<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 15:39:35 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Fuzzing”</title>
    <link>https://www.bsdnow.tv/tags/fuzzing</link>
    <pubDate>Wed, 24 Jun 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>95: Bitrot Group Therapy</title>
  <link>https://www.bsdnow.tv/95</link>
  <guid isPermaLink="false">e712bc93-a45f-45ce-9d3a-e58ee627200c</guid>
  <pubDate>Wed, 24 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e712bc93-a45f-45ce-9d3a-e58ee627200c.mp3" length="54443956" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking some ZFS with Sean Chittenden. He's been using it on FreeBSD at Groupon, and has some interesting stories about how it's saved his data. Answers to your emails and all of this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:15:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking some ZFS with Sean Chittenden. He's been using it on FreeBSD at Groupon, and has some interesting stories about how it's saved his data. Answers to your emails and all of this week's headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
More BSDCan 2015 videos (https://www.bsdcan.org/2015/schedule/)
Almost as if we said it would happen last week, more BSD-related presentation videos have been uploaded
Alexander Motin, Feature-rich and fast SCSI target with CTL and ZFS (https://www.youtube.com/watch?v=lBE4BfxVDQc)
Daichi Goto, FreeBSD for High Density Servers (https://www.youtube.com/watch?v=r2BoQ70bwK4)
Ken Moore, Lumina-DE (https://www.youtube.com/watch?v=Qh_YK9y4_Os)
Kevin Bowling, FreeBSD Operations at (https://www.youtube.com/watch?v=4l2rlRjkGhk) Limelight Networks (https://www.youtube.com/watch?v=K1-ZyiY5z48)
Maciej Pasternacki, Jetpack, a container (https://www.youtube.com/watch?v=8phbsAhJ-9w) runtime for FreeBSD (https://www.youtube.com/watch?v=kJ74mgkzLxc)
Ray Percival, Networking with OpenBSD in a virtualized environment (https://www.youtube.com/watch?v=gx5FILdSp2w)
Reyk Floeter, Introducing OpenBSD's (https://www.youtube.com/watch?v=DV1-EfdIp8I) new httpd (https://www.youtube.com/watch?v=_v0lI6qDWFs)
Still more to come, hopefully
***
OpenBSD httpd rewrite support (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143480475721221&amp;amp;w=2)
One of the most-requested features of OpenBSD's new HTTP daemon (in fact, you can hear someone asking about it in the video just above) is rewrite support
There were concerns about regex code being too complicated and potentially allowing another attack surface, so that was out
Instead, Reyk ported over an implementation of lua pattern matching while on the flight back from BSDCan, turning it into a C API without the lua bindings
In the mailing list post, he shows an example of how to use it for redirects and provides the diff (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143489473103114&amp;amp;w=2) if you'd like to give it a try now
It's since been committed (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143507301715409&amp;amp;w=2) to -current, so you can try it out with a snapshot too
***
SSH 2FA on FreeBSD (http://sysconfig.org.uk/two-factor-authentication-with-ssh.html)
We've discussed different ways to lock down SSH access to your BSD boxes before - use keys instead of passwords, whitelist IPs, or even use two-factor authentication
This article serves as a sort of "roundup" on different methods to set up two-factor authentication on FreeBSD
It touches on key pairs with a server-side password, google authenticator and a few other variations
While the article is focused on FreeBSD, a lot of it can be easily applied to the others too
OpenSSH has a great security record, but two-factor authentication is always a good thing to have for the most important systems
***
NetBSD 7.0-RC1 released (https://blog.netbsd.org/tnf/entry/netbsd_7_0_rc1_binaries)
NetBSD has just announced the first release candidate for the 7.0 branch, after a long delay since the initial beta (11 months ago (http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv))
Some of the standout features include: improved KMS/DRM with support for modern GPUs, SMP support on ARM, lots of new ARM boards officially supported, GPT support in the installer, Lua kernel scripting, a multiprocessor USB stack, improvements to NPF (their firewall) and, optionally, Clang 3.6.1
They're looking for as much testing as possible, so give it a try and report your findings to the release engineering team
***
Interview - Sean Chittenden - seanc@freebsd.org (mailto:seanc@freebsd.org) / @seanchittenden (https://twitter.com/seanchittenden)
FreeBSD at Groupon, ZFS
News Roundup
OpenSMTPD and Dovecot (http://www.tumfatig.net/20150620/opensmtpd-and-dovecot-on-openbsd-5-7/)
We've covered a number of OpenSMTPD mail server guides on the show, each with just a little something different to offer than the last
This blog post about it has something not mentioned before: virtual domains and virtual users
This means you can easily have "user1@domain.com" and "user2@otherdomain.com" both go to a local user on the box (or a different third address)
It also covers SSL certificates, blocking spam and setting up IMAP access, the usual
Now might also be a good time to test out OpenSMTPD 5.7.1-rc1 (https://www.mail-archive.com/misc@opensmtpd.org/msg02177.html), which we'll cover in more detail when it's released...
***
OctoPkg, a QT frontend to pkgng (https://github.com/aarnt/octopkg)
A PC-BSD user has begun porting over a graphical package management utility from Arch linux called Octopi (https://octopiproject.wordpress.com/about/)
Obviously, it needed to be rewritten to use FreeBSD's pkg system instead of pacman
There are some basic instructions on how to get it built and running on the github page
After some testing, it'll likely make its way to the FreeBSD ports tree
Tools like this might make it easier for desktop users (who are used to similar things in Ubuntu or related distros) to switch over
***
AFL vs. mandoc, a quantitative analysis (http://undeadly.org/cgi?action=article&amp;amp;sid=20150619071929)
Ingo Schwarze has written a pretty detailed article about how he and other OpenBSD developers have been fuzzing mandoc with AFL
It's meant to be accompanying material to his BSDCan talk, which already covered nine topics
mandoc is an interesting example to stress test with fuzzing, since its main job is to take and parse some highly varying input
The article breaks down the 45 different bugs that were found, based on their root cause
If you're interested in secure coding practices, this'll be a great one to read
***
OpenZFS conference videos (https://www.youtube.com/playlist?list=PLaUVvul17xScvtic0SPoks2MlQleyejks)
Videos from the second OpenZFS conference have just started to show up
The first talk is by, you guessed it, Matt Ahrens
In it, he covers some ZFS history, the Oracle takeover, the birth of illumos and OpenZFS, some administration basics and also some upcoming features that are being worked on
There are also videos from Nexenta (https://www.youtube.com/watch?v=5ciV4z7WWmo) and HGST (https://www.youtube.com/watch?v=a2lnMxMUxyc), talking about how they use and contribute to OpenZFS
***
Feedback/Questions
Bryson writes in (http://slexy.org/view/s2FqJfmeK3)
Kevin writes in (http://slexy.org/view/s20erRHahQ)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, fuzzing, mandoc, httpd, 7.0, opensmtpd, dovecot, bsdcan 2015, pkgng, groupon, ecommerce, zfs, bitrot, zpool, afl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking some ZFS with Sean Chittenden. He&#39;s been using it on FreeBSD at Groupon, and has some interesting stories about how it&#39;s saved his data. Answers to your emails and all of this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">More BSDCan 2015 videos</a></h3>

<ul>
<li>Almost as if we said it would happen last week, more BSD-related presentation videos have been uploaded</li>
<li>Alexander Motin, <a href="https://www.youtube.com/watch?v=lBE4BfxVDQc" rel="nofollow">Feature-rich and fast SCSI target with CTL and ZFS</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=r2BoQ70bwK4" rel="nofollow">FreeBSD for High Density Servers</a></li>
<li>Ken Moore, <a href="https://www.youtube.com/watch?v=Qh_YK9y4_Os" rel="nofollow">Lumina-DE</a></li>
<li>Kevin Bowling, <a href="https://www.youtube.com/watch?v=4l2rlRjkGhk" rel="nofollow">FreeBSD Operations at</a> <a href="https://www.youtube.com/watch?v=K1-ZyiY5z48" rel="nofollow">Limelight Networks</a></li>
<li>Maciej Pasternacki, <a href="https://www.youtube.com/watch?v=8phbsAhJ-9w" rel="nofollow">Jetpack, a container</a> <a href="https://www.youtube.com/watch?v=kJ74mgkzLxc" rel="nofollow">runtime for FreeBSD</a></li>
<li>Ray Percival, <a href="https://www.youtube.com/watch?v=gx5FILdSp2w" rel="nofollow">Networking with OpenBSD in a virtualized environment</a></li>
<li>Reyk Floeter, <a href="https://www.youtube.com/watch?v=DV1-EfdIp8I" rel="nofollow">Introducing OpenBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=_v0lI6qDWFs" rel="nofollow">new httpd</a></li>
<li>Still more to come, hopefully
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143480475721221&w=2" rel="nofollow">OpenBSD httpd rewrite support</a></h3>

<ul>
<li>One of the most-requested features of OpenBSD&#39;s new HTTP daemon (in fact, you can hear someone asking about it in the video just above) is rewrite support</li>
<li>There were concerns about regex code being too complicated and potentially allowing another attack surface, so that was out</li>
<li>Instead, Reyk ported over an implementation of lua pattern matching while on the flight back from BSDCan, turning it into a C API without the lua bindings</li>
<li>In the mailing list post, he shows an example of how to use it for redirects and provides <a href="https://www.marc.info/?l=openbsd-tech&m=143489473103114&w=2" rel="nofollow">the diff</a> if you&#39;d like to give it a try now</li>
<li>It&#39;s since <a href="https://www.marc.info/?l=openbsd-cvs&m=143507301715409&w=2" rel="nofollow">been committed</a> to -current, so you can try it out with a snapshot too
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/two-factor-authentication-with-ssh.html" rel="nofollow">SSH 2FA on FreeBSD</a></h3>

<ul>
<li>We&#39;ve discussed different ways to lock down SSH access to your BSD boxes before - use keys instead of passwords, whitelist IPs, or even use two-factor authentication</li>
<li>This article serves as a sort of &quot;roundup&quot; on different methods to set up two-factor authentication on FreeBSD</li>
<li>It touches on key pairs with a server-side password, google authenticator and a few other variations</li>
<li>While the article is focused on FreeBSD, a lot of it can be easily applied to the others too</li>
<li>OpenSSH has a great security record, but two-factor authentication is always a good thing to have for the most important systems
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_7_0_rc1_binaries" rel="nofollow">NetBSD 7.0-RC1 released</a></h3>

<ul>
<li>NetBSD has just announced the first release candidate for the 7.0 branch, after a long delay since the initial beta (<a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">11 months ago</a>)</li>
<li>Some of the standout features include: improved KMS/DRM with support for modern GPUs, SMP support on ARM, lots of new ARM boards officially supported, GPT support in the installer, Lua kernel scripting, a multiprocessor USB stack, improvements to NPF (their firewall) and, optionally, Clang 3.6.1</li>
<li>They&#39;re looking for as much testing as possible, so give it a try and report your findings to the release engineering team
***</li>
</ul>

<h2>Interview - Sean Chittenden - <a href="mailto:seanc@freebsd.org" rel="nofollow">seanc@freebsd.org</a> / <a href="https://twitter.com/seanchittenden" rel="nofollow">@seanchittenden</a></h2>

<p>FreeBSD at Groupon, ZFS</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tumfatig.net/20150620/opensmtpd-and-dovecot-on-openbsd-5-7/" rel="nofollow">OpenSMTPD and Dovecot</a></h3>

<ul>
<li>We&#39;ve covered a number of OpenSMTPD mail server guides on the show, each with just a little something different to offer than the last</li>
<li>This blog post about it has something not mentioned before: virtual domains and virtual users</li>
<li>This means you can easily have &quot;<a href="mailto:user1@domain.com" rel="nofollow">user1@domain.com</a>&quot; and &quot;<a href="mailto:user2@otherdomain.com" rel="nofollow">user2@otherdomain.com</a>&quot; both go to a local user on the box (or a different third address)</li>
<li>It also covers SSL certificates, blocking spam and setting up IMAP access, the usual</li>
<li>Now might also be a good time to test out OpenSMTPD <a href="https://www.mail-archive.com/misc@opensmtpd.org/msg02177.html" rel="nofollow">5.7.1-rc1</a>, which we&#39;ll cover in more detail when it&#39;s released...
***</li>
</ul>

<h3><a href="https://github.com/aarnt/octopkg" rel="nofollow">OctoPkg, a QT frontend to pkgng</a></h3>

<ul>
<li>A PC-BSD user has begun porting over a graphical package management utility from Arch linux called <a href="https://octopiproject.wordpress.com/about/" rel="nofollow">Octopi</a></li>
<li>Obviously, it needed to be rewritten to use FreeBSD&#39;s pkg system instead of pacman</li>
<li>There are some basic instructions on how to get it built and running on the github page</li>
<li>After some testing, it&#39;ll likely make its way to the FreeBSD ports tree</li>
<li>Tools like this might make it easier for desktop users (who are used to similar things in Ubuntu or related distros) to switch over
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150619071929" rel="nofollow">AFL vs. mandoc, a quantitative analysis</a></h3>

<ul>
<li>Ingo Schwarze has written a pretty detailed article about how he and other OpenBSD developers have been fuzzing mandoc with AFL</li>
<li>It&#39;s meant to be accompanying material to his BSDCan talk, which already covered nine topics</li>
<li>mandoc is an interesting example to stress test with fuzzing, since its main job is to take and parse some highly varying input</li>
<li>The article breaks down the 45 different bugs that were found, based on their root cause</li>
<li>If you&#39;re interested in secure coding practices, this&#39;ll be a great one to read
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLaUVvul17xScvtic0SPoks2MlQleyejks" rel="nofollow">OpenZFS conference videos</a></h3>

<ul>
<li>Videos from the second OpenZFS conference have just started to show up</li>
<li>The first talk is by, you guessed it, Matt Ahrens</li>
<li>In it, he covers some ZFS history, the Oracle takeover, the birth of illumos and OpenZFS, some administration basics and also some upcoming features that are being worked on</li>
<li>There are also videos <a href="https://www.youtube.com/watch?v=5ciV4z7WWmo" rel="nofollow">from Nexenta</a> <a href="https://www.youtube.com/watch?v=a2lnMxMUxyc" rel="nofollow">and HGST</a>, talking about how they use and contribute to OpenZFS
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2FqJfmeK3" rel="nofollow">Bryson writes in</a></li>
<li><a href="http://slexy.org/view/s20erRHahQ" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking some ZFS with Sean Chittenden. He&#39;s been using it on FreeBSD at Groupon, and has some interesting stories about how it&#39;s saved his data. Answers to your emails and all of this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">More BSDCan 2015 videos</a></h3>

<ul>
<li>Almost as if we said it would happen last week, more BSD-related presentation videos have been uploaded</li>
<li>Alexander Motin, <a href="https://www.youtube.com/watch?v=lBE4BfxVDQc" rel="nofollow">Feature-rich and fast SCSI target with CTL and ZFS</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=r2BoQ70bwK4" rel="nofollow">FreeBSD for High Density Servers</a></li>
<li>Ken Moore, <a href="https://www.youtube.com/watch?v=Qh_YK9y4_Os" rel="nofollow">Lumina-DE</a></li>
<li>Kevin Bowling, <a href="https://www.youtube.com/watch?v=4l2rlRjkGhk" rel="nofollow">FreeBSD Operations at</a> <a href="https://www.youtube.com/watch?v=K1-ZyiY5z48" rel="nofollow">Limelight Networks</a></li>
<li>Maciej Pasternacki, <a href="https://www.youtube.com/watch?v=8phbsAhJ-9w" rel="nofollow">Jetpack, a container</a> <a href="https://www.youtube.com/watch?v=kJ74mgkzLxc" rel="nofollow">runtime for FreeBSD</a></li>
<li>Ray Percival, <a href="https://www.youtube.com/watch?v=gx5FILdSp2w" rel="nofollow">Networking with OpenBSD in a virtualized environment</a></li>
<li>Reyk Floeter, <a href="https://www.youtube.com/watch?v=DV1-EfdIp8I" rel="nofollow">Introducing OpenBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=_v0lI6qDWFs" rel="nofollow">new httpd</a></li>
<li>Still more to come, hopefully
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143480475721221&w=2" rel="nofollow">OpenBSD httpd rewrite support</a></h3>

<ul>
<li>One of the most-requested features of OpenBSD&#39;s new HTTP daemon (in fact, you can hear someone asking about it in the video just above) is rewrite support</li>
<li>There were concerns about regex code being too complicated and potentially allowing another attack surface, so that was out</li>
<li>Instead, Reyk ported over an implementation of lua pattern matching while on the flight back from BSDCan, turning it into a C API without the lua bindings</li>
<li>In the mailing list post, he shows an example of how to use it for redirects and provides <a href="https://www.marc.info/?l=openbsd-tech&m=143489473103114&w=2" rel="nofollow">the diff</a> if you&#39;d like to give it a try now</li>
<li>It&#39;s since <a href="https://www.marc.info/?l=openbsd-cvs&m=143507301715409&w=2" rel="nofollow">been committed</a> to -current, so you can try it out with a snapshot too
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/two-factor-authentication-with-ssh.html" rel="nofollow">SSH 2FA on FreeBSD</a></h3>

<ul>
<li>We&#39;ve discussed different ways to lock down SSH access to your BSD boxes before - use keys instead of passwords, whitelist IPs, or even use two-factor authentication</li>
<li>This article serves as a sort of &quot;roundup&quot; on different methods to set up two-factor authentication on FreeBSD</li>
<li>It touches on key pairs with a server-side password, google authenticator and a few other variations</li>
<li>While the article is focused on FreeBSD, a lot of it can be easily applied to the others too</li>
<li>OpenSSH has a great security record, but two-factor authentication is always a good thing to have for the most important systems
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_7_0_rc1_binaries" rel="nofollow">NetBSD 7.0-RC1 released</a></h3>

<ul>
<li>NetBSD has just announced the first release candidate for the 7.0 branch, after a long delay since the initial beta (<a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">11 months ago</a>)</li>
<li>Some of the standout features include: improved KMS/DRM with support for modern GPUs, SMP support on ARM, lots of new ARM boards officially supported, GPT support in the installer, Lua kernel scripting, a multiprocessor USB stack, improvements to NPF (their firewall) and, optionally, Clang 3.6.1</li>
<li>They&#39;re looking for as much testing as possible, so give it a try and report your findings to the release engineering team
***</li>
</ul>

<h2>Interview - Sean Chittenden - <a href="mailto:seanc@freebsd.org" rel="nofollow">seanc@freebsd.org</a> / <a href="https://twitter.com/seanchittenden" rel="nofollow">@seanchittenden</a></h2>

<p>FreeBSD at Groupon, ZFS</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tumfatig.net/20150620/opensmtpd-and-dovecot-on-openbsd-5-7/" rel="nofollow">OpenSMTPD and Dovecot</a></h3>

<ul>
<li>We&#39;ve covered a number of OpenSMTPD mail server guides on the show, each with just a little something different to offer than the last</li>
<li>This blog post about it has something not mentioned before: virtual domains and virtual users</li>
<li>This means you can easily have &quot;<a href="mailto:user1@domain.com" rel="nofollow">user1@domain.com</a>&quot; and &quot;<a href="mailto:user2@otherdomain.com" rel="nofollow">user2@otherdomain.com</a>&quot; both go to a local user on the box (or a different third address)</li>
<li>It also covers SSL certificates, blocking spam and setting up IMAP access, the usual</li>
<li>Now might also be a good time to test out OpenSMTPD <a href="https://www.mail-archive.com/misc@opensmtpd.org/msg02177.html" rel="nofollow">5.7.1-rc1</a>, which we&#39;ll cover in more detail when it&#39;s released...
***</li>
</ul>

<h3><a href="https://github.com/aarnt/octopkg" rel="nofollow">OctoPkg, a QT frontend to pkgng</a></h3>

<ul>
<li>A PC-BSD user has begun porting over a graphical package management utility from Arch linux called <a href="https://octopiproject.wordpress.com/about/" rel="nofollow">Octopi</a></li>
<li>Obviously, it needed to be rewritten to use FreeBSD&#39;s pkg system instead of pacman</li>
<li>There are some basic instructions on how to get it built and running on the github page</li>
<li>After some testing, it&#39;ll likely make its way to the FreeBSD ports tree</li>
<li>Tools like this might make it easier for desktop users (who are used to similar things in Ubuntu or related distros) to switch over
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150619071929" rel="nofollow">AFL vs. mandoc, a quantitative analysis</a></h3>

<ul>
<li>Ingo Schwarze has written a pretty detailed article about how he and other OpenBSD developers have been fuzzing mandoc with AFL</li>
<li>It&#39;s meant to be accompanying material to his BSDCan talk, which already covered nine topics</li>
<li>mandoc is an interesting example to stress test with fuzzing, since its main job is to take and parse some highly varying input</li>
<li>The article breaks down the 45 different bugs that were found, based on their root cause</li>
<li>If you&#39;re interested in secure coding practices, this&#39;ll be a great one to read
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLaUVvul17xScvtic0SPoks2MlQleyejks" rel="nofollow">OpenZFS conference videos</a></h3>

<ul>
<li>Videos from the second OpenZFS conference have just started to show up</li>
<li>The first talk is by, you guessed it, Matt Ahrens</li>
<li>In it, he covers some ZFS history, the Oracle takeover, the birth of illumos and OpenZFS, some administration basics and also some upcoming features that are being worked on</li>
<li>There are also videos <a href="https://www.youtube.com/watch?v=5ciV4z7WWmo" rel="nofollow">from Nexenta</a> <a href="https://www.youtube.com/watch?v=a2lnMxMUxyc" rel="nofollow">and HGST</a>, talking about how they use and contribute to OpenZFS
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2FqJfmeK3" rel="nofollow">Bryson writes in</a></li>
<li><a href="http://slexy.org/view/s20erRHahQ" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>85: PIE in the Sky</title>
  <link>https://www.bsdnow.tv/85</link>
  <guid isPermaLink="false">7b947cd6-04e4-4210-a3a1-3f80d96ccc79</guid>
  <pubDate>Wed, 15 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/7b947cd6-04e4-4210-a3a1-3f80d96ccc79.mp3" length="58114516" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He'll tell us what types of attacks it prevents, and why it's such a big deal. We've also got answers to questions from you in the audience and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He'll tell us what types of attacks it prevents, and why it's such a big deal. We've also got answers to questions from you in the audience and all this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Solaris' networking future is with OpenBSD (http://bsdly.blogspot.com/2015/04/solaris-admins-for-glimpse-of-your.html)
A curious patch from someone with an Oracle email address was recently sent in (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142822852613581&amp;amp;w=2) to one of the OpenBSD mailing lists
It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the current version of PF
For anyone unfamiliar with the history of PF, it was actually made as a replacement for IPFilter in OpenBSD, due to some licensing issues
What's more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting
This blog post goes through some of the backstory of the two firewalls
PF is in a lot of places - other BSDs, Mac OS X and iOS - but there are plenty of other OpenBSD-developed technologies end up ported to other projects too
"Many of the world's largest corporations and government agencies are heavy Solaris users, meaning that even if you're neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD's PF for their filtering needs, we will all be benefiting even more from the OpenBSD project's emphasis on correctness, quality and security"
You're welcome, Oracle
***
BAFUG discussion videos (https://www.youtube.com/watch?v=Cb--h-iOQEM#t=15)
The Bay Area FreeBSD users group has been uploading some videos from their recent meetings
Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)
Craig Rodrigues also gave a talk (https://www.youtube.com/watch?v=kPs8Dni_g3M#t=15) about Kyua and the FreeBSD testing framework
Lastly, Kip Macy gave a talk (https://www.youtube.com/watch?v=Q13WtuqbZ7E#t=15) titled "network stack changes, user-level FreeBSD"
The main two subjects there are some network stack changes, and how to get more people contributing, but there's also open discussion about a variety of FreeBSD topics
If you're close to the Bay Area in California, be sure to check out their group and attend a meeting sometime
***
More than just a makefile (http://homing-on-code.blogspot.com/2015/04/ports-are-more-than-just-makefile.html)
If you're not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux
This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs
As it turns out, the ports system really isn't that different from a binary package manager - they are what's used to create binary packages, after all
The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream
After that, he shows you how to get your new port tested, if you're interesting in doing some porting yourself, and getting involved with the rest of the community
This post is very long and there's a lot more to it, so check it out (and more discussion on Hacker News (https://news.ycombinator.com/item?id=9360827))
***
Securing your home fences (http://www.scip.ch/en/?labs.20150409)
Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a bad (http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/) idea (https://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970) by now
We hear from a lot of users who want to set up some kind of BSD-based firewall, but don't hear back from them after they've done it.. until now
In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines APU board (http://www.pcengines.ch/apu1d4.htm)
He notes that you have a lot of options software-wise, including vanilla FreeBSD (http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/), OpenBSD (http://www.bsdnow.tv/tutorials/openbsd-router) or even Linux, but decided to go with OPNsense because of the easy interface and configuration
The post covers all the hardware you'll need, getting the OS installed to a flash drive or SD card and going through the whole process
Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up
If you don't have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)
We love super-detailed guides like this, so everyone should write more and send them to us immediately
***
Interview - Pascal Stumpf - pascal@openbsd.org (mailto:pascal@openbsd.org)
Static PIE in OpenBSD
News Roundup
LLVM's new libFuzzer (http://blog.llvm.org/2015/04/fuzz-all-clangs.html)
We've discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility
It looks like LLVM is going to have their own fuzzing tool too now
The Clang and LLVM guys are no strangers to this type of code testing, but decided to "close the loop" and start fuzzing parts of LLVM (including Clang) using LLVM itself
With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future
***
HardenedBSD upgrades secadm (http://hardenedbsd.org/article/shawn-webb/2015-04-14/introducing-secadm-02)
The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support
We covered both the secadm tool and integriforce in previous episodes, but the short version is that it's a way to prevent files from being altered (even as root)
Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now
***
RAID5 returns to OpenBSD (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142877132517229&amp;amp;w=2)
OpenBSD's softraid (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4) subsystem, somewhat similar to FreeBSD's GEOM, has had experimental RAID5 support for a while
However, it was exactly that - experimental - and required a recompile to enable
With some work from recent hackathons, the final piece (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142876943116907&amp;amp;w=2) was added to enable resuming partial array rebuilds
Now it's on by default (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142877026917030&amp;amp;w=2), and there's a call for testing being put out, so grab a snapshot and put the code through its paces
The bioctl softraid command also now supports (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142877223817406&amp;amp;w=2) DUIDs during pseudo-device detachment, possibly paving the way for the installer to drop (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142643313416298&amp;amp;w=2) the "do you want to enable DUIDs?" question entirely
***
pkgng 1.5.0 released (https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055463.html)
Going back to what we talked about last week (http://www.bsdnow.tv/episodes/2015_04_08-pkg_remove_freebsd-update), the final version of pkgng 1.5.0 is out
The "provides" and "requires" support is finally in a regular release
A new "-r" switch will allow for direct installation to a chroot or alternate root directory
Memory usage should be much better now, and some general code speed-ups were added
This version also introduces support for Mac OS X, NetBSD and EdgeBSD - it'll be interesting to see if anything comes of that
Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)
***
p2k15 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150411160247)
There was another OpenBSD hackathon that just finished up in the UK - this time it was mainly for ports work
As usual, the developers sent in reports of some of the things they got done at the event
Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit
Stefan Sperling wrote in (http://undeadly.org/cgi?action=article&amp;amp;sid=20150414064710), detailing his work with wireless chipsets, specifically when the vendor doesn't provide any hardware documentation, as well as updating some of the games in ports
Ken Westerback also sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150413163333), but decided to be a rebel and not work on ports at all - he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier
***
Feedback/Questions
Shaun writes in (http://slexy.org/view/s2iNBo2swq)
Hrishi writes in (http://slexy.org/view/s202BRLwrd)
Randy writes in (http://slexy.org/view/s2KT7M35uY)
Zach writes in (http://slexy.org/view/s2Q5lOoxzl)
Ben writes in (http://slexy.org/view/s2ynDjuzVi)
***
Mailing List Gold
Gstreamer hates us (https://www.marc.info/?l=openbsd-ports&amp;amp;m=142884995931428&amp;amp;w=2)
At least he's honest (https://lists.torproject.org/pipermail/tor-relays/2015-April/006765.html)
I find myself in a situation (https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055390.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, aslr, pie, position-independent executable, static, binary, dynamic, linking, security, llvm, fuzzing, clang, opnsense, pcengines, apu, alix, hammer2, zfs, oracle, solaris, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He&#39;ll tell us what types of attacks it prevents, and why it&#39;s such a big deal. We&#39;ve also got answers to questions from you in the audience and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2015/04/solaris-admins-for-glimpse-of-your.html" rel="nofollow">Solaris&#39; networking future is with OpenBSD</a></h3>

<ul>
<li>A curious patch from someone with an Oracle email address was <a href="https://www.marc.info/?l=openbsd-tech&m=142822852613581&w=2" rel="nofollow">recently sent in</a> to one of the OpenBSD mailing lists</li>
<li>It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the <strong>current</strong> version of PF</li>
<li>For anyone unfamiliar with the history of PF, it was actually made <em>as a replacement for</em> IPFilter in OpenBSD, due to some licensing issues</li>
<li>What&#39;s more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting</li>
<li>This blog post goes through some of the backstory of the two firewalls</li>
<li>PF is in a lot of places - other BSDs, Mac OS X and iOS - but there are plenty of other OpenBSD-developed technologies end up ported to other projects too</li>
<li>&quot;Many of the world&#39;s largest corporations and government agencies are heavy Solaris users, meaning that even if you&#39;re neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD&#39;s PF for their filtering needs, we will all be benefiting even more from the OpenBSD project&#39;s emphasis on correctness, quality and security&quot;</li>
<li>You&#39;re welcome, Oracle
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=Cb--h-iOQEM#t=15" rel="nofollow">BAFUG discussion videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos from their recent meetings</li>
<li>Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)</li>
<li>Craig Rodrigues also gave <a href="https://www.youtube.com/watch?v=kPs8Dni_g3M#t=15" rel="nofollow">a talk</a> about Kyua and the FreeBSD testing framework</li>
<li>Lastly, Kip Macy gave <a href="https://www.youtube.com/watch?v=Q13WtuqbZ7E#t=15" rel="nofollow">a talk</a> titled &quot;network stack changes, user-level FreeBSD&quot;</li>
<li>The main two subjects there are some network stack changes, and how to get more people contributing, but there&#39;s also open discussion about a variety of FreeBSD topics</li>
<li>If you&#39;re close to the Bay Area in California, be sure to check out their group and attend a meeting sometime
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/04/ports-are-more-than-just-makefile.html" rel="nofollow">More than just a makefile</a></h3>

<ul>
<li>If you&#39;re not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux</li>
<li>This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs</li>
<li>As it turns out, the ports system really isn&#39;t that different from a binary package manager - they are what&#39;s <em>used</em> to create binary packages, after all</li>
<li>The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream</li>
<li>After that, he shows you how to get your new port tested, if you&#39;re interesting in doing some porting yourself, and getting involved with the rest of the community</li>
<li>This post is very long and there&#39;s a lot more to it, so check it out (and more discussion <a href="https://news.ycombinator.com/item?id=9360827" rel="nofollow">on Hacker News</a>)
***</li>
</ul>

<h3><a href="http://www.scip.ch/en/?labs.20150409" rel="nofollow">Securing your home fences</a></h3>

<ul>
<li>Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a <a href="http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/" rel="nofollow">bad</a> <a href="https://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970" rel="nofollow">idea</a> by now</li>
<li>We hear from a lot of users who want to set up some kind of BSD-based firewall, but don&#39;t hear back from them after they&#39;ve done it.. until now</li>
<li>In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines <a href="http://www.pcengines.ch/apu1d4.htm" rel="nofollow">APU board</a></li>
<li>He notes that you have a lot of options software-wise, including vanilla <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a>, <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a> or even Linux, but decided to go with OPNsense because of the easy interface and configuration</li>
<li>The post covers all the hardware you&#39;ll need, getting the OS installed to a flash drive or SD card and going through the whole process</li>
<li>Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up</li>
<li>If you don&#39;t have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)</li>
<li>We love super-detailed guides like this, so everyone should write more and send them to us immediately
***</li>
</ul>

<h2>Interview - Pascal Stumpf - <a href="mailto:pascal@openbsd.org" rel="nofollow">pascal@openbsd.org</a></h2>

<p>Static PIE in OpenBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.llvm.org/2015/04/fuzz-all-clangs.html" rel="nofollow">LLVM&#39;s new libFuzzer</a></h3>

<ul>
<li>We&#39;ve discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility</li>
<li>It looks like LLVM is going to have their own fuzzing tool too now</li>
<li>The Clang and LLVM guys are no strangers to this type of code testing, but decided to &quot;close the loop&quot; and start fuzzing parts of LLVM (including Clang) using LLVM itself</li>
<li>With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-04-14/introducing-secadm-02" rel="nofollow">HardenedBSD upgrades secadm</a></h3>

<ul>
<li>The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support</li>
<li>We covered both the secadm tool and integriforce in previous episodes, but the short version is that it&#39;s a way to prevent files from being altered (even as root)</li>
<li>Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142877132517229&w=2" rel="nofollow">RAID5 returns to OpenBSD</a></h3>

<ul>
<li>OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> subsystem, somewhat similar to FreeBSD&#39;s GEOM, has had experimental RAID5 support for a while</li>
<li>However, it was exactly that - experimental - and required a recompile to enable</li>
<li>With some work from recent hackathons, the <a href="https://www.marc.info/?l=openbsd-cvs&m=142876943116907&w=2" rel="nofollow">final piece</a> was added to enable resuming partial array rebuilds</li>
<li>Now it&#39;s <a href="https://www.marc.info/?l=openbsd-cvs&m=142877026917030&w=2" rel="nofollow">on by default</a>, and there&#39;s a call for testing being put out, so grab a snapshot and put the code through its paces</li>
<li>The bioctl softraid command also <a href="https://www.marc.info/?l=openbsd-cvs&m=142877223817406&w=2" rel="nofollow">now supports</a> DUIDs during pseudo-device detachment, possibly paving the way for the installer to <a href="https://www.marc.info/?l=openbsd-tech&m=142643313416298&w=2" rel="nofollow">drop</a> the &quot;do you want to enable DUIDs?&quot; question entirely
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055463.html" rel="nofollow">pkgng 1.5.0 released</a></h3>

<ul>
<li>Going back to what we <a href="http://www.bsdnow.tv/episodes/2015_04_08-pkg_remove_freebsd-update" rel="nofollow">talked about last week</a>, the final version of pkgng 1.5.0 is out</li>
<li>The &quot;provides&quot; and &quot;requires&quot; support is finally in a regular release</li>
<li>A new &quot;-r&quot; switch will allow for direct installation to a chroot or alternate root directory</li>
<li>Memory usage should be much better now, and some general code speed-ups were added</li>
<li>This version also introduces support for Mac OS X, NetBSD and EdgeBSD - it&#39;ll be interesting to see if anything comes of that</li>
<li>Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150411160247" rel="nofollow">p2k15 hackathon reports</a></h3>

<ul>
<li>There was another OpenBSD hackathon that just finished up in the UK - this time it was mainly for ports work</li>
<li>As usual, the developers sent in reports of some of the things they got done at the event</li>
<li>Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit</li>
<li>Stefan Sperling <a href="http://undeadly.org/cgi?action=article&sid=20150414064710" rel="nofollow">wrote in</a>, detailing his work with wireless chipsets, specifically when the vendor doesn&#39;t provide any hardware documentation, as well as updating some of the games in ports</li>
<li>Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150413163333" rel="nofollow">also sent in a report</a>, but decided to be a rebel and not work on ports at all - he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iNBo2swq" rel="nofollow">Shaun writes in</a></li>
<li><a href="http://slexy.org/view/s202BRLwrd" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2KT7M35uY" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2Q5lOoxzl" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s2ynDjuzVi" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142884995931428&w=2" rel="nofollow">Gstreamer hates us</a></li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2015-April/006765.html" rel="nofollow">At least he&#39;s honest</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055390.html" rel="nofollow">I find myself in a situation</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He&#39;ll tell us what types of attacks it prevents, and why it&#39;s such a big deal. We&#39;ve also got answers to questions from you in the audience and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2015/04/solaris-admins-for-glimpse-of-your.html" rel="nofollow">Solaris&#39; networking future is with OpenBSD</a></h3>

<ul>
<li>A curious patch from someone with an Oracle email address was <a href="https://www.marc.info/?l=openbsd-tech&m=142822852613581&w=2" rel="nofollow">recently sent in</a> to one of the OpenBSD mailing lists</li>
<li>It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the <strong>current</strong> version of PF</li>
<li>For anyone unfamiliar with the history of PF, it was actually made <em>as a replacement for</em> IPFilter in OpenBSD, due to some licensing issues</li>
<li>What&#39;s more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting</li>
<li>This blog post goes through some of the backstory of the two firewalls</li>
<li>PF is in a lot of places - other BSDs, Mac OS X and iOS - but there are plenty of other OpenBSD-developed technologies end up ported to other projects too</li>
<li>&quot;Many of the world&#39;s largest corporations and government agencies are heavy Solaris users, meaning that even if you&#39;re neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD&#39;s PF for their filtering needs, we will all be benefiting even more from the OpenBSD project&#39;s emphasis on correctness, quality and security&quot;</li>
<li>You&#39;re welcome, Oracle
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=Cb--h-iOQEM#t=15" rel="nofollow">BAFUG discussion videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos from their recent meetings</li>
<li>Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)</li>
<li>Craig Rodrigues also gave <a href="https://www.youtube.com/watch?v=kPs8Dni_g3M#t=15" rel="nofollow">a talk</a> about Kyua and the FreeBSD testing framework</li>
<li>Lastly, Kip Macy gave <a href="https://www.youtube.com/watch?v=Q13WtuqbZ7E#t=15" rel="nofollow">a talk</a> titled &quot;network stack changes, user-level FreeBSD&quot;</li>
<li>The main two subjects there are some network stack changes, and how to get more people contributing, but there&#39;s also open discussion about a variety of FreeBSD topics</li>
<li>If you&#39;re close to the Bay Area in California, be sure to check out their group and attend a meeting sometime
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/04/ports-are-more-than-just-makefile.html" rel="nofollow">More than just a makefile</a></h3>

<ul>
<li>If you&#39;re not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux</li>
<li>This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs</li>
<li>As it turns out, the ports system really isn&#39;t that different from a binary package manager - they are what&#39;s <em>used</em> to create binary packages, after all</li>
<li>The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream</li>
<li>After that, he shows you how to get your new port tested, if you&#39;re interesting in doing some porting yourself, and getting involved with the rest of the community</li>
<li>This post is very long and there&#39;s a lot more to it, so check it out (and more discussion <a href="https://news.ycombinator.com/item?id=9360827" rel="nofollow">on Hacker News</a>)
***</li>
</ul>

<h3><a href="http://www.scip.ch/en/?labs.20150409" rel="nofollow">Securing your home fences</a></h3>

<ul>
<li>Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a <a href="http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/" rel="nofollow">bad</a> <a href="https://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970" rel="nofollow">idea</a> by now</li>
<li>We hear from a lot of users who want to set up some kind of BSD-based firewall, but don&#39;t hear back from them after they&#39;ve done it.. until now</li>
<li>In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines <a href="http://www.pcengines.ch/apu1d4.htm" rel="nofollow">APU board</a></li>
<li>He notes that you have a lot of options software-wise, including vanilla <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a>, <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a> or even Linux, but decided to go with OPNsense because of the easy interface and configuration</li>
<li>The post covers all the hardware you&#39;ll need, getting the OS installed to a flash drive or SD card and going through the whole process</li>
<li>Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up</li>
<li>If you don&#39;t have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)</li>
<li>We love super-detailed guides like this, so everyone should write more and send them to us immediately
***</li>
</ul>

<h2>Interview - Pascal Stumpf - <a href="mailto:pascal@openbsd.org" rel="nofollow">pascal@openbsd.org</a></h2>

<p>Static PIE in OpenBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.llvm.org/2015/04/fuzz-all-clangs.html" rel="nofollow">LLVM&#39;s new libFuzzer</a></h3>

<ul>
<li>We&#39;ve discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility</li>
<li>It looks like LLVM is going to have their own fuzzing tool too now</li>
<li>The Clang and LLVM guys are no strangers to this type of code testing, but decided to &quot;close the loop&quot; and start fuzzing parts of LLVM (including Clang) using LLVM itself</li>
<li>With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-04-14/introducing-secadm-02" rel="nofollow">HardenedBSD upgrades secadm</a></h3>

<ul>
<li>The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support</li>
<li>We covered both the secadm tool and integriforce in previous episodes, but the short version is that it&#39;s a way to prevent files from being altered (even as root)</li>
<li>Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142877132517229&w=2" rel="nofollow">RAID5 returns to OpenBSD</a></h3>

<ul>
<li>OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> subsystem, somewhat similar to FreeBSD&#39;s GEOM, has had experimental RAID5 support for a while</li>
<li>However, it was exactly that - experimental - and required a recompile to enable</li>
<li>With some work from recent hackathons, the <a href="https://www.marc.info/?l=openbsd-cvs&m=142876943116907&w=2" rel="nofollow">final piece</a> was added to enable resuming partial array rebuilds</li>
<li>Now it&#39;s <a href="https://www.marc.info/?l=openbsd-cvs&m=142877026917030&w=2" rel="nofollow">on by default</a>, and there&#39;s a call for testing being put out, so grab a snapshot and put the code through its paces</li>
<li>The bioctl softraid command also <a href="https://www.marc.info/?l=openbsd-cvs&m=142877223817406&w=2" rel="nofollow">now supports</a> DUIDs during pseudo-device detachment, possibly paving the way for the installer to <a href="https://www.marc.info/?l=openbsd-tech&m=142643313416298&w=2" rel="nofollow">drop</a> the &quot;do you want to enable DUIDs?&quot; question entirely
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055463.html" rel="nofollow">pkgng 1.5.0 released</a></h3>

<ul>
<li>Going back to what we <a href="http://www.bsdnow.tv/episodes/2015_04_08-pkg_remove_freebsd-update" rel="nofollow">talked about last week</a>, the final version of pkgng 1.5.0 is out</li>
<li>The &quot;provides&quot; and &quot;requires&quot; support is finally in a regular release</li>
<li>A new &quot;-r&quot; switch will allow for direct installation to a chroot or alternate root directory</li>
<li>Memory usage should be much better now, and some general code speed-ups were added</li>
<li>This version also introduces support for Mac OS X, NetBSD and EdgeBSD - it&#39;ll be interesting to see if anything comes of that</li>
<li>Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150411160247" rel="nofollow">p2k15 hackathon reports</a></h3>

<ul>
<li>There was another OpenBSD hackathon that just finished up in the UK - this time it was mainly for ports work</li>
<li>As usual, the developers sent in reports of some of the things they got done at the event</li>
<li>Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit</li>
<li>Stefan Sperling <a href="http://undeadly.org/cgi?action=article&sid=20150414064710" rel="nofollow">wrote in</a>, detailing his work with wireless chipsets, specifically when the vendor doesn&#39;t provide any hardware documentation, as well as updating some of the games in ports</li>
<li>Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150413163333" rel="nofollow">also sent in a report</a>, but decided to be a rebel and not work on ports at all - he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iNBo2swq" rel="nofollow">Shaun writes in</a></li>
<li><a href="http://slexy.org/view/s202BRLwrd" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2KT7M35uY" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2Q5lOoxzl" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s2ynDjuzVi" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142884995931428&w=2" rel="nofollow">Gstreamer hates us</a></li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2015-April/006765.html" rel="nofollow">At least he&#39;s honest</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055390.html" rel="nofollow">I find myself in a situation</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>74: That Sly MINIX</title>
  <link>https://www.bsdnow.tv/74</link>
  <guid isPermaLink="false">6e3c9361-afc5-4f27-b2de-a33a6ac82db5</guid>
  <pubDate>Wed, 28 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6e3c9361-afc5-4f27-b2de-a33a6ac82db5.mp3" length="54813172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we've got something a little bit different for you. We'll be talking with Andrew Tanenbaum, the creator of MINIX. They've recently imported parts of NetBSD into their OS, and we'll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:16:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we've got something a little bit different for you. We'll be talking with Andrew Tanenbaum, the creator of MINIX. They've recently imported parts of NetBSD into their OS, and we'll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
The missing EuroBSDCon videos (http://2014.eurobsdcon.org/)
Some of the missing videos from EuroBSDCon 2014 we mentioned before (http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited) have mysteriously appeared
Jordan Hubbard (http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap), FreeBSD, looking forward to another 10 years (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/01.Keynote%20-%20FreeBSD:%20looking%20forward%20to%20another%2010%20years%20-%20Jordan%20Hubbard.mp4)
Lourival Viera Neto, NPF scripting with Lua (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/06.NFS%20scripting%20with%20Lua%20-%20Lourival%20Viera%20Neto.mp4)
Kris Moore, Snapshots, replication and boot environments (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/02.Snapshots,%20replication%20and%20boot%20environments%20-%20Kris%20Moore.mp4)
Andy Tanenbaum, A reimplementation of NetBSD based on a microkernel (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/07.A%20reimplementation%20of%20NetBSD%20based%20on%20a%20microkernel%20-%20Andy%20Tanenbaum.mp4)
Kirk McKusick (http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache), An introduction to FreeBSD's implementation of ZFS (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/03.An%20introduction%20to%20the%20implementation%20of%20ZFS%20-%20Kirk%20McKusick.mp4)
Emannuel Dreyfus, FUSE and beyond, bridging filesystems (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/05.FUSE%20and%20beyond:%20bridging%20filesystems%20-%20Emannuel%20Dreyfus.mp4)
John-Mark Gurney (http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind), Optimizing GELI performance (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/04.Optimizing%20GELI%20performance%20-%20John-Mark%20Gurney.mp4)
Unfortunately, there are still about six talks missing… and no ETA
***
FreeBSD on a MacBook Pro (or two) (https://gist.github.com/mpasternacki/974e29d1e3865e940c53)
We've got a couple posts about running FreeBSD on a MacBook Pro this week
In the first one, the author talks a bit about trying to run Linux on his laptop for quite a while, going back and forth between it and something that Just Works™
Eventually he came full circle, and the focus on using only GUI tools got in the way, instead of making things easier
He works on a lot of FreeBSD-related software, so switching to it for a desktop seems to be the obvious next step
He's still not quite to that point yet, but documents his experiments with BSD as a desktop
The second article (http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-13-late.html) also documents an ex-Linux user switching over to BSD for their desktop
It also covers (http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-82-now.html) power management, bluetooth and trackpad setup
On the topic of Gentoo, "Underneath the beautiful and easy-to-use Portage system lies the same glibc, the same turmoil over a switch to a less-than-ideal init system, and the same kernel-level bugs that bring my productivity down"
Check out both articles if you've been considering running FreeBSD on a MacBook
***
Remote logging over TLS (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142136923124184&amp;amp;w=2)
In most of the BSDs, syslogd has been able to remotely send logs to another server for a long time
That feature can be very useful, especially for forensics purposes - it's much harder for an attacker to hide their activities if the logs aren't on the same server
The problem is, of course, that it's sent in cleartext (https://en.wikipedia.org/wiki/Syslog#Protocol), unless you tunnel it over SSH or use some kind of third party wrapper
With a few recent commits (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142160989610410&amp;amp;w=2), OpenBSD's syslogd now supports sending logs over TLS natively, including X509 certificate verification
By default, syslogd runs as an unprivileged user in a chroot on OpenBSD, so there were some initial concerns about certificate verification - how does that user access the CA chain outside of the chroot?
That problem was also conquered (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142188450524692&amp;amp;w=2), by loading the CA chain directly from memory (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142191799331938&amp;amp;w=2), so the entire process can be run in the chroot (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142191819131993&amp;amp;w=2) without issue
Some of the privsep verifcation code even made its way into (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142191878632141&amp;amp;w=2) LibreSSL right afterwards
If you haven't set up remote logging before, now might be an interesting time to try it out
***
FreeBSD, not a Linux distro (https://www.youtube.com/watch?v=wwbO4eTieQY)
George Neville-Neil gave a presentation recently, titled "FreeBSD: not a Linux distro"
It's meant to be an introduction to new users that might've heard about FreeBSD, but aren't familiar with any BSD history
He goes through some of that history, and talks about what FreeBSD is and why you might want to use it over other options
There's even an interesting "thirty years in three minutes" segment
It's not just a history lesson though, he talks about some of the current features and even some new things coming in the next version(s)
We also learn about filesystems, jails, capsicum, clang, dtrace and the various big companies using FreeBSD in their products
This might be a good video to show your friends or potential employer if you're looking to introduce FreeBSD to them 
***
Long-term support considered harmful (http://www.tedunangst.com/flak/post/long-term-support-considered-harmful)
There was recently a pretty horrible bug (https://www.marc.info/?l=bugtraq&amp;amp;m=142237866420639&amp;amp;w=2) in GNU's libc (BSDs aren't affected, don't worry)
Aside from the severity of the actual problem, the fix was delayed (https://code.google.com/p/chromium/issues/detail?id=364511) for quite a long time, leaving people vulnerable
Ted Unangst writes a post about how this idea of long-term support (https://plus.google.com/u/0/+ArtoPekkanen/posts/88jk5ggXYts?cfem=1) could actually be harmful in the long run, and compares it to how OpenBSD does things
OpenBSD releases a new version every six months, and only the two most recent releases get support and security fixes
He describes this as both a good thing and a bad thing: all the bugs in the ecosystem get flushed out within a year, but it forces people to stay (relatively) up-to-date
"Upgrades only get harder and more painful (and more fragile) the longer one goes between them. More changes, more damage. Frequent upgrades amortize the cost and ensure that regressions are caught early."
There was also some (https://lobste.rs/s/a4iijx/long_term_support_considered_harmful) discussion (https://news.ycombinator.com/item?id=8954737) about the article you can check out
***
Interview - Andrew Tanenbaum - info@minix3.org (mailto:info@minix3.org) / @minix3 (https://twitter.com/minix3)
MINIX's integration of NetBSD
News Roundup
Using AFL on OpenBSD (http://www.undeadly.org/cgi?action=article&amp;amp;sid=20150121093259)
We've talked about American Fuzzy Lop (http://lcamtuf.coredump.cx/afl/) a bit on a previous episode, and how some OpenBSD devs are using it (https://www.marc.info/?l=openbsd-cvs&amp;amp;w=2&amp;amp;r=1&amp;amp;s=afl&amp;amp;q=b) to catch and fix new bugs
Undeadly has a cool guide on how you can get started with fuzzing
It's a little on the advanced side, but if you're interested in programming or diagnosing crashes, it'll be a really interesting article to read
Lots of recent CVEs in other open source projects are attributed to fuzzing - it's a great way to stress test your software
***
Lumina 0.8.1 released (http://blog.pcbsd.org/2015/01/lumina-desktop-0-8-1-released/)
A new version of Lumina, the BSD-licensed desktop environment from PCBSD, has been released
This update includes some new plugins, lots of bugfixes and even "quality-of-life improvements"
There's a new audio player desktop plugin, a button to easily minimize all windows at once and some cool new customization options
You can get it in PCBSD's edge repo or install it through regular ports (on FreeBSD, OpenBSD or DragonFly!)
If you haven't seen our episode about Lumina, where we interview the developer and show you a tour of its features, gotta go watch it (http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment)
***
My first OpenBSD port (http://homing-on-code.blogspot.com/2015/01/my-first-openbsd-port.html)
The author of the "Code Rot &amp;amp; Why I Chose OpenBSD" article has a new post up, this time about ports
He recently made his first port and got it into the tree, so he talks about the whole process from start to finish
After learning some of the basics and becoming comfortable running -current, he noticed there wasn't a port for the "Otter" web browser
At that point he did what you're supposed to do in that situation, and started working on it himself
OpenBSD has a great porter's handbook (http://www.openbsd.org/faq/ports/) that he referenced throughout the process
Long story short, his browser of choice is in the official ports collection and now he's the maintainer (and gets to deal with any bug reports, of course)
If some software you use isn't available for whatever BSD you're using, you could be the one to make it happen
***
How to slide with DragonFly (http://www.dragonflybsd.org/docs/docs/howtos/howtoslide/)
DragonFly BSD has a new HAMMER FS utility called "Slider"
It's used to easily browse through file history and undelete files - imagine something like a commandline version of Apple's Time Machine
They have a pretty comprehensive guide on how to use it on their wiki page
If you're using HAMMER FS, this is a really handy tool to have, check it out
***
OpenSMTPD with Dovecot and Salt (https://blog.al-shami.net/2015/01/howto-small-mail-server-with-salt-dovecot-and-opensmtpd/)
We recently had a feedback question about which mail servers you can use on BSD - Postfix, Exim and OpenSMTPD being the big three
This blog post details how to set up OpenSMTPD, including Dovecot for IMAP and Salt for quick and easy deployment
Intrigued by it becoming the default MTA in OpenBSD, the author decided to give it a try after being a long-time Postfix fan
"Small, fast, stable, and very easy to customize, no more ugly m4 macros to deal with"
Check it out if you've been thinking about configuring your first mail server on any of the BSDs
***
Feedback/Questions
Christopher writes in (http://slexy.org/view/s20q2fSfEO) (handbook section (https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails-ezjail.html#jails-ezjail-update-os))
Mark writes in (http://slexy.org/view/s2zGvAczeN)
Kevin writes in (http://slexy.org/view/s21Dn2Tey8)
Stefano writes in (http://slexy.org/view/s215nxxrtF)
Matthew writes in (http://slexy.org/view/s20cwezc9l)
***
Mailing List Gold
Not that interested actually (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142194821910087&amp;amp;w=2)
This guy again (https://lists.freebsd.org/pipermail/freebsd-jail/2015-January/002742.html)
Yep, this is the place (https://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024888.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, minix, minix3, userland, pkgsrc, afl, american fuzzy lop, fuzzing, hammerfs, hammer fs, slider, eurobsdcon, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ve got something a little bit different for you. We&#39;ll be talking with Andrew Tanenbaum, the creator of MINIX. They&#39;ve recently imported parts of NetBSD into their OS, and we&#39;ll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/" rel="nofollow">The missing EuroBSDCon videos</a></h3>

<ul>
<li>Some of the missing videos from EuroBSDCon 2014 <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">we mentioned before</a> have mysteriously appeared</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/01.Keynote%20-%20FreeBSD:%20looking%20forward%20to%20another%2010%20years%20-%20Jordan%20Hubbard.mp4" rel="nofollow">FreeBSD, looking forward to another 10 years</a></li>
<li>Lourival Viera Neto, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/06.NFS%20scripting%20with%20Lua%20-%20Lourival%20Viera%20Neto.mp4" rel="nofollow">NPF scripting with Lua</a></li>
<li>Kris Moore, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/02.Snapshots,%20replication%20and%20boot%20environments%20-%20Kris%20Moore.mp4" rel="nofollow">Snapshots, replication and boot environments</a></li>
<li>Andy Tanenbaum, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/07.A%20reimplementation%20of%20NetBSD%20based%20on%20a%20microkernel%20-%20Andy%20Tanenbaum.mp4" rel="nofollow">A reimplementation of NetBSD based on a microkernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/03.An%20introduction%20to%20the%20implementation%20of%20ZFS%20-%20Kirk%20McKusick.mp4" rel="nofollow">An introduction to FreeBSD&#39;s implementation of ZFS</a></li>
<li>Emannuel Dreyfus, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/05.FUSE%20and%20beyond:%20bridging%20filesystems%20-%20Emannuel%20Dreyfus.mp4" rel="nofollow">FUSE and beyond, bridging filesystems</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">John-Mark Gurney</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/04.Optimizing%20GELI%20performance%20-%20John-Mark%20Gurney.mp4" rel="nofollow">Optimizing GELI performance</a></li>
<li>Unfortunately, there are still about six talks missing… and no ETA
***</li>
</ul>

<h3><a href="https://gist.github.com/mpasternacki/974e29d1e3865e940c53" rel="nofollow">FreeBSD on a MacBook Pro (or two)</a></h3>

<ul>
<li>We&#39;ve got a couple posts about running FreeBSD on a MacBook Pro this week</li>
<li>In the first one, the author talks a bit about trying to run Linux on his laptop for quite a while, going back and forth between it and something that Just Works™</li>
<li>Eventually he came full circle, and the focus on using only GUI tools got in the way, instead of making things easier</li>
<li>He works on a lot of FreeBSD-related software, so switching to it for a desktop seems to be the obvious next step</li>
<li>He&#39;s still not quite to that point yet, but documents his experiments with BSD as a desktop</li>
<li>The <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-13-late.html" rel="nofollow">second article</a> also documents an ex-Linux user switching over to BSD for their desktop</li>
<li>It <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-82-now.html" rel="nofollow">also covers</a> power management, bluetooth and trackpad setup</li>
<li>On the topic of Gentoo, &quot;Underneath the beautiful and easy-to-use Portage system lies the same glibc, the same turmoil over a switch to a less-than-ideal init system, and the same kernel-level bugs that bring my productivity down&quot;</li>
<li>Check out both articles if you&#39;ve been considering running FreeBSD on a MacBook
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142136923124184&w=2" rel="nofollow">Remote logging over TLS</a></h3>

<ul>
<li>In most of the BSDs, syslogd has been able to remotely send logs to another server for a long time</li>
<li>That feature can be very useful, especially for forensics purposes - it&#39;s much harder for an attacker to hide their activities if the logs aren&#39;t on the same server</li>
<li>The problem is, of course, that it&#39;s <a href="https://en.wikipedia.org/wiki/Syslog#Protocol" rel="nofollow">sent in cleartext</a>, unless you tunnel it over SSH or use some kind of third party wrapper</li>
<li>With a few <a href="https://www.marc.info/?l=openbsd-cvs&m=142160989610410&w=2" rel="nofollow">recent commits</a>, OpenBSD&#39;s syslogd now supports sending logs over TLS natively, including X509 certificate verification</li>
<li>By default, syslogd runs as an unprivileged user in a chroot on OpenBSD, so there were some initial concerns about certificate verification - how does that user access the CA chain <em>outside</em> of the chroot?</li>
<li>That problem <a href="https://www.marc.info/?l=openbsd-tech&m=142188450524692&w=2" rel="nofollow">was also conquered</a>, by loading the CA chain <a href="https://www.marc.info/?l=openbsd-cvs&m=142191799331938&w=2" rel="nofollow">directly from memory</a>, so the entire process <a href="https://www.marc.info/?l=openbsd-cvs&m=142191819131993&w=2" rel="nofollow">can be run in the chroot</a> without issue</li>
<li>Some of the privsep verifcation code even <a href="https://www.marc.info/?l=openbsd-cvs&m=142191878632141&w=2" rel="nofollow">made its way into</a> LibreSSL right afterwards</li>
<li>If you haven&#39;t set up remote logging before, now might be an interesting time to try it out
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=wwbO4eTieQY" rel="nofollow">FreeBSD, not a Linux distro</a></h3>

<ul>
<li>George Neville-Neil gave a presentation recently, titled &quot;FreeBSD: not a Linux distro&quot;</li>
<li>It&#39;s meant to be an introduction to new users that might&#39;ve heard about FreeBSD, but aren&#39;t familiar with any BSD history</li>
<li>He goes through some of that history, and talks about what FreeBSD is and why you might want to use it over other options</li>
<li>There&#39;s even an interesting &quot;thirty years in three minutes&quot; segment</li>
<li>It&#39;s not just a history lesson though, he talks about some of the current features and even some new things coming in the next version(s)</li>
<li>We also learn about filesystems, jails, capsicum, clang, dtrace and the various big companies using FreeBSD in their products</li>
<li>This might be a good video to show your friends or potential employer if you&#39;re looking to introduce FreeBSD to them 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/long-term-support-considered-harmful" rel="nofollow">Long-term support considered harmful</a></h3>

<ul>
<li>There was recently a <a href="https://www.marc.info/?l=bugtraq&m=142237866420639&w=2" rel="nofollow">pretty horrible bug</a> in GNU&#39;s libc (BSDs aren&#39;t affected, don&#39;t worry)</li>
<li>Aside from the severity of the actual problem, the fix was <a href="https://code.google.com/p/chromium/issues/detail?id=364511" rel="nofollow">delayed</a> for quite a long time, leaving people vulnerable</li>
<li>Ted Unangst writes a post about how this <a href="https://plus.google.com/u/0/+ArtoPekkanen/posts/88jk5ggXYts?cfem=1" rel="nofollow">idea of long-term support</a> could actually be harmful in the long run, and compares it to how OpenBSD does things</li>
<li>OpenBSD releases a new version every six months, and only the two most recent releases get support and security fixes</li>
<li>He describes this as both a good thing and a bad thing: all the bugs in the ecosystem get flushed out within a year, but it forces people to stay (relatively) up-to-date</li>
<li>&quot;Upgrades only get harder and more painful (and more fragile) the longer one goes between them. More changes, more damage. Frequent upgrades amortize the cost and ensure that regressions are caught early.&quot;</li>
<li>There was also <a href="https://lobste.rs/s/a4iijx/long_term_support_considered_harmful" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=8954737" rel="nofollow">discussion</a> about the article you can check out
***</li>
</ul>

<h2>Interview - Andrew Tanenbaum - <a href="mailto:info@minix3.org" rel="nofollow">info@minix3.org</a> / <a href="https://twitter.com/minix3" rel="nofollow">@minix3</a></h2>

<p>MINIX&#39;s integration of NetBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.undeadly.org/cgi?action=article&sid=20150121093259" rel="nofollow">Using AFL on OpenBSD</a></h3>

<ul>
<li>We&#39;ve talked about <a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a> a bit on a previous episode, and how some OpenBSD devs <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">are using it</a> to catch and fix new bugs</li>
<li>Undeadly has a cool guide on how you can get started with fuzzing</li>
<li>It&#39;s a little on the advanced side, but if you&#39;re interested in programming or diagnosing crashes, it&#39;ll be a really interesting article to read</li>
<li>Lots of recent CVEs in other open source projects are attributed to fuzzing - it&#39;s a great way to stress test your software
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/lumina-desktop-0-8-1-released/" rel="nofollow">Lumina 0.8.1 released</a></h3>

<ul>
<li>A new version of Lumina, the BSD-licensed desktop environment from PCBSD, has been released</li>
<li>This update includes some new plugins, lots of bugfixes and even &quot;quality-of-life improvements&quot;</li>
<li>There&#39;s a new audio player desktop plugin, a button to easily minimize all windows at once and some cool new customization options</li>
<li>You can get it in PCBSD&#39;s edge repo or install it through regular ports (on FreeBSD, OpenBSD <em>or</em> DragonFly!)</li>
<li>If you haven&#39;t seen our episode about Lumina, where we interview the developer and show you a tour of its features, <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">gotta go watch it</a>
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/my-first-openbsd-port.html" rel="nofollow">My first OpenBSD port</a></h3>

<ul>
<li>The author of the &quot;Code Rot &amp; Why I Chose OpenBSD&quot; article has a new post up, this time about ports</li>
<li>He recently made his first port and got it into the tree, so he talks about the whole process from start to finish</li>
<li>After learning some of the basics and becoming comfortable running -current, he noticed there wasn&#39;t a port for the &quot;Otter&quot; web browser</li>
<li>At that point he did what you&#39;re <em>supposed to do</em> in that situation, and started working on it himself</li>
<li>OpenBSD has a great <a href="http://www.openbsd.org/faq/ports/" rel="nofollow">porter&#39;s handbook</a> that he referenced throughout the process</li>
<li>Long story short, his browser of choice is in the official ports collection and now he&#39;s the maintainer (and gets to deal with any bug reports, of course)</li>
<li>If some software you use isn&#39;t available for whatever BSD you&#39;re using, you could be the one to make it happen
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/docs/howtos/howtoslide/" rel="nofollow">How to slide with DragonFly</a></h3>

<ul>
<li>DragonFly BSD has a new HAMMER FS utility called &quot;Slider&quot;</li>
<li>It&#39;s used to easily browse through file history and undelete files - imagine something like a commandline version of Apple&#39;s Time Machine</li>
<li>They have a pretty comprehensive guide on how to use it on their wiki page</li>
<li>If you&#39;re using HAMMER FS, this is a really handy tool to have, check it out
***</li>
</ul>

<h3><a href="https://blog.al-shami.net/2015/01/howto-small-mail-server-with-salt-dovecot-and-opensmtpd/" rel="nofollow">OpenSMTPD with Dovecot and Salt</a></h3>

<ul>
<li>We recently had a feedback question about which mail servers you can use on BSD - Postfix, Exim and OpenSMTPD being the big three</li>
<li>This blog post details how to set up OpenSMTPD, including Dovecot for IMAP and Salt for quick and easy deployment</li>
<li>Intrigued by it becoming the default MTA in OpenBSD, the author decided to give it a try after being a long-time Postfix fan</li>
<li>&quot;Small, fast, stable, and very easy to customize, no more ugly m4 macros to deal with&quot;</li>
<li>Check it out if you&#39;ve been thinking about configuring your first mail server on any of the BSDs
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20q2fSfEO" rel="nofollow">Christopher writes in</a> (<a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails-ezjail.html#jails-ezjail-update-os" rel="nofollow">handbook section</a>)</li>
<li><a href="http://slexy.org/view/s2zGvAczeN" rel="nofollow">Mark writes in</a></li>
<li><a href="http://slexy.org/view/s21Dn2Tey8" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s215nxxrtF" rel="nofollow">Stefano writes in</a></li>
<li><a href="http://slexy.org/view/s20cwezc9l" rel="nofollow">Matthew writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142194821910087&w=2" rel="nofollow">Not that interested actually</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-jail/2015-January/002742.html" rel="nofollow">This guy again</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024888.html" rel="nofollow">Yep, this is the place</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ve got something a little bit different for you. We&#39;ll be talking with Andrew Tanenbaum, the creator of MINIX. They&#39;ve recently imported parts of NetBSD into their OS, and we&#39;ll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/" rel="nofollow">The missing EuroBSDCon videos</a></h3>

<ul>
<li>Some of the missing videos from EuroBSDCon 2014 <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">we mentioned before</a> have mysteriously appeared</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/01.Keynote%20-%20FreeBSD:%20looking%20forward%20to%20another%2010%20years%20-%20Jordan%20Hubbard.mp4" rel="nofollow">FreeBSD, looking forward to another 10 years</a></li>
<li>Lourival Viera Neto, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/06.NFS%20scripting%20with%20Lua%20-%20Lourival%20Viera%20Neto.mp4" rel="nofollow">NPF scripting with Lua</a></li>
<li>Kris Moore, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/02.Snapshots,%20replication%20and%20boot%20environments%20-%20Kris%20Moore.mp4" rel="nofollow">Snapshots, replication and boot environments</a></li>
<li>Andy Tanenbaum, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/07.A%20reimplementation%20of%20NetBSD%20based%20on%20a%20microkernel%20-%20Andy%20Tanenbaum.mp4" rel="nofollow">A reimplementation of NetBSD based on a microkernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/03.An%20introduction%20to%20the%20implementation%20of%20ZFS%20-%20Kirk%20McKusick.mp4" rel="nofollow">An introduction to FreeBSD&#39;s implementation of ZFS</a></li>
<li>Emannuel Dreyfus, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/05.FUSE%20and%20beyond:%20bridging%20filesystems%20-%20Emannuel%20Dreyfus.mp4" rel="nofollow">FUSE and beyond, bridging filesystems</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">John-Mark Gurney</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/04.Optimizing%20GELI%20performance%20-%20John-Mark%20Gurney.mp4" rel="nofollow">Optimizing GELI performance</a></li>
<li>Unfortunately, there are still about six talks missing… and no ETA
***</li>
</ul>

<h3><a href="https://gist.github.com/mpasternacki/974e29d1e3865e940c53" rel="nofollow">FreeBSD on a MacBook Pro (or two)</a></h3>

<ul>
<li>We&#39;ve got a couple posts about running FreeBSD on a MacBook Pro this week</li>
<li>In the first one, the author talks a bit about trying to run Linux on his laptop for quite a while, going back and forth between it and something that Just Works™</li>
<li>Eventually he came full circle, and the focus on using only GUI tools got in the way, instead of making things easier</li>
<li>He works on a lot of FreeBSD-related software, so switching to it for a desktop seems to be the obvious next step</li>
<li>He&#39;s still not quite to that point yet, but documents his experiments with BSD as a desktop</li>
<li>The <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-13-late.html" rel="nofollow">second article</a> also documents an ex-Linux user switching over to BSD for their desktop</li>
<li>It <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-82-now.html" rel="nofollow">also covers</a> power management, bluetooth and trackpad setup</li>
<li>On the topic of Gentoo, &quot;Underneath the beautiful and easy-to-use Portage system lies the same glibc, the same turmoil over a switch to a less-than-ideal init system, and the same kernel-level bugs that bring my productivity down&quot;</li>
<li>Check out both articles if you&#39;ve been considering running FreeBSD on a MacBook
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142136923124184&w=2" rel="nofollow">Remote logging over TLS</a></h3>

<ul>
<li>In most of the BSDs, syslogd has been able to remotely send logs to another server for a long time</li>
<li>That feature can be very useful, especially for forensics purposes - it&#39;s much harder for an attacker to hide their activities if the logs aren&#39;t on the same server</li>
<li>The problem is, of course, that it&#39;s <a href="https://en.wikipedia.org/wiki/Syslog#Protocol" rel="nofollow">sent in cleartext</a>, unless you tunnel it over SSH or use some kind of third party wrapper</li>
<li>With a few <a href="https://www.marc.info/?l=openbsd-cvs&m=142160989610410&w=2" rel="nofollow">recent commits</a>, OpenBSD&#39;s syslogd now supports sending logs over TLS natively, including X509 certificate verification</li>
<li>By default, syslogd runs as an unprivileged user in a chroot on OpenBSD, so there were some initial concerns about certificate verification - how does that user access the CA chain <em>outside</em> of the chroot?</li>
<li>That problem <a href="https://www.marc.info/?l=openbsd-tech&m=142188450524692&w=2" rel="nofollow">was also conquered</a>, by loading the CA chain <a href="https://www.marc.info/?l=openbsd-cvs&m=142191799331938&w=2" rel="nofollow">directly from memory</a>, so the entire process <a href="https://www.marc.info/?l=openbsd-cvs&m=142191819131993&w=2" rel="nofollow">can be run in the chroot</a> without issue</li>
<li>Some of the privsep verifcation code even <a href="https://www.marc.info/?l=openbsd-cvs&m=142191878632141&w=2" rel="nofollow">made its way into</a> LibreSSL right afterwards</li>
<li>If you haven&#39;t set up remote logging before, now might be an interesting time to try it out
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=wwbO4eTieQY" rel="nofollow">FreeBSD, not a Linux distro</a></h3>

<ul>
<li>George Neville-Neil gave a presentation recently, titled &quot;FreeBSD: not a Linux distro&quot;</li>
<li>It&#39;s meant to be an introduction to new users that might&#39;ve heard about FreeBSD, but aren&#39;t familiar with any BSD history</li>
<li>He goes through some of that history, and talks about what FreeBSD is and why you might want to use it over other options</li>
<li>There&#39;s even an interesting &quot;thirty years in three minutes&quot; segment</li>
<li>It&#39;s not just a history lesson though, he talks about some of the current features and even some new things coming in the next version(s)</li>
<li>We also learn about filesystems, jails, capsicum, clang, dtrace and the various big companies using FreeBSD in their products</li>
<li>This might be a good video to show your friends or potential employer if you&#39;re looking to introduce FreeBSD to them 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/long-term-support-considered-harmful" rel="nofollow">Long-term support considered harmful</a></h3>

<ul>
<li>There was recently a <a href="https://www.marc.info/?l=bugtraq&m=142237866420639&w=2" rel="nofollow">pretty horrible bug</a> in GNU&#39;s libc (BSDs aren&#39;t affected, don&#39;t worry)</li>
<li>Aside from the severity of the actual problem, the fix was <a href="https://code.google.com/p/chromium/issues/detail?id=364511" rel="nofollow">delayed</a> for quite a long time, leaving people vulnerable</li>
<li>Ted Unangst writes a post about how this <a href="https://plus.google.com/u/0/+ArtoPekkanen/posts/88jk5ggXYts?cfem=1" rel="nofollow">idea of long-term support</a> could actually be harmful in the long run, and compares it to how OpenBSD does things</li>
<li>OpenBSD releases a new version every six months, and only the two most recent releases get support and security fixes</li>
<li>He describes this as both a good thing and a bad thing: all the bugs in the ecosystem get flushed out within a year, but it forces people to stay (relatively) up-to-date</li>
<li>&quot;Upgrades only get harder and more painful (and more fragile) the longer one goes between them. More changes, more damage. Frequent upgrades amortize the cost and ensure that regressions are caught early.&quot;</li>
<li>There was also <a href="https://lobste.rs/s/a4iijx/long_term_support_considered_harmful" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=8954737" rel="nofollow">discussion</a> about the article you can check out
***</li>
</ul>

<h2>Interview - Andrew Tanenbaum - <a href="mailto:info@minix3.org" rel="nofollow">info@minix3.org</a> / <a href="https://twitter.com/minix3" rel="nofollow">@minix3</a></h2>

<p>MINIX&#39;s integration of NetBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.undeadly.org/cgi?action=article&sid=20150121093259" rel="nofollow">Using AFL on OpenBSD</a></h3>

<ul>
<li>We&#39;ve talked about <a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a> a bit on a previous episode, and how some OpenBSD devs <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">are using it</a> to catch and fix new bugs</li>
<li>Undeadly has a cool guide on how you can get started with fuzzing</li>
<li>It&#39;s a little on the advanced side, but if you&#39;re interested in programming or diagnosing crashes, it&#39;ll be a really interesting article to read</li>
<li>Lots of recent CVEs in other open source projects are attributed to fuzzing - it&#39;s a great way to stress test your software
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/lumina-desktop-0-8-1-released/" rel="nofollow">Lumina 0.8.1 released</a></h3>

<ul>
<li>A new version of Lumina, the BSD-licensed desktop environment from PCBSD, has been released</li>
<li>This update includes some new plugins, lots of bugfixes and even &quot;quality-of-life improvements&quot;</li>
<li>There&#39;s a new audio player desktop plugin, a button to easily minimize all windows at once and some cool new customization options</li>
<li>You can get it in PCBSD&#39;s edge repo or install it through regular ports (on FreeBSD, OpenBSD <em>or</em> DragonFly!)</li>
<li>If you haven&#39;t seen our episode about Lumina, where we interview the developer and show you a tour of its features, <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">gotta go watch it</a>
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/my-first-openbsd-port.html" rel="nofollow">My first OpenBSD port</a></h3>

<ul>
<li>The author of the &quot;Code Rot &amp; Why I Chose OpenBSD&quot; article has a new post up, this time about ports</li>
<li>He recently made his first port and got it into the tree, so he talks about the whole process from start to finish</li>
<li>After learning some of the basics and becoming comfortable running -current, he noticed there wasn&#39;t a port for the &quot;Otter&quot; web browser</li>
<li>At that point he did what you&#39;re <em>supposed to do</em> in that situation, and started working on it himself</li>
<li>OpenBSD has a great <a href="http://www.openbsd.org/faq/ports/" rel="nofollow">porter&#39;s handbook</a> that he referenced throughout the process</li>
<li>Long story short, his browser of choice is in the official ports collection and now he&#39;s the maintainer (and gets to deal with any bug reports, of course)</li>
<li>If some software you use isn&#39;t available for whatever BSD you&#39;re using, you could be the one to make it happen
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/docs/howtos/howtoslide/" rel="nofollow">How to slide with DragonFly</a></h3>

<ul>
<li>DragonFly BSD has a new HAMMER FS utility called &quot;Slider&quot;</li>
<li>It&#39;s used to easily browse through file history and undelete files - imagine something like a commandline version of Apple&#39;s Time Machine</li>
<li>They have a pretty comprehensive guide on how to use it on their wiki page</li>
<li>If you&#39;re using HAMMER FS, this is a really handy tool to have, check it out
***</li>
</ul>

<h3><a href="https://blog.al-shami.net/2015/01/howto-small-mail-server-with-salt-dovecot-and-opensmtpd/" rel="nofollow">OpenSMTPD with Dovecot and Salt</a></h3>

<ul>
<li>We recently had a feedback question about which mail servers you can use on BSD - Postfix, Exim and OpenSMTPD being the big three</li>
<li>This blog post details how to set up OpenSMTPD, including Dovecot for IMAP and Salt for quick and easy deployment</li>
<li>Intrigued by it becoming the default MTA in OpenBSD, the author decided to give it a try after being a long-time Postfix fan</li>
<li>&quot;Small, fast, stable, and very easy to customize, no more ugly m4 macros to deal with&quot;</li>
<li>Check it out if you&#39;ve been thinking about configuring your first mail server on any of the BSDs
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20q2fSfEO" rel="nofollow">Christopher writes in</a> (<a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails-ezjail.html#jails-ezjail-update-os" rel="nofollow">handbook section</a>)</li>
<li><a href="http://slexy.org/view/s2zGvAczeN" rel="nofollow">Mark writes in</a></li>
<li><a href="http://slexy.org/view/s21Dn2Tey8" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s215nxxrtF" rel="nofollow">Stefano writes in</a></li>
<li><a href="http://slexy.org/view/s20cwezc9l" rel="nofollow">Matthew writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142194821910087&w=2" rel="nofollow">Not that interested actually</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-jail/2015-January/002742.html" rel="nofollow">This guy again</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024888.html" rel="nofollow">Yep, this is the place</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>65: 8,000,000 Mogofoo-ops</title>
  <link>https://www.bsdnow.tv/65</link>
  <guid isPermaLink="false">c905fcf9-ebc6-4a15-8d34-631dc9742cea</guid>
  <pubDate>Wed, 26 Nov 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c905fcf9-ebc6-4a15-8d34-631dc9742cea.mp3" length="66537364" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on the show this week, we've got an interview with Brendan Gregg of Netflix. He's got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:32:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up on the show this week, we've got an interview with Brendan Gregg of Netflix. He's got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week's news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Even more BSD presentation videos (https://www.meetbsd.com/)
More videos from this year's MeetBSD and OpenZFS devsummit were uploaded since last week
Robert Ryan, At the Heart of the Digital Economy (https://www.youtube.com/watch?v=Rc9k1xEepWU)
FreeNAS &amp;amp; ZFS, The Indestructible Duo - Except for the Hard Drives (https://www.youtube.com/watch?v=d1C6DELK7fc)
Richard Yao, libzfs_core and ioctl stabilization (https://www.youtube.com/watch?v=PIC0dwLRBZU)
OpenZFS, Company lightning talks (https://www.youtube.com/watch?v=LmbI7F7XTTc)
OpenZFS, Hackathon Presentation and Awards (https://www.youtube.com/watch?v=gPbVPwScMGk)
Pavel Zakharov, Fast File Cloning (https://www.youtube.com/watch?v=_lGOAZFXra8)
Rick Reed, Half a billion unsuspecting FreeBSD users (https://www.youtube.com/watch?v=TneLO5TdW_M)
Alex Reece &amp;amp; Matt Ahrens, Device Removal (https://www.youtube.com/watch?v=Xs6MsJ9kKKE)
Chris Side, Channel Programs (https://www.youtube.com/watch?v=RMTxyqcomPA)
David Maxwell, The Unix command pipeline (https://www.youtube.com/watch?v=CZHEZHK4jRc)
Be sure to check out the giant list of videos from last week's episode (http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited) if you haven't seen them already
***
NetBSD on a Cobalt Qube 2 (http://www.jarredcapellman.com/2014/3/9/NetBSD-and-a-Cobalt-Qube-2)
The Cobalt Qube was a very expensive networking appliance around 2000
In 2014, you can apparently get one of these MIPS-based machines for about forty bucks
This blog post details getting NetBSD installed and set up on the rare relic of our networking past
If you're an old-time fan of RISC or MIPS CPUs, this'll be a treat for you
Lots of great pictures of the hardware too
***
OpenBSD vs. AFL (https://www.marc.info/?l=openbsd-cvs&amp;amp;w=2&amp;amp;r=1&amp;amp;s=afl&amp;amp;q=b)
In their never-ending security audit, some OpenBSD developers have been hitting various parts of the tree (https://twitter.com/damienmiller/status/534156368391831552) with a fuzzer
If you're not familiar, fuzzing (https://en.wikipedia.org/wiki/Fuzz_testing) is a semi-automated way to test programs for crashes and potential security problems
The program being subjected to torture gets all sorts of random and invalid input, in the hopes of uncovering overflows and other bugs
American Fuzzy Lop (http://lcamtuf.coredump.cx/afl/), in particular, has provided some interesting results across various open source projects recently
So far, it's fixed some NULL pointer dereferences in OpenSSH, various crashes in tcpdump and mandoc (http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man) and a few other things (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141646270127039&amp;amp;w=2)
AFL has an impressive list of CVEs (vulnerabilities) that it's helped developers discover and fix
It also made its way into OpenBSD ports, FreeBSD ports and NetBSD's pkgsrc very recently, so you can try it out for yourself
***
GNOME 3 hits the FreeBSD ports tree (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=372768)
While you've been able to run GNOME 3 on PC-BSD and OpenBSD for a while, it hasn't actually hit the FreeBSD ports tree.. until now
Now you can play with GNOME 3 and all its goodies (as well as Cinnamon 2.2, which this also brings in) on vanilla FreeBSD
Be sure to check the commit message and /usr/ports/UPDATING (http://www.bsdnow.tv/tutorials/ports) if you're upgrading from GNOME 2
You might also want to go back and listen to our interview (http://www.bsdnow.tv/episodes/2014_02_26-port_authority) with Joe Marcus Clark about GNOME's portability
***
Interview - Brendan Gregg - bgregg@netflix.com (mailto:bgregg@netflix.com) / @brendangregg (https://twitter.com/brendangregg)
Performance tuning, benchmarks, debugging
News Roundup
DragonFlyBSD 4.0 released (http://www.dragonflybsd.org/release40/)
A new major version of DragonFly, 4.0.1, was just recently announced
This version includes support for Haswell GPUs, lots of SMP improvements (including some in PF) and support for up to 256 CPUs
It's also the first release to drop support for i386, so it joins PCBSD in the 64 bit-only club
Check the release notes for all the details, including networking and kernel improvements, as well as some crypto changes
***
Can we talk about FreeBSD vs Linux (https://news.ycombinator.com/item?id=8645443)
Hackernews had a recent thread about discussing Linux vs BSD, and the trolls stayed away for once
Rather than rehashing why one is "better" than the other, it was focused on explaining some of the differences between ecosystems and communities
If you're one of the many people who watch our show just out of curiosity about the BSD world, this might be a good thread to read
Someone in the comments even gave bsdnow.tv a mention as a good resource to learn, thanks guy
***
OpenBSD IPSEC tunnel guide (http://www.packetmischief.ca/openbsd-ipsec-tunnel-guide/)
If you've ever wanted to connect two networks with OpenBSD gateways, this is the article for you
It shows how to set up an IPSEC tunnel between destinations, how to lock it down and how to access all the machines on the other network just like they were on your LAN
The article also explains some of the basics of IPSEC if you're not familiar with all the terminology, so this isn't just for experts
Though the article itself is a few years old, it mostly still applies to the latest stuff today
All the tools used are in the OpenBSD base system, so that's pretty handy too
***
DragonFly starts work on IPFW2 (http://www.dragonflybsd.org/docs/ipfw2/)
DragonFlyBSD, much like FreeBSD, comes with more than one firewall you can use
Now it looks like you're going to have yet another choice, as someone is working on a fork of IPFW (which is actually already in its second version, so it should be "IPFW3")
Not a whole lot is known yet; it's still in heavy development, but there's a brief roadmap (http://www.dragonflybsd.org/docs/ipfw2/#index6h1) page with some planned additions
The guy who's working on this has already agreed to come on the show for an interview, but we're going to give him a chance to get some more work done first
Expect that sometime next year, once he's made some progress
***
Feedback/Questions
Michael writes in (http://slexy.org/view/s2NYgVifXN)
Samael writes in (http://slexy.org/view/s21X02saI3)
Steven writes in (http://slexy.org/view/s21Dj7zImH)
Remy writes in (http://slexy.org/view/s218lXg38C)
Michael writes in (http://slexy.org/view/s20SEuKlaH)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dtrace, benchmarks, zfs, solaris, pmstat, performance, high availability, ktrace, strace, iops, freenas, ipfw2, gnome3, afl, fuzzing, american fuzzy lop, ipsec, tunnel</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on the show this week, we&#39;ve got an interview with Brendan Gregg of Netflix. He&#39;s got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">Even more BSD presentation videos</a></h3>

<ul>
<li>More videos from this year&#39;s MeetBSD and OpenZFS devsummit were uploaded since last week</li>
<li>Robert Ryan, <a href="https://www.youtube.com/watch?v=Rc9k1xEepWU" rel="nofollow">At the Heart of the Digital Economy</a></li>
<li>FreeNAS &amp; ZFS, The Indestructible Duo - <a href="https://www.youtube.com/watch?v=d1C6DELK7fc" rel="nofollow">Except for the Hard Drives</a></li>
<li>Richard Yao, <a href="https://www.youtube.com/watch?v=PIC0dwLRBZU" rel="nofollow">libzfs_core and ioctl stabilization</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=LmbI7F7XTTc" rel="nofollow">Company lightning talks</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=gPbVPwScMGk" rel="nofollow">Hackathon Presentation and Awards</a></li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=_lGOAZFXra8" rel="nofollow">Fast File Cloning</a></li>
<li>Rick Reed, <a href="https://www.youtube.com/watch?v=TneLO5TdW_M" rel="nofollow">Half a billion unsuspecting FreeBSD users</a></li>
<li>Alex Reece &amp; Matt Ahrens, <a href="https://www.youtube.com/watch?v=Xs6MsJ9kKKE" rel="nofollow">Device Removal</a></li>
<li>Chris Side, <a href="https://www.youtube.com/watch?v=RMTxyqcomPA" rel="nofollow">Channel Programs</a></li>
<li>David Maxwell, <a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">The Unix command pipeline</a></li>
<li>Be sure to check out the <strong>giant list of videos</strong> from <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">last week&#39;s episode</a> if you haven&#39;t seen them already
***</li>
</ul>

<h3><a href="http://www.jarredcapellman.com/2014/3/9/NetBSD-and-a-Cobalt-Qube-2" rel="nofollow">NetBSD on a Cobalt Qube 2</a></h3>

<ul>
<li>The Cobalt Qube was a very expensive networking appliance around 2000</li>
<li>In 2014, you can apparently get one of these MIPS-based machines for about forty bucks</li>
<li>This blog post details getting NetBSD installed and set up on the rare relic of our networking past</li>
<li>If you&#39;re an old-time fan of RISC or MIPS CPUs, this&#39;ll be a treat for you</li>
<li>Lots of great pictures of the hardware too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">OpenBSD vs. AFL</a></h3>

<ul>
<li>In their never-ending security audit, some OpenBSD developers have been <a href="https://twitter.com/damienmiller/status/534156368391831552" rel="nofollow">hitting various parts of the tree</a> with a fuzzer</li>
<li>If you&#39;re not familiar, <a href="https://en.wikipedia.org/wiki/Fuzz_testing" rel="nofollow">fuzzing</a> is a semi-automated way to test programs for crashes and potential security problems</li>
<li>The program being subjected to torture gets all sorts of random and invalid input, in the hopes of uncovering overflows and other bugs</li>
<li><a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a>, in particular, has provided some interesting results across various open source projects recently</li>
<li>So far, it&#39;s fixed some NULL pointer dereferences in OpenSSH, various crashes in tcpdump and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a> and <a href="https://www.marc.info/?l=openbsd-cvs&m=141646270127039&w=2" rel="nofollow">a few other things</a></li>
<li>AFL has an impressive list of CVEs (vulnerabilities) that it&#39;s helped developers discover and fix</li>
<li>It also made its way into OpenBSD ports, FreeBSD ports and NetBSD&#39;s pkgsrc very recently, so you can try it out for yourself
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=372768" rel="nofollow">GNOME 3 hits the FreeBSD ports tree</a></h3>

<ul>
<li>While you&#39;ve been able to run GNOME 3 on PC-BSD and OpenBSD for a while, it hasn&#39;t actually hit the FreeBSD ports tree.. until now</li>
<li>Now you can play with GNOME 3 and all its goodies (as well as Cinnamon 2.2, which this also brings in) on vanilla FreeBSD</li>
<li>Be sure to check the commit message and <a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">/usr/ports/UPDATING</a> if you&#39;re upgrading from GNOME 2</li>
<li>You might also want to go back and listen to <a href="http://www.bsdnow.tv/episodes/2014_02_26-port_authority" rel="nofollow">our interview</a> with Joe Marcus Clark about GNOME&#39;s portability
***</li>
</ul>

<h2>Interview - Brendan Gregg - <a href="mailto:bgregg@netflix.com" rel="nofollow">bgregg@netflix.com</a> / <a href="https://twitter.com/brendangregg" rel="nofollow">@brendangregg</a></h2>

<p>Performance tuning, benchmarks, debugging</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.dragonflybsd.org/release40/" rel="nofollow">DragonFlyBSD 4.0 released</a></h3>

<ul>
<li>A new major version of DragonFly, 4.0.1, was just recently announced</li>
<li>This version includes support for Haswell GPUs, lots of SMP improvements (including some in PF) and support for up to 256 CPUs</li>
<li>It&#39;s also the first release to drop support for i386, so it joins PCBSD in the 64 bit-only club</li>
<li>Check the release notes for all the details, including networking and kernel improvements, as well as some crypto changes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=8645443" rel="nofollow">Can we talk about FreeBSD vs Linux</a></h3>

<ul>
<li>Hackernews had a recent thread about discussing Linux vs BSD, and the trolls stayed away for once</li>
<li>Rather than rehashing why one is &quot;better&quot; than the other, it was focused on explaining some of the differences between ecosystems and communities</li>
<li>If you&#39;re one of the many people who watch our show just out of curiosity about the BSD world, this might be a good thread to read</li>
<li>Someone in the comments even gave bsdnow.tv a mention as a good resource to learn, thanks guy
***</li>
</ul>

<h3><a href="http://www.packetmischief.ca/openbsd-ipsec-tunnel-guide/" rel="nofollow">OpenBSD IPSEC tunnel guide</a></h3>

<ul>
<li>If you&#39;ve ever wanted to connect two networks with OpenBSD gateways, this is the article for you</li>
<li>It shows how to set up an IPSEC tunnel between destinations, how to lock it down and how to access all the machines on the other network just like they were on your LAN</li>
<li>The article also explains some of the basics of IPSEC if you&#39;re not familiar with all the terminology, so this isn&#39;t just for experts</li>
<li>Though the article itself is a few years old, it mostly still applies to the latest stuff today</li>
<li>All the tools used are in the OpenBSD base system, so that&#39;s pretty handy too
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/ipfw2/" rel="nofollow">DragonFly starts work on IPFW2</a></h3>

<ul>
<li>DragonFlyBSD, much like FreeBSD, comes with more than one firewall you can use</li>
<li>Now it looks like you&#39;re going to have yet another choice, as someone is working on a fork of IPFW (which is actually already in its second version, so it should be &quot;IPFW3&quot;)</li>
<li>Not a whole lot is known yet; it&#39;s still in heavy development, but there&#39;s a brief <a href="http://www.dragonflybsd.org/docs/ipfw2/#index6h1" rel="nofollow">roadmap</a> page with some planned additions</li>
<li>The guy who&#39;s working on this has already agreed to come on the show for an interview, but we&#39;re going to give him a chance to get some more work done first</li>
<li>Expect that sometime next year, once he&#39;s made some progress
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NYgVifXN" rel="nofollow">Michael writes in</a></li>
<li><a href="http://slexy.org/view/s21X02saI3" rel="nofollow">Samael writes in</a></li>
<li><a href="http://slexy.org/view/s21Dj7zImH" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s218lXg38C" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s20SEuKlaH" rel="nofollow">Michael writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on the show this week, we&#39;ve got an interview with Brendan Gregg of Netflix. He&#39;s got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">Even more BSD presentation videos</a></h3>

<ul>
<li>More videos from this year&#39;s MeetBSD and OpenZFS devsummit were uploaded since last week</li>
<li>Robert Ryan, <a href="https://www.youtube.com/watch?v=Rc9k1xEepWU" rel="nofollow">At the Heart of the Digital Economy</a></li>
<li>FreeNAS &amp; ZFS, The Indestructible Duo - <a href="https://www.youtube.com/watch?v=d1C6DELK7fc" rel="nofollow">Except for the Hard Drives</a></li>
<li>Richard Yao, <a href="https://www.youtube.com/watch?v=PIC0dwLRBZU" rel="nofollow">libzfs_core and ioctl stabilization</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=LmbI7F7XTTc" rel="nofollow">Company lightning talks</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=gPbVPwScMGk" rel="nofollow">Hackathon Presentation and Awards</a></li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=_lGOAZFXra8" rel="nofollow">Fast File Cloning</a></li>
<li>Rick Reed, <a href="https://www.youtube.com/watch?v=TneLO5TdW_M" rel="nofollow">Half a billion unsuspecting FreeBSD users</a></li>
<li>Alex Reece &amp; Matt Ahrens, <a href="https://www.youtube.com/watch?v=Xs6MsJ9kKKE" rel="nofollow">Device Removal</a></li>
<li>Chris Side, <a href="https://www.youtube.com/watch?v=RMTxyqcomPA" rel="nofollow">Channel Programs</a></li>
<li>David Maxwell, <a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">The Unix command pipeline</a></li>
<li>Be sure to check out the <strong>giant list of videos</strong> from <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">last week&#39;s episode</a> if you haven&#39;t seen them already
***</li>
</ul>

<h3><a href="http://www.jarredcapellman.com/2014/3/9/NetBSD-and-a-Cobalt-Qube-2" rel="nofollow">NetBSD on a Cobalt Qube 2</a></h3>

<ul>
<li>The Cobalt Qube was a very expensive networking appliance around 2000</li>
<li>In 2014, you can apparently get one of these MIPS-based machines for about forty bucks</li>
<li>This blog post details getting NetBSD installed and set up on the rare relic of our networking past</li>
<li>If you&#39;re an old-time fan of RISC or MIPS CPUs, this&#39;ll be a treat for you</li>
<li>Lots of great pictures of the hardware too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">OpenBSD vs. AFL</a></h3>

<ul>
<li>In their never-ending security audit, some OpenBSD developers have been <a href="https://twitter.com/damienmiller/status/534156368391831552" rel="nofollow">hitting various parts of the tree</a> with a fuzzer</li>
<li>If you&#39;re not familiar, <a href="https://en.wikipedia.org/wiki/Fuzz_testing" rel="nofollow">fuzzing</a> is a semi-automated way to test programs for crashes and potential security problems</li>
<li>The program being subjected to torture gets all sorts of random and invalid input, in the hopes of uncovering overflows and other bugs</li>
<li><a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a>, in particular, has provided some interesting results across various open source projects recently</li>
<li>So far, it&#39;s fixed some NULL pointer dereferences in OpenSSH, various crashes in tcpdump and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a> and <a href="https://www.marc.info/?l=openbsd-cvs&m=141646270127039&w=2" rel="nofollow">a few other things</a></li>
<li>AFL has an impressive list of CVEs (vulnerabilities) that it&#39;s helped developers discover and fix</li>
<li>It also made its way into OpenBSD ports, FreeBSD ports and NetBSD&#39;s pkgsrc very recently, so you can try it out for yourself
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=372768" rel="nofollow">GNOME 3 hits the FreeBSD ports tree</a></h3>

<ul>
<li>While you&#39;ve been able to run GNOME 3 on PC-BSD and OpenBSD for a while, it hasn&#39;t actually hit the FreeBSD ports tree.. until now</li>
<li>Now you can play with GNOME 3 and all its goodies (as well as Cinnamon 2.2, which this also brings in) on vanilla FreeBSD</li>
<li>Be sure to check the commit message and <a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">/usr/ports/UPDATING</a> if you&#39;re upgrading from GNOME 2</li>
<li>You might also want to go back and listen to <a href="http://www.bsdnow.tv/episodes/2014_02_26-port_authority" rel="nofollow">our interview</a> with Joe Marcus Clark about GNOME&#39;s portability
***</li>
</ul>

<h2>Interview - Brendan Gregg - <a href="mailto:bgregg@netflix.com" rel="nofollow">bgregg@netflix.com</a> / <a href="https://twitter.com/brendangregg" rel="nofollow">@brendangregg</a></h2>

<p>Performance tuning, benchmarks, debugging</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.dragonflybsd.org/release40/" rel="nofollow">DragonFlyBSD 4.0 released</a></h3>

<ul>
<li>A new major version of DragonFly, 4.0.1, was just recently announced</li>
<li>This version includes support for Haswell GPUs, lots of SMP improvements (including some in PF) and support for up to 256 CPUs</li>
<li>It&#39;s also the first release to drop support for i386, so it joins PCBSD in the 64 bit-only club</li>
<li>Check the release notes for all the details, including networking and kernel improvements, as well as some crypto changes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=8645443" rel="nofollow">Can we talk about FreeBSD vs Linux</a></h3>

<ul>
<li>Hackernews had a recent thread about discussing Linux vs BSD, and the trolls stayed away for once</li>
<li>Rather than rehashing why one is &quot;better&quot; than the other, it was focused on explaining some of the differences between ecosystems and communities</li>
<li>If you&#39;re one of the many people who watch our show just out of curiosity about the BSD world, this might be a good thread to read</li>
<li>Someone in the comments even gave bsdnow.tv a mention as a good resource to learn, thanks guy
***</li>
</ul>

<h3><a href="http://www.packetmischief.ca/openbsd-ipsec-tunnel-guide/" rel="nofollow">OpenBSD IPSEC tunnel guide</a></h3>

<ul>
<li>If you&#39;ve ever wanted to connect two networks with OpenBSD gateways, this is the article for you</li>
<li>It shows how to set up an IPSEC tunnel between destinations, how to lock it down and how to access all the machines on the other network just like they were on your LAN</li>
<li>The article also explains some of the basics of IPSEC if you&#39;re not familiar with all the terminology, so this isn&#39;t just for experts</li>
<li>Though the article itself is a few years old, it mostly still applies to the latest stuff today</li>
<li>All the tools used are in the OpenBSD base system, so that&#39;s pretty handy too
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/ipfw2/" rel="nofollow">DragonFly starts work on IPFW2</a></h3>

<ul>
<li>DragonFlyBSD, much like FreeBSD, comes with more than one firewall you can use</li>
<li>Now it looks like you&#39;re going to have yet another choice, as someone is working on a fork of IPFW (which is actually already in its second version, so it should be &quot;IPFW3&quot;)</li>
<li>Not a whole lot is known yet; it&#39;s still in heavy development, but there&#39;s a brief <a href="http://www.dragonflybsd.org/docs/ipfw2/#index6h1" rel="nofollow">roadmap</a> page with some planned additions</li>
<li>The guy who&#39;s working on this has already agreed to come on the show for an interview, but we&#39;re going to give him a chance to get some more work done first</li>
<li>Expect that sometime next year, once he&#39;s made some progress
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NYgVifXN" rel="nofollow">Michael writes in</a></li>
<li><a href="http://slexy.org/view/s21X02saI3" rel="nofollow">Samael writes in</a></li>
<li><a href="http://slexy.org/view/s21Dj7zImH" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s218lXg38C" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s20SEuKlaH" rel="nofollow">Michael writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
