<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 09 May 2026 09:17:54 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Encryption”</title>
    <link>https://www.bsdnow.tv/tags/encryption</link>
    <pubDate>Thu, 14 Oct 2021 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>424: Unveiling OpenBSD’s pledge</title>
  <link>https://www.bsdnow.tv/424</link>
  <guid isPermaLink="false">6f778bcb-d4a7-469d-9ec2-8fed7fbe93a1</guid>
  <pubDate>Thu, 14 Oct 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6f778bcb-d4a7-469d-9ec2-8fed7fbe93a1.mp3" length="30778248" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>J language working on OpenBSD, Comparing FreeBSD GELI and OpenZFS encrypted pools, What is FreeBSD, actually?, OpenBSD's pledge and unveil from Python, and more.</itunes:subtitle>
  <itunes:duration>49:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;J language working on OpenBSD, Comparing FreeBSD GELI and OpenZFS encrypted pools, What is FreeBSD, actually?, OpenBSD's pledge and unveil from Python, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://briancallahan.net/blog/20210911.html" target="_blank" rel="nofollow noopener"&gt;I got the J language working on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://rubenerd.com/my-first-prod-encrypted-openzfs-pool/" target="_blank" rel="nofollow noopener"&gt;Rubenerd: Comparing FreeBSD GELI and OpenZFS encrypted pools with keys&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://medium.com/@probonopd/what-is-freebsd-actually-think-again-200c2752d026" target="_blank" rel="nofollow noopener"&gt;What is FreeBSD, actually? Think again.&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://nullprogram.com/blog/2021/09/15/" target="_blank" rel="nofollow noopener"&gt;OpenBSD's pledge and unveil from Python&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;pre&gt;&lt;code&gt;• [Hibernate time reduced](http://undeadly.org/cgi?action=article;sid=20210831050932)
• [(open)rsync gains include/exclude support](http://undeadly.org/cgi?action=article;sid=20210830081715)
• [Producer JT's latest ancient find that he needs help with](https://twitter.com/q5sys/status/1440105555754848257)
• [Doas comes to MidnightBSD](https://github.com/slicer69/doas)
• [FreeBSD SSH Hardening](https://gist.github.com/koobs/e01cf8869484a095605404cd0051eb11)
• [OpenBSD 6.8 and you](https://home.nuug.no/~peter/openbsd_and_you/#1)
• [By default, scp(1) now uses SFTP protocol](https://undeadly.org/cgi?action=article;sid=20210910074941)
• [FreeBSD 11.4 end-of-life](https://lists.freebsd.org/pipermail/freebsd-announce/2021-September/002060.html)
• [sched_ule(4): Improve long-term load balancer](https://cgit.freebsd.org/src/commit/?id=e745d729be60a47b49eb19c02a6864a747fb2744)
&lt;/code&gt;&lt;/pre&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, j language, porting, language port, comparing, comparison, geli, full disk encryption, encryption, pledge, unveil, python   </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>J language working on OpenBSD, Comparing FreeBSD GELI and OpenZFS encrypted pools, What is FreeBSD, actually?, OpenBSD&#39;s pledge and unveil from Python, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210911.html" rel="nofollow">I got the J language working on OpenBSD</a></h3>

<hr>

<h3><a href="https://rubenerd.com/my-first-prod-encrypted-openzfs-pool/" rel="nofollow">Rubenerd: Comparing FreeBSD GELI and OpenZFS encrypted pools with keys</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://medium.com/@probonopd/what-is-freebsd-actually-think-again-200c2752d026" rel="nofollow">What is FreeBSD, actually? Think again.</a></h3>

<hr>

<h3><a href="https://nullprogram.com/blog/2021/09/15/" rel="nofollow">OpenBSD&#39;s pledge and unveil from Python</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [Hibernate time reduced](http://undeadly.org/cgi?action=article;sid=20210831050932)
• [(open)rsync gains include/exclude support](http://undeadly.org/cgi?action=article;sid=20210830081715)
• [Producer JT&#39;s latest ancient find that he needs help with](https://twitter.com/q5sys/status/1440105555754848257)
• [Doas comes to MidnightBSD](https://github.com/slicer69/doas)
• [FreeBSD SSH Hardening](https://gist.github.com/koobs/e01cf8869484a095605404cd0051eb11)
• [OpenBSD 6.8 and you](https://home.nuug.no/~peter/openbsd_and_you/#1)
• [By default, scp(1) now uses SFTP protocol](https://undeadly.org/cgi?action=article;sid=20210910074941)
• [FreeBSD 11.4 end-of-life](https://lists.freebsd.org/pipermail/freebsd-announce/2021-September/002060.html)
• [sched_ule(4): Improve long-term load balancer](https://cgit.freebsd.org/src/commit/?id=e745d729be60a47b49eb19c02a6864a747fb2744)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>J language working on OpenBSD, Comparing FreeBSD GELI and OpenZFS encrypted pools, What is FreeBSD, actually?, OpenBSD&#39;s pledge and unveil from Python, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210911.html" rel="nofollow">I got the J language working on OpenBSD</a></h3>

<hr>

<h3><a href="https://rubenerd.com/my-first-prod-encrypted-openzfs-pool/" rel="nofollow">Rubenerd: Comparing FreeBSD GELI and OpenZFS encrypted pools with keys</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://medium.com/@probonopd/what-is-freebsd-actually-think-again-200c2752d026" rel="nofollow">What is FreeBSD, actually? Think again.</a></h3>

<hr>

<h3><a href="https://nullprogram.com/blog/2021/09/15/" rel="nofollow">OpenBSD&#39;s pledge and unveil from Python</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [Hibernate time reduced](http://undeadly.org/cgi?action=article;sid=20210831050932)
• [(open)rsync gains include/exclude support](http://undeadly.org/cgi?action=article;sid=20210830081715)
• [Producer JT&#39;s latest ancient find that he needs help with](https://twitter.com/q5sys/status/1440105555754848257)
• [Doas comes to MidnightBSD](https://github.com/slicer69/doas)
• [FreeBSD SSH Hardening](https://gist.github.com/koobs/e01cf8869484a095605404cd0051eb11)
• [OpenBSD 6.8 and you](https://home.nuug.no/~peter/openbsd_and_you/#1)
• [By default, scp(1) now uses SFTP protocol](https://undeadly.org/cgi?action=article;sid=20210910074941)
• [FreeBSD 11.4 end-of-life](https://lists.freebsd.org/pipermail/freebsd-announce/2021-September/002060.html)
• [sched_ule(4): Improve long-term load balancer](https://cgit.freebsd.org/src/commit/?id=e745d729be60a47b49eb19c02a6864a747fb2744)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>417: bhyve private cloud</title>
  <link>https://www.bsdnow.tv/417</link>
  <guid isPermaLink="false">63b2639c-ad67-45db-9581-8053963313c2</guid>
  <pubDate>Thu, 26 Aug 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/63b2639c-ad67-45db-9581-8053963313c2.mp3" length="34928712" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Achieving RPO/RTO Objectives with ZFS pt 1, FreeBSD Foundation Q2 report, OpenBSD full Tor setup, MyBee - bhyve as private cloud, FreeBSD home fileserver expansion, OpenBSD on Framework Laptop, portable GELI, and more.</itunes:subtitle>
  <itunes:duration>57:18</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Achieving RPO/RTO Objectives with ZFS pt 1, FreeBSD Foundation Q2 report, OpenBSD full Tor setup, MyBee - bhyve as private cloud, FreeBSD home fileserver expansion, OpenBSD on Framework Laptop, portable GELI, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/achieving-rpo-rto-objectives-with-zfs-part-1/" target="_blank" rel="nofollow noopener"&gt;Achieving RPO/RTO Objectives with ZFS - Part 1&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://freebsdfoundation.org/blog/freebsd-foundation-q2-2021-status-update/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation Q2 Report&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2021-07-25-openbsd-full-tor.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD full Tor setup&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://habr.com/en/post/569226/" target="_blank" rel="nofollow noopener"&gt;MyBee — FreeBSD OS and hypervisor bhyve as private cloud&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://rubenerd.com/expanding-our-freebsd-home-file-server/" target="_blank" rel="nofollow noopener"&gt;Expanding our FreeBSD home file server&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://jcs.org/2021/08/06/framework" target="_blank" rel="nofollow noopener"&gt;OpenBSD on the Framework Laptop&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://bijanebrahimi.github.io/blog/portable-geli.html" target="_blank" rel="nofollow noopener"&gt;Portable GELI&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/417/feedback/Chunky_pie%20-%20zfs%20question.md" target="_blank" rel="nofollow noopener"&gt;Chunky_pie - zfs question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/417/feedback/Paul%20-%20several%20questions.md" target="_blank" rel="nofollow noopener"&gt;Paul - several questions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/417/feedback/chris%20-%20firewall%20question.md" target="_blank" rel="nofollow noopener"&gt;chris - firewall question&lt;/a&gt;
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, rpo, rto, objectives, foundation, second quarter report, tor setup, mybee, private cloud, bhyve, fileserver, home, expansion, framework laptop, portable, geli, encryption, disk</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Achieving RPO/RTO Objectives with ZFS pt 1, FreeBSD Foundation Q2 report, OpenBSD full Tor setup, MyBee - bhyve as private cloud, FreeBSD home fileserver expansion, OpenBSD on Framework Laptop, portable GELI, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/achieving-rpo-rto-objectives-with-zfs-part-1/" rel="nofollow">Achieving RPO/RTO Objectives with ZFS - Part 1</a></h3>

<hr>

<h3><a href="https://freebsdfoundation.org/blog/freebsd-foundation-q2-2021-status-update/" rel="nofollow">FreeBSD Foundation Q2 Report</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-07-25-openbsd-full-tor.html" rel="nofollow">OpenBSD full Tor setup</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://habr.com/en/post/569226/" rel="nofollow">MyBee — FreeBSD OS and hypervisor bhyve as private cloud</a></h3>

<hr>

<h3><a href="https://rubenerd.com/expanding-our-freebsd-home-file-server/" rel="nofollow">Expanding our FreeBSD home file server</a></h3>

<hr>

<h3><a href="https://jcs.org/2021/08/06/framework" rel="nofollow">OpenBSD on the Framework Laptop</a></h3>

<hr>

<h3><a href="http://bijanebrahimi.github.io/blog/portable-geli.html" rel="nofollow">Portable GELI</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/417/feedback/Chunky_pie%20-%20zfs%20question.md" rel="nofollow">Chunky_pie - zfs question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/417/feedback/Paul%20-%20several%20questions.md" rel="nofollow">Paul - several questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/417/feedback/chris%20-%20firewall%20question.md" rel="nofollow">chris - firewall question</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Achieving RPO/RTO Objectives with ZFS pt 1, FreeBSD Foundation Q2 report, OpenBSD full Tor setup, MyBee - bhyve as private cloud, FreeBSD home fileserver expansion, OpenBSD on Framework Laptop, portable GELI, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/achieving-rpo-rto-objectives-with-zfs-part-1/" rel="nofollow">Achieving RPO/RTO Objectives with ZFS - Part 1</a></h3>

<hr>

<h3><a href="https://freebsdfoundation.org/blog/freebsd-foundation-q2-2021-status-update/" rel="nofollow">FreeBSD Foundation Q2 Report</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-07-25-openbsd-full-tor.html" rel="nofollow">OpenBSD full Tor setup</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://habr.com/en/post/569226/" rel="nofollow">MyBee — FreeBSD OS and hypervisor bhyve as private cloud</a></h3>

<hr>

<h3><a href="https://rubenerd.com/expanding-our-freebsd-home-file-server/" rel="nofollow">Expanding our FreeBSD home file server</a></h3>

<hr>

<h3><a href="https://jcs.org/2021/08/06/framework" rel="nofollow">OpenBSD on the Framework Laptop</a></h3>

<hr>

<h3><a href="http://bijanebrahimi.github.io/blog/portable-geli.html" rel="nofollow">Portable GELI</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/417/feedback/Chunky_pie%20-%20zfs%20question.md" rel="nofollow">Chunky_pie - zfs question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/417/feedback/Paul%20-%20several%20questions.md" rel="nofollow">Paul - several questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/417/feedback/chris%20-%20firewall%20question.md" rel="nofollow">chris - firewall question</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>408: FreeBSD DevSummit 2021</title>
  <link>https://www.bsdnow.tv/408</link>
  <guid isPermaLink="false">62094053-3e0f-4996-ac35-7d3f3a62572d</guid>
  <pubDate>Thu, 24 Jun 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/62094053-3e0f-4996-ac35-7d3f3a62572d.mp3" length="37936488" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Report from virtual FreeBSD DevSummit 2021, another promising release by FreeBSD Based helloSystem, GearBSD, OpenBGPD release, Let’s Encrypt on OpenBSD, FreeBSD 13 on the Panasonic Let’s Note, and more
</itunes:subtitle>
  <itunes:duration>57:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Report from virtual FreeBSD DevSummit 2021, another promising release by FreeBSD Based helloSystem, GearBSD, OpenBGPD release, Let’s Encrypt on OpenBSD, FreeBSD 13 on the Panasonic Let’s Note, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/freebsd-developer-summit-2021/" target="_blank" rel="nofollow noopener"&gt;2021 FreeBSD Developer Summit&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.debugpoint.com/2021/06/hellosystem-0-5-0-release/" target="_blank" rel="nofollow noopener"&gt;helloSystem – FreeBSD Based OS Brings another Promising Release 0.5.0&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2021-06-01-gearbsd.html" target="_blank" rel="nofollow noopener"&gt;GearBSD: a project to help automating your OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://bsdsec.net/articles/openbgpd-7-0-released" target="_blank" rel="nofollow noopener"&gt;OpenBGPD 7.0 released&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/OpenBSDNiceLetsEncrypt" target="_blank" rel="nofollow noopener"&gt;Simple use of Let's Encrypt on OpenBSD is pleasantly straightforward (as of 6.8)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://rubenerd.com/freebsd-13-on-the-panasonic-cf-rz6/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 13 on the Panasonic Let’s Note CF-RZ6&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;pre&gt;&lt;code&gt;• [Paul - ZFS Questions](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Paul%20-%20ZFS%20Questions)
• [Rafael - relic](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Rafael%20-%20relic)
• [matthew - sendfile and ktls](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/matthew%20-%20sendfile%20and%20ktls)
&lt;/code&gt;&lt;/pre&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, devsummit, report, helloSystem, GearBSD, openBGPD, let’s encrypt, encryption, ssl, tls, panasonic, let’s note</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Report from virtual FreeBSD DevSummit 2021, another promising release by FreeBSD Based helloSystem, GearBSD, OpenBGPD release, Let’s Encrypt on OpenBSD, FreeBSD 13 on the Panasonic Let’s Note, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-developer-summit-2021/" rel="nofollow">2021 FreeBSD Developer Summit</a></h3>

<hr>

<h3><a href="https://www.debugpoint.com/2021/06/hellosystem-0-5-0-release/" rel="nofollow">helloSystem – FreeBSD Based OS Brings another Promising Release 0.5.0</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-06-01-gearbsd.html" rel="nofollow">GearBSD: a project to help automating your OpenBSD</a></h3>

<hr>

<h3><a href="https://bsdsec.net/articles/openbgpd-7-0-released" rel="nofollow">OpenBGPD 7.0 released</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/OpenBSDNiceLetsEncrypt" rel="nofollow">Simple use of Let&#39;s Encrypt on OpenBSD is pleasantly straightforward (as of 6.8)</a></h3>

<hr>

<h3><a href="https://rubenerd.com/freebsd-13-on-the-panasonic-cf-rz6/" rel="nofollow">FreeBSD 13 on the Panasonic Let’s Note CF-RZ6</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<pre><code>• [Paul - ZFS Questions](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Paul%20-%20ZFS%20Questions)
• [Rafael - relic](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Rafael%20-%20relic)
• [matthew - sendfile and ktls](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/matthew%20-%20sendfile%20and%20ktls)
</code></pre>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Report from virtual FreeBSD DevSummit 2021, another promising release by FreeBSD Based helloSystem, GearBSD, OpenBGPD release, Let’s Encrypt on OpenBSD, FreeBSD 13 on the Panasonic Let’s Note, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-developer-summit-2021/" rel="nofollow">2021 FreeBSD Developer Summit</a></h3>

<hr>

<h3><a href="https://www.debugpoint.com/2021/06/hellosystem-0-5-0-release/" rel="nofollow">helloSystem – FreeBSD Based OS Brings another Promising Release 0.5.0</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-06-01-gearbsd.html" rel="nofollow">GearBSD: a project to help automating your OpenBSD</a></h3>

<hr>

<h3><a href="https://bsdsec.net/articles/openbgpd-7-0-released" rel="nofollow">OpenBGPD 7.0 released</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/OpenBSDNiceLetsEncrypt" rel="nofollow">Simple use of Let&#39;s Encrypt on OpenBSD is pleasantly straightforward (as of 6.8)</a></h3>

<hr>

<h3><a href="https://rubenerd.com/freebsd-13-on-the-panasonic-cf-rz6/" rel="nofollow">FreeBSD 13 on the Panasonic Let’s Note CF-RZ6</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<pre><code>• [Paul - ZFS Questions](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Paul%20-%20ZFS%20Questions)
• [Rafael - relic](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Rafael%20-%20relic)
• [matthew - sendfile and ktls](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/matthew%20-%20sendfile%20and%20ktls)
</code></pre>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>356: Dig in Deeper</title>
  <link>https://www.bsdnow.tv/356</link>
  <guid isPermaLink="false">666c3655-32bf-4341-a986-ab085baa9c10</guid>
  <pubDate>Thu, 25 Jun 2020 07:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/666c3655-32bf-4341-a986-ab085baa9c10.mp3" length="31946816" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>TrueNAS is Multi-OS, Encrypted ZFS on NetBSD, FreeBSD’s new Code of Conduct, Gaming on OpenBSD, dig a little deeper, Hammer2 and periodic snapshots, and more.</itunes:subtitle>
  <itunes:duration>32:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;TrueNAS is Multi-OS, Encrypted ZFS on NetBSD, FreeBSD’s new Code of Conduct, Gaming on OpenBSD, dig a little deeper, Hammer2 and periodic snapshots, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.ixsystems.com/blog/truenas-multi-os/" target="_blank" rel="nofollow noopener"&gt;TrueNAS is Multi-OS&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; There was a time in history where all that mattered was an Operating System (OS) and the hardware it ran on — the “pre-software era”, if you will. Your hardware dictated the OS you used.&lt;br&gt;
&amp;gt; Once software applications became prominent, your hardware’s OS determined the applications you could run. Application vendors were forced to juggle the burden of “portability” between OS platforms, choosing carefully the operating systems they’d develop their software to. Then, there were the great OS Wars of the 1990s, replete with the rampant competition, licensing battles, and nasty lawsuits, which more or less gave birth to the “open source OS” era.&lt;br&gt;
&amp;gt; The advent of the hypervisor simultaneously gave way to the “virtual era” which set us on a path of agnosticism toward the OS. Instead of choosing from the applications available for your chosen OS, you could simply install another OS on the same hardware for your chosen application. The OS became nothing but a necessary cog in the stack.&lt;br&gt;
&amp;gt; TrueNAS open storage enables this “post-OS era” with support for storage clients of all UNIX flavors, Linux, FreeBSD, Windows, MacOS, VMware, Citrix, and many others. Containerization has carried that mentality even further. An operating system, like the hardware that runs it, is now just thought of as part of the “infrastructure”.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://rubenerd.com/encrypted-zfs-on-netbsd-9-for-a-freebsd-guy/" target="_blank" rel="nofollow noopener"&gt;Encrypted ZFS on NetBSD 9.0, for a FreeBSD guy&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I had one of my other HP Microservers brought back from the office last week to help with this working-from-home world we’re in right now. I was going to wipe an old version of Debian Wheezy/Xen and install FreeBSD to mirror my other machines before thinking: why not NetBSD?&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/internal/code-of-conduct.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD's New Code of Conduct&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://raw.githubusercontent.com/BSDNow/bsdnow.tv/master/episodes/356/FBSD-CoC-Email" target="_blank" rel="nofollow noopener"&gt;FreeBSD Announcement Email&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2020-06-05-openbsd-gaming.html" target="_blank" rel="nofollow noopener"&gt;Gaming on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; While no one would expect this, there are huge efforts from a small team to bring more games into OpenBSD. In fact, now some commercial games works natively now, thanks to Mono or Java. There are no wine or linux emulation layer in OpenBSD.&lt;br&gt;
&amp;gt; Here is a small list of most well known games that run on OpenBSD:&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://vishaltelangre.com/dig-a-little-deeper/" target="_blank" rel="nofollow noopener"&gt;'dig' a little deeper&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I knew the existence of the dig command but didn't exactly know when and how to use it. Then, just recently I encountered an issue that allowed me to learn and make use of it.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2020/06/15/24635.html" target="_blank" rel="nofollow noopener"&gt;HAMMER2 and periodic snapshots&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; The first version of HAMMER took automatic snapshots, set within the config for each filesystem.  HAMMER2 now also takes automatic snapshots, via periodic(8) like most every repeating task on your DragonFly system.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2020-June/769247.html" target="_blank" rel="nofollow noopener"&gt;git: Implement periodic hammer2 snapshots&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/356/feedback/Cy%20-%20OPenSSL%20relicensing.md" target="_blank" rel="nofollow noopener"&gt;Cy - OpenSSL relicensing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/356/feedback/Christian%20-%20lagg%20vlans%20and%20iocage" target="_blank" rel="nofollow noopener"&gt;Christian - lagg vlans and iocage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/356/feedback/Brad%20-%20SMR" target="_blank" rel="nofollow noopener"&gt;Brad - SMR&lt;/a&gt;
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, truenas, multi os, os, operating system, code of conduct, code, conduct, encryption, encrypted, zfs, gaming, dig, hammer2, snapshot, snapshots, periodic, periodic snapshots</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>TrueNAS is Multi-OS, Encrypted ZFS on NetBSD, FreeBSD’s new Code of Conduct, Gaming on OpenBSD, dig a little deeper, Hammer2 and periodic snapshots, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.ixsystems.com/blog/truenas-multi-os/" rel="nofollow">TrueNAS is Multi-OS</a></h3>

<blockquote>
<p>There was a time in history where all that mattered was an Operating System (OS) and the hardware it ran on — the “pre-software era”, if you will. Your hardware dictated the OS you used.<br>
Once software applications became prominent, your hardware’s OS determined the applications you could run. Application vendors were forced to juggle the burden of “portability” between OS platforms, choosing carefully the operating systems they’d develop their software to. Then, there were the great OS Wars of the 1990s, replete with the rampant competition, licensing battles, and nasty lawsuits, which more or less gave birth to the “open source OS” era.<br>
The advent of the hypervisor simultaneously gave way to the “virtual era” which set us on a path of agnosticism toward the OS. Instead of choosing from the applications available for your chosen OS, you could simply install another OS on the same hardware for your chosen application. The OS became nothing but a necessary cog in the stack.<br>
TrueNAS open storage enables this “post-OS era” with support for storage clients of all UNIX flavors, Linux, FreeBSD, Windows, MacOS, VMware, Citrix, and many others. Containerization has carried that mentality even further. An operating system, like the hardware that runs it, is now just thought of as part of the “infrastructure”.</p>

<hr>

<h3><a href="https://rubenerd.com/encrypted-zfs-on-netbsd-9-for-a-freebsd-guy/" rel="nofollow">Encrypted ZFS on NetBSD 9.0, for a FreeBSD guy</a></h3>

<p>I had one of my other HP Microservers brought back from the office last week to help with this working-from-home world we’re in right now. I was going to wipe an old version of Debian Wheezy/Xen and install FreeBSD to mirror my other machines before thinking: why not NetBSD?</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsd.org/internal/code-of-conduct.html" rel="nofollow">FreeBSD&#39;s New Code of Conduct</a></h3>

<ul>
<li><a href="https://raw.githubusercontent.com/BSDNow/bsdnow.tv/master/episodes/356/FBSD-CoC-Email" rel="nofollow">FreeBSD Announcement Email</a></li>
</ul>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2020-06-05-openbsd-gaming.html" rel="nofollow">Gaming on OpenBSD</a></h3>

<blockquote>
<p>While no one would expect this, there are huge efforts from a small team to bring more games into OpenBSD. In fact, now some commercial games works natively now, thanks to Mono or Java. There are no wine or linux emulation layer in OpenBSD.<br>
Here is a small list of most well known games that run on OpenBSD:</p>

<hr>

<h3><a href="https://vishaltelangre.com/dig-a-little-deeper/" rel="nofollow">&#39;dig&#39; a little deeper</a></h3>

<p>I knew the existence of the dig command but didn&#39;t exactly know when and how to use it. Then, just recently I encountered an issue that allowed me to learn and make use of it.</p>

<hr>

<h3><a href="https://www.dragonflydigest.com/2020/06/15/24635.html" rel="nofollow">HAMMER2 and periodic snapshots</a></h3>

<p>The first version of HAMMER took automatic snapshots, set within the config for each filesystem.  HAMMER2 now also takes automatic snapshots, via periodic(8) like most every repeating task on your DragonFly system.</p>

<ul>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2020-June/769247.html" rel="nofollow">git: Implement periodic hammer2 snapshots</a>
***</li>
</ul>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/356/feedback/Cy%20-%20OPenSSL%20relicensing.md" rel="nofollow">Cy - OpenSSL relicensing</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/356/feedback/Christian%20-%20lagg%20vlans%20and%20iocage" rel="nofollow">Christian - lagg vlans and iocage</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/356/feedback/Brad%20-%20SMR" rel="nofollow">Brad - SMR</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>TrueNAS is Multi-OS, Encrypted ZFS on NetBSD, FreeBSD’s new Code of Conduct, Gaming on OpenBSD, dig a little deeper, Hammer2 and periodic snapshots, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.ixsystems.com/blog/truenas-multi-os/" rel="nofollow">TrueNAS is Multi-OS</a></h3>

<blockquote>
<p>There was a time in history where all that mattered was an Operating System (OS) and the hardware it ran on — the “pre-software era”, if you will. Your hardware dictated the OS you used.<br>
Once software applications became prominent, your hardware’s OS determined the applications you could run. Application vendors were forced to juggle the burden of “portability” between OS platforms, choosing carefully the operating systems they’d develop their software to. Then, there were the great OS Wars of the 1990s, replete with the rampant competition, licensing battles, and nasty lawsuits, which more or less gave birth to the “open source OS” era.<br>
The advent of the hypervisor simultaneously gave way to the “virtual era” which set us on a path of agnosticism toward the OS. Instead of choosing from the applications available for your chosen OS, you could simply install another OS on the same hardware for your chosen application. The OS became nothing but a necessary cog in the stack.<br>
TrueNAS open storage enables this “post-OS era” with support for storage clients of all UNIX flavors, Linux, FreeBSD, Windows, MacOS, VMware, Citrix, and many others. Containerization has carried that mentality even further. An operating system, like the hardware that runs it, is now just thought of as part of the “infrastructure”.</p>

<hr>

<h3><a href="https://rubenerd.com/encrypted-zfs-on-netbsd-9-for-a-freebsd-guy/" rel="nofollow">Encrypted ZFS on NetBSD 9.0, for a FreeBSD guy</a></h3>

<p>I had one of my other HP Microservers brought back from the office last week to help with this working-from-home world we’re in right now. I was going to wipe an old version of Debian Wheezy/Xen and install FreeBSD to mirror my other machines before thinking: why not NetBSD?</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsd.org/internal/code-of-conduct.html" rel="nofollow">FreeBSD&#39;s New Code of Conduct</a></h3>

<ul>
<li><a href="https://raw.githubusercontent.com/BSDNow/bsdnow.tv/master/episodes/356/FBSD-CoC-Email" rel="nofollow">FreeBSD Announcement Email</a></li>
</ul>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2020-06-05-openbsd-gaming.html" rel="nofollow">Gaming on OpenBSD</a></h3>

<blockquote>
<p>While no one would expect this, there are huge efforts from a small team to bring more games into OpenBSD. In fact, now some commercial games works natively now, thanks to Mono or Java. There are no wine or linux emulation layer in OpenBSD.<br>
Here is a small list of most well known games that run on OpenBSD:</p>

<hr>

<h3><a href="https://vishaltelangre.com/dig-a-little-deeper/" rel="nofollow">&#39;dig&#39; a little deeper</a></h3>

<p>I knew the existence of the dig command but didn&#39;t exactly know when and how to use it. Then, just recently I encountered an issue that allowed me to learn and make use of it.</p>

<hr>

<h3><a href="https://www.dragonflydigest.com/2020/06/15/24635.html" rel="nofollow">HAMMER2 and periodic snapshots</a></h3>

<p>The first version of HAMMER took automatic snapshots, set within the config for each filesystem.  HAMMER2 now also takes automatic snapshots, via periodic(8) like most every repeating task on your DragonFly system.</p>

<ul>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2020-June/769247.html" rel="nofollow">git: Implement periodic hammer2 snapshots</a>
***</li>
</ul>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/356/feedback/Cy%20-%20OPenSSL%20relicensing.md" rel="nofollow">Cy - OpenSSL relicensing</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/356/feedback/Christian%20-%20lagg%20vlans%20and%20iocage" rel="nofollow">Christian - lagg vlans and iocage</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/356/feedback/Brad%20-%20SMR" rel="nofollow">Brad - SMR</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>350: Speedy Bridges</title>
  <link>https://www.bsdnow.tv/350</link>
  <guid isPermaLink="false">49114e72-83f1-43b6-ae71-9e608a059b3e</guid>
  <pubDate>Thu, 14 May 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/49114e72-83f1-43b6-ae71-9e608a059b3e.mp3" length="37173656" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>5x if_bridge Performance Improvement, How Unix Won, Understanding VLAN Configuration on FreeBSD, Using bhyve PCI passthrough on OmniOS, TrueNAS 11.3-U2 Available, and more.</itunes:subtitle>
  <itunes:duration>34:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;5x if_bridge Performance Improvement, How Unix Won, Understanding VLAN Configuration on FreeBSD, Using bhyve PCI passthrough on OmniOS, TrueNAS 11.3-U2 Available, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/blog/500-if_bridge-performance-improvement/" target="_blank" rel="nofollow noopener"&gt;5x if_bridge Performance Improvement&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; With FreeBSD Foundation grant, Kristof Provost harnesses new parallel techniques to uncork performance bottleneck &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Kristof also streamed some of his work, providing an interesting insight into how such development work happens&lt;/li&gt;
&lt;li&gt;&amp;gt; &lt;a href="https://www.twitch.tv/provostk/videos" target="_blank" rel="nofollow noopener"&gt;https://www.twitch.tv/provostk/videos&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.vivekhaldar.com/post/617189040564928512/how-unix-won" target="_blank" rel="nofollow noopener"&gt;How Unix Won&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;+&amp;gt; Unix has won in every conceivable way. And in true mythic style, it contains the seeds of its own eclipse. This is my subjective historical narrative of how that happened.&lt;br&gt;
&amp;gt; I’m using the name “Unix” to include the entire family of operating systems descended from it, or that have been heavily influenced by it. That includes Linux, SunOS, Solaris, BSD, Mac OS X, and many, many others.&lt;br&gt;
&amp;gt; Both major mobile OSs, Android and iOS, have Unix roots. Their billions of users dwarf those using clunky things like laptops and desktops, but even there, Windows is only the non-Unix viable OS. Almost everything running server-side in giant datacenters is Linux.&lt;br&gt;
&amp;gt; How did Unix win?&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.socruel.nu/freebsd/check-logs-of-syslog-ng-log-host-on-freebsd.html" target="_blank" rel="nofollow noopener"&gt;Check logs of central syslog-ng log host on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; This blog post continues where the blog post A central log host with syslog-ng on FreeBSD left off. Open source solutions to check syslog log messages exist, such as Logcheck or Logwatch. Although these are not to difficult to implement and maintain, I still found these to much. So I went for my own home grown solution to check the syslog messages of the SoCruel.NU central log host. And the solution presented in this blog post works pretty well for me!&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://genneko.github.io/playing-with-bsd/networking/freebsd-vlan/" target="_blank" rel="nofollow noopener"&gt;Understanding VLAN Configuration on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Until recently, I’ve never had a chance to use VLANs on FreeBSD hosts, though I sometimes configure them on ethernet switches.&lt;br&gt;
&amp;gt; But when I was playing with vnet jails, I suddenly got interested in VLAN configuration on FreeBSD and experimented with it for some time.&lt;br&gt;
&amp;gt; I wrote this short article to summarize my current understanding of how to configure VLANs on FreeBSD.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.cyber-tec.org/2019/05/29/using-bhyve-pci-passthrough-on-omnios/" target="_blank" rel="nofollow noopener"&gt;Using bhyve PCI passthrough on OmniOS&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Some hardware is not supported in illumos yet, but luckily there is bhyve which supports pci passthrough to any guest operating system. To continue with my OmniOS desktop on "modern" hardware I would love wifi support, so why not using a bhyve guest as router zone which provide the required drivers?&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.ixsystems.com/blog/truenas-11-3-u2-is-available/" target="_blank" rel="nofollow noopener"&gt;TrueNAS 11.3-U2 is Generally Available&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; TrueNAS 11.3-U2.1 is generally available as of 4/22/2020. This update is based on FreeNAS 11.3-U2 which has had over 50k deployments and received excellent community and third party reviews. The Release Notes are available on the iXsystems.com website.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://hardenedbsd.org/article/shawn-webb/2020-04-24/hardenedbsd-april-2020-status-report" target="_blank" rel="nofollow noopener"&gt;HardenedBSD April 2020 Status Report&lt;/a&gt;&lt;br&gt;
&lt;a href="http://lists.nycbug.org/pipermail/jobs/2020-April/000553.html" target="_blank" rel="nofollow noopener"&gt;NYC Bug’s Mailing List - Listing of open Dev Jobs&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Greg - &lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/350/feedback/Greg%20-%20Lenovos.md" target="_blank" rel="nofollow noopener"&gt;Lenovo&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Matt - &lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/350/feedback/Matt%20-%20BSD%20Packaging.md" target="_blank" rel="nofollow noopener"&gt;BSD Packaging&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Morgan - &lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/350/feedback/Morgan%20-%20Performance.md" target="_blank" rel="nofollow noopener"&gt;Performance&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, unix, bsd, interview, crash, crash dump, encryption, encrypted,  dev environment, kernel development, TrueNAS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>5x if_bridge Performance Improvement, How Unix Won, Understanding VLAN Configuration on FreeBSD, Using bhyve PCI passthrough on OmniOS, TrueNAS 11.3-U2 Available, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/500-if_bridge-performance-improvement/" rel="nofollow">5x if_bridge Performance Improvement</a></h3>

<blockquote>
<p>With FreeBSD Foundation grant, Kristof Provost harnesses new parallel techniques to uncork performance bottleneck </p>

<ul>
<li>Kristof also streamed some of his work, providing an interesting insight into how such development work happens</li>
<li>&gt; <a href="https://www.twitch.tv/provostk/videos" rel="nofollow">https://www.twitch.tv/provostk/videos</a>
***</li>
</ul>
</blockquote>

<h3><a href="https://blog.vivekhaldar.com/post/617189040564928512/how-unix-won" rel="nofollow">How Unix Won</a></h3>

<p>+&gt; Unix has won in every conceivable way. And in true mythic style, it contains the seeds of its own eclipse. This is my subjective historical narrative of how that happened.</p>

<blockquote>
<p>I’m using the name “Unix” to include the entire family of operating systems descended from it, or that have been heavily influenced by it. That includes Linux, SunOS, Solaris, BSD, Mac OS X, and many, many others.<br>
Both major mobile OSs, Android and iOS, have Unix roots. Their billions of users dwarf those using clunky things like laptops and desktops, but even there, Windows is only the non-Unix viable OS. Almost everything running server-side in giant datacenters is Linux.<br>
How did Unix win?</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://blog.socruel.nu/freebsd/check-logs-of-syslog-ng-log-host-on-freebsd.html" rel="nofollow">Check logs of central syslog-ng log host on FreeBSD</a></h3>

<blockquote>
<p>This blog post continues where the blog post A central log host with syslog-ng on FreeBSD left off. Open source solutions to check syslog log messages exist, such as Logcheck or Logwatch. Although these are not to difficult to implement and maintain, I still found these to much. So I went for my own home grown solution to check the syslog messages of the SoCruel.NU central log host. And the solution presented in this blog post works pretty well for me!</p>

<hr>
</blockquote>

<h3><a href="https://genneko.github.io/playing-with-bsd/networking/freebsd-vlan/" rel="nofollow">Understanding VLAN Configuration on FreeBSD</a></h3>

<blockquote>
<p>Until recently, I’ve never had a chance to use VLANs on FreeBSD hosts, though I sometimes configure them on ethernet switches.<br>
But when I was playing with vnet jails, I suddenly got interested in VLAN configuration on FreeBSD and experimented with it for some time.<br>
I wrote this short article to summarize my current understanding of how to configure VLANs on FreeBSD.</p>

<hr>
</blockquote>

<h3><a href="https://www.cyber-tec.org/2019/05/29/using-bhyve-pci-passthrough-on-omnios/" rel="nofollow">Using bhyve PCI passthrough on OmniOS</a></h3>

<blockquote>
<p>Some hardware is not supported in illumos yet, but luckily there is bhyve which supports pci passthrough to any guest operating system. To continue with my OmniOS desktop on &quot;modern&quot; hardware I would love wifi support, so why not using a bhyve guest as router zone which provide the required drivers?</p>

<hr>
</blockquote>

<h3><a href="https://www.ixsystems.com/blog/truenas-11-3-u2-is-available/" rel="nofollow">TrueNAS 11.3-U2 is Generally Available</a></h3>

<blockquote>
<p>TrueNAS 11.3-U2.1 is generally available as of 4/22/2020. This update is based on FreeNAS 11.3-U2 which has had over 50k deployments and received excellent community and third party reviews. The Release Notes are available on the iXsystems.com website.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<p><a href="https://hardenedbsd.org/article/shawn-webb/2020-04-24/hardenedbsd-april-2020-status-report" rel="nofollow">HardenedBSD April 2020 Status Report</a><br>
<a href="http://lists.nycbug.org/pipermail/jobs/2020-April/000553.html" rel="nofollow">NYC Bug’s Mailing List - Listing of open Dev Jobs</a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Greg - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/350/feedback/Greg%20-%20Lenovos.md" rel="nofollow">Lenovo</a></li>
<li>Matt - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/350/feedback/Matt%20-%20BSD%20Packaging.md" rel="nofollow">BSD Packaging</a></li>
<li><p>Morgan - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/350/feedback/Morgan%20-%20Performance.md" rel="nofollow">Performance</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>5x if_bridge Performance Improvement, How Unix Won, Understanding VLAN Configuration on FreeBSD, Using bhyve PCI passthrough on OmniOS, TrueNAS 11.3-U2 Available, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/500-if_bridge-performance-improvement/" rel="nofollow">5x if_bridge Performance Improvement</a></h3>

<blockquote>
<p>With FreeBSD Foundation grant, Kristof Provost harnesses new parallel techniques to uncork performance bottleneck </p>

<ul>
<li>Kristof also streamed some of his work, providing an interesting insight into how such development work happens</li>
<li>&gt; <a href="https://www.twitch.tv/provostk/videos" rel="nofollow">https://www.twitch.tv/provostk/videos</a>
***</li>
</ul>
</blockquote>

<h3><a href="https://blog.vivekhaldar.com/post/617189040564928512/how-unix-won" rel="nofollow">How Unix Won</a></h3>

<p>+&gt; Unix has won in every conceivable way. And in true mythic style, it contains the seeds of its own eclipse. This is my subjective historical narrative of how that happened.</p>

<blockquote>
<p>I’m using the name “Unix” to include the entire family of operating systems descended from it, or that have been heavily influenced by it. That includes Linux, SunOS, Solaris, BSD, Mac OS X, and many, many others.<br>
Both major mobile OSs, Android and iOS, have Unix roots. Their billions of users dwarf those using clunky things like laptops and desktops, but even there, Windows is only the non-Unix viable OS. Almost everything running server-side in giant datacenters is Linux.<br>
How did Unix win?</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://blog.socruel.nu/freebsd/check-logs-of-syslog-ng-log-host-on-freebsd.html" rel="nofollow">Check logs of central syslog-ng log host on FreeBSD</a></h3>

<blockquote>
<p>This blog post continues where the blog post A central log host with syslog-ng on FreeBSD left off. Open source solutions to check syslog log messages exist, such as Logcheck or Logwatch. Although these are not to difficult to implement and maintain, I still found these to much. So I went for my own home grown solution to check the syslog messages of the SoCruel.NU central log host. And the solution presented in this blog post works pretty well for me!</p>

<hr>
</blockquote>

<h3><a href="https://genneko.github.io/playing-with-bsd/networking/freebsd-vlan/" rel="nofollow">Understanding VLAN Configuration on FreeBSD</a></h3>

<blockquote>
<p>Until recently, I’ve never had a chance to use VLANs on FreeBSD hosts, though I sometimes configure them on ethernet switches.<br>
But when I was playing with vnet jails, I suddenly got interested in VLAN configuration on FreeBSD and experimented with it for some time.<br>
I wrote this short article to summarize my current understanding of how to configure VLANs on FreeBSD.</p>

<hr>
</blockquote>

<h3><a href="https://www.cyber-tec.org/2019/05/29/using-bhyve-pci-passthrough-on-omnios/" rel="nofollow">Using bhyve PCI passthrough on OmniOS</a></h3>

<blockquote>
<p>Some hardware is not supported in illumos yet, but luckily there is bhyve which supports pci passthrough to any guest operating system. To continue with my OmniOS desktop on &quot;modern&quot; hardware I would love wifi support, so why not using a bhyve guest as router zone which provide the required drivers?</p>

<hr>
</blockquote>

<h3><a href="https://www.ixsystems.com/blog/truenas-11-3-u2-is-available/" rel="nofollow">TrueNAS 11.3-U2 is Generally Available</a></h3>

<blockquote>
<p>TrueNAS 11.3-U2.1 is generally available as of 4/22/2020. This update is based on FreeNAS 11.3-U2 which has had over 50k deployments and received excellent community and third party reviews. The Release Notes are available on the iXsystems.com website.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<p><a href="https://hardenedbsd.org/article/shawn-webb/2020-04-24/hardenedbsd-april-2020-status-report" rel="nofollow">HardenedBSD April 2020 Status Report</a><br>
<a href="http://lists.nycbug.org/pipermail/jobs/2020-April/000553.html" rel="nofollow">NYC Bug’s Mailing List - Listing of open Dev Jobs</a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Greg - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/350/feedback/Greg%20-%20Lenovos.md" rel="nofollow">Lenovo</a></li>
<li>Matt - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/350/feedback/Matt%20-%20BSD%20Packaging.md" rel="nofollow">BSD Packaging</a></li>
<li><p>Morgan - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/350/feedback/Morgan%20-%20Performance.md" rel="nofollow">Performance</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>349: Entropy Overhaul</title>
  <link>https://www.bsdnow.tv/349</link>
  <guid isPermaLink="false">468d2fe0-ed8f-4e89-aaae-8aa4a0fbf66f</guid>
  <pubDate>Thu, 07 May 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/468d2fe0-ed8f-4e89-aaae-8aa4a0fbf66f.mp3" length="41444019" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Encrypted Crash Dumps in FreeBSD, Time on Unix, Improve ZVOL sync write performance with a taskq, central log host with syslog-ng, NetBSD Entropy overhaul, Setting Up NetBSD Kernel Dev Environment, and more.</itunes:subtitle>
  <itunes:duration>57:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Encrypted Crash Dumps in FreeBSD, Time on Unix, Improve ZVOL sync write performance with a taskq, central log host with syslog-ng, NetBSD Entropy overhaul, Setting Up NetBSD Kernel Dev Environment, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://oshogbo.vexillium.org/blog/74/" target="_blank" rel="nofollow noopener"&gt;EKCD - Encrypted Crash Dumps in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Some time ago, I was describing how to configure networking crash dumps. In that post, I mentioned that there is also the possibility to encrypt crash dumps. Today we will look into this functionality. Initially, it was implemented during Google Summer of Code 2013 by my friend Konrad Witaszczyk, who made it available in FreeBSD 12. If you can understand Polish, you can also look into his presentation on BSD-PL on which he gave a comprehensive review of all kernel crash dumps features.&lt;/p&gt;

&lt;p&gt;&amp;gt; The main issue with crash dumps is that they may include sensitive information available in memory during a crash. They will contain all the data from the kernel and the userland, like passwords, private keys, etc. While dumping them, they are written to unencrypted storage, so if somebody took out the hard drive, they could access sensitive data. If you are sending a crash dump through the network, it may be captured by third parties. Locally the data are written directly to a dump device, skipping the GEOM subsystem. The purpose of that is to allow a kernel to write a crash dump even in case a panic occurs in the GEOM subsystem. It means that a crash dump cannot be automatically encrypted with GELI.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://venam.nixers.net/blog/unix/2020/05/02/time-on-unix.html" target="_blank" rel="nofollow noopener"&gt;Time on Unix&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Time, a word that is entangled in everything in our lives, something we’re intimately familiar with. Keeping track of it is important for many activities we do.&lt;/p&gt;

&lt;p&gt;&amp;gt; Over millennia we’ve developed different ways to calculate it. Most prominently, we’ve relied on the position the sun appears to be at in the sky, what is called apparent solar time.&lt;/p&gt;

&lt;p&gt;&amp;gt; We’ve decided to split it as seasons pass, counting one full cycle of the 4 seasons as a year, a full rotation around the sun. We’ve also divided the passing of light to the lack thereof as days, a rotation of the earth on itself. Moving on to more precise clock divisions such as seconds, minutes, and hours, units that meant different things at different points in history. Ultimately, as travel got faster, the different ways of counting time that evolved in multiple places had to converge. People had to agree on what it all meant.&lt;/p&gt;

&lt;p&gt;See the article for more&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/openzfs/zfs/commit/0929c4de398606f8305057ca540cf577e6771c30" target="_blank" rel="nofollow noopener"&gt;Improve ZVOL sync write performance by using a taskq&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://blog.socruel.nu/freebsd/a-central-log-host-with-syslog-ng-on-freebsd.html" target="_blank" rel="nofollow noopener"&gt;A central log host with syslog-ng on FreeBSD - Part 1&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; syslog-ng is the Swiss army knife of log management. You can collect logs from any source, process them in real time and deliver them to wide range of destinations. It allows you to flexibly collect, parse, classify, rewrite and correlate logs from across your infrastructure. This is why syslog-ng is the perfect solution for the central log host of my (mainly) FreeBSD based infrastructure.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/current-users/2020/05/01/msg038495.html" target="_blank" rel="nofollow noopener"&gt;HEADS UP: NetBSD Entropy Overhaul&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; This week I committed an overhaul of the kernel entropy system.  Please let me know if you observe any snags!  For the technical background, see the thread on tech-kern a few months ago: .&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://adityapadala.com/2020/04/20/Setting-Up-NetBSD-Kernel-Dev-Environment/" target="_blank" rel="nofollow noopener"&gt;Setting Up NetBSD Kernel Dev Environment&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I used T_PAGEFLT’s blog post as a reference for setting my NetBSD kernel development environment since his website is down I’m putting down the steps here so it would be helpful for starters.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2020/05/04/24480.html" target="_blank" rel="nofollow noopener"&gt;You can now use ccache to speed up dsynth even more.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/improving_libossaudio_and_the_future" target="_blank" rel="nofollow noopener"&gt;Improving libossaudio, and the future of OSS in NetBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2020-April/769021.html" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD DHCPCD Import dhcpcd-9.0.2 with the following changes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://wiki.freebsd.org/OfficeHours" target="_blank" rel="nofollow noopener"&gt;Reminder: watch this space for upcoming FreeBSD Office Hours, next is May 13th at 2pm Eastern, 18:00 UTC&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Ghislain - &lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/349/feedback/Ghislain%20-%20ZFS%20Question.md" target="_blank" rel="nofollow noopener"&gt;ZFS Question&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jake - &lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/349/feedback/Jake%20-%20Paypal%20Donations.md" target="_blank" rel="nofollow noopener"&gt;Paypal Donations&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Oswin - &lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/349/feedback/Oswin%20-%20Hammer%20tutorial.md" target="_blank" rel="nofollow noopener"&gt;Hammer tutorial&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;p&gt;&lt;br&gt;
    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4"&gt;&lt;br&gt;
    Your browser does not support the HTML5 video tag.&lt;br&gt;
&lt;/source&gt; &lt;/p&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, crash, crash dump, encryption, encrypted, unix time, zvol, sync, synchronous, sync write, taskq, syslog, syslog-ng, log host, entropy, entropy overhaul, dev environment, kernel development</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Encrypted Crash Dumps in FreeBSD, Time on Unix, Improve ZVOL sync write performance with a taskq, central log host with syslog-ng, NetBSD Entropy overhaul, Setting Up NetBSD Kernel Dev Environment, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://oshogbo.vexillium.org/blog/74/" rel="nofollow">EKCD - Encrypted Crash Dumps in FreeBSD</a></h3>

<blockquote>
<p>Some time ago, I was describing how to configure networking crash dumps. In that post, I mentioned that there is also the possibility to encrypt crash dumps. Today we will look into this functionality. Initially, it was implemented during Google Summer of Code 2013 by my friend Konrad Witaszczyk, who made it available in FreeBSD 12. If you can understand Polish, you can also look into his presentation on BSD-PL on which he gave a comprehensive review of all kernel crash dumps features.</p>

<p>The main issue with crash dumps is that they may include sensitive information available in memory during a crash. They will contain all the data from the kernel and the userland, like passwords, private keys, etc. While dumping them, they are written to unencrypted storage, so if somebody took out the hard drive, they could access sensitive data. If you are sending a crash dump through the network, it may be captured by third parties. Locally the data are written directly to a dump device, skipping the GEOM subsystem. The purpose of that is to allow a kernel to write a crash dump even in case a panic occurs in the GEOM subsystem. It means that a crash dump cannot be automatically encrypted with GELI.</p>
</blockquote>

<hr>

<h3><a href="https://venam.nixers.net/blog/unix/2020/05/02/time-on-unix.html" rel="nofollow">Time on Unix</a></h3>

<blockquote>
<p>Time, a word that is entangled in everything in our lives, something we’re intimately familiar with. Keeping track of it is important for many activities we do.</p>

<p>Over millennia we’ve developed different ways to calculate it. Most prominently, we’ve relied on the position the sun appears to be at in the sky, what is called apparent solar time.</p>

<p>We’ve decided to split it as seasons pass, counting one full cycle of the 4 seasons as a year, a full rotation around the sun. We’ve also divided the passing of light to the lack thereof as days, a rotation of the earth on itself. Moving on to more precise clock divisions such as seconds, minutes, and hours, units that meant different things at different points in history. Ultimately, as travel got faster, the different ways of counting time that evolved in multiple places had to converge. People had to agree on what it all meant.</p>
</blockquote>

<p>See the article for more</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/openzfs/zfs/commit/0929c4de398606f8305057ca540cf577e6771c30" rel="nofollow">Improve ZVOL sync write performance by using a taskq</a></h3>

<hr>

<h3><a href="https://blog.socruel.nu/freebsd/a-central-log-host-with-syslog-ng-on-freebsd.html" rel="nofollow">A central log host with syslog-ng on FreeBSD - Part 1</a></h3>

<blockquote>
<p>syslog-ng is the Swiss army knife of log management. You can collect logs from any source, process them in real time and deliver them to wide range of destinations. It allows you to flexibly collect, parse, classify, rewrite and correlate logs from across your infrastructure. This is why syslog-ng is the perfect solution for the central log host of my (mainly) FreeBSD based infrastructure.</p>
</blockquote>

<hr>

<h3><a href="https://mail-index.netbsd.org/current-users/2020/05/01/msg038495.html" rel="nofollow">HEADS UP: NetBSD Entropy Overhaul</a></h3>

<blockquote>
<p>This week I committed an overhaul of the kernel entropy system.  Please let me know if you observe any snags!  For the technical background, see the thread on tech-kern a few months ago: <a href="https://mail-index.NetBSD.org/tech-kern/2019/12/21/msg025876.html" rel="nofollow">https://mail-index.NetBSD.org/tech-kern/2019/12/21/msg025876.html</a>.</p>
</blockquote>

<hr>

<h3><a href="https://adityapadala.com/2020/04/20/Setting-Up-NetBSD-Kernel-Dev-Environment/" rel="nofollow">Setting Up NetBSD Kernel Dev Environment</a></h3>

<blockquote>
<p>I used T_PAGEFLT’s blog post as a reference for setting my NetBSD kernel development environment since his website is down I’m putting down the steps here so it would be helpful for starters.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/05/04/24480.html" rel="nofollow">You can now use ccache to speed up dsynth even more.</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/improving_libossaudio_and_the_future" rel="nofollow">Improving libossaudio, and the future of OSS in NetBSD</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2020-April/769021.html" rel="nofollow">DragonFlyBSD DHCPCD Import dhcpcd-9.0.2 with the following changes</a></li>
<li><a href="https://wiki.freebsd.org/OfficeHours" rel="nofollow">Reminder: watch this space for upcoming FreeBSD Office Hours, next is May 13th at 2pm Eastern, 18:00 UTC</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Ghislain - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/349/feedback/Ghislain%20-%20ZFS%20Question.md" rel="nofollow">ZFS Question</a></li>
<li>Jake - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/349/feedback/Jake%20-%20Paypal%20Donations.md" rel="nofollow">Paypal Donations</a></li>
<li>Oswin - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/349/feedback/Oswin%20-%20Hammer%20tutorial.md" rel="nofollow">Hammer tutorial</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Encrypted Crash Dumps in FreeBSD, Time on Unix, Improve ZVOL sync write performance with a taskq, central log host with syslog-ng, NetBSD Entropy overhaul, Setting Up NetBSD Kernel Dev Environment, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://oshogbo.vexillium.org/blog/74/" rel="nofollow">EKCD - Encrypted Crash Dumps in FreeBSD</a></h3>

<blockquote>
<p>Some time ago, I was describing how to configure networking crash dumps. In that post, I mentioned that there is also the possibility to encrypt crash dumps. Today we will look into this functionality. Initially, it was implemented during Google Summer of Code 2013 by my friend Konrad Witaszczyk, who made it available in FreeBSD 12. If you can understand Polish, you can also look into his presentation on BSD-PL on which he gave a comprehensive review of all kernel crash dumps features.</p>

<p>The main issue with crash dumps is that they may include sensitive information available in memory during a crash. They will contain all the data from the kernel and the userland, like passwords, private keys, etc. While dumping them, they are written to unencrypted storage, so if somebody took out the hard drive, they could access sensitive data. If you are sending a crash dump through the network, it may be captured by third parties. Locally the data are written directly to a dump device, skipping the GEOM subsystem. The purpose of that is to allow a kernel to write a crash dump even in case a panic occurs in the GEOM subsystem. It means that a crash dump cannot be automatically encrypted with GELI.</p>
</blockquote>

<hr>

<h3><a href="https://venam.nixers.net/blog/unix/2020/05/02/time-on-unix.html" rel="nofollow">Time on Unix</a></h3>

<blockquote>
<p>Time, a word that is entangled in everything in our lives, something we’re intimately familiar with. Keeping track of it is important for many activities we do.</p>

<p>Over millennia we’ve developed different ways to calculate it. Most prominently, we’ve relied on the position the sun appears to be at in the sky, what is called apparent solar time.</p>

<p>We’ve decided to split it as seasons pass, counting one full cycle of the 4 seasons as a year, a full rotation around the sun. We’ve also divided the passing of light to the lack thereof as days, a rotation of the earth on itself. Moving on to more precise clock divisions such as seconds, minutes, and hours, units that meant different things at different points in history. Ultimately, as travel got faster, the different ways of counting time that evolved in multiple places had to converge. People had to agree on what it all meant.</p>
</blockquote>

<p>See the article for more</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/openzfs/zfs/commit/0929c4de398606f8305057ca540cf577e6771c30" rel="nofollow">Improve ZVOL sync write performance by using a taskq</a></h3>

<hr>

<h3><a href="https://blog.socruel.nu/freebsd/a-central-log-host-with-syslog-ng-on-freebsd.html" rel="nofollow">A central log host with syslog-ng on FreeBSD - Part 1</a></h3>

<blockquote>
<p>syslog-ng is the Swiss army knife of log management. You can collect logs from any source, process them in real time and deliver them to wide range of destinations. It allows you to flexibly collect, parse, classify, rewrite and correlate logs from across your infrastructure. This is why syslog-ng is the perfect solution for the central log host of my (mainly) FreeBSD based infrastructure.</p>
</blockquote>

<hr>

<h3><a href="https://mail-index.netbsd.org/current-users/2020/05/01/msg038495.html" rel="nofollow">HEADS UP: NetBSD Entropy Overhaul</a></h3>

<blockquote>
<p>This week I committed an overhaul of the kernel entropy system.  Please let me know if you observe any snags!  For the technical background, see the thread on tech-kern a few months ago: <a href="https://mail-index.NetBSD.org/tech-kern/2019/12/21/msg025876.html" rel="nofollow">https://mail-index.NetBSD.org/tech-kern/2019/12/21/msg025876.html</a>.</p>
</blockquote>

<hr>

<h3><a href="https://adityapadala.com/2020/04/20/Setting-Up-NetBSD-Kernel-Dev-Environment/" rel="nofollow">Setting Up NetBSD Kernel Dev Environment</a></h3>

<blockquote>
<p>I used T_PAGEFLT’s blog post as a reference for setting my NetBSD kernel development environment since his website is down I’m putting down the steps here so it would be helpful for starters.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/05/04/24480.html" rel="nofollow">You can now use ccache to speed up dsynth even more.</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/improving_libossaudio_and_the_future" rel="nofollow">Improving libossaudio, and the future of OSS in NetBSD</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2020-April/769021.html" rel="nofollow">DragonFlyBSD DHCPCD Import dhcpcd-9.0.2 with the following changes</a></li>
<li><a href="https://wiki.freebsd.org/OfficeHours" rel="nofollow">Reminder: watch this space for upcoming FreeBSD Office Hours, next is May 13th at 2pm Eastern, 18:00 UTC</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Ghislain - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/349/feedback/Ghislain%20-%20ZFS%20Question.md" rel="nofollow">ZFS Question</a></li>
<li>Jake - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/349/feedback/Jake%20-%20Paypal%20Donations.md" rel="nofollow">Paypal Donations</a></li>
<li>Oswin - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/349/feedback/Oswin%20-%20Hammer%20tutorial.md" rel="nofollow">Hammer tutorial</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 260: Hacking Tour of Europe | BSD Now 260</title>
  <link>https://www.bsdnow.tv/260</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2463</guid>
  <pubDate>Thu, 23 Aug 2018 05:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a3504e6e-2e15-4430-8917-d6a8782b461e.mp3" length="48332197" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Trip reports from the Essen Hackathon and BSDCam, CfT: ZFS native encryption and UFS trim consolidation, ZFS performance benchmarks on a FreeBSD server, how to port your OS to EC2, Vint Cerf about traceability, Remote Access console to an RPi3 running FreeBSD, and more.</itunes:subtitle>
  <itunes:duration>1:20:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Trip reports from the Essen Hackathon and BSDCam, CfT: ZFS native encryption and UFS trim consolidation, ZFS performance benchmarks on a FreeBSD server, how to port your OS to EC2, Vint Cerf about traceability, Remote Access console to an RPi3 running FreeBSD, and more.&lt;/p&gt;

&lt;p&gt;##Headlines&lt;br&gt;
###&lt;a href="https://wiki.freebsd.org/DevSummit/201808Hackathon" target="_blank" rel="nofollow noopener"&gt;Essen Hackathon &amp;amp; BSDCam 2018 trip report&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Allan and Benedict met at FRA airport and then headed to the Air Rail terminal for our train to Essen where the Hackathon would happen over the weekend of Aug 10 - 12, 2018. Once there, we did not have to wait long until other early-arrivals would show up and soon we had about 10 people gathered for lunch. After buying some take-out pizzas and bringing it back to the Linuxhotel (there was a training still going on there so we could not get into our rooms yet), we sat in the sunny park and talked. More and more people arrived and soon, people started hacking on their laptops. Some people would not arrive until a few hours before midnight, but we already had a record appearance of 20 people in total.&lt;/li&gt;
&lt;li&gt;On Saturday, we gathered everyone in one of the seminar rooms that had rooms and chairs for us. After some organizational infos, we did an introductory round and Benedict wrote down on the whiteboard what people were interested in. It was not long until groups formed to talk about SSL in base, weird ZFS scrubs that would go over 100% completion (fixed now). Other people started working on ports, fixing bugs, or wrote documentation. The day ended in a &lt;a href="https://twitter.com/bsdbcr" target="_blank" rel="nofollow noopener"&gt;BBQ in the Linuxhotel park&lt;/a&gt;, which was well received by everyone.&lt;/li&gt;
&lt;li&gt;On Sunday, after attendees packed up their luggage and stored it in the seminar room, we continued hacking until lunchtime. After a quick group picture, we headed to a local restaurant for the social event (which was not open on Saturday, otherwise we would have had it then). In the afternoon, most people departed, a good half of them were heading for BSDCam.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://freshbsd.org/search?q=Essen+hackathon" target="_blank" rel="nofollow noopener"&gt;Commits from the hackathon (the ones from 2018)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Overall, the hackathon was well received by attendees and a lot of them liked the fact that it was close to another BSD gathering so they could nicely combine the two. Also, people thought about doing their own hackathon in the future, which is an exciting prospect. Thanks to all who attended, helped out here and there when needed. Special Thanks to &lt;a href="https://www.netzkommune.de/" target="_blank" rel="nofollow noopener"&gt;Netzkommune GmbH&lt;/a&gt; for sponsoring the social event and the &lt;a href="http://linuxhotel.de/" target="_blank" rel="nofollow noopener"&gt;Linuxhotel&lt;/a&gt; for having us.&lt;/li&gt;
&lt;li&gt;Benedict was having a regular work day on Monday after coming back from the hackathon, but flew out to Heathrow on Tuesday. Allan was in London a day earlier and arrived a couple of hours before Benedict in Cambridge. He headed for the Computer Lab even though the main event would not start until Wednesday. Most people gathered at the Maypole pub on Tuesday evening for welcomes, food and drinks.&lt;/li&gt;
&lt;li&gt;On Wednesday, a lot of people met in the breakfast room of Churchill College where most people were staying and went to the Computer Lab, which served as the main venue for BSDCam, together. The morning was spend with introductions and collecting what most people were interested in talking. This unconference style has worked well in the past and soon we had 10 main sessions together for the rest of this and the following two days (&lt;a href="https://bsdcam.cl.cam.ac.uk/" target="_blank" rel="nofollow noopener"&gt;full schedule&lt;/a&gt;).&lt;/li&gt;
&lt;li&gt;Most sessions took notes, which you can find on the &lt;a href="https://wiki.freebsd.org/DevSummit/201808" target="_blank" rel="nofollow noopener"&gt;FreeBSD wiki&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;On Thursday evening, we had a nice formal dinner at Trinity Hall.&lt;/li&gt;
&lt;li&gt;BSDCam 2018 was a great success with a lot of fruitful discussions and planning sessions. We thank the organizers for BSDCam for making it happen.&lt;/li&gt;
&lt;li&gt;A special mentions goes out to Robert Watson and his family. Even though he was not there, he had a good reason to miss it: they had their first child born at the beginning of the week. Congratulations and best wishes to all three of them!&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070832.html" target="_blank" rel="nofollow noopener"&gt;Call for Testing: ZFS Native Encryption for FreeBSD&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A port of the ZoL (ZFS-on-Linux) feature that provides native crypto support for ZFS is ready for testing on FreeBSD&lt;/li&gt;
&lt;li&gt;Most of the porting was done by &lt;a href="mailto:sef@freebsd.org" target="_blank" rel="nofollow noopener"&gt;sef@freebsd.org&lt;/a&gt; (Sean Eric Fagan)&lt;/li&gt;
&lt;li&gt;The original ZoL commit is here: &lt;a href="https://github.com/zfsonlinux/zfs/pull/5769/commits/5aef9bedc801830264428c64cd2242d1b786fd49" target="_blank" rel="nofollow noopener"&gt;https://github.com/zfsonlinux/zfs/pull/5769/commits/5aef9bedc801830264428c64cd2242d1b786fd49&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;For an overview, see Tom Caputi’s presentation from the OpenZFS Developers Summit in 2016&lt;/li&gt;
&lt;li&gt;Video: &lt;a href="https://youtu.be/frnLiXclAMo" target="_blank" rel="nofollow noopener"&gt;https://youtu.be/frnLiXclAMo&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Slides: &lt;a href="https://drive.google.com/file/d/0B5hUzsxe4cdmU3ZTRXNxa2JIaDQ/view?usp=sharing" target="_blank" rel="nofollow noopener"&gt;https://drive.google.com/file/d/0B5hUzsxe4cdmU3ZTRXNxa2JIaDQ/view?usp=sharing&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;WARNING: test in VMs or with spare disks etc, pools created with this code, or upgraded to this version, will no longer be importable on systems that do not support this feature. The on-disk format or other things may change before the final version, so you will likely have to ‘zfs send | zfs recv’ the data on to a new pool&lt;/li&gt;
&lt;li&gt;Thanks for testing to help this feature land in FreeBSD&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;iXsystems&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;###&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070797.html" target="_blank" rel="nofollow noopener"&gt;Call for Testing: UFS TRIM Consolidation&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Kirk Mckusick posts to the FreeBSD mailing list looking for testers for the new UFS TRIM Consolidation code&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;When deleting files on filesystems that are stored on flash-memory (solid-state) disk drives, the filesystem notifies the underlying disk of the blocks that it is no longer using. The notification allows the drive to avoid saving these blocks when it needs to flash (zero out) one of its flash pages. These notifications of no-longer-being-used blocks are referred to as TRIM notifications. In FreeBSD these TRIM notifications are sent from the filesystem to the drive using the BIO_DELETE command.&lt;br&gt;
Until now, the filesystem would send a separate message to the drive for each block of the file that was deleted. Each Gigabyte of file size resulted in over 3000 TRIM messages being sent to the drive. This burst of messages can overwhelm the drive’s task queue causing multiple second delays for read and write requests.&lt;br&gt;
This implementation collects runs of contiguous blocks in the file and then consolodates them into a single BIO_DELETE command to the drive. The BIO_DELETE command describes the run of blocks as a single large block being deleted. Each Gigabyte of file size can result in as few as two BIO_DELETE commands and is typically less than ten.  Though these larger BIO_DELETE commands take longer to run, they do not clog the drive task queue, so read and write commands can intersperse effectively with them.&lt;br&gt;
Though this new feature has been throughly reviewed and tested, it is being added disabled by default so as to minimize the possibility of disrupting the upcoming 12.0 release. It can be enabled by running ``sysctl vfs.ffs.dotrimcons=1’’. Users are encouraged to test it. If no problems arise, we will consider requesting that it be enabled by default for 12.0.&lt;br&gt;
This support is off by default, but I am hoping that I can get enough testing to ensure that it (a) works, and (b) is helpful that it will be reasonable to have it turned on by default in 12.0. The cutoff for turning it on by default in 12.0 is September 19th. So I am requesting your testing feedback in the near-term. Please let me know if you have managed to use it successfully (or not) and also if it provided any performance difference (good or bad).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;To enable TRIM consolidation use `sysctl vfs.ffs.dotrimcons=1’&lt;/li&gt;
&lt;li&gt;There is also a diff that adds additional statistics: &lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070798.html" target="_blank" rel="nofollow noopener"&gt;https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070798.html&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;You can also watch the volume and latency of BIO_DELETE commands by running &lt;code&gt;gstat&lt;/code&gt; with the -d flag&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##News Roundup&lt;br&gt;
###&lt;a href="https://aravindh.net/post/zfs_performance/" target="_blank" rel="nofollow noopener"&gt;ZFS performance&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Aravindh Sampathkumar, a Performance Engineer and Sysadmin posts some simple benchmarks he did on a new ZFS server&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;This is NOT an all-in post about ZFS performance. I built a FreeBSD+ZFS file server recently at work to serve as an offsite backup server. I wanted to run a few synthetic workloads on it and look at how it fares from performance perspective. Mostly for curiosity and learning purposes.&lt;br&gt;
As stated in the notes about building this server, performance was not one of the priorities, as this server will never face our active workload. What I care about from this server is its ability to work with rsync and keep the data synchronised with our primary storage server. With that context, I ran a few write tests to see how good our solution is and what to expect from it in terms of performance.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The article then uses FIO to do some benchmarks.&lt;/li&gt;
&lt;li&gt;As the author did, make sure you match the FIO block size to the ZFS record size to avoid write amplification. Either tune FIO or adjust the recordsize property in ZFS&lt;/li&gt;
&lt;li&gt;You also want to consider compression and cache effects&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Write Performance: Incompressible: 1600-2600 MB/s, Compressible: 2500-6600 MB/s&lt;br&gt;
Another over 1200 MB/s is enough to keep your 10 gigabit network saturated&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The increased latency that is seen with higher number of writers working, may be the result of the ZFS backpressure system (the write throttle). There is some tuning that can be done there. Specifically, since this machine has 768 GB of ram, you might allow more than 4GB of dirty data, which would mean you’d be able to write larger batches and not have to push back while you wait for a transaction group to flush when dealing with gigabytes/sec of writes&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="http://www.daemonology.net/blog/2018-07-14-port-OS-to-EC2.html" target="_blank" rel="nofollow noopener"&gt;How to port your OS to EC2&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Colin Percival reflects on his FreeBSD on EC2 maintainership efforts in his blog:&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;I’ve been the maintainer of the FreeBSD/EC2 platform for about 7.5 years now, and as far as “running things in virtual machines” goes, that remains the only operating system and the only cloud which I work on. That said, from time to time I get questions from people who want to port other operating systems into EC2, and being a member of the open source community, I do my best to help them. I realized a few days ago that rather than replying to emails one by one it would be more efficient to post something publicly; so — for the benefit of the dozen or so people who want to port operating systems to run in EC2, and the curiosity of maybe a thousand more people who use EC2 but will never build AMIs themselves — here’s a rough guide to building EC2 images.&lt;br&gt;
Before we can talk about building images, there are some things you need:&lt;br&gt;
Your OS needs to run on x86 hardware. 64-bit (“amd64”, “x86-64”) is ideal, but I’ve managed to run 32-bit FreeBSD on “64-bit” EC2 instances so at least in some cases that’s not strictly necessary.&lt;br&gt;
You almost certainly want to have drivers for Xen block devices (for all of the pre-Nitro EC2 instances) or for NVMe disks (for the most recent EC2 instances). Theoretically you could make do without these since there’s some ATA emulation available for bootstrapping, but if you want to do any disk I/O after the kernel finishes booting you’ll want to have a disk driver.&lt;br&gt;
Similarly, you need support for the Xen network interface (older instances), Intel 10 GbE SR-IOV networking (some newer but pre-Nitro instances), or Amazon’s “ENA” network adapters (on Nitro instances), unless you plan on having instances which don’t communicate over the network. The ENA driver is probably the hardest thing to port, since as far as I know there’s no way to get your hands on the hardware directly, and it’s very difficult to do any debugging in EC2 without having a working network.&lt;br&gt;
Finally, the obvious: You need to have an AWS account, and appropriate API access keys.&lt;br&gt;
Building a disk image&lt;/p&gt;
&lt;p&gt;Building an AMI&lt;br&gt;
I wrote a simple tool for converting disk images into EC2 instances: bsdec2-image-upload. It uploads a disk image to Amazon S3; makes an API call to import that disk image into an EBS volume; creates a snapshot of that volume; then registers an EC2 AMI using that snapshot.&lt;br&gt;
To use bsdec2-image-upload, you’ll first need to create an S3 bucket for it to use as a staging area. You can call it anything you like, but I recommend that you&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;Create it in a “nearby” region (for performance reasons), and&lt;br&gt;
Set an S3 “lifecycle policy” which deletes objects automatically after 1 day (since bsdec2-image-upload doesn’t clean up the S3 bucket, and those objects are useless once you’ve finished creating an AMI).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;Boot configuration&lt;br&gt;
Odds are that your instance started booting and got as far as the boot loader launching the kernel, but at some point after that things went sideways. Now we start the iterative process of building disk images, turning them into AMIs, launching said AMIs, and seeing where they break. Some things you’ll probably run into here:&lt;br&gt;
EC2 instances have two types of console available to them: A serial console and an VGA console. (Or rather, emulated serial and emulated VGA.) If you can have your kernel output go to both consoles, I recommend doing that. If you have to pick one, the serial console (which shows up as the “System Log” in EC2) is probably more useful than the VGA console (which shows up as “instance screenshot”) since it lets you see more than one screen of logs at once; but there’s a catch: Due to some bizarre breakage in EC2 — which I’ve been complaining about for ten years — the serial console is very “laggy”. If you find that you’re not getting any output, wait five minutes and try again.&lt;br&gt;
You may need to tell your kernel where to find the root filesystem. On FreeBSD we build our disk images using GPT labels, so we simply need to specify in /etc/fstab that the root filesystem is on /dev/gpt/rootfs; but if you can’t do this, you’ll probably need to have different AMIs for Nitro instances vs. non-Nitro instances since Xen block devices will typically show up with different device names from NVMe disks. On FreeBSD, I also needed to set the vfs.root.mountfrom kernel environment variable for a while; this also is no longer needed on FreeBSD but something similar may be needed on other systems.&lt;br&gt;
You’ll need to enable networking, using DHCP. On FreeBSD, this means placing ifconfig_DEFAULT=“SYNCDHCP” into /etc/rc.conf; other systems will have other ways of specifying network parameters, and it may be necessary to specify a setting for the Xen network device, Intel SR-IOV network, and the Amazon ENA interface so that you’ll have the necessary configuration across all EC2 instance types. (On FreeBSD, ifconfig_DEFAULT takes care of specifying the network settings which should apply for whatever network interface the kernel finds at boot time.)&lt;br&gt;
You’ll almost certainly want to turn on SSH, so that you can connect into newly launched instances and make use of them. Don’t worry about setting a password or creating a user to SSH into yet — we’ll take care of that later.&lt;br&gt;
EC2 configuration&lt;br&gt;
Now it’s time to make the AMI behave like an EC2 instance. To this end, I prepared a set of rc.d scripts for FreeBSD. Most importantly, they&lt;br&gt;
Print the SSH host keys to the console, so that you can veriy that they are correct when you first SSH in. (Remember, Verifying SSH host keys is more important than flossing every day.)&lt;br&gt;
Download the SSH public key you want to use for logging in, and create an account (by default, “ec2-user”) with that key set up for you.&lt;br&gt;
Fetch EC2 user-data and process it via configinit to allow you to configure the system as part of the process of launching it.&lt;br&gt;
If your OS has an rc system derived from NetBSD’s rc.d, you may be able to use these scripts without any changes by simply installing them and enabling them in /etc/rc.conf; otherwise you may need to write your own scripts using mine as a model.&lt;br&gt;
Firstboot scripts&lt;br&gt;
A feature I added to FreeBSD a few years ago is the concept of “firstboot” scripts: These startup scripts are only run the first time a system boots. The aforementioned configinit and SSH key fetching scripts are flagged this way — so if your OS doesn’t support the “firstboot” keyword on rc.d scripts you’ll need to hack around that — but EC2 instances also ship with other scripts set to run on the first boot:&lt;br&gt;
FreeBSD Update will fetch and install security and critical errata updates, and then reboot the system if necessary.&lt;br&gt;
The UFS filesystem on the “boot disk” will be automatically expanded to the full size of the disk — this makes it possible to specify a larger size of disk at EC2 instance launch time.&lt;br&gt;
Third-party packages will be automatically fetched and installed, according to a list in /etc/rc.conf. This is most useful if configinit is used to edit /etc/rc.conf, since it allows you to specify packages to install via the EC2 user-data.&lt;br&gt;
While none of these are strictly necessary, I find them to be extremely useful and highly recommend implementing similar functionality in your systems.&lt;br&gt;
Support my work!&lt;br&gt;
I hope you find this useful, or at very least interesting. Please consider supporting my work in this area; while I’m happy to contribute my time to supporting open source software, it would be nice if I had money coming in which I could use to cover incidental expenses (e.g., conference travel) so that I didn’t end up paying to contribute to FreeBSD.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;Digital Ocean&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://do.co/bsdnow" target="_blank" rel="nofollow noopener"&gt;https://do.co/bsdnow&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;###&lt;a href="https://cacm.acm.org/magazines/2018/8/229771-traceability/fulltext" target="_blank" rel="nofollow noopener"&gt;Traceability, by Vint Cerf&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A recent article from the August issue of the Communications of the ACM, for your contemplation:&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;At a recent workshop on cybersecurity in the U.K., a primary topic of consideration was how to preserve the freedom and openness of the Internet while protecting against the harmful behaviors that have emerged in this global medium. That this is a significant challenge cannot be overstated. The bad behaviors range from social network bullying and misinformation to email spam, distributed denial of service attacks, direct cyberattacks against infrastructure, malware propagation, identity theft, and a host of other ills requiring a wide range of technical and legal considerations. That these harmful behaviors can and do cross international boundaries only makes it more difficult to fashion effective responses.&lt;br&gt;
In other columns, I have argued for better software development tools to reduce the common mistakes that lead to vulnerabilities that are exploited. Here, I want to focus on another aspect of response related to law enforcement and tracking down perpetrators. Of course, not all harms are (or perhaps are not yet) illegal, but discovering those who cause them may still be warranted. The recent adoption and implementation of the General Data Protection Regulation (GDPR) in the European Union creates an interesting tension because it highlights the importance and value of privacy while those who do direct or indirect harm must be tracked down and their identities discovered.&lt;br&gt;
In passing, I mention that cryptography has sometimes been blamed for protecting the identity or actions of criminals but it is also a tool for protecting privacy. Arguments have been made for “back doors” to cryptographic systems but I am of the opinion that such proposals carry extremely high risk to privacy and safety. It is not my intent to argue this question in this column.&lt;br&gt;
What is of interest to me is a concept to which I was introduced at the Ditchley workshop, specifically, differential traceability. The ability to trace bad actors to bring them to justice seems to me an important goal in a civilized society. The tension with privacy protection leads to the idea that only under appropriate conditions can privacy be violated. By way of example, consider license plates on cars. They are usually arbitrary identifiers and special authority is needed to match them with the car owners (unless, of course, they are vanity plates like mine: “Cerfsup”). This is an example of differential traceability; the police department has the authority to demand ownership information from the Department of Motor Vehicles that issues the license plates. Ordinary citizens do not have this authority.&lt;br&gt;
In the Internet environment there are a variety of identifiers associated with users (including corporate users). Domain names, IP addresses, email addresses, and public cryptography keys are examples among many others. Some of these identifiers are dynamic and thus ambiguous. For example, IP addresses are not always permanent and may change (for example, temporary IP addresses assigned at Wi-Fi hotspots) or may be ambiguous in the case of Network Address Translation. Information about the time of assignment and the party to whom an IP address was assigned may be needed to identify an individual user. There has been considerable debate and even a recent court case regarding requirements to register users in domain name WHOIS databases in the context of the adoption of GDPR. If we are to accomplish the simultaneous objectives of protecting privacy while apprehending those engaged in harmful or criminal behavior on the Internet, we must find some balance between conflicting but desirable outcomes.&lt;br&gt;
This suggests to me that the notion of traceability under (internationally?) agreed circumstances (that is, differential traceability) might be a fruitful concept to explore. In most societies today, it is accepted that we must be identifiable to appropriate authorities under certain conditions (consider border crossings, traffic violation stops as examples). While there are conditions under which apparent anonymity is desirable and even justifiable (whistle-blowing, for example) absolute anonymity is actually quite difficult to achieve (another point made at the Ditchley workshop) and might not be absolutely desirable given the misbehaviors apparent anonymity invites. I expect this is a controversial conclusion and I look forward to subsequent discussion.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://blackdot.be/2018/08/remote-access-console-using-raspberry-pi-3b-and-freebsd/" target="_blank" rel="nofollow noopener"&gt;Remote Access Console using FreeBSD on an RPi3&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Our friend, and FOSDEM Booth Neighbour, Jorge, has posted a tutorial on how he created a remote access console for his SmartOS server and other machines in his homelab&lt;/li&gt;
&lt;li&gt;Parts:&lt;/li&gt;
&lt;li&gt;Raspberry Pi 3 B+&lt;/li&gt;
&lt;li&gt;NavoLabs micro POE Hat&lt;/li&gt;
&lt;li&gt;FT4232H  based USB-to-RS232 (4x) adapter&lt;/li&gt;
&lt;li&gt;Official Raspberry Pi case (optional)&lt;/li&gt;
&lt;li&gt;Heat-sink kit (optional)&lt;/li&gt;
&lt;li&gt;USB-to-TTL adaptor (optional)&lt;/li&gt;
&lt;li&gt;Sandisk 16Gb microSD&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;For the software I ended up using conserver. Below is a very brief tutorial on how to set everything up. I assume you have basic unix skills.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Get an RPi3 image, make some minor modifications for RPi3+, and write it to the USB stick&lt;/li&gt;
&lt;li&gt;Configure FreeBSD on the RPi3
&lt;ul&gt;
&lt;li&gt;Load the ‘muge’ Ethernet Driver&lt;/li&gt;
&lt;li&gt;Load USB serial support&lt;/li&gt;
&lt;li&gt;Load the FTDI driver&lt;/li&gt;
&lt;li&gt;Enable SSHd and Conserver&lt;/li&gt;
&lt;li&gt;Configure Conserver&lt;/li&gt;
&lt;li&gt;Setup log rotation&lt;/li&gt;
&lt;li&gt;Start Conserver&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;And you’re good to go&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;A small bonus script I wrote to turn on the 2nd LED on the rPI once the system is booted, it will then blink the LED if someone is connected to any of the consoles.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;There is also a followup post with some additional tips: &lt;a href="https://blackdot.be/2018/08/freebsd-uart-and-raspberry-pi-3-b/" target="_blank" rel="nofollow noopener"&gt;https://blackdot.be/2018/08/freebsd-uart-and-raspberry-pi-3-b/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##Beastie Bits&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://twitter.com/ungleich/status/1031501391792156673" target="_blank" rel="nofollow noopener"&gt;Annual Penguin Races&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.mcternan.me.uk/mscgen/" target="_blank" rel="nofollow noopener"&gt;Mscgen - Message Sequence Chart generator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D16723" target="_blank" rel="nofollow noopener"&gt;This patch makes FreeBSD boot 500 - 800ms faster, please test on your hardware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=338059" target="_blank" rel="nofollow noopener"&gt;FreeBSD’s arc4random() replaced with OpenBSD ChaCha20 implementation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/freebsdfndation/status/1031590348768915456" target="_blank" rel="nofollow noopener"&gt;MeetBSD Devsummit open for registrations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mwl.io/archives/3654" target="_blank" rel="nofollow noopener"&gt;New Podcast interview with Michael W. Lucas&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;Tarsnap&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;##Feedback/Questions&lt;br&gt;
We need more feedback emails. Please write to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Additionally, we are considering a new segment to be added to the end of the show (to make it skippable), where we have a ~15 minute deep dive on a topic. Some initial ideas are on the Virtual Memory subsystem, the Scheduler, Capsicum, and GEOM. What topics would you like to get very detailed explanations of? Many of the explanations may have accompanying graphics, and not be very suitable for audio only listeners, that is why we are planning to put it at the very end of the episode.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, zfs, performance, encryption, remote access, rpi3, raspberry pi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Trip reports from the Essen Hackathon and BSDCam, CfT: ZFS native encryption and UFS trim consolidation, ZFS performance benchmarks on a FreeBSD server, how to port your OS to EC2, Vint Cerf about traceability, Remote Access console to an RPi3 running FreeBSD, and more.</p>

<p>##Headlines<br>
###<a href="https://wiki.freebsd.org/DevSummit/201808Hackathon">Essen Hackathon &amp; BSDCam 2018 trip report</a></p>

<ul>
<li>Allan and Benedict met at FRA airport and then headed to the Air Rail terminal for our train to Essen where the Hackathon would happen over the weekend of Aug 10 - 12, 2018. Once there, we did not have to wait long until other early-arrivals would show up and soon we had about 10 people gathered for lunch. After buying some take-out pizzas and bringing it back to the Linuxhotel (there was a training still going on there so we could not get into our rooms yet), we sat in the sunny park and talked. More and more people arrived and soon, people started hacking on their laptops. Some people would not arrive until a few hours before midnight, but we already had a record appearance of 20 people in total.</li>
<li>On Saturday, we gathered everyone in one of the seminar rooms that had rooms and chairs for us. After some organizational infos, we did an introductory round and Benedict wrote down on the whiteboard what people were interested in. It was not long until groups formed to talk about SSL in base, weird ZFS scrubs that would go over 100% completion (fixed now). Other people started working on ports, fixing bugs, or wrote documentation. The day ended in a <a href="https://twitter.com/bsdbcr">BBQ in the Linuxhotel park</a>, which was well received by everyone.</li>
<li>On Sunday, after attendees packed up their luggage and stored it in the seminar room, we continued hacking until lunchtime. After a quick group picture, we headed to a local restaurant for the social event (which was not open on Saturday, otherwise we would have had it then). In the afternoon, most people departed, a good half of them were heading for BSDCam.</li>
<li><a href="http://freshbsd.org/search?q=Essen+hackathon">Commits from the hackathon (the ones from 2018)</a></li>
<li>Overall, the hackathon was well received by attendees and a lot of them liked the fact that it was close to another BSD gathering so they could nicely combine the two. Also, people thought about doing their own hackathon in the future, which is an exciting prospect. Thanks to all who attended, helped out here and there when needed. Special Thanks to <a href="https://www.netzkommune.de/">Netzkommune GmbH</a> for sponsoring the social event and the <a href="http://linuxhotel.de/">Linuxhotel</a> for having us.</li>
<li>Benedict was having a regular work day on Monday after coming back from the hackathon, but flew out to Heathrow on Tuesday. Allan was in London a day earlier and arrived a couple of hours before Benedict in Cambridge. He headed for the Computer Lab even though the main event would not start until Wednesday. Most people gathered at the Maypole pub on Tuesday evening for welcomes, food and drinks.</li>
<li>On Wednesday, a lot of people met in the breakfast room of Churchill College where most people were staying and went to the Computer Lab, which served as the main venue for BSDCam, together. The morning was spend with introductions and collecting what most people were interested in talking. This unconference style has worked well in the past and soon we had 10 main sessions together for the rest of this and the following two days (<a href="https://bsdcam.cl.cam.ac.uk/">full schedule</a>).</li>
<li>Most sessions took notes, which you can find on the <a href="https://wiki.freebsd.org/DevSummit/201808">FreeBSD wiki</a>.</li>
<li>On Thursday evening, we had a nice formal dinner at Trinity Hall.</li>
<li>BSDCam 2018 was a great success with a lot of fruitful discussions and planning sessions. We thank the organizers for BSDCam for making it happen.</li>
<li>A special mentions goes out to Robert Watson and his family. Even though he was not there, he had a good reason to miss it: they had their first child born at the beginning of the week. Congratulations and best wishes to all three of them!</li>
</ul>

<p><hr></p>

<p>###<a href="https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070832.html">Call for Testing: ZFS Native Encryption for FreeBSD</a></p>

<ul>
<li>A port of the ZoL (ZFS-on-Linux) feature that provides native crypto support for ZFS is ready for testing on FreeBSD</li>
<li>Most of the porting was done by <a href="mailto:sef@freebsd.org">sef@freebsd.org</a> (Sean Eric Fagan)</li>
<li>The original ZoL commit is here: <a href="https://github.com/zfsonlinux/zfs/pull/5769/commits/5aef9bedc801830264428c64cd2242d1b786fd49">https://github.com/zfsonlinux/zfs/pull/5769/commits/5aef9bedc801830264428c64cd2242d1b786fd49</a></li>
<li>For an overview, see Tom Caputi’s presentation from the OpenZFS Developers Summit in 2016</li>
<li>Video: <a href="https://youtu.be/frnLiXclAMo">https://youtu.be/frnLiXclAMo</a></li>
<li>Slides: <a href="https://drive.google.com/file/d/0B5hUzsxe4cdmU3ZTRXNxa2JIaDQ/view?usp=sharing">https://drive.google.com/file/d/0B5hUzsxe4cdmU3ZTRXNxa2JIaDQ/view?usp=sharing</a></li>
<li>WARNING: test in VMs or with spare disks etc, pools created with this code, or upgraded to this version, will no longer be importable on systems that do not support this feature. The on-disk format or other things may change before the final version, so you will likely have to ‘zfs send | zfs recv’ the data on to a new pool</li>
<li>Thanks for testing to help this feature land in FreeBSD</li>
</ul>

<p><hr></p>

<p><strong>iXsystems</strong></p>

<p>###<a href="https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070797.html">Call for Testing: UFS TRIM Consolidation</a></p>

<ul>
<li>Kirk Mckusick posts to the FreeBSD mailing list looking for testers for the new UFS TRIM Consolidation code</li>
</ul>

<blockquote>
<p>When deleting files on filesystems that are stored on flash-memory (solid-state) disk drives, the filesystem notifies the underlying disk of the blocks that it is no longer using. The notification allows the drive to avoid saving these blocks when it needs to flash (zero out) one of its flash pages. These notifications of no-longer-being-used blocks are referred to as TRIM notifications. In FreeBSD these TRIM notifications are sent from the filesystem to the drive using the BIO_DELETE command.<br>
Until now, the filesystem would send a separate message to the drive for each block of the file that was deleted. Each Gigabyte of file size resulted in over 3000 TRIM messages being sent to the drive. This burst of messages can overwhelm the drive’s task queue causing multiple second delays for read and write requests.<br>
This implementation collects runs of contiguous blocks in the file and then consolodates them into a single BIO_DELETE command to the drive. The BIO_DELETE command describes the run of blocks as a single large block being deleted. Each Gigabyte of file size can result in as few as two BIO_DELETE commands and is typically less than ten.  Though these larger BIO_DELETE commands take longer to run, they do not clog the drive task queue, so read and write commands can intersperse effectively with them.<br>
Though this new feature has been throughly reviewed and tested, it is being added disabled by default so as to minimize the possibility of disrupting the upcoming 12.0 release. It can be enabled by running ``sysctl vfs.ffs.dotrimcons=1’’. Users are encouraged to test it. If no problems arise, we will consider requesting that it be enabled by default for 12.0.<br>
This support is off by default, but I am hoping that I can get enough testing to ensure that it (a) works, and (b) is helpful that it will be reasonable to have it turned on by default in 12.0. The cutoff for turning it on by default in 12.0 is September 19th. So I am requesting your testing feedback in the near-term. Please let me know if you have managed to use it successfully (or not) and also if it provided any performance difference (good or bad).</p>
</blockquote>

<ul>
<li>To enable TRIM consolidation use `sysctl vfs.ffs.dotrimcons=1’</li>
<li>There is also a diff that adds additional statistics: <a href="https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070798.html">https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070798.html</a></li>
<li>You can also watch the volume and latency of BIO_DELETE commands by running <code>gstat</code> with the -d flag</li>
</ul>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://aravindh.net/post/zfs_performance/">ZFS performance</a></p>

<ul>
<li>Aravindh Sampathkumar, a Performance Engineer and Sysadmin posts some simple benchmarks he did on a new ZFS server</li>
</ul>

<blockquote>
<p>This is NOT an all-in post about ZFS performance. I built a FreeBSD+ZFS file server recently at work to serve as an offsite backup server. I wanted to run a few synthetic workloads on it and look at how it fares from performance perspective. Mostly for curiosity and learning purposes.<br>
As stated in the notes about building this server, performance was not one of the priorities, as this server will never face our active workload. What I care about from this server is its ability to work with rsync and keep the data synchronised with our primary storage server. With that context, I ran a few write tests to see how good our solution is and what to expect from it in terms of performance.</p>
</blockquote>

<ul>
<li>The article then uses FIO to do some benchmarks.</li>
<li>As the author did, make sure you match the FIO block size to the ZFS record size to avoid write amplification. Either tune FIO or adjust the recordsize property in ZFS</li>
<li>You also want to consider compression and cache effects</li>
</ul>

<blockquote>
<p>Write Performance: Incompressible: 1600-2600 MB/s, Compressible: 2500-6600 MB/s<br>
Another over 1200 MB/s is enough to keep your 10 gigabit network saturated</p>
</blockquote>

<ul>
<li>The increased latency that is seen with higher number of writers working, may be the result of the ZFS backpressure system (the write throttle). There is some tuning that can be done there. Specifically, since this machine has 768 GB of ram, you might allow more than 4GB of dirty data, which would mean you’d be able to write larger batches and not have to push back while you wait for a transaction group to flush when dealing with gigabytes/sec of writes</li>
</ul>

<p><hr></p>

<p>###<a href="http://www.daemonology.net/blog/2018-07-14-port-OS-to-EC2.html">How to port your OS to EC2</a></p>

<ul>
<li>Colin Percival reflects on his FreeBSD on EC2 maintainership efforts in his blog:</li>
</ul>

<blockquote>
<p>I’ve been the maintainer of the FreeBSD/EC2 platform for about 7.5 years now, and as far as “running things in virtual machines” goes, that remains the only operating system and the only cloud which I work on. That said, from time to time I get questions from people who want to port other operating systems into EC2, and being a member of the open source community, I do my best to help them. I realized a few days ago that rather than replying to emails one by one it would be more efficient to post something publicly; so — for the benefit of the dozen or so people who want to port operating systems to run in EC2, and the curiosity of maybe a thousand more people who use EC2 but will never build AMIs themselves — here’s a rough guide to building EC2 images.<br>
Before we can talk about building images, there are some things you need:<br>
Your OS needs to run on x86 hardware. 64-bit (“amd64”, “x86-64”) is ideal, but I’ve managed to run 32-bit FreeBSD on “64-bit” EC2 instances so at least in some cases that’s not strictly necessary.<br>
You almost certainly want to have drivers for Xen block devices (for all of the pre-Nitro EC2 instances) or for NVMe disks (for the most recent EC2 instances). Theoretically you could make do without these since there’s some ATA emulation available for bootstrapping, but if you want to do any disk I/O after the kernel finishes booting you’ll want to have a disk driver.<br>
Similarly, you need support for the Xen network interface (older instances), Intel 10 GbE SR-IOV networking (some newer but pre-Nitro instances), or Amazon’s “ENA” network adapters (on Nitro instances), unless you plan on having instances which don’t communicate over the network. The ENA driver is probably the hardest thing to port, since as far as I know there’s no way to get your hands on the hardware directly, and it’s very difficult to do any debugging in EC2 without having a working network.<br>
Finally, the obvious: You need to have an AWS account, and appropriate API access keys.<br>
Building a disk image</p>
<p>Building an AMI<br>
I wrote a simple tool for converting disk images into EC2 instances: bsdec2-image-upload. It uploads a disk image to Amazon S3; makes an API call to import that disk image into an EBS volume; creates a snapshot of that volume; then registers an EC2 AMI using that snapshot.<br>
To use bsdec2-image-upload, you’ll first need to create an S3 bucket for it to use as a staging area. You can call it anything you like, but I recommend that you</p>
</blockquote>

<blockquote>
<p>Create it in a “nearby” region (for performance reasons), and<br>
Set an S3 “lifecycle policy” which deletes objects automatically after 1 day (since bsdec2-image-upload doesn’t clean up the S3 bucket, and those objects are useless once you’ve finished creating an AMI).</p>
</blockquote>

<blockquote>
<p>Boot configuration<br>
Odds are that your instance started booting and got as far as the boot loader launching the kernel, but at some point after that things went sideways. Now we start the iterative process of building disk images, turning them into AMIs, launching said AMIs, and seeing where they break. Some things you’ll probably run into here:<br>
EC2 instances have two types of console available to them: A serial console and an VGA console. (Or rather, emulated serial and emulated VGA.) If you can have your kernel output go to both consoles, I recommend doing that. If you have to pick one, the serial console (which shows up as the “System Log” in EC2) is probably more useful than the VGA console (which shows up as “instance screenshot”) since it lets you see more than one screen of logs at once; but there’s a catch: Due to some bizarre breakage in EC2 — which I’ve been complaining about for ten years — the serial console is very “laggy”. If you find that you’re not getting any output, wait five minutes and try again.<br>
You may need to tell your kernel where to find the root filesystem. On FreeBSD we build our disk images using GPT labels, so we simply need to specify in /etc/fstab that the root filesystem is on /dev/gpt/rootfs; but if you can’t do this, you’ll probably need to have different AMIs for Nitro instances vs. non-Nitro instances since Xen block devices will typically show up with different device names from NVMe disks. On FreeBSD, I also needed to set the vfs.root.mountfrom kernel environment variable for a while; this also is no longer needed on FreeBSD but something similar may be needed on other systems.<br>
You’ll need to enable networking, using DHCP. On FreeBSD, this means placing ifconfig_DEFAULT=“SYNCDHCP” into /etc/rc.conf; other systems will have other ways of specifying network parameters, and it may be necessary to specify a setting for the Xen network device, Intel SR-IOV network, and the Amazon ENA interface so that you’ll have the necessary configuration across all EC2 instance types. (On FreeBSD, ifconfig_DEFAULT takes care of specifying the network settings which should apply for whatever network interface the kernel finds at boot time.)<br>
You’ll almost certainly want to turn on SSH, so that you can connect into newly launched instances and make use of them. Don’t worry about setting a password or creating a user to SSH into yet — we’ll take care of that later.<br>
EC2 configuration<br>
Now it’s time to make the AMI behave like an EC2 instance. To this end, I prepared a set of rc.d scripts for FreeBSD. Most importantly, they<br>
Print the SSH host keys to the console, so that you can veriy that they are correct when you first SSH in. (Remember, Verifying SSH host keys is more important than flossing every day.)<br>
Download the SSH public key you want to use for logging in, and create an account (by default, “ec2-user”) with that key set up for you.<br>
Fetch EC2 user-data and process it via configinit to allow you to configure the system as part of the process of launching it.<br>
If your OS has an rc system derived from NetBSD’s rc.d, you may be able to use these scripts without any changes by simply installing them and enabling them in /etc/rc.conf; otherwise you may need to write your own scripts using mine as a model.<br>
Firstboot scripts<br>
A feature I added to FreeBSD a few years ago is the concept of “firstboot” scripts: These startup scripts are only run the first time a system boots. The aforementioned configinit and SSH key fetching scripts are flagged this way — so if your OS doesn’t support the “firstboot” keyword on rc.d scripts you’ll need to hack around that — but EC2 instances also ship with other scripts set to run on the first boot:<br>
FreeBSD Update will fetch and install security and critical errata updates, and then reboot the system if necessary.<br>
The UFS filesystem on the “boot disk” will be automatically expanded to the full size of the disk — this makes it possible to specify a larger size of disk at EC2 instance launch time.<br>
Third-party packages will be automatically fetched and installed, according to a list in /etc/rc.conf. This is most useful if configinit is used to edit /etc/rc.conf, since it allows you to specify packages to install via the EC2 user-data.<br>
While none of these are strictly necessary, I find them to be extremely useful and highly recommend implementing similar functionality in your systems.<br>
Support my work!<br>
I hope you find this useful, or at very least interesting. Please consider supporting my work in this area; while I’m happy to contribute my time to supporting open source software, it would be nice if I had money coming in which I could use to cover incidental expenses (e.g., conference travel) so that I didn’t end up paying to contribute to FreeBSD.</p>
</blockquote>

<p><hr></p>

<p><strong>Digital Ocean</strong><br>
<a href="https://do.co/bsdnow">https://do.co/bsdnow</a></p>

<p>###<a href="https://cacm.acm.org/magazines/2018/8/229771-traceability/fulltext">Traceability, by Vint Cerf</a></p>

<ul>
<li>A recent article from the August issue of the Communications of the ACM, for your contemplation:</li>
</ul>

<blockquote>
<p>At a recent workshop on cybersecurity in the U.K., a primary topic of consideration was how to preserve the freedom and openness of the Internet while protecting against the harmful behaviors that have emerged in this global medium. That this is a significant challenge cannot be overstated. The bad behaviors range from social network bullying and misinformation to email spam, distributed denial of service attacks, direct cyberattacks against infrastructure, malware propagation, identity theft, and a host of other ills requiring a wide range of technical and legal considerations. That these harmful behaviors can and do cross international boundaries only makes it more difficult to fashion effective responses.<br>
In other columns, I have argued for better software development tools to reduce the common mistakes that lead to vulnerabilities that are exploited. Here, I want to focus on another aspect of response related to law enforcement and tracking down perpetrators. Of course, not all harms are (or perhaps are not yet) illegal, but discovering those who cause them may still be warranted. The recent adoption and implementation of the General Data Protection Regulation (GDPR) in the European Union creates an interesting tension because it highlights the importance and value of privacy while those who do direct or indirect harm must be tracked down and their identities discovered.<br>
In passing, I mention that cryptography has sometimes been blamed for protecting the identity or actions of criminals but it is also a tool for protecting privacy. Arguments have been made for “back doors” to cryptographic systems but I am of the opinion that such proposals carry extremely high risk to privacy and safety. It is not my intent to argue this question in this column.<br>
What is of interest to me is a concept to which I was introduced at the Ditchley workshop, specifically, differential traceability. The ability to trace bad actors to bring them to justice seems to me an important goal in a civilized society. The tension with privacy protection leads to the idea that only under appropriate conditions can privacy be violated. By way of example, consider license plates on cars. They are usually arbitrary identifiers and special authority is needed to match them with the car owners (unless, of course, they are vanity plates like mine: “Cerfsup”). This is an example of differential traceability; the police department has the authority to demand ownership information from the Department of Motor Vehicles that issues the license plates. Ordinary citizens do not have this authority.<br>
In the Internet environment there are a variety of identifiers associated with users (including corporate users). Domain names, IP addresses, email addresses, and public cryptography keys are examples among many others. Some of these identifiers are dynamic and thus ambiguous. For example, IP addresses are not always permanent and may change (for example, temporary IP addresses assigned at Wi-Fi hotspots) or may be ambiguous in the case of Network Address Translation. Information about the time of assignment and the party to whom an IP address was assigned may be needed to identify an individual user. There has been considerable debate and even a recent court case regarding requirements to register users in domain name WHOIS databases in the context of the adoption of GDPR. If we are to accomplish the simultaneous objectives of protecting privacy while apprehending those engaged in harmful or criminal behavior on the Internet, we must find some balance between conflicting but desirable outcomes.<br>
This suggests to me that the notion of traceability under (internationally?) agreed circumstances (that is, differential traceability) might be a fruitful concept to explore. In most societies today, it is accepted that we must be identifiable to appropriate authorities under certain conditions (consider border crossings, traffic violation stops as examples). While there are conditions under which apparent anonymity is desirable and even justifiable (whistle-blowing, for example) absolute anonymity is actually quite difficult to achieve (another point made at the Ditchley workshop) and might not be absolutely desirable given the misbehaviors apparent anonymity invites. I expect this is a controversial conclusion and I look forward to subsequent discussion.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://blackdot.be/2018/08/remote-access-console-using-raspberry-pi-3b-and-freebsd/">Remote Access Console using FreeBSD on an RPi3</a></p>

<ul>
<li>Our friend, and FOSDEM Booth Neighbour, Jorge, has posted a tutorial on how he created a remote access console for his SmartOS server and other machines in his homelab</li>
<li>Parts:</li>
<li>Raspberry Pi 3 B+</li>
<li>NavoLabs micro POE Hat</li>
<li>FT4232H  based USB-to-RS232 (4x) adapter</li>
<li>Official Raspberry Pi case (optional)</li>
<li>Heat-sink kit (optional)</li>
<li>USB-to-TTL adaptor (optional)</li>
<li>Sandisk 16Gb microSD</li>
</ul>

<blockquote>
<p>For the software I ended up using conserver. Below is a very brief tutorial on how to set everything up. I assume you have basic unix skills.</p>
</blockquote>

<ul>
<li>Get an RPi3 image, make some minor modifications for RPi3+, and write it to the USB stick</li>
<li>Configure FreeBSD on the RPi3
<ul>
<li>Load the ‘muge’ Ethernet Driver</li>
<li>Load USB serial support</li>
<li>Load the FTDI driver</li>
<li>Enable SSHd and Conserver</li>
<li>Configure Conserver</li>
<li>Setup log rotation</li>
<li>Start Conserver</li>
</ul>

<p></li><br>
<li>And you’re good to go</li><br>
</ul></p>

<blockquote>
<p>A small bonus script I wrote to turn on the 2nd LED on the rPI once the system is booted, it will then blink the LED if someone is connected to any of the consoles.</p>
</blockquote>

<ul>
<li>There is also a followup post with some additional tips: <a href="https://blackdot.be/2018/08/freebsd-uart-and-raspberry-pi-3-b/">https://blackdot.be/2018/08/freebsd-uart-and-raspberry-pi-3-b/</a></li>
</ul>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://twitter.com/ungleich/status/1031501391792156673">Annual Penguin Races</a></li>
<li><a href="http://www.mcternan.me.uk/mscgen/">Mscgen - Message Sequence Chart generator</a></li>
<li><a href="https://reviews.freebsd.org/D16723">This patch makes FreeBSD boot 500 - 800ms faster, please test on your hardware</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=338059">FreeBSD’s arc4random() replaced with OpenBSD ChaCha20 implementation</a></li>
<li><a href="https://twitter.com/freebsdfndation/status/1031590348768915456">MeetBSD Devsummit open for registrations</a></li>
<li><a href="https://mwl.io/archives/3654">New Podcast interview with Michael W. Lucas</a></li>
</ul>

<p><hr></p>

<p><strong>Tarsnap</strong></p>

<p>##Feedback/Questions<br>
We need more feedback emails. Please write to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></p>

<p>Additionally, we are considering a new segment to be added to the end of the show (to make it skippable), where we have a ~15 minute deep dive on a topic. Some initial ideas are on the Virtual Memory subsystem, the Scheduler, Capsicum, and GEOM. What topics would you like to get very detailed explanations of? Many of the explanations may have accompanying graphics, and not be very suitable for audio only listeners, that is why we are planning to put it at the very end of the episode.</p>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Trip reports from the Essen Hackathon and BSDCam, CfT: ZFS native encryption and UFS trim consolidation, ZFS performance benchmarks on a FreeBSD server, how to port your OS to EC2, Vint Cerf about traceability, Remote Access console to an RPi3 running FreeBSD, and more.</p>

<p>##Headlines<br>
###<a href="https://wiki.freebsd.org/DevSummit/201808Hackathon">Essen Hackathon &amp; BSDCam 2018 trip report</a></p>

<ul>
<li>Allan and Benedict met at FRA airport and then headed to the Air Rail terminal for our train to Essen where the Hackathon would happen over the weekend of Aug 10 - 12, 2018. Once there, we did not have to wait long until other early-arrivals would show up and soon we had about 10 people gathered for lunch. After buying some take-out pizzas and bringing it back to the Linuxhotel (there was a training still going on there so we could not get into our rooms yet), we sat in the sunny park and talked. More and more people arrived and soon, people started hacking on their laptops. Some people would not arrive until a few hours before midnight, but we already had a record appearance of 20 people in total.</li>
<li>On Saturday, we gathered everyone in one of the seminar rooms that had rooms and chairs for us. After some organizational infos, we did an introductory round and Benedict wrote down on the whiteboard what people were interested in. It was not long until groups formed to talk about SSL in base, weird ZFS scrubs that would go over 100% completion (fixed now). Other people started working on ports, fixing bugs, or wrote documentation. The day ended in a <a href="https://twitter.com/bsdbcr">BBQ in the Linuxhotel park</a>, which was well received by everyone.</li>
<li>On Sunday, after attendees packed up their luggage and stored it in the seminar room, we continued hacking until lunchtime. After a quick group picture, we headed to a local restaurant for the social event (which was not open on Saturday, otherwise we would have had it then). In the afternoon, most people departed, a good half of them were heading for BSDCam.</li>
<li><a href="http://freshbsd.org/search?q=Essen+hackathon">Commits from the hackathon (the ones from 2018)</a></li>
<li>Overall, the hackathon was well received by attendees and a lot of them liked the fact that it was close to another BSD gathering so they could nicely combine the two. Also, people thought about doing their own hackathon in the future, which is an exciting prospect. Thanks to all who attended, helped out here and there when needed. Special Thanks to <a href="https://www.netzkommune.de/">Netzkommune GmbH</a> for sponsoring the social event and the <a href="http://linuxhotel.de/">Linuxhotel</a> for having us.</li>
<li>Benedict was having a regular work day on Monday after coming back from the hackathon, but flew out to Heathrow on Tuesday. Allan was in London a day earlier and arrived a couple of hours before Benedict in Cambridge. He headed for the Computer Lab even though the main event would not start until Wednesday. Most people gathered at the Maypole pub on Tuesday evening for welcomes, food and drinks.</li>
<li>On Wednesday, a lot of people met in the breakfast room of Churchill College where most people were staying and went to the Computer Lab, which served as the main venue for BSDCam, together. The morning was spend with introductions and collecting what most people were interested in talking. This unconference style has worked well in the past and soon we had 10 main sessions together for the rest of this and the following two days (<a href="https://bsdcam.cl.cam.ac.uk/">full schedule</a>).</li>
<li>Most sessions took notes, which you can find on the <a href="https://wiki.freebsd.org/DevSummit/201808">FreeBSD wiki</a>.</li>
<li>On Thursday evening, we had a nice formal dinner at Trinity Hall.</li>
<li>BSDCam 2018 was a great success with a lot of fruitful discussions and planning sessions. We thank the organizers for BSDCam for making it happen.</li>
<li>A special mentions goes out to Robert Watson and his family. Even though he was not there, he had a good reason to miss it: they had their first child born at the beginning of the week. Congratulations and best wishes to all three of them!</li>
</ul>

<p><hr></p>

<p>###<a href="https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070832.html">Call for Testing: ZFS Native Encryption for FreeBSD</a></p>

<ul>
<li>A port of the ZoL (ZFS-on-Linux) feature that provides native crypto support for ZFS is ready for testing on FreeBSD</li>
<li>Most of the porting was done by <a href="mailto:sef@freebsd.org">sef@freebsd.org</a> (Sean Eric Fagan)</li>
<li>The original ZoL commit is here: <a href="https://github.com/zfsonlinux/zfs/pull/5769/commits/5aef9bedc801830264428c64cd2242d1b786fd49">https://github.com/zfsonlinux/zfs/pull/5769/commits/5aef9bedc801830264428c64cd2242d1b786fd49</a></li>
<li>For an overview, see Tom Caputi’s presentation from the OpenZFS Developers Summit in 2016</li>
<li>Video: <a href="https://youtu.be/frnLiXclAMo">https://youtu.be/frnLiXclAMo</a></li>
<li>Slides: <a href="https://drive.google.com/file/d/0B5hUzsxe4cdmU3ZTRXNxa2JIaDQ/view?usp=sharing">https://drive.google.com/file/d/0B5hUzsxe4cdmU3ZTRXNxa2JIaDQ/view?usp=sharing</a></li>
<li>WARNING: test in VMs or with spare disks etc, pools created with this code, or upgraded to this version, will no longer be importable on systems that do not support this feature. The on-disk format or other things may change before the final version, so you will likely have to ‘zfs send | zfs recv’ the data on to a new pool</li>
<li>Thanks for testing to help this feature land in FreeBSD</li>
</ul>

<p><hr></p>

<p><strong>iXsystems</strong></p>

<p>###<a href="https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070797.html">Call for Testing: UFS TRIM Consolidation</a></p>

<ul>
<li>Kirk Mckusick posts to the FreeBSD mailing list looking for testers for the new UFS TRIM Consolidation code</li>
</ul>

<blockquote>
<p>When deleting files on filesystems that are stored on flash-memory (solid-state) disk drives, the filesystem notifies the underlying disk of the blocks that it is no longer using. The notification allows the drive to avoid saving these blocks when it needs to flash (zero out) one of its flash pages. These notifications of no-longer-being-used blocks are referred to as TRIM notifications. In FreeBSD these TRIM notifications are sent from the filesystem to the drive using the BIO_DELETE command.<br>
Until now, the filesystem would send a separate message to the drive for each block of the file that was deleted. Each Gigabyte of file size resulted in over 3000 TRIM messages being sent to the drive. This burst of messages can overwhelm the drive’s task queue causing multiple second delays for read and write requests.<br>
This implementation collects runs of contiguous blocks in the file and then consolodates them into a single BIO_DELETE command to the drive. The BIO_DELETE command describes the run of blocks as a single large block being deleted. Each Gigabyte of file size can result in as few as two BIO_DELETE commands and is typically less than ten.  Though these larger BIO_DELETE commands take longer to run, they do not clog the drive task queue, so read and write commands can intersperse effectively with them.<br>
Though this new feature has been throughly reviewed and tested, it is being added disabled by default so as to minimize the possibility of disrupting the upcoming 12.0 release. It can be enabled by running ``sysctl vfs.ffs.dotrimcons=1’’. Users are encouraged to test it. If no problems arise, we will consider requesting that it be enabled by default for 12.0.<br>
This support is off by default, but I am hoping that I can get enough testing to ensure that it (a) works, and (b) is helpful that it will be reasonable to have it turned on by default in 12.0. The cutoff for turning it on by default in 12.0 is September 19th. So I am requesting your testing feedback in the near-term. Please let me know if you have managed to use it successfully (or not) and also if it provided any performance difference (good or bad).</p>
</blockquote>

<ul>
<li>To enable TRIM consolidation use `sysctl vfs.ffs.dotrimcons=1’</li>
<li>There is also a diff that adds additional statistics: <a href="https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070798.html">https://lists.freebsd.org/pipermail/freebsd-current/2018-August/070798.html</a></li>
<li>You can also watch the volume and latency of BIO_DELETE commands by running <code>gstat</code> with the -d flag</li>
</ul>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://aravindh.net/post/zfs_performance/">ZFS performance</a></p>

<ul>
<li>Aravindh Sampathkumar, a Performance Engineer and Sysadmin posts some simple benchmarks he did on a new ZFS server</li>
</ul>

<blockquote>
<p>This is NOT an all-in post about ZFS performance. I built a FreeBSD+ZFS file server recently at work to serve as an offsite backup server. I wanted to run a few synthetic workloads on it and look at how it fares from performance perspective. Mostly for curiosity and learning purposes.<br>
As stated in the notes about building this server, performance was not one of the priorities, as this server will never face our active workload. What I care about from this server is its ability to work with rsync and keep the data synchronised with our primary storage server. With that context, I ran a few write tests to see how good our solution is and what to expect from it in terms of performance.</p>
</blockquote>

<ul>
<li>The article then uses FIO to do some benchmarks.</li>
<li>As the author did, make sure you match the FIO block size to the ZFS record size to avoid write amplification. Either tune FIO or adjust the recordsize property in ZFS</li>
<li>You also want to consider compression and cache effects</li>
</ul>

<blockquote>
<p>Write Performance: Incompressible: 1600-2600 MB/s, Compressible: 2500-6600 MB/s<br>
Another over 1200 MB/s is enough to keep your 10 gigabit network saturated</p>
</blockquote>

<ul>
<li>The increased latency that is seen with higher number of writers working, may be the result of the ZFS backpressure system (the write throttle). There is some tuning that can be done there. Specifically, since this machine has 768 GB of ram, you might allow more than 4GB of dirty data, which would mean you’d be able to write larger batches and not have to push back while you wait for a transaction group to flush when dealing with gigabytes/sec of writes</li>
</ul>

<p><hr></p>

<p>###<a href="http://www.daemonology.net/blog/2018-07-14-port-OS-to-EC2.html">How to port your OS to EC2</a></p>

<ul>
<li>Colin Percival reflects on his FreeBSD on EC2 maintainership efforts in his blog:</li>
</ul>

<blockquote>
<p>I’ve been the maintainer of the FreeBSD/EC2 platform for about 7.5 years now, and as far as “running things in virtual machines” goes, that remains the only operating system and the only cloud which I work on. That said, from time to time I get questions from people who want to port other operating systems into EC2, and being a member of the open source community, I do my best to help them. I realized a few days ago that rather than replying to emails one by one it would be more efficient to post something publicly; so — for the benefit of the dozen or so people who want to port operating systems to run in EC2, and the curiosity of maybe a thousand more people who use EC2 but will never build AMIs themselves — here’s a rough guide to building EC2 images.<br>
Before we can talk about building images, there are some things you need:<br>
Your OS needs to run on x86 hardware. 64-bit (“amd64”, “x86-64”) is ideal, but I’ve managed to run 32-bit FreeBSD on “64-bit” EC2 instances so at least in some cases that’s not strictly necessary.<br>
You almost certainly want to have drivers for Xen block devices (for all of the pre-Nitro EC2 instances) or for NVMe disks (for the most recent EC2 instances). Theoretically you could make do without these since there’s some ATA emulation available for bootstrapping, but if you want to do any disk I/O after the kernel finishes booting you’ll want to have a disk driver.<br>
Similarly, you need support for the Xen network interface (older instances), Intel 10 GbE SR-IOV networking (some newer but pre-Nitro instances), or Amazon’s “ENA” network adapters (on Nitro instances), unless you plan on having instances which don’t communicate over the network. The ENA driver is probably the hardest thing to port, since as far as I know there’s no way to get your hands on the hardware directly, and it’s very difficult to do any debugging in EC2 without having a working network.<br>
Finally, the obvious: You need to have an AWS account, and appropriate API access keys.<br>
Building a disk image</p>
<p>Building an AMI<br>
I wrote a simple tool for converting disk images into EC2 instances: bsdec2-image-upload. It uploads a disk image to Amazon S3; makes an API call to import that disk image into an EBS volume; creates a snapshot of that volume; then registers an EC2 AMI using that snapshot.<br>
To use bsdec2-image-upload, you’ll first need to create an S3 bucket for it to use as a staging area. You can call it anything you like, but I recommend that you</p>
</blockquote>

<blockquote>
<p>Create it in a “nearby” region (for performance reasons), and<br>
Set an S3 “lifecycle policy” which deletes objects automatically after 1 day (since bsdec2-image-upload doesn’t clean up the S3 bucket, and those objects are useless once you’ve finished creating an AMI).</p>
</blockquote>

<blockquote>
<p>Boot configuration<br>
Odds are that your instance started booting and got as far as the boot loader launching the kernel, but at some point after that things went sideways. Now we start the iterative process of building disk images, turning them into AMIs, launching said AMIs, and seeing where they break. Some things you’ll probably run into here:<br>
EC2 instances have two types of console available to them: A serial console and an VGA console. (Or rather, emulated serial and emulated VGA.) If you can have your kernel output go to both consoles, I recommend doing that. If you have to pick one, the serial console (which shows up as the “System Log” in EC2) is probably more useful than the VGA console (which shows up as “instance screenshot”) since it lets you see more than one screen of logs at once; but there’s a catch: Due to some bizarre breakage in EC2 — which I’ve been complaining about for ten years — the serial console is very “laggy”. If you find that you’re not getting any output, wait five minutes and try again.<br>
You may need to tell your kernel where to find the root filesystem. On FreeBSD we build our disk images using GPT labels, so we simply need to specify in /etc/fstab that the root filesystem is on /dev/gpt/rootfs; but if you can’t do this, you’ll probably need to have different AMIs for Nitro instances vs. non-Nitro instances since Xen block devices will typically show up with different device names from NVMe disks. On FreeBSD, I also needed to set the vfs.root.mountfrom kernel environment variable for a while; this also is no longer needed on FreeBSD but something similar may be needed on other systems.<br>
You’ll need to enable networking, using DHCP. On FreeBSD, this means placing ifconfig_DEFAULT=“SYNCDHCP” into /etc/rc.conf; other systems will have other ways of specifying network parameters, and it may be necessary to specify a setting for the Xen network device, Intel SR-IOV network, and the Amazon ENA interface so that you’ll have the necessary configuration across all EC2 instance types. (On FreeBSD, ifconfig_DEFAULT takes care of specifying the network settings which should apply for whatever network interface the kernel finds at boot time.)<br>
You’ll almost certainly want to turn on SSH, so that you can connect into newly launched instances and make use of them. Don’t worry about setting a password or creating a user to SSH into yet — we’ll take care of that later.<br>
EC2 configuration<br>
Now it’s time to make the AMI behave like an EC2 instance. To this end, I prepared a set of rc.d scripts for FreeBSD. Most importantly, they<br>
Print the SSH host keys to the console, so that you can veriy that they are correct when you first SSH in. (Remember, Verifying SSH host keys is more important than flossing every day.)<br>
Download the SSH public key you want to use for logging in, and create an account (by default, “ec2-user”) with that key set up for you.<br>
Fetch EC2 user-data and process it via configinit to allow you to configure the system as part of the process of launching it.<br>
If your OS has an rc system derived from NetBSD’s rc.d, you may be able to use these scripts without any changes by simply installing them and enabling them in /etc/rc.conf; otherwise you may need to write your own scripts using mine as a model.<br>
Firstboot scripts<br>
A feature I added to FreeBSD a few years ago is the concept of “firstboot” scripts: These startup scripts are only run the first time a system boots. The aforementioned configinit and SSH key fetching scripts are flagged this way — so if your OS doesn’t support the “firstboot” keyword on rc.d scripts you’ll need to hack around that — but EC2 instances also ship with other scripts set to run on the first boot:<br>
FreeBSD Update will fetch and install security and critical errata updates, and then reboot the system if necessary.<br>
The UFS filesystem on the “boot disk” will be automatically expanded to the full size of the disk — this makes it possible to specify a larger size of disk at EC2 instance launch time.<br>
Third-party packages will be automatically fetched and installed, according to a list in /etc/rc.conf. This is most useful if configinit is used to edit /etc/rc.conf, since it allows you to specify packages to install via the EC2 user-data.<br>
While none of these are strictly necessary, I find them to be extremely useful and highly recommend implementing similar functionality in your systems.<br>
Support my work!<br>
I hope you find this useful, or at very least interesting. Please consider supporting my work in this area; while I’m happy to contribute my time to supporting open source software, it would be nice if I had money coming in which I could use to cover incidental expenses (e.g., conference travel) so that I didn’t end up paying to contribute to FreeBSD.</p>
</blockquote>

<p><hr></p>

<p><strong>Digital Ocean</strong><br>
<a href="https://do.co/bsdnow">https://do.co/bsdnow</a></p>

<p>###<a href="https://cacm.acm.org/magazines/2018/8/229771-traceability/fulltext">Traceability, by Vint Cerf</a></p>

<ul>
<li>A recent article from the August issue of the Communications of the ACM, for your contemplation:</li>
</ul>

<blockquote>
<p>At a recent workshop on cybersecurity in the U.K., a primary topic of consideration was how to preserve the freedom and openness of the Internet while protecting against the harmful behaviors that have emerged in this global medium. That this is a significant challenge cannot be overstated. The bad behaviors range from social network bullying and misinformation to email spam, distributed denial of service attacks, direct cyberattacks against infrastructure, malware propagation, identity theft, and a host of other ills requiring a wide range of technical and legal considerations. That these harmful behaviors can and do cross international boundaries only makes it more difficult to fashion effective responses.<br>
In other columns, I have argued for better software development tools to reduce the common mistakes that lead to vulnerabilities that are exploited. Here, I want to focus on another aspect of response related to law enforcement and tracking down perpetrators. Of course, not all harms are (or perhaps are not yet) illegal, but discovering those who cause them may still be warranted. The recent adoption and implementation of the General Data Protection Regulation (GDPR) in the European Union creates an interesting tension because it highlights the importance and value of privacy while those who do direct or indirect harm must be tracked down and their identities discovered.<br>
In passing, I mention that cryptography has sometimes been blamed for protecting the identity or actions of criminals but it is also a tool for protecting privacy. Arguments have been made for “back doors” to cryptographic systems but I am of the opinion that such proposals carry extremely high risk to privacy and safety. It is not my intent to argue this question in this column.<br>
What is of interest to me is a concept to which I was introduced at the Ditchley workshop, specifically, differential traceability. The ability to trace bad actors to bring them to justice seems to me an important goal in a civilized society. The tension with privacy protection leads to the idea that only under appropriate conditions can privacy be violated. By way of example, consider license plates on cars. They are usually arbitrary identifiers and special authority is needed to match them with the car owners (unless, of course, they are vanity plates like mine: “Cerfsup”). This is an example of differential traceability; the police department has the authority to demand ownership information from the Department of Motor Vehicles that issues the license plates. Ordinary citizens do not have this authority.<br>
In the Internet environment there are a variety of identifiers associated with users (including corporate users). Domain names, IP addresses, email addresses, and public cryptography keys are examples among many others. Some of these identifiers are dynamic and thus ambiguous. For example, IP addresses are not always permanent and may change (for example, temporary IP addresses assigned at Wi-Fi hotspots) or may be ambiguous in the case of Network Address Translation. Information about the time of assignment and the party to whom an IP address was assigned may be needed to identify an individual user. There has been considerable debate and even a recent court case regarding requirements to register users in domain name WHOIS databases in the context of the adoption of GDPR. If we are to accomplish the simultaneous objectives of protecting privacy while apprehending those engaged in harmful or criminal behavior on the Internet, we must find some balance between conflicting but desirable outcomes.<br>
This suggests to me that the notion of traceability under (internationally?) agreed circumstances (that is, differential traceability) might be a fruitful concept to explore. In most societies today, it is accepted that we must be identifiable to appropriate authorities under certain conditions (consider border crossings, traffic violation stops as examples). While there are conditions under which apparent anonymity is desirable and even justifiable (whistle-blowing, for example) absolute anonymity is actually quite difficult to achieve (another point made at the Ditchley workshop) and might not be absolutely desirable given the misbehaviors apparent anonymity invites. I expect this is a controversial conclusion and I look forward to subsequent discussion.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://blackdot.be/2018/08/remote-access-console-using-raspberry-pi-3b-and-freebsd/">Remote Access Console using FreeBSD on an RPi3</a></p>

<ul>
<li>Our friend, and FOSDEM Booth Neighbour, Jorge, has posted a tutorial on how he created a remote access console for his SmartOS server and other machines in his homelab</li>
<li>Parts:</li>
<li>Raspberry Pi 3 B+</li>
<li>NavoLabs micro POE Hat</li>
<li>FT4232H  based USB-to-RS232 (4x) adapter</li>
<li>Official Raspberry Pi case (optional)</li>
<li>Heat-sink kit (optional)</li>
<li>USB-to-TTL adaptor (optional)</li>
<li>Sandisk 16Gb microSD</li>
</ul>

<blockquote>
<p>For the software I ended up using conserver. Below is a very brief tutorial on how to set everything up. I assume you have basic unix skills.</p>
</blockquote>

<ul>
<li>Get an RPi3 image, make some minor modifications for RPi3+, and write it to the USB stick</li>
<li>Configure FreeBSD on the RPi3
<ul>
<li>Load the ‘muge’ Ethernet Driver</li>
<li>Load USB serial support</li>
<li>Load the FTDI driver</li>
<li>Enable SSHd and Conserver</li>
<li>Configure Conserver</li>
<li>Setup log rotation</li>
<li>Start Conserver</li>
</ul>

<p></li><br>
<li>And you’re good to go</li><br>
</ul></p>

<blockquote>
<p>A small bonus script I wrote to turn on the 2nd LED on the rPI once the system is booted, it will then blink the LED if someone is connected to any of the consoles.</p>
</blockquote>

<ul>
<li>There is also a followup post with some additional tips: <a href="https://blackdot.be/2018/08/freebsd-uart-and-raspberry-pi-3-b/">https://blackdot.be/2018/08/freebsd-uart-and-raspberry-pi-3-b/</a></li>
</ul>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://twitter.com/ungleich/status/1031501391792156673">Annual Penguin Races</a></li>
<li><a href="http://www.mcternan.me.uk/mscgen/">Mscgen - Message Sequence Chart generator</a></li>
<li><a href="https://reviews.freebsd.org/D16723">This patch makes FreeBSD boot 500 - 800ms faster, please test on your hardware</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=338059">FreeBSD’s arc4random() replaced with OpenBSD ChaCha20 implementation</a></li>
<li><a href="https://twitter.com/freebsdfndation/status/1031590348768915456">MeetBSD Devsummit open for registrations</a></li>
<li><a href="https://mwl.io/archives/3654">New Podcast interview with Michael W. Lucas</a></li>
</ul>

<p><hr></p>

<p><strong>Tarsnap</strong></p>

<p>##Feedback/Questions<br>
We need more feedback emails. Please write to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></p>

<p>Additionally, we are considering a new segment to be added to the end of the show (to make it skippable), where we have a ~15 minute deep dive on a topic. Some initial ideas are on the Virtual Memory subsystem, the Scheduler, Capsicum, and GEOM. What topics would you like to get very detailed explanations of? Many of the explanations may have accompanying graphics, and not be very suitable for audio only listeners, that is why we are planning to put it at the very end of the episode.</p>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>97: Big Network, SmallWall</title>
  <link>https://www.bsdnow.tv/97</link>
  <guid isPermaLink="false">8ae01f5e-8be5-4cbc-bb95-094f2d536681</guid>
  <pubDate>Wed, 08 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8ae01f5e-8be5-4cbc-bb95-094f2d536681.mp3" length="56408980" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be chatting with Lee Sharp. He's recently revived the m0n0wall codebase, now known as SmallWall, and we'll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be chatting with Lee Sharp. He's recently revived the m0n0wall codebase, now known as SmallWall, and we'll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/channel/UCAEx6zhR2sD2pAGKezasAjA/videos" target="_blank" rel="nofollow noopener"&gt;BSDCan and pkgsrcCon videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Even more BSDCan 2015 videos are slowly but surely making their way to the internet&lt;/li&gt;
&lt;li&gt;Nigel Williams, &lt;a href="https://www.youtube.com/watch?v=P3vB_FWtyIs" target="_blank" rel="nofollow noopener"&gt;Multipath TCP for FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Stephen Bourne, &lt;a href="https://www.youtube.com/watch?v=2kEJoWfobpA" target="_blank" rel="nofollow noopener"&gt;Early days of Unix and design of sh&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;John Criswell, &lt;a href="https://www.youtube.com/watch?v=hRIC_aF_u24" target="_blank" rel="nofollow noopener"&gt;Protecting FreeBSD with Secure Virtual Architecture&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Shany Michaely, &lt;a href="https://www.youtube.com/watch?v=stsaeKvF3no" target="_blank" rel="nofollow noopener"&gt;Expanding RDMA capability over Ethernet in FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;John-Mark Gurney, &lt;a href="https://www.youtube.com/watch?v=JaufZ7yCrLU" target="_blank" rel="nofollow noopener"&gt;Adding AES-ICM and AES-GCM to OpenCrypto&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Sevan Janiyan, &lt;a href="https://www.youtube.com/watch?v=-HMXyzybgdM" target="_blank" rel="nofollow noopener"&gt;Adventures in building&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=Xof-uKnQ6cY" target="_blank" rel="nofollow noopener"&gt;open source software&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;And finally, &lt;a href="https://www.youtube.com/watch?v=Ynm0bGnYdfY" target="_blank" rel="nofollow noopener"&gt;the BSDCan 2015 closing&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Some &lt;a href="https://vimeo.com/channels/pkgsrccon/videos" target="_blank" rel="nofollow noopener"&gt;videos&lt;/a&gt; from this year's &lt;a href="http://pkgsrc.org/pkgsrcCon/2015/" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon&lt;/a&gt; are also starting to appear online&lt;/li&gt;
&lt;li&gt;Sevan Janiyan, &lt;a href="https://vimeo.com/channels/pkgsrccon/132767946" target="_blank" rel="nofollow noopener"&gt;A year of pkgsrc 2014 - 2015&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Pierre Pronchery, &lt;a href="https://vimeo.com/channels/pkgsrccon/132766052" target="_blank" rel="nofollow noopener"&gt;pkgsrc meets pkg-ng&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jonathan Perkin, &lt;a href="https://vimeo.com/channels/pkgsrccon/132760863" target="_blank" rel="nofollow noopener"&gt;pkgsrc at Joyent&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jörg Sonnenberger, &lt;a href="https://vimeo.com/channels/pkgsrccon/132757658" target="_blank" rel="nofollow noopener"&gt;pkg_install script framework&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Benny Siegert, &lt;a href="https://vimeo.com/channels/pkgsrccon/132751897" target="_blank" rel="nofollow noopener"&gt;New Features in BulkTracker&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This is the first time we've ever seen recordings from the conference - hopefully they continue this trend
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forum.opnsense.org/index.php?topic=839.0" target="_blank" rel="nofollow noopener"&gt;OPNsense 15.7 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OPNsense team has released version 15.7, almost exactly six months after &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;their initial debut&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server&lt;/li&gt;
&lt;li&gt;Taking a note from upstream PF's playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140419151959" target="_blank" rel="nofollow noopener"&gt;completely removed&lt;/a&gt; just over a year ago)&lt;/li&gt;
&lt;li&gt;The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI - switching between the two is simple; no commitment needed&lt;/li&gt;
&lt;li&gt;Various third party ports have also been bumped up to their latest versions to keep things fresh, and there's the usual round of bug fixes included&lt;/li&gt;
&lt;li&gt;Shortly afterwards, &lt;a href="https://forum.opnsense.org/index.php?topic=915.0" target="_blank" rel="nofollow noopener"&gt;15.7.1&lt;/a&gt; was released with a few more small fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/07/04/msg000688.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference 2015 Okinawa&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you liked &lt;a href="http://www.bsdnow.tv/episodes/2015_07_01-lost_technology" target="_blank" rel="nofollow noopener"&gt;last week's episode&lt;/a&gt; then you'll probably know what to expect with this one&lt;/li&gt;
&lt;li&gt;The NetBSD users group of Japan hit another open source conference, this time in Okinawa&lt;/li&gt;
&lt;li&gt;This time, they had a few interesting NetBSD machines on display that we didn't get to see in the interview last week&lt;/li&gt;
&lt;li&gt;We'd love to see something like this in North America or Europe too - anyone up for installing BSD on some interesting devices and showing them off at a Linux con?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://firstyear.id.au/entry/21" target="_blank" rel="nofollow noopener"&gt;OpenBSD BGP and VRFs&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"&lt;a href="https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding" target="_blank" rel="nofollow noopener"&gt;VRFs&lt;/a&gt;, or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic"&lt;/li&gt;
&lt;li&gt;This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness&lt;/li&gt;
&lt;li&gt;With multiple rdomains, it's also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them&lt;/li&gt;
&lt;li&gt;The idea of a "guest network" can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues&lt;/li&gt;
&lt;li&gt;Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here&lt;/li&gt;
&lt;li&gt;The &lt;a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" target="_blank" rel="nofollow noopener"&gt;BSDCan talk on rdomains&lt;/a&gt; expands on the subject a bit more if you haven't seen it, as well as a few &lt;a href="https://www.packetmischief.ca/2011/09/20/virtualizing-the-openbsd-routing-table/" target="_blank" rel="nofollow noopener"&gt;related&lt;/a&gt; &lt;a href="http://cybermashup.com/2013/05/21/complex-routing-with-openbsd/" target="_blank" rel="nofollow noopener"&gt;posts&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Lee Sharp - &lt;a href="mailto:lee@smallwall.org" target="_blank" rel="nofollow noopener"&gt;lee@smallwall.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://smallwall.org" target="_blank" rel="nofollow noopener"&gt;SmallWall&lt;/a&gt;, a continuation of m0n0wall&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blogs.oracle.com/solarisfw/entry/pf_for_solaris" target="_blank" rel="nofollow noopener"&gt;Solaris adopts more BSD goodies&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD's PF firewall to their next version, even contributing back patches for SMP and other bug fixes&lt;/li&gt;
&lt;li&gt;They recently published an article about PF, talking about what's different about it on their platform compared to others - not especially useful for BSD users, but interesting to read if you like firewalls&lt;/li&gt;
&lt;li&gt;Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a &lt;a href="https://blogs.oracle.com/darren/entry/openssh_in_solaris_11_3" target="_blank" rel="nofollow noopener"&gt;second blog post&lt;/a&gt; up about their "SunSSH" fork&lt;/li&gt;
&lt;li&gt;Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that&lt;/li&gt;
&lt;li&gt;The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two&lt;/li&gt;
&lt;li&gt;In &lt;a href="https://blogs.oracle.com/darren/entry/solaris_new_system_calls_getentropy" target="_blank" rel="nofollow noopener"&gt;a third blog post&lt;/a&gt;, they talk about a new system call they're borrowing from OpenBSD, &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2" target="_blank" rel="nofollow noopener"&gt;getentropy(2)&lt;/a&gt;, as well as the addition of &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man3/arc4random.3" target="_blank" rel="nofollow noopener"&gt;arc4random&lt;/a&gt; to their libc&lt;/li&gt;
&lt;li&gt;With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming &lt;em&gt;better than us&lt;/em&gt;?&lt;/li&gt;
&lt;li&gt;Look forward to the upcoming "Solaris Now" podcast &lt;sub&gt;(not really)&lt;/sub&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://2015.eurobsdcon.org/talks/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2015 talks and tutorials&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published&lt;/li&gt;
&lt;li&gt;The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us&lt;/li&gt;
&lt;li&gt;It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course&lt;/li&gt;
&lt;li&gt;There are also &lt;a href="https://2015.eurobsdcon.org/tutorials/" target="_blank" rel="nofollow noopener"&gt;a few tutorials&lt;/a&gt; planned for the event, some you've probably seen already and some you haven't&lt;/li&gt;
&lt;li&gt;Registration for the event will be opening very soon (likely this week or next)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.iceflatline.com/2015/07/using-zfs-replication-features-in-freebsd-to-improve-my-offsite-backups/" target="_blank" rel="nofollow noopener"&gt;Using ZFS replication to improve offsite backups&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you take backups seriously, you're probably using ZFS and probably keeping an offsite copy of the data&lt;/li&gt;
&lt;li&gt;This article covers doing just that, but with a focus on making use of the replication capability&lt;/li&gt;
&lt;li&gt;It'll walk you through taking a snapshot of your pool and then replicating it to another remote system, using "zfs send" and SSH - this has the benefit of only transferring the files that have changed since the last time you did it&lt;/li&gt;
&lt;li&gt;Steps are also taken to allow a regular user to take and manage snapshots, so you don't need to be root for the SSH transfer&lt;/li&gt;
&lt;li&gt;Data integrity is a long process - filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations... they all play a role in keeping your files secure; don't skip out on any of them&lt;/li&gt;
&lt;li&gt;One thing the author didn't mention in his post: having an &lt;strong&gt;offline&lt;/strong&gt; copy of the data, ideally sealed in a safe place, is also important
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://anadoxin.org/blog/blog/20150705/block-encryption-in-openbsd/" target="_blank" rel="nofollow noopener"&gt;Block encryption in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've &lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;covered&lt;/a&gt; ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data&lt;/li&gt;
&lt;li&gt;This blog post takes you through the process of creating encrypted &lt;em&gt;containers&lt;/em&gt; in OpenBSD, à la TrueCrypt - that is, a file-backed virtual device with an encrypted filesystem&lt;/li&gt;
&lt;li&gt;It goes through creating a file that looks like random data, pointing &lt;strong&gt;vnconfig&lt;/strong&gt; at it, setting up the crypto and finally using it as a fake storage device&lt;/li&gt;
&lt;li&gt;The encrypted container method offers the advantage of being a bit more portable across installations than other ways
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=391421" target="_blank" rel="nofollow noopener"&gt;Docker hits FreeBSD ports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The inevitable has happened, and an early FreeBSD port of docker is finally here &lt;/li&gt;
&lt;li&gt;Some &lt;a href="https://github.com/kvasdopil/docker/blob/freebsd-compat/FREEBSD-PORTING.md" target="_blank" rel="nofollow noopener"&gt;details and directions&lt;/a&gt; are available to read if you'd like to give it a try, as well as a list of which features work and which don't&lt;/li&gt;
&lt;li&gt;There was also some &lt;a href="https://news.ycombinator.com/item?id=9840025" target="_blank" rel="nofollow noopener"&gt;Hacker News discussion&lt;/a&gt; on the topic
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150708134520&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;Microsoft donates to OpenSSH&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations - now it's Microsoft's turn&lt;/li&gt;
&lt;li&gt;With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor&lt;/li&gt;
&lt;li&gt;They've also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate - we're always glad to see this
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2NqbhwOoH" target="_blank" rel="nofollow noopener"&gt;Joe writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2T3NEia98" target="_blank" rel="nofollow noopener"&gt;Mike writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20RlTK6Ha" target="_blank" rel="nofollow noopener"&gt;Randy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2rjCd0bGX" target="_blank" rel="nofollow noopener"&gt;Tony writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21PfSIyG5" target="_blank" rel="nofollow noopener"&gt;Kevin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, smallwall, m0n0wall, opnsense, pfsense, router, mini-itx, apu, alix, soekris, pcengines, edgerouter, lite, encryption, containers, zfs, replication, docker</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Lee Sharp. He&#39;s recently revived the m0n0wall codebase, now known as SmallWall, and we&#39;ll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCAEx6zhR2sD2pAGKezasAjA/videos" rel="nofollow">BSDCan and pkgsrcCon videos</a></h3>

<ul>
<li>Even more BSDCan 2015 videos are slowly but surely making their way to the internet</li>
<li>Nigel Williams, <a href="https://www.youtube.com/watch?v=P3vB_FWtyIs" rel="nofollow">Multipath TCP for FreeBSD</a></li>
<li>Stephen Bourne, <a href="https://www.youtube.com/watch?v=2kEJoWfobpA" rel="nofollow">Early days of Unix and design of sh</a></li>
<li>John Criswell, <a href="https://www.youtube.com/watch?v=hRIC_aF_u24" rel="nofollow">Protecting FreeBSD with Secure Virtual Architecture</a></li>
<li>Shany Michaely, <a href="https://www.youtube.com/watch?v=stsaeKvF3no" rel="nofollow">Expanding RDMA capability over Ethernet in FreeBSD</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=JaufZ7yCrLU" rel="nofollow">Adding AES-ICM and AES-GCM to OpenCrypto</a></li>
<li>Sevan Janiyan, <a href="https://www.youtube.com/watch?v=-HMXyzybgdM" rel="nofollow">Adventures in building</a> <a href="https://www.youtube.com/watch?v=Xof-uKnQ6cY" rel="nofollow">open source software</a></li>
<li>And finally, <a href="https://www.youtube.com/watch?v=Ynm0bGnYdfY" rel="nofollow">the BSDCan 2015 closing</a></li>
<li>Some <a href="https://vimeo.com/channels/pkgsrccon/videos" rel="nofollow">videos</a> from this year&#39;s <a href="http://pkgsrc.org/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon</a> are also starting to appear online</li>
<li>Sevan Janiyan, <a href="https://vimeo.com/channels/pkgsrccon/132767946" rel="nofollow">A year of pkgsrc 2014 - 2015</a></li>
<li>Pierre Pronchery, <a href="https://vimeo.com/channels/pkgsrccon/132766052" rel="nofollow">pkgsrc meets pkg-ng</a></li>
<li>Jonathan Perkin, <a href="https://vimeo.com/channels/pkgsrccon/132760863" rel="nofollow">pkgsrc at Joyent</a></li>
<li>Jörg Sonnenberger, <a href="https://vimeo.com/channels/pkgsrccon/132757658" rel="nofollow">pkg_install script framework</a></li>
<li>Benny Siegert, <a href="https://vimeo.com/channels/pkgsrccon/132751897" rel="nofollow">New Features in BulkTracker</a></li>
<li>This is the first time we&#39;ve ever seen recordings from the conference - hopefully they continue this trend
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=839.0" rel="nofollow">OPNsense 15.7 released</a></h3>

<ul>
<li>The OPNsense team has released version 15.7, almost exactly six months after <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">their initial debut</a></li>
<li>In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server</li>
<li>Taking a note from upstream PF&#39;s playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was <a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">completely removed</a> just over a year ago)</li>
<li>The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI - switching between the two is simple; no commitment needed</li>
<li>Various third party ports have also been bumped up to their latest versions to keep things fresh, and there&#39;s the usual round of bug fixes included</li>
<li>Shortly afterwards, <a href="https://forum.opnsense.org/index.php?topic=915.0" rel="nofollow">15.7.1</a> was released with a few more small fixes
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/07/04/msg000688.html" rel="nofollow">NetBSD at Open Source Conference 2015 Okinawa</a></h3>

<ul>
<li>If you liked <a href="http://www.bsdnow.tv/episodes/2015_07_01-lost_technology" rel="nofollow">last week&#39;s episode</a> then you&#39;ll probably know what to expect with this one</li>
<li>The NetBSD users group of Japan hit another open source conference, this time in Okinawa</li>
<li>This time, they had a few interesting NetBSD machines on display that we didn&#39;t get to see in the interview last week</li>
<li>We&#39;d love to see something like this in North America or Europe too - anyone up for installing BSD on some interesting devices and showing them off at a Linux con?
***</li>
</ul>

<h3><a href="http://firstyear.id.au/entry/21" rel="nofollow">OpenBSD BGP and VRFs</a></h3>

<ul>
<li>&quot;<a href="https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding" rel="nofollow">VRFs</a>, or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic&quot;</li>
<li>This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness</li>
<li>With multiple rdomains, it&#39;s also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them</li>
<li>The idea of a &quot;guest network&quot; can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues</li>
<li>Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here</li>
<li>The <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">BSDCan talk on rdomains</a> expands on the subject a bit more if you haven&#39;t seen it, as well as a few <a href="https://www.packetmischief.ca/2011/09/20/virtualizing-the-openbsd-routing-table/" rel="nofollow">related</a> <a href="http://cybermashup.com/2013/05/21/complex-routing-with-openbsd/" rel="nofollow">posts</a>
***</li>
</ul>

<h2>Interview - Lee Sharp - <a href="mailto:lee@smallwall.org" rel="nofollow">lee@smallwall.org</a></h2>

<p><a href="http://smallwall.org" rel="nofollow">SmallWall</a>, a continuation of m0n0wall</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blogs.oracle.com/solarisfw/entry/pf_for_solaris" rel="nofollow">Solaris adopts more BSD goodies</a></h3>

<ul>
<li>We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD&#39;s PF firewall to their next version, even contributing back patches for SMP and other bug fixes</li>
<li>They recently published an article about PF, talking about what&#39;s different about it on their platform compared to others - not especially useful for BSD users, but interesting to read if you like firewalls</li>
<li>Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a <a href="https://blogs.oracle.com/darren/entry/openssh_in_solaris_11_3" rel="nofollow">second blog post</a> up about their &quot;SunSSH&quot; fork</li>
<li>Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that</li>
<li>The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two</li>
<li>In <a href="https://blogs.oracle.com/darren/entry/solaris_new_system_calls_getentropy" rel="nofollow">a third blog post</a>, they talk about a new system call they&#39;re borrowing from OpenBSD, <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2" rel="nofollow">getentropy(2)</a>, as well as the addition of <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man3/arc4random.3" rel="nofollow">arc4random</a> to their libc</li>
<li>With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming <em>better than us</em>?</li>
<li>Look forward to the upcoming &quot;Solaris Now&quot; podcast <sub>(not really)</sub>
***</li>
</ul>

<h3><a href="https://2015.eurobsdcon.org/talks/" rel="nofollow">EuroBSDCon 2015 talks and tutorials</a></h3>

<ul>
<li>This year&#39;s EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published</li>
<li>The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us</li>
<li>It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course</li>
<li>There are also <a href="https://2015.eurobsdcon.org/tutorials/" rel="nofollow">a few tutorials</a> planned for the event, some you&#39;ve probably seen already and some you haven&#39;t</li>
<li>Registration for the event will be opening very soon (likely this week or next)
***</li>
</ul>

<h3><a href="https://www.iceflatline.com/2015/07/using-zfs-replication-features-in-freebsd-to-improve-my-offsite-backups/" rel="nofollow">Using ZFS replication to improve offsite backups</a></h3>

<ul>
<li>If you take backups seriously, you&#39;re probably using ZFS and probably keeping an offsite copy of the data</li>
<li>This article covers doing just that, but with a focus on making use of the replication capability</li>
<li>It&#39;ll walk you through taking a snapshot of your pool and then replicating it to another remote system, using &quot;zfs send&quot; and SSH - this has the benefit of only transferring the files that have changed since the last time you did it</li>
<li>Steps are also taken to allow a regular user to take and manage snapshots, so you don&#39;t need to be root for the SSH transfer</li>
<li>Data integrity is a long process - filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations... they all play a role in keeping your files secure; don&#39;t skip out on any of them</li>
<li>One thing the author didn&#39;t mention in his post: having an <strong>offline</strong> copy of the data, ideally sealed in a safe place, is also important
***</li>
</ul>

<h3><a href="http://anadoxin.org/blog/blog/20150705/block-encryption-in-openbsd/" rel="nofollow">Block encryption in OpenBSD</a></h3>

<ul>
<li>We&#39;ve <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">covered</a> ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data</li>
<li>This blog post takes you through the process of creating encrypted <em>containers</em> in OpenBSD, à la TrueCrypt - that is, a file-backed virtual device with an encrypted filesystem</li>
<li>It goes through creating a file that looks like random data, pointing <strong>vnconfig</strong> at it, setting up the crypto and finally using it as a fake storage device</li>
<li>The encrypted container method offers the advantage of being a bit more portable across installations than other ways
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=391421" rel="nofollow">Docker hits FreeBSD ports</a></h3>

<ul>
<li>The inevitable has happened, and an early FreeBSD port of docker is finally here </li>
<li>Some <a href="https://github.com/kvasdopil/docker/blob/freebsd-compat/FREEBSD-PORTING.md" rel="nofollow">details and directions</a> are available to read if you&#39;d like to give it a try, as well as a list of which features work and which don&#39;t</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9840025" rel="nofollow">Hacker News discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150708134520&mode=flat" rel="nofollow">Microsoft donates to OpenSSH</a></h3>

<ul>
<li>We&#39;ve talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations - now it&#39;s Microsoft&#39;s turn</li>
<li>With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor</li>
<li>They&#39;ve also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate - we&#39;re always glad to see this
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NqbhwOoH" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2T3NEia98" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s20RlTK6Ha" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2rjCd0bGX" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s21PfSIyG5" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Lee Sharp. He&#39;s recently revived the m0n0wall codebase, now known as SmallWall, and we&#39;ll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCAEx6zhR2sD2pAGKezasAjA/videos" rel="nofollow">BSDCan and pkgsrcCon videos</a></h3>

<ul>
<li>Even more BSDCan 2015 videos are slowly but surely making their way to the internet</li>
<li>Nigel Williams, <a href="https://www.youtube.com/watch?v=P3vB_FWtyIs" rel="nofollow">Multipath TCP for FreeBSD</a></li>
<li>Stephen Bourne, <a href="https://www.youtube.com/watch?v=2kEJoWfobpA" rel="nofollow">Early days of Unix and design of sh</a></li>
<li>John Criswell, <a href="https://www.youtube.com/watch?v=hRIC_aF_u24" rel="nofollow">Protecting FreeBSD with Secure Virtual Architecture</a></li>
<li>Shany Michaely, <a href="https://www.youtube.com/watch?v=stsaeKvF3no" rel="nofollow">Expanding RDMA capability over Ethernet in FreeBSD</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=JaufZ7yCrLU" rel="nofollow">Adding AES-ICM and AES-GCM to OpenCrypto</a></li>
<li>Sevan Janiyan, <a href="https://www.youtube.com/watch?v=-HMXyzybgdM" rel="nofollow">Adventures in building</a> <a href="https://www.youtube.com/watch?v=Xof-uKnQ6cY" rel="nofollow">open source software</a></li>
<li>And finally, <a href="https://www.youtube.com/watch?v=Ynm0bGnYdfY" rel="nofollow">the BSDCan 2015 closing</a></li>
<li>Some <a href="https://vimeo.com/channels/pkgsrccon/videos" rel="nofollow">videos</a> from this year&#39;s <a href="http://pkgsrc.org/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon</a> are also starting to appear online</li>
<li>Sevan Janiyan, <a href="https://vimeo.com/channels/pkgsrccon/132767946" rel="nofollow">A year of pkgsrc 2014 - 2015</a></li>
<li>Pierre Pronchery, <a href="https://vimeo.com/channels/pkgsrccon/132766052" rel="nofollow">pkgsrc meets pkg-ng</a></li>
<li>Jonathan Perkin, <a href="https://vimeo.com/channels/pkgsrccon/132760863" rel="nofollow">pkgsrc at Joyent</a></li>
<li>Jörg Sonnenberger, <a href="https://vimeo.com/channels/pkgsrccon/132757658" rel="nofollow">pkg_install script framework</a></li>
<li>Benny Siegert, <a href="https://vimeo.com/channels/pkgsrccon/132751897" rel="nofollow">New Features in BulkTracker</a></li>
<li>This is the first time we&#39;ve ever seen recordings from the conference - hopefully they continue this trend
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=839.0" rel="nofollow">OPNsense 15.7 released</a></h3>

<ul>
<li>The OPNsense team has released version 15.7, almost exactly six months after <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">their initial debut</a></li>
<li>In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server</li>
<li>Taking a note from upstream PF&#39;s playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was <a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">completely removed</a> just over a year ago)</li>
<li>The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI - switching between the two is simple; no commitment needed</li>
<li>Various third party ports have also been bumped up to their latest versions to keep things fresh, and there&#39;s the usual round of bug fixes included</li>
<li>Shortly afterwards, <a href="https://forum.opnsense.org/index.php?topic=915.0" rel="nofollow">15.7.1</a> was released with a few more small fixes
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/07/04/msg000688.html" rel="nofollow">NetBSD at Open Source Conference 2015 Okinawa</a></h3>

<ul>
<li>If you liked <a href="http://www.bsdnow.tv/episodes/2015_07_01-lost_technology" rel="nofollow">last week&#39;s episode</a> then you&#39;ll probably know what to expect with this one</li>
<li>The NetBSD users group of Japan hit another open source conference, this time in Okinawa</li>
<li>This time, they had a few interesting NetBSD machines on display that we didn&#39;t get to see in the interview last week</li>
<li>We&#39;d love to see something like this in North America or Europe too - anyone up for installing BSD on some interesting devices and showing them off at a Linux con?
***</li>
</ul>

<h3><a href="http://firstyear.id.au/entry/21" rel="nofollow">OpenBSD BGP and VRFs</a></h3>

<ul>
<li>&quot;<a href="https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding" rel="nofollow">VRFs</a>, or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic&quot;</li>
<li>This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness</li>
<li>With multiple rdomains, it&#39;s also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them</li>
<li>The idea of a &quot;guest network&quot; can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues</li>
<li>Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here</li>
<li>The <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">BSDCan talk on rdomains</a> expands on the subject a bit more if you haven&#39;t seen it, as well as a few <a href="https://www.packetmischief.ca/2011/09/20/virtualizing-the-openbsd-routing-table/" rel="nofollow">related</a> <a href="http://cybermashup.com/2013/05/21/complex-routing-with-openbsd/" rel="nofollow">posts</a>
***</li>
</ul>

<h2>Interview - Lee Sharp - <a href="mailto:lee@smallwall.org" rel="nofollow">lee@smallwall.org</a></h2>

<p><a href="http://smallwall.org" rel="nofollow">SmallWall</a>, a continuation of m0n0wall</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blogs.oracle.com/solarisfw/entry/pf_for_solaris" rel="nofollow">Solaris adopts more BSD goodies</a></h3>

<ul>
<li>We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD&#39;s PF firewall to their next version, even contributing back patches for SMP and other bug fixes</li>
<li>They recently published an article about PF, talking about what&#39;s different about it on their platform compared to others - not especially useful for BSD users, but interesting to read if you like firewalls</li>
<li>Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a <a href="https://blogs.oracle.com/darren/entry/openssh_in_solaris_11_3" rel="nofollow">second blog post</a> up about their &quot;SunSSH&quot; fork</li>
<li>Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that</li>
<li>The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two</li>
<li>In <a href="https://blogs.oracle.com/darren/entry/solaris_new_system_calls_getentropy" rel="nofollow">a third blog post</a>, they talk about a new system call they&#39;re borrowing from OpenBSD, <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2" rel="nofollow">getentropy(2)</a>, as well as the addition of <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man3/arc4random.3" rel="nofollow">arc4random</a> to their libc</li>
<li>With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming <em>better than us</em>?</li>
<li>Look forward to the upcoming &quot;Solaris Now&quot; podcast <sub>(not really)</sub>
***</li>
</ul>

<h3><a href="https://2015.eurobsdcon.org/talks/" rel="nofollow">EuroBSDCon 2015 talks and tutorials</a></h3>

<ul>
<li>This year&#39;s EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published</li>
<li>The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us</li>
<li>It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course</li>
<li>There are also <a href="https://2015.eurobsdcon.org/tutorials/" rel="nofollow">a few tutorials</a> planned for the event, some you&#39;ve probably seen already and some you haven&#39;t</li>
<li>Registration for the event will be opening very soon (likely this week or next)
***</li>
</ul>

<h3><a href="https://www.iceflatline.com/2015/07/using-zfs-replication-features-in-freebsd-to-improve-my-offsite-backups/" rel="nofollow">Using ZFS replication to improve offsite backups</a></h3>

<ul>
<li>If you take backups seriously, you&#39;re probably using ZFS and probably keeping an offsite copy of the data</li>
<li>This article covers doing just that, but with a focus on making use of the replication capability</li>
<li>It&#39;ll walk you through taking a snapshot of your pool and then replicating it to another remote system, using &quot;zfs send&quot; and SSH - this has the benefit of only transferring the files that have changed since the last time you did it</li>
<li>Steps are also taken to allow a regular user to take and manage snapshots, so you don&#39;t need to be root for the SSH transfer</li>
<li>Data integrity is a long process - filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations... they all play a role in keeping your files secure; don&#39;t skip out on any of them</li>
<li>One thing the author didn&#39;t mention in his post: having an <strong>offline</strong> copy of the data, ideally sealed in a safe place, is also important
***</li>
</ul>

<h3><a href="http://anadoxin.org/blog/blog/20150705/block-encryption-in-openbsd/" rel="nofollow">Block encryption in OpenBSD</a></h3>

<ul>
<li>We&#39;ve <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">covered</a> ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data</li>
<li>This blog post takes you through the process of creating encrypted <em>containers</em> in OpenBSD, à la TrueCrypt - that is, a file-backed virtual device with an encrypted filesystem</li>
<li>It goes through creating a file that looks like random data, pointing <strong>vnconfig</strong> at it, setting up the crypto and finally using it as a fake storage device</li>
<li>The encrypted container method offers the advantage of being a bit more portable across installations than other ways
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=391421" rel="nofollow">Docker hits FreeBSD ports</a></h3>

<ul>
<li>The inevitable has happened, and an early FreeBSD port of docker is finally here </li>
<li>Some <a href="https://github.com/kvasdopil/docker/blob/freebsd-compat/FREEBSD-PORTING.md" rel="nofollow">details and directions</a> are available to read if you&#39;d like to give it a try, as well as a list of which features work and which don&#39;t</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9840025" rel="nofollow">Hacker News discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150708134520&mode=flat" rel="nofollow">Microsoft donates to OpenSSH</a></h3>

<ul>
<li>We&#39;ve talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations - now it&#39;s Microsoft&#39;s turn</li>
<li>With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor</li>
<li>They&#39;ve also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate - we&#39;re always glad to see this
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NqbhwOoH" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2T3NEia98" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s20RlTK6Ha" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2rjCd0bGX" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s21PfSIyG5" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>61: IPSECond Wind</title>
  <link>https://www.bsdnow.tv/61</link>
  <guid isPermaLink="false">a0bfab13-8167-4b68-b1de-74122013593a</guid>
  <pubDate>Wed, 29 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a0bfab13-8167-4b68-b1de-74122013593a.mp3" length="53960980" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" target="_blank" rel="nofollow noopener"&gt;BSD panel at Phoenix LUG&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD&lt;/li&gt;
&lt;li&gt;It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience&lt;/li&gt;
&lt;li&gt;They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy&lt;/li&gt;
&lt;li&gt;It was a good "real world" example of things potential switchers are curious to know about&lt;/li&gt;
&lt;li&gt;They closed by concluding that more diversity is always better, and even if you've got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" target="_blank" rel="nofollow noopener"&gt;Book of PF signed copy auction&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Peter Hansteen (who we've &lt;a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" target="_blank" rel="nofollow noopener"&gt;had on the show&lt;/a&gt;) is auctioning off the first signed copy of the new Book of PF&lt;/li&gt;
&lt;li&gt;All the profits from the sale will go to the &lt;a href="http://www.openbsd.org/donations.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD Foundation&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD's versions (which still use ALTQ, among other differences)&lt;/li&gt;
&lt;li&gt;If you're interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;Michael Lucas&lt;/a&gt; has &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=141429413908567&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;challenged Peter&lt;/a&gt; to raise more for the foundation than his last book selling - let's see who wins&lt;/li&gt;
&lt;li&gt;Pause the episode, &lt;a href="http://www.ebay.com/itm/321563281902" target="_blank" rel="nofollow noopener"&gt;go bid on it&lt;/a&gt; and then come back!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation goes to EuroBSDCon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report&lt;/li&gt;
&lt;li&gt;They also sponsored four other developers to go&lt;/li&gt;
&lt;li&gt;The foundation was there "to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD"&lt;/li&gt;
&lt;li&gt;They also have &lt;a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" target="_blank" rel="nofollow noopener"&gt;a second report&lt;/a&gt; from Kamil Czekirda&lt;/li&gt;
&lt;li&gt;A total of $2000 was raised at the conference
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/56.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Note&lt;/strong&gt;: we're doing this story a couple days early - it's actually being released on November 1st (this Saturday), but we have next week off and didn't want to let this one slip through the cracks - it may be out by the time you're watching this&lt;/li&gt;
&lt;li&gt;Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6&lt;/li&gt;
&lt;li&gt;It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features&lt;/li&gt;
&lt;li&gt;5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it&lt;/li&gt;
&lt;li&gt;You can now hibernate your laptop when using a fully-encrypted filesystem (see &lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;our tutorial&lt;/a&gt; for that)&lt;/li&gt;
&lt;li&gt;ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed&lt;/li&gt;
&lt;li&gt;This will serve as a "transitional" release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to &lt;a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" target="_blank" rel="nofollow noopener"&gt;httpd&lt;/a&gt; and from BIND to Unbound&lt;/li&gt;
&lt;li&gt;Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions&lt;/li&gt;
&lt;li&gt;As always, 5.6 comes with its own &lt;a href="http://www.openbsd.org/lyrics.html#56" target="_blank" rel="nofollow noopener"&gt;song and artwork&lt;/a&gt; - the theme this time was obviously LibreSSL&lt;/li&gt;
&lt;li&gt;Be sure to check the &lt;a href="http://www.openbsd.org/plus56.html" target="_blank" rel="nofollow noopener"&gt;full changelog&lt;/a&gt; (&lt;em&gt;it's huge&lt;/em&gt;) and pick up &lt;a href="http://www.openbsd.org/orders.html" target="_blank" rel="nofollow noopener"&gt;a CD or tshirt&lt;/a&gt; to support their efforts&lt;/li&gt;
&lt;li&gt;If you don't already have the public key releases are signed with, getting a physical CD is a good "out of bounds" way to obtain it safely&lt;/li&gt;
&lt;li&gt;Here are some cool &lt;a href="https://imgur.com/a/5PtFe" target="_blank" rel="nofollow noopener"&gt;images of the set&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;After you do your installation or &lt;a href="http://www.openbsd.org/faq/upgrade56.html" target="_blank" rel="nofollow noopener"&gt;upgrade&lt;/a&gt;, don't forget to head over to &lt;a href="http://www.openbsd.org/errata56.html" target="_blank" rel="nofollow noopener"&gt;the errata page&lt;/a&gt; and apply any patches listed there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - John-Mark Gurney - &lt;a href="mailto:jmg@freebsd.org" target="_blank" rel="nofollow noopener"&gt;jmg@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/encthenet" target="_blank" rel="nofollow noopener"&gt;@encthenet&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Updating FreeBSD's IPSEC stack&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2014/10/22/14942.html" target="_blank" rel="nofollow noopener"&gt;Clang in DragonFly BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64&lt;/li&gt;
&lt;li&gt;Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly&lt;/li&gt;
&lt;li&gt;We'd love to see more BSDs switch to Clang/LLVM eventually, it's a lot more modern than the old GCC most are using
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" target="_blank" rel="nofollow noopener"&gt;reallocarray(): integer overflow detection for free&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the less obvious features in OpenBSD 5.6 is a new libc function: "reallocarray()"&lt;/li&gt;
&lt;li&gt;It's a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost&lt;/li&gt;
&lt;li&gt;Theo and a few other developers have &lt;a href="https://secure.freshbsd.org/search?project=openbsd&amp;amp;q=reallocarray" target="_blank" rel="nofollow noopener"&gt;already started&lt;/a&gt; a mass audit of the entire source tree, replacing many instances with this new feature&lt;/li&gt;
&lt;li&gt;OpenBSD's explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bothsidesofthence.tumblr.com/" target="_blank" rel="nofollow noopener"&gt;Switching from Linux blog&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux&lt;/li&gt;
&lt;li&gt;After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)&lt;/li&gt;
&lt;li&gt;So far, he's put up a few posts about his initial thoughts, some documentation he's going through and his experiments so far&lt;/li&gt;
&lt;li&gt;It'll be an ongoing series, so we may check back in with him again later on
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" target="_blank" rel="nofollow noopener"&gt;Owncloud in a FreeNAS jail&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the most common emails we get is about running Owncloud in FreeNAS&lt;/li&gt;
&lt;li&gt;Now, finally, someone made a video on how to do just that, and it's even jailed&lt;/li&gt;
&lt;li&gt;A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend&lt;/li&gt;
&lt;li&gt;If you're looking for an easy way to back up and sync your files, this might be worth a watch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2XEsQdggZ" target="_blank" rel="nofollow noopener"&gt;Ernõ writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21EizH2aR" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s24SAJ5im6" target="_blank" rel="nofollow noopener"&gt;Kamil writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20ABZe0RD" target="_blank" rel="nofollow noopener"&gt;Torsten writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s208jQs9c6" target="_blank" rel="nofollow noopener"&gt;Dominik writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" target="_blank" rel="nofollow noopener"&gt;That's not our IP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" target="_blank" rel="nofollow noopener"&gt;Is this thing on?&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ipsec, aes, gcm, chacha20, encryption, netsec, ike, openiked, infosec, 5.6, openhttpd, opensmtpd, meetbsd, book of pf, libressl, freenas, owncloud</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>52: Reverse Takeover</title>
  <link>https://www.bsdnow.tv/52</link>
  <guid isPermaLink="false">67ad6e78-144e-4d1c-a713-49b54e5b679e</guid>
  <pubDate>Wed, 27 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/67ad6e78-144e-4d1c-a713-49b54e5b679e.mp3" length="53663188" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we'll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we'll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2014augupdate.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation August update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The foundation has published a new PDF detailing some of their recent activities&lt;/li&gt;
&lt;li&gt;It includes project development updates, the 10.1-RELEASE schedule and some of its new features&lt;/li&gt;
&lt;li&gt;There is also a short interview with &lt;a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" target="_blank" rel="nofollow noopener"&gt;Dru Lavigne&lt;/a&gt; in the "voices from the community" section&lt;/li&gt;
&lt;li&gt;If you're into hardware, there's another section about some new FreeBSD server equipment&lt;/li&gt;
&lt;li&gt;In closing, there's an update on funding too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.prado.it/2014/08/20/how-to-run-master-nsd-on-freebsd-10-0/" target="_blank" rel="nofollow noopener"&gt;NSD for an authoritative nameserver&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With BIND having been removed from FreeBSD 10.0, you might be looking to replace your old DNS setup&lt;/li&gt;
&lt;li&gt;This article shows how to use NSD for an authoritative DNS nameserver&lt;/li&gt;
&lt;li&gt;It's also got a link to a similar article on Unbound, the new favorite recursive and caching resolver (they work great together)&lt;/li&gt;
&lt;li&gt;All the instructions are presented very neatly, with all the little details included&lt;/li&gt;
&lt;li&gt;Less BIND means less vulnerabilities, everybody's happy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=140873518514033&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;BIND and Nginx removed from OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While we're on the topic of DNS servers, BIND was finally removed from OpenBSD as well&lt;/li&gt;
&lt;li&gt;The base system contains both NSD and Unbound, so users can transition over between 5.6 (November of this year) and 5.7 (May of next year)&lt;/li&gt;
&lt;li&gt;They've also &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=140908174910713&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;removed nginx&lt;/a&gt; from the base system, in favor of the new custom HTTP daemon&lt;/li&gt;
&lt;li&gt;BIND and Nginx are still available in ports if you don't want to switch&lt;/li&gt;
&lt;li&gt;We're hoping to have Reyk Floeter on the show next week to talk about it, but scheduling might not work out, so it may be a little later on&lt;/li&gt;
&lt;li&gt;With Apache gone in the upcoming 5.6, It's also likely that sendmail will be removed before 5.7 - hooray for modern alternatives
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/user/tsutsuii/videos" target="_blank" rel="nofollow noopener"&gt;NetBSD demo videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A Japanese NetBSD developer has been uploading lots of interesting videos&lt;/li&gt;
&lt;li&gt;Unsurprisingly, they're all featuring NetBSD running on exotic and weird hardware&lt;/li&gt;
&lt;li&gt;Most of them are demoing sound or running a modern Twitter client on an ancient computer&lt;/li&gt;
&lt;li&gt;They're from the same guy that did the conference wrap-up we mentioned recently
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Shawn Webb - &lt;a href="mailto:shawn.webb@hardenedbsd.org" target="_blank" rel="nofollow noopener"&gt;shawn.webb@hardenedbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/lattera" target="_blank" rel="nofollow noopener"&gt;@lattera&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Address space layout randomization &lt;a href="http://hardenedbsd.org/" target="_blank" rel="nofollow noopener"&gt;in FreeBSD&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/reverse-ssh" target="_blank" rel="nofollow noopener"&gt;Reverse SSH tunneling&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://deuterion.net/puppet-master-agent-installation-on-freebsd/" target="_blank" rel="nofollow noopener"&gt;Puppet master-agent installation on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got a lot of BSD boxes under your control, or if you're just lazy, you've probably looked into Puppet before&lt;/li&gt;
&lt;li&gt;The author claims a lack of BSD-specific Puppet documentation, so he decided to write up some notes of his own&lt;/li&gt;
&lt;li&gt;He goes through some advantages of using this type of tool for deployments, even when you don't have a huge number of systems&lt;/li&gt;
&lt;li&gt;The rest of the post explains how to set up both the master and the agent configurations
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.mondaiji.com/blog/other/it/10175-the-hunt-for-the-ultimate-free-open-source-firewall-distro" target="_blank" rel="nofollow noopener"&gt;Misc. pfSense items&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We found a few miscellaneous pfSense articles this past week &lt;/li&gt;
&lt;li&gt;The first one is about the hunt for the "ultimate" free open source firewall, where pfSense is obviously a strong contender&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://willbradley.name/2014/08/20/logging-natfirewallstate-entries-in-pfsense/" target="_blank" rel="nofollow noopener"&gt;The second one&lt;/a&gt; shows how to log NAT firewall states (a good way to find out which family member has been torrenting!)&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.proteansec.com/linux/pfsense-automatically-backup-configuration-files/" target="_blank" rel="nofollow noopener"&gt;the third&lt;/a&gt;, you can see how to automatically back up your configuration files&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://vidarw.wordpress.com/2014/07/09/network-boot-with-pfsense-and-tftpd32/" target="_blank" rel="nofollow noopener"&gt;The fourth item&lt;/a&gt; shows how to set up PXE booting with pfSense, similar to one of our tutorials
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.khubla.com/freebsd/timemachine-backups-on-freebsd-10" target="_blank" rel="nofollow noopener"&gt;Time Machine backups on ZFS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got a Mac you need to keep backed up, a FreeBSD server with ZFS can take the place of an expensive "time capsule"&lt;/li&gt;
&lt;li&gt;This post walks you through setting up netatalk and mDNS for a very versatile Time Machine backup system&lt;/li&gt;
&lt;li&gt;With a single command on the OS X side, you can write to and read from the BSD box just like a regular external drive&lt;/li&gt;
&lt;li&gt;Surprisingly simple to do, recommended for anyone with Macs on their network
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/08/pc-bsd-10-0-3-preview-lumina-desktop/" target="_blank" rel="nofollow noopener"&gt;Lumina desktop preview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lumina, the BSD-exclusive desktop environment, seems to be coming along nicely&lt;/li&gt;
&lt;li&gt;The main developer has posted an update on the PCBSD blog with some screenshots&lt;/li&gt;
&lt;li&gt;Lots of new features have been added, many of which are documented in the post&lt;/li&gt;
&lt;li&gt;There just might be a BSD Now episode about Lumina coming up.. (cough cough)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21eLBvf1l" target="_blank" rel="nofollow noopener"&gt;Gary writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20xqTKNrf" target="_blank" rel="nofollow noopener"&gt;Cedric writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21q428tPj" target="_blank" rel="nofollow noopener"&gt;Caldwell writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2uVLhqCaO" target="_blank" rel="nofollow noopener"&gt;Cary writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, tunnel, reverse tunnel, encryption, aslr, pie, address space layout randomization, position-independent executables, nsd, bind, unbound, dns server, pfsense, shawn webb, time machine, os x, nginx</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we&#39;ll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014augupdate.pdf" rel="nofollow">FreeBSD foundation August update</a></h3>

<ul>
<li>The foundation has published a new PDF detailing some of their recent activities</li>
<li>It includes project development updates, the 10.1-RELEASE schedule and some of its new features</li>
<li>There is also a short interview with <a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a> in the &quot;voices from the community&quot; section</li>
<li>If you&#39;re into hardware, there&#39;s another section about some new FreeBSD server equipment</li>
<li>In closing, there&#39;s an update on funding too
***</li>
</ul>

<h3><a href="http://www.prado.it/2014/08/20/how-to-run-master-nsd-on-freebsd-10-0/" rel="nofollow">NSD for an authoritative nameserver</a></h3>

<ul>
<li>With BIND having been removed from FreeBSD 10.0, you might be looking to replace your old DNS setup</li>
<li>This article shows how to use NSD for an authoritative DNS nameserver</li>
<li>It&#39;s also got a link to a similar article on Unbound, the new favorite recursive and caching resolver (they work great together)</li>
<li>All the instructions are presented very neatly, with all the little details included</li>
<li>Less BIND means less vulnerabilities, everybody&#39;s happy
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=140873518514033&w=2" rel="nofollow">BIND and Nginx removed from OpenBSD</a></h3>

<ul>
<li>While we&#39;re on the topic of DNS servers, BIND was finally removed from OpenBSD as well</li>
<li>The base system contains both NSD and Unbound, so users can transition over between 5.6 (November of this year) and 5.7 (May of next year)</li>
<li>They&#39;ve also <a href="http://marc.info/?l=openbsd-cvs&m=140908174910713&w=2" rel="nofollow">removed nginx</a> from the base system, in favor of the new custom HTTP daemon</li>
<li>BIND and Nginx are still available in ports if you don&#39;t want to switch</li>
<li>We&#39;re hoping to have Reyk Floeter on the show next week to talk about it, but scheduling might not work out, so it may be a little later on</li>
<li>With Apache gone in the upcoming 5.6, It&#39;s also likely that sendmail will be removed before 5.7 - hooray for modern alternatives
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/tsutsuii/videos" rel="nofollow">NetBSD demo videos</a></h3>

<ul>
<li>A Japanese NetBSD developer has been uploading lots of interesting videos</li>
<li>Unsurprisingly, they&#39;re all featuring NetBSD running on exotic and weird hardware</li>
<li>Most of them are demoing sound or running a modern Twitter client on an ancient computer</li>
<li>They&#39;re from the same guy that did the conference wrap-up we mentioned recently
***</li>
</ul>

<h2>Interview - Shawn Webb - <a href="mailto:shawn.webb@hardenedbsd.org" rel="nofollow">shawn.webb@hardenedbsd.org</a> / <a href="https://twitter.com/lattera" rel="nofollow">@lattera</a></h2>

<p>Address space layout randomization <a href="http://hardenedbsd.org/" rel="nofollow">in FreeBSD</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/reverse-ssh" rel="nofollow">Reverse SSH tunneling</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://deuterion.net/puppet-master-agent-installation-on-freebsd/" rel="nofollow">Puppet master-agent installation on FreeBSD</a></h3>

<ul>
<li>If you&#39;ve got a lot of BSD boxes under your control, or if you&#39;re just lazy, you&#39;ve probably looked into Puppet before</li>
<li>The author claims a lack of BSD-specific Puppet documentation, so he decided to write up some notes of his own</li>
<li>He goes through some advantages of using this type of tool for deployments, even when you don&#39;t have a huge number of systems</li>
<li>The rest of the post explains how to set up both the master and the agent configurations
***</li>
</ul>

<h3><a href="http://www.mondaiji.com/blog/other/it/10175-the-hunt-for-the-ultimate-free-open-source-firewall-distro" rel="nofollow">Misc. pfSense items</a></h3>

<ul>
<li>We found a few miscellaneous pfSense articles this past week </li>
<li>The first one is about the hunt for the &quot;ultimate&quot; free open source firewall, where pfSense is obviously a strong contender</li>
<li><a href="http://willbradley.name/2014/08/20/logging-natfirewallstate-entries-in-pfsense/" rel="nofollow">The second one</a> shows how to log NAT firewall states (a good way to find out which family member has been torrenting!)</li>
<li>In <a href="http://www.proteansec.com/linux/pfsense-automatically-backup-configuration-files/" rel="nofollow">the third</a>, you can see how to automatically back up your configuration files</li>
<li><a href="https://vidarw.wordpress.com/2014/07/09/network-boot-with-pfsense-and-tftpd32/" rel="nofollow">The fourth item</a> shows how to set up PXE booting with pfSense, similar to one of our tutorials
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/timemachine-backups-on-freebsd-10" rel="nofollow">Time Machine backups on ZFS</a></h3>

<ul>
<li>If you&#39;ve got a Mac you need to keep backed up, a FreeBSD server with ZFS can take the place of an expensive &quot;time capsule&quot;</li>
<li>This post walks you through setting up netatalk and mDNS for a very versatile Time Machine backup system</li>
<li>With a single command on the OS X side, you can write to and read from the BSD box just like a regular external drive</li>
<li>Surprisingly simple to do, recommended for anyone with Macs on their network
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/08/pc-bsd-10-0-3-preview-lumina-desktop/" rel="nofollow">Lumina desktop preview</a></h3>

<ul>
<li>Lumina, the BSD-exclusive desktop environment, seems to be coming along nicely</li>
<li>The main developer has posted an update on the PCBSD blog with some screenshots</li>
<li>Lots of new features have been added, many of which are documented in the post</li>
<li>There just might be a BSD Now episode about Lumina coming up.. (cough cough)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21eLBvf1l" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s20xqTKNrf" rel="nofollow">Cedric writes in</a></li>
<li><a href="http://slexy.org/view/s21q428tPj" rel="nofollow">Caldwell writes in</a></li>
<li><a href="http://slexy.org/view/s2uVLhqCaO" rel="nofollow">Cary writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we&#39;ll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014augupdate.pdf" rel="nofollow">FreeBSD foundation August update</a></h3>

<ul>
<li>The foundation has published a new PDF detailing some of their recent activities</li>
<li>It includes project development updates, the 10.1-RELEASE schedule and some of its new features</li>
<li>There is also a short interview with <a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a> in the &quot;voices from the community&quot; section</li>
<li>If you&#39;re into hardware, there&#39;s another section about some new FreeBSD server equipment</li>
<li>In closing, there&#39;s an update on funding too
***</li>
</ul>

<h3><a href="http://www.prado.it/2014/08/20/how-to-run-master-nsd-on-freebsd-10-0/" rel="nofollow">NSD for an authoritative nameserver</a></h3>

<ul>
<li>With BIND having been removed from FreeBSD 10.0, you might be looking to replace your old DNS setup</li>
<li>This article shows how to use NSD for an authoritative DNS nameserver</li>
<li>It&#39;s also got a link to a similar article on Unbound, the new favorite recursive and caching resolver (they work great together)</li>
<li>All the instructions are presented very neatly, with all the little details included</li>
<li>Less BIND means less vulnerabilities, everybody&#39;s happy
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=140873518514033&w=2" rel="nofollow">BIND and Nginx removed from OpenBSD</a></h3>

<ul>
<li>While we&#39;re on the topic of DNS servers, BIND was finally removed from OpenBSD as well</li>
<li>The base system contains both NSD and Unbound, so users can transition over between 5.6 (November of this year) and 5.7 (May of next year)</li>
<li>They&#39;ve also <a href="http://marc.info/?l=openbsd-cvs&m=140908174910713&w=2" rel="nofollow">removed nginx</a> from the base system, in favor of the new custom HTTP daemon</li>
<li>BIND and Nginx are still available in ports if you don&#39;t want to switch</li>
<li>We&#39;re hoping to have Reyk Floeter on the show next week to talk about it, but scheduling might not work out, so it may be a little later on</li>
<li>With Apache gone in the upcoming 5.6, It&#39;s also likely that sendmail will be removed before 5.7 - hooray for modern alternatives
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/tsutsuii/videos" rel="nofollow">NetBSD demo videos</a></h3>

<ul>
<li>A Japanese NetBSD developer has been uploading lots of interesting videos</li>
<li>Unsurprisingly, they&#39;re all featuring NetBSD running on exotic and weird hardware</li>
<li>Most of them are demoing sound or running a modern Twitter client on an ancient computer</li>
<li>They&#39;re from the same guy that did the conference wrap-up we mentioned recently
***</li>
</ul>

<h2>Interview - Shawn Webb - <a href="mailto:shawn.webb@hardenedbsd.org" rel="nofollow">shawn.webb@hardenedbsd.org</a> / <a href="https://twitter.com/lattera" rel="nofollow">@lattera</a></h2>

<p>Address space layout randomization <a href="http://hardenedbsd.org/" rel="nofollow">in FreeBSD</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/reverse-ssh" rel="nofollow">Reverse SSH tunneling</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://deuterion.net/puppet-master-agent-installation-on-freebsd/" rel="nofollow">Puppet master-agent installation on FreeBSD</a></h3>

<ul>
<li>If you&#39;ve got a lot of BSD boxes under your control, or if you&#39;re just lazy, you&#39;ve probably looked into Puppet before</li>
<li>The author claims a lack of BSD-specific Puppet documentation, so he decided to write up some notes of his own</li>
<li>He goes through some advantages of using this type of tool for deployments, even when you don&#39;t have a huge number of systems</li>
<li>The rest of the post explains how to set up both the master and the agent configurations
***</li>
</ul>

<h3><a href="http://www.mondaiji.com/blog/other/it/10175-the-hunt-for-the-ultimate-free-open-source-firewall-distro" rel="nofollow">Misc. pfSense items</a></h3>

<ul>
<li>We found a few miscellaneous pfSense articles this past week </li>
<li>The first one is about the hunt for the &quot;ultimate&quot; free open source firewall, where pfSense is obviously a strong contender</li>
<li><a href="http://willbradley.name/2014/08/20/logging-natfirewallstate-entries-in-pfsense/" rel="nofollow">The second one</a> shows how to log NAT firewall states (a good way to find out which family member has been torrenting!)</li>
<li>In <a href="http://www.proteansec.com/linux/pfsense-automatically-backup-configuration-files/" rel="nofollow">the third</a>, you can see how to automatically back up your configuration files</li>
<li><a href="https://vidarw.wordpress.com/2014/07/09/network-boot-with-pfsense-and-tftpd32/" rel="nofollow">The fourth item</a> shows how to set up PXE booting with pfSense, similar to one of our tutorials
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/timemachine-backups-on-freebsd-10" rel="nofollow">Time Machine backups on ZFS</a></h3>

<ul>
<li>If you&#39;ve got a Mac you need to keep backed up, a FreeBSD server with ZFS can take the place of an expensive &quot;time capsule&quot;</li>
<li>This post walks you through setting up netatalk and mDNS for a very versatile Time Machine backup system</li>
<li>With a single command on the OS X side, you can write to and read from the BSD box just like a regular external drive</li>
<li>Surprisingly simple to do, recommended for anyone with Macs on their network
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/08/pc-bsd-10-0-3-preview-lumina-desktop/" rel="nofollow">Lumina desktop preview</a></h3>

<ul>
<li>Lumina, the BSD-exclusive desktop environment, seems to be coming along nicely</li>
<li>The main developer has posted an update on the PCBSD blog with some screenshots</li>
<li>Lots of new features have been added, many of which are documented in the post</li>
<li>There just might be a BSD Now episode about Lumina coming up.. (cough cough)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21eLBvf1l" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s20xqTKNrf" rel="nofollow">Cedric writes in</a></li>
<li><a href="http://slexy.org/view/s21q428tPj" rel="nofollow">Caldwell writes in</a></li>
<li><a href="http://slexy.org/view/s2uVLhqCaO" rel="nofollow">Cary writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>47: DES Challenge IV</title>
  <link>https://www.bsdnow.tv/47</link>
  <guid isPermaLink="false">2c9f4e68-6474-41f9-ab80-bb40fbb76855</guid>
  <pubDate>Wed, 23 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2c9f4e68-6474-41f9-ab80-bb40fbb76855.mp3" length="66811828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:32:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/hackathons.html" target="_blank" rel="nofollow noopener"&gt;g2k14 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon&lt;/li&gt;
&lt;li&gt;Lots of work got done - in just the first two weeks of July, there were &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;r=1&amp;amp;b=201407&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;over 1000 commits&lt;/a&gt; to their CVS tree&lt;/li&gt;
&lt;li&gt;Some of the developers wrote in to document what they were up to at the event&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140713220618" target="_blank" rel="nofollow noopener"&gt;Bob Beck&lt;/a&gt; planned to work on kernel stuff, but then "LibreSSL happened" and he spent most of his time working on that&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140718072312" target="_blank" rel="nofollow noopener"&gt;Miod Vallat&lt;/a&gt; also tells about his LibreSSL experiences&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140718090456" target="_blank" rel="nofollow noopener"&gt;Brent Cook&lt;/a&gt;, a new developer, worked mainly on the portable version of LibreSSL (and we'll be interviewing him next week!)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140714094454" target="_blank" rel="nofollow noopener"&gt;Henning Brauer&lt;/a&gt; worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140714191912" target="_blank" rel="nofollow noopener"&gt;Martin Pieuchot&lt;/a&gt; fixed some bugs in the USB stack, softraid and misc other things&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140714202157" target="_blank" rel="nofollow noopener"&gt;Marc Espie&lt;/a&gt; improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140715120259" target="_blank" rel="nofollow noopener"&gt;Martin Pelikan&lt;/a&gt; integrated read-only ext4 support&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140715094848" target="_blank" rel="nofollow noopener"&gt;Vadim Zhukov&lt;/a&gt; did lots of ports work, including working on KDE4&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140715212333" target="_blank" rel="nofollow noopener"&gt;Theo de Raadt&lt;/a&gt; created a new, more secure system call, "sendsyslog" and did a lot of work with /etc, sysmerge and the rc scripts&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140718134017" target="_blank" rel="nofollow noopener"&gt;Paul Irofti&lt;/a&gt; worked on the USB stack, specifically for the Octeon platform&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140719104939" target="_blank" rel="nofollow noopener"&gt;Sebastian Benoit&lt;/a&gt; worked on relayd filters and IPv6 code&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140719134058" target="_blank" rel="nofollow noopener"&gt;Jasper Lievisse Adriaanse&lt;/a&gt; did work with puppet, packages and the bootloader&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140719082410" target="_blank" rel="nofollow noopener"&gt;Jonathan Gray&lt;/a&gt; imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125235" target="_blank" rel="nofollow noopener"&gt;Stefan Sperling&lt;/a&gt; fixed a lot of issues with wireless drivers&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125020" target="_blank" rel="nofollow noopener"&gt;Florian Obser&lt;/a&gt; did many things related to IPv6&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140721090411" target="_blank" rel="nofollow noopener"&gt;Ingo Schwarze&lt;/a&gt; worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140722071413" target="_blank" rel="nofollow noopener"&gt;Ken Westerback&lt;/a&gt; hacked on dhclient and dhcpd, and also got dump working on 4k sector drives&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140723142224" target="_blank" rel="nofollow noopener"&gt;Matthieu Herrb&lt;/a&gt; worked on updating and modernizing parts of xenocara
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD pf discussion takes off&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Concerns from last week, about FreeBSD's packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the "questions" and "current" mailing lists (unfortunately people didn't always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)&lt;/li&gt;
&lt;li&gt;Straight from the SMP FreeBSD pf maintainer: "no one right now [is actively developing pf on FreeBSD]"&lt;/li&gt;
&lt;li&gt;Searching for documentation online for pf is troublesome because there are two incompatible syntaxes&lt;/li&gt;
&lt;li&gt;FreeBSD's pf man pages are lacking, and some of FreeBSD's documentation still links to OpenBSD's pages, which won't work anymore - possibly turning away would-be BSD converts because it's frustrating&lt;/li&gt;
&lt;li&gt;There's also the issue of importing patches from pfSense, but most of those still haven't been done either&lt;/li&gt;
&lt;li&gt;Lots of disagreement among developers vs. users...&lt;/li&gt;
&lt;li&gt;Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren't interested&lt;/li&gt;
&lt;li&gt;Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions&lt;/li&gt;
&lt;li&gt;Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning's claims about OpenBSD's improved speed as "uncorroborated claims" (but neither side has provided any public benchmarks)&lt;/li&gt;
&lt;li&gt;Gleb had to abandon his work on FreeBSD's pf because funding ran out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" target="_blank" rel="nofollow noopener"&gt;LibreSSL progress update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;LibreSSL's first few portable releases have come out and they're making great progress, releasing 2.0.3 &lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=140599450206255&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;two days ago&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list&lt;/li&gt;
&lt;li&gt;However, there has already been some drama... with Linux users&lt;/li&gt;
&lt;li&gt;There was a problem with Linux's PRNG, and LibreSSL was &lt;a href="https://twitter.com/MiodVallat/status/489122763610021888" target="_blank" rel="nofollow noopener"&gt;unforgiving&lt;/a&gt; of it, not making an effort to randomize something that could not provide real entropy&lt;/li&gt;
&lt;li&gt;This "problem" doesn't affect OpenBSD's native implementation, only the portable version&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" target="_blank" rel="nofollow noopener"&gt;The developers&lt;/a&gt; decide to &lt;a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" target="_blank" rel="nofollow noopener"&gt;weigh in&lt;/a&gt; to calm the misinformation and rage&lt;/li&gt;
&lt;li&gt;A fix was added in 2.0.2, and Linux may even &lt;a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" target="_blank" rel="nofollow noopener"&gt;get a new system call&lt;/a&gt; to handle this properly now - remember to say thanks, guys&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; has a &lt;a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" target="_blank" rel="nofollow noopener"&gt;really good post&lt;/a&gt; about the whole situation, definitely check it out&lt;/li&gt;
&lt;li&gt;As a follow-up from last week, bapt says they're working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you're a port maintainer, please test your ports against it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" target="_blank" rel="nofollow noopener"&gt;Preparation for NetBSD 7&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The release process for NetBSD 7.0 is finally underway&lt;/li&gt;
&lt;li&gt;The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September&lt;/li&gt;
&lt;li&gt;If you run NetBSD, that'll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)&lt;/li&gt;
&lt;li&gt;They're also looking for some help updating documentation and fixing any bugs that get reported&lt;/li&gt;
&lt;li&gt;Another formal announcement will be made when the beta binaries are up
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Dag-Erling Smørgrav - &lt;a href="mailto:des@freebsd.org" target="_blank" rel="nofollow noopener"&gt;des@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/RealEvilDES" target="_blank" rel="nofollow noopener"&gt;@RealEvilDES&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The role of the FreeBSD Security Officer, recent ports features, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" target="_blank" rel="nofollow noopener"&gt;BSDCan ports and packages WG&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages&lt;/li&gt;
&lt;li&gt;Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages&lt;/li&gt;
&lt;li&gt;There's also some detail about the signing infrastructure and different mirrors&lt;/li&gt;
&lt;li&gt;Ports people and source people need to talk more often about ABI breakage&lt;/li&gt;
&lt;li&gt;The post also includes information about pkg 1.3, the old pkg tools' EOL, the quarterly stable package sets and a lot more (it's a huge post!)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.ignoranthack.me/?p=212" target="_blank" rel="nofollow noopener"&gt;Cross-compiling ports with QEMU and poudriere&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With recent QEMU features, you can basically chroot into a completely different architecture&lt;/li&gt;
&lt;li&gt;This article goes through the process of building ARMv6 packages on a normal X86 box&lt;/li&gt;
&lt;li&gt;Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now&lt;/li&gt;
&lt;li&gt;The poudriere-devel port now has a "qemu user" option that will pull in all the requirements&lt;/li&gt;
&lt;li&gt;Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2108" target="_blank" rel="nofollow noopener"&gt;Cloning FreeBSD with ZFS send&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen&lt;/li&gt;
&lt;li&gt;This post shows his entire process in creating a mirror machine, using ZFS for everything&lt;/li&gt;
&lt;li&gt;The "zfs send" and "zfs snapshot" commands really come in handy for this&lt;/li&gt;
&lt;li&gt;He does the whole thing from a live CD, pretty impressive
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Overview series&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog series we stumbled upon about a Linux user switching to BSD&lt;/li&gt;
&lt;li&gt;In part one, he gives a little background on being "done with Linux distros" and documents his initial experience getting and installing FreeBSD 10&lt;/li&gt;
&lt;li&gt;He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels&lt;/li&gt;
&lt;li&gt;Most of what he was used to on Linux was already in the default FreeBSD (except bash...)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" target="_blank" rel="nofollow noopener"&gt;Part two&lt;/a&gt; documents his experiences with pkgng and ports 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s214FYbOKL" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21cWLhzj4" target="_blank" rel="nofollow noopener"&gt;Rick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21A4grtH0" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s27fQHz8Se" target="_blank" rel="nofollow noopener"&gt;Esteban writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21QscO4Cr" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://imgur.com/a/Ah444" target="_blank" rel="nofollow noopener"&gt;Matt sends in pictures of his FreeBSD CD collection&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, prng, linux, des, aes, encryption, cryptography, Dag-Erling Smørgrav, security, hackathon, pf, packet filter, firewall, smp, multithreading, ixsystems, tarsnap, bsdcan, cheri, zfs, qemu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>46: Network Iodometry</title>
  <link>https://www.bsdnow.tv/46</link>
  <guid isPermaLink="false">e23303c8-31f0-4706-817c-1618e08cd149</guid>
  <pubDate>Wed, 16 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e23303c8-31f0-4706-817c-1618e08cd149.mp3" length="76226260" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.eurobsdcon.org/registration/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2014 registration open&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;September is getting closer, and that means it's time for EuroBSDCon - held in Bulgaria this year&lt;/li&gt;
&lt;li&gt;Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th&lt;/li&gt;
&lt;li&gt;Tutorials, sessions, dev summits and everything else all have their own pricing as well&lt;/li&gt;
&lt;li&gt;Registering between August 18th - September 12th will cost more for everything&lt;/li&gt;
&lt;li&gt;You can &lt;a href="http://registration.eurobsdcon.org/" target="_blank" rel="nofollow noopener"&gt;register online here&lt;/a&gt; and &lt;a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" target="_blank" rel="nofollow noopener"&gt;check hotels in the area&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The FreeBSD foundation is also &lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" target="_blank" rel="nofollow noopener"&gt;accepting applications&lt;/a&gt; for travel grants
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?t=140440541000002&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD SMP PF update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded&lt;/li&gt;
&lt;li&gt;With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump&lt;/li&gt;
&lt;li&gt;In a recent mailing list thread, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" target="_blank" rel="nofollow noopener"&gt;Henning Brauer&lt;/a&gt; addresses some of the concerns&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=140479174521071&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;short version&lt;/a&gt; is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless&lt;/li&gt;
&lt;li&gt;He &lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=140481012425889&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;also says&lt;/a&gt; PF on OpenBSD is over four times faster than FreeBSD's old version, presumably due to those extra years of development it's gone through&lt;/li&gt;
&lt;li&gt;There's also been &lt;a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" target="_blank" rel="nofollow noopener"&gt;even more recent concern&lt;/a&gt; about the uncertain future of FreeBSD's PF, being mostly unmaintained since their SMP patches&lt;/li&gt;
&lt;li&gt;We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://saveosx.org/pkgsrc-intro/" target="_blank" rel="nofollow noopener"&gt;Introduction to NetBSD pkgsrc&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An article from one of our listeners about how to create a new pkgsrc port or fix one that you need&lt;/li&gt;
&lt;li&gt;The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format&lt;/li&gt;
&lt;li&gt;It also lists all the different bmake targets and their functions in relation to the porting process&lt;/li&gt;
&lt;li&gt;Finally, the post details the whole process of creating a new port
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/9.3R/relnotes.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 9.3-RELEASE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced &lt;a href="https://www.freebsd.org/releases/9.3R/schedule.html" target="_blank" rel="nofollow noopener"&gt;today&lt;/a&gt; but actually came out yesterday&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.freebsd.org/releases/9.3R/relnotes.html" target="_blank" rel="nofollow noopener"&gt;The full list of changes&lt;/a&gt; is available, but it's mostly a smaller maintenance release&lt;/li&gt;
&lt;li&gt;Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more&lt;/li&gt;
&lt;li&gt;If you haven't jumped to the 10.x branch yet (and there are a lot of people who haven't!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon&lt;/li&gt;
&lt;li&gt;Good news, this will be &lt;a href="https://twitter.com/evilgjb/status/485909719522222080" target="_blank" rel="nofollow noopener"&gt;the first release&lt;/a&gt; with PGP-signed checksums on the FTP mirrors - a very welcome change&lt;/li&gt;
&lt;li&gt;With that out of the way, the 10.1-RELEASE schedule &lt;a href="https://www.freebsd.org/releases/10.1R/schedule.html" target="_blank" rel="nofollow noopener"&gt;was posted&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Bryan Drewery - &lt;a href="mailto:bdrewery@freebsd.org" target="_blank" rel="nofollow noopener"&gt;bdrewery@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/bdrewery" target="_blank" rel="nofollow noopener"&gt;@bdrewery&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The FreeBSD package building cluster, pkgng, ports, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ssh-dns" target="_blank" rel="nofollow noopener"&gt;Tunneling traffic through DNS&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" target="_blank" rel="nofollow noopener"&gt;SSH two-factor authentication on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website&lt;/li&gt;
&lt;li&gt;This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port&lt;/li&gt;
&lt;li&gt;Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally&lt;/li&gt;
&lt;li&gt;It's a really, really simple process once you have the port installed - full details on the page
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" target="_blank" rel="nofollow noopener"&gt;Ditch tape backup in favor of FreeNAS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The author of this post shares some of his horrible experiences with tape backups for a client&lt;/li&gt;
&lt;li&gt;Having constant, daily errors and failed backups, he needed to find another solution&lt;/li&gt;
&lt;li&gt;With 1TB of backups, tapes just weren't a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)&lt;/li&gt;
&lt;li&gt;The rest of the article details his experiences with it and tells about his setup
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" target="_blank" rel="nofollow noopener"&gt;NetBSD vs FreeBSD, desktop experiences&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job&lt;/li&gt;
&lt;li&gt;Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver&lt;/li&gt;
&lt;li&gt;"Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga."&lt;/li&gt;
&lt;li&gt;He's become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" target="_blank" rel="nofollow noopener"&gt;PCBSD not-so-weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Speaking of choices for a desktop system, it's the return of the PCBSD digest!&lt;/li&gt;
&lt;li&gt;Warden and PBI_add have gotten some interesting new features&lt;/li&gt;
&lt;li&gt;You can now create jails "on the fly" when adding a new PBI to your application library&lt;/li&gt;
&lt;li&gt;Bulk jail creation is also possible now, and it's really easy&lt;/li&gt;
&lt;li&gt;New Jenkins integration, with public access to &lt;a href="http://builds.pcbsd.org" target="_blank" rel="nofollow noopener"&gt;poudriere logs as well&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;PkgNG 1.3.0.rc2 testing for EDGE users
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21D05MP0t" target="_blank" rel="nofollow noopener"&gt;Jeff writes in&lt;/a&gt; - &lt;a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" target="_blank" rel="nofollow noopener"&gt;Sending Encrypted Backups over SSH&lt;/a&gt; + &lt;a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" target="_blank" rel="nofollow noopener"&gt;Sending ZFS snapshots via user&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2lzo1swzo" target="_blank" rel="nofollow noopener"&gt;Bruce writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20z841ean" target="_blank" rel="nofollow noopener"&gt;Richard writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2QYc8BOAo" target="_blank" rel="nofollow noopener"&gt;Jeff writes in&lt;/a&gt; - &lt;a href="http://www.nycbug.org/index.cgi?action=dmesgd" target="_blank" rel="nofollow noopener"&gt;NYCBUG dmesg list&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2V2e1m7S7" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pc-bsd, tutorial, howto, guide, bsd, interview, iodine, dns, tunnel, ssh, encryption, vpn, ids, bypass, detection, portmgr, pkgng, bypassing, firewall, pkgsrccon, pkgsrc, pf, smp, eurobsdcon, 2014, multithreaded, presentations, talks, two factor authentication, freenas, 9.3</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>44: Base ISO 100</title>
  <link>https://www.bsdnow.tv/44</link>
  <guid isPermaLink="false">cbf5ab1d-2355-4c2c-ade8-0e66250b204e</guid>
  <pubDate>Wed, 02 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf5ab1d-2355-4c2c-ade8-0e66250b204e.mp3" length="75659476" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1377" target="_blank" rel="nofollow noopener"&gt;pfSense 2.1.4 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The &lt;a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" target="_blank" rel="nofollow noopener"&gt;pfSense team&lt;/a&gt; has released 2.1.4, shortly after 2.1.3 - it's mainly a security release&lt;/li&gt;
&lt;li&gt;Included within are eight security fixes, most of which are pfSense-specific&lt;/li&gt;
&lt;li&gt;OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)&lt;/li&gt;
&lt;li&gt;It also includes a large number of various other bug fixes&lt;/li&gt;
&lt;li&gt;Update all your routers!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" target="_blank" rel="nofollow noopener"&gt;DragonflyBSD's pf gets SMP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While we're on the topic of pf...&lt;/li&gt;
&lt;li&gt;Dragonfly patches their old[er than even FreeBSD's] pf to support multithreading in many areas&lt;/li&gt;
&lt;li&gt;Stemming from &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" target="_blank" rel="nofollow noopener"&gt;a user's complaint&lt;/a&gt;, Matthew Dillon did his own work on pf to make it SMP-aware&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" target="_blank" rel="nofollow noopener"&gt;Altering your configuration&lt;/a&gt;'s ruleset can also help speed things up, he found&lt;/li&gt;
&lt;li&gt;When will OpenBSD, the source of pf, finally do the same?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ianix.com/pub/chacha-deployment.html" target="_blank" rel="nofollow noopener"&gt;ChaCha usage and deployment&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A while back, &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;we talked to djm&lt;/a&gt; about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5&lt;/li&gt;
&lt;li&gt;This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20&lt;/li&gt;
&lt;li&gt;OpenSSH offers it as a stream cipher now, OpenBSD uses it for it's random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it&lt;/li&gt;
&lt;li&gt;Both Google's fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not&lt;/li&gt;
&lt;li&gt;Unfortunately, this article has one mistake: FreeBSD &lt;a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" target="_blank" rel="nofollow noopener"&gt;does not use it&lt;/a&gt; - they &lt;em&gt;still&lt;/em&gt; use the broken RC4 algorithm
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" target="_blank" rel="nofollow noopener"&gt;BSDMag June 2014 issue&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The monthly online BSD magazine releases their newest issue&lt;/li&gt;
&lt;li&gt;This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, "saving time and headaches using the robot framework for testing," an interview and an article about the increasing number of security vulnerabilities&lt;/li&gt;
&lt;li&gt;The free pdf file is available for download as always
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Craig Rodrigues - &lt;a href="mailto:rodrigc@freebsd.org" target="_blank" rel="nofollow noopener"&gt;rodrigc@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD's &lt;a href="https://wiki.freebsd.org/Jenkins" target="_blank" rel="nofollow noopener"&gt;continuous&lt;/a&gt; &lt;a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" target="_blank" rel="nofollow noopener"&gt;testing&lt;/a&gt; &lt;a href="https://jenkins.freebsd.org/jenkins/" target="_blank" rel="nofollow noopener"&gt;infrastructure&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/stable-iso" target="_blank" rel="nofollow noopener"&gt;Creating pre-patched OpenBSD ISOs&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" target="_blank" rel="nofollow noopener"&gt;Preauthenticated decryption considered harmful&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Responding to &lt;a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" target="_blank" rel="nofollow noopener"&gt;a post&lt;/a&gt; from Adam Langley, &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; talks a little more about how signify and pkg_add handle signatures&lt;/li&gt;
&lt;li&gt;In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns&lt;/li&gt;
&lt;li&gt;With signify, now everything is fully downloaded and verified before tar is even invoked&lt;/li&gt;
&lt;li&gt;The pkg_add utility works a little bit differently, but it's also been improved in this area - details in the post&lt;/li&gt;
&lt;li&gt;Be sure to also read the original post from Adam, lots of good information
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 9.3-RC2 is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As the -RELEASE inches closer, release candidate 2 is out and ready for testing&lt;/li&gt;
&lt;li&gt;Since the last one, it's got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things&lt;/li&gt;
&lt;li&gt;The updated bsdconfig will use pkgng style packages now too&lt;/li&gt;
&lt;li&gt;A lesser known fact: there are also premade virtual machine images you can use too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://saveosx.org/pkgsrcCon/" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon 2014 wrap-up&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In what may be the first real pkgsrcCon article we've ever had!&lt;/li&gt;
&lt;li&gt;Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event&lt;/li&gt;
&lt;li&gt;Unfortunately no recordings to be found...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" target="_blank" rel="nofollow noopener"&gt;PostgreSQL FreeBSD performance and scalability&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales&lt;/li&gt;
&lt;li&gt;On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings&lt;/li&gt;
&lt;li&gt;Lots of technical details if you're interested in getting the best performance out of your hardware&lt;/li&gt;
&lt;li&gt;It also includes specific kernel options he used and the rest of the configuration&lt;/li&gt;
&lt;li&gt;If you don't want to open the pdf file, you can &lt;a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" target="_blank" rel="nofollow noopener"&gt;use this link&lt;/a&gt; too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s24pFjUPe4" target="_blank" rel="nofollow noopener"&gt;James writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21OogIgTu" target="_blank" rel="nofollow noopener"&gt;Klemen writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21rLcemNN" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s203Qsx6CZ" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2eBj0FfSL" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, iso, patch, stable, cd, dvd, cdr, pre-applied, applied, horrible puns, jenkins, testing, kyua, ixsystems, tarsnap, pfsense, freenas, tarsnap, ixsystems, pfsense, freenas, bsdmag, magazine, ssl, tls, hardening, hardened, security, pf, smp, multithreading, firewall, scalability, postgresql, mysql, sql, database, performance, openssl, libressl, boringssl, google, chacha, chacha20, salsa20, encryption, pkgsrc, pkgsrccon, signify, pkg_add, authenticated encryption, decryption, gcm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>39: The Friendly Sandbox</title>
  <link>https://www.bsdnow.tv/39</link>
  <guid isPermaLink="false">4ae1b0f5-7c6f-486f-bdcf-c71ec415269c</guid>
  <pubDate>Wed, 28 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4ae1b0f5-7c6f-486f-bdcf-c71ec415269c.mp3" length="45004756" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:02:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2014/schedule/" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 talks and reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links&lt;/li&gt;
&lt;li&gt;Karl Lehenbauer's &lt;a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" target="_blank" rel="nofollow noopener"&gt;keynote&lt;/a&gt; (he's on next week's episode)&lt;/li&gt;
&lt;li&gt;Mariusz Zaborski and Pawel Jakub Dawidek,
&lt;a href="https://www.youtube.com/watch?v=0la06FHbdvg" target="_blank" rel="nofollow noopener"&gt;Capsicum and Casper&lt;/a&gt; (relevant to today's interview)&lt;/li&gt;
&lt;li&gt;Luigi Rizzo,
&lt;a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" target="_blank" rel="nofollow noopener"&gt;In-kernel OpenvSwitch on FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Dwayne Hart, &lt;a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" target="_blank" rel="nofollow noopener"&gt;Migrating from Linux to FreeBSD for Backend Data Storage&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Warner Losh, &lt;a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" target="_blank" rel="nofollow noopener"&gt;NAND Flash and FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Simon Gerraty, &lt;a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" target="_blank" rel="nofollow noopener"&gt;FreeBSD bmake and Meta Mode&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Bob Beck, &lt;a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" target="_blank" rel="nofollow noopener"&gt;LibreSSL - The First 30 Days&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Henning Brauer, &lt;a href="https://www.youtube.com/watch?v=cP8AW111IKg" target="_blank" rel="nofollow noopener"&gt;OpenBGPD Turns 10 Years Old&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Arun Thomas, &lt;a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" target="_blank" rel="nofollow noopener"&gt;BSD ARM Kernel Internals&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Peter Hessler, &lt;a href="https://www.youtube.com/watch?v=i8UAVswpagA" target="_blank" rel="nofollow noopener"&gt;Using BGP for Realtime Spam Lists&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Pedro Giffuni, &lt;a href="https://www.youtube.com/watch?v=HMeTxViulgo" target="_blank" rel="nofollow noopener"&gt;Features and Status of FreeBSD's Ext2 Implementation
&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Matt Ahrens, &lt;a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" target="_blank" rel="nofollow noopener"&gt;OpenZFS Upcoming Features and Performance Enhancements&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Daichi Goto, &lt;a href="https://www.youtube.com/watch?v=MsRu0xIawaA" target="_blank" rel="nofollow noopener"&gt;Shellscripts and Commands&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Benno Rice, &lt;a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" target="_blank" rel="nofollow noopener"&gt;Keeping Current&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Sean Bruno, &lt;a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" target="_blank" rel="nofollow noopener"&gt;MIPS Router Hacking&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;John-Mark Gurney, &lt;a href="https://www.youtube.com/watch?v=2qicD0tv_tI" target="_blank" rel="nofollow noopener"&gt;Optimizing GELI Performance&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Patrick Kelsey, &lt;a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" target="_blank" rel="nofollow noopener"&gt;Userspace Networking with libuinet&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Massimiliano Stucchi, &lt;a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" target="_blank" rel="nofollow noopener"&gt;IPv6 Transitioning Mechanisms&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Roger Pau Monné, &lt;a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" target="_blank" rel="nofollow noopener"&gt;Taking the Red Pill&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Shawn Webb, &lt;a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" target="_blank" rel="nofollow noopener"&gt;Introducing ASLR in FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There's also a &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140519164127" target="_blank" rel="nofollow noopener"&gt;trip report&lt;/a&gt; from Peter Hessler and &lt;a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" target="_blank" rel="nofollow noopener"&gt;one from Julio Merino&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that's a recurring trend)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" target="_blank" rel="nofollow noopener"&gt;Defend your network and privacy with a VPN and OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back&lt;/li&gt;
&lt;li&gt;This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities&lt;/li&gt;
&lt;li&gt;There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used&lt;/li&gt;
&lt;li&gt;You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)&lt;/li&gt;
&lt;li&gt;It also includes a few general privacy tips, recommended browser extensions, etc&lt;/li&gt;
&lt;li&gt;The intro to the article is especially great, so give the whole thing a read&lt;/li&gt;
&lt;li&gt;He mentions our &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;OpenBSD router guide&lt;/a&gt; and other tutorials being a big help for this setup, so hello if you're watching!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pascalj.com/article/you-should-try-freebsd/" target="_blank" rel="nofollow noopener"&gt;You should try FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this blog post, the author talks a bit about how some Linux people aren't familiar with the BSDs and how we can take steps to change that&lt;/li&gt;
&lt;li&gt;He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two&lt;/li&gt;
&lt;li&gt;Possibly the most useful part is how to address the question "my server already works, why bother switching?"&lt;/li&gt;
&lt;li&gt;"Stackoverflow’s answers assume I have apt-get installed"&lt;/li&gt;
&lt;li&gt;It includes mention of the great documentation, stability, ports, improved security and much more&lt;/li&gt;
&lt;li&gt;A takeaway quote for would-be Linux switchers: "I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" target="_blank" rel="nofollow noopener"&gt;OpenBSD and the little Mauritian contributor&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This is a story about a guy from &lt;a href="https://en.wikipedia.org/wiki/Mauritius" target="_blank" rel="nofollow noopener"&gt;Mauritius&lt;/a&gt; named Logan, one of OpenBSD's newest developers&lt;/li&gt;
&lt;li&gt;Back in 2010, he started sending in patched for OpenBSD's "mg" editor, among other small things, and eventually added file transfer resume support for SFTP&lt;/li&gt;
&lt;li&gt;The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon&lt;/li&gt;
&lt;li&gt;It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem&lt;/li&gt;
&lt;li&gt;Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jon Anderson - &lt;a href="mailto:jonathan@freebsd.org" target="_blank" rel="nofollow noopener"&gt;jonathan@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Capsicum and Casperd&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/dnscrypt" target="_blank" rel="nofollow noopener"&gt;Encrypting DNS lookups&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://i.imgur.com/f0qg6Ss.jpg" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal, May 2014 issue&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The newest issue of the &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal&lt;/a&gt; is out, following the bi-monthly release cycle&lt;/li&gt;
&lt;li&gt;This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling&lt;/li&gt;
&lt;li&gt;Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" target="_blank" rel="nofollow noopener"&gt;LibreSSL porting update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Since the last LibreSSL post we covered, a couple unofficial "portable" versions have died off&lt;/li&gt;
&lt;li&gt;Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!&lt;/li&gt;
&lt;li&gt;This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example&lt;/li&gt;
&lt;li&gt;Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" target="_blank" rel="nofollow noopener"&gt;BSDMag May 2014 issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The usual monthly release from BSDMag, covering a variety of subjects&lt;/li&gt;
&lt;li&gt;This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things&lt;/li&gt;
&lt;li&gt;It's a free PDF, go grab it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 241&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new episode of &lt;a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" target="_blank" rel="nofollow noopener"&gt;BSDTalk&lt;/a&gt; is out, this time with Bob Beck&lt;/li&gt;
&lt;li&gt;He talks about the OpenBSD foundation's recent activities, his own work in the project, some stories about the hardware in Theo's basement and a lot more&lt;/li&gt;
&lt;li&gt;The interview itself isn't about LibreSSL at all, but they do touch on it a bit too&lt;/li&gt;
&lt;li&gt;Really interesting stuff, covers a lot of different topics in a short amount of time
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;We got a number of replies about last week's VPN question, so thanks to everyone who sent in an email about it - the &lt;a href="https://www.freshports.org/security/vpnc/" target="_blank" rel="nofollow noopener"&gt;vpnc&lt;/a&gt; package seems to be what we were looking for&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20MK7bTyc" target="_blank" rel="nofollow noopener"&gt;Tim writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2OWREQdUA" target="_blank" rel="nofollow noopener"&gt;AJ writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s202obAqbT" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Kye2jAc" target="_blank" rel="nofollow noopener"&gt;Thomas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2zqFVqwxN" target="_blank" rel="nofollow noopener"&gt;Martin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, casper, casperd, the friendly ghost, capsicum, sandbox, application, jails, isolation, isolated, chroot, virtual machine, exploit, vpn, security, ssh, tunnel, encryption, bsdcan, presentation, talk, video, recordings, dnscrypt, opendns, dnscurve, lookups, dns, dnssec, gateway, vpn, vps, journal, bsdmag, bsdtalk, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>29: P.E.F.S.</title>
  <link>https://www.bsdnow.tv/29</link>
  <guid isPermaLink="false">4af36dea-3dd3-4ac1-9ee9-a2e34dd54e3a</guid>
  <pubDate>Wed, 19 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4af36dea-3dd3-4ac1-9ee9-a2e34dd54e3a.mp3" length="82610606" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from AsiaBSDCon! This week we'll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we'll give you a step by step guide on how to actually use it. There's also the usual round of your questions and we've got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:54:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back from AsiaBSDCon! This week we'll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we'll give you a step by step guide on how to actually use it. There's also the usual round of your questions and we've got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" target="_blank" rel="nofollow noopener"&gt;Using OpenSSH Certificate Authentication&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you're using&lt;/li&gt;
&lt;li&gt;They're not really that complex, there just isn't a lot of documentation on how to use them - this post tries to solve that&lt;/li&gt;
&lt;li&gt;There's the benefit of not needing a known_hosts file or authorized_users file anymore&lt;/li&gt;
&lt;li&gt;The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" target="_blank" rel="nofollow noopener"&gt;Back to FreeBSD, a new series&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Similar to the "FreeBSD Challenge" blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey&lt;/li&gt;
&lt;li&gt;"So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10"&lt;/li&gt;
&lt;li&gt;He's starting off with PCBSD since it's easy to get working with dual graphics&lt;/li&gt;
&lt;li&gt;Should be a fun series to follow!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140307130554" target="_blank" rel="nofollow noopener"&gt;OpenBSD's recent experiments in package building&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you'll remember back to our &lt;a href="http://www.bsdnow.tv/tutorials/poudriere" target="_blank" rel="nofollow noopener"&gt;poudriere tutorial&lt;/a&gt;, it lets you build FreeBSD binary packages in bulk - OpenBSD's version is called &lt;a href="http://www.bsdnow.tv/tutorials/dpb" target="_blank" rel="nofollow noopener"&gt;dpb&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware&lt;/li&gt;
&lt;li&gt;This article goes through some of his findings and plans for future versions that increase performance&lt;/li&gt;
&lt;li&gt;We'll be showing a tutorial of dpb on the show in a few weeks
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" target="_blank" rel="nofollow noopener"&gt;Securing FreeBSD with 2FA&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;So maybe you've set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?&lt;/li&gt;
&lt;li&gt;This post walks us through the process of locking down an &lt;a href="http://www.bsdnow.tv/tutorials/ssh-tmux" target="_blank" rel="nofollow noopener"&gt;ssh server&lt;/a&gt; with 2FA&lt;/li&gt;
&lt;li&gt;With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Gleb Kurtsou - &lt;a href="mailto:gleb.kurtsou@gmail.com" target="_blank" rel="nofollow noopener"&gt;gleb.kurtsou@gmail.com&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;PEFS (security audit results &lt;a href="https://defuse.ca/audits/pefs.htm" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;)&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/pefs" target="_blank" rel="nofollow noopener"&gt;Filesystem-based encryption with PEFS&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2014/registration.php" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 registration&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Registration is finally open!&lt;/li&gt;
&lt;li&gt;The prices are available along with a full list of presentations&lt;/li&gt;
&lt;li&gt;Tutorial sessions for various topics as well&lt;/li&gt;
&lt;li&gt;You have to go
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140314080734" target="_blank" rel="nofollow noopener"&gt;Big changes for OpenBSD 5.6&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising&lt;/li&gt;
&lt;li&gt;OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3&lt;/li&gt;
&lt;li&gt;They've also imported nginx into base a few years ago, but now have finally removed Apache&lt;/li&gt;
&lt;li&gt;Sendmail is also no longer the default MTA, OpenSMTPD &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140313052817" target="_blank" rel="nofollow noopener"&gt;is the new default&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Will BIND be removed next? &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139492163427518&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Maybe so&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They've also discontinued the hp300, mvme68k and mvme88k ports
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" target="_blank" rel="nofollow noopener"&gt;Getting to know your portmgr lurkers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The "getting to know your portmgr" series makes its return&lt;/li&gt;
&lt;li&gt;This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)&lt;/li&gt;
&lt;li&gt;How he got into FreeBSD? He "wanted a unix system that I could understand and that would not get bloated as time goes by"&lt;/li&gt;
&lt;li&gt;Mentions why he's still heavily involved with the project and lots more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Work has started to port Pulseaudio to PCBSD 10.0.1&lt;/li&gt;
&lt;li&gt;There's a new "pc-mixer" utility being worked on for sound management as well&lt;/li&gt;
&lt;li&gt;New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more&lt;/li&gt;
&lt;li&gt;PCBSD 10.0.1 &lt;a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" target="_blank" rel="nofollow noopener"&gt;was released&lt;/a&gt; too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QwjHkL2n" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2wLGlHF15" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21JsgRjMU" target="_blank" rel="nofollow noopener"&gt;Nick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2UX4sYdHy" target="_blank" rel="nofollow noopener"&gt;Sami writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s26z60Qd6z" target="_blank" rel="nofollow noopener"&gt;Christopher writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, encryption, pefs, fde, disk, asiabsdcon, 2014, asiabsdcon2014, presentation, talk, video, recording, openssh, certificate, authentication, dpb, two factor, 2fa, yubikey</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week we&#39;ll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we&#39;ll give you a step by step guide on how to actually use it. There&#39;s also the usual round of your questions and we&#39;ve got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" rel="nofollow">Using OpenSSH Certificate Authentication</a></h3>

<ul>
<li>SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you&#39;re using</li>
<li>They&#39;re not really that complex, there just isn&#39;t a lot of documentation on how to use them - this post tries to solve that</li>
<li>There&#39;s the benefit of not needing a known_hosts file or authorized_users file anymore</li>
<li>The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***</li>
</ul>

<h3><a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" rel="nofollow">Back to FreeBSD, a new series</a></h3>

<ul>
<li>Similar to the &quot;FreeBSD Challenge&quot; blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey</li>
<li>&quot;So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10&quot;</li>
<li>He&#39;s starting off with PCBSD since it&#39;s easy to get working with dual graphics</li>
<li>Should be a fun series to follow!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140307130554" rel="nofollow">OpenBSD&#39;s recent experiments in package building</a></h3>

<ul>
<li>If you&#39;ll remember back to our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a>, it lets you build FreeBSD binary packages in bulk - OpenBSD&#39;s version is called <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a></li>
<li>Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware</li>
<li>This article goes through some of his findings and plans for future versions that increase performance</li>
<li>We&#39;ll be showing a tutorial of dpb on the show in a few weeks
***</li>
</ul>

<h3><a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" rel="nofollow">Securing FreeBSD with 2FA</a></h3>

<ul>
<li>So maybe you&#39;ve set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?</li>
<li>This post walks us through the process of locking down an <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">ssh server</a> with 2FA</li>
<li>With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***</li>
</ul>

<h2>Interview - Gleb Kurtsou - <a href="mailto:gleb.kurtsou@gmail.com" rel="nofollow">gleb.kurtsou@gmail.com</a></h2>

<p>PEFS (security audit results <a href="https://defuse.ca/audits/pefs.htm" rel="nofollow">here</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pefs" rel="nofollow">Filesystem-based encryption with PEFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.bsdcan.org/2014/registration.php" rel="nofollow">BSDCan 2014 registration</a></h3>

<ul>
<li>Registration is finally open!</li>
<li>The prices are available along with a full list of presentations</li>
<li>Tutorial sessions for various topics as well</li>
<li>You have to go
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140314080734" rel="nofollow">Big changes for OpenBSD 5.6</a></h3>

<ul>
<li>Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising</li>
<li>OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3</li>
<li>They&#39;ve also imported nginx into base a few years ago, but now have finally removed Apache</li>
<li>Sendmail is also no longer the default MTA, OpenSMTPD <a href="http://undeadly.org/cgi?action=article&sid=20140313052817" rel="nofollow">is the new default</a></li>
<li>Will BIND be removed next? <a href="http://marc.info/?l=openbsd-cvs&m=139492163427518&w=2" rel="nofollow">Maybe so</a></li>
<li>They&#39;ve also discontinued the hp300, mvme68k and mvme88k ports
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The &quot;getting to know your portmgr&quot; series makes its return</li>
<li>This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)</li>
<li>How he got into FreeBSD? He &quot;wanted a unix system that I could understand and that would not get bloated as time goes by&quot;</li>
<li>Mentions why he&#39;s still heavily involved with the project and lots more
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Work has started to port Pulseaudio to PCBSD 10.0.1</li>
<li>There&#39;s a new &quot;pc-mixer&quot; utility being worked on for sound management as well</li>
<li>New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more</li>
<li>PCBSD 10.0.1 <a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" rel="nofollow">was released</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2QwjHkL2n" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s2wLGlHF15" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21JsgRjMU" rel="nofollow">Nick writes in</a></li>
<li><a href="http://slexy.org/view/s2UX4sYdHy" rel="nofollow">Sami writes in</a></li>
<li><a href="http://slexy.org/view/s26z60Qd6z" rel="nofollow">Christopher writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week we&#39;ll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we&#39;ll give you a step by step guide on how to actually use it. There&#39;s also the usual round of your questions and we&#39;ve got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" rel="nofollow">Using OpenSSH Certificate Authentication</a></h3>

<ul>
<li>SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you&#39;re using</li>
<li>They&#39;re not really that complex, there just isn&#39;t a lot of documentation on how to use them - this post tries to solve that</li>
<li>There&#39;s the benefit of not needing a known_hosts file or authorized_users file anymore</li>
<li>The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***</li>
</ul>

<h3><a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" rel="nofollow">Back to FreeBSD, a new series</a></h3>

<ul>
<li>Similar to the &quot;FreeBSD Challenge&quot; blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey</li>
<li>&quot;So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10&quot;</li>
<li>He&#39;s starting off with PCBSD since it&#39;s easy to get working with dual graphics</li>
<li>Should be a fun series to follow!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140307130554" rel="nofollow">OpenBSD&#39;s recent experiments in package building</a></h3>

<ul>
<li>If you&#39;ll remember back to our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a>, it lets you build FreeBSD binary packages in bulk - OpenBSD&#39;s version is called <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a></li>
<li>Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware</li>
<li>This article goes through some of his findings and plans for future versions that increase performance</li>
<li>We&#39;ll be showing a tutorial of dpb on the show in a few weeks
***</li>
</ul>

<h3><a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" rel="nofollow">Securing FreeBSD with 2FA</a></h3>

<ul>
<li>So maybe you&#39;ve set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?</li>
<li>This post walks us through the process of locking down an <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">ssh server</a> with 2FA</li>
<li>With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***</li>
</ul>

<h2>Interview - Gleb Kurtsou - <a href="mailto:gleb.kurtsou@gmail.com" rel="nofollow">gleb.kurtsou@gmail.com</a></h2>

<p>PEFS (security audit results <a href="https://defuse.ca/audits/pefs.htm" rel="nofollow">here</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pefs" rel="nofollow">Filesystem-based encryption with PEFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.bsdcan.org/2014/registration.php" rel="nofollow">BSDCan 2014 registration</a></h3>

<ul>
<li>Registration is finally open!</li>
<li>The prices are available along with a full list of presentations</li>
<li>Tutorial sessions for various topics as well</li>
<li>You have to go
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140314080734" rel="nofollow">Big changes for OpenBSD 5.6</a></h3>

<ul>
<li>Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising</li>
<li>OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3</li>
<li>They&#39;ve also imported nginx into base a few years ago, but now have finally removed Apache</li>
<li>Sendmail is also no longer the default MTA, OpenSMTPD <a href="http://undeadly.org/cgi?action=article&sid=20140313052817" rel="nofollow">is the new default</a></li>
<li>Will BIND be removed next? <a href="http://marc.info/?l=openbsd-cvs&m=139492163427518&w=2" rel="nofollow">Maybe so</a></li>
<li>They&#39;ve also discontinued the hp300, mvme68k and mvme88k ports
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The &quot;getting to know your portmgr&quot; series makes its return</li>
<li>This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)</li>
<li>How he got into FreeBSD? He &quot;wanted a unix system that I could understand and that would not get bloated as time goes by&quot;</li>
<li>Mentions why he&#39;s still heavily involved with the project and lots more
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Work has started to port Pulseaudio to PCBSD 10.0.1</li>
<li>There&#39;s a new &quot;pc-mixer&quot; utility being worked on for sound management as well</li>
<li>New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more</li>
<li>PCBSD 10.0.1 <a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" rel="nofollow">was released</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2QwjHkL2n" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s2wLGlHF15" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21JsgRjMU" rel="nofollow">Nick writes in</a></li>
<li><a href="http://slexy.org/view/s2UX4sYdHy" rel="nofollow">Sami writes in</a></li>
<li><a href="http://slexy.org/view/s26z60Qd6z" rel="nofollow">Christopher writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>16: Cryptocrystalline</title>
  <link>https://www.bsdnow.tv/16</link>
  <guid isPermaLink="false">d9af27cf-c4ff-4572-b119-cbfd0e4167c8</guid>
  <pubDate>Wed, 18 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d9af27cf-c4ff-4572-b119-cbfd0e4167c8.mp3" length="79454910" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:50:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" target="_blank" rel="nofollow noopener"&gt;Secure communications with OpenBSD and OpenVPN&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Starting off today's theme of encryption...&lt;/li&gt;
&lt;li&gt;A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic&lt;/li&gt;
&lt;li&gt;Part 1 covers installing OpenBSD with full disk encryption (which we'll be doing later on in the show)&lt;/li&gt;
&lt;li&gt;Part 2 covers the initial setup of OpenVPN certificates and keys&lt;/li&gt;
&lt;li&gt;Parts 3 and 4 are the OpenVPN server and client configuration&lt;/li&gt;
&lt;li&gt;Part 5 is some updates and closing remarks
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation Newsletter&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The December 2013 semi-annual newsletter was sent out from the foundation&lt;/li&gt;
&lt;li&gt;In the newsletter you will find the president's letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored&lt;/li&gt;
&lt;li&gt;The president's letter alone is worth the read, really amazing&lt;/li&gt;
&lt;li&gt;Really long, with lots of details and stories from the conferences and projects
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://evertiq.com/design/33394" target="_blank" rel="nofollow noopener"&gt;Use of NetBSD with Marvell Kirkwood Processors&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer&lt;/li&gt;
&lt;li&gt;The IP-Plug is a "multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger)."&lt;/li&gt;
&lt;li&gt;Really cool little NetBSD ARM project with lots of graphs, pictures and details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" target="_blank" rel="nofollow noopener"&gt;Experimenting with zero-copy network IO&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD&lt;/li&gt;
&lt;li&gt;Discusses the different OS' implementations and options&lt;/li&gt;
&lt;li&gt;He's able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn't stopping there&lt;/li&gt;
&lt;li&gt;Tons of details, check the full post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Damien Miller - &lt;a href="mailto:djm@openbsd.org" target="_blank" rel="nofollow noopener"&gt;djm@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/damienmiller" target="_blank" rel="nofollow noopener"&gt;@damienmiller&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Cryptography in OpenBSD and OpenSSH&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;Full disk encryption in FreeBSD &amp;amp; OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" target="_blank" rel="nofollow noopener"&gt;OpenZFS office hours&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy &lt;a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" target="_blank" rel="nofollow noopener"&gt;George Wilson&lt;/a&gt; sat down to take some ZFS questions from the community&lt;/li&gt;
&lt;li&gt;You can see more info about it &lt;a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" target="_blank" rel="nofollow noopener"&gt;License summaries in pkgng&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A discussion between &lt;a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" target="_blank" rel="nofollow noopener"&gt;Justin Sherill&lt;/a&gt; and some NYCBUG guys about license frameworks in pkgng&lt;/li&gt;
&lt;li&gt;Similar to pkgsrc's "ACCEPTABLE_LICENSES" setting, pkgng could let the user decide which software licenses he wants to allow&lt;/li&gt;
&lt;li&gt;Maybe we could get a "pkg licenses" command to display the license of all installed packages&lt;/li&gt;
&lt;li&gt;Ok bapt, do it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD challenge continues&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Checking in with our buddy from the Linux foundation...&lt;/li&gt;
&lt;li&gt;The switching from Linux to FreeBSD blog series continues for his month-long trial&lt;/li&gt;
&lt;li&gt;Follow up from last week: "As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding."&lt;/li&gt;
&lt;li&gt;Since we last mentioned it, he's decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=336615" target="_blank" rel="nofollow noopener"&gt;Ports gets a stable branch&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For the first time ever, FreeBSD's ports tree will have a maintained "stable" branch&lt;/li&gt;
&lt;li&gt;This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes&lt;/li&gt;
&lt;li&gt;All commits to this branch require approval of portmgr, looks like it'll start in 2014Q1
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2iRV1tOzB" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gAR5lgf" target="_blank" rel="nofollow noopener"&gt;Spencer writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s203iOnFh1" target="_blank" rel="nofollow noopener"&gt;Campbell writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yUqj3vKW" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2egcTPBXH" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, arm, openssh, sftp, security, damien miller, djm, mindrot, encryption, crypto, chacha20, poly1305, aes, hmac, mac, sha256, cipher, rc4, base64, encode, decode, ed25519, bcrypt, md5, hash, salt, openzfs, office hours, openvpn, vps, vpn, ssl, tun, tap, foundation, newsletter, freebsd journal, ixsystems, ecc, rsa, dsa, ecdsa, tunnel, keys, password, passphrase, full disk encryption, fde, installation, encrypted install, unencrypted</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>15: Kickin' NAS</title>
  <link>https://www.bsdnow.tv/15</link>
  <guid isPermaLink="false">cbf73b1a-fa1e-4acd-a1c4-ad96edb36916</guid>
  <pubDate>Wed, 11 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf73b1a-fa1e-4acd-a1c4-ad96edb36916.mp3" length="77923925" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he's on the FreeBSD release engineering team too, and does quite a lot for the project. We've got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:48:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he's on the FreeBSD release engineering team too, and does quite a lot for the project. We've got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" target="_blank" rel="nofollow noopener"&gt;More faces of FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another installment of the FoF series&lt;/li&gt;
&lt;li&gt;This time they talk with Reid Linnemann who works at Spectra Logic&lt;/li&gt;
&lt;li&gt;Gives a history of all the different jobs he's done, all the programming languages he knows&lt;/li&gt;
&lt;li&gt;Mentions how he first learned about FreeBSD, actually pretty similar to Kris' story&lt;/li&gt;
&lt;li&gt;"I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD."&lt;/li&gt;
&lt;li&gt;Now works on FreeBSD as his day job&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" target="_blank" rel="nofollow noopener"&gt;The second one&lt;/a&gt; covers Brooks Davis&lt;/li&gt;
&lt;li&gt;FreeBSD committer since 2001 and core team member from 2006 through 2012&lt;/li&gt;
&lt;li&gt;He's helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain&lt;/li&gt;
&lt;li&gt;"One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it."&lt;/li&gt;
&lt;li&gt;Lots more in the show notes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" target="_blank" rel="nofollow noopener"&gt;We cannot trust Intel and Via’s chip-based crypto&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We woke up to see FreeBSD on the front page of &lt;a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" target="_blank" rel="nofollow noopener"&gt;The Register&lt;/a&gt;, &lt;a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" target="_blank" rel="nofollow noopener"&gt;Ars Technica&lt;/a&gt;, &lt;a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" target="_blank" rel="nofollow noopener"&gt;Slashdot&lt;/a&gt; and &lt;a href="https://news.ycombinator.com/item?id=6880474" target="_blank" rel="nofollow noopener"&gt;Hacker News&lt;/a&gt; for their strong stance on security and respecting privacy&lt;/li&gt;
&lt;li&gt;At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.&lt;/li&gt;
&lt;li&gt;FreeBSD's /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA's hardware RNGs as the sole point of entropy&lt;/li&gt;
&lt;li&gt;"It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD 5.4.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenBSD developers came out with major a new version&lt;/li&gt;
&lt;li&gt;Improved config syntax (please check your smtpd.conf before upgrading)&lt;/li&gt;
&lt;li&gt;Adds support for TLS Perfect Forward Secrecy and custom CA certificate&lt;/li&gt;
&lt;li&gt;MTA, Queue and SMTP server improvements&lt;/li&gt;
&lt;li&gt;SNI support confirmed for the next version&lt;/li&gt;
&lt;li&gt;Check the show notes for the full list of changes, pretty huge release&lt;/li&gt;
&lt;li&gt;Watch &lt;a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" target="_blank" rel="nofollow noopener"&gt;Episode 3&lt;/a&gt; for an interview we did with the developers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" target="_blank" rel="nofollow noopener"&gt;More getting to know your portmgr&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The portmgr secretary, Thomas Abthorpe, interviews... himself!&lt;/li&gt;
&lt;li&gt;Joined as -secretary in March 2010, upgraded to full member in March 2011&lt;/li&gt;
&lt;li&gt;His inspiration for using BSD is "I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go."&lt;/li&gt;
&lt;li&gt;Mentions how he loves that anyone can contribute and watch it "go live"&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" target="_blank" rel="nofollow noopener"&gt;The second one&lt;/a&gt; covers Baptiste Daroussin&lt;/li&gt;
&lt;li&gt;The reason for his nick, bapt, is "Baptiste is too long to type"&lt;/li&gt;
&lt;li&gt;There's even &lt;a href="https://www.youtube.com/watch?v=tZk__K8rqOg" target="_blank" rel="nofollow noopener"&gt;a video&lt;/a&gt; of bapt joining the team!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Santa Clause - &lt;a href="mailto:josh@ixsystems.com" target="_blank" rel="nofollow noopener"&gt;josh@ixsystems.com&lt;/a&gt; / &lt;a href="https://twitter.com/freenasteam" target="_blank" rel="nofollow noopener"&gt;@freenasteam&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeNAS &lt;a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" target="_blank" rel="nofollow noopener"&gt;9.2.0&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.&lt;/strong&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;FreeNAS walkthrough&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" target="_blank" rel="nofollow noopener"&gt;Introducing configinit&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;CloudInit is "a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2"&lt;/li&gt;
&lt;li&gt;Wasn't ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)&lt;/li&gt;
&lt;li&gt;Colin Percival came up with configinit, a FreeBSD alternative&lt;/li&gt;
&lt;li&gt;Alongside his new "firstboot-pkgs" port, it can spin up a webserver in 120 seconds from "launch" of the EC2 instance&lt;/li&gt;
&lt;li&gt;Check the show notes for full blog post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" target="_blank" rel="nofollow noopener"&gt;OpenSSH support for Ed25519 and bcrypt keys&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code&lt;/li&gt;
&lt;li&gt;SSH private keys were encrypted with a symmetric key that's just an MD5 of their password&lt;/li&gt;
&lt;li&gt;Now they'll be using bcrypt &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=138633721618361&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;by default&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;We'll get more into this in next week's interview
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD challenge&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A member of the Linux foundation blogs about using FreeBSD&lt;/li&gt;
&lt;li&gt;Goes through all the beginner steps, has to "unlearn" some of his Linux ways&lt;/li&gt;
&lt;li&gt;Only a few posts as of this time, but it's a continuing series that may be helpful for switchers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;GNOME3, cinnamon and mate desktops are in the installer&lt;/li&gt;
&lt;li&gt;Compat layer updated to CentOS 6, enables newest Skype&lt;/li&gt;
&lt;li&gt;Looking for people to test printers and hplip&lt;/li&gt;
&lt;li&gt;Continuing work on grub, but the ability to switch between bootloaders is back
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20k2gumbP" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2PM8tfKfe" target="_blank" rel="nofollow noopener"&gt;Jason writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2KgXIKqrJ" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20DLk8bac" target="_blank" rel="nofollow noopener"&gt;Kjell-Aleksander writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2nmmJHvgR" target="_blank" rel="nofollow noopener"&gt;Alexy writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ports, freenas, ixsystems, nas, network attached storage, josh paetzel, jpaetzel, cto, zfs, zpool, encryption, 9.2.0, walkthrough, web, interface, ui, frontend, opensmtpd, bcrypt, openssh, portmgr, linux foundation, switching from linux to bsd, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he&#39;s on the FreeBSD release engineering team too, and does quite a lot for the project. We&#39;ve got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" rel="nofollow">More faces of FreeBSD</a></h3>

<ul>
<li>Another installment of the FoF series</li>
<li>This time they talk with Reid Linnemann who works at Spectra Logic</li>
<li>Gives a history of all the different jobs he&#39;s done, all the programming languages he knows</li>
<li>Mentions how he first learned about FreeBSD, actually pretty similar to Kris&#39; story</li>
<li>&quot;I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD.&quot;</li>
<li>Now works on FreeBSD as his day job</li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" rel="nofollow">The second one</a> covers Brooks Davis</li>
<li>FreeBSD committer since 2001 and core team member from 2006 through 2012</li>
<li>He&#39;s helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain</li>
<li>&quot;One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it.&quot;</li>
<li>Lots more in the show notes
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" rel="nofollow">We cannot trust Intel and Via’s chip-based crypto</a></h3>

<ul>
<li>We woke up to see FreeBSD on the front page of <a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" rel="nofollow">The Register</a>, <a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" rel="nofollow">Ars Technica</a>, <a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" rel="nofollow">Slashdot</a> and <a href="https://news.ycombinator.com/item?id=6880474" rel="nofollow">Hacker News</a> for their strong stance on security and respecting privacy</li>
<li>At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.</li>
<li>FreeBSD&#39;s /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA&#39;s hardware RNGs as the sole point of entropy</li>
<li>&quot;It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more&quot;
***</li>
</ul>

<h3><a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" rel="nofollow">OpenSMTPD 5.4.1 released</a></h3>

<ul>
<li>The OpenBSD developers came out with major a new version</li>
<li>Improved config syntax (please check your smtpd.conf before upgrading)</li>
<li>Adds support for TLS Perfect Forward Secrecy and custom CA certificate</li>
<li>MTA, Queue and SMTP server improvements</li>
<li>SNI support confirmed for the next version</li>
<li>Check the show notes for the full list of changes, pretty huge release</li>
<li>Watch <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">Episode 3</a> for an interview we did with the developers
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" rel="nofollow">More getting to know your portmgr</a></h3>

<ul>
<li>The portmgr secretary, Thomas Abthorpe, interviews... himself!</li>
<li>Joined as -secretary in March 2010, upgraded to full member in March 2011</li>
<li>His inspiration for using BSD is &quot;I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go.&quot;</li>
<li>Mentions how he loves that anyone can contribute and watch it &quot;go live&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" rel="nofollow">The second one</a> covers Baptiste Daroussin</li>
<li>The reason for his nick, bapt, is &quot;Baptiste is too long to type&quot;</li>
<li>There&#39;s even <a href="https://www.youtube.com/watch?v=tZk__K8rqOg" rel="nofollow">a video</a> of bapt joining the team!
***</li>
</ul>

<h2>Interview - Santa Clause - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/freenasteam" rel="nofollow">@freenasteam</a></h2>

<p>FreeNAS <a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" rel="nofollow">9.2.0</a></p>

<p><strong>Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.</strong></p>

<hr>

<h2>Tutorial</h2>

<h3>FreeNAS walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" rel="nofollow">Introducing configinit</a></h3>

<ul>
<li>CloudInit is &quot;a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2&quot;</li>
<li>Wasn&#39;t ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)</li>
<li>Colin Percival came up with configinit, a FreeBSD alternative</li>
<li>Alongside his new &quot;firstboot-pkgs&quot; port, it can spin up a webserver in 120 seconds from &quot;launch&quot; of the EC2 instance</li>
<li>Check the show notes for full blog post
***</li>
</ul>

<h3><a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" rel="nofollow">OpenSSH support for Ed25519 and bcrypt keys</a></h3>

<ul>
<li>New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code</li>
<li>SSH private keys were encrypted with a symmetric key that&#39;s just an MD5 of their password</li>
<li>Now they&#39;ll be using bcrypt <a href="http://marc.info/?l=openbsd-cvs&m=138633721618361&w=2" rel="nofollow">by default</a></li>
<li>We&#39;ll get more into this in next week&#39;s interview
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge</a></h3>

<ul>
<li>A member of the Linux foundation blogs about using FreeBSD</li>
<li>Goes through all the beginner steps, has to &quot;unlearn&quot; some of his Linux ways</li>
<li>Only a few posts as of this time, but it&#39;s a continuing series that may be helpful for switchers
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>GNOME3, cinnamon and mate desktops are in the installer</li>
<li>Compat layer updated to CentOS 6, enables newest Skype</li>
<li>Looking for people to test printers and hplip</li>
<li>Continuing work on grub, but the ability to switch between bootloaders is back
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20k2gumbP" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2PM8tfKfe" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2KgXIKqrJ" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20DLk8bac" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2nmmJHvgR" rel="nofollow">Alexy writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he&#39;s on the FreeBSD release engineering team too, and does quite a lot for the project. We&#39;ve got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" rel="nofollow">More faces of FreeBSD</a></h3>

<ul>
<li>Another installment of the FoF series</li>
<li>This time they talk with Reid Linnemann who works at Spectra Logic</li>
<li>Gives a history of all the different jobs he&#39;s done, all the programming languages he knows</li>
<li>Mentions how he first learned about FreeBSD, actually pretty similar to Kris&#39; story</li>
<li>&quot;I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD.&quot;</li>
<li>Now works on FreeBSD as his day job</li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" rel="nofollow">The second one</a> covers Brooks Davis</li>
<li>FreeBSD committer since 2001 and core team member from 2006 through 2012</li>
<li>He&#39;s helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain</li>
<li>&quot;One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it.&quot;</li>
<li>Lots more in the show notes
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" rel="nofollow">We cannot trust Intel and Via’s chip-based crypto</a></h3>

<ul>
<li>We woke up to see FreeBSD on the front page of <a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" rel="nofollow">The Register</a>, <a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" rel="nofollow">Ars Technica</a>, <a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" rel="nofollow">Slashdot</a> and <a href="https://news.ycombinator.com/item?id=6880474" rel="nofollow">Hacker News</a> for their strong stance on security and respecting privacy</li>
<li>At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.</li>
<li>FreeBSD&#39;s /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA&#39;s hardware RNGs as the sole point of entropy</li>
<li>&quot;It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more&quot;
***</li>
</ul>

<h3><a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" rel="nofollow">OpenSMTPD 5.4.1 released</a></h3>

<ul>
<li>The OpenBSD developers came out with major a new version</li>
<li>Improved config syntax (please check your smtpd.conf before upgrading)</li>
<li>Adds support for TLS Perfect Forward Secrecy and custom CA certificate</li>
<li>MTA, Queue and SMTP server improvements</li>
<li>SNI support confirmed for the next version</li>
<li>Check the show notes for the full list of changes, pretty huge release</li>
<li>Watch <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">Episode 3</a> for an interview we did with the developers
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" rel="nofollow">More getting to know your portmgr</a></h3>

<ul>
<li>The portmgr secretary, Thomas Abthorpe, interviews... himself!</li>
<li>Joined as -secretary in March 2010, upgraded to full member in March 2011</li>
<li>His inspiration for using BSD is &quot;I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go.&quot;</li>
<li>Mentions how he loves that anyone can contribute and watch it &quot;go live&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" rel="nofollow">The second one</a> covers Baptiste Daroussin</li>
<li>The reason for his nick, bapt, is &quot;Baptiste is too long to type&quot;</li>
<li>There&#39;s even <a href="https://www.youtube.com/watch?v=tZk__K8rqOg" rel="nofollow">a video</a> of bapt joining the team!
***</li>
</ul>

<h2>Interview - Santa Clause - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/freenasteam" rel="nofollow">@freenasteam</a></h2>

<p>FreeNAS <a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" rel="nofollow">9.2.0</a></p>

<p><strong>Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.</strong></p>

<hr>

<h2>Tutorial</h2>

<h3>FreeNAS walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" rel="nofollow">Introducing configinit</a></h3>

<ul>
<li>CloudInit is &quot;a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2&quot;</li>
<li>Wasn&#39;t ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)</li>
<li>Colin Percival came up with configinit, a FreeBSD alternative</li>
<li>Alongside his new &quot;firstboot-pkgs&quot; port, it can spin up a webserver in 120 seconds from &quot;launch&quot; of the EC2 instance</li>
<li>Check the show notes for full blog post
***</li>
</ul>

<h3><a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" rel="nofollow">OpenSSH support for Ed25519 and bcrypt keys</a></h3>

<ul>
<li>New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code</li>
<li>SSH private keys were encrypted with a symmetric key that&#39;s just an MD5 of their password</li>
<li>Now they&#39;ll be using bcrypt <a href="http://marc.info/?l=openbsd-cvs&m=138633721618361&w=2" rel="nofollow">by default</a></li>
<li>We&#39;ll get more into this in next week&#39;s interview
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge</a></h3>

<ul>
<li>A member of the Linux foundation blogs about using FreeBSD</li>
<li>Goes through all the beginner steps, has to &quot;unlearn&quot; some of his Linux ways</li>
<li>Only a few posts as of this time, but it&#39;s a continuing series that may be helpful for switchers
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>GNOME3, cinnamon and mate desktops are in the installer</li>
<li>Compat layer updated to CentOS 6, enables newest Skype</li>
<li>Looking for people to test printers and hplip</li>
<li>Continuing work on grub, but the ability to switch between bootloaders is back
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20k2gumbP" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2PM8tfKfe" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2KgXIKqrJ" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20DLk8bac" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2nmmJHvgR" rel="nofollow">Alexy writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>14: Zettabytes for Days</title>
  <link>https://www.bsdnow.tv/14</link>
  <guid isPermaLink="false">8a946478-3ac7-4087-a433-ad139e4d7aa9</guid>
  <pubDate>Wed, 04 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8a946478-3ac7-4087-a433-ad139e4d7aa9.mp3" length="56736843" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=334937" target="_blank" rel="nofollow noopener"&gt;pkgng 1.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;bapt and bdrewery from the portmgr team released pkgng 1.2 final&lt;/li&gt;
&lt;li&gt;New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new "pkg config" command, repo improvements, vuXML is now default, new fingerprint features and much more&lt;/li&gt;
&lt;li&gt;Really simple to upgrade, check our &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;pkgng tutorial&lt;/a&gt; if you want some easy instructions&lt;/li&gt;
&lt;li&gt;It's also made its way &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" target="_blank" rel="nofollow noopener"&gt;into Dragonfly&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;See the show notes for the full list of new features and fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" target="_blank" rel="nofollow noopener"&gt;ChaCha20 and Poly1305 in OpenSSH&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305&lt;/li&gt;
&lt;li&gt;Long blog post explaining what these are and why we need them&lt;/li&gt;
&lt;li&gt;This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC&lt;/li&gt;
&lt;li&gt;RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn't show the packet length in cleartext&lt;/li&gt;
&lt;li&gt;Great explanation of the differences between EtM, MtE and EaM and their advantages&lt;/li&gt;
&lt;li&gt;"Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" target="_blank" rel="nofollow noopener"&gt;Is it time to dump Linux and move to BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;ITworld did an article about switching from Linux to BSD&lt;/li&gt;
&lt;li&gt;The author's interest was sparked from a review he was reading that said "I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0"&lt;/li&gt;
&lt;li&gt;The whole article can be summed up with "yes" - ok, next story!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/user/deirdres/videos" target="_blank" rel="nofollow noopener"&gt;OpenZFS devsummit videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenZFS &lt;a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" target="_blank" rel="nofollow noopener"&gt;developer summit&lt;/a&gt; discussion and presentation videos are up&lt;/li&gt;
&lt;li&gt;People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced&lt;/li&gt;
&lt;li&gt;Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation&lt;/li&gt;
&lt;li&gt;Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production&lt;/li&gt;
&lt;li&gt;TONS of video, about 6 hours' worth&lt;/li&gt;
&lt;li&gt;This leads us into our interview, which is...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - George Wilson - &lt;a href="mailto:wilzun@gmail.com" target="_blank" rel="nofollow noopener"&gt;wilzun@gmail.com&lt;/a&gt; / &lt;a href="https://twitter.com/zfsdude" target="_blank" rel="nofollow noopener"&gt;@zfsdude&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenZFS&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/zfs" target="_blank" rel="nofollow noopener"&gt;A crash course on ZFS&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131126113154" target="_blank" rel="nofollow noopener"&gt;ruBSD 2013 information&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia&lt;/li&gt;
&lt;li&gt;Speakers include three OpenBSD developers, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" target="_blank" rel="nofollow noopener"&gt;Theo de Raadt&lt;/a&gt;, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" target="_blank" rel="nofollow noopener"&gt;Henning Brauer&lt;/a&gt; and Mike Belopuhov&lt;/li&gt;
&lt;li&gt;Their talks are titled "The bane of backwards compatibility," "OpenBSD's pf: Design, Implementation and Future" and "OpenBSD: Where crypto is going?"&lt;/li&gt;
&lt;li&gt;No word on if there will be video recordings, but we'll let you know if that changes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" target="_blank" rel="nofollow noopener"&gt;DragonFly roadmap, post 3.6&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;John Marino posted a possible roadmap for DragonFly, now that they're past the 3.6 release&lt;/li&gt;
&lt;li&gt;He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)&lt;/li&gt;
&lt;li&gt;Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still&lt;/li&gt;
&lt;li&gt;Bring in fixes and new stuff from FreeBSD 10
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 CFP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDCan 2014 will be held on May 16-17 in Ottawa, Canada&lt;/li&gt;
&lt;li&gt;They're now accepting proposals for talks&lt;/li&gt;
&lt;li&gt;If you are doing something interesting with a BSD operating system, please submit a proposal&lt;/li&gt;
&lt;li&gt;We'll be getting lots of interviews there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258838" target="_blank" rel="nofollow noopener"&gt;casperd added to -CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted."&lt;/li&gt;
&lt;li&gt;Lists some sysctls that can be controlled
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258704" target="_blank" rel="nofollow noopener"&gt;ZFS corruption bug fixed in -CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JDWKjs7l" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20BLqxTWD" target="_blank" rel="nofollow noopener"&gt;SW writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2939tUOf5" target="_blank" rel="nofollow noopener"&gt;Jason writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21qKY6qIb" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20LWlmhoK" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, openzfs, devsummit, george wilson, zpool, raidz, raidz2, raidz3, mirror, delphix, linux, switch, zol, zfsonlinux, illumos, solaris, opensolaris, itworld, pkgng, pkg, 1.2, openssh, ssh, chacha20, cipher, encryption, mac, poly1305, rc4, security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
