<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 29 Apr 2026 23:34:42 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “File”</title>
    <link>https://www.bsdnow.tv/tags/file</link>
    <pubDate>Wed, 01 Jul 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>96: Lost Technology</title>
  <link>https://www.bsdnow.tv/96</link>
  <guid isPermaLink="false">a1813e16-466a-4617-9bb0-24dbdc1cb5f2</guid>
  <pubDate>Wed, 01 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a1813e16-466a-4617-9bb0-24dbdc1cb5f2.mp3" length="52701844" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He'll tell us what makes these old (and often forgotten) machines so interesting. As usual, we've also got answers to your emails and all this week's news on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:13:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He'll tell us what makes these old (and often forgotten) machines so interesting. As usual, we've also got answers to your emails and all this week's news on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Out with the old, in with the less (http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less)
Our friend Ted Unangst has a new article up, talking about "various OpenBSD replacements and reductions"
"Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs."
In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure
It starts off with a lesser-known SCSI driver that "tried to do too much" being replaced with three separate drivers
"Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver."
In contrast to that example, he goes on to cite mandoc as taking a very non "unixy" direction, but at the same time being smaller and simpler than all the tools it replaced
The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)
He also talks about the rewritten "file" utility: "Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it."
Finally, sudo in OpenBSD's base system is moving to ports soon, and the article briefly describes a new tool that may or may not replace it (https://marc.info/?l=openbsd-ports&amp;amp;m=143481227122523&amp;amp;w=2), called "doas"
There's also a nice wrap-up of all the examples at the end, and the "Pruning and Polishing (http://www.openbsd.org/papers/pruning.html)" talk is good complementary reading material
***
More OpenZFS and BSDCan videos (https://www.youtube.com/channel/UC0IK6Y4Go2KtRueHDiQcxow/videos)
We mentioned last week (http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy) that some of the videos from the second OpenZFS conference in Europe were being uploaded - here's some more
Matt Ahrens did a Q&amp;amp;A session (https://www.youtube.com/watch?v=I6fXZ_6OT5c) and talked about ZFS send and receive (https://www.youtube.com/watch?v=iY44jPMvxog), as well as giving an overview of OpenZFS (https://www.youtube.com/watch?v=RQlMDmnty80)
George Wilson talked about a performance retrospective (https://www.youtube.com/watch?v=KBI6rRGUv4E)
Toshiba (https://www.youtube.com/watch?v=sSi47-k78IM), Syneto (https://www.youtube.com/watch?v=Hhje5KEF5cE) and HGST (https://www.youtube.com/watch?v=aKgxXipss8k) also gave some talks about their companies and how they're using ZFS
As for BSDCan, more of their BSD presentations have been uploaded too...
Ryan Stone, PCI SR-IOV on FreeBSD (https://www.youtube.com/watch?v=INeMd-i5jzM)
George Neville-Neil, Measure Twice, Code Once (https://www.youtube.com/watch?v=LE4wMsP7zeA)
Kris Moore, Unifying jail and package management for PC-BSD, FreeNAS and FreeBSD (https://www.youtube.com/watch?v=qNYXqpJiFN0)
Warner Losh, I/O Scheduling in CAM (https://www.youtube.com/watch?v=3WqOLolj5EU)
Kirk McKusick, An Introduction to the Implementation of ZFS (https://www.youtube.com/watch?v=l-RCLgLxuSc)
Midori Kato, Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support (https://www.youtube.com/watch?v=zZXvjhWcg_4)
Baptiste Daroussin, Packaging FreeBSD's (https://www.youtube.com/watch?v=Br6izhH5P1I) base system (https://www.youtube.com/watch?v=v7px6ktoDAI)
Matt Ahrens, New OpenZFS features supporting remote replication (https://www.youtube.com/watch?v=UOX7WDAjqso)
Ed Schouten, CloudABI Cloud computing meets fine-grained capabilities (https://www.youtube.com/watch?v=SVdF84x1EdA)
The audio of Ingo Schwarze's talk "mandoc: becoming the main BSD manual toolbox" got messed up, but there's an alternate recording here (http://www.bsdcan.org/2015/audio/mandoc.mp3), and the slides are here (http://www.openbsd.org/papers/bsdcan15-mandoc.pdf)
***
SMP steroids for PF (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143526329006942&amp;amp;w=2)
An Oracle employee that's been porting OpenBSD's PF to an upcoming Solaris release has sent in an interesting patch for review
Attached to the mail was what may be the beginnings of making native PF SMP-aware
Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind - this is just one piece of the puzzle
The initial response (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143532243322281&amp;amp;w=2) has been quite positive though, with some back and forth (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143532963824548&amp;amp;w=2) between developers and the submitter
For now, let's be patient and see what happens
***
DragonFly 4.2.0 released (http://www.dragonflybsd.org/release42/)
DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes
i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release
Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there's a wiki page (http://www.dragonflybsd.com/docs/docs/newhandbook/mta/) about configuring it
They've also switched the default compiler to GCC 5, though why they've gone in that direction instead of embracing Clang is a mystery
The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools
Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement
There was also some hacker news discussion (https://news.ycombinator.com/item?id=9797932) you can check out, as well as upgrade instructions (http://lists.dragonflybsd.org/pipermail/users/2015-June/207801.html)
***
OpenSMTPD 5.7.1 released (https://opensmtpd.org/announces/release-5.7.1.txt)
The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently
Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default
The long-awaited filter API is now enabled by default, though still considered slightly experimental
Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)
Many more small additions and bugfixes were made, so check the changelog for the full list
Starting with 5.7.1, releases are now cryptographically (https://twitter.com/OpenSMTPD/status/613257722574839808) signed (https://www.opensmtpd.org/archives/opensmtpd-5.7.1.sum.sig) to ensure integrity
This release has gone through some major stress testing to ensure stability - Gilles regularly asks their Twitter followers to flood a test server (https://twitter.com/OpenSMTPD/status/608399272447471616) with thousands of emails per second, even offering prizes (https://twitter.com/OpenSMTPD/status/608235180839567360) to whoever can DDoS them the hardest
OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately
Let's all encourage (mailto:feedback@bsdnow.tv) Kris to stop procrastinating on switching from Postfix
***
Interview - Jun Ebihara (蛯原純) - jun@netbsd.org (mailto:jun@netbsd.org) / @ebijun (https://twitter.com/ebijun)
Lesser-known CPU architectures, embedded NetBSD devices
News Roundup
FreeBSD foundation at BSDCan (http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-steven-douglas.html)
The FreeBSD foundation has posted a few BSDCan summaries on their blog
The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: "Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people."
He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily
Their second (http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-ahmed-kamal.html) trip report is from Ahmed Kamal, who flew in all the way from Egypt
A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum's about MINIX and NetBSD
There are also two more wrap-ups from Zbigniew Bodek (http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-zbigniew-bodek.html) and Vsevolod Stakhov (http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-vsevolod-stakhov.html), so you've got plenty to read
***
OpenBSD from a veteran Linux user perspective (http://cfenollosa.com/blog/openbsd-from-a-veteran-linux-user-perspective.html)
In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time
"For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an 'old-school' Linux admin, and I've felt out of place with the latest changes on the system administration."
The post is a collection of his thoughts about what's different between Linux and BSD, what surprised him as a beginner - admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags
One of the things that surprised him (in a positive way) was the documentation: "OpenBSD's man pages are so nice that RTFMing somebody on the internet is not condescending but selfless."
He also goes through some of the basics, installing and updating software, following different branches
It concludes with "If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern."
***
FreeBSD on the desktop, am I crazy (http://sysconfig.org.uk/freebsd-on-the-desktop-am-i-crazy.html)
Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up - this time about FreeBSD on the desktop
He begins with a bit of forewarning for potential Linux switchers: "It certainly wasn't an easy journey, and I'm tempted to say do not try this at home to anybody who isn't going to leverage any of FreeBSD's strong points. Definitely don't try FreeBSD on the desktop if you haven't used it on servers or virtual machines before. It's got less in common with Linux than you might think."
With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd
The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash
Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well
In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too
***
OpenIKED and Cisco CSR 1000v IPSEC (https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/)
This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED
What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud
There are lots of details (and example configuration files) for using IKEv2 and OpenBSD's built-in IKE daemon
It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that's afraid to try them… don't be
***
HardenedBSD improves stack randomization (https://github.com/HardenedBSD/hardenedBSD/commit/bd5cecb4dc7947a5e214fc100834399b4bffdee8)
The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area
In their initial implementation, the stack randomization was a random gap - this update makes the base address randomized as well
They're now stacking the new on top of the old as well, with the goal being even more entropy
This change triggered an ABI and API incompatibility, so their major version has been bumped
***
OpenSSH 6.9 released (https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-July/000121.html)
The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes
There are a couple new things though - the "AuthorizedKeysCommand" config option now takes custom arguments
One very notable change is that the default cipher has changed as of this release
The traditional pairing of AES128 in counter mode with MD5 HMAC has been replaced by the ever-trendy ChaCha20-Poly1305 combo
Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to "no" by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they're under 1024 bits
Many small bugs fixes and improvements were also made, so check the announcement for everything else
The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon
***
Feedback/Questions
Brad writes in (http://slexy.org/view/s2Ws6Y2rZy)
Mason writes in (http://slexy.org/view/s21GvZ5xbs)
Jochen writes in (http://slexy.org/view/s209TrPK4e)
Simon writes in (http://slexy.org/view/s21TQjUjxv)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, osc, embedded, japanese, users group, pf, smp, multithreading, file, solaris, httpd, leap second, openzfs, zfs, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He&#39;ll tell us what makes these old (and often forgotten) machines so interesting. As usual, we&#39;ve also got answers to your emails and all this week&#39;s news on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">Out with the old, in with the less</a></h3>

<ul>
<li>Our friend Ted Unangst has a new article up, talking about &quot;various OpenBSD replacements and reductions&quot;</li>
<li>&quot;Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs.&quot;</li>
<li>In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure</li>
<li>It starts off with a lesser-known SCSI driver that &quot;tried to do too much&quot; being replaced with three separate drivers</li>
<li>&quot;Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver.&quot;</li>
<li>In contrast to that example, he goes on to cite mandoc as taking a very non &quot;unixy&quot; direction, but at the same time being smaller and simpler than all the tools it replaced</li>
<li>The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)</li>
<li>He also talks about the rewritten &quot;file&quot; utility: &quot;Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it.&quot;</li>
<li>Finally, sudo in OpenBSD&#39;s base system is moving to ports soon, and the article briefly describes a new tool that <a href="https://marc.info/?l=openbsd-ports&m=143481227122523&w=2" rel="nofollow">may or may not replace it</a>, called &quot;doas&quot;</li>
<li>There&#39;s also a nice wrap-up of all the examples at the end, and the &quot;<a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">Pruning and Polishing</a>&quot; talk is good complementary reading material
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UC0IK6Y4Go2KtRueHDiQcxow/videos" rel="nofollow">More OpenZFS and BSDCan videos</a></h3>

<ul>
<li>We mentioned <a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" rel="nofollow">last week</a> that some of the videos from the second OpenZFS conference in Europe were being uploaded - here&#39;s some more</li>
<li>Matt Ahrens did <a href="https://www.youtube.com/watch?v=I6fXZ_6OT5c" rel="nofollow">a Q&amp;A session</a> and talked about ZFS <a href="https://www.youtube.com/watch?v=iY44jPMvxog" rel="nofollow">send and receive</a>, as well as giving an <a href="https://www.youtube.com/watch?v=RQlMDmnty80" rel="nofollow">overview of OpenZFS</a></li>
<li>George Wilson talked about a <a href="https://www.youtube.com/watch?v=KBI6rRGUv4E" rel="nofollow">performance retrospective</a></li>
<li><a href="https://www.youtube.com/watch?v=sSi47-k78IM" rel="nofollow">Toshiba</a>, <a href="https://www.youtube.com/watch?v=Hhje5KEF5cE" rel="nofollow">Syneto</a> and <a href="https://www.youtube.com/watch?v=aKgxXipss8k" rel="nofollow">HGST</a> also gave some talks about their companies and how they&#39;re using ZFS</li>
<li>As for BSDCan, more of their BSD presentations have been uploaded too...</li>
<li>Ryan Stone, <a href="https://www.youtube.com/watch?v=INeMd-i5jzM" rel="nofollow">PCI SR-IOV on FreeBSD</a></li>
<li>George Neville-Neil, <a href="https://www.youtube.com/watch?v=LE4wMsP7zeA" rel="nofollow">Measure Twice, Code Once</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=qNYXqpJiFN0" rel="nofollow">Unifying jail and package management for PC-BSD, FreeNAS and FreeBSD</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=3WqOLolj5EU" rel="nofollow">I/O Scheduling in CAM</a></li>
<li>Kirk McKusick, <a href="https://www.youtube.com/watch?v=l-RCLgLxuSc" rel="nofollow">An Introduction to the Implementation of ZFS</a></li>
<li>Midori Kato, <a href="https://www.youtube.com/watch?v=zZXvjhWcg_4" rel="nofollow">Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support</a></li>
<li>Baptiste Daroussin, <a href="https://www.youtube.com/watch?v=Br6izhH5P1I" rel="nofollow">Packaging FreeBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=v7px6ktoDAI" rel="nofollow">base system</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=UOX7WDAjqso" rel="nofollow">New OpenZFS features supporting remote replication</a></li>
<li>Ed Schouten, <a href="https://www.youtube.com/watch?v=SVdF84x1EdA" rel="nofollow">CloudABI Cloud computing meets fine-grained capabilities</a></li>
<li>The audio of Ingo Schwarze&#39;s talk &quot;mandoc: becoming the main BSD manual toolbox&quot; got messed up, but there&#39;s an alternate recording <a href="http://www.bsdcan.org/2015/audio/mandoc.mp3" rel="nofollow">here</a>, and the slides are <a href="http://www.openbsd.org/papers/bsdcan15-mandoc.pdf" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143526329006942&w=2" rel="nofollow">SMP steroids for PF</a></h3>

<ul>
<li>An Oracle employee that&#39;s been porting OpenBSD&#39;s PF to an upcoming Solaris release has sent in an interesting patch for review</li>
<li>Attached to the mail was what may be the beginnings of making native PF SMP-aware</li>
<li>Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind - this is just one piece of the puzzle</li>
<li>The <a href="https://www.marc.info/?l=openbsd-tech&m=143532243322281&w=2" rel="nofollow">initial response</a> has been quite positive though, with some <a href="https://www.marc.info/?l=openbsd-tech&m=143532963824548&w=2" rel="nofollow">back and forth</a> between developers and the submitter</li>
<li>For now, let&#39;s be patient and see what happens
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release42/" rel="nofollow">DragonFly 4.2.0 released</a></h3>

<ul>
<li>DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes</li>
<li>i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release</li>
<li>Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there&#39;s <a href="http://www.dragonflybsd.com/docs/docs/newhandbook/mta/" rel="nofollow">a wiki page</a> about configuring it</li>
<li>They&#39;ve also switched the default compiler to GCC 5, though why they&#39;ve gone in that direction instead of embracing Clang is a mystery</li>
<li>The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools</li>
<li>Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9797932" rel="nofollow">hacker news discussion</a> you can check out, as well as <a href="http://lists.dragonflybsd.org/pipermail/users/2015-June/207801.html" rel="nofollow">upgrade instructions</a>
***</li>
</ul>

<h3><a href="https://opensmtpd.org/announces/release-5.7.1.txt" rel="nofollow">OpenSMTPD 5.7.1 released</a></h3>

<ul>
<li>The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently</li>
<li>Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default</li>
<li>The long-awaited filter API is now enabled by default, though still considered slightly experimental</li>
<li>Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)</li>
<li>Many more small additions and bugfixes were made, so check the changelog for the full list</li>
<li>Starting with 5.7.1, releases are now <a href="https://twitter.com/OpenSMTPD/status/613257722574839808" rel="nofollow">cryptographically</a> <a href="https://www.opensmtpd.org/archives/opensmtpd-5.7.1.sum.sig" rel="nofollow">signed</a> to ensure integrity</li>
<li>This release has gone through some major stress testing to ensure stability - Gilles regularly asks their Twitter followers to <a href="https://twitter.com/OpenSMTPD/status/608399272447471616" rel="nofollow">flood a test server</a> with thousands of emails per second, even <a href="https://twitter.com/OpenSMTPD/status/608235180839567360" rel="nofollow">offering prizes</a> to whoever can DDoS them the hardest</li>
<li>OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately</li>
<li>Let&#39;s all <a href="mailto:feedback@bsdnow.tv" rel="nofollow">encourage</a> Kris to stop procrastinating on switching from Postfix
***</li>
</ul>

<h2>Interview - Jun Ebihara (蛯原純) - <a href="mailto:jun@netbsd.org" rel="nofollow">jun@netbsd.org</a> / <a href="https://twitter.com/ebijun" rel="nofollow">@ebijun</a></h2>

<p>Lesser-known CPU architectures, embedded NetBSD devices</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-steven-douglas.html" rel="nofollow">FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has posted a few BSDCan summaries on their blog</li>
<li>The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: &quot;Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people.&quot;</li>
<li>He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-ahmed-kamal.html" rel="nofollow">second</a> trip report is from Ahmed Kamal, who flew in all the way from Egypt</li>
<li>A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum&#39;s about MINIX and NetBSD</li>
<li>There are also two more wrap-ups from <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-zbigniew-bodek.html" rel="nofollow">Zbigniew Bodek</a> and <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-vsevolod-stakhov.html" rel="nofollow">Vsevolod Stakhov</a>, so you&#39;ve got plenty to read
***</li>
</ul>

<h3><a href="http://cfenollosa.com/blog/openbsd-from-a-veteran-linux-user-perspective.html" rel="nofollow">OpenBSD from a veteran Linux user perspective</a></h3>

<ul>
<li>In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time</li>
<li>&quot;For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an &#39;old-school&#39; Linux admin, and I&#39;ve felt out of place with the latest changes on the system administration.&quot;</li>
<li>The post is a collection of his thoughts about what&#39;s different between Linux and BSD, what surprised him as a beginner - admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags</li>
<li>One of the things that surprised him (in a positive way) was the documentation: &quot;OpenBSD&#39;s man pages are so nice that RTFMing somebody on the internet is not condescending but selfless.&quot;</li>
<li>He also goes through some of the basics, installing and updating software, following different branches</li>
<li>It concludes with &quot;If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern.&quot;
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/freebsd-on-the-desktop-am-i-crazy.html" rel="nofollow">FreeBSD on the desktop, am I crazy</a></h3>

<ul>
<li>Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up - this time about FreeBSD on the desktop</li>
<li>He begins with a bit of forewarning for potential Linux switchers: &quot;It certainly wasn&#39;t an easy journey, and I&#39;m tempted to say do not try this at home to anybody who isn&#39;t going to leverage any of FreeBSD&#39;s strong points. Definitely don&#39;t try FreeBSD on the desktop if you haven&#39;t used it on servers or virtual machines before. It&#39;s got less in common with Linux than you might think.&quot;</li>
<li>With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd</li>
<li>The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash</li>
<li>Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well</li>
<li>In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too
***</li>
</ul>

<h3><a href="https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/" rel="nofollow">OpenIKED and Cisco CSR 1000v IPSEC</a></h3>

<ul>
<li>This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED</li>
<li>What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud</li>
<li>There are lots of details (and example configuration files) for using IKEv2 and OpenBSD&#39;s built-in IKE daemon</li>
<li>It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that&#39;s afraid to try them… don&#39;t be
***</li>
</ul>

<h3><a href="https://github.com/HardenedBSD/hardenedBSD/commit/bd5cecb4dc7947a5e214fc100834399b4bffdee8" rel="nofollow">HardenedBSD improves stack randomization</a></h3>

<ul>
<li>The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area</li>
<li>In their initial implementation, the stack randomization was a random gap - this update makes the base address randomized as well</li>
<li>They&#39;re now stacking the new on top of the old as well, with the goal being even more entropy</li>
<li>This change triggered an ABI and API incompatibility, so their major version has been bumped
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-July/000121.html" rel="nofollow">OpenSSH 6.9 released</a></h3>

<ul>
<li>The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes</li>
<li>There are a couple new things though - the &quot;AuthorizedKeysCommand&quot; config option now takes custom arguments</li>
<li>One very notable change is that <strong>the default cipher has changed</strong> as of this release</li>
<li>The traditional pairing of AES128 in counter mode with MD5 HMAC has been <em>replaced</em> by the ever-trendy ChaCha20-Poly1305 combo</li>
<li>Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to &quot;no&quot; by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they&#39;re under 1024 bits</li>
<li>Many small bugs fixes and improvements were also made, so check the announcement for everything else</li>
<li>The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2Ws6Y2rZy" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21GvZ5xbs" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s209TrPK4e" rel="nofollow">Jochen writes in</a></li>
<li><a href="http://slexy.org/view/s21TQjUjxv" rel="nofollow">Simon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He&#39;ll tell us what makes these old (and often forgotten) machines so interesting. As usual, we&#39;ve also got answers to your emails and all this week&#39;s news on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">Out with the old, in with the less</a></h3>

<ul>
<li>Our friend Ted Unangst has a new article up, talking about &quot;various OpenBSD replacements and reductions&quot;</li>
<li>&quot;Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs.&quot;</li>
<li>In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure</li>
<li>It starts off with a lesser-known SCSI driver that &quot;tried to do too much&quot; being replaced with three separate drivers</li>
<li>&quot;Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver.&quot;</li>
<li>In contrast to that example, he goes on to cite mandoc as taking a very non &quot;unixy&quot; direction, but at the same time being smaller and simpler than all the tools it replaced</li>
<li>The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)</li>
<li>He also talks about the rewritten &quot;file&quot; utility: &quot;Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it.&quot;</li>
<li>Finally, sudo in OpenBSD&#39;s base system is moving to ports soon, and the article briefly describes a new tool that <a href="https://marc.info/?l=openbsd-ports&m=143481227122523&w=2" rel="nofollow">may or may not replace it</a>, called &quot;doas&quot;</li>
<li>There&#39;s also a nice wrap-up of all the examples at the end, and the &quot;<a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">Pruning and Polishing</a>&quot; talk is good complementary reading material
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UC0IK6Y4Go2KtRueHDiQcxow/videos" rel="nofollow">More OpenZFS and BSDCan videos</a></h3>

<ul>
<li>We mentioned <a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" rel="nofollow">last week</a> that some of the videos from the second OpenZFS conference in Europe were being uploaded - here&#39;s some more</li>
<li>Matt Ahrens did <a href="https://www.youtube.com/watch?v=I6fXZ_6OT5c" rel="nofollow">a Q&amp;A session</a> and talked about ZFS <a href="https://www.youtube.com/watch?v=iY44jPMvxog" rel="nofollow">send and receive</a>, as well as giving an <a href="https://www.youtube.com/watch?v=RQlMDmnty80" rel="nofollow">overview of OpenZFS</a></li>
<li>George Wilson talked about a <a href="https://www.youtube.com/watch?v=KBI6rRGUv4E" rel="nofollow">performance retrospective</a></li>
<li><a href="https://www.youtube.com/watch?v=sSi47-k78IM" rel="nofollow">Toshiba</a>, <a href="https://www.youtube.com/watch?v=Hhje5KEF5cE" rel="nofollow">Syneto</a> and <a href="https://www.youtube.com/watch?v=aKgxXipss8k" rel="nofollow">HGST</a> also gave some talks about their companies and how they&#39;re using ZFS</li>
<li>As for BSDCan, more of their BSD presentations have been uploaded too...</li>
<li>Ryan Stone, <a href="https://www.youtube.com/watch?v=INeMd-i5jzM" rel="nofollow">PCI SR-IOV on FreeBSD</a></li>
<li>George Neville-Neil, <a href="https://www.youtube.com/watch?v=LE4wMsP7zeA" rel="nofollow">Measure Twice, Code Once</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=qNYXqpJiFN0" rel="nofollow">Unifying jail and package management for PC-BSD, FreeNAS and FreeBSD</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=3WqOLolj5EU" rel="nofollow">I/O Scheduling in CAM</a></li>
<li>Kirk McKusick, <a href="https://www.youtube.com/watch?v=l-RCLgLxuSc" rel="nofollow">An Introduction to the Implementation of ZFS</a></li>
<li>Midori Kato, <a href="https://www.youtube.com/watch?v=zZXvjhWcg_4" rel="nofollow">Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support</a></li>
<li>Baptiste Daroussin, <a href="https://www.youtube.com/watch?v=Br6izhH5P1I" rel="nofollow">Packaging FreeBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=v7px6ktoDAI" rel="nofollow">base system</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=UOX7WDAjqso" rel="nofollow">New OpenZFS features supporting remote replication</a></li>
<li>Ed Schouten, <a href="https://www.youtube.com/watch?v=SVdF84x1EdA" rel="nofollow">CloudABI Cloud computing meets fine-grained capabilities</a></li>
<li>The audio of Ingo Schwarze&#39;s talk &quot;mandoc: becoming the main BSD manual toolbox&quot; got messed up, but there&#39;s an alternate recording <a href="http://www.bsdcan.org/2015/audio/mandoc.mp3" rel="nofollow">here</a>, and the slides are <a href="http://www.openbsd.org/papers/bsdcan15-mandoc.pdf" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143526329006942&w=2" rel="nofollow">SMP steroids for PF</a></h3>

<ul>
<li>An Oracle employee that&#39;s been porting OpenBSD&#39;s PF to an upcoming Solaris release has sent in an interesting patch for review</li>
<li>Attached to the mail was what may be the beginnings of making native PF SMP-aware</li>
<li>Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind - this is just one piece of the puzzle</li>
<li>The <a href="https://www.marc.info/?l=openbsd-tech&m=143532243322281&w=2" rel="nofollow">initial response</a> has been quite positive though, with some <a href="https://www.marc.info/?l=openbsd-tech&m=143532963824548&w=2" rel="nofollow">back and forth</a> between developers and the submitter</li>
<li>For now, let&#39;s be patient and see what happens
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release42/" rel="nofollow">DragonFly 4.2.0 released</a></h3>

<ul>
<li>DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes</li>
<li>i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release</li>
<li>Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there&#39;s <a href="http://www.dragonflybsd.com/docs/docs/newhandbook/mta/" rel="nofollow">a wiki page</a> about configuring it</li>
<li>They&#39;ve also switched the default compiler to GCC 5, though why they&#39;ve gone in that direction instead of embracing Clang is a mystery</li>
<li>The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools</li>
<li>Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9797932" rel="nofollow">hacker news discussion</a> you can check out, as well as <a href="http://lists.dragonflybsd.org/pipermail/users/2015-June/207801.html" rel="nofollow">upgrade instructions</a>
***</li>
</ul>

<h3><a href="https://opensmtpd.org/announces/release-5.7.1.txt" rel="nofollow">OpenSMTPD 5.7.1 released</a></h3>

<ul>
<li>The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently</li>
<li>Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default</li>
<li>The long-awaited filter API is now enabled by default, though still considered slightly experimental</li>
<li>Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)</li>
<li>Many more small additions and bugfixes were made, so check the changelog for the full list</li>
<li>Starting with 5.7.1, releases are now <a href="https://twitter.com/OpenSMTPD/status/613257722574839808" rel="nofollow">cryptographically</a> <a href="https://www.opensmtpd.org/archives/opensmtpd-5.7.1.sum.sig" rel="nofollow">signed</a> to ensure integrity</li>
<li>This release has gone through some major stress testing to ensure stability - Gilles regularly asks their Twitter followers to <a href="https://twitter.com/OpenSMTPD/status/608399272447471616" rel="nofollow">flood a test server</a> with thousands of emails per second, even <a href="https://twitter.com/OpenSMTPD/status/608235180839567360" rel="nofollow">offering prizes</a> to whoever can DDoS them the hardest</li>
<li>OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately</li>
<li>Let&#39;s all <a href="mailto:feedback@bsdnow.tv" rel="nofollow">encourage</a> Kris to stop procrastinating on switching from Postfix
***</li>
</ul>

<h2>Interview - Jun Ebihara (蛯原純) - <a href="mailto:jun@netbsd.org" rel="nofollow">jun@netbsd.org</a> / <a href="https://twitter.com/ebijun" rel="nofollow">@ebijun</a></h2>

<p>Lesser-known CPU architectures, embedded NetBSD devices</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-steven-douglas.html" rel="nofollow">FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has posted a few BSDCan summaries on their blog</li>
<li>The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: &quot;Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people.&quot;</li>
<li>He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-ahmed-kamal.html" rel="nofollow">second</a> trip report is from Ahmed Kamal, who flew in all the way from Egypt</li>
<li>A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum&#39;s about MINIX and NetBSD</li>
<li>There are also two more wrap-ups from <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-zbigniew-bodek.html" rel="nofollow">Zbigniew Bodek</a> and <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-vsevolod-stakhov.html" rel="nofollow">Vsevolod Stakhov</a>, so you&#39;ve got plenty to read
***</li>
</ul>

<h3><a href="http://cfenollosa.com/blog/openbsd-from-a-veteran-linux-user-perspective.html" rel="nofollow">OpenBSD from a veteran Linux user perspective</a></h3>

<ul>
<li>In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time</li>
<li>&quot;For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an &#39;old-school&#39; Linux admin, and I&#39;ve felt out of place with the latest changes on the system administration.&quot;</li>
<li>The post is a collection of his thoughts about what&#39;s different between Linux and BSD, what surprised him as a beginner - admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags</li>
<li>One of the things that surprised him (in a positive way) was the documentation: &quot;OpenBSD&#39;s man pages are so nice that RTFMing somebody on the internet is not condescending but selfless.&quot;</li>
<li>He also goes through some of the basics, installing and updating software, following different branches</li>
<li>It concludes with &quot;If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern.&quot;
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/freebsd-on-the-desktop-am-i-crazy.html" rel="nofollow">FreeBSD on the desktop, am I crazy</a></h3>

<ul>
<li>Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up - this time about FreeBSD on the desktop</li>
<li>He begins with a bit of forewarning for potential Linux switchers: &quot;It certainly wasn&#39;t an easy journey, and I&#39;m tempted to say do not try this at home to anybody who isn&#39;t going to leverage any of FreeBSD&#39;s strong points. Definitely don&#39;t try FreeBSD on the desktop if you haven&#39;t used it on servers or virtual machines before. It&#39;s got less in common with Linux than you might think.&quot;</li>
<li>With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd</li>
<li>The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash</li>
<li>Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well</li>
<li>In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too
***</li>
</ul>

<h3><a href="https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/" rel="nofollow">OpenIKED and Cisco CSR 1000v IPSEC</a></h3>

<ul>
<li>This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED</li>
<li>What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud</li>
<li>There are lots of details (and example configuration files) for using IKEv2 and OpenBSD&#39;s built-in IKE daemon</li>
<li>It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that&#39;s afraid to try them… don&#39;t be
***</li>
</ul>

<h3><a href="https://github.com/HardenedBSD/hardenedBSD/commit/bd5cecb4dc7947a5e214fc100834399b4bffdee8" rel="nofollow">HardenedBSD improves stack randomization</a></h3>

<ul>
<li>The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area</li>
<li>In their initial implementation, the stack randomization was a random gap - this update makes the base address randomized as well</li>
<li>They&#39;re now stacking the new on top of the old as well, with the goal being even more entropy</li>
<li>This change triggered an ABI and API incompatibility, so their major version has been bumped
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-July/000121.html" rel="nofollow">OpenSSH 6.9 released</a></h3>

<ul>
<li>The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes</li>
<li>There are a couple new things though - the &quot;AuthorizedKeysCommand&quot; config option now takes custom arguments</li>
<li>One very notable change is that <strong>the default cipher has changed</strong> as of this release</li>
<li>The traditional pairing of AES128 in counter mode with MD5 HMAC has been <em>replaced</em> by the ever-trendy ChaCha20-Poly1305 combo</li>
<li>Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to &quot;no&quot; by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they&#39;re under 1024 bits</li>
<li>Many small bugs fixes and improvements were also made, so check the announcement for everything else</li>
<li>The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2Ws6Y2rZy" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21GvZ5xbs" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s209TrPK4e" rel="nofollow">Jochen writes in</a></li>
<li><a href="http://slexy.org/view/s21TQjUjxv" rel="nofollow">Simon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>87: On the List</title>
  <link>https://www.bsdnow.tv/87</link>
  <guid isPermaLink="false">56f4b27b-9384-4cb9-9877-d825f62815a7</guid>
  <pubDate>Wed, 29 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/56f4b27b-9384-4cb9-9877-d825f62815a7.mp3" length="58344340" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:21:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
New PAE support in OpenBSD (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142990524317070&amp;amp;w=2)
OpenBSD has just added Physical Address Extention (https://en.wikipedia.org/wiki/Physical_Address_Extension) support to the i386 architecture, but it's probably not what you'd think of when you hear the term
In most operating systems, PAE's main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn't for that
Instead, this change specifically allows the system to use the No-eXecute Bit (https://en.wikipedia.org/wiki/NX_bit#OpenBSD) of the processor for the userland, further hardening the in-place memory protections
Other operating systems enable the CPU feature without doing anything to the page table entries (https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table), so they do get the available memory expansion, but don't get the potential security benefit
As we discussed in a previous episode (http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach), the AMD64 platform already saw some major W^X kernel and userland improvements - the i386 kernel reworking will begin shortly
Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W^X that was already there
The AMD64 improvements will be in 5.7, due out in just a couple days as of when we're recording this, but the i386 improvements will likely be in 5.8
***
Booting Windows in bhyve (https://twitter.com/nahannisys/status/591733319357730816)
Work on FreeBSD's bhyve (http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind) continues, and a big addition is on the way
Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, no Windows
This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter
Graphics emulation is still in the works; this image was taken by booting headless and using RDP
A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)
Not a lot of details on the matter currently, but we'll be sure to bring you more info as it comes out
Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***
MidnightBSD 0.6 released (http://www.midnightbsd.org/notes/)
MidnightBSD is a smaller project we've not covered a lot on the show before
It's an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use
They also have their own, smaller version of FreeBSD ports, called "mports"
If you're already using it, this new version is mainly a security and bugfix release
It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions
You can check their site (http://www.midnightbsd.org/about/) for more information about the project
We're trying to get the lead developer to come on for an interview, but haven't heard anything back yet
***
OpenBSD rewrites the file utility (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142989267412968&amp;amp;w=4)
We're all probably familiar with the traditional file (https://en.wikipedia.org/wiki/File_%28command%29) command - it's been around since the 1970s (http://darwinsys.com/file/)
For anyone who doesn't know, it's used to determine what type of file something actually is
This tool doesn't see a lot of development these days, and it's had its share of security issues as well
Some of those security issues remain (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141857001403570&amp;amp;w=2) unfixed (https://www.marc.info/?l=freebsd-security&amp;amp;m=142980545021888&amp;amp;w=2) in various BSDs even today, despite being publicly known for a while
It's not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it
When you think about it, file was technically designed to be used on untrusted files
OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny
This new version will, by default, run as an unprivileged user (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143014212727213&amp;amp;w=2) with no shell, and in a systrace sandbox (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143014276127454&amp;amp;w=2), strictly limiting what system calls can be made
With these two things combined, it should drastically reduce the damage a malicious file could potentially do
Ian Darwin, the original author of the utility, saw the commit and replied (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142989483913635&amp;amp;w=4), in what may be a moment in BSD history to remember
It'll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone's already thrown together an unofficial portable version
Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***
Interview - Christos Zoulas - christos@netbsd.org (mailto:christos@netbsd.org)
blacklistd (https://www.youtube.com/watch?v=0UKCAsezF3Q) and NetBSD advocacy
News Roundup
GSoC-accepted BSD projects (https://www.google-melange.com/gsoc/projects/list/google/gsoc2015)
The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list
FreeBSD's list (https://wiki.freebsd.org/SummerOfCode2015Projects) includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. memory compression and deduplication
OpenBSD's list (http://www.openbsdfoundation.org/gsoc2015.html) includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp;amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... porting HAMMER FS to OpenBSD
We'll be sure to keep you up to date on developments from both projects
Hopefully the other BSDs will make the cut too next year
***
FreeBSD on the Gumstix Duovero (http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html)
If you're not familiar with the Gumstix Duovero, it's an dual core ARM-based computer-on-module (https://store.gumstix.com/index.php/coms/duovero-coms.html)
They actually look more like a stick of RAM than a mini-computer
This article shows you how to build a FreeBSD -CURRENT image to run on them, using crochet-freebsd (https://github.com/freebsd/crochet)
If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***
EU study recommends OpenBSD (https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D)
A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools
This is especially important, in all countries, after the mass surveillance documents came out 
"[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts."
The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on
Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: "Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways"
Reddit, Undeadly and Hacker News also had (https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/) some (http://undeadly.org/cgi?action=article&amp;amp;sid=20150427093546) discussion (https://news.ycombinator.com/item?id=9445831), particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we've discussed with Voxer (http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq) and M:Tier (http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual) before
***
FreeBSD workflow with Git (https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html)
If you're interested in contributing to FreeBSD, but aren't a big fan of SVN, they have a Github mirror too
This mailing list post talks about interacting between (https://wiki.freebsd.org/GitWorkflow/GitSvn) the official source repository and the Git mirror
This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***
Feedback/Questions
Sean writes in (http://slexy.org/view/s2vjh3ogvG)
Bryan writes in (http://slexy.org/view/s20GMcWvKE)
Sean writes in (http://slexy.org/view/s21M1imT3d)
Charles writes in (http://slexy.org/view/s25ScxQSwb)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, blacklistd, file, pae, w^x, aslr, bhyve, windows, efi, rdp, gumstix, duovero, midnightbsd, coreclr, gsoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be speaking with Christos Zoulas, a NetBSD security officer. He&#39;s got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We&#39;ve also got answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142990524317070&w=2" rel="nofollow">New PAE support in OpenBSD</a></h3>

<ul>
<li>OpenBSD has just added <a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" rel="nofollow">Physical Address Extention</a> support to the i386 architecture, but it&#39;s probably not what you&#39;d think of when you hear the term</li>
<li>In most operating systems, PAE&#39;s main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn&#39;t for that</li>
<li>Instead, this change specifically allows the system to use the <a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" rel="nofollow">No-eXecute Bit</a> of the processor for the userland, further hardening the in-place memory protections</li>
<li>Other operating systems enable the CPU feature without doing anything to the <a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" rel="nofollow">page table entries</a>, so they <strong>do get</strong> the available memory expansion, but <strong>don&#39;t get</strong> the potential security benefit</li>
<li>As we discussed in a <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">previous episode</a>, the AMD64 platform already saw some major W<sup>X</sup> kernel <strong>and</strong> userland improvements - the i386 kernel reworking will begin shortly</li>
<li>Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W<sup>X</sup> that was already there</li>
<li>The AMD64 improvements will be in 5.7, due out in just a couple days as of when we&#39;re recording this, but the i386 improvements will likely be in 5.8
***</li>
</ul>

<h3><a href="https://twitter.com/nahannisys/status/591733319357730816" rel="nofollow">Booting Windows in bhyve</a></h3>

<ul>
<li>Work on FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">bhyve</a> continues, and a big addition is on the way</li>
<li>Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, <em>no Windows</em></li>
<li>This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter</li>
<li>Graphics emulation is still in the works; this image was taken by booting headless and using RDP</li>
<li>A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)</li>
<li>Not a lot of details on the matter currently, but we&#39;ll be sure to bring you more info as it comes out</li>
<li>Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.6 released</a></h3>

<ul>
<li>MidnightBSD is a smaller project we&#39;ve not covered a lot on the show before</li>
<li>It&#39;s an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use</li>
<li>They also have their own, smaller version of FreeBSD ports, called &quot;mports&quot;</li>
<li>If you&#39;re already using it, this new version is mainly a security and bugfix release</li>
<li>It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions</li>
<li>You can check <a href="http://www.midnightbsd.org/about/" rel="nofollow">their site</a> for more information about the project</li>
<li>We&#39;re trying to get the lead developer to come on for an interview, but haven&#39;t heard anything back yet
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142989267412968&w=4" rel="nofollow">OpenBSD rewrites the file utility</a></h3>

<ul>
<li>We&#39;re all probably familiar with the traditional <a href="https://en.wikipedia.org/wiki/File_%28command%29" rel="nofollow">file</a> command - it&#39;s been around <a href="http://darwinsys.com/file/" rel="nofollow">since the 1970s</a></li>
<li>For anyone who doesn&#39;t know, it&#39;s used to determine what type of file something actually is</li>
<li>This tool doesn&#39;t see a lot of development these days, and it&#39;s had its share of security issues as well</li>
<li>Some of those security issues <a href="https://www.marc.info/?l=openbsd-tech&m=141857001403570&w=2" rel="nofollow">remain</a> <a href="https://www.marc.info/?l=freebsd-security&m=142980545021888&w=2" rel="nofollow">unfixed</a> in various BSDs <strong>even today</strong>, despite being publicly known for a while</li>
<li>It&#39;s not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it</li>
<li>When you think about it, file was technically <em>designed</em> to be used on untrusted files</li>
<li>OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny</li>
<li>This new version will, by default, run <a href="https://www.marc.info/?l=openbsd-cvs&m=143014212727213&w=2" rel="nofollow">as an unprivileged user</a> with no shell, and in a <a href="https://www.marc.info/?l=openbsd-cvs&m=143014276127454&w=2" rel="nofollow">systrace sandbox</a>, strictly limiting what system calls can be made</li>
<li>With these two things combined, it should drastically reduce the damage a malicious file could potentially do</li>
<li>Ian Darwin, the original author of the utility, <a href="https://www.marc.info/?l=openbsd-cvs&m=142989483913635&w=4" rel="nofollow">saw the commit and replied</a>, in what may be a moment in BSD history to remember</li>
<li>It&#39;ll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone&#39;s already thrown together an unofficial portable version</li>
<li>Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***</li>
</ul>

<h2>Interview - Christos Zoulas - <a href="mailto:christos@netbsd.org" rel="nofollow">christos@netbsd.org</a></h2>

<p><a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" rel="nofollow">blacklistd</a> and NetBSD advocacy</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list</li>
<li>FreeBSD&#39;s <a href="https://wiki.freebsd.org/SummerOfCode2015Projects" rel="nofollow">list</a> includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. <strong>memory compression and deduplication</strong></li>
<li>OpenBSD&#39;s <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">list</a> includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... <strong>porting HAMMER FS to OpenBSD</strong></li>
<li>We&#39;ll be sure to keep you up to date on developments from both projects</li>
<li>Hopefully the other BSDs will make the cut too next year
***</li>
</ul>

<h3><a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" rel="nofollow">FreeBSD on the Gumstix Duovero</a></h3>

<ul>
<li>If you&#39;re not familiar with the Gumstix Duovero, it&#39;s an dual core ARM-based <a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" rel="nofollow">computer-on-module</a></li>
<li>They actually look more like a stick of RAM than a mini-computer</li>
<li>This article shows you how to build a FreeBSD -CURRENT image to run on them, using <a href="https://github.com/freebsd/crochet" rel="nofollow">crochet-freebsd</a></li>
<li>If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***</li>
</ul>

<h3><a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" rel="nofollow">EU study recommends OpenBSD</a></h3>

<ul>
<li>A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools</li>
<li>This is especially important, in all countries, after the mass surveillance documents came out </li>
<li>&quot;[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts.&quot;</li>
<li>The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on</li>
<li>Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: &quot;Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways&quot;</li>
<li>Reddit, Undeadly and Hacker News also <a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" rel="nofollow">had</a> <a href="http://undeadly.org/cgi?action=article&sid=20150427093546" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=9445831" rel="nofollow">discussion</a>, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we&#39;ve discussed with <a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" rel="nofollow">Voxer</a> and <a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" rel="nofollow">M:Tier</a> before
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" rel="nofollow">FreeBSD workflow with Git</a></h3>

<ul>
<li>If you&#39;re interested in contributing to FreeBSD, but aren&#39;t a big fan of SVN, they have a Github mirror too</li>
<li>This mailing list post talks about interacting <a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" rel="nofollow">between</a> the official source repository and the Git mirror</li>
<li>This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2vjh3ogvG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20GMcWvKE" rel="nofollow">Bryan writes in</a></li>
<li><a href="http://slexy.org/view/s21M1imT3d" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s25ScxQSwb" rel="nofollow">Charles writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be speaking with Christos Zoulas, a NetBSD security officer. He&#39;s got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We&#39;ve also got answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142990524317070&w=2" rel="nofollow">New PAE support in OpenBSD</a></h3>

<ul>
<li>OpenBSD has just added <a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" rel="nofollow">Physical Address Extention</a> support to the i386 architecture, but it&#39;s probably not what you&#39;d think of when you hear the term</li>
<li>In most operating systems, PAE&#39;s main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn&#39;t for that</li>
<li>Instead, this change specifically allows the system to use the <a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" rel="nofollow">No-eXecute Bit</a> of the processor for the userland, further hardening the in-place memory protections</li>
<li>Other operating systems enable the CPU feature without doing anything to the <a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" rel="nofollow">page table entries</a>, so they <strong>do get</strong> the available memory expansion, but <strong>don&#39;t get</strong> the potential security benefit</li>
<li>As we discussed in a <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">previous episode</a>, the AMD64 platform already saw some major W<sup>X</sup> kernel <strong>and</strong> userland improvements - the i386 kernel reworking will begin shortly</li>
<li>Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W<sup>X</sup> that was already there</li>
<li>The AMD64 improvements will be in 5.7, due out in just a couple days as of when we&#39;re recording this, but the i386 improvements will likely be in 5.8
***</li>
</ul>

<h3><a href="https://twitter.com/nahannisys/status/591733319357730816" rel="nofollow">Booting Windows in bhyve</a></h3>

<ul>
<li>Work on FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">bhyve</a> continues, and a big addition is on the way</li>
<li>Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, <em>no Windows</em></li>
<li>This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter</li>
<li>Graphics emulation is still in the works; this image was taken by booting headless and using RDP</li>
<li>A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)</li>
<li>Not a lot of details on the matter currently, but we&#39;ll be sure to bring you more info as it comes out</li>
<li>Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.6 released</a></h3>

<ul>
<li>MidnightBSD is a smaller project we&#39;ve not covered a lot on the show before</li>
<li>It&#39;s an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use</li>
<li>They also have their own, smaller version of FreeBSD ports, called &quot;mports&quot;</li>
<li>If you&#39;re already using it, this new version is mainly a security and bugfix release</li>
<li>It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions</li>
<li>You can check <a href="http://www.midnightbsd.org/about/" rel="nofollow">their site</a> for more information about the project</li>
<li>We&#39;re trying to get the lead developer to come on for an interview, but haven&#39;t heard anything back yet
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142989267412968&w=4" rel="nofollow">OpenBSD rewrites the file utility</a></h3>

<ul>
<li>We&#39;re all probably familiar with the traditional <a href="https://en.wikipedia.org/wiki/File_%28command%29" rel="nofollow">file</a> command - it&#39;s been around <a href="http://darwinsys.com/file/" rel="nofollow">since the 1970s</a></li>
<li>For anyone who doesn&#39;t know, it&#39;s used to determine what type of file something actually is</li>
<li>This tool doesn&#39;t see a lot of development these days, and it&#39;s had its share of security issues as well</li>
<li>Some of those security issues <a href="https://www.marc.info/?l=openbsd-tech&m=141857001403570&w=2" rel="nofollow">remain</a> <a href="https://www.marc.info/?l=freebsd-security&m=142980545021888&w=2" rel="nofollow">unfixed</a> in various BSDs <strong>even today</strong>, despite being publicly known for a while</li>
<li>It&#39;s not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it</li>
<li>When you think about it, file was technically <em>designed</em> to be used on untrusted files</li>
<li>OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny</li>
<li>This new version will, by default, run <a href="https://www.marc.info/?l=openbsd-cvs&m=143014212727213&w=2" rel="nofollow">as an unprivileged user</a> with no shell, and in a <a href="https://www.marc.info/?l=openbsd-cvs&m=143014276127454&w=2" rel="nofollow">systrace sandbox</a>, strictly limiting what system calls can be made</li>
<li>With these two things combined, it should drastically reduce the damage a malicious file could potentially do</li>
<li>Ian Darwin, the original author of the utility, <a href="https://www.marc.info/?l=openbsd-cvs&m=142989483913635&w=4" rel="nofollow">saw the commit and replied</a>, in what may be a moment in BSD history to remember</li>
<li>It&#39;ll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone&#39;s already thrown together an unofficial portable version</li>
<li>Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***</li>
</ul>

<h2>Interview - Christos Zoulas - <a href="mailto:christos@netbsd.org" rel="nofollow">christos@netbsd.org</a></h2>

<p><a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" rel="nofollow">blacklistd</a> and NetBSD advocacy</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list</li>
<li>FreeBSD&#39;s <a href="https://wiki.freebsd.org/SummerOfCode2015Projects" rel="nofollow">list</a> includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. <strong>memory compression and deduplication</strong></li>
<li>OpenBSD&#39;s <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">list</a> includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... <strong>porting HAMMER FS to OpenBSD</strong></li>
<li>We&#39;ll be sure to keep you up to date on developments from both projects</li>
<li>Hopefully the other BSDs will make the cut too next year
***</li>
</ul>

<h3><a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" rel="nofollow">FreeBSD on the Gumstix Duovero</a></h3>

<ul>
<li>If you&#39;re not familiar with the Gumstix Duovero, it&#39;s an dual core ARM-based <a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" rel="nofollow">computer-on-module</a></li>
<li>They actually look more like a stick of RAM than a mini-computer</li>
<li>This article shows you how to build a FreeBSD -CURRENT image to run on them, using <a href="https://github.com/freebsd/crochet" rel="nofollow">crochet-freebsd</a></li>
<li>If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***</li>
</ul>

<h3><a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" rel="nofollow">EU study recommends OpenBSD</a></h3>

<ul>
<li>A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools</li>
<li>This is especially important, in all countries, after the mass surveillance documents came out </li>
<li>&quot;[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts.&quot;</li>
<li>The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on</li>
<li>Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: &quot;Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways&quot;</li>
<li>Reddit, Undeadly and Hacker News also <a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" rel="nofollow">had</a> <a href="http://undeadly.org/cgi?action=article&sid=20150427093546" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=9445831" rel="nofollow">discussion</a>, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we&#39;ve discussed with <a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" rel="nofollow">Voxer</a> and <a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" rel="nofollow">M:Tier</a> before
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" rel="nofollow">FreeBSD workflow with Git</a></h3>

<ul>
<li>If you&#39;re interested in contributing to FreeBSD, but aren&#39;t a big fan of SVN, they have a Github mirror too</li>
<li>This mailing list post talks about interacting <a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" rel="nofollow">between</a> the official source repository and the Git mirror</li>
<li>This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2vjh3ogvG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20GMcWvKE" rel="nofollow">Bryan writes in</a></li>
<li><a href="http://slexy.org/view/s21M1imT3d" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s25ScxQSwb" rel="nofollow">Charles writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
