<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 05 Mar 2026 21:03:04 -0600</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Exploit”</title>
    <link>https://www.bsdnow.tv/tags/exploit</link>
    <pubDate>Wed, 29 Jul 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>100: Straight from the Src</title>
  <link>https://www.bsdnow.tv/100</link>
  <guid isPermaLink="false">06d71c41-6630-4fa3-8cd3-46e35a9a535c</guid>
  <pubDate>Wed, 29 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/06d71c41-6630-4fa3-8cd3-46e35a9a535c.mp3" length="53030452" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</itunes:subtitle>
  <itunes:duration>1:13:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Remote DoS in the TCP stack (https://blog.team-cymru.org/2015/07/another-day-another-patch/)
A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing remote attackers to exhaust the resources of a system with nothing more than TCP connections
While in the LAST_ACK state, which is one of the final stages of a connection's lifetime, the connection can get stuck and hang there indefinitely
This problem has a slightly confusing history that involves different fixes at different points in time from different people
Juniper originally discovered the bug and announced a fix (https://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=JSA10686) for their proprietary networking gear on June 8th
On June 29th, FreeBSD caught wind of it and fixed the bug in their -current branch (https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=284941&amp;amp;r2=284940&amp;amp;pathrev=284941), but did not issue a security notice or MFC the fix back to the -stable branches
On July 13th, two weeks later, OpenBSD fixed the issue (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143682919807388&amp;amp;w=2) in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found
Immediately afterwards, they merged it back to -stable and issued an errata notice (http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig) for 5.7 and 5.6
On July 21st, three weeks after their original fix, FreeBSD committed yet another slightly different fix (https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=285777&amp;amp;r2=285776&amp;amp;pathrev=285777) and issued a security notice (https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html) for the problem (which didn't include the first fix)
After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way
NetBSD confirmed they were vulnerable too, and applied another completely different fix (http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&amp;amp;r2=1.184&amp;amp;only_with_tag=MAIN) to -current on July 24th, but haven't released a security notice yet
DragonFly is also investigating the issue now to see if they're affected as well
***
c2k15 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150721180312&amp;amp;mode=flat)
Reports from OpenBSD's latest hackathon (http://www.openbsd.org/hackathons.html), held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)
The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event
He writes, "Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the "command" built-in command - and had to step through dozens of false positives with the less '/' and 'n' search keys before you finally found the actual definition?"
With mandoc's new internal jump targets, this is a problem of the past now
Jasper also sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150723124332&amp;amp;mode=flat), doing his usual work with Puppet (and specifically "Facter," a tool used by Puppet to gather various bits of system information)
Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an "-i" flag for sed (hooray!)
Antoine Jacoutot gave a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150722205349&amp;amp;mode=flat) on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)
It now has an "ls" subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this "the poor man's service monitoring tool")
He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)
His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades
Foundation director Ken Westerback was also there (http://undeadly.org/cgi?action=article&amp;amp;sid=20150722105658&amp;amp;mode=flat), getting some disk-related and laptop work done
He cleaned up and committed the 4k sector softraid code that he'd been working on, as well as fixing some trackpad issues
Stefan Sperling, OpenBSD's token "wireless guy," had a lot to say (http://undeadly.org/cgi?action=article&amp;amp;sid=20150722182236&amp;amp;mode=flat) about the hackathon and what he did there (and even sent in his write-up before he got home)
He taught tcpdump about some new things, including 802.11n metadata beacons (there's a lot more specific detail about this one in the report)
Bringing a bag full of USB wireless devices with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work
One quote from Stefan's report that a lot of people seem to be talking about: "Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We'll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year."
Jeremy Evans wrote in (http://undeadly.org/cgi?action=article&amp;amp;sid=20150725180527&amp;amp;mode=flat) to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem
While he's mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon
Rafael Zalamena, who got commit access at the event, gives his very first report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150725183439&amp;amp;mode=flat) on his networking-related hackathon activities
With Rafael's diffs and help from a couple other developers, OpenBSD now has support for VPLS (https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service)
Jonathan Gray got a lot done (http://undeadly.org/cgi?action=article&amp;amp;sid=20150728184743&amp;amp;mode=flat) in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code
As he's become somewhat known for, Jonathan was also busy running three things in the background: clang's fuzzer, cppcheck and AFL (looking for any potential crashes to fix)
Martin Pieuchot gave an write-up (http://undeadly.org/cgi?action=article&amp;amp;sid=20150724183210&amp;amp;mode=flat) on his experience: "I always though that hackathons were the best place to write code, but what's even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that's what I did."
He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack
Unfortunately, most of Martin's secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle
We're still eagerly awaiting a report from one of OpenBSD's newest developers (https://twitter.com/phessler/status/623291827878137856), Alexandr Nedvedicky (the Oracle guy who's working on SMP PF and some other PF fixes)
OpenBSD 5.8's "beta" status was recently reverted, with the message "take that as a hint (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143766883514831&amp;amp;w=2)," so that may mean more big changes are still to come...
***
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2015-04-2015-06.html)
FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far
It's broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others
Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just "svn.freebsd.org") are now using GeoGNS with official SSL certs and general redundancy was increased
In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages
The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon
Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)
The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support
Multipath TCP was also a hot topic, and there's a brief summary of the current status on that patch (it will be available publicly soon)
ZFSguru, a project we haven't talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August
PCIe hotplug support is also mentioned, though it's still in the development stages (basic hot-swap functions are working though)
The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling
Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report
Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot
Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***
The OpenSSH bug that wasn't (http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html)
There's been a lot of discussion (https://www.marc.info/?t=143766048000005&amp;amp;r=1&amp;amp;w=2) about a supposed flaw (https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/) in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)
There's no actual exploit to speak of; this bug would only help someone get more bruteforce tries in with a fewer number of connections (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html)
FreeBSD in its default configuration, with PAM (https://en.wikipedia.org/wiki/Pluggable_authentication_module) and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - not upstream OpenSSH (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143767296016252&amp;amp;w=2), nor any of the other BSDs, and not even the majority of Linux distros
If you disable all forms of authentication except public keys, like you're supposed to (https://stribika.github.io/2015/01/04/secure-secure-shell.html), then this is also not a big deal for FreeBSD systems
Realistically speaking, it's more of a PAM bug (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143782167322500&amp;amp;w=2) than anything else
OpenSSH added an additional check (https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab) for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can run freebsd-update (https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html))
***
Interview - Sebastian Wiedenroth - wiedi@netbsd.org (mailto:wiedi@netbsd.org) / @wied0r (https://twitter.com/wied0r)
pkgsrc (https://en.wikipedia.org/wiki/Pkgsrc) and pkgsrcCon (http://pkgsrc.org/pkgsrcCon/)
News Roundup
Now served by OpenBSD (https://tribaal.io/this-now-served-by-openbsd.html)
We've mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it
The use case for the author was for a webserver, so he decided to try out the httpd in base
Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting
TLS 1.2 by default, strong ciphers with LibreSSL and HSTS (https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) combined give you a pretty secure web server
***
FreeBSD laptop playbooks (https://github.com/sean-/freebsd-laptops)
A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named "freebsd-laptops"
It's based on ansible, and uses the playbook format for automatic set up and configuration
Right now, it's only working on a single Lenovo laptop, but the plan is to add instructions for many more models
Check the Github page for instructions on how to get started, and maybe get involved if you're running FreeBSD on a laptop
***
NetBSD on the NVIDIA Jetson TK1 (https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson)
If you've never heard of the Jetson TK1 (https://developer.nvidia.com/jetson-tk1), we can go ahead and spoil the secret here: NetBSD runs on it
As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE
This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)
You can even run X11 on it, pretty sweet
***
DragonFly power mangement options (http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html)
DragonFly developer Sepherosa, who we've had on the show, has been doing some ACPI work over there
In this email, he presents some of DragonFly's different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well
He also did some testing with each of them and gave his findings about power saving
If you've been thinking about running DragonFly on a laptop, this would be a good one to read
***
OpenBSD router under FreeBSD bhyve (https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/)
If one BSD just isn't enough for you, and you've only got one machine, why not run two at once
This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it
If you've been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware
The author also includes a little bit of history on how he got into both operating systems
There are lots of mixed opinions about virtualizing core network components, so we'll leave it up to you to do your research
Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***
Feedback/Questions
Kevin writes in (http://slexy.org/view/s2yPVV5Wyp)
Logan writes in (http://slexy.org/view/s21zcz9rut)
Peter writes in (http://slexy.org/view/s21CRmiPwK)
Randy writes in (http://slexy.org/view/s211zfIXff)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, pkgsrccon, portability, illumos, solaris, openindiana, opensolaris, zfs, openzfs, tcp, dos, c2k15, hackathon, openssh, pam, exploit, smartos, omnios, joyent, delphix</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>79: Just Add QEMU</title>
  <link>https://www.bsdnow.tv/79</link>
  <guid isPermaLink="false">cb3fc5ef-1795-4d76-8b42-56a205255a03</guid>
  <pubDate>Wed, 04 Mar 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cb3fc5ef-1795-4d76-8b42-56a205255a03.mp3" length="60830644" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be talking to Sean Bruno. He's been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We've also got answers to viewer-submitted questions and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:24:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this time on the show, we'll be talking to Sean Bruno. He's been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We've also got answers to viewer-submitted questions and all this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
AsiaBSDCon 2015 schedule (http://2015.asiabsdcon.org/timetable.html.en)
Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up
This year's conference will be between 12-15 March at the Tokyo University of Science in Japan
The first and second days are for tutorials, as well as the developer summit and vendor summit
Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again
Not counting the ones that have yet to be revealed (as of the day we're recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD
Summaries of all the presentations are on the timetable page if you scroll down a bit
***
FreeBSD foundation updates and more (https://www.freebsdfoundation.org/press/2015febupdate.pdf)
The FreeBSD foundation (http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1) has posted a number of things this week, the first of which is their February 2015 status update
It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform
There's a FOSDEM recap and another update of their fundraising goal for 2015
They also have two new blog posts: a trip report from SCALE13x (http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html) and a featured "FreeBSD in the trenches (http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html)" article about how a small typo caused a lot of ZFS chaos in the cluster
"Then panic ensued.  The machine didn't panic -- I did."
***
OpenBSD improves browser security (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142523501726732&amp;amp;w=2)
No matter what OS you run on your desktop, the most likely entry point for an exploit these days is almost certainly the web browser
Ted Unangst writes in to the OpenBSD misc list to introduce a new project he's working on, simply titled "improving browser security"
He gives some background on the W^X memory protection (https://en.wikipedia.org/wiki/W%5EX) in the base system, but also mentions that some applications in ports don't adhere to it
For it to be enforced globally instead of just recommended, at least one browser (or specifically, one JIT (https://en.wikipedia.org/wiki/Just-in-time_compilation) engine) needs to be fixed to use it
"A system that is 'all W^X except where it's not' is the same as a system that's not W^X. We've worked hard to provide a secure foundation for programs; we'd like to see them take advantage of it."
The work is being supported by the OpenBSD foundation (http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2), and we'll keep you updated on this undertaking as more news about it is released
There's also some discussion on Hacker News (https://news.ycombinator.com/item?id=9128360) and Undeadly (http://undeadly.org/cgi?action=article&amp;amp;sid=20150303075848&amp;amp;mode=expanded) about it
***
NetBSD at Open Source Conference 2015 Tokyo (https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html)
The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo
There's even a spreadsheet (https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0) of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)
If you just can't get enough strange devices running BSD, check the mailing list post for lots of pictures
Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we'll run into them
***
Interview - Sean Bruno - sbruno@freebsd.org (mailto:sbruno@freebsd.org) / @franknbeans (https://twitter.com/franknbeans)
Cross-compiling packages with poudriere (http://www.bsdnow.tv/tutorials/poudriere) and QEMU
News Roundup
The Crypto Bone (http://crypto-bone.com/what.html)
The Crypto Bone is a new device (http://www.crypto-bone.com/) that's aimed at making encryption and secure communications easier (http://crypto-bone.com/cbb-usersview.html) and more accessible
Under the hood, it's actually just a Beaglebone (http://beagleboard.org/bone) board, running stock OpenBSD with a few extra packages
It includes a web interface (http://crypto-bone.com/release/root/var/www/apache/html/) for configuring keys and secure tunnels
The source code (http://crypto-bone.com/release/root/) is freely available for anyone interested in hacking on it (or auditing the crypto), and there's a technical overview (http://crypto-bone.com/cbb-technicalview.html) of how everything works on their site
If you don't want to teach your mom how to use PGP, buy her one of these(?)
***
BSD in the 2015 Google Summer of Code (https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page)
For those who don't know, GSoC is a way for students to get paid to work on a coding project for an open source organization
Good news: both FreeBSD and OpenBSD were accepted (https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015) for the 2015 event
FreeBSD has a wiki page (https://wiki.freebsd.org/SummerOfCodeIdeas) of ideas for people to work on
OpenBSD also has an ideas page (http://www.openbsdfoundation.org/gsoc2015.html) where you can see some of the initial things that might be interesting
If you're a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it
Who knows, you may even end up on the show (http://www.bsdnow.tv/episodes/2015_01_07-system_disaster) if you work on a cool project
GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you'd like to hack on
***
pfSense 2.3 roadmap (https://blog.pfsense.org/?p=1588)
The pfSense team has posted a new blog entry, detailing some of their plans for future versions
PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions
PBIs are scheduled to be replaced with native pkgng packages
Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely
Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***
PCBSD 10.1.2 security features (http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/)
PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post
A new "personacrypt" utility is introduced, which allows for easy encryption and management of external drives for your home directory
Going along with this, it also has a "stealth mode" that allows for one-time temporary home directories (but it doesn't self-destruct, don't worry)
The LibreSSL integration also continues, and now packages will be built with it by default
If you're using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update
They've also been working on introducing some new options to enable tunneling your traffic through Tor
There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week
A small disclaimer: remember that many things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity
Look forward to Kris wearing a Tor shirt (https://www.torproject.org/getinvolved/tshirt.html) in future episodes
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s2ofBPRT5n)
Chris writes in (http://slexy.org/view/s26LsYcoJF)
Van writes in (http://slexy.org/view/s28Rho0jvL)
Stu writes in (http://slexy.org/view/s21AkGbniU)
***
Mailing List Gold
H (https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html)
Pay up, mister Free (https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html)
Heritage protected (https://www.mail-archive.com/tech%40openbsd.org/msg22663.html)
Blind leading the blind (https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html)
What are the chances (https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, qemu, mips, arm, poudriere, packages, scale13x, asiabsdcon 2015, tor, tails, w^m, browser, exploit</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking to Sean Bruno. He&#39;s been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2015.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon 2015 schedule</a></h3>

<ul>
<li>Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up</li>
<li>This year&#39;s conference will be between 12-15 March at the Tokyo University of Science in Japan</li>
<li>The first and second days are for tutorials, as well as the developer summit and vendor summit</li>
<li>Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again</li>
<li>Not counting the ones that have yet to be revealed (as of the day we&#39;re recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD</li>
<li>Summaries of all the presentations are on the timetable page if you scroll down a bit
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015febupdate.pdf" rel="nofollow">FreeBSD foundation updates and more</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">FreeBSD foundation</a> has posted a number of things this week, the first of which is their February 2015 status update</li>
<li>It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform</li>
<li>There&#39;s a FOSDEM recap and another update of their fundraising goal for 2015</li>
<li>They also have two new blog posts: <a href="http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html" rel="nofollow">a trip report from SCALE13x</a> and a featured &quot;<a href="http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html" rel="nofollow">FreeBSD in the trenches</a>&quot; article about how a small typo caused a lot of ZFS chaos in the cluster</li>
<li>&quot;Then panic ensued.  The machine didn&#39;t panic -- I did.&quot;
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142523501726732&w=2" rel="nofollow">OpenBSD improves browser security</a></h3>

<ul>
<li>No matter what OS you run on your desktop, the most likely entry point for an exploit these days is <em>almost certainly</em> the web browser</li>
<li>Ted Unangst writes in to the OpenBSD misc list to introduce a new project he&#39;s working on, simply titled &quot;improving browser security&quot;</li>
<li>He gives some background on the <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup> memory protection</a> in the base system, but also mentions that some applications in ports don&#39;t adhere to it</li>
<li>For it to be enforced globally instead of just recommended, at least one browser (or specifically, one <a href="https://en.wikipedia.org/wiki/Just-in-time_compilation" rel="nofollow">JIT</a> engine) needs to be fixed to use it</li>
<li>&quot;A system that is &#39;all W<sup>X</sup> except where it&#39;s not&#39; is the same as a system that&#39;s not W<sup>X.</sup> We&#39;ve worked hard to provide a secure foundation for programs; we&#39;d like to see them take advantage of it.&quot;</li>
<li>The work is being supported by the <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">OpenBSD foundation</a>, and we&#39;ll keep you updated on this undertaking as more news about it is released</li>
<li>There&#39;s also some discussion <a href="https://news.ycombinator.com/item?id=9128360" rel="nofollow">on Hacker News</a> <a href="http://undeadly.org/cgi?action=article&sid=20150303075848&mode=expanded" rel="nofollow">and Undeadly</a> about it
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html" rel="nofollow">NetBSD at Open Source Conference 2015 Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo</li>
<li>There&#39;s even a <a href="https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0" rel="nofollow">spreadsheet</a> of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)</li>
<li>If you just can&#39;t get enough strange devices running BSD, check the mailing list post for lots of pictures</li>
<li>Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we&#39;ll run into them
***</li>
</ul>

<h2>Interview - Sean Bruno - <a href="mailto:sbruno@freebsd.org" rel="nofollow">sbruno@freebsd.org</a> / <a href="https://twitter.com/franknbeans" rel="nofollow">@franknbeans</a></h2>

<p>Cross-compiling packages with <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> and QEMU</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://crypto-bone.com/what.html" rel="nofollow">The Crypto Bone</a></h3>

<ul>
<li>The Crypto Bone is a new <a href="http://www.crypto-bone.com/" rel="nofollow">device</a> that&#39;s aimed at making encryption and secure communications <a href="http://crypto-bone.com/cbb-usersview.html" rel="nofollow">easier</a> and more accessible</li>
<li>Under the hood, it&#39;s actually just a <a href="http://beagleboard.org/bone" rel="nofollow">Beaglebone</a> board, running stock OpenBSD with a few extra packages</li>
<li>It includes a <a href="http://crypto-bone.com/release/root/var/www/apache/html/" rel="nofollow">web interface</a> for configuring keys and secure tunnels</li>
<li>The <a href="http://crypto-bone.com/release/root/" rel="nofollow">source code</a> is freely available for anyone interested in hacking on it (or auditing the crypto), and there&#39;s <a href="http://crypto-bone.com/cbb-technicalview.html" rel="nofollow">a technical overview</a> of how everything works on their site</li>
<li>If you don&#39;t want to teach your mom how to use PGP, buy her one of these(?)
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page" rel="nofollow">BSD in the 2015 Google Summer of Code</a></h3>

<ul>
<li>For those who don&#39;t know, GSoC is a way for students to get paid to work on a coding project for an open source organization</li>
<li>Good news: both FreeBSD and OpenBSD were <a href="https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015" rel="nofollow">accepted</a> for the 2015 event</li>
<li>FreeBSD has <a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">a wiki page</a> of ideas for people to work on</li>
<li>OpenBSD also has <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">an ideas page</a> where you can see some of the initial things that might be interesting</li>
<li>If you&#39;re a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it</li>
<li>Who knows, you may even <a href="http://www.bsdnow.tv/episodes/2015_01_07-system_disaster" rel="nofollow">end up on the show</a> if you work on a cool project</li>
<li>GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you&#39;d like to hack on
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1588" rel="nofollow">pfSense 2.3 roadmap</a></h3>

<ul>
<li>The pfSense team has posted a new blog entry, detailing some of their plans for future versions</li>
<li>PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions</li>
<li>PBIs are scheduled to be replaced with native pkgng packages</li>
<li>Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely</li>
<li>Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/" rel="nofollow">PCBSD 10.1.2 security features</a></h3>

<ul>
<li>PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post</li>
<li>A new &quot;personacrypt&quot; utility is introduced, which allows for easy encryption and management of external drives for your home directory</li>
<li>Going along with this, it also has a &quot;stealth mode&quot; that allows for one-time temporary home directories (but it doesn&#39;t self-destruct, don&#39;t worry)</li>
<li>The LibreSSL integration also continues, and now packages will be built with it by default</li>
<li>If you&#39;re using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update</li>
<li>They&#39;ve also been working on introducing some new options to enable tunneling your traffic through Tor</li>
<li>There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week</li>
<li>A small disclaimer: remember that <strong>many</strong> things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity</li>
<li>Look forward to Kris wearing a <a href="https://www.torproject.org/getinvolved/tshirt.html" rel="nofollow">Tor shirt</a> in future episodes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ofBPRT5n" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s26LsYcoJF" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s28Rho0jvL" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s21AkGbniU" rel="nofollow">Stu writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html" rel="nofollow">H</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html" rel="nofollow">Pay up, mister Free</a></li>
<li><a href="https://www.mail-archive.com/tech%40openbsd.org/msg22663.html" rel="nofollow">Heritage protected</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html" rel="nofollow">Blind leading the blind</a></li>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html" rel="nofollow">What are the chances</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking to Sean Bruno. He&#39;s been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2015.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon 2015 schedule</a></h3>

<ul>
<li>Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up</li>
<li>This year&#39;s conference will be between 12-15 March at the Tokyo University of Science in Japan</li>
<li>The first and second days are for tutorials, as well as the developer summit and vendor summit</li>
<li>Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again</li>
<li>Not counting the ones that have yet to be revealed (as of the day we&#39;re recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD</li>
<li>Summaries of all the presentations are on the timetable page if you scroll down a bit
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015febupdate.pdf" rel="nofollow">FreeBSD foundation updates and more</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">FreeBSD foundation</a> has posted a number of things this week, the first of which is their February 2015 status update</li>
<li>It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform</li>
<li>There&#39;s a FOSDEM recap and another update of their fundraising goal for 2015</li>
<li>They also have two new blog posts: <a href="http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html" rel="nofollow">a trip report from SCALE13x</a> and a featured &quot;<a href="http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html" rel="nofollow">FreeBSD in the trenches</a>&quot; article about how a small typo caused a lot of ZFS chaos in the cluster</li>
<li>&quot;Then panic ensued.  The machine didn&#39;t panic -- I did.&quot;
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142523501726732&w=2" rel="nofollow">OpenBSD improves browser security</a></h3>

<ul>
<li>No matter what OS you run on your desktop, the most likely entry point for an exploit these days is <em>almost certainly</em> the web browser</li>
<li>Ted Unangst writes in to the OpenBSD misc list to introduce a new project he&#39;s working on, simply titled &quot;improving browser security&quot;</li>
<li>He gives some background on the <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup> memory protection</a> in the base system, but also mentions that some applications in ports don&#39;t adhere to it</li>
<li>For it to be enforced globally instead of just recommended, at least one browser (or specifically, one <a href="https://en.wikipedia.org/wiki/Just-in-time_compilation" rel="nofollow">JIT</a> engine) needs to be fixed to use it</li>
<li>&quot;A system that is &#39;all W<sup>X</sup> except where it&#39;s not&#39; is the same as a system that&#39;s not W<sup>X.</sup> We&#39;ve worked hard to provide a secure foundation for programs; we&#39;d like to see them take advantage of it.&quot;</li>
<li>The work is being supported by the <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">OpenBSD foundation</a>, and we&#39;ll keep you updated on this undertaking as more news about it is released</li>
<li>There&#39;s also some discussion <a href="https://news.ycombinator.com/item?id=9128360" rel="nofollow">on Hacker News</a> <a href="http://undeadly.org/cgi?action=article&sid=20150303075848&mode=expanded" rel="nofollow">and Undeadly</a> about it
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html" rel="nofollow">NetBSD at Open Source Conference 2015 Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo</li>
<li>There&#39;s even a <a href="https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0" rel="nofollow">spreadsheet</a> of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)</li>
<li>If you just can&#39;t get enough strange devices running BSD, check the mailing list post for lots of pictures</li>
<li>Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we&#39;ll run into them
***</li>
</ul>

<h2>Interview - Sean Bruno - <a href="mailto:sbruno@freebsd.org" rel="nofollow">sbruno@freebsd.org</a> / <a href="https://twitter.com/franknbeans" rel="nofollow">@franknbeans</a></h2>

<p>Cross-compiling packages with <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> and QEMU</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://crypto-bone.com/what.html" rel="nofollow">The Crypto Bone</a></h3>

<ul>
<li>The Crypto Bone is a new <a href="http://www.crypto-bone.com/" rel="nofollow">device</a> that&#39;s aimed at making encryption and secure communications <a href="http://crypto-bone.com/cbb-usersview.html" rel="nofollow">easier</a> and more accessible</li>
<li>Under the hood, it&#39;s actually just a <a href="http://beagleboard.org/bone" rel="nofollow">Beaglebone</a> board, running stock OpenBSD with a few extra packages</li>
<li>It includes a <a href="http://crypto-bone.com/release/root/var/www/apache/html/" rel="nofollow">web interface</a> for configuring keys and secure tunnels</li>
<li>The <a href="http://crypto-bone.com/release/root/" rel="nofollow">source code</a> is freely available for anyone interested in hacking on it (or auditing the crypto), and there&#39;s <a href="http://crypto-bone.com/cbb-technicalview.html" rel="nofollow">a technical overview</a> of how everything works on their site</li>
<li>If you don&#39;t want to teach your mom how to use PGP, buy her one of these(?)
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page" rel="nofollow">BSD in the 2015 Google Summer of Code</a></h3>

<ul>
<li>For those who don&#39;t know, GSoC is a way for students to get paid to work on a coding project for an open source organization</li>
<li>Good news: both FreeBSD and OpenBSD were <a href="https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015" rel="nofollow">accepted</a> for the 2015 event</li>
<li>FreeBSD has <a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">a wiki page</a> of ideas for people to work on</li>
<li>OpenBSD also has <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">an ideas page</a> where you can see some of the initial things that might be interesting</li>
<li>If you&#39;re a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it</li>
<li>Who knows, you may even <a href="http://www.bsdnow.tv/episodes/2015_01_07-system_disaster" rel="nofollow">end up on the show</a> if you work on a cool project</li>
<li>GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you&#39;d like to hack on
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1588" rel="nofollow">pfSense 2.3 roadmap</a></h3>

<ul>
<li>The pfSense team has posted a new blog entry, detailing some of their plans for future versions</li>
<li>PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions</li>
<li>PBIs are scheduled to be replaced with native pkgng packages</li>
<li>Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely</li>
<li>Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/" rel="nofollow">PCBSD 10.1.2 security features</a></h3>

<ul>
<li>PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post</li>
<li>A new &quot;personacrypt&quot; utility is introduced, which allows for easy encryption and management of external drives for your home directory</li>
<li>Going along with this, it also has a &quot;stealth mode&quot; that allows for one-time temporary home directories (but it doesn&#39;t self-destruct, don&#39;t worry)</li>
<li>The LibreSSL integration also continues, and now packages will be built with it by default</li>
<li>If you&#39;re using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update</li>
<li>They&#39;ve also been working on introducing some new options to enable tunneling your traffic through Tor</li>
<li>There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week</li>
<li>A small disclaimer: remember that <strong>many</strong> things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity</li>
<li>Look forward to Kris wearing a <a href="https://www.torproject.org/getinvolved/tshirt.html" rel="nofollow">Tor shirt</a> in future episodes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ofBPRT5n" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s26LsYcoJF" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s28Rho0jvL" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s21AkGbniU" rel="nofollow">Stu writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html" rel="nofollow">H</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html" rel="nofollow">Pay up, mister Free</a></li>
<li><a href="https://www.mail-archive.com/tech%40openbsd.org/msg22663.html" rel="nofollow">Heritage protected</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html" rel="nofollow">Blind leading the blind</a></li>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html" rel="nofollow">What are the chances</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>57: The Daemon's Apprentice</title>
  <link>https://www.bsdnow.tv/57</link>
  <guid isPermaLink="false">fe6cb8d4-b1ab-4260-a466-435ed66e003f</guid>
  <pubDate>Wed, 01 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/fe6cb8d4-b1ab-4260-a466-435ed66e003f.mp3" length="65007508" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from EuroBSDCon! This week we'll be talking with Steve Wills about mentoring new BSD developers. If you've ever considered becoming a developer or helping out, it's actually really easy to get involved. We've also got all the BSD news for the week and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back from EuroBSDCon! This week we'll be talking with Steve Wills about mentoring new BSD developers. If you've ever considered becoming a developer or helping out, it's actually really easy to get involved. We've also got all the BSD news for the week and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
NetBSD at Hiroshima Open Source Conference (http://mail-index.netbsd.org/netbsd-advocacy/2014/09/26/msg000669.html)
NetBSD developers are hard at work, putting NetBSD on everything they can find
At a technology conference in Hiroshima, some developers brought their exotic machines to put on display
As usual, there are lots of pictures and a nice report from the conference
***
FreeBSD's Linux emulation overhaul (https://svnweb.freebsd.org/ports?limit_changes=0&amp;amp;view=revision&amp;amp;revision=368845)
For a long time, FreeBSD's emulation layer has been based on an ancient Fedora 10 system
If you've ever needed to install Adobe Flash on BSD, you'll be stuck with all this extra junk
With some recent work, that's been replaced with a recent CentOS release
This opens up the door for newer versions of Skype to run on FreeBSD, and maybe even Steam someday
***
pfSense 2.2-BETA (https://blog.pfsense.org/?p=1449)
Big changes are coming in pfSense land, with their upcoming 2.2 release
We talked to the developer (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) a while back about future plans, and now they're finally out there
The 2.2 branch will be based on FreeBSD 10-STABLE (instead of 8.3) and include lots of performance fixes
It also includes some security updates, lots of package changes and updates and much more
You can check the full list of changes (https://doc.pfsense.org/index.php/2.2_New_Features_and_Changes) on their wiki
***
NetBSD on the Raspberry Pi (http://www.cambus.net/netbsd-on-the-raspberry-pi/)
This article shows how you can install NetBSD on the ever-so-popular Raspberry Pi
As of right now, you'll need to use a -CURRENT snapshot to do it
It also shows how to grow the filesystem to fill up an SD card, some pkgsrc basics and how to get some initial things set up
Can anyone find something that you can't install NetBSD on?
***
Interview - Steve Wills - swills@freebsd.org (mailto:swills@freebsd.org) / @swills (https://twitter.com/swills)
Mentoring new BSD developers
News Roundup
MidnightBSD 0.5 released (http://www.midnightbsd.org/notes/)
We don't hear a whole lot about MidnightBSD, but they've just released version 0.5
It's got a round of the latest FreeBSD security patches, driver updates and various small things
Maybe one of their developers could come on the show sometime and tell us more about the project
***
BSD Router Project 1.52 released (http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.52/)
The newest update for the BSD Router Project is out
This version is based on a snapshot of 10-STABLE that's very close to 10.1-RELEASE
It's mostly a bugfix release, but includes some small changes and package updates
***
Configuring a DragonFly BSD desktop (http://www.dragonflydigest.com/2014/09/19/14751.html)
We've done tutorials on how to set up a FreeBSD or OpenBSD desktop, but maybe you're more interested in DragonFly
In this post from Justin Sherrill, you'll learn some of the steps to do just that
He pulled out an old desktop machine, gave it a try and seems to be pleased with the results
It includes a few Xorg tips, and there are some comments about the possibility of making a GUI DragonFly installer
***
Building a mini-ITX pfSense box (http://pakitong.blogspot.com/2014/09/jetway-j7f2-four-lan-mini-itx-for.html)
Another week, another pfSense firewall build post
This time, the author is installing to a Jetway J7F2, a mini-ITX device with four LAN ports
He used to be a m0n0wall guy, but wanted to give the more modern pfSense a try
Lots of great pictures of the hardware, which we always love
***
Feedback/Questions
Damian writes in (http://slexy.org/view/s2184TfOKD)
Jan writes in (http://slexy.org/view/s20uAdTwLv)
Dale writes in (http://slexy.org/view/s20es52IgZ)
Joe writes in (http://slexy.org/view/s2mjulpac6)
Bostjan writes in (http://slexy.org/view/s2BvNC8cgi)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, eurobsdcon, 2014, presentation, talk, steve wills, mentoring, developers, community, ports, bsdrp, bash, linux, exploit, pfsense, devsummit, shellshock</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from EuroBSDCon! This week we&#39;ll be talking with Steve Wills about mentoring new BSD developers. If you&#39;ve ever considered becoming a developer or helping out, it&#39;s actually really easy to get involved. We&#39;ve also got all the BSD news for the week and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/09/26/msg000669.html" rel="nofollow">NetBSD at Hiroshima Open Source Conference</a></h3>

<ul>
<li>NetBSD developers are hard at work, putting NetBSD on everything they can find</li>
<li>At a technology conference in Hiroshima, some developers brought their exotic machines to put on display</li>
<li>As usual, there are lots of pictures and a nice report from the conference
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?limit_changes=0&view=revision&revision=368845" rel="nofollow">FreeBSD&#39;s Linux emulation overhaul</a></h3>

<ul>
<li>For a long time, FreeBSD&#39;s emulation layer has been based on an ancient Fedora 10 system</li>
<li>If you&#39;ve ever needed to install Adobe Flash on BSD, you&#39;ll be stuck with all this extra junk</li>
<li>With some recent work, that&#39;s been replaced with a recent CentOS release</li>
<li>This opens up the door for newer versions of Skype to run on FreeBSD, and maybe even Steam someday
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1449" rel="nofollow">pfSense 2.2-BETA</a></h3>

<ul>
<li>Big changes are coming in pfSense land, with their upcoming 2.2 release</li>
<li>We <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">talked to the developer</a> a while back about future plans, and now they&#39;re finally out there</li>
<li>The 2.2 branch will be based on FreeBSD 10-STABLE (instead of 8.3) and include lots of performance fixes</li>
<li>It also includes some security updates, lots of package changes and updates and much more</li>
<li>You can check the <a href="https://doc.pfsense.org/index.php/2.2_New_Features_and_Changes" rel="nofollow">full list of changes</a> on their wiki
***</li>
</ul>

<h3><a href="http://www.cambus.net/netbsd-on-the-raspberry-pi/" rel="nofollow">NetBSD on the Raspberry Pi</a></h3>

<ul>
<li>This article shows how you can install NetBSD on the ever-so-popular Raspberry Pi</li>
<li>As of right now, you&#39;ll need to use a -CURRENT snapshot to do it</li>
<li>It also shows how to grow the filesystem to fill up an SD card, some pkgsrc basics and how to get some initial things set up</li>
<li>Can anyone find something that you can&#39;t install NetBSD on?
***</li>
</ul>

<h2>Interview - Steve Wills - <a href="mailto:swills@freebsd.org" rel="nofollow">swills@freebsd.org</a> / <a href="https://twitter.com/swills" rel="nofollow">@swills</a></h2>

<p>Mentoring new BSD developers</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.5 released</a></h3>

<ul>
<li>We don&#39;t hear a whole lot about MidnightBSD, but they&#39;ve just released version 0.5</li>
<li>It&#39;s got a round of the latest FreeBSD security patches, driver updates and various small things</li>
<li>Maybe one of their developers could come on the show sometime and tell us more about the project
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.52/" rel="nofollow">BSD Router Project 1.52 released</a></h3>

<ul>
<li>The newest update for the BSD Router Project is out</li>
<li>This version is based on a snapshot of 10-STABLE that&#39;s very close to 10.1-RELEASE</li>
<li>It&#39;s mostly a bugfix release, but includes some small changes and package updates
***</li>
</ul>

<h3><a href="http://www.dragonflydigest.com/2014/09/19/14751.html" rel="nofollow">Configuring a DragonFly BSD desktop</a></h3>

<ul>
<li>We&#39;ve done tutorials on how to set up a FreeBSD or OpenBSD desktop, but maybe you&#39;re more interested in DragonFly</li>
<li>In this post from Justin Sherrill, you&#39;ll learn some of the steps to do just that</li>
<li>He pulled out an old desktop machine, gave it a try and seems to be pleased with the results</li>
<li>It includes a few Xorg tips, and there are some comments about the possibility of making a GUI DragonFly installer
***</li>
</ul>

<h3><a href="http://pakitong.blogspot.com/2014/09/jetway-j7f2-four-lan-mini-itx-for.html" rel="nofollow">Building a mini-ITX pfSense box</a></h3>

<ul>
<li>Another week, another pfSense firewall build post</li>
<li>This time, the author is installing to a Jetway J7F2, a mini-ITX device with four LAN ports</li>
<li>He used to be a m0n0wall guy, but wanted to give the more modern pfSense a try</li>
<li>Lots of great pictures of the hardware, which we always love
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2184TfOKD" rel="nofollow">Damian writes in</a></li>
<li><a href="http://slexy.org/view/s20uAdTwLv" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s20es52IgZ" rel="nofollow">Dale writes in</a></li>
<li><a href="http://slexy.org/view/s2mjulpac6" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2BvNC8cgi" rel="nofollow">Bostjan writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from EuroBSDCon! This week we&#39;ll be talking with Steve Wills about mentoring new BSD developers. If you&#39;ve ever considered becoming a developer or helping out, it&#39;s actually really easy to get involved. We&#39;ve also got all the BSD news for the week and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/09/26/msg000669.html" rel="nofollow">NetBSD at Hiroshima Open Source Conference</a></h3>

<ul>
<li>NetBSD developers are hard at work, putting NetBSD on everything they can find</li>
<li>At a technology conference in Hiroshima, some developers brought their exotic machines to put on display</li>
<li>As usual, there are lots of pictures and a nice report from the conference
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?limit_changes=0&view=revision&revision=368845" rel="nofollow">FreeBSD&#39;s Linux emulation overhaul</a></h3>

<ul>
<li>For a long time, FreeBSD&#39;s emulation layer has been based on an ancient Fedora 10 system</li>
<li>If you&#39;ve ever needed to install Adobe Flash on BSD, you&#39;ll be stuck with all this extra junk</li>
<li>With some recent work, that&#39;s been replaced with a recent CentOS release</li>
<li>This opens up the door for newer versions of Skype to run on FreeBSD, and maybe even Steam someday
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1449" rel="nofollow">pfSense 2.2-BETA</a></h3>

<ul>
<li>Big changes are coming in pfSense land, with their upcoming 2.2 release</li>
<li>We <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">talked to the developer</a> a while back about future plans, and now they&#39;re finally out there</li>
<li>The 2.2 branch will be based on FreeBSD 10-STABLE (instead of 8.3) and include lots of performance fixes</li>
<li>It also includes some security updates, lots of package changes and updates and much more</li>
<li>You can check the <a href="https://doc.pfsense.org/index.php/2.2_New_Features_and_Changes" rel="nofollow">full list of changes</a> on their wiki
***</li>
</ul>

<h3><a href="http://www.cambus.net/netbsd-on-the-raspberry-pi/" rel="nofollow">NetBSD on the Raspberry Pi</a></h3>

<ul>
<li>This article shows how you can install NetBSD on the ever-so-popular Raspberry Pi</li>
<li>As of right now, you&#39;ll need to use a -CURRENT snapshot to do it</li>
<li>It also shows how to grow the filesystem to fill up an SD card, some pkgsrc basics and how to get some initial things set up</li>
<li>Can anyone find something that you can&#39;t install NetBSD on?
***</li>
</ul>

<h2>Interview - Steve Wills - <a href="mailto:swills@freebsd.org" rel="nofollow">swills@freebsd.org</a> / <a href="https://twitter.com/swills" rel="nofollow">@swills</a></h2>

<p>Mentoring new BSD developers</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.5 released</a></h3>

<ul>
<li>We don&#39;t hear a whole lot about MidnightBSD, but they&#39;ve just released version 0.5</li>
<li>It&#39;s got a round of the latest FreeBSD security patches, driver updates and various small things</li>
<li>Maybe one of their developers could come on the show sometime and tell us more about the project
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.52/" rel="nofollow">BSD Router Project 1.52 released</a></h3>

<ul>
<li>The newest update for the BSD Router Project is out</li>
<li>This version is based on a snapshot of 10-STABLE that&#39;s very close to 10.1-RELEASE</li>
<li>It&#39;s mostly a bugfix release, but includes some small changes and package updates
***</li>
</ul>

<h3><a href="http://www.dragonflydigest.com/2014/09/19/14751.html" rel="nofollow">Configuring a DragonFly BSD desktop</a></h3>

<ul>
<li>We&#39;ve done tutorials on how to set up a FreeBSD or OpenBSD desktop, but maybe you&#39;re more interested in DragonFly</li>
<li>In this post from Justin Sherrill, you&#39;ll learn some of the steps to do just that</li>
<li>He pulled out an old desktop machine, gave it a try and seems to be pleased with the results</li>
<li>It includes a few Xorg tips, and there are some comments about the possibility of making a GUI DragonFly installer
***</li>
</ul>

<h3><a href="http://pakitong.blogspot.com/2014/09/jetway-j7f2-four-lan-mini-itx-for.html" rel="nofollow">Building a mini-ITX pfSense box</a></h3>

<ul>
<li>Another week, another pfSense firewall build post</li>
<li>This time, the author is installing to a Jetway J7F2, a mini-ITX device with four LAN ports</li>
<li>He used to be a m0n0wall guy, but wanted to give the more modern pfSense a try</li>
<li>Lots of great pictures of the hardware, which we always love
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2184TfOKD" rel="nofollow">Damian writes in</a></li>
<li><a href="http://slexy.org/view/s20uAdTwLv" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s20es52IgZ" rel="nofollow">Dale writes in</a></li>
<li><a href="http://slexy.org/view/s2mjulpac6" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2BvNC8cgi" rel="nofollow">Bostjan writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>39: The Friendly Sandbox</title>
  <link>https://www.bsdnow.tv/39</link>
  <guid isPermaLink="false">4ae1b0f5-7c6f-486f-bdcf-c71ec415269c</guid>
  <pubDate>Wed, 28 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4ae1b0f5-7c6f-486f-bdcf-c71ec415269c.mp3" length="45004756" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:02:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSDCan 2014 talks and reports (https://www.bsdcan.org/2014/schedule/)
The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links
Karl Lehenbauer's keynote (https://www.youtube.com/watch?v=13LiyjnTGsQ) (he's on next week's episode)
Mariusz Zaborski and Pawel Jakub Dawidek,
Capsicum and Casper (https://www.youtube.com/watch?v=0la06FHbdvg) (relevant to today's interview)
Luigi Rizzo,
In-kernel OpenvSwitch on FreeBSD (https://www.youtube.com/watch?v=Lr5o1VQMtgA)
Dwayne Hart, Migrating from Linux to FreeBSD for Backend Data Storage (https://www.youtube.com/watch?v=AVuF9eFeVWs)
Warner Losh, NAND Flash and FreeBSD (https://www.youtube.com/watch?v=lj0XAE6C6-k)
Simon Gerraty, FreeBSD bmake and Meta Mode (https://www.youtube.com/watch?v=4s0UY0sg6vI)
Bob Beck, LibreSSL - The First 30 Days (https://www.youtube.com/watch?v=oM6S7FEUfkU)
Henning Brauer, OpenBGPD Turns 10 Years Old (https://www.youtube.com/watch?v=cP8AW111IKg)
Arun Thomas, BSD ARM Kernel Internals (https://www.youtube.com/watch?v=ZAM7fqhGRr8)
Peter Hessler, Using BGP for Realtime Spam Lists (https://www.youtube.com/watch?v=i8UAVswpagA)
Pedro Giffuni, Features and Status of FreeBSD's Ext2 Implementation
 (https://www.youtube.com/watch?v=HMeTxViulgo)
Matt Ahrens, OpenZFS Upcoming Features and Performance Enhancements (https://www.youtube.com/watch?v=EjGqVdCOIhM)
Daichi Goto, Shellscripts and Commands (https://www.youtube.com/watch?v=MsRu0xIawaA)
Benno Rice, Keeping Current (https://www.youtube.com/watch?v=jZp-ciB6mAg)
Sean Bruno, MIPS Router Hacking (https://www.youtube.com/watch?v=LZjoFSfIv3k)
John-Mark Gurney, Optimizing GELI Performance (https://www.youtube.com/watch?v=2qicD0tv_tI)
Patrick Kelsey, Userspace Networking with libuinet (https://www.youtube.com/watch?v=LhIx8q8_7YY)
Massimiliano Stucchi, IPv6 Transitioning Mechanisms (https://www.youtube.com/watch?v=WZoQzUZKaeo)
Roger Pau Monné, Taking the Red Pill (https://www.youtube.com/watch?v=q6l9qtjlNXU)
Shawn Webb, Introducing ASLR in FreeBSD (https://www.youtube.com/watch?v=jo8ObzR1tKQ)
There's also a trip report (http://undeadly.org/cgi?action=article&amp;amp;sid=20140519164127) from Peter Hessler and one from Julio Merino (http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html)
The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that's a recurring trend)
***
Defend your network and privacy with a VPN and OpenBSD (http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html)
After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back
This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities
There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used
You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)
It also includes a few general privacy tips, recommended browser extensions, etc
The intro to the article is especially great, so give the whole thing a read
He mentions our OpenBSD router guide (http://www.bsdnow.tv/tutorials/openbsd-router) and other tutorials being a big help for this setup, so hello if you're watching!
***
You should try FreeBSD (http://blog.pascalj.com/article/you-should-try-freebsd/)
In this blog post, the author talks a bit about how some Linux people aren't familiar with the BSDs and how we can take steps to change that
He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two
Possibly the most useful part is how to address the question "my server already works, why bother switching?"
"Stackoverflow’s answers assume I have apt-get installed"
It includes mention of the great documentation, stability, ports, improved security and much more
A takeaway quote for would-be Linux switchers: "I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before"
***
OpenBSD and the little Mauritian contributor (http://hacklog.in/openbsd-and-the-little-mauritian-contributor/)
This is a story about a guy from Mauritius (https://en.wikipedia.org/wiki/Mauritius) named Logan, one of OpenBSD's newest developers
Back in 2010, he started sending in patched for OpenBSD's "mg" editor, among other small things, and eventually added file transfer resume support for SFTP
The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon
It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem
Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***
Interview - Jon Anderson - jonathan@freebsd.org (mailto:jonathan@freebsd.org)
Capsicum and Casperd
Tutorial
Encrypting DNS lookups (http://www.bsdnow.tv/tutorials/dnscrypt)
News Roundup
FreeBSD Journal, May 2014 issue (http://i.imgur.com/f0qg6Ss.jpg)
The newest issue of the FreeBSD Journal (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) is out, following the bi-monthly release cycle
This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling
Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***
LibreSSL porting update (http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html)
Since the last LibreSSL post we covered, a couple unofficial "portable" versions have died off
Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!
This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example
Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***
BSDMag May 2014 issue is out (http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue)
The usual monthly release from BSDMag, covering a variety of subjects
This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things
It's a free PDF, go grab it
***
BSDTalk episode 241 (http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html)
A new episode of BSDTalk (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) is out, this time with Bob Beck
He talks about the OpenBSD foundation's recent activities, his own work in the project, some stories about the hardware in Theo's basement and a lot more
The interview itself isn't about LibreSSL at all, but they do touch on it a bit too
Really interesting stuff, covers a lot of different topics in a short amount of time
***
Feedback/Questions
We got a number of replies about last week's VPN question, so thanks to everyone who sent in an email about it - the vpnc (https://www.freshports.org/security/vpnc/) package seems to be what we were looking for
Tim writes in (http://slexy.org/view/s20MK7bTyc)
AJ writes in (http://slexy.org/view/s2OWREQdUA)
Peter writes in (http://slexy.org/view/s202obAqbT)
Thomas writes in (http://slexy.org/view/s21Kye2jAc)
Martin writes in (http://slexy.org/view/s2zqFVqwxN)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, casper, casperd, the friendly ghost, capsicum, sandbox, application, jails, isolation, isolated, chroot, virtual machine, exploit, vpn, security, ssh, tunnel, encryption, bsdcan, presentation, talk, video, recordings, dnscrypt, opendns, dnscurve, lookups, dns, dnssec, gateway, vpn, vps, journal, bsdmag, bsdtalk, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>33: Certified Package Delivery</title>
  <link>https://www.bsdnow.tv/33</link>
  <guid isPermaLink="false">f0c15113-8ade-464b-a89f-3398734256dc</guid>
  <pubDate>Wed, 16 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f0c15113-8ade-464b-a89f-3398734256dc.mp3" length="57837748" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
BSDCan schedule, speakers and talks (https://www.bsdcan.org/2014/schedule/)
This year's BSDCan will kick off on May 14th in Ottawa
The list of speakers (https://www.bsdcan.org/2014/schedule/speakers.en.html) is also out
And finally the talks (https://www.bsdcan.org/2014/schedule/events.en.html) everyone's looking forward to
Lots of great tutorials and talks, spanning a wide range of topics of interest
Be sure to come by so you can and meet Allan and Kris in person and get BSDCan shirts (https://twitter.com/bsdcan/status/454990067552247808)
***
NYCBSDCon talks uploaded (https://www.youtube.com/watch?v=4bPduH6O7lI)
The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon
Jeff Rizzo's talk, "Releasing NetBSD: So Many Targets, So Little Time"
Dru Lavigne's talk (https://www.youtube.com/watch?v=DAmZ3cbfigA), "ZFS Management Tools in FreeNAS and PC-BSD"
Scott Long's talk (https://www.youtube.com/watch?v=FL5U4wr86L4), "Serving one third of the Internet via FreeBSD"
Michael W. Lucas' talk (https://www.youtube.com/watch?v=buo5JlMnGPI), "BSD Breaking Barriers"
***
FreeBSD Journal, issue 2 (http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html)
The bi-monthly FreeBSD journal's second issue is out
Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates
In less than two months, they've already gotten over 1000 subscribers! It's available on Google Play, iTunes, Amazon, etc
"We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD"
Check our interview with GNN (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) for more information about the journal
***
OpenSSL, more like OpenSS-Hell (http://bsd.slashdot.org/story/200567)
We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy
There's been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so
We finally have a timeline of events (http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html)
Reactions from ISC (https://isc.sans.edu/diary/Testing+for+Heartbleed/17933), PCBSD (http://blog.pcbsd.org/2014/04/openssl-security-update/), Tarsnap (http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html), the Tor (https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html) project (https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html), FreeBSD (https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html), NetBSD (http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc), oss-sec (http://seclists.org/oss-sec/2014/q2/index.html), PHK (https://queue.acm.org/detail.cfm?id=2602816), Varnish (https://www.varnish-cache.org/docs/trunk/phk/dough.html) and Akamai (https://blogs.akamai.com/2014/04/heartbleed-update.html)
pfSense (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) released a new version to fix it (https://blog.pfsense.org/?p=1253)
OpenBSD disabled heartbeat entirely (http://marc.info/?l=openbsd-cvs&amp;amp;m=139715336230455&amp;amp;w=2) and is very unforgiving of the IETF (https://news.ycombinator.com/item?id=7568921)
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has two good (http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf) write-ups (http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse) about the issue and how horrible the OpenSSL codebase is
A nice quote from one of the OpenBSD lists: "Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL's bug tracker is only used to park bugs, not fix them"
Sounds like someone else (http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html) was having fun with the bug for a while too
There's also another OpenSSL bug that OpenBSD patched (http://marc.info/?l=openbsd-cvs&amp;amp;m=139732441810737&amp;amp;w=2) - it allows an attacker to inject data from one connection into another 
OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we're seeing a fork (http://undeadly.org/cgi?action=article&amp;amp;sid=20140415093252) in real time
***
Interview - Jim Brown - info@bsdcertification.org (mailto:info@bsdcertification.org)
The BSD Certification (http://bsdcertification.org/) exams
Tutorial
Building OpenBSD binary packages in bulk (http://www.bsdnow.tv/tutorials/dpb)
News Roundup
Portable signify (https://github.com/aperezdc/signify)
Back in episode 23 (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) we talked with Ted Unangst about the new "signify" tool in OpenBSD
Now there's a (completely unofficial) portable version of it on github
If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it
Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***
Foundation goals and updates (https://www.mail-archive.com/misc@openbsd.org/msg128240.html)
The OpenBSD foundation has reached their 2014 goal of $150,000
You can check their activities and goals (http://www.openbsdfoundation.org/activities.html) to see where the money is going
Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data
The FreeBSD foundation has kicked off their spring fundraising (http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html) campaign
There's also a list of their activities and goals available to read through
Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/)
New PBI runtime that fixes stability issues and decreases load times
"Update Center" is getting a lot of development and improvements
Lots of misc. bug fixes and updates
***
Feedback/Questions
There's a reddit thread (http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/) we wanted to highlight - a user wants to show his friend BSD and why it's great
Brad writes in (http://slexy.org/view/s20Tso9a6v)
Sha'ul writes in (http://slexy.org/view/s21DfdV9yt)
iGibbs writes in (http://slexy.org/view/s2di8XRt73)
Matt writes in (http://slexy.org/view/s20m2g8UgV)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dpb, distributed ports builder, marc espie, poudriere, package builds, jim brown, bsdcertification, bsd certification, exam, test, openssl, heartbleed, exploit, ssl, tls, heartbeat, openssh, theo de raadt, hole, 0day, zero day, bsdcan, nycbsdcon, presentations, talks, conference, recording, netflix, tarsnap, mitigation, ixsystems, foundation, journal, cve</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
