<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 17 May 2026 07:26:57 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Edgerouter Lite”</title>
    <link>https://www.bsdnow.tv/tags/edgerouter%20lite</link>
    <pubDate>Thu, 24 May 2018 15:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>Episode 247: Interning for FreeBSD | BSD Now 247</title>
  <link>https://www.bsdnow.tv/247</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-1994</guid>
  <pubDate>Thu, 24 May 2018 15:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/31bf045b-2e53-459e-a40e-993a51ceccdb.mp3" length="54062460" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.</itunes:subtitle>
  <itunes:duration>1:29:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/blog/guest-blog-what-i-learned-during-my-freebsd-internship/" target="_blank" rel="nofollow noopener"&gt;What I learned during my FreeBSD intership&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development.&lt;/p&gt;
  
  &lt;p&gt;I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;What I Liked&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software.&lt;/p&gt;
  
  &lt;p&gt;It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;What I Learned&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader.&lt;/p&gt;
  
  &lt;p&gt;The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to.&lt;/p&gt;
  
  &lt;p&gt;I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this.&lt;/p&gt;
  
  &lt;p&gt;I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others.&lt;/p&gt;
  
  &lt;p&gt;I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them.&lt;/p&gt;
  
  &lt;p&gt;It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects.&lt;/p&gt;
  
  &lt;p&gt;As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Closing Thoughts&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further.&lt;/p&gt;
  
  &lt;p&gt;I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;Recent Developments in FreeBSD&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=333890" target="_blank" rel="nofollow noopener"&gt;Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=333649" target="_blank" rel="nofollow noopener"&gt;Intel Microcode Splitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=334005" target="_blank" rel="nofollow noopener"&gt;Intel Spec Store Bypass Disable control&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=333713" target="_blank" rel="nofollow noopener"&gt;Raspberry Pi 3B+ Ethernet Driver&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D15522" target="_blank" rel="nofollow noopener"&gt;IBRS for i386&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Upcoming:&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D15523" target="_blank" rel="nofollow noopener"&gt;Microcode updater for AMD CPUs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D15525" target="_blank" rel="nofollow noopener"&gt;the RACK TCP/IP stack, from Netflix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Voting in the FreeBSD Core Election begins today:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;DigitalOcean&lt;/strong&gt;
&lt;a href="http://do.co/bsdnow" target="_blank" rel="nofollow noopener"&gt;Digital Ocean Promo Link for BSD Now Listeners&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.shlomimarco.com/blog/running-freenas-on-a-digitalocean-droplet" target="_blank" rel="nofollow noopener"&gt;Running FreeNAS on a DigitalOcean Droplet&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it&lt;/li&gt;
&lt;li&gt;The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS&lt;/li&gt;
&lt;li&gt;Create a droplet, and add a small secondary block-storage device&lt;/li&gt;
&lt;li&gt;Boot the droplet, login, and download FreeNAS&lt;/li&gt;
&lt;li&gt;Disable swap, enable ‘foot shooting’ mode in GEOM&lt;/li&gt;
&lt;li&gt;use dd to write the FreeNAS installer to the boot disk&lt;/li&gt;
&lt;li&gt;Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device&lt;/li&gt;
&lt;li&gt;Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer&lt;/li&gt;
&lt;li&gt;Boot, and dd FreeNAS from the secondary block storage device back to the boot disk&lt;/li&gt;
&lt;li&gt;You can now destroy the secondary block device&lt;/li&gt;
&lt;li&gt;Now you have a FreeNAS, and can take it from there.&lt;/li&gt;
&lt;li&gt;Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS&lt;/li&gt;
&lt;li&gt;Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.vincentdelft.be/post/post_20180411" target="_blank" rel="nofollow noopener"&gt;Network Manager Control for OpenBSD (Updated)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Generalities&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;I just remind the scope of this small tool:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;allow you to pre-define several cable or wifi connections&lt;/li&gt;
&lt;li&gt;let nmctl to connect automatically to the first available one&lt;/li&gt;
&lt;li&gt;allow you to easily switch from one network connection to an other one&lt;/li&gt;
&lt;li&gt;create openbox dynamic menus&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;&lt;p&gt;Enhancements in this version&lt;/p&gt;&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;This is my second development version: 0.2.
  I've added performed several changes in the code:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;code style cleanup, to better match the python recommendations&lt;/li&gt;
&lt;li&gt;adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels&lt;/li&gt;
&lt;li&gt;implement a loop as work-around concerning the arp table issue.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The source code is still on the git of Sourceforge.net. 
   You can see the files &lt;a href="https://sourceforge.net/p/nmctl/code/ci/master/tree/" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;&lt;/p&gt;
  
  &lt;p&gt;And you can download the last version &lt;a href="https://sourceforge.net/p/nmctl/code/ci/master/tarball" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Feedbacks after few months&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The Openbox menus&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options.
  I've not changed this part of nmctl since it works as expected (for me :-) ).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The --restart option&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. 
  In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me.
  But I had several issues in this scenario.
  Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing.
  Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters.
  If you want to reduce or increase this figures, you can do it via the --retry parameter.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Results of my expertise with this small tool&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location.
  Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable.
  Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-).
  I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan".&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Next steps&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Documentation&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same.
  I plan to write a README and a man page at first instances.
  But since my laziness, I will do it as soon as I see some interest for this tool from other persons.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Tests&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I now have to travel and see how to see the script react on the different situations.
  Interested persons are welcome to share with me the outcome of their tests.
  I'm curious how it work.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://an.undulating.space/post/180411-erl-openbsd-upgrade/" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.3 on EdgeRouter Lite simple upgrade method&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;TL;DR&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on.
  Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;a tiny upgrade&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3.
  The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention:
  The best solution, whenever possible, is to backup your data and reinstall from scratch
  I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Reading on:&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD".
  But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it.
  But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade.
  Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once.
  So I don’t want to futz around with all that.
  There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;iXsystems&lt;/strong&gt;
&lt;a href="https://www.ixsystems.com/blog/boisetechshow-2018/" target="_blank" rel="nofollow noopener"&gt;Boise Technology Show 2018 Recap&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;&lt;a href="http://zfs.datto.com/" target="_blank" rel="nofollow noopener"&gt;OpenZFS User Conference Slides &amp;amp; Videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112599" target="_blank" rel="nofollow noopener"&gt;Thank you ZFS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112475" target="_blank" rel="nofollow noopener"&gt;ZSTD Compression&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266111164" target="_blank" rel="nofollow noopener"&gt;Pool Layout Considerations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266111346" target="_blank" rel="nofollow noopener"&gt;ZFS Releases&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112077" target="_blank" rel="nofollow noopener"&gt;Helping Developers Help You&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112233" target="_blank" rel="nofollow noopener"&gt;ZFS and MySQL on Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266110985" target="_blank" rel="nofollow noopener"&gt;Micron&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266108105" target="_blank" rel="nofollow noopener"&gt;OSNEXUS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266107946" target="_blank" rel="nofollow noopener"&gt;ZFS at Six Feet Up&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266107372" target="_blank" rel="nofollow noopener"&gt;Flexible Disk Use with OpenZFS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://jvns.ca/blog/2018/05/11/batch-editing-files-with-ed/" target="_blank" rel="nofollow noopener"&gt;Batch editing files with ed&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;what’s ‘ed’?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;
$ ed
help
?
h
?
asdfasdfasdfsadf
?
&amp;lt;close terminal in frustration&amp;gt;
&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today.
  vi is a successor to ed, except with a visual interface instead of this ?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;surprise: Ed is actually sort of cool and fun&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!!
  On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true.
  And it was so cool!!!! I found out:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;how to get Ed to give you better error messages than just ?&lt;/li&gt;
&lt;li&gt;that the name of the grep command comes from ed syntax (g/re/p)&lt;/li&gt;
&lt;li&gt;the basics of how to navigate and edit files using ed&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!!&lt;/p&gt;
  
  &lt;p&gt;The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blather.michaelwlucas.com/archives/3186" target="_blank" rel="nofollow noopener"&gt;FreeBSD Mastery: Jails -- Help make it happen &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=MsY-BafQgj4" target="_blank" rel="nofollow noopener"&gt;Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2018/05/17/21257.html" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.reddit.com/r/openbsd/comments/8ei00k/a_love_letter_to_openbsd/" target="_blank" rel="nofollow noopener"&gt;A Love Letter to OpenBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blather.michaelwlucas.com/archives/3176" target="_blank" rel="nofollow noopener"&gt;New talks, and the F-bomb&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://manpages.bsd.lv/mdoc.html" target="_blank" rel="nofollow noopener"&gt;Practical UNIX Manuals: mdoc&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2018-May/004758.html" target="_blank" rel="nofollow noopener"&gt;BSD Meetup in Zurich: May 24th&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.eventbrite.com/e/the-polish-bsd-user-group-1-meetup-tickets-45941857332" target="_blank" rel="nofollow noopener"&gt;BSD Meetup in Warsaw: May 24th&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;MeetBSD 2018&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;Tarsnap&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Seth - &lt;a href="http://dpaste.com/12R65X4#wrap" target="_blank" rel="nofollow noopener"&gt;First time poudriere Builder&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Farhan - &lt;a href="http://dpaste.com/1GHCGY5#wrap" target="_blank" rel="nofollow noopener"&gt;Why we didn't go FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;architech - &lt;a href="http://dpaste.com/1H72FGE#wrap" target="_blank" rel="nofollow noopener"&gt;Encryption Feedback&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Dave - &lt;a href="http://dpaste.com/27YH93Y#wrap" target="_blank" rel="nofollow noopener"&gt;Handy Tip on setting up automated coredump handling for FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, tutorial, howto, guide, bsd, interview, FreeBSD Internship, FreeNAS, Digital Ocean, Network Manager, EdgeRouter Lite, OpenZFS, ed</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/guest-blog-what-i-learned-during-my-freebsd-internship/">What I learned during my FreeBSD intership</a></h3>

<blockquote>
  <p>Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development.</p>
  
  <p>I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”.</p>
</blockquote>

<ul>
<li>What I Liked</li>
</ul>

<blockquote>
  <p>In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software.</p>
  
  <p>It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated.</p>
</blockquote>

<ul>
<li>What I Learned</li>
</ul>

<blockquote>
  <p>Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader.</p>
  
  <p>The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to.</p>
  
  <p>I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this.</p>
  
  <p>I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others.</p>
  
  <p>I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them.</p>
  
  <p>It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects.</p>
  
  <p>As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning.</p>
</blockquote>

<ul>
<li>Closing Thoughts</li>
</ul>

<blockquote>
  <p>I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further.</p>
  
  <p>I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here.</p>
</blockquote>

<p><hr /></p>

<h3>Recent Developments in FreeBSD</h3>

<ul>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333890">Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333649">Intel Microcode Splitter</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=334005">Intel Spec Store Bypass Disable control</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333713">Raspberry Pi 3B+ Ethernet Driver</a></li>
<li><a href="https://reviews.freebsd.org/D15522">IBRS for i386</a></li>
<li>Upcoming:</li>
<li><a href="https://reviews.freebsd.org/D15523">Microcode updater for AMD CPUs</a></li>
<li><a href="https://reviews.freebsd.org/D15525">the RACK TCP/IP stack, from Netflix</a></li>
<li>Voting in the FreeBSD Core Election begins today:</li>
</ul>

<p><hr /></p>

<p><strong>DigitalOcean</strong>
<a href="http://do.co/bsdnow">Digital Ocean Promo Link for BSD Now Listeners</a></p>

<p><hr /></p>

<h3><a href="http://www.shlomimarco.com/blog/running-freenas-on-a-digitalocean-droplet">Running FreeNAS on a DigitalOcean Droplet</a></h3>

<ul>
<li>Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it</li>
<li>The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS</li>
<li>Create a droplet, and add a small secondary block-storage device</li>
<li>Boot the droplet, login, and download FreeNAS</li>
<li>Disable swap, enable ‘foot shooting’ mode in GEOM</li>
<li>use dd to write the FreeNAS installer to the boot disk</li>
<li>Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device</li>
<li>Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer</li>
<li>Boot, and dd FreeNAS from the secondary block storage device back to the boot disk</li>
<li>You can now destroy the secondary block device</li>
<li>Now you have a FreeNAS, and can take it from there.</li>
<li>Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS</li>
<li>Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool.</li>
</ul>

<p><hr /></p>

<h2>News Roundup</h2>

<h3><a href="http://www.vincentdelft.be/post/post_20180411">Network Manager Control for OpenBSD (Updated)</a></h3>

<ul>
<li>Generalities</li>
<li><p>I just remind the scope of this small tool:</p>

<ul><li>allow you to pre-define several cable or wifi connections</li>
<li>let nmctl to connect automatically to the first available one</li>
<li>allow you to easily switch from one network connection to an other one</li>
<li>create openbox dynamic menus</li></ul></li>
<li><p>Enhancements in this version</p></li>
</ul>

<blockquote>
  <p>This is my second development version: 0.2.
  I've added performed several changes in the code:</p>
</blockquote>

<ul>
<li>code style cleanup, to better match the python recommendations</li>
<li>adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels</li>
<li>implement a loop as work-around concerning the arp table issue.</li>
</ul>

<blockquote>
  <p>The source code is still on the git of Sourceforge.net. 
   You can see the files <a href="https://sourceforge.net/p/nmctl/code/ci/master/tree/">here</a></p>
  
  <p>And you can download the last version <a href="https://sourceforge.net/p/nmctl/code/ci/master/tarball">here</a></p>
</blockquote>

<ul>
<li>Feedbacks after few months</li>
</ul>

<blockquote>
  <p>I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option.</p>
</blockquote>

<ul>
<li>The Openbox menus</li>
</ul>

<blockquote>
  <p>The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options.
  I've not changed this part of nmctl since it works as expected (for me :-) ).</p>
</blockquote>

<ul>
<li>The --restart option</li>
</ul>

<blockquote>
  <p>Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. 
  In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me.
  But I had several issues in this scenario.
  Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing.
  Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters.
  If you want to reduce or increase this figures, you can do it via the --retry parameter.</p>
</blockquote>

<ul>
<li>Results of my expertise with this small tool</li>
</ul>

<blockquote>
  <p>Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location.
  Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable.
  Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-).
  I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan".</p>
</blockquote>

<ul>
<li><p>Next steps</p></li>
<li><p>Documentation</p></li>
</ul>

<blockquote>
  <p>The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same.
  I plan to write a README and a man page at first instances.
  But since my laziness, I will do it as soon as I see some interest for this tool from other persons.</p>
</blockquote>

<ul>
<li>Tests</li>
</ul>

<blockquote>
  <p>I now have to travel and see how to see the script react on the different situations.
  Interested persons are welcome to share with me the outcome of their tests.
  I'm curious how it work.</p>
</blockquote>

<p><hr /></p>

<h3><a href="https://an.undulating.space/post/180411-erl-openbsd-upgrade/">OpenBSD 6.3 on EdgeRouter Lite simple upgrade method</a></h3>

<ul>
<li>TL;DR</li>
</ul>

<blockquote>
  <p>OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on.
  Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it.</p>
</blockquote>

<ul>
<li>a tiny upgrade</li>
</ul>

<blockquote>
  <p>The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3.
  The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention:
  The best solution, whenever possible, is to backup your data and reinstall from scratch
  I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism.</p>
</blockquote>

<ul>
<li>Reading on:</li>
</ul>

<blockquote>
  <p>To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD".
  But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it.
  But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade.
  Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once.
  So I don’t want to futz around with all that.
  There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right?</p>
</blockquote>

<p><hr /></p>

<p><strong>iXsystems</strong>
<a href="https://www.ixsystems.com/blog/boisetechshow-2018/">Boise Technology Show 2018 Recap</a></p>

<h3><a href="http://zfs.datto.com/">OpenZFS User Conference Slides &amp; Videos</a></h3>

<ul>
<li><a href="https://vimeo.com/album/5150026/video/266112599">Thank you ZFS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112475">ZSTD Compression</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111164">Pool Layout Considerations</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111346">ZFS Releases</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112077">Helping Developers Help You</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112233">ZFS and MySQL on Linux</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266110985">Micron</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266108105">OSNEXUS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107946">ZFS at Six Feet Up</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107372">Flexible Disk Use with OpenZFS</a></li>
</ul>

<p><hr /></p>

<h3><a href="https://jvns.ca/blog/2018/05/11/batch-editing-files-with-ed/">Batch editing files with ed</a></h3>

<ul>
<li>what’s ‘ed’?</li>
</ul>

<blockquote>
  <p>ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this:</p>
</blockquote>

<p><code>
$ ed
help
?
h
?
asdfasdfasdfsadf
?
&lt;close terminal in frustration&gt;
</code></p>

<blockquote>
  <p>Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today.
  vi is a successor to ed, except with a visual interface instead of this ?</p>
</blockquote>

<ul>
<li>surprise: Ed is actually sort of cool and fun</li>
</ul>

<blockquote>
  <p>So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!!
  On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true.
  And it was so cool!!!! I found out:</p>
</blockquote>

<ul>
<li>how to get Ed to give you better error messages than just ?</li>
<li>that the name of the grep command comes from ed syntax (g/re/p)</li>
<li>the basics of how to navigate and edit files using ed</li>
</ul>

<blockquote>
  <p>All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!!</p>
  
  <p>The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files.</p>
</blockquote>

<p><hr /></p>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://blather.michaelwlucas.com/archives/3186">FreeBSD Mastery: Jails -- Help make it happen </a></li>
<li><a href="https://www.youtube.com/watch?v=MsY-BafQgj4">Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018</a></li>
<li><a href="https://www.dragonflydigest.com/2018/05/17/21257.html">DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT</a></li>
<li><a href="https://www.reddit.com/r/openbsd/comments/8ei00k/a_love_letter_to_openbsd/">A Love Letter to OpenBSD</a></li>
<li><a href="https://blather.michaelwlucas.com/archives/3176">New talks, and the F-bomb</a></li>
<li><a href="https://manpages.bsd.lv/mdoc.html">Practical UNIX Manuals: mdoc</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2018-May/004758.html">BSD Meetup in Zurich: May 24th</a></li>
<li><a href="https://www.eventbrite.com/e/the-polish-bsd-user-group-1-meetup-tickets-45941857332">BSD Meetup in Warsaw: May 24th</a></li>
<li><a href="http://meetbsd.com/">MeetBSD 2018</a></li>
</ul>

<p><hr /></p>

<p><strong>Tarsnap</strong></p>

<h2>Feedback/Questions</h2>

<ul>
<li>Seth - <a href="http://dpaste.com/12R65X4#wrap">First time poudriere Builder</a></li>
<li>Farhan - <a href="http://dpaste.com/1GHCGY5#wrap">Why we didn't go FreeBSD</a></li>
<li>architech - <a href="http://dpaste.com/1H72FGE#wrap">Encryption Feedback</a></li>
<li>Dave - <a href="http://dpaste.com/27YH93Y#wrap">Handy Tip on setting up automated coredump handling for FreeBSD</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/guest-blog-what-i-learned-during-my-freebsd-internship/">What I learned during my FreeBSD intership</a></h3>

<blockquote>
  <p>Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development.</p>
  
  <p>I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”.</p>
</blockquote>

<ul>
<li>What I Liked</li>
</ul>

<blockquote>
  <p>In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software.</p>
  
  <p>It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated.</p>
</blockquote>

<ul>
<li>What I Learned</li>
</ul>

<blockquote>
  <p>Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader.</p>
  
  <p>The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to.</p>
  
  <p>I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this.</p>
  
  <p>I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others.</p>
  
  <p>I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them.</p>
  
  <p>It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects.</p>
  
  <p>As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning.</p>
</blockquote>

<ul>
<li>Closing Thoughts</li>
</ul>

<blockquote>
  <p>I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further.</p>
  
  <p>I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here.</p>
</blockquote>

<p><hr /></p>

<h3>Recent Developments in FreeBSD</h3>

<ul>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333890">Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333649">Intel Microcode Splitter</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=334005">Intel Spec Store Bypass Disable control</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333713">Raspberry Pi 3B+ Ethernet Driver</a></li>
<li><a href="https://reviews.freebsd.org/D15522">IBRS for i386</a></li>
<li>Upcoming:</li>
<li><a href="https://reviews.freebsd.org/D15523">Microcode updater for AMD CPUs</a></li>
<li><a href="https://reviews.freebsd.org/D15525">the RACK TCP/IP stack, from Netflix</a></li>
<li>Voting in the FreeBSD Core Election begins today:</li>
</ul>

<p><hr /></p>

<p><strong>DigitalOcean</strong>
<a href="http://do.co/bsdnow">Digital Ocean Promo Link for BSD Now Listeners</a></p>

<p><hr /></p>

<h3><a href="http://www.shlomimarco.com/blog/running-freenas-on-a-digitalocean-droplet">Running FreeNAS on a DigitalOcean Droplet</a></h3>

<ul>
<li>Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it</li>
<li>The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS</li>
<li>Create a droplet, and add a small secondary block-storage device</li>
<li>Boot the droplet, login, and download FreeNAS</li>
<li>Disable swap, enable ‘foot shooting’ mode in GEOM</li>
<li>use dd to write the FreeNAS installer to the boot disk</li>
<li>Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device</li>
<li>Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer</li>
<li>Boot, and dd FreeNAS from the secondary block storage device back to the boot disk</li>
<li>You can now destroy the secondary block device</li>
<li>Now you have a FreeNAS, and can take it from there.</li>
<li>Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS</li>
<li>Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool.</li>
</ul>

<p><hr /></p>

<h2>News Roundup</h2>

<h3><a href="http://www.vincentdelft.be/post/post_20180411">Network Manager Control for OpenBSD (Updated)</a></h3>

<ul>
<li>Generalities</li>
<li><p>I just remind the scope of this small tool:</p>

<ul><li>allow you to pre-define several cable or wifi connections</li>
<li>let nmctl to connect automatically to the first available one</li>
<li>allow you to easily switch from one network connection to an other one</li>
<li>create openbox dynamic menus</li></ul></li>
<li><p>Enhancements in this version</p></li>
</ul>

<blockquote>
  <p>This is my second development version: 0.2.
  I've added performed several changes in the code:</p>
</blockquote>

<ul>
<li>code style cleanup, to better match the python recommendations</li>
<li>adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels</li>
<li>implement a loop as work-around concerning the arp table issue.</li>
</ul>

<blockquote>
  <p>The source code is still on the git of Sourceforge.net. 
   You can see the files <a href="https://sourceforge.net/p/nmctl/code/ci/master/tree/">here</a></p>
  
  <p>And you can download the last version <a href="https://sourceforge.net/p/nmctl/code/ci/master/tarball">here</a></p>
</blockquote>

<ul>
<li>Feedbacks after few months</li>
</ul>

<blockquote>
  <p>I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option.</p>
</blockquote>

<ul>
<li>The Openbox menus</li>
</ul>

<blockquote>
  <p>The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options.
  I've not changed this part of nmctl since it works as expected (for me :-) ).</p>
</blockquote>

<ul>
<li>The --restart option</li>
</ul>

<blockquote>
  <p>Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. 
  In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me.
  But I had several issues in this scenario.
  Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing.
  Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters.
  If you want to reduce or increase this figures, you can do it via the --retry parameter.</p>
</blockquote>

<ul>
<li>Results of my expertise with this small tool</li>
</ul>

<blockquote>
  <p>Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location.
  Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable.
  Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-).
  I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan".</p>
</blockquote>

<ul>
<li><p>Next steps</p></li>
<li><p>Documentation</p></li>
</ul>

<blockquote>
  <p>The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same.
  I plan to write a README and a man page at first instances.
  But since my laziness, I will do it as soon as I see some interest for this tool from other persons.</p>
</blockquote>

<ul>
<li>Tests</li>
</ul>

<blockquote>
  <p>I now have to travel and see how to see the script react on the different situations.
  Interested persons are welcome to share with me the outcome of their tests.
  I'm curious how it work.</p>
</blockquote>

<p><hr /></p>

<h3><a href="https://an.undulating.space/post/180411-erl-openbsd-upgrade/">OpenBSD 6.3 on EdgeRouter Lite simple upgrade method</a></h3>

<ul>
<li>TL;DR</li>
</ul>

<blockquote>
  <p>OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on.
  Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it.</p>
</blockquote>

<ul>
<li>a tiny upgrade</li>
</ul>

<blockquote>
  <p>The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3.
  The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention:
  The best solution, whenever possible, is to backup your data and reinstall from scratch
  I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism.</p>
</blockquote>

<ul>
<li>Reading on:</li>
</ul>

<blockquote>
  <p>To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD".
  But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it.
  But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade.
  Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once.
  So I don’t want to futz around with all that.
  There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right?</p>
</blockquote>

<p><hr /></p>

<p><strong>iXsystems</strong>
<a href="https://www.ixsystems.com/blog/boisetechshow-2018/">Boise Technology Show 2018 Recap</a></p>

<h3><a href="http://zfs.datto.com/">OpenZFS User Conference Slides &amp; Videos</a></h3>

<ul>
<li><a href="https://vimeo.com/album/5150026/video/266112599">Thank you ZFS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112475">ZSTD Compression</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111164">Pool Layout Considerations</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111346">ZFS Releases</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112077">Helping Developers Help You</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112233">ZFS and MySQL on Linux</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266110985">Micron</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266108105">OSNEXUS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107946">ZFS at Six Feet Up</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107372">Flexible Disk Use with OpenZFS</a></li>
</ul>

<p><hr /></p>

<h3><a href="https://jvns.ca/blog/2018/05/11/batch-editing-files-with-ed/">Batch editing files with ed</a></h3>

<ul>
<li>what’s ‘ed’?</li>
</ul>

<blockquote>
  <p>ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this:</p>
</blockquote>

<p><code>
$ ed
help
?
h
?
asdfasdfasdfsadf
?
&lt;close terminal in frustration&gt;
</code></p>

<blockquote>
  <p>Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today.
  vi is a successor to ed, except with a visual interface instead of this ?</p>
</blockquote>

<ul>
<li>surprise: Ed is actually sort of cool and fun</li>
</ul>

<blockquote>
  <p>So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!!
  On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true.
  And it was so cool!!!! I found out:</p>
</blockquote>

<ul>
<li>how to get Ed to give you better error messages than just ?</li>
<li>that the name of the grep command comes from ed syntax (g/re/p)</li>
<li>the basics of how to navigate and edit files using ed</li>
</ul>

<blockquote>
  <p>All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!!</p>
  
  <p>The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files.</p>
</blockquote>

<p><hr /></p>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://blather.michaelwlucas.com/archives/3186">FreeBSD Mastery: Jails -- Help make it happen </a></li>
<li><a href="https://www.youtube.com/watch?v=MsY-BafQgj4">Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018</a></li>
<li><a href="https://www.dragonflydigest.com/2018/05/17/21257.html">DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT</a></li>
<li><a href="https://www.reddit.com/r/openbsd/comments/8ei00k/a_love_letter_to_openbsd/">A Love Letter to OpenBSD</a></li>
<li><a href="https://blather.michaelwlucas.com/archives/3176">New talks, and the F-bomb</a></li>
<li><a href="https://manpages.bsd.lv/mdoc.html">Practical UNIX Manuals: mdoc</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2018-May/004758.html">BSD Meetup in Zurich: May 24th</a></li>
<li><a href="https://www.eventbrite.com/e/the-polish-bsd-user-group-1-meetup-tickets-45941857332">BSD Meetup in Warsaw: May 24th</a></li>
<li><a href="http://meetbsd.com/">MeetBSD 2018</a></li>
</ul>

<p><hr /></p>

<p><strong>Tarsnap</strong></p>

<h2>Feedback/Questions</h2>

<ul>
<li>Seth - <a href="http://dpaste.com/12R65X4#wrap">First time poudriere Builder</a></li>
<li>Farhan - <a href="http://dpaste.com/1GHCGY5#wrap">Why we didn't go FreeBSD</a></li>
<li>architech - <a href="http://dpaste.com/1H72FGE#wrap">Encryption Feedback</a></li>
<li>Dave - <a href="http://dpaste.com/27YH93Y#wrap">Handy Tip on setting up automated coredump handling for FreeBSD</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>104: Beverly Hills 25519</title>
  <link>https://www.bsdnow.tv/104</link>
  <guid isPermaLink="false">0bc0c068-36fe-429f-b7f4-38ac01fb7f19</guid>
  <pubDate>Wed, 26 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0bc0c068-36fe-429f-b7f4-38ac01fb7f19.mp3" length="58136116" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we'll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</itunes:subtitle>
  <itunes:duration>1:20:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week on the show, we'll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" target="_blank" rel="nofollow noopener"&gt;EdgeRouter Lite, meet OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it &lt;/li&gt;
&lt;li&gt;We've covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)&lt;/li&gt;
&lt;li&gt;Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it&lt;/li&gt;
&lt;li&gt;He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware&lt;/li&gt;
&lt;li&gt;More discussion can be found &lt;a href="https://news.ycombinator.com/item?id=10079210" target="_blank" rel="nofollow noopener"&gt;on Hacker News&lt;/a&gt; and &lt;a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" target="_blank" rel="nofollow noopener"&gt;various&lt;/a&gt; &lt;a href="https://www.marc.info/?t=143974140500001&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;other&lt;/a&gt; &lt;a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" target="_blank" rel="nofollow noopener"&gt;places&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;One thing to &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143991822827285&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;note&lt;/a&gt; about these devices: because of their MIPS64 processor, they'll have weaker ASLR than X86 CPUs (and no W&lt;sup&gt;X&lt;/sup&gt; at all)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.infoq.com/articles/freebsd-design-implementation-review" target="_blank" rel="nofollow noopener"&gt;Design and Implementation of the FreeBSD Operating System interview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For those who don't know, the "Design and Implementation of the FreeBSD Operating System" is a semi-recently-revived technical reference book for FreeBSD development&lt;/li&gt;
&lt;li&gt;InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors&lt;/li&gt;
&lt;li&gt;"The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points."&lt;/li&gt;
&lt;li&gt;Aside from detailing a few of the chapters, the interview covers who the book's target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144027474117290&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Path list parameter in OpenBSD tame&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've mentioned OpenBSD's relatively new "&lt;a href="https://marc.info/?l=openbsd-tech&amp;amp;m=143725996614627&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;tame&lt;/a&gt;" subsystem a couple times before: it's an easy-to-implement "self-containment" framework, allowing programs to have a reduced feature set mode with even less privileges&lt;/li&gt;
&lt;li&gt;One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between&lt;/li&gt;
&lt;li&gt;Now there's the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers&lt;/li&gt;
&lt;li&gt;The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9&lt;/li&gt;
&lt;li&gt;More discussion can be found &lt;a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" target="_blank" rel="nofollow noopener"&gt;on Reddit&lt;/a&gt; &lt;a href="https://news.ycombinator.com/item?id=10104886" target="_blank" rel="nofollow noopener"&gt;and Hacker News&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/10.2R/announce.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD &amp;amp; PC-BSD 10.2-RELEASE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out&lt;/li&gt;
&lt;li&gt;The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13&lt;/li&gt;
&lt;li&gt;New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to&lt;/li&gt;
&lt;li&gt;A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet&lt;/li&gt;
&lt;li&gt;The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions&lt;/li&gt;
&lt;li&gt;ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards&lt;/li&gt;
&lt;li&gt;The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups&lt;/li&gt;
&lt;li&gt;In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail&lt;/li&gt;
&lt;li&gt;Check the &lt;a href="https://www.freebsd.org/releases/10.2R/relnotes.html" target="_blank" rel="nofollow noopener"&gt;full release notes&lt;/a&gt; for the rest of the details and changes&lt;/li&gt;
&lt;li&gt;PC-BSD also followed with &lt;a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" target="_blank" rel="nofollow noopener"&gt;their 10.2-RELEASE&lt;/a&gt;, sporting a few more additional features
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Damien Miller - &lt;a href="mailto:djm@openbsd.org" target="_blank" rel="nofollow noopener"&gt;djm@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/damienmiller" target="_blank" rel="nofollow noopener"&gt;@damienmiller&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenSSH: phasing out broken crypto, default cipher changes&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference Shimane&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We weren't the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another&lt;/li&gt;
&lt;li&gt;This time they had NetBSD running on some Sony NWS devices (MIPS-based)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/JavaStation" target="_blank" rel="nofollow noopener"&gt;JavaStations&lt;/a&gt; were also on display - something we haven't ever seen before (made between 1996-2000)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=-XF20nitI90" target="_blank" rel="nofollow noopener"&gt;BAFUG videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Bay Area FreeBSD users group has been uploading some videos of their recent meetings&lt;/li&gt;
&lt;li&gt;Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works&lt;/li&gt;
&lt;li&gt;Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts&lt;/li&gt;
&lt;li&gt;In &lt;a href="https://www.youtube.com/watch?v=49sPYHh473U" target="_blank" rel="nofollow noopener"&gt;a second video&lt;/a&gt;, Jordan Hubbard and Kip Macy introduce "NeXTBSD aka FreeBSD X"&lt;/li&gt;
&lt;li&gt;In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)&lt;/li&gt;
&lt;li&gt;People should record presentations at their BSD users groups and send them to us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" target="_blank" rel="nofollow noopener"&gt;L2TP over IPSEC on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well&lt;/li&gt;
&lt;li&gt;Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic&lt;/li&gt;
&lt;li&gt;This guide specifically covers L2TP, using npppd and pre-shared keys&lt;/li&gt;
&lt;li&gt;Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" target="_blank" rel="nofollow noopener"&gt;Reliable bare metal with TrueOS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Imagine a server version of PC-BSD with some useful utilities preinstalled - that's basically TrueOS&lt;/li&gt;
&lt;li&gt;This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution&lt;/li&gt;
&lt;li&gt;Most importantly, he also covers how to keep everything redundant and deal with hard drives failing&lt;/li&gt;
&lt;li&gt;The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he'd like&lt;/li&gt;
&lt;li&gt;Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144047868127049&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Kernel W&lt;sup&gt;X&lt;/sup&gt; on i386&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned some big W&lt;sup&gt;X&lt;/sup&gt; kernel changes in OpenBSD &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;a while back&lt;/a&gt;, but the work was mainly for x86_64 CPU architecture (which makes sense; that's what most people run now)&lt;/li&gt;
&lt;li&gt;Mike Larkin is back again, and isn't leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well&lt;/li&gt;
&lt;li&gt;Check out &lt;a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" target="_blank" rel="nofollow noopener"&gt;our interview with Mike&lt;/a&gt; for some more background info on memory protections like W&lt;sup&gt;X&lt;/sup&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2iGoeYMyb" target="_blank" rel="nofollow noopener"&gt;Markus writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21bIFfmUS" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21Hjm8Tsa" target="_blank" rel="nofollow noopener"&gt;Theo writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssh, openssl, chacha20, chacha20-poly1305, aes, md5, hmac, cbc, gcm, cryptography, ed25519, curve25519, erl, edgerouter lite, tame, bafug</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" rel="nofollow">EdgeRouter Lite, meet OpenBSD</a></h3>

<ul>
<li>The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it </li>
<li>We&#39;ve covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)</li>
<li>Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it</li>
<li>He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10079210" rel="nofollow">on Hacker News</a> and <a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" rel="nofollow">various</a> <a href="https://www.marc.info/?t=143974140500001&r=1&w=2" rel="nofollow">other</a> <a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" rel="nofollow">places</a></li>
<li>One thing to <a href="https://www.marc.info/?l=openbsd-misc&m=143991822827285&w=2" rel="nofollow">note</a> about these devices: because of their MIPS64 processor, they&#39;ll have weaker ASLR than X86 CPUs (and no W<sup>X</sup> at all)
***</li>
</ul>

<h3><a href="http://www.infoq.com/articles/freebsd-design-implementation-review" rel="nofollow">Design and Implementation of the FreeBSD Operating System interview</a></h3>

<ul>
<li>For those who don&#39;t know, the &quot;Design and Implementation of the FreeBSD Operating System&quot; is a semi-recently-revived technical reference book for FreeBSD development</li>
<li>InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors</li>
<li>&quot;The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points.&quot;</li>
<li>Aside from detailing a few of the chapters, the interview covers who the book&#39;s target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144027474117290&w=2" rel="nofollow">Path list parameter in OpenBSD tame</a></h3>

<ul>
<li>We&#39;ve mentioned OpenBSD&#39;s relatively new &quot;<a href="https://marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">tame</a>&quot; subsystem a couple times before: it&#39;s an easy-to-implement &quot;self-containment&quot; framework, allowing programs to have a reduced feature set mode with even less privileges</li>
<li>One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between</li>
<li>Now there&#39;s the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers</li>
<li>The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9</li>
<li>More discussion can be found <a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" rel="nofollow">on Reddit</a> <a href="https://news.ycombinator.com/item?id=10104886" rel="nofollow">and Hacker News</a>
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.2R/announce.html" rel="nofollow">FreeBSD &amp; PC-BSD 10.2-RELEASE</a></h3>

<ul>
<li>The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out</li>
<li>The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13</li>
<li>New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to</li>
<li>A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet</li>
<li>The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions</li>
<li>ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards</li>
<li>The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups</li>
<li>In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.2R/relnotes.html" rel="nofollow">full release notes</a> for the rest of the details and changes</li>
<li>PC-BSD also followed with <a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" rel="nofollow">their 10.2-RELEASE</a>, sporting a few more additional features
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>OpenSSH: phasing out broken crypto, default cipher changes</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" rel="nofollow">NetBSD at Open Source Conference Shimane</a></h3>

<ul>
<li>We weren&#39;t the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another</li>
<li>This time they had NetBSD running on some Sony NWS devices (MIPS-based)</li>
<li><a href="https://en.wikipedia.org/wiki/JavaStation" rel="nofollow">JavaStations</a> were also on display - something we haven&#39;t ever seen before (made between 1996-2000)
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=-XF20nitI90" rel="nofollow">BAFUG videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos of their recent meetings</li>
<li>Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works</li>
<li>Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts</li>
<li>In <a href="https://www.youtube.com/watch?v=49sPYHh473U" rel="nofollow">a second video</a>, Jordan Hubbard and Kip Macy introduce &quot;NeXTBSD aka FreeBSD X&quot;</li>
<li>In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)</li>
<li>People should record presentations at their BSD users groups and send them to us
***</li>
</ul>

<h3><a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" rel="nofollow">L2TP over IPSEC on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well</li>
<li>Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic</li>
<li>This guide specifically covers L2TP, using npppd and pre-shared keys</li>
<li>Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***</li>
</ul>

<h3><a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" rel="nofollow">Reliable bare metal with TrueOS</a></h3>

<ul>
<li>Imagine a server version of PC-BSD with some useful utilities preinstalled - that&#39;s basically TrueOS</li>
<li>This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution</li>
<li>Most importantly, he also covers how to keep everything redundant and deal with hard drives failing</li>
<li>The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he&#39;d like</li>
<li>Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144047868127049&w=2" rel="nofollow">Kernel W<sup>X</sup> on i386</a></h3>

<ul>
<li>We mentioned some big W<sup>X</sup> kernel changes in OpenBSD <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">a while back</a>, but the work was mainly for x86_64 CPU architecture (which makes sense; that&#39;s what most people run now)</li>
<li>Mike Larkin is back again, and isn&#39;t leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well</li>
<li>Check out <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">our interview with Mike</a> for some more background info on memory protections like W<sup>X</sup>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iGoeYMyb" rel="nofollow">Markus writes in</a></li>
<li><a href="http://slexy.org/view/s21bIFfmUS" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21Hjm8Tsa" rel="nofollow">Theo writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" rel="nofollow">EdgeRouter Lite, meet OpenBSD</a></h3>

<ul>
<li>The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it </li>
<li>We&#39;ve covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)</li>
<li>Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it</li>
<li>He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10079210" rel="nofollow">on Hacker News</a> and <a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" rel="nofollow">various</a> <a href="https://www.marc.info/?t=143974140500001&r=1&w=2" rel="nofollow">other</a> <a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" rel="nofollow">places</a></li>
<li>One thing to <a href="https://www.marc.info/?l=openbsd-misc&m=143991822827285&w=2" rel="nofollow">note</a> about these devices: because of their MIPS64 processor, they&#39;ll have weaker ASLR than X86 CPUs (and no W<sup>X</sup> at all)
***</li>
</ul>

<h3><a href="http://www.infoq.com/articles/freebsd-design-implementation-review" rel="nofollow">Design and Implementation of the FreeBSD Operating System interview</a></h3>

<ul>
<li>For those who don&#39;t know, the &quot;Design and Implementation of the FreeBSD Operating System&quot; is a semi-recently-revived technical reference book for FreeBSD development</li>
<li>InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors</li>
<li>&quot;The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points.&quot;</li>
<li>Aside from detailing a few of the chapters, the interview covers who the book&#39;s target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144027474117290&w=2" rel="nofollow">Path list parameter in OpenBSD tame</a></h3>

<ul>
<li>We&#39;ve mentioned OpenBSD&#39;s relatively new &quot;<a href="https://marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">tame</a>&quot; subsystem a couple times before: it&#39;s an easy-to-implement &quot;self-containment&quot; framework, allowing programs to have a reduced feature set mode with even less privileges</li>
<li>One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between</li>
<li>Now there&#39;s the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers</li>
<li>The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9</li>
<li>More discussion can be found <a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" rel="nofollow">on Reddit</a> <a href="https://news.ycombinator.com/item?id=10104886" rel="nofollow">and Hacker News</a>
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.2R/announce.html" rel="nofollow">FreeBSD &amp; PC-BSD 10.2-RELEASE</a></h3>

<ul>
<li>The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out</li>
<li>The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13</li>
<li>New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to</li>
<li>A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet</li>
<li>The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions</li>
<li>ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards</li>
<li>The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups</li>
<li>In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.2R/relnotes.html" rel="nofollow">full release notes</a> for the rest of the details and changes</li>
<li>PC-BSD also followed with <a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" rel="nofollow">their 10.2-RELEASE</a>, sporting a few more additional features
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>OpenSSH: phasing out broken crypto, default cipher changes</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" rel="nofollow">NetBSD at Open Source Conference Shimane</a></h3>

<ul>
<li>We weren&#39;t the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another</li>
<li>This time they had NetBSD running on some Sony NWS devices (MIPS-based)</li>
<li><a href="https://en.wikipedia.org/wiki/JavaStation" rel="nofollow">JavaStations</a> were also on display - something we haven&#39;t ever seen before (made between 1996-2000)
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=-XF20nitI90" rel="nofollow">BAFUG videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos of their recent meetings</li>
<li>Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works</li>
<li>Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts</li>
<li>In <a href="https://www.youtube.com/watch?v=49sPYHh473U" rel="nofollow">a second video</a>, Jordan Hubbard and Kip Macy introduce &quot;NeXTBSD aka FreeBSD X&quot;</li>
<li>In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)</li>
<li>People should record presentations at their BSD users groups and send them to us
***</li>
</ul>

<h3><a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" rel="nofollow">L2TP over IPSEC on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well</li>
<li>Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic</li>
<li>This guide specifically covers L2TP, using npppd and pre-shared keys</li>
<li>Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***</li>
</ul>

<h3><a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" rel="nofollow">Reliable bare metal with TrueOS</a></h3>

<ul>
<li>Imagine a server version of PC-BSD with some useful utilities preinstalled - that&#39;s basically TrueOS</li>
<li>This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution</li>
<li>Most importantly, he also covers how to keep everything redundant and deal with hard drives failing</li>
<li>The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he&#39;d like</li>
<li>Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144047868127049&w=2" rel="nofollow">Kernel W<sup>X</sup> on i386</a></h3>

<ul>
<li>We mentioned some big W<sup>X</sup> kernel changes in OpenBSD <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">a while back</a>, but the work was mainly for x86_64 CPU architecture (which makes sense; that&#39;s what most people run now)</li>
<li>Mike Larkin is back again, and isn&#39;t leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well</li>
<li>Check out <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">our interview with Mike</a> for some more background info on memory protections like W<sup>X</sup>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iGoeYMyb" rel="nofollow">Markus writes in</a></li>
<li><a href="http://slexy.org/view/s21bIFfmUS" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21Hjm8Tsa" rel="nofollow">Theo writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>89: Exclusive Disjunction</title>
  <link>https://www.bsdnow.tv/89</link>
  <guid isPermaLink="false">e47f088b-2b32-4187-92cd-0f4be4f1426e</guid>
  <pubDate>Wed, 13 May 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e47f088b-2b32-4187-92cd-0f4be4f1426e.mp3" length="45530932" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking to Mike Larkin about various memory protections in OpenBSD. We'll cover recent W^X improvements, SSP, ASLR, PIE and all kinds of acronyms! We've also got a bunch of news and answers to your questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:03:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be talking to Mike Larkin about various memory protections in OpenBSD. We'll cover recent W&lt;sup&gt;X&lt;/sup&gt; improvements, SSP, ASLR, PIE and all kinds of acronyms! We've also got a bunch of news and answers to your questions, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/05/accept-from-any-for-any-relay-via.html" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD for the whole family&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Setting up a BSD mail server is something a lot of us are probably familiar with doing, at least for our own accounts&lt;/li&gt;
&lt;li&gt;This article talks about configuring a home mail server too, but even for the other people you live with&lt;/li&gt;
&lt;li&gt;After convincing his wife to use their BSD-based Owncloud server for backups, the author talks about moving her over to his brand new OpenSMTPD server too&lt;/li&gt;
&lt;li&gt;If you've ever run a mail server and had to deal with greylisting, you'll appreciate the struggle he went through&lt;/li&gt;
&lt;li&gt;In the end, BGP-based list distribution saved the day, and his family is being served well by a BSD box
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/hands_on_experience_with_edgerouter" target="_blank" rel="nofollow noopener"&gt;NetBSD on the Edgerouter Lite&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked a lot about building your own BSD-based router on the show, but not many of the devices we mention are in the same price range as consumer devices&lt;/li&gt;
&lt;li&gt;The EdgeRouter Lite, a small MIPS-powered machine, is starting to become popular (and is a bit cheaper)&lt;/li&gt;
&lt;li&gt;A NetBSD developer has been hacking on it, and documents the steps to get a working install in this blog post&lt;/li&gt;
&lt;li&gt;The process is fairly simple, and you can &lt;a href="http://www.bsdnow.tv/tutorials/current-nbsd" target="_blank" rel="nofollow noopener"&gt;cross-compile&lt;/a&gt; your own installation image on any CPU architecture (even from another BSD!)&lt;/li&gt;
&lt;li&gt;OpenBSD and FreeBSD also have &lt;a href="http://www.openbsd.org/octeon.html" target="_blank" rel="nofollow noopener"&gt;some&lt;/a&gt; &lt;a href="http://rtfm.net/FreeBSD/ERL/" target="_blank" rel="nofollow noopener"&gt;support&lt;/a&gt; for these devices
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=h4FhgBdYSUU" target="_blank" rel="nofollow noopener"&gt;Bitrig at NYC*BUG&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The New York City BSD users group has semi-regular meetings with presentations, and this time the speaker was John Vernaleo&lt;/li&gt;
&lt;li&gt;John discussed &lt;a href="http://www.bsdnow.tv/episodes/2014_12_10-must_be_rigged" target="_blank" rel="nofollow noopener"&gt;Bitrig&lt;/a&gt;, an OpenBSD fork that we've talked about a couple times on the show&lt;/li&gt;
&lt;li&gt;He talks about what they've been up to lately, why they're doing what they're doing, difference in supported platforms&lt;/li&gt;
&lt;li&gt;Ports and packages between the two projects are almost exactly the same, but he covers the differences in the base systems, how (some) patches get shared between the two and finally some development model differences
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" target="_blank" rel="nofollow noopener"&gt;OPNsense, meet HardenedBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Speaking of forks, two FreeBSD-based forked projects we've mentioned on the show, &lt;a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" target="_blank" rel="nofollow noopener"&gt;HardenedBSD&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;OPNsense&lt;/a&gt;, have decided to join forces&lt;/li&gt;
&lt;li&gt;Backporting their changes to the 10-STABLE branch, HardenedBSD hopes to introduce some of their security additions to the OPNsense codebase&lt;/li&gt;
&lt;li&gt;Paired up with LibreSSL, this combination should offer a good solution for anyone wanting a BSD-based firewall with an easy web interface&lt;/li&gt;
&lt;li&gt;We'll cover more news on the collaboration as it comes out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Mike Larkin - &lt;a href="mailto:mlarkin@openbsd.org" target="_blank" rel="nofollow noopener"&gt;mlarkin@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/mlarkin2012" target="_blank" rel="nofollow noopener"&gt;@mlarkin2012&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Memory protections in OpenBSD: &lt;a href="https://en.wikipedia.org/wiki/W%5EX" target="_blank" rel="nofollow noopener"&gt;W&lt;sup&gt;X&lt;/sup&gt;&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" target="_blank" rel="nofollow noopener"&gt;ASLR&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Position-independent_code" target="_blank" rel="nofollow noopener"&gt;PIE&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" target="_blank" rel="nofollow noopener"&gt;SSP&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.techopedia.com/2/31035/software/a-closer-look-at-freebsd" target="_blank" rel="nofollow noopener"&gt;A closer look at FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The week wouldn't be complete without at least one BSD article making it to a mainstream tech site&lt;/li&gt;
&lt;li&gt;This time, it's a high-level overview of FreeBSD, some of its features and where it's used&lt;/li&gt;
&lt;li&gt;Being that it's an overview article on a more mainstream site, you won't find anything too technical - it covers some BSD history, stability, ZFS, LLVM and Clang, ports and packages, jails and the licensing&lt;/li&gt;
&lt;li&gt;If you have any BSD-curious Linux friends, this might be a good one to send to them
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ramblingfoo.blogspot.com/2015/05/linksys-nslu2-adventures-into-netbsd.html" target="_blank" rel="nofollow noopener"&gt;Linksys NSLU2 and NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Linksys NSLU2 is a proprietary network-attached storage device introduced back in 2004&lt;/li&gt;
&lt;li&gt;"About 2 months ago I set a goal to run some kind of BSD on the spare Linksys NSLU2 I had. This was driven mostly by curiosity, after listening to a few BSDNow episodes and becoming a regular listener [...]"&lt;/li&gt;
&lt;li&gt;After doing some research, the author of this post discovered that he could cross-compile NetBSD for the device straight from his Linux box&lt;/li&gt;
&lt;li&gt;If you've got one of these old devices kicking around, check out this write-up and get some BSD action on there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.jeffreyforman.net/2015/05/09/from-0-to-an-openbsd-install-with-no-hands-and-a-custom-disk-layou" target="_blank" rel="nofollow noopener"&gt;OpenBSD disklabel templates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've covered OpenBSD's "autoinstall" feature for unattended installations in the past, but one area where it didn't offer a lot of customization was with the disk layout&lt;/li&gt;
&lt;li&gt;With a few &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150505123418" target="_blank" rel="nofollow noopener"&gt;recent changes&lt;/a&gt;, there are now a series of templates you can use for a completely customized partition scheme&lt;/li&gt;
&lt;li&gt;This article takes you through the process of configuring an autoinstall answer file and adding the new section for disklabel&lt;/li&gt;
&lt;li&gt;Combine this new feature with our &lt;a href="http://www.bsdnow.tv/tutorials/stable-iso" target="_blank" rel="nofollow noopener"&gt;-stable iso tutorial&lt;/a&gt;, and you could deploy completely patched and customized images en masse pretty easily
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=282693" target="_blank" rel="nofollow noopener"&gt;FreeBSD native ARM builds&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD -CURRENT builds for the ARM CPU architecture can now be built natively, without utilities that aren't part of base&lt;/li&gt;
&lt;li&gt;Some of the older board-specific kernel configuration files have been replaced, and now the "IMC6" target is used&lt;/li&gt;
&lt;li&gt;This goes along with what we read in the most recent quarterly status report - ARM is starting to get treated as a first class citizen
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2088U2OjO" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s29ZKhQKOz" target="_blank" rel="nofollow noopener"&gt;Ron writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2NCVHEKt1" target="_blank" rel="nofollow noopener"&gt;Charles writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2mGRoKo5G" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, verisign, vbsdcon, 2015, presentations, talks, w^x, aslr, pie, ssp, stack smashing, gcc, exploit mitigation, security, edgerouter lite, opnsense, hardenedbsd, bitrig</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Mike Larkin about various memory protections in OpenBSD. We&#39;ll cover recent W<sup>X</sup> improvements, SSP, ASLR, PIE and all kinds of acronyms! We&#39;ve also got a bunch of news and answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/05/accept-from-any-for-any-relay-via.html" rel="nofollow">OpenSMTPD for the whole family</a></h3>

<ul>
<li>Setting up a BSD mail server is something a lot of us are probably familiar with doing, at least for our own accounts</li>
<li>This article talks about configuring a home mail server too, but even for the other people you live with</li>
<li>After convincing his wife to use their BSD-based Owncloud server for backups, the author talks about moving her over to his brand new OpenSMTPD server too</li>
<li>If you&#39;ve ever run a mail server and had to deal with greylisting, you&#39;ll appreciate the struggle he went through</li>
<li>In the end, BGP-based list distribution saved the day, and his family is being served well by a BSD box
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/hands_on_experience_with_edgerouter" rel="nofollow">NetBSD on the Edgerouter Lite</a></h3>

<ul>
<li>We&#39;ve talked a lot about building your own BSD-based router on the show, but not many of the devices we mention are in the same price range as consumer devices</li>
<li>The EdgeRouter Lite, a small MIPS-powered machine, is starting to become popular (and is a bit cheaper)</li>
<li>A NetBSD developer has been hacking on it, and documents the steps to get a working install in this blog post</li>
<li>The process is fairly simple, and you can <a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">cross-compile</a> your own installation image on any CPU architecture (even from another BSD!)</li>
<li>OpenBSD and FreeBSD also have <a href="http://www.openbsd.org/octeon.html" rel="nofollow">some</a> <a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">support</a> for these devices
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=h4FhgBdYSUU" rel="nofollow">Bitrig at NYC*BUG</a></h3>

<ul>
<li>The New York City BSD users group has semi-regular meetings with presentations, and this time the speaker was John Vernaleo</li>
<li>John discussed <a href="http://www.bsdnow.tv/episodes/2014_12_10-must_be_rigged" rel="nofollow">Bitrig</a>, an OpenBSD fork that we&#39;ve talked about a couple times on the show</li>
<li>He talks about what they&#39;ve been up to lately, why they&#39;re doing what they&#39;re doing, difference in supported platforms</li>
<li>Ports and packages between the two projects are almost exactly the same, but he covers the differences in the base systems, how (some) patches get shared between the two and finally some development model differences
***</li>
</ul>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" rel="nofollow">OPNsense, meet HardenedBSD</a></h3>

<ul>
<li>Speaking of forks, two FreeBSD-based forked projects we&#39;ve mentioned on the show, <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">HardenedBSD</a> and <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a>, have decided to join forces</li>
<li>Backporting their changes to the 10-STABLE branch, HardenedBSD hopes to introduce some of their security additions to the OPNsense codebase</li>
<li>Paired up with LibreSSL, this combination should offer a good solution for anyone wanting a BSD-based firewall with an easy web interface</li>
<li>We&#39;ll cover more news on the collaboration as it comes out
***</li>
</ul>

<h2>Interview - Mike Larkin - <a href="mailto:mlarkin@openbsd.org" rel="nofollow">mlarkin@openbsd.org</a> / <a href="https://twitter.com/mlarkin2012" rel="nofollow">@mlarkin2012</a></h2>

<p>Memory protections in OpenBSD: <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup></a>, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">ASLR</a>, <a href="https://en.wikipedia.org/wiki/Position-independent_code" rel="nofollow">PIE</a>, <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">SSP</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.techopedia.com/2/31035/software/a-closer-look-at-freebsd" rel="nofollow">A closer look at FreeBSD</a></h3>

<ul>
<li>The week wouldn&#39;t be complete without at least one BSD article making it to a mainstream tech site</li>
<li>This time, it&#39;s a high-level overview of FreeBSD, some of its features and where it&#39;s used</li>
<li>Being that it&#39;s an overview article on a more mainstream site, you won&#39;t find anything too technical - it covers some BSD history, stability, ZFS, LLVM and Clang, ports and packages, jails and the licensing</li>
<li>If you have any BSD-curious Linux friends, this might be a good one to send to them
***</li>
</ul>

<h3><a href="http://ramblingfoo.blogspot.com/2015/05/linksys-nslu2-adventures-into-netbsd.html" rel="nofollow">Linksys NSLU2 and NetBSD</a></h3>

<ul>
<li>The Linksys NSLU2 is a proprietary network-attached storage device introduced back in 2004</li>
<li>&quot;About 2 months ago I set a goal to run some kind of BSD on the spare Linksys NSLU2 I had. This was driven mostly by curiosity, after listening to a few BSDNow episodes and becoming a regular listener [...]&quot;</li>
<li>After doing some research, the author of this post discovered that he could cross-compile NetBSD for the device straight from his Linux box</li>
<li>If you&#39;ve got one of these old devices kicking around, check out this write-up and get some BSD action on there
***</li>
</ul>

<h3><a href="http://blog.jeffreyforman.net/2015/05/09/from-0-to-an-openbsd-install-with-no-hands-and-a-custom-disk-layou" rel="nofollow">OpenBSD disklabel templates</a></h3>

<ul>
<li>We&#39;ve covered OpenBSD&#39;s &quot;autoinstall&quot; feature for unattended installations in the past, but one area where it didn&#39;t offer a lot of customization was with the disk layout</li>
<li>With a few <a href="http://undeadly.org/cgi?action=article&sid=20150505123418" rel="nofollow">recent changes</a>, there are now a series of templates you can use for a completely customized partition scheme</li>
<li>This article takes you through the process of configuring an autoinstall answer file and adding the new section for disklabel</li>
<li>Combine this new feature with our <a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">-stable iso tutorial</a>, and you could deploy completely patched and customized images en masse pretty easily
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=282693" rel="nofollow">FreeBSD native ARM builds</a></h3>

<ul>
<li>FreeBSD -CURRENT builds for the ARM CPU architecture can now be built natively, without utilities that aren&#39;t part of base</li>
<li>Some of the older board-specific kernel configuration files have been replaced, and now the &quot;IMC6&quot; target is used</li>
<li>This goes along with what we read in the most recent quarterly status report - ARM is starting to get treated as a first class citizen
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2088U2OjO" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s29ZKhQKOz" rel="nofollow">Ron writes in</a></li>
<li><a href="http://slexy.org/view/s2NCVHEKt1" rel="nofollow">Charles writes in</a></li>
<li><a href="http://slexy.org/view/s2mGRoKo5G" rel="nofollow">Bostjan writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Mike Larkin about various memory protections in OpenBSD. We&#39;ll cover recent W<sup>X</sup> improvements, SSP, ASLR, PIE and all kinds of acronyms! We&#39;ve also got a bunch of news and answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/05/accept-from-any-for-any-relay-via.html" rel="nofollow">OpenSMTPD for the whole family</a></h3>

<ul>
<li>Setting up a BSD mail server is something a lot of us are probably familiar with doing, at least for our own accounts</li>
<li>This article talks about configuring a home mail server too, but even for the other people you live with</li>
<li>After convincing his wife to use their BSD-based Owncloud server for backups, the author talks about moving her over to his brand new OpenSMTPD server too</li>
<li>If you&#39;ve ever run a mail server and had to deal with greylisting, you&#39;ll appreciate the struggle he went through</li>
<li>In the end, BGP-based list distribution saved the day, and his family is being served well by a BSD box
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/hands_on_experience_with_edgerouter" rel="nofollow">NetBSD on the Edgerouter Lite</a></h3>

<ul>
<li>We&#39;ve talked a lot about building your own BSD-based router on the show, but not many of the devices we mention are in the same price range as consumer devices</li>
<li>The EdgeRouter Lite, a small MIPS-powered machine, is starting to become popular (and is a bit cheaper)</li>
<li>A NetBSD developer has been hacking on it, and documents the steps to get a working install in this blog post</li>
<li>The process is fairly simple, and you can <a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">cross-compile</a> your own installation image on any CPU architecture (even from another BSD!)</li>
<li>OpenBSD and FreeBSD also have <a href="http://www.openbsd.org/octeon.html" rel="nofollow">some</a> <a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">support</a> for these devices
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=h4FhgBdYSUU" rel="nofollow">Bitrig at NYC*BUG</a></h3>

<ul>
<li>The New York City BSD users group has semi-regular meetings with presentations, and this time the speaker was John Vernaleo</li>
<li>John discussed <a href="http://www.bsdnow.tv/episodes/2014_12_10-must_be_rigged" rel="nofollow">Bitrig</a>, an OpenBSD fork that we&#39;ve talked about a couple times on the show</li>
<li>He talks about what they&#39;ve been up to lately, why they&#39;re doing what they&#39;re doing, difference in supported platforms</li>
<li>Ports and packages between the two projects are almost exactly the same, but he covers the differences in the base systems, how (some) patches get shared between the two and finally some development model differences
***</li>
</ul>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" rel="nofollow">OPNsense, meet HardenedBSD</a></h3>

<ul>
<li>Speaking of forks, two FreeBSD-based forked projects we&#39;ve mentioned on the show, <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">HardenedBSD</a> and <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a>, have decided to join forces</li>
<li>Backporting their changes to the 10-STABLE branch, HardenedBSD hopes to introduce some of their security additions to the OPNsense codebase</li>
<li>Paired up with LibreSSL, this combination should offer a good solution for anyone wanting a BSD-based firewall with an easy web interface</li>
<li>We&#39;ll cover more news on the collaboration as it comes out
***</li>
</ul>

<h2>Interview - Mike Larkin - <a href="mailto:mlarkin@openbsd.org" rel="nofollow">mlarkin@openbsd.org</a> / <a href="https://twitter.com/mlarkin2012" rel="nofollow">@mlarkin2012</a></h2>

<p>Memory protections in OpenBSD: <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup></a>, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">ASLR</a>, <a href="https://en.wikipedia.org/wiki/Position-independent_code" rel="nofollow">PIE</a>, <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">SSP</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.techopedia.com/2/31035/software/a-closer-look-at-freebsd" rel="nofollow">A closer look at FreeBSD</a></h3>

<ul>
<li>The week wouldn&#39;t be complete without at least one BSD article making it to a mainstream tech site</li>
<li>This time, it&#39;s a high-level overview of FreeBSD, some of its features and where it&#39;s used</li>
<li>Being that it&#39;s an overview article on a more mainstream site, you won&#39;t find anything too technical - it covers some BSD history, stability, ZFS, LLVM and Clang, ports and packages, jails and the licensing</li>
<li>If you have any BSD-curious Linux friends, this might be a good one to send to them
***</li>
</ul>

<h3><a href="http://ramblingfoo.blogspot.com/2015/05/linksys-nslu2-adventures-into-netbsd.html" rel="nofollow">Linksys NSLU2 and NetBSD</a></h3>

<ul>
<li>The Linksys NSLU2 is a proprietary network-attached storage device introduced back in 2004</li>
<li>&quot;About 2 months ago I set a goal to run some kind of BSD on the spare Linksys NSLU2 I had. This was driven mostly by curiosity, after listening to a few BSDNow episodes and becoming a regular listener [...]&quot;</li>
<li>After doing some research, the author of this post discovered that he could cross-compile NetBSD for the device straight from his Linux box</li>
<li>If you&#39;ve got one of these old devices kicking around, check out this write-up and get some BSD action on there
***</li>
</ul>

<h3><a href="http://blog.jeffreyforman.net/2015/05/09/from-0-to-an-openbsd-install-with-no-hands-and-a-custom-disk-layou" rel="nofollow">OpenBSD disklabel templates</a></h3>

<ul>
<li>We&#39;ve covered OpenBSD&#39;s &quot;autoinstall&quot; feature for unattended installations in the past, but one area where it didn&#39;t offer a lot of customization was with the disk layout</li>
<li>With a few <a href="http://undeadly.org/cgi?action=article&sid=20150505123418" rel="nofollow">recent changes</a>, there are now a series of templates you can use for a completely customized partition scheme</li>
<li>This article takes you through the process of configuring an autoinstall answer file and adding the new section for disklabel</li>
<li>Combine this new feature with our <a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">-stable iso tutorial</a>, and you could deploy completely patched and customized images en masse pretty easily
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=282693" rel="nofollow">FreeBSD native ARM builds</a></h3>

<ul>
<li>FreeBSD -CURRENT builds for the ARM CPU architecture can now be built natively, without utilities that aren&#39;t part of base</li>
<li>Some of the older board-specific kernel configuration files have been replaced, and now the &quot;IMC6&quot; target is used</li>
<li>This goes along with what we read in the most recent quarterly status report - ARM is starting to get treated as a first class citizen
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2088U2OjO" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s29ZKhQKOz" rel="nofollow">Ron writes in</a></li>
<li><a href="http://slexy.org/view/s2NCVHEKt1" rel="nofollow">Charles writes in</a></li>
<li><a href="http://slexy.org/view/s2mGRoKo5G" rel="nofollow">Bostjan writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>25: A Sixth pfSense</title>
  <link>https://www.bsdnow.tv/25</link>
  <guid isPermaLink="false">dad040a2-8866-4876-88fb-43b036b3e691</guid>
  <pubDate>Wed, 19 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dad040a2-8866-4876-88fb-43b036b3e691.mp3" length="48903556" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon and AsiaBSDCon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year, EuroBSDCon will be in September in Sofia, Bulgaria&lt;/li&gt;
&lt;li&gt;They've got a call for papers up now, so everyone can submit the talks they want to present&lt;/li&gt;
&lt;li&gt;There will also be a tutorial section of the conference&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://2014.asiabsdcon.org/timetable.html.en" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon&lt;/a&gt; will be next month, in March!&lt;/li&gt;
&lt;li&gt;All the info about the registration, tutorials, hotels, timetable and location have been posted&lt;/li&gt;
&lt;li&gt;Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://rtfm.net/FreeBSD/ERL/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 on Ubiquiti EdgeRouter Lite&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU&lt;/li&gt;
&lt;li&gt;This article goes through the process of installing and configuring FreeBSD on it to use as a home router&lt;/li&gt;
&lt;li&gt;Lots of good pictures of the hardware and specific details needed to get you set up&lt;/li&gt;
&lt;li&gt;It also includes the scripts to create your own images if you don't want to use the ones rolled by someone else&lt;/li&gt;
&lt;li&gt;For such a cheap price, might be a really fun weekend project to replace your shitty consumer router&lt;/li&gt;
&lt;li&gt;Of course if you're more of an OpenBSD guy, you can always see &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;our tutorial&lt;/a&gt; for that too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.saveosx.org/signed-packages/" target="_blank" rel="nofollow noopener"&gt;Signed pkgsrc package guide&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up&lt;/li&gt;
&lt;li&gt;It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)&lt;/li&gt;
&lt;li&gt;He goes through the process of signing packages with a public key and how to verify the packages when you install them&lt;/li&gt;
&lt;li&gt;The author also happens to be an EdgeBSD developer
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140212083627" target="_blank" rel="nofollow noopener"&gt;Big batch of OpenBSD hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140213065843" target="_blank" rel="nofollow noopener"&gt;the second&lt;/a&gt;, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140213173808" target="_blank" rel="nofollow noopener"&gt;the third&lt;/a&gt;, jsg updated libdrm and mesa and did various work on xenocara&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140214070023" target="_blank" rel="nofollow noopener"&gt;the fourth&lt;/a&gt;, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he's done&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140214130039" target="_blank" rel="nofollow noopener"&gt;the fifth&lt;/a&gt;, claudio talks about some stuff he did for routing tables and misc. other things
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Chris Buechler - &lt;a href="mailto:cmb@pfsense.com" target="_blank" rel="nofollow noopener"&gt;cmb@pfsense.com&lt;/a&gt; / &lt;a href="https://twitter.com/cbuechler" target="_blank" rel="nofollow noopener"&gt;@cbuechler&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;pfSense&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;pfSense walkthrough&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" target="_blank" rel="nofollow noopener"&gt;FreeBSD challenge continues&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy from the Linux foundation continues his switching to BSD journey&lt;/li&gt;
&lt;li&gt;In day 13, he covers some tips for new users, mentions trying things out in a VM first&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" target="_blank" rel="nofollow noopener"&gt;day 14&lt;/a&gt;, he starts setting up XFCE and X11, feels like he's starting over as a new Linux user learning the ropes again - concludes that ports are the way to go&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" target="_blank" rel="nofollow noopener"&gt;day 15&lt;/a&gt;, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" target="_blank" rel="nofollow noopener"&gt;day 16&lt;/a&gt;, he dives into the world of &lt;a href="http://www.bsdnow.tv/tutorials/jails" target="_blank" rel="nofollow noopener"&gt;FreeBSD jails&lt;/a&gt;!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/1962" target="_blank" rel="nofollow noopener"&gt;BSD books in 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSD books are some of the highest quality technical writings available, and MWL has written a good number of them&lt;/li&gt;
&lt;li&gt;In this post, he details some of his plans for 2014&lt;/li&gt;
&lt;li&gt;In includes at least one OpenBSD book, at least one FreeBSD book and...&lt;/li&gt;
&lt;li&gt;Very strong possibility of Absolute FreeBSD 3rd edition (watch &lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;our interview with him&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Check the link for all the details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" target="_blank" rel="nofollow noopener"&gt;How to build FreeBSD/EC2 images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" target="_blank" rel="nofollow noopener"&gt;Colin Percival&lt;/a&gt; details how to build EC2 images in a new blog post&lt;/li&gt;
&lt;li&gt;Most people just use the images he makes on their instances, but some people will want to make their own &lt;a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" target="_blank" rel="nofollow noopener"&gt;from scratch&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;You build a regular disk image and then turn it into an AMI&lt;/li&gt;
&lt;li&gt;It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This time around we discuss how you can become a developer&lt;/li&gt;
&lt;li&gt;Kris also details the length of supported releases&lt;/li&gt;
&lt;li&gt;Expect lots of new features in 10.1
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216xJoCVG" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2gLrR3VVf" target="_blank" rel="nofollow noopener"&gt;Jake writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gfG3Iho" target="_blank" rel="nofollow noopener"&gt;Niclas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JNyw5BCn" target="_blank" rel="nofollow noopener"&gt;Steffan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2kg3zoRfm" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ZwSIfRjm" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pfsense, pf, firewall, gateway, router, hangout, webui, web interface, php, ipfw, ipfilter, gateway, graphs, bandwidth, edgerouter, edgerouter lite, eurobsdcon, eurobsdcon2014, edge router, 2014, books, michael w lucas, freebsd journal, fosdem, asiabsdcon, mips, hackathon, new zealand, pkgsrc, signed packages, edgebsd, smp, ec2, amazon, images, instance, build, custom</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
