<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 17 May 2026 07:30:35 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Ed”</title>
    <link>https://www.bsdnow.tv/tags/ed</link>
    <pubDate>Fri, 03 May 2019 13:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>296: It’s Alive: OpenBSD 6.5</title>
  <link>https://www.bsdnow.tv/296</link>
  <guid isPermaLink="false">81313d3c-40f8-49f3-bc58-f34f5dfcf51d</guid>
  <pubDate>Fri, 03 May 2019 13:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/81313d3c-40f8-49f3-bc58-f34f5dfcf51d.mp3" length="37476669" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenBSD 6.5 has been released, mount ZFS datasets anywhere, help test upcoming NetBSD 9 branch, LibreSSL 2.9.1 is available, Bail Bond Denied Edition of FreeBSD Mastery: Jails, and one reason ed(1) was a good editor back in the days in this week’s episode.</itunes:subtitle>
  <itunes:duration>1:01:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;OpenBSD 6.5 has been released, mount ZFS datasets anywhere, help test upcoming NetBSD 9 branch, LibreSSL 2.9.1 is available, Bail Bond Denied Edition of FreeBSD Mastery: Jails, and one reason ed(1) was a good editor back in the days in this week’s episode.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.openbsd.org/65.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.5 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/plus65.html" target="_blank" rel="nofollow noopener"&gt;Changelog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.openbsd.org/ftp.html" target="_blank" rel="nofollow noopener"&gt;Mirrors&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;6.5 Includes


&lt;ul&gt;
&lt;li&gt;OpenSMTPD 6.5.0&lt;/li&gt;

&lt;li&gt;LibreSSL 2.9.1&lt;/li&gt;

&lt;li&gt;OpenSSH 8.0&lt;/li&gt;

&lt;li&gt;Mandoc 1.14.5&lt;/li&gt;

&lt;li&gt;Xenocara&lt;/li&gt;

&lt;li&gt;LLVM/Clang 7.0.1 (+ patches)&lt;/li&gt;

&lt;li&gt;GCC 4.2.1 (+ patches) and 3.3.6 (+ patches)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;Many pre-built packages for each architecture:

&lt;ul&gt;
&lt;li&gt;aarch64: 9654&lt;/li&gt;

&lt;li&gt;amd64: 10602&lt;/li&gt;

&lt;li&gt;i386: 10535&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dan.langille.org/2019/04/22/mount-your-zfs-datasets-anywhere-you-want/" target="_blank" rel="nofollow noopener"&gt;Mount your ZFS datasets anywhere you want&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;ZFS is very flexible about mountpoints, and there are many features available to provide great flexibility.
  When you create zpool main&lt;em&gt;tank, the default mountpoint is /main&lt;/em&gt;tank.
  You might be happy with that, but you don’t have to be content. You can do magical things.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Some highlights are:


&lt;ul&gt;
&lt;li&gt;mount point can be inherited&lt;/li&gt;

&lt;li&gt;not all filesystems in a zpool need to be mounted&lt;/li&gt;

&lt;li&gt;each filesystem (directory) can have different ZFS characteristics&lt;/li&gt;

&lt;li&gt;In my case, let’s look at this new zpool I created earlier today and I will show you some very simple alternatives. This zpool use NVMe devices which should be faster than SSDs especially when used with multiple concurrent writes. This is my plan: run all the Bacula regression tests concurrently.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/current-users/2019/04/24/msg035645.html" target="_blank" rel="nofollow noopener"&gt;Branch for netbsd 9 upcoming, please help and test -current&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Folks,
  once again we are quite late for branching the next NetBSD release (NetBSD 9).
  Initially planned to happen early in February 2019, we are now approaching May and it is unlikely that the branch will happen before that.
  On the positive side, lots of good things landed in -current in between, like new Mesa, new jemalloc, lots of ZFS improvements - and some of those would be hard to pull up to the branch later.
  On the bad side we saw lots of churn in -current recently, and there is quite  some fallout where we not even have a good overview right now. And this is where  you can help:&lt;/p&gt;
  
  &lt;ul&gt;
  &lt;li&gt;please test -current, on all the various machines you have&lt;/li&gt;
  
  &lt;li&gt;especially interesting would be test results from uncommon architectures
  or strange combinations (like the sparc userland on sparc64 kernel issue
  I ran in yesterday)
  Please test, report success, and file PRs for failures!
  We will likely announce the real branch date on quite short notice, the likely next candidates would be mid may or end of may.
  We may need to do extra steps after the branch (like switch some architectures back to old jemalloc on the branch). However, the less difference between -current and the branch, the easier will the release cycle go.
  Our goal is to have an unprecedented short release cycle this time. But..
  we always say that upfront.&lt;/li&gt;
  &lt;/ul&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://marc.info/?l=openbsd-announce&amp;amp;m=155590112606279&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;LibreSSL 2.9.1 Released&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;We have released LibreSSL 2.9.1, which will be arriving in the LibreSSL
  directory of your local OpenBSD mirror soon. This is the first stable release
  from the 2.9 series, which is also included with OpenBSD 6.5&lt;/p&gt;
  
  &lt;p&gt;It includes the following changes and improvements from LibreSSL 2.8.x:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;API and Documentation Enhancements&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CRYPTO_LOCK is now automatically initialized, with the legacy
callbacks stubbed for compatibility.&lt;/li&gt;

&lt;li&gt;Added the SM3 hash function from the Chinese standard GB/T 32905-2016.&lt;/li&gt;

&lt;li&gt;Added the SM4 block cipher from the Chinese standard GB/T 32907-2016.&lt;/li&gt;

&lt;li&gt;Added more OPENSSL&lt;em&gt;NO&lt;/em&gt;* macros for compatibility with OpenSSL.&lt;/li&gt;

&lt;li&gt;Partial port of the OpenSSL EC&lt;em&gt;KEY&lt;/em&gt;METHOD API for use by OpenSSH.&lt;/li&gt;

&lt;li&gt;Implemented further missing OpenSSL 1.1 API.&lt;/li&gt;

&lt;li&gt;Added support for XChaCha20 and XChaCha20-Poly1305.&lt;/li&gt;

&lt;li&gt;Added support for AES key wrap constructions via the EVP interface.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;

&lt;p&gt;Compatibility Changes&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added pbkdf2 key derivation support to openssl(1) enc.&lt;/li&gt;

&lt;li&gt;Changed the default digest type of openssl(1) enc to sha256.&lt;/li&gt;

&lt;li&gt;Changed the default digest type of openssl(1) dgst to sha256.&lt;/li&gt;

&lt;li&gt;Changed the default digest type of openssl(1) x509 -fingerprint to sha256.&lt;/li&gt;

&lt;li&gt;Changed the default digest type of openssl(1) crl -fingerprint to sha256.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;

&lt;p&gt;Testing and Proactive Security&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added extensive interoperability tests between LibreSSL and OpenSSL
1.0 and 1.1.&lt;/li&gt;

&lt;li&gt;Added additional Wycheproof tests and related bug fixes.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;

&lt;p&gt;Internal Improvements&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Simplified sigalgs option processing and handshake signing
algorithm selection.&lt;/li&gt;

&lt;li&gt;Added the ability to use the RSA PSS algorithm for handshake signatures.&lt;/li&gt;

&lt;li&gt;Added bn&lt;em&gt;rand&lt;/em&gt;interval() and use it in code needing ranges of
random bn values.&lt;/li&gt;

&lt;li&gt;Added functionality to derive early, handshake, and application
secrets as per RFC8446.&lt;/li&gt;

&lt;li&gt;Added handshake state machine from RFC8446.&lt;/li&gt;

&lt;li&gt;Removed some ASN.1 related code from libcrypto that had not been
used since around 2000.&lt;/li&gt;

&lt;li&gt;Unexported internal symbols and internalized more record layer structs.&lt;/li&gt;

&lt;li&gt;Removed SHA224 based handshake signatures from consideration for
use in a TLS 1.2 handshake.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;

&lt;p&gt;Portable Improvements&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added support for assembly optimizations on 32-bit ARM ELF targets.&lt;/li&gt;

&lt;li&gt;Added support for assembly optimizations on Mingw-w64 targets.&lt;/li&gt;

&lt;li&gt;Improved Android compatibility&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;

&lt;p&gt;Bug Fixes&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Improved protection against timing side channels in ECDSA signature
generation.&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;Coordinate blinding was added to some elliptic curves. This is the
last bit of the work by Brumley et al. to protect against the Portsmash
vulnerability.&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;Ensure transcript handshake is always freed with TLS 1.2.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The LibreSSL project continues improvement of the codebase to reflect modern,
  safe programming practices. We welcome feedback and improvements from the
  broader community. Thanks to all of the contributors who helped make this
  release possible.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://mwl.io/archives/4227" target="_blank" rel="nofollow noopener"&gt;FreeBSD Mastery: Jails – Bail Bond Denied Edition&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;I had a brilliant, hideous idea: to produce a charity edition of FreeBSD Mastery: Jails featuring the cover art I would use if I was imprisoned and did not have access to a real cover artist. (Never mind that I wouldn’t be permitted to release books while in jail: we creative sorts scoff at mere legal and cultural details.)
  I originally wanted to produce my own take on the book’s cover art. My first attempt failed spectacularly.
  I downgraded my expectations and tried again. And again. And again.
  I’m pleased to reveal the final cover for FreeBSD Mastery: Jails–Bail Bond Edition!
  This cover represents the very pinnacle of my artistic talents, and is the result of literally hours of effort.
  But, as this book is available only to the winner of charity fund-raisers, purchase of this tome represents moral supremacy. I recommend flaunting it to your family, coworkers, and all those of lesser character.
  Get your copy by winning the BSDCan 2019 charity auction… or any other other auction-type event I deem worthwhile.
  As far as my moral fiber goes: I have learned that art is hard, and that artists are not paid enough.
  And if I am ever imprisoned, I do hope that you’ll contribute to my bail fund. Otherwise, you’ll get more covers like this one.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/~cks/space/blog/unix/EdDesignedForCookedInput" target="_blank" rel="nofollow noopener"&gt;One reason ed(1) was a good editor back in the days of V7 Unix&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;It is common to describe ed(1) as being line oriented, as opposed to screen oriented editors like vi. This is completely accurate but it is perhaps not a complete enough description for today, because ed is line oriented in a way that is now uncommon. After all, you could say that your shell is line oriented too, and very few people use shells that work and feel the same way ed does.
  The surface difference between most people's shells and ed is that most people's shells have some version of cursor based interactive editing. The deeper difference is that this requires the shell to run in character by character TTY input mode, also called raw mode. By contrast, ed runs in what Unix usually calls cooked mode, where it reads whole lines from the kernel and the kernel handles things like backspace. All of ed's commands are designed so that they work in this line focused way (including being terminated by the end of the line), and as a whole ed's interface makes this whole line input approach natural. In fact I think ed makes it so natural that it's hard to think of things as being any other way. Ed was designed for line at a time input, not just to not be screen oriented.
  This input mode difference is not very important today, but in the days of V7 and serial terminals it made a real difference. In cooked mode, V7 ran very little code when you entered each character; almost everything was deferred until it could be processed in bulk by the kernel, and then handed to ed all in a single line which ed could also process all at once. A version of ed that tried to work in raw mode would have been much more resource intensive, even if it still operated on single lines at a time.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-fs/2019-April/027603.html" target="_blank" rel="nofollow noopener"&gt;CFT for FreeBSD ZoL&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://github.com/wilyarti/simple-dns-adblock" target="_blank" rel="nofollow noopener"&gt;Simple DNS Adblock&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://twitter.com/unix_byte/status/1119904828182781958" target="_blank" rel="nofollow noopener"&gt;AT&amp;amp;T Unix PC in 1985&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=155523690813457&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD-current drm at 4.19, includes new support for Intel GPUs like Coffee Lake&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://twitter.com/cfenollosa/status/1122069042083323904" target="_blank" rel="nofollow noopener"&gt;"What are the differences between Linux and OpenBSD?" - Twitter thread&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="http://mail-index.netbsd.org/pkgsrc-users/2019/04/10/msg028308.html" target="_blank" rel="nofollow noopener"&gt;Announcing the pkgsrc-2019Q1 release (2019-04-10)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Brad - &lt;a href="http://dpaste.com/0K2QFTM#wrap" target="_blank" rel="nofollow noopener"&gt;iocage&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Frank - &lt;a href="http://dpaste.com/3110R96#wrap" target="_blank" rel="nofollow noopener"&gt;Video from Level1Tech and a question&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Niall - &lt;a href="http://dpaste.com/0A32XDK#wrap" target="_blank" rel="nofollow noopener"&gt;Revision Control&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0296.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, zfs, libressl, ed, michael lucas, dns, pkgsrc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenBSD 6.5 has been released, mount ZFS datasets anywhere, help test upcoming NetBSD 9 branch, LibreSSL 2.9.1 is available, Bail Bond Denied Edition of FreeBSD Mastery: Jails, and one reason ed(1) was a good editor back in the days in this week’s episode.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="openbsd65releasedhttpswwwopenbsdorg65html"><a href="https://www.openbsd.org/65.html">OpenBSD 6.5 Released</a></h3>

<ul>
<li><a href="https://www.openbsd.org/plus65.html">Changelog</a></li>

<li><a href="https://www.openbsd.org/ftp.html">Mirrors</a></li>

<li>6.5 Includes


<ul>
<li>OpenSMTPD 6.5.0</li>

<li>LibreSSL 2.9.1</li>

<li>OpenSSH 8.0</li>

<li>Mandoc 1.14.5</li>

<li>Xenocara</li>

<li>LLVM/Clang 7.0.1 (+ patches)</li>

<li>GCC 4.2.1 (+ patches) and 3.3.6 (+ patches)</li></ul>
</li>

<li>Many pre-built packages for each architecture:


<ul>
<li>aarch64: 9654</li>

<li>amd64: 10602</li>

<li>i386: 10535</li></ul>
</li>
</ul>

<p><hr /></p>

<h3 id="mountyourzfsdatasetsanywhereyouwanthttpsdanlangilleorg20190422mountyourzfsdatasetsanywhereyouwant"><a href="https://dan.langille.org/2019/04/22/mount-your-zfs-datasets-anywhere-you-want/">Mount your ZFS datasets anywhere you want</a></h3>

<blockquote>
  <p>ZFS is very flexible about mountpoints, and there are many features available to provide great flexibility.
  When you create zpool main<em>tank, the default mountpoint is /main</em>tank.
  You might be happy with that, but you don’t have to be content. You can do magical things.</p>
</blockquote>

<ul>
<li>Some highlights are:


<ul>
<li>mount point can be inherited</li>

<li>not all filesystems in a zpool need to be mounted</li>

<li>each filesystem (directory) can have different ZFS characteristics</li>

<li>In my case, let’s look at this new zpool I created earlier today and I will show you some very simple alternatives. This zpool use NVMe devices which should be faster than SSDs especially when used with multiple concurrent writes. This is my plan: run all the Bacula regression tests concurrently.</li></ul>
</li>
</ul>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="branchfornetbsd9upcomingpleasehelpandtestcurrenthttpsmailindexnetbsdorgcurrentusers20190424msg035645html"><a href="https://mail-index.netbsd.org/current-users/2019/04/24/msg035645.html">Branch for netbsd 9 upcoming, please help and test -current</a></h3>

<blockquote>
  <p>Folks,
  once again we are quite late for branching the next NetBSD release (NetBSD 9).
  Initially planned to happen early in February 2019, we are now approaching May and it is unlikely that the branch will happen before that.
  On the positive side, lots of good things landed in -current in between, like new Mesa, new jemalloc, lots of ZFS improvements - and some of those would be hard to pull up to the branch later.
  On the bad side we saw lots of churn in -current recently, and there is quite  some fallout where we not even have a good overview right now. And this is where  you can help:</p>
  
  <ul>
  <li>please test -current, on all the various machines you have</li>
  
  <li>especially interesting would be test results from uncommon architectures
  or strange combinations (like the sparc userland on sparc64 kernel issue
  I ran in yesterday)
  Please test, report success, and file PRs for failures!
  We will likely announce the real branch date on quite short notice, the likely next candidates would be mid may or end of may.
  We may need to do extra steps after the branch (like switch some architectures back to old jemalloc on the branch). However, the less difference between -current and the branch, the easier will the release cycle go.
  Our goal is to have an unprecedented short release cycle this time. But..
  we always say that upfront.</li>
  </ul>
  
  <hr />
</blockquote>

<h3 id="libressl291releasedhttpsmarcinfolopenbsdannouncem155590112606279w2"><a href="https://marc.info/?l=openbsd-announce&amp;m=155590112606279&amp;w=2">LibreSSL 2.9.1 Released</a></h3>

<blockquote>
  <p>We have released LibreSSL 2.9.1, which will be arriving in the LibreSSL
  directory of your local OpenBSD mirror soon. This is the first stable release
  from the 2.9 series, which is also included with OpenBSD 6.5</p>
  
  <p>It includes the following changes and improvements from LibreSSL 2.8.x:</p>
</blockquote>

<ul>
<li><p>API and Documentation Enhancements</p>

<ul>
<li>CRYPTO_LOCK is now automatically initialized, with the legacy
callbacks stubbed for compatibility.</li>

<li>Added the SM3 hash function from the Chinese standard GB/T 32905-2016.</li>

<li>Added the SM4 block cipher from the Chinese standard GB/T 32907-2016.</li>

<li>Added more OPENSSL<em>NO</em>* macros for compatibility with OpenSSL.</li>

<li>Partial port of the OpenSSL EC<em>KEY</em>METHOD API for use by OpenSSH.</li>

<li>Implemented further missing OpenSSL 1.1 API.</li>

<li>Added support for XChaCha20 and XChaCha20-Poly1305.</li>

<li>Added support for AES key wrap constructions via the EVP interface.</li></ul></li>

<li><p>Compatibility Changes</p>

<ul>
<li>Added pbkdf2 key derivation support to openssl(1) enc.</li>

<li>Changed the default digest type of openssl(1) enc to sha256.</li>

<li>Changed the default digest type of openssl(1) dgst to sha256.</li>

<li>Changed the default digest type of openssl(1) x509 -fingerprint to sha256.</li>

<li>Changed the default digest type of openssl(1) crl -fingerprint to sha256.</li></ul></li>

<li><p>Testing and Proactive Security</p>

<ul>
<li>Added extensive interoperability tests between LibreSSL and OpenSSL
1.0 and 1.1.</li>

<li>Added additional Wycheproof tests and related bug fixes.</li></ul></li>

<li><p>Internal Improvements</p>

<ul>
<li>Simplified sigalgs option processing and handshake signing
algorithm selection.</li>

<li>Added the ability to use the RSA PSS algorithm for handshake signatures.</li>

<li>Added bn<em>rand</em>interval() and use it in code needing ranges of
random bn values.</li>

<li>Added functionality to derive early, handshake, and application
secrets as per RFC8446.</li>

<li>Added handshake state machine from RFC8446.</li>

<li>Removed some ASN.1 related code from libcrypto that had not been
used since around 2000.</li>

<li>Unexported internal symbols and internalized more record layer structs.</li>

<li>Removed SHA224 based handshake signatures from consideration for
use in a TLS 1.2 handshake.</li></ul></li>

<li><p>Portable Improvements</p>

<ul>
<li>Added support for assembly optimizations on 32-bit ARM ELF targets.</li>

<li>Added support for assembly optimizations on Mingw-w64 targets.</li>

<li>Improved Android compatibility</li></ul></li>

<li><p>Bug Fixes</p>

<p><ul>
<li>Improved protection against timing side channels in ECDSA signature
generation.</li></p>

<p><li>Coordinate blinding was added to some elliptic curves. This is the
last bit of the work by Brumley et al. to protect against the Portsmash
vulnerability.</li></p>

<p><li>Ensure transcript handshake is always freed with TLS 1.2.</li></ul>

<p></p></li>
</ul></p>

<blockquote>
  <p>The LibreSSL project continues improvement of the codebase to reflect modern,
  safe programming practices. We welcome feedback and improvements from the
  broader community. Thanks to all of the contributors who helped make this
  release possible.</p>
  
  <hr />
</blockquote>

<h3 id="freebsdmasteryjailsbailbonddeniededitionhttpsmwlioarchives4227"><a href="https://mwl.io/archives/4227">FreeBSD Mastery: Jails – Bail Bond Denied Edition</a></h3>

<blockquote>
  <p>I had a brilliant, hideous idea: to produce a charity edition of FreeBSD Mastery: Jails featuring the cover art I would use if I was imprisoned and did not have access to a real cover artist. (Never mind that I wouldn’t be permitted to release books while in jail: we creative sorts scoff at mere legal and cultural details.)
  I originally wanted to produce my own take on the book’s cover art. My first attempt failed spectacularly.
  I downgraded my expectations and tried again. And again. And again.
  I’m pleased to reveal the final cover for FreeBSD Mastery: Jails–Bail Bond Edition!
  This cover represents the very pinnacle of my artistic talents, and is the result of literally hours of effort.
  But, as this book is available only to the winner of charity fund-raisers, purchase of this tome represents moral supremacy. I recommend flaunting it to your family, coworkers, and all those of lesser character.
  Get your copy by winning the BSDCan 2019 charity auction… or any other other auction-type event I deem worthwhile.
  As far as my moral fiber goes: I have learned that art is hard, and that artists are not paid enough.
  And if I am ever imprisoned, I do hope that you’ll contribute to my bail fund. Otherwise, you’ll get more covers like this one.</p>
</blockquote>

<hr />

<h3 id="onereasoned1wasagoodeditorbackinthedaysofv7unixhttpsutccutorontocatcksspaceblogunixeddesignedforcookedinput"><a href="https://utcc.utoronto.ca/~cks/space/blog/unix/EdDesignedForCookedInput">One reason ed(1) was a good editor back in the days of V7 Unix</a></h3>

<blockquote>
  <p>It is common to describe ed(1) as being line oriented, as opposed to screen oriented editors like vi. This is completely accurate but it is perhaps not a complete enough description for today, because ed is line oriented in a way that is now uncommon. After all, you could say that your shell is line oriented too, and very few people use shells that work and feel the same way ed does.
  The surface difference between most people's shells and ed is that most people's shells have some version of cursor based interactive editing. The deeper difference is that this requires the shell to run in character by character TTY input mode, also called raw mode. By contrast, ed runs in what Unix usually calls cooked mode, where it reads whole lines from the kernel and the kernel handles things like backspace. All of ed's commands are designed so that they work in this line focused way (including being terminated by the end of the line), and as a whole ed's interface makes this whole line input approach natural. In fact I think ed makes it so natural that it's hard to think of things as being any other way. Ed was designed for line at a time input, not just to not be screen oriented.
  This input mode difference is not very important today, but in the days of V7 and serial terminals it made a real difference. In cooked mode, V7 ran very little code when you entered each character; almost everything was deferred until it could be processed in bulk by the kernel, and then handed to ed all in a single line which ed could also process all at once. A version of ed that tried to work in raw mode would have been much more resource intensive, even if it still operated on single lines at a time.</p>
</blockquote>

<hr />

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-fs/2019-April/027603.html">CFT for FreeBSD ZoL</a></li>

<li><a href="https://github.com/wilyarti/simple-dns-adblock">Simple DNS Adblock</a></li>

<li><a href="https://twitter.com/unix_byte/status/1119904828182781958">AT&amp;T Unix PC in 1985</a></li>

<li><a href="https://marc.info/?l=openbsd-cvs&amp;m=155523690813457&amp;w=2">OpenBSD-current drm at 4.19, includes new support for Intel GPUs like Coffee Lake</a></li>

<li><a href="https://twitter.com/cfenollosa/status/1122069042083323904">"What are the differences between Linux and OpenBSD?" - Twitter thread</a></li>

<li><a href="http://mail-index.netbsd.org/pkgsrc-users/2019/04/10/msg028308.html">Announcing the pkgsrc-2019Q1 release (2019-04-10)</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Brad - <a href="http://dpaste.com/0K2QFTM#wrap">iocage</a></li>

<li>Frank - <a href="http://dpaste.com/3110R96#wrap">Video from Level1Tech and a question</a></li>

<li>Niall - <a href="http://dpaste.com/0A32XDK#wrap">Revision Control</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0296.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenBSD 6.5 has been released, mount ZFS datasets anywhere, help test upcoming NetBSD 9 branch, LibreSSL 2.9.1 is available, Bail Bond Denied Edition of FreeBSD Mastery: Jails, and one reason ed(1) was a good editor back in the days in this week’s episode.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="openbsd65releasedhttpswwwopenbsdorg65html"><a href="https://www.openbsd.org/65.html">OpenBSD 6.5 Released</a></h3>

<ul>
<li><a href="https://www.openbsd.org/plus65.html">Changelog</a></li>

<li><a href="https://www.openbsd.org/ftp.html">Mirrors</a></li>

<li>6.5 Includes


<ul>
<li>OpenSMTPD 6.5.0</li>

<li>LibreSSL 2.9.1</li>

<li>OpenSSH 8.0</li>

<li>Mandoc 1.14.5</li>

<li>Xenocara</li>

<li>LLVM/Clang 7.0.1 (+ patches)</li>

<li>GCC 4.2.1 (+ patches) and 3.3.6 (+ patches)</li></ul>
</li>

<li>Many pre-built packages for each architecture:


<ul>
<li>aarch64: 9654</li>

<li>amd64: 10602</li>

<li>i386: 10535</li></ul>
</li>
</ul>

<p><hr /></p>

<h3 id="mountyourzfsdatasetsanywhereyouwanthttpsdanlangilleorg20190422mountyourzfsdatasetsanywhereyouwant"><a href="https://dan.langille.org/2019/04/22/mount-your-zfs-datasets-anywhere-you-want/">Mount your ZFS datasets anywhere you want</a></h3>

<blockquote>
  <p>ZFS is very flexible about mountpoints, and there are many features available to provide great flexibility.
  When you create zpool main<em>tank, the default mountpoint is /main</em>tank.
  You might be happy with that, but you don’t have to be content. You can do magical things.</p>
</blockquote>

<ul>
<li>Some highlights are:


<ul>
<li>mount point can be inherited</li>

<li>not all filesystems in a zpool need to be mounted</li>

<li>each filesystem (directory) can have different ZFS characteristics</li>

<li>In my case, let’s look at this new zpool I created earlier today and I will show you some very simple alternatives. This zpool use NVMe devices which should be faster than SSDs especially when used with multiple concurrent writes. This is my plan: run all the Bacula regression tests concurrently.</li></ul>
</li>
</ul>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="branchfornetbsd9upcomingpleasehelpandtestcurrenthttpsmailindexnetbsdorgcurrentusers20190424msg035645html"><a href="https://mail-index.netbsd.org/current-users/2019/04/24/msg035645.html">Branch for netbsd 9 upcoming, please help and test -current</a></h3>

<blockquote>
  <p>Folks,
  once again we are quite late for branching the next NetBSD release (NetBSD 9).
  Initially planned to happen early in February 2019, we are now approaching May and it is unlikely that the branch will happen before that.
  On the positive side, lots of good things landed in -current in between, like new Mesa, new jemalloc, lots of ZFS improvements - and some of those would be hard to pull up to the branch later.
  On the bad side we saw lots of churn in -current recently, and there is quite  some fallout where we not even have a good overview right now. And this is where  you can help:</p>
  
  <ul>
  <li>please test -current, on all the various machines you have</li>
  
  <li>especially interesting would be test results from uncommon architectures
  or strange combinations (like the sparc userland on sparc64 kernel issue
  I ran in yesterday)
  Please test, report success, and file PRs for failures!
  We will likely announce the real branch date on quite short notice, the likely next candidates would be mid may or end of may.
  We may need to do extra steps after the branch (like switch some architectures back to old jemalloc on the branch). However, the less difference between -current and the branch, the easier will the release cycle go.
  Our goal is to have an unprecedented short release cycle this time. But..
  we always say that upfront.</li>
  </ul>
  
  <hr />
</blockquote>

<h3 id="libressl291releasedhttpsmarcinfolopenbsdannouncem155590112606279w2"><a href="https://marc.info/?l=openbsd-announce&amp;m=155590112606279&amp;w=2">LibreSSL 2.9.1 Released</a></h3>

<blockquote>
  <p>We have released LibreSSL 2.9.1, which will be arriving in the LibreSSL
  directory of your local OpenBSD mirror soon. This is the first stable release
  from the 2.9 series, which is also included with OpenBSD 6.5</p>
  
  <p>It includes the following changes and improvements from LibreSSL 2.8.x:</p>
</blockquote>

<ul>
<li><p>API and Documentation Enhancements</p>

<ul>
<li>CRYPTO_LOCK is now automatically initialized, with the legacy
callbacks stubbed for compatibility.</li>

<li>Added the SM3 hash function from the Chinese standard GB/T 32905-2016.</li>

<li>Added the SM4 block cipher from the Chinese standard GB/T 32907-2016.</li>

<li>Added more OPENSSL<em>NO</em>* macros for compatibility with OpenSSL.</li>

<li>Partial port of the OpenSSL EC<em>KEY</em>METHOD API for use by OpenSSH.</li>

<li>Implemented further missing OpenSSL 1.1 API.</li>

<li>Added support for XChaCha20 and XChaCha20-Poly1305.</li>

<li>Added support for AES key wrap constructions via the EVP interface.</li></ul></li>

<li><p>Compatibility Changes</p>

<ul>
<li>Added pbkdf2 key derivation support to openssl(1) enc.</li>

<li>Changed the default digest type of openssl(1) enc to sha256.</li>

<li>Changed the default digest type of openssl(1) dgst to sha256.</li>

<li>Changed the default digest type of openssl(1) x509 -fingerprint to sha256.</li>

<li>Changed the default digest type of openssl(1) crl -fingerprint to sha256.</li></ul></li>

<li><p>Testing and Proactive Security</p>

<ul>
<li>Added extensive interoperability tests between LibreSSL and OpenSSL
1.0 and 1.1.</li>

<li>Added additional Wycheproof tests and related bug fixes.</li></ul></li>

<li><p>Internal Improvements</p>

<ul>
<li>Simplified sigalgs option processing and handshake signing
algorithm selection.</li>

<li>Added the ability to use the RSA PSS algorithm for handshake signatures.</li>

<li>Added bn<em>rand</em>interval() and use it in code needing ranges of
random bn values.</li>

<li>Added functionality to derive early, handshake, and application
secrets as per RFC8446.</li>

<li>Added handshake state machine from RFC8446.</li>

<li>Removed some ASN.1 related code from libcrypto that had not been
used since around 2000.</li>

<li>Unexported internal symbols and internalized more record layer structs.</li>

<li>Removed SHA224 based handshake signatures from consideration for
use in a TLS 1.2 handshake.</li></ul></li>

<li><p>Portable Improvements</p>

<ul>
<li>Added support for assembly optimizations on 32-bit ARM ELF targets.</li>

<li>Added support for assembly optimizations on Mingw-w64 targets.</li>

<li>Improved Android compatibility</li></ul></li>

<li><p>Bug Fixes</p>

<p><ul>
<li>Improved protection against timing side channels in ECDSA signature
generation.</li></p>

<p><li>Coordinate blinding was added to some elliptic curves. This is the
last bit of the work by Brumley et al. to protect against the Portsmash
vulnerability.</li></p>

<p><li>Ensure transcript handshake is always freed with TLS 1.2.</li></ul>

<p></p></li>
</ul></p>

<blockquote>
  <p>The LibreSSL project continues improvement of the codebase to reflect modern,
  safe programming practices. We welcome feedback and improvements from the
  broader community. Thanks to all of the contributors who helped make this
  release possible.</p>
  
  <hr />
</blockquote>

<h3 id="freebsdmasteryjailsbailbonddeniededitionhttpsmwlioarchives4227"><a href="https://mwl.io/archives/4227">FreeBSD Mastery: Jails – Bail Bond Denied Edition</a></h3>

<blockquote>
  <p>I had a brilliant, hideous idea: to produce a charity edition of FreeBSD Mastery: Jails featuring the cover art I would use if I was imprisoned and did not have access to a real cover artist. (Never mind that I wouldn’t be permitted to release books while in jail: we creative sorts scoff at mere legal and cultural details.)
  I originally wanted to produce my own take on the book’s cover art. My first attempt failed spectacularly.
  I downgraded my expectations and tried again. And again. And again.
  I’m pleased to reveal the final cover for FreeBSD Mastery: Jails–Bail Bond Edition!
  This cover represents the very pinnacle of my artistic talents, and is the result of literally hours of effort.
  But, as this book is available only to the winner of charity fund-raisers, purchase of this tome represents moral supremacy. I recommend flaunting it to your family, coworkers, and all those of lesser character.
  Get your copy by winning the BSDCan 2019 charity auction… or any other other auction-type event I deem worthwhile.
  As far as my moral fiber goes: I have learned that art is hard, and that artists are not paid enough.
  And if I am ever imprisoned, I do hope that you’ll contribute to my bail fund. Otherwise, you’ll get more covers like this one.</p>
</blockquote>

<hr />

<h3 id="onereasoned1wasagoodeditorbackinthedaysofv7unixhttpsutccutorontocatcksspaceblogunixeddesignedforcookedinput"><a href="https://utcc.utoronto.ca/~cks/space/blog/unix/EdDesignedForCookedInput">One reason ed(1) was a good editor back in the days of V7 Unix</a></h3>

<blockquote>
  <p>It is common to describe ed(1) as being line oriented, as opposed to screen oriented editors like vi. This is completely accurate but it is perhaps not a complete enough description for today, because ed is line oriented in a way that is now uncommon. After all, you could say that your shell is line oriented too, and very few people use shells that work and feel the same way ed does.
  The surface difference between most people's shells and ed is that most people's shells have some version of cursor based interactive editing. The deeper difference is that this requires the shell to run in character by character TTY input mode, also called raw mode. By contrast, ed runs in what Unix usually calls cooked mode, where it reads whole lines from the kernel and the kernel handles things like backspace. All of ed's commands are designed so that they work in this line focused way (including being terminated by the end of the line), and as a whole ed's interface makes this whole line input approach natural. In fact I think ed makes it so natural that it's hard to think of things as being any other way. Ed was designed for line at a time input, not just to not be screen oriented.
  This input mode difference is not very important today, but in the days of V7 and serial terminals it made a real difference. In cooked mode, V7 ran very little code when you entered each character; almost everything was deferred until it could be processed in bulk by the kernel, and then handed to ed all in a single line which ed could also process all at once. A version of ed that tried to work in raw mode would have been much more resource intensive, even if it still operated on single lines at a time.</p>
</blockquote>

<hr />

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-fs/2019-April/027603.html">CFT for FreeBSD ZoL</a></li>

<li><a href="https://github.com/wilyarti/simple-dns-adblock">Simple DNS Adblock</a></li>

<li><a href="https://twitter.com/unix_byte/status/1119904828182781958">AT&amp;T Unix PC in 1985</a></li>

<li><a href="https://marc.info/?l=openbsd-cvs&amp;m=155523690813457&amp;w=2">OpenBSD-current drm at 4.19, includes new support for Intel GPUs like Coffee Lake</a></li>

<li><a href="https://twitter.com/cfenollosa/status/1122069042083323904">"What are the differences between Linux and OpenBSD?" - Twitter thread</a></li>

<li><a href="http://mail-index.netbsd.org/pkgsrc-users/2019/04/10/msg028308.html">Announcing the pkgsrc-2019Q1 release (2019-04-10)</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Brad - <a href="http://dpaste.com/0K2QFTM#wrap">iocage</a></li>

<li>Frank - <a href="http://dpaste.com/3110R96#wrap">Video from Level1Tech and a question</a></li>

<li>Niall - <a href="http://dpaste.com/0A32XDK#wrap">Revision Control</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0296.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 247: Interning for FreeBSD | BSD Now 247</title>
  <link>https://www.bsdnow.tv/247</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-1994</guid>
  <pubDate>Thu, 24 May 2018 15:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/31bf045b-2e53-459e-a40e-993a51ceccdb.mp3" length="54062460" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.</itunes:subtitle>
  <itunes:duration>1:29:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/blog/guest-blog-what-i-learned-during-my-freebsd-internship/" target="_blank" rel="nofollow noopener"&gt;What I learned during my FreeBSD intership&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development.&lt;/p&gt;
  
  &lt;p&gt;I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;What I Liked&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software.&lt;/p&gt;
  
  &lt;p&gt;It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;What I Learned&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader.&lt;/p&gt;
  
  &lt;p&gt;The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to.&lt;/p&gt;
  
  &lt;p&gt;I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this.&lt;/p&gt;
  
  &lt;p&gt;I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others.&lt;/p&gt;
  
  &lt;p&gt;I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them.&lt;/p&gt;
  
  &lt;p&gt;It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects.&lt;/p&gt;
  
  &lt;p&gt;As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Closing Thoughts&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further.&lt;/p&gt;
  
  &lt;p&gt;I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;Recent Developments in FreeBSD&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=333890" target="_blank" rel="nofollow noopener"&gt;Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=333649" target="_blank" rel="nofollow noopener"&gt;Intel Microcode Splitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=334005" target="_blank" rel="nofollow noopener"&gt;Intel Spec Store Bypass Disable control&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=333713" target="_blank" rel="nofollow noopener"&gt;Raspberry Pi 3B+ Ethernet Driver&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D15522" target="_blank" rel="nofollow noopener"&gt;IBRS for i386&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Upcoming:&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D15523" target="_blank" rel="nofollow noopener"&gt;Microcode updater for AMD CPUs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D15525" target="_blank" rel="nofollow noopener"&gt;the RACK TCP/IP stack, from Netflix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Voting in the FreeBSD Core Election begins today:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;DigitalOcean&lt;/strong&gt;
&lt;a href="http://do.co/bsdnow" target="_blank" rel="nofollow noopener"&gt;Digital Ocean Promo Link for BSD Now Listeners&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.shlomimarco.com/blog/running-freenas-on-a-digitalocean-droplet" target="_blank" rel="nofollow noopener"&gt;Running FreeNAS on a DigitalOcean Droplet&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it&lt;/li&gt;
&lt;li&gt;The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS&lt;/li&gt;
&lt;li&gt;Create a droplet, and add a small secondary block-storage device&lt;/li&gt;
&lt;li&gt;Boot the droplet, login, and download FreeNAS&lt;/li&gt;
&lt;li&gt;Disable swap, enable ‘foot shooting’ mode in GEOM&lt;/li&gt;
&lt;li&gt;use dd to write the FreeNAS installer to the boot disk&lt;/li&gt;
&lt;li&gt;Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device&lt;/li&gt;
&lt;li&gt;Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer&lt;/li&gt;
&lt;li&gt;Boot, and dd FreeNAS from the secondary block storage device back to the boot disk&lt;/li&gt;
&lt;li&gt;You can now destroy the secondary block device&lt;/li&gt;
&lt;li&gt;Now you have a FreeNAS, and can take it from there.&lt;/li&gt;
&lt;li&gt;Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS&lt;/li&gt;
&lt;li&gt;Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.vincentdelft.be/post/post_20180411" target="_blank" rel="nofollow noopener"&gt;Network Manager Control for OpenBSD (Updated)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Generalities&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;I just remind the scope of this small tool:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;allow you to pre-define several cable or wifi connections&lt;/li&gt;
&lt;li&gt;let nmctl to connect automatically to the first available one&lt;/li&gt;
&lt;li&gt;allow you to easily switch from one network connection to an other one&lt;/li&gt;
&lt;li&gt;create openbox dynamic menus&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;&lt;p&gt;Enhancements in this version&lt;/p&gt;&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;This is my second development version: 0.2.
  I've added performed several changes in the code:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;code style cleanup, to better match the python recommendations&lt;/li&gt;
&lt;li&gt;adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels&lt;/li&gt;
&lt;li&gt;implement a loop as work-around concerning the arp table issue.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The source code is still on the git of Sourceforge.net. 
   You can see the files &lt;a href="https://sourceforge.net/p/nmctl/code/ci/master/tree/" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;&lt;/p&gt;
  
  &lt;p&gt;And you can download the last version &lt;a href="https://sourceforge.net/p/nmctl/code/ci/master/tarball" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Feedbacks after few months&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The Openbox menus&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options.
  I've not changed this part of nmctl since it works as expected (for me :-) ).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The --restart option&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. 
  In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me.
  But I had several issues in this scenario.
  Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing.
  Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters.
  If you want to reduce or increase this figures, you can do it via the --retry parameter.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Results of my expertise with this small tool&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location.
  Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable.
  Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-).
  I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan".&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Next steps&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Documentation&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same.
  I plan to write a README and a man page at first instances.
  But since my laziness, I will do it as soon as I see some interest for this tool from other persons.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Tests&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I now have to travel and see how to see the script react on the different situations.
  Interested persons are welcome to share with me the outcome of their tests.
  I'm curious how it work.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://an.undulating.space/post/180411-erl-openbsd-upgrade/" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.3 on EdgeRouter Lite simple upgrade method&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;TL;DR&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on.
  Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;a tiny upgrade&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3.
  The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention:
  The best solution, whenever possible, is to backup your data and reinstall from scratch
  I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Reading on:&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD".
  But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it.
  But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade.
  Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once.
  So I don’t want to futz around with all that.
  There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;iXsystems&lt;/strong&gt;
&lt;a href="https://www.ixsystems.com/blog/boisetechshow-2018/" target="_blank" rel="nofollow noopener"&gt;Boise Technology Show 2018 Recap&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;&lt;a href="http://zfs.datto.com/" target="_blank" rel="nofollow noopener"&gt;OpenZFS User Conference Slides &amp;amp; Videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112599" target="_blank" rel="nofollow noopener"&gt;Thank you ZFS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112475" target="_blank" rel="nofollow noopener"&gt;ZSTD Compression&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266111164" target="_blank" rel="nofollow noopener"&gt;Pool Layout Considerations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266111346" target="_blank" rel="nofollow noopener"&gt;ZFS Releases&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112077" target="_blank" rel="nofollow noopener"&gt;Helping Developers Help You&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112233" target="_blank" rel="nofollow noopener"&gt;ZFS and MySQL on Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266110985" target="_blank" rel="nofollow noopener"&gt;Micron&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266108105" target="_blank" rel="nofollow noopener"&gt;OSNEXUS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266107946" target="_blank" rel="nofollow noopener"&gt;ZFS at Six Feet Up&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266107372" target="_blank" rel="nofollow noopener"&gt;Flexible Disk Use with OpenZFS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://jvns.ca/blog/2018/05/11/batch-editing-files-with-ed/" target="_blank" rel="nofollow noopener"&gt;Batch editing files with ed&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;what’s ‘ed’?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;
$ ed
help
?
h
?
asdfasdfasdfsadf
?
&amp;lt;close terminal in frustration&amp;gt;
&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today.
  vi is a successor to ed, except with a visual interface instead of this ?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;surprise: Ed is actually sort of cool and fun&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!!
  On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true.
  And it was so cool!!!! I found out:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;how to get Ed to give you better error messages than just ?&lt;/li&gt;
&lt;li&gt;that the name of the grep command comes from ed syntax (g/re/p)&lt;/li&gt;
&lt;li&gt;the basics of how to navigate and edit files using ed&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!!&lt;/p&gt;
  
  &lt;p&gt;The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blather.michaelwlucas.com/archives/3186" target="_blank" rel="nofollow noopener"&gt;FreeBSD Mastery: Jails -- Help make it happen &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=MsY-BafQgj4" target="_blank" rel="nofollow noopener"&gt;Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2018/05/17/21257.html" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.reddit.com/r/openbsd/comments/8ei00k/a_love_letter_to_openbsd/" target="_blank" rel="nofollow noopener"&gt;A Love Letter to OpenBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blather.michaelwlucas.com/archives/3176" target="_blank" rel="nofollow noopener"&gt;New talks, and the F-bomb&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://manpages.bsd.lv/mdoc.html" target="_blank" rel="nofollow noopener"&gt;Practical UNIX Manuals: mdoc&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2018-May/004758.html" target="_blank" rel="nofollow noopener"&gt;BSD Meetup in Zurich: May 24th&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.eventbrite.com/e/the-polish-bsd-user-group-1-meetup-tickets-45941857332" target="_blank" rel="nofollow noopener"&gt;BSD Meetup in Warsaw: May 24th&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;MeetBSD 2018&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;Tarsnap&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Seth - &lt;a href="http://dpaste.com/12R65X4#wrap" target="_blank" rel="nofollow noopener"&gt;First time poudriere Builder&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Farhan - &lt;a href="http://dpaste.com/1GHCGY5#wrap" target="_blank" rel="nofollow noopener"&gt;Why we didn't go FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;architech - &lt;a href="http://dpaste.com/1H72FGE#wrap" target="_blank" rel="nofollow noopener"&gt;Encryption Feedback&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Dave - &lt;a href="http://dpaste.com/27YH93Y#wrap" target="_blank" rel="nofollow noopener"&gt;Handy Tip on setting up automated coredump handling for FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, tutorial, howto, guide, bsd, interview, FreeBSD Internship, FreeNAS, Digital Ocean, Network Manager, EdgeRouter Lite, OpenZFS, ed</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/guest-blog-what-i-learned-during-my-freebsd-internship/">What I learned during my FreeBSD intership</a></h3>

<blockquote>
  <p>Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development.</p>
  
  <p>I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”.</p>
</blockquote>

<ul>
<li>What I Liked</li>
</ul>

<blockquote>
  <p>In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software.</p>
  
  <p>It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated.</p>
</blockquote>

<ul>
<li>What I Learned</li>
</ul>

<blockquote>
  <p>Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader.</p>
  
  <p>The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to.</p>
  
  <p>I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this.</p>
  
  <p>I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others.</p>
  
  <p>I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them.</p>
  
  <p>It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects.</p>
  
  <p>As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning.</p>
</blockquote>

<ul>
<li>Closing Thoughts</li>
</ul>

<blockquote>
  <p>I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further.</p>
  
  <p>I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here.</p>
</blockquote>

<p><hr /></p>

<h3>Recent Developments in FreeBSD</h3>

<ul>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333890">Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333649">Intel Microcode Splitter</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=334005">Intel Spec Store Bypass Disable control</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333713">Raspberry Pi 3B+ Ethernet Driver</a></li>
<li><a href="https://reviews.freebsd.org/D15522">IBRS for i386</a></li>
<li>Upcoming:</li>
<li><a href="https://reviews.freebsd.org/D15523">Microcode updater for AMD CPUs</a></li>
<li><a href="https://reviews.freebsd.org/D15525">the RACK TCP/IP stack, from Netflix</a></li>
<li>Voting in the FreeBSD Core Election begins today:</li>
</ul>

<p><hr /></p>

<p><strong>DigitalOcean</strong>
<a href="http://do.co/bsdnow">Digital Ocean Promo Link for BSD Now Listeners</a></p>

<p><hr /></p>

<h3><a href="http://www.shlomimarco.com/blog/running-freenas-on-a-digitalocean-droplet">Running FreeNAS on a DigitalOcean Droplet</a></h3>

<ul>
<li>Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it</li>
<li>The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS</li>
<li>Create a droplet, and add a small secondary block-storage device</li>
<li>Boot the droplet, login, and download FreeNAS</li>
<li>Disable swap, enable ‘foot shooting’ mode in GEOM</li>
<li>use dd to write the FreeNAS installer to the boot disk</li>
<li>Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device</li>
<li>Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer</li>
<li>Boot, and dd FreeNAS from the secondary block storage device back to the boot disk</li>
<li>You can now destroy the secondary block device</li>
<li>Now you have a FreeNAS, and can take it from there.</li>
<li>Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS</li>
<li>Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool.</li>
</ul>

<p><hr /></p>

<h2>News Roundup</h2>

<h3><a href="http://www.vincentdelft.be/post/post_20180411">Network Manager Control for OpenBSD (Updated)</a></h3>

<ul>
<li>Generalities</li>
<li><p>I just remind the scope of this small tool:</p>

<ul><li>allow you to pre-define several cable or wifi connections</li>
<li>let nmctl to connect automatically to the first available one</li>
<li>allow you to easily switch from one network connection to an other one</li>
<li>create openbox dynamic menus</li></ul></li>
<li><p>Enhancements in this version</p></li>
</ul>

<blockquote>
  <p>This is my second development version: 0.2.
  I've added performed several changes in the code:</p>
</blockquote>

<ul>
<li>code style cleanup, to better match the python recommendations</li>
<li>adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels</li>
<li>implement a loop as work-around concerning the arp table issue.</li>
</ul>

<blockquote>
  <p>The source code is still on the git of Sourceforge.net. 
   You can see the files <a href="https://sourceforge.net/p/nmctl/code/ci/master/tree/">here</a></p>
  
  <p>And you can download the last version <a href="https://sourceforge.net/p/nmctl/code/ci/master/tarball">here</a></p>
</blockquote>

<ul>
<li>Feedbacks after few months</li>
</ul>

<blockquote>
  <p>I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option.</p>
</blockquote>

<ul>
<li>The Openbox menus</li>
</ul>

<blockquote>
  <p>The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options.
  I've not changed this part of nmctl since it works as expected (for me :-) ).</p>
</blockquote>

<ul>
<li>The --restart option</li>
</ul>

<blockquote>
  <p>Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. 
  In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me.
  But I had several issues in this scenario.
  Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing.
  Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters.
  If you want to reduce or increase this figures, you can do it via the --retry parameter.</p>
</blockquote>

<ul>
<li>Results of my expertise with this small tool</li>
</ul>

<blockquote>
  <p>Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location.
  Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable.
  Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-).
  I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan".</p>
</blockquote>

<ul>
<li><p>Next steps</p></li>
<li><p>Documentation</p></li>
</ul>

<blockquote>
  <p>The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same.
  I plan to write a README and a man page at first instances.
  But since my laziness, I will do it as soon as I see some interest for this tool from other persons.</p>
</blockquote>

<ul>
<li>Tests</li>
</ul>

<blockquote>
  <p>I now have to travel and see how to see the script react on the different situations.
  Interested persons are welcome to share with me the outcome of their tests.
  I'm curious how it work.</p>
</blockquote>

<p><hr /></p>

<h3><a href="https://an.undulating.space/post/180411-erl-openbsd-upgrade/">OpenBSD 6.3 on EdgeRouter Lite simple upgrade method</a></h3>

<ul>
<li>TL;DR</li>
</ul>

<blockquote>
  <p>OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on.
  Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it.</p>
</blockquote>

<ul>
<li>a tiny upgrade</li>
</ul>

<blockquote>
  <p>The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3.
  The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention:
  The best solution, whenever possible, is to backup your data and reinstall from scratch
  I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism.</p>
</blockquote>

<ul>
<li>Reading on:</li>
</ul>

<blockquote>
  <p>To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD".
  But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it.
  But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade.
  Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once.
  So I don’t want to futz around with all that.
  There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right?</p>
</blockquote>

<p><hr /></p>

<p><strong>iXsystems</strong>
<a href="https://www.ixsystems.com/blog/boisetechshow-2018/">Boise Technology Show 2018 Recap</a></p>

<h3><a href="http://zfs.datto.com/">OpenZFS User Conference Slides &amp; Videos</a></h3>

<ul>
<li><a href="https://vimeo.com/album/5150026/video/266112599">Thank you ZFS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112475">ZSTD Compression</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111164">Pool Layout Considerations</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111346">ZFS Releases</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112077">Helping Developers Help You</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112233">ZFS and MySQL on Linux</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266110985">Micron</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266108105">OSNEXUS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107946">ZFS at Six Feet Up</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107372">Flexible Disk Use with OpenZFS</a></li>
</ul>

<p><hr /></p>

<h3><a href="https://jvns.ca/blog/2018/05/11/batch-editing-files-with-ed/">Batch editing files with ed</a></h3>

<ul>
<li>what’s ‘ed’?</li>
</ul>

<blockquote>
  <p>ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this:</p>
</blockquote>

<p><code>
$ ed
help
?
h
?
asdfasdfasdfsadf
?
&lt;close terminal in frustration&gt;
</code></p>

<blockquote>
  <p>Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today.
  vi is a successor to ed, except with a visual interface instead of this ?</p>
</blockquote>

<ul>
<li>surprise: Ed is actually sort of cool and fun</li>
</ul>

<blockquote>
  <p>So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!!
  On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true.
  And it was so cool!!!! I found out:</p>
</blockquote>

<ul>
<li>how to get Ed to give you better error messages than just ?</li>
<li>that the name of the grep command comes from ed syntax (g/re/p)</li>
<li>the basics of how to navigate and edit files using ed</li>
</ul>

<blockquote>
  <p>All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!!</p>
  
  <p>The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files.</p>
</blockquote>

<p><hr /></p>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://blather.michaelwlucas.com/archives/3186">FreeBSD Mastery: Jails -- Help make it happen </a></li>
<li><a href="https://www.youtube.com/watch?v=MsY-BafQgj4">Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018</a></li>
<li><a href="https://www.dragonflydigest.com/2018/05/17/21257.html">DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT</a></li>
<li><a href="https://www.reddit.com/r/openbsd/comments/8ei00k/a_love_letter_to_openbsd/">A Love Letter to OpenBSD</a></li>
<li><a href="https://blather.michaelwlucas.com/archives/3176">New talks, and the F-bomb</a></li>
<li><a href="https://manpages.bsd.lv/mdoc.html">Practical UNIX Manuals: mdoc</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2018-May/004758.html">BSD Meetup in Zurich: May 24th</a></li>
<li><a href="https://www.eventbrite.com/e/the-polish-bsd-user-group-1-meetup-tickets-45941857332">BSD Meetup in Warsaw: May 24th</a></li>
<li><a href="http://meetbsd.com/">MeetBSD 2018</a></li>
</ul>

<p><hr /></p>

<p><strong>Tarsnap</strong></p>

<h2>Feedback/Questions</h2>

<ul>
<li>Seth - <a href="http://dpaste.com/12R65X4#wrap">First time poudriere Builder</a></li>
<li>Farhan - <a href="http://dpaste.com/1GHCGY5#wrap">Why we didn't go FreeBSD</a></li>
<li>architech - <a href="http://dpaste.com/1H72FGE#wrap">Encryption Feedback</a></li>
<li>Dave - <a href="http://dpaste.com/27YH93Y#wrap">Handy Tip on setting up automated coredump handling for FreeBSD</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/guest-blog-what-i-learned-during-my-freebsd-internship/">What I learned during my FreeBSD intership</a></h3>

<blockquote>
  <p>Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development.</p>
  
  <p>I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”.</p>
</blockquote>

<ul>
<li>What I Liked</li>
</ul>

<blockquote>
  <p>In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software.</p>
  
  <p>It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated.</p>
</blockquote>

<ul>
<li>What I Learned</li>
</ul>

<blockquote>
  <p>Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader.</p>
  
  <p>The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to.</p>
  
  <p>I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this.</p>
  
  <p>I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others.</p>
  
  <p>I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them.</p>
  
  <p>It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects.</p>
  
  <p>As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning.</p>
</blockquote>

<ul>
<li>Closing Thoughts</li>
</ul>

<blockquote>
  <p>I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further.</p>
  
  <p>I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here.</p>
</blockquote>

<p><hr /></p>

<h3>Recent Developments in FreeBSD</h3>

<ul>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333890">Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333649">Intel Microcode Splitter</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=334005">Intel Spec Store Bypass Disable control</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333713">Raspberry Pi 3B+ Ethernet Driver</a></li>
<li><a href="https://reviews.freebsd.org/D15522">IBRS for i386</a></li>
<li>Upcoming:</li>
<li><a href="https://reviews.freebsd.org/D15523">Microcode updater for AMD CPUs</a></li>
<li><a href="https://reviews.freebsd.org/D15525">the RACK TCP/IP stack, from Netflix</a></li>
<li>Voting in the FreeBSD Core Election begins today:</li>
</ul>

<p><hr /></p>

<p><strong>DigitalOcean</strong>
<a href="http://do.co/bsdnow">Digital Ocean Promo Link for BSD Now Listeners</a></p>

<p><hr /></p>

<h3><a href="http://www.shlomimarco.com/blog/running-freenas-on-a-digitalocean-droplet">Running FreeNAS on a DigitalOcean Droplet</a></h3>

<ul>
<li>Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it</li>
<li>The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS</li>
<li>Create a droplet, and add a small secondary block-storage device</li>
<li>Boot the droplet, login, and download FreeNAS</li>
<li>Disable swap, enable ‘foot shooting’ mode in GEOM</li>
<li>use dd to write the FreeNAS installer to the boot disk</li>
<li>Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device</li>
<li>Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer</li>
<li>Boot, and dd FreeNAS from the secondary block storage device back to the boot disk</li>
<li>You can now destroy the secondary block device</li>
<li>Now you have a FreeNAS, and can take it from there.</li>
<li>Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS</li>
<li>Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool.</li>
</ul>

<p><hr /></p>

<h2>News Roundup</h2>

<h3><a href="http://www.vincentdelft.be/post/post_20180411">Network Manager Control for OpenBSD (Updated)</a></h3>

<ul>
<li>Generalities</li>
<li><p>I just remind the scope of this small tool:</p>

<ul><li>allow you to pre-define several cable or wifi connections</li>
<li>let nmctl to connect automatically to the first available one</li>
<li>allow you to easily switch from one network connection to an other one</li>
<li>create openbox dynamic menus</li></ul></li>
<li><p>Enhancements in this version</p></li>
</ul>

<blockquote>
  <p>This is my second development version: 0.2.
  I've added performed several changes in the code:</p>
</blockquote>

<ul>
<li>code style cleanup, to better match the python recommendations</li>
<li>adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels</li>
<li>implement a loop as work-around concerning the arp table issue.</li>
</ul>

<blockquote>
  <p>The source code is still on the git of Sourceforge.net. 
   You can see the files <a href="https://sourceforge.net/p/nmctl/code/ci/master/tree/">here</a></p>
  
  <p>And you can download the last version <a href="https://sourceforge.net/p/nmctl/code/ci/master/tarball">here</a></p>
</blockquote>

<ul>
<li>Feedbacks after few months</li>
</ul>

<blockquote>
  <p>I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option.</p>
</blockquote>

<ul>
<li>The Openbox menus</li>
</ul>

<blockquote>
  <p>The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options.
  I've not changed this part of nmctl since it works as expected (for me :-) ).</p>
</blockquote>

<ul>
<li>The --restart option</li>
</ul>

<blockquote>
  <p>Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. 
  In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me.
  But I had several issues in this scenario.
  Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing.
  Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters.
  If you want to reduce or increase this figures, you can do it via the --retry parameter.</p>
</blockquote>

<ul>
<li>Results of my expertise with this small tool</li>
</ul>

<blockquote>
  <p>Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location.
  Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable.
  Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-).
  I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan".</p>
</blockquote>

<ul>
<li><p>Next steps</p></li>
<li><p>Documentation</p></li>
</ul>

<blockquote>
  <p>The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same.
  I plan to write a README and a man page at first instances.
  But since my laziness, I will do it as soon as I see some interest for this tool from other persons.</p>
</blockquote>

<ul>
<li>Tests</li>
</ul>

<blockquote>
  <p>I now have to travel and see how to see the script react on the different situations.
  Interested persons are welcome to share with me the outcome of their tests.
  I'm curious how it work.</p>
</blockquote>

<p><hr /></p>

<h3><a href="https://an.undulating.space/post/180411-erl-openbsd-upgrade/">OpenBSD 6.3 on EdgeRouter Lite simple upgrade method</a></h3>

<ul>
<li>TL;DR</li>
</ul>

<blockquote>
  <p>OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on.
  Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it.</p>
</blockquote>

<ul>
<li>a tiny upgrade</li>
</ul>

<blockquote>
  <p>The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3.
  The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention:
  The best solution, whenever possible, is to backup your data and reinstall from scratch
  I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism.</p>
</blockquote>

<ul>
<li>Reading on:</li>
</ul>

<blockquote>
  <p>To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD".
  But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it.
  But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade.
  Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once.
  So I don’t want to futz around with all that.
  There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right?</p>
</blockquote>

<p><hr /></p>

<p><strong>iXsystems</strong>
<a href="https://www.ixsystems.com/blog/boisetechshow-2018/">Boise Technology Show 2018 Recap</a></p>

<h3><a href="http://zfs.datto.com/">OpenZFS User Conference Slides &amp; Videos</a></h3>

<ul>
<li><a href="https://vimeo.com/album/5150026/video/266112599">Thank you ZFS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112475">ZSTD Compression</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111164">Pool Layout Considerations</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111346">ZFS Releases</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112077">Helping Developers Help You</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112233">ZFS and MySQL on Linux</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266110985">Micron</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266108105">OSNEXUS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107946">ZFS at Six Feet Up</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107372">Flexible Disk Use with OpenZFS</a></li>
</ul>

<p><hr /></p>

<h3><a href="https://jvns.ca/blog/2018/05/11/batch-editing-files-with-ed/">Batch editing files with ed</a></h3>

<ul>
<li>what’s ‘ed’?</li>
</ul>

<blockquote>
  <p>ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this:</p>
</blockquote>

<p><code>
$ ed
help
?
h
?
asdfasdfasdfsadf
?
&lt;close terminal in frustration&gt;
</code></p>

<blockquote>
  <p>Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today.
  vi is a successor to ed, except with a visual interface instead of this ?</p>
</blockquote>

<ul>
<li>surprise: Ed is actually sort of cool and fun</li>
</ul>

<blockquote>
  <p>So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!!
  On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true.
  And it was so cool!!!! I found out:</p>
</blockquote>

<ul>
<li>how to get Ed to give you better error messages than just ?</li>
<li>that the name of the grep command comes from ed syntax (g/re/p)</li>
<li>the basics of how to navigate and edit files using ed</li>
</ul>

<blockquote>
  <p>All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!!</p>
  
  <p>The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files.</p>
</blockquote>

<p><hr /></p>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://blather.michaelwlucas.com/archives/3186">FreeBSD Mastery: Jails -- Help make it happen </a></li>
<li><a href="https://www.youtube.com/watch?v=MsY-BafQgj4">Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018</a></li>
<li><a href="https://www.dragonflydigest.com/2018/05/17/21257.html">DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT</a></li>
<li><a href="https://www.reddit.com/r/openbsd/comments/8ei00k/a_love_letter_to_openbsd/">A Love Letter to OpenBSD</a></li>
<li><a href="https://blather.michaelwlucas.com/archives/3176">New talks, and the F-bomb</a></li>
<li><a href="https://manpages.bsd.lv/mdoc.html">Practical UNIX Manuals: mdoc</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2018-May/004758.html">BSD Meetup in Zurich: May 24th</a></li>
<li><a href="https://www.eventbrite.com/e/the-polish-bsd-user-group-1-meetup-tickets-45941857332">BSD Meetup in Warsaw: May 24th</a></li>
<li><a href="http://meetbsd.com/">MeetBSD 2018</a></li>
</ul>

<p><hr /></p>

<p><strong>Tarsnap</strong></p>

<h2>Feedback/Questions</h2>

<ul>
<li>Seth - <a href="http://dpaste.com/12R65X4#wrap">First time poudriere Builder</a></li>
<li>Farhan - <a href="http://dpaste.com/1GHCGY5#wrap">Why we didn't go FreeBSD</a></li>
<li>architech - <a href="http://dpaste.com/1H72FGE#wrap">Encryption Feedback</a></li>
<li>Dave - <a href="http://dpaste.com/27YH93Y#wrap">Handy Tip on setting up automated coredump handling for FreeBSD</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
