<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 17:21:57 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Freenas”</title>
    <link>https://www.bsdnow.tv/tags/freenas</link>
    <pubDate>Thu, 07 Oct 2021 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>423: RACK the Stack </title>
  <link>https://www.bsdnow.tv/423</link>
  <guid isPermaLink="false">4773f65c-58e5-4661-8a0e-cd636e3a9997</guid>
  <pubDate>Thu, 07 Oct 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4773f65c-58e5-4661-8a0e-cd636e3a9997.mp3" length="32212584" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD serves Netflix Video at 400Gb/s, Using the RACK TCP stack, an OpenBSD script to update packages fast, Plasma System Monitor and FreeBSD, TrueNAS vs FreeNAS (and why you should upgrade!), auto lock screen on OpenBSD using xidle and xlock, and more</itunes:subtitle>
  <itunes:duration>51:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD serves Netflix Video at 400Gb/s, Using the RACK TCP stack, an OpenBSD script to update packages fast, Plasma System Monitor and FreeBSD, TrueNAS vs FreeNAS (and why you should upgrade!), auto lock screen on OpenBSD using xidle and xlock, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
Serving Netflix Video at 400Gb/s on FreeBSD (https://people.freebsd.org/~gallatin/talks/euro2021.pdf)
Using the FreeBSD RACK TCP Stack (https://klarasystems.com/articles/using-the-freebsd-rack-tcp-stack/)
News Roundup
pkgupdate, an OpenBSD script to update packages fast (https://dataswamp.org/~solene/2021-08-15-openbsd-pkgupdate.html)
Plasma System Monitor and FreeBSD (https://euroquis.nl//kde/2021/09/15/systemmonitor.html)
TrueNAS vs FreeNAS (and why you should upgrade!) (https://www.ixsystems.com/blog/truenas-vs-freenas-and-why-you-should-upgrade/)
Automatically lock screen on OpenBSD using xidle and xlock (https://dataswamp.org/~solene/2021-07-30-openbsd-xidle-xlock.html)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Ben - LightDM with Slick-Greeter.md (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/423/feedback/Ben%20-%20LightDM%20with%20Slick-Greeter.md)
Dave - Cloned Interface.md (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/423/feedback/Dave%20-%20Cloned%20Interface.md)
MJ Rodriguez - Sony.md (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/423/feedback/MJ%20Rodriguez%20-%20Sony.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <content:encoded>
    <![CDATA[<p>FreeBSD serves Netflix Video at 400Gb/s, Using the RACK TCP stack, an OpenBSD script to update packages fast, Plasma System Monitor and FreeBSD, TrueNAS vs FreeNAS (and why you should upgrade!), auto lock screen on OpenBSD using xidle and xlock, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://people.freebsd.org/%7Egallatin/talks/euro2021.pdf" rel="nofollow">Serving Netflix Video at 400Gb/s on FreeBSD</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/using-the-freebsd-rack-tcp-stack/" rel="nofollow">Using the FreeBSD RACK TCP Stack</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-08-15-openbsd-pkgupdate.html" rel="nofollow">pkgupdate, an OpenBSD script to update packages fast</a></h3>

<hr>

<h3><a href="https://euroquis.nl//kde/2021/09/15/systemmonitor.html" rel="nofollow">Plasma System Monitor and FreeBSD</a></h3>

<hr>

<h3><a href="https://www.ixsystems.com/blog/truenas-vs-freenas-and-why-you-should-upgrade/" rel="nofollow">TrueNAS vs FreeNAS (and why you should upgrade!)</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-07-30-openbsd-xidle-xlock.html" rel="nofollow">Automatically lock screen on OpenBSD using xidle and xlock</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/423/feedback/Ben%20-%20LightDM%20with%20Slick-Greeter.md" rel="nofollow">Ben - LightDM with Slick-Greeter.md</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/423/feedback/Dave%20-%20Cloned%20Interface.md" rel="nofollow">Dave - Cloned Interface.md</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/423/feedback/MJ%20Rodriguez%20-%20Sony.md" rel="nofollow">MJ Rodriguez - Sony.md</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD serves Netflix Video at 400Gb/s, Using the RACK TCP stack, an OpenBSD script to update packages fast, Plasma System Monitor and FreeBSD, TrueNAS vs FreeNAS (and why you should upgrade!), auto lock screen on OpenBSD using xidle and xlock, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://people.freebsd.org/%7Egallatin/talks/euro2021.pdf" rel="nofollow">Serving Netflix Video at 400Gb/s on FreeBSD</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/using-the-freebsd-rack-tcp-stack/" rel="nofollow">Using the FreeBSD RACK TCP Stack</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-08-15-openbsd-pkgupdate.html" rel="nofollow">pkgupdate, an OpenBSD script to update packages fast</a></h3>

<hr>

<h3><a href="https://euroquis.nl//kde/2021/09/15/systemmonitor.html" rel="nofollow">Plasma System Monitor and FreeBSD</a></h3>

<hr>

<h3><a href="https://www.ixsystems.com/blog/truenas-vs-freenas-and-why-you-should-upgrade/" rel="nofollow">TrueNAS vs FreeNAS (and why you should upgrade!)</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-07-30-openbsd-xidle-xlock.html" rel="nofollow">Automatically lock screen on OpenBSD using xidle and xlock</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/423/feedback/Ben%20-%20LightDM%20with%20Slick-Greeter.md" rel="nofollow">Ben - LightDM with Slick-Greeter.md</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/423/feedback/Dave%20-%20Cloned%20Interface.md" rel="nofollow">Dave - Cloned Interface.md</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/423/feedback/MJ%20Rodriguez%20-%20Sony.md" rel="nofollow">MJ Rodriguez - Sony.md</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>341: U-NAS-ification</title>
  <link>https://www.bsdnow.tv/341</link>
  <guid isPermaLink="false">28217a13-b389-4ab7-bc99-8a6f5d61e5b5</guid>
  <pubDate>Thu, 12 Mar 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/28217a13-b389-4ab7-bc99-8a6f5d61e5b5.mp3" length="36740725" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD on Power, DragonflyBSD 5.8 is here, Unifying FreeNAS/TrueNAS, OpenBSD vs. Prometheus and Go, gcc 4.2.1 removed from FreeBSD base, and more.</itunes:subtitle>
  <itunes:duration>51:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD on Power, DragonflyBSD 5.8 is here, Unifying FreeNAS/TrueNAS, OpenBSD vs. Prometheus and Go, gcc 4.2.1 removed from FreeBSD base, and more.
Headlines
FreeBSD on Power (https://www.freebsdfoundation.org/blog/power-to-the-people-making-freebsd-a-first-class-citizen-on-power/)
The power and promise of all open source software is freedom. Another way to express freedom is choice — choice of platforms, deployment models, stacks, configurations, etc.
The FreeBSD Foundation is dedicated to supporting and promoting the FreeBSD Project and community worldwide. But, what does this mean, exactly, you may wonder. The truth is it means many different things, but in all cases the Foundation acts to expand freedom and choice so that FreeBSD users have the power to serve their varied compute needs.
This blog tells the story of one specific way the Foundation helps a member of the community provide greater hardware choice for all FreeBSD users.
Dragonfly 5.8 (https://www.dragonflybsd.org/release58/)
DragonFly version 5.8 brings a new dsynth utility for building your own binary dports packages, plus significant support work to speed up that build - up to and including the entire collection. Additional progress has been made on GPU and signal support.
The details of all commits between the 5.6 and 5.8 branches are available in the associated commit messages for 5.8.0rc1 and 5.8.0. Also see /usr/src/UPDATING for specific file changes in PAM.
See article for rest of information
2nd HamBUG meeting recap (https://www.hambug.ca/)
The second meeting of the Hamilton BSD Users Group took place last night
The next meeting is scheduled for the 2nd Tuesday of the month, April 14th 2020
News Roundup
FreeNAS/TrueNAS Brand Unification (https://www.ixsystems.com/blog/freenas-truenas-unification/)
FreeNAS and TrueNAS have been separate-but-related members of the #1 Open Source storage software family since 2012. FreeNAS is the free Open Source version with an expert community and has led the pursuit of innovations like Plugins and VMs. TrueNAS is the enterprise version for organizations of all sizes that need additional uptime and performance, as well as the enterprise-grade support necessary for critical data and applications. 
From the beginning at iXsystems, we’ve developed, tested, documented, and released both as separate products, even though the vast majority of code is shared. This was a deliberate technical decision in the beginning but over time became less of a necessity and more of “just how we’ve always done it”. Furthermore, to change it was going to require a serious overhaul to how we build and package both products, among other things, so we continued to kick the can down the road. As we made systematic improvements to development and QA efficiency over the past few years, the redundant release process became almost impossible to ignore as our next major efficiency roadblock to overcome. So, we’ve finally rolled up our sleeves.
With the recent 11.3 release, TrueNAS gained parity with FreeNAS on features like VMs and Plugins, further homogenizing the code. Today, we announce the next phase of evolution for FreeNAS and TrueNAS. 
OpenBSD versus Prometheus (and Go). (https://utcc.utoronto.ca/~cks/space/blog/sysadmin/OpenBSDVsPrometheusAndGo)
We have a decent number of OpenBSD machines that do important things (and that have sometimes experienced problems like running out of disk space), and we have a Prometheus based metrics and monitoring system. The Prometheus host agent has enough support for OpenBSD to be able to report on critical metrics, including things like local disk space. Despite all of this, after some investigation I've determined that it's not really sensible to even try to deploy the host agent on our OpenBSD machines. This is due to a combination of factors that have at their root OpenBSD's lack of ABI stability
FreeBSD removed gcc from base (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=358454)
As described in Warner's email message[1] to the FreeBSD-arch mailing list we have reached GCC 4.2.1's retirement date.  At this time all supported architectures either use in-tree Clang, or rely on external toolchain (i.e., a contemporary GCC version from ports).
GCC 4.2.1 was released July 18, 2007 and was imported into FreeBSD later that year, in r171825.  GCC has served us well, but version 4.2.1 is obsolete and not used by default on any architecture in FreeBSD.  It does not support modern C and does not support arm64 or RISC-V.
Beastie Bits
New Archive location for Dragonfly 4.x (https://www.dragonflydigest.com/2020/03/10/24276.html)
A dead simple git cheat sheet (https://hub.iwebthings.com/a-dead-simple-git-cheatsheet/)
Xorg 1.20.7 on HardenedBSD Comes with IE/RELRO+BIND_NOW/CFI/SafeStack Protections (https://twitter.com/lattera/status/1233412881569415168)
Feedback/Questions
Niclas writes in Regarding the Lenovo E595 user (episode 340) (http://dpaste.com/2YJ6PFW#wrap)
Lyubomir writes about GELI and ZFS (http://dpaste.com/1S0DGT3#wrap)
Peter writes in about scaling FreeBSD jails (http://dpaste.com/2FSZQ8V#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, Power, Power architecture, freenas, truenas, prometheus, go, gcc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD on Power, DragonflyBSD 5.8 is here, Unifying FreeNAS/TrueNAS, OpenBSD vs. Prometheus and Go, gcc 4.2.1 removed from FreeBSD base, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/power-to-the-people-making-freebsd-a-first-class-citizen-on-power/" rel="nofollow">FreeBSD on Power</a></h3>

<blockquote>
<p>The power and promise of all open source software is freedom. Another way to express freedom is choice — choice of platforms, deployment models, stacks, configurations, etc.</p>

<p>The FreeBSD Foundation is dedicated to supporting and promoting the FreeBSD Project and community worldwide. But, what does this mean, exactly, you may wonder. The truth is it means many different things, but in all cases the Foundation acts to expand freedom and choice so that FreeBSD users have the power to serve their varied compute needs.</p>

<p>This blog tells the story of one specific way the Foundation helps a member of the community provide greater hardware choice for all FreeBSD users.</p>
</blockquote>

<hr>

<h3><a href="https://www.dragonflybsd.org/release58/" rel="nofollow">Dragonfly 5.8</a></h3>

<blockquote>
<p>DragonFly version 5.8 brings a new dsynth utility for building your own binary dports packages, plus significant support work to speed up that build - up to and including the entire collection. Additional progress has been made on GPU and signal support.</p>

<p>The details of all commits between the 5.6 and 5.8 branches are available in the associated commit messages for 5.8.0rc1 and 5.8.0. Also see /usr/src/UPDATING for specific file changes in PAM.</p>
</blockquote>

<ul>
<li>See article for rest of information</li>
</ul>

<hr>

<h3><a href="https://www.hambug.ca/" rel="nofollow">2nd HamBUG meeting recap</a></h3>

<ul>
<li>The second meeting of the Hamilton BSD Users Group took place last night</li>
<li>The next meeting is scheduled for the 2nd Tuesday of the month, April 14th 2020</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.ixsystems.com/blog/freenas-truenas-unification/" rel="nofollow">FreeNAS/TrueNAS Brand Unification</a></h3>

<blockquote>
<p>FreeNAS and TrueNAS have been separate-but-related members of the #1 Open Source storage software family since 2012. FreeNAS is the free Open Source version with an expert community and has led the pursuit of innovations like Plugins and VMs. TrueNAS is the enterprise version for organizations of all sizes that need additional uptime and performance, as well as the enterprise-grade support necessary for critical data and applications. </p>

<p>From the beginning at iXsystems, we’ve developed, tested, documented, and released both as separate products, even though the vast majority of code is shared. This was a deliberate technical decision in the beginning but over time became less of a necessity and more of “just how we’ve always done it”. Furthermore, to change it was going to require a serious overhaul to how we build and package both products, among other things, so we continued to kick the can down the road. As we made systematic improvements to development and QA efficiency over the past few years, the redundant release process became almost impossible to ignore as our next major efficiency roadblock to overcome. So, we’ve finally rolled up our sleeves.</p>

<p>With the recent 11.3 release, TrueNAS gained parity with FreeNAS on features like VMs and Plugins, further homogenizing the code. Today, we announce the next phase of evolution for FreeNAS and TrueNAS. </p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/sysadmin/OpenBSDVsPrometheusAndGo" rel="nofollow">OpenBSD versus Prometheus (and Go).</a></h3>

<blockquote>
<p>We have a decent number of OpenBSD machines that do important things (and that have sometimes experienced problems like running out of disk space), and we have a Prometheus based metrics and monitoring system. The Prometheus host agent has enough support for OpenBSD to be able to report on critical metrics, including things like local disk space. Despite all of this, after some investigation I&#39;ve determined that it&#39;s not really sensible to even try to deploy the host agent on our OpenBSD machines. This is due to a combination of factors that have at their root OpenBSD&#39;s lack of ABI stability</p>
</blockquote>

<hr>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=358454" rel="nofollow">FreeBSD removed gcc from base</a></h3>

<blockquote>
<p>As described in Warner&#39;s email message[1] to the FreeBSD-arch mailing list we have reached GCC 4.2.1&#39;s retirement date.  At this time all supported architectures either use in-tree Clang, or rely on external toolchain (i.e., a contemporary GCC version from ports).</p>

<p>GCC 4.2.1 was released July 18, 2007 and was imported into FreeBSD later that year, in r171825.  GCC has served us well, but version 4.2.1 is obsolete and not used by default on any architecture in FreeBSD.  It does not support modern C and does not support arm64 or RISC-V.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/03/10/24276.html" rel="nofollow">New Archive location for Dragonfly 4.x</a></li>
<li><a href="https://hub.iwebthings.com/a-dead-simple-git-cheatsheet/" rel="nofollow">A dead simple git cheat sheet</a></li>
<li><a href="https://twitter.com/lattera/status/1233412881569415168" rel="nofollow">Xorg 1.20.7 on HardenedBSD Comes with IE/RELRO+BIND_NOW/CFI/SafeStack Protections</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/2YJ6PFW#wrap" rel="nofollow">Niclas writes in Regarding the Lenovo E595 user (episode 340)</a></li>
<li><a href="http://dpaste.com/1S0DGT3#wrap" rel="nofollow">Lyubomir writes about GELI and ZFS</a></li>
<li><a href="http://dpaste.com/2FSZQ8V#wrap" rel="nofollow">Peter writes in about scaling FreeBSD jails</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0341.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD on Power, DragonflyBSD 5.8 is here, Unifying FreeNAS/TrueNAS, OpenBSD vs. Prometheus and Go, gcc 4.2.1 removed from FreeBSD base, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/power-to-the-people-making-freebsd-a-first-class-citizen-on-power/" rel="nofollow">FreeBSD on Power</a></h3>

<blockquote>
<p>The power and promise of all open source software is freedom. Another way to express freedom is choice — choice of platforms, deployment models, stacks, configurations, etc.</p>

<p>The FreeBSD Foundation is dedicated to supporting and promoting the FreeBSD Project and community worldwide. But, what does this mean, exactly, you may wonder. The truth is it means many different things, but in all cases the Foundation acts to expand freedom and choice so that FreeBSD users have the power to serve their varied compute needs.</p>

<p>This blog tells the story of one specific way the Foundation helps a member of the community provide greater hardware choice for all FreeBSD users.</p>
</blockquote>

<hr>

<h3><a href="https://www.dragonflybsd.org/release58/" rel="nofollow">Dragonfly 5.8</a></h3>

<blockquote>
<p>DragonFly version 5.8 brings a new dsynth utility for building your own binary dports packages, plus significant support work to speed up that build - up to and including the entire collection. Additional progress has been made on GPU and signal support.</p>

<p>The details of all commits between the 5.6 and 5.8 branches are available in the associated commit messages for 5.8.0rc1 and 5.8.0. Also see /usr/src/UPDATING for specific file changes in PAM.</p>
</blockquote>

<ul>
<li>See article for rest of information</li>
</ul>

<hr>

<h3><a href="https://www.hambug.ca/" rel="nofollow">2nd HamBUG meeting recap</a></h3>

<ul>
<li>The second meeting of the Hamilton BSD Users Group took place last night</li>
<li>The next meeting is scheduled for the 2nd Tuesday of the month, April 14th 2020</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.ixsystems.com/blog/freenas-truenas-unification/" rel="nofollow">FreeNAS/TrueNAS Brand Unification</a></h3>

<blockquote>
<p>FreeNAS and TrueNAS have been separate-but-related members of the #1 Open Source storage software family since 2012. FreeNAS is the free Open Source version with an expert community and has led the pursuit of innovations like Plugins and VMs. TrueNAS is the enterprise version for organizations of all sizes that need additional uptime and performance, as well as the enterprise-grade support necessary for critical data and applications. </p>

<p>From the beginning at iXsystems, we’ve developed, tested, documented, and released both as separate products, even though the vast majority of code is shared. This was a deliberate technical decision in the beginning but over time became less of a necessity and more of “just how we’ve always done it”. Furthermore, to change it was going to require a serious overhaul to how we build and package both products, among other things, so we continued to kick the can down the road. As we made systematic improvements to development and QA efficiency over the past few years, the redundant release process became almost impossible to ignore as our next major efficiency roadblock to overcome. So, we’ve finally rolled up our sleeves.</p>

<p>With the recent 11.3 release, TrueNAS gained parity with FreeNAS on features like VMs and Plugins, further homogenizing the code. Today, we announce the next phase of evolution for FreeNAS and TrueNAS. </p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/sysadmin/OpenBSDVsPrometheusAndGo" rel="nofollow">OpenBSD versus Prometheus (and Go).</a></h3>

<blockquote>
<p>We have a decent number of OpenBSD machines that do important things (and that have sometimes experienced problems like running out of disk space), and we have a Prometheus based metrics and monitoring system. The Prometheus host agent has enough support for OpenBSD to be able to report on critical metrics, including things like local disk space. Despite all of this, after some investigation I&#39;ve determined that it&#39;s not really sensible to even try to deploy the host agent on our OpenBSD machines. This is due to a combination of factors that have at their root OpenBSD&#39;s lack of ABI stability</p>
</blockquote>

<hr>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=358454" rel="nofollow">FreeBSD removed gcc from base</a></h3>

<blockquote>
<p>As described in Warner&#39;s email message[1] to the FreeBSD-arch mailing list we have reached GCC 4.2.1&#39;s retirement date.  At this time all supported architectures either use in-tree Clang, or rely on external toolchain (i.e., a contemporary GCC version from ports).</p>

<p>GCC 4.2.1 was released July 18, 2007 and was imported into FreeBSD later that year, in r171825.  GCC has served us well, but version 4.2.1 is obsolete and not used by default on any architecture in FreeBSD.  It does not support modern C and does not support arm64 or RISC-V.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/03/10/24276.html" rel="nofollow">New Archive location for Dragonfly 4.x</a></li>
<li><a href="https://hub.iwebthings.com/a-dead-simple-git-cheatsheet/" rel="nofollow">A dead simple git cheat sheet</a></li>
<li><a href="https://twitter.com/lattera/status/1233412881569415168" rel="nofollow">Xorg 1.20.7 on HardenedBSD Comes with IE/RELRO+BIND_NOW/CFI/SafeStack Protections</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/2YJ6PFW#wrap" rel="nofollow">Niclas writes in Regarding the Lenovo E595 user (episode 340)</a></li>
<li><a href="http://dpaste.com/1S0DGT3#wrap" rel="nofollow">Lyubomir writes about GELI and ZFS</a></li>
<li><a href="http://dpaste.com/2FSZQ8V#wrap" rel="nofollow">Peter writes in about scaling FreeBSD jails</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0341.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>335: FreeBSD Down Under</title>
  <link>https://www.bsdnow.tv/335</link>
  <guid isPermaLink="false">12678787-276e-4471-a8a3-115404afed57</guid>
  <pubDate>Thu, 30 Jan 2020 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/12678787-276e-4471-a8a3-115404afed57.mp3" length="38818086" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Hyperbola Developer interview, why you should migrate from Linux to BSD, FreeBSD is an amazing OS, improving the ptrace(2) API in LLVM 10, First FreeBSD conference in Australia, and a guide to containers on FreeNAS.</itunes:subtitle>
  <itunes:duration>53:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Hyperbola Developer interview, why you should migrate from Linux to BSD, FreeBSD is an amazing OS, improving the ptrace(2) API in LLVM 10, First FreeBSD conference in Australia, and a guide to containers on FreeNAS.
Headlines
FreeBSD is an amazing operating System (https://www.unixsheikh.com/articles/freebsd-is-an-amazing-operating-system.html)
Update 2020-01-21: Since I wrote this article it got posted on Hacker News, Reddit and Lobster, and a few people have emailed me with comments. I have updated the article with comments where I have found it needed. As an important side note I would like to point out that I am not a FreeBSD developer, there may be things going on in the FreeBSD world that I know absolutely nothing about. I am also not glued to the FreeBSD developer mailing lists. I am not a FreeBSD "fanboy". I have been using GNU/Linux a ton more for the past two decades than FreeBSD, mainly due to hardware incompatibility (lacking or buggy drivers), and I love both Debian GNU/Linux and Arch Linux just as much as FreeBSD. However, I am concerned about the development of GNU/Linux as of late. Also this article is not about me trying to make anyone switch from something else to FreeBSD. It's about why I like FreeBSD and that I recommend you try it out if you're into messing with operating systems.
I think the year was late 1999 or mid 2000 when I one day was browsing computer books at my favorite bookshop and I discovered the book The Complete FreeBSD third edition from 1999 by Greg Lehey. With the book came 4 CD Roms with FreeBSD 3.3.
I had already familiarized myself with GNU/Linux in 1998, and I was in the process of migrating every server and desktop operating system away from Microsoft Windows, both at home and at my company, to GNU/Linux, initially Red Hat Linux and then later Debian GNU/Linux, which eventually became my favorite GNU/Linux distribution for many years.
When I first saw The Complete FreeBSD book by Greg Lehey I remember noticing the text on the front page that said, "The Free Version of Berkeley UNIX" and "Rock Solid Stability", and I was immediately intrigued! What was that all about? A free UNIX operating system! And rock solid stability? That sounded amazing.
Hyperbola Dev Interview (https://itsfoss.com/hyperbola-linux-bsd/)
In late December 2019, Hyperbola announced that they would be making major changes to their project. They have decided to drop the Linux kernel in favor of forking the OpenBSD kernel. This announcement only came months after Project Trident announced that they were going in the opposite direction (from BSD to Linux).
Hyperbola also plans to replace all software that is not GPL v3 compliant with new versions that are.
To get more insight into the future of their new project, I interviewed Andre, co-founder of Hyperbola.
News Roundup
Improving the ptrace(2) API and preparing for LLVM-10.0 (https://blog.netbsd.org/tnf/entry/improving_the_ptrace_2_api)
This month I have improved the NetBSD ptrace(2) API, removing one legacy interface with a few flaws and replacing it with two new calls with new features, and removing technical debt.
As LLVM 10.0 is branching now soon (Jan 15th 2020), I worked on proper support of the LLVM features for NetBSD 9.0 (today RC1) and NetBSD HEAD (future 10.0).
The first FreeBSD conference in Australia (https://rubenerd.com/the-first-freebsd-conference-in-australia/)
FreeBSD has existed as an operating system, project, and foundation for more than twenty years, and its earlier incantations have exited for far longer. The old guard have been developing code, porting software, and writing documentation for longer than I’ve existed. I’ve been using it for more than a decade for personal projects, and professionally for half that time.
While there are many prominent Australian FreeBSD contributors, sysadmins, and users, we’ve always had to venture overseas for conferences. We’re always told Australians are among the most ardent travellers, but I always wondered if we could do a domestic event as well.
And on Tuesday, we did! Deb Goodkin and the FreeBSD Foundation graciously organised and chaired a dedicated FreeBSD miniconf at the long-running linux.conf.au event held each year in a different city in Australia and New Zealand.
A practical guide to containers on FreeNAS for a depraved psychopath (https://medium.com/@andoriyu/a-practical-guide-to-containers-on-freenas-for-a-depraved-psychopath-c212203c0394)
This is a simple write-up to setup Docker on FreeNAS 11 or FreeBSD 11.
But muh jails?
You know that jails are dope and you know that jails are dope, yet no one else knows it. So here we are stuck with docker. Two years ago I would be the last person to recommend using docker, but a whole lot of things has changes past years… 
So jails are dead then?
No, jails are still dope, but jails lack tools to manage them. Yes, there are a few tools, but they meant for hard-core FreeBSD users who used to suffering. Docker allows you to run applications without deep knowledge of application you’re running. It will also allow you to run applications that are not ported to FreeBSD.
Why you should migrate everything from Linux to BSD (https://www.unixsheikh.com/articles/why-you-should-migrate-everything-from-linux-to-bsd.html)
As an operating system GNU/Linux has become a real mess because of the fragmented nature of the project, the bloatware in the kernel, and because of the jerking around by commercial interests.
Response Should you migrate from Linux to BSD? It depends. (https://fediverse.blog/~/AllGoodThings/should-you-migrate-from-linux-to-bsd-it-depends)
Beastie Bits
Using the OpenBSD ports tree with dedicated users (https://dataswamp.org/~solene/2020-01-11-privsep.html)
broot on FreeBSD (https://vermaden.wordpress.com/2020/01/10/run-broot-on-freebsd/)
A Trip down Memory Lane (https://svnweb.freebsd.org/base/head/share/misc/bsd-family-tree?view=co)
Running syslog-ng in BastilleBSD (https://www.syslog-ng.com/community/b/blog/posts/running-syslog-ng-in-bastillebsd)
NASA : Using Software Packages in pkgsrc (https://www.nas.nasa.gov/hecc/support/kb/using-software-packages-in-pkgsrc_493.html)
Feedback/Questions
All of our questions this week were pretty technical in nature so I'm going to save those for the next episode so Allan can weigh in on them, since if we cover them now we're basically going to be deferring to Allan anyway.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, hyperbola, migrate, migration, ptrace, llvm, conference, australia, containers, freenas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Hyperbola Developer interview, why you should migrate from Linux to BSD, FreeBSD is an amazing OS, improving the ptrace(2) API in LLVM 10, First FreeBSD conference in Australia, and a guide to containers on FreeNAS.</p>

<h2>Headlines</h2>

<h3><a href="https://www.unixsheikh.com/articles/freebsd-is-an-amazing-operating-system.html" rel="nofollow">FreeBSD is an amazing operating System</a></h3>

<blockquote>
<p>Update 2020-01-21: Since I wrote this article it got posted on Hacker News, Reddit and Lobster, and a few people have emailed me with comments. I have updated the article with comments where I have found it needed. As an important side note I would like to point out that I am not a FreeBSD developer, there may be things going on in the FreeBSD world that I know absolutely nothing about. I am also not glued to the FreeBSD developer mailing lists. I am not a FreeBSD &quot;fanboy&quot;. I have been using GNU/Linux a ton more for the past two decades than FreeBSD, mainly due to hardware incompatibility (lacking or buggy drivers), and I love both Debian GNU/Linux and Arch Linux just as much as FreeBSD. However, I am concerned about the development of GNU/Linux as of late. Also this article is not about me trying to make anyone switch from something else to FreeBSD. It&#39;s about why I like FreeBSD and that I recommend you try it out if you&#39;re into messing with operating systems.</p>

<p>I think the year was late 1999 or mid 2000 when I one day was browsing computer books at my favorite bookshop and I discovered the book The Complete FreeBSD third edition from 1999 by Greg Lehey. With the book came 4 CD Roms with FreeBSD 3.3.</p>

<p>I had already familiarized myself with GNU/Linux in 1998, and I was in the process of migrating every server and desktop operating system away from Microsoft Windows, both at home and at my company, to GNU/Linux, initially Red Hat Linux and then later Debian GNU/Linux, which eventually became my favorite GNU/Linux distribution for many years.</p>

<p>When I first saw The Complete FreeBSD book by Greg Lehey I remember noticing the text on the front page that said, &quot;The Free Version of Berkeley UNIX&quot; and &quot;Rock Solid Stability&quot;, and I was immediately intrigued! What was that all about? A free UNIX operating system! And rock solid stability? That sounded amazing.</p>
</blockquote>

<hr>

<h3><a href="https://itsfoss.com/hyperbola-linux-bsd/" rel="nofollow">Hyperbola Dev Interview</a></h3>

<blockquote>
<p>In late December 2019, Hyperbola announced that they would be making major changes to their project. They have decided to drop the Linux kernel in favor of forking the OpenBSD kernel. This announcement only came months after Project Trident announced that they were going in the opposite direction (from BSD to Linux).</p>

<p>Hyperbola also plans to replace all software that is not GPL v3 compliant with new versions that are.</p>

<p>To get more insight into the future of their new project, I interviewed Andre, co-founder of Hyperbola.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.netbsd.org/tnf/entry/improving_the_ptrace_2_api" rel="nofollow">Improving the ptrace(2) API and preparing for LLVM-10.0</a></h3>

<blockquote>
<p>This month I have improved the NetBSD ptrace(2) API, removing one legacy interface with a few flaws and replacing it with two new calls with new features, and removing technical debt.</p>

<p>As LLVM 10.0 is branching now soon (Jan 15th 2020), I worked on proper support of the LLVM features for NetBSD 9.0 (today RC1) and NetBSD HEAD (future 10.0).</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/the-first-freebsd-conference-in-australia/" rel="nofollow">The first FreeBSD conference in Australia</a></h3>

<blockquote>
<p>FreeBSD has existed as an operating system, project, and foundation for more than twenty years, and its earlier incantations have exited for far longer. The old guard have been developing code, porting software, and writing documentation for longer than I’ve existed. I’ve been using it for more than a decade for personal projects, and professionally for half that time.</p>

<p>While there are many prominent Australian FreeBSD contributors, sysadmins, and users, we’ve always had to venture overseas for conferences. We’re always told Australians are among the most ardent travellers, but I always wondered if we could do a domestic event as well.</p>

<p>And on Tuesday, we did! Deb Goodkin and the FreeBSD Foundation graciously organised and chaired a dedicated FreeBSD miniconf at the long-running linux.conf.au event held each year in a different city in Australia and New Zealand.</p>
</blockquote>

<hr>

<h3><a href="https://medium.com/@andoriyu/a-practical-guide-to-containers-on-freenas-for-a-depraved-psychopath-c212203c0394" rel="nofollow">A practical guide to containers on FreeNAS for a depraved psychopath</a></h3>

<blockquote>
<p>This is a simple write-up to setup Docker on FreeNAS 11 or FreeBSD 11.</p>
</blockquote>

<p>But muh jails?</p>

<blockquote>
<p>You know that jails are dope and you know that jails are dope, yet no one else knows it. So here we are stuck with docker. Two years ago I would be the last person to recommend using docker, but a whole lot of things has changes past years… </p>
</blockquote>

<p>So jails are dead then?</p>

<blockquote>
<p>No, jails are still dope, but jails lack tools to manage them. Yes, there are a few tools, but they meant for hard-core FreeBSD users who used to suffering. Docker allows you to run applications without deep knowledge of application you’re running. It will also allow you to run applications that are not ported to FreeBSD.</p>
</blockquote>

<hr>

<h3><a href="https://www.unixsheikh.com/articles/why-you-should-migrate-everything-from-linux-to-bsd.html" rel="nofollow">Why you should migrate everything from Linux to BSD</a></h3>

<blockquote>
<p>As an operating system GNU/Linux has become a real mess because of the fragmented nature of the project, the bloatware in the kernel, and because of the jerking around by commercial interests.</p>
</blockquote>

<ul>
<li>Response <a href="https://fediverse.blog/%7E/AllGoodThings/should-you-migrate-from-linux-to-bsd-it-depends" rel="nofollow">Should you migrate from Linux to BSD? It depends.</a></li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://dataswamp.org/%7Esolene/2020-01-11-privsep.html" rel="nofollow">Using the OpenBSD ports tree with dedicated users</a></li>
<li><a href="https://vermaden.wordpress.com/2020/01/10/run-broot-on-freebsd/" rel="nofollow">broot on FreeBSD</a></li>
<li><a href="https://svnweb.freebsd.org/base/head/share/misc/bsd-family-tree?view=co" rel="nofollow">A Trip down Memory Lane</a></li>
<li><a href="https://www.syslog-ng.com/community/b/blog/posts/running-syslog-ng-in-bastillebsd" rel="nofollow">Running syslog-ng in BastilleBSD</a></li>
<li><a href="https://www.nas.nasa.gov/hecc/support/kb/using-software-packages-in-pkgsrc_493.html" rel="nofollow">NASA : Using Software Packages in pkgsrc</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>All of our questions this week were pretty technical in nature so I&#39;m going to save those for the next episode so Allan can weigh in on them, since if we cover them now we&#39;re basically going to be deferring to Allan anyway.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0335.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Hyperbola Developer interview, why you should migrate from Linux to BSD, FreeBSD is an amazing OS, improving the ptrace(2) API in LLVM 10, First FreeBSD conference in Australia, and a guide to containers on FreeNAS.</p>

<h2>Headlines</h2>

<h3><a href="https://www.unixsheikh.com/articles/freebsd-is-an-amazing-operating-system.html" rel="nofollow">FreeBSD is an amazing operating System</a></h3>

<blockquote>
<p>Update 2020-01-21: Since I wrote this article it got posted on Hacker News, Reddit and Lobster, and a few people have emailed me with comments. I have updated the article with comments where I have found it needed. As an important side note I would like to point out that I am not a FreeBSD developer, there may be things going on in the FreeBSD world that I know absolutely nothing about. I am also not glued to the FreeBSD developer mailing lists. I am not a FreeBSD &quot;fanboy&quot;. I have been using GNU/Linux a ton more for the past two decades than FreeBSD, mainly due to hardware incompatibility (lacking or buggy drivers), and I love both Debian GNU/Linux and Arch Linux just as much as FreeBSD. However, I am concerned about the development of GNU/Linux as of late. Also this article is not about me trying to make anyone switch from something else to FreeBSD. It&#39;s about why I like FreeBSD and that I recommend you try it out if you&#39;re into messing with operating systems.</p>

<p>I think the year was late 1999 or mid 2000 when I one day was browsing computer books at my favorite bookshop and I discovered the book The Complete FreeBSD third edition from 1999 by Greg Lehey. With the book came 4 CD Roms with FreeBSD 3.3.</p>

<p>I had already familiarized myself with GNU/Linux in 1998, and I was in the process of migrating every server and desktop operating system away from Microsoft Windows, both at home and at my company, to GNU/Linux, initially Red Hat Linux and then later Debian GNU/Linux, which eventually became my favorite GNU/Linux distribution for many years.</p>

<p>When I first saw The Complete FreeBSD book by Greg Lehey I remember noticing the text on the front page that said, &quot;The Free Version of Berkeley UNIX&quot; and &quot;Rock Solid Stability&quot;, and I was immediately intrigued! What was that all about? A free UNIX operating system! And rock solid stability? That sounded amazing.</p>
</blockquote>

<hr>

<h3><a href="https://itsfoss.com/hyperbola-linux-bsd/" rel="nofollow">Hyperbola Dev Interview</a></h3>

<blockquote>
<p>In late December 2019, Hyperbola announced that they would be making major changes to their project. They have decided to drop the Linux kernel in favor of forking the OpenBSD kernel. This announcement only came months after Project Trident announced that they were going in the opposite direction (from BSD to Linux).</p>

<p>Hyperbola also plans to replace all software that is not GPL v3 compliant with new versions that are.</p>

<p>To get more insight into the future of their new project, I interviewed Andre, co-founder of Hyperbola.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.netbsd.org/tnf/entry/improving_the_ptrace_2_api" rel="nofollow">Improving the ptrace(2) API and preparing for LLVM-10.0</a></h3>

<blockquote>
<p>This month I have improved the NetBSD ptrace(2) API, removing one legacy interface with a few flaws and replacing it with two new calls with new features, and removing technical debt.</p>

<p>As LLVM 10.0 is branching now soon (Jan 15th 2020), I worked on proper support of the LLVM features for NetBSD 9.0 (today RC1) and NetBSD HEAD (future 10.0).</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/the-first-freebsd-conference-in-australia/" rel="nofollow">The first FreeBSD conference in Australia</a></h3>

<blockquote>
<p>FreeBSD has existed as an operating system, project, and foundation for more than twenty years, and its earlier incantations have exited for far longer. The old guard have been developing code, porting software, and writing documentation for longer than I’ve existed. I’ve been using it for more than a decade for personal projects, and professionally for half that time.</p>

<p>While there are many prominent Australian FreeBSD contributors, sysadmins, and users, we’ve always had to venture overseas for conferences. We’re always told Australians are among the most ardent travellers, but I always wondered if we could do a domestic event as well.</p>

<p>And on Tuesday, we did! Deb Goodkin and the FreeBSD Foundation graciously organised and chaired a dedicated FreeBSD miniconf at the long-running linux.conf.au event held each year in a different city in Australia and New Zealand.</p>
</blockquote>

<hr>

<h3><a href="https://medium.com/@andoriyu/a-practical-guide-to-containers-on-freenas-for-a-depraved-psychopath-c212203c0394" rel="nofollow">A practical guide to containers on FreeNAS for a depraved psychopath</a></h3>

<blockquote>
<p>This is a simple write-up to setup Docker on FreeNAS 11 or FreeBSD 11.</p>
</blockquote>

<p>But muh jails?</p>

<blockquote>
<p>You know that jails are dope and you know that jails are dope, yet no one else knows it. So here we are stuck with docker. Two years ago I would be the last person to recommend using docker, but a whole lot of things has changes past years… </p>
</blockquote>

<p>So jails are dead then?</p>

<blockquote>
<p>No, jails are still dope, but jails lack tools to manage them. Yes, there are a few tools, but they meant for hard-core FreeBSD users who used to suffering. Docker allows you to run applications without deep knowledge of application you’re running. It will also allow you to run applications that are not ported to FreeBSD.</p>
</blockquote>

<hr>

<h3><a href="https://www.unixsheikh.com/articles/why-you-should-migrate-everything-from-linux-to-bsd.html" rel="nofollow">Why you should migrate everything from Linux to BSD</a></h3>

<blockquote>
<p>As an operating system GNU/Linux has become a real mess because of the fragmented nature of the project, the bloatware in the kernel, and because of the jerking around by commercial interests.</p>
</blockquote>

<ul>
<li>Response <a href="https://fediverse.blog/%7E/AllGoodThings/should-you-migrate-from-linux-to-bsd-it-depends" rel="nofollow">Should you migrate from Linux to BSD? It depends.</a></li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://dataswamp.org/%7Esolene/2020-01-11-privsep.html" rel="nofollow">Using the OpenBSD ports tree with dedicated users</a></li>
<li><a href="https://vermaden.wordpress.com/2020/01/10/run-broot-on-freebsd/" rel="nofollow">broot on FreeBSD</a></li>
<li><a href="https://svnweb.freebsd.org/base/head/share/misc/bsd-family-tree?view=co" rel="nofollow">A Trip down Memory Lane</a></li>
<li><a href="https://www.syslog-ng.com/community/b/blog/posts/running-syslog-ng-in-bastillebsd" rel="nofollow">Running syslog-ng in BastilleBSD</a></li>
<li><a href="https://www.nas.nasa.gov/hecc/support/kb/using-software-packages-in-pkgsrc_493.html" rel="nofollow">NASA : Using Software Packages in pkgsrc</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>All of our questions this week were pretty technical in nature so I&#39;m going to save those for the next episode so Allan can weigh in on them, since if we cover them now we&#39;re basically going to be deferring to Allan anyway.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0335.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>330: Happy Holidays, All(an)</title>
  <link>https://www.bsdnow.tv/330</link>
  <guid isPermaLink="false">af84425c-c562-4d3b-b28c-cce7a148a3ad</guid>
  <pubDate>Thu, 26 Dec 2019 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/af84425c-c562-4d3b-b28c-cce7a148a3ad.mp3" length="54074955" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.</itunes:subtitle>
  <itunes:duration>1:15:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.
Headlines
Authentication vulnerabilities in OpenBSD (https://www.openwall.com/lists/oss-security/2019/12/04/5)
We discovered an authentication-bypass vulnerability in OpenBSD's authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis. For example, sshd is not exploitable thanks to its defense-in-depth mechanisms.
From the manual page of login.conf:
OpenBSD uses BSD Authentication, which is made up of a variety of authentication styles.  The authentication styles currently provided are:
         passwd     Request a password and check it against the password in the master.passwd file.  See loginpasswd(8).
         skey       Send a challenge and request a response, checking it with S/Key (tm) authentication.  See loginskey(8).
         yubikey    Authenticate using a Yubico YubiKey token.  See loginyubikey(8).
         For any given style, the program /usr/libexec/auth/loginstyle is used to
         perform the authentication.  The synopsis of this program is:
         /usr/libexec/auth/login_style [-v name=value] [-s service] username class
This is the first piece of the puzzle: if an attacker specifies a username of the form "-option", they can influence the behavior of the authentication program in unexpected ways.
 login_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user [class] The service argument specifies which protocol to use with the invoking program.  The allowed protocols are login, challenge, and response.  (The challenge protocol is silently ignored but will report success as passwd-style authentication is not challenge-response based).
This is the second piece of the puzzle: if an attacker specifies the username "-schallenge" (or "-schallenge:passwd" to force a passwd-style authentication), then the authentication is automatically successful and therefore bypassed.
Case study: smtpd
Case study: ldapd
Case study: radiusd
Case study: sshd
Acknowledgments: We thank Theo de Raadt and the OpenBSD developers for their incredibly quick response: they published patches for these vulnerabilities less than 40 hours after our initial contact. We also thank MITRE's CVE Assignment Team.
First release candidate for NetBSD 9.0 available! (https://blog.netbsd.org/tnf/entry/first_release_candidate_for_netbsd)
Since the start of the release process four months ago a lot of improvements went into the branch - more than 500 pullups were processed!
This includes usbnet (a common framework for usb ethernet drivers), aarch64 stability enhancements and lots of new hardware support, installer/sysinst fixes and changes to the NVMM (hardware virtualization) interface.
We hope this will lead to the best NetBSD release ever (only to be topped by NetBSD 10 next year).
Here are a few highlights of the new release:
Support for Arm AArch64 (64-bit Armv8-A) machines, including "Arm ServerReady"
compliant machines (SBBR+SBSA)
Enhanced hardware support for Armv7-A
Updated GPU drivers (e.g. support for Intel Kabylake)
Enhanced virtualization support
Support for hardware-accelerated virtualization (NVMM)
Support for Performance Monitoring Counters
Support for Kernel ASLR
Support several kernel sanitizers (KLEAK, KASAN, KUBSAN)
Support for userland sanitizers
Audit of the network stack
Many improvements in NPF
Updated ZFS
Reworked error handling and NCQ support in the SATA subsystem
Support a common framework for USB Ethernet drivers (usbnet)
More information on the RC can be found on the NetBSD 9 release page (https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html)
News Roundup
Running FreeNAS on a Digitalocean droplet (https://www.shlomimarco.com/post/running-freenas-on-a-digitalocean-droplet)
ZFS is awesome. FreeBSD even more so. FreeNAS is the battle-tested, enterprise-ready-yet-home-user-friendly software defined storage solution which is cooler then deep space, based on FreeBSD and makes heavy use of ZFS. This is what I (and soooooo many others) use for just about any storage-related task. I can go on and on and on about what makes it great, but if you're here, reading this, you probably know all that already and we can skip ahead.
I've needed an offsite FreeNAS setup to replicate things to, to run some things, to do some stuff, basically, my privately-owned, tightly-controlled NAS appliance in the cloud, one I control from top to bottom and with support for whatever crazy thing I'm trying to do. Since I'm using DigitalOcean as my main VPS provider, it seemed logical to run FreeNAS there, however, you can't. While DO supports many many distos and pre-setup applications (e.g OpenVPN), FreeNAS isn't a supported feature, at least not in the traditional way :)
Before we begin, here's the gist of what we're going to do:
Base of a FreeBSD droplet, we'll re-image our boot block device with FreeNAS iso. We'll then install FreeNAS on the second block device. Once done we're going to do the ol' switcheroo: we're going to re-image our original boot block device using the now FreeNAS-installed second block device. 
Part 1: re-image our boot block device to boot FreeNAS install media.
Part 2: Install FreeNAS on the second block-device
Part 3: Re-image the boot block device using the FreeNAS-installed block device
NomadBSD 1.3 is now available (https://nomadbsd.org/)
From the release notes:
The base system has been changed to FreeBSD 12.1-RELEASE-p1
 Due to a deadlock problem, FreeBSD's unionfs has been replaced by unionfs-fuse
 The GPT layout has been changed to MBR. This prevents problems with Lenovo
 systems that refuse to boot from GPT if "lenovofix" is not set, and systems that
 hang on boot if "lenovofix" is set.
 Support for ZFS installations has been added to the NomadBSD installer.
 The rc-script for setting up the network interfaces has been fixed and improved.
 Support for setting the country code for the wlan device has been added.
 Auto configuration for running in VirtualBox has been added.
 A check for the default display has been added to the graphics configuration scripts. This fixes problems where users with Optimus have their NVIDIA card disabled, and use the integrated graphics chip instead.
 NVIDIA driver version 440 has been added.
 nomadbsd-dmconfig, a Qt tool for selecting the display manager theme, setting the
default user and autologin has been added.
 nomadbsd-adduser, a Qt tool for added preconfigured user accounts to the system has been added.
 Martin Orszulik added Czech translations to the setup and installation wizard.
 The NomadBSD logo, designed by Ian Grindley, has been changed.
 Support for localized error messages has been added.
 Support for localizing the password prompts has been added.
 Some templates for starting other DEs have been added to ~/.xinitrc.
 The interfaces of nomadbsd-setup-gui and nomadbsd-install-gui have been improved.
 A script that helps users to configure a multihead systems has been added.
 The Xorg driver for newer Intel GPUs has been changed from "intel" to "modesetting".
 /proc has been added to /etc/fstab
 A D-Bus session issue has been fixed which prevented thunar from accessing  samba shares.
 DSBBg which allows users to change and manage wallpapers has been added.
 The latest version of update_obmenu now supports auto-updating the Openbox menu. Manually updating the Openbox menu after packet (de)installation is therefore no longer needed.
Support for multiple keyboard layouts has been added.
 www/palemoon has been removed.
 mail/thunderbird has been removed.
 audio/audacity has been added.
 deskutils/orage has been added.
 the password manager fpm2 has been replaced by KeePassXC
 mail/sylpheed has been replaced by mail/claws-mail
 multimedia/simplescreenrecorder has been added.
 DSBMC has been changed to DSBMC-Qt
 Many small improvements and bug fixes.
At e2k19 nobody can hear you scream (https://undeadly.org/cgi?action=article;sid=20191204170908)
After 2 years it was once again time to pack skis and snowshoes, put a satellite dish onto a sledge and hike through the snowy rockies to the Elk Lakes hut.
I did not really have much of a plan what I wanted to work on but there were a few things I wanted to look into. One of them was rpki-client and the fact that it was so incredibly slow. Since Bob beck@ was around I started to ask him innocent X509 questions ... as if there are innocent X509 questions! Mainly about the abuse of the X509STORE in rpki-client. Pretty soon it was clear that rpki-client did it all wrong and most of the X509 verification had to be rewritten. Instead of only storing the root certificates in the store and passing the intermediate certs as a chain to the verification function rpki-client threw everything into it. The X509STORE is just not built for such an abuse and so it was no wonder that this was slow.
Lucky me I pulled benno@ with me into this dark hole of libcrypto code. He managed to build up an initial diff to pass the chains as a STACKOF(X509) and together we managed to get it working. A big thanks goes to ingo@ who documented most of the functions we had to use. Have a look at STACKOF(3) and skpopfree(3) to understand why benno@ and I slowly turned crazy.
Our next challenge was to only load the necessary certificate revocation list into the X509STORECTX. While doing those changes it became obvious that some of the data structures needed better lookup functions. Looking up certificates was done using a linear lookup and so we replaced the internal certificate and CRL tables with RB trees for fast lookups. deraadt@ also joined the rpki-client commit fest and changed the output code to use rename(2) so that files are replaced in an atomic operation. Thanks to this rpki-client can now be safely run from cron (there is an example in the default crontab).
I did not plan to spend most of my week hacking on rpki-client but in the end I'm happy that I did and the result is fairly impressive. Working with libcrypto code and especially X509 was less than pleasant. Our screams of agony died away in the snowy rocky mountains and made Bob deep dive into UVM with a smile since he knew that benno@ and I had it worse.
In case you wonder thanks to all changes at e2k19 rpki-client improved from over 20min run time to validate all VRPS to roughly 1min to do the same job. A factor 20 improvement!
Thanks to Theo, Bob and Howie to make this possible. To all the cooks for the great food and to Xplornet for providing us with Internet at the hut.
Beastie Bits
FOSDEM 2020 BSD Devroom schedule (https://fosdem.org/2020/schedule/track/bsd/)
Easy Minecraft Server on FreeBSD Howto (https://www.freebsdfoundation.org/freebsd/how-to-guides/easy-minecraft-server-on-freebsd/)
stats(3) framework in the TCP stack (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=355304)
4017 days of uptime (https://twitter.com/EdwinKremer/status/1203071684535889921)
sysget - A front-end for every package manager (https://github.com/emilengler/sysget)
PlayOnBSD’s Cross-BSD Shopping Guide (https://www.playonbsd.com/shopping_guide/)
Feedback/Questions
Pat asks about the proper disk drive type for ZFS (http://dpaste.com/2FDN26X#wrap)
Brad asks about a ZFS rosetta stone (http://dpaste.com/2X8PBMC#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 Special Guest: Mariusz Zaborski.
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, Authentication, vulnerabilities, release candidate, digitalocean, droplet, freenas, nomadbsd, e2k19, hackathon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.openwall.com/lists/oss-security/2019/12/04/5" rel="nofollow">Authentication vulnerabilities in OpenBSD</a></h3>

<ul>
<li>We discovered an authentication-bypass vulnerability in OpenBSD&#39;s authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis. For example, sshd is not exploitable thanks to its defense-in-depth mechanisms.</li>
<li>From the manual page of login.conf:</li>
</ul>

<blockquote>
<p>OpenBSD uses BSD Authentication, which is made up of a variety of authentication styles.  The authentication styles currently provided are:<br>
         passwd     Request a password and check it against the password in the master.passwd file.  See login_passwd(8).<br>
         skey       Send a challenge and request a response, checking it with S/Key (tm) authentication.  See login_skey(8).<br>
         yubikey    Authenticate using a Yubico YubiKey token.  See login_yubikey(8).<br>
         For any given style, the program /usr/libexec/auth/login_style is used to<br>
         perform the authentication.  The synopsis of this program is:<br>
         /usr/libexec/auth/login_style [-v name=value] [-s service] username class</p>
</blockquote>

<ul>
<li>This is the first piece of the puzzle: if an attacker specifies a username of the form &quot;-option&quot;, they can influence the behavior of the authentication program in unexpected ways.</li>
</ul>

<blockquote>
<pre><code> login_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user [class] The service argument specifies which protocol to use with the invoking program.  The allowed protocols are login, challenge, and response.  (The challenge protocol is silently ignored but will report success as passwd-style authentication is not challenge-response based).
</code></pre>
</blockquote>

<ul>
<li>This is the second piece of the puzzle: if an attacker specifies the username &quot;-schallenge&quot; (or &quot;-schallenge:passwd&quot; to force a passwd-style authentication), then the authentication is automatically successful and therefore bypassed.</li>
<li>Case study: smtpd</li>
<li>Case study: ldapd</li>
<li>Case study: radiusd</li>
<li>Case study: sshd</li>
<li>Acknowledgments: We thank Theo de Raadt and the OpenBSD developers for their incredibly quick response: they published patches for these vulnerabilities less than 40 hours after our initial contact. We also thank MITRE&#39;s CVE Assignment Team.</li>
</ul>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/first_release_candidate_for_netbsd" rel="nofollow">First release candidate for NetBSD 9.0 available!</a></h3>

<ul>
<li>Since the start of the release process four months ago a lot of improvements went into the branch - more than 500 pullups were processed!</li>
<li>This includes usbnet (a common framework for usb ethernet drivers), aarch64 stability enhancements and lots of new hardware support, installer/sysinst fixes and changes to the NVMM (hardware virtualization) interface.</li>
<li>We hope this will lead to the best NetBSD release ever (only to be topped by NetBSD 10 next year).</li>
<li><p>Here are a few highlights of the new release:</p>

<blockquote>
<p>Support for Arm AArch64 (64-bit Armv8-A) machines, including &quot;Arm ServerReady&quot;<br>
compliant machines (SBBR+SBSA)<br>
Enhanced hardware support for Armv7-A<br>
Updated GPU drivers (e.g. support for Intel Kabylake)<br>
Enhanced virtualization support<br>
Support for hardware-accelerated virtualization (NVMM)<br>
Support for Performance Monitoring Counters<br>
Support for Kernel ASLR<br>
Support several kernel sanitizers (KLEAK, KASAN, KUBSAN)<br>
Support for userland sanitizers<br>
Audit of the network stack<br>
Many improvements in NPF<br>
Updated ZFS<br>
Reworked error handling and NCQ support in the SATA subsystem<br>
Support a common framework for USB Ethernet drivers (usbnet)</p>
</blockquote></li>
<li><p>More information on the RC can be found on the <a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html" rel="nofollow">NetBSD 9 release page</a></p></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.shlomimarco.com/post/running-freenas-on-a-digitalocean-droplet" rel="nofollow">Running FreeNAS on a Digitalocean droplet</a></h3>

<ul>
<li>ZFS is awesome. FreeBSD even more so. FreeNAS is the battle-tested, enterprise-ready-yet-home-user-friendly software defined storage solution which is cooler then deep space, based on FreeBSD and makes heavy use of ZFS. This is what I (and soooooo many others) use for just about any storage-related task. I can go on and on and on about what makes it great, but if you&#39;re here, reading this, you probably know all that already and we can skip ahead.</li>
<li>I&#39;ve needed an offsite FreeNAS setup to replicate things to, to run some things, to do some stuff, basically, my privately-owned, tightly-controlled NAS appliance in the cloud, one I control from top to bottom and with support for whatever crazy thing I&#39;m trying to do. Since I&#39;m using DigitalOcean as my main VPS provider, it seemed logical to run FreeNAS there, however, you can&#39;t. While DO supports many many distos and pre-setup applications (e.g OpenVPN), FreeNAS isn&#39;t a supported feature, at least not in the traditional way :)</li>
<li>Before we begin, here&#39;s the gist of what we&#39;re going to do:</li>
</ul>

<blockquote>
<p>Base of a FreeBSD droplet, we&#39;ll re-image our boot block device with FreeNAS iso. We&#39;ll then install FreeNAS on the second block device. Once done we&#39;re going to do the ol&#39; switcheroo: we&#39;re going to re-image our original boot block device using the now FreeNAS-installed second block device. </p>
</blockquote>

<ul>
<li>Part 1: re-image our boot block device to boot FreeNAS install media.</li>
<li>Part 2: Install FreeNAS on the second block-device</li>
<li>Part 3: Re-image the boot block device using the FreeNAS-installed block device</li>
</ul>

<hr>

<h3><a href="https://nomadbsd.org/" rel="nofollow">NomadBSD 1.3 is now available</a></h3>

<ul>
<li>From the release notes:</li>
</ul>

<blockquote>
<p>The base system has been changed to FreeBSD 12.1-RELEASE-p1<br>
 Due to a deadlock problem, FreeBSD&#39;s unionfs has been replaced by unionfs-fuse<br>
 The GPT layout has been changed to MBR. This prevents problems with Lenovo<br>
 systems that refuse to boot from GPT if &quot;lenovofix&quot; is not set, and systems that<br>
 hang on boot if &quot;lenovofix&quot; is set.<br>
 Support for ZFS installations has been added to the NomadBSD installer.<br>
 The rc-script for setting up the network interfaces has been fixed and improved.<br>
 Support for setting the country code for the wlan device has been added.<br>
 Auto configuration for running in VirtualBox has been added.<br>
 A check for the default display has been added to the graphics configuration scripts. This fixes problems where users with Optimus have their NVIDIA card disabled, and use the integrated graphics chip instead.<br>
 NVIDIA driver version 440 has been added.<br>
 nomadbsd-dmconfig, a Qt tool for selecting the display manager theme, setting the<br>
default user and autologin has been added.<br>
 nomadbsd-adduser, a Qt tool for added preconfigured user accounts to the system has been added.<br>
 Martin Orszulik added Czech translations to the setup and installation wizard.<br>
 The NomadBSD logo, designed by Ian Grindley, has been changed.<br>
 Support for localized error messages has been added.<br>
 Support for localizing the password prompts has been added.<br>
 Some templates for starting other DEs have been added to ~/.xinitrc.<br>
 The interfaces of nomadbsd-setup-gui and nomadbsd-install-gui have been improved.<br>
 A script that helps users to configure a multihead systems has been added.<br>
 The Xorg driver for newer Intel GPUs has been changed from &quot;intel&quot; to &quot;modesetting&quot;.<br>
 /proc has been added to /etc/fstab<br>
 A D-Bus session issue has been fixed which prevented thunar from accessing  samba shares.<br>
 DSBBg which allows users to change and manage wallpapers has been added.<br>
 The latest version of update_obmenu now supports auto-updating the Openbox menu. Manually updating the Openbox menu after packet (de)installation is therefore no longer needed.</p>

<p>Support for multiple keyboard layouts has been added.<br>
 www/palemoon has been removed.<br>
 mail/thunderbird has been removed.<br>
 audio/audacity has been added.<br>
 deskutils/orage has been added.<br>
 the password manager fpm2 has been replaced by KeePassXC<br>
 mail/sylpheed has been replaced by mail/claws-mail<br>
 multimedia/simplescreenrecorder has been added.<br>
 DSBMC has been changed to DSBMC-Qt<br>
 Many small improvements and bug fixes.</p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20191204170908" rel="nofollow">At e2k19 nobody can hear you scream</a></h3>

<ul>
<li>After 2 years it was once again time to pack skis and snowshoes, put a satellite dish onto a sledge and hike through the snowy rockies to the Elk Lakes hut.</li>
<li>I did not really have much of a plan what I wanted to work on but there were a few things I wanted to look into. One of them was rpki-client and the fact that it was so incredibly slow. Since Bob beck@ was around I started to ask him innocent X509 questions ... as if there are innocent X509 questions! Mainly about the abuse of the X509_STORE in rpki-client. Pretty soon it was clear that rpki-client did it all wrong and most of the X509 verification had to be rewritten. Instead of only storing the root certificates in the store and passing the intermediate certs as a chain to the verification function rpki-client threw everything into it. The X509_STORE is just not built for such an abuse and so it was no wonder that this was slow.</li>
<li>Lucky me I pulled benno@ with me into this dark hole of libcrypto code. He managed to build up an initial diff to pass the chains as a STACK_OF(X509) and together we managed to get it working. A big thanks goes to ingo@ who documented most of the functions we had to use. Have a look at STACK_OF(3) and sk_pop_free(3) to understand why benno@ and I slowly turned crazy.</li>
<li>Our next challenge was to only load the necessary certificate revocation list into the X509_STORE_CTX. While doing those changes it became obvious that some of the data structures needed better lookup functions. Looking up certificates was done using a linear lookup and so we replaced the internal certificate and CRL tables with RB trees for fast lookups. deraadt@ also joined the rpki-client commit fest and changed the output code to use rename(2) so that files are replaced in an atomic operation. Thanks to this rpki-client can now be safely run from cron (there is an example in the default crontab).</li>
<li>I did not plan to spend most of my week hacking on rpki-client but in the end I&#39;m happy that I did and the result is fairly impressive. Working with libcrypto code and especially X509 was less than pleasant. Our screams of agony died away in the snowy rocky mountains and made Bob deep dive into UVM with a smile since he knew that benno@ and I had it worse.</li>
<li>In case you wonder thanks to all changes at e2k19 rpki-client improved from over 20min run time to validate all VRPS to roughly 1min to do the same job. A factor 20 improvement!</li>
<li>Thanks to Theo, Bob and Howie to make this possible. To all the cooks for the great food and to Xplornet for providing us with Internet at the hut.</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://fosdem.org/2020/schedule/track/bsd/" rel="nofollow">FOSDEM 2020 BSD Devroom schedule</a></li>
<li><a href="https://www.freebsdfoundation.org/freebsd/how-to-guides/easy-minecraft-server-on-freebsd/" rel="nofollow">Easy Minecraft Server on FreeBSD Howto</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=355304" rel="nofollow">stats(3) framework in the TCP stack</a></li>
<li><a href="https://twitter.com/EdwinKremer/status/1203071684535889921" rel="nofollow">4017 days of uptime</a></li>
<li><a href="https://github.com/emilengler/sysget" rel="nofollow">sysget - A front-end for every package manager</a></li>
<li><a href="https://www.playonbsd.com/shopping_guide/" rel="nofollow">PlayOnBSD’s Cross-BSD Shopping Guide</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/2FDN26X#wrap" rel="nofollow">Pat asks about the proper disk drive type for ZFS</a></li>
<li><a href="http://dpaste.com/2X8PBMC#wrap" rel="nofollow">Brad asks about a ZFS rosetta stone</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0330.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video><p>Special Guest: Mariusz Zaborski.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.openwall.com/lists/oss-security/2019/12/04/5" rel="nofollow">Authentication vulnerabilities in OpenBSD</a></h3>

<ul>
<li>We discovered an authentication-bypass vulnerability in OpenBSD&#39;s authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis. For example, sshd is not exploitable thanks to its defense-in-depth mechanisms.</li>
<li>From the manual page of login.conf:</li>
</ul>

<blockquote>
<p>OpenBSD uses BSD Authentication, which is made up of a variety of authentication styles.  The authentication styles currently provided are:<br>
         passwd     Request a password and check it against the password in the master.passwd file.  See login_passwd(8).<br>
         skey       Send a challenge and request a response, checking it with S/Key (tm) authentication.  See login_skey(8).<br>
         yubikey    Authenticate using a Yubico YubiKey token.  See login_yubikey(8).<br>
         For any given style, the program /usr/libexec/auth/login_style is used to<br>
         perform the authentication.  The synopsis of this program is:<br>
         /usr/libexec/auth/login_style [-v name=value] [-s service] username class</p>
</blockquote>

<ul>
<li>This is the first piece of the puzzle: if an attacker specifies a username of the form &quot;-option&quot;, they can influence the behavior of the authentication program in unexpected ways.</li>
</ul>

<blockquote>
<pre><code> login_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user [class] The service argument specifies which protocol to use with the invoking program.  The allowed protocols are login, challenge, and response.  (The challenge protocol is silently ignored but will report success as passwd-style authentication is not challenge-response based).
</code></pre>
</blockquote>

<ul>
<li>This is the second piece of the puzzle: if an attacker specifies the username &quot;-schallenge&quot; (or &quot;-schallenge:passwd&quot; to force a passwd-style authentication), then the authentication is automatically successful and therefore bypassed.</li>
<li>Case study: smtpd</li>
<li>Case study: ldapd</li>
<li>Case study: radiusd</li>
<li>Case study: sshd</li>
<li>Acknowledgments: We thank Theo de Raadt and the OpenBSD developers for their incredibly quick response: they published patches for these vulnerabilities less than 40 hours after our initial contact. We also thank MITRE&#39;s CVE Assignment Team.</li>
</ul>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/first_release_candidate_for_netbsd" rel="nofollow">First release candidate for NetBSD 9.0 available!</a></h3>

<ul>
<li>Since the start of the release process four months ago a lot of improvements went into the branch - more than 500 pullups were processed!</li>
<li>This includes usbnet (a common framework for usb ethernet drivers), aarch64 stability enhancements and lots of new hardware support, installer/sysinst fixes and changes to the NVMM (hardware virtualization) interface.</li>
<li>We hope this will lead to the best NetBSD release ever (only to be topped by NetBSD 10 next year).</li>
<li><p>Here are a few highlights of the new release:</p>

<blockquote>
<p>Support for Arm AArch64 (64-bit Armv8-A) machines, including &quot;Arm ServerReady&quot;<br>
compliant machines (SBBR+SBSA)<br>
Enhanced hardware support for Armv7-A<br>
Updated GPU drivers (e.g. support for Intel Kabylake)<br>
Enhanced virtualization support<br>
Support for hardware-accelerated virtualization (NVMM)<br>
Support for Performance Monitoring Counters<br>
Support for Kernel ASLR<br>
Support several kernel sanitizers (KLEAK, KASAN, KUBSAN)<br>
Support for userland sanitizers<br>
Audit of the network stack<br>
Many improvements in NPF<br>
Updated ZFS<br>
Reworked error handling and NCQ support in the SATA subsystem<br>
Support a common framework for USB Ethernet drivers (usbnet)</p>
</blockquote></li>
<li><p>More information on the RC can be found on the <a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html" rel="nofollow">NetBSD 9 release page</a></p></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.shlomimarco.com/post/running-freenas-on-a-digitalocean-droplet" rel="nofollow">Running FreeNAS on a Digitalocean droplet</a></h3>

<ul>
<li>ZFS is awesome. FreeBSD even more so. FreeNAS is the battle-tested, enterprise-ready-yet-home-user-friendly software defined storage solution which is cooler then deep space, based on FreeBSD and makes heavy use of ZFS. This is what I (and soooooo many others) use for just about any storage-related task. I can go on and on and on about what makes it great, but if you&#39;re here, reading this, you probably know all that already and we can skip ahead.</li>
<li>I&#39;ve needed an offsite FreeNAS setup to replicate things to, to run some things, to do some stuff, basically, my privately-owned, tightly-controlled NAS appliance in the cloud, one I control from top to bottom and with support for whatever crazy thing I&#39;m trying to do. Since I&#39;m using DigitalOcean as my main VPS provider, it seemed logical to run FreeNAS there, however, you can&#39;t. While DO supports many many distos and pre-setup applications (e.g OpenVPN), FreeNAS isn&#39;t a supported feature, at least not in the traditional way :)</li>
<li>Before we begin, here&#39;s the gist of what we&#39;re going to do:</li>
</ul>

<blockquote>
<p>Base of a FreeBSD droplet, we&#39;ll re-image our boot block device with FreeNAS iso. We&#39;ll then install FreeNAS on the second block device. Once done we&#39;re going to do the ol&#39; switcheroo: we&#39;re going to re-image our original boot block device using the now FreeNAS-installed second block device. </p>
</blockquote>

<ul>
<li>Part 1: re-image our boot block device to boot FreeNAS install media.</li>
<li>Part 2: Install FreeNAS on the second block-device</li>
<li>Part 3: Re-image the boot block device using the FreeNAS-installed block device</li>
</ul>

<hr>

<h3><a href="https://nomadbsd.org/" rel="nofollow">NomadBSD 1.3 is now available</a></h3>

<ul>
<li>From the release notes:</li>
</ul>

<blockquote>
<p>The base system has been changed to FreeBSD 12.1-RELEASE-p1<br>
 Due to a deadlock problem, FreeBSD&#39;s unionfs has been replaced by unionfs-fuse<br>
 The GPT layout has been changed to MBR. This prevents problems with Lenovo<br>
 systems that refuse to boot from GPT if &quot;lenovofix&quot; is not set, and systems that<br>
 hang on boot if &quot;lenovofix&quot; is set.<br>
 Support for ZFS installations has been added to the NomadBSD installer.<br>
 The rc-script for setting up the network interfaces has been fixed and improved.<br>
 Support for setting the country code for the wlan device has been added.<br>
 Auto configuration for running in VirtualBox has been added.<br>
 A check for the default display has been added to the graphics configuration scripts. This fixes problems where users with Optimus have their NVIDIA card disabled, and use the integrated graphics chip instead.<br>
 NVIDIA driver version 440 has been added.<br>
 nomadbsd-dmconfig, a Qt tool for selecting the display manager theme, setting the<br>
default user and autologin has been added.<br>
 nomadbsd-adduser, a Qt tool for added preconfigured user accounts to the system has been added.<br>
 Martin Orszulik added Czech translations to the setup and installation wizard.<br>
 The NomadBSD logo, designed by Ian Grindley, has been changed.<br>
 Support for localized error messages has been added.<br>
 Support for localizing the password prompts has been added.<br>
 Some templates for starting other DEs have been added to ~/.xinitrc.<br>
 The interfaces of nomadbsd-setup-gui and nomadbsd-install-gui have been improved.<br>
 A script that helps users to configure a multihead systems has been added.<br>
 The Xorg driver for newer Intel GPUs has been changed from &quot;intel&quot; to &quot;modesetting&quot;.<br>
 /proc has been added to /etc/fstab<br>
 A D-Bus session issue has been fixed which prevented thunar from accessing  samba shares.<br>
 DSBBg which allows users to change and manage wallpapers has been added.<br>
 The latest version of update_obmenu now supports auto-updating the Openbox menu. Manually updating the Openbox menu after packet (de)installation is therefore no longer needed.</p>

<p>Support for multiple keyboard layouts has been added.<br>
 www/palemoon has been removed.<br>
 mail/thunderbird has been removed.<br>
 audio/audacity has been added.<br>
 deskutils/orage has been added.<br>
 the password manager fpm2 has been replaced by KeePassXC<br>
 mail/sylpheed has been replaced by mail/claws-mail<br>
 multimedia/simplescreenrecorder has been added.<br>
 DSBMC has been changed to DSBMC-Qt<br>
 Many small improvements and bug fixes.</p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20191204170908" rel="nofollow">At e2k19 nobody can hear you scream</a></h3>

<ul>
<li>After 2 years it was once again time to pack skis and snowshoes, put a satellite dish onto a sledge and hike through the snowy rockies to the Elk Lakes hut.</li>
<li>I did not really have much of a plan what I wanted to work on but there were a few things I wanted to look into. One of them was rpki-client and the fact that it was so incredibly slow. Since Bob beck@ was around I started to ask him innocent X509 questions ... as if there are innocent X509 questions! Mainly about the abuse of the X509_STORE in rpki-client. Pretty soon it was clear that rpki-client did it all wrong and most of the X509 verification had to be rewritten. Instead of only storing the root certificates in the store and passing the intermediate certs as a chain to the verification function rpki-client threw everything into it. The X509_STORE is just not built for such an abuse and so it was no wonder that this was slow.</li>
<li>Lucky me I pulled benno@ with me into this dark hole of libcrypto code. He managed to build up an initial diff to pass the chains as a STACK_OF(X509) and together we managed to get it working. A big thanks goes to ingo@ who documented most of the functions we had to use. Have a look at STACK_OF(3) and sk_pop_free(3) to understand why benno@ and I slowly turned crazy.</li>
<li>Our next challenge was to only load the necessary certificate revocation list into the X509_STORE_CTX. While doing those changes it became obvious that some of the data structures needed better lookup functions. Looking up certificates was done using a linear lookup and so we replaced the internal certificate and CRL tables with RB trees for fast lookups. deraadt@ also joined the rpki-client commit fest and changed the output code to use rename(2) so that files are replaced in an atomic operation. Thanks to this rpki-client can now be safely run from cron (there is an example in the default crontab).</li>
<li>I did not plan to spend most of my week hacking on rpki-client but in the end I&#39;m happy that I did and the result is fairly impressive. Working with libcrypto code and especially X509 was less than pleasant. Our screams of agony died away in the snowy rocky mountains and made Bob deep dive into UVM with a smile since he knew that benno@ and I had it worse.</li>
<li>In case you wonder thanks to all changes at e2k19 rpki-client improved from over 20min run time to validate all VRPS to roughly 1min to do the same job. A factor 20 improvement!</li>
<li>Thanks to Theo, Bob and Howie to make this possible. To all the cooks for the great food and to Xplornet for providing us with Internet at the hut.</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://fosdem.org/2020/schedule/track/bsd/" rel="nofollow">FOSDEM 2020 BSD Devroom schedule</a></li>
<li><a href="https://www.freebsdfoundation.org/freebsd/how-to-guides/easy-minecraft-server-on-freebsd/" rel="nofollow">Easy Minecraft Server on FreeBSD Howto</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=355304" rel="nofollow">stats(3) framework in the TCP stack</a></li>
<li><a href="https://twitter.com/EdwinKremer/status/1203071684535889921" rel="nofollow">4017 days of uptime</a></li>
<li><a href="https://github.com/emilengler/sysget" rel="nofollow">sysget - A front-end for every package manager</a></li>
<li><a href="https://www.playonbsd.com/shopping_guide/" rel="nofollow">PlayOnBSD’s Cross-BSD Shopping Guide</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/2FDN26X#wrap" rel="nofollow">Pat asks about the proper disk drive type for ZFS</a></li>
<li><a href="http://dpaste.com/2X8PBMC#wrap" rel="nofollow">Brad asks about a ZFS rosetta stone</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0330.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video><p>Special Guest: Mariusz Zaborski.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>310: My New Free NAS</title>
  <link>https://www.bsdnow.tv/310</link>
  <guid isPermaLink="false">11bc3886-8630-42e4-8ce6-a97cfce82f4d</guid>
  <pubDate>Wed, 07 Aug 2019 23:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/11bc3886-8630-42e4-8ce6-a97cfce82f4d.mp3" length="34679977" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>
OPNsense 19.7.1 is out, ZFS on Linux still has annoying issues with ARC size, Hammer2 is now default, NetBSD audio – an application perspective, new FreeNAS Mini, and more. </itunes:subtitle>
  <itunes:duration>48:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>OPNsense 19.7.1 is out, ZFS on Linux still has annoying issues with ARC size, Hammer2 is now default, NetBSD audio – an application perspective, new FreeNAS Mini, and more. 
Headlines
OPNsense 19.7.1 (https://opnsense.org/opnsense-19-7-1-released/)
We do not wish to keep you from enjoying your summer time, but this
is a recommended security update enriched with reliability fixes for the
new 19.7 series.  Of special note are performance improvements as well
as a fix for a longstanding NAT before IPsec limitation.
Full patch notes:
system: do not create automatic copies of existing gateways
system: do not translate empty tunables descriptions
system: remove unwanted form action tags
system: do not include Syslog-ng in rc.freebsd handler
system: fix manual system log stop/start/restart
system: scoped IPv6 "%" could confuse mwexecf(), use plain mwexec() instead
system: allow curl-based downloads to use both trusted and local authorities
system: fix group privilege print and correctly redirect after edit
system: use cached address list in referrer check
system: fix Syslog-ng search stats
firewall: HTML-escape dynamic entries to display aliases
firewall: display correct IP version in automatic rules
firewall: fix a warning while reading empty outbound rules configuration
firewall: skip illegal log lines in live log
interfaces: performance improvements for configurations with hundreds of interfaces
reporting: performance improvements for Python 3 NetFlow aggregator rewrite
dhcp: move advanced router advertisement options to correct config section
ipsec: replace global array access with function to ensure side-effect free boot
ipsec: change DPD action on start to "dpdaction = restart"
ipsec: remove already default "dpdaction = none" if not set
ipsec: use interface IP address in local ID when doing NAT before IPsec
web proxy: fix database reset for Squid 4 by replacing use of sslcrtd with securityfile_certgen
plugins: os-acme-client 1.24[1]
plugins: os-bind 1.6[2]
plugins: os-dnscrypt-proxy 1.5[3]
plugins: os-frr now restricts characters BGP prefix-list and route-maps[4]
plugins: os-google-cloud-sdk 1.0[5]
ports: curl 7.65.3[6]
ports: monit 5.26.0[7]
ports: openssh 8.0p1[8]
ports: php 7.2.20[9]
ports: python 3.7.4[10]
ports: sqlite 3.29.0[11]
ports: squid 4.8[12]
Stay safe and hydrated, Your OPNsense team
ZFS on Linux still has annoying issues with ARC size (https://utcc.utoronto.ca/~cks/space/blog/linux/ZFSOnLinuxARCShrinkage)
One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS's auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.
Linux's regular filesystem disk cache is very predictable; if you do disk IO, the cache will relentlessly grow to use all of your free memory. This sometimes disconcerts people when free reports that there's very little memory actually free, but at least you're getting value from your RAM. This is so reliable and regular that we generally don't think about 'is my system going to use all of my RAM as a disk cache', because the answer is always 'yes'. (The general filesystem cache is also called the page cache.)
This is unfortunately not the case with the ZFS ARC in ZFS on Linux (and it wasn't necessarily the case even on Solaris). ZFS has both a current size and a 'target size' for the ARC (called 'c' in ZFS statistics). When your system boots this target size starts out as the maximum allowed size for the ARC, but various events afterward can cause it to be reduced (which obviously limits the size of your ARC, since that's its purpose). In practice, this reduction in the target size is both pretty sticky and rather mysterious (as ZFS on Linux doesn't currently expose enough statistics to tell why your ARC target size shrunk in any particular case).
The net effect is that the ZFS ARC is not infrequently quite shy and hesitant about using memory, in stark contrast to Linux's normal filesystem cache. The default maximum ARC size starts out as only half of your RAM (unlike the regular filesystem cache, which will use all of it), and then it shrinks from there, sometimes very significantly, and once shrunk it only recovers slowly (if at all).
News Roundup
Hammer2 is now default (http://lists.dragonflybsd.org/pipermail/commits/2019-June/718989.html)
```
commit a49112761c919d42d405ec10252eb0553662c824
Author: Matthew Dillon 
Date:   Mon Jun 10 17:53:46 2019 -0700
installer - Default to HAMMER2

* Change the installer default from HAMMER1 to HAMMER2.

* Adjust the nrelease build to print the location of the image files
  when it finishes.
Summary of changes:
 nrelease/Makefile                          |  2 +-
 usr.sbin/installer/dfuibe_installer/flow.c | 20 ++++++++++----------
 2 files changed, 11 insertions(+), 11 deletions(-)
http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/a49112761c919d42d405ec10252eb0553662c824
```
NetBSD audio – an application perspective (https://netbsd.org/gallery/presentations/nia/netbsd-audio/)
NetBSD audio – an application perspective ... or, "doing it natively, because we can"
audio options for NetBSD in pkgsrc
Use NetBSD native audio (sun audio/audioio.h)
Or OSS emulation layer: Basically a wrapper around sun audio in the kernel. Incomplete and old version, but works for simple stuff
Many many abstraction layers available:
OpenAL-Soft
alsa-lib (config file required)
libao, GStreamer (plugins!)
PortAudio, SDL
PulseAudio, JACK
... lots more!? some obsolete stuff (esd, nas?)
Advantages of using NetBSD audio directly
Low latency, low CPU usage: Abstraction layers differ in latency (SDL2 vs ALSA/OpenAL)
Query device information: Is /dev/audio1 a USB microphone or another sound card?
Avoid bugs from excessive layering
Nice API, well documented: [nia note: I had no idea how to write audio code. I read a man page and now I do.]
Your code might work on illumos too
[nia note: SDL2 seems very sensitive to the blk_ms sysctl being high or low, with other implementations there seems to be a less noticable difference. I don't know why.]
New FreeNAS Mini (https://www.ixsystems.com/blog/new-freenas-mini-models-release-pr/)
Two new FreeNAS Mini systems join the very popular FreeNAS Mini and Mini XL:
FreeNAS Mini XL+: This powerful 10 Bay platform (8x 3.5” and 1x 2.5” hot-swap, 1x 2.5” internal) includes the latest, compact server technology and provides dual 10GbE ports, 8 CPU cores and 32 GB RAM for high performance workgroups. The Mini XL+ scales beyond 100TB and is ideal for very demanding applications, including hosting virtual machines and multimedia editing. Starting at $1499, the Mini XL+ configured with cache SSD and 80 TB capacity is $4299, and consumes about 100 Watts.
FreeNAS Mini E: This cost-effective 4 Bay platform provides the resources required for SOHO use with quad GbE ports and 8 GB of RAM. The Mini E is ideal for file sharing, streaming and transcoding video at 1080p. Starting at $749, the Mini E configured with 8 TB capacity is $999, and consumes about 36 Watts.
Beastie Bits
Welcome to NetBSD 9.99.1! (https://mail-index.netbsd.org/source-changes/2019/07/30/msg107671.html)
Berkeley smorgasbord — part II (http://blog.snailtext.com/posts/berkeley-smorgasbord-part-2.html)
dtracing postgres (https://www.youtube.com/watch?v=Brt41xnMZqo&amp;amp;list=PLuJmmKtsV1dOTmlImlD9U5j1P1rLxS2V8&amp;amp;index=20&amp;amp;t=0s)
Project Trident 19.07-U1 now available (https://project-trident.org/post/2019-07-30_19.07-u1_available/)
Need a Secure Operating System? Take a Look at OpenBSD (https://www.devprojournal.com/technology-trends/operating-systems/need-a-secure-operating-system-take-a-look-at-openbsd/)
Feedback/Questions
Jeff - OpenZFS Port Testing Feedback (http://dpaste.com/2AT7JGP#wrap)
Malcolm - Best Practices for Custom Ports (http://dpaste.com/1R170D7)
Michael - Little Correction (http://dpaste.com/0CERP6R)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords> freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, opnsense, zfs, arc, hammer2, audio, freenas, mini</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OPNsense 19.7.1 is out, ZFS on Linux still has annoying issues with ARC size, Hammer2 is now default, NetBSD audio – an application perspective, new FreeNAS Mini, and more. </p>

<h2>Headlines</h2>

<h3><a href="https://opnsense.org/opnsense-19-7-1-released/" rel="nofollow">OPNsense 19.7.1</a></h3>

<blockquote>
<p>We do not wish to keep you from enjoying your summer time, but this<br>
is a recommended security update enriched with reliability fixes for the<br>
new 19.7 series.  Of special note are performance improvements as well<br>
as a fix for a longstanding NAT before IPsec limitation.</p>

<p>Full patch notes:</p>
</blockquote>

<ul>
<li>system: do not create automatic copies of existing gateways</li>
<li>system: do not translate empty tunables descriptions</li>
<li>system: remove unwanted form action tags</li>
<li>system: do not include Syslog-ng in rc.freebsd handler</li>
<li>system: fix manual system log stop/start/restart</li>
<li>system: scoped IPv6 &quot;%&quot; could confuse mwexecf(), use plain mwexec() instead</li>
<li>system: allow curl-based downloads to use both trusted and local authorities</li>
<li>system: fix group privilege print and correctly redirect after edit</li>
<li>system: use cached address list in referrer check</li>
<li>system: fix Syslog-ng search stats</li>
<li>firewall: HTML-escape dynamic entries to display aliases</li>
<li>firewall: display correct IP version in automatic rules</li>
<li>firewall: fix a warning while reading empty outbound rules configuration</li>
<li>firewall: skip illegal log lines in live log</li>
<li>interfaces: performance improvements for configurations with hundreds of interfaces</li>
<li>reporting: performance improvements for Python 3 NetFlow aggregator rewrite</li>
<li>dhcp: move advanced router advertisement options to correct config section</li>
<li>ipsec: replace global array access with function to ensure side-effect free boot</li>
<li>ipsec: change DPD action on start to &quot;dpdaction = restart&quot;</li>
<li>ipsec: remove already default &quot;dpdaction = none&quot; if not set</li>
<li>ipsec: use interface IP address in local ID when doing NAT before IPsec</li>
<li>web proxy: fix database reset for Squid 4 by replacing use of ssl_crtd with security_file_certgen</li>
<li>plugins: os-acme-client 1.24[1]</li>
<li>plugins: os-bind 1.6[2]</li>
<li>plugins: os-dnscrypt-proxy 1.5[3]</li>
<li>plugins: os-frr now restricts characters BGP prefix-list and route-maps[4]</li>
<li>plugins: os-google-cloud-sdk 1.0[5]</li>
<li>ports: curl 7.65.3[6]</li>
<li>ports: monit 5.26.0[7]</li>
<li>ports: openssh 8.0p1[8]</li>
<li>ports: php 7.2.20[9]</li>
<li>ports: python 3.7.4[10]</li>
<li>ports: sqlite 3.29.0[11]</li>
<li>ports: squid 4.8[12]</li>
</ul>

<blockquote>
<p>Stay safe and hydrated, Your OPNsense team</p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/linux/ZFSOnLinuxARCShrinkage" rel="nofollow">ZFS on Linux still has annoying issues with ARC size</a></h3>

<p><code>One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS&#39;s auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.</code></p>

<blockquote>
<p>Linux&#39;s regular filesystem disk cache is very predictable; if you do disk IO, the cache will relentlessly grow to use all of your free memory. This sometimes disconcerts people when free reports that there&#39;s very little memory actually free, but at least you&#39;re getting value from your RAM. This is so reliable and regular that we generally don&#39;t think about &#39;is my system going to use all of my RAM as a disk cache&#39;, because the answer is always &#39;yes&#39;. (The general filesystem cache is also called the page cache.)</p>

<p>This is unfortunately not the case with the ZFS ARC in ZFS on Linux (and it wasn&#39;t necessarily the case even on Solaris). ZFS has both a current size and a &#39;target size&#39; for the ARC (called &#39;c&#39; in ZFS statistics). When your system boots this target size starts out as the maximum allowed size for the ARC, but various events afterward can cause it to be reduced (which obviously limits the size of your ARC, since that&#39;s its purpose). In practice, this reduction in the target size is both pretty sticky and rather mysterious (as ZFS on Linux doesn&#39;t currently expose enough statistics to tell why your ARC target size shrunk in any particular case).</p>

<p>The net effect is that the ZFS ARC is not infrequently quite shy and hesitant about using memory, in stark contrast to Linux&#39;s normal filesystem cache. The default maximum ARC size starts out as only half of your RAM (unlike the regular filesystem cache, which will use all of it), and then it shrinks from there, sometimes very significantly, and once shrunk it only recovers slowly (if at all).</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2019-June/718989.html" rel="nofollow">Hammer2 is now default</a></h3>

<pre><code>commit a49112761c919d42d405ec10252eb0553662c824
Author: Matthew Dillon &lt;dillon at apollo.backplane.com&gt;
Date:   Mon Jun 10 17:53:46 2019 -0700

    installer - Default to HAMMER2

    * Change the installer default from HAMMER1 to HAMMER2.

    * Adjust the nrelease build to print the location of the image files
      when it finishes.

Summary of changes:
 nrelease/Makefile                          |  2 +-
 usr.sbin/installer/dfuibe_installer/flow.c | 20 ++++++++++----------
 2 files changed, 11 insertions(+), 11 deletions(-)

http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/a49112761c919d42d405ec10252eb0553662c824
</code></pre>

<hr>

<h3><a href="https://netbsd.org/gallery/presentations/nia/netbsd-audio/" rel="nofollow">NetBSD audio – an application perspective</a></h3>

<blockquote>
<p>NetBSD audio – an application perspective ... or, &quot;doing it natively, because we can&quot;</p>
</blockquote>

<ul>
<li><p>audio options for NetBSD in pkgsrc</p>

<ul>
<li>Use NetBSD native audio (sun audio/audioio.h)</li>
<li>Or OSS emulation layer: Basically a wrapper around sun audio in the kernel. Incomplete and old version, but works for simple stuff</li>
</ul></li>
<li><p>Many many abstraction layers available:</p>

<ul>
<li>OpenAL-Soft</li>
<li>alsa-lib (config file required)</li>
<li>libao, GStreamer (plugins!)</li>
<li>PortAudio, SDL</li>
<li>PulseAudio, JACK</li>
<li>... lots more!? some obsolete stuff (esd, nas?)</li>
</ul></li>
<li><p>Advantages of using NetBSD audio directly</p>

<ul>
<li>Low latency, low CPU usage: Abstraction layers differ in latency (SDL2 vs ALSA/OpenAL)</li>
<li>Query device information: Is /dev/audio1 a USB microphone or another sound card?</li>
<li>Avoid bugs from excessive layering</li>
<li>Nice API, well documented: [nia note: I had no idea how to write audio code. I read a man page and now I do.]</li>
<li>Your code might work on illumos too</li>
</ul></li>
<li><p>[nia note: SDL2 seems very sensitive to the blk_ms sysctl being high or low, with other implementations there seems to be a less noticable difference. I don&#39;t know why.]</p></li>
</ul>

<hr>

<h3><a href="https://www.ixsystems.com/blog/new-freenas-mini-models-release-pr/" rel="nofollow">New FreeNAS Mini</a></h3>

<blockquote>
<p>Two new FreeNAS Mini systems join the very popular FreeNAS Mini and Mini XL:</p>

<p>FreeNAS Mini XL+: This powerful 10 Bay platform (8x 3.5” and 1x 2.5” hot-swap, 1x 2.5” internal) includes the latest, compact server technology and provides dual 10GbE ports, 8 CPU cores and 32 GB RAM for high performance workgroups. The Mini XL+ scales beyond 100TB and is ideal for very demanding applications, including hosting virtual machines and multimedia editing. Starting at $1499, the Mini XL+ configured with cache SSD and 80 TB capacity is $4299, and consumes about 100 Watts.</p>

<p>FreeNAS Mini E: This cost-effective 4 Bay platform provides the resources required for SOHO use with quad GbE ports and 8 GB of RAM. The Mini E is ideal for file sharing, streaming and transcoding video at 1080p. Starting at $749, the Mini E configured with 8 TB capacity is $999, and consumes about 36 Watts.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2019/07/30/msg107671.html" rel="nofollow">Welcome to NetBSD 9.99.1!</a></li>
<li><a href="http://blog.snailtext.com/posts/berkeley-smorgasbord-part-2.html" rel="nofollow">Berkeley smorgasbord — part II</a></li>
<li><a href="https://www.youtube.com/watch?v=Brt41xnMZqo&list=PLuJmmKtsV1dOTmlImlD9U5j1P1rLxS2V8&index=20&t=0s" rel="nofollow">dtracing postgres</a></li>
<li><a href="https://project-trident.org/post/2019-07-30_19.07-u1_available/" rel="nofollow">Project Trident 19.07-U1 now available</a></li>
<li><a href="https://www.devprojournal.com/technology-trends/operating-systems/need-a-secure-operating-system-take-a-look-at-openbsd/" rel="nofollow">Need a Secure Operating System? Take a Look at OpenBSD</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Jeff - <a href="http://dpaste.com/2AT7JGP#wrap" rel="nofollow">OpenZFS Port Testing Feedback</a></li>
<li>Malcolm - <a href="http://dpaste.com/1R170D7" rel="nofollow">Best Practices for Custom Ports</a></li>
<li>Michael - <a href="http://dpaste.com/0CERP6R" rel="nofollow">Little Correction</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0310.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OPNsense 19.7.1 is out, ZFS on Linux still has annoying issues with ARC size, Hammer2 is now default, NetBSD audio – an application perspective, new FreeNAS Mini, and more. </p>

<h2>Headlines</h2>

<h3><a href="https://opnsense.org/opnsense-19-7-1-released/" rel="nofollow">OPNsense 19.7.1</a></h3>

<blockquote>
<p>We do not wish to keep you from enjoying your summer time, but this<br>
is a recommended security update enriched with reliability fixes for the<br>
new 19.7 series.  Of special note are performance improvements as well<br>
as a fix for a longstanding NAT before IPsec limitation.</p>

<p>Full patch notes:</p>
</blockquote>

<ul>
<li>system: do not create automatic copies of existing gateways</li>
<li>system: do not translate empty tunables descriptions</li>
<li>system: remove unwanted form action tags</li>
<li>system: do not include Syslog-ng in rc.freebsd handler</li>
<li>system: fix manual system log stop/start/restart</li>
<li>system: scoped IPv6 &quot;%&quot; could confuse mwexecf(), use plain mwexec() instead</li>
<li>system: allow curl-based downloads to use both trusted and local authorities</li>
<li>system: fix group privilege print and correctly redirect after edit</li>
<li>system: use cached address list in referrer check</li>
<li>system: fix Syslog-ng search stats</li>
<li>firewall: HTML-escape dynamic entries to display aliases</li>
<li>firewall: display correct IP version in automatic rules</li>
<li>firewall: fix a warning while reading empty outbound rules configuration</li>
<li>firewall: skip illegal log lines in live log</li>
<li>interfaces: performance improvements for configurations with hundreds of interfaces</li>
<li>reporting: performance improvements for Python 3 NetFlow aggregator rewrite</li>
<li>dhcp: move advanced router advertisement options to correct config section</li>
<li>ipsec: replace global array access with function to ensure side-effect free boot</li>
<li>ipsec: change DPD action on start to &quot;dpdaction = restart&quot;</li>
<li>ipsec: remove already default &quot;dpdaction = none&quot; if not set</li>
<li>ipsec: use interface IP address in local ID when doing NAT before IPsec</li>
<li>web proxy: fix database reset for Squid 4 by replacing use of ssl_crtd with security_file_certgen</li>
<li>plugins: os-acme-client 1.24[1]</li>
<li>plugins: os-bind 1.6[2]</li>
<li>plugins: os-dnscrypt-proxy 1.5[3]</li>
<li>plugins: os-frr now restricts characters BGP prefix-list and route-maps[4]</li>
<li>plugins: os-google-cloud-sdk 1.0[5]</li>
<li>ports: curl 7.65.3[6]</li>
<li>ports: monit 5.26.0[7]</li>
<li>ports: openssh 8.0p1[8]</li>
<li>ports: php 7.2.20[9]</li>
<li>ports: python 3.7.4[10]</li>
<li>ports: sqlite 3.29.0[11]</li>
<li>ports: squid 4.8[12]</li>
</ul>

<blockquote>
<p>Stay safe and hydrated, Your OPNsense team</p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/linux/ZFSOnLinuxARCShrinkage" rel="nofollow">ZFS on Linux still has annoying issues with ARC size</a></h3>

<p><code>One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS&#39;s auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.</code></p>

<blockquote>
<p>Linux&#39;s regular filesystem disk cache is very predictable; if you do disk IO, the cache will relentlessly grow to use all of your free memory. This sometimes disconcerts people when free reports that there&#39;s very little memory actually free, but at least you&#39;re getting value from your RAM. This is so reliable and regular that we generally don&#39;t think about &#39;is my system going to use all of my RAM as a disk cache&#39;, because the answer is always &#39;yes&#39;. (The general filesystem cache is also called the page cache.)</p>

<p>This is unfortunately not the case with the ZFS ARC in ZFS on Linux (and it wasn&#39;t necessarily the case even on Solaris). ZFS has both a current size and a &#39;target size&#39; for the ARC (called &#39;c&#39; in ZFS statistics). When your system boots this target size starts out as the maximum allowed size for the ARC, but various events afterward can cause it to be reduced (which obviously limits the size of your ARC, since that&#39;s its purpose). In practice, this reduction in the target size is both pretty sticky and rather mysterious (as ZFS on Linux doesn&#39;t currently expose enough statistics to tell why your ARC target size shrunk in any particular case).</p>

<p>The net effect is that the ZFS ARC is not infrequently quite shy and hesitant about using memory, in stark contrast to Linux&#39;s normal filesystem cache. The default maximum ARC size starts out as only half of your RAM (unlike the regular filesystem cache, which will use all of it), and then it shrinks from there, sometimes very significantly, and once shrunk it only recovers slowly (if at all).</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2019-June/718989.html" rel="nofollow">Hammer2 is now default</a></h3>

<pre><code>commit a49112761c919d42d405ec10252eb0553662c824
Author: Matthew Dillon &lt;dillon at apollo.backplane.com&gt;
Date:   Mon Jun 10 17:53:46 2019 -0700

    installer - Default to HAMMER2

    * Change the installer default from HAMMER1 to HAMMER2.

    * Adjust the nrelease build to print the location of the image files
      when it finishes.

Summary of changes:
 nrelease/Makefile                          |  2 +-
 usr.sbin/installer/dfuibe_installer/flow.c | 20 ++++++++++----------
 2 files changed, 11 insertions(+), 11 deletions(-)

http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/a49112761c919d42d405ec10252eb0553662c824
</code></pre>

<hr>

<h3><a href="https://netbsd.org/gallery/presentations/nia/netbsd-audio/" rel="nofollow">NetBSD audio – an application perspective</a></h3>

<blockquote>
<p>NetBSD audio – an application perspective ... or, &quot;doing it natively, because we can&quot;</p>
</blockquote>

<ul>
<li><p>audio options for NetBSD in pkgsrc</p>

<ul>
<li>Use NetBSD native audio (sun audio/audioio.h)</li>
<li>Or OSS emulation layer: Basically a wrapper around sun audio in the kernel. Incomplete and old version, but works for simple stuff</li>
</ul></li>
<li><p>Many many abstraction layers available:</p>

<ul>
<li>OpenAL-Soft</li>
<li>alsa-lib (config file required)</li>
<li>libao, GStreamer (plugins!)</li>
<li>PortAudio, SDL</li>
<li>PulseAudio, JACK</li>
<li>... lots more!? some obsolete stuff (esd, nas?)</li>
</ul></li>
<li><p>Advantages of using NetBSD audio directly</p>

<ul>
<li>Low latency, low CPU usage: Abstraction layers differ in latency (SDL2 vs ALSA/OpenAL)</li>
<li>Query device information: Is /dev/audio1 a USB microphone or another sound card?</li>
<li>Avoid bugs from excessive layering</li>
<li>Nice API, well documented: [nia note: I had no idea how to write audio code. I read a man page and now I do.]</li>
<li>Your code might work on illumos too</li>
</ul></li>
<li><p>[nia note: SDL2 seems very sensitive to the blk_ms sysctl being high or low, with other implementations there seems to be a less noticable difference. I don&#39;t know why.]</p></li>
</ul>

<hr>

<h3><a href="https://www.ixsystems.com/blog/new-freenas-mini-models-release-pr/" rel="nofollow">New FreeNAS Mini</a></h3>

<blockquote>
<p>Two new FreeNAS Mini systems join the very popular FreeNAS Mini and Mini XL:</p>

<p>FreeNAS Mini XL+: This powerful 10 Bay platform (8x 3.5” and 1x 2.5” hot-swap, 1x 2.5” internal) includes the latest, compact server technology and provides dual 10GbE ports, 8 CPU cores and 32 GB RAM for high performance workgroups. The Mini XL+ scales beyond 100TB and is ideal for very demanding applications, including hosting virtual machines and multimedia editing. Starting at $1499, the Mini XL+ configured with cache SSD and 80 TB capacity is $4299, and consumes about 100 Watts.</p>

<p>FreeNAS Mini E: This cost-effective 4 Bay platform provides the resources required for SOHO use with quad GbE ports and 8 GB of RAM. The Mini E is ideal for file sharing, streaming and transcoding video at 1080p. Starting at $749, the Mini E configured with 8 TB capacity is $999, and consumes about 36 Watts.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2019/07/30/msg107671.html" rel="nofollow">Welcome to NetBSD 9.99.1!</a></li>
<li><a href="http://blog.snailtext.com/posts/berkeley-smorgasbord-part-2.html" rel="nofollow">Berkeley smorgasbord — part II</a></li>
<li><a href="https://www.youtube.com/watch?v=Brt41xnMZqo&list=PLuJmmKtsV1dOTmlImlD9U5j1P1rLxS2V8&index=20&t=0s" rel="nofollow">dtracing postgres</a></li>
<li><a href="https://project-trident.org/post/2019-07-30_19.07-u1_available/" rel="nofollow">Project Trident 19.07-U1 now available</a></li>
<li><a href="https://www.devprojournal.com/technology-trends/operating-systems/need-a-secure-operating-system-take-a-look-at-openbsd/" rel="nofollow">Need a Secure Operating System? Take a Look at OpenBSD</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Jeff - <a href="http://dpaste.com/2AT7JGP#wrap" rel="nofollow">OpenZFS Port Testing Feedback</a></li>
<li>Malcolm - <a href="http://dpaste.com/1R170D7" rel="nofollow">Best Practices for Custom Ports</a></li>
<li>Michael - <a href="http://dpaste.com/0CERP6R" rel="nofollow">Little Correction</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0310.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>306: Comparing Hammers</title>
  <link>https://www.bsdnow.tv/306</link>
  <guid isPermaLink="false">2e907009-f426-4bbd-a592-d91329f11f0f</guid>
  <pubDate>Thu, 11 Jul 2019 10:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2e907009-f426-4bbd-a592-d91329f11f0f.mp3" length="27620333" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Am5x86 based retro UNIX build log, setting up services in a FreeNAS Jail, first taste of DragonflyBSD, streaming Netflix on NetBSD, NetBSD on the last G4 Mac mini, Hammer vs Hammer2, and more.</itunes:subtitle>
  <itunes:duration>38:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Am5x86 based retro UNIX build log, setting up services in a FreeNAS Jail, first taste of DragonflyBSD, streaming Netflix on NetBSD, NetBSD on the last G4 Mac mini, Hammer vs Hammer2, and more.
Headlines
Polprog's Am5x86 based retro UNIX build log (https://polprog.net/blog/486/)
I have recently acquired an Am5x86 computer, in a surprisingly good condition. This is an ongoing project, check this page often for updates!
I began by connecting a front panel. The panel came from a different chassis and is slightly too wide, so I had to attach it with a couple of zip-ties. However, that makes it stick out from the PC front at an angle, allowing easy access when the computer sits at the floor - and thats where it is most of the time. It's not that bad, to be honest, and its way easier to access than it would be, if mounted vertically
There is a mains switch on the front panel because the computer uses an older style power supply. Those power supplies instead of relying on a PSON signal, like modern ATX supplies, run a 4 wire cable to a mains switch. The cable carries live and neutral both ways, and the switch keys in or out the power. The system powers on as soon as the switch is enabled.
Originally there was no graphics card in it. Since a PC will not boot with out a GPU, I had to find one. The mainboard only has PCI and ISA slots, and all the GPUs I had were AGP. Fortunately, I bought a PCI GPU hoping it would solve my issue...
However the GPU turned out to be faulty. It took me some time to repair it. I had to repair a broken trace leading to one of the EEPROM pins, and replace a contact in the EEPROM's socket. Then I replaced all the electrolytic capacitors on it, and that fixed it for good.
Having used up only one of the three PCI slots, I populated the remaining pair with two ethernet cards. I still have a bunch of ISA slots available, but I have nothing to install there. Yet.
See the article for the rest of the writeup
Setting up services in a FreeNAS Jail (https://www.ixsystems.com/blog/services-in-freenas-jail/)
This piece demonstrates the setup of a server service in a FreeNAS jail and how to share files with a jail using Apache 2.4 as an example. Jails are powerful, self-contained FreeBSD environments with separate network settings, package management, and access to thousands of FreeBSD application packages. Popular packages such as Apache, NGINX, LigHTTPD, MySQL, and PHP can be found and installed with the pkg search and pkg install commands. 
This example shows creating a jail, installing an Apache web server, and setting up a simple web page. 
NOTE: Do not directly attach FreeNAS to an external network (WAN). Use port forwarding, proper firewalls and DDoS protections when using FreeNAS for external web sites. This example demonstrates expanding the functionality of FreeNAS in an isolated LAN environment.
News Roundup
First taste of DragonflyBSD (https://nanxiao.me/en/first-taste-of-dragonfly-bsd/)
Last week, I needed to pick a BSD Operating System which supports NUMA to do some testing, so I decided to give Dragonfly BSD a shot. Dragonfly BSDonly can run on X86_64 architecture, which reminds me of Arch Linux, and after some tweaking, I feel Dragonfly BSD may be a “developer-friendly” Operating System, at least for me.
I mainly use Dragonfly BSD as a server, so I don’t care whether GUI is fancy or not. But I have high requirements of developer tools, i.e., compiler and debugger. The default compiler of Dragonfly BSD is gcc 8.3, and I can also install clang 8.0.0 from package. This means I can test state-of-the-art features of compilers, and it is really important for me. gdb‘s version is 7.6.1, a little lag behind, but still OK.
Furthermore, the upgradation of Dragonfly BSD is pretty simple and straightforward. I followed document to upgrade my Operating System to 5.6.0 this morning, just copied and pasted, no single error, booted successfully.
Streaming Netflix on NetBSD (https://www.unitedbsd.com/d/68-streaming-netflix-on-netbsd)
Here's a step-by-step guide that allows streaming Netflix media on NetBSD using a intel-haxm accelerated QEMU vm.
Heads-up! Sound doesn't work, but everything else is fine. Please read the rest of this thread for a solution to this!!
“Sudo Mastery 2nd Edition” cover art reveal (https://mwl.io/archives/4320)
I’m about halfway through the new edition of Sudo Mastery. Assuming nothing terrible happens, should have a complete first draft in four to six weeks. Enough stuff has changed in sudo that I need to carefully double-check every single feature. (I’m also horrified by the painfully obsolete versions of sudo shipped in the latest versions of CentOS and Debian, but people running those operating systems are already accustomed to their creaky obsolescence.)
But the reason for this blog post? I have Eddie Sharam’s glorious cover art. My Patronizers saw it last month, so now the rest of you get a turn.
NetBSD on the last G4 Mac mini (https://tenfourfox.blogspot.com/2019/06/and-now-for-something-completely.html)
I'm a big fan of NetBSD. I've run it since 2000 on a Mac IIci (of course it's still running it) and I ran it for several years on a Power Mac 7300 with a G3 card which was the second incarnation of the Floodgap gopher server. Today I also still run it on a MIPS-based Cobalt RaQ 2 and an HP Jornada 690. I think NetBSD is a better match for smaller or underpowered systems than current-day Linux, and is fairly easy to harden and keep secure even though none of these systems are exposed to the outside world.
Recently I had a need to set up a bridge system that would be fast enough to connect two networks and I happened to have two of the "secret" last-of-the-line 1.5GHz G4 Mac minis sitting on the shelf doing nothing. Yes, they're probably outclassed by later Raspberry Pi models, but I don't have to buy anything and I like putting old hardware to good use.
Hammer vs Hammer2 (https://phoronix.com/scan.php?page=news_item&amp;amp;px=DragonFlyBSD-5.6-HAMMER2-Perf)
With the newly released DragonFlyBSD 5.6 there are improvements to its original HAMMER2 file-system to the extent that it's now selected by its installer as the default file-system choice for new installations. Curious how the performance now compares between HAMMER and HAMMER2, here are some initial benchmarks on an NVMe solid-state drive using DragonFlyBSD 5.6.0. 
With a 120GB Toshiba NVMe SSD on an Intel Core i7 8700K system, I ran some benchmarks of DragonFlyBSD 5.6.0 freshly installed with HAMMER2 and then again when returning to the original HAMMER file-system that remains available via its installer. No other changes were made to the setup during testing. 
And then for the more synthetic workloads it was just a mix. But overall HAMMER2 was performing well during the initial testing and great to see it continuing to offer noticeable leads in real-world workloads compared to the aging HAMMER file-system. HAMMER2 also offers better clustering, online deduplication, snapshots, compression, encryption, and many other modern file-system features.
Beastie Bits
Unix CLI relational database (https://spin.atomicobject.com/2019/06/16/unix-cli-relational-database/)
The TTY demystified (https://www.linusakesson.net/programming/tty/index.php)
Ranger, a console file manager with VI keybindings (https://ranger.github.io/)
Some Unix Humor (https://www.reddit.com/r/unix/comments/c6o5ze/some_unix_humor/)
OpenBSD -import vulkan-loader for Vulkan API support (https://marc.info/?l=openbsd-ports-cvs&amp;amp;m=156121732625604&amp;amp;w=2)
FreeBSD ZFS without drives (https://savagedlight.me/2019/06/09/freebsd-zfs-without-drives/)
Feedback/Questions
Moritz - ARM Builds (http://dpaste.com/175RRAZ)
Dave - Videos (http://dpaste.com/2DYK85B)
Chris - Raspberry Pi4 (http://dpaste.com/1B16QVN)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, Am5x86, freenas, jail, g4, mac, streaming, netflix, hammer</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Am5x86 based retro UNIX build log, setting up services in a FreeNAS Jail, first taste of DragonflyBSD, streaming Netflix on NetBSD, NetBSD on the last G4 Mac mini, Hammer vs Hammer2, and more.</p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://polprog.net/blog/486/" rel="nofollow">Polprog&#39;s Am5x86 based retro UNIX build log</a></h3>

<blockquote>
<p>I have recently acquired an Am5x86 computer, in a surprisingly good condition. This is an ongoing project, check this page often for updates!</p>

<p>I began by connecting a front panel. The panel came from a different chassis and is slightly too wide, so I had to attach it with a couple of zip-ties. However, that makes it stick out from the PC front at an angle, allowing easy access when the computer sits at the floor - and thats where it is most of the time. It&#39;s not that bad, to be honest, and its way easier to access than it would be, if mounted vertically</p>

<p>There is a mains switch on the front panel because the computer uses an older style power supply. Those power supplies instead of relying on a PSON signal, like modern ATX supplies, run a 4 wire cable to a mains switch. The cable carries live and neutral both ways, and the switch keys in or out the power. The system powers on as soon as the switch is enabled.</p>

<p>Originally there was no graphics card in it. Since a PC will not boot with out a GPU, I had to find one. The mainboard only has PCI and ISA slots, and all the GPUs I had were AGP. Fortunately, I bought a PCI GPU hoping it would solve my issue...</p>

<p>However the GPU turned out to be faulty. It took me some time to repair it. I had to repair a broken trace leading to one of the EEPROM pins, and replace a contact in the EEPROM&#39;s socket. Then I replaced all the electrolytic capacitors on it, and that fixed it for good.</p>

<p>Having used up only one of the three PCI slots, I populated the remaining pair with two ethernet cards. I still have a bunch of ISA slots available, but I have nothing to install there. Yet.</p>
</blockquote>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>

<hr>

<h3><a href="https://www.ixsystems.com/blog/services-in-freenas-jail/" rel="nofollow">Setting up services in a FreeNAS Jail</a></h3>

<blockquote>
<p>This piece demonstrates the setup of a server service in a FreeNAS jail and how to share files with a jail using Apache 2.4 as an example. Jails are powerful, self-contained FreeBSD environments with separate network settings, package management, and access to thousands of FreeBSD application packages. Popular packages such as Apache, NGINX, LigHTTPD, MySQL, and PHP can be found and installed with the pkg search and pkg install commands. </p>

<p>This example shows creating a jail, installing an Apache web server, and setting up a simple web page. </p>

<p>NOTE: Do not directly attach FreeNAS to an external network (WAN). Use port forwarding, proper firewalls and DDoS protections when using FreeNAS for external web sites. This example demonstrates expanding the functionality of FreeNAS in an isolated LAN environment.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://nanxiao.me/en/first-taste-of-dragonfly-bsd/" rel="nofollow">First taste of DragonflyBSD</a></h3>

<blockquote>
<p>Last week, I needed to pick a BSD Operating System which supports NUMA to do some testing, so I decided to give Dragonfly BSD a shot. Dragonfly BSDonly can run on X86_64 architecture, which reminds me of Arch Linux, and after some tweaking, I feel Dragonfly BSD may be a “developer-friendly” Operating System, at least for me.</p>

<p>I mainly use Dragonfly BSD as a server, so I don’t care whether GUI is fancy or not. But I have high requirements of developer tools, i.e., compiler and debugger. The default compiler of Dragonfly BSD is gcc 8.3, and I can also install clang 8.0.0 from package. This means I can test state-of-the-art features of compilers, and it is really important for me. gdb‘s version is 7.6.1, a little lag behind, but still OK.</p>

<p>Furthermore, the upgradation of Dragonfly BSD is pretty simple and straightforward. I followed document to upgrade my Operating System to 5.6.0 this morning, just copied and pasted, no single error, booted successfully.</p>
</blockquote>

<hr>

<h3><a href="https://www.unitedbsd.com/d/68-streaming-netflix-on-netbsd" rel="nofollow">Streaming Netflix on NetBSD</a></h3>

<blockquote>
<p>Here&#39;s a step-by-step guide that allows streaming Netflix media on NetBSD using a intel-haxm accelerated QEMU vm.</p>

<p>Heads-up! Sound doesn&#39;t work, but everything else is fine. Please read the rest of this thread for a solution to this!!</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/4320" rel="nofollow">“Sudo Mastery 2nd Edition” cover art reveal</a></h3>

<blockquote>
<p>I’m about halfway through the new edition of Sudo Mastery. Assuming nothing terrible happens, should have a complete first draft in four to six weeks. Enough stuff has changed in sudo that I need to carefully double-check every single feature. (I’m also horrified by the painfully obsolete versions of sudo shipped in the latest versions of CentOS and Debian, but people running those operating systems are already accustomed to their creaky obsolescence.)</p>

<p>But the reason for this blog post? I have Eddie Sharam’s glorious cover art. My Patronizers saw it last month, so now the rest of you get a turn.</p>
</blockquote>

<hr>

<h3><a href="https://tenfourfox.blogspot.com/2019/06/and-now-for-something-completely.html" rel="nofollow">NetBSD on the last G4 Mac mini</a></h3>

<blockquote>
<p>I&#39;m a big fan of NetBSD. I&#39;ve run it since 2000 on a Mac IIci (of course it&#39;s still running it) and I ran it for several years on a Power Mac 7300 with a G3 card which was the second incarnation of the Floodgap gopher server. Today I also still run it on a MIPS-based Cobalt RaQ 2 and an HP Jornada 690. I think NetBSD is a better match for smaller or underpowered systems than current-day Linux, and is fairly easy to harden and keep secure even though none of these systems are exposed to the outside world.</p>

<p>Recently I had a need to set up a bridge system that would be fast enough to connect two networks and I happened to have two of the &quot;secret&quot; last-of-the-line 1.5GHz G4 Mac minis sitting on the shelf doing nothing. Yes, they&#39;re probably outclassed by later Raspberry Pi models, but I don&#39;t have to buy anything and I like putting old hardware to good use.</p>
</blockquote>

<hr>

<h3><a href="https://phoronix.com/scan.php?page=news_item&px=DragonFlyBSD-5.6-HAMMER2-Perf" rel="nofollow">Hammer vs Hammer2</a></h3>

<blockquote>
<p>With the newly released DragonFlyBSD 5.6 there are improvements to its original HAMMER2 file-system to the extent that it&#39;s now selected by its installer as the default file-system choice for new installations. Curious how the performance now compares between HAMMER and HAMMER2, here are some initial benchmarks on an NVMe solid-state drive using DragonFlyBSD 5.6.0. </p>

<p>With a 120GB Toshiba NVMe SSD on an Intel Core i7 8700K system, I ran some benchmarks of DragonFlyBSD 5.6.0 freshly installed with HAMMER2 and then again when returning to the original HAMMER file-system that remains available via its installer. No other changes were made to the setup during testing. </p>

<p>And then for the more synthetic workloads it was just a mix. But overall HAMMER2 was performing well during the initial testing and great to see it continuing to offer noticeable leads in real-world workloads compared to the aging HAMMER file-system. HAMMER2 also offers better clustering, online deduplication, snapshots, compression, encryption, and many other modern file-system features.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://spin.atomicobject.com/2019/06/16/unix-cli-relational-database/" rel="nofollow">Unix CLI relational database</a></li>
<li><a href="https://www.linusakesson.net/programming/tty/index.php" rel="nofollow">The TTY demystified</a></li>
<li><a href="https://ranger.github.io/" rel="nofollow">Ranger, a console file manager with VI keybindings</a></li>
<li><a href="https://www.reddit.com/r/unix/comments/c6o5ze/some_unix_humor/" rel="nofollow">Some Unix Humor</a></li>
<li><a href="https://marc.info/?l=openbsd-ports-cvs&m=156121732625604&w=2" rel="nofollow">OpenBSD -import vulkan-loader for Vulkan API support</a></li>
<li><a href="https://savagedlight.me/2019/06/09/freebsd-zfs-without-drives/" rel="nofollow">FreeBSD ZFS without drives</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Moritz - <a href="http://dpaste.com/175RRAZ" rel="nofollow">ARM Builds</a></li>
<li>Dave - <a href="http://dpaste.com/2DYK85B" rel="nofollow">Videos</a></li>
<li>Chris - <a href="http://dpaste.com/1B16QVN" rel="nofollow">Raspberry Pi4</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0306.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Am5x86 based retro UNIX build log, setting up services in a FreeNAS Jail, first taste of DragonflyBSD, streaming Netflix on NetBSD, NetBSD on the last G4 Mac mini, Hammer vs Hammer2, and more.</p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://polprog.net/blog/486/" rel="nofollow">Polprog&#39;s Am5x86 based retro UNIX build log</a></h3>

<blockquote>
<p>I have recently acquired an Am5x86 computer, in a surprisingly good condition. This is an ongoing project, check this page often for updates!</p>

<p>I began by connecting a front panel. The panel came from a different chassis and is slightly too wide, so I had to attach it with a couple of zip-ties. However, that makes it stick out from the PC front at an angle, allowing easy access when the computer sits at the floor - and thats where it is most of the time. It&#39;s not that bad, to be honest, and its way easier to access than it would be, if mounted vertically</p>

<p>There is a mains switch on the front panel because the computer uses an older style power supply. Those power supplies instead of relying on a PSON signal, like modern ATX supplies, run a 4 wire cable to a mains switch. The cable carries live and neutral both ways, and the switch keys in or out the power. The system powers on as soon as the switch is enabled.</p>

<p>Originally there was no graphics card in it. Since a PC will not boot with out a GPU, I had to find one. The mainboard only has PCI and ISA slots, and all the GPUs I had were AGP. Fortunately, I bought a PCI GPU hoping it would solve my issue...</p>

<p>However the GPU turned out to be faulty. It took me some time to repair it. I had to repair a broken trace leading to one of the EEPROM pins, and replace a contact in the EEPROM&#39;s socket. Then I replaced all the electrolytic capacitors on it, and that fixed it for good.</p>

<p>Having used up only one of the three PCI slots, I populated the remaining pair with two ethernet cards. I still have a bunch of ISA slots available, but I have nothing to install there. Yet.</p>
</blockquote>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>

<hr>

<h3><a href="https://www.ixsystems.com/blog/services-in-freenas-jail/" rel="nofollow">Setting up services in a FreeNAS Jail</a></h3>

<blockquote>
<p>This piece demonstrates the setup of a server service in a FreeNAS jail and how to share files with a jail using Apache 2.4 as an example. Jails are powerful, self-contained FreeBSD environments with separate network settings, package management, and access to thousands of FreeBSD application packages. Popular packages such as Apache, NGINX, LigHTTPD, MySQL, and PHP can be found and installed with the pkg search and pkg install commands. </p>

<p>This example shows creating a jail, installing an Apache web server, and setting up a simple web page. </p>

<p>NOTE: Do not directly attach FreeNAS to an external network (WAN). Use port forwarding, proper firewalls and DDoS protections when using FreeNAS for external web sites. This example demonstrates expanding the functionality of FreeNAS in an isolated LAN environment.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://nanxiao.me/en/first-taste-of-dragonfly-bsd/" rel="nofollow">First taste of DragonflyBSD</a></h3>

<blockquote>
<p>Last week, I needed to pick a BSD Operating System which supports NUMA to do some testing, so I decided to give Dragonfly BSD a shot. Dragonfly BSDonly can run on X86_64 architecture, which reminds me of Arch Linux, and after some tweaking, I feel Dragonfly BSD may be a “developer-friendly” Operating System, at least for me.</p>

<p>I mainly use Dragonfly BSD as a server, so I don’t care whether GUI is fancy or not. But I have high requirements of developer tools, i.e., compiler and debugger. The default compiler of Dragonfly BSD is gcc 8.3, and I can also install clang 8.0.0 from package. This means I can test state-of-the-art features of compilers, and it is really important for me. gdb‘s version is 7.6.1, a little lag behind, but still OK.</p>

<p>Furthermore, the upgradation of Dragonfly BSD is pretty simple and straightforward. I followed document to upgrade my Operating System to 5.6.0 this morning, just copied and pasted, no single error, booted successfully.</p>
</blockquote>

<hr>

<h3><a href="https://www.unitedbsd.com/d/68-streaming-netflix-on-netbsd" rel="nofollow">Streaming Netflix on NetBSD</a></h3>

<blockquote>
<p>Here&#39;s a step-by-step guide that allows streaming Netflix media on NetBSD using a intel-haxm accelerated QEMU vm.</p>

<p>Heads-up! Sound doesn&#39;t work, but everything else is fine. Please read the rest of this thread for a solution to this!!</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/4320" rel="nofollow">“Sudo Mastery 2nd Edition” cover art reveal</a></h3>

<blockquote>
<p>I’m about halfway through the new edition of Sudo Mastery. Assuming nothing terrible happens, should have a complete first draft in four to six weeks. Enough stuff has changed in sudo that I need to carefully double-check every single feature. (I’m also horrified by the painfully obsolete versions of sudo shipped in the latest versions of CentOS and Debian, but people running those operating systems are already accustomed to their creaky obsolescence.)</p>

<p>But the reason for this blog post? I have Eddie Sharam’s glorious cover art. My Patronizers saw it last month, so now the rest of you get a turn.</p>
</blockquote>

<hr>

<h3><a href="https://tenfourfox.blogspot.com/2019/06/and-now-for-something-completely.html" rel="nofollow">NetBSD on the last G4 Mac mini</a></h3>

<blockquote>
<p>I&#39;m a big fan of NetBSD. I&#39;ve run it since 2000 on a Mac IIci (of course it&#39;s still running it) and I ran it for several years on a Power Mac 7300 with a G3 card which was the second incarnation of the Floodgap gopher server. Today I also still run it on a MIPS-based Cobalt RaQ 2 and an HP Jornada 690. I think NetBSD is a better match for smaller or underpowered systems than current-day Linux, and is fairly easy to harden and keep secure even though none of these systems are exposed to the outside world.</p>

<p>Recently I had a need to set up a bridge system that would be fast enough to connect two networks and I happened to have two of the &quot;secret&quot; last-of-the-line 1.5GHz G4 Mac minis sitting on the shelf doing nothing. Yes, they&#39;re probably outclassed by later Raspberry Pi models, but I don&#39;t have to buy anything and I like putting old hardware to good use.</p>
</blockquote>

<hr>

<h3><a href="https://phoronix.com/scan.php?page=news_item&px=DragonFlyBSD-5.6-HAMMER2-Perf" rel="nofollow">Hammer vs Hammer2</a></h3>

<blockquote>
<p>With the newly released DragonFlyBSD 5.6 there are improvements to its original HAMMER2 file-system to the extent that it&#39;s now selected by its installer as the default file-system choice for new installations. Curious how the performance now compares between HAMMER and HAMMER2, here are some initial benchmarks on an NVMe solid-state drive using DragonFlyBSD 5.6.0. </p>

<p>With a 120GB Toshiba NVMe SSD on an Intel Core i7 8700K system, I ran some benchmarks of DragonFlyBSD 5.6.0 freshly installed with HAMMER2 and then again when returning to the original HAMMER file-system that remains available via its installer. No other changes were made to the setup during testing. </p>

<p>And then for the more synthetic workloads it was just a mix. But overall HAMMER2 was performing well during the initial testing and great to see it continuing to offer noticeable leads in real-world workloads compared to the aging HAMMER file-system. HAMMER2 also offers better clustering, online deduplication, snapshots, compression, encryption, and many other modern file-system features.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://spin.atomicobject.com/2019/06/16/unix-cli-relational-database/" rel="nofollow">Unix CLI relational database</a></li>
<li><a href="https://www.linusakesson.net/programming/tty/index.php" rel="nofollow">The TTY demystified</a></li>
<li><a href="https://ranger.github.io/" rel="nofollow">Ranger, a console file manager with VI keybindings</a></li>
<li><a href="https://www.reddit.com/r/unix/comments/c6o5ze/some_unix_humor/" rel="nofollow">Some Unix Humor</a></li>
<li><a href="https://marc.info/?l=openbsd-ports-cvs&m=156121732625604&w=2" rel="nofollow">OpenBSD -import vulkan-loader for Vulkan API support</a></li>
<li><a href="https://savagedlight.me/2019/06/09/freebsd-zfs-without-drives/" rel="nofollow">FreeBSD ZFS without drives</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Moritz - <a href="http://dpaste.com/175RRAZ" rel="nofollow">ARM Builds</a></li>
<li>Dave - <a href="http://dpaste.com/2DYK85B" rel="nofollow">Videos</a></li>
<li>Chris - <a href="http://dpaste.com/1B16QVN" rel="nofollow">Raspberry Pi4</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0306.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>300: The Big Three</title>
  <link>https://www.bsdnow.tv/300</link>
  <guid isPermaLink="false">f4d00ce6-8060-4be0-9049-570b73a6adbd</guid>
  <pubDate>Thu, 30 May 2019 12:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f4d00ce6-8060-4be0-9049-570b73a6adbd.mp3" length="44983170" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD 11.3-beta 1 is out, BSDCan 2019 recap, OpenIndiana 2019.04 is out, Overview of ZFS Pools in FreeNAS, why open source firmware is important for security, a new Opnsense release, wireguard on OpenBSD, and more. </itunes:subtitle>
  <itunes:duration>1:14:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD 11.3-beta 1 is out, BSDCan 2019 recap, OpenIndiana 2019.04 is out, Overview of ZFS Pools in FreeNAS, why open source firmware is important for security, a new Opnsense release, wireguard on OpenBSD, and more. 
&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2019-May/091210.html"&gt;FreeBSD 11.3-b1 is out&lt;/a&gt;&lt;/h3&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2019/"&gt;BSDCan 2019 Recap&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’re back from BSDCan and it was a packed week as always.&lt;/li&gt;

&lt;li&gt;It started with &lt;a href="http://bhyvecon.org/"&gt;bhyvecon&lt;/a&gt; on Tuesday. Meanwhile, Benedict spent the whole day in productive meetings: annual FreeBSD Foundation board meeting and FreeBSD Journal editorial board meeting.&lt;/li&gt;

&lt;li&gt;On Wednesday, tutorials for BSDCan started as well as the &lt;a href="https://wiki.freebsd.org/DevSummit/201905"&gt;FreeBSD Developer Summit&lt;/a&gt;. In the mornings, there were presentations in the big auditorium, while working groups about networking, failsafe bootcode, development web services, swap space management, and testing/CI were held. Friday had a similar format with an update from the FreeBSD core team and the “have, need, want” session for FreeBSD 13. In the afternoon, there were working groups about translation tools, package base, GSoC/Outreachy, or general hacking. Benedict held his Icinga tutorial in the afternoon with about 15 people attending.
Devsummit presentation slides can be found on the wiki page and video recordings done by &lt;a href="https://www.scaleengine.com/"&gt;ScaleEngine&lt;/a&gt; are available on &lt;a href="https://www.youtube.com/channel/UCxLxR_oW-NAmChIcSkAyZGQ"&gt;FreeBSD’s youtube channel&lt;/a&gt;.&lt;/li&gt;

&lt;li&gt;The conference program was a good mixture of sysadmin and tech talks across the major BSDs. Benedict saw the following talks: How ZFS snapshots really work by Matt Ahrens, 20 years in Jail by Michael W. Lucas, OpenZFS BOF session, the future of OpenZFS and FreeBSD, MQTT for system administrators by Jan-Piet Mens, and spent the rest of the time in between in the hallway track. &lt;/li&gt;

&lt;li&gt;Photos from the event are available on &lt;a href="https://www.talegraph.com/tales/Qg446T5bKT"&gt;Ollivier Robert’s talegraph
&lt;/a&gt; and Diane Bruce’s website for &lt;a href="http://www.db.net/gallery/BSDCan/2019_BSDCan_day_1_web/"&gt;day 1&lt;/a&gt;, &lt;a href="http://www.db.net/gallery/BSDCan/2019_FreeBSD_Dev_Summit_day_2_web"&gt;day 2&lt;/a&gt;, &lt;a href="http://www.db.net/gallery/BSDCan/2019_BSDCan_day_1_web"&gt;conference day 1&lt;/a&gt;, and &lt;a href="http://www.db.net/gallery/BSDCan/2019_BSDCan_day_2_web"&gt;conference day 2&lt;/a&gt;.&lt;/li&gt;

&lt;li&gt;Thanks to all the sponsors, supporters, organizers, speakers, and attendees for making this yet another great BSDCan. Next year’s BSDCan will be from June 2 - 6, 2020.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://www.openindiana.org/2019/05/12/openindiana-hipster-2019-04-is-here/"&gt;OpenIndiana 2019.04 is out&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;We have released a new OpenIndiana Hipster snapshot 2019.04. The noticeable changes:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Firefox was updated to 60.6.3 ESR&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Virtualbox packages were added (including guest additions)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Mate was updated to 1.22&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;IPS has received updates from OmniOS CE and Oracle IPS repos, including automatic boot environment naming&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Some OI-specific applications have been ported from Python 2.7/GTK 2 to Python 3.5/GTK 3&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Quick Demo Video: https://www.youtube.com/watch?v=tQ0-fo3XNrg&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.ixsystems.com/blog/zfs-pools-in-freenas/"&gt;Overview of ZFS Pools in FreeNAS&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;FreeNAS uses the OpenZFS (ZFS) file system, which handles both disk and volume management. ZFS offers RAID options mirror, stripe, and its own parity distribution called RAIDZ that functions like RAID5 on hardware RAID. The file system is extremely flexible and secure, with various drive combinations, checksums, snapshots, and replication all possible. For a deeper dive on ZFS technology, read the ZFS Primer section of the FreeNAS documentation.&lt;/p&gt;
  
  &lt;p&gt;SUGGEST LAYOUT attempts to balance usable capacity and redundancy by automatically choosing an ideal vdev layout for the number of available disks.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The following vdev layout options are available when creating a pool:


&lt;ul&gt;
&lt;li&gt;Stripe data is shared on two drives, similar to RAID0)&lt;/li&gt;

&lt;li&gt;Mirror copies data on two drives, similar to RAID1 but not limited to 2 disks)&lt;/li&gt;

&lt;li&gt;RAIDZ1 single parity similar to RAID5&lt;/li&gt;

&lt;li&gt;RAIDZ2 double parity similar to RAID6&lt;/li&gt;

&lt;li&gt;RAIDZ3 which uses triple parity and has no RAID equivalent&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://blog.jessfraz.com/post/why-open-source-firmware-is-important-for-security/"&gt;Why OpenSource Firmware is Important for Security&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Roots of Trust&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The goal of the root of trust should be to verify that the software installed in every component of the hardware is the software that was intended. This way you can know without a doubt and verify if hardware has been hacked. Since we have very little to no visibility into the code running in a lot of places in our hardware it is hard to do this. How do we really know that the firmware in a component is not vulnerable or that is doesn’t have any backdoors? Well we can’t. Not unless it was all open source.
  Every cloud and vendor seems to have their own way of doing a root of trust. Microsoft has Cerberus, Google has Titan, and Amazon has Nitro. These seem to assume an explicit amount of trust in the proprietary code (the code we cannot see). This leaves me with not a great feeling. Wouldn’t it be better to be able to use all open source code? Then we could verify without a doubt that the code you can read and build yourself is the same code running on hardware for all the various places we have firmware. We could then verify that a machine was in a correct state without a doubt of it being vulnerable or with a backdoor.
  It makes me wonder what the smaller cloud providers like DigitalOcean or Packet have for a root of trust. Often times we only hear of these projects from the big three or five. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-19-1-8-released/"&gt;OPNsense&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;This update addresses several privilege escalation issues in the access control implementation and new memory disclosure issues in Intel CPUs. We would like to thank Arnaud Cordier and Bill Marquette for the top-notch reports and coordination.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Here are the full patch notes:&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;system: address CVE-2019-11816 privilege escalation bugs[1] (reported by Arnaud Cordier)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;system: /etc/hosts generation without interface&lt;em&gt;has&lt;/em&gt;gateway()&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;system: show correct timestamp in config restore save message (contributed by nhirokinet)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;system: list the commands for the pluginctl utility when n+ argument is given&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;system: introduce and use userIsAdmin() helper function instead of checking for 'page-all' privilege directly&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;system: use absolute path in widget ACLs (reported by Netgate)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;system: RRD-related cleanups for less code exposure&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;interfaces: add EN DUID Generation using OPNsense PEN (contributed by Team Rebellion)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;interfaces: replace legacy&lt;em&gt;getall&lt;/em&gt;interface_addresses() usage&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;firewall: fix port validation in aliases with leading / trailing spaces&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;firewall: fix outbound NAT translation display in overview page&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;firewall: prevent CARP outgoing packets from using the configured gateway&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;firewall: use CARP net.inet.carp.demotion to control current demotion in status page&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;firewall: stop live log poller on error result&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;dhcpd: change rule priority to 1 to avoid bogon clash&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;dnsmasq: only admins may edit custom options field&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;firmware: use insecure mode for base and kernel sets when package fingerprints are disabled&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;firmware: add optional device support for base and kernel sets&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;firmware: add Hostcentral mirror (HTTP, Melbourne, Australia)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;ipsec: always reset rightallowany to default when writing configuration&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;lang: say "hola" to Spanish as the newest available GUI language&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;lang: updates for Chinese, Czech, Japanese, German, French, Russian and Portuguese&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;network time: only admins may edit custom options field&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;openvpn: call openvpn&lt;em&gt;refresh&lt;/em&gt;crls() indirectly via plugin_configure() for less code exposure&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;openvpn: only admins may edit custom options field to prevent privilege escalation (reported by Bill Marquette)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;openvpn: remove custom options field from wizard&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;unbound: only admins may edit custom options field&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;wizard: translate typehint as well&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;plugins: os-freeradius 1.9.3 fixes string interpolation in LDAP filters (contributed by theq86)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;plugins: os-nginx 1.12[2]&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;plugins: os-theme-cicada 1.17 (contributed by Team Rebellion)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;plugins: os-theme-tukan 1.17 (contributed by Team Rebellion)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;src: timezone database information update[3]&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;src: install(1) broken with partially matching relative paths[4]&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;src: microarchitectural Data Sampling (MDS) mitigation[5]&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;ports: ca&lt;em&gt;root&lt;/em&gt;nss 3.44&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;ports: php 7.2.18[6]&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;ports: sqlite 3.28.0[7]&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;ports: strongswan custom XAuth generic patch removed&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://blog.jasper.la/wireguard-on-openbsd.html"&gt;wiregaurd on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Earlier this week I imported a port for WireGuard into the OpenBSD ports tree. At the moment we have the userland daemon and the tools available. The in-kernel implementation is only available for Linux. At the time of writing there are packages available for -current.
  Jason A. Donenfeld (WireGuard author) has worked to support OpenBSD in WireGuard and as such his post on ports@ last year got me interested in WireGuard, since then others have toyed with WireGuard on OpenBSD before and as such I've used Ted's article as a reference. Note however that some of the options mentioned there are no longer valid. Also, I'll be using two OpenBSD peers here.
  The setup will be as follows: two OpenBSD peers, of which we'll dub wg1 the server and wg2 the client. The WireGuard service on wg1 is listening on 100.64.4.3:51820.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Conclusion&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;WireGuard (cl)aims to be easier to setup and faster than OpenVPN and while I haven't been able to verify the latter, the first is certainly true...once you've figured it out. Most documentation out there is for Linux so I had to figure out the wireguard&lt;em&gt;go service and the tun parameters. But all in all, sure, it's easier. Especially the client configuration on iOS which I didn't cover here because it's essentially pkg&lt;/em&gt;add libqrencode ; cat client.conf | qrencode -t ansiutf8, scan the code with the WireGuard app and you're good to go. What is particularly neat is that WireGuard on iOS supports Always-on.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/SerenityOS/serenity"&gt;Serenity OS&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2019/05/27/22985.html"&gt;vkernels vs pmap&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=EY6q5dv_B-o"&gt;Brian Kernighan interviews Ken Thompson&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/improvements_in_forking_threading_and"&gt;Improvements in forking, threading, and signal code&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2019/05/21/22946.html"&gt;DragonFly 5.4.3&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://magazine.odroid.com/article/netbsd-for-the-the-odroid-c2/"&gt;NetBSD on the Odroid C2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Paulo - &lt;a href="http://dpaste.com/3VXMGX8"&gt;Laptops&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;A Listener - &lt;a href="http://dpaste.com/0SWJNRX#wrap"&gt;Thanks&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;Bostjan - &lt;a href="http://dpaste.com/35NRF40#wrap"&gt;Extend a pool and lower RAM footprint&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords> freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, bsdcan, zfs, openindiana, freenas, firmware, wireguard</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 11.3-beta 1 is out, BSDCan 2019 recap, OpenIndiana 2019.04 is out, Overview of ZFS Pools in FreeNAS, why open source firmware is important for security, a new Opnsense release, wireguard on OpenBSD, and more. </p>

<h2 id="headlines">Headlines</h2>

<h3 id="freebsd113b1isouthttpslistsfreebsdorgpipermailfreebsdstable2019may091210html"><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2019-May/091210.html">FreeBSD 11.3-b1 is out</a></h3>

<h3 id="bsdcan2019recaphttpswwwbsdcanorg2019"><a href="https://www.bsdcan.org/2019/">BSDCan 2019 Recap</a></h3>

<ul>
<li>We’re back from BSDCan and it was a packed week as always.</li>

<li>It started with <a href="http://bhyvecon.org/">bhyvecon</a> on Tuesday. Meanwhile, Benedict spent the whole day in productive meetings: annual FreeBSD Foundation board meeting and FreeBSD Journal editorial board meeting.</li>

<li>On Wednesday, tutorials for BSDCan started as well as the <a href="https://wiki.freebsd.org/DevSummit/201905">FreeBSD Developer Summit</a>. In the mornings, there were presentations in the big auditorium, while working groups about networking, failsafe bootcode, development web services, swap space management, and testing/CI were held. Friday had a similar format with an update from the FreeBSD core team and the “have, need, want” session for FreeBSD 13. In the afternoon, there were working groups about translation tools, package base, GSoC/Outreachy, or general hacking. Benedict held his Icinga tutorial in the afternoon with about 15 people attending.
Devsummit presentation slides can be found on the wiki page and video recordings done by <a href="https://www.scaleengine.com/">ScaleEngine</a> are available on <a href="https://www.youtube.com/channel/UCxLxR_oW-NAmChIcSkAyZGQ">FreeBSD’s youtube channel</a>.</li>

<li>The conference program was a good mixture of sysadmin and tech talks across the major BSDs. Benedict saw the following talks: How ZFS snapshots really work by Matt Ahrens, 20 years in Jail by Michael W. Lucas, OpenZFS BOF session, the future of OpenZFS and FreeBSD, MQTT for system administrators by Jan-Piet Mens, and spent the rest of the time in between in the hallway track. </li>

<li>Photos from the event are available on <a href="https://www.talegraph.com/tales/Qg446T5bKT">Ollivier Robert’s talegraph
</a> and Diane Bruce’s website for <a href="http://www.db.net/gallery/BSDCan/2019_BSDCan_day_1_web/">day 1</a>, <a href="http://www.db.net/gallery/BSDCan/2019_FreeBSD_Dev_Summit_day_2_web">day 2</a>, <a href="http://www.db.net/gallery/BSDCan/2019_BSDCan_day_1_web">conference day 1</a>, and <a href="http://www.db.net/gallery/BSDCan/2019_BSDCan_day_2_web">conference day 2</a>.</li>

<li>Thanks to all the sponsors, supporters, organizers, speakers, and attendees for making this yet another great BSDCan. Next year’s BSDCan will be from June 2 - 6, 2020.</li>
</ul>

<p><hr /></p>

<h3 id="openindiana201904isouthttpswwwopenindianaorg20190512openindianahipster201904ishere"><a href="https://www.openindiana.org/2019/05/12/openindiana-hipster-2019-04-is-here/">OpenIndiana 2019.04 is out</a></h3>

<blockquote>
  <p>We have released a new OpenIndiana Hipster snapshot 2019.04. The noticeable changes:</p>
</blockquote>

<ul>
<li><p>Firefox was updated to 60.6.3 ESR</p></li>

<li><p>Virtualbox packages were added (including guest additions)</p></li>

<li><p>Mate was updated to 1.22</p></li>

<li><p>IPS has received updates from OmniOS CE and Oracle IPS repos, including automatic boot environment naming</p></li>

<li><p>Some OI-specific applications have been ported from Python 2.7/GTK 2 to Python 3.5/GTK 3</p></li>

<li><p>Quick Demo Video: https://www.youtube.com/watch?v=tQ0-fo3XNrg</p></li>
</ul>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="overviewofzfspoolsinfreenashttpswwwixsystemscomblogzfspoolsinfreenas"><a href="https://www.ixsystems.com/blog/zfs-pools-in-freenas/">Overview of ZFS Pools in FreeNAS</a></h3>

<blockquote>
  <p>FreeNAS uses the OpenZFS (ZFS) file system, which handles both disk and volume management. ZFS offers RAID options mirror, stripe, and its own parity distribution called RAIDZ that functions like RAID5 on hardware RAID. The file system is extremely flexible and secure, with various drive combinations, checksums, snapshots, and replication all possible. For a deeper dive on ZFS technology, read the ZFS Primer section of the FreeNAS documentation.</p>
  
  <p>SUGGEST LAYOUT attempts to balance usable capacity and redundancy by automatically choosing an ideal vdev layout for the number of available disks.</p>
</blockquote>

<ul>
<li>The following vdev layout options are available when creating a pool:


<ul>
<li>Stripe data is shared on two drives, similar to RAID0)</li>

<li>Mirror copies data on two drives, similar to RAID1 but not limited to 2 disks)</li>

<li>RAIDZ1 single parity similar to RAID5</li>

<li>RAIDZ2 double parity similar to RAID6</li>

<li>RAIDZ3 which uses triple parity and has no RAID equivalent</li></ul>
</li>
</ul>

<p><hr /></p>

<h3 id="whyopensourcefirmwareisimportantforsecurityhttpsblogjessfrazcompostwhyopensourcefirmwareisimportantforsecurity"><a href="https://blog.jessfraz.com/post/why-open-source-firmware-is-important-for-security/">Why OpenSource Firmware is Important for Security</a></h3>

<ul>
<li>Roots of Trust</li>
</ul>

<blockquote>
  <p>The goal of the root of trust should be to verify that the software installed in every component of the hardware is the software that was intended. This way you can know without a doubt and verify if hardware has been hacked. Since we have very little to no visibility into the code running in a lot of places in our hardware it is hard to do this. How do we really know that the firmware in a component is not vulnerable or that is doesn’t have any backdoors? Well we can’t. Not unless it was all open source.
  Every cloud and vendor seems to have their own way of doing a root of trust. Microsoft has Cerberus, Google has Titan, and Amazon has Nitro. These seem to assume an explicit amount of trust in the proprietary code (the code we cannot see). This leaves me with not a great feeling. Wouldn’t it be better to be able to use all open source code? Then we could verify without a doubt that the code you can read and build yourself is the same code running on hardware for all the various places we have firmware. We could then verify that a machine was in a correct state without a doubt of it being vulnerable or with a backdoor.
  It makes me wonder what the smaller cloud providers like DigitalOcean or Packet have for a root of trust. Often times we only hear of these projects from the big three or five. </p>
</blockquote>

<p><hr /></p>

<h3 id="opnsensehttpsopnsenseorgopnsense1918released"><a href="https://opnsense.org/opnsense-19-1-8-released/">OPNsense</a></h3>

<blockquote>
  <p>This update addresses several privilege escalation issues in the access control implementation and new memory disclosure issues in Intel CPUs. We would like to thank Arnaud Cordier and Bill Marquette for the top-notch reports and coordination.</p>
</blockquote>

<ul>
<li><p>Here are the full patch notes:</p></li>

<li><p>system: address CVE-2019-11816 privilege escalation bugs[1] (reported by Arnaud Cordier)</p></li>

<li><p>system: /etc/hosts generation without interface<em>has</em>gateway()</p></li>

<li><p>system: show correct timestamp in config restore save message (contributed by nhirokinet)</p></li>

<li><p>system: list the commands for the pluginctl utility when n+ argument is given</p></li>

<li><p>system: introduce and use userIsAdmin() helper function instead of checking for 'page-all' privilege directly</p></li>

<li><p>system: use absolute path in widget ACLs (reported by Netgate)</p></li>

<li><p>system: RRD-related cleanups for less code exposure</p></li>

<li><p>interfaces: add EN DUID Generation using OPNsense PEN (contributed by Team Rebellion)</p></li>

<li><p>interfaces: replace legacy<em>getall</em>interface_addresses() usage</p></li>

<li><p>firewall: fix port validation in aliases with leading / trailing spaces</p></li>

<li><p>firewall: fix outbound NAT translation display in overview page</p></li>

<li><p>firewall: prevent CARP outgoing packets from using the configured gateway</p></li>

<li><p>firewall: use CARP net.inet.carp.demotion to control current demotion in status page</p></li>

<li><p>firewall: stop live log poller on error result</p></li>

<li><p>dhcpd: change rule priority to 1 to avoid bogon clash</p></li>

<li><p>dnsmasq: only admins may edit custom options field</p></li>

<li><p>firmware: use insecure mode for base and kernel sets when package fingerprints are disabled</p></li>

<li><p>firmware: add optional device support for base and kernel sets</p></li>

<li><p>firmware: add Hostcentral mirror (HTTP, Melbourne, Australia)</p></li>

<li><p>ipsec: always reset rightallowany to default when writing configuration</p></li>

<li><p>lang: say "hola" to Spanish as the newest available GUI language</p></li>

<li><p>lang: updates for Chinese, Czech, Japanese, German, French, Russian and Portuguese</p></li>

<li><p>network time: only admins may edit custom options field</p></li>

<li><p>openvpn: call openvpn<em>refresh</em>crls() indirectly via plugin_configure() for less code exposure</p></li>

<li><p>openvpn: only admins may edit custom options field to prevent privilege escalation (reported by Bill Marquette)</p></li>

<li><p>openvpn: remove custom options field from wizard</p></li>

<li><p>unbound: only admins may edit custom options field</p></li>

<li><p>wizard: translate typehint as well</p></li>

<li><p>plugins: os-freeradius 1.9.3 fixes string interpolation in LDAP filters (contributed by theq86)</p></li>

<li><p>plugins: os-nginx 1.12[2]</p></li>

<li><p>plugins: os-theme-cicada 1.17 (contributed by Team Rebellion)</p></li>

<li><p>plugins: os-theme-tukan 1.17 (contributed by Team Rebellion)</p></li>

<li><p>src: timezone database information update[3]</p></li>

<li><p>src: install(1) broken with partially matching relative paths[4]</p></li>

<li><p>src: microarchitectural Data Sampling (MDS) mitigation[5]</p></li>

<li><p>ports: ca<em>root</em>nss 3.44</p></li>

<li><p>ports: php 7.2.18[6]</p></li>

<li><p>ports: sqlite 3.28.0[7]</p></li>

<li><p>ports: strongswan custom XAuth generic patch removed</p></li>
</ul>

<p><hr /></p>

<h3 id="wiregaurdonopenbsdhttpsblogjasperlawireguardonopenbsdhtml"><a href="https://blog.jasper.la/wireguard-on-openbsd.html">wiregaurd on OpenBSD</a></h3>

<blockquote>
  <p>Earlier this week I imported a port for WireGuard into the OpenBSD ports tree. At the moment we have the userland daemon and the tools available. The in-kernel implementation is only available for Linux. At the time of writing there are packages available for -current.
  Jason A. Donenfeld (WireGuard author) has worked to support OpenBSD in WireGuard and as such his post on ports@ last year got me interested in WireGuard, since then others have toyed with WireGuard on OpenBSD before and as such I've used Ted's article as a reference. Note however that some of the options mentioned there are no longer valid. Also, I'll be using two OpenBSD peers here.
  The setup will be as follows: two OpenBSD peers, of which we'll dub wg1 the server and wg2 the client. The WireGuard service on wg1 is listening on 100.64.4.3:51820.</p>
</blockquote>

<ul>
<li>Conclusion</li>
</ul>

<blockquote>
  <p>WireGuard (cl)aims to be easier to setup and faster than OpenVPN and while I haven't been able to verify the latter, the first is certainly true...once you've figured it out. Most documentation out there is for Linux so I had to figure out the wireguard<em>go service and the tun parameters. But all in all, sure, it's easier. Especially the client configuration on iOS which I didn't cover here because it's essentially pkg</em>add libqrencode ; cat client.conf | qrencode -t ansiutf8, scan the code with the WireGuard app and you're good to go. What is particularly neat is that WireGuard on iOS supports Always-on.</p>
</blockquote>

<p><hr /></p>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://github.com/SerenityOS/serenity">Serenity OS</a></li>

<li><a href="https://www.dragonflydigest.com/2019/05/27/22985.html">vkernels vs pmap</a></li>

<li><a href="https://www.youtube.com/watch?v=EY6q5dv_B-o">Brian Kernighan interviews Ken Thompson</a></li>

<li><a href="http://blog.netbsd.org/tnf/entry/improvements_in_forking_threading_and">Improvements in forking, threading, and signal code</a></li>

<li><a href="https://www.dragonflydigest.com/2019/05/21/22946.html">DragonFly 5.4.3</a></li>

<li><a href="https://magazine.odroid.com/article/netbsd-for-the-the-odroid-c2/">NetBSD on the Odroid C2</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Paulo - <a href="http://dpaste.com/3VXMGX8">Laptops</a></li>

<li>A Listener - <a href="http://dpaste.com/0SWJNRX#wrap">Thanks</a></li>

<li>Bostjan - <a href="http://dpaste.com/35NRF40#wrap">Extend a pool and lower RAM footprint</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0300.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 11.3-beta 1 is out, BSDCan 2019 recap, OpenIndiana 2019.04 is out, Overview of ZFS Pools in FreeNAS, why open source firmware is important for security, a new Opnsense release, wireguard on OpenBSD, and more. </p>

<h2 id="headlines">Headlines</h2>

<h3 id="freebsd113b1isouthttpslistsfreebsdorgpipermailfreebsdstable2019may091210html"><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2019-May/091210.html">FreeBSD 11.3-b1 is out</a></h3>

<h3 id="bsdcan2019recaphttpswwwbsdcanorg2019"><a href="https://www.bsdcan.org/2019/">BSDCan 2019 Recap</a></h3>

<ul>
<li>We’re back from BSDCan and it was a packed week as always.</li>

<li>It started with <a href="http://bhyvecon.org/">bhyvecon</a> on Tuesday. Meanwhile, Benedict spent the whole day in productive meetings: annual FreeBSD Foundation board meeting and FreeBSD Journal editorial board meeting.</li>

<li>On Wednesday, tutorials for BSDCan started as well as the <a href="https://wiki.freebsd.org/DevSummit/201905">FreeBSD Developer Summit</a>. In the mornings, there were presentations in the big auditorium, while working groups about networking, failsafe bootcode, development web services, swap space management, and testing/CI were held. Friday had a similar format with an update from the FreeBSD core team and the “have, need, want” session for FreeBSD 13. In the afternoon, there were working groups about translation tools, package base, GSoC/Outreachy, or general hacking. Benedict held his Icinga tutorial in the afternoon with about 15 people attending.
Devsummit presentation slides can be found on the wiki page and video recordings done by <a href="https://www.scaleengine.com/">ScaleEngine</a> are available on <a href="https://www.youtube.com/channel/UCxLxR_oW-NAmChIcSkAyZGQ">FreeBSD’s youtube channel</a>.</li>

<li>The conference program was a good mixture of sysadmin and tech talks across the major BSDs. Benedict saw the following talks: How ZFS snapshots really work by Matt Ahrens, 20 years in Jail by Michael W. Lucas, OpenZFS BOF session, the future of OpenZFS and FreeBSD, MQTT for system administrators by Jan-Piet Mens, and spent the rest of the time in between in the hallway track. </li>

<li>Photos from the event are available on <a href="https://www.talegraph.com/tales/Qg446T5bKT">Ollivier Robert’s talegraph
</a> and Diane Bruce’s website for <a href="http://www.db.net/gallery/BSDCan/2019_BSDCan_day_1_web/">day 1</a>, <a href="http://www.db.net/gallery/BSDCan/2019_FreeBSD_Dev_Summit_day_2_web">day 2</a>, <a href="http://www.db.net/gallery/BSDCan/2019_BSDCan_day_1_web">conference day 1</a>, and <a href="http://www.db.net/gallery/BSDCan/2019_BSDCan_day_2_web">conference day 2</a>.</li>

<li>Thanks to all the sponsors, supporters, organizers, speakers, and attendees for making this yet another great BSDCan. Next year’s BSDCan will be from June 2 - 6, 2020.</li>
</ul>

<p><hr /></p>

<h3 id="openindiana201904isouthttpswwwopenindianaorg20190512openindianahipster201904ishere"><a href="https://www.openindiana.org/2019/05/12/openindiana-hipster-2019-04-is-here/">OpenIndiana 2019.04 is out</a></h3>

<blockquote>
  <p>We have released a new OpenIndiana Hipster snapshot 2019.04. The noticeable changes:</p>
</blockquote>

<ul>
<li><p>Firefox was updated to 60.6.3 ESR</p></li>

<li><p>Virtualbox packages were added (including guest additions)</p></li>

<li><p>Mate was updated to 1.22</p></li>

<li><p>IPS has received updates from OmniOS CE and Oracle IPS repos, including automatic boot environment naming</p></li>

<li><p>Some OI-specific applications have been ported from Python 2.7/GTK 2 to Python 3.5/GTK 3</p></li>

<li><p>Quick Demo Video: https://www.youtube.com/watch?v=tQ0-fo3XNrg</p></li>
</ul>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="overviewofzfspoolsinfreenashttpswwwixsystemscomblogzfspoolsinfreenas"><a href="https://www.ixsystems.com/blog/zfs-pools-in-freenas/">Overview of ZFS Pools in FreeNAS</a></h3>

<blockquote>
  <p>FreeNAS uses the OpenZFS (ZFS) file system, which handles both disk and volume management. ZFS offers RAID options mirror, stripe, and its own parity distribution called RAIDZ that functions like RAID5 on hardware RAID. The file system is extremely flexible and secure, with various drive combinations, checksums, snapshots, and replication all possible. For a deeper dive on ZFS technology, read the ZFS Primer section of the FreeNAS documentation.</p>
  
  <p>SUGGEST LAYOUT attempts to balance usable capacity and redundancy by automatically choosing an ideal vdev layout for the number of available disks.</p>
</blockquote>

<ul>
<li>The following vdev layout options are available when creating a pool:


<ul>
<li>Stripe data is shared on two drives, similar to RAID0)</li>

<li>Mirror copies data on two drives, similar to RAID1 but not limited to 2 disks)</li>

<li>RAIDZ1 single parity similar to RAID5</li>

<li>RAIDZ2 double parity similar to RAID6</li>

<li>RAIDZ3 which uses triple parity and has no RAID equivalent</li></ul>
</li>
</ul>

<p><hr /></p>

<h3 id="whyopensourcefirmwareisimportantforsecurityhttpsblogjessfrazcompostwhyopensourcefirmwareisimportantforsecurity"><a href="https://blog.jessfraz.com/post/why-open-source-firmware-is-important-for-security/">Why OpenSource Firmware is Important for Security</a></h3>

<ul>
<li>Roots of Trust</li>
</ul>

<blockquote>
  <p>The goal of the root of trust should be to verify that the software installed in every component of the hardware is the software that was intended. This way you can know without a doubt and verify if hardware has been hacked. Since we have very little to no visibility into the code running in a lot of places in our hardware it is hard to do this. How do we really know that the firmware in a component is not vulnerable or that is doesn’t have any backdoors? Well we can’t. Not unless it was all open source.
  Every cloud and vendor seems to have their own way of doing a root of trust. Microsoft has Cerberus, Google has Titan, and Amazon has Nitro. These seem to assume an explicit amount of trust in the proprietary code (the code we cannot see). This leaves me with not a great feeling. Wouldn’t it be better to be able to use all open source code? Then we could verify without a doubt that the code you can read and build yourself is the same code running on hardware for all the various places we have firmware. We could then verify that a machine was in a correct state without a doubt of it being vulnerable or with a backdoor.
  It makes me wonder what the smaller cloud providers like DigitalOcean or Packet have for a root of trust. Often times we only hear of these projects from the big three or five. </p>
</blockquote>

<p><hr /></p>

<h3 id="opnsensehttpsopnsenseorgopnsense1918released"><a href="https://opnsense.org/opnsense-19-1-8-released/">OPNsense</a></h3>

<blockquote>
  <p>This update addresses several privilege escalation issues in the access control implementation and new memory disclosure issues in Intel CPUs. We would like to thank Arnaud Cordier and Bill Marquette for the top-notch reports and coordination.</p>
</blockquote>

<ul>
<li><p>Here are the full patch notes:</p></li>

<li><p>system: address CVE-2019-11816 privilege escalation bugs[1] (reported by Arnaud Cordier)</p></li>

<li><p>system: /etc/hosts generation without interface<em>has</em>gateway()</p></li>

<li><p>system: show correct timestamp in config restore save message (contributed by nhirokinet)</p></li>

<li><p>system: list the commands for the pluginctl utility when n+ argument is given</p></li>

<li><p>system: introduce and use userIsAdmin() helper function instead of checking for 'page-all' privilege directly</p></li>

<li><p>system: use absolute path in widget ACLs (reported by Netgate)</p></li>

<li><p>system: RRD-related cleanups for less code exposure</p></li>

<li><p>interfaces: add EN DUID Generation using OPNsense PEN (contributed by Team Rebellion)</p></li>

<li><p>interfaces: replace legacy<em>getall</em>interface_addresses() usage</p></li>

<li><p>firewall: fix port validation in aliases with leading / trailing spaces</p></li>

<li><p>firewall: fix outbound NAT translation display in overview page</p></li>

<li><p>firewall: prevent CARP outgoing packets from using the configured gateway</p></li>

<li><p>firewall: use CARP net.inet.carp.demotion to control current demotion in status page</p></li>

<li><p>firewall: stop live log poller on error result</p></li>

<li><p>dhcpd: change rule priority to 1 to avoid bogon clash</p></li>

<li><p>dnsmasq: only admins may edit custom options field</p></li>

<li><p>firmware: use insecure mode for base and kernel sets when package fingerprints are disabled</p></li>

<li><p>firmware: add optional device support for base and kernel sets</p></li>

<li><p>firmware: add Hostcentral mirror (HTTP, Melbourne, Australia)</p></li>

<li><p>ipsec: always reset rightallowany to default when writing configuration</p></li>

<li><p>lang: say "hola" to Spanish as the newest available GUI language</p></li>

<li><p>lang: updates for Chinese, Czech, Japanese, German, French, Russian and Portuguese</p></li>

<li><p>network time: only admins may edit custom options field</p></li>

<li><p>openvpn: call openvpn<em>refresh</em>crls() indirectly via plugin_configure() for less code exposure</p></li>

<li><p>openvpn: only admins may edit custom options field to prevent privilege escalation (reported by Bill Marquette)</p></li>

<li><p>openvpn: remove custom options field from wizard</p></li>

<li><p>unbound: only admins may edit custom options field</p></li>

<li><p>wizard: translate typehint as well</p></li>

<li><p>plugins: os-freeradius 1.9.3 fixes string interpolation in LDAP filters (contributed by theq86)</p></li>

<li><p>plugins: os-nginx 1.12[2]</p></li>

<li><p>plugins: os-theme-cicada 1.17 (contributed by Team Rebellion)</p></li>

<li><p>plugins: os-theme-tukan 1.17 (contributed by Team Rebellion)</p></li>

<li><p>src: timezone database information update[3]</p></li>

<li><p>src: install(1) broken with partially matching relative paths[4]</p></li>

<li><p>src: microarchitectural Data Sampling (MDS) mitigation[5]</p></li>

<li><p>ports: ca<em>root</em>nss 3.44</p></li>

<li><p>ports: php 7.2.18[6]</p></li>

<li><p>ports: sqlite 3.28.0[7]</p></li>

<li><p>ports: strongswan custom XAuth generic patch removed</p></li>
</ul>

<p><hr /></p>

<h3 id="wiregaurdonopenbsdhttpsblogjasperlawireguardonopenbsdhtml"><a href="https://blog.jasper.la/wireguard-on-openbsd.html">wiregaurd on OpenBSD</a></h3>

<blockquote>
  <p>Earlier this week I imported a port for WireGuard into the OpenBSD ports tree. At the moment we have the userland daemon and the tools available. The in-kernel implementation is only available for Linux. At the time of writing there are packages available for -current.
  Jason A. Donenfeld (WireGuard author) has worked to support OpenBSD in WireGuard and as such his post on ports@ last year got me interested in WireGuard, since then others have toyed with WireGuard on OpenBSD before and as such I've used Ted's article as a reference. Note however that some of the options mentioned there are no longer valid. Also, I'll be using two OpenBSD peers here.
  The setup will be as follows: two OpenBSD peers, of which we'll dub wg1 the server and wg2 the client. The WireGuard service on wg1 is listening on 100.64.4.3:51820.</p>
</blockquote>

<ul>
<li>Conclusion</li>
</ul>

<blockquote>
  <p>WireGuard (cl)aims to be easier to setup and faster than OpenVPN and while I haven't been able to verify the latter, the first is certainly true...once you've figured it out. Most documentation out there is for Linux so I had to figure out the wireguard<em>go service and the tun parameters. But all in all, sure, it's easier. Especially the client configuration on iOS which I didn't cover here because it's essentially pkg</em>add libqrencode ; cat client.conf | qrencode -t ansiutf8, scan the code with the WireGuard app and you're good to go. What is particularly neat is that WireGuard on iOS supports Always-on.</p>
</blockquote>

<p><hr /></p>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://github.com/SerenityOS/serenity">Serenity OS</a></li>

<li><a href="https://www.dragonflydigest.com/2019/05/27/22985.html">vkernels vs pmap</a></li>

<li><a href="https://www.youtube.com/watch?v=EY6q5dv_B-o">Brian Kernighan interviews Ken Thompson</a></li>

<li><a href="http://blog.netbsd.org/tnf/entry/improvements_in_forking_threading_and">Improvements in forking, threading, and signal code</a></li>

<li><a href="https://www.dragonflydigest.com/2019/05/21/22946.html">DragonFly 5.4.3</a></li>

<li><a href="https://magazine.odroid.com/article/netbsd-for-the-the-odroid-c2/">NetBSD on the Odroid C2</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Paulo - <a href="http://dpaste.com/3VXMGX8">Laptops</a></li>

<li>A Listener - <a href="http://dpaste.com/0SWJNRX#wrap">Thanks</a></li>

<li>Bostjan - <a href="http://dpaste.com/35NRF40#wrap">Extend a pool and lower RAM footprint</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0300.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 247: Interning for FreeBSD | BSD Now 247</title>
  <link>https://www.bsdnow.tv/247</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-1994</guid>
  <pubDate>Thu, 24 May 2018 15:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/31bf045b-2e53-459e-a40e-993a51ceccdb.mp3" length="54062460" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.</itunes:subtitle>
  <itunes:duration>1:29:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.
&lt;h2&gt;Headlines&lt;/h2&gt;
&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/blog/guest-blog-what-i-learned-during-my-freebsd-internship/"&gt;What I learned during my FreeBSD intership&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development.&lt;/p&gt;
  
  &lt;p&gt;I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;What I Liked&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software.&lt;/p&gt;
  
  &lt;p&gt;It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;What I Learned&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader.&lt;/p&gt;
  
  &lt;p&gt;The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to.&lt;/p&gt;
  
  &lt;p&gt;I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this.&lt;/p&gt;
  
  &lt;p&gt;I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others.&lt;/p&gt;
  
  &lt;p&gt;I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them.&lt;/p&gt;
  
  &lt;p&gt;It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects.&lt;/p&gt;
  
  &lt;p&gt;As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Closing Thoughts&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further.&lt;/p&gt;
  
  &lt;p&gt;I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h3&gt;Recent Developments in FreeBSD&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=333890"&gt;Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=333649"&gt;Intel Microcode Splitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=334005"&gt;Intel Spec Store Bypass Disable control&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=333713"&gt;Raspberry Pi 3B+ Ethernet Driver&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D15522"&gt;IBRS for i386&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Upcoming:&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D15523"&gt;Microcode updater for AMD CPUs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D15525"&gt;the RACK TCP/IP stack, from Netflix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Voting in the FreeBSD Core Election begins today:&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;DigitalOcean&lt;/strong&gt;
&lt;a href="http://do.co/bsdnow"&gt;Digital Ocean Promo Link for BSD Now Listeners&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="http://www.shlomimarco.com/blog/running-freenas-on-a-digitalocean-droplet"&gt;Running FreeNAS on a DigitalOcean Droplet&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it&lt;/li&gt;
&lt;li&gt;The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS&lt;/li&gt;
&lt;li&gt;Create a droplet, and add a small secondary block-storage device&lt;/li&gt;
&lt;li&gt;Boot the droplet, login, and download FreeNAS&lt;/li&gt;
&lt;li&gt;Disable swap, enable ‘foot shooting’ mode in GEOM&lt;/li&gt;
&lt;li&gt;use dd to write the FreeNAS installer to the boot disk&lt;/li&gt;
&lt;li&gt;Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device&lt;/li&gt;
&lt;li&gt;Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer&lt;/li&gt;
&lt;li&gt;Boot, and dd FreeNAS from the secondary block storage device back to the boot disk&lt;/li&gt;
&lt;li&gt;You can now destroy the secondary block device&lt;/li&gt;
&lt;li&gt;Now you have a FreeNAS, and can take it from there.&lt;/li&gt;
&lt;li&gt;Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS&lt;/li&gt;
&lt;li&gt;Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.vincentdelft.be/post/post_20180411"&gt;Network Manager Control for OpenBSD (Updated)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Generalities&lt;/li&gt;
&lt;li&gt;&lt;p&gt;I just remind the scope of this small tool:&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;allow you to pre-define several cable or wifi connections&lt;/li&gt;
&lt;li&gt;let nmctl to connect automatically to the first available one&lt;/li&gt;
&lt;li&gt;allow you to easily switch from one network connection to an other one&lt;/li&gt;
&lt;li&gt;create openbox dynamic menus&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enhancements in this version&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;This is my second development version: 0.2.
  I've added performed several changes in the code:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;code style cleanup, to better match the python recommendations&lt;/li&gt;
&lt;li&gt;adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels&lt;/li&gt;
&lt;li&gt;implement a loop as work-around concerning the arp table issue.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The source code is still on the git of Sourceforge.net. 
   You can see the files &lt;a href="https://sourceforge.net/p/nmctl/code/ci/master/tree/"&gt;here&lt;/a&gt;&lt;/p&gt;
  
  &lt;p&gt;And you can download the last version &lt;a href="https://sourceforge.net/p/nmctl/code/ci/master/tarball"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Feedbacks after few months&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The Openbox menus&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options.
  I've not changed this part of nmctl since it works as expected (for me :-) ).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The --restart option&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. 
  In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me.
  But I had several issues in this scenario.
  Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing.
  Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters.
  If you want to reduce or increase this figures, you can do it via the --retry parameter.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Results of my expertise with this small tool&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location.
  Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable.
  Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-).
  I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan".&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Next steps&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Documentation&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same.
  I plan to write a README and a man page at first instances.
  But since my laziness, I will do it as soon as I see some interest for this tool from other persons.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Tests&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I now have to travel and see how to see the script react on the different situations.
  Interested persons are welcome to share with me the outcome of their tests.
  I'm curious how it work.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://an.undulating.space/post/180411-erl-openbsd-upgrade/"&gt;OpenBSD 6.3 on EdgeRouter Lite simple upgrade method&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;TL;DR&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on.
  Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;a tiny upgrade&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3.
  The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention:
  The best solution, whenever possible, is to backup your data and reinstall from scratch
  I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Reading on:&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD".
  But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it.
  But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade.
  Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once.
  So I don’t want to futz around with all that.
  There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;iXsystems&lt;/strong&gt;
&lt;a href="https://www.ixsystems.com/blog/boisetechshow-2018/"&gt;Boise Technology Show 2018 Recap&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;&lt;a href="http://zfs.datto.com/"&gt;OpenZFS User Conference Slides &amp;amp; Videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112599"&gt;Thank you ZFS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112475"&gt;ZSTD Compression&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266111164"&gt;Pool Layout Considerations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266111346"&gt;ZFS Releases&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112077"&gt;Helping Developers Help You&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266112233"&gt;ZFS and MySQL on Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266110985"&gt;Micron&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266108105"&gt;OSNEXUS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266107946"&gt;ZFS at Six Feet Up&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vimeo.com/album/5150026/video/266107372"&gt;Flexible Disk Use with OpenZFS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://jvns.ca/blog/2018/05/11/batch-editing-files-with-ed/"&gt;Batch editing files with ed&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;what’s ‘ed’?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;
$ ed
help
?
h
?
asdfasdfasdfsadf
?
&amp;lt;close terminal in frustration&amp;gt;
&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today.
  vi is a successor to ed, except with a visual interface instead of this ?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;surprise: Ed is actually sort of cool and fun&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!!
  On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true.
  And it was so cool!!!! I found out:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;how to get Ed to give you better error messages than just ?&lt;/li&gt;
&lt;li&gt;that the name of the grep command comes from ed syntax (g/re/p)&lt;/li&gt;
&lt;li&gt;the basics of how to navigate and edit files using ed&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!!&lt;/p&gt;
  
  &lt;p&gt;The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blather.michaelwlucas.com/archives/3186"&gt;FreeBSD Mastery: Jails -- Help make it happen &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=MsY-BafQgj4"&gt;Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2018/05/17/21257.html"&gt;DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.reddit.com/r/openbsd/comments/8ei00k/a_love_letter_to_openbsd/"&gt;A Love Letter to OpenBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blather.michaelwlucas.com/archives/3176"&gt;New talks, and the F-bomb&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://manpages.bsd.lv/mdoc.html"&gt;Practical UNIX Manuals: mdoc&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2018-May/004758.html"&gt;BSD Meetup in Zurich: May 24th&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.eventbrite.com/e/the-polish-bsd-user-group-1-meetup-tickets-45941857332"&gt;BSD Meetup in Warsaw: May 24th&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://meetbsd.com/"&gt;MeetBSD 2018&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Tarsnap&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Seth - &lt;a href="http://dpaste.com/12R65X4#wrap"&gt;First time poudriere Builder&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Farhan - &lt;a href="http://dpaste.com/1GHCGY5#wrap"&gt;Why we didn't go FreeBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;architech - &lt;a href="http://dpaste.com/1H72FGE#wrap"&gt;Encryption Feedback&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Dave - &lt;a href="http://dpaste.com/27YH93Y#wrap"&gt;Handy Tip on setting up automated coredump handling for FreeBSD&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, tutorial, howto, guide, bsd, interview, FreeBSD Internship, FreeNAS, Digital Ocean, Network Manager, EdgeRouter Lite, OpenZFS, ed</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/guest-blog-what-i-learned-during-my-freebsd-internship/">What I learned during my FreeBSD intership</a></h3>

<blockquote>
  <p>Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development.</p>
  
  <p>I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”.</p>
</blockquote>

<ul>
<li>What I Liked</li>
</ul>

<blockquote>
  <p>In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software.</p>
  
  <p>It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated.</p>
</blockquote>

<ul>
<li>What I Learned</li>
</ul>

<blockquote>
  <p>Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader.</p>
  
  <p>The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to.</p>
  
  <p>I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this.</p>
  
  <p>I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others.</p>
  
  <p>I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them.</p>
  
  <p>It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects.</p>
  
  <p>As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning.</p>
</blockquote>

<ul>
<li>Closing Thoughts</li>
</ul>

<blockquote>
  <p>I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further.</p>
  
  <p>I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here.</p>
</blockquote>

<p><hr /></p>

<h3>Recent Developments in FreeBSD</h3>

<ul>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333890">Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333649">Intel Microcode Splitter</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=334005">Intel Spec Store Bypass Disable control</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333713">Raspberry Pi 3B+ Ethernet Driver</a></li>
<li><a href="https://reviews.freebsd.org/D15522">IBRS for i386</a></li>
<li>Upcoming:</li>
<li><a href="https://reviews.freebsd.org/D15523">Microcode updater for AMD CPUs</a></li>
<li><a href="https://reviews.freebsd.org/D15525">the RACK TCP/IP stack, from Netflix</a></li>
<li>Voting in the FreeBSD Core Election begins today:</li>
</ul>

<p><hr /></p>

<p><strong>DigitalOcean</strong>
<a href="http://do.co/bsdnow">Digital Ocean Promo Link for BSD Now Listeners</a></p>

<p><hr /></p>

<h3><a href="http://www.shlomimarco.com/blog/running-freenas-on-a-digitalocean-droplet">Running FreeNAS on a DigitalOcean Droplet</a></h3>

<ul>
<li>Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it</li>
<li>The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS</li>
<li>Create a droplet, and add a small secondary block-storage device</li>
<li>Boot the droplet, login, and download FreeNAS</li>
<li>Disable swap, enable ‘foot shooting’ mode in GEOM</li>
<li>use dd to write the FreeNAS installer to the boot disk</li>
<li>Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device</li>
<li>Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer</li>
<li>Boot, and dd FreeNAS from the secondary block storage device back to the boot disk</li>
<li>You can now destroy the secondary block device</li>
<li>Now you have a FreeNAS, and can take it from there.</li>
<li>Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS</li>
<li>Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool.</li>
</ul>

<p><hr /></p>

<h2>News Roundup</h2>

<h3><a href="http://www.vincentdelft.be/post/post_20180411">Network Manager Control for OpenBSD (Updated)</a></h3>

<ul>
<li>Generalities</li>
<li><p>I just remind the scope of this small tool:</p>

<ul><li>allow you to pre-define several cable or wifi connections</li>
<li>let nmctl to connect automatically to the first available one</li>
<li>allow you to easily switch from one network connection to an other one</li>
<li>create openbox dynamic menus</li></ul></li>
<li><p>Enhancements in this version</p></li>
</ul>

<blockquote>
  <p>This is my second development version: 0.2.
  I've added performed several changes in the code:</p>
</blockquote>

<ul>
<li>code style cleanup, to better match the python recommendations</li>
<li>adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels</li>
<li>implement a loop as work-around concerning the arp table issue.</li>
</ul>

<blockquote>
  <p>The source code is still on the git of Sourceforge.net. 
   You can see the files <a href="https://sourceforge.net/p/nmctl/code/ci/master/tree/">here</a></p>
  
  <p>And you can download the last version <a href="https://sourceforge.net/p/nmctl/code/ci/master/tarball">here</a></p>
</blockquote>

<ul>
<li>Feedbacks after few months</li>
</ul>

<blockquote>
  <p>I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option.</p>
</blockquote>

<ul>
<li>The Openbox menus</li>
</ul>

<blockquote>
  <p>The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options.
  I've not changed this part of nmctl since it works as expected (for me :-) ).</p>
</blockquote>

<ul>
<li>The --restart option</li>
</ul>

<blockquote>
  <p>Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. 
  In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me.
  But I had several issues in this scenario.
  Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing.
  Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters.
  If you want to reduce or increase this figures, you can do it via the --retry parameter.</p>
</blockquote>

<ul>
<li>Results of my expertise with this small tool</li>
</ul>

<blockquote>
  <p>Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location.
  Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable.
  Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-).
  I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan".</p>
</blockquote>

<ul>
<li><p>Next steps</p></li>
<li><p>Documentation</p></li>
</ul>

<blockquote>
  <p>The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same.
  I plan to write a README and a man page at first instances.
  But since my laziness, I will do it as soon as I see some interest for this tool from other persons.</p>
</blockquote>

<ul>
<li>Tests</li>
</ul>

<blockquote>
  <p>I now have to travel and see how to see the script react on the different situations.
  Interested persons are welcome to share with me the outcome of their tests.
  I'm curious how it work.</p>
</blockquote>

<p><hr /></p>

<h3><a href="https://an.undulating.space/post/180411-erl-openbsd-upgrade/">OpenBSD 6.3 on EdgeRouter Lite simple upgrade method</a></h3>

<ul>
<li>TL;DR</li>
</ul>

<blockquote>
  <p>OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on.
  Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it.</p>
</blockquote>

<ul>
<li>a tiny upgrade</li>
</ul>

<blockquote>
  <p>The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3.
  The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention:
  The best solution, whenever possible, is to backup your data and reinstall from scratch
  I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism.</p>
</blockquote>

<ul>
<li>Reading on:</li>
</ul>

<blockquote>
  <p>To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD".
  But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it.
  But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade.
  Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once.
  So I don’t want to futz around with all that.
  There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right?</p>
</blockquote>

<p><hr /></p>

<p><strong>iXsystems</strong>
<a href="https://www.ixsystems.com/blog/boisetechshow-2018/">Boise Technology Show 2018 Recap</a></p>

<h3><a href="http://zfs.datto.com/">OpenZFS User Conference Slides &amp; Videos</a></h3>

<ul>
<li><a href="https://vimeo.com/album/5150026/video/266112599">Thank you ZFS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112475">ZSTD Compression</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111164">Pool Layout Considerations</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111346">ZFS Releases</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112077">Helping Developers Help You</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112233">ZFS and MySQL on Linux</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266110985">Micron</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266108105">OSNEXUS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107946">ZFS at Six Feet Up</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107372">Flexible Disk Use with OpenZFS</a></li>
</ul>

<p><hr /></p>

<h3><a href="https://jvns.ca/blog/2018/05/11/batch-editing-files-with-ed/">Batch editing files with ed</a></h3>

<ul>
<li>what’s ‘ed’?</li>
</ul>

<blockquote>
  <p>ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this:</p>
</blockquote>

<p><code>
$ ed
help
?
h
?
asdfasdfasdfsadf
?
&lt;close terminal in frustration&gt;
</code></p>

<blockquote>
  <p>Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today.
  vi is a successor to ed, except with a visual interface instead of this ?</p>
</blockquote>

<ul>
<li>surprise: Ed is actually sort of cool and fun</li>
</ul>

<blockquote>
  <p>So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!!
  On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true.
  And it was so cool!!!! I found out:</p>
</blockquote>

<ul>
<li>how to get Ed to give you better error messages than just ?</li>
<li>that the name of the grep command comes from ed syntax (g/re/p)</li>
<li>the basics of how to navigate and edit files using ed</li>
</ul>

<blockquote>
  <p>All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!!</p>
  
  <p>The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files.</p>
</blockquote>

<p><hr /></p>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://blather.michaelwlucas.com/archives/3186">FreeBSD Mastery: Jails -- Help make it happen </a></li>
<li><a href="https://www.youtube.com/watch?v=MsY-BafQgj4">Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018</a></li>
<li><a href="https://www.dragonflydigest.com/2018/05/17/21257.html">DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT</a></li>
<li><a href="https://www.reddit.com/r/openbsd/comments/8ei00k/a_love_letter_to_openbsd/">A Love Letter to OpenBSD</a></li>
<li><a href="https://blather.michaelwlucas.com/archives/3176">New talks, and the F-bomb</a></li>
<li><a href="https://manpages.bsd.lv/mdoc.html">Practical UNIX Manuals: mdoc</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2018-May/004758.html">BSD Meetup in Zurich: May 24th</a></li>
<li><a href="https://www.eventbrite.com/e/the-polish-bsd-user-group-1-meetup-tickets-45941857332">BSD Meetup in Warsaw: May 24th</a></li>
<li><a href="http://meetbsd.com/">MeetBSD 2018</a></li>
</ul>

<p><hr /></p>

<p><strong>Tarsnap</strong></p>

<h2>Feedback/Questions</h2>

<ul>
<li>Seth - <a href="http://dpaste.com/12R65X4#wrap">First time poudriere Builder</a></li>
<li>Farhan - <a href="http://dpaste.com/1GHCGY5#wrap">Why we didn't go FreeBSD</a></li>
<li>architech - <a href="http://dpaste.com/1H72FGE#wrap">Encryption Feedback</a></li>
<li>Dave - <a href="http://dpaste.com/27YH93Y#wrap">Handy Tip on setting up automated coredump handling for FreeBSD</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD internship learnings, exciting developments coming to FreeBSD, running FreeNAS on DigitalOcean, Network Manager control for OpenBSD, OpenZFS User Conference Videos are here and batch editing files with ed.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/guest-blog-what-i-learned-during-my-freebsd-internship/">What I learned during my FreeBSD intership</a></h3>

<blockquote>
  <p>Hi, my name is Mitchell Horne. I am a computer engineering student at the University of Waterloo, currently in my third year of studies, and fortunate to have been one of the FreeBSD Foundation’s co-op students this past term (January to April). During this time I worked under Ed Maste, in the Foundation’s small Kitchener office, along with another co-op student Arshan Khanifar. My term has now come to an end, and so I’d like to share a little bit about my experience as a newcomer to FreeBSD and open-source development.</p>
  
  <p>I’ll begin with some quick background — and a small admission of guilt. I have been an open-source user for a large part of my life. When I was a teenager I started playing around with Linux, which opened my eyes to the wider world of free software. Other than some small contributions to GNOME, my experience has been mostly as an end user; however, the value of these projects and the open-source philosophy was not lost on me, and is most of what motivated my interest in this position. Before beginning this term I had no personal experience with any of the BSDs, although I knew of their existence and was extremely excited to receive the position. I knew it would be a great opportunity for growth, but I must confess that my naivety about FreeBSD caused me to make the silent assumption that this would be a form of compromise — a stepping stone that would eventually allow me to work on open-source projects that are somehow “greater” or more “legitimate”. After four months spent immersed in this project I have learned how it operates, witnessed its community, and learned about its history. I am happy to admit that I was completely mistaken. Saying it now seems obvious, but FreeBSD is a project with its own distinct uses, goals, and identity. For many there may exist no greater opportunity than to work on FreeBSD full time, and with what I know now I would have a hard time coming up with a project that is more “legitimate”.</p>
</blockquote>

<ul>
<li>What I Liked</li>
</ul>

<blockquote>
  <p>In all cases, the work I submitted this term was reviewed by no less than two people before being committed. The feedback and criticism I received was always both constructive and to the point, and it commented on everything from high-level ideas to small style issues. I appreciate having these thorough reviews in place, since I believe it ultimately encourages people to accept only their best work. It is indicative of the high quality that already exists within every aspect of this project, and this commitment to quality is something that should continue to be honored as a core value. As I’ve discovered in some of my previous work terms, it is all too easy cut corners in the name of a deadline or changing priorities, but the fact that FreeBSD doesn’t need to make these types of compromises is a testament to the power of free software.</p>
  
  <p>It’s a small thing, but the quality and completeness of the FreeBSD documentation was hugely helpful throughout my term. Everything you might need to know about utilities, library functions, the kernel, and more can be found in a man page; and the handbook is a great resource as both an introduction to the operating system and a reference. I only wish I had taken some time earlier in the term to explore the different documents more thoroughly, as they cover a wide range of interesting and useful topics. The effort people put into writing and maintaining FreeBSD’s documentation is easy to overlook, but its value cannot be overstated.</p>
</blockquote>

<ul>
<li>What I Learned</li>
</ul>

<blockquote>
  <p>Although there was a lot I enjoyed, there were certainly many struggles I faced throughout the term, and lessons to be learned from them. I expect that some of issues I faced may be specific to FreeBSD, while others may be common to open-source projects in general. I don’t have enough experience to speculate on which is which, so I will leave this to the reader.</p>
  
  <p>The first lesson can be summed up simply: you have to advocate for your own work. FreeBSD is made up in large part by volunteer efforts, and in many cases there is more work to go around than people available to do it. A consequence of this is that there will not be anybody there to check up on you. Even in my position where I actually had a direct supervisor, Ed often had his plate full with so many other things that the responsibility to find someone to look at my work fell to me. Admittedly, a couple of smaller changes I worked on got left behind or stuck in review simply because there wasn’t a clear person/place to reach out to.</p>
  
  <p>I think this is both a barrier of entry to FreeBSD and a mental hurdle that I needed to get over. If there’s a change you want to see included or reviewed, then you may have to be the one to push for it, and there’s nothing wrong with that. Perhaps this process should be easier for newcomers or infrequent contributors (the disconnect between Bugzilla and Phabricator definitely leaves a lot to be desired), but we also have to be aware that this simply isn’t the reality right now. Getting your work looked at may require a little bit more self-motivation, but I’d argue that there are much worse problems a project like FreeBSD could have than this.</p>
  
  <p>I understand this a lot better now, but it is still something I struggle with. I’m not naturally the type of person who easily connects with others or asks for help, so I see this as an area for future growth rather than simply a struggle I encountered and overcame over the course of this work term. Certainly it is an important skill to understand the value of your own work, and equally important is the ability to communicate that value to others.</p>
  
  <p>I also learned the importance of starting small. My first week or two on the job mainly involved getting set up and comfortable with the workflow. After this initial stage, I began exploring the project and found myself overwhelmed by its scale. With so many possible areas to investigate, and so much work happening at once, I felt quite lost on where to begin. Many of the potential projects I found were too far beyond my experience level, and most small bugs were picked up and fixed quickly by more experienced contributors before I could even get to them.</p>
  
  <p>It’s easy to make the mistake that FreeBSD is made up solely of a few rock-star committers that do everything. This is how it appears at face-value, as reading through commits, bug reports, and mailing lists yields a few of the same names over and over. The reality is that just as important are the hundreds of users and infrequent contributors who take the time to submit bug reports, patches, or feedback. Even though there are some people who would fall under the umbrella of a rock-star committer, they didn’t get there overnight. Rather, they have built their skills and knowledge through many years of involvement in FreeBSD and similar projects.</p>
  
  <p>As a student coming into this project and having high expectations of myself, it was easy to set the bar too high by comparing myself against those big committers, and feel that my work was insignificant, inadequate, and simply too infrequent. In reality, there is no reason I should have felt this way. In a way, this comparison is disrespectful to those who have reached this level, as it took them a long time to get there, and it’s a humbling reminder that any skill worth learning requires time, patience, and dedication. It is easy to focus on an end product and simply wish to be there, but in order to be truly successful one must start small, and find satisfaction in the struggle of learning something new. I take pride in the many small successes I’ve had throughout my term here, and appreciate the fact that my journey into FreeBSD and open-source software is only just beginning.</p>
</blockquote>

<ul>
<li>Closing Thoughts</li>
</ul>

<blockquote>
  <p>I would like to close with some brief thank-you’s. First, to everyone at the Foundation for being so helpful, and allowing this position to exist in the first place. I am extremely grateful to have been given this unique opportunity to learn about and give back to the open-source world. I’d also like to thank my office mates; Ed: for being an excellent mentor, who offered an endless wealth of knowledge and willingness to share it. My classmate and fellow intern Arshan: for giving me a sense of camaraderie and the comforting reminder that at many moments he was as lost as I was. Finally, a quick thanks to everyone else I crossed paths with who offered reviews and advice. I appreciate your help and look forward to working with you all further.</p>
  
  <p>I am walking away from this co-op with a much greater appreciation for this project, and have made it a goal to remain involved in some capacity. I feel that I’ve gained a little bit of a wider perspective on my place in the software world, something I never really got from my previous co-ops. Whether it ends up being just a stepping stone, or the beginning of much larger involvement, I thoroughly enjoyed my time here.</p>
</blockquote>

<p><hr /></p>

<h3>Recent Developments in FreeBSD</h3>

<ul>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333890">Support for encrypted, compressed (gzip and zstd), and network crash dumps enabled by default on most platforms</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333649">Intel Microcode Splitter</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=334005">Intel Spec Store Bypass Disable control</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=333713">Raspberry Pi 3B+ Ethernet Driver</a></li>
<li><a href="https://reviews.freebsd.org/D15522">IBRS for i386</a></li>
<li>Upcoming:</li>
<li><a href="https://reviews.freebsd.org/D15523">Microcode updater for AMD CPUs</a></li>
<li><a href="https://reviews.freebsd.org/D15525">the RACK TCP/IP stack, from Netflix</a></li>
<li>Voting in the FreeBSD Core Election begins today:</li>
</ul>

<p><hr /></p>

<p><strong>DigitalOcean</strong>
<a href="http://do.co/bsdnow">Digital Ocean Promo Link for BSD Now Listeners</a></p>

<p><hr /></p>

<h3><a href="http://www.shlomimarco.com/blog/running-freenas-on-a-digitalocean-droplet">Running FreeNAS on a DigitalOcean Droplet</a></h3>

<ul>
<li>Need to backup your FreeNAS offsite? Run a locked down instance in the cloud, and replicate to it</li>
<li>The tutorial walks though the steps of converting a fresh FreeBSD based droplet into a FreeNAS</li>
<li>Create a droplet, and add a small secondary block-storage device</li>
<li>Boot the droplet, login, and download FreeNAS</li>
<li>Disable swap, enable ‘foot shooting’ mode in GEOM</li>
<li>use dd to write the FreeNAS installer to the boot disk</li>
<li>Reboot the droplet, and use the FreeNAS installer to install FreeNAS to the secondary block storage device</li>
<li>Now, reimage the droplet with FreeBSD again, to replace the FreeNAS installer</li>
<li>Boot, and dd FreeNAS from the secondary block storage device back to the boot disk</li>
<li>You can now destroy the secondary block device</li>
<li>Now you have a FreeNAS, and can take it from there.</li>
<li>Use the FreeNAS replication wizard to configure sending snapshots from your home NAS to your cloud NAS</li>
<li>Note: You might consider creating a new block storage device to create a larger pool, that you can more easily grow over time, rather than using the boot device in the droplet as your main pool.</li>
</ul>

<p><hr /></p>

<h2>News Roundup</h2>

<h3><a href="http://www.vincentdelft.be/post/post_20180411">Network Manager Control for OpenBSD (Updated)</a></h3>

<ul>
<li>Generalities</li>
<li><p>I just remind the scope of this small tool:</p>

<ul><li>allow you to pre-define several cable or wifi connections</li>
<li>let nmctl to connect automatically to the first available one</li>
<li>allow you to easily switch from one network connection to an other one</li>
<li>create openbox dynamic menus</li></ul></li>
<li><p>Enhancements in this version</p></li>
</ul>

<blockquote>
  <p>This is my second development version: 0.2.
  I've added performed several changes in the code:</p>
</blockquote>

<ul>
<li>code style cleanup, to better match the python recommendations</li>
<li>adapt the tool to allow to connect to an Open-wifi having blancs in the name. This happens in some hotels</li>
<li>implement a loop as work-around concerning the arp table issue.</li>
</ul>

<blockquote>
  <p>The source code is still on the git of Sourceforge.net. 
   You can see the files <a href="https://sourceforge.net/p/nmctl/code/ci/master/tree/">here</a></p>
  
  <p>And you can download the last version <a href="https://sourceforge.net/p/nmctl/code/ci/master/tarball">here</a></p>
</blockquote>

<ul>
<li>Feedbacks after few months</li>
</ul>

<blockquote>
  <p>I'm using this script on my OpenBSD laptop since about 5 months. In my case, I'm mainly using the openbox menus and the --restart option.</p>
</blockquote>

<ul>
<li>The Openbox menus</li>
</ul>

<blockquote>
  <p>The openbox menus are working fine. As explain in my previous blog, I just have to create 2 entries in my openbox's menu.xml file, and all the rest comes automatically from nmctl itself thanks to the --list and --scan options.
  I've not changed this part of nmctl since it works as expected (for me :-) ).</p>
</blockquote>

<ul>
<li>The --restart option</li>
</ul>

<blockquote>
  <p>Because I'm very lazy, and because OpenBSD is very simple to use, I've added the command "nmctl --restart" in the /etc/apm/resume script. Thanks to apmd, this script will be used each time I'm opening the lid of my laptop. 
  In other words, each time I'll opening my laptop, nmctl will search the optimum network connection for me.
  But I had several issues in this scenario.
  Most of the problems were linked to the arp table issues. Indeed, in some circumstances, my proxy IP address was associated to the cable interface instead of the wifi interface or vice-versa. As consequence I'm not able to connect to the proxy, thus not able to connect to internet. So the ping to google (final test nmctl perform) is failing.
  Knowing that anyhow, I'm doing a full arp cleanup, it's not clear for me from where this problem come from. To solve this situation I've implemented a "retry" concept. In other words, before testing an another possible network connection (as listed in my /etc/nmctl.conf file), the script try 3x the current connection's parameters.
  If you want to reduce or increase this figures, you can do it via the --retry parameter.</p>
</blockquote>

<ul>
<li>Results of my expertise with this small tool</li>
</ul>

<blockquote>
  <p>Where ever I'm located, my laptop is now connecting automatically to the wifi / cable connection previously identified for this location.
  Currently I have 3 places where I have Wifi credentials and 2 offices places where I just have to plug the network cable.
  Since the /etc/apm/resume scripts is triggered when I open the lid of the laptop, I just have to make sure that I plug the RJ45 before opening the laptop. For the rest, I do not have to type any commands, OpenBSD do all what is needed ;-).
  I hotels or restaurants, I can just connect to the Open Wifi thanks to the openbox menu created by "nmctl --scan".</p>
</blockquote>

<ul>
<li><p>Next steps</p></li>
<li><p>Documentation</p></li>
</ul>

<blockquote>
  <p>The tool is missing lot of documentation. I appreciate OpenBSD for his great documentation, so I have to do the same.
  I plan to write a README and a man page at first instances.
  But since my laziness, I will do it as soon as I see some interest for this tool from other persons.</p>
</blockquote>

<ul>
<li>Tests</li>
</ul>

<blockquote>
  <p>I now have to travel and see how to see the script react on the different situations.
  Interested persons are welcome to share with me the outcome of their tests.
  I'm curious how it work.</p>
</blockquote>

<p><hr /></p>

<h3><a href="https://an.undulating.space/post/180411-erl-openbsd-upgrade/">OpenBSD 6.3 on EdgeRouter Lite simple upgrade method</a></h3>

<ul>
<li>TL;DR</li>
</ul>

<blockquote>
  <p>OpenBSD 6.3 oceton upgrade instructions may not factor that your ERL is running from the USB key they want wiped with the miniroot63.fs image loaded on.
  Place the bsd.rd for OpenBSD 6.3 on the sd0i slice used by U-Boot for the kernel, and then edit the boot command to run it.</p>
</blockquote>

<ul>
<li>a tiny upgrade</li>
</ul>

<blockquote>
  <p>The OpenBSD documentation is comprehensive, but there might be rough corners around what are probably edge cases in their user base. People running EdgeRouter Lite hardware for example, who are looking to upgrade from 6.2 to 6.3.
  The documentation, which gave us everything we needed last time, left me with some questions about how to upgrade. In INSTALL.octeon, the Upgrading section does mention:
  The best solution, whenever possible, is to backup your data and reinstall from scratch
  I had to check if that directive existed in the documentation for other architectures. I wondered if oceton users were getting singled out. We were not. Just simplicity and pragmatism.</p>
</blockquote>

<ul>
<li>Reading on:</li>
</ul>

<blockquote>
  <p>To upgrade OpenBSD 6.3 from a previous version, start with the general instructions in the section "Installing OpenBSD".
  But that section requires us to boot off of TFTP or NFS. Which I don’t want to do right now. Could also use a USB stick with the miniroot63.fs installed on it.
  But as the ERL only has a single USB port, we would have to remove the USB stick with the current install on it. Once we get to the Install or Upgrade prompt, there would be nothing to upgrade.
  Well, I guess I could use a USB hub. But the ERL’s USB port is inside the case. With all the screws in. And the tools are neatly put away. And I’d have to pull the USB hub from behind a workstation. And it’s two am. And I cleaned up the cabling in the lab this past weekend. Looks nice for once.
  So I don’t want to futz around with all that.
  There must be an almost imperceptibly easier way of doing this than setting up a TFTP server or NFS share in five minutes… Right?</p>
</blockquote>

<p><hr /></p>

<p><strong>iXsystems</strong>
<a href="https://www.ixsystems.com/blog/boisetechshow-2018/">Boise Technology Show 2018 Recap</a></p>

<h3><a href="http://zfs.datto.com/">OpenZFS User Conference Slides &amp; Videos</a></h3>

<ul>
<li><a href="https://vimeo.com/album/5150026/video/266112599">Thank you ZFS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112475">ZSTD Compression</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111164">Pool Layout Considerations</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266111346">ZFS Releases</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112077">Helping Developers Help You</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266112233">ZFS and MySQL on Linux</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266110985">Micron</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266108105">OSNEXUS</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107946">ZFS at Six Feet Up</a></li>
<li><a href="https://vimeo.com/album/5150026/video/266107372">Flexible Disk Use with OpenZFS</a></li>
</ul>

<p><hr /></p>

<h3><a href="https://jvns.ca/blog/2018/05/11/batch-editing-files-with-ed/">Batch editing files with ed</a></h3>

<ul>
<li>what’s ‘ed’?</li>
</ul>

<blockquote>
  <p>ed is this sort of terrifying text editor. A typical interaction with ed for me in the past has gone something like this:</p>
</blockquote>

<p><code>
$ ed
help
?
h
?
asdfasdfasdfsadf
?
&lt;close terminal in frustration&gt;
</code></p>

<blockquote>
  <p>Basically if you do something wrong, ed will just print out a single, unhelpful, ?. So I’d basically dismissed ed as an old arcane Unix tool that had no practical use today.
  vi is a successor to ed, except with a visual interface instead of this ?</p>
</blockquote>

<ul>
<li>surprise: Ed is actually sort of cool and fun</li>
</ul>

<blockquote>
  <p>So if Ed is a terrifying thing that only prints ? at you, why am I writing a blog post about it? WELL!!!!
  On April 1 this year, Michael W Lucas published a new short book called Ed Mastery. I like his writing, and even though it was sort of an april fool’s joke, it was ALSO a legitimate actual real book, and so I bought it and read it to see if his claims that Ed is actually interesting were true.
  And it was so cool!!!! I found out:</p>
</blockquote>

<ul>
<li>how to get Ed to give you better error messages than just ?</li>
<li>that the name of the grep command comes from ed syntax (g/re/p)</li>
<li>the basics of how to navigate and edit files using ed</li>
</ul>

<blockquote>
  <p>All of that was a cool Unix history lesson, but did not make me want to actually use Ed in real life. But!!!</p>
  
  <p>The other neat thing about Ed (that did make me want to use it!) is that any Ed session corresponds to a script that you can replay! So if I know Ed, then I can use Ed basically as a way to easily apply vim-macro-like programs to my files.</p>
</blockquote>

<p><hr /></p>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://blather.michaelwlucas.com/archives/3186">FreeBSD Mastery: Jails -- Help make it happen </a></li>
<li><a href="https://www.youtube.com/watch?v=MsY-BafQgj4">Video: OpenZFS Basics presented by George Wilson and Matt Ahrens at Scale 16x back in March 2018</a></li>
<li><a href="https://www.dragonflydigest.com/2018/05/17/21257.html">DragonFlyBSD’s IPFW gets highspeed lockless in-kernel NAT</a></li>
<li><a href="https://www.reddit.com/r/openbsd/comments/8ei00k/a_love_letter_to_openbsd/">A Love Letter to OpenBSD</a></li>
<li><a href="https://blather.michaelwlucas.com/archives/3176">New talks, and the F-bomb</a></li>
<li><a href="https://manpages.bsd.lv/mdoc.html">Practical UNIX Manuals: mdoc</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2018-May/004758.html">BSD Meetup in Zurich: May 24th</a></li>
<li><a href="https://www.eventbrite.com/e/the-polish-bsd-user-group-1-meetup-tickets-45941857332">BSD Meetup in Warsaw: May 24th</a></li>
<li><a href="http://meetbsd.com/">MeetBSD 2018</a></li>
</ul>

<p><hr /></p>

<p><strong>Tarsnap</strong></p>

<h2>Feedback/Questions</h2>

<ul>
<li>Seth - <a href="http://dpaste.com/12R65X4#wrap">First time poudriere Builder</a></li>
<li>Farhan - <a href="http://dpaste.com/1GHCGY5#wrap">Why we didn't go FreeBSD</a></li>
<li>architech - <a href="http://dpaste.com/1H72FGE#wrap">Encryption Feedback</a></li>
<li>Dave - <a href="http://dpaste.com/27YH93Y#wrap">Handy Tip on setting up automated coredump handling for FreeBSD</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>190: The Moore You Know</title>
  <link>https://www.bsdnow.tv/190</link>
  <guid isPermaLink="false">919a0bc5-1fd4-4195-bb5d-5f587826c25e</guid>
  <pubDate>Wed, 19 Apr 2017 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/919a0bc5-1fd4-4195-bb5d-5f587826c25e.mp3" length="94312372" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we look forward with the latest OpenBSD release, look back with Dennis Ritchie’s paper on the evolution of Unix Time Sharing, have an Interview with Kris</itunes:subtitle>
  <itunes:duration>2:10:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week, we look forward with the latest OpenBSD release, look back with Dennis Ritchie’s paper on the evolution of Unix Time Sharing, have an Interview with Kris
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
OpenBSD 6.1 RELEASED (http://undeadly.org/cgi?action=article&amp;amp;sid=20170411132956)
Mailing list post (https://marc.info/?l=openbsd-announce&amp;amp;m=149191716921690&amp;amp;w=2')
We are pleased to announce the official release of OpenBSD 6.1. This is our 42nd release.
New/extended platforms:
New arm64 platform, using clang(1) as the base system compiler.
The loongson platform now supports systems with Loongson 3A CPU and RS780E chipset.
The following platforms were retired: armish, sparc, zaurus
New vmm(4)/ vmd(8)
IEEE 802.11 wireless stack improvements
Generic network stack improvements
Installer improvements
Routing daemons and other userland network improvements
Security improvements
dhclient(8)/ dhcpd(8)/ dhcrelay(8) improvements
Assorted improvements
OpenSMTPD 6.0.0
OpenSSH 7.4
LibreSSL 2.5.3
mandoc 1.14.1
***
Fuzz Testing OpenSSH (http://vegardno.blogspot.ca/2017/03/fuzzing-openssh-daemon-using-afl.html)
Vegard Nossum writes a blog post explaining how to fuzz OpenSSH using AFL
It starts by compiling AFL and SSH with LLVM to get extra instrumentation to make the fuzzing process better, and faster
Sandboxing, PIE, and other features are disabled to increase debuggability, and to try to make breaking SSH easier
Privsep is also disabled, because when AFL does make SSH crash, the child process crashing causes the parent process to exit normally, and AFL then doesn’t realize that a crash has happened. A one-line patch disables the privsep feature for the purposes of testing
A few other features are disabled to make testing easier (disabling replay attack protection allows the same inputs to be reused many times), and faster:
the local arc4random_buf() is patched to return a buffer of zeros
disabling CRC checks
disabling MAC checks
disabling encryption (allow the NULL cipher for everything)
add a call to _AFLINIT(), to enable “deferred forkserver mode”
disabling closefrom()
“Skipping expensive DH/curve and key derivation operations”
Then, you can finally get around to writing some test cases
The steps are all described in detail
In one day of testing, the author found a few NULL dereferences that have since been fixed.
Maybe you can think of some other code paths through SSH that should be tested, or want to test another daemon
***
Getting OpenBSD running on Raspberry Pi 3 (http://undeadly.org/cgi?action=article&amp;amp;sid=20170409123528)
Ian Darwin writes in about his work deploying the arm64 platform and the Raspberry Pi 3
So I have this empty white birdhouse-like thing in the yard, open at the front. It was intended to house the wireless remote temperature sensor from a low-cost weather station, which had previously been mounted on a dark-colored wall of the house [...]. But when I put the sensor into the birdhouse, the signal is too weak for the weather station to receive it (the mounting post was put in place by a previous owner of our property, and is set deeply in concrete). So the next plan was to pop in a tiny OpenBSD computer with a uthum(4) temperature sensor and stream the temperature over WiFi.
The Raspberry Pi computers are interesting in their own way: intending to bring low-cost computing to everybody, they take shortcuts and omit things that you'd expect on a laptop or desktop. They aren't too bright on their own: there's very little smarts in the board compared to the "BIOS" and later firmwares on conventional systems. Some of the "smarts" are only available as binary files. This was part of the reason that our favorite OS never came to the Pi Party for the original rpi, and didn't quite arrive for the rpi2. With the rpi3, though, there is enough availability that our devs were able to make it boot. Some limitations remain, though: if you want to build your own full release, you have to install the dedicated raspberrypi-firmware package from the ports tree. And, the boot disks have to have several extra files on them - this is set up on the install sets, but you should be careful not to mess with these extra files until you know what you're doing!
But wait! Before you read on, please note that, as of April 1, 2017, this platform boots up but is not yet ready for prime time:
there's no driver for SD/MMC but that's the only thing the hardware can level-0 boot from, so you need both the uSD card and a USB disk, at least while getting started;
there is no support for the built-in WiFi (a Broadcom BCM43438 SDIO 802.11), so you have to use wired Ethernet or a USB WiFi dongle (for my project an old MSI that shows up as ural(4) seems to work fine);
the HDMI driver isn't used by the kernel (if a monitor is plugged in uBoot will display its messages there), so you need to set up cu with a 3V serial cable, at least for initial setup.
the ports tree isn't ready to cope with the base compiler being clang yet, so packages are "a thing of the future"
But wait - there's more! The "USB disk" can be a USB thumb drive, though they're generally slower than a "real" disk. My first forays used a Kingston DTSE9, the hardy little steel-cased version of the popular DataTraveler line. I was able to do the install, and boot it, once (when I captured the dmesg output shown below). After that, it failed - the boot process hung with the ever-unpopular "scanning usb for storage devices..." message. I tried the whole thing again with a second DTSE9, and with a 32GB plastic-cased DataTraveler. Same results. After considerable wasted time, I found a post on RPI's own site which dates back to the early days of the PI 3, in which they admit that they took shortcuts in developing the firmware, and it just can't be made to work with the Kingston DataTraveler! Not having any of the "approved" devices, and not living around the corner from a computer store, I switched to a Sabrent USB dock with a 320GB Western Digital disk, and it's been rock solid. Too big and energy-hungry for the final project, but enough to show that the rpi3 can be solid with the right (solid-state) disk. And fast enough to build a few simple ports - though a lot will not build yet. I then found and installed OpenBSD onto a “PNY” brand thumb drive and found it solid - in fact I populated it by dd’ing from one of the DataTraveller drives, so they’re not at fault.
Check out the full article for detailed setup instructions
***
Dennis M. Ritchie’s Paper: The Evolution of the Unix Time Sharing System (http://www.read.seas.harvard.edu/~kohler/class/aosref/ritchie84evolution.pdf)
From the abstract:
This paper presents a brief history of the early development of the Unix operating system. It concentrates on the evolution of the file system, the process-control mechanism, and the idea of pipelined commands. Some attention is paid to social conditions during the development of the system. 
During the past few years, the Unix operating system has come into wide use, so wide that its very name has become a trademark of Bell Laboratories. Its important characteristics have become known to many people. It has suffered much rewriting and tinkering since the first publication describing it in 1974 [1], but few fundamental changes. However, Unix was born in 1969 not 1974, and the account of its development makes a little-known and perhaps instructive story. This paper presents a technical and social history of the evolution of the system. 
High level document structure:
Origins
The PDP-7 Unix file system 
Process control
IO Redirection
The advent of the PDP-11
The first PDP-11 system
Pipes
High-level languages
Conclusion
One of the comforting things about old memories is their tendency to take on a rosy glow. The programming environment provided by the early versions of Unix seems, when described here, to be extremely harsh and primitive. I am sure that if forced back to the PDP-7 I would find it intolerably limiting and lacking in conveniences. Nevertheless, it did not seem so at the time; the memory fixes on what was good and what lasted, and on the joy of helping to create the improvements that made life better. In ten years, I hope we can look back with the same mixed impression of progress combined with continuity. 
Interview - Kris Moore - kris@trueos.org (mailto:kris@trueos.org) | @pcbsdkris (https://twitter.com/pcbsdkris)
Director of Engineering at iXSystems
FreeNAS 
News Roundup
Compressed zfs send / receive now in FreeBSD’s vendor area (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=316894)
Andriy Gapon committed a whole lot of ZFS updates to FreeBSD’s vendor area
This feature takes advantage of the new compressed ARC feature, which means blocks that are compressed on disk, remain compressed in ZFS’ RAM cache, to use the compressed blocks when using ZFS replication.
Previously, blocks were uncompressed, sent (usually over the network), then recompressed on the other side.
This is rather wasteful, and can make the process slower, not just because of the CPU time wasted decompressing/recompressing the data, but because it means more data has to be sent over the network.
This caused many users to end up doing: zfs send | xz -T0 | ssh unxz | zfs recv, or similar, to compress the data before sending it over the network.
With this new feature, zfs send with the new -c flag, will transmit the already compressed blocks instead.
This change also adds longopts versions of all of the zfs send flags, making them easier to understand when written in shell scripts.
A lot of fixes, man page updates, etc. from upstream OpenZFS 
Thanks to everyone who worked on these fixes and features!
We’ll announce when these have been committed to head for testing
***
Granting privileges using the FreeBSD MAC framework  (https://mysteriouscode.io/blog/granting-privileges-using-mac-framework/)
The MAC (Mandatory Access Control) framework allows finer grained permissions than the standard UNIX permissions that exist in the base system
FreeBSD’s kernel provides quite sophisticated privilege model that extends the traditional UNIX user-and-group one. Here I’ll show how to leverage it to grant access to specific privileges to group of non-root users.
mac(9) allows creating pluggable modules with policies that can extend existing base system security definitions. struct macpolicyops consist of many entry points that we can use to amend the behaviour.
This time, I wanted to grant a privilege to change realtime priority to a selected group. While Linux kernel lets you specify a named group, FreeBSD doesn’t have such ability, hence I created this very simple policy.
The privilege check can be extended using two user supplied functions: privcheck and privgrant. The first one can be used to further restrict existing privileges, i.e. you can disallow some specific priv to be used in jails, etc. The second one is used to explicitly grant extra privileges not available for the target in base configuration.
The core of the macrtprio module is dead simple. I defined sysctl tree for two oids: enable (on/off switch for the policy) and gid (the GID target has to be member of), then I specified our custom version of mpoprivgrant called rtprioprivgrant. Body of my granting function is even simpler. If the policy is disabled or the privilege that is being checked is not PRIVSCHED_RTPRIO, we simply skip and return EPERM. If the user is member of the designated group we return 0 that’ll allow the action – target would change realtime privileges.
Another useful thing the MAC framework can be used to grant to non-root users: PortACL: The ability to bind to TCP/UDP ports less than 1024, which is usually restricted to root.
Some other uses for the MAC framework are discussed in The FreeBSD Handbook (https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/mac.html)
However, there are lots more, and we would really like to see more tutorials and documentation on using MAC to make more secure servers, but allowing the few specific things that normally require root access.
***
The Story of the PING Program (http://ftp.arl.army.mil/~mike/ping.html)
This is from the homepage of Mike Muuss:
Yes, it's true! I'm the author of ping for UNIX. Ping is a little thousand-line hack that I wrote in an evening which practically everyone seems to know about. :-)
I named it after the sound that a sonar makes, inspired by the whole principle of cho-location. In college I'd done a lot of modeling of sonar and radar systems, so the "Cyberspace" analogy seemed very apt. It's exactly the same paradigm applied to a new problem domain: ping uses timed IP/ICMP ECHOREQUEST and ECHOREPLY packets to probe the "distance" to the target machine.
My original impetus for writing PING for 4.2a BSD UNIX came from an offhand remark in July 1983 by Dr. Dave Mills while we were attending a DARPA meeting in Norway, in which he described some work that he had done on his "Fuzzball" LSI-11 systems to measure path latency using timed ICMP Echo packets.
In December of 1983 I encountered some odd behavior of the IP network at BRL. Recalling Dr. Mills' comments, I quickly coded up the PING program, which revolved around opening an ICMP style SOCKRAW AFINET Berkeley-style socket(). The code compiled just fine, but it didn't work -- there was no kernel support for raw ICMP sockets! Incensed, I coded up the kernel support and had everything working well before sunrise. Not surprisingly, Chuck Kennedy (aka "Kermit") had found and fixed the network hardware before I was able to launch my very first "ping" packet. But I've used it a few times since then. grin If I'd known then that it would be my most famous accomplishment in life, I might have worked on it another day or two and added some more options.
The folks at Berkeley eagerly took back my kernel modifications and the PING source code, and it's been a standard part of Berkeley UNIX ever since. Since it's free, it has been ported to many systems since then, including Microsoft Windows95 and WindowsNT.
In 1993, ten years after I wrote PING, the USENIX association presented me with a handsome scroll, pronouncing me a Joint recipient of The USENIX Association 1993 Lifetime Achievement Award presented to the Computer Systems Research Group, University of California at Berkeley 1979-1993. ``Presented to honor profound intellectual achievement and unparalleled service to our Community. At the behest of CSRG principals we hereby recognize the following individuals and organizations as CSRG participants, contributors and supporters.'' Wow!
The best ping story I've ever heard was told to me at a USENIX conference, where a network administrator with an intermittent Ethernet had linked the ping program to his vocoder program, in essence writing:
ping goodhost | sed -e 's/.*/ping/' | vocoder
He wired the vocoder's output into his office stereo and turned up the volume as loud as he could stand. The computer sat there shouting "Ping, ping, ping..." once a second, and he wandered through the building wiggling Ethernet connectors until the sound stopped. And that's how he found the intermittent failure.
FreeBSD: /usr/local/lib/libpkg.so.3: Undefined symbol "utimensat" (http://glasz.org/sheeplog/2017/02/freebsd-usrlocalliblibpkgso3-undefined-symbol-utimensat.html)
The internet will tell you that, of course, 10.2 is EOL, that packages are being built for 10.3 by now and to better upgrade to the latest version of FreeBSD. While all of this is true and running the latest versions is generally good advise, in most cases it is unfeasible to do an entire OS upgrade just to be able to install a package.
Points out the ABI variable being used in /usr/local/etc/pkg/repos/FreeBSD.conf
Now, if you have 10.2 installed and 10.3 is the current latest FreeBSD version, this url will point to packages built for 10.3 resulting in the problem that, when running pkg upgrade pkg it’ll go ahead and install the latest version of pkg build for 10.3 onto your 10.2 system. Yikes! FreeBSD 10.3 and pkgng broke the ABI by introducing new symbols, like utimensat.
The solution:
Have a look at the actual repo url http://pkg.FreeBSD.org/FreeBSD:10:amd64… there’s repo’s for each release! Instead of going through the tedious process of upgrading FreeBSD you just need to Use a repo url that fits your FreeBSD release:
Update the package cache: pkg update
Downgrade pkgng (in case you accidentally upgraded it already): pkg delete -f pkg
pkg install -y pkg
Install your package
There you go. Don’t fret. But upgrade your OS soon ;)
Beastie Bits
CPU temperature collectd report on NetBSD (https://imil.net/blog/2017/01/22/collectd_NetBSD_temperature/)
Booting FreeBSD 11 with NVMe and ZFS on AMD Ryzen (https://www.servethehome.com/booting-freebsd-11-nvme-zfs-amd-ryzen/)
BeagleBone Black Tor relay (https://torbsd.github.io/blog.html#busy-bbb)
FreeBSD - Disable in-tree GDB by default on x86, mips, and powerpc (https://reviews.freebsd.org/rS317094)
CharmBUG April Meetup (https://www.meetup.com/CharmBUG/events/238218742/)
The origins of XXX as FIXME (https://www.snellman.net/blog/archive/2017-04-17-xxx-fixme/)
***
Feedback/Questions
Felis - L2ARC (http://dpaste.com/2APJE4E#wrap)
Gabe - FreeBSD Server Install (http://dpaste.com/0BRJJ73#wrap)  
FEMP Script (http://dpaste.com/05EYNJ4#wrap)
Scott - FreeNAS &amp;amp; LAGG (http://dpaste.com/1CV323G#wrap)
Marko - Backups (http://dpaste.com/3486VQZ#wrap)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, freenas, unix, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we look forward with the latest OpenBSD release, look back with Dennis Ritchies paper on the evolution of Unix Time Sharing, have an Interview with Kris</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20170411132956" rel="nofollow">OpenBSD 6.1 RELEASED</a></h3>

<ul>
<li><a href="https://marc.info/?l=openbsd-announce&m=149191716921690&w=2&#x27;" rel="nofollow">Mailing list post</a></li>
<li>We are pleased to announce the official release of OpenBSD 6.1. This is our 42nd release.</li>
<li>New/extended platforms:

<ul>
<li>New arm64 platform, using clang(1) as the base system compiler.</li>
<li>The loongson platform now supports systems with Loongson 3A CPU and RS780E chipset.</li>
<li>The following platforms were retired: armish, sparc, zaurus</li>
</ul></li>
<li>New vmm(4)/ vmd(8)</li>
<li>IEEE 802.11 wireless stack improvements</li>
<li>Generic network stack improvements</li>
<li>Installer improvements</li>
<li>Routing daemons and other userland network improvements</li>
<li>Security improvements</li>
<li>dhclient(8)/ dhcpd(8)/ dhcrelay(8) improvements</li>
<li>Assorted improvements</li>
<li>OpenSMTPD 6.0.0</li>
<li>OpenSSH 7.4</li>
<li>LibreSSL 2.5.3</li>
<li>mandoc 1.14.1
***</li>
</ul>

<h3><a href="http://vegardno.blogspot.ca/2017/03/fuzzing-openssh-daemon-using-afl.html" rel="nofollow">Fuzz Testing OpenSSH</a></h3>

<ul>
<li>Vegard Nossum writes a blog post explaining how to fuzz OpenSSH using AFL</li>
<li>It starts by compiling AFL and SSH with LLVM to get extra instrumentation to make the fuzzing process better, and faster</li>
<li>Sandboxing, PIE, and other features are disabled to increase debuggability, and to try to make breaking SSH easier</li>
<li>Privsep is also disabled, because when AFL does make SSH crash, the child process crashing causes the parent process to exit normally, and AFL then doesnt realize that a crash has happened. A one-line patch disables the privsep feature for the purposes of testing</li>
<li>A few other features are disabled to make testing easier (disabling replay attack protection allows the same inputs to be reused many times), and faster:

<ul>
<li>the local arc4random_buf() is patched to return a buffer of zeros</li>
<li>disabling CRC checks</li>
<li>disabling MAC checks</li>
<li>disabling encryption (allow the NULL cipher for everything)</li>
<li>add a call to __AFL_INIT(), to enable deferred forkserver mode</li>
<li>disabling closefrom()</li>
<li>Skipping expensive DH/curve and key derivation operations</li>
</ul></li>
<li>Then, you can finally get around to writing some test cases</li>
<li>The steps are all described in detail</li>
<li>In one day of testing, the author found a few NULL dereferences that have since been fixed.</li>
<li>Maybe you can think of some other code paths through SSH that should be tested, or want to test another daemon
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20170409123528" rel="nofollow">Getting OpenBSD running on Raspberry Pi 3</a></h3>

<blockquote>
<p>Ian Darwin writes in about his work deploying the arm64 platform and the Raspberry Pi 3<br>
So I have this empty white birdhouse-like thing in the yard, open at the front. It was intended to house the wireless remote temperature sensor from a low-cost weather station, which had previously been mounted on a dark-colored wall of the house [...]. But when I put the sensor into the birdhouse, the signal is too weak for the weather station to receive it (the mounting post was put in place by a previous owner of our property, and is set deeply in concrete). So the next plan was to pop in a tiny OpenBSD computer with a uthum(4) temperature sensor and stream the temperature over WiFi.<br>
The Raspberry Pi computers are interesting in their own way: intending to bring low-cost computing to everybody, they take shortcuts and omit things that you&#39;d expect on a laptop or desktop. They aren&#39;t too bright on their own: there&#39;s very little smarts in the board compared to the &quot;BIOS&quot; and later firmwares on conventional systems. Some of the &quot;smarts&quot; are only available as binary files. This was part of the reason that our favorite OS never came to the Pi Party for the original rpi, and didn&#39;t quite arrive for the rpi2. With the rpi3, though, there is enough availability that our devs were able to make it boot. Some limitations remain, though: if you want to build your own full release, you have to install the dedicated raspberrypi-firmware package from the ports tree. And, the boot disks have to have several extra files on them - this is set up on the install sets, but you should be careful not to mess with these extra files until you know what you&#39;re doing!</p>

<p>But wait! Before you read on, please note that, as of April 1, 2017, this platform boots up but is not yet ready for prime time:</p>
</blockquote>

<ul>
<li>there&#39;s no driver for SD/MMC but that&#39;s the only thing the hardware can level-0 boot from, so you need both the uSD card and a USB disk, at least while getting started;</li>
<li>there is no support for the built-in WiFi (a Broadcom BCM43438 SDIO 802.11), so you have to use wired Ethernet or a USB WiFi dongle (for my project an old MSI that shows up as ural(4) seems to work fine);</li>
<li>the HDMI driver isn&#39;t used by the kernel (if a monitor is plugged in uBoot will display its messages there), so you need to set up cu with a 3V serial cable, at least for initial setup.</li>
<li>the ports tree isn&#39;t ready to cope with the base compiler being clang yet, so packages are &quot;a thing of the future&quot;</li>
</ul>

<blockquote>
<p>But wait - there&#39;s more! The &quot;USB disk&quot; can be a USB thumb drive, though they&#39;re generally slower than a &quot;real&quot; disk. My first forays used a Kingston DTSE9, the hardy little steel-cased version of the popular DataTraveler line. I was able to do the install, and boot it, once (when I captured the dmesg output shown below). After that, it failed - the boot process hung with the ever-unpopular &quot;scanning usb for storage devices...&quot; message. I tried the whole thing again with a second DTSE9, and with a 32GB plastic-cased DataTraveler. Same results. After considerable wasted time, I found a post on RPI&#39;s own site which dates back to the early days of the PI 3, in which they admit that they took shortcuts in developing the firmware, and it just can&#39;t be made to work with the Kingston DataTraveler! Not having any of the &quot;approved&quot; devices, and not living around the corner from a computer store, I switched to a Sabrent USB dock with a 320GB Western Digital disk, and it&#39;s been rock solid. Too big and energy-hungry for the final project, but enough to show that the rpi3 can be solid with the right (solid-state) disk. And fast enough to build a few simple ports - though a lot will not build yet. I then found and installed OpenBSD onto a PNY brand thumb drive and found it solid - in fact I populated it by dding from one of the DataTraveller drives, so theyre not at fault.</p>
</blockquote>

<ul>
<li>Check out the full article for detailed setup instructions
***</li>
</ul>

<h3><a href="http://www.read.seas.harvard.edu/%7Ekohler/class/aosref/ritchie84evolution.pdf" rel="nofollow">Dennis M. Ritchies Paper: The Evolution of the Unix Time Sharing System</a></h3>

<ul>
<li>From the abstract:</li>
</ul>

<blockquote>
<p>This paper presents a brief history of the early development of the Unix operating system. It concentrates on the evolution of the file system, the process-control mechanism, and the idea of pipelined commands. Some attention is paid to social conditions during the development of the system. <br>
During the past few years, the Unix operating system has come into wide use, so wide that its very name has become a trademark of Bell Laboratories. Its important characteristics have become known to many people. It has suffered much rewriting and tinkering since the first publication describing it in 1974 [1], but few fundamental changes. However, Unix was born in 1969 not 1974, and the account of its development makes a little-known and perhaps instructive story. This paper presents a technical and social history of the evolution of the system. </p>
</blockquote>

<ul>
<li>High level document structure:</li>
</ul>

<blockquote>
<p>Origins<br>
The PDP-7 Unix file system <br>
Process control<br>
IO Redirection<br>
The advent of the PDP-11<br>
The first PDP-11 system<br>
Pipes<br>
High-level languages<br>
Conclusion</p>

<p>One of the comforting things about old memories is their tendency to take on a rosy glow. The programming environment provided by the early versions of Unix seems, when described here, to be extremely harsh and primitive. I am sure that if forced back to the PDP-7 I would find it intolerably limiting and lacking in conveniences. Nevertheless, it did not seem so at the time; the memory fixes on what was good and what lasted, and on the joy of helping to create the improvements that made life better. In ten years, I hope we can look back with the same mixed impression of progress combined with continuity. </p>

<hr>
</blockquote>

<h2>Interview - Kris Moore - <a href="mailto:kris@trueos.org" rel="nofollow">kris@trueos.org</a> | <a href="https://twitter.com/pcbsdkris" rel="nofollow">@pcbsdkris</a></h2>

<ul>
<li>Director of Engineering at iXSystems</li>
<li>FreeNAS </li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=316894" rel="nofollow">Compressed zfs send / receive now in FreeBSDs vendor area</a></h3>

<ul>
<li>Andriy Gapon committed a whole lot of ZFS updates to FreeBSDs vendor area</li>
<li>This feature takes advantage of the new compressed ARC feature, which means blocks that are compressed on disk, remain compressed in ZFS RAM cache, to use the compressed blocks when using ZFS replication.</li>
<li>Previously, blocks were uncompressed, sent (usually over the network), then recompressed on the other side.</li>
<li>This is rather wasteful, and can make the process slower, not just because of the CPU time wasted decompressing/recompressing the data, but because it means more data has to be sent over the network.</li>
<li>This caused many users to end up doing: zfs send | xz -T0 | ssh unxz | zfs recv, or similar, to compress the data before sending it over the network.</li>
<li>With this new feature, zfs send with the new -c flag, will transmit the already compressed blocks instead.</li>
<li>This change also adds longopts versions of all of the zfs send flags, making them easier to understand when written in shell scripts.</li>
<li>A lot of fixes, man page updates, etc. from upstream OpenZFS </li>
<li>Thanks to everyone who worked on these fixes and features!</li>
<li>Well announce when these have been committed to head for testing
***</li>
</ul>

<h3><a href="https://mysteriouscode.io/blog/granting-privileges-using-mac-framework/" rel="nofollow">Granting privileges using the FreeBSD MAC framework </a></h3>

<ul>
<li>The MAC (Mandatory Access Control) framework allows finer grained permissions than the standard UNIX permissions that exist in the base system</li>
</ul>

<blockquote>
<p>FreeBSDs kernel provides quite sophisticated privilege model that extends the traditional UNIX user-and-group one. Here Ill show how to leverage it to grant access to specific privileges to group of non-root users.<br>
mac(9) allows creating pluggable modules with policies that can extend existing base system security definitions. struct mac_policy_ops consist of many entry points that we can use to amend the behaviour.<br>
This time, I wanted to grant a privilege to change realtime priority to a selected group. While Linux kernel lets you specify a named group, FreeBSD doesnt have such ability, hence I created this very simple policy.<br>
The privilege check can be extended using two user supplied functions: priv_check and priv_grant. The first one can be used to further restrict existing privileges, i.e. you can disallow some specific priv to be used in jails, etc. The second one is used to explicitly grant extra privileges not available for the target in base configuration.<br>
The core of the mac_rtprio module is dead simple. I defined sysctl tree for two oids: enable (on/off switch for the policy) and gid (the GID target has to be member of), then I specified our custom version of mpo_priv_grant called rtprio_priv_grant. Body of my granting function is even simpler. If the policy is disabled or the privilege that is being checked is not PRIV_SCHED_RTPRIO, we simply skip and return EPERM. If the user is member of the designated group we return 0 thatll allow the action  target would change realtime privileges.</p>
</blockquote>

<ul>
<li>Another useful thing the MAC framework can be used to grant to non-root users: PortACL: The ability to bind to TCP/UDP ports less than 1024, which is usually restricted to root.</li>
<li>Some other uses for the MAC framework are discussed in <a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/mac.html" rel="nofollow">The FreeBSD Handbook</a></li>
<li>However, there are lots more, and we would really like to see more tutorials and documentation on using MAC to make more secure servers, but allowing the few specific things that normally require root access.
***</li>
</ul>

<h3><a href="http://ftp.arl.army.mil/%7Emike/ping.html" rel="nofollow">The Story of the PING Program</a></h3>

<ul>
<li>This is from the homepage of Mike Muuss:</li>
</ul>

<blockquote>
<p>Yes, it&#39;s true! I&#39;m the author of ping for UNIX. Ping is a little thousand-line hack that I wrote in an evening which practically everyone seems to know about. :-)<br>
I named it after the sound that a sonar makes, inspired by the whole principle of cho-location. In college I&#39;d done a lot of modeling of sonar and radar systems, so the &quot;Cyberspace&quot; analogy seemed very apt. It&#39;s exactly the same paradigm applied to a new problem domain: ping uses timed IP/ICMP ECHO_REQUEST and ECHO_REPLY packets to probe the &quot;distance&quot; to the target machine.<br>
My original impetus for writing PING for 4.2a BSD UNIX came from an offhand remark in July 1983 by Dr. Dave Mills while we were attending a DARPA meeting in Norway, in which he described some work that he had done on his &quot;Fuzzball&quot; LSI-11 systems to measure path latency using timed ICMP Echo packets.<br>
In December of 1983 I encountered some odd behavior of the IP network at BRL. Recalling Dr. Mills&#39; comments, I quickly coded up the PING program, which revolved around opening an ICMP style SOCK_RAW AF_INET Berkeley-style socket(). The code compiled just fine, but it didn&#39;t work -- there was no kernel support for raw ICMP sockets! Incensed, I coded up the kernel support and had everything working well before sunrise. Not surprisingly, Chuck Kennedy (aka &quot;Kermit&quot;) had found and fixed the network hardware before I was able to launch my very first &quot;ping&quot; packet. But I&#39;ve used it a few times since then. <em>grin</em> If I&#39;d known then that it would be my most famous accomplishment in life, I might have worked on it another day or two and added some more options.<br>
The folks at Berkeley eagerly took back my kernel modifications and the PING source code, and it&#39;s been a standard part of Berkeley UNIX ever since. Since it&#39;s free, it has been ported to many systems since then, including Microsoft Windows95 and WindowsNT.<br>
In 1993, ten years after I wrote PING, the USENIX association presented me with a handsome scroll, pronouncing me a Joint recipient of The USENIX Association 1993 Lifetime Achievement Award presented to the Computer Systems Research Group, University of California at Berkeley 1979-1993. ``Presented to honor profound intellectual achievement and unparalleled service to our Community. At the behest of CSRG principals we hereby recognize the following individuals and organizations as CSRG participants, contributors and supporters.&#39;&#39; Wow!<br>
The best ping story I&#39;ve ever heard was told to me at a USENIX conference, where a network administrator with an intermittent Ethernet had linked the ping program to his vocoder program, in essence writing:<br>
ping goodhost | sed -e &#39;s/.*/ping/&#39; | vocoder<br>
He wired the vocoder&#39;s output into his office stereo and turned up the volume as loud as he could stand. The computer sat there shouting &quot;Ping, ping, ping...&quot; once a second, and he wandered through the building wiggling Ethernet connectors until the sound stopped. And that&#39;s how he found the intermittent failure.</p>

<hr>
</blockquote>

<h3><a href="http://glasz.org/sheeplog/2017/02/freebsd-usrlocalliblibpkgso3-undefined-symbol-utimensat.html" rel="nofollow">FreeBSD: /usr/local/lib/libpkg.so.3: Undefined symbol &quot;utimensat&quot;</a></h3>

<blockquote>
<p>The internet will tell you that, of course, 10.2 is EOL, that packages are being built for 10.3 by now and to better upgrade to the latest version of FreeBSD. While all of this is true and running the latest versions is generally good advise, in most cases it is unfeasible to do an entire OS upgrade just to be able to install a package.</p>
</blockquote>

<ul>
<li>Points out the ABI variable being used in /usr/local/etc/pkg/repos/FreeBSD.conf</li>
</ul>

<blockquote>
<p>Now, if you have 10.2 installed and 10.3 is the current latest FreeBSD version, this url will point to packages built for 10.3 resulting in the problem that, when running pkg upgrade pkg itll go ahead and install the latest version of pkg build for 10.3 onto your 10.2 system. Yikes! FreeBSD 10.3 and pkgng broke the ABI by introducing new symbols, like utimensat.</p>
</blockquote>

<ul>
<li>The solution:</li>
</ul>

<blockquote>
<p>Have a look at the actual repo url <a href="http://pkg.FreeBSD.org/FreeBSD:10:amd64%C2%85" rel="nofollow">http://pkg.FreeBSD.org/FreeBSD:10:amd64</a> theres repos for each release! Instead of going through the tedious process of upgrading FreeBSD you just need to Use a repo url that fits your FreeBSD release:</p>

<p>Update the package cache: pkg update<br>
Downgrade pkgng (in case you accidentally upgraded it already): pkg delete -f pkg<br>
pkg install -y pkg<br>
Install your package<br>
There you go. Dont fret. But upgrade your OS soon ;)</p>

<hr>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://imil.net/blog/2017/01/22/collectd_NetBSD_temperature/" rel="nofollow">CPU temperature collectd report on NetBSD</a></li>
<li><a href="https://www.servethehome.com/booting-freebsd-11-nvme-zfs-amd-ryzen/" rel="nofollow">Booting FreeBSD 11 with NVMe and ZFS on AMD Ryzen</a></li>
<li><a href="https://torbsd.github.io/blog.html#busy-bbb" rel="nofollow">BeagleBone Black Tor relay</a></li>
<li><a href="https://reviews.freebsd.org/rS317094" rel="nofollow">FreeBSD - Disable in-tree GDB by default on x86, mips, and powerpc</a></li>
<li><a href="https://www.meetup.com/CharmBUG/events/238218742/" rel="nofollow">CharmBUG April Meetup</a></li>
<li><a href="https://www.snellman.net/blog/archive/2017-04-17-xxx-fixme/" rel="nofollow">The origins of XXX as FIXME</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/2APJE4E#wrap" rel="nofollow">Felis - L2ARC</a></li>
<li><a href="http://dpaste.com/0BRJJ73#wrap" rel="nofollow">Gabe - FreeBSD Server Install</a><br></li>
<li><a href="http://dpaste.com/05EYNJ4#wrap" rel="nofollow">FEMP Script</a></li>
<li><a href="http://dpaste.com/1CV323G#wrap" rel="nofollow">Scott - FreeNAS &amp; LAGG</a></li>
<li><a href="http://dpaste.com/3486VQZ#wrap" rel="nofollow">Marko - Backups</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we look forward with the latest OpenBSD release, look back with Dennis Ritchies paper on the evolution of Unix Time Sharing, have an Interview with Kris</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20170411132956" rel="nofollow">OpenBSD 6.1 RELEASED</a></h3>

<ul>
<li><a href="https://marc.info/?l=openbsd-announce&m=149191716921690&w=2&#x27;" rel="nofollow">Mailing list post</a></li>
<li>We are pleased to announce the official release of OpenBSD 6.1. This is our 42nd release.</li>
<li>New/extended platforms:

<ul>
<li>New arm64 platform, using clang(1) as the base system compiler.</li>
<li>The loongson platform now supports systems with Loongson 3A CPU and RS780E chipset.</li>
<li>The following platforms were retired: armish, sparc, zaurus</li>
</ul></li>
<li>New vmm(4)/ vmd(8)</li>
<li>IEEE 802.11 wireless stack improvements</li>
<li>Generic network stack improvements</li>
<li>Installer improvements</li>
<li>Routing daemons and other userland network improvements</li>
<li>Security improvements</li>
<li>dhclient(8)/ dhcpd(8)/ dhcrelay(8) improvements</li>
<li>Assorted improvements</li>
<li>OpenSMTPD 6.0.0</li>
<li>OpenSSH 7.4</li>
<li>LibreSSL 2.5.3</li>
<li>mandoc 1.14.1
***</li>
</ul>

<h3><a href="http://vegardno.blogspot.ca/2017/03/fuzzing-openssh-daemon-using-afl.html" rel="nofollow">Fuzz Testing OpenSSH</a></h3>

<ul>
<li>Vegard Nossum writes a blog post explaining how to fuzz OpenSSH using AFL</li>
<li>It starts by compiling AFL and SSH with LLVM to get extra instrumentation to make the fuzzing process better, and faster</li>
<li>Sandboxing, PIE, and other features are disabled to increase debuggability, and to try to make breaking SSH easier</li>
<li>Privsep is also disabled, because when AFL does make SSH crash, the child process crashing causes the parent process to exit normally, and AFL then doesnt realize that a crash has happened. A one-line patch disables the privsep feature for the purposes of testing</li>
<li>A few other features are disabled to make testing easier (disabling replay attack protection allows the same inputs to be reused many times), and faster:

<ul>
<li>the local arc4random_buf() is patched to return a buffer of zeros</li>
<li>disabling CRC checks</li>
<li>disabling MAC checks</li>
<li>disabling encryption (allow the NULL cipher for everything)</li>
<li>add a call to __AFL_INIT(), to enable deferred forkserver mode</li>
<li>disabling closefrom()</li>
<li>Skipping expensive DH/curve and key derivation operations</li>
</ul></li>
<li>Then, you can finally get around to writing some test cases</li>
<li>The steps are all described in detail</li>
<li>In one day of testing, the author found a few NULL dereferences that have since been fixed.</li>
<li>Maybe you can think of some other code paths through SSH that should be tested, or want to test another daemon
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20170409123528" rel="nofollow">Getting OpenBSD running on Raspberry Pi 3</a></h3>

<blockquote>
<p>Ian Darwin writes in about his work deploying the arm64 platform and the Raspberry Pi 3<br>
So I have this empty white birdhouse-like thing in the yard, open at the front. It was intended to house the wireless remote temperature sensor from a low-cost weather station, which had previously been mounted on a dark-colored wall of the house [...]. But when I put the sensor into the birdhouse, the signal is too weak for the weather station to receive it (the mounting post was put in place by a previous owner of our property, and is set deeply in concrete). So the next plan was to pop in a tiny OpenBSD computer with a uthum(4) temperature sensor and stream the temperature over WiFi.<br>
The Raspberry Pi computers are interesting in their own way: intending to bring low-cost computing to everybody, they take shortcuts and omit things that you&#39;d expect on a laptop or desktop. They aren&#39;t too bright on their own: there&#39;s very little smarts in the board compared to the &quot;BIOS&quot; and later firmwares on conventional systems. Some of the &quot;smarts&quot; are only available as binary files. This was part of the reason that our favorite OS never came to the Pi Party for the original rpi, and didn&#39;t quite arrive for the rpi2. With the rpi3, though, there is enough availability that our devs were able to make it boot. Some limitations remain, though: if you want to build your own full release, you have to install the dedicated raspberrypi-firmware package from the ports tree. And, the boot disks have to have several extra files on them - this is set up on the install sets, but you should be careful not to mess with these extra files until you know what you&#39;re doing!</p>

<p>But wait! Before you read on, please note that, as of April 1, 2017, this platform boots up but is not yet ready for prime time:</p>
</blockquote>

<ul>
<li>there&#39;s no driver for SD/MMC but that&#39;s the only thing the hardware can level-0 boot from, so you need both the uSD card and a USB disk, at least while getting started;</li>
<li>there is no support for the built-in WiFi (a Broadcom BCM43438 SDIO 802.11), so you have to use wired Ethernet or a USB WiFi dongle (for my project an old MSI that shows up as ural(4) seems to work fine);</li>
<li>the HDMI driver isn&#39;t used by the kernel (if a monitor is plugged in uBoot will display its messages there), so you need to set up cu with a 3V serial cable, at least for initial setup.</li>
<li>the ports tree isn&#39;t ready to cope with the base compiler being clang yet, so packages are &quot;a thing of the future&quot;</li>
</ul>

<blockquote>
<p>But wait - there&#39;s more! The &quot;USB disk&quot; can be a USB thumb drive, though they&#39;re generally slower than a &quot;real&quot; disk. My first forays used a Kingston DTSE9, the hardy little steel-cased version of the popular DataTraveler line. I was able to do the install, and boot it, once (when I captured the dmesg output shown below). After that, it failed - the boot process hung with the ever-unpopular &quot;scanning usb for storage devices...&quot; message. I tried the whole thing again with a second DTSE9, and with a 32GB plastic-cased DataTraveler. Same results. After considerable wasted time, I found a post on RPI&#39;s own site which dates back to the early days of the PI 3, in which they admit that they took shortcuts in developing the firmware, and it just can&#39;t be made to work with the Kingston DataTraveler! Not having any of the &quot;approved&quot; devices, and not living around the corner from a computer store, I switched to a Sabrent USB dock with a 320GB Western Digital disk, and it&#39;s been rock solid. Too big and energy-hungry for the final project, but enough to show that the rpi3 can be solid with the right (solid-state) disk. And fast enough to build a few simple ports - though a lot will not build yet. I then found and installed OpenBSD onto a PNY brand thumb drive and found it solid - in fact I populated it by dding from one of the DataTraveller drives, so theyre not at fault.</p>
</blockquote>

<ul>
<li>Check out the full article for detailed setup instructions
***</li>
</ul>

<h3><a href="http://www.read.seas.harvard.edu/%7Ekohler/class/aosref/ritchie84evolution.pdf" rel="nofollow">Dennis M. Ritchies Paper: The Evolution of the Unix Time Sharing System</a></h3>

<ul>
<li>From the abstract:</li>
</ul>

<blockquote>
<p>This paper presents a brief history of the early development of the Unix operating system. It concentrates on the evolution of the file system, the process-control mechanism, and the idea of pipelined commands. Some attention is paid to social conditions during the development of the system. <br>
During the past few years, the Unix operating system has come into wide use, so wide that its very name has become a trademark of Bell Laboratories. Its important characteristics have become known to many people. It has suffered much rewriting and tinkering since the first publication describing it in 1974 [1], but few fundamental changes. However, Unix was born in 1969 not 1974, and the account of its development makes a little-known and perhaps instructive story. This paper presents a technical and social history of the evolution of the system. </p>
</blockquote>

<ul>
<li>High level document structure:</li>
</ul>

<blockquote>
<p>Origins<br>
The PDP-7 Unix file system <br>
Process control<br>
IO Redirection<br>
The advent of the PDP-11<br>
The first PDP-11 system<br>
Pipes<br>
High-level languages<br>
Conclusion</p>

<p>One of the comforting things about old memories is their tendency to take on a rosy glow. The programming environment provided by the early versions of Unix seems, when described here, to be extremely harsh and primitive. I am sure that if forced back to the PDP-7 I would find it intolerably limiting and lacking in conveniences. Nevertheless, it did not seem so at the time; the memory fixes on what was good and what lasted, and on the joy of helping to create the improvements that made life better. In ten years, I hope we can look back with the same mixed impression of progress combined with continuity. </p>

<hr>
</blockquote>

<h2>Interview - Kris Moore - <a href="mailto:kris@trueos.org" rel="nofollow">kris@trueos.org</a> | <a href="https://twitter.com/pcbsdkris" rel="nofollow">@pcbsdkris</a></h2>

<ul>
<li>Director of Engineering at iXSystems</li>
<li>FreeNAS </li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=316894" rel="nofollow">Compressed zfs send / receive now in FreeBSDs vendor area</a></h3>

<ul>
<li>Andriy Gapon committed a whole lot of ZFS updates to FreeBSDs vendor area</li>
<li>This feature takes advantage of the new compressed ARC feature, which means blocks that are compressed on disk, remain compressed in ZFS RAM cache, to use the compressed blocks when using ZFS replication.</li>
<li>Previously, blocks were uncompressed, sent (usually over the network), then recompressed on the other side.</li>
<li>This is rather wasteful, and can make the process slower, not just because of the CPU time wasted decompressing/recompressing the data, but because it means more data has to be sent over the network.</li>
<li>This caused many users to end up doing: zfs send | xz -T0 | ssh unxz | zfs recv, or similar, to compress the data before sending it over the network.</li>
<li>With this new feature, zfs send with the new -c flag, will transmit the already compressed blocks instead.</li>
<li>This change also adds longopts versions of all of the zfs send flags, making them easier to understand when written in shell scripts.</li>
<li>A lot of fixes, man page updates, etc. from upstream OpenZFS </li>
<li>Thanks to everyone who worked on these fixes and features!</li>
<li>Well announce when these have been committed to head for testing
***</li>
</ul>

<h3><a href="https://mysteriouscode.io/blog/granting-privileges-using-mac-framework/" rel="nofollow">Granting privileges using the FreeBSD MAC framework </a></h3>

<ul>
<li>The MAC (Mandatory Access Control) framework allows finer grained permissions than the standard UNIX permissions that exist in the base system</li>
</ul>

<blockquote>
<p>FreeBSDs kernel provides quite sophisticated privilege model that extends the traditional UNIX user-and-group one. Here Ill show how to leverage it to grant access to specific privileges to group of non-root users.<br>
mac(9) allows creating pluggable modules with policies that can extend existing base system security definitions. struct mac_policy_ops consist of many entry points that we can use to amend the behaviour.<br>
This time, I wanted to grant a privilege to change realtime priority to a selected group. While Linux kernel lets you specify a named group, FreeBSD doesnt have such ability, hence I created this very simple policy.<br>
The privilege check can be extended using two user supplied functions: priv_check and priv_grant. The first one can be used to further restrict existing privileges, i.e. you can disallow some specific priv to be used in jails, etc. The second one is used to explicitly grant extra privileges not available for the target in base configuration.<br>
The core of the mac_rtprio module is dead simple. I defined sysctl tree for two oids: enable (on/off switch for the policy) and gid (the GID target has to be member of), then I specified our custom version of mpo_priv_grant called rtprio_priv_grant. Body of my granting function is even simpler. If the policy is disabled or the privilege that is being checked is not PRIV_SCHED_RTPRIO, we simply skip and return EPERM. If the user is member of the designated group we return 0 thatll allow the action  target would change realtime privileges.</p>
</blockquote>

<ul>
<li>Another useful thing the MAC framework can be used to grant to non-root users: PortACL: The ability to bind to TCP/UDP ports less than 1024, which is usually restricted to root.</li>
<li>Some other uses for the MAC framework are discussed in <a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/mac.html" rel="nofollow">The FreeBSD Handbook</a></li>
<li>However, there are lots more, and we would really like to see more tutorials and documentation on using MAC to make more secure servers, but allowing the few specific things that normally require root access.
***</li>
</ul>

<h3><a href="http://ftp.arl.army.mil/%7Emike/ping.html" rel="nofollow">The Story of the PING Program</a></h3>

<ul>
<li>This is from the homepage of Mike Muuss:</li>
</ul>

<blockquote>
<p>Yes, it&#39;s true! I&#39;m the author of ping for UNIX. Ping is a little thousand-line hack that I wrote in an evening which practically everyone seems to know about. :-)<br>
I named it after the sound that a sonar makes, inspired by the whole principle of cho-location. In college I&#39;d done a lot of modeling of sonar and radar systems, so the &quot;Cyberspace&quot; analogy seemed very apt. It&#39;s exactly the same paradigm applied to a new problem domain: ping uses timed IP/ICMP ECHO_REQUEST and ECHO_REPLY packets to probe the &quot;distance&quot; to the target machine.<br>
My original impetus for writing PING for 4.2a BSD UNIX came from an offhand remark in July 1983 by Dr. Dave Mills while we were attending a DARPA meeting in Norway, in which he described some work that he had done on his &quot;Fuzzball&quot; LSI-11 systems to measure path latency using timed ICMP Echo packets.<br>
In December of 1983 I encountered some odd behavior of the IP network at BRL. Recalling Dr. Mills&#39; comments, I quickly coded up the PING program, which revolved around opening an ICMP style SOCK_RAW AF_INET Berkeley-style socket(). The code compiled just fine, but it didn&#39;t work -- there was no kernel support for raw ICMP sockets! Incensed, I coded up the kernel support and had everything working well before sunrise. Not surprisingly, Chuck Kennedy (aka &quot;Kermit&quot;) had found and fixed the network hardware before I was able to launch my very first &quot;ping&quot; packet. But I&#39;ve used it a few times since then. <em>grin</em> If I&#39;d known then that it would be my most famous accomplishment in life, I might have worked on it another day or two and added some more options.<br>
The folks at Berkeley eagerly took back my kernel modifications and the PING source code, and it&#39;s been a standard part of Berkeley UNIX ever since. Since it&#39;s free, it has been ported to many systems since then, including Microsoft Windows95 and WindowsNT.<br>
In 1993, ten years after I wrote PING, the USENIX association presented me with a handsome scroll, pronouncing me a Joint recipient of The USENIX Association 1993 Lifetime Achievement Award presented to the Computer Systems Research Group, University of California at Berkeley 1979-1993. ``Presented to honor profound intellectual achievement and unparalleled service to our Community. At the behest of CSRG principals we hereby recognize the following individuals and organizations as CSRG participants, contributors and supporters.&#39;&#39; Wow!<br>
The best ping story I&#39;ve ever heard was told to me at a USENIX conference, where a network administrator with an intermittent Ethernet had linked the ping program to his vocoder program, in essence writing:<br>
ping goodhost | sed -e &#39;s/.*/ping/&#39; | vocoder<br>
He wired the vocoder&#39;s output into his office stereo and turned up the volume as loud as he could stand. The computer sat there shouting &quot;Ping, ping, ping...&quot; once a second, and he wandered through the building wiggling Ethernet connectors until the sound stopped. And that&#39;s how he found the intermittent failure.</p>

<hr>
</blockquote>

<h3><a href="http://glasz.org/sheeplog/2017/02/freebsd-usrlocalliblibpkgso3-undefined-symbol-utimensat.html" rel="nofollow">FreeBSD: /usr/local/lib/libpkg.so.3: Undefined symbol &quot;utimensat&quot;</a></h3>

<blockquote>
<p>The internet will tell you that, of course, 10.2 is EOL, that packages are being built for 10.3 by now and to better upgrade to the latest version of FreeBSD. While all of this is true and running the latest versions is generally good advise, in most cases it is unfeasible to do an entire OS upgrade just to be able to install a package.</p>
</blockquote>

<ul>
<li>Points out the ABI variable being used in /usr/local/etc/pkg/repos/FreeBSD.conf</li>
</ul>

<blockquote>
<p>Now, if you have 10.2 installed and 10.3 is the current latest FreeBSD version, this url will point to packages built for 10.3 resulting in the problem that, when running pkg upgrade pkg itll go ahead and install the latest version of pkg build for 10.3 onto your 10.2 system. Yikes! FreeBSD 10.3 and pkgng broke the ABI by introducing new symbols, like utimensat.</p>
</blockquote>

<ul>
<li>The solution:</li>
</ul>

<blockquote>
<p>Have a look at the actual repo url <a href="http://pkg.FreeBSD.org/FreeBSD:10:amd64%C2%85" rel="nofollow">http://pkg.FreeBSD.org/FreeBSD:10:amd64</a> theres repos for each release! Instead of going through the tedious process of upgrading FreeBSD you just need to Use a repo url that fits your FreeBSD release:</p>

<p>Update the package cache: pkg update<br>
Downgrade pkgng (in case you accidentally upgraded it already): pkg delete -f pkg<br>
pkg install -y pkg<br>
Install your package<br>
There you go. Dont fret. But upgrade your OS soon ;)</p>

<hr>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://imil.net/blog/2017/01/22/collectd_NetBSD_temperature/" rel="nofollow">CPU temperature collectd report on NetBSD</a></li>
<li><a href="https://www.servethehome.com/booting-freebsd-11-nvme-zfs-amd-ryzen/" rel="nofollow">Booting FreeBSD 11 with NVMe and ZFS on AMD Ryzen</a></li>
<li><a href="https://torbsd.github.io/blog.html#busy-bbb" rel="nofollow">BeagleBone Black Tor relay</a></li>
<li><a href="https://reviews.freebsd.org/rS317094" rel="nofollow">FreeBSD - Disable in-tree GDB by default on x86, mips, and powerpc</a></li>
<li><a href="https://www.meetup.com/CharmBUG/events/238218742/" rel="nofollow">CharmBUG April Meetup</a></li>
<li><a href="https://www.snellman.net/blog/archive/2017-04-17-xxx-fixme/" rel="nofollow">The origins of XXX as FIXME</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/2APJE4E#wrap" rel="nofollow">Felis - L2ARC</a></li>
<li><a href="http://dpaste.com/0BRJJ73#wrap" rel="nofollow">Gabe - FreeBSD Server Install</a><br></li>
<li><a href="http://dpaste.com/05EYNJ4#wrap" rel="nofollow">FEMP Script</a></li>
<li><a href="http://dpaste.com/1CV323G#wrap" rel="nofollow">Scott - FreeNAS &amp; LAGG</a></li>
<li><a href="http://dpaste.com/3486VQZ#wrap" rel="nofollow">Marko - Backups</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>86: Business as Usual</title>
  <link>https://www.bsdnow.tv/86</link>
  <guid isPermaLink="false">299268e7-d000-4377-8a05-1d0b89b36c5c</guid>
  <pubDate>Wed, 22 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/299268e7-d000-4377-8a05-1d0b89b36c5c.mp3" length="75048916" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we'll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:44:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this time on the show, we'll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we'll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Optimizing TLS for high bandwidth applications (https://people.freebsd.org/~rrs/asiabsd_2015_tls.pdf)
Netflix has released a report on some of their recent activities, pushing lots of traffic through TLS on FreeBSD
TLS has traditionally had too much overhead for the levels of bandwidth they're using, so this pdf outlines some of their strategy in optimizing it
The sendfile() syscall (which nginx uses) isn't available when data is encrypted in userland
To get around this, Netflix is proposing to add TLS support to the FreeBSD kernel
Having encrypted movie streams would be pretty neat
***
Crypto in unexpected places (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142944822223482&amp;amp;w=2)
OpenBSD is somewhat known for its integrated cryptography, right down to strong randomness in every place you could imagine (process IDs, TCP initial sequence numbers, etc)
One place you might not expect crypto to be used (or even needed) is in the "ping" utility, right? Well, think again 
David Gwynne recently committed (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142944754923359&amp;amp;w=2) a change that adds MAC (https://en.wikipedia.org/wiki/Message_authentication_code) to the ping timestamp payload
By default, it'll be filled with a ChaCha stream instead of an unvarying payload, and David says "this lets us have some confidence that the timestamp hasn't been damaged or tampered with in transit"
Not only is this a security feature, but it should also help detect dodgy or malfunctioning network equipment going forward
Maybe we can look forward to a cryptographically secure "echo" command next...
***
Broadwell in DragonFly (http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/BroadwellBoxes/)
The DragonFlyBSD guys have started a new page on their wiki to discuss Broadwell hardware and its current status
Matt Dillon, the project lead, recently bought some hardware with this chipset, and lays out what works and what doesn't work
The two main show-stoppers right now are the graphics and wireless, but they have someone who's already making progress with the GPU support
Wireless support will likely have to wait until FreeBSD gets it, then they'll port it back over
None of the BSDs currently have full Broadwell support, so stay tuned for further updates
***
DIY NAS software roundup (http://blog.brianmoses.net/2015/04/diy-nas-software-roundup.html)
In this blog post, the author compares a few different software solutions for a network attached storage device
He puts FreeNAS, one of our favorites, up against a number of opponents - both BSD and Linux-based
NAS4Free gets an honorable mention as well, particularly for its lower hardware requirements and sleek interface
If you've been thinking about putting together a NAS, but aren't quite comfortable enough to set it up by yourself yet, this article should give you a good view of the current big names
Some competition is always good, gotta keep those guys on their toes
***
Interview - Antoine Jacoutot - ajacoutot@openbsd.org (mailto:ajacoutot@openbsd.org) / @ajacoutot (https://twitter.com/ajacoutot)
OpenBSD at M:Tier (http://www.mtier.org/about-us/), business adoption of BSD, various topics
News Roundup
OpenBSD on DigitalOcean (http://www.tubsta.com/2015/04/openbsd-on-digital-ocean/)
When DigitalOcean rolled out initial support for FreeBSD, it was a great step in the right direction - we hoped that all the other BSDs would soon follow
This is not yet the case, but a blog article here has details on how you can install OpenBSD (and likely the others too) on your VPS
Using a -current snapshot and some swapfile trickery, it's possible to image an OpenBSD ramdisk installer onto an unmounted portion of the virtual disk
After doing so, you just boot from their web UI-based console and can perform a standard installation 
You will have to pay special attention to some details of the disk layout, but this article takes you through the entire process step by step
***
Initial ARM64 support lands in FreeBSD (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=281494)
The ARM64 architecture, sometimes called ARMv8 or AArch64 (https://wiki.freebsd.org/arm64), is a new generation of CPUs that will mostly be in embedded devices
FreeBSD has just gotten support for this platform in the -CURRENT branch
Previously, it was only the beginnings of the kernel and enough bits to boot in QEMU - now a full build (https://lists.freebsd.org/pipermail/freebsd-testing/2015-April/000918.html) is possible
Work should now start happening in the main source code tree, and hopefully they'll have full support in a branch soon
***
Scripting with least privilege (http://shill.seas.harvard.edu/)
A new scripting language with a focus on privilege separation and running with only what's absolutely needed has been popular in the headlines lately
Shell scripts are used everywhere today: startup scripts, orchestration scripts for mass deployment, configuring and compiling software, etc.
Shill aims to answer the questions "how do we limit the authority of scripts" and "how do we determine what authority is necessary" by including a declarative security policy that's checked and enforced by the language runtime
If used on FreeBSD, Shill will use Capsicum for sandboxing
You can find some more of the technical information in their documentation pdf (http://shill.seas.harvard.edu/shill-osdi-2014.pdf) or watch their USENIX presentation (https://2459d6dc103cb5933875-c0245c5c937c5dedcca3f1764ecc9b2f.ssl.cf2.rackcdn.com/osdi14/moore.mp4) video
Hacker News also had some discussion (https://news.ycombinator.com/item?id=9328277) on the topic
***
OpenBSD first impressions (http://blog.greduan.com/2015-04-19-mstobfi.html)
A brand new BSD user has started documenting his experience through a series of blog posts
Formerly a Linux guy, he's tried out FreeBSD and OpenBSD so far, and is currently working on an OpenBSD desktop
The first post goes into why he chose BSD at all, why he's switching away from Linux, how the initial transition has been, what you'll need to relearn and what he's got planned going forward
He's only been using OpenBSD for a few days as of the time this was written - we don't usually get to hear from people this early in on their BSD journey, so it offers a unique perspective
***
PCBSD and 4K oh my! (http://blog.pcbsd.org/2015/04/pc-bsd-and-4k-oh-my/)
Yesterday, Kris got ahold of some 4K monitor hardware to test PC-BSD out
The short of it - It works great!
Minor tweaks being made to some of the PC-BSD defaults to better accommodate 4K out of box
This particular model monitor ships with DisplayPort set to 1.1 mode only, switching it to 1.2 mode enables 60Hz properly
***
Feedback/Questions
Darin writes in (http://slexy.org/view/s21kFuvAFs)
Mitch writes in (http://slexy.org/view/s2nf4o9p4E)
***
Discussion
Comparison of BSD release cycles
FreeBSD (https://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/introduction.html#idp55486416), OpenBSD (http://www.openbsd.org/faq/faq5.html#Flavors), NetBSD (https://www.netbsd.org/releases/release-map.html) and DragonFlyBSD (https://www.dragonflybsd.org/releases/)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, mtier, m:tier, business, it, consulting, binpatch-ng, openup, stable, packages, enterprise, support, freenas, tls, netflix, broadwell, nas4free</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we&#39;ll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" rel="nofollow">Optimizing TLS for high bandwidth applications</a></h3>

<ul>
<li>Netflix has released a report on some of their recent activities, pushing lots of traffic through TLS on FreeBSD</li>
<li>TLS has traditionally had too much overhead for the levels of bandwidth they&#39;re using, so this pdf outlines some of their strategy in optimizing it</li>
<li>The sendfile() syscall (which nginx uses) isn&#39;t available when data is encrypted in userland</li>
<li>To get around this, Netflix is proposing to add TLS support to the FreeBSD <strong>kernel</strong></li>
<li>Having encrypted movie streams would be pretty neat
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142944822223482&w=2" rel="nofollow">Crypto in unexpected places</a></h3>

<ul>
<li>OpenBSD is somewhat known for its integrated cryptography, right down to strong randomness in every place you could imagine (process IDs, TCP initial sequence numbers, etc)</li>
<li>One place you might not expect crypto to be used (or even needed) is in the &quot;ping&quot; utility, right? Well, think again </li>
<li>David Gwynne recently <a href="https://www.marc.info/?l=openbsd-cvs&m=142944754923359&w=2" rel="nofollow">committed</a> a change that adds <a href="https://en.wikipedia.org/wiki/Message_authentication_code" rel="nofollow">MAC</a> to the ping timestamp payload</li>
<li>By default, it&#39;ll be filled with a ChaCha stream instead of an unvarying payload, and David says &quot;this lets us have some confidence that the timestamp hasn&#39;t been damaged or tampered with in transit&quot;</li>
<li>Not only is this a security feature, but it should also help detect dodgy or malfunctioning network equipment going forward</li>
<li>Maybe we can look forward to a cryptographically secure &quot;echo&quot; command next...
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/BroadwellBoxes/" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>The DragonFlyBSD guys have started a new page on their wiki to discuss Broadwell hardware and its current status</li>
<li>Matt Dillon, the project lead, recently bought some hardware with this chipset, and lays out what works and what doesn&#39;t work</li>
<li>The two main show-stoppers right now are the graphics and wireless, but they have someone who&#39;s already making progress with the GPU support</li>
<li>Wireless support will likely have to wait until FreeBSD gets it, then they&#39;ll port it back over</li>
<li>None of the BSDs currently have full Broadwell support, so stay tuned for further updates
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2015/04/diy-nas-software-roundup.html" rel="nofollow">DIY NAS software roundup</a></h3>

<ul>
<li>In this blog post, the author compares a few different software solutions for a network attached storage device</li>
<li>He puts FreeNAS, one of our favorites, up against a number of opponents - both BSD and Linux-based</li>
<li>NAS4Free gets an honorable mention as well, particularly for its lower hardware requirements and sleek interface</li>
<li>If you&#39;ve been thinking about putting together a NAS, but aren&#39;t quite comfortable enough to set it up by yourself yet, this article should give you a good view of the current big names</li>
<li>Some competition is always good, gotta keep those guys on their toes
***</li>
</ul>

<h2>Interview - Antoine Jacoutot - <a href="mailto:ajacoutot@openbsd.org" rel="nofollow">ajacoutot@openbsd.org</a> / <a href="https://twitter.com/ajacoutot" rel="nofollow">@ajacoutot</a></h2>

<p>OpenBSD at <a href="http://www.mtier.org/about-us/" rel="nofollow">M:Tier</a>, business adoption of BSD, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tubsta.com/2015/04/openbsd-on-digital-ocean/" rel="nofollow">OpenBSD on DigitalOcean</a></h3>

<ul>
<li>When DigitalOcean rolled out initial support for FreeBSD, it was a great step in the right direction - we hoped that all the other BSDs would soon follow</li>
<li>This is not yet the case, but a blog article here has details on how you can install OpenBSD (and likely the others too) on your VPS</li>
<li>Using a -current snapshot and some swapfile trickery, it&#39;s possible to image an OpenBSD ramdisk installer onto an unmounted portion of the virtual disk</li>
<li>After doing so, you just boot from their web UI-based console and can perform a standard installation </li>
<li>You will have to pay special attention to some details of the disk layout, but this article takes you through the entire process step by step
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=281494" rel="nofollow">Initial ARM64 support lands in FreeBSD</a></h3>

<ul>
<li>The ARM64 architecture, sometimes called <a href="https://wiki.freebsd.org/arm64" rel="nofollow">ARMv8 or AArch64</a>, is a new generation of CPUs that will mostly be in embedded devices</li>
<li>FreeBSD has just gotten support for this platform in the -CURRENT branch</li>
<li>Previously, it was only the beginnings of the kernel and enough bits to boot in QEMU - now <a href="https://lists.freebsd.org/pipermail/freebsd-testing/2015-April/000918.html" rel="nofollow">a full build</a> is possible</li>
<li>Work should now start happening in the main source code tree, and hopefully they&#39;ll have full support in a branch soon
***</li>
</ul>

<h3><a href="http://shill.seas.harvard.edu/" rel="nofollow">Scripting with least privilege</a></h3>

<ul>
<li>A new scripting language with a focus on privilege separation and running with only what&#39;s absolutely needed has been popular in the headlines lately</li>
<li>Shell scripts are used everywhere today: startup scripts, orchestration scripts for mass deployment, configuring and compiling software, etc.</li>
<li>Shill aims to answer the questions &quot;how do we limit the authority of scripts&quot; and &quot;how do we determine what authority is necessary&quot; by including a declarative security policy that&#39;s checked and enforced by the language runtime</li>
<li>If used on FreeBSD, Shill will use Capsicum for sandboxing</li>
<li>You can find some more of the technical information in their <a href="http://shill.seas.harvard.edu/shill-osdi-2014.pdf" rel="nofollow">documentation pdf</a> or watch their <a href="https://2459d6dc103cb5933875-c0245c5c937c5dedcca3f1764ecc9b2f.ssl.cf2.rackcdn.com/osdi14/moore.mp4" rel="nofollow">USENIX presentation</a> video</li>
<li>Hacker News also <a href="https://news.ycombinator.com/item?id=9328277" rel="nofollow">had some discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://blog.greduan.com/2015-04-19-mstobfi.html" rel="nofollow">OpenBSD first impressions</a></h3>

<ul>
<li>A brand new BSD user has started documenting his experience through a series of blog posts</li>
<li>Formerly a Linux guy, he&#39;s tried out FreeBSD and OpenBSD so far, and is currently working on an OpenBSD desktop</li>
<li>The first post goes into why he chose BSD at all, why he&#39;s switching away from Linux, how the initial transition has been, what you&#39;ll need to relearn and what he&#39;s got planned going forward</li>
<li>He&#39;s only been using OpenBSD for a few days as of the time this was written - we don&#39;t usually get to hear from people this early in on their BSD journey, so it offers a unique perspective
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/04/pc-bsd-and-4k-oh-my/" rel="nofollow">PCBSD and 4K oh my!</a></h3>

<ul>
<li>Yesterday, Kris got ahold of some 4K monitor hardware to test PC-BSD out</li>
<li>The short of it - It works great!</li>
<li>Minor tweaks being made to some of the PC-BSD defaults to better accommodate 4K out of box</li>
<li>This particular model monitor ships with DisplayPort set to 1.1 mode only, switching it to 1.2 mode enables 60Hz properly
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21kFuvAFs" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s2nf4o9p4E" rel="nofollow">Mitch writes in</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of BSD release cycles</h3>

<ul>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/introduction.html#idp55486416" rel="nofollow">FreeBSD</a>, <a href="http://www.openbsd.org/faq/faq5.html#Flavors" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/releases/release-map.html" rel="nofollow">NetBSD</a> and <a href="https://www.dragonflybsd.org/releases/" rel="nofollow">DragonFlyBSD</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we&#39;ll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" rel="nofollow">Optimizing TLS for high bandwidth applications</a></h3>

<ul>
<li>Netflix has released a report on some of their recent activities, pushing lots of traffic through TLS on FreeBSD</li>
<li>TLS has traditionally had too much overhead for the levels of bandwidth they&#39;re using, so this pdf outlines some of their strategy in optimizing it</li>
<li>The sendfile() syscall (which nginx uses) isn&#39;t available when data is encrypted in userland</li>
<li>To get around this, Netflix is proposing to add TLS support to the FreeBSD <strong>kernel</strong></li>
<li>Having encrypted movie streams would be pretty neat
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142944822223482&w=2" rel="nofollow">Crypto in unexpected places</a></h3>

<ul>
<li>OpenBSD is somewhat known for its integrated cryptography, right down to strong randomness in every place you could imagine (process IDs, TCP initial sequence numbers, etc)</li>
<li>One place you might not expect crypto to be used (or even needed) is in the &quot;ping&quot; utility, right? Well, think again </li>
<li>David Gwynne recently <a href="https://www.marc.info/?l=openbsd-cvs&m=142944754923359&w=2" rel="nofollow">committed</a> a change that adds <a href="https://en.wikipedia.org/wiki/Message_authentication_code" rel="nofollow">MAC</a> to the ping timestamp payload</li>
<li>By default, it&#39;ll be filled with a ChaCha stream instead of an unvarying payload, and David says &quot;this lets us have some confidence that the timestamp hasn&#39;t been damaged or tampered with in transit&quot;</li>
<li>Not only is this a security feature, but it should also help detect dodgy or malfunctioning network equipment going forward</li>
<li>Maybe we can look forward to a cryptographically secure &quot;echo&quot; command next...
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/BroadwellBoxes/" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>The DragonFlyBSD guys have started a new page on their wiki to discuss Broadwell hardware and its current status</li>
<li>Matt Dillon, the project lead, recently bought some hardware with this chipset, and lays out what works and what doesn&#39;t work</li>
<li>The two main show-stoppers right now are the graphics and wireless, but they have someone who&#39;s already making progress with the GPU support</li>
<li>Wireless support will likely have to wait until FreeBSD gets it, then they&#39;ll port it back over</li>
<li>None of the BSDs currently have full Broadwell support, so stay tuned for further updates
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2015/04/diy-nas-software-roundup.html" rel="nofollow">DIY NAS software roundup</a></h3>

<ul>
<li>In this blog post, the author compares a few different software solutions for a network attached storage device</li>
<li>He puts FreeNAS, one of our favorites, up against a number of opponents - both BSD and Linux-based</li>
<li>NAS4Free gets an honorable mention as well, particularly for its lower hardware requirements and sleek interface</li>
<li>If you&#39;ve been thinking about putting together a NAS, but aren&#39;t quite comfortable enough to set it up by yourself yet, this article should give you a good view of the current big names</li>
<li>Some competition is always good, gotta keep those guys on their toes
***</li>
</ul>

<h2>Interview - Antoine Jacoutot - <a href="mailto:ajacoutot@openbsd.org" rel="nofollow">ajacoutot@openbsd.org</a> / <a href="https://twitter.com/ajacoutot" rel="nofollow">@ajacoutot</a></h2>

<p>OpenBSD at <a href="http://www.mtier.org/about-us/" rel="nofollow">M:Tier</a>, business adoption of BSD, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tubsta.com/2015/04/openbsd-on-digital-ocean/" rel="nofollow">OpenBSD on DigitalOcean</a></h3>

<ul>
<li>When DigitalOcean rolled out initial support for FreeBSD, it was a great step in the right direction - we hoped that all the other BSDs would soon follow</li>
<li>This is not yet the case, but a blog article here has details on how you can install OpenBSD (and likely the others too) on your VPS</li>
<li>Using a -current snapshot and some swapfile trickery, it&#39;s possible to image an OpenBSD ramdisk installer onto an unmounted portion of the virtual disk</li>
<li>After doing so, you just boot from their web UI-based console and can perform a standard installation </li>
<li>You will have to pay special attention to some details of the disk layout, but this article takes you through the entire process step by step
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=281494" rel="nofollow">Initial ARM64 support lands in FreeBSD</a></h3>

<ul>
<li>The ARM64 architecture, sometimes called <a href="https://wiki.freebsd.org/arm64" rel="nofollow">ARMv8 or AArch64</a>, is a new generation of CPUs that will mostly be in embedded devices</li>
<li>FreeBSD has just gotten support for this platform in the -CURRENT branch</li>
<li>Previously, it was only the beginnings of the kernel and enough bits to boot in QEMU - now <a href="https://lists.freebsd.org/pipermail/freebsd-testing/2015-April/000918.html" rel="nofollow">a full build</a> is possible</li>
<li>Work should now start happening in the main source code tree, and hopefully they&#39;ll have full support in a branch soon
***</li>
</ul>

<h3><a href="http://shill.seas.harvard.edu/" rel="nofollow">Scripting with least privilege</a></h3>

<ul>
<li>A new scripting language with a focus on privilege separation and running with only what&#39;s absolutely needed has been popular in the headlines lately</li>
<li>Shell scripts are used everywhere today: startup scripts, orchestration scripts for mass deployment, configuring and compiling software, etc.</li>
<li>Shill aims to answer the questions &quot;how do we limit the authority of scripts&quot; and &quot;how do we determine what authority is necessary&quot; by including a declarative security policy that&#39;s checked and enforced by the language runtime</li>
<li>If used on FreeBSD, Shill will use Capsicum for sandboxing</li>
<li>You can find some more of the technical information in their <a href="http://shill.seas.harvard.edu/shill-osdi-2014.pdf" rel="nofollow">documentation pdf</a> or watch their <a href="https://2459d6dc103cb5933875-c0245c5c937c5dedcca3f1764ecc9b2f.ssl.cf2.rackcdn.com/osdi14/moore.mp4" rel="nofollow">USENIX presentation</a> video</li>
<li>Hacker News also <a href="https://news.ycombinator.com/item?id=9328277" rel="nofollow">had some discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://blog.greduan.com/2015-04-19-mstobfi.html" rel="nofollow">OpenBSD first impressions</a></h3>

<ul>
<li>A brand new BSD user has started documenting his experience through a series of blog posts</li>
<li>Formerly a Linux guy, he&#39;s tried out FreeBSD and OpenBSD so far, and is currently working on an OpenBSD desktop</li>
<li>The first post goes into why he chose BSD at all, why he&#39;s switching away from Linux, how the initial transition has been, what you&#39;ll need to relearn and what he&#39;s got planned going forward</li>
<li>He&#39;s only been using OpenBSD for a few days as of the time this was written - we don&#39;t usually get to hear from people this early in on their BSD journey, so it offers a unique perspective
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/04/pc-bsd-and-4k-oh-my/" rel="nofollow">PCBSD and 4K oh my!</a></h3>

<ul>
<li>Yesterday, Kris got ahold of some 4K monitor hardware to test PC-BSD out</li>
<li>The short of it - It works great!</li>
<li>Minor tweaks being made to some of the PC-BSD defaults to better accommodate 4K out of box</li>
<li>This particular model monitor ships with DisplayPort set to 1.1 mode only, switching it to 1.2 mode enables 60Hz properly
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21kFuvAFs" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s2nf4o9p4E" rel="nofollow">Mitch writes in</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of BSD release cycles</h3>

<ul>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/introduction.html#idp55486416" rel="nofollow">FreeBSD</a>, <a href="http://www.openbsd.org/faq/faq5.html#Flavors" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/releases/release-map.html" rel="nofollow">NetBSD</a> and <a href="https://www.dragonflybsd.org/releases/" rel="nofollow">DragonFlyBSD</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>65: 8,000,000 Mogofoo-ops</title>
  <link>https://www.bsdnow.tv/65</link>
  <guid isPermaLink="false">c905fcf9-ebc6-4a15-8d34-631dc9742cea</guid>
  <pubDate>Wed, 26 Nov 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c905fcf9-ebc6-4a15-8d34-631dc9742cea.mp3" length="66537364" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on the show this week, we've got an interview with Brendan Gregg of Netflix. He's got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:32:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up on the show this week, we've got an interview with Brendan Gregg of Netflix. He's got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week's news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Even more BSD presentation videos (https://www.meetbsd.com/)
More videos from this year's MeetBSD and OpenZFS devsummit were uploaded since last week
Robert Ryan, At the Heart of the Digital Economy (https://www.youtube.com/watch?v=Rc9k1xEepWU)
FreeNAS &amp;amp; ZFS, The Indestructible Duo - Except for the Hard Drives (https://www.youtube.com/watch?v=d1C6DELK7fc)
Richard Yao, libzfs_core and ioctl stabilization (https://www.youtube.com/watch?v=PIC0dwLRBZU)
OpenZFS, Company lightning talks (https://www.youtube.com/watch?v=LmbI7F7XTTc)
OpenZFS, Hackathon Presentation and Awards (https://www.youtube.com/watch?v=gPbVPwScMGk)
Pavel Zakharov, Fast File Cloning (https://www.youtube.com/watch?v=_lGOAZFXra8)
Rick Reed, Half a billion unsuspecting FreeBSD users (https://www.youtube.com/watch?v=TneLO5TdW_M)
Alex Reece &amp;amp; Matt Ahrens, Device Removal (https://www.youtube.com/watch?v=Xs6MsJ9kKKE)
Chris Side, Channel Programs (https://www.youtube.com/watch?v=RMTxyqcomPA)
David Maxwell, The Unix command pipeline (https://www.youtube.com/watch?v=CZHEZHK4jRc)
Be sure to check out the giant list of videos from last week's episode (http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited) if you haven't seen them already
***
NetBSD on a Cobalt Qube 2 (http://www.jarredcapellman.com/2014/3/9/NetBSD-and-a-Cobalt-Qube-2)
The Cobalt Qube was a very expensive networking appliance around 2000
In 2014, you can apparently get one of these MIPS-based machines for about forty bucks
This blog post details getting NetBSD installed and set up on the rare relic of our networking past
If you're an old-time fan of RISC or MIPS CPUs, this'll be a treat for you
Lots of great pictures of the hardware too
***
OpenBSD vs. AFL (https://www.marc.info/?l=openbsd-cvs&amp;amp;w=2&amp;amp;r=1&amp;amp;s=afl&amp;amp;q=b)
In their never-ending security audit, some OpenBSD developers have been hitting various parts of the tree (https://twitter.com/damienmiller/status/534156368391831552) with a fuzzer
If you're not familiar, fuzzing (https://en.wikipedia.org/wiki/Fuzz_testing) is a semi-automated way to test programs for crashes and potential security problems
The program being subjected to torture gets all sorts of random and invalid input, in the hopes of uncovering overflows and other bugs
American Fuzzy Lop (http://lcamtuf.coredump.cx/afl/), in particular, has provided some interesting results across various open source projects recently
So far, it's fixed some NULL pointer dereferences in OpenSSH, various crashes in tcpdump and mandoc (http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man) and a few other things (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141646270127039&amp;amp;w=2)
AFL has an impressive list of CVEs (vulnerabilities) that it's helped developers discover and fix
It also made its way into OpenBSD ports, FreeBSD ports and NetBSD's pkgsrc very recently, so you can try it out for yourself
***
GNOME 3 hits the FreeBSD ports tree (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=372768)
While you've been able to run GNOME 3 on PC-BSD and OpenBSD for a while, it hasn't actually hit the FreeBSD ports tree.. until now
Now you can play with GNOME 3 and all its goodies (as well as Cinnamon 2.2, which this also brings in) on vanilla FreeBSD
Be sure to check the commit message and /usr/ports/UPDATING (http://www.bsdnow.tv/tutorials/ports) if you're upgrading from GNOME 2
You might also want to go back and listen to our interview (http://www.bsdnow.tv/episodes/2014_02_26-port_authority) with Joe Marcus Clark about GNOME's portability
***
Interview - Brendan Gregg - bgregg@netflix.com (mailto:bgregg@netflix.com) / @brendangregg (https://twitter.com/brendangregg)
Performance tuning, benchmarks, debugging
News Roundup
DragonFlyBSD 4.0 released (http://www.dragonflybsd.org/release40/)
A new major version of DragonFly, 4.0.1, was just recently announced
This version includes support for Haswell GPUs, lots of SMP improvements (including some in PF) and support for up to 256 CPUs
It's also the first release to drop support for i386, so it joins PCBSD in the 64 bit-only club
Check the release notes for all the details, including networking and kernel improvements, as well as some crypto changes
***
Can we talk about FreeBSD vs Linux (https://news.ycombinator.com/item?id=8645443)
Hackernews had a recent thread about discussing Linux vs BSD, and the trolls stayed away for once
Rather than rehashing why one is "better" than the other, it was focused on explaining some of the differences between ecosystems and communities
If you're one of the many people who watch our show just out of curiosity about the BSD world, this might be a good thread to read
Someone in the comments even gave bsdnow.tv a mention as a good resource to learn, thanks guy
***
OpenBSD IPSEC tunnel guide (http://www.packetmischief.ca/openbsd-ipsec-tunnel-guide/)
If you've ever wanted to connect two networks with OpenBSD gateways, this is the article for you
It shows how to set up an IPSEC tunnel between destinations, how to lock it down and how to access all the machines on the other network just like they were on your LAN
The article also explains some of the basics of IPSEC if you're not familiar with all the terminology, so this isn't just for experts
Though the article itself is a few years old, it mostly still applies to the latest stuff today
All the tools used are in the OpenBSD base system, so that's pretty handy too
***
DragonFly starts work on IPFW2 (http://www.dragonflybsd.org/docs/ipfw2/)
DragonFlyBSD, much like FreeBSD, comes with more than one firewall you can use
Now it looks like you're going to have yet another choice, as someone is working on a fork of IPFW (which is actually already in its second version, so it should be "IPFW3")
Not a whole lot is known yet; it's still in heavy development, but there's a brief roadmap (http://www.dragonflybsd.org/docs/ipfw2/#index6h1) page with some planned additions
The guy who's working on this has already agreed to come on the show for an interview, but we're going to give him a chance to get some more work done first
Expect that sometime next year, once he's made some progress
***
Feedback/Questions
Michael writes in (http://slexy.org/view/s2NYgVifXN)
Samael writes in (http://slexy.org/view/s21X02saI3)
Steven writes in (http://slexy.org/view/s21Dj7zImH)
Remy writes in (http://slexy.org/view/s218lXg38C)
Michael writes in (http://slexy.org/view/s20SEuKlaH)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dtrace, benchmarks, zfs, solaris, pmstat, performance, high availability, ktrace, strace, iops, freenas, ipfw2, gnome3, afl, fuzzing, american fuzzy lop, ipsec, tunnel</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on the show this week, we&#39;ve got an interview with Brendan Gregg of Netflix. He&#39;s got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">Even more BSD presentation videos</a></h3>

<ul>
<li>More videos from this year&#39;s MeetBSD and OpenZFS devsummit were uploaded since last week</li>
<li>Robert Ryan, <a href="https://www.youtube.com/watch?v=Rc9k1xEepWU" rel="nofollow">At the Heart of the Digital Economy</a></li>
<li>FreeNAS &amp; ZFS, The Indestructible Duo - <a href="https://www.youtube.com/watch?v=d1C6DELK7fc" rel="nofollow">Except for the Hard Drives</a></li>
<li>Richard Yao, <a href="https://www.youtube.com/watch?v=PIC0dwLRBZU" rel="nofollow">libzfs_core and ioctl stabilization</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=LmbI7F7XTTc" rel="nofollow">Company lightning talks</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=gPbVPwScMGk" rel="nofollow">Hackathon Presentation and Awards</a></li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=_lGOAZFXra8" rel="nofollow">Fast File Cloning</a></li>
<li>Rick Reed, <a href="https://www.youtube.com/watch?v=TneLO5TdW_M" rel="nofollow">Half a billion unsuspecting FreeBSD users</a></li>
<li>Alex Reece &amp; Matt Ahrens, <a href="https://www.youtube.com/watch?v=Xs6MsJ9kKKE" rel="nofollow">Device Removal</a></li>
<li>Chris Side, <a href="https://www.youtube.com/watch?v=RMTxyqcomPA" rel="nofollow">Channel Programs</a></li>
<li>David Maxwell, <a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">The Unix command pipeline</a></li>
<li>Be sure to check out the <strong>giant list of videos</strong> from <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">last week&#39;s episode</a> if you haven&#39;t seen them already
***</li>
</ul>

<h3><a href="http://www.jarredcapellman.com/2014/3/9/NetBSD-and-a-Cobalt-Qube-2" rel="nofollow">NetBSD on a Cobalt Qube 2</a></h3>

<ul>
<li>The Cobalt Qube was a very expensive networking appliance around 2000</li>
<li>In 2014, you can apparently get one of these MIPS-based machines for about forty bucks</li>
<li>This blog post details getting NetBSD installed and set up on the rare relic of our networking past</li>
<li>If you&#39;re an old-time fan of RISC or MIPS CPUs, this&#39;ll be a treat for you</li>
<li>Lots of great pictures of the hardware too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">OpenBSD vs. AFL</a></h3>

<ul>
<li>In their never-ending security audit, some OpenBSD developers have been <a href="https://twitter.com/damienmiller/status/534156368391831552" rel="nofollow">hitting various parts of the tree</a> with a fuzzer</li>
<li>If you&#39;re not familiar, <a href="https://en.wikipedia.org/wiki/Fuzz_testing" rel="nofollow">fuzzing</a> is a semi-automated way to test programs for crashes and potential security problems</li>
<li>The program being subjected to torture gets all sorts of random and invalid input, in the hopes of uncovering overflows and other bugs</li>
<li><a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a>, in particular, has provided some interesting results across various open source projects recently</li>
<li>So far, it&#39;s fixed some NULL pointer dereferences in OpenSSH, various crashes in tcpdump and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a> and <a href="https://www.marc.info/?l=openbsd-cvs&m=141646270127039&w=2" rel="nofollow">a few other things</a></li>
<li>AFL has an impressive list of CVEs (vulnerabilities) that it&#39;s helped developers discover and fix</li>
<li>It also made its way into OpenBSD ports, FreeBSD ports and NetBSD&#39;s pkgsrc very recently, so you can try it out for yourself
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=372768" rel="nofollow">GNOME 3 hits the FreeBSD ports tree</a></h3>

<ul>
<li>While you&#39;ve been able to run GNOME 3 on PC-BSD and OpenBSD for a while, it hasn&#39;t actually hit the FreeBSD ports tree.. until now</li>
<li>Now you can play with GNOME 3 and all its goodies (as well as Cinnamon 2.2, which this also brings in) on vanilla FreeBSD</li>
<li>Be sure to check the commit message and <a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">/usr/ports/UPDATING</a> if you&#39;re upgrading from GNOME 2</li>
<li>You might also want to go back and listen to <a href="http://www.bsdnow.tv/episodes/2014_02_26-port_authority" rel="nofollow">our interview</a> with Joe Marcus Clark about GNOME&#39;s portability
***</li>
</ul>

<h2>Interview - Brendan Gregg - <a href="mailto:bgregg@netflix.com" rel="nofollow">bgregg@netflix.com</a> / <a href="https://twitter.com/brendangregg" rel="nofollow">@brendangregg</a></h2>

<p>Performance tuning, benchmarks, debugging</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.dragonflybsd.org/release40/" rel="nofollow">DragonFlyBSD 4.0 released</a></h3>

<ul>
<li>A new major version of DragonFly, 4.0.1, was just recently announced</li>
<li>This version includes support for Haswell GPUs, lots of SMP improvements (including some in PF) and support for up to 256 CPUs</li>
<li>It&#39;s also the first release to drop support for i386, so it joins PCBSD in the 64 bit-only club</li>
<li>Check the release notes for all the details, including networking and kernel improvements, as well as some crypto changes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=8645443" rel="nofollow">Can we talk about FreeBSD vs Linux</a></h3>

<ul>
<li>Hackernews had a recent thread about discussing Linux vs BSD, and the trolls stayed away for once</li>
<li>Rather than rehashing why one is &quot;better&quot; than the other, it was focused on explaining some of the differences between ecosystems and communities</li>
<li>If you&#39;re one of the many people who watch our show just out of curiosity about the BSD world, this might be a good thread to read</li>
<li>Someone in the comments even gave bsdnow.tv a mention as a good resource to learn, thanks guy
***</li>
</ul>

<h3><a href="http://www.packetmischief.ca/openbsd-ipsec-tunnel-guide/" rel="nofollow">OpenBSD IPSEC tunnel guide</a></h3>

<ul>
<li>If you&#39;ve ever wanted to connect two networks with OpenBSD gateways, this is the article for you</li>
<li>It shows how to set up an IPSEC tunnel between destinations, how to lock it down and how to access all the machines on the other network just like they were on your LAN</li>
<li>The article also explains some of the basics of IPSEC if you&#39;re not familiar with all the terminology, so this isn&#39;t just for experts</li>
<li>Though the article itself is a few years old, it mostly still applies to the latest stuff today</li>
<li>All the tools used are in the OpenBSD base system, so that&#39;s pretty handy too
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/ipfw2/" rel="nofollow">DragonFly starts work on IPFW2</a></h3>

<ul>
<li>DragonFlyBSD, much like FreeBSD, comes with more than one firewall you can use</li>
<li>Now it looks like you&#39;re going to have yet another choice, as someone is working on a fork of IPFW (which is actually already in its second version, so it should be &quot;IPFW3&quot;)</li>
<li>Not a whole lot is known yet; it&#39;s still in heavy development, but there&#39;s a brief <a href="http://www.dragonflybsd.org/docs/ipfw2/#index6h1" rel="nofollow">roadmap</a> page with some planned additions</li>
<li>The guy who&#39;s working on this has already agreed to come on the show for an interview, but we&#39;re going to give him a chance to get some more work done first</li>
<li>Expect that sometime next year, once he&#39;s made some progress
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NYgVifXN" rel="nofollow">Michael writes in</a></li>
<li><a href="http://slexy.org/view/s21X02saI3" rel="nofollow">Samael writes in</a></li>
<li><a href="http://slexy.org/view/s21Dj7zImH" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s218lXg38C" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s20SEuKlaH" rel="nofollow">Michael writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on the show this week, we&#39;ve got an interview with Brendan Gregg of Netflix. He&#39;s got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">Even more BSD presentation videos</a></h3>

<ul>
<li>More videos from this year&#39;s MeetBSD and OpenZFS devsummit were uploaded since last week</li>
<li>Robert Ryan, <a href="https://www.youtube.com/watch?v=Rc9k1xEepWU" rel="nofollow">At the Heart of the Digital Economy</a></li>
<li>FreeNAS &amp; ZFS, The Indestructible Duo - <a href="https://www.youtube.com/watch?v=d1C6DELK7fc" rel="nofollow">Except for the Hard Drives</a></li>
<li>Richard Yao, <a href="https://www.youtube.com/watch?v=PIC0dwLRBZU" rel="nofollow">libzfs_core and ioctl stabilization</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=LmbI7F7XTTc" rel="nofollow">Company lightning talks</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=gPbVPwScMGk" rel="nofollow">Hackathon Presentation and Awards</a></li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=_lGOAZFXra8" rel="nofollow">Fast File Cloning</a></li>
<li>Rick Reed, <a href="https://www.youtube.com/watch?v=TneLO5TdW_M" rel="nofollow">Half a billion unsuspecting FreeBSD users</a></li>
<li>Alex Reece &amp; Matt Ahrens, <a href="https://www.youtube.com/watch?v=Xs6MsJ9kKKE" rel="nofollow">Device Removal</a></li>
<li>Chris Side, <a href="https://www.youtube.com/watch?v=RMTxyqcomPA" rel="nofollow">Channel Programs</a></li>
<li>David Maxwell, <a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">The Unix command pipeline</a></li>
<li>Be sure to check out the <strong>giant list of videos</strong> from <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">last week&#39;s episode</a> if you haven&#39;t seen them already
***</li>
</ul>

<h3><a href="http://www.jarredcapellman.com/2014/3/9/NetBSD-and-a-Cobalt-Qube-2" rel="nofollow">NetBSD on a Cobalt Qube 2</a></h3>

<ul>
<li>The Cobalt Qube was a very expensive networking appliance around 2000</li>
<li>In 2014, you can apparently get one of these MIPS-based machines for about forty bucks</li>
<li>This blog post details getting NetBSD installed and set up on the rare relic of our networking past</li>
<li>If you&#39;re an old-time fan of RISC or MIPS CPUs, this&#39;ll be a treat for you</li>
<li>Lots of great pictures of the hardware too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">OpenBSD vs. AFL</a></h3>

<ul>
<li>In their never-ending security audit, some OpenBSD developers have been <a href="https://twitter.com/damienmiller/status/534156368391831552" rel="nofollow">hitting various parts of the tree</a> with a fuzzer</li>
<li>If you&#39;re not familiar, <a href="https://en.wikipedia.org/wiki/Fuzz_testing" rel="nofollow">fuzzing</a> is a semi-automated way to test programs for crashes and potential security problems</li>
<li>The program being subjected to torture gets all sorts of random and invalid input, in the hopes of uncovering overflows and other bugs</li>
<li><a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a>, in particular, has provided some interesting results across various open source projects recently</li>
<li>So far, it&#39;s fixed some NULL pointer dereferences in OpenSSH, various crashes in tcpdump and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a> and <a href="https://www.marc.info/?l=openbsd-cvs&m=141646270127039&w=2" rel="nofollow">a few other things</a></li>
<li>AFL has an impressive list of CVEs (vulnerabilities) that it&#39;s helped developers discover and fix</li>
<li>It also made its way into OpenBSD ports, FreeBSD ports and NetBSD&#39;s pkgsrc very recently, so you can try it out for yourself
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=372768" rel="nofollow">GNOME 3 hits the FreeBSD ports tree</a></h3>

<ul>
<li>While you&#39;ve been able to run GNOME 3 on PC-BSD and OpenBSD for a while, it hasn&#39;t actually hit the FreeBSD ports tree.. until now</li>
<li>Now you can play with GNOME 3 and all its goodies (as well as Cinnamon 2.2, which this also brings in) on vanilla FreeBSD</li>
<li>Be sure to check the commit message and <a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">/usr/ports/UPDATING</a> if you&#39;re upgrading from GNOME 2</li>
<li>You might also want to go back and listen to <a href="http://www.bsdnow.tv/episodes/2014_02_26-port_authority" rel="nofollow">our interview</a> with Joe Marcus Clark about GNOME&#39;s portability
***</li>
</ul>

<h2>Interview - Brendan Gregg - <a href="mailto:bgregg@netflix.com" rel="nofollow">bgregg@netflix.com</a> / <a href="https://twitter.com/brendangregg" rel="nofollow">@brendangregg</a></h2>

<p>Performance tuning, benchmarks, debugging</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.dragonflybsd.org/release40/" rel="nofollow">DragonFlyBSD 4.0 released</a></h3>

<ul>
<li>A new major version of DragonFly, 4.0.1, was just recently announced</li>
<li>This version includes support for Haswell GPUs, lots of SMP improvements (including some in PF) and support for up to 256 CPUs</li>
<li>It&#39;s also the first release to drop support for i386, so it joins PCBSD in the 64 bit-only club</li>
<li>Check the release notes for all the details, including networking and kernel improvements, as well as some crypto changes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=8645443" rel="nofollow">Can we talk about FreeBSD vs Linux</a></h3>

<ul>
<li>Hackernews had a recent thread about discussing Linux vs BSD, and the trolls stayed away for once</li>
<li>Rather than rehashing why one is &quot;better&quot; than the other, it was focused on explaining some of the differences between ecosystems and communities</li>
<li>If you&#39;re one of the many people who watch our show just out of curiosity about the BSD world, this might be a good thread to read</li>
<li>Someone in the comments even gave bsdnow.tv a mention as a good resource to learn, thanks guy
***</li>
</ul>

<h3><a href="http://www.packetmischief.ca/openbsd-ipsec-tunnel-guide/" rel="nofollow">OpenBSD IPSEC tunnel guide</a></h3>

<ul>
<li>If you&#39;ve ever wanted to connect two networks with OpenBSD gateways, this is the article for you</li>
<li>It shows how to set up an IPSEC tunnel between destinations, how to lock it down and how to access all the machines on the other network just like they were on your LAN</li>
<li>The article also explains some of the basics of IPSEC if you&#39;re not familiar with all the terminology, so this isn&#39;t just for experts</li>
<li>Though the article itself is a few years old, it mostly still applies to the latest stuff today</li>
<li>All the tools used are in the OpenBSD base system, so that&#39;s pretty handy too
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/ipfw2/" rel="nofollow">DragonFly starts work on IPFW2</a></h3>

<ul>
<li>DragonFlyBSD, much like FreeBSD, comes with more than one firewall you can use</li>
<li>Now it looks like you&#39;re going to have yet another choice, as someone is working on a fork of IPFW (which is actually already in its second version, so it should be &quot;IPFW3&quot;)</li>
<li>Not a whole lot is known yet; it&#39;s still in heavy development, but there&#39;s a brief <a href="http://www.dragonflybsd.org/docs/ipfw2/#index6h1" rel="nofollow">roadmap</a> page with some planned additions</li>
<li>The guy who&#39;s working on this has already agreed to come on the show for an interview, but we&#39;re going to give him a chance to get some more work done first</li>
<li>Expect that sometime next year, once he&#39;s made some progress
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NYgVifXN" rel="nofollow">Michael writes in</a></li>
<li><a href="http://slexy.org/view/s21X02saI3" rel="nofollow">Samael writes in</a></li>
<li><a href="http://slexy.org/view/s21Dj7zImH" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s218lXg38C" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s20SEuKlaH" rel="nofollow">Michael writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>61: IPSECond Wind</title>
  <link>https://www.bsdnow.tv/61</link>
  <guid isPermaLink="false">a0bfab13-8167-4b68-b1de-74122013593a</guid>
  <pubDate>Wed, 29 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a0bfab13-8167-4b68-b1de-74122013593a.mp3" length="53960980" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSD panel at Phoenix LUG (https://www.youtube.com/watch?v=3AOF7fm-TJ0)
The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD
It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience
They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy
It was a good "real world" example of things potential switchers are curious to know about
They closed by concluding that more diversity is always better, and even if you've got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***
Book of PF signed copy auction (http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html)
Peter Hansteen (who we've had on the show (http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall)) is auctioning off the first signed copy of the new Book of PF
All the profits from the sale will go to the OpenBSD Foundation (http://www.openbsd.org/donations.html)
The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD's versions (which still use ALTQ, among other differences)
If you're interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause
Michael Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) has challenged Peter (https://www.marc.info/?l=openbsd-misc&amp;amp;m=141429413908567&amp;amp;w=2) to raise more for the foundation than his last book selling - let's see who wins
Pause the episode, go bid on it (http://www.ebay.com/itm/321563281902) and then come back!
***
FreeBSD Foundation goes to EuroBSDCon (http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html)
Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report
They also sponsored four other developers to go
The foundation was there "to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD"
They also have a second report (http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html) from Kamil Czekirda
A total of $2000 was raised at the conference
***
OpenBSD 5.6 released (http://www.openbsd.org/56.html)
Note: we're doing this story a couple days early - it's actually being released on November 1st (this Saturday), but we have next week off and didn't want to let this one slip through the cracks - it may be out by the time you're watching this
Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6
It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features
5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it
You can now hibernate your laptop when using a fully-encrypted filesystem (see our tutorial (http://www.bsdnow.tv/tutorials/fde) for that)
ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed
This will serve as a "transitional" release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to httpd (http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time) and from BIND to Unbound
Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions
As always, 5.6 comes with its own song and artwork (http://www.openbsd.org/lyrics.html#56) - the theme this time was obviously LibreSSL
Be sure to check the full changelog (http://www.openbsd.org/plus56.html) (it's huge) and pick up a CD or tshirt (http://www.openbsd.org/orders.html) to support their efforts
If you don't already have the public key releases are signed with, getting a physical CD is a good "out of bounds" way to obtain it safely
Here are some cool images of the set (https://imgur.com/a/5PtFe)
After you do your installation or upgrade (http://www.openbsd.org/faq/upgrade56.html), don't forget to head over to the errata page (http://www.openbsd.org/errata56.html) and apply any patches listed there
***
Interview - John-Mark Gurney - jmg@freebsd.org (mailto:jmg@freebsd.org) / @encthenet (https://twitter.com/encthenet)
Updating FreeBSD's IPSEC stack
News Roundup
Clang in DragonFly BSD (https://www.dragonflydigest.com/2014/10/22/14942.html)
As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64
Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly
We'd love to see more BSDs switch to Clang/LLVM eventually, it's a lot more modern than the old GCC most are using
***
reallocarray(): integer overflow detection for free (http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/)
One of the less obvious features in OpenBSD 5.6 is a new libc function: "reallocarray()"
It's a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost
Theo and a few other developers have already started (https://secure.freshbsd.org/search?project=openbsd&amp;amp;q=reallocarray) a mass audit of the entire source tree, replacing many instances with this new feature
OpenBSD's explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***
Switching from Linux blog (http://bothsidesofthence.tumblr.com/)
A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux
After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)
So far, he's put up a few posts about his initial thoughts, some documentation he's going through and his experiments so far
It'll be an ongoing series, so we may check back in with him again later on
***
Owncloud in a FreeNAS jail (https://www.youtube.com/watch?v=z6VQwOl4wE4)
One of the most common emails we get is about running Owncloud in FreeNAS
Now, finally, someone made a video on how to do just that, and it's even jailed
A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend
If you're looking for an easy way to back up and sync your files, this might be worth a watch
***
Feedback/Questions
Ernõ writes in (http://slexy.org/view/s2XEsQdggZ)
David writes in (http://slexy.org/view/s21EizH2aR)
Kamil writes in (http://slexy.org/view/s24SAJ5im6)
Torsten writes in (http://slexy.org/view/s20ABZe0RD)
Dominik writes in (http://slexy.org/view/s208jQs9c6)
***
Mailing List Gold
That's not our IP (https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html)
Is this thing on? (https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ipsec, aes, gcm, chacha20, encryption, netsec, ike, openiked, infosec, 5.6, openhttpd, opensmtpd, meetbsd, book of pf, libressl, freenas, owncloud</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>60: Don't Buy a Router</title>
  <link>https://www.bsdnow.tv/60</link>
  <guid isPermaLink="false">e61941d1-74ff-40d0-91f6-86ff864cf99b</guid>
  <pubDate>Wed, 22 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e61941d1-74ff-40d0-91f6-86ff864cf99b.mp3" length="49443412" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we're joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We'll be discussing what the BSD Router Project is, what it's for and where it's going. All this week's headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we're joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We'll be discussing what the BSD Router Project is, what it's for and where it's going. All this week's headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSD Devroom CFP (https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html)
This year's FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom
They've issued a call for papers on anything BSD-related, and we always love more presentations
If you're in the Belgium area or plan on going, submit a talk about something cool you're doing
There's also a mailing list (https://lists.fosdem.org/listinfo/bsd-devroom) and some more information in the original post
***
Bhyve SVM code merge (https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html)
The bhyve_svm code has been in the "projects" tree of FreeBSD, but is now ready (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=273375) for -CURRENT
This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only
All the supported operating systems and utilities should work on both now
One thing to note: bhyve doesn't support PCI passthrough on AMD just yet
There may still be some issues (https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html) though
***
NetBSD at Open Source Conference Tokyo (https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html)
The Japanese NetBSD users group held a booth at another recent open source conference
As always, they were running NetBSD on everything you can imagine
One of the users reports back to the mailing list on their experience, providing lots of pictures and links
Here's an interesting screenshot of NetBSD running various other BSDs in Xen (https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large)
***
More BSD switchers every day (https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/)
A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community
Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect
So far, he's found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion
There's also another semi-related thread (https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/) about another Linux user wanting to switch to BSD because of systemd and GNU people
There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read
Maybe the OPs should've just watched this show
***
Interview - Olivier Cochard-Labbé - olivier@cochard.me (mailto:olivier@cochard.me) / @ocochardlabbe (https://twitter.com/ocochardlabbe)
The BSD Router Project
News Roundup
FreeBSD -CURRENT on a T420 (https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420)
Thinkpads are quite popular with BSD developers and users
Most of the hardware seems to be supported across the BSDs (especially wifi)
This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI
If you've got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***
FreeNAS on a Supermicro 5018A-MHN4 (https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/)
More and more people are migrating their NAS devices to BSD-based solutions
In this post, the author goes through setting up FreeNAS on some of his new hardware
His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor
The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***
Hardening procfs and linprocfs (http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs)
There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux
There exists a native procfs in FreeBSD, which was the target point of that exploit, but it's not used very often
The Linux emulation layer also supports its own linprocfs, which was affected as well
The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs
If you want to learn more about ASLR and HardenedBSD, be sure to check out our interview with Shawn (http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover) too
***
pfSense monitoring with bandwidthd (http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/)
A lot of people run pfSense on their home network, and it's really useful to monitor the bandwidth usage
This article will walk you through setting up bandwidthd to do exactly that
bandwidthd monitors based on the IP address, rather than per-interface
It can also build some cool HTML graphs, and we love those pfSense graphs
Have a look at our bandwidth monitoring and testing (http://www.bsdnow.tv/tutorials/vnstat-iperf) tutorial for some more ideas
***
Feedback/Questions
Dave writes in (http://slexy.org/view/s2b5ZZ5qCv)
Chris writes in (http://slexy.org/view/s20aVvhv2d)
Zeke writes in (http://slexy.org/view/s2Vmwxy1QM)
Bostjan writes in (http://slexy.org/view/s2LB6MKoNT)
Patrick writes in (http://slexy.org/view/s2xxB9uOuV)
***
Mailing List Gold
More (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141357595922692&amp;amp;w=2) old bugs (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141358124924479&amp;amp;w=2)
The Right Font™ (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141332534304117&amp;amp;w=2) (see also (https://twitter.com/blakkheim/status/522162864409546753))
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bsdrp, bsd router project, freenas, nas4free, router, gateway, firewall, pfsense, nanobsd, hardenedbsd, bhyve, devroom, fosdem</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;re joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We&#39;ll be discussing what the BSD Router Project is, what it&#39;s for and where it&#39;s going. All this week&#39;s headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html" rel="nofollow">BSD Devroom CFP</a></h3>

<ul>
<li>This year&#39;s FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom</li>
<li>They&#39;ve issued a call for papers on anything BSD-related, and we always love more presentations</li>
<li>If you&#39;re in the Belgium area or plan on going, submit a talk about something cool you&#39;re doing</li>
<li>There&#39;s also <a href="https://lists.fosdem.org/listinfo/bsd-devroom" rel="nofollow">a mailing list</a> and some more information in the original post
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html" rel="nofollow">Bhyve SVM code merge</a></h3>

<ul>
<li>The bhyve_svm code has been in the &quot;projects&quot; tree of FreeBSD, but is <a href="https://svnweb.freebsd.org/base?view=revision&revision=273375" rel="nofollow">now ready</a> for -CURRENT</li>
<li>This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only</li>
<li>All the supported operating systems and utilities should work on both now</li>
<li>One thing to note: bhyve doesn&#39;t support PCI passthrough on AMD just yet</li>
<li>There may still be <a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html" rel="nofollow">some issues</a> though
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html" rel="nofollow">NetBSD at Open Source Conference Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group held a booth at another recent open source conference</li>
<li>As always, they were running NetBSD on everything you can imagine</li>
<li>One of the users reports back to the mailing list on their experience, providing lots of pictures and links</li>
<li>Here&#39;s an interesting <a href="https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large" rel="nofollow">screenshot of NetBSD running various other BSDs in Xen</a>
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/" rel="nofollow">More BSD switchers every day</a></h3>

<ul>
<li>A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community</li>
<li>Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect</li>
<li>So far, he&#39;s found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion</li>
<li>There&#39;s also <a href="https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/" rel="nofollow">another semi-related thread</a> about another Linux user wanting to switch to BSD because of systemd and GNU people</li>
<li>There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read</li>
<li>Maybe the OPs should&#39;ve just watched this show
***</li>
</ul>

<h2>Interview - Olivier Cochard-Labbé - <a href="mailto:olivier@cochard.me" rel="nofollow">olivier@cochard.me</a> / <a href="https://twitter.com/ocochardlabbe" rel="nofollow">@ocochardlabbe</a></h2>

<p>The BSD Router Project</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420" rel="nofollow">FreeBSD -CURRENT on a T420</a></h3>

<ul>
<li>Thinkpads are quite popular with BSD developers and users</li>
<li>Most of the hardware seems to be supported across the BSDs (especially wifi)</li>
<li>This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI</li>
<li>If you&#39;ve got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***</li>
</ul>

<h3><a href="https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/" rel="nofollow">FreeNAS on a Supermicro 5018A-MHN4</a></h3>

<ul>
<li>More and more people are migrating their NAS devices to BSD-based solutions</li>
<li>In this post, the author goes through setting up FreeNAS on some of his new hardware</li>
<li>His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor</li>
<li>The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs" rel="nofollow">Hardening procfs and linprocfs</a></h3>

<ul>
<li>There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux</li>
<li>There exists a native procfs in FreeBSD, which was the target point of that exploit, but it&#39;s not used very often</li>
<li>The Linux emulation layer also supports its own linprocfs, which was affected as well</li>
<li>The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs</li>
<li>If you want to learn more about ASLR and HardenedBSD, be sure to check out <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">our interview with Shawn</a> too
***</li>
</ul>

<h3><a href="http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/" rel="nofollow">pfSense monitoring with bandwidthd</a></h3>

<ul>
<li>A lot of people run pfSense on their home network, and it&#39;s really useful to monitor the bandwidth usage</li>
<li>This article will walk you through setting up bandwidthd to do exactly that</li>
<li>bandwidthd monitors based on the IP address, rather than per-interface</li>
<li>It can also build some cool HTML graphs, and we love those pfSense graphs</li>
<li>Have a look at our <a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">bandwidth monitoring and testing</a> tutorial for some more ideas
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b5ZZ5qCv" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s20aVvhv2d" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2Vmwxy1QM" rel="nofollow">Zeke writes in</a></li>
<li><a href="http://slexy.org/view/s2LB6MKoNT" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2xxB9uOuV" rel="nofollow">Patrick writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141357595922692&w=2" rel="nofollow">More</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=141358124924479&w=2" rel="nofollow">old bugs</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141332534304117&w=2" rel="nofollow">The Right Font™</a> (<a href="https://twitter.com/blakkheim/status/522162864409546753" rel="nofollow">see also</a>)
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;re joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We&#39;ll be discussing what the BSD Router Project is, what it&#39;s for and where it&#39;s going. All this week&#39;s headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html" rel="nofollow">BSD Devroom CFP</a></h3>

<ul>
<li>This year&#39;s FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom</li>
<li>They&#39;ve issued a call for papers on anything BSD-related, and we always love more presentations</li>
<li>If you&#39;re in the Belgium area or plan on going, submit a talk about something cool you&#39;re doing</li>
<li>There&#39;s also <a href="https://lists.fosdem.org/listinfo/bsd-devroom" rel="nofollow">a mailing list</a> and some more information in the original post
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html" rel="nofollow">Bhyve SVM code merge</a></h3>

<ul>
<li>The bhyve_svm code has been in the &quot;projects&quot; tree of FreeBSD, but is <a href="https://svnweb.freebsd.org/base?view=revision&revision=273375" rel="nofollow">now ready</a> for -CURRENT</li>
<li>This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only</li>
<li>All the supported operating systems and utilities should work on both now</li>
<li>One thing to note: bhyve doesn&#39;t support PCI passthrough on AMD just yet</li>
<li>There may still be <a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html" rel="nofollow">some issues</a> though
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html" rel="nofollow">NetBSD at Open Source Conference Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group held a booth at another recent open source conference</li>
<li>As always, they were running NetBSD on everything you can imagine</li>
<li>One of the users reports back to the mailing list on their experience, providing lots of pictures and links</li>
<li>Here&#39;s an interesting <a href="https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large" rel="nofollow">screenshot of NetBSD running various other BSDs in Xen</a>
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/" rel="nofollow">More BSD switchers every day</a></h3>

<ul>
<li>A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community</li>
<li>Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect</li>
<li>So far, he&#39;s found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion</li>
<li>There&#39;s also <a href="https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/" rel="nofollow">another semi-related thread</a> about another Linux user wanting to switch to BSD because of systemd and GNU people</li>
<li>There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read</li>
<li>Maybe the OPs should&#39;ve just watched this show
***</li>
</ul>

<h2>Interview - Olivier Cochard-Labbé - <a href="mailto:olivier@cochard.me" rel="nofollow">olivier@cochard.me</a> / <a href="https://twitter.com/ocochardlabbe" rel="nofollow">@ocochardlabbe</a></h2>

<p>The BSD Router Project</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420" rel="nofollow">FreeBSD -CURRENT on a T420</a></h3>

<ul>
<li>Thinkpads are quite popular with BSD developers and users</li>
<li>Most of the hardware seems to be supported across the BSDs (especially wifi)</li>
<li>This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI</li>
<li>If you&#39;ve got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***</li>
</ul>

<h3><a href="https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/" rel="nofollow">FreeNAS on a Supermicro 5018A-MHN4</a></h3>

<ul>
<li>More and more people are migrating their NAS devices to BSD-based solutions</li>
<li>In this post, the author goes through setting up FreeNAS on some of his new hardware</li>
<li>His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor</li>
<li>The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs" rel="nofollow">Hardening procfs and linprocfs</a></h3>

<ul>
<li>There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux</li>
<li>There exists a native procfs in FreeBSD, which was the target point of that exploit, but it&#39;s not used very often</li>
<li>The Linux emulation layer also supports its own linprocfs, which was affected as well</li>
<li>The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs</li>
<li>If you want to learn more about ASLR and HardenedBSD, be sure to check out <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">our interview with Shawn</a> too
***</li>
</ul>

<h3><a href="http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/" rel="nofollow">pfSense monitoring with bandwidthd</a></h3>

<ul>
<li>A lot of people run pfSense on their home network, and it&#39;s really useful to monitor the bandwidth usage</li>
<li>This article will walk you through setting up bandwidthd to do exactly that</li>
<li>bandwidthd monitors based on the IP address, rather than per-interface</li>
<li>It can also build some cool HTML graphs, and we love those pfSense graphs</li>
<li>Have a look at our <a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">bandwidth monitoring and testing</a> tutorial for some more ideas
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b5ZZ5qCv" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s20aVvhv2d" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2Vmwxy1QM" rel="nofollow">Zeke writes in</a></li>
<li><a href="http://slexy.org/view/s2LB6MKoNT" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2xxB9uOuV" rel="nofollow">Patrick writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141357595922692&w=2" rel="nofollow">More</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=141358124924479&w=2" rel="nofollow">old bugs</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141332534304117&w=2" rel="nofollow">The Right Font™</a> (<a href="https://twitter.com/blakkheim/status/522162864409546753" rel="nofollow">see also</a>)
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>59: BSDって聞いたことある？</title>
  <link>https://www.bsdnow.tv/59</link>
  <guid isPermaLink="false">b1712d17-1c5f-4c0a-8722-3ad171336d67</guid>
  <pubDate>Wed, 15 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b1712d17-1c5f-4c0a-8722-3ad171336d67.mp3" length="57694324" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we'll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSD talks at XDC 2014 (https://www.youtube.com/channel/UCXlH5v1PkEhjzLFTUTm_U7g/videos)
This year's Xorg conference featured a few BSD-related talks
Matthieu Herrb, Status of the OpenBSD graphics stack (https://www.youtube.com/watch?v=KopgD4nTtnA)
Matthieu's talk details what's been done recently in Xenocara the OpenBSD kernel for graphics (slides here (http://www.openbsd.org/papers/xdc2014-xenocara.pdf))
Jean-Sébastien Pédron, The status of the graphics stack on FreeBSD (https://www.youtube.com/watch?v=POmxFleN3Bc) 
His presentation gives a history of major changes and outlines the current overall status of graphics in FreeBSD (slides here (http://www.x.org/wiki/Events/XDC2014/XDC2014PedronFreeBSD/XDC-2014_FreeBSD.pdf))
Francois Tigeot, Porting DRM/KMS drivers to DragonFlyBSD (https://www.youtube.com/watch?v=NdM7_yPGFDk)
Francois' talk tells the story of how he ported some of the DRM and KMS kernel drivers to DragonFly (slides here (http://www.x.org/wiki/Events/XDC2014/XDC2014TigeotDragonFlyBSD/XDC-2014_Porting_kms_drivers_to_DragonFly.pdf))
***
FreeBSD Quarterly Status Report (https://www.freebsd.org/news/status/report-2014-07-2014-09.html)
The FreeBSD project has a report of their activities between July and September of this year
Lots of ARM work has been done, and a goal for 11.0 is tier one support for the platform
The release includes reports from the cluster admin team, release team, ports team, core team and much more, but we've already covered most of the items on the show
If you're interested in seeing what the FreeBSD community has been up to lately, check the full report - it's huge
***
Monitoring pfSense logs using ELK (http://elijahpaul.co.uk/monitoring-pfsense-2-1-logs-using-elk-logstash-kibana-elasticsearch/)
If you're one of those people who loves the cool graphs and charts that pfSense can produce, this is the post for you
ELK (ElasticSearch, Logstash, Kibana) is a group of tools that let you collect, store, search and (most importantly) visualize logs
It works with lots of different things that output logs and can be sent to one central server for displaying
This post shows you how to set up pfSense to do remote logging to ELK and get some pretty awesome graphs
***
Some updates to IPFW (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=272840)
Even though PF gets a lot of attention, a lot of FreeBSD people still love IPFW
While mostly a dormant section of the source tree, some updates were recently committed to -CURRENT
The commit lists the user-visible changes, performance changes, ABI changes and internal changes
It should be merged back to -STABLE after a month or so of testing, and will probably end up in 10.2-RELEASE
Also check this blog post (http://blog.cochard.me/2014/10/ipfw-improvement-on-freebsd-current.html) for some more information and fancy graphs
***
Interview - Hiroki Sato (佐藤広生) - hrs@freebsd.org (mailto:hrs@freebsd.org) / @hiroki_sato (https://twitter.com/hiroki_sato)
BSD in Japan, technology conferences, various topics
News Roundup
pfSense on Hyper-V (https://virtual-ops.de/?p=600)
In case you didn't know, the latest pfSense snapshots support running on Hyper-V
Unfortunately, the current stable release is based on an old, unsupported FreeBSD 8.x base, so you have to use the snapshots for now
The author of the post tells about his experience running pfSense and gives lots of links to read if you're interested in doing the same
He also praises pfSense above other Linux-based solutions for its IPv6 support and high quality code
***
OpenBSD as a daily driver (https://www.reddit.com/r/openbsd/comments/2isz24/openbsd_as_a_daily_driver/)
A curious Reddit user posts to ask the community about using OpenBSD as an everyday desktop OS
The overall consensus is that it works great for that, stays out of your way and is quite reliable
Caveats would include there being no Adobe Flash support (though others consider this a blessing..) and it requiring a more hands-on approach to updating
If you're considering running OpenBSD as a "daily driver," check all the comments for more information and tips
***
Getting PF log statistics (https://secure.ciscodude.net/2014/10/09/firewall-log-stats/)
The author of this post runs an OpenBSD box in front of all his VMs at his colocation, and details his experiences with firewall logs
He usually investigates any IPs of interest with whois, nslookup, etc. - but this gets repetitive quickly, so..
He sets out to find the best way to gather firewall log statistics
After coming across a perl script (http://www.pantz.org/software/pf/pantzpfblockstats.html) to do this, he edited it a bit and is now a happy, lazy admin once again
You can try out his updated PF script here (https://github.com/tbaschak/Pantz-PFlog-Stats)
***
FlashRD 1.7 released (http://www.nmedia.net/flashrd/)
In case anyone's not familiar, flashrd is a tool to create OpenBSD images for embedded hardware devices, executing from a virtualized environment
This new version is based on (the currently unreleased) OpenBSD 5.6, and automatically adapts to the number of CPUs you have for building
It also includes fixes for 4k drives and lots of various other improvements
If you're interested in learning more, take a look at some of the slides and audio from the main developer on the website
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s20XvSa4h0)
Don writes in (http://slexy.org/view/s20lGUXW3d)
Andriy writes in (http://slexy.org/view/s2al5DFIO7)
Richard writes in (http://slexy.org/view/s203QoFuWs)
Robert writes in (http://slexy.org/view/s29WIplL6k)
***
Mailing List Gold
Subtle trolling (https://marc.info/?l=openbsd-cvs&amp;amp;m=141271076115386&amp;amp;w=2)
Old bugs with old fixes (https://marc.info/?l=openbsd-cvs&amp;amp;m=141275713329601&amp;amp;w=2)
A pig reinstall (https://lists.freebsd.org/pipermail/freebsd-ports/2014-October/095906.html)
Strange DOS-like environment (https://lists.freebsd.org/pipermail/freebsd-doc/2014-October/024408.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, japan, japanese, 日本語, conference, hiroki sato, daichi goto, 後藤大地, 佐藤広生, allbsd, eurobsdcon, asiabsdcon, flashrd, freenas, pfsense, xdc2014</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCXlH5v1PkEhjzLFTUTm_U7g/videos" rel="nofollow">BSD talks at XDC 2014</a></h3>

<ul>
<li>This year&#39;s Xorg conference featured a few BSD-related talks</li>
<li>Matthieu Herrb, <a href="https://www.youtube.com/watch?v=KopgD4nTtnA" rel="nofollow">Status of the OpenBSD graphics stack</a></li>
<li>Matthieu&#39;s talk details what&#39;s been done recently in Xenocara the OpenBSD kernel for graphics (<a href="http://www.openbsd.org/papers/xdc2014-xenocara.pdf" rel="nofollow">slides here</a>)</li>
<li>Jean-Sébastien Pédron, <a href="https://www.youtube.com/watch?v=POmxFleN3Bc" rel="nofollow">The status of the graphics stack on FreeBSD</a> </li>
<li>His presentation gives a history of major changes and outlines the current overall status of graphics in FreeBSD (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014PedronFreeBSD/XDC-2014_FreeBSD.pdf" rel="nofollow">slides here</a>)</li>
<li>Francois Tigeot, <a href="https://www.youtube.com/watch?v=NdM7_yPGFDk" rel="nofollow">Porting DRM/KMS drivers to DragonFlyBSD</a></li>
<li>Francois&#39; talk tells the story of how he ported some of the DRM and KMS kernel drivers to DragonFly (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014TigeotDragonFlyBSD/XDC-2014_Porting_kms_drivers_to_DragonFly.pdf" rel="nofollow">slides here</a>)
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-07-2014-09.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The FreeBSD project has a report of their activities between July and September of this year</li>
<li>Lots of ARM work has been done, and a goal for 11.0 is tier one support for the platform</li>
<li>The release includes reports from the cluster admin team, release team, ports team, core team and much more, but we&#39;ve already covered most of the items on the show</li>
<li>If you&#39;re interested in seeing what the FreeBSD community has been up to lately, check the full report - it&#39;s huge
***</li>
</ul>

<h3><a href="http://elijahpaul.co.uk/monitoring-pfsense-2-1-logs-using-elk-logstash-kibana-elasticsearch/" rel="nofollow">Monitoring pfSense logs using ELK</a></h3>

<ul>
<li>If you&#39;re one of those people who loves the cool graphs and charts that pfSense can produce, this is the post for you</li>
<li>ELK (ElasticSearch, Logstash, Kibana) is a group of tools that let you collect, store, search and (most importantly) visualize logs</li>
<li>It works with lots of different things that output logs and can be sent to one central server for displaying</li>
<li>This post shows you how to set up pfSense to do remote logging to ELK and get some pretty awesome graphs
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=272840" rel="nofollow">Some updates to IPFW</a></h3>

<ul>
<li>Even though PF gets a lot of attention, a lot of FreeBSD people still love IPFW</li>
<li>While mostly a dormant section of the source tree, some updates were recently committed to -CURRENT</li>
<li>The commit lists the user-visible changes, performance changes, ABI changes and internal changes</li>
<li>It should be merged back to -STABLE after a month or so of testing, and will probably end up in 10.2-RELEASE</li>
<li>Also check <a href="http://blog.cochard.me/2014/10/ipfw-improvement-on-freebsd-current.html" rel="nofollow">this blog post</a> for some more information and fancy graphs
***</li>
</ul>

<h2>Interview - Hiroki Sato (佐藤広生) - <a href="mailto:hrs@freebsd.org" rel="nofollow">hrs@freebsd.org</a> / <a href="https://twitter.com/hiroki_sato" rel="nofollow">@hiroki_sato</a></h2>

<p>BSD in Japan, technology conferences, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://virtual-ops.de/?p=600" rel="nofollow">pfSense on Hyper-V</a></h3>

<ul>
<li>In case you didn&#39;t know, the latest pfSense snapshots support running on Hyper-V</li>
<li>Unfortunately, the current stable release is based on an old, unsupported FreeBSD 8.x base, so you have to use the snapshots for now</li>
<li>The author of the post tells about his experience running pfSense and gives lots of links to read if you&#39;re interested in doing the same</li>
<li>He also praises pfSense above other Linux-based solutions for its IPv6 support and high quality code
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/openbsd/comments/2isz24/openbsd_as_a_daily_driver/" rel="nofollow">OpenBSD as a daily driver</a></h3>

<ul>
<li>A curious Reddit user posts to ask the community about using OpenBSD as an everyday desktop OS</li>
<li>The overall consensus is that it works great for that, stays out of your way and is quite reliable</li>
<li>Caveats would include there being no Adobe Flash support (though others consider this a blessing..) and it requiring a more hands-on approach to updating</li>
<li>If you&#39;re considering running OpenBSD as a &quot;daily driver,&quot; check all the comments for more information and tips
***</li>
</ul>

<h3><a href="https://secure.ciscodude.net/2014/10/09/firewall-log-stats/" rel="nofollow">Getting PF log statistics</a></h3>

<ul>
<li>The author of this post runs an OpenBSD box in front of all his VMs at his colocation, and details his experiences with firewall logs</li>
<li>He usually investigates any IPs of interest with whois, nslookup, etc. - but this gets repetitive quickly, so..</li>
<li>He sets out to find the best way to gather firewall log statistics</li>
<li>After coming across <a href="http://www.pantz.org/software/pf/pantzpfblockstats.html" rel="nofollow">a perl script</a> to do this, he edited it a bit and is now a happy, lazy admin once again</li>
<li>You can try out his updated PF script <a href="https://github.com/tbaschak/Pantz-PFlog-Stats" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.nmedia.net/flashrd/" rel="nofollow">FlashRD 1.7 released</a></h3>

<ul>
<li>In case anyone&#39;s not familiar, flashrd is a tool to create OpenBSD images for embedded hardware devices, executing from a virtualized environment</li>
<li>This new version is based on (the currently unreleased) OpenBSD 5.6, and automatically adapts to the number of CPUs you have for building</li>
<li>It also includes fixes for 4k drives and lots of various other improvements</li>
<li>If you&#39;re interested in learning more, take a look at some of the slides and audio from the main developer on the website
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20XvSa4h0" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s20lGUXW3d" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s2al5DFIO7" rel="nofollow">Andriy writes in</a></li>
<li><a href="http://slexy.org/view/s203QoFuWs" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s29WIplL6k" rel="nofollow">Robert writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141271076115386&w=2" rel="nofollow">Subtle trolling</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141275713329601&w=2" rel="nofollow">Old bugs with old fixes</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-October/095906.html" rel="nofollow">A pig reinstall</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2014-October/024408.html" rel="nofollow">Strange DOS-like environment</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCXlH5v1PkEhjzLFTUTm_U7g/videos" rel="nofollow">BSD talks at XDC 2014</a></h3>

<ul>
<li>This year&#39;s Xorg conference featured a few BSD-related talks</li>
<li>Matthieu Herrb, <a href="https://www.youtube.com/watch?v=KopgD4nTtnA" rel="nofollow">Status of the OpenBSD graphics stack</a></li>
<li>Matthieu&#39;s talk details what&#39;s been done recently in Xenocara the OpenBSD kernel for graphics (<a href="http://www.openbsd.org/papers/xdc2014-xenocara.pdf" rel="nofollow">slides here</a>)</li>
<li>Jean-Sébastien Pédron, <a href="https://www.youtube.com/watch?v=POmxFleN3Bc" rel="nofollow">The status of the graphics stack on FreeBSD</a> </li>
<li>His presentation gives a history of major changes and outlines the current overall status of graphics in FreeBSD (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014PedronFreeBSD/XDC-2014_FreeBSD.pdf" rel="nofollow">slides here</a>)</li>
<li>Francois Tigeot, <a href="https://www.youtube.com/watch?v=NdM7_yPGFDk" rel="nofollow">Porting DRM/KMS drivers to DragonFlyBSD</a></li>
<li>Francois&#39; talk tells the story of how he ported some of the DRM and KMS kernel drivers to DragonFly (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014TigeotDragonFlyBSD/XDC-2014_Porting_kms_drivers_to_DragonFly.pdf" rel="nofollow">slides here</a>)
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-07-2014-09.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The FreeBSD project has a report of their activities between July and September of this year</li>
<li>Lots of ARM work has been done, and a goal for 11.0 is tier one support for the platform</li>
<li>The release includes reports from the cluster admin team, release team, ports team, core team and much more, but we&#39;ve already covered most of the items on the show</li>
<li>If you&#39;re interested in seeing what the FreeBSD community has been up to lately, check the full report - it&#39;s huge
***</li>
</ul>

<h3><a href="http://elijahpaul.co.uk/monitoring-pfsense-2-1-logs-using-elk-logstash-kibana-elasticsearch/" rel="nofollow">Monitoring pfSense logs using ELK</a></h3>

<ul>
<li>If you&#39;re one of those people who loves the cool graphs and charts that pfSense can produce, this is the post for you</li>
<li>ELK (ElasticSearch, Logstash, Kibana) is a group of tools that let you collect, store, search and (most importantly) visualize logs</li>
<li>It works with lots of different things that output logs and can be sent to one central server for displaying</li>
<li>This post shows you how to set up pfSense to do remote logging to ELK and get some pretty awesome graphs
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=272840" rel="nofollow">Some updates to IPFW</a></h3>

<ul>
<li>Even though PF gets a lot of attention, a lot of FreeBSD people still love IPFW</li>
<li>While mostly a dormant section of the source tree, some updates were recently committed to -CURRENT</li>
<li>The commit lists the user-visible changes, performance changes, ABI changes and internal changes</li>
<li>It should be merged back to -STABLE after a month or so of testing, and will probably end up in 10.2-RELEASE</li>
<li>Also check <a href="http://blog.cochard.me/2014/10/ipfw-improvement-on-freebsd-current.html" rel="nofollow">this blog post</a> for some more information and fancy graphs
***</li>
</ul>

<h2>Interview - Hiroki Sato (佐藤広生) - <a href="mailto:hrs@freebsd.org" rel="nofollow">hrs@freebsd.org</a> / <a href="https://twitter.com/hiroki_sato" rel="nofollow">@hiroki_sato</a></h2>

<p>BSD in Japan, technology conferences, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://virtual-ops.de/?p=600" rel="nofollow">pfSense on Hyper-V</a></h3>

<ul>
<li>In case you didn&#39;t know, the latest pfSense snapshots support running on Hyper-V</li>
<li>Unfortunately, the current stable release is based on an old, unsupported FreeBSD 8.x base, so you have to use the snapshots for now</li>
<li>The author of the post tells about his experience running pfSense and gives lots of links to read if you&#39;re interested in doing the same</li>
<li>He also praises pfSense above other Linux-based solutions for its IPv6 support and high quality code
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/openbsd/comments/2isz24/openbsd_as_a_daily_driver/" rel="nofollow">OpenBSD as a daily driver</a></h3>

<ul>
<li>A curious Reddit user posts to ask the community about using OpenBSD as an everyday desktop OS</li>
<li>The overall consensus is that it works great for that, stays out of your way and is quite reliable</li>
<li>Caveats would include there being no Adobe Flash support (though others consider this a blessing..) and it requiring a more hands-on approach to updating</li>
<li>If you&#39;re considering running OpenBSD as a &quot;daily driver,&quot; check all the comments for more information and tips
***</li>
</ul>

<h3><a href="https://secure.ciscodude.net/2014/10/09/firewall-log-stats/" rel="nofollow">Getting PF log statistics</a></h3>

<ul>
<li>The author of this post runs an OpenBSD box in front of all his VMs at his colocation, and details his experiences with firewall logs</li>
<li>He usually investigates any IPs of interest with whois, nslookup, etc. - but this gets repetitive quickly, so..</li>
<li>He sets out to find the best way to gather firewall log statistics</li>
<li>After coming across <a href="http://www.pantz.org/software/pf/pantzpfblockstats.html" rel="nofollow">a perl script</a> to do this, he edited it a bit and is now a happy, lazy admin once again</li>
<li>You can try out his updated PF script <a href="https://github.com/tbaschak/Pantz-PFlog-Stats" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.nmedia.net/flashrd/" rel="nofollow">FlashRD 1.7 released</a></h3>

<ul>
<li>In case anyone&#39;s not familiar, flashrd is a tool to create OpenBSD images for embedded hardware devices, executing from a virtualized environment</li>
<li>This new version is based on (the currently unreleased) OpenBSD 5.6, and automatically adapts to the number of CPUs you have for building</li>
<li>It also includes fixes for 4k drives and lots of various other improvements</li>
<li>If you&#39;re interested in learning more, take a look at some of the slides and audio from the main developer on the website
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20XvSa4h0" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s20lGUXW3d" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s2al5DFIO7" rel="nofollow">Andriy writes in</a></li>
<li><a href="http://slexy.org/view/s203QoFuWs" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s29WIplL6k" rel="nofollow">Robert writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141271076115386&w=2" rel="nofollow">Subtle trolling</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141275713329601&w=2" rel="nofollow">Old bugs with old fixes</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-October/095906.html" rel="nofollow">A pig reinstall</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2014-October/024408.html" rel="nofollow">Strange DOS-like environment</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>50: VPN, My Dear Watson</title>
  <link>https://www.bsdnow.tv/50</link>
  <guid isPermaLink="false">b0306dc5-ee87-4a03-aeea-9a89b915ff5e</guid>
  <pubDate>Wed, 13 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b0306dc5-ee87-4a03-aeea-9a89b915ff5e.mp3" length="62998996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
MeetBSD 2014 is approaching (http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/)
The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California
MeetBSD has an "unconference" format, which means there will be both planned talks and community events
All the extra details will be on their site (https://www.meetbsd.com/) soon
It also has hotels and various other bits of useful information - hopefully with more info on the talks to come
Of course, EuroBSDCon is coming up before then
***
First experiences with OpenBSD (https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html)
A new blog post that leads off with "tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven't tried before"
The author read the famous "BSD for Linux users (http://www.over-yonder.net/~fullermd/rants/bsd4linux/01)" series (that most of us have surely seen) and decided to give BSD a try
He details his different OS and distro history, concluding with how he "eventually became annoyed at the poor quality of Linux userland software"
From there, it talks about how he used the OpenBSD USB image and got a fully-working system
He especially liked the simplicity of OpenBSD's "hostname.if" system for network configuration
Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***
NetBSD rump kernels on bare metal (and Kansai OSC report) (https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from)
When you're developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right
However, NetBSD's rump kernels - a very unique concept - make this process a lot easier
This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week
Also have a look back at episode 8 (http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction) for our interview about rump kernels and what exactly they do
While on the topic of NetBSD, there were also a couple of very detailed reports (http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html) (with lots of pictures!) of the various NetBSD-themed booths at the 2014 Kansai Open Source Conference (http://d.hatena.ne.jp/mizuno-as/20140806/1407307913) that we wanted to highlight
***
OpenSSL and LibreSSL updates (https://www.openssl.org/news/secadv_20140806.txt)
OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)
Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more
LibreSSL released a new version (http://marc.info/?l=openbsd-tech&amp;amp;m=140752295222929&amp;amp;w=2) to address most of the vulnerabilities, but wasn't affected by some of them
Whichever version of whatever SSL you use, make sure it's patched for these issues
DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***
Interview - Robert Watson - rwatson@freebsd.org (mailto:rwatson@freebsd.org)
FreeBSD architecture, security research techniques, exploit mitigation
Tutorial
Protecting traffic with a BSD-based VPN (http://www.bsdnow.tv/tutorials/openvpn)
News Roundup
A FreeBSD-based CGit server (https://lechindianer.de/blog/2014/08/06/freebsd-cgit/)
If you use git (like a certain host of this show) then you've probably considered setting up your own server
This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend
It even shows you how to set up multiple repos with key-based user separation and other cool things
The author of the post is also a listener of the show, thanks for sending it in!
***
Backup devices for small businesses (http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html)
In this article, different methods of data storage and backup are compared
After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer
He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers
It also goes over some of the hardware specifics in the FreeNAS Mini
***
A new Xenocara interview (http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html)
As a follow up to last week's OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara
If you're not familiar with Xenocara, it's OpenBSD's version of Xorg with some custom patches
In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing
Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it's natural for him to do a lot of the maintainership work there
***
Building a high performance FreeBSD samba server (https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/)
If you've got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what's the best solution?
FreeBSD, ZFS and Samba obviously!
The master image and related files clock in at over 20GB, and will be accessed at the same time by all of those clients
This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)
It doesn't even require the newest or best hardware with the right changes, pretty cool
***
Feedback/Questions
An interesting Reddit thread (http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/) (or two (http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch))
PB writes in (http://slexy.org/view/s21t7L5bqO)
Sean writes in (http://slexy.org/view/s20MFywDqZ)
Steve writes in (http://slexy.org/view/s2Td6nq11J)
Lachlan writes in (http://slexy.org/view/s215MlpJYV)
Justin writes in (http://slexy.org/view/s2N4JKkoKt)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, vpn, vps, openvpn, tunnel, ssh, security, exploit mitigation, zfs, lzo, tls, xenocara, x11, xorg, freenas, freenas mini, ixsystems, network attached storage, nas, meetbsd, rump kernels, libressl, openssl, kansai</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>46: Network Iodometry</title>
  <link>https://www.bsdnow.tv/46</link>
  <guid isPermaLink="false">e23303c8-31f0-4706-817c-1618e08cd149</guid>
  <pubDate>Wed, 16 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e23303c8-31f0-4706-817c-1618e08cd149.mp3" length="76226260" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
EuroBSDCon 2014 registration open (http://2014.eurobsdcon.org/registration/)
September is getting closer, and that means it's time for EuroBSDCon - held in Bulgaria this year
Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th
Tutorials, sessions, dev summits and everything else all have their own pricing as well
Registering between August 18th - September 12th will cost more for everything
You can register online here (http://registration.eurobsdcon.org/) and check hotels in the area (http://2014.eurobsdcon.org/registration/travel-and-stay/hotels)
The FreeBSD foundation is also accepting applications (https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html) for travel grants
***
OpenBSD SMP PF update (http://marc.info/?t=140440541000002&amp;amp;r=1&amp;amp;w=2)
A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded
With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump
In a recent mailing list thread, Henning Brauer (http://www.bsdnow.tv/episodes/2013_10_30-current_events) addresses some of the concerns
The short version (http://marc.info/?l=openbsd-misc&amp;amp;m=140479174521071&amp;amp;w=2) is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless
He also says (http://marc.info/?l=openbsd-misc&amp;amp;m=140481012425889&amp;amp;w=2) PF on OpenBSD is over four times faster than FreeBSD's old version, presumably due to those extra years of development it's gone through
There's also been even more recent concern (https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html) about the uncertain future of FreeBSD's PF, being mostly unmaintained since their SMP patches
We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***
Introduction to NetBSD pkgsrc (http://saveosx.org/pkgsrc-intro/)
An article from one of our listeners about how to create a new pkgsrc port or fix one that you need
The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format
It also lists all the different bmake targets and their functions in relation to the porting process
Finally, the post details the whole process of creating a new port
***
FreeBSD 9.3-RELEASE (https://www.freebsd.org/releases/9.3R/relnotes.html)
After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced today (https://www.freebsd.org/releases/9.3R/schedule.html) but actually came out yesterday
The full list of changes (https://www.freebsd.org/releases/9.3R/relnotes.html) is available, but it's mostly a smaller maintenance release
Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more
If you haven't jumped to the 10.x branch yet (and there are a lot of people who haven't!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon
Good news, this will be the first release (https://twitter.com/evilgjb/status/485909719522222080) with PGP-signed checksums on the FTP mirrors - a very welcome change
With that out of the way, the 10.1-RELEASE schedule was posted (https://www.freebsd.org/releases/10.1R/schedule.html)
***
Interview - Bryan Drewery - bdrewery@freebsd.org (mailto:bdrewery@freebsd.org) / @bdrewery (https://twitter.com/bdrewery)
The FreeBSD package building cluster, pkgng, ports, various topics
Tutorial
Tunneling traffic through DNS (http://www.bsdnow.tv/tutorials/ssh-dns)
News Roundup
SSH two-factor authentication on FreeBSD (http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/)
We've previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website
This blog post tells you how to do exactly that, but with your Google account and the pamgoogleauthenticator port
Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally
It's a really, really simple process once you have the port installed - full details on the page
***
Ditch tape backup in favor of FreeNAS (http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/)
The author of this post shares some of his horrible experiences with tape backups for a client
Having constant, daily errors and failed backups, he needed to find another solution
With 1TB of backups, tapes just weren't a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)
The rest of the article details his experiences with it and tells about his setup
***
NetBSD vs FreeBSD, desktop experiences (http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/)
A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job
Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver
"Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga."
He's become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***
PCBSD not-so-weekly digest (http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/)
Speaking of choices for a desktop system, it's the return of the PCBSD digest!
Warden and PBI_add have gotten some interesting new features
You can now create jails "on the fly" when adding a new PBI to your application library
Bulk jail creation is also possible now, and it's really easy
New Jenkins integration, with public access to poudriere logs as well (http://builds.pcbsd.org)
PkgNG 1.3.0.rc2 testing for EDGE users
***
Feedback/Questions
Jeff writes in (http://slexy.org/view/s21D05MP0t) - Sending Encrypted Backups over SSH (http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh) + Sending ZFS snapshots via user (http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System)
Bruce writes in (http://slexy.org/view/s2lzo1swzo)
Richard writes in (http://slexy.org/view/s20z841ean)
Jeff writes in (http://slexy.org/view/s2QYc8BOAo) - NYCBUG dmesg list (http://www.nycbug.org/index.cgi?action=dmesgd)
Steve writes in (http://slexy.org/view/s2V2e1m7S7)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pc-bsd, tutorial, howto, guide, bsd, interview, iodine, dns, tunnel, ssh, encryption, vpn, ids, bypass, detection, portmgr, pkgng, bypassing, firewall, pkgsrccon, pkgsrc, pf, smp, eurobsdcon, 2014, multithreaded, presentations, talks, two factor authentication, freenas, 9.3</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>45: ZFS War Stories</title>
  <link>https://www.bsdnow.tv/45</link>
  <guid isPermaLink="false">d53fb6f3-26c8-4311-86c5-a2034403b866</guid>
  <pubDate>Wed, 09 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d53fb6f3-26c8-4311-86c5-a2034403b866.mp3" length="33459412" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week Allan is at BSDCam in the UK, so we'll be back with a regular episode next week. For now though, here's an interview with Josh Paetzel about some crazy experiences he's had with ZFS.</itunes:subtitle>
  <itunes:duration>46:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week Allan is at BSDCam in the UK, so we'll be back with a regular episode next week. For now though, here's an interview with Josh Paetzel about some crazy experiences he's had with ZFS.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Interview - Josh Paetzel - josh@ixsystems.com (mailto:josh@ixsystems.com) / @bsdunix4ever (https://twitter.com/bsdunix4ever)
Crazy ZFS stories, network protocols, server hardware 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, zpool, raid, raid-z, openzfs, open-zfs, array, hardware, iscsi, freenas, ixsystems, high availability, bsdcam</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week Allan is at BSDCam in the UK, so we&#39;ll be back with a regular episode next week. For now though, here&#39;s an interview with Josh Paetzel about some crazy experiences he&#39;s had with ZFS.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Josh Paetzel - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/bsdunix4ever" rel="nofollow">@bsdunix4ever</a></h2>

<p>Crazy ZFS stories, network protocols, server hardware </p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week Allan is at BSDCam in the UK, so we&#39;ll be back with a regular episode next week. For now though, here&#39;s an interview with Josh Paetzel about some crazy experiences he&#39;s had with ZFS.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Josh Paetzel - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/bsdunix4ever" rel="nofollow">@bsdunix4ever</a></h2>

<p>Crazy ZFS stories, network protocols, server hardware </p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>44: Base ISO 100</title>
  <link>https://www.bsdnow.tv/44</link>
  <guid isPermaLink="false">cbf5ab1d-2355-4c2c-ade8-0e66250b204e</guid>
  <pubDate>Wed, 02 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf5ab1d-2355-4c2c-ade8-0e66250b204e.mp3" length="75659476" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
pfSense 2.1.4 released (https://blog.pfsense.org/?p=1377)
The pfSense team (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) has released 2.1.4, shortly after 2.1.3 - it's mainly a security release
Included within are eight security fixes, most of which are pfSense-specific
OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)
It also includes a large number of various other bug fixes
Update all your routers!
***
DragonflyBSD's pf gets SMP (http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html)
While we're on the topic of pf...
Dragonfly patches their old[er than even FreeBSD's] pf to support multithreading in many areas
Stemming from a user's complaint (http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html), Matthew Dillon did his own work on pf to make it SMP-aware
Altering your configuration (http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html)'s ruleset can also help speed things up, he found
When will OpenBSD, the source of pf, finally do the same?
***
ChaCha usage and deployment (http://ianix.com/pub/chacha-deployment.html)
A while back, we talked to djm (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5
This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20
OpenSSH offers it as a stream cipher now, OpenBSD uses it for it's random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it
Both Google's fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not
Unfortunately, this article has one mistake: FreeBSD does not use it (https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html) - they still use the broken RC4 algorithm
***
BSDMag June 2014 issue (http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue)
The monthly online BSD magazine releases their newest issue
This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, "saving time and headaches using the robot framework for testing," an interview and an article about the increasing number of security vulnerabilities
The free pdf file is available for download as always
***
Interview - Craig Rodrigues - rodrigc@freebsd.org (mailto:rodrigc@freebsd.org)
FreeBSD's continuous (https://wiki.freebsd.org/Jenkins) testing (https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p) infrastructure (https://jenkins.freebsd.org/jenkins/)
Tutorial
Creating pre-patched OpenBSD ISOs (http://www.bsdnow.tv/tutorials/stable-iso)
News Roundup
Preauthenticated decryption considered harmful (http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful)
Responding to a post (https://www.imperialviolet.org/2014/06/27/streamingencryption.html) from Adam Langley, Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) talks a little more about how signify and pkg_add handle signatures
In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns
With signify, now everything is fully downloaded and verified before tar is even invoked
The pkg_add utility works a little bit differently, but it's also been improved in this area - details in the post
Be sure to also read the original post from Adam, lots of good information
***
FreeBSD 9.3-RC2 is out (https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html)
As the -RELEASE inches closer, release candidate 2 is out and ready for testing
Since the last one, it's got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things
The updated bsdconfig will use pkgng style packages now too
A lesser known fact: there are also premade virtual machine images you can use too
***
pkgsrcCon 2014 wrap-up (http://saveosx.org/pkgsrcCon/)
In what may be the first real pkgsrcCon article we've ever had!
Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event
Unfortunately no recordings to be found...
***
PostgreSQL FreeBSD performance and scalability (https://kib.kiev.ua/kib/pgsql_perf.pdf)
FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales
On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings
Lots of technical details if you're interested in getting the best performance out of your hardware
It also includes specific kernel options he used and the rest of the configuration
If you don't want to open the pdf file, you can use this link (https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf) too
***
Feedback/Questions
James writes in (http://slexy.org/view/s24pFjUPe4)
Klemen writes in (http://slexy.org/view/s21OogIgTu)
John writes in (http://slexy.org/view/s21rLcemNN)
Brad writes in (http://slexy.org/view/s203Qsx6CZ)
Adam writes in (http://slexy.org/view/s2eBj0FfSL)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, iso, patch, stable, cd, dvd, cdr, pre-applied, applied, horrible puns, jenkins, testing, kyua, ixsystems, tarsnap, pfsense, freenas, tarsnap, ixsystems, pfsense, freenas, bsdmag, magazine, ssl, tls, hardening, hardened, security, pf, smp, multithreading, firewall, scalability, postgresql, mysql, sql, database, performance, openssl, libressl, boringssl, google, chacha, chacha20, salsa20, encryption, pkgsrc, pkgsrccon, signify, pkg_add, authenticated encryption, decryption, gcm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>43: Package Design</title>
  <link>https://www.bsdnow.tv/43</link>
  <guid isPermaLink="false">d4b10034-d20a-44a6-a918-a57335debcae</guid>
  <pubDate>Wed, 25 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d4b10034-d20a-44a6-a918-a57335debcae.mp3" length="62389876" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's a big show this week! We'll be interviewing Marc Espie about OpenBSD's package system and build cluster. Also, we've been asked many times "how do I keep my BSD box up to date?" Well, today's tutorial should finally answer that. Answers to all your emails and this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's a big show this week! We'll be interviewing Marc Espie about OpenBSD's package system and build cluster. Also, we've been asked many times "how do I keep my BSD box up to date?" Well, today's tutorial should finally answer that. Answers to all your emails and this week's headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
EuroBSDCon 2014 talks and schedule (http://2014.eurobsdcon.org/talks-and-schedule/)
The talks and schedules for EuroBSDCon 2014 are finally revealed
The opening keynote is called "FreeBSD, looking forward to another 10 years" by jkh
Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great
It looks like Theo even has a talk, but the title isn't on the page... how mysterious
There are also days dedicated to some really interesting tutorials
Register now, the conference is on September 25-28th in Bulgaria
If you see Allan and Kris walking towards you and you haven't given us an interview yet... well you know what's going to happen
Why aren't the videos up from last year yet? Will this year also not have any?
***
FreeNAS vs NAS4Free (http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/)
More mainstream news covering BSD, this time with an article about different NAS solutions
In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free
Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect
Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project
"One is pleasantly functional; the other continues devolving during a journey of pain" - uh oh, who's the loser?
***
Quality software costs money, heartbleed was free (https://queue.acm.org/detail.cfm?id=2636165)
PHK (http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail) writes an article for ACM Queue about open source software projects' funding efforts
A lot of people don't realize just how widespread open source software is - TVs, printers, gaming consoles, etc
The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish's funding
The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them
On that subject, "Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software"
Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***
Geoblock evasion with pf and OpenBSD rdomains (https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s)
Geoblocking is a way for websites to block visitors based on the location of their IP
This is a blog post about how to get around it, using pf and rdomains
It has the advantage of not requiring any browser plugins or DNS settings on the users' computers, you just need to be running OpenBSD on your router (hmm, if only a website had a tutorial about that (http://www.bsdnow.tv/tutorials/openbsd-router)...)
In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia
It's got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***
Interview - Marc Espie - espie@openbsd.org (mailto:espie@openbsd.org) / @espie_openbsd (https://twitter.com/espie_openbsd)
OpenBSD's package system, building cluster, various topics
Tutorial
Keeping your BSD up to date (http://www.bsdnow.tv/tutorials/upgrade)
News Roundup
BoringSSL and LibReSSL (https://www.imperialviolet.org/2014/06/20/boringssl.html)
Yet another OpenSSL fork pops up, this time from Google, called BoringSSL
Adam Langley has a blog post about it, why they did it and how they're going to maintain it
You can easily browse the source code (https://boringssl.googlesource.com/)
Theo de Raadt also weighs in (http://marc.info/?l=openbsd-tech&amp;amp;m=140332790726752&amp;amp;w=2) with how this effort relates to LibReSSL
More eyes on the code is good, and patches will be shared between the two projects
***
More BSD Tor nodes wanted (http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html)
Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous
Originally discussed (https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html) on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network
If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.
The EFF is also holding a Tor challenge (https://www.eff.org/torchallenge/) for people to start up new relays and keep them online for over a year
Check out our Tor tutorial (http://www.bsdnow.tv/tutorials/tor) and help out the network, and promote BSD at the same time!
***
FreeBSD 10 OpenStack images (https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html)
OpenStack, to quote Wikipedia, is "a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution."
The article goes into detail about creating a FreeBSD instant, installing and converting it for use with "bsd-cloudinit"
The author of the article is a regular listener and emailer of the show, hey!
***
BSDday 2014 call for papers (https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html)
BSD Day, a conference not so well-known, is going to be held August 9th in Argentina
It was created in 2008 and is the only BSD conference around that area
The "call for papers" was issued, so if you're around Argentina and use BSD, consider submitting a talk
Sysadmins, developers and regular users are, of course, all welcome to come to the event
***
Feedback/Questions
Maruf writes in (http://slexy.org/view/s20nTYO2w1)
Solomon writes in (http://slexy.org/view/s21cvV6mRP)
Silas writes in (http://slexy.org/view/s2MK8sbea0)
Bert writes in (http://slexy.org/view/s2Yz97YlzI)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ports, packages, cluster, building, pkg_add, freenas, ixsystems, tarsnap, eurobsdcon, bulgaria, 2014, talks, presentation, slides, Poul-Henning Kamp, phk, schedule, freenas, nas4free, nas, geoblock, evasion, bypassing, ip ban, pf, firewall, rdomains, glusterfs, marc espie, boringssl, openssl, libressl, upgrades, how to upgrade, update, rebuild, tor, tor nodes, relays, exit node, eff, tor challenge, aslr, pie, security, bsdday, openstack, bsd-cloudinit, cloud computing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s a big show this week! We&#39;ll be interviewing Marc Espie about OpenBSD&#39;s package system and build cluster. Also, we&#39;ve been asked many times &quot;how do I keep my BSD box up to date?&quot; Well, today&#39;s tutorial should finally answer that. Answers to all your emails and this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and schedule</a></h3>

<ul>
<li>The talks and schedules for EuroBSDCon 2014 are finally revealed</li>
<li>The opening keynote is called &quot;FreeBSD, looking forward to another 10 years&quot; by jkh</li>
<li>Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great</li>
<li>It looks like Theo even has a talk, but the title isn&#39;t on the page... how mysterious</li>
<li>There are also days dedicated to some really interesting tutorials</li>
<li>Register now, the conference is on September 25-28th in Bulgaria</li>
<li>If you see Allan and Kris walking towards you and you haven&#39;t given us an interview yet... well you know what&#39;s going to happen</li>
<li>Why aren&#39;t the videos up from last year yet? Will this year also not have any?
***</li>
</ul>

<h3><a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" rel="nofollow">FreeNAS vs NAS4Free</a></h3>

<ul>
<li>More mainstream news covering BSD, this time with an article about different NAS solutions</li>
<li>In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free</li>
<li>Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect</li>
<li>Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project</li>
<li>&quot;One is pleasantly functional; the other continues devolving during a journey of pain&quot; - uh oh, who&#39;s the loser?
***</li>
</ul>

<h3><a href="https://queue.acm.org/detail.cfm?id=2636165" rel="nofollow">Quality software costs money, heartbleed was free</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">PHK</a> writes an article for ACM Queue about open source software projects&#39; funding efforts</li>
<li>A lot of people don&#39;t realize just how widespread open source software is - TVs, printers, gaming consoles, etc</li>
<li>The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish&#39;s funding</li>
<li>The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them</li>
<li>On that subject, &quot;Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software&quot;</li>
<li>Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***</li>
</ul>

<h3><a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" rel="nofollow">Geoblock evasion with pf and OpenBSD rdomains</a></h3>

<ul>
<li>Geoblocking is a way for websites to block visitors based on the location of their IP</li>
<li>This is a blog post about how to get around it, using pf and rdomains</li>
<li>It has the advantage of not requiring any browser plugins or DNS settings on the users&#39; computers, you just need to be running OpenBSD on your router (hmm, if only a website had <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">a tutorial about that</a>...)</li>
<li>In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia</li>
<li>It&#39;s got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p>OpenBSD&#39;s package system, building cluster, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/upgrade" rel="nofollow">Keeping your BSD up to date</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" rel="nofollow">BoringSSL and LibReSSL</a></h3>

<ul>
<li>Yet another OpenSSL fork pops up, this time from Google, called BoringSSL</li>
<li>Adam Langley has a blog post about it, why they did it and how they&#39;re going to maintain it</li>
<li>You can easily browse <a href="https://boringssl.googlesource.com/" rel="nofollow">the source code</a></li>
<li>Theo de Raadt also <a href="http://marc.info/?l=openbsd-tech&m=140332790726752&w=2" rel="nofollow">weighs in</a> with how this effort relates to LibReSSL</li>
<li>More eyes on the code is good, and patches will be shared between the two projects
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" rel="nofollow">More BSD Tor nodes wanted</a></h3>

<ul>
<li>Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous</li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" rel="nofollow">Originally discussed</a> on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network</li>
<li>If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.</li>
<li>The EFF is also holding a <a href="https://www.eff.org/torchallenge/" rel="nofollow">Tor challenge</a> for people to start up new relays and keep them online for over a year</li>
<li>Check out our <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor tutorial</a> and help out the network, and promote BSD at the same time!
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" rel="nofollow">FreeBSD 10 OpenStack images</a></h3>

<ul>
<li>OpenStack, to quote Wikipedia, is &quot;a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution.&quot;</li>
<li>The article goes into detail about creating a FreeBSD instant, installing and converting it for use with &quot;bsd-cloudinit&quot;</li>
<li>The author of the article is a regular listener and emailer of the show, hey!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" rel="nofollow">BSDday 2014 call for papers</a></h3>

<ul>
<li>BSD Day, a conference not so well-known, is going to be held August 9th in Argentina</li>
<li>It was created in 2008 and is the only BSD conference around that area</li>
<li>The &quot;call for papers&quot; was issued, so if you&#39;re around Argentina and use BSD, consider submitting a talk</li>
<li>Sysadmins, developers and regular users are, of course, all welcome to come to the event
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20nTYO2w1" rel="nofollow">Maruf writes in</a></li>
<li><a href="http://slexy.org/view/s21cvV6mRP" rel="nofollow">Solomon writes in</a></li>
<li><a href="http://slexy.org/view/s2MK8sbea0" rel="nofollow">Silas writes in</a></li>
<li><a href="http://slexy.org/view/s2Yz97YlzI" rel="nofollow">Bert writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s a big show this week! We&#39;ll be interviewing Marc Espie about OpenBSD&#39;s package system and build cluster. Also, we&#39;ve been asked many times &quot;how do I keep my BSD box up to date?&quot; Well, today&#39;s tutorial should finally answer that. Answers to all your emails and this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and schedule</a></h3>

<ul>
<li>The talks and schedules for EuroBSDCon 2014 are finally revealed</li>
<li>The opening keynote is called &quot;FreeBSD, looking forward to another 10 years&quot; by jkh</li>
<li>Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great</li>
<li>It looks like Theo even has a talk, but the title isn&#39;t on the page... how mysterious</li>
<li>There are also days dedicated to some really interesting tutorials</li>
<li>Register now, the conference is on September 25-28th in Bulgaria</li>
<li>If you see Allan and Kris walking towards you and you haven&#39;t given us an interview yet... well you know what&#39;s going to happen</li>
<li>Why aren&#39;t the videos up from last year yet? Will this year also not have any?
***</li>
</ul>

<h3><a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" rel="nofollow">FreeNAS vs NAS4Free</a></h3>

<ul>
<li>More mainstream news covering BSD, this time with an article about different NAS solutions</li>
<li>In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free</li>
<li>Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect</li>
<li>Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project</li>
<li>&quot;One is pleasantly functional; the other continues devolving during a journey of pain&quot; - uh oh, who&#39;s the loser?
***</li>
</ul>

<h3><a href="https://queue.acm.org/detail.cfm?id=2636165" rel="nofollow">Quality software costs money, heartbleed was free</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">PHK</a> writes an article for ACM Queue about open source software projects&#39; funding efforts</li>
<li>A lot of people don&#39;t realize just how widespread open source software is - TVs, printers, gaming consoles, etc</li>
<li>The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish&#39;s funding</li>
<li>The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them</li>
<li>On that subject, &quot;Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software&quot;</li>
<li>Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***</li>
</ul>

<h3><a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" rel="nofollow">Geoblock evasion with pf and OpenBSD rdomains</a></h3>

<ul>
<li>Geoblocking is a way for websites to block visitors based on the location of their IP</li>
<li>This is a blog post about how to get around it, using pf and rdomains</li>
<li>It has the advantage of not requiring any browser plugins or DNS settings on the users&#39; computers, you just need to be running OpenBSD on your router (hmm, if only a website had <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">a tutorial about that</a>...)</li>
<li>In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia</li>
<li>It&#39;s got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p>OpenBSD&#39;s package system, building cluster, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/upgrade" rel="nofollow">Keeping your BSD up to date</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" rel="nofollow">BoringSSL and LibReSSL</a></h3>

<ul>
<li>Yet another OpenSSL fork pops up, this time from Google, called BoringSSL</li>
<li>Adam Langley has a blog post about it, why they did it and how they&#39;re going to maintain it</li>
<li>You can easily browse <a href="https://boringssl.googlesource.com/" rel="nofollow">the source code</a></li>
<li>Theo de Raadt also <a href="http://marc.info/?l=openbsd-tech&m=140332790726752&w=2" rel="nofollow">weighs in</a> with how this effort relates to LibReSSL</li>
<li>More eyes on the code is good, and patches will be shared between the two projects
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" rel="nofollow">More BSD Tor nodes wanted</a></h3>

<ul>
<li>Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous</li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" rel="nofollow">Originally discussed</a> on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network</li>
<li>If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.</li>
<li>The EFF is also holding a <a href="https://www.eff.org/torchallenge/" rel="nofollow">Tor challenge</a> for people to start up new relays and keep them online for over a year</li>
<li>Check out our <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor tutorial</a> and help out the network, and promote BSD at the same time!
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" rel="nofollow">FreeBSD 10 OpenStack images</a></h3>

<ul>
<li>OpenStack, to quote Wikipedia, is &quot;a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution.&quot;</li>
<li>The article goes into detail about creating a FreeBSD instant, installing and converting it for use with &quot;bsd-cloudinit&quot;</li>
<li>The author of the article is a regular listener and emailer of the show, hey!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" rel="nofollow">BSDday 2014 call for papers</a></h3>

<ul>
<li>BSD Day, a conference not so well-known, is going to be held August 9th in Argentina</li>
<li>It was created in 2008 and is the only BSD conference around that area</li>
<li>The &quot;call for papers&quot; was issued, so if you&#39;re around Argentina and use BSD, consider submitting a talk</li>
<li>Sysadmins, developers and regular users are, of course, all welcome to come to the event
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20nTYO2w1" rel="nofollow">Maruf writes in</a></li>
<li><a href="http://slexy.org/view/s21cvV6mRP" rel="nofollow">Solomon writes in</a></li>
<li><a href="http://slexy.org/view/s2MK8sbea0" rel="nofollow">Silas writes in</a></li>
<li><a href="http://slexy.org/view/s2Yz97YlzI" rel="nofollow">Bert writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>41: Commit This Bit</title>
  <link>https://www.bsdnow.tv/41</link>
  <guid isPermaLink="false">0017fbdd-17f8-464f-8bd5-94c6070bbd9a</guid>
  <pubDate>Wed, 11 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0017fbdd-17f8-464f-8bd5-94c6070bbd9a.mp3" length="48292564" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week in the big show, we'll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week in the big show, we'll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD moves to Bugzilla (https://lists.freebsd.org/pipermail/freebsd-announce/2014-June/001559.html)
Historically, FreeBSD has used the old GNATS system for keeping track of bug reports
After years and years of wanting to switch, they've finally moved away from GNATS to Bugzilla
It offers a lot of advantages, is much more modern and actively maintained and 
There's a new workflow chart (http://people.freebsd.org/~eadler/bugrelocation/workflow.html) for developers to illustrate the new way of doing things
The old "send-pr" command will still work for the time being, but will eventually be phased out in favor of native Bugzilla reporting tools (of which there are multiple in ports)
This will hopefully make reporting bugs a lot less painful
***
DIY NAS: EconoNAS 2014 (http://blog.brianmoses.net/2014/06/diy-nas-econonas-2014.html)
We previously covered this blog last year, but the 2014 edition is up
More of a hardware-focused article, the author details the parts he's using for a budget NAS
Details the motherboard, RAM, CPU, hard drives, case, etc
With a set goal of $500 max, he goes just over it - $550 for all the parts
Lots of nice pictures of the hardware and step by step instructions for assembly, as well as software configuration instructions
***
DragonflyBSD 3.8 released (http://www.shiningsilence.com/dbsdlog/2014/06/04/14122.html)
Justin (http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug) announced the availability of DragonflyBSD 3.8.0
Binaries in /bin and /sbin are dynamic now, enabling the use of PAM and NSS to manage user accounts
It includes a new HAMMER FS backup script and lots of FreeBSD tools have been synced with their latest versions
Work continues on for the Intel graphics drivers, but it's currently limited to the HD4000 and Ivy Bridge series
See the release page (http://www.dragonflybsd.org/release38/) for more info and check the link for source-based upgrade instructions
***
OpenZFS European conference 2014 (http://www.open-zfs.org/wiki/Publications#2014_OpenZFS_European_Conference)
There was an OpenZFS conference held in Europe recently, and now the videos are online for your viewing pleasure
Matt Ahrens, Introduction (http://www.youtube.com/watch?v=Mk1czZs6vkQ)
Michael Alexander, FhGFS performance on ZFS (http://www.youtube.com/watch?v=Ak1HB507-xY)
Andriy Gapon, Testing ZFS on FreeBSD (http://www.youtube.com/watch?v=oB-QDwVuBH4)
Luke Marsden, HybridCluster: ZFS in the cloud (http://www.youtube.com/watch?v=ISI9Ppj3kTo)
Vadim Comănescu, Syneto: continuously delivering a ZFS-based OS (http://www.youtube.com/watch?v=1xK94v0BedE)
Chris George, DDRdrive ZIL accelerator: random write revelation (http://www.youtube.com/watch?v=ScNHjWBQYQ8)
Grenville Whelan, High-Availability (http://www.youtube.com/watch?v=tiTYZykCeDo)
Phil Harman, Harman Holistic (https://www.youtube.com/watch?v=ApjkrBVlPXk)
Mark Rees, Storiant and OpenZFS (http://www.youtube.com/watch?v=41yl23EACns)
Andrew Holway, EraStor ZFS appliances (http://www.youtube.com/watch?v=b4L0DRvKJxo)
Dan Vâtca, Syneto and OpenZFS (http://www.youtube.com/watch?v=pPOW8bwUXxo)
Luke Marsden, HybridCluster and OpenZFS (http://www.youtube.com/watch?v=uSM1s1aWlZE)
Matt Ahrens, Delphix and OpenZFS (http://www.youtube.com/watch?v=UaRdzUOsieA)
Check the link for slides and other goodies
***
Interview - Benedict Reuschling - bcr@freebsd.org (mailto:bcr@freebsd.org)
BSD documentation, getting commit access, unix education, various topics
News Roundup
Getting to know your portmgr, Steve Wills (http://blogs.freebsdish.org/portmgr/2014/06/04/getting-to-know-your-portmgr-steve-wills/)
"It is my pleasure to introduce Steve Wills, the newest member of the portmgr team"
swills is an all-round good guy, does a lot for ports (especially the ruby ports)
In this interview, we learn why he uses FreeBSD, the most embarrassing moment in his FreeBSD career and much more
He used to work for Red Hat, woah
***
BSDTalk episode 242 (http://bsdtalk.blogspot.com/2014/06/bsdtalk242-pfsense-with-chris-buechler.html)
This time on BSDTalk, Will interviews Chris Buechler (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) from pfSense
Topics include: the heartbleed vulnerability and how it affected pfSense, how people usually leave their firewalls unpatched for a long time (or even forget about them!), changes between major versions, the upgrade process, upcoming features in their 10-based version, backporting drivers and security fixes
They also touch on recent concerns in the pfSense community about their license change, that they may be "going commercial" and closing the source - so tune in to find out what their future plans are for all of that
***
Turn old PC hardware into a killer home server (http://www.pcworld.com/article/2243748/turn-old-pc-hardware-into-a-killer-home-server-with-freenas.html)
Lots of us have old hardware lying around doing nothing but collecting dust
Why not turn that old box into a modern file server with FreeNAS and ZFS?
This article goes through the process of setting up a NAS, gives a little history behind the project and highlights some of the different protocols FreeNAS can use (NFS, SMB, AFS, etc)
Most of our users are already familiar with all of this stuff, nothing too advanced
Good to see BSD getting some well-deserved attention on a big mainstream site
***
Unbloating the VAX install CD (https://blog.netbsd.org/tnf/entry/unbloating_the_vax_install_cd)
After a discussion on the VAX mailing list, something very important came to the attention of the developers...
You can't boot NetBSD on a VAX box with 16MB of RAM from the CD image
This blog post goes through the developer's adventure in trying to fix that through emulation and stripping various things out of the kernel to make it smaller
In the end, he got it booting - and now all three VAX users who want to run NetBSD can do so on their systems with 16MB of RAM...
***
Feedback/Questions
Thomas writes in (http://slexy.org/view/s211mNScBr)
Reynold writes in (http://slexy.org/view/s21JA8BVmZ)
Bostjan writes in (http://slexy.org/view/s2kwS3ncTY)
Paul writes in (http://slexy.org/view/s2VgjXUfW9)
John writes in (http://slexy.org/view/s202AAQUXt)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, gnats, send-pr, sendbug, bugzilla, bug tracker, iso, cdr, dvd, patches, applied, commit bit, documentation, bsdcan, 2014, 9.3-RELEASE, 9.3, release, stable, advocacy, openssl, libressl, security, vulnerability, bsdtalk, pfsense, license, openzfs, zfs, presentation, talk, matthew ahrens, delphix, hybridcluster, freenas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week in the big show, we&#39;ll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-June/001559.html" rel="nofollow">FreeBSD moves to Bugzilla</a></h3>

<ul>
<li>Historically, FreeBSD has used the old GNATS system for keeping track of bug reports</li>
<li>After years and years of wanting to switch, they&#39;ve finally moved away from GNATS to Bugzilla</li>
<li>It offers a lot of advantages, is much more modern and actively maintained and </li>
<li>There&#39;s a new <a href="http://people.freebsd.org/%7Eeadler/bugrelocation/workflow.html" rel="nofollow">workflow chart</a> for developers to illustrate the new way of doing things</li>
<li>The old &quot;send-pr&quot; command will still work for the time being, but will eventually be phased out in favor of native Bugzilla reporting tools (of which there are multiple in ports)</li>
<li>This will hopefully make reporting bugs a lot less painful
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/06/diy-nas-econonas-2014.html" rel="nofollow">DIY NAS: EconoNAS 2014</a></h3>

<ul>
<li>We previously covered this blog last year, but the 2014 edition is up</li>
<li>More of a hardware-focused article, the author details the parts he&#39;s using for a <strong>budget</strong> NAS</li>
<li>Details the motherboard, RAM, CPU, hard drives, case, etc</li>
<li>With a set goal of $500 max, he goes just over it - $550 for all the parts</li>
<li>Lots of nice pictures of the hardware and step by step instructions for assembly, as well as software configuration instructions
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/06/04/14122.html" rel="nofollow">DragonflyBSD 3.8 released</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin</a> announced the availability of DragonflyBSD 3.8.0</li>
<li>Binaries in /bin and /sbin are dynamic now, enabling the use of PAM and NSS to manage user accounts</li>
<li>It includes a new HAMMER FS backup script and lots of FreeBSD tools have been synced with their latest versions</li>
<li>Work continues on for the Intel graphics drivers, but it&#39;s currently limited to the HD4000 and Ivy Bridge series</li>
<li>See <a href="http://www.dragonflybsd.org/release38/" rel="nofollow">the release page</a> for more info and check the link for source-based upgrade instructions
***</li>
</ul>

<h3><a href="http://www.open-zfs.org/wiki/Publications#2014_OpenZFS_European_Conference" rel="nofollow">OpenZFS European conference 2014</a></h3>

<ul>
<li>There was an OpenZFS conference held in Europe recently, and now the videos are online for your viewing pleasure</li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=Mk1czZs6vkQ" rel="nofollow">Introduction</a></li>
<li>Michael Alexander, <a href="http://www.youtube.com/watch?v=Ak1HB507-xY" rel="nofollow">FhGFS performance on ZFS</a></li>
<li>Andriy Gapon, <a href="http://www.youtube.com/watch?v=oB-QDwVuBH4" rel="nofollow">Testing ZFS on FreeBSD</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=ISI9Ppj3kTo" rel="nofollow">HybridCluster: ZFS in the cloud</a></li>
<li>Vadim Comănescu, <a href="http://www.youtube.com/watch?v=1xK94v0BedE" rel="nofollow">Syneto: continuously delivering a ZFS-based OS</a></li>
<li>Chris George, <a href="http://www.youtube.com/watch?v=ScNHjWBQYQ8" rel="nofollow">DDRdrive ZIL accelerator: random write revelation</a></li>
<li>Grenville Whelan, <a href="http://www.youtube.com/watch?v=tiTYZykCeDo" rel="nofollow">High-Availability</a></li>
<li>Phil Harman, <a href="https://www.youtube.com/watch?v=ApjkrBVlPXk" rel="nofollow">Harman Holistic</a></li>
<li>Mark Rees, <a href="http://www.youtube.com/watch?v=41yl23EACns" rel="nofollow">Storiant and OpenZFS</a></li>
<li>Andrew Holway, <a href="http://www.youtube.com/watch?v=b4L0DRvKJxo" rel="nofollow">EraStor ZFS appliances</a></li>
<li>Dan Vâtca, <a href="http://www.youtube.com/watch?v=pPOW8bwUXxo" rel="nofollow">Syneto and OpenZFS</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=uSM1s1aWlZE" rel="nofollow">HybridCluster and OpenZFS</a></li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=UaRdzUOsieA" rel="nofollow">Delphix and OpenZFS</a></li>
<li>Check the link for slides and other goodies
***</li>
</ul>

<h2>Interview - Benedict Reuschling - <a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></h2>

<p>BSD documentation, getting commit access, unix education, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/06/04/getting-to-know-your-portmgr-steve-wills/" rel="nofollow">Getting to know your portmgr, Steve Wills</a></h3>

<ul>
<li>&quot;It is my pleasure to introduce Steve Wills, the newest member of the portmgr team&quot;</li>
<li>swills is an all-round good guy, does a lot for ports (especially the ruby ports)</li>
<li>In this interview, we learn why he uses FreeBSD, the most embarrassing moment in his FreeBSD career and much more</li>
<li>He used to work for Red Hat, woah
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/06/bsdtalk242-pfsense-with-chris-buechler.html" rel="nofollow">BSDTalk episode 242</a></h3>

<ul>
<li>This time on BSDTalk, Will interviews <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">Chris Buechler</a> from pfSense</li>
<li>Topics include: the heartbleed vulnerability and how it affected pfSense, how people usually leave their firewalls unpatched for a long time (or even forget about them!), changes between major versions, the upgrade process, upcoming features in their 10-based version, backporting drivers and security fixes</li>
<li>They also touch on recent concerns in the pfSense community about their license change, that they may be &quot;going commercial&quot; and closing the source - so tune in to find out what their future plans are for all of that
***</li>
</ul>

<h3><a href="http://www.pcworld.com/article/2243748/turn-old-pc-hardware-into-a-killer-home-server-with-freenas.html" rel="nofollow">Turn old PC hardware into a killer home server</a></h3>

<ul>
<li>Lots of us have old hardware lying around doing nothing but collecting dust</li>
<li>Why not turn that old box into a modern file server with FreeNAS and ZFS?</li>
<li>This article goes through the process of setting up a NAS, gives a little history behind the project and highlights some of the different protocols FreeNAS can use (NFS, SMB, AFS, etc)</li>
<li>Most of our users are already familiar with all of this stuff, nothing too advanced</li>
<li>Good to see BSD getting some well-deserved attention on a big mainstream site
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/unbloating_the_vax_install_cd" rel="nofollow">Unbloating the VAX install CD</a></h3>

<ul>
<li>After a discussion on the VAX mailing list, something very important came to the attention of the developers...</li>
<li>You can&#39;t boot NetBSD on a VAX box with 16MB of RAM from the CD image</li>
<li>This blog post goes through the developer&#39;s adventure in trying to fix that through emulation and stripping various things out of the kernel to make it smaller</li>
<li>In the end, he got it booting - and now all three VAX users who want to run NetBSD can do so on their systems with 16MB of RAM...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s211mNScBr" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21JA8BVmZ" rel="nofollow">Reynold writes in</a></li>
<li><a href="http://slexy.org/view/s2kwS3ncTY" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2VgjXUfW9" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s202AAQUXt" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week in the big show, we&#39;ll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-June/001559.html" rel="nofollow">FreeBSD moves to Bugzilla</a></h3>

<ul>
<li>Historically, FreeBSD has used the old GNATS system for keeping track of bug reports</li>
<li>After years and years of wanting to switch, they&#39;ve finally moved away from GNATS to Bugzilla</li>
<li>It offers a lot of advantages, is much more modern and actively maintained and </li>
<li>There&#39;s a new <a href="http://people.freebsd.org/%7Eeadler/bugrelocation/workflow.html" rel="nofollow">workflow chart</a> for developers to illustrate the new way of doing things</li>
<li>The old &quot;send-pr&quot; command will still work for the time being, but will eventually be phased out in favor of native Bugzilla reporting tools (of which there are multiple in ports)</li>
<li>This will hopefully make reporting bugs a lot less painful
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/06/diy-nas-econonas-2014.html" rel="nofollow">DIY NAS: EconoNAS 2014</a></h3>

<ul>
<li>We previously covered this blog last year, but the 2014 edition is up</li>
<li>More of a hardware-focused article, the author details the parts he&#39;s using for a <strong>budget</strong> NAS</li>
<li>Details the motherboard, RAM, CPU, hard drives, case, etc</li>
<li>With a set goal of $500 max, he goes just over it - $550 for all the parts</li>
<li>Lots of nice pictures of the hardware and step by step instructions for assembly, as well as software configuration instructions
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/06/04/14122.html" rel="nofollow">DragonflyBSD 3.8 released</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin</a> announced the availability of DragonflyBSD 3.8.0</li>
<li>Binaries in /bin and /sbin are dynamic now, enabling the use of PAM and NSS to manage user accounts</li>
<li>It includes a new HAMMER FS backup script and lots of FreeBSD tools have been synced with their latest versions</li>
<li>Work continues on for the Intel graphics drivers, but it&#39;s currently limited to the HD4000 and Ivy Bridge series</li>
<li>See <a href="http://www.dragonflybsd.org/release38/" rel="nofollow">the release page</a> for more info and check the link for source-based upgrade instructions
***</li>
</ul>

<h3><a href="http://www.open-zfs.org/wiki/Publications#2014_OpenZFS_European_Conference" rel="nofollow">OpenZFS European conference 2014</a></h3>

<ul>
<li>There was an OpenZFS conference held in Europe recently, and now the videos are online for your viewing pleasure</li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=Mk1czZs6vkQ" rel="nofollow">Introduction</a></li>
<li>Michael Alexander, <a href="http://www.youtube.com/watch?v=Ak1HB507-xY" rel="nofollow">FhGFS performance on ZFS</a></li>
<li>Andriy Gapon, <a href="http://www.youtube.com/watch?v=oB-QDwVuBH4" rel="nofollow">Testing ZFS on FreeBSD</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=ISI9Ppj3kTo" rel="nofollow">HybridCluster: ZFS in the cloud</a></li>
<li>Vadim Comănescu, <a href="http://www.youtube.com/watch?v=1xK94v0BedE" rel="nofollow">Syneto: continuously delivering a ZFS-based OS</a></li>
<li>Chris George, <a href="http://www.youtube.com/watch?v=ScNHjWBQYQ8" rel="nofollow">DDRdrive ZIL accelerator: random write revelation</a></li>
<li>Grenville Whelan, <a href="http://www.youtube.com/watch?v=tiTYZykCeDo" rel="nofollow">High-Availability</a></li>
<li>Phil Harman, <a href="https://www.youtube.com/watch?v=ApjkrBVlPXk" rel="nofollow">Harman Holistic</a></li>
<li>Mark Rees, <a href="http://www.youtube.com/watch?v=41yl23EACns" rel="nofollow">Storiant and OpenZFS</a></li>
<li>Andrew Holway, <a href="http://www.youtube.com/watch?v=b4L0DRvKJxo" rel="nofollow">EraStor ZFS appliances</a></li>
<li>Dan Vâtca, <a href="http://www.youtube.com/watch?v=pPOW8bwUXxo" rel="nofollow">Syneto and OpenZFS</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=uSM1s1aWlZE" rel="nofollow">HybridCluster and OpenZFS</a></li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=UaRdzUOsieA" rel="nofollow">Delphix and OpenZFS</a></li>
<li>Check the link for slides and other goodies
***</li>
</ul>

<h2>Interview - Benedict Reuschling - <a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></h2>

<p>BSD documentation, getting commit access, unix education, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/06/04/getting-to-know-your-portmgr-steve-wills/" rel="nofollow">Getting to know your portmgr, Steve Wills</a></h3>

<ul>
<li>&quot;It is my pleasure to introduce Steve Wills, the newest member of the portmgr team&quot;</li>
<li>swills is an all-round good guy, does a lot for ports (especially the ruby ports)</li>
<li>In this interview, we learn why he uses FreeBSD, the most embarrassing moment in his FreeBSD career and much more</li>
<li>He used to work for Red Hat, woah
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/06/bsdtalk242-pfsense-with-chris-buechler.html" rel="nofollow">BSDTalk episode 242</a></h3>

<ul>
<li>This time on BSDTalk, Will interviews <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">Chris Buechler</a> from pfSense</li>
<li>Topics include: the heartbleed vulnerability and how it affected pfSense, how people usually leave their firewalls unpatched for a long time (or even forget about them!), changes between major versions, the upgrade process, upcoming features in their 10-based version, backporting drivers and security fixes</li>
<li>They also touch on recent concerns in the pfSense community about their license change, that they may be &quot;going commercial&quot; and closing the source - so tune in to find out what their future plans are for all of that
***</li>
</ul>

<h3><a href="http://www.pcworld.com/article/2243748/turn-old-pc-hardware-into-a-killer-home-server-with-freenas.html" rel="nofollow">Turn old PC hardware into a killer home server</a></h3>

<ul>
<li>Lots of us have old hardware lying around doing nothing but collecting dust</li>
<li>Why not turn that old box into a modern file server with FreeNAS and ZFS?</li>
<li>This article goes through the process of setting up a NAS, gives a little history behind the project and highlights some of the different protocols FreeNAS can use (NFS, SMB, AFS, etc)</li>
<li>Most of our users are already familiar with all of this stuff, nothing too advanced</li>
<li>Good to see BSD getting some well-deserved attention on a big mainstream site
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/unbloating_the_vax_install_cd" rel="nofollow">Unbloating the VAX install CD</a></h3>

<ul>
<li>After a discussion on the VAX mailing list, something very important came to the attention of the developers...</li>
<li>You can&#39;t boot NetBSD on a VAX box with 16MB of RAM from the CD image</li>
<li>This blog post goes through the developer&#39;s adventure in trying to fix that through emulation and stripping various things out of the kernel to make it smaller</li>
<li>In the end, he got it booting - and now all three VAX users who want to run NetBSD can do so on their systems with 16MB of RAM...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s211mNScBr" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21JA8BVmZ" rel="nofollow">Reynold writes in</a></li>
<li><a href="http://slexy.org/view/s2kwS3ncTY" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2VgjXUfW9" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s202AAQUXt" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>40: AirPorts &amp; Packages</title>
  <link>https://www.bsdnow.tv/40</link>
  <guid isPermaLink="false">f9c8a284-4fd9-4c5d-9137-77062c5814b4</guid>
  <pubDate>Wed, 04 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f9c8a284-4fd9-4c5d-9137-77062c5814b4.mp3" length="52844692" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's episode, we'll be giving you an introductory guide on OpenBSD's ports and package system. There's also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:13:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>On this week's episode, we'll be giving you an introductory guide on OpenBSD's ports and package system. There's also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSDCan 2014 talks and reports, part 2 (https://www.bsdcan.org/2014/schedule/)
More presentations and trip reports are still being uploaded
Ingo Schwarze, New Trends in mandoc (https://www.youtube.com/watch?v=oifYhwTaOuw)
Vsevolod Stakhov, The Architecture of the New Solver in pkg
 (https://www.youtube.com/watch?v=3SOKFz2UUQ4)
Julio Merino, The FreeBSD Test Suite (https://www.youtube.com/watch?v=nf-bFeKaZsY)
Zbigniew Bodek, Transparent Superpages for FreeBSD on ARM (https://www.youtube.com/watch?v=s5iIKEHtbX8)
There's also a trip report from Michael Dexter (http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html) and another (very long and detailed) trip report (http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html) from our friend Warren Block (http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king) that even gives us some linkage, thanks!
***
Beyond security, getting to know OpenBSD's real purpose (https://www.youtube.com/watch?v=JrFfrrY-yOo)
Michael W Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) (who, we learn through this video, has been using BSD since 1986) gave a "webcast" last week, and the audio and slides are finally up
It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics
Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a "pressure cooker for ideas," briefly touches on GPL vs BSDL, their "do it right or don't do it at all" attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans
Here's a direct link to the slides (https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf)
Great presentation if you'd like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***
FreeBSD vs Linux, a comprehensive comparison (http://brioteam.com/linux-versus-freebsd-comprehensive-comparison)
Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux
This one was worth mentioning because it's very thorough in regards to how things are done behind the scenes, not just the usual technical differences
It highlights the concept of a "core team" and their role vs "contributors" and "committers" (similar to a presentation Kirk McKusick did not long ago)
While a lot of things will be the same on both platforms, you might still be asking "which one is right for me?" - this article weighs in with some points for both sides and different use cases
Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don't hate us for linking it
***
Expand FreeNAS with plugins (http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins)
One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework
With these plugins, you can greatly expand the feature set of your NAS via third party programs
This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience
Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more
It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***
Interview - Karl Lehenbauer - karl@flightaware.com (mailto:karl@flightaware.com) / @flightaware (https://twitter.com/flightaware)
FreeBSD at FlightAware, BSD history, various topics
Tutorial
Ports and packages in OpenBSD (http://www.bsdnow.tv/tutorials/ports-obsd)
News Roundup
Code review culture meets FreeBSD (http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html)
In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree
This article describes Phabricator, an open source code review system that we briefly mentioned last week
Instructions for using it are on the wiki (https://wiki.freebsd.org/CodeReview)
While not approved by the core team yet for anything official, it's in a testing phase and developers are encouraged to try it out and get their patches reviewed
Just look at that fancy interface!! (http://phabric.freebsd.org/)
***
Upcoming BSD books (http://blather.michaelwlucas.com/archives/2088)
Sneaky MWL somehow finds his way into both our headlines and the news roundup
He gives us an update on the next BSD books that he's planning to release
The plan is to release three (or so) books based on different aspects of FreeBSD's storage system(s) - GEOM, UFS, ZFS, etc.
This has the advantage of only requiring you to buy the one(s) you're specifically interested in
"When will they be released? When I'm done writing them. How much will they cost? Dunno."
It's not Absolute FreeBSD 3rd edition...
***
CARP failover and high availability on FreeBSD (https://www.youtube.com/watch?v=VjYb9mKB4jU)
If you're running a cluster or a group of servers, you should have some sort of failover in place
But the question comes up, "how do you load balance the load balancers!?"
This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying
Also mentions DNS-based load balancing as another option
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/)
This time in PCBSD land, we're getting ready for the 10.0.2 release (ISOs here) (http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/)
AppCafe got a good number of fixes, and now shows 10 random highlighted applications
EasyPBI added a "bulk" mode to create PBIs of an entire FreeBSD port category
Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***
Feedback/Questions
Paul writes in (http://slexy.org/view/s205iiKiWp)
Matt writes in (http://slexy.org/view/s2060bkTNl)
Kjell writes in (http://slexy.org/view/s2G7eMC6oP)
Paul writes in (http://slexy.org/view/s2REfzMFGK)
Tom writes in (http://slexy.org/view/s21nvJtXY6)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, flightaware, karl lehenbauer, keynote, bsdcan, 2014, webcast, beyond security, libressl, linux, bsd vs linux, freenas, plugins, jails, plex media server, plex, owncloud, tarsnap, ixsystems, code review, kyua, geom, ufs, zfs, books, absolute freebsd, carp, failover, high availability, firewalls, pf, ipfw, load balancing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be giving you an introductory guide on OpenBSD&#39;s ports and package system. There&#39;s also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports, part 2</a></h3>

<ul>
<li>More presentations and trip reports are still being uploaded</li>
<li>Ingo Schwarze, <a href="https://www.youtube.com/watch?v=oifYhwTaOuw" rel="nofollow">New Trends in mandoc</a></li>
<li>Vsevolod Stakhov, <a href="https://www.youtube.com/watch?v=3SOKFz2UUQ4" rel="nofollow">The Architecture of the New Solver in pkg
</a></li>
<li>Julio Merino, <a href="https://www.youtube.com/watch?v=nf-bFeKaZsY" rel="nofollow">The FreeBSD Test Suite</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=s5iIKEHtbX8" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>There&#39;s also a <a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html" rel="nofollow">trip report from Michael Dexter</a> and another (very long and detailed) <a href="http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html" rel="nofollow">trip report</a> from our friend <a href="http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king" rel="nofollow">Warren Block</a> that even gives us some linkage, thanks!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=JrFfrrY-yOo" rel="nofollow">Beyond security, getting to know OpenBSD&#39;s real purpose</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W Lucas</a> (who, we learn through this video, has been using BSD since 1986) gave a &quot;webcast&quot; last week, and the audio and slides are finally up</li>
<li>It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics</li>
<li>Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a &quot;pressure cooker for ideas,&quot; briefly touches on GPL vs BSDL, their &quot;do it right or don&#39;t do it at all&quot; attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans</li>
<li>Here&#39;s a direct link to <a href="https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf" rel="nofollow">the slides</a></li>
<li>Great presentation if you&#39;d like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***</li>
</ul>

<h3><a href="http://brioteam.com/linux-versus-freebsd-comprehensive-comparison" rel="nofollow">FreeBSD vs Linux, a comprehensive comparison</a></h3>

<ul>
<li>Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux</li>
<li>This one was worth mentioning because it&#39;s very thorough in regards to how things are done behind the scenes, not just the usual technical differences</li>
<li>It highlights the concept of a &quot;core team&quot; and their role vs &quot;contributors&quot; and &quot;committers&quot; (similar to a presentation Kirk McKusick did not long ago)</li>
<li>While a lot of things will be the same on both platforms, you might still be asking &quot;which one is right for me?&quot; - this article weighs in with some points for both sides and different use cases</li>
<li>Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don&#39;t hate us for linking it
***</li>
</ul>

<h3><a href="http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins" rel="nofollow">Expand FreeNAS with plugins</a></h3>

<ul>
<li>One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework</li>
<li>With these plugins, you can greatly expand the feature set of your NAS via third party programs</li>
<li>This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience</li>
<li>Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more</li>
<li>It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***</li>
</ul>

<h2>Interview - Karl Lehenbauer - <a href="mailto:karl@flightaware.com" rel="nofollow">karl@flightaware.com</a> / <a href="https://twitter.com/flightaware" rel="nofollow">@flightaware</a></h2>

<p>FreeBSD at FlightAware, BSD history, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">Ports and packages in OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html" rel="nofollow">Code review culture meets FreeBSD</a></h3>

<ul>
<li>In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree</li>
<li>This article describes Phabricator, an open source code review system that we briefly mentioned last week</li>
<li>Instructions for using it are on <a href="https://wiki.freebsd.org/CodeReview" rel="nofollow">the wiki</a></li>
<li>While not approved by the core team yet for anything official, it&#39;s in a testing phase and developers are encouraged to try it out and get their patches reviewed</li>
<li><a href="http://phabric.freebsd.org/" rel="nofollow">Just look at that fancy interface!!</a>
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2088" rel="nofollow">Upcoming BSD books</a></h3>

<ul>
<li>Sneaky MWL somehow finds his way into both our headlines and the news roundup</li>
<li>He gives us an update on the next BSD books that he&#39;s planning to release</li>
<li>The plan is to release three (or so) books based on different aspects of FreeBSD&#39;s storage system(s) - GEOM, UFS, ZFS, etc.</li>
<li>This has the advantage of only requiring you to buy the one(s) you&#39;re specifically interested in</li>
<li>&quot;When will they be released? When I&#39;m done writing them. How much will they cost? Dunno.&quot;</li>
<li>It&#39;s not Absolute FreeBSD 3rd edition...
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=VjYb9mKB4jU" rel="nofollow">CARP failover and high availability on FreeBSD</a></h3>

<ul>
<li>If you&#39;re running a cluster or a group of servers, you should have some sort of failover in place</li>
<li>But the question comes up, &quot;how do you load balance the load balancers!?&quot;</li>
<li>This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying</li>
<li>Also mentions DNS-based load balancing as another option
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time in PCBSD land, we&#39;re getting ready for the 10.0.2 release <a href="http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/" rel="nofollow">(ISOs here)</a></li>
<li>AppCafe got a good number of fixes, and now shows 10 random highlighted applications</li>
<li>EasyPBI added a &quot;bulk&quot; mode to create PBIs of an entire FreeBSD port category</li>
<li>Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205iiKiWp" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s2060bkTNl" rel="nofollow">Matt writes in</a></li>
<li><a href="http://slexy.org/view/s2G7eMC6oP" rel="nofollow">Kjell writes in</a></li>
<li><a href="http://slexy.org/view/s2REfzMFGK" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s21nvJtXY6" rel="nofollow">Tom writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be giving you an introductory guide on OpenBSD&#39;s ports and package system. There&#39;s also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports, part 2</a></h3>

<ul>
<li>More presentations and trip reports are still being uploaded</li>
<li>Ingo Schwarze, <a href="https://www.youtube.com/watch?v=oifYhwTaOuw" rel="nofollow">New Trends in mandoc</a></li>
<li>Vsevolod Stakhov, <a href="https://www.youtube.com/watch?v=3SOKFz2UUQ4" rel="nofollow">The Architecture of the New Solver in pkg
</a></li>
<li>Julio Merino, <a href="https://www.youtube.com/watch?v=nf-bFeKaZsY" rel="nofollow">The FreeBSD Test Suite</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=s5iIKEHtbX8" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>There&#39;s also a <a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html" rel="nofollow">trip report from Michael Dexter</a> and another (very long and detailed) <a href="http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html" rel="nofollow">trip report</a> from our friend <a href="http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king" rel="nofollow">Warren Block</a> that even gives us some linkage, thanks!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=JrFfrrY-yOo" rel="nofollow">Beyond security, getting to know OpenBSD&#39;s real purpose</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W Lucas</a> (who, we learn through this video, has been using BSD since 1986) gave a &quot;webcast&quot; last week, and the audio and slides are finally up</li>
<li>It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics</li>
<li>Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a &quot;pressure cooker for ideas,&quot; briefly touches on GPL vs BSDL, their &quot;do it right or don&#39;t do it at all&quot; attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans</li>
<li>Here&#39;s a direct link to <a href="https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf" rel="nofollow">the slides</a></li>
<li>Great presentation if you&#39;d like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***</li>
</ul>

<h3><a href="http://brioteam.com/linux-versus-freebsd-comprehensive-comparison" rel="nofollow">FreeBSD vs Linux, a comprehensive comparison</a></h3>

<ul>
<li>Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux</li>
<li>This one was worth mentioning because it&#39;s very thorough in regards to how things are done behind the scenes, not just the usual technical differences</li>
<li>It highlights the concept of a &quot;core team&quot; and their role vs &quot;contributors&quot; and &quot;committers&quot; (similar to a presentation Kirk McKusick did not long ago)</li>
<li>While a lot of things will be the same on both platforms, you might still be asking &quot;which one is right for me?&quot; - this article weighs in with some points for both sides and different use cases</li>
<li>Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don&#39;t hate us for linking it
***</li>
</ul>

<h3><a href="http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins" rel="nofollow">Expand FreeNAS with plugins</a></h3>

<ul>
<li>One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework</li>
<li>With these plugins, you can greatly expand the feature set of your NAS via third party programs</li>
<li>This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience</li>
<li>Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more</li>
<li>It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***</li>
</ul>

<h2>Interview - Karl Lehenbauer - <a href="mailto:karl@flightaware.com" rel="nofollow">karl@flightaware.com</a> / <a href="https://twitter.com/flightaware" rel="nofollow">@flightaware</a></h2>

<p>FreeBSD at FlightAware, BSD history, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">Ports and packages in OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html" rel="nofollow">Code review culture meets FreeBSD</a></h3>

<ul>
<li>In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree</li>
<li>This article describes Phabricator, an open source code review system that we briefly mentioned last week</li>
<li>Instructions for using it are on <a href="https://wiki.freebsd.org/CodeReview" rel="nofollow">the wiki</a></li>
<li>While not approved by the core team yet for anything official, it&#39;s in a testing phase and developers are encouraged to try it out and get their patches reviewed</li>
<li><a href="http://phabric.freebsd.org/" rel="nofollow">Just look at that fancy interface!!</a>
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2088" rel="nofollow">Upcoming BSD books</a></h3>

<ul>
<li>Sneaky MWL somehow finds his way into both our headlines and the news roundup</li>
<li>He gives us an update on the next BSD books that he&#39;s planning to release</li>
<li>The plan is to release three (or so) books based on different aspects of FreeBSD&#39;s storage system(s) - GEOM, UFS, ZFS, etc.</li>
<li>This has the advantage of only requiring you to buy the one(s) you&#39;re specifically interested in</li>
<li>&quot;When will they be released? When I&#39;m done writing them. How much will they cost? Dunno.&quot;</li>
<li>It&#39;s not Absolute FreeBSD 3rd edition...
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=VjYb9mKB4jU" rel="nofollow">CARP failover and high availability on FreeBSD</a></h3>

<ul>
<li>If you&#39;re running a cluster or a group of servers, you should have some sort of failover in place</li>
<li>But the question comes up, &quot;how do you load balance the load balancers!?&quot;</li>
<li>This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying</li>
<li>Also mentions DNS-based load balancing as another option
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time in PCBSD land, we&#39;re getting ready for the 10.0.2 release <a href="http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/" rel="nofollow">(ISOs here)</a></li>
<li>AppCafe got a good number of fixes, and now shows 10 random highlighted applications</li>
<li>EasyPBI added a &quot;bulk&quot; mode to create PBIs of an entire FreeBSD port category</li>
<li>Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205iiKiWp" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s2060bkTNl" rel="nofollow">Matt writes in</a></li>
<li><a href="http://slexy.org/view/s2G7eMC6oP" rel="nofollow">Kjell writes in</a></li>
<li><a href="http://slexy.org/view/s2REfzMFGK" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s21nvJtXY6" rel="nofollow">Tom writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>34: It's Gonna Get NASty</title>
  <link>https://www.bsdnow.tv/34</link>
  <guid isPermaLink="false">47904615-f374-468c-b27c-625dad704346</guid>
  <pubDate>Wed, 23 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/47904615-f374-468c-b27c-625dad704346.mp3" length="16314196" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, Allan's at a conference so we've got a short episode for you. We sat down with John Hixson to discuss FreeNAS development and all their future plans. The show will be back next week with a normal episode.</itunes:subtitle>
  <itunes:duration>22:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week, Allan's at a conference so we've got a short episode for you. We sat down with John Hixson to discuss FreeNAS development and all their future plans. The show will be back next week with a normal episode.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Interview - John Hixson - john@ixsystems.com (mailto:john@ixsystems.com) / @bsdwhore (https://twitter.com/bsdwhore)
FreeNAS development
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, john hixson, ixsystems, freenas, plugins, jails, development</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, Allan&#39;s at a conference so we&#39;ve got a short episode for you. We sat down with John Hixson to discuss FreeNAS development and all their future plans. The show will be back next week with a normal episode.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - John Hixson - <a href="mailto:john@ixsystems.com" rel="nofollow">john@ixsystems.com</a> / <a href="https://twitter.com/bsdwhore" rel="nofollow">@bsdwhore</a></h2>

<p>FreeNAS development</p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, Allan&#39;s at a conference so we&#39;ve got a short episode for you. We sat down with John Hixson to discuss FreeNAS development and all their future plans. The show will be back next week with a normal episode.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - John Hixson - <a href="mailto:john@ixsystems.com" rel="nofollow">john@ixsystems.com</a> / <a href="https://twitter.com/bsdwhore" rel="nofollow">@bsdwhore</a></h2>

<p>FreeNAS development</p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>32: PXE Dust</title>
  <link>https://www.bsdnow.tv/32</link>
  <guid isPermaLink="false">a909eddb-036d-451c-8d5a-e7b8e358239f</guid>
  <pubDate>Wed, 09 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a909eddb-036d-451c-8d5a-e7b8e358239f.mp3" length="55324948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the big show we'll be showing off OpenBSD's new "autoinstall" feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it's the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:16:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the big show we'll be showing off OpenBSD's new "autoinstall" feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it's the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD ASLR status update (http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress)
Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD
He's implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)
Work has also started on testing ASLR on ARM, using a Raspberry Pi
He's giving a presentation at BSDCan this year about his ASLR work
While we're on the topic of BSDCan...
***
BSDCan tutorials, improving the experience (http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html)
Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials
The tutorials are called "Building the network you need with PF, the OpenBSD packet filter" and "Transitioning to OpenBSD 5.5" - both scheduled to last three hours each
He's requesting anyone that'll be there to go ahead and contact him, telling him exactly what you'd like to learn
There's also a bit of background information about the tutorials and how he's looking to improve them
If you're interested in OpenBSD and going to BSDCan this year, hit him up
***
pkgsrc-2014Q1 released (http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html)
The new stable branch of pkgsrc packages has been built and is ready
Python 3.3 is now a "first class citizen" in pkgsrc
14255 packages for NetBSD-current/x8664, 11233 binary packages built with clang for FreeBSD 10/x8664
There's a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined
They're also looking into signing packages (http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html)
***
Only two holes in a heck of a long time, who cares? (https://www.mail-archive.com/misc%40openbsd.org/index.html#127993)
A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list
He questions "what's the big deal" about OpenBSD's slogan being "Only two remote holes in the default install, in a heck of a long time!"
Luckily, the community and Theo set the record straight (https://www.mail-archive.com/misc%40openbsd.org/msg128001.html) about why you should care about this
Running insecure applications on OpenBSD is actually more secure than running them on other systems, due to things like ASLR, PIE and all the security features (https://www.mail-archive.com/misc%40openbsd.org/msg127995.html) of OpenBSD
It spawned a discussion about ease of management and Linux's poor security record, definitely worth reading (https://www.mail-archive.com/misc%40openbsd.org/msg128073.html)
***
Interview - Dru Lavigne - dru@freebsd.org (mailto:dru@freebsd.org) / @bsdevents (https://twitter.com/bsdevents)
FreeBSD's documentation printing, documentation springs, various topics
Tutorial
Automatic, unattended OpenBSD installs with PXE (http://www.bsdnow.tv/tutorials/autoinstall)
News Roundup
pfSense 2.1.1 released (https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes)
A new version of pfSense is released, mainly to fix some security issues
Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router
There are also some NIC driver updates and other things (https://blog.pfsense.org/?p=1238)
Of course if you want to learn more about pfSense, watch episode 25 (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense)
2.1.2 is already up for testing too
***
FreeBSD gets UEFI support (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=264095)
It looks like FreeBSD's battle with UEFI may be coming to a close?
Ed Maste committed a giant list of patches to enable UEFI support on x86_64
Look through the list to see all the details and information
Thanks FreeBSD foundation!
***
Ideas for the next DragonflyBSD release (http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html)
Mr. Dragonfly release engineer himself, Justin Sherrill (http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug) posts some of his ideas for the upcoming release
They're aiming for late May for the next version
Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support
Gasp, they're even considering dropping i386
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/)
Lots of new PBI updates for 10.0, new runtime implementation
New support for running 32 bit applications in PBI runtime
New default CD and DVD player, umplayer
Latest GNOME 3 and Cinnamon merged, new edge package builds
***
Feedback/Questions
Remy writes in (http://slexy.org/view/s273oSezFs)
Jan writes in (http://slexy.org/view/s2I3H1HsVb)
Eddie writes in (http://slexy.org/view/s2wUTRowzU)
Zen writes in (http://slexy.org/view/s2RA0whmwz)
Sean writes in (http://slexy.org/view/s2pwE20Ov6)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pxe, pxeboot, autoinstall, dru lavigne, documentation, sprints, handbook, printed, bsdcan, aslr, arm, desktop, linux, games, ports, stable, pkgsrc, aslr, security, pie, branch, ports, pkgng, freenas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the big show we&#39;ll be showing off OpenBSD&#39;s new &quot;autoinstall&quot; feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it&#39;s the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress" rel="nofollow">FreeBSD ASLR status update</a></h3>

<ul>
<li>Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD</li>
<li>He&#39;s implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)</li>
<li>Work has also started on testing ASLR on ARM, using a Raspberry Pi</li>
<li>He&#39;s giving a presentation at BSDCan this year about his ASLR work</li>
<li>While we&#39;re on the topic of BSDCan...
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html" rel="nofollow">BSDCan tutorials, improving the experience</a></h3>

<ul>
<li>Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials</li>
<li>The tutorials are called &quot;Building the network you need with PF, the OpenBSD packet filter&quot; and &quot;Transitioning to OpenBSD 5.5&quot; - both scheduled to last three hours each</li>
<li>He&#39;s requesting anyone that&#39;ll be there to go ahead and contact him, telling him exactly what you&#39;d like to learn</li>
<li>There&#39;s also a bit of background information about the tutorials and how he&#39;s looking to improve them</li>
<li>If you&#39;re interested in OpenBSD and going to BSDCan this year, hit him up
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html" rel="nofollow">pkgsrc-2014Q1 released</a></h3>

<ul>
<li>The new stable branch of pkgsrc packages has been built and is ready</li>
<li>Python 3.3 is now a &quot;first class citizen&quot; in pkgsrc</li>
<li>14255 packages for NetBSD-current/x86_64, 11233 binary packages built with clang for FreeBSD 10/x86_64</li>
<li>There&#39;s a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined</li>
<li>They&#39;re also looking into <a href="http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html" rel="nofollow">signing packages</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc%40openbsd.org/index.html#127993" rel="nofollow">Only two holes in a heck of a long time, who cares?</a></h3>

<ul>
<li>A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list</li>
<li>He questions &quot;what&#39;s the big deal&quot; about OpenBSD&#39;s slogan being &quot;Only two remote holes in the default install, in a heck of a long time!&quot;</li>
<li>Luckily, the community and Theo <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128001.html" rel="nofollow">set the record straight</a> about why you should care about this</li>
<li>Running insecure applications on OpenBSD is actually <strong>more</strong> secure than running them on other systems, due to things like ASLR, PIE and all the <a href="https://www.mail-archive.com/misc%40openbsd.org/msg127995.html" rel="nofollow">security features</a> of OpenBSD</li>
<li>It spawned a discussion about ease of management and Linux&#39;s poor security record, definitely <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128073.html" rel="nofollow">worth reading</a>
***</li>
</ul>

<h2>Interview - Dru Lavigne - <a href="mailto:dru@freebsd.org" rel="nofollow">dru@freebsd.org</a> / <a href="https://twitter.com/bsdevents" rel="nofollow">@bsdevents</a></h2>

<p>FreeBSD&#39;s documentation printing, documentation springs, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">Automatic, unattended OpenBSD installs with PXE</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense 2.1.1 released</a></h3>

<ul>
<li>A new version of pfSense is released, mainly to fix some security issues</li>
<li>Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router</li>
<li>There are also some NIC driver updates <a href="https://blog.pfsense.org/?p=1238" rel="nofollow">and other things</a></li>
<li>Of course if you want to learn more about pfSense, watch <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">episode 25</a></li>
<li>2.1.2 is already up for testing too
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=264095" rel="nofollow">FreeBSD gets UEFI support</a></h3>

<ul>
<li>It looks like FreeBSD&#39;s battle with UEFI may be coming to a close?</li>
<li>Ed Maste committed a giant list of patches to enable UEFI support on x86_64</li>
<li>Look through the list to see all the details and information</li>
<li>Thanks FreeBSD foundation!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html" rel="nofollow">Ideas for the next DragonflyBSD release</a></h3>

<ul>
<li>Mr. Dragonfly release engineer himself, <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherrill</a> posts some of his ideas for the upcoming release</li>
<li>They&#39;re aiming for late May for the next version</li>
<li>Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support</li>
<li>Gasp, they&#39;re even considering dropping i386
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of new PBI updates for 10.0, new runtime implementation</li>
<li>New support for running 32 bit applications in PBI runtime</li>
<li>New default CD and DVD player, umplayer</li>
<li>Latest GNOME 3 and Cinnamon merged, new edge package builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s273oSezFs" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2I3H1HsVb" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s2wUTRowzU" rel="nofollow">Eddie writes in</a></li>
<li><a href="http://slexy.org/view/s2RA0whmwz" rel="nofollow">Zen writes in</a></li>
<li><a href="http://slexy.org/view/s2pwE20Ov6" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the big show we&#39;ll be showing off OpenBSD&#39;s new &quot;autoinstall&quot; feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it&#39;s the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress" rel="nofollow">FreeBSD ASLR status update</a></h3>

<ul>
<li>Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD</li>
<li>He&#39;s implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)</li>
<li>Work has also started on testing ASLR on ARM, using a Raspberry Pi</li>
<li>He&#39;s giving a presentation at BSDCan this year about his ASLR work</li>
<li>While we&#39;re on the topic of BSDCan...
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html" rel="nofollow">BSDCan tutorials, improving the experience</a></h3>

<ul>
<li>Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials</li>
<li>The tutorials are called &quot;Building the network you need with PF, the OpenBSD packet filter&quot; and &quot;Transitioning to OpenBSD 5.5&quot; - both scheduled to last three hours each</li>
<li>He&#39;s requesting anyone that&#39;ll be there to go ahead and contact him, telling him exactly what you&#39;d like to learn</li>
<li>There&#39;s also a bit of background information about the tutorials and how he&#39;s looking to improve them</li>
<li>If you&#39;re interested in OpenBSD and going to BSDCan this year, hit him up
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html" rel="nofollow">pkgsrc-2014Q1 released</a></h3>

<ul>
<li>The new stable branch of pkgsrc packages has been built and is ready</li>
<li>Python 3.3 is now a &quot;first class citizen&quot; in pkgsrc</li>
<li>14255 packages for NetBSD-current/x86_64, 11233 binary packages built with clang for FreeBSD 10/x86_64</li>
<li>There&#39;s a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined</li>
<li>They&#39;re also looking into <a href="http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html" rel="nofollow">signing packages</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc%40openbsd.org/index.html#127993" rel="nofollow">Only two holes in a heck of a long time, who cares?</a></h3>

<ul>
<li>A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list</li>
<li>He questions &quot;what&#39;s the big deal&quot; about OpenBSD&#39;s slogan being &quot;Only two remote holes in the default install, in a heck of a long time!&quot;</li>
<li>Luckily, the community and Theo <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128001.html" rel="nofollow">set the record straight</a> about why you should care about this</li>
<li>Running insecure applications on OpenBSD is actually <strong>more</strong> secure than running them on other systems, due to things like ASLR, PIE and all the <a href="https://www.mail-archive.com/misc%40openbsd.org/msg127995.html" rel="nofollow">security features</a> of OpenBSD</li>
<li>It spawned a discussion about ease of management and Linux&#39;s poor security record, definitely <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128073.html" rel="nofollow">worth reading</a>
***</li>
</ul>

<h2>Interview - Dru Lavigne - <a href="mailto:dru@freebsd.org" rel="nofollow">dru@freebsd.org</a> / <a href="https://twitter.com/bsdevents" rel="nofollow">@bsdevents</a></h2>

<p>FreeBSD&#39;s documentation printing, documentation springs, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">Automatic, unattended OpenBSD installs with PXE</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense 2.1.1 released</a></h3>

<ul>
<li>A new version of pfSense is released, mainly to fix some security issues</li>
<li>Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router</li>
<li>There are also some NIC driver updates <a href="https://blog.pfsense.org/?p=1238" rel="nofollow">and other things</a></li>
<li>Of course if you want to learn more about pfSense, watch <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">episode 25</a></li>
<li>2.1.2 is already up for testing too
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=264095" rel="nofollow">FreeBSD gets UEFI support</a></h3>

<ul>
<li>It looks like FreeBSD&#39;s battle with UEFI may be coming to a close?</li>
<li>Ed Maste committed a giant list of patches to enable UEFI support on x86_64</li>
<li>Look through the list to see all the details and information</li>
<li>Thanks FreeBSD foundation!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html" rel="nofollow">Ideas for the next DragonflyBSD release</a></h3>

<ul>
<li>Mr. Dragonfly release engineer himself, <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherrill</a> posts some of his ideas for the upcoming release</li>
<li>They&#39;re aiming for late May for the next version</li>
<li>Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support</li>
<li>Gasp, they&#39;re even considering dropping i386
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of new PBI updates for 10.0, new runtime implementation</li>
<li>New support for running 32 bit applications in PBI runtime</li>
<li>New default CD and DVD player, umplayer</li>
<li>Latest GNOME 3 and Cinnamon merged, new edge package builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s273oSezFs" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2I3H1HsVb" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s2wUTRowzU" rel="nofollow">Eddie writes in</a></li>
<li><a href="http://slexy.org/view/s2RA0whmwz" rel="nofollow">Zen writes in</a></li>
<li><a href="http://slexy.org/view/s2pwE20Ov6" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>30: Documentation is King</title>
  <link>https://www.bsdnow.tv/30</link>
  <guid isPermaLink="false">ab836072-6c9b-4d13-9011-8d9ddf4294e7</guid>
  <pubDate>Wed, 26 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ab836072-6c9b-4d13-9011-8d9ddf4294e7.mp3" length="59694113" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Finally hit 30 episodes! Today we'll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you've ever wondered about the scary world of mailing lists, today's tutorial will show you the basics of how to get help and contribute back. There's lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Finally hit 30 episodes! Today we'll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you've ever wondered about the scary world of mailing lists, today's tutorial will show you the basics of how to get help and contribute back. There's lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
OpenBSD on a Sun T5120 (http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120)
Our buddy Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) got himself a cool Sun box
Of course he had to write a post about installing and running OpenBSD on it
The post goes through some of the quirks and steps to go through in case you're interested in one of these fine SPARC machines
He's also got another post about OpenBSD on a Dell CS24-SC server (http://www.tedunangst.com/flak/post/Dell-CS24-SC-server)
***
Bhyvecon 2014 videos are up (https://www.youtube.com/results?search_query=bhyvecon%20tokyo&amp;amp;sm=3)
Like we mentioned last week, Bhyvecon (http://bhyvecon.org/) was an almost-impromptu conference before AsiaBSDCon
The talks have apparently already been uploaded!
Subjects include Bhyve's past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization
Lots more detail in the videos, so check 'em all out
***
Building a FreeBSD wireless access point (http://blog.khubla.com/freebsd/building-my-own-wireless-point)
We've got a new blog post about creating a wireless access point with FreeBSD
After all the recent news of consumer routers being pwned like candy, it's time for people to start building BSD routers (http://www.bsdnow.tv/tutorials/openbsd-router)
The author goes through a lot of the process of getting one set up using good ol' FreeBSD
Using hostapd, he's able to share his wireless card in hostap mode and offer DHCP to all the clients
Plenty of config files and more messy details in the post
***
Switching from Synology to FreeNAS (http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/)
The author has been considering getting a NAS for quite a while and documents his research
He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY
After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice
The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***
Interview - Warren Block - wblock@freebsd.org (mailto:wblock@freebsd.org)
FreeBSD's documentation project, igor, doceng
Tutorial
The world of BSD mailing lists (http://www.bsdnow.tv/tutorials/mailing-lists)
News Roundup
HAMMER2 work and notes (http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html)
Matthew Dillon has posted some updated notes about the development of the new HAMMER version
The start of a cluster API was committed to the tree
There are also links to design document, a freemap design document, a changes list and a todo list
***
BSD Breaking Barriers (https://www.youtube.com/watch?v=buo5JlMnGPI)
Our friend MWL (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) gave a talk at NYCBSDCon about BSD "breaking barriers"
"What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We'll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years."
He also has another upcoming talk, (or "webcast") called "Beyond Security: Getting to Know OpenBSD's Real Purpose (http://oreillynet.com/pub/e/3059)"
"OpenBSD is frequently billed as a high-security operating system. That's true, but security isn't the OpenBSD Project's main goal. This webcast will introduce systems administrators to OpenBSD, explain the project's mission, and discuss the features and benefits."
It's on May 27th and will hopefully be recorded
***
FreeBSD in a chroot (http://dreamcat4.github.io/finch/)
Finch, "FreeBSD running IN a CHroot," is a new project
It's a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)
All the details and some interesting use cases are on the github page
He really needs to change the project name (https://www.freshports.org/net-im/finch) though
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/)
Lots of bugfixes for PCBSD coming down the tubes
LZ4 compression is now enabled by default on the whole pool
The latest 10-STABLE has been imported and builds are going
Also the latest GNOME and Cinnamon builds have been imported and much more
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s20SlvTcwd) (IRC suggests md5deep)
Don writes in (http://slexy.org/view/s2PeMqXFid)
kaltheat writes in (http://slexy.org/view/s21yii6KZe) (We use R0DE Podcast microphones and Logitech C920 HD webcams)
Harri writes in (http://slexy.org/view/s21SkX19Cp)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, rtfm, mailing lists, lists, documentation, doceng, igor, man pages, manpages, wireless, access point, wap, router, pfsense, sun, t5120, dell, cs24-c, server, bhyve, bhyvecon, asiabsdcon, 2014, synology, freenas, ixsystems, megaport, foundation, rack, datacenter, mail, hammer, hammer2, hammerfs, fs, filesystem, rump kernels</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Finally hit 30 episodes! Today we&#39;ll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you&#39;ve ever wondered about the scary world of mailing lists, today&#39;s tutorial will show you the basics of how to get help and contribute back. There&#39;s lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120" rel="nofollow">OpenBSD on a Sun T5120</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> got himself a cool Sun box</li>
<li>Of course he had to write a post about installing and running OpenBSD on it</li>
<li>The post goes through some of the quirks and steps to go through in case you&#39;re interested in one of these fine SPARC machines</li>
<li>He&#39;s also got another post about OpenBSD on a <a href="http://www.tedunangst.com/flak/post/Dell-CS24-SC-server" rel="nofollow">Dell CS24-SC server</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/results?search_query=bhyvecon%20tokyo&sm=3" rel="nofollow">Bhyvecon 2014 videos are up</a></h3>

<ul>
<li>Like we mentioned last week, <a href="http://bhyvecon.org/" rel="nofollow">Bhyvecon</a> was an almost-impromptu conference before AsiaBSDCon</li>
<li>The talks have apparently already been uploaded!</li>
<li>Subjects include Bhyve&#39;s past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization</li>
<li>Lots more detail in the videos, so check &#39;em all out
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/building-my-own-wireless-point" rel="nofollow">Building a FreeBSD wireless access point</a></h3>

<ul>
<li>We&#39;ve got a new blog post about creating a wireless access point with FreeBSD</li>
<li>After all the recent news of consumer routers being pwned like candy, it&#39;s time for people to start building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">BSD routers</a></li>
<li>The author goes through a lot of the process of getting one set up using good ol&#39; FreeBSD</li>
<li>Using hostapd, he&#39;s able to share his wireless card in hostap mode and offer DHCP to all the clients</li>
<li>Plenty of config files and more messy details in the post
***</li>
</ul>

<h3><a href="http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/" rel="nofollow">Switching from Synology to FreeNAS</a></h3>

<ul>
<li>The author has been considering getting a NAS for quite a while and documents his research</li>
<li>He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY</li>
<li>After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice</li>
<li>The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***</li>
</ul>

<h2>Interview - Warren Block - <a href="mailto:wblock@freebsd.org" rel="nofollow">wblock@freebsd.org</a></h2>

<p>FreeBSD&#39;s documentation project, igor, doceng</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/mailing-lists" rel="nofollow">The world of BSD mailing lists</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html" rel="nofollow">HAMMER2 work and notes</a></h3>

<ul>
<li>Matthew Dillon has posted some updated notes about the development of the new HAMMER version</li>
<li>The start of a cluster API was committed to the tree</li>
<li>There are also links to design document, a freemap design document, a changes list and a todo list
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">BSD Breaking Barriers</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> gave a talk at NYCBSDCon about BSD &quot;breaking barriers&quot;</li>
<li>&quot;What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We&#39;ll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years.&quot;</li>
<li>He also has another upcoming talk, (or &quot;webcast&quot;) called &quot;<a href="http://oreillynet.com/pub/e/3059" rel="nofollow">Beyond Security: Getting to Know OpenBSD&#39;s Real Purpose</a>&quot;</li>
<li>&quot;OpenBSD is frequently billed as a high-security operating system. That&#39;s true, but security isn&#39;t the OpenBSD Project&#39;s main goal. This webcast will introduce systems administrators to OpenBSD, explain the project&#39;s mission, and discuss the features and benefits.&quot;</li>
<li>It&#39;s on May 27th and will hopefully be recorded
***</li>
</ul>

<h3><a href="http://dreamcat4.github.io/finch/" rel="nofollow">FreeBSD in a chroot</a></h3>

<ul>
<li>Finch, &quot;FreeBSD running IN a CHroot,&quot; is a new project</li>
<li>It&#39;s a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)</li>
<li>All the details and some interesting use cases are on the github page</li>
<li>He really needs to <a href="https://www.freshports.org/net-im/finch" rel="nofollow">change the project name</a> though
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of bugfixes for PCBSD coming down the tubes</li>
<li>LZ4 compression is now enabled by default on the whole pool</li>
<li>The latest 10-STABLE has been imported and builds are going</li>
<li>Also the latest GNOME and Cinnamon builds have been imported and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20SlvTcwd" rel="nofollow">Bostjan writes in</a> (IRC suggests md5deep)</li>
<li><a href="http://slexy.org/view/s2PeMqXFid" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s21yii6KZe" rel="nofollow">kaltheat writes in</a> (We use R0DE Podcast microphones and Logitech C920 HD webcams)</li>
<li><a href="http://slexy.org/view/s21SkX19Cp" rel="nofollow">Harri writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Finally hit 30 episodes! Today we&#39;ll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you&#39;ve ever wondered about the scary world of mailing lists, today&#39;s tutorial will show you the basics of how to get help and contribute back. There&#39;s lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120" rel="nofollow">OpenBSD on a Sun T5120</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> got himself a cool Sun box</li>
<li>Of course he had to write a post about installing and running OpenBSD on it</li>
<li>The post goes through some of the quirks and steps to go through in case you&#39;re interested in one of these fine SPARC machines</li>
<li>He&#39;s also got another post about OpenBSD on a <a href="http://www.tedunangst.com/flak/post/Dell-CS24-SC-server" rel="nofollow">Dell CS24-SC server</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/results?search_query=bhyvecon%20tokyo&sm=3" rel="nofollow">Bhyvecon 2014 videos are up</a></h3>

<ul>
<li>Like we mentioned last week, <a href="http://bhyvecon.org/" rel="nofollow">Bhyvecon</a> was an almost-impromptu conference before AsiaBSDCon</li>
<li>The talks have apparently already been uploaded!</li>
<li>Subjects include Bhyve&#39;s past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization</li>
<li>Lots more detail in the videos, so check &#39;em all out
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/building-my-own-wireless-point" rel="nofollow">Building a FreeBSD wireless access point</a></h3>

<ul>
<li>We&#39;ve got a new blog post about creating a wireless access point with FreeBSD</li>
<li>After all the recent news of consumer routers being pwned like candy, it&#39;s time for people to start building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">BSD routers</a></li>
<li>The author goes through a lot of the process of getting one set up using good ol&#39; FreeBSD</li>
<li>Using hostapd, he&#39;s able to share his wireless card in hostap mode and offer DHCP to all the clients</li>
<li>Plenty of config files and more messy details in the post
***</li>
</ul>

<h3><a href="http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/" rel="nofollow">Switching from Synology to FreeNAS</a></h3>

<ul>
<li>The author has been considering getting a NAS for quite a while and documents his research</li>
<li>He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY</li>
<li>After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice</li>
<li>The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***</li>
</ul>

<h2>Interview - Warren Block - <a href="mailto:wblock@freebsd.org" rel="nofollow">wblock@freebsd.org</a></h2>

<p>FreeBSD&#39;s documentation project, igor, doceng</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/mailing-lists" rel="nofollow">The world of BSD mailing lists</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html" rel="nofollow">HAMMER2 work and notes</a></h3>

<ul>
<li>Matthew Dillon has posted some updated notes about the development of the new HAMMER version</li>
<li>The start of a cluster API was committed to the tree</li>
<li>There are also links to design document, a freemap design document, a changes list and a todo list
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">BSD Breaking Barriers</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> gave a talk at NYCBSDCon about BSD &quot;breaking barriers&quot;</li>
<li>&quot;What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We&#39;ll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years.&quot;</li>
<li>He also has another upcoming talk, (or &quot;webcast&quot;) called &quot;<a href="http://oreillynet.com/pub/e/3059" rel="nofollow">Beyond Security: Getting to Know OpenBSD&#39;s Real Purpose</a>&quot;</li>
<li>&quot;OpenBSD is frequently billed as a high-security operating system. That&#39;s true, but security isn&#39;t the OpenBSD Project&#39;s main goal. This webcast will introduce systems administrators to OpenBSD, explain the project&#39;s mission, and discuss the features and benefits.&quot;</li>
<li>It&#39;s on May 27th and will hopefully be recorded
***</li>
</ul>

<h3><a href="http://dreamcat4.github.io/finch/" rel="nofollow">FreeBSD in a chroot</a></h3>

<ul>
<li>Finch, &quot;FreeBSD running IN a CHroot,&quot; is a new project</li>
<li>It&#39;s a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)</li>
<li>All the details and some interesting use cases are on the github page</li>
<li>He really needs to <a href="https://www.freshports.org/net-im/finch" rel="nofollow">change the project name</a> though
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of bugfixes for PCBSD coming down the tubes</li>
<li>LZ4 compression is now enabled by default on the whole pool</li>
<li>The latest 10-STABLE has been imported and builds are going</li>
<li>Also the latest GNOME and Cinnamon builds have been imported and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20SlvTcwd" rel="nofollow">Bostjan writes in</a> (IRC suggests md5deep)</li>
<li><a href="http://slexy.org/view/s2PeMqXFid" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s21yii6KZe" rel="nofollow">kaltheat writes in</a> (We use R0DE Podcast microphones and Logitech C920 HD webcams)</li>
<li><a href="http://slexy.org/view/s21SkX19Cp" rel="nofollow">Harri writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>21: Tendresse for Ten</title>
  <link>https://www.bsdnow.tv/21</link>
  <guid isPermaLink="false">353e6a60-9bd0-494f-ac34-4337e3dfa734</guid>
  <pubDate>Wed, 22 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/353e6a60-9bd0-494f-ac34-4337e3dfa734.mp3" length="77103576" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we've got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it's finally here! We're gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we'll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We've got a round of your questions and the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:47:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we've got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it's finally here! We're gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we'll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We've got a round of your questions and the latest news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD 10.0-RELEASE is out (https://www.freebsd.org/releases/10.0R/announce.html)
The long awaited, giant release of FreeBSD is now official and ready to be downloaded (http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.0/)
One of the biggest releases in FreeBSD history, with tons of new updates
Some features include: LDNS/Unbound replacing BIND, Clang by default (no GCC anymore), native Raspberry Pi support and other ARM improvements, bhyve, hyper-v support, AMD KMS, VirtIO, Xen PVHVM in GENERIC, lots of driver updates, ZFS on root in the installer, SMP patches to pf that drastically improve performance, Netmap support, pkgng by default, wireless stack improvements, a new iSCSI stack, FUSE in the base system... the list goes on and on (https://www.freebsd.org/releases/10.0R/relnotes.html)
Start up your freebsd-update or do a source-based upgrade
***
OpenSSH 6.5 CFT (https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/031987.html)
Our buddy Damien Miller (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) announced a Call For Testing for OpenSSH 6.5
Huge, huge release, focused on new features rather than bugfixes (but it includes those too)
New ciphers, new key formats, new config options, see the mailing list for all the details
Should be in OpenBSD 5.5 in May, look forward to it - but also help test on other platforms!
***
DIY NAS story, FreeNAS 9.2.1-BETA (http://blog.brianmoses.net/2014/01/diy-nas-2014-edition.html)
Another new blog post about FreeNAS!
Instead of updating the older tutorials, the author started fresh and wrote a new one for 2014
"I did briefly consider suggesting nas4free for the EconoNAS blog, since it’s essentially a fork off the FreeNAS tree but may run better on slower hardware, but ultimately I couldn’t recommend anything other than FreeNAS"
Really long article with lots of nice details about his setup, why you might want a NAS, etc.
Speaking of FreeNAS, they released 9.2.1-BETA (http://www.freenas.org/whats-new/2014/01/freenas-9-2-1-beta-now-ready-for-download.html) with lots of bugfixes
***
OpenBSD needed funding for electricity.. and they got it (https://news.ycombinator.com/item?id=7069889)
Briefly mentioned at the end of last week's show, but has blown up over the internet since
OpenBSD in the headlines of major tech news sites: slashdot, zdnet, the register, hacker news, reddit, twitter.. thousands of comments
They needed about $20,000 to cover electric costs for the server rack in Theo's basement (http://www.openbsd.org/images/rack2009.jpg)
Lots of positive reaction from the community helping out so far, and it appears they have reached their goal (http://www.openbsdfoundation.org/campaign2104.html) and got $100,000 in donations
From Bob Beck: "we have in one week gone from being in a dire situation to having a commitment of approximately $100,000 in donations to the foundation"
This is a shining example of the BSD community coming together, and even the Linux people realizing how critical BSD is to the world at large
***
Interview - Colin Percival - cperciva@freebsd.org (mailto:cperciva@freebsd.org) / @cperciva (https://twitter.com/cperciva)
FreeBSD on Amazon EC2 (http://www.daemonology.net/freebsd-on-ec2/), backups with Tarsnap (https://www.tarsnap.com/), 10.0-RELEASE, various topics
Tutorial
Bandwidth monitoring and testing (http://www.bsdnow.tv/tutorials/vnstat-iperf)
News Roundup
pfSense talk at Tokyo FreeBSD Benkyoukai (https://blog.pfsense.org/?p=1176)
Isaac Levy will be presenting "pfSense Practical Experiences: from home routers, to High-Availability Datacenter Deployments"
He's also going to be looking for help to translate the pfSense documentation into Japanese
The event is on February 17, 2014 if you're in the Tokyo area
***
m0n0wall 1.8.1 released (http://m0n0.ch/wall/downloads.php)
For those who don't know, m0n0wall is an older BSD-based firewall OS that's mostly focused on embedded applications
pfSense was forked from it in 2004, and has a lot more active development now
They switched to FreeBSD 8.4 for this new version
Full list of updates in the changelog
This version requires at least 128MB RAM and a disk/CF size of 32MB or more, oh no!
***
Ansible and PF, plus NTP (http://blather.michaelwlucas.com/archives/1933)
Another blog post from our buddy Michael Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop)
There've been some NTP amplification attacks recently (https://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc) in the news
The post describes how he configured ntpd on a lot of servers without a lot of work
He leverages pf and ansible for the configuration
OpenNTPD is, not surprisingly, unaffected - use it
***
ruBSD videos online (http://undeadly.org/cgi?action=article&amp;amp;sid=20140115054839)
Just a quick followup from a few weeks ago
Theo and Henning's talks from ruBSD are now available for download
There's also a nice interview with Theo
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-5/)
10.0-RC4 images are available
Wine PBI is now available for 10
9.2 systems will now be able to upgrade to version 10 and keep their PBI library
***
Feedback/Questions
Sha'ul writes in (http://slexy.org/view/s2WQXwMASZ)
Kjell-Aleksander writes in (http://slexy.org/view/s2H0FURAtZ)
Mike writes in (http://slexy.org/view/s21eKKPgqh)
Charlie writes in (and gets a reply) (http://slexy.org/view/s21UMLnV0G)
Kevin writes in (http://slexy.org/view/s2SuazcfoR)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ec2, colin percival, cperciva, amazon, cloud, aws, instance, vm, virtual machine, xen, hypervisor, generic, 10.0, in the cloud, custom kernel, tarsnap, backup, backups, encrypted, dropbox, offsite, off site, crashplan, vnstat, iperf, performance, network, sysctl, throughput, speed, download, upload, check, test, freenas, m0n0wall, pfsense, zfs, vfs, tokyo, benkyokai, benkyoukai, ansible, nas, freenas, pf, ntp, openntpd, vulnerability, ntpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ve got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it&#39;s finally here! We&#39;re gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we&#39;ll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We&#39;ve got a round of your questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/10.0R/announce.html" rel="nofollow">FreeBSD 10.0-RELEASE is out</a></h3>

<ul>
<li>The long awaited, giant release of FreeBSD is now official and <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.0/" rel="nofollow">ready to be downloaded</a></li>
<li>One of the biggest releases in FreeBSD history, with tons of new updates</li>
<li>Some features include: LDNS/Unbound replacing BIND, Clang by default (no GCC anymore), native Raspberry Pi support and other ARM improvements, bhyve, hyper-v support, AMD KMS, VirtIO, Xen PVHVM in GENERIC, lots of driver updates, ZFS on root in the installer, SMP patches to pf that drastically improve performance, Netmap support, pkgng by default, wireless stack improvements, a new iSCSI stack, FUSE in the base system... <a href="https://www.freebsd.org/releases/10.0R/relnotes.html" rel="nofollow">the list goes on and on</a></li>
<li>Start up your freebsd-update or do a source-based upgrade
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/031987.html" rel="nofollow">OpenSSH 6.5 CFT</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> announced a Call For Testing for OpenSSH 6.5</li>
<li>Huge, huge release, focused on new features rather than bugfixes (but it includes those too)</li>
<li>New ciphers, new key formats, new config options, see the mailing list for all the details</li>
<li>Should be in OpenBSD 5.5 in May, look forward to it - but also help test on other platforms!
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/01/diy-nas-2014-edition.html" rel="nofollow">DIY NAS story, FreeNAS 9.2.1-BETA</a></h3>

<ul>
<li>Another new blog post about FreeNAS!</li>
<li>Instead of updating the older tutorials, the author started fresh and wrote a new one for 2014</li>
<li>&quot;I did briefly consider suggesting nas4free for the EconoNAS blog, since it’s essentially a fork off the FreeNAS tree but may run better on slower hardware, but ultimately I couldn’t recommend anything other than FreeNAS&quot;</li>
<li>Really long article with lots of nice details about his setup, why you might want a NAS, etc.</li>
<li>Speaking of FreeNAS, they released <a href="http://www.freenas.org/whats-new/2014/01/freenas-9-2-1-beta-now-ready-for-download.html" rel="nofollow">9.2.1-BETA</a> with lots of bugfixes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=7069889" rel="nofollow">OpenBSD needed funding for electricity.. and they got it</a></h3>

<ul>
<li>Briefly mentioned at the end of last week&#39;s show, but has blown up over the internet since</li>
<li>OpenBSD in the headlines of major tech news sites: slashdot, zdnet, the register, hacker news, reddit, twitter.. thousands of comments</li>
<li>They needed about $20,000 to cover electric costs for the <a href="http://www.openbsd.org/images/rack2009.jpg" rel="nofollow">server rack in Theo&#39;s basement</a></li>
<li>Lots of positive reaction from the community helping out so far, and it appears they have <a href="http://www.openbsdfoundation.org/campaign2104.html" rel="nofollow">reached their goal</a> and got $100,000 in donations</li>
<li>From Bob Beck: &quot;we have in one week gone from being in a dire situation to having a commitment of approximately $100,000 in donations to the foundation&quot;</li>
<li>This is a shining example of the BSD community coming together, and even the Linux people realizing how critical BSD is to the world at large
***</li>
</ul>

<h2>Interview - Colin Percival - <a href="mailto:cperciva@freebsd.org" rel="nofollow">cperciva@freebsd.org</a> / <a href="https://twitter.com/cperciva" rel="nofollow">@cperciva</a></h2>

<p>FreeBSD <a href="http://www.daemonology.net/freebsd-on-ec2/" rel="nofollow">on Amazon EC2</a>, backups with <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a>, 10.0-RELEASE, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">Bandwidth monitoring and testing</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.pfsense.org/?p=1176" rel="nofollow">pfSense talk at Tokyo FreeBSD Benkyoukai</a></h3>

<ul>
<li>Isaac Levy will be presenting &quot;pfSense Practical Experiences: from home routers, to High-Availability Datacenter Deployments&quot;</li>
<li>He&#39;s also going to be looking for help to translate the pfSense documentation into Japanese</li>
<li>The event is on February 17, 2014 if you&#39;re in the Tokyo area
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/downloads.php" rel="nofollow">m0n0wall 1.8.1 released</a></h3>

<ul>
<li>For those who don&#39;t know, m0n0wall is an older BSD-based firewall OS that&#39;s mostly focused on embedded applications</li>
<li>pfSense was forked from it in 2004, and has a lot more active development now</li>
<li>They switched to FreeBSD 8.4 for this new version</li>
<li>Full list of updates in the changelog</li>
<li>This version requires at least 128MB RAM and a disk/CF size of 32MB or more, oh no!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1933" rel="nofollow">Ansible and PF, plus NTP</a></h3>

<ul>
<li>Another blog post from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>There&#39;ve been some NTP amplification attacks <a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" rel="nofollow">recently</a> in the news</li>
<li>The post describes how he configured ntpd on a lot of servers without a lot of work</li>
<li>He leverages pf and ansible for the configuration</li>
<li>OpenNTPD is, not surprisingly, unaffected - use it
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140115054839" rel="nofollow">ruBSD videos online</a></h3>

<ul>
<li>Just a quick followup from a few weeks ago</li>
<li>Theo and Henning&#39;s talks from ruBSD are now available for download</li>
<li>There&#39;s also a nice interview with Theo
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-5/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 images are available</li>
<li>Wine PBI is now available for 10</li>
<li>9.2 systems will now be able to upgrade to version 10 and keep their PBI library
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2WQXwMASZ" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2H0FURAtZ" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s21eKKPgqh" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21UMLnV0G" rel="nofollow">Charlie writes in (and gets a reply)</a></li>
<li><a href="http://slexy.org/view/s2SuazcfoR" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ve got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it&#39;s finally here! We&#39;re gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we&#39;ll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We&#39;ve got a round of your questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/10.0R/announce.html" rel="nofollow">FreeBSD 10.0-RELEASE is out</a></h3>

<ul>
<li>The long awaited, giant release of FreeBSD is now official and <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.0/" rel="nofollow">ready to be downloaded</a></li>
<li>One of the biggest releases in FreeBSD history, with tons of new updates</li>
<li>Some features include: LDNS/Unbound replacing BIND, Clang by default (no GCC anymore), native Raspberry Pi support and other ARM improvements, bhyve, hyper-v support, AMD KMS, VirtIO, Xen PVHVM in GENERIC, lots of driver updates, ZFS on root in the installer, SMP patches to pf that drastically improve performance, Netmap support, pkgng by default, wireless stack improvements, a new iSCSI stack, FUSE in the base system... <a href="https://www.freebsd.org/releases/10.0R/relnotes.html" rel="nofollow">the list goes on and on</a></li>
<li>Start up your freebsd-update or do a source-based upgrade
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/031987.html" rel="nofollow">OpenSSH 6.5 CFT</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> announced a Call For Testing for OpenSSH 6.5</li>
<li>Huge, huge release, focused on new features rather than bugfixes (but it includes those too)</li>
<li>New ciphers, new key formats, new config options, see the mailing list for all the details</li>
<li>Should be in OpenBSD 5.5 in May, look forward to it - but also help test on other platforms!
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/01/diy-nas-2014-edition.html" rel="nofollow">DIY NAS story, FreeNAS 9.2.1-BETA</a></h3>

<ul>
<li>Another new blog post about FreeNAS!</li>
<li>Instead of updating the older tutorials, the author started fresh and wrote a new one for 2014</li>
<li>&quot;I did briefly consider suggesting nas4free for the EconoNAS blog, since it’s essentially a fork off the FreeNAS tree but may run better on slower hardware, but ultimately I couldn’t recommend anything other than FreeNAS&quot;</li>
<li>Really long article with lots of nice details about his setup, why you might want a NAS, etc.</li>
<li>Speaking of FreeNAS, they released <a href="http://www.freenas.org/whats-new/2014/01/freenas-9-2-1-beta-now-ready-for-download.html" rel="nofollow">9.2.1-BETA</a> with lots of bugfixes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=7069889" rel="nofollow">OpenBSD needed funding for electricity.. and they got it</a></h3>

<ul>
<li>Briefly mentioned at the end of last week&#39;s show, but has blown up over the internet since</li>
<li>OpenBSD in the headlines of major tech news sites: slashdot, zdnet, the register, hacker news, reddit, twitter.. thousands of comments</li>
<li>They needed about $20,000 to cover electric costs for the <a href="http://www.openbsd.org/images/rack2009.jpg" rel="nofollow">server rack in Theo&#39;s basement</a></li>
<li>Lots of positive reaction from the community helping out so far, and it appears they have <a href="http://www.openbsdfoundation.org/campaign2104.html" rel="nofollow">reached their goal</a> and got $100,000 in donations</li>
<li>From Bob Beck: &quot;we have in one week gone from being in a dire situation to having a commitment of approximately $100,000 in donations to the foundation&quot;</li>
<li>This is a shining example of the BSD community coming together, and even the Linux people realizing how critical BSD is to the world at large
***</li>
</ul>

<h2>Interview - Colin Percival - <a href="mailto:cperciva@freebsd.org" rel="nofollow">cperciva@freebsd.org</a> / <a href="https://twitter.com/cperciva" rel="nofollow">@cperciva</a></h2>

<p>FreeBSD <a href="http://www.daemonology.net/freebsd-on-ec2/" rel="nofollow">on Amazon EC2</a>, backups with <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a>, 10.0-RELEASE, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">Bandwidth monitoring and testing</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.pfsense.org/?p=1176" rel="nofollow">pfSense talk at Tokyo FreeBSD Benkyoukai</a></h3>

<ul>
<li>Isaac Levy will be presenting &quot;pfSense Practical Experiences: from home routers, to High-Availability Datacenter Deployments&quot;</li>
<li>He&#39;s also going to be looking for help to translate the pfSense documentation into Japanese</li>
<li>The event is on February 17, 2014 if you&#39;re in the Tokyo area
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/downloads.php" rel="nofollow">m0n0wall 1.8.1 released</a></h3>

<ul>
<li>For those who don&#39;t know, m0n0wall is an older BSD-based firewall OS that&#39;s mostly focused on embedded applications</li>
<li>pfSense was forked from it in 2004, and has a lot more active development now</li>
<li>They switched to FreeBSD 8.4 for this new version</li>
<li>Full list of updates in the changelog</li>
<li>This version requires at least 128MB RAM and a disk/CF size of 32MB or more, oh no!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1933" rel="nofollow">Ansible and PF, plus NTP</a></h3>

<ul>
<li>Another blog post from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>There&#39;ve been some NTP amplification attacks <a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" rel="nofollow">recently</a> in the news</li>
<li>The post describes how he configured ntpd on a lot of servers without a lot of work</li>
<li>He leverages pf and ansible for the configuration</li>
<li>OpenNTPD is, not surprisingly, unaffected - use it
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140115054839" rel="nofollow">ruBSD videos online</a></h3>

<ul>
<li>Just a quick followup from a few weeks ago</li>
<li>Theo and Henning&#39;s talks from ruBSD are now available for download</li>
<li>There&#39;s also a nice interview with Theo
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-5/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 images are available</li>
<li>Wine PBI is now available for 10</li>
<li>9.2 systems will now be able to upgrade to version 10 and keep their PBI library
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2WQXwMASZ" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2H0FURAtZ" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s21eKKPgqh" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21UMLnV0G" rel="nofollow">Charlie writes in (and gets a reply)</a></li>
<li><a href="http://slexy.org/view/s2SuazcfoR" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>20: Bhyve Mind</title>
  <link>https://www.bsdnow.tv/20</link>
  <guid isPermaLink="false">6125c3d9-473a-4557-a429-423dffa36cbf</guid>
  <pubDate>Wed, 15 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6125c3d9-473a-4557-a429-423dffa36cbf.mp3" length="60158675" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our big 20th episode! We're going to sit down for a chat with Neel Natu and Peter Grehan, the developers of bhyve. Not familiar with bhyve? Our tutorial will show you all you need to know about this awesome new virtualization technology. Answers to your questions and all the latest news, here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:23:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's our big 20th episode! We're going to sit down for a chat with Neel Natu and Peter Grehan, the developers of bhyve. Not familiar with bhyve? Our tutorial will show you all you need to know about this awesome new virtualization technology. Answers to your questions and all the latest news, here on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
OpenBSD automatic installation (http://undeadly.org/cgi?action=article&amp;amp;sid=20140106055302)
A CFT (call for testing) was posted for OpenBSD's new automatic installer process
Using this new system, you can spin up fully-configured OpenBSD installs very quickly
It will answer all the questions for you and can put files into place and start services
Great for large deployments, help test it and report your findings
***
FreeNAS install guide and blog posts (https://www.youtube.com/channel/UCL09rVicvyZrqe-I2LP5Vyg/videos)
A multipart series on YouTube about installing FreeNAS
In part 1, the guy (who is possibly Dracula, with his very Transylvanian accent..) builds his new file server and shows off the hardware
In part 2, he shows how to install and configure FreeNAS, uses IPMI, sets up his pools
He pronounces gigabytes as jiggabytes and it's hilarious
We've also got an unrelated blog post (http://enoriver.net/index.php/2014/01/11/freenas-works-as-advertised/) about a very satisfied FreeNAS user who details his setup
As well as another blog post (http://devinteske.com/freenas-development/) from our old pal Devin Teske (http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities) about his recent foray into the FreeNAS development world
***
FreeBSD 10.0-RC5 is out (https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/076800.html)
Another, unexpected RC is out for 10.0
Minor fixes included, please help test and report any bugs
You can update via freebsd-update or from source
Hopefully this will be the last one before 10.0-RELEASE, which has tons of new features we'll talk about
It's been tagged -RELEASE (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=260664) in SVN already too!
***
OpenBSD 5.5-beta is out (http://marc.info/?l=openbsd-cvs&amp;amp;m=138952598914052&amp;amp;w=2)
Theo updated the branch status to 5.5-beta
A list of changes (http://www.openbsd.org/plus.html)
Help test (http://ftp.openbsd.org/pub/OpenBSD/snapshots/) and report any bugs you find
Lots of rapid development with signify (which we mentioned last week), the beta includes some "test keys"
Does that mean it'll be part of the final release? We'll find out in May.. or when we interview Ted (soon)
***
Interview - Neel Natu &amp;amp; Peter Grehan - neel@freebsd.org (mailto:neel@freebsd.org) &amp;amp; grehan@freebsd.org (mailto:grehan@freebsd.org)
BHyVe - the BSD hypervisor
Tutorial
Virtualization with bhyve (http://www.bsdnow.tv/tutorials/bhyve)
News Roundup
Hostname canonicalisation in OpenSSH (http://blog.djm.net.au/2014/01/hostname-canonicalisation-in-openssh.html)
Blog post from our friend Damien Miller (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline)
This new feature allows clients to canonicalize unqualified domain names
SSH will know if you typed "ssh bsdnow" you meant "ssh bsdnow.tv" with new config options
This will help clean up some ssh configs, especially if you have many hosts
Should make it into OpenSSH 6.5, which is "due really soon"
***
Dragonfly on a Chromebook (http://www.shiningsilence.com/dbsdlog/2014/01/07/13078.html)
Some work has been done by Matthew Dillon to get DragonflyBSD working on a Google Chromebook
These couple of posts (http://www.shiningsilence.com/dbsdlog/2014/01/10/13132.html) detail some of the things he's got working so far
Changes were needed to the boot process, trackpad and wifi drivers needed updating...
Also includes a guide written by Dillon on how to get yours working
***
Spider in a box (http://kazarka.com/index.php?section=spiderinabox)
"Spiderinabox" is a new OpenBSD-based project
Using a combination of OpenBSD, Firefox, XQuartz and VirtualBox, it creates a secure browsing experience for OS X
Firefox runs encapsulated in OpenBSD and doesn't have access to OS X in any way
The developer is looking for testers on other operating systems!
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-3/)
PCBSD 10 has entered into the code freeze phase
They're focusing on fixing bugs now, rather than adding new features
The update system got a lot of improvements
PBI load times reduced by up to 40%! what!!!
***
Feedback/Questions
Scott writes in (http://slexy.org/view/s25zbSPtcm)
Chris writes in (http://slexy.org/view/s2EarxbZz1)
SW writes in (http://slexy.org/view/s2MWKxtWxF)
Ole writes in (http://slexy.org/view/s20kzex2qm)
Gertjan writes in (http://slexy.org/view/s2858Ph4o0)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bhyve, virtualization, xen, hypervisor, type 2, neel natu, peter grehan, presentation, dom0, domu, automatic install, pxe, pxeboot, freenas, installation, chromebook, edgebsd, spiderinabox, spider in a box, vm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our big 20th episode! We&#39;re going to sit down for a chat with Neel Natu and Peter Grehan, the developers of bhyve. Not familiar with bhyve? Our tutorial will show you all you need to know about this awesome new virtualization technology. Answers to your questions and all the latest news, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140106055302" rel="nofollow">OpenBSD automatic installation</a></h3>

<ul>
<li>A CFT (call for testing) was posted for OpenBSD&#39;s new automatic installer process</li>
<li>Using this new system, you can spin up fully-configured OpenBSD installs very quickly</li>
<li>It will answer all the questions for you and can put files into place and start services</li>
<li>Great for large deployments, help test it and report your findings
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UCL09rVicvyZrqe-I2LP5Vyg/videos" rel="nofollow">FreeNAS install guide and blog posts</a></h3>

<ul>
<li>A multipart series on YouTube about installing FreeNAS</li>
<li>In part 1, the guy (who is possibly Dracula, with his very Transylvanian accent..) builds his new file server and shows off the hardware</li>
<li>In part 2, he shows how to install and configure FreeNAS, uses IPMI, sets up his pools</li>
<li>He pronounces gigabytes as jiggabytes and it&#39;s hilarious</li>
<li>We&#39;ve also got an <a href="http://enoriver.net/index.php/2014/01/11/freenas-works-as-advertised/" rel="nofollow">unrelated blog post</a> about a very satisfied FreeNAS user who details his setup</li>
<li>As well as <a href="http://devinteske.com/freenas-development/" rel="nofollow">another blog post</a> from our old pal <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a> about his recent foray into the FreeNAS development world
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/076800.html" rel="nofollow">FreeBSD 10.0-RC5 is out</a></h3>

<ul>
<li>Another, unexpected RC is out for 10.0</li>
<li>Minor fixes included, please help test and report any bugs</li>
<li>You can update via freebsd-update or from source</li>
<li>Hopefully this will be the last one before 10.0-RELEASE, which has tons of new features we&#39;ll talk about</li>
<li>It&#39;s been <a href="https://svnweb.freebsd.org/base?view=revision&revision=260664" rel="nofollow">tagged -RELEASE</a> in SVN already too!
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138952598914052&w=2" rel="nofollow">OpenBSD 5.5-beta is out</a></h3>

<ul>
<li>Theo updated the branch status to 5.5-beta</li>
<li>A <a href="http://www.openbsd.org/plus.html" rel="nofollow">list of changes</a></li>
<li><a href="http://ftp.openbsd.org/pub/OpenBSD/snapshots/" rel="nofollow">Help test</a> and report any bugs you find</li>
<li>Lots of rapid development with signify (which we mentioned last week), the beta includes some &quot;test keys&quot;</li>
<li>Does that mean it&#39;ll be part of the final release? We&#39;ll find out in May.. or when we interview Ted (soon)
***</li>
</ul>

<h2>Interview - Neel Natu &amp; Peter Grehan - <a href="mailto:neel@freebsd.org" rel="nofollow">neel@freebsd.org</a> &amp; <a href="mailto:grehan@freebsd.org" rel="nofollow">grehan@freebsd.org</a></h2>

<p>BHyVe - the BSD hypervisor</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">Virtualization with bhyve</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.djm.net.au/2014/01/hostname-canonicalisation-in-openssh.html" rel="nofollow">Hostname canonicalisation in OpenSSH</a></h3>

<ul>
<li>Blog post from our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a></li>
<li>This new feature allows clients to canonicalize unqualified domain names</li>
<li>SSH will know if you typed &quot;ssh bsdnow&quot; you meant &quot;ssh bsdnow.tv&quot; with new config options</li>
<li>This will help clean up some ssh configs, especially if you have many hosts</li>
<li>Should make it into OpenSSH 6.5, which is &quot;due really soon&quot;
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/07/13078.html" rel="nofollow">Dragonfly on a Chromebook</a></h3>

<ul>
<li>Some work has been done by Matthew Dillon to get DragonflyBSD working on a Google Chromebook</li>
<li>These <a href="http://www.shiningsilence.com/dbsdlog/2014/01/10/13132.html" rel="nofollow">couple of posts</a> detail some of the things he&#39;s got working so far</li>
<li>Changes were needed to the boot process, trackpad and wifi drivers needed updating...</li>
<li>Also includes a guide written by Dillon on how to get yours working
***</li>
</ul>

<h3><a href="http://kazarka.com/index.php?section=spiderinabox" rel="nofollow">Spider in a box</a></h3>

<ul>
<li>&quot;Spiderinabox&quot; is a new OpenBSD-based project</li>
<li>Using a combination of OpenBSD, Firefox, XQuartz and VirtualBox, it creates a secure browsing experience for OS X</li>
<li>Firefox runs encapsulated in OpenBSD and doesn&#39;t have access to OS X in any way</li>
<li>The developer is looking for testers on other operating systems!
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-3/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCBSD 10 has entered into the code freeze phase</li>
<li>They&#39;re focusing on fixing bugs now, rather than adding new features</li>
<li>The update system got a lot of improvements</li>
<li>PBI load times reduced by up to 40%! what!!!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s25zbSPtcm" rel="nofollow">Scott writes in</a></li>
<li><a href="http://slexy.org/view/s2EarxbZz1" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2MWKxtWxF" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s20kzex2qm" rel="nofollow">Ole writes in</a></li>
<li><a href="http://slexy.org/view/s2858Ph4o0" rel="nofollow">Gertjan writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our big 20th episode! We&#39;re going to sit down for a chat with Neel Natu and Peter Grehan, the developers of bhyve. Not familiar with bhyve? Our tutorial will show you all you need to know about this awesome new virtualization technology. Answers to your questions and all the latest news, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140106055302" rel="nofollow">OpenBSD automatic installation</a></h3>

<ul>
<li>A CFT (call for testing) was posted for OpenBSD&#39;s new automatic installer process</li>
<li>Using this new system, you can spin up fully-configured OpenBSD installs very quickly</li>
<li>It will answer all the questions for you and can put files into place and start services</li>
<li>Great for large deployments, help test it and report your findings
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UCL09rVicvyZrqe-I2LP5Vyg/videos" rel="nofollow">FreeNAS install guide and blog posts</a></h3>

<ul>
<li>A multipart series on YouTube about installing FreeNAS</li>
<li>In part 1, the guy (who is possibly Dracula, with his very Transylvanian accent..) builds his new file server and shows off the hardware</li>
<li>In part 2, he shows how to install and configure FreeNAS, uses IPMI, sets up his pools</li>
<li>He pronounces gigabytes as jiggabytes and it&#39;s hilarious</li>
<li>We&#39;ve also got an <a href="http://enoriver.net/index.php/2014/01/11/freenas-works-as-advertised/" rel="nofollow">unrelated blog post</a> about a very satisfied FreeNAS user who details his setup</li>
<li>As well as <a href="http://devinteske.com/freenas-development/" rel="nofollow">another blog post</a> from our old pal <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a> about his recent foray into the FreeNAS development world
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/076800.html" rel="nofollow">FreeBSD 10.0-RC5 is out</a></h3>

<ul>
<li>Another, unexpected RC is out for 10.0</li>
<li>Minor fixes included, please help test and report any bugs</li>
<li>You can update via freebsd-update or from source</li>
<li>Hopefully this will be the last one before 10.0-RELEASE, which has tons of new features we&#39;ll talk about</li>
<li>It&#39;s been <a href="https://svnweb.freebsd.org/base?view=revision&revision=260664" rel="nofollow">tagged -RELEASE</a> in SVN already too!
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138952598914052&w=2" rel="nofollow">OpenBSD 5.5-beta is out</a></h3>

<ul>
<li>Theo updated the branch status to 5.5-beta</li>
<li>A <a href="http://www.openbsd.org/plus.html" rel="nofollow">list of changes</a></li>
<li><a href="http://ftp.openbsd.org/pub/OpenBSD/snapshots/" rel="nofollow">Help test</a> and report any bugs you find</li>
<li>Lots of rapid development with signify (which we mentioned last week), the beta includes some &quot;test keys&quot;</li>
<li>Does that mean it&#39;ll be part of the final release? We&#39;ll find out in May.. or when we interview Ted (soon)
***</li>
</ul>

<h2>Interview - Neel Natu &amp; Peter Grehan - <a href="mailto:neel@freebsd.org" rel="nofollow">neel@freebsd.org</a> &amp; <a href="mailto:grehan@freebsd.org" rel="nofollow">grehan@freebsd.org</a></h2>

<p>BHyVe - the BSD hypervisor</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">Virtualization with bhyve</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.djm.net.au/2014/01/hostname-canonicalisation-in-openssh.html" rel="nofollow">Hostname canonicalisation in OpenSSH</a></h3>

<ul>
<li>Blog post from our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a></li>
<li>This new feature allows clients to canonicalize unqualified domain names</li>
<li>SSH will know if you typed &quot;ssh bsdnow&quot; you meant &quot;ssh bsdnow.tv&quot; with new config options</li>
<li>This will help clean up some ssh configs, especially if you have many hosts</li>
<li>Should make it into OpenSSH 6.5, which is &quot;due really soon&quot;
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/07/13078.html" rel="nofollow">Dragonfly on a Chromebook</a></h3>

<ul>
<li>Some work has been done by Matthew Dillon to get DragonflyBSD working on a Google Chromebook</li>
<li>These <a href="http://www.shiningsilence.com/dbsdlog/2014/01/10/13132.html" rel="nofollow">couple of posts</a> detail some of the things he&#39;s got working so far</li>
<li>Changes were needed to the boot process, trackpad and wifi drivers needed updating...</li>
<li>Also includes a guide written by Dillon on how to get yours working
***</li>
</ul>

<h3><a href="http://kazarka.com/index.php?section=spiderinabox" rel="nofollow">Spider in a box</a></h3>

<ul>
<li>&quot;Spiderinabox&quot; is a new OpenBSD-based project</li>
<li>Using a combination of OpenBSD, Firefox, XQuartz and VirtualBox, it creates a secure browsing experience for OS X</li>
<li>Firefox runs encapsulated in OpenBSD and doesn&#39;t have access to OS X in any way</li>
<li>The developer is looking for testers on other operating systems!
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-3/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCBSD 10 has entered into the code freeze phase</li>
<li>They&#39;re focusing on fixing bugs now, rather than adding new features</li>
<li>The update system got a lot of improvements</li>
<li>PBI load times reduced by up to 40%! what!!!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s25zbSPtcm" rel="nofollow">Scott writes in</a></li>
<li><a href="http://slexy.org/view/s2EarxbZz1" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2MWKxtWxF" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s20kzex2qm" rel="nofollow">Ole writes in</a></li>
<li><a href="http://slexy.org/view/s2858Ph4o0" rel="nofollow">Gertjan writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>15: Kickin' NAS</title>
  <link>https://www.bsdnow.tv/15</link>
  <guid isPermaLink="false">cbf73b1a-fa1e-4acd-a1c4-ad96edb36916</guid>
  <pubDate>Wed, 11 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf73b1a-fa1e-4acd-a1c4-ad96edb36916.mp3" length="77923925" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he's on the FreeBSD release engineering team too, and does quite a lot for the project. We've got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:48:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he's on the FreeBSD release engineering team too, and does quite a lot for the project. We've got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
More faces of FreeBSD (http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html)
Another installment of the FoF series
This time they talk with Reid Linnemann who works at Spectra Logic
Gives a history of all the different jobs he's done, all the programming languages he knows
Mentions how he first learned about FreeBSD, actually pretty similar to Kris' story
"I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD."
Now works on FreeBSD as his day job
The second one (http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html) covers Brooks Davis
FreeBSD committer since 2001 and core team member from 2006 through 2012
He's helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain
"One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it."
Lots more in the show notes
***
We cannot trust Intel and Via’s chip-based crypto (https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security)
We woke up to see FreeBSD on the front page of The Register (http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/), Ars Technica (http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/), Slashdot (http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption) and Hacker News (https://news.ycombinator.com/item?id=6880474) for their strong stance on security and respecting privacy
At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.
FreeBSD's /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA's hardware RNGs as the sole point of entropy
"It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more"
***
OpenSMTPD 5.4.1 released (http://article.gmane.org/gmane.mail.opensmtpd.general/1146)
The OpenBSD developers came out with major a new version
Improved config syntax (please check your smtpd.conf before upgrading)
Adds support for TLS Perfect Forward Secrecy and custom CA certificate
MTA, Queue and SMTP server improvements
SNI support confirmed for the next version
Check the show notes for the full list of changes, pretty huge release
Watch Episode 3 (http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx) for an interview we did with the developers
***
More getting to know your portmgr (http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/)
The portmgr secretary, Thomas Abthorpe, interviews... himself!
Joined as -secretary in March 2010, upgraded to full member in March 2011
His inspiration for using BSD is "I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go."
Mentions how he loves that anyone can contribute and watch it "go live"
The second one (http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/) covers Baptiste Daroussin
The reason for his nick, bapt, is "Baptiste is too long to type"
There's even a video (https://www.youtube.com/watch?v=tZk__K8rqOg) of bapt joining the team!
***
Interview - Santa Clause - josh@ixsystems.com (mailto:josh@ixsystems.com) / @freenasteam (https://twitter.com/freenasteam)
FreeNAS 9.2.0 (http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html)
Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.
Tutorial
FreeNAS walkthrough
News Roundup
Introducing configinit (http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html)
CloudInit is "a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2"
Wasn't ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)
Colin Percival came up with configinit, a FreeBSD alternative
Alongside his new "firstboot-pkgs" port, it can spin up a webserver in 120 seconds from "launch" of the EC2 instance
Check the show notes for full blog post
***
OpenSSH support for Ed25519 and bcrypt keys (http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup)
New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code
SSH private keys were encrypted with a symmetric key that's just an MD5 of their password
Now they'll be using bcrypt by default (http://marc.info/?l=openbsd-cvs&amp;amp;m=138633721618361&amp;amp;w=2)
We'll get more into this in next week's interview
***
The FreeBSD challenge (http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/)
A member of the Linux foundation blogs about using FreeBSD
Goes through all the beginner steps, has to "unlearn" some of his Linux ways
Only a few posts as of this time, but it's a continuing series that may be helpful for switchers
***
PCBSD weekly digest (http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/)
GNOME3, cinnamon and mate desktops are in the installer
Compat layer updated to CentOS 6, enables newest Skype
Looking for people to test printers and hplip
Continuing work on grub, but the ability to switch between bootloaders is back
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s20k2gumbP)
Jason writes in (http://slexy.org/view/s2PM8tfKfe)
John writes in (http://slexy.org/view/s2KgXIKqrJ)
Kjell-Aleksander writes in (http://slexy.org/view/s20DLk8bac)
Alexy writes in (http://slexy.org/view/s2nmmJHvgR)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ports, freenas, ixsystems, nas, network attached storage, josh paetzel, jpaetzel, cto, zfs, zpool, encryption, 9.2.0, walkthrough, web, interface, ui, frontend, opensmtpd, bcrypt, openssh, portmgr, linux foundation, switching from linux to bsd, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he&#39;s on the FreeBSD release engineering team too, and does quite a lot for the project. We&#39;ve got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" rel="nofollow">More faces of FreeBSD</a></h3>

<ul>
<li>Another installment of the FoF series</li>
<li>This time they talk with Reid Linnemann who works at Spectra Logic</li>
<li>Gives a history of all the different jobs he&#39;s done, all the programming languages he knows</li>
<li>Mentions how he first learned about FreeBSD, actually pretty similar to Kris&#39; story</li>
<li>&quot;I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD.&quot;</li>
<li>Now works on FreeBSD as his day job</li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" rel="nofollow">The second one</a> covers Brooks Davis</li>
<li>FreeBSD committer since 2001 and core team member from 2006 through 2012</li>
<li>He&#39;s helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain</li>
<li>&quot;One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it.&quot;</li>
<li>Lots more in the show notes
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" rel="nofollow">We cannot trust Intel and Via’s chip-based crypto</a></h3>

<ul>
<li>We woke up to see FreeBSD on the front page of <a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" rel="nofollow">The Register</a>, <a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" rel="nofollow">Ars Technica</a>, <a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" rel="nofollow">Slashdot</a> and <a href="https://news.ycombinator.com/item?id=6880474" rel="nofollow">Hacker News</a> for their strong stance on security and respecting privacy</li>
<li>At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.</li>
<li>FreeBSD&#39;s /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA&#39;s hardware RNGs as the sole point of entropy</li>
<li>&quot;It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more&quot;
***</li>
</ul>

<h3><a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" rel="nofollow">OpenSMTPD 5.4.1 released</a></h3>

<ul>
<li>The OpenBSD developers came out with major a new version</li>
<li>Improved config syntax (please check your smtpd.conf before upgrading)</li>
<li>Adds support for TLS Perfect Forward Secrecy and custom CA certificate</li>
<li>MTA, Queue and SMTP server improvements</li>
<li>SNI support confirmed for the next version</li>
<li>Check the show notes for the full list of changes, pretty huge release</li>
<li>Watch <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">Episode 3</a> for an interview we did with the developers
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" rel="nofollow">More getting to know your portmgr</a></h3>

<ul>
<li>The portmgr secretary, Thomas Abthorpe, interviews... himself!</li>
<li>Joined as -secretary in March 2010, upgraded to full member in March 2011</li>
<li>His inspiration for using BSD is &quot;I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go.&quot;</li>
<li>Mentions how he loves that anyone can contribute and watch it &quot;go live&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" rel="nofollow">The second one</a> covers Baptiste Daroussin</li>
<li>The reason for his nick, bapt, is &quot;Baptiste is too long to type&quot;</li>
<li>There&#39;s even <a href="https://www.youtube.com/watch?v=tZk__K8rqOg" rel="nofollow">a video</a> of bapt joining the team!
***</li>
</ul>

<h2>Interview - Santa Clause - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/freenasteam" rel="nofollow">@freenasteam</a></h2>

<p>FreeNAS <a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" rel="nofollow">9.2.0</a></p>

<p><strong>Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.</strong></p>

<hr>

<h2>Tutorial</h2>

<h3>FreeNAS walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" rel="nofollow">Introducing configinit</a></h3>

<ul>
<li>CloudInit is &quot;a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2&quot;</li>
<li>Wasn&#39;t ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)</li>
<li>Colin Percival came up with configinit, a FreeBSD alternative</li>
<li>Alongside his new &quot;firstboot-pkgs&quot; port, it can spin up a webserver in 120 seconds from &quot;launch&quot; of the EC2 instance</li>
<li>Check the show notes for full blog post
***</li>
</ul>

<h3><a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" rel="nofollow">OpenSSH support for Ed25519 and bcrypt keys</a></h3>

<ul>
<li>New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code</li>
<li>SSH private keys were encrypted with a symmetric key that&#39;s just an MD5 of their password</li>
<li>Now they&#39;ll be using bcrypt <a href="http://marc.info/?l=openbsd-cvs&m=138633721618361&w=2" rel="nofollow">by default</a></li>
<li>We&#39;ll get more into this in next week&#39;s interview
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge</a></h3>

<ul>
<li>A member of the Linux foundation blogs about using FreeBSD</li>
<li>Goes through all the beginner steps, has to &quot;unlearn&quot; some of his Linux ways</li>
<li>Only a few posts as of this time, but it&#39;s a continuing series that may be helpful for switchers
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>GNOME3, cinnamon and mate desktops are in the installer</li>
<li>Compat layer updated to CentOS 6, enables newest Skype</li>
<li>Looking for people to test printers and hplip</li>
<li>Continuing work on grub, but the ability to switch between bootloaders is back
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20k2gumbP" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2PM8tfKfe" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2KgXIKqrJ" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20DLk8bac" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2nmmJHvgR" rel="nofollow">Alexy writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he&#39;s on the FreeBSD release engineering team too, and does quite a lot for the project. We&#39;ve got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" rel="nofollow">More faces of FreeBSD</a></h3>

<ul>
<li>Another installment of the FoF series</li>
<li>This time they talk with Reid Linnemann who works at Spectra Logic</li>
<li>Gives a history of all the different jobs he&#39;s done, all the programming languages he knows</li>
<li>Mentions how he first learned about FreeBSD, actually pretty similar to Kris&#39; story</li>
<li>&quot;I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD.&quot;</li>
<li>Now works on FreeBSD as his day job</li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" rel="nofollow">The second one</a> covers Brooks Davis</li>
<li>FreeBSD committer since 2001 and core team member from 2006 through 2012</li>
<li>He&#39;s helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain</li>
<li>&quot;One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it.&quot;</li>
<li>Lots more in the show notes
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" rel="nofollow">We cannot trust Intel and Via’s chip-based crypto</a></h3>

<ul>
<li>We woke up to see FreeBSD on the front page of <a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" rel="nofollow">The Register</a>, <a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" rel="nofollow">Ars Technica</a>, <a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" rel="nofollow">Slashdot</a> and <a href="https://news.ycombinator.com/item?id=6880474" rel="nofollow">Hacker News</a> for their strong stance on security and respecting privacy</li>
<li>At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.</li>
<li>FreeBSD&#39;s /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA&#39;s hardware RNGs as the sole point of entropy</li>
<li>&quot;It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more&quot;
***</li>
</ul>

<h3><a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" rel="nofollow">OpenSMTPD 5.4.1 released</a></h3>

<ul>
<li>The OpenBSD developers came out with major a new version</li>
<li>Improved config syntax (please check your smtpd.conf before upgrading)</li>
<li>Adds support for TLS Perfect Forward Secrecy and custom CA certificate</li>
<li>MTA, Queue and SMTP server improvements</li>
<li>SNI support confirmed for the next version</li>
<li>Check the show notes for the full list of changes, pretty huge release</li>
<li>Watch <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">Episode 3</a> for an interview we did with the developers
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" rel="nofollow">More getting to know your portmgr</a></h3>

<ul>
<li>The portmgr secretary, Thomas Abthorpe, interviews... himself!</li>
<li>Joined as -secretary in March 2010, upgraded to full member in March 2011</li>
<li>His inspiration for using BSD is &quot;I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go.&quot;</li>
<li>Mentions how he loves that anyone can contribute and watch it &quot;go live&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" rel="nofollow">The second one</a> covers Baptiste Daroussin</li>
<li>The reason for his nick, bapt, is &quot;Baptiste is too long to type&quot;</li>
<li>There&#39;s even <a href="https://www.youtube.com/watch?v=tZk__K8rqOg" rel="nofollow">a video</a> of bapt joining the team!
***</li>
</ul>

<h2>Interview - Santa Clause - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/freenasteam" rel="nofollow">@freenasteam</a></h2>

<p>FreeNAS <a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" rel="nofollow">9.2.0</a></p>

<p><strong>Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.</strong></p>

<hr>

<h2>Tutorial</h2>

<h3>FreeNAS walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" rel="nofollow">Introducing configinit</a></h3>

<ul>
<li>CloudInit is &quot;a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2&quot;</li>
<li>Wasn&#39;t ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)</li>
<li>Colin Percival came up with configinit, a FreeBSD alternative</li>
<li>Alongside his new &quot;firstboot-pkgs&quot; port, it can spin up a webserver in 120 seconds from &quot;launch&quot; of the EC2 instance</li>
<li>Check the show notes for full blog post
***</li>
</ul>

<h3><a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" rel="nofollow">OpenSSH support for Ed25519 and bcrypt keys</a></h3>

<ul>
<li>New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code</li>
<li>SSH private keys were encrypted with a symmetric key that&#39;s just an MD5 of their password</li>
<li>Now they&#39;ll be using bcrypt <a href="http://marc.info/?l=openbsd-cvs&m=138633721618361&w=2" rel="nofollow">by default</a></li>
<li>We&#39;ll get more into this in next week&#39;s interview
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge</a></h3>

<ul>
<li>A member of the Linux foundation blogs about using FreeBSD</li>
<li>Goes through all the beginner steps, has to &quot;unlearn&quot; some of his Linux ways</li>
<li>Only a few posts as of this time, but it&#39;s a continuing series that may be helpful for switchers
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>GNOME3, cinnamon and mate desktops are in the installer</li>
<li>Compat layer updated to CentOS 6, enables newest Skype</li>
<li>Looking for people to test printers and hplip</li>
<li>Continuing work on grub, but the ability to switch between bootloaders is back
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20k2gumbP" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2PM8tfKfe" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2KgXIKqrJ" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20DLk8bac" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2nmmJHvgR" rel="nofollow">Alexy writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
