that complex, there just isn't a lot of documentation on how to use them - this post tries to solve that
There's the benefit of not needing a knownhosts file or authorizedusers file anymore
The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***
Back to FreeBSD, a new series (http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more)
Similar to the "FreeBSD Challenge" blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey
"So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10"
He's starting off with PCBSD since it's easy to get working with dual graphics
Should be a fun series to follow!
***
OpenBSD's recent experiments in package building (http://undeadly.org/cgi?action=article&amp;amp;sid=20140307130554)
If you'll remember back to our poudriere tutorial (http://www.bsdnow.tv/tutorials/poudriere), it lets you build FreeBSD binary packages in bulk - OpenBSD's version is called dpb (http://www.bsdnow.tv/tutorials/dpb)
Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware
This article goes through some of his findings and plans for future versions that increase performance
We'll be showing a tutorial of dpb on the show in a few weeks
***
Securing FreeBSD with 2FA (http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/)
So maybe you've set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?
This post walks us through the process of locking down an ssh server (http://www.bsdnow.tv/tutorials/ssh-tmux) with 2FA
With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***
Interview - Gleb Kurtsou - gleb.kurtsou@gmail.com (mailto:gleb.kurtsou@gmail.com)
PEFS (security audit results here (https://defuse.ca/audits/pefs.htm))
Tutorial
Filesystem-based encryption with PEFS (http://www.bsdnow.tv/tutorials/pefs)
News Roundup
BSDCan 2014 registration (https://www.bsdcan.org/2014/registration.php)
Registration is finally open!
The prices are available along with a full list of presentations
Tutorial sessions for various topics as well
You have to go
***
Big changes for OpenBSD 5.6 (http://undeadly.org/cgi?action=article&amp;amp;sid=20140314080734)
Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising
OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3
They've also imported nginx into base a few years ago, but now have finally removed Apache
Sendmail is also no longer the default MTA, OpenSMTPD is the new default (http://undeadly.org/cgi?action=article&amp;amp;sid=20140313052817)
Will BIND be removed next? Maybe so (http://marc.info/?l=openbsd-cvs&amp;amp;m=139492163427518&amp;amp;w=2)
They've also discontinued the hp300, mvme68k and mvme88k ports
***
Getting to know your portmgr lurkers (http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/)
The "getting to know your portmgr" series makes its return
This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)
How he got into FreeBSD? He "wanted a unix system that I could understand and that would not get bloated as time goes by"
Mentions why he's still heavily involved with the project and lots more
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/)
Work has started to port Pulseaudio to PCBSD 10.0.1
There's a new "pc-mixer" utility being worked on for sound management as well
New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more
PCBSD 10.0.1 was released (http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/) too
***
Feedback/Questions
Alex writes in (http://slexy.org/view/s2QwjHkL2n)
Ben writes in (http://slexy.org/view/s2wLGlHF15)
Nick writes in (http://slexy.org/view/s21JsgRjMU)
Sami writes in (http://slexy.org/view/s2UX4sYdHy)
Christopher writes in (http://slexy.org/view/s26z60Qd6z)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, encryption, pefs, fde, disk, asiabsdcon, 2014, asiabsdcon2014, presentation, talk, video, recording, openssh, certificate, authentication, dpb, two factor, 2fa, yubikey</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week we&#39;ll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we&#39;ll give you a step by step guide on how to actually use it. There&#39;s also the usual round of your questions and we&#39;ve got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" rel="nofollow">Using OpenSSH Certificate Authentication</a></h3>

<ul>
<li>SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you&#39;re using</li>
<li>They&#39;re not really that complex, there just isn&#39;t a lot of documentation on how to use them - this post tries to solve that</li>
<li>There&#39;s the benefit of not needing a known_hosts file or authorized_users file anymore</li>
<li>The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***</li>
</ul>

<h3><a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" rel="nofollow">Back to FreeBSD, a new series</a></h3>

<ul>
<li>Similar to the &quot;FreeBSD Challenge&quot; blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey</li>
<li>&quot;So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10&quot;</li>
<li>He&#39;s starting off with PCBSD since it&#39;s easy to get working with dual graphics</li>
<li>Should be a fun series to follow!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140307130554" rel="nofollow">OpenBSD&#39;s recent experiments in package building</a></h3>

<ul>
<li>If you&#39;ll remember back to our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a>, it lets you build FreeBSD binary packages in bulk - OpenBSD&#39;s version is called <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a></li>
<li>Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware</li>
<li>This article goes through some of his findings and plans for future versions that increase performance</li>
<li>We&#39;ll be showing a tutorial of dpb on the show in a few weeks
***</li>
</ul>

<h3><a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" rel="nofollow">Securing FreeBSD with 2FA</a></h3>

<ul>
<li>So maybe you&#39;ve set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?</li>
<li>This post walks us through the process of locking down an <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">ssh server</a> with 2FA</li>
<li>With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***</li>
</ul>

<h2>Interview - Gleb Kurtsou - <a href="mailto:gleb.kurtsou@gmail.com" rel="nofollow">gleb.kurtsou@gmail.com</a></h2>

<p>PEFS (security audit results <a href="https://defuse.ca/audits/pefs.htm" rel="nofollow">here</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pefs" rel="nofollow">Filesystem-based encryption with PEFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.bsdcan.org/2014/registration.php" rel="nofollow">BSDCan 2014 registration</a></h3>

<ul>
<li>Registration is finally open!</li>
<li>The prices are available along with a full list of presentations</li>
<li>Tutorial sessions for various topics as well</li>
<li>You have to go
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140314080734" rel="nofollow">Big changes for OpenBSD 5.6</a></h3>

<ul>
<li>Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising</li>
<li>OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3</li>
<li>They&#39;ve also imported nginx into base a few years ago, but now have finally removed Apache</li>
<li>Sendmail is also no longer the default MTA, OpenSMTPD <a href="http://undeadly.org/cgi?action=article&sid=20140313052817" rel="nofollow">is the new default</a></li>
<li>Will BIND be removed next? <a href="http://marc.info/?l=openbsd-cvs&m=139492163427518&w=2" rel="nofollow">Maybe so</a></li>
<li>They&#39;ve also discontinued the hp300, mvme68k and mvme88k ports
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The &quot;getting to know your portmgr&quot; series makes its return</li>
<li>This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)</li>
<li>How he got into FreeBSD? He &quot;wanted a unix system that I could understand and that would not get bloated as time goes by&quot;</li>
<li>Mentions why he&#39;s still heavily involved with the project and lots more
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Work has started to port Pulseaudio to PCBSD 10.0.1</li>
<li>There&#39;s a new &quot;pc-mixer&quot; utility being worked on for sound management as well</li>
<li>New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more</li>
<li>PCBSD 10.0.1 <a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" rel="nofollow">was released</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2QwjHkL2n" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s2wLGlHF15" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21JsgRjMU" rel="nofollow">Nick writes in</a></li>
<li><a href="http://slexy.org/view/s2UX4sYdHy" rel="nofollow">Sami writes in</a></li>
<li><a href="http://slexy.org/view/s26z60Qd6z" rel="nofollow">Christopher writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week we&#39;ll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we&#39;ll give you a step by step guide on how to actually use it. There&#39;s also the usual round of your questions and we&#39;ve got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" rel="nofollow">Using OpenSSH Certificate Authentication</a></h3>

<ul>
<li>SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you&#39;re using</li>
<li>They&#39;re not really that complex, there just isn&#39;t a lot of documentation on how to use them - this post tries to solve that</li>
<li>There&#39;s the benefit of not needing a known_hosts file or authorized_users file anymore</li>
<li>The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***</li>
</ul>

<h3><a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" rel="nofollow">Back to FreeBSD, a new series</a></h3>

<ul>
<li>Similar to the &quot;FreeBSD Challenge&quot; blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey</li>
<li>&quot;So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10&quot;</li>
<li>He&#39;s starting off with PCBSD since it&#39;s easy to get working with dual graphics</li>
<li>Should be a fun series to follow!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140307130554" rel="nofollow">OpenBSD&#39;s recent experiments in package building</a></h3>

<ul>
<li>If you&#39;ll remember back to our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a>, it lets you build FreeBSD binary packages in bulk - OpenBSD&#39;s version is called <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a></li>
<li>Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware</li>
<li>This article goes through some of his findings and plans for future versions that increase performance</li>
<li>We&#39;ll be showing a tutorial of dpb on the show in a few weeks
***</li>
</ul>

<h3><a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" rel="nofollow">Securing FreeBSD with 2FA</a></h3>

<ul>
<li>So maybe you&#39;ve set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?</li>
<li>This post walks us through the process of locking down an <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">ssh server</a> with 2FA</li>
<li>With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***</li>
</ul>

<h2>Interview - Gleb Kurtsou - <a href="mailto:gleb.kurtsou@gmail.com" rel="nofollow">gleb.kurtsou@gmail.com</a></h2>

<p>PEFS (security audit results <a href="https://defuse.ca/audits/pefs.htm" rel="nofollow">here</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pefs" rel="nofollow">Filesystem-based encryption with PEFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.bsdcan.org/2014/registration.php" rel="nofollow">BSDCan 2014 registration</a></h3>

<ul>
<li>Registration is finally open!</li>
<li>The prices are available along with a full list of presentations</li>
<li>Tutorial sessions for various topics as well</li>
<li>You have to go
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140314080734" rel="nofollow">Big changes for OpenBSD 5.6</a></h3>

<ul>
<li>Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising</li>
<li>OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3</li>
<li>They&#39;ve also imported nginx into base a few years ago, but now have finally removed Apache</li>
<li>Sendmail is also no longer the default MTA, OpenSMTPD <a href="http://undeadly.org/cgi?action=article&sid=20140313052817" rel="nofollow">is the new default</a></li>
<li>Will BIND be removed next? <a href="http://marc.info/?l=openbsd-cvs&m=139492163427518&w=2" rel="nofollow">Maybe so</a></li>
<li>They&#39;ve also discontinued the hp300, mvme68k and mvme88k ports
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The &quot;getting to know your portmgr&quot; series makes its return</li>
<li>This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)</li>
<li>How he got into FreeBSD? He &quot;wanted a unix system that I could understand and that would not get bloated as time goes by&quot;</li>
<li>Mentions why he&#39;s still heavily involved with the project and lots more
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Work has started to port Pulseaudio to PCBSD 10.0.1</li>
<li>There&#39;s a new &quot;pc-mixer&quot; utility being worked on for sound management as well</li>
<li>New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more</li>
<li>PCBSD 10.0.1 <a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" rel="nofollow">was released</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2QwjHkL2n" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s2wLGlHF15" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21JsgRjMU" rel="nofollow">Nick writes in</a></li>
<li><a href="http://slexy.org/view/s2UX4sYdHy" rel="nofollow">Sami writes in</a></li>
<li><a href="http://slexy.org/view/s26z60Qd6z" rel="nofollow">Christopher writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
