<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 07 May 2026 07:22:10 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Furybsd”</title>
    <link>https://www.bsdnow.tv/tags/furybsd</link>
    <pubDate>Thu, 30 Apr 2020 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>348: BSD Community Collections</title>
  <link>https://www.bsdnow.tv/348</link>
  <guid isPermaLink="false">ed288ede-fe94-433f-85a4-6eebb8cb2478</guid>
  <pubDate>Thu, 30 Apr 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ed288ede-fe94-433f-85a4-6eebb8cb2478.mp3" length="43398814" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.</itunes:subtitle>
  <itunes:duration>1:00:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.furybsd.org/furybsd-2020-q2-images-are-available-for-xfce-and-kde/" target="_blank" rel="nofollow noopener"&gt;FuryBSD 2020Q2 Images Available for XFCE and KDE&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; The Q2 2020 images are not a visible leap forward but a functional leap forward.  Most effort was spent creating a better out of box experience for automatic Ethernet configuration, working WiFi, webcam, and improved hypervisor support. &lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://unixsheikh.com/articles/technical-reasons-to-choose-freebsd-over-linux.html" target="_blank" rel="nofollow noopener"&gt;Technical reasons to choose FreeBSD over GNU/Linux&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Since I wrote my article "Why you should migrate everything from Linux to BSD" I have been wanting to write something about the technical reasons to choose FreeBSD over GNU/Linux and while I cannot possibly cover every single reason, I can write about some of the things that I consider worth noting.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;+ &lt;a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/" target="_blank" rel="nofollow noopener"&gt;Not actually Linux distro review deux: GhostBSD&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;&amp;gt; When I began work on the FreeBSD 12.1-RELEASE review last week, it didn't take long to figure out that the desktop portion wasn't going very smoothly.&lt;/p&gt;

&lt;p&gt;&amp;gt; I think it's important for BSD-curious users to know of easier, gentler alternatives, so I did a little looking around and settled on GhostBSD for a follow-up review.&lt;/p&gt;

&lt;p&gt;&amp;gt; GhostBSD is based on TrueOS, which itself derives from FreeBSD Stable. It was originally a Canadian distro, but—like most successful distributions—it has transcended its country of origin and can now be considered worldwide. Significant GhostBSD development takes place now in Canada, Italy, Germany, and the United States.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://mwl.io/archives/6265" target="_blank" rel="nofollow noopener"&gt;“TLS Mastery” sponsorships open&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; My next book will be TLS Mastery, all about Transport Layer Encryption, Let’s Encrypt, OCSP, and so on.&lt;/p&gt;

&lt;p&gt;&amp;gt; This should be a shorter book, more like my DNSSEC or Tarsnap titles, or the first edition of Sudo Mastery. I would like a break from writing doorstops like the SNMP and jails books.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;JT (our producer) shared his Open Source Retail Box Collection on twitter this past weekend and there was a nice response from a few in the BSD Community showing their collections:&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;JT's post: &lt;a href="https://twitter.com/q5sys/status/1251194823589138432" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/q5sys/status/1251194823589138432&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;High Resolution Image to see the bottom shelf better: &lt;a href="https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg" target="_blank" rel="nofollow noopener"&gt;https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Closeup of the BSD Section: &lt;a href="https://twitter.com/q5sys/status/1251294290782928897" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/q5sys/status/1251294290782928897&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Others jumped in with their collections:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Deb Goodkin's collection: &lt;a href="https://twitter.com/dgoodkin/status/1251294016139743232" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/dgoodkin/status/1251294016139743232&lt;/a&gt; &amp;amp; &lt;a href="https://twitter.com/dgoodkin/status/1251298125672660992" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/dgoodkin/status/1251298125672660992&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FreeBSD Frau's FreeBSD Collection: &lt;a href="https://twitter.com/freebsdfrau/status/1251290430475350018" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/freebsdfrau/status/1251290430475350018&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jason Tubnor's OpenBSD Collection: &lt;a href="https://twitter.com/Tubsta/status/1251265902214918144" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/Tubsta/status/1251265902214918144&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Do you have a nice collection, take a picture and send it in!&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://bsdb0y.github.io/blog/deep-dive-into-the-OpenBSD-malloc-and-friends-internals-part-1.html" target="_blank" rel="nofollow noopener"&gt;Tale of OpenBSD secure memory allocator internals - malloc(3)&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Hi there,&lt;/p&gt;

&lt;p&gt;&amp;gt; It's been a very long time I haven't written anything after my last OpenBSD blogs, that is, &lt;/p&gt;

&lt;p&gt;&amp;gt; OpenBSD Kernel Internals — Creation of process from user-space to kernel space.&lt;/p&gt;

&lt;p&gt;&amp;gt; OpenBSD: Introduction to &lt;code&gt;execpromises&lt;/code&gt; in the pledge(2)&lt;/p&gt;

&lt;p&gt;&amp;gt; pledge(2): OpenBSD's defensive approach to OS Security&lt;/p&gt;

&lt;p&gt;&amp;gt; So, again I started reading OpenBSD source codes with debugger after reducing my sleep timings and managing to get some time after professional life. This time I have picked one of my favourite item from my wishlist to learn and share, that is, OpenBSD malloc(3), secure allocator&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.ixsystems.com/community/threads/how-i-learned-to-stop-worrying-and-love-ssds.82617/" target="_blank" rel="nofollow noopener"&gt;How I learned to stop worrying and love SSDs&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; my home FreeNAS runs two pools for data. One RAIDZ2 with four spinning disk drives and one mirror with two SSDs. Toying with InfluxDB and Grafana in the last couple of days I found that I seem to have a constant write load of 1 Megabyte (!) per second on the SSDs. What the ...?&lt;/p&gt;

&lt;p&gt;&amp;gt; So I run three VMs on the SSDs in total. One with Windows 10, two with Ubuntu running Confluence, A wiki essentially, with files for attachments and MySQL as the backend database. Clearly the writes had to stop when the wikis were not used at all, just sitting idle, right?&lt;/p&gt;

&lt;p&gt;&amp;gt; Well even with a full query log and quite some experience in the operation of web applications I could not figure out what Confluence is doing (productively, no doubt) but trust me, it writes a couple of hundred kbytes to the database each second just sitting idle.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://chown.me/blog/infrastructure-2019.html" target="_blank" rel="nofollow noopener"&gt;My infrastructure as of 2019&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I've wanted to write about my infrastructure for a while, but I kept thinking, "I'll wait until after I've done $next_thing_on_my_todo." Of course this cycle never ends, so I decided to write about its state at the end of 2019. Maybe I'll write an update on it in a couple of moons; who knows?&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;For something different than our usual Beastie Bits… we bring you…&lt;/h2&gt;

&lt;h2&gt;We're all quarantined so lets install BSD on things!  Install BSD on something this week, write it up and let us know about it, and maybe we'll feature you!&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://e17i.github.io/articles-netbsd-install/" target="_blank" rel="nofollow noopener"&gt;Installation of NetBSD on a Mac Mini&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://icyphox.sh/blog/openbsd-hp-envy/" target="_blank" rel="nofollow noopener"&gt;OpenBSD on the HP Envy 13&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.rs-online.com/designspark/install-netbsd-on-a-vintage-computer" target="_blank" rel="nofollow noopener"&gt;Install NetBSD on a Vintage Computer&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/allanjude/status/1251895348836143104" target="_blank" rel="nofollow noopener"&gt;BSDCan Home Lab Panel recording session: May 5th at 18:00 UTC&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://wiki.freebsd.org/OfficeHours" target="_blank" rel="nofollow noopener"&gt;Allan started a series of FreeBSD Office Hours&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;BSDNow is going Independent&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;After being part of Jupiter Broadcasting since we started back in 2013, BSDNow is moving to become independent. We extend a very large thank you to Jupiter Broadcasting and Linux Academy for hosting us for so many years, and allowing us to bring you over 100 episodes without advertisements.
What does this mean for you, the listener? Not much will change, just make sure your subscription is via the RSS feed at BSDNow.tv rather than one of the Jupiter Broadcasting feeds. We will update you with more news as things settle out.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Todd - &lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/348/feedback/Todd%20-%20LinusTechTips'%20claims%20on%20ZFS.md" target="_blank" rel="nofollow noopener"&gt;LinusTechTips Claims about ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, furybsd, kde, xfce, GhostBSD, Ars Technica, TLS, tls mastery, tls mastery book, book sponsorship, collections, secure memory allocator, internals, memory allocator, memory allocator internals, ssd, solid state drive</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.furybsd.org/furybsd-2020-q2-images-are-available-for-xfce-and-kde/" rel="nofollow">FuryBSD 2020Q2 Images Available for XFCE and KDE</a></h3>

<blockquote>
<p>The Q2 2020 images are not a visible leap forward but a functional leap forward.  Most effort was spent creating a better out of box experience for automatic Ethernet configuration, working WiFi, webcam, and improved hypervisor support. </p>
</blockquote>

<hr>

<h3><a href="https://unixsheikh.com/articles/technical-reasons-to-choose-freebsd-over-linux.html" rel="nofollow">Technical reasons to choose FreeBSD over GNU/Linux</a></h3>

<blockquote>
<p>Since I wrote my article &quot;Why you should migrate everything from Linux to BSD&quot; I have been wanting to write something about the technical reasons to choose FreeBSD over GNU/Linux and while I cannot possibly cover every single reason, I can write about some of the things that I consider worth noting.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3>+ <a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/" rel="nofollow">Not actually Linux distro review deux: GhostBSD</a></h3>

<blockquote>
<p>When I began work on the FreeBSD 12.1-RELEASE review last week, it didn&#39;t take long to figure out that the desktop portion wasn&#39;t going very smoothly.</p>

<p>I think it&#39;s important for BSD-curious users to know of easier, gentler alternatives, so I did a little looking around and settled on GhostBSD for a follow-up review.</p>

<p>GhostBSD is based on TrueOS, which itself derives from FreeBSD Stable. It was originally a Canadian distro, but—like most successful distributions—it has transcended its country of origin and can now be considered worldwide. Significant GhostBSD development takes place now in Canada, Italy, Germany, and the United States.</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/6265" rel="nofollow">“TLS Mastery” sponsorships open</a></h3>

<blockquote>
<p>My next book will be TLS Mastery, all about Transport Layer Encryption, Let’s Encrypt, OCSP, and so on.</p>

<p>This should be a shorter book, more like my DNSSEC or Tarsnap titles, or the first edition of Sudo Mastery. I would like a break from writing doorstops like the SNMP and jails books.</p>
</blockquote>

<hr>

<h3>JT (our producer) shared his Open Source Retail Box Collection on twitter this past weekend and there was a nice response from a few in the BSD Community showing their collections:</h3>

<ul>
<li><p>JT&#39;s post: <a href="https://twitter.com/q5sys/status/1251194823589138432" rel="nofollow">https://twitter.com/q5sys/status/1251194823589138432</a></p>

<ul>
<li>High Resolution Image to see the bottom shelf better: <a href="https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg" rel="nofollow">https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg</a></li>
<li>Closeup of the BSD Section: <a href="https://twitter.com/q5sys/status/1251294290782928897" rel="nofollow">https://twitter.com/q5sys/status/1251294290782928897</a></li>
</ul></li>
<li><p>Others jumped in with their collections:</p>

<ul>
<li>Deb Goodkin&#39;s collection: <a href="https://twitter.com/dgoodkin/status/1251294016139743232" rel="nofollow">https://twitter.com/dgoodkin/status/1251294016139743232</a> &amp; <a href="https://twitter.com/dgoodkin/status/1251298125672660992" rel="nofollow">https://twitter.com/dgoodkin/status/1251298125672660992</a></li>
<li>FreeBSD Frau&#39;s FreeBSD Collection: <a href="https://twitter.com/freebsdfrau/status/1251290430475350018" rel="nofollow">https://twitter.com/freebsdfrau/status/1251290430475350018</a></li>
<li>Jason Tubnor&#39;s OpenBSD Collection: <a href="https://twitter.com/Tubsta/status/1251265902214918144" rel="nofollow">https://twitter.com/Tubsta/status/1251265902214918144</a></li>
</ul></li>
</ul>

<p>Do you have a nice collection, take a picture and send it in!</p>

<hr>

<h3><a href="https://bsdb0y.github.io/blog/deep-dive-into-the-OpenBSD-malloc-and-friends-internals-part-1.html" rel="nofollow">Tale of OpenBSD secure memory allocator internals - malloc(3)</a></h3>

<blockquote>
<p>Hi there,</p>

<p>It&#39;s been a very long time I haven&#39;t written anything after my last OpenBSD blogs, that is, </p>

<p>OpenBSD Kernel Internals — Creation of process from user-space to kernel space.</p>

<p>OpenBSD: Introduction to <code>execpromises</code> in the pledge(2)</p>

<p>pledge(2): OpenBSD&#39;s defensive approach to OS Security</p>

<p>So, again I started reading OpenBSD source codes with debugger after reducing my sleep timings and managing to get some time after professional life. This time I have picked one of my favourite item from my wishlist to learn and share, that is, OpenBSD malloc(3), secure allocator</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/community/threads/how-i-learned-to-stop-worrying-and-love-ssds.82617/" rel="nofollow">How I learned to stop worrying and love SSDs</a></h3>

<blockquote>
<p>my home FreeNAS runs two pools for data. One RAIDZ2 with four spinning disk drives and one mirror with two SSDs. Toying with InfluxDB and Grafana in the last couple of days I found that I seem to have a constant write load of 1 Megabyte (!) per second on the SSDs. What the ...?</p>

<p>So I run three VMs on the SSDs in total. One with Windows 10, two with Ubuntu running Confluence, A wiki essentially, with files for attachments and MySQL as the backend database. Clearly the writes had to stop when the wikis were not used at all, just sitting idle, right?</p>

<p>Well even with a full query log and quite some experience in the operation of web applications I could not figure out what Confluence is doing (productively, no doubt) but trust me, it writes a couple of hundred kbytes to the database each second just sitting idle.</p>
</blockquote>

<hr>

<h3><a href="https://chown.me/blog/infrastructure-2019.html" rel="nofollow">My infrastructure as of 2019</a></h3>

<blockquote>
<p>I&#39;ve wanted to write about my infrastructure for a while, but I kept thinking, &quot;I&#39;ll wait until after I&#39;ve done $next_thing_on_my_todo.&quot; Of course this cycle never ends, so I decided to write about its state at the end of 2019. Maybe I&#39;ll write an update on it in a couple of moons; who knows?</p>
</blockquote>

<hr>

<h2>For something different than our usual Beastie Bits… we bring you…</h2>

<h2>We&#39;re all quarantined so lets install BSD on things!  Install BSD on something this week, write it up and let us know about it, and maybe we&#39;ll feature you!</h2>

<ul>
<li><p><a href="https://e17i.github.io/articles-netbsd-install/" rel="nofollow">Installation of NetBSD on a Mac Mini</a></p></li>
<li><p><a href="https://icyphox.sh/blog/openbsd-hp-envy/" rel="nofollow">OpenBSD on the HP Envy 13</a></p></li>
<li><p><a href="https://www.rs-online.com/designspark/install-netbsd-on-a-vintage-computer" rel="nofollow">Install NetBSD on a Vintage Computer</a></p></li>
<li><p><a href="https://twitter.com/allanjude/status/1251895348836143104" rel="nofollow">BSDCan Home Lab Panel recording session: May 5th at 18:00 UTC</a></p></li>
<li><p><a href="https://wiki.freebsd.org/OfficeHours" rel="nofollow">Allan started a series of FreeBSD Office Hours</a></p></li>
</ul>

<hr>

<h2>BSDNow is going Independent</h2>

<ul>
<li>After being part of Jupiter Broadcasting since we started back in 2013, BSDNow is moving to become independent. We extend a very large thank you to Jupiter Broadcasting and Linux Academy for hosting us for so many years, and allowing us to bring you over 100 episodes without advertisements.
What does this mean for you, the listener? Not much will change, just make sure your subscription is via the RSS feed at BSDNow.tv rather than one of the Jupiter Broadcasting feeds. We will update you with more news as things settle out.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Todd - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/348/feedback/Todd%20-%20LinusTechTips&#x27;%20claims%20on%20ZFS.md" rel="nofollow">LinusTechTips Claims about ZFS</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.furybsd.org/furybsd-2020-q2-images-are-available-for-xfce-and-kde/" rel="nofollow">FuryBSD 2020Q2 Images Available for XFCE and KDE</a></h3>

<blockquote>
<p>The Q2 2020 images are not a visible leap forward but a functional leap forward.  Most effort was spent creating a better out of box experience for automatic Ethernet configuration, working WiFi, webcam, and improved hypervisor support. </p>
</blockquote>

<hr>

<h3><a href="https://unixsheikh.com/articles/technical-reasons-to-choose-freebsd-over-linux.html" rel="nofollow">Technical reasons to choose FreeBSD over GNU/Linux</a></h3>

<blockquote>
<p>Since I wrote my article &quot;Why you should migrate everything from Linux to BSD&quot; I have been wanting to write something about the technical reasons to choose FreeBSD over GNU/Linux and while I cannot possibly cover every single reason, I can write about some of the things that I consider worth noting.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3>+ <a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/" rel="nofollow">Not actually Linux distro review deux: GhostBSD</a></h3>

<blockquote>
<p>When I began work on the FreeBSD 12.1-RELEASE review last week, it didn&#39;t take long to figure out that the desktop portion wasn&#39;t going very smoothly.</p>

<p>I think it&#39;s important for BSD-curious users to know of easier, gentler alternatives, so I did a little looking around and settled on GhostBSD for a follow-up review.</p>

<p>GhostBSD is based on TrueOS, which itself derives from FreeBSD Stable. It was originally a Canadian distro, but—like most successful distributions—it has transcended its country of origin and can now be considered worldwide. Significant GhostBSD development takes place now in Canada, Italy, Germany, and the United States.</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/6265" rel="nofollow">“TLS Mastery” sponsorships open</a></h3>

<blockquote>
<p>My next book will be TLS Mastery, all about Transport Layer Encryption, Let’s Encrypt, OCSP, and so on.</p>

<p>This should be a shorter book, more like my DNSSEC or Tarsnap titles, or the first edition of Sudo Mastery. I would like a break from writing doorstops like the SNMP and jails books.</p>
</blockquote>

<hr>

<h3>JT (our producer) shared his Open Source Retail Box Collection on twitter this past weekend and there was a nice response from a few in the BSD Community showing their collections:</h3>

<ul>
<li><p>JT&#39;s post: <a href="https://twitter.com/q5sys/status/1251194823589138432" rel="nofollow">https://twitter.com/q5sys/status/1251194823589138432</a></p>

<ul>
<li>High Resolution Image to see the bottom shelf better: <a href="https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg" rel="nofollow">https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg</a></li>
<li>Closeup of the BSD Section: <a href="https://twitter.com/q5sys/status/1251294290782928897" rel="nofollow">https://twitter.com/q5sys/status/1251294290782928897</a></li>
</ul></li>
<li><p>Others jumped in with their collections:</p>

<ul>
<li>Deb Goodkin&#39;s collection: <a href="https://twitter.com/dgoodkin/status/1251294016139743232" rel="nofollow">https://twitter.com/dgoodkin/status/1251294016139743232</a> &amp; <a href="https://twitter.com/dgoodkin/status/1251298125672660992" rel="nofollow">https://twitter.com/dgoodkin/status/1251298125672660992</a></li>
<li>FreeBSD Frau&#39;s FreeBSD Collection: <a href="https://twitter.com/freebsdfrau/status/1251290430475350018" rel="nofollow">https://twitter.com/freebsdfrau/status/1251290430475350018</a></li>
<li>Jason Tubnor&#39;s OpenBSD Collection: <a href="https://twitter.com/Tubsta/status/1251265902214918144" rel="nofollow">https://twitter.com/Tubsta/status/1251265902214918144</a></li>
</ul></li>
</ul>

<p>Do you have a nice collection, take a picture and send it in!</p>

<hr>

<h3><a href="https://bsdb0y.github.io/blog/deep-dive-into-the-OpenBSD-malloc-and-friends-internals-part-1.html" rel="nofollow">Tale of OpenBSD secure memory allocator internals - malloc(3)</a></h3>

<blockquote>
<p>Hi there,</p>

<p>It&#39;s been a very long time I haven&#39;t written anything after my last OpenBSD blogs, that is, </p>

<p>OpenBSD Kernel Internals — Creation of process from user-space to kernel space.</p>

<p>OpenBSD: Introduction to <code>execpromises</code> in the pledge(2)</p>

<p>pledge(2): OpenBSD&#39;s defensive approach to OS Security</p>

<p>So, again I started reading OpenBSD source codes with debugger after reducing my sleep timings and managing to get some time after professional life. This time I have picked one of my favourite item from my wishlist to learn and share, that is, OpenBSD malloc(3), secure allocator</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/community/threads/how-i-learned-to-stop-worrying-and-love-ssds.82617/" rel="nofollow">How I learned to stop worrying and love SSDs</a></h3>

<blockquote>
<p>my home FreeNAS runs two pools for data. One RAIDZ2 with four spinning disk drives and one mirror with two SSDs. Toying with InfluxDB and Grafana in the last couple of days I found that I seem to have a constant write load of 1 Megabyte (!) per second on the SSDs. What the ...?</p>

<p>So I run three VMs on the SSDs in total. One with Windows 10, two with Ubuntu running Confluence, A wiki essentially, with files for attachments and MySQL as the backend database. Clearly the writes had to stop when the wikis were not used at all, just sitting idle, right?</p>

<p>Well even with a full query log and quite some experience in the operation of web applications I could not figure out what Confluence is doing (productively, no doubt) but trust me, it writes a couple of hundred kbytes to the database each second just sitting idle.</p>
</blockquote>

<hr>

<h3><a href="https://chown.me/blog/infrastructure-2019.html" rel="nofollow">My infrastructure as of 2019</a></h3>

<blockquote>
<p>I&#39;ve wanted to write about my infrastructure for a while, but I kept thinking, &quot;I&#39;ll wait until after I&#39;ve done $next_thing_on_my_todo.&quot; Of course this cycle never ends, so I decided to write about its state at the end of 2019. Maybe I&#39;ll write an update on it in a couple of moons; who knows?</p>
</blockquote>

<hr>

<h2>For something different than our usual Beastie Bits… we bring you…</h2>

<h2>We&#39;re all quarantined so lets install BSD on things!  Install BSD on something this week, write it up and let us know about it, and maybe we&#39;ll feature you!</h2>

<ul>
<li><p><a href="https://e17i.github.io/articles-netbsd-install/" rel="nofollow">Installation of NetBSD on a Mac Mini</a></p></li>
<li><p><a href="https://icyphox.sh/blog/openbsd-hp-envy/" rel="nofollow">OpenBSD on the HP Envy 13</a></p></li>
<li><p><a href="https://www.rs-online.com/designspark/install-netbsd-on-a-vintage-computer" rel="nofollow">Install NetBSD on a Vintage Computer</a></p></li>
<li><p><a href="https://twitter.com/allanjude/status/1251895348836143104" rel="nofollow">BSDCan Home Lab Panel recording session: May 5th at 18:00 UTC</a></p></li>
<li><p><a href="https://wiki.freebsd.org/OfficeHours" rel="nofollow">Allan started a series of FreeBSD Office Hours</a></p></li>
</ul>

<hr>

<h2>BSDNow is going Independent</h2>

<ul>
<li>After being part of Jupiter Broadcasting since we started back in 2013, BSDNow is moving to become independent. We extend a very large thank you to Jupiter Broadcasting and Linux Academy for hosting us for so many years, and allowing us to bring you over 100 episodes without advertisements.
What does this mean for you, the listener? Not much will change, just make sure your subscription is via the RSS feed at BSDNow.tv rather than one of the Jupiter Broadcasting feeds. We will update you with more news as things settle out.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Todd - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/348/feedback/Todd%20-%20LinusTechTips&#x27;%20claims%20on%20ZFS.md" rel="nofollow">LinusTechTips Claims about ZFS</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>343: FreeBSD, Corona: Fight!</title>
  <link>https://www.bsdnow.tv/343</link>
  <guid isPermaLink="false">1752e8c2-3d6e-40dc-8bd9-5c7654660b15</guid>
  <pubDate>Thu, 26 Mar 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1752e8c2-3d6e-40dc-8bd9-5c7654660b15.mp3" length="28131915" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Fighting the Coronavirus with FreeBSD, Wireguard VPN Howto in OPNsense, NomadBSD 1.3.1 available, fresh GhostBSD 20.02, New FuryBSD XFCE and KDE images, pf-badhost 0.3 released, and more.</itunes:subtitle>
  <itunes:duration>39:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Fighting the Coronavirus with FreeBSD, Wireguard VPN Howto in OPNsense, NomadBSD 1.3.1 available, fresh GhostBSD 20.02, New FuryBSD XFCE and KDE images, pf-badhost 0.3 released, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-freebsd-foldinghome/" target="_blank" rel="nofollow noopener"&gt;Fighting the Coronavirus with FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Here is a quick HOWTO for those who want to provide some FreeBSD based compute resources to help finding vaccines.&lt;/p&gt;

&lt;p&gt;&amp;gt; UPDATE 2020-03-22: 0mp@ made a port out of this, it is in “biology/linux-foldingathome”.&lt;/p&gt;

&lt;p&gt;&amp;gt; Per default it will now pick up some SARS-CoV‑2 (COVID-19) related folding tasks. There are some more config options (e.g. how much of the system resources are used). Please refer to the official Folding@Home site for more information about that. Be also aware that there is a big rise in compute resources donated to Folding@Home, so the pool of available work units may be empty from time to time, but they are working on adding more work units. Be patient.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://homenetworkguy.com/how-to/configure-wireguard-opnsense/" target="_blank" rel="nofollow noopener"&gt;How to configure the Wireguard VPN in OPNsense&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; WireGuard is a modern designed VPN that uses the latest cryptography for stronger security, is very lightweight, and is relatively easy to set up (mostly). I say ‘mostly’ because I found setting up WireGuard in OPNsense to be more difficult than I anticipated. The basic setup of the WireGuard VPN itself was as easy as the authors claim on their website, but I came across a few gotcha's. The gotcha's occur with functionality that is beyond the scope of the WireGuard protocol so I cannot fault them for that. My greatest struggle was configuring WireGuard to function similarly to my OpenVPN server. I want the ability to connect remotely to my home network from my iPhone or iPad, tunnel all traffic through the VPN, have access to certain devices and services on my network, and have the VPN devices use my home's Internet connection.&lt;/p&gt;

&lt;p&gt;&amp;gt; WireGuard behaves more like a SSH server than a typical VPN server. With WireGuard, devices which have shared their cryptographic keys with each other are able to connect via an encrypted tunnel (like a SSH server configured to use keys instead of passwords). The devices that are connecting to one another are referred to as “peer” devices. When the peer device is an OPNsense router with WireGuard installed, for instance, it can be configured to allow access to various resources on your network. It becomes a tunnel into your network similar to OpenVPN (with the appropriate firewall rules enabled). I will refer to the WireGuard installation on OPNsense as the server rather than a “peer” to make it more clear which device I am configuring unless I am describing the user interface because that is the terminology used interchangeably by WireGuard.&lt;/p&gt;

&lt;p&gt;&amp;gt; The documentation I found on WireGuard in OPNsense is straightforward and relatively easy to understand, but I had to wrestle with it for a little while to gain a better understanding on how it should be configured. I believe it was partially due to differing end goals – I was trying to achieve something a little different than the authors of other wiki/blog/forum posts. Piecing together various sources of information, I finally ended up with a configuration that met the goals stated above.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://nomadbsd.org/index.html#1.3.1" target="_blank" rel="nofollow noopener"&gt;NomadBSD 1.3.1&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; NomadBSD 1.3.1 has recently been made available. NomadBSD is a lightweight and portable FreeBSD distribution, designed to run on live on a USB flash drive, allowing you to plug, test, and play on different hardware. They have also started a forum as of yesterday, where you can ask questions and mingle with the NomadBSD community. Notable changes in 1.3.1 are base system upgraded to FreeBSD 12.1-p2. automatic network interface setup improved, image size increased to over 4GB, Thunderbird, Zeroconf, and some more listed below.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://ghostbsd.org/20.02_release_announcement" target="_blank" rel="nofollow noopener"&gt;GhostBSD 20.02&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Eric Turgeon, main developer of GhostBSD, has announced version 20.02 of the FreeBSD based operating system. Notable changes are ZFS partition into the custom partition editor installer, allowing you to install alongside with Windows, Linux, or macOS. Other changes are force upgrade all packages on system upgrade, improved update station, and powerd by default for laptop battery performance.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.furybsd.org/new-furybsd-12-1-based-images-are-available-for-xfce-and-kde/" target="_blank" rel="nofollow noopener"&gt;New FuryBSD XFCE and KDE images&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; This new release is now based on FreeBSD 12.1 with the latest FreeBSD quarterly packages. This brings XFCE up to 4.14, and KDE up to 5.17. In addition to updates this new ISO mostly addresses community bugs, community enhancement requests, and community pull requests. Due to the overwhelming amount of reports with GitHub hosting all new releases are now being pushed to SourceForge only for the time being. Previous releases will still be kept for archive purposes.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.geoghegan.ca/pfbadhost.html" target="_blank" rel="nofollow noopener"&gt;pf-badhost 0.3 Released&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet's biggest irritants. Annoyances such as SSH and SMTP bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2020/03/23/24324.html" target="_blank" rel="nofollow noopener"&gt;DragonFly i915 drm update&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blog.snailtext.com/posts/cshell-is-punk-rock.html" target="_blank" rel="nofollow noopener"&gt;CShell is punk rock&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://minnie.tuhs.org/pipermail/tuhs/2020-March/020664.html" target="_blank" rel="nofollow noopener"&gt;The most surprising Unix programs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Master One - &lt;a href="http://dpaste.com/102HKF5#wrap" target="_blank" rel="nofollow noopener"&gt;Torn between OpenBSD and FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Brad - &lt;a href="http://dpaste.com/1VXQA2Y#wrap" target="_blank" rel="nofollow noopener"&gt;Follow up to Linus ZFS story&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Filipe Carvalho - &lt;a href="http://dpaste.com/2H7S8YP" target="_blank" rel="nofollow noopener"&gt;Call for Portuguese BSD User Groups&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0343.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, corona, corona virus, covid-19, foldingathome, folding at home, wireguard, vpn, opnsense, nomadbsd, ghostbsd, furybsd, xfce, kde, pf, pf-badhost </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Fighting the Coronavirus with FreeBSD, Wireguard VPN Howto in OPNsense, NomadBSD 1.3.1 available, fresh GhostBSD 20.02, New FuryBSD XFCE and KDE images, pf-badhost 0.3 released, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-freebsd-foldinghome/" rel="nofollow">Fighting the Coronavirus with FreeBSD</a></h3>

<blockquote>
<p>Here is a quick HOWTO for those who want to provide some FreeBSD based compute resources to help finding vaccines.</p>

<p>UPDATE 2020-03-22: 0mp@ made a port out of this, it is in “biology/linux-foldingathome”.</p>

<p>Per default it will now pick up some SARS-CoV‑2 (COVID-19) related folding tasks. There are some more config options (e.g. how much of the system resources are used). Please refer to the official Folding@Home site for more information about that. Be also aware that there is a big rise in compute resources donated to Folding@Home, so the pool of available work units may be empty from time to time, but they are working on adding more work units. Be patient.</p>
</blockquote>

<hr>

<h3><a href="https://homenetworkguy.com/how-to/configure-wireguard-opnsense/" rel="nofollow">How to configure the Wireguard VPN in OPNsense</a></h3>

<blockquote>
<p>WireGuard is a modern designed VPN that uses the latest cryptography for stronger security, is very lightweight, and is relatively easy to set up (mostly). I say ‘mostly’ because I found setting up WireGuard in OPNsense to be more difficult than I anticipated. The basic setup of the WireGuard VPN itself was as easy as the authors claim on their website, but I came across a few gotcha&#39;s. The gotcha&#39;s occur with functionality that is beyond the scope of the WireGuard protocol so I cannot fault them for that. My greatest struggle was configuring WireGuard to function similarly to my OpenVPN server. I want the ability to connect remotely to my home network from my iPhone or iPad, tunnel all traffic through the VPN, have access to certain devices and services on my network, and have the VPN devices use my home&#39;s Internet connection.</p>

<p>WireGuard behaves more like a SSH server than a typical VPN server. With WireGuard, devices which have shared their cryptographic keys with each other are able to connect via an encrypted tunnel (like a SSH server configured to use keys instead of passwords). The devices that are connecting to one another are referred to as “peer” devices. When the peer device is an OPNsense router with WireGuard installed, for instance, it can be configured to allow access to various resources on your network. It becomes a tunnel into your network similar to OpenVPN (with the appropriate firewall rules enabled). I will refer to the WireGuard installation on OPNsense as the server rather than a “peer” to make it more clear which device I am configuring unless I am describing the user interface because that is the terminology used interchangeably by WireGuard.</p>

<p>The documentation I found on WireGuard in OPNsense is straightforward and relatively easy to understand, but I had to wrestle with it for a little while to gain a better understanding on how it should be configured. I believe it was partially due to differing end goals – I was trying to achieve something a little different than the authors of other wiki/blog/forum posts. Piecing together various sources of information, I finally ended up with a configuration that met the goals stated above.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://nomadbsd.org/index.html#1.3.1" rel="nofollow">NomadBSD 1.3.1</a></h3>

<blockquote>
<p>NomadBSD 1.3.1 has recently been made available. NomadBSD is a lightweight and portable FreeBSD distribution, designed to run on live on a USB flash drive, allowing you to plug, test, and play on different hardware. They have also started a forum as of yesterday, where you can ask questions and mingle with the NomadBSD community. Notable changes in 1.3.1 are base system upgraded to FreeBSD 12.1-p2. automatic network interface setup improved, image size increased to over 4GB, Thunderbird, Zeroconf, and some more listed below.</p>
</blockquote>

<hr>

<h3><a href="https://ghostbsd.org/20.02_release_announcement" rel="nofollow">GhostBSD 20.02</a></h3>

<blockquote>
<p>Eric Turgeon, main developer of GhostBSD, has announced version 20.02 of the FreeBSD based operating system. Notable changes are ZFS partition into the custom partition editor installer, allowing you to install alongside with Windows, Linux, or macOS. Other changes are force upgrade all packages on system upgrade, improved update station, and powerd by default for laptop battery performance.</p>
</blockquote>

<hr>

<h3><a href="https://www.furybsd.org/new-furybsd-12-1-based-images-are-available-for-xfce-and-kde/" rel="nofollow">New FuryBSD XFCE and KDE images</a></h3>

<blockquote>
<p>This new release is now based on FreeBSD 12.1 with the latest FreeBSD quarterly packages. This brings XFCE up to 4.14, and KDE up to 5.17. In addition to updates this new ISO mostly addresses community bugs, community enhancement requests, and community pull requests. Due to the overwhelming amount of reports with GitHub hosting all new releases are now being pushed to SourceForge only for the time being. Previous releases will still be kept for archive purposes.</p>
</blockquote>

<hr>

<h3><a href="https://www.geoghegan.ca/pfbadhost.html" rel="nofollow">pf-badhost 0.3 Released</a></h3>

<blockquote>
<p>pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet&#39;s biggest irritants. Annoyances such as SSH and SMTP bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/03/23/24324.html" rel="nofollow">DragonFly i915 drm update</a></li>
<li><a href="http://blog.snailtext.com/posts/cshell-is-punk-rock.html" rel="nofollow">CShell is punk rock</a></li>
<li><a href="https://minnie.tuhs.org/pipermail/tuhs/2020-March/020664.html" rel="nofollow">The most surprising Unix programs</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Master One - <a href="http://dpaste.com/102HKF5#wrap" rel="nofollow">Torn between OpenBSD and FreeBSD</a></li>
<li>Brad - <a href="http://dpaste.com/1VXQA2Y#wrap" rel="nofollow">Follow up to Linus ZFS story</a></li>
<li>Filipe Carvalho - <a href="http://dpaste.com/2H7S8YP" rel="nofollow">Call for Portuguese BSD User Groups</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0343.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Fighting the Coronavirus with FreeBSD, Wireguard VPN Howto in OPNsense, NomadBSD 1.3.1 available, fresh GhostBSD 20.02, New FuryBSD XFCE and KDE images, pf-badhost 0.3 released, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-freebsd-foldinghome/" rel="nofollow">Fighting the Coronavirus with FreeBSD</a></h3>

<blockquote>
<p>Here is a quick HOWTO for those who want to provide some FreeBSD based compute resources to help finding vaccines.</p>

<p>UPDATE 2020-03-22: 0mp@ made a port out of this, it is in “biology/linux-foldingathome”.</p>

<p>Per default it will now pick up some SARS-CoV‑2 (COVID-19) related folding tasks. There are some more config options (e.g. how much of the system resources are used). Please refer to the official Folding@Home site for more information about that. Be also aware that there is a big rise in compute resources donated to Folding@Home, so the pool of available work units may be empty from time to time, but they are working on adding more work units. Be patient.</p>
</blockquote>

<hr>

<h3><a href="https://homenetworkguy.com/how-to/configure-wireguard-opnsense/" rel="nofollow">How to configure the Wireguard VPN in OPNsense</a></h3>

<blockquote>
<p>WireGuard is a modern designed VPN that uses the latest cryptography for stronger security, is very lightweight, and is relatively easy to set up (mostly). I say ‘mostly’ because I found setting up WireGuard in OPNsense to be more difficult than I anticipated. The basic setup of the WireGuard VPN itself was as easy as the authors claim on their website, but I came across a few gotcha&#39;s. The gotcha&#39;s occur with functionality that is beyond the scope of the WireGuard protocol so I cannot fault them for that. My greatest struggle was configuring WireGuard to function similarly to my OpenVPN server. I want the ability to connect remotely to my home network from my iPhone or iPad, tunnel all traffic through the VPN, have access to certain devices and services on my network, and have the VPN devices use my home&#39;s Internet connection.</p>

<p>WireGuard behaves more like a SSH server than a typical VPN server. With WireGuard, devices which have shared their cryptographic keys with each other are able to connect via an encrypted tunnel (like a SSH server configured to use keys instead of passwords). The devices that are connecting to one another are referred to as “peer” devices. When the peer device is an OPNsense router with WireGuard installed, for instance, it can be configured to allow access to various resources on your network. It becomes a tunnel into your network similar to OpenVPN (with the appropriate firewall rules enabled). I will refer to the WireGuard installation on OPNsense as the server rather than a “peer” to make it more clear which device I am configuring unless I am describing the user interface because that is the terminology used interchangeably by WireGuard.</p>

<p>The documentation I found on WireGuard in OPNsense is straightforward and relatively easy to understand, but I had to wrestle with it for a little while to gain a better understanding on how it should be configured. I believe it was partially due to differing end goals – I was trying to achieve something a little different than the authors of other wiki/blog/forum posts. Piecing together various sources of information, I finally ended up with a configuration that met the goals stated above.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://nomadbsd.org/index.html#1.3.1" rel="nofollow">NomadBSD 1.3.1</a></h3>

<blockquote>
<p>NomadBSD 1.3.1 has recently been made available. NomadBSD is a lightweight and portable FreeBSD distribution, designed to run on live on a USB flash drive, allowing you to plug, test, and play on different hardware. They have also started a forum as of yesterday, where you can ask questions and mingle with the NomadBSD community. Notable changes in 1.3.1 are base system upgraded to FreeBSD 12.1-p2. automatic network interface setup improved, image size increased to over 4GB, Thunderbird, Zeroconf, and some more listed below.</p>
</blockquote>

<hr>

<h3><a href="https://ghostbsd.org/20.02_release_announcement" rel="nofollow">GhostBSD 20.02</a></h3>

<blockquote>
<p>Eric Turgeon, main developer of GhostBSD, has announced version 20.02 of the FreeBSD based operating system. Notable changes are ZFS partition into the custom partition editor installer, allowing you to install alongside with Windows, Linux, or macOS. Other changes are force upgrade all packages on system upgrade, improved update station, and powerd by default for laptop battery performance.</p>
</blockquote>

<hr>

<h3><a href="https://www.furybsd.org/new-furybsd-12-1-based-images-are-available-for-xfce-and-kde/" rel="nofollow">New FuryBSD XFCE and KDE images</a></h3>

<blockquote>
<p>This new release is now based on FreeBSD 12.1 with the latest FreeBSD quarterly packages. This brings XFCE up to 4.14, and KDE up to 5.17. In addition to updates this new ISO mostly addresses community bugs, community enhancement requests, and community pull requests. Due to the overwhelming amount of reports with GitHub hosting all new releases are now being pushed to SourceForge only for the time being. Previous releases will still be kept for archive purposes.</p>
</blockquote>

<hr>

<h3><a href="https://www.geoghegan.ca/pfbadhost.html" rel="nofollow">pf-badhost 0.3 Released</a></h3>

<blockquote>
<p>pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet&#39;s biggest irritants. Annoyances such as SSH and SMTP bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/03/23/24324.html" rel="nofollow">DragonFly i915 drm update</a></li>
<li><a href="http://blog.snailtext.com/posts/cshell-is-punk-rock.html" rel="nofollow">CShell is punk rock</a></li>
<li><a href="https://minnie.tuhs.org/pipermail/tuhs/2020-March/020664.html" rel="nofollow">The most surprising Unix programs</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Master One - <a href="http://dpaste.com/102HKF5#wrap" rel="nofollow">Torn between OpenBSD and FreeBSD</a></li>
<li>Brad - <a href="http://dpaste.com/1VXQA2Y#wrap" rel="nofollow">Follow up to Linus ZFS story</a></li>
<li>Filipe Carvalho - <a href="http://dpaste.com/2H7S8YP" rel="nofollow">Call for Portuguese BSD User Groups</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0343.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>339: BSD Fundraising</title>
  <link>https://www.bsdnow.tv/339</link>
  <guid isPermaLink="false">581b71e1-6a98-41d7-b8d8-477eaaaba8db</guid>
  <pubDate>Thu, 27 Feb 2020 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/581b71e1-6a98-41d7-b8d8-477eaaaba8db.mp3" length="38843791" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Meet FuryBSD, NetBSD 9.0 has been released, OpenBSD Foundation 2019 campaign wrapup, a retrospective on OmniOS ZFS-based NFS fileservers, NetBSD Fundraising 2020 goal, OpenSSH 8.2 released, and more.</itunes:subtitle>
  <itunes:duration>53:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Meet FuryBSD, NetBSD 9.0 has been released, OpenBSD Foundation 2019 campaign wrapup, a retrospective on OmniOS ZFS-based NFS fileservers, NetBSD Fundraising 2020 goal, OpenSSH 8.2 released, and more.## Headlines&lt;/p&gt;

&lt;h3&gt;&lt;a href="https://itsfoss.com/furybsd/" target="_blank" rel="nofollow noopener"&gt;Meet FuryBSD: A New Desktop BSD Distribution&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; At its heart, FuryBSD is a very simple beast. According to the site, “FuryBSD is a back to basics lightweight desktop distribution based on stock FreeBSD.” It is basically FreeBSD with a desktop environment pre-configured and several apps preinstalled. The goal is to quickly get a FreeBSD-based system running on your computer.&lt;/p&gt;

&lt;p&gt;&amp;gt; You might be thinking that this sounds a lot like a couple of other BSDs that are available, such as NomadBSD and GhostBSD. The major difference between those BSDs and FuryBSD is that FuryBSD is much closer to stock FreeBSD. For example, FuryBSD uses the FreeBSD installer, while others have created their own installers and utilities.&lt;/p&gt;

&lt;p&gt;&amp;gt; As it states on the site, “Although FuryBSD may resemble past graphical BSD projects like PC-BSD and TrueOS, FuryBSD is created by a different team and takes a different approach focusing on tight integration with FreeBSD. This keeps overhead low and maintains compatibility with upstream.” The lead dev also told me that “One key focus for FuryBSD is for it to be a small live media with a few assistive tools to test drivers for hardware.”&lt;/p&gt;

&lt;p&gt;&amp;gt; Currently, you can go to the FuryBSD homepage and download either an XFCE or KDE LiveCD. A GNOME version is in the works.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html" target="_blank" rel="nofollow noopener"&gt;NetBSD 9.0&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; The NetBSD Project is pleased to announce NetBSD 9.0, the seventeenth major release of the NetBSD operating system.&lt;/p&gt;

&lt;p&gt;&amp;gt; This release brings significant improvements in terms of hardware support, quality assurance, security, along with new features and hundreds of bug fixes. Here are some highlights of this new release.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article;sid=20200217001107" target="_blank" rel="nofollow noopener"&gt;OpenBSD Foundation 2019 campaign wrapup&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Our target for 2019 was CDN$300K. Our community's continued generosity combined with our corporate donors exceeded that nicely. In addition we received the largest single donation in our history, CDN$380K from Smartisan. The return of Google was another welcome event. Altogether 2019 was our most successful campaign to date, yielding CDN$692K in total.&lt;/p&gt;

&lt;p&gt;&amp;gt; We thank all our donors, Iridium (Smartisan), Platinum (Yandex, Google), Gold (Microsoft, Facebook) Silver (2Keys) and Bronze (genua, Thinkst Canary). But especially our community of smaller donors whose contributions are the bedrock of our support. Thank you all!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.openbsdfoundation.org/campaign2019.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD Foundation 2019 Fundraising Goal Exceeded&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/OmniOSFileserverRetrospective" target="_blank" rel="nofollow noopener"&gt;A retrospective on our OmniOS ZFS-based NFS fileservers&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Our OmniOS fileservers have now been out of service for about six months, which makes it somewhat past time for a retrospective on them. Our OmniOS fileservers followed on our Solaris fileservers, which I wrote a two part retrospective on (part 1, part 2), and have now been replaced by our Linux fileservers. To be honest, I have been sitting on my hands about writing this retrospective because we have mixed feelings about our OmniOS fileservers.&lt;/p&gt;

&lt;p&gt;&amp;gt; I will put the summary up front. OmniOS worked reasonably well for us over its lifespan here and looking back I think it was almost certainly the right choice for us at the time we made that choice (which was 2013 and 2014). However it was not without issues that marred our experience with it in practice, although not enough to make me regret that we ran it (and ran it for as long as we did). Part of our issues are likely due to a design mistake in making our fileservers too big, although this design mistake was probably magnified when we were unable to use Intel 10G-T networking in OmniOS.&lt;/p&gt;

&lt;p&gt;&amp;gt; On the one hand, our OmniOS fileservers worked, almost always reliably. Like our Solaris fileservers before them, they ran quietly for years without needing much attention, delivering NFS fileservice to our Ubuntu servers; specifically, we ran them for about five years (2014 through 2019, although we started migrating away at the end of 2018). Over this time we had only minor hardware issues and not all that many disk failures, and we suffered no data loss (with ZFS checksums likely saving us several times, and certainly providing good reassurances). Our overall environment was easy to manage and was pretty much problem free in the face of things like failed disks. I'm pretty sure that our users saw a NFS environment that was solid, reliable, and performed well pretty much all of the time, which is the important thing. So OmniOS basically delivered the fileserver environment we wanted.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/fundraising_2020" target="_blank" rel="nofollow noopener"&gt;NetBSD Fundraising 2020 goal&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Is it really more than 10 years since we last had an official fundraising drive?&lt;/p&gt;

&lt;p&gt;&amp;gt; Looking at old TNF financial reports I noticed that we have been doing quite well financially over the last years, with a steady stream of small and medium donations, and most of the time only moderate expenditures. The last fundraising drive back in 2009 was a giant success, and we have lived off it until now.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.openssh.com/txt/release-8.2" target="_blank" rel="nofollow noopener"&gt;OpenSSH 8.2 released February 14, 2020&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; OpenSSH 8.2 was released on 2020-02-14. It is available from the mirrors listed at &lt;a href="https://www.openssh.com/" target="_blank" rel="nofollow noopener"&gt;https://www.openssh.com/&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&amp;gt; OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support.&lt;/p&gt;

&lt;p&gt;&amp;gt; Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.openssh.com/donations.html" target="_blank" rel="nofollow noopener"&gt;https://www.openssh.com/donations.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=aXsRIrC5bjg" target="_blank" rel="nofollow noopener"&gt;FreeNAS vs. Unraid: GRUDGE MATCH!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cb.vu/unixtoolbox.xhtml" target="_blank" rel="nofollow noopener"&gt;Unix Toolbox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.rigsofrods.org/" target="_blank" rel="nofollow noopener"&gt;Rigs of Rods - OpenBSD Physics Game&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://dpaste.com/0V35MAB#wrap" target="_blank" rel="nofollow noopener"&gt;NYCBug - Dr Vixie&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Hamilton BSD User group will meet again on March 10th](&lt;a href="http://studybsd.com/" target="_blank" rel="nofollow noopener"&gt;http://studybsd.com/&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/BSD-Users-Stockholm/events/267873938/" target="_blank" rel="nofollow noopener"&gt;BSD Stockholm - Meetup March 3rd 2020&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Shirkdog - &lt;a href="http://dpaste.com/36E2BZ1" target="_blank" rel="nofollow noopener"&gt;Question&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Master One - &lt;a href="http://dpaste.com/3B9M814#wrap" target="_blank" rel="nofollow noopener"&gt;ZFS + Suspend/resume&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Micah Roth - &lt;a href="http://dpaste.com/0D4GDX1#wrap" target="_blank" rel="nofollow noopener"&gt;ZFS write caching&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0339.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, furybsd, desktop, desktop bsd, netbsd 9.0, openbsd foundation, campaign wrapup, retrospective, omnios, zfs, nfs, fileserver, netbsd fundraising, fundraising goal, openssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Meet FuryBSD, NetBSD 9.0 has been released, OpenBSD Foundation 2019 campaign wrapup, a retrospective on OmniOS ZFS-based NFS fileservers, NetBSD Fundraising 2020 goal, OpenSSH 8.2 released, and more.## Headlines</p>

<h3><a href="https://itsfoss.com/furybsd/" rel="nofollow">Meet FuryBSD: A New Desktop BSD Distribution</a></h3>

<blockquote>
<p>At its heart, FuryBSD is a very simple beast. According to the site, “FuryBSD is a back to basics lightweight desktop distribution based on stock FreeBSD.” It is basically FreeBSD with a desktop environment pre-configured and several apps preinstalled. The goal is to quickly get a FreeBSD-based system running on your computer.</p>

<p>You might be thinking that this sounds a lot like a couple of other BSDs that are available, such as NomadBSD and GhostBSD. The major difference between those BSDs and FuryBSD is that FuryBSD is much closer to stock FreeBSD. For example, FuryBSD uses the FreeBSD installer, while others have created their own installers and utilities.</p>

<p>As it states on the site, “Although FuryBSD may resemble past graphical BSD projects like PC-BSD and TrueOS, FuryBSD is created by a different team and takes a different approach focusing on tight integration with FreeBSD. This keeps overhead low and maintains compatibility with upstream.” The lead dev also told me that “One key focus for FuryBSD is for it to be a small live media with a few assistive tools to test drivers for hardware.”</p>

<p>Currently, you can go to the FuryBSD homepage and download either an XFCE or KDE LiveCD. A GNOME version is in the works.</p>
</blockquote>

<hr>

<h3><a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html" rel="nofollow">NetBSD 9.0</a></h3>

<blockquote>
<p>The NetBSD Project is pleased to announce NetBSD 9.0, the seventeenth major release of the NetBSD operating system.</p>

<p>This release brings significant improvements in terms of hardware support, quality assurance, security, along with new features and hundreds of bug fixes. Here are some highlights of this new release.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20200217001107" rel="nofollow">OpenBSD Foundation 2019 campaign wrapup</a></h3>

<blockquote>
<p>Our target for 2019 was CDN$300K. Our community&#39;s continued generosity combined with our corporate donors exceeded that nicely. In addition we received the largest single donation in our history, CDN$380K from Smartisan. The return of Google was another welcome event. Altogether 2019 was our most successful campaign to date, yielding CDN$692K in total.</p>

<p>We thank all our donors, Iridium (Smartisan), Platinum (Yandex, Google), Gold (Microsoft, Facebook) Silver (2Keys) and Bronze (genua, Thinkst Canary). But especially our community of smaller donors whose contributions are the bedrock of our support. Thank you all!</p>
</blockquote>

<ul>
<li><a href="https://www.openbsdfoundation.org/campaign2019.html" rel="nofollow">OpenBSD Foundation 2019 Fundraising Goal Exceeded</a></li>
</ul>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/OmniOSFileserverRetrospective" rel="nofollow">A retrospective on our OmniOS ZFS-based NFS fileservers</a></h3>

<blockquote>
<p>Our OmniOS fileservers have now been out of service for about six months, which makes it somewhat past time for a retrospective on them. Our OmniOS fileservers followed on our Solaris fileservers, which I wrote a two part retrospective on (part 1, part 2), and have now been replaced by our Linux fileservers. To be honest, I have been sitting on my hands about writing this retrospective because we have mixed feelings about our OmniOS fileservers.</p>

<p>I will put the summary up front. OmniOS worked reasonably well for us over its lifespan here and looking back I think it was almost certainly the right choice for us at the time we made that choice (which was 2013 and 2014). However it was not without issues that marred our experience with it in practice, although not enough to make me regret that we ran it (and ran it for as long as we did). Part of our issues are likely due to a design mistake in making our fileservers too big, although this design mistake was probably magnified when we were unable to use Intel 10G-T networking in OmniOS.</p>

<p>On the one hand, our OmniOS fileservers worked, almost always reliably. Like our Solaris fileservers before them, they ran quietly for years without needing much attention, delivering NFS fileservice to our Ubuntu servers; specifically, we ran them for about five years (2014 through 2019, although we started migrating away at the end of 2018). Over this time we had only minor hardware issues and not all that many disk failures, and we suffered no data loss (with ZFS checksums likely saving us several times, and certainly providing good reassurances). Our overall environment was easy to manage and was pretty much problem free in the face of things like failed disks. I&#39;m pretty sure that our users saw a NFS environment that was solid, reliable, and performed well pretty much all of the time, which is the important thing. So OmniOS basically delivered the fileserver environment we wanted.</p>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/fundraising_2020" rel="nofollow">NetBSD Fundraising 2020 goal</a></h3>

<blockquote>
<p>Is it really more than 10 years since we last had an official fundraising drive?</p>

<p>Looking at old TNF financial reports I noticed that we have been doing quite well financially over the last years, with a steady stream of small and medium donations, and most of the time only moderate expenditures. The last fundraising drive back in 2009 was a giant success, and we have lived off it until now.</p>
</blockquote>

<hr>

<h3><a href="http://www.openssh.com/txt/release-8.2" rel="nofollow">OpenSSH 8.2 released February 14, 2020</a></h3>

<blockquote>
<p>OpenSSH 8.2 was released on 2020-02-14. It is available from the mirrors listed at <a href="https://www.openssh.com/" rel="nofollow">https://www.openssh.com/</a>.</p>

<p>OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support.</p>

<p>Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at:</p>
</blockquote>

<ul>
<li><a href="https://www.openssh.com/donations.html" rel="nofollow">https://www.openssh.com/donations.html</a></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=aXsRIrC5bjg" rel="nofollow">FreeNAS vs. Unraid: GRUDGE MATCH!</a></li>
<li><a href="http://cb.vu/unixtoolbox.xhtml" rel="nofollow">Unix Toolbox</a></li>
<li><a href="https://docs.rigsofrods.org/" rel="nofollow">Rigs of Rods - OpenBSD Physics Game</a></li>
<li><a href="http://dpaste.com/0V35MAB#wrap" rel="nofollow">NYCBug - Dr Vixie</a></li>
<li>Hamilton BSD User group will meet again on March 10th](<a href="http://studybsd.com/" rel="nofollow">http://studybsd.com/</a>)</li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/267873938/" rel="nofollow">BSD Stockholm - Meetup March 3rd 2020</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Shirkdog - <a href="http://dpaste.com/36E2BZ1" rel="nofollow">Question</a></li>
<li>Master One - <a href="http://dpaste.com/3B9M814#wrap" rel="nofollow">ZFS + Suspend/resume</a></li>
<li>Micah Roth - <a href="http://dpaste.com/0D4GDX1#wrap" rel="nofollow">ZFS write caching</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0339.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Meet FuryBSD, NetBSD 9.0 has been released, OpenBSD Foundation 2019 campaign wrapup, a retrospective on OmniOS ZFS-based NFS fileservers, NetBSD Fundraising 2020 goal, OpenSSH 8.2 released, and more.## Headlines</p>

<h3><a href="https://itsfoss.com/furybsd/" rel="nofollow">Meet FuryBSD: A New Desktop BSD Distribution</a></h3>

<blockquote>
<p>At its heart, FuryBSD is a very simple beast. According to the site, “FuryBSD is a back to basics lightweight desktop distribution based on stock FreeBSD.” It is basically FreeBSD with a desktop environment pre-configured and several apps preinstalled. The goal is to quickly get a FreeBSD-based system running on your computer.</p>

<p>You might be thinking that this sounds a lot like a couple of other BSDs that are available, such as NomadBSD and GhostBSD. The major difference between those BSDs and FuryBSD is that FuryBSD is much closer to stock FreeBSD. For example, FuryBSD uses the FreeBSD installer, while others have created their own installers and utilities.</p>

<p>As it states on the site, “Although FuryBSD may resemble past graphical BSD projects like PC-BSD and TrueOS, FuryBSD is created by a different team and takes a different approach focusing on tight integration with FreeBSD. This keeps overhead low and maintains compatibility with upstream.” The lead dev also told me that “One key focus for FuryBSD is for it to be a small live media with a few assistive tools to test drivers for hardware.”</p>

<p>Currently, you can go to the FuryBSD homepage and download either an XFCE or KDE LiveCD. A GNOME version is in the works.</p>
</blockquote>

<hr>

<h3><a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html" rel="nofollow">NetBSD 9.0</a></h3>

<blockquote>
<p>The NetBSD Project is pleased to announce NetBSD 9.0, the seventeenth major release of the NetBSD operating system.</p>

<p>This release brings significant improvements in terms of hardware support, quality assurance, security, along with new features and hundreds of bug fixes. Here are some highlights of this new release.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20200217001107" rel="nofollow">OpenBSD Foundation 2019 campaign wrapup</a></h3>

<blockquote>
<p>Our target for 2019 was CDN$300K. Our community&#39;s continued generosity combined with our corporate donors exceeded that nicely. In addition we received the largest single donation in our history, CDN$380K from Smartisan. The return of Google was another welcome event. Altogether 2019 was our most successful campaign to date, yielding CDN$692K in total.</p>

<p>We thank all our donors, Iridium (Smartisan), Platinum (Yandex, Google), Gold (Microsoft, Facebook) Silver (2Keys) and Bronze (genua, Thinkst Canary). But especially our community of smaller donors whose contributions are the bedrock of our support. Thank you all!</p>
</blockquote>

<ul>
<li><a href="https://www.openbsdfoundation.org/campaign2019.html" rel="nofollow">OpenBSD Foundation 2019 Fundraising Goal Exceeded</a></li>
</ul>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/OmniOSFileserverRetrospective" rel="nofollow">A retrospective on our OmniOS ZFS-based NFS fileservers</a></h3>

<blockquote>
<p>Our OmniOS fileservers have now been out of service for about six months, which makes it somewhat past time for a retrospective on them. Our OmniOS fileservers followed on our Solaris fileservers, which I wrote a two part retrospective on (part 1, part 2), and have now been replaced by our Linux fileservers. To be honest, I have been sitting on my hands about writing this retrospective because we have mixed feelings about our OmniOS fileservers.</p>

<p>I will put the summary up front. OmniOS worked reasonably well for us over its lifespan here and looking back I think it was almost certainly the right choice for us at the time we made that choice (which was 2013 and 2014). However it was not without issues that marred our experience with it in practice, although not enough to make me regret that we ran it (and ran it for as long as we did). Part of our issues are likely due to a design mistake in making our fileservers too big, although this design mistake was probably magnified when we were unable to use Intel 10G-T networking in OmniOS.</p>

<p>On the one hand, our OmniOS fileservers worked, almost always reliably. Like our Solaris fileservers before them, they ran quietly for years without needing much attention, delivering NFS fileservice to our Ubuntu servers; specifically, we ran them for about five years (2014 through 2019, although we started migrating away at the end of 2018). Over this time we had only minor hardware issues and not all that many disk failures, and we suffered no data loss (with ZFS checksums likely saving us several times, and certainly providing good reassurances). Our overall environment was easy to manage and was pretty much problem free in the face of things like failed disks. I&#39;m pretty sure that our users saw a NFS environment that was solid, reliable, and performed well pretty much all of the time, which is the important thing. So OmniOS basically delivered the fileserver environment we wanted.</p>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/fundraising_2020" rel="nofollow">NetBSD Fundraising 2020 goal</a></h3>

<blockquote>
<p>Is it really more than 10 years since we last had an official fundraising drive?</p>

<p>Looking at old TNF financial reports I noticed that we have been doing quite well financially over the last years, with a steady stream of small and medium donations, and most of the time only moderate expenditures. The last fundraising drive back in 2009 was a giant success, and we have lived off it until now.</p>
</blockquote>

<hr>

<h3><a href="http://www.openssh.com/txt/release-8.2" rel="nofollow">OpenSSH 8.2 released February 14, 2020</a></h3>

<blockquote>
<p>OpenSSH 8.2 was released on 2020-02-14. It is available from the mirrors listed at <a href="https://www.openssh.com/" rel="nofollow">https://www.openssh.com/</a>.</p>

<p>OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support.</p>

<p>Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at:</p>
</blockquote>

<ul>
<li><a href="https://www.openssh.com/donations.html" rel="nofollow">https://www.openssh.com/donations.html</a></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=aXsRIrC5bjg" rel="nofollow">FreeNAS vs. Unraid: GRUDGE MATCH!</a></li>
<li><a href="http://cb.vu/unixtoolbox.xhtml" rel="nofollow">Unix Toolbox</a></li>
<li><a href="https://docs.rigsofrods.org/" rel="nofollow">Rigs of Rods - OpenBSD Physics Game</a></li>
<li><a href="http://dpaste.com/0V35MAB#wrap" rel="nofollow">NYCBug - Dr Vixie</a></li>
<li>Hamilton BSD User group will meet again on March 10th](<a href="http://studybsd.com/" rel="nofollow">http://studybsd.com/</a>)</li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/267873938/" rel="nofollow">BSD Stockholm - Meetup March 3rd 2020</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Shirkdog - <a href="http://dpaste.com/36E2BZ1" rel="nofollow">Question</a></li>
<li>Master One - <a href="http://dpaste.com/3B9M814#wrap" rel="nofollow">ZFS + Suspend/resume</a></li>
<li>Micah Roth - <a href="http://dpaste.com/0D4GDX1#wrap" rel="nofollow">ZFS write caching</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0339.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>338: iocage in Jail</title>
  <link>https://www.bsdnow.tv/338</link>
  <guid isPermaLink="false">7e9e4cfc-7a05-4ebe-8d45-a7282fe7ab0f</guid>
  <pubDate>Thu, 20 Feb 2020 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/7e9e4cfc-7a05-4ebe-8d45-a7282fe7ab0f.mp3" length="45174932" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Distrowatch reviews FuryBSD, LLDB on i386 for NetBSD, wpa_supplicant as lower-class citizen, KDE on FreeBSD updates, Travel Grant for BSDCan open, ZFS dataset for testing iocage within a jail, and more.</itunes:subtitle>
  <itunes:duration>1:02:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Distrowatch reviews FuryBSD, LLDB on i386 for NetBSD, wpa_supplicant as lower-class citizen, KDE on FreeBSD updates, Travel Grant for BSDCan open, ZFS dataset for testing iocage within a jail, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://distrowatch.com/weekly.php?issue=20200127#furybsd" target="_blank" rel="nofollow noopener"&gt;Distrowatch Fury BSD Review&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; FuryBSD is the most recent addition to the DistroWatch database and provides a live desktop operating system based on FreeBSD. FuryBSD is not entirely different in its goals from NomadBSD, which we discussed recently. I wanted to take this FreeBSD-based project for a test drive and see how it compares to NomadBSD and other desktop-oriented projects in the FreeBSD family.&lt;/p&gt;

&lt;p&gt;&amp;gt; FuryBSD supplies hybrid ISO/USB images which can be used to run a live desktop. There are two desktop editions currently, both for 64-bit (x86_64) machines: Xfce and KDE Plasma. The Xfce edition is 1.4GB in size and is the flavour I downloaded. The KDE Plasma edition is about 3.0GB in size.&lt;/p&gt;

&lt;p&gt;&amp;gt; My fresh install of FuryBSD booted to a graphical login screen. From there I could sign into my account, which brings up the Xfce desktop. The installed version of Xfce is the same as the live version, with a few minor changes. Most of the desktop icons have been removed with just the file manager launchers remaining. The Getting Started and System Information icons have been removed. Otherwise the experience is virtually identical to the live media.&lt;/p&gt;

&lt;p&gt;&amp;gt; FuryBSD uses a theme that is mostly grey and white with creamy yellow folder icons. The application menu launchers tend to have neutral icons, neither particularly bright and detailed or minimal.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/lldb_now_works_on_i386" target="_blank" rel="nofollow noopener"&gt;LLDB now works on i386&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Upstream describes LLDB as a next generation, high-performance debugger. It is built on top of LLVM/Clang toolchain, and features great integration with it. At the moment, it primarily supports debugging C, C++ and ObjC code, and there is interest in extending it to more languages.&lt;/p&gt;

&lt;p&gt;&amp;gt; In February 2019, I have started working on LLDB, as contracted by the NetBSD Foundation. So far I've been working on reenabling continuous integration, squashing bugs, improving NetBSD core file support, extending NetBSD's ptrace interface to cover more register types and fix compat32 issues, fixing watchpoint and threading support.&lt;/p&gt;

&lt;p&gt;&amp;gt; The original NetBSD port of LLDB was focused on amd64 only. In January, I have extended it to support i386 executables. This includes both 32-bit builds of LLDB (running natively on i386 kernel or via compat32) and debugging 32-bit programs from 64-bit LLDB.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://marc.info/?l=openbsd-misc&amp;amp;m=158068418807352&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;wpa_supplicant is definitely a lower-class citizen, sorry&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; wpa_supplicant is definitely a lower-class citizen, sorry.&lt;/p&gt;

&lt;p&gt;&amp;gt; I increasingly wonder why this stuff matters; transit costs are so much lower than the period when eduroam was setup, and their reliance on 802.11x is super weird in a world where, for the most part&lt;br&gt;
    + entire cities have open wifi in their downtown core&lt;br&gt;
    + edu vs edu+transit split horizon problems have to be solved anyways&lt;br&gt;
    + many universities have parallel open wifi&lt;br&gt;
    + rate limiting / fare-share approaches for the open-net, on unmetered&lt;br&gt;
    + flat-rate solves the problem&lt;br&gt;
    + LTE hotspot off a phone isn't a rip off anymore&lt;br&gt;
    + other open networks exist&lt;/p&gt;

&lt;p&gt;&amp;gt; essentially no one else feels compelled to do use 802.11x for a so called "semi-open access network", so I think they've lost the plot on friction vs benefit.&lt;/p&gt;

&lt;p&gt;&amp;gt; (we've held hackathons at EDU campus that are locked down like that, and in every case we've said no way, gotten a wire with open net, and built our own wifi.  we will not subject our developers to that extra complexity).&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://euroquis.nl/freebsd/2020/02/08/freebsd.html" target="_blank" rel="nofollow noopener"&gt;KDE FreeBSD Updates Feb 2020&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Some bits and bobs from the KDE FreeBSD team in february 2020. We met at the FreeBSD devsummit before FOSDEM, along with other FreeBSD people. Plans were made, schemes were forged, and Groff the Goat was introduced to some new people. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The big ticket things:

&lt;ul&gt;
&lt;li&gt; Frameworks are at 5.66&lt;/li&gt;
&lt;li&gt;Plasma is at 5.17.5 (the beta 5.18 hasn’t been tried)&lt;/li&gt;
&lt;li&gt;KDE release service has landed 19.12.2 (same day it was released)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Developer-centric:

&lt;ul&gt;
&lt;li&gt;KDevelop is at 5.5.0&lt;/li&gt;
&lt;li&gt;KUserfeedback landed its 1.0.0 release&lt;/li&gt;
&lt;li&gt;CMake is 3.16.3&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Applications:

&lt;ul&gt;
&lt;li&gt;Musescore is at 3.4.2&lt;/li&gt;
&lt;li&gt;Elisa now part of the KDE release service updates&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Fuure work:

&lt;ul&gt;
&lt;li&gt;KIO-Fuse probably needs extra real-world testing on FreeBSD. I don’t have that kind of   mounts (just NFS in /etc/fstab) so I’m not the target audience.&lt;/li&gt;
&lt;li&gt;KTextEditor is missing .editorconfig support. That can come in with the next frameworks update, when consumers update anyway. Chasing it in an intermediate release is a bit problematic because it does require some rebuilds of consumers.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-February/001929.html" target="_blank" rel="nofollow noopener"&gt;Travel Grant Application for BSDCan is now open&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Hi everyone,&lt;/p&gt;

&lt;p&gt;&amp;gt; The Travel Grant Application for BSDCan 2020 is now open. The Foundation can help you attend BSDCan through our travel grant program. Travel grants are available to FreeBSD developers and advocates who need assistance with travel expenses for attending conferences related to FreeBSD development. BSDCan 2020 applications are due April 9, 2020. Find out more and apply at: &lt;a href="https://www.freebsdfoundation.org/what-we-do/grants/travel-grants/" target="_blank" rel="nofollow noopener"&gt;https://www.freebsdfoundation.org/what-we-do/grants/travel-grants/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&amp;gt; Did you know the Foundation also provides grants for technical events not specifically focused on BSD? If you feel that your attendance at one of these events will benefit the FreeBSD Project and Community and you need assistance getting there,  please fill out the general travel grant application.  Your application must be received 7 weeks prior to the event. The general application can be found here: &lt;a href="https://goo.gl/forms/QzsOMR8Jra0vqFYH2" target="_blank" rel="nofollow noopener"&gt;https://goo.gl/forms/QzsOMR8Jra0vqFYH2&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dan.langille.org/2020/02/01/creating-a-zfs-dataset-for-testing-iocage-within-a-jail/" target="_blank" rel="nofollow noopener"&gt;Creating a ZFS dataset for testing iocage within a jail&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Be warned, this failed. I’m stalled and I have not completed this.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;  I’m going to do jails within a jail. I already do that with poudriere in a jail but here I want to test an older version of iocage before upgrading my current jail hosts to a newer version.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In this post:

&lt;ul&gt;
&lt;li&gt;FreeBSD 12.1&lt;/li&gt;
&lt;li&gt;py36-iocage-1.2_3&lt;/li&gt;
&lt;li&gt;py36-iocage-1.2_4&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; This post includes my errors and mistakes. Perhaps you should proceed carefully and read it all first.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.freebsdfoundation.org/journal/browser-based-edition/" target="_blank" rel="nofollow noopener"&gt;Reminder: the FreeBSD Journal is free! Check out these great articles&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/jcs/status/1224205573656322048" target="_blank" rel="nofollow noopener"&gt;Serenity GUI desktop running on an OpenBSD kernel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/apple-open-source/macos" target="_blank" rel="nofollow noopener"&gt;The Open Source Parts of MacOS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fosdem.org/2020/schedule/track/bsd/" target="_blank" rel="nofollow noopener"&gt;FOSDEM videos available&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Michael - &lt;a href="http://dpaste.com/3WRC9CQ#wrap" target="_blank" rel="nofollow noopener"&gt;Install with ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Mohammad - &lt;a href="http://dpaste.com/3BYZKMS#wrap" target="_blank" rel="nofollow noopener"&gt;Server Freeze&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Todd - &lt;a href="http://dpaste.com/2J50HSJ#wrap" target="_blank" rel="nofollow noopener"&gt;ZFS Questions&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0338.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, distrowatch, furybsd, review, lldb, i386, wpa_supplicant, KDE, desktop environment, DE, travel grant, grant, iocage, dataset, zfs, jail</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Distrowatch reviews FuryBSD, LLDB on i386 for NetBSD, wpa_supplicant as lower-class citizen, KDE on FreeBSD updates, Travel Grant for BSDCan open, ZFS dataset for testing iocage within a jail, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20200127#furybsd" rel="nofollow">Distrowatch Fury BSD Review</a></h3>

<blockquote>
<p>FuryBSD is the most recent addition to the DistroWatch database and provides a live desktop operating system based on FreeBSD. FuryBSD is not entirely different in its goals from NomadBSD, which we discussed recently. I wanted to take this FreeBSD-based project for a test drive and see how it compares to NomadBSD and other desktop-oriented projects in the FreeBSD family.</p>

<p>FuryBSD supplies hybrid ISO/USB images which can be used to run a live desktop. There are two desktop editions currently, both for 64-bit (x86_64) machines: Xfce and KDE Plasma. The Xfce edition is 1.4GB in size and is the flavour I downloaded. The KDE Plasma edition is about 3.0GB in size.</p>

<p>My fresh install of FuryBSD booted to a graphical login screen. From there I could sign into my account, which brings up the Xfce desktop. The installed version of Xfce is the same as the live version, with a few minor changes. Most of the desktop icons have been removed with just the file manager launchers remaining. The Getting Started and System Information icons have been removed. Otherwise the experience is virtually identical to the live media.</p>

<p>FuryBSD uses a theme that is mostly grey and white with creamy yellow folder icons. The application menu launchers tend to have neutral icons, neither particularly bright and detailed or minimal.</p>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/lldb_now_works_on_i386" rel="nofollow">LLDB now works on i386</a></h3>

<blockquote>
<p>Upstream describes LLDB as a next generation, high-performance debugger. It is built on top of LLVM/Clang toolchain, and features great integration with it. At the moment, it primarily supports debugging C, C++ and ObjC code, and there is interest in extending it to more languages.</p>

<p>In February 2019, I have started working on LLDB, as contracted by the NetBSD Foundation. So far I&#39;ve been working on reenabling continuous integration, squashing bugs, improving NetBSD core file support, extending NetBSD&#39;s ptrace interface to cover more register types and fix compat32 issues, fixing watchpoint and threading support.</p>

<p>The original NetBSD port of LLDB was focused on amd64 only. In January, I have extended it to support i386 executables. This includes both 32-bit builds of LLDB (running natively on i386 kernel or via compat32) and debugging 32-bit programs from 64-bit LLDB.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://marc.info/?l=openbsd-misc&m=158068418807352&w=2" rel="nofollow">wpa_supplicant is definitely a lower-class citizen, sorry</a></h3>

<blockquote>
<p>wpa_supplicant is definitely a lower-class citizen, sorry.</p>

<p>I increasingly wonder why this stuff matters; transit costs are so much lower than the period when eduroam was setup, and their reliance on 802.11x is super weird in a world where, for the most part<br>
    + entire cities have open wifi in their downtown core<br>
    + edu vs edu+transit split horizon problems have to be solved anyways<br>
    + many universities have parallel open wifi<br>
    + rate limiting / fare-share approaches for the open-net, on unmetered<br>
    + flat-rate solves the problem<br>
    + LTE hotspot off a phone isn&#39;t a rip off anymore<br>
    + other open networks exist</p>

<p>essentially no one else feels compelled to do use 802.11x for a so called &quot;semi-open access network&quot;, so I think they&#39;ve lost the plot on friction vs benefit.</p>

<p>(we&#39;ve held hackathons at EDU campus that are locked down like that, and in every case we&#39;ve said no way, gotten a wire with open net, and built our own wifi.  we will not subject our developers to that extra complexity).</p>
</blockquote>

<hr>

<h3><a href="https://euroquis.nl/freebsd/2020/02/08/freebsd.html" rel="nofollow">KDE FreeBSD Updates Feb 2020</a></h3>

<blockquote>
<p>Some bits and bobs from the KDE FreeBSD team in february 2020. We met at the FreeBSD devsummit before FOSDEM, along with other FreeBSD people. Plans were made, schemes were forged, and Groff the Goat was introduced to some new people. </p>
</blockquote>

<ul>
<li>The big ticket things:

<ul>
<li> Frameworks are at 5.66</li>
<li>Plasma is at 5.17.5 (the beta 5.18 hasn’t been tried)</li>
<li>KDE release service has landed 19.12.2 (same day it was released)</li>
</ul></li>
<li>Developer-centric:

<ul>
<li>KDevelop is at 5.5.0</li>
<li>KUserfeedback landed its 1.0.0 release</li>
<li>CMake is 3.16.3</li>
</ul></li>
<li>Applications:

<ul>
<li>Musescore is at 3.4.2</li>
<li>Elisa now part of the KDE release service updates</li>
</ul></li>
<li>Fuure work:

<ul>
<li>KIO-Fuse probably needs extra real-world testing on FreeBSD. I don’t have that kind of   mounts (just NFS in /etc/fstab) so I’m not the target audience.</li>
<li>KTextEditor is missing .editorconfig support. That can come in with the next frameworks update, when consumers update anyway. Chasing it in an intermediate release is a bit problematic because it does require some rebuilds of consumers.</li>
</ul></li>
</ul>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-February/001929.html" rel="nofollow">Travel Grant Application for BSDCan is now open</a></h3>

<blockquote>
<p>Hi everyone,</p>

<p>The Travel Grant Application for BSDCan 2020 is now open. The Foundation can help you attend BSDCan through our travel grant program. Travel grants are available to FreeBSD developers and advocates who need assistance with travel expenses for attending conferences related to FreeBSD development. BSDCan 2020 applications are due April 9, 2020. Find out more and apply at: <a href="https://www.freebsdfoundation.org/what-we-do/grants/travel-grants/" rel="nofollow">https://www.freebsdfoundation.org/what-we-do/grants/travel-grants/</a></p>

<p>Did you know the Foundation also provides grants for technical events not specifically focused on BSD? If you feel that your attendance at one of these events will benefit the FreeBSD Project and Community and you need assistance getting there,  please fill out the general travel grant application.  Your application must be received 7 weeks prior to the event. The general application can be found here: <a href="https://goo.gl/forms/QzsOMR8Jra0vqFYH2" rel="nofollow">https://goo.gl/forms/QzsOMR8Jra0vqFYH2</a></p>
</blockquote>

<hr>

<h3><a href="https://dan.langille.org/2020/02/01/creating-a-zfs-dataset-for-testing-iocage-within-a-jail/" rel="nofollow">Creating a ZFS dataset for testing iocage within a jail</a></h3>

<ul>
<li>Be warned, this failed. I’m stalled and I have not completed this.</li>
</ul>

<blockquote>
<p>I’m going to do jails within a jail. I already do that with poudriere in a jail but here I want to test an older version of iocage before upgrading my current jail hosts to a newer version.</p>
</blockquote>

<ul>
<li>In this post:

<ul>
<li>FreeBSD 12.1</li>
<li>py36-iocage-1.2_3</li>
<li>py36-iocage-1.2_4</li>
</ul></li>
</ul>

<blockquote>
<p>This post includes my errors and mistakes. Perhaps you should proceed carefully and read it all first.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.freebsdfoundation.org/journal/browser-based-edition/" rel="nofollow">Reminder: the FreeBSD Journal is free! Check out these great articles</a></li>
<li><a href="https://twitter.com/jcs/status/1224205573656322048" rel="nofollow">Serenity GUI desktop running on an OpenBSD kernel</a></li>
<li><a href="https://github.com/apple-open-source/macos" rel="nofollow">The Open Source Parts of MacOS</a></li>
<li><a href="https://www.fosdem.org/2020/schedule/track/bsd/" rel="nofollow">FOSDEM videos available</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Michael - <a href="http://dpaste.com/3WRC9CQ#wrap" rel="nofollow">Install with ZFS</a></li>
<li>Mohammad - <a href="http://dpaste.com/3BYZKMS#wrap" rel="nofollow">Server Freeze</a></li>
<li>Todd - <a href="http://dpaste.com/2J50HSJ#wrap" rel="nofollow">ZFS Questions</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0338.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Distrowatch reviews FuryBSD, LLDB on i386 for NetBSD, wpa_supplicant as lower-class citizen, KDE on FreeBSD updates, Travel Grant for BSDCan open, ZFS dataset for testing iocage within a jail, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20200127#furybsd" rel="nofollow">Distrowatch Fury BSD Review</a></h3>

<blockquote>
<p>FuryBSD is the most recent addition to the DistroWatch database and provides a live desktop operating system based on FreeBSD. FuryBSD is not entirely different in its goals from NomadBSD, which we discussed recently. I wanted to take this FreeBSD-based project for a test drive and see how it compares to NomadBSD and other desktop-oriented projects in the FreeBSD family.</p>

<p>FuryBSD supplies hybrid ISO/USB images which can be used to run a live desktop. There are two desktop editions currently, both for 64-bit (x86_64) machines: Xfce and KDE Plasma. The Xfce edition is 1.4GB in size and is the flavour I downloaded. The KDE Plasma edition is about 3.0GB in size.</p>

<p>My fresh install of FuryBSD booted to a graphical login screen. From there I could sign into my account, which brings up the Xfce desktop. The installed version of Xfce is the same as the live version, with a few minor changes. Most of the desktop icons have been removed with just the file manager launchers remaining. The Getting Started and System Information icons have been removed. Otherwise the experience is virtually identical to the live media.</p>

<p>FuryBSD uses a theme that is mostly grey and white with creamy yellow folder icons. The application menu launchers tend to have neutral icons, neither particularly bright and detailed or minimal.</p>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/lldb_now_works_on_i386" rel="nofollow">LLDB now works on i386</a></h3>

<blockquote>
<p>Upstream describes LLDB as a next generation, high-performance debugger. It is built on top of LLVM/Clang toolchain, and features great integration with it. At the moment, it primarily supports debugging C, C++ and ObjC code, and there is interest in extending it to more languages.</p>

<p>In February 2019, I have started working on LLDB, as contracted by the NetBSD Foundation. So far I&#39;ve been working on reenabling continuous integration, squashing bugs, improving NetBSD core file support, extending NetBSD&#39;s ptrace interface to cover more register types and fix compat32 issues, fixing watchpoint and threading support.</p>

<p>The original NetBSD port of LLDB was focused on amd64 only. In January, I have extended it to support i386 executables. This includes both 32-bit builds of LLDB (running natively on i386 kernel or via compat32) and debugging 32-bit programs from 64-bit LLDB.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://marc.info/?l=openbsd-misc&m=158068418807352&w=2" rel="nofollow">wpa_supplicant is definitely a lower-class citizen, sorry</a></h3>

<blockquote>
<p>wpa_supplicant is definitely a lower-class citizen, sorry.</p>

<p>I increasingly wonder why this stuff matters; transit costs are so much lower than the period when eduroam was setup, and their reliance on 802.11x is super weird in a world where, for the most part<br>
    + entire cities have open wifi in their downtown core<br>
    + edu vs edu+transit split horizon problems have to be solved anyways<br>
    + many universities have parallel open wifi<br>
    + rate limiting / fare-share approaches for the open-net, on unmetered<br>
    + flat-rate solves the problem<br>
    + LTE hotspot off a phone isn&#39;t a rip off anymore<br>
    + other open networks exist</p>

<p>essentially no one else feels compelled to do use 802.11x for a so called &quot;semi-open access network&quot;, so I think they&#39;ve lost the plot on friction vs benefit.</p>

<p>(we&#39;ve held hackathons at EDU campus that are locked down like that, and in every case we&#39;ve said no way, gotten a wire with open net, and built our own wifi.  we will not subject our developers to that extra complexity).</p>
</blockquote>

<hr>

<h3><a href="https://euroquis.nl/freebsd/2020/02/08/freebsd.html" rel="nofollow">KDE FreeBSD Updates Feb 2020</a></h3>

<blockquote>
<p>Some bits and bobs from the KDE FreeBSD team in february 2020. We met at the FreeBSD devsummit before FOSDEM, along with other FreeBSD people. Plans were made, schemes were forged, and Groff the Goat was introduced to some new people. </p>
</blockquote>

<ul>
<li>The big ticket things:

<ul>
<li> Frameworks are at 5.66</li>
<li>Plasma is at 5.17.5 (the beta 5.18 hasn’t been tried)</li>
<li>KDE release service has landed 19.12.2 (same day it was released)</li>
</ul></li>
<li>Developer-centric:

<ul>
<li>KDevelop is at 5.5.0</li>
<li>KUserfeedback landed its 1.0.0 release</li>
<li>CMake is 3.16.3</li>
</ul></li>
<li>Applications:

<ul>
<li>Musescore is at 3.4.2</li>
<li>Elisa now part of the KDE release service updates</li>
</ul></li>
<li>Fuure work:

<ul>
<li>KIO-Fuse probably needs extra real-world testing on FreeBSD. I don’t have that kind of   mounts (just NFS in /etc/fstab) so I’m not the target audience.</li>
<li>KTextEditor is missing .editorconfig support. That can come in with the next frameworks update, when consumers update anyway. Chasing it in an intermediate release is a bit problematic because it does require some rebuilds of consumers.</li>
</ul></li>
</ul>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-February/001929.html" rel="nofollow">Travel Grant Application for BSDCan is now open</a></h3>

<blockquote>
<p>Hi everyone,</p>

<p>The Travel Grant Application for BSDCan 2020 is now open. The Foundation can help you attend BSDCan through our travel grant program. Travel grants are available to FreeBSD developers and advocates who need assistance with travel expenses for attending conferences related to FreeBSD development. BSDCan 2020 applications are due April 9, 2020. Find out more and apply at: <a href="https://www.freebsdfoundation.org/what-we-do/grants/travel-grants/" rel="nofollow">https://www.freebsdfoundation.org/what-we-do/grants/travel-grants/</a></p>

<p>Did you know the Foundation also provides grants for technical events not specifically focused on BSD? If you feel that your attendance at one of these events will benefit the FreeBSD Project and Community and you need assistance getting there,  please fill out the general travel grant application.  Your application must be received 7 weeks prior to the event. The general application can be found here: <a href="https://goo.gl/forms/QzsOMR8Jra0vqFYH2" rel="nofollow">https://goo.gl/forms/QzsOMR8Jra0vqFYH2</a></p>
</blockquote>

<hr>

<h3><a href="https://dan.langille.org/2020/02/01/creating-a-zfs-dataset-for-testing-iocage-within-a-jail/" rel="nofollow">Creating a ZFS dataset for testing iocage within a jail</a></h3>

<ul>
<li>Be warned, this failed. I’m stalled and I have not completed this.</li>
</ul>

<blockquote>
<p>I’m going to do jails within a jail. I already do that with poudriere in a jail but here I want to test an older version of iocage before upgrading my current jail hosts to a newer version.</p>
</blockquote>

<ul>
<li>In this post:

<ul>
<li>FreeBSD 12.1</li>
<li>py36-iocage-1.2_3</li>
<li>py36-iocage-1.2_4</li>
</ul></li>
</ul>

<blockquote>
<p>This post includes my errors and mistakes. Perhaps you should proceed carefully and read it all first.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.freebsdfoundation.org/journal/browser-based-edition/" rel="nofollow">Reminder: the FreeBSD Journal is free! Check out these great articles</a></li>
<li><a href="https://twitter.com/jcs/status/1224205573656322048" rel="nofollow">Serenity GUI desktop running on an OpenBSD kernel</a></li>
<li><a href="https://github.com/apple-open-source/macos" rel="nofollow">The Open Source Parts of MacOS</a></li>
<li><a href="https://www.fosdem.org/2020/schedule/track/bsd/" rel="nofollow">FOSDEM videos available</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Michael - <a href="http://dpaste.com/3WRC9CQ#wrap" rel="nofollow">Install with ZFS</a></li>
<li>Mohammad - <a href="http://dpaste.com/3BYZKMS#wrap" rel="nofollow">Server Freeze</a></li>
<li>Todd - <a href="http://dpaste.com/2J50HSJ#wrap" rel="nofollow">ZFS Questions</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0338.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
