<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 18 May 2026 06:05:51 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Full Disk Encryption”</title>
    <link>https://www.bsdnow.tv/tags/full%20disk%20encryption</link>
    <pubDate>Thu, 25 Nov 2021 03:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>430: OpenBSD Onwards</title>
  <link>https://www.bsdnow.tv/430</link>
  <guid isPermaLink="false">a211d686-fe47-4d60-9f0d-41d44cb4af80</guid>
  <pubDate>Thu, 25 Nov 2021 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a211d686-fe47-4d60-9f0d-41d44cb4af80.mp3" length="27077856" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Manipulate a ZFS pool from Rescue System, FreeBSD 3rd Quarter Report, Monitoring FreeBSD jails form the host, OpenBSD on RPI4 with Full Disk Encryption, Onwards with OpenBSD, and more</itunes:subtitle>
  <itunes:duration>45:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Manipulate a ZFS pool from Rescue System, FreeBSD 3rd Quarter Report, Monitoring FreeBSD jails form the host, OpenBSD on RPI4 with Full Disk Encryption, Onwards with OpenBSD, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/manipulating-a-pool-from-the-rescue-system/" target="_blank" rel="nofollow noopener"&gt;Going From Recovery Mode to Normal Operations with OpenZFS Manipulating a Pool from the Rescue System&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dan.langille.org/2021/10/31/monitoring-freebsd-jails-from-the-host/" target="_blank" rel="nofollow noopener"&gt;Monitoring FreeBSD jails from the host&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/status/report-2021-07-2021-09/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Quarterly Status Report 3rd Quarter 2021&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://matecha.net/posts/openbsd-on-pi-4-with-full-disk-encryption/" target="_blank" rel="nofollow noopener"&gt;OpenBSD on Raspberry Pi 4 with Full-Disk Encryption&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20211103080052" target="_blank" rel="nofollow noopener"&gt;Catchup 2021-11-03&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;pre&gt;&lt;code&gt;• [Manage Kubernetes cluster from FreeBSD with kubectl](https://www.youtube.com/watch?v=iUxJIXKtK7c)
• [amdgpu support in DragonFly](https://www.dragonflydigest.com/2021/11/08/26343.html)
• [Today is the 50th Anniversary of the 1st Edition of Unix...](https://twitter.com/bsdimp/status/1456019089466421248?s=20)
&lt;/code&gt;&lt;/pre&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/430/feedback/Efraim%20-%20response%20to%20IPFS%20and%20an%20overlay%20filesystem.md" target="_blank" rel="nofollow noopener"&gt;Efraim - response to IPFS and an overlay filesystem&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/430/feedback/Paul%20-%20FS%20Send%20question.md" target="_blank" rel="nofollow noopener"&gt;Paul - FS Send question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/430/feedback/sev%20-%20Freebsd%20%26%20IPA.md" target="_blank" rel="nofollow noopener"&gt;sev - Freebsd &amp;amp; IPA&lt;/a&gt;
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, recovery mode, rescue system, pool manipulation, Q3 status report, 2021 Q3 status, monitoring, jails, raspberry pi, full disk encryption, openbsd catchup</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Manipulate a ZFS pool from Rescue System, FreeBSD 3rd Quarter Report, Monitoring FreeBSD jails form the host, OpenBSD on RPI4 with Full Disk Encryption, Onwards with OpenBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/manipulating-a-pool-from-the-rescue-system/" rel="nofollow">Going From Recovery Mode to Normal Operations with OpenZFS Manipulating a Pool from the Rescue System</a></h3>

<hr>

<h3><a href="https://dan.langille.org/2021/10/31/monitoring-freebsd-jails-from-the-host/" rel="nofollow">Monitoring FreeBSD jails from the host</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsd.org/status/report-2021-07-2021-09/" rel="nofollow">FreeBSD Quarterly Status Report 3rd Quarter 2021</a></h3>

<hr>

<h3><a href="http://matecha.net/posts/openbsd-on-pi-4-with-full-disk-encryption/" rel="nofollow">OpenBSD on Raspberry Pi 4 with Full-Disk Encryption</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20211103080052" rel="nofollow">Catchup 2021-11-03</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [Manage Kubernetes cluster from FreeBSD with kubectl](https://www.youtube.com/watch?v=iUxJIXKtK7c)
• [amdgpu support in DragonFly](https://www.dragonflydigest.com/2021/11/08/26343.html)
• [Today is the 50th Anniversary of the 1st Edition of Unix...](https://twitter.com/bsdimp/status/1456019089466421248?s=20)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/430/feedback/Efraim%20-%20response%20to%20IPFS%20and%20an%20overlay%20filesystem.md" rel="nofollow">Efraim - response to IPFS and an overlay filesystem</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/430/feedback/Paul%20-%20FS%20Send%20question.md" rel="nofollow">Paul - FS Send question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/430/feedback/sev%20-%20Freebsd%20%26%20IPA.md" rel="nofollow">sev - Freebsd &amp; IPA</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Manipulate a ZFS pool from Rescue System, FreeBSD 3rd Quarter Report, Monitoring FreeBSD jails form the host, OpenBSD on RPI4 with Full Disk Encryption, Onwards with OpenBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/manipulating-a-pool-from-the-rescue-system/" rel="nofollow">Going From Recovery Mode to Normal Operations with OpenZFS Manipulating a Pool from the Rescue System</a></h3>

<hr>

<h3><a href="https://dan.langille.org/2021/10/31/monitoring-freebsd-jails-from-the-host/" rel="nofollow">Monitoring FreeBSD jails from the host</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsd.org/status/report-2021-07-2021-09/" rel="nofollow">FreeBSD Quarterly Status Report 3rd Quarter 2021</a></h3>

<hr>

<h3><a href="http://matecha.net/posts/openbsd-on-pi-4-with-full-disk-encryption/" rel="nofollow">OpenBSD on Raspberry Pi 4 with Full-Disk Encryption</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20211103080052" rel="nofollow">Catchup 2021-11-03</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [Manage Kubernetes cluster from FreeBSD with kubectl](https://www.youtube.com/watch?v=iUxJIXKtK7c)
• [amdgpu support in DragonFly](https://www.dragonflydigest.com/2021/11/08/26343.html)
• [Today is the 50th Anniversary of the 1st Edition of Unix...](https://twitter.com/bsdimp/status/1456019089466421248?s=20)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/430/feedback/Efraim%20-%20response%20to%20IPFS%20and%20an%20overlay%20filesystem.md" rel="nofollow">Efraim - response to IPFS and an overlay filesystem</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/430/feedback/Paul%20-%20FS%20Send%20question.md" rel="nofollow">Paul - FS Send question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/430/feedback/sev%20-%20Freebsd%20%26%20IPA.md" rel="nofollow">sev - Freebsd &amp; IPA</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>424: Unveiling OpenBSD’s pledge</title>
  <link>https://www.bsdnow.tv/424</link>
  <guid isPermaLink="false">6f778bcb-d4a7-469d-9ec2-8fed7fbe93a1</guid>
  <pubDate>Thu, 14 Oct 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6f778bcb-d4a7-469d-9ec2-8fed7fbe93a1.mp3" length="30778248" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>J language working on OpenBSD, Comparing FreeBSD GELI and OpenZFS encrypted pools, What is FreeBSD, actually?, OpenBSD's pledge and unveil from Python, and more.</itunes:subtitle>
  <itunes:duration>49:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;J language working on OpenBSD, Comparing FreeBSD GELI and OpenZFS encrypted pools, What is FreeBSD, actually?, OpenBSD's pledge and unveil from Python, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://briancallahan.net/blog/20210911.html" target="_blank" rel="nofollow noopener"&gt;I got the J language working on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://rubenerd.com/my-first-prod-encrypted-openzfs-pool/" target="_blank" rel="nofollow noopener"&gt;Rubenerd: Comparing FreeBSD GELI and OpenZFS encrypted pools with keys&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://medium.com/@probonopd/what-is-freebsd-actually-think-again-200c2752d026" target="_blank" rel="nofollow noopener"&gt;What is FreeBSD, actually? Think again.&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://nullprogram.com/blog/2021/09/15/" target="_blank" rel="nofollow noopener"&gt;OpenBSD's pledge and unveil from Python&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;pre&gt;&lt;code&gt;• [Hibernate time reduced](http://undeadly.org/cgi?action=article;sid=20210831050932)
• [(open)rsync gains include/exclude support](http://undeadly.org/cgi?action=article;sid=20210830081715)
• [Producer JT's latest ancient find that he needs help with](https://twitter.com/q5sys/status/1440105555754848257)
• [Doas comes to MidnightBSD](https://github.com/slicer69/doas)
• [FreeBSD SSH Hardening](https://gist.github.com/koobs/e01cf8869484a095605404cd0051eb11)
• [OpenBSD 6.8 and you](https://home.nuug.no/~peter/openbsd_and_you/#1)
• [By default, scp(1) now uses SFTP protocol](https://undeadly.org/cgi?action=article;sid=20210910074941)
• [FreeBSD 11.4 end-of-life](https://lists.freebsd.org/pipermail/freebsd-announce/2021-September/002060.html)
• [sched_ule(4): Improve long-term load balancer](https://cgit.freebsd.org/src/commit/?id=e745d729be60a47b49eb19c02a6864a747fb2744)
&lt;/code&gt;&lt;/pre&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, j language, porting, language port, comparing, comparison, geli, full disk encryption, encryption, pledge, unveil, python   </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>J language working on OpenBSD, Comparing FreeBSD GELI and OpenZFS encrypted pools, What is FreeBSD, actually?, OpenBSD&#39;s pledge and unveil from Python, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210911.html" rel="nofollow">I got the J language working on OpenBSD</a></h3>

<hr>

<h3><a href="https://rubenerd.com/my-first-prod-encrypted-openzfs-pool/" rel="nofollow">Rubenerd: Comparing FreeBSD GELI and OpenZFS encrypted pools with keys</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://medium.com/@probonopd/what-is-freebsd-actually-think-again-200c2752d026" rel="nofollow">What is FreeBSD, actually? Think again.</a></h3>

<hr>

<h3><a href="https://nullprogram.com/blog/2021/09/15/" rel="nofollow">OpenBSD&#39;s pledge and unveil from Python</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [Hibernate time reduced](http://undeadly.org/cgi?action=article;sid=20210831050932)
• [(open)rsync gains include/exclude support](http://undeadly.org/cgi?action=article;sid=20210830081715)
• [Producer JT&#39;s latest ancient find that he needs help with](https://twitter.com/q5sys/status/1440105555754848257)
• [Doas comes to MidnightBSD](https://github.com/slicer69/doas)
• [FreeBSD SSH Hardening](https://gist.github.com/koobs/e01cf8869484a095605404cd0051eb11)
• [OpenBSD 6.8 and you](https://home.nuug.no/~peter/openbsd_and_you/#1)
• [By default, scp(1) now uses SFTP protocol](https://undeadly.org/cgi?action=article;sid=20210910074941)
• [FreeBSD 11.4 end-of-life](https://lists.freebsd.org/pipermail/freebsd-announce/2021-September/002060.html)
• [sched_ule(4): Improve long-term load balancer](https://cgit.freebsd.org/src/commit/?id=e745d729be60a47b49eb19c02a6864a747fb2744)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>J language working on OpenBSD, Comparing FreeBSD GELI and OpenZFS encrypted pools, What is FreeBSD, actually?, OpenBSD&#39;s pledge and unveil from Python, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210911.html" rel="nofollow">I got the J language working on OpenBSD</a></h3>

<hr>

<h3><a href="https://rubenerd.com/my-first-prod-encrypted-openzfs-pool/" rel="nofollow">Rubenerd: Comparing FreeBSD GELI and OpenZFS encrypted pools with keys</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://medium.com/@probonopd/what-is-freebsd-actually-think-again-200c2752d026" rel="nofollow">What is FreeBSD, actually? Think again.</a></h3>

<hr>

<h3><a href="https://nullprogram.com/blog/2021/09/15/" rel="nofollow">OpenBSD&#39;s pledge and unveil from Python</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [Hibernate time reduced](http://undeadly.org/cgi?action=article;sid=20210831050932)
• [(open)rsync gains include/exclude support](http://undeadly.org/cgi?action=article;sid=20210830081715)
• [Producer JT&#39;s latest ancient find that he needs help with](https://twitter.com/q5sys/status/1440105555754848257)
• [Doas comes to MidnightBSD](https://github.com/slicer69/doas)
• [FreeBSD SSH Hardening](https://gist.github.com/koobs/e01cf8869484a095605404cd0051eb11)
• [OpenBSD 6.8 and you](https://home.nuug.no/~peter/openbsd_and_you/#1)
• [By default, scp(1) now uses SFTP protocol](https://undeadly.org/cgi?action=article;sid=20210910074941)
• [FreeBSD 11.4 end-of-life](https://lists.freebsd.org/pipermail/freebsd-announce/2021-September/002060.html)
• [sched_ule(4): Improve long-term load balancer](https://cgit.freebsd.org/src/commit/?id=e745d729be60a47b49eb19c02a6864a747fb2744)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>342: Layout the DVA</title>
  <link>https://www.bsdnow.tv/342</link>
  <guid isPermaLink="false">d6b1fa91-dcee-41e7-9e1c-b0f240d34ea0</guid>
  <pubDate>Thu, 19 Mar 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d6b1fa91-dcee-41e7-9e1c-b0f240d34ea0.mp3" length="34437665" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenBSD Full disk encryption with coreboot and tianocore, FreeBSD 12.0 EOL, ZFS DVA layout, OpenBSD’s Go situation, AD updates requires changes in TrueNAS and FreeNAS, full name of FreeBSD’s root account, and more.</itunes:subtitle>
  <itunes:duration>47:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;OpenBSD Full disk encryption with coreboot and tianocore, FreeBSD 12.0 EOL, ZFS DVA layout, OpenBSD’s Go situation, AD updates requires changes in TrueNAS and FreeNAS, full name of FreeBSD’s root account, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://functionallyparanoid.com/2020/03/07/openbsd-full-disk-encryption-with-coreboot-and-tianocore-payload/" target="_blank" rel="nofollow noopener"&gt;OpenBSD Full Disk Encryption with CoreBoot and Tianocore Payload&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; It has been a while since I have posted here so I wanted to share something that was surprisingly difficult for me to figure out.  I have a Thinkpad T440p that I have flashed with Coreboot 4.11 with some special patches that allow the newer machine to work.  When I got the laptop, the default BIOS was UEFI and I installed two operating systems.&lt;/p&gt;

&lt;p&gt;&amp;gt; Windows 10 with bitlocker full disk encryption on the “normal” drive (I replaced the spinning 2.5″ disk with an SSD)&lt;/p&gt;

&lt;p&gt;&amp;gt; Ubuntu 19.10 on the m.2 SATA drive that I installed using LUKS full disk encryption&lt;/p&gt;

&lt;p&gt;&amp;gt; I purchased one of those carriers for the optical bay that allows you to install a third SSD and so I did that with the intent of putting OpenBSD on it.  Since my other two operating systems were running full disk encryption, I wanted to do the same on OpenBSD.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See article for rest of story&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-February/001930.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 12.0 EOL&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Dear FreeBSD community,&lt;/p&gt;

&lt;p&gt;&amp;gt; As of February 29, 2020, FreeBSD 12.0 will reach end-of-life and will no longer be supported by the FreeBSD Security Team.  Users of FreeBSD 12.0 are strongly encouraged to upgrade to a newer release as soon as possible.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.freebsd.org/releases/12.1R/announce.html" target="_blank" rel="nofollow noopener"&gt;12.1 Active release&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsd.org/releases/12.2R/schedule.html" target="_blank" rel="nofollow noopener"&gt;12.2 Release Schedule&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/ZFSDVAFormatAndGrowth" target="_blank" rel="nofollow noopener"&gt;Some effects of the ZFS DVA format on data layout and growing ZFS pools&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; One piece of ZFS terminology is DVA and DVAs, which is short for Data Virtual Address. For ZFS, a DVA is the equivalent of a block number in other filesystems; it tells ZFS where to find whatever data we're talking about. The short summary of what fields DVAs have and what they mean is that DVAs tell us how to find blocks by giving us their vdev (by number) and their byte offset into that particular vdev (and then their size). A typical DVA might say that you find what it's talking about on vdev 0 at byte offset 0x53a40ed000. There are some consequences of this that I hadn't really thought about until the other day.&lt;/p&gt;

&lt;p&gt;&amp;gt; Right away we can see why ZFS has a problem removing a vdev; the vdev's number is burned into every DVA that refers to data on it. If there's no vdev 0 in the pool, ZFS has no idea where to even start looking for data because all addressing is relative to the vdev. ZFS pool shrinking gets around this by adding a translation layer that says where to find the portions of vdev 0 that you care about after it's been removed.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.ixsystems.com/blog/active-directory-truenas-and-freenas/" target="_blank" rel="nofollow noopener"&gt;Warning! Active Directory Security Changes Require TrueNAS and FreeNAS Updates.&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Critical Information for Current FreeNAS and TrueNAS Users&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Microsoft is changing the security defaults for Active Directory to eliminate some security vulnerabilities in its protocols. Unfortunately, these new security defaults may disrupt existing FreeNAS/TrueNAS deployments once Windows systems are updated. The Windows updates may appear sometime in March 2020; no official date has been announced as of yet.&lt;/p&gt;

&lt;p&gt;&amp;gt; FreeNAS and TrueNAS users that utilize Active Directory should update to version 11.3 (or 11.2-U8) to avoid potential disruption of their networks when updating to the latest versions of Windows software after March 1, 2020. Version 11.3 has been released and version 11.2-U8 will be available in early March.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.geeklan.co.uk/?p=2457" target="_blank" rel="nofollow noopener"&gt;Full name of the FreeBSD Root Account&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; NetBSD now has a users(7) and groups(7) manual. Looking into what entries existed in the passwd and group files I wondered about root’s full name who we now know as Charlie Root in the BSDs....&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/programming/GoOpenBSDSituation" target="_blank" rel="nofollow noopener"&gt;OpenBSD Go Situation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Over in the fediverse, Pete Zaitcev had a reaction to my entry on OpenBSD versus Prometheus for us:&lt;/p&gt;

&lt;p&gt;&amp;gt; I don't think the situation is usually that bad. Our situation with Prometheus is basically a worst case scenario for Go on OpenBSD, and most people will have much better results, especially if you stick to supported OpenBSD versions.&lt;/p&gt;

&lt;p&gt;&amp;gt; If you stick to supported OpenBSD versions, upgrading your machines as older OpenBSD releases fall out of support (as the OpenBSD people want you to do), you should not have any problems with your own Go programs. The latest Go release will support the currently supported OpenBSD versions (as long as OpenBSD remains a supported platform for Go), and the Go 1.0 compatibility guarantee means that you can always rebuild your current Go programs with newer versions of Go. You might have problems with compiled binaries that you don't want to rebuild, but my understanding is that this is the case for OpenBSD in general; it doesn't guarantee a stable ABI even for C programs (cf). If you use OpenBSD, you have to be prepared to rebuild your code after OpenBSD upgrades regardless of what language it's written in.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2020-February/018174.html" target="_blank" rel="nofollow noopener"&gt;Test your TOR&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://opnsense.org/opnsense-20-1-1-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 20.1.1 released&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=525794" target="_blank" rel="nofollow noopener"&gt;pkg for FreeBSD 1.13&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://dpaste.com/3WKG09D#wrap" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in about Wireguard&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://dpaste.com/0DDN99Q#wrap" target="_blank" rel="nofollow noopener"&gt;Charlie has a followup to wpa_supplicant as lower class citizen&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://dpaste.com/1N12HFB#wrap" target="_blank" rel="nofollow noopener"&gt;Lars writes about LibreSSL as a positive example&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0342.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, full disk encryption, crypto, coreboot, tianocore, payload, end of life, zfs, openzfs, dva, dva layout, pool, zpool, go, active directory, root account, root</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenBSD Full disk encryption with coreboot and tianocore, FreeBSD 12.0 EOL, ZFS DVA layout, OpenBSD’s Go situation, AD updates requires changes in TrueNAS and FreeNAS, full name of FreeBSD’s root account, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://functionallyparanoid.com/2020/03/07/openbsd-full-disk-encryption-with-coreboot-and-tianocore-payload/" rel="nofollow">OpenBSD Full Disk Encryption with CoreBoot and Tianocore Payload</a></h3>

<blockquote>
<p>It has been a while since I have posted here so I wanted to share something that was surprisingly difficult for me to figure out.  I have a Thinkpad T440p that I have flashed with Coreboot 4.11 with some special patches that allow the newer machine to work.  When I got the laptop, the default BIOS was UEFI and I installed two operating systems.</p>

<p>Windows 10 with bitlocker full disk encryption on the “normal” drive (I replaced the spinning 2.5″ disk with an SSD)</p>

<p>Ubuntu 19.10 on the m.2 SATA drive that I installed using LUKS full disk encryption</p>

<p>I purchased one of those carriers for the optical bay that allows you to install a third SSD and so I did that with the intent of putting OpenBSD on it.  Since my other two operating systems were running full disk encryption, I wanted to do the same on OpenBSD.</p>
</blockquote>

<ul>
<li>See article for rest of story</li>
</ul>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-February/001930.html" rel="nofollow">FreeBSD 12.0 EOL</a></h3>

<blockquote>
<p>Dear FreeBSD community,</p>

<p>As of February 29, 2020, FreeBSD 12.0 will reach end-of-life and will no longer be supported by the FreeBSD Security Team.  Users of FreeBSD 12.0 are strongly encouraged to upgrade to a newer release as soon as possible.</p>
</blockquote>

<ul>
<li><a href="https://www.freebsd.org/releases/12.1R/announce.html" rel="nofollow">12.1 Active release</a></li>
<li><a href="https://www.freebsd.org/releases/12.2R/schedule.html" rel="nofollow">12.2 Release Schedule</a></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/ZFSDVAFormatAndGrowth" rel="nofollow">Some effects of the ZFS DVA format on data layout and growing ZFS pools</a></h3>

<blockquote>
<p>One piece of ZFS terminology is DVA and DVAs, which is short for Data Virtual Address. For ZFS, a DVA is the equivalent of a block number in other filesystems; it tells ZFS where to find whatever data we&#39;re talking about. The short summary of what fields DVAs have and what they mean is that DVAs tell us how to find blocks by giving us their vdev (by number) and their byte offset into that particular vdev (and then their size). A typical DVA might say that you find what it&#39;s talking about on vdev 0 at byte offset 0x53a40ed000. There are some consequences of this that I hadn&#39;t really thought about until the other day.</p>

<p>Right away we can see why ZFS has a problem removing a vdev; the vdev&#39;s number is burned into every DVA that refers to data on it. If there&#39;s no vdev 0 in the pool, ZFS has no idea where to even start looking for data because all addressing is relative to the vdev. ZFS pool shrinking gets around this by adding a translation layer that says where to find the portions of vdev 0 that you care about after it&#39;s been removed.</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/blog/active-directory-truenas-and-freenas/" rel="nofollow">Warning! Active Directory Security Changes Require TrueNAS and FreeNAS Updates.</a></h3>

<ul>
<li>Critical Information for Current FreeNAS and TrueNAS Users</li>
</ul>

<blockquote>
<p>Microsoft is changing the security defaults for Active Directory to eliminate some security vulnerabilities in its protocols. Unfortunately, these new security defaults may disrupt existing FreeNAS/TrueNAS deployments once Windows systems are updated. The Windows updates may appear sometime in March 2020; no official date has been announced as of yet.</p>

<p>FreeNAS and TrueNAS users that utilize Active Directory should update to version 11.3 (or 11.2-U8) to avoid potential disruption of their networks when updating to the latest versions of Windows software after March 1, 2020. Version 11.3 has been released and version 11.2-U8 will be available in early March.</p>
</blockquote>

<hr>

<h3><a href="https://www.geeklan.co.uk/?p=2457" rel="nofollow">Full name of the FreeBSD Root Account</a></h3>

<blockquote>
<p>NetBSD now has a users(7) and groups(7) manual. Looking into what entries existed in the passwd and group files I wondered about root’s full name who we now know as Charlie Root in the BSDs....</p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/programming/GoOpenBSDSituation" rel="nofollow">OpenBSD Go Situation</a></h3>

<blockquote>
<p>Over in the fediverse, Pete Zaitcev had a reaction to my entry on OpenBSD versus Prometheus for us:</p>

<p>I don&#39;t think the situation is usually that bad. Our situation with Prometheus is basically a worst case scenario for Go on OpenBSD, and most people will have much better results, especially if you stick to supported OpenBSD versions.</p>

<p>If you stick to supported OpenBSD versions, upgrading your machines as older OpenBSD releases fall out of support (as the OpenBSD people want you to do), you should not have any problems with your own Go programs. The latest Go release will support the currently supported OpenBSD versions (as long as OpenBSD remains a supported platform for Go), and the Go 1.0 compatibility guarantee means that you can always rebuild your current Go programs with newer versions of Go. You might have problems with compiled binaries that you don&#39;t want to rebuild, but my understanding is that this is the case for OpenBSD in general; it doesn&#39;t guarantee a stable ABI even for C programs (cf). If you use OpenBSD, you have to be prepared to rebuild your code after OpenBSD upgrades regardless of what language it&#39;s written in.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://lists.nycbug.org/pipermail/talk/2020-February/018174.html" rel="nofollow">Test your TOR</a></li>
<li><a href="https://opnsense.org/opnsense-20-1-1-released/" rel="nofollow">OPNsense 20.1.1 released</a></li>
<li><a href="https://svnweb.freebsd.org/ports?view=revision&revision=525794" rel="nofollow">pkg for FreeBSD 1.13</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/3WKG09D#wrap" rel="nofollow">Bostjan writes in about Wireguard</a></li>
<li><a href="http://dpaste.com/0DDN99Q#wrap" rel="nofollow">Charlie has a followup to wpa_supplicant as lower class citizen</a></li>
<li><a href="http://dpaste.com/1N12HFB#wrap" rel="nofollow">Lars writes about LibreSSL as a positive example</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0342.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenBSD Full disk encryption with coreboot and tianocore, FreeBSD 12.0 EOL, ZFS DVA layout, OpenBSD’s Go situation, AD updates requires changes in TrueNAS and FreeNAS, full name of FreeBSD’s root account, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://functionallyparanoid.com/2020/03/07/openbsd-full-disk-encryption-with-coreboot-and-tianocore-payload/" rel="nofollow">OpenBSD Full Disk Encryption with CoreBoot and Tianocore Payload</a></h3>

<blockquote>
<p>It has been a while since I have posted here so I wanted to share something that was surprisingly difficult for me to figure out.  I have a Thinkpad T440p that I have flashed with Coreboot 4.11 with some special patches that allow the newer machine to work.  When I got the laptop, the default BIOS was UEFI and I installed two operating systems.</p>

<p>Windows 10 with bitlocker full disk encryption on the “normal” drive (I replaced the spinning 2.5″ disk with an SSD)</p>

<p>Ubuntu 19.10 on the m.2 SATA drive that I installed using LUKS full disk encryption</p>

<p>I purchased one of those carriers for the optical bay that allows you to install a third SSD and so I did that with the intent of putting OpenBSD on it.  Since my other two operating systems were running full disk encryption, I wanted to do the same on OpenBSD.</p>
</blockquote>

<ul>
<li>See article for rest of story</li>
</ul>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-February/001930.html" rel="nofollow">FreeBSD 12.0 EOL</a></h3>

<blockquote>
<p>Dear FreeBSD community,</p>

<p>As of February 29, 2020, FreeBSD 12.0 will reach end-of-life and will no longer be supported by the FreeBSD Security Team.  Users of FreeBSD 12.0 are strongly encouraged to upgrade to a newer release as soon as possible.</p>
</blockquote>

<ul>
<li><a href="https://www.freebsd.org/releases/12.1R/announce.html" rel="nofollow">12.1 Active release</a></li>
<li><a href="https://www.freebsd.org/releases/12.2R/schedule.html" rel="nofollow">12.2 Release Schedule</a></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/ZFSDVAFormatAndGrowth" rel="nofollow">Some effects of the ZFS DVA format on data layout and growing ZFS pools</a></h3>

<blockquote>
<p>One piece of ZFS terminology is DVA and DVAs, which is short for Data Virtual Address. For ZFS, a DVA is the equivalent of a block number in other filesystems; it tells ZFS where to find whatever data we&#39;re talking about. The short summary of what fields DVAs have and what they mean is that DVAs tell us how to find blocks by giving us their vdev (by number) and their byte offset into that particular vdev (and then their size). A typical DVA might say that you find what it&#39;s talking about on vdev 0 at byte offset 0x53a40ed000. There are some consequences of this that I hadn&#39;t really thought about until the other day.</p>

<p>Right away we can see why ZFS has a problem removing a vdev; the vdev&#39;s number is burned into every DVA that refers to data on it. If there&#39;s no vdev 0 in the pool, ZFS has no idea where to even start looking for data because all addressing is relative to the vdev. ZFS pool shrinking gets around this by adding a translation layer that says where to find the portions of vdev 0 that you care about after it&#39;s been removed.</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/blog/active-directory-truenas-and-freenas/" rel="nofollow">Warning! Active Directory Security Changes Require TrueNAS and FreeNAS Updates.</a></h3>

<ul>
<li>Critical Information for Current FreeNAS and TrueNAS Users</li>
</ul>

<blockquote>
<p>Microsoft is changing the security defaults for Active Directory to eliminate some security vulnerabilities in its protocols. Unfortunately, these new security defaults may disrupt existing FreeNAS/TrueNAS deployments once Windows systems are updated. The Windows updates may appear sometime in March 2020; no official date has been announced as of yet.</p>

<p>FreeNAS and TrueNAS users that utilize Active Directory should update to version 11.3 (or 11.2-U8) to avoid potential disruption of their networks when updating to the latest versions of Windows software after March 1, 2020. Version 11.3 has been released and version 11.2-U8 will be available in early March.</p>
</blockquote>

<hr>

<h3><a href="https://www.geeklan.co.uk/?p=2457" rel="nofollow">Full name of the FreeBSD Root Account</a></h3>

<blockquote>
<p>NetBSD now has a users(7) and groups(7) manual. Looking into what entries existed in the passwd and group files I wondered about root’s full name who we now know as Charlie Root in the BSDs....</p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/programming/GoOpenBSDSituation" rel="nofollow">OpenBSD Go Situation</a></h3>

<blockquote>
<p>Over in the fediverse, Pete Zaitcev had a reaction to my entry on OpenBSD versus Prometheus for us:</p>

<p>I don&#39;t think the situation is usually that bad. Our situation with Prometheus is basically a worst case scenario for Go on OpenBSD, and most people will have much better results, especially if you stick to supported OpenBSD versions.</p>

<p>If you stick to supported OpenBSD versions, upgrading your machines as older OpenBSD releases fall out of support (as the OpenBSD people want you to do), you should not have any problems with your own Go programs. The latest Go release will support the currently supported OpenBSD versions (as long as OpenBSD remains a supported platform for Go), and the Go 1.0 compatibility guarantee means that you can always rebuild your current Go programs with newer versions of Go. You might have problems with compiled binaries that you don&#39;t want to rebuild, but my understanding is that this is the case for OpenBSD in general; it doesn&#39;t guarantee a stable ABI even for C programs (cf). If you use OpenBSD, you have to be prepared to rebuild your code after OpenBSD upgrades regardless of what language it&#39;s written in.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://lists.nycbug.org/pipermail/talk/2020-February/018174.html" rel="nofollow">Test your TOR</a></li>
<li><a href="https://opnsense.org/opnsense-20-1-1-released/" rel="nofollow">OPNsense 20.1.1 released</a></li>
<li><a href="https://svnweb.freebsd.org/ports?view=revision&revision=525794" rel="nofollow">pkg for FreeBSD 1.13</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://dpaste.com/3WKG09D#wrap" rel="nofollow">Bostjan writes in about Wireguard</a></li>
<li><a href="http://dpaste.com/0DDN99Q#wrap" rel="nofollow">Charlie has a followup to wpa_supplicant as lower class citizen</a></li>
<li><a href="http://dpaste.com/1N12HFB#wrap" rel="nofollow">Lars writes about LibreSSL as a positive example</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0342.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>38: A BUG's Life</title>
  <link>https://www.bsdnow.tv/38</link>
  <guid isPermaLink="false">01510b66-38e5-40ac-a282-9bff71cb55d9</guid>
  <pubDate>Wed, 21 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/01510b66-38e5-40ac-a282-9bff71cb55d9.mp3" length="63768244" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2053" target="_blank" rel="nofollow noopener"&gt;FreeBSD 11 goals and discussion&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Something that actually happened at BSDCan this year...&lt;/li&gt;
&lt;li&gt;During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE&lt;/li&gt;
&lt;li&gt;Some of MWL's notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support&lt;/li&gt;
&lt;li&gt;A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more&lt;/li&gt;
&lt;li&gt;There's also some notes from the &lt;a href="http://blather.michaelwlucas.com/archives/2060" target="_blank" rel="nofollow noopener"&gt;devsummit virtualization session&lt;/a&gt;, mostly talking about bhyve&lt;/li&gt;
&lt;li&gt;Lastly, he also provides some notes about &lt;a href="http://blather.michaelwlucas.com/archives/2065" target="_blank" rel="nofollow noopener"&gt;ports and packages&lt;/a&gt; and where they're going
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" target="_blank" rel="nofollow noopener"&gt;An SSH honeypot with OpenBSD and Kippo&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Everyone loves messing with script kiddies, right?&lt;/li&gt;
&lt;li&gt;This blog post introduces &lt;a href="https://code.google.com/p/kippo/" target="_blank" rel="nofollow noopener"&gt;Kippo&lt;/a&gt;, an SSH honeypot tool, and how to use it in combination with OpenBSD&lt;/li&gt;
&lt;li&gt;It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely&lt;/li&gt;
&lt;li&gt;You can use this to get new 0day exploits or find weaknesses in your systems&lt;/li&gt;
&lt;li&gt;OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.netbsd.org/foundation/reports/financial/2013.html" target="_blank" rel="nofollow noopener"&gt;NetBSD foundation financial report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The NetBSD foundation has posted their 2013 financial report&lt;/li&gt;
&lt;li&gt;It's a very "no nonsense" page, pretty much only the hard numbers&lt;/li&gt;
&lt;li&gt;In 2013, they got $26,000 of income in donations&lt;/li&gt;
&lt;li&gt;The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else&lt;/li&gt;
&lt;li&gt;Be sure to donate to whichever BSDs you like and use!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Building a fully-encrypted NAS with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you're doing&lt;/li&gt;
&lt;li&gt;This article takes a look at the OpenBSD side and &lt;a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" target="_blank" rel="nofollow noopener"&gt;explains how&lt;/a&gt; to build a NAS with security in mind&lt;/li&gt;
&lt;li&gt;The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected&lt;/li&gt;
&lt;li&gt;The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people's needs too&lt;/li&gt;
&lt;li&gt;There's also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Brian Callahan &amp;amp; Aaron Bieber - &lt;a href="mailto:admin@lists.nycbug.org" target="_blank" rel="nofollow noopener"&gt;admin@lists.nycbug.org&lt;/a&gt; &amp;amp; &lt;a href="mailto:admin@cobug.org" target="_blank" rel="nofollow noopener"&gt;admin@cobug.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Forming a local BSD Users Group&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/pkgsrc" target="_blank" rel="nofollow noopener"&gt;The basics of pkgsrc&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" target="_blank" rel="nofollow noopener"&gt;FreeBSD periodic mails vs. monitoring&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've ever been an admin for a lot of FreeBSD boxes, you've probably noticed that you get a lot of email&lt;/li&gt;
&lt;li&gt;This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them&lt;/li&gt;
&lt;li&gt;From bad SSH logins to Zabbix alerts, it all adds up quickly&lt;/li&gt;
&lt;li&gt;It highlights the periodic.conf file and FreeBSD's periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.skogsrud.net/?p=44" target="_blank" rel="nofollow noopener"&gt;Doing cool stuff with OpenBSD routing domains&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A blog post from our viewer and regular emailer, Kjell-Aleksander!&lt;/li&gt;
&lt;li&gt;He manages some internally-routed IP ranges at his work, but didn't want to have equipment for each separate project&lt;/li&gt;
&lt;li&gt;This is where OpenBSD routing domains and pf come in to save the day&lt;/li&gt;
&lt;li&gt;The blog post goes through the process with all the network details you could ever dream of&lt;/li&gt;
&lt;li&gt;He even &lt;a href="http://i.imgur.com/penYQFP.jpg" target="_blank" rel="nofollow noopener"&gt;named his networking equipment... after us&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" target="_blank" rel="nofollow noopener"&gt;LibreSSL, the good and the bad&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We're all probably familiar with OpenBSD's fork of OpenSSL at this point&lt;/li&gt;
&lt;li&gt;However, "for those of you that don't know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk"&lt;/li&gt;
&lt;li&gt;This article talks about some of the cryptographic development challenges involved with maintaining such a massive project&lt;/li&gt;
&lt;li&gt;You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled&lt;/li&gt;
&lt;li&gt;It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lots going on in PCBSD land this week, AppCafe has been redesigned&lt;/li&gt;
&lt;li&gt;The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update&lt;/li&gt;
&lt;li&gt;In the more &lt;a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" target="_blank" rel="nofollow noopener"&gt;recent post&lt;/a&gt;, there's some further explanation of the PBI system and the reason for the transition&lt;/li&gt;
&lt;li&gt;It's got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2UbEhgjce" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21XU0y3JP" target="_blank" rel="nofollow noopener"&gt;Daniel writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QQtuawFl" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20XrT5Q8U" target="_blank" rel="nofollow noopener"&gt;tsyn writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ayZ1nsdv" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, bug, bsd user group, users group, community, lug, uug, unix users group, packages, signing, binary, source, compile, ports, nycbug, nycbsdcon, cobug, colorado, new york, conference, presentation, 11.0, ssh, honeypot, script kiddies, kippo, foundation, financial report, encrypted, nas, network attached storage, full disk encryption, periodic, routing domains, pf, the book of pf, third edition, 3rd edition, cron, monitoring, openssl, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>16: Cryptocrystalline</title>
  <link>https://www.bsdnow.tv/16</link>
  <guid isPermaLink="false">d9af27cf-c4ff-4572-b119-cbfd0e4167c8</guid>
  <pubDate>Wed, 18 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d9af27cf-c4ff-4572-b119-cbfd0e4167c8.mp3" length="79454910" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:50:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" target="_blank" rel="nofollow noopener"&gt;Secure communications with OpenBSD and OpenVPN&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Starting off today's theme of encryption...&lt;/li&gt;
&lt;li&gt;A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic&lt;/li&gt;
&lt;li&gt;Part 1 covers installing OpenBSD with full disk encryption (which we'll be doing later on in the show)&lt;/li&gt;
&lt;li&gt;Part 2 covers the initial setup of OpenVPN certificates and keys&lt;/li&gt;
&lt;li&gt;Parts 3 and 4 are the OpenVPN server and client configuration&lt;/li&gt;
&lt;li&gt;Part 5 is some updates and closing remarks
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation Newsletter&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The December 2013 semi-annual newsletter was sent out from the foundation&lt;/li&gt;
&lt;li&gt;In the newsletter you will find the president's letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored&lt;/li&gt;
&lt;li&gt;The president's letter alone is worth the read, really amazing&lt;/li&gt;
&lt;li&gt;Really long, with lots of details and stories from the conferences and projects
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://evertiq.com/design/33394" target="_blank" rel="nofollow noopener"&gt;Use of NetBSD with Marvell Kirkwood Processors&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer&lt;/li&gt;
&lt;li&gt;The IP-Plug is a "multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger)."&lt;/li&gt;
&lt;li&gt;Really cool little NetBSD ARM project with lots of graphs, pictures and details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" target="_blank" rel="nofollow noopener"&gt;Experimenting with zero-copy network IO&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD&lt;/li&gt;
&lt;li&gt;Discusses the different OS' implementations and options&lt;/li&gt;
&lt;li&gt;He's able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn't stopping there&lt;/li&gt;
&lt;li&gt;Tons of details, check the full post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Damien Miller - &lt;a href="mailto:djm@openbsd.org" target="_blank" rel="nofollow noopener"&gt;djm@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/damienmiller" target="_blank" rel="nofollow noopener"&gt;@damienmiller&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Cryptography in OpenBSD and OpenSSH&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;Full disk encryption in FreeBSD &amp;amp; OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" target="_blank" rel="nofollow noopener"&gt;OpenZFS office hours&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy &lt;a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" target="_blank" rel="nofollow noopener"&gt;George Wilson&lt;/a&gt; sat down to take some ZFS questions from the community&lt;/li&gt;
&lt;li&gt;You can see more info about it &lt;a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" target="_blank" rel="nofollow noopener"&gt;License summaries in pkgng&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A discussion between &lt;a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" target="_blank" rel="nofollow noopener"&gt;Justin Sherill&lt;/a&gt; and some NYCBUG guys about license frameworks in pkgng&lt;/li&gt;
&lt;li&gt;Similar to pkgsrc's "ACCEPTABLE_LICENSES" setting, pkgng could let the user decide which software licenses he wants to allow&lt;/li&gt;
&lt;li&gt;Maybe we could get a "pkg licenses" command to display the license of all installed packages&lt;/li&gt;
&lt;li&gt;Ok bapt, do it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD challenge continues&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Checking in with our buddy from the Linux foundation...&lt;/li&gt;
&lt;li&gt;The switching from Linux to FreeBSD blog series continues for his month-long trial&lt;/li&gt;
&lt;li&gt;Follow up from last week: "As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding."&lt;/li&gt;
&lt;li&gt;Since we last mentioned it, he's decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=336615" target="_blank" rel="nofollow noopener"&gt;Ports gets a stable branch&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For the first time ever, FreeBSD's ports tree will have a maintained "stable" branch&lt;/li&gt;
&lt;li&gt;This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes&lt;/li&gt;
&lt;li&gt;All commits to this branch require approval of portmgr, looks like it'll start in 2014Q1
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2iRV1tOzB" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gAR5lgf" target="_blank" rel="nofollow noopener"&gt;Spencer writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s203iOnFh1" target="_blank" rel="nofollow noopener"&gt;Campbell writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yUqj3vKW" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2egcTPBXH" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, arm, openssh, sftp, security, damien miller, djm, mindrot, encryption, crypto, chacha20, poly1305, aes, hmac, mac, sha256, cipher, rc4, base64, encode, decode, ed25519, bcrypt, md5, hash, salt, openzfs, office hours, openvpn, vps, vpn, ssl, tun, tap, foundation, newsletter, freebsd journal, ixsystems, ecc, rsa, dsa, ecdsa, tunnel, keys, password, passphrase, full disk encryption, fde, installation, encrypted install, unencrypted</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
